This is the user guide for HP StoreOnce VSA Backup system and is intended for users who install, operate and maintain the
HP StoreOnce Backup system.
Always check www.hp.com/go/storage/docs for the most current documentation, including localized versions (in PDF format)
for your product. (Search on Product Name and select the Product Manuals option.)
Refer to the Quick Specs on http://www.hp.com/go/storeonce for supported features for your model and the current status.
HP Part Number: TC458-96025
Published: July 2014
Edition: 2
Confidential computer software. Valid license from HP required for possession, use or copying. Consistent with FAR 12.211 and 12.212, Commercial
Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under
vendor's standard commercial license.
The information contained herein is subject to change without notice. The only warranties for HP products and services are set forth in the express
warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. HP shall
not be liable for technical or editorial errors or omissions contained herein.
Warranty
WARRANTY STATEMENT: To obtain a copy of the warranty for this product, see the warranty information website:
http://www.hp.com/go/storagewarranty
Acknowledgments
Linear Tape-Open, LTO, LTO Logo, Ultrium and Ultrium Logo are trademarks of Quantum Corp, HP and IBM in the US, other countries or both.
Microsoft, Windows, Windows NT, and Windows XP are U.S. registered trademarks of Microsoft Corporation. Intel and Itanium are trademarks
or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
The HP StoreOnce Backup system product firmware includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit. (http://
www.openssl.org/).
Revision History
June 2013Revision 1
First edition.
July 2014Revision 2
Second edition, issued with the 3.11.0 version of HP StoreOnce software.
•Overview of HP StoreOnce Backup products (page 7)
•User types and user roles (page 7)
•Navigating the StoreOnce Graphical User Interface (GUI) (page 9)
•Navigating the online help (page 10)
•The StoreOnce CLI (page 12)
•Licensing (page 12)
This guide
This guide contains detailed information on using the StoreOnce GUI and includes some Command
Line Interface commands and troubleshooting information.
•Tasks available only in the StoreOnce GUI are described only in this guide.
•Tasks available in both the GUI and CLI are described in this guide. (The CLI command is
described in greater detail in the HP StoreOnce Backup system CLI Reference Guide.)
•Tasks only available in the CLI are described fully in the HP StoreOnce Backup system CLI
Reference Guide. Those tasks may not be described in this guide.
Overview of The HP StoreOnce Backup system
The HP StoreOnce VSA extends the StoreOnce portfolio with the agility and flexibility of StoreOnce
as a virtual appliance. Install into an existing vSphere (v5.x) environment without the need for
dedicated hardware. Once installed and powered on, StoreOnce VSA is used by backup and
recovery applications as a backup target in the same way as physical StoreOnce appliances.
StoreOnce VSA can be deployed using either SEM or via a vSphere client specific hardware. The
StoreOnce VSA is available to purchase by license, which includes HP StoreOnce Catalyst and
Replication support.
The StoreOnce VSA model, TC458A and D4T77A:
•Description: A virtual machine with ten 1TB disks
•Ports: 2 x 1GBE ports
•Storage expansion: Up to ten virtual disks of 1TB
•Interfaces supported: iSCSI only
User types and user roles
User roles
Two roles define the permissions associated with a user; admin and user. Two default user accounts,
one for each role, are created automatically when the system is installed:
•Administrator: Authorized users can create and edit management and StoreOnce functions
via the GUI and CLI. The default login and password are Admin and admin. The permissions
role of the Administrator is admin. You cannot delete this account, but you can and should
modify its password. Note that once the Admin account password has been changed, its
password cannot be changed back to admin as this password is not sufficiently complex. The
This guide7
only way to revert that password back to admin is via the HPresetpassword account which is
only available on the local console of the device.
•Operator: This account limits access to the GUI and CLI to monitoring and viewing. The default
login and password are Operator and operator. The permissions role of the Operator is user.
User types
After installation, an Administrator can configure additional user accounts and assign permissions
roles (admin or user) and passwords to these users. See the HP StoreOnce Backup system userguide.
There are three types of user accounts:
•Local User (with an administrator or user permissions role): Local users log in locally.
•External User (with an administrator or user permissions role): User logs in as a domain user.
An external user is a Microsoft Active Directory user.
•External Group (with an administrator or user permissions role): An external user is a Microsoft
Active Directory group. Members of the group log in as domain users. If after creating a group
you then set up a member of that group as an individual user (external user) and give them
an administrator role, that user will be an administrator, even if the group role is set to user.
This is because role permissions set through Add User take precedence over role permissions
set through Add Group.
Any user with an admin role has the same permissions as the default Administrator. Any user with
a user role will have the same permissions as the default Operator.
NOTE:To add external users or groups, first add the StoreOnce device to an AD domain.
Connection to an AD Domain is configured through the NAS CIFS server tab on the StoreOnce
GUI. See Configuring CIFS Server with AD and CIFS Share with AD domain users (page 34).
IMPORTANT:If Admin credentials are lost, the Admin password can be reset through the account
“HPresetpassword”. This account is password protected and is only accessible from the StoreOnce
console and CLI. HP recommends the end-user change the HPresetpassword password after
installation and store it in an offline Password Security tool.
Tip
To identify current user rights view the title bar of the GUI. This shows your user Type, Name, andRole. See (page 10).
Powering off and on
HP recommends using the CLI commands to power off and on the system instead of using the
“power off” and “power on” controls on the hypervisor. See the HP StoreOnce VSA Deployomentand Configuration guide for more information.
Deployment of the Virtual Storage Appliance
HP StoreOnce VSA is a software-only version of the HP StoreOnce Backup System. Packaged as
a virtual appliance, it can be deployed and run on a vmware vSphere hypervisor (v5.x) or Hyper-V
Manager installed by the customer. Once deployed, the customer has access to web management
via the StoreOnce GUI or command line management via the CLI. The StoreOnce VSA Backup
System supports 10 x 1 TB virtual disks.
8Getting started
The customer is able to create the following backup target devices on the HP StoreOnce VSA:
•Catalyst stores
•iSCSI VT libraries
•CIFS NAS shares
The virtual appliance is fully compatible with StoreOnce hardware products for replication and
Catalyst Copy functions and is fully integrated within HP StoreOnce Enterprise Manager, both for
ease of management and for ease of deployment.
There are two methods of deployment:
•Using Hyper-V Manager
•Using vSphere Client (v5.x)
Instructions for deployment are in the HP StoreOnce VSA Deployment and Configuration guide.
Please consult the guide to deploy your StoreOnce VSA backup system.
Navigating the HP StoreOnce Graphical User Interface (GUI)
The HP StoreOnce GUI and CLI together make up the Management Console. While there is overlap
in what operations you can perform, not all operations are available from both interfaces.
The HP StoreOnce GUI is the main interface for:
•Monitoring the status and health of the HP StoreOnce Backup system and all configured backup
devices
•Creating and modifying VTL and NAS StoreOnce backup targets and Catalyst stores
•Managing replication relationships and housekeeping
To run the StoreOnce GUI
Log on to the StoreOnce GUI using a browser on any machine connected to the management
network; see “User types and user roles” (page 7) for default login information. The HP StoreOnce
Backup system uses a secure network connection.
Enter: https://<IP_address> .
NOTE:Entering http: in the URL path will automatically forward to the https: secure network
connection.
The StoreOnce GUI displays the Login prompt.
NOTE:The web browser requires Active Scripting or JavaScript enabled. If both are disabled,
some browser buttons may not be displayed.
Navigating the HP StoreOnce Graphical User Interface (GUI)9
GUI components
The GUI includes:
•Title bar: Displays the HP StoreOnce Backup system model, the user name and role, and
contains the Logout and Help buttons.
NOTE:After 15 minutes of inactivity, the session times out and returns to the Login screen.
•System Status (top left side panel): Displays the last time the system was updated (the machine
time) and a count of event status categories.
The three icons described below are used in the System Status area. They do not identify the
event that has affected the status. To view the individual events for more detail, select Events
from the Navigator, as described in Events (page 124).
Indicates standard information.
Indicates a warning state. Attention is needed but the error is not critical to the successful operation of
the device. For example, a single disk failure occurs or disks are installed in an expansion shelf but
not licensed.
Indicates a critical state. The system requires immediate attention. This icon may also appear in the
Details area of the screen with a red square background (rather than a red circle).
•Navigator (left side panel): Displays available GUI topics and enables navigation to selected
topic pages. A + sign next to a topic indicates additional options; click + to expand the
selection and click — to contract the selection.
•Topic page (main window): Initially, the main window displays the top-level StoreOnce topic
page. Select another topic from the Navigator to display the page for that selection. Some
Topic pages require selection of an item, such as a library, NAS share, or Catalyst store in
the top half of the page to display details specific to the selected item in the lower half of
page. Some Topic pages include multiple tabs within the page, for example the VTL—Libraries
page. Select a tab to display information and actions appropriate to that tab.
Navigating the online help
The Help link in the top right-hand corner of each page displays context-sensitive information for
the current page.
10Getting started
The following example displays the Help when selected from the NAS Mappings page.
•Click and drag on a side or a corner to expand or contract the Help window.
•The header displays the page where the help was called. Links navigate to the next or previous
pages; the titles of the next and previous pages are beneath the respective links.
•The footer also provides navigation options. Select home to access the help Home page which
provides access to the complete online help and Contents, Search, and Index options. Resize
the page to view all of the content.
Navigating the online help11
The StoreOnce CLI
The StoreOnce Command Line Interface (CLI) provides an alternative way of administering and
monitoring the system. Some tasks are only accessible from the StoreOnce CLI.
StoreOnce CLI commands require an SSH client application (freely available from the internet) and
must be run from a SSH terminal session as described in Accessing the CLI (page 126).
See the HP StoreOnce Backup system CLI Reference Guide for more information about the StoreOnce
CLI commands.
Licensing
HP StoreOnce VSA has a single license that enables StoreOnce Catalyst and Replication. The
license also includes the security features of Data at Rest Encryption, Data in Flight Encryption, and
Secure Erase.
Security Features
The security features of Data at Rest Encryption, Data in Flight Encryption, and Secure Erase are
part of the VSA license.
NOTE:StoreOnce replication can be encrypted at the Network layer. This feature is included in
the Security license. See the HP StoreOnce Backup system CLI Reference Guide for more details;
review the networking configuration commands such as net add encryption.
Data at Rest Encryption
When enabled, the Data at Rest Encryption security feature protects data at rest on a stolen,
discarded, or replaced disk from forensic attack.
Creation of a new VTL library, Catalyst store, or NAS share provides the option to enable encryption
if the license was already applied. Once enabled, encryption will automatically be performed on
the data before it is written to disk. Encryption cannot be disabled once it is configured for a library,
Catalyst store, or NAS share.
When creating an encrypted library, Catalyst store, or NAS share, the key store is updated with
the encryption key. This key store may be backed up and saved securely offsite in case the original
key store is corrupted. However, keep only the latest version of the key store as a backup. The key
store on the StoreOnce Backup system is updated each time you create a library, Catalyst store,
or NAS share. The StoreOnce CLI command that backs up the key store also encrypts it, ensuring
it can only be decrypted by the HP StoreOnce backup system.
NOTE:Each configured library, Catalyst store, or NAS share uses a different key. The StoreOnce
software automatically tracks which key is relevant to which device in the Key Store File. Keys are
automatically re-applied to the correct device if the key store file is restored.
IMPORTANT:Be very diligent about backing up your keystore if you are creating encrypted
stores or libraries. See the HP StoreOnce Backup system CLI Reference Guide for more information
about the StoreOnce CLI commands for backing up and restoring key stores.
Data in Flight Encryption
When enabled, the Data in Flight Encryption security feature protects data that is in transit from
forensic attack using the IPsec protocol. The data can be moving between two StoreOnce Backup
appliances or a StoreOnce Backup appliance and a backup server.
Data in Flight Encryption is configured using the net [add/modify/delete] encryption
commands in the CLI; see the HP StoreOnce Backup system CLI Reference Guide for more
information.
12Getting started
Secure Erase
Secure Erase can be enabled for all store types. This feature enables allows secure erasure of data
that was backed up as part of a regular backup job. The Secure Erase feature can only be enabled
after store or library creation (edit the store or library to enable Secure Erase). All data written to
disk once Secure Erase is enabled will be securely erased upon data deletion. For example, you
may have unintentionally backed up confidential data and need to be sure that it has been securely
erased. Work with the backup application to trigger the Secure Erase, for example by forcing the
format of a cartridge. The backup application sends the request to delete the data and the deletion
is carried out as part of the Housekeeping function.
WARNING!To immediately remove data, ensure the backup application is configured correctly.
Rotation and retention policies may need to be revisited to ensure that the data is expired.
NOTE:The Secure Erase process may take some time depending on the Housekeeping workload.
Only chunks not referenced by any other items can be securely erased. If a chunk is referenced
by another item which is not marked for Secure Erase, then the referenced chunk will not be erased,
securely or otherwise. Use the backup application when performing a Secure Erase on stores,
shares, or libraries that have Secure Erase enabled.
Security Features13
2 StoreOnce functions
The following topics are covered in this chapter:
•Overview of the HP StoreOnce page (page 14)
•System information and status (page 14)
Overview of the HP StoreOnce page
The initial page at GUI logon provides important information about system status and processes
that are running (see System information and status (page 14)).
It also provides access to individual StoreOnce functions, which are available as sub topics (click
+ to display them in the Navigator).
•VTL (Virtual Tape Libraries) functions (page 16)
•NAS functions (page 30)
•Replication functions (page 50)
•HP StoreOnce Catalyst functions (page 80)
•Housekeeping (page 105)
•StoreOnce reporting (page 110)
System information and status
System information
This section provides information unique to an individual HP StoreOnce Backup system.
Table 1 System information parameters
DescriptionParameter
The model of StoreOnce Backup system.Type
The name of the StoreOnce Backup system.Name
Serial Number
IP Address
The serial number of the StoreOnce Backup system (use this number when contacting HP
Support).
The software revision running on the StoreOnce Backup system.Software Revision
The IP addresses configured for the StoreOnce Backup system. This is the IP address that
you should use when targeting backups and setting up replication mappings and Catalyst
jobs.
If vLAN tagging has been configured on your network, there is an option to expand the
list so that you can see all the vLAN IP addresses that have been configured. For more
information about vLAN tagging, see your product’s HP StoreOnce Backup systemInstallation and Configuration guide.
14StoreOnce functions
Table 1 System information parameters (continued)
DescriptionParameter
HP StoreOnce VSA Backup systems may have up to two IP addresses depending on how
the network is configured. See the HP StoreOnce VSA Deployment and Configurationguide for more information.
Status
This section provides details about the rolled-up system status of the system and the status of the
services running.
Table 2 Status parameters
DescriptionParameter
The state of the system.Overall Status
StoreOnce Subsystem
The status of the background support processes such as EventManager and
ResourceManager.
The status of the VTL service.Virtual Tape
The status of the NAS service.NAS
The status of the StoreOnce Catalyst service.StoreOnce Catalyst
The status of the Replication service.Replication
The status of the Housekeeping service.Housekeeping
System information and status15
3 VTL (Virtual Tape Libraries) functions
The following topics are covered in this chapter:
•VTL page (page 16)
•Libraries page (page 16)
•Make Replication Target libraries visible to the host (page 28)
VTL Configuration page
Select VTL from the HP StoreOnce menu to display the current VTL configuration.
The HP StoreOnce–VTL page includes the following tabs:
•iSCSI Settings tab (page 16)
NOTE:Equivalent StoreOnce CLI commands are available for the tasks described in this section.
See the HP StoreOnce Backup system CLI Reference Guide.
iSCSI Settings tab
By default, a new library is automatically created whenever a new server first connects to the HP
StoreOnce Backup system using the iSCSI initiator. Users with an Admin login may use this page
to disable this feature.
Click Edit and make sure the Auto Creation Enabled box is unchecked.
Libraries page
Click VTL — Libraries in the Navigator panel to display existing libraries.
The top half of the Libraries page shows all libraries configured for the appliance. Click on a library
to display its details in the lower half of the page. Users with an Admin login may edit these settings
and delete or create libraries.
The lower half of the Libraries page contains tabs that display information relevant to the selected
library:
•Device details tab (page 17)
•Interface information tab (page 22)
•Cartridges tab (page 23)
16VTL (Virtual Tape Libraries) functions
Working with the Libraries list (top half of page)
The Libraries list in the top half of the page provides columns of details.
•To sort the list according to a column, click on the column heading and select Sort Ascending
or Sort Descending.
•To hide or show columns, click on any column heading, select Columns and uncheck or check
the preferred columns.
•Users with an Admin login may also create libraries. Click Create.
See Create a library (page 19) for more information.
•Users with an Admin login may edit details on some of the tabs for individual libraries (not
all tabs have editable information). The relevant GUI buttons are on the tab. For example,
each Edit button shall trigger edit mode only for the current tab. When in edit mode, each
tab shall have its own Update and Cancel buttons. If a user changes tab while in edit mode
a warning dialog advises that any changes they have made will be lost.
The Delete button is on the Device Details tab only and will delete the entire library.
Table 3 Libraries parameters (top half of page)
DescriptionParameter
Name
Replication Role
Status
Connection
Cartridges / Slots
Port
Identifies the selected device (library). HP recommends usnig a name that identifies the
host or backup job with which it is associated.
The role of the library, which may be non-replicating, replication source or replication
target.
The status of the library, which may be online, offline, notstarted, failed to start, stopping,
creating, or deleting.
Indicates whether the library is connected. Possible values are: Connected – A client
device is connected to any device (robotics or drive) within this library. Not Connected
– No device is connected to this library.
The emulation type used by the backup software. It is selected when you create a device.Device Type
The number of cartridges or slots available on the device, which is determined by the
Emulation types for tape device selected when the device was created. You can reduce
the number of slots in the Device Details tab for a library selected on this page, but this
will only remove the highest empty slots. Once it reaches a slot number that contains
data, it will not allow you to reduce the number further on this page, even if earlier slots
are blank. You must first use the Cartridges tab to make the slot empty.
Identifies the port to which the host is connected for backup and restore. The number of
ports available in the drop-down menu depends upon the interfaces that your model
supports and your network configuration.
There is always one iSCSI port.
The amount of user data stored on the library.User Data Stored
The actual size used on disk (after deduplication).Size On Disk
Dedupe Ratio
Device Details tab
This tab displays device-specific information for the selected library.
Users with an Admin login may perform the following tasks from this tab:
•Create a library (page 19)
•Edit a library (page 20)
The deduplication ratio achieved on the data on the library. If deduplication is disabled,
the column displays “Dedupe Disabled.”
Libraries page17
•Delete a library (page 21)
•Make Replication Target libraries visible to the host (page 28)
Table 4 Device Details tab
DescriptionField
Library Name
Emulation Type
Drive emulation
Total Number of
Cartridge Slots
The name used to identify a particular library. Enter a name that identifies the host or backup
job with which it is associated.
The emulation type of the library. The HP StoreOnce Backup system supports a number of
emulation types. . See also Emulation types for tape device (page 21). The emulation type
determines the available embedded drives and cartridge slots. For example, if you select
HP MSL G3 Series (2x24), the device emulates an MSL 2024 Library with two embedded
tape drives and a possible total of 24 cartridge slots. Consult your backup application
technical support information for information about device types they support.
The drive emulation type, HP LTO–2, 3, 4, 5 or 6, determines the default capacity of the
cartridges within the library device and the iSCSI inquiry string information provided to the
backup application. Tape cartridge capacities can be increased at any time (but not
decreased), as long as the cartridge is blank, regardless of the drive emulation generation
number.
If you selected D2DBS Generic for the Library Emulation Type, Ultrium VT is an option for
drive emulation. This is a generic Ultrium device which is clearly identifiable as virtual.
Where supported by the backup application, HP recommends that D2DBS Generic and
Ultrium VT are used in preference to the other emulation types.
All drives on a library configured with the IBM-TS3500 emulation type will use the IBM-LTO3
drive emulation type. If the library is then changed to a different emulation type, the drives
will change to the new emulation type.
If you edit this field, the new setting applies only to the next drives that are created within
the library, it is not retrospectively applied to existing drives.
Define the number of cartridge slots in the library. The number of slots available depends
upon the Emulation Type selected. Each slot is automatically populated with a new cartridge
upon creation. The cartridge capacity corresponds to the Drive Emulation type.
You can change the maximum size of the cartridge as long as it is blank. This means that
the value can only be changed after the device is created and before it is accessed by the
backup application.
Number of Drives
Deduplication
Media Changer Port
18VTL (Virtual Tape Libraries) functions
The default number of drives is determined by the Emulation Type selected. If increasing the
number of drives, DO NOT exceed the maximum number of libraries and drives that a host
can physically access: see StoreOnce key parameters (page 137). The number of drives can
only be edited during library creation from this field. After library creation, there is a separate
button to Add/Remove drives.
Enables deduplication if the check box is selected (default); unselect to create a
non-deduplication library. Deduplication cannot be enabled or disabled once the library is
created.
The date the library was created is generated automatically.Creation Time
Identifies the port on the HP StoreOnce Backup system to which the device is connected.
This will be the port used for the Library device as well as the default port for embedded
tape drives. The number of ports available in the drop-down menu depends upon the
interfaces that your model supports and your network configuration.
There is always one iSCSI port.
Table 4 Device Details tab (continued)
DescriptionField
Number of Barcode
Characters
Encryption Enabled
Secure Erase Mode
Backup Application
Data Type
iSCSI Initiator Name
(iSCSI devices only)
Enables configuration of the barcodes for the library to display six or eight characters. The
HP StoreOnce Backup system generates barcodes automatically for cartridges. When entering
a barcode manually, 8 characters are required. If the 6–character barcode is selected, the
StoreOnce Backup system will truncate to the top six characters, removing the top two
characters of an 8–character barcode, i.e. barcode 1ABCDEFG will truncate to BCDEFG.
The barcode is displayed with the truncated characters in brackets on the Cartridges tab,
(1A)BCDEFG.
Enables Data at Rest Encryption if you applied a Security license. Encryption cannot be
enabled or disabled once a library is created; it can only be enabled at library creation. If
enabled, encryption is performed prior to writing data to disk for this library. The correct
license must be applied to enable encryption.
Enables Secure Erase if you have applied the Security license. “None” leaves it disabled
(default). To enable, select the number of preferred Overwrite Passes (1, 3, 5, or 7). This is
the number of times the data is written over after deletion. See “Secure Erase” (page 13)
for information about the Secure Erase feature.
The backup application used on the system. This optional field is provided to assist with
support troubleshooting and has no impact on performance or deduplication efficiency.
The type of data being protected by the backups. This optional field is provided to assist
with support troubleshooting and has no impact on performance or deduplication efficiency.
This is the Initiator Node Name of the host that will back up to this device. You must enter
it manually when you are creating a new device. If you are using the Microsoft iSCSI Initiator,
you can find the name by running the iSCSI Initiator on the host and copying the Initiator
Node Name from the General tab.
NOTE:iSCSI multi-initiator mode is not supported.
To create a new library (administrators only)
HP recommends:
•Only configure the libraries that you need
•Only configure the number of cartridges that you are likely to need
NOTE:Refer to the HP StoreOnce Backup system Concepts and Configuration Guidelines,
available on the HP Support web site, for guidelines on setting up a backup policy/job within
backup applications. This document is helpful in determining the required number of libraries and
cartridges.
You can add cartridge slots at a later date to expand the system and remove individual blank
cartridges from a library without deleting the whole library.
1.To create a new library device for the host, click Create in the upper left corner of the screen.
2.Enter the appropriate details in the Device details tab (page 17).
To enable Data at Rest Encryption for the new library, configure it at this time by checking the
Encryption Enabled box. This feature requires a license. If the license is not installed, an
information message is displayed next to the check box stating Not Licensed. See “Security
Features” (page 12) and “Licensing” (page 12) for more information.
NOTE:The Replication Wizard does not allow creation of an encrypted target library. If a
replication target library needs encryption enabled, you must create the library on the target
appliance before replication mapping to it.
Libraries page19
3.Click Create. The Cartridges tab is only generated after the library is created. The information
on the Interface Information tab is generated automatically.
NOTE:Once the library has been created, you can enable Secure Erase. See “Edit a
library” (page 20) for more information.
Guidelines on creating libraries
The table below illustrates maximum configurations for libraries and drives, but this number may
be limited if you have already created NAS shares and Catalyst stores. For more detailed device
configuration examples see the HP StoreOnce Concepts and Configuration Guidelines.
Table 5 Maximum number of libraries and drives/slots per library
emulation)
To edit library details (administrators only)
It is possible to edit some, but not all, device details after creating a library.
StoreOnce VSA
16Maximum drives per library/appliance (D2DBS and ESL
96Maximum cartridges per library (D2DBS and ESL emulation)
3200Maximum cartridge size (GB)
•Delete cartridges by reducing the number of slots on the Devices page. This will only remove
the highest-numbered empty slots. Once the Delete operation reaches a slot number that
contains a cartridge, it will not allow further reduction on the Details page, even if previous
slots are empty. To open previous slots first use the Cartridges tab to delete the cartridge from
the slot.
•Changing the cartridge size (by changing the emulation type) on this page will only change
newly-added cartridges; it does not change the size of cartridges that were already created.
•You can reduce the number of drives but, if you go to 0, the port setting will change to "No
Port".
The Number of Drives field can only be edited during library creation. After library creation,
there is a separate button to Add/Remove drives.
•You cannot change the library type to a type that has a smaller set of maximum values (e.g.
number of cartridges) than is currently set.
•You cannot enable or disable deduplication.
•Once the library is created and the correct license is applied, the Secure Erase Mode box
appears on the Device Details tab. The selection box defaults to None, meaning Secure Erase
is disabled. To enable Secure Erase, select the preferred number of Overwrite Passes (1, 3,
5, or 7). If enabled, this feature allows you to securely erase confidential data that may have
20VTL (Virtual Tape Libraries) functions
unintentionally been backed up as part of a regular backup job. See “Security
Features” (page 12) and “Licensing” (page 12) for more information.
1.Select the device in the list to display its details and then click on Edit.
2.Amend details as appropriate and click Update to apply them.
To add/remove drives
1.Click Add/Remove drive.
2.The maximum number of drives is shown, below which you can edit the Number of Drives.
3.Click OK. If you provide an invalid value the text box will be surrounded in a red border.
To delete a library (administrators only)
Select the required device and then click Delete on the Device Details tab to delete it. You will be
prompted to confirm deletion.
WARNING!All data on the device will be deleted. The library's deduplication store is also deleted.
It may take some time to delete all the files and free space on the HP StoreOnce Backup system.
If Secure Erase is enabled for this store, this data will be deleted securely.
Emulation types for tape devices
HP StoreOnce Backup systems emulate a range of physical tape devices listed in Emulation types.
Table 6 Emulation types for tape devices
DescriptionEmulation type
D2DBS Generic
EML E Series
ESL E Series
If supported by your backup application, this is the preferred emulation type because it does
not emulate any physical library types in existence and is, therefore, clearly identifiable as
a StoreOnce device. It is the most flexible emulation type available; however, backup
application support varies by software vendor.
If you have selected D2DBS Generic for the Library Emulation Type, you will be able to
select Ultrium VT for the drive emulation. This is a generic Ultrium device which is clearly
identifiable as virtual. Backup application support for Ultrium VT is common, but not quite
as complete as the D2DBS library type, so its not possible to use it with all backup software.
NOTE:Symantec prefers their customers use this emulation type with BackupExec and
Netbackup.
An enterprise tape library solution that allows you to configure up to 500 drives and up to
4096 cartridges per library (HP 4900 = up to 16384 cartridges per library).
An enterprise tape solution that allows you to configure up to 500 drives and up to 4096
cartridges per library (HP 4900 = up to 16384 cartridges per library).
IBM-TS3500
MSL G3 Series (2x24)
A tape library device that appears as a native IBM TS3500 device in a TSM environment
to allow use of standard IBM drivers. The emulation type is configured at the library level.
Therefore, all drives on a library configured with the IBM-TS3500 emulation type will use
the IBM-LTO3 drive emulation type. If the library is then changed to a different emulation
type, the drives will change to the new emulation type.
A tape library device with a maximum of two embedded Ultrium tape drives and 24 cartridge
slots. It should be used when implementing rotation schemes which involve simultaneous
backup jobs to two devices. This emulation type is widely supported by backup applications.
Libraries page21
Table 6 Emulation types for tape devices (continued)
DescriptionEmulation type
MSL G3 Series (4x48)
MSL G3 Series (8x96)
A tape library device with a maximum of four embedded Ultrium tape drives and 48 cartridge
slots. It should be used when implementing rotation schemes which involve simultaneous
backup jobs to more than two devices or those that use a large number of cartridges devices.
This emulation type is widely supported by backup applications.
A tape library device with a maximum of eight embedded Ultrium tape drives and 96
cartridge slots.
Flexible emulation
The ESL, EML and D2DBS emulations are particularly flexible because they allow you to configure
a large number of drives per library. The main benefits are that a large number of drives allows:
•more concurrent streams on backups which are throttled due to host application throughput,
such as multi-streamed backups from a database.
•a single library (and therefore deduplication store) to contain similar data from backups that
must run in parallel to increase deduplication ratio.
If using these flexible emulation types, the following factors should also be considered:
•An important consideration when configuring VTL devices is that the library and each drive
that you configure for it counts as a separate device. There are practical limitations on the
number of devices that each host and Fibre Channel switch or HBA can access. See StoreOnce
key parameters (page 137).
For iSCSI VTL devices, a single Windows or Linux host can only access a maximum of 64
devices. A single library with 63 drives is the most that a single host can access. Configuring
a single library with more than 63 drives will result in not all devices in the library being seen
(which may include the library device). The same limitation could be hit with multiple libraries
and fewer drives per library.
•The total device value also applies to NAS shares and Catalyst stores. If you configure the
full value as VTL devices, you will not be able to configure any NAS shares or Catalyst stores
for that .
•Refer to the HP StoreOnce Backup system Concepts and Configuration Guidelines for maximum
and recommended values.
Interface Information tab
This tab shows interface information for the media changer and drives on the selected library.
The information for the Interface Information tab is generated automatically and manual configuration
is discouraged.
The following information is provided for a device that is configured to use the Fibre Channel
interface.
iSCSI interface
The following information is provided for a device that is configured to use the iSCSI interface.
22VTL (Virtual Tape Libraries) functions
Table 7 iSCSI Interface Information
DescriptionField
Device Name
Device Serial Number
Name
Active Connections tab
This shows the Session information of any active connections to the library; it displays information
about open iSCSI sessions. All details are generated automatically and cannot be edited.
If a device is showing as not connected, this indicates that the iSCSI Initiator on the host has not
logged on. Log on using the iSCSI Initiator and set the device as a Persistent Target for that host
to ensure that it will automatically log on again whenever the host is rebooted.
The device name lists all of the devices for the specific Library. There will be an entry for the
Medium Changer, and for each of the drives configured.
This defines the port to which each media changer or drive is connected.Port
This is a unique serial number for the device. It is generated automatically by the HP
StoreOnce Backup system and cannot be edited.
This is provided when the device is created.World Wide Node
This is generated automatically by the HP StoreOnce Backup system for iSCSI devices.iSCSI Target Name
This is generated automatically by the HP StoreOnce Backup system for iSCSI devices.iSCSI Alias
Cartridges tab
This tab shows cartridge information for the selected library.
Users with an Admin login can perform the following tasks from this tab:
•Create a cartridge (page 25)
•Delete a cartridge (page 25)
•Write protect a cartridge (page 26)
•Edit maximum cartridge size (page 27)
•Move or unload a cartridge (page 27)
Libraries page23
Table 8 Cartridge tab parameters
DescriptionField
Location
Barcode
Mapped Slot
Identifies each element of the library available to hold a cartridge. The types of elements
are:
• Mail slot: a dedicated slot used to hold a cartridge that is ready for exporting to or
importing from physical tape. The Mail slot is not used with HP StoreOnce models.
• Tape drive: populated when there is activity on a cartridge. You can move a cartridge
into a tape drive by using the Move Cartridge drop-down menu in Edit mode.
• Slot n: one of the standard library slots.
A barcode is an 8– or 6–digit, alphanumeric, unique identifier for a cartridge within the HP
StoreOnce Backup system. Barcodes are shared with the backup application upon request.
The backup application can choose to assign its own internal identifier to the cartridge but,
if it does so, the backup application cannot assign this identifier to the Cartridge barcode.
Barcodes are generated automatically but may be edited by the user. When editing the
barcode:
• It must be unique and must not start with the letters “CLN” or “DG” because these are
reserved designations for cleaning and diagnostic cartridges.
• It should be a minimum of 6 characters. Valid ASCII characters are A-Z, a-z, 0–9.
Barcodes are always displayed as 8 characters with letters in capitals on the StoreOnce
GUI and CLI (padded with space characters) regardless of the size selected. However,
if the Number of Barcode Characters is set to 6, only the rightmost 6 characters will be
visible to the backup software, i.e. barcode 1ABCDEFG will truncate to BCDEFG.
(Truncated barcode characters are shown in brackets in the Cartridges tab.)
Check box indicates whether the slot is included in a replication mapping configuration. It
cannot be edited from this page.
The actual used capacity in MB or GB.Used Size
Max Size
Write Protected
Last Written
Defaults to the appropriate capacity for the drive emulation type selected on the Devices
tab. This value may be changed if the Used Size is Blank, see below. The maximum value
allowed is 3200 GB.
Check box that enables (checked) and disables (unchecked) write protection, see “Write
protect a cartridge” (page 26).
Identifies when the cartridge was last written to and is useful when identifying data for
copying or exporting.
NOTE:Additional columns appear when function buttons are selected below, such as Create,
Move, and Delete.
24VTL (Virtual Tape Libraries) functions
Empty slots
Empty slots are slots containing no cartridges and all the fields are empty.
•Tape drive row: A library consists of two devices: a tape drive and changer device. This
location refers to the tape drive element of the library and is normally only populated when
the backup application on the host is writing to or reading from the library.
•Mail slot row: This location is the slot used for importing and exporting cartridges from a
library. It is provided by StoreOnce virtual libraries for compatibility with backup applications
but is not used.
•Numbered slot row: This slot is empty after a Delete operation or after the backup application
has moved data to the mail slot for export.
Once a numbered slot is empty, the Create button may be used to create a new blank cartridge.
To create a cartridge (administrators only)
NOTE:You can only create a cartridge in an empty slot.
Click the Create button. In the Add Cartridge column, empty slots are checked.
Select individual slots by clicking the appropriate check boxes. After selected the slots where
cartridges should be added, click Create.
Alternatively, click Create all to create a blank cartridge of the size/emulation type selected when
the library was first configured in all empty slots.
•If you create a cartridge in an empty slot, the backup application must inventory it (add it to
its database or catalog) before the backup application can access the cartridge.
•If you create a cartridge in an empty mail slot, use the backup application to move the blank
new cartridge to an empty cartridge slot without requiring an inventory. This saves processing
time.
Restart the backup application services to see the new cartridges.
To delete a cartridge (administrators only)
To delete individual cartridges, select individual slots by clicking the appropriate check boxes in
the Delete Cartridge column. Then click Delete.
Libraries page25
CAUTION:A dialog is displayed, warning that all data will be lost and asking you to confirm
the Delete action.
NOTE:You cannot delete cartridges that are currently in drives, that are mapped for replication,
or that are in the delete pending, erase pending, or creating state.
If you click Cancel, the cartridges will not be deleted and you remain in delete mode. Click Delete
to continue and the selected cartridges will be deleted. The GUI does not differentiate between
cartridges with data and blank cartridges.
NOTE:You can also delete cartridges by reducing the number of slots on the Devices page, but
this only removes the highest slots with no or blank cartridges. Once the Delete operation reaches
a slot number that contains a cartridge with data, it will not reduce the number further on the Details
page even if earlier slots are blank. First use the Cartridges tab to reconfigure the slots to a blank
state.
To delete all or a range of cartridges (administrators only)
To delete all the cartridges in the library at once, click Delete All. This opens a window with several
options:
•Delete — Remove cartridges (default): completely deletes the cartridges
•Erase — Erase cartridge data: deletes the data but leaves the cartridge configurations intact
You can also determine which cartridges to delete or erase:
•All Cartridges
•Range: enter the first and last slot to be included in the delete or erase.
Finally, if you select the “Delete cartridges with data” check box, cartridges containing data will
be deleted. If unselected, only blank cartridges are deleted. After all of the options are selected,
click OK. A confirmation box appears; click OK.
NOTE:You cannot delete cartridges that are currently in drives, that are mapped for replication,
or that are in the delete pending, erase pending, or create state.
To write protect a cartridge (administrators only)
1.Click Edit for the selected library.
2.Check the Write Protected check boxfor the cartridge(s).
26VTL (Virtual Tape Libraries) functions
3.Click Update. Your backup application will not be able to write any more data to the
cartridge(s).
To edit maximum cartridge size (administrators only)
The Max Size defaults to the appropriate capacity for the drive emulation type selected on the
Devices tab, but this value is editable. The maximum value allowed is 3200 GB.
NOTE:The maximum size indicates the maximum amount of user data that can be written to that
cartridge, assuming uncompressed data; it will only be committed when data is written to it.
Changing the maximum space does not affect actual disk usage or save disk space but may be
useful if you know you will be moving data to a physical tape with a smaller cartridge capacity.
1.Click Edit for the selected library.
2.Select a value from the drop-down menu, and click Update.
To move or unload cartridges
You can move cartridges, but only to an empty Location (tape drive or numbered slot).
•Click the Move button. The Move Cartridge drop-down menu lists available empty slots. (Empty
numbered slots are created when a cartridge is deleted.)
•Use the Unload all Cartridges button to return all cartridges to default slots.
Libraries page27
The move and unload options may be useful to re-align the library configuration against the backup
application. For example, if the backup application has crashed or if the backup application does
not support the Move Medium command, the library and the backup application can become out
of sync.
NOTE:You cannot move or unload cartridges that are in the delete pending, erase pending, or
create state.
Make Replication Target libraries visible to the host
NOTE:See Replication functions (page 50) for more details on replication configuration.
Replication Target libraries are not normally visible to the host, but you can configure devices to
make them visible to backup applications. This allows the backup application to:
•Move cartridges from storage slots to drives in the library.
•Perform read and verify operations on the cartridge (but not write).
•Perform load/unload operations on the tape device.
WARNING!Use with care. If the backup application can see both source and target libraries,
the application cannot distinguish between the source library and the target library because the
barcodes are duplicated in the two locations.
Why make target libraries visible?
It may be useful to make a target library visible to the backup application on the host to:
•Confirm replication is working correctly and check the integrity of the replicated backup by
doing a test restore.
•Perform manual tape copy jobs (sometimes called tape offload) to any tape device on the
network using the backup application.
IMPORTANT:You cannot change data on a Target library cartridge; you may only load it
temporarily into a physical tape device to read it.
28VTL (Virtual Tape Libraries) functions
Best practices for using this feature
WARNING!Failure to follow best practices may cause instability and damage to your backup
system and data. Cartridges can be marked as unusable or the backup application can attempt
to write to target cartridges.
•Verify no replication jobs to the selected target cartridge are in progress.
•Verify no backup jobs to the mapped source cartridges are scheduled.
•Verify the backup application media server instance to be used is not within the same
cell/domain that can access the source cartridge.
•Import the data on the target cartridge into the backup application (this operation must be
repeated after each replicate operation to the cartridge).
•Perform the desired operation on the cartridge, which may be:
Verify the cartridge using the backup application either with a verify command or by
◦
performing a restore.
◦Copy the cartridge to a physical tape device connected to the media server.
How is a target device made visible?
1.Create the replication mapping as normal. See Running the replication wizard (virtual tape
devices) (page 64), as appropriate.
2.From the host that has access to the target library on the VTL — Libraries page, select the
target library in the Libraries list.
3.Click Edit.
4.The Port defaults to None. Select the appropriate iSCSI Port.
5.Click Update.
6.Make the target library visible from other hosts. Configure the Fibre Channel fabric to make
the host visible. Target visibility persists even if the power fails or if the replication mapping
is removed.
NOTE:To remove target visibility, reset the Port to None.
Make Replication Target libraries visible to the host29
4 NAS functions
This page provides access to the following StoreOnce NAS functions:
•NAS Configuration (page 30), allows users to configure CIFS and NFS servers and permissions
•Shares (NAS) (page 43), allows users to view and manage NAS shares
NAS Configuration page
Select NAS from the StoreOnce menu item to display the NAS configuration page.
Two tabs allow configuration of a CIFS Server or an NFS Server for the shares.
•The CIFS server provides CIFS interface shares that provide backup targets to Windows servers.
See CIFS Server tab (page 30).
•The NFS server provides NFS interface shares that provide backup targets to UNIX and Linux
servers. See NFS Server tab (page 42).
CIFS Server tab
There are two configuration stages when creating a backup target share that Windows users can
access; both stages are implemented from the Web Management Interface:
•Configure authentication for the StoreOnce Backup system CIFS server. These settings then
apply to the appliance and all NAS CIFS shares created on it.
•Create NAS CIFS shares on the HP StoreOnce Backup system. See Creating a CIFS
share (page 45).
Configuring the CIFS server
1.Select NAS on the StoreOnce GUI.
2.Select the CIFS Server tab. It displays the authentication settings.
NOTE:The CIFS Server tab also shows the SMB Signing field. This feature improves security
at the protocol level and will be available in an upcoming release.
3.Click Edit to modify the authentication settings.
Three authentication options provide different levels of security for CIFS NAS shares: None
(default), User, and AD (Windows Active Directory). Before configuring the settings, determine
the appropriate setting for the particular network and collect any additional information that
may be required to complete the configuration.
NOTE:AD authentication joins the StoreOnce Backup system to an AD domain and is not
unique to NAS shares. It is also required when adding external users or external groups from
an AD domain to the StoreOnce Backup system, see User Management (page 114).
30NAS functions
•None (no authentication)
This provides a simple CIFS server configuration that allows for the creation of shares
with no authentication. Any user or computer can mount and access the shares created
on the HP StoreOnce Backup system with this setting.
•User authentication
This provides a method of securing the CIFS shares to be accessed only by specified users
local to the CIFS Server. Once the server is configured to User mode, it is possible to
create new local users by selecting Create User. See Configuring user
authentication (page 32) for more information.
•Active Directory (AD) authentication
This allows the CIFS server to join a Windows Active Directory domain. Access to
individual CIFS shares is managed from the Windows domain controller server which
provides the names of domain users and groups with access. See Configuring CIFS Server
with AD and CIFS Share with AD domain users (page 34) for detailed instructions.
4.Click Update. A popup window will advise that if you update the CIFS Server settings, any
backup or restore jobs in progress for it will fail.
5.After reading the advisory, click Continue (or Cancel).
IMPORTANT:When switching authentication modes, the user must log out and back into
the Windows client before the new authentication settings will work.
6.The system is now configured to create CIFS NAS shares. See Creating a CIFS share (page 45).
Connecting to the NAS target device on Windows
To access the NAS CIFS target device from a Windows server on the network, enter the following
in Windows Explorer:
•<StoreOnce server name>/<share name>
Or <IP address>/<share name>.
It is also possible to connect using \\<Fully Qualified domain name>\<share
name>.
NOTE:
This information is also provided in the StoreOnce GUI for the share: Select a share under
NAS–Shares and on the Share tab look for the Network Path.
•If User authentication was set for the CIFS server, a prompt will require a user name and
password, which will be:
<StoreOnce server name>\<user name> <password> or <StoreOnce IP
address>\<user name> <password>.
The share can also be mounted through the Map Network Drive utility in Windows or through
the Command Prompt utility with the net use command.
net use z:\\192.168.2.1\Share_3 /user:192.168.2.1\User1<password>
CIFS Server tab31
This command will mount Share_3 available from StoreOnce device 192.168.2.1 locally
on the server on z: drive using local StoreOnce CIFS server User1 credentials.
•If AD authentication was set for the CIFS server, a prompt will require a user name and
The share can also be mounted through the Map Network Drive utility in Windows or through
the Command Prompt utility with the net use command.
net use z:\\192.168.2.1\Share_3 /user:192.168.2.1\User1<password>
This will mount Share_3 available from StoreOnce device 192.168.2.1 locally on the server
on z: drive using the ‘mydomainname’ domain user User1 and its credentials.
Configuring user authentication
Once the server has been set to User mode, you can create new local users.
1.On the CIFS Server tab select Create User.
2.Provide a username and password and click Update.
These users can then be individually allowed to access any of the shares that are created.
When creating a new user in User Authentication mode, the user must log out and back into
Windows before they can access the newly created share.
3.Navigate to HP StoreOnce—NAS-Shares to provide individual users access to specific shares.
Create a NAS CIFS Share; on the Permissions tab. It shows No Access.
4.Click Edit and change it to Access. Click Update.
IMPORTANT:A warning is displayed to advise that any backup or restore jobs in progress
will fail.
Confirm the update by clicking Yes.
5.In Windows, navigate to Computer, right click and select Map Network Drive...
Specify the drive letter for connection and the network path of the share.
32NAS functions
6.Enter the user credentials.
7.This provides the user with access to the share.
Deleting a user
1.To delete a user, first disconnect the mapped share.
2.On the StoreOnce—NAS—Shares page, display the Permissions tab for the Share, and edit
it to be No Access.
CIFS Server tab33
3.Navigate to the StoreOnce-NAS—CIFS Server tab. Select the user and click Delete.
4.Click OK in the confirmation box. The user no longer exists in the system.
Configuring CIFS Server with AD and CIFS Share with AD domain users
To grant external users or groups (AD domain users) access to NAS shares:
1.Set the Authentication mode to AD on the NAS CIFS server tab. See “Configuring the CIFS
server” (page 30).
2.Add the StoreOnce device to an AD domain. See “Adding the StoreOnce device to an AD
Domain” (page 35).
3.Add any required users or groups to the active directory to grant access to the AD domain.
See “Adding users and groups to an AD domain” (page 36).
4.Create and manage NAS shares on the AD domain. See “Managing shares on an AD domain”
(page 39).
5.Create local administrators for the CIFS server. See “To create Local Administrators for the
CIFS server” (page 41).
NOTE:To create external users or groups on the StoreOnce Backup system (using the User
Management GUI or CLI function), first use the NAS CIFS server tab to set the Authentication mode
to AD, join an AD domain, and create any required users or groups. This is required even when
not using NAS shares as target devices.
Prerequisites
•Domain Name
•Domain Controller running:
Windows server 2003◦
◦Windows server 2003 R2
◦Windows server 2008
◦Windows server 2008 R2
◦Windows server 2012
◦Windows server 2012 R2
•User account on Domain Controller, which should be the Domain Administrator or Delegated
user with Domain Administrative rights.
•User account on server running DNS to add entries.
•The system time on the StoreOnce Backup system must be correct and in sync with that of the
domain controller. Using the StoreOnce CLI time commands on the StoreOnce Backup system
to synchronize with a time server ensures accurate time keeping. See the HP StoreOnce Backupsystem CLI Reference Guide for details.
IMPORTANT:AD Domain Support: StoreOnce models support configuration in a multi-domain
tree forest but do not support multi-forest domain topologies.
34NAS functions
Adding the StoreOnce device to an AD Domain
To join a domain:
1.Connect to the StoreOnce Web Management Interface and navigate to the NAS—CIFS Server
page.
2.Select the Edit button and choose AD from the drop-down menu.
NOTE:You must manually create an entry for the StoreOnce appliance in the DNS server
so the appliance can be resolved using its domain qualified appliance name. The StoreOnce
appliance will not automatically provide the information when joining the domain.
3.Provide the name of the intended domain, for example, “mydomain.local”.
4.Select Update. If the domain controller is found, a popup box will request credentials of a
user with permission to join the domain.
IMPORTANT:Joining or leaving the domain will result in failure of any backup or restore
operations that are currently running.
5.Provide the credentials (<User Name> and <Password>) of the Domain Administrator or
a delegated user with Domain Administrative rights and select Register.
6.After a short delay (the time is dependent on the topology and size of the AD Domain) the
computer will become a member of the domain and a Success dialog is displayed.
Configuring CIFS Server with AD and CIFS Share with AD domain users35
7.Launch the “Active Directory Users and Computers” management tool (type dsa.msc from
the command line or launch from Administrative Tools) to verify there is an entry for the
StoreOnce device CIFS server and that the StoreOnce Backup system can be “managed”
(Action—Manage from the menu) by the domain.
NOTE:Using Action—Manage might prompt an error message that the RPC server is
unavailable because the StoreOnce appliance does not support all of the management systems
of a Windows server. However, this error does not prevent the management of shared folders.
Adding users and groups to an AD domain
The AD domain management tool interface varies by system. The following portrays one example.
1.Open the active directory management tool. Navigate to the user folder.
2.To create a new group in the AD domain:
•Right click on the Users folder and select Create a New Group.
36NAS functions
•The AD domain address appears at the top of the dialog box (<domainname/users>).
Enter a group name and select Global for group scope and Security for group type. Click
OK. This new group can be added on the CIFS server tab to provide NAS server
permissions or added using the User Management tool to provide StoreOnce device
permissions.
3.To create a new user in the AD domain:
•Right click on the Users folder and select Create a New User.
•Enter the user’s first name and last name, full name, and a logon name. After the logon
name the domain address is listed. This logon name and domain address is used to log
in to access the shares or device (username@domainname).
Configuring CIFS Server with AD and CIFS Share with AD domain users37
•Click Next. Enter a password and password confirmation. If User must change password
at next login is selected and the user logs in through the CLI, the user will be prompted
to change the password (only at the first login; subsequent logins will not require a
password change).
•Click Next. The final screen displays the user logon name and a mention of the required
password change (if that was selected on the previous screen). Click Finish.
4.You can now grant access permissions to either NAS shares only on the NAS CIFS Server tab
or to all StoreOnce features using the User Management tool.
38NAS functions
Managing shares on an AD domain
Now that the HP StoreOnce Backup system is part of a domain and can be managed, it is possible
to create shares and grant access permission to them for domain account users or groups. There
are two ways for users to be granted access permissions to the NAS shares on the CIFS server:
•As remote users configured through the Windows Computer Management tool: Run MMC
and install the computer management plug-in (management console). Once remote users are
configured through the windows computer management tool (which must be run through
MMC), permissions can be applied per share using the StoreOnce GUI.
•As local users with Delegated Admin permissions configured through the HP StoreOnce GUI.
These users have Admin rights to all shares created on the NAS CIFS server.
NOTE:The StoreOnce appliance only supports the Shared Folders utility within the Windows
Computer Management. Any other Windows Computer Management utilities are not supported.
1.Create a share on the Backup system to be used as a backup target by selecting NAS—Share
from the Web Management Interface and clicking Create.
2.Provide a share name and description, then select the CIFS protocol and click Create.
3.The share will start and its status will change to Online.
4.Provide a list of users who can access this share through the Windows Computer Management
tool. Select the Shared Folders—Share option to display the available shares on the StoreOnce
Backup system. In addition to the user configured shares, there will be two “default shares”
called C$ and IPC$. These shares cannot be used for backup.
Configuring CIFS Server with AD and CIFS Share with AD domain users39
5.Select the newly created Backup share and select Properties from the Action menu.
6.Select the Share Permissions tab and Add a user or group of users from the domain, then
specify the level of permission that the users will receive. Finally, select Apply.
40NAS functions
7.It is now possible to access the newly created share from any Windows server on the domain
using the credentials of anyone who has permission to access the share. If a permitted user
is logged into Windows, access to the share is granted automatically with those permissions.
IMPORTANT:When switching from None or User authentication mode to AD authentication
mode, HP recommends that the user logs out and back into the Windows client where the
share is mounted. This ensures the new authentication settings of the CIFS server are enforced.
NOTE:The HP StoreOnce Backup system does not support creating shares from Windows
Computer Management Consoles. Shares must be created from the StoreOnce Management
Console.
To create Local Administrators for the CIFS server
After adding the StoreOnce device to the AD domain, a new Local Administrators section appears
on the lower half of the CIFS server tab. This allows the creation of users with Administrator access
to all shares created on the CIFS server. (The section provides a way of implementing Delegated
Administration, which is not available for the StoreOnce device from the Active Directory
Management tool.)
IMPORTANT:When adding AD domain users through the CIFS server tab, the users are
automatically created as Local Administrators whether or not they are admin users on the AD
domain.
Configuring CIFS Server with AD and CIFS Share with AD domain users41
1.To add a user, click Create User.
2.Enter the domain name and user name and click Update.
Leaving an AD Domain
The user may wish to Leave an AD domain in order to:
•Temporarily leave, then rejoin the same domain.
•Join a different AD Domain.
•Put the StoreOnce Backup system into either No Authentication or Local User Authentication
modes.
The user can click the Leave AD option on the NAS—CIFS Server GUI page to leave. The user can
then rejoin the same domain. If joining a different AD domain or changing modes, the user clicks
the Edit button on the page and selects the new domain or mode.
NFS Server tab
HP StoreOnce Backup systems provide an NFS interface that enables configuration of the HP
StoreOnce Backup system with NFS file shares as target for backups from UNIX and Linux servers.
Two configuration stages, implemented from the StoreOnce GUI, are used to create a file share
that UNIX and Linux users can access.
•Create a list of NFS hosts that can mount the NFS shares.
•Create NFS NAS shares on the StoreOnce Backup system and specify access permissions for
list of hosts, see Creating an NFS share and setting permissions (page 47).
Specifying NFS hosts
1.Log on to the StoreOnce GUI for the appliance.
2.Select NAS.
3.Select the NFS Server tab.
42NAS functions
4.Click Add and provide a Host Name and Description. Click Update.
NOTE:A host with the ‘*' wildcard, added by default, allows any host to access a share.
You can have a maximum of 50 hosts on the NFS server (including the wildcard).
5.Create NFS NAS shares on the StoreOnce Backup system and specify access permissions for
a list of hosts. See Creating an NFS share and setting permissions (page 47).
Connecting to the NAS share on UNIX or Linux
To access the NAS share from a UNIX or Linux server on the network, use the mount command.
The actual syntax of the command depends on the operating system.
IMPORTANT:See the HP StoreOnce Backup system Linux and UNIX Configuration Guide for
more detailed information. Verify the correct mount options to ensure good performance and
deduplication ratio. These options may be different from normal use.
Problems connecting
The following sequence causes problems when connecting to an NFS share:
1.Creating an NFS share and mounting it on a Linux box.
2.Deleting the share on the StoreOnce Backup system without unmounting it from the Linux box.
3.Recreating the share again using the same name.
In this scenario, the Linux client assigns a new set of inodes to the new share, but when trying to
access the old mount point uses the previous set of inodes and cannot connect.
Reboot the host Linux system and the connection will work again.
Shares (NAS)
This page is used to view and manage all NAS target devices (referred to as shares) for both CIFS
and NFS servers.
IMPORTANT:It is important to understand that the HP StoreOnce network share is intended to
be used ONLY by backup applications that “back up to disk”. Do not use the NAS target device
as a drag-and-drop general file store. The one exception to this rule is when using the NAS share
to seed an appliance for replication.
Shares (NAS)43
Creating NAS shares
Users with an Admin login may create NAS shares. The process varies slightly depending upon
whether creating a CIFS or NFS share, see:
•CIFS: Creating a CIFS share (page 45)
•NFS: Creating an NFS share and setting permissions (page 47)
Shares can be configured as version 2 (default) or version 1. The difference is in the maximum
number of files per share permitted: 25,000 for version 1 shares and 1,000,000 for version 2
shares. Configuring a version 1 share is only recommended for replication compatibility with
another appliance on an older software version that only supports version 1 shares. Once
configured, you can change the share version from 1 to 2 but you cannot change from 2 to 1. The
maximum number of shares depends upon the product model and the number of other devices
(including VTL libraries and Catalyst stores) already created. See StoreOnce key
parameters (page 137).
Editing share details
Users with an Admin login may edit the Description, Write Protection, and Secure Erase settings
for existing NAS shares. Write protection prevents access initially or protects data after it has been
backed up for compliance purposes. Data at Rest Encryption cannot be edited; that feature is only
enabled or disabled at the time of share creation.
1.Select the share on the Shares page and click Edit.
NOTE:
The Network Path field is not displayed when you select Edit. However, if you display the
Network Paths tab, you can copy the share path if required. If your StoreOnce Backup system
is configured on a Virtual LAN, this tab will display all the VLAN IP addresses available for
that share.
If the correct license was applied, enable Secure Erase by selecting the number of Overwrite
Passes from the Secure Erase Mode drop down box. This field does not appear until after the
share is created.
2.Make the required changes and click Update.
44NAS functions
NOTE:You can change a share from version 1 to version 2, but you cannot change from
version 2 to version 1. In addition, you cannot change from version 1 to version 2 if replication
mapping is in place; you must first remove the replication mapping, ensure both the source
and target devices are on StoreOnce software version 3.11.0 or higher (upgrade if necessary),
change the source and target shares to version 2, and then reapply the replication mapping.
3.A popup window advises that if you update the Share settings, any backup or restore jobs in
progress will fail. Click Yes (or No).
Applied changes take effect immediately. If the NAS server (service) must restart, a warning
is provided to the user, which they can accept to allow all shares to temporarily go offline.
You cannot change the share name after it is created.
If a share is converted from Read/Write to Read Only, any open items will be forced closed,
which may result in inconsistencies if they are being written to by a backup application. The
user will be warned that this could occur before the change is made.
Deleting share details
Users with an Admin login may delete a share. Select the share in the list and click Delete.
Creating a CIFS share
A note about permissions
Each share has a Permissions tab. The options available on this tab depend on the type of
Authentication selected when you configured the CIFS Server.
•If None (No Authentication) was selected, the Permissions tab is disabled.
•If User Authentication was selected, there will be a list of users. Set the access permissions for
that share for each user in the list to Access or No Access. See Configuring user
authentication (page 32) for an example.
•If AD Authentication was selected, share permissions are managed from the AD Domain. See
Configuring CIFS Server with AD and CIFS Share with AD domain users (page 34) for an
example.
To create a CIFS share
1.Select NAS—Share on the StoreOnce GUI to display the Share page. This page is used to
manage all shares for both CIFS and NFS servers.
2.Click Create.
Shares (NAS)45
3.Provide the following information:
•Name: the name that will be used to identify the share in Windows.
•Description: a text description of the share (optional).
•Access Protocol: select CIFS.
•Share Version: leave as version 2, or change to version 1 if replicating to or from an
existing version 1 share. See “Creating NAS shares” (page 44) for a description of the
share types.
•Write Protection: Only used to prevent further backup to the share. If enabled, any backup
jobs currently using that share will fail.
•Deduplication Enabled: Enables deduplication if the check box is selected (default); unselect
to create a non-deduplication share. Deduplication cannot be enabled or disabled once
the share is created.
•Encryption Enabled: To enable Data at Rest Encryption for the new share, check this box.
This feature requires a special license. If the license is not installed, an information message
is displayed next to the check boxstating Not Licensed. See “Security Features” (page 12)
and “Licensing” (page 12) for more information.
4.Click Create. It will take a few minutes for the status of the new share to go Online.
5.After creating the share, if the correct license was applied the Secure Erase Mode drop down
box appears. Enable Secure Erase by selecting a number of Overwrite Passes. See “Editing
share details” (page 44).
The Network Path details are provided by the Management Console and are displayed in
the format:
<IP address>/<share name>.
It is also possible to connect using:
\\<Fully Qualified domain name>\<share name>.
There may be multiple entries under the Network Path, depending upon how the network was
configured at installation. You can click on Show all network paths or use the Network Paths
tab to display all available IP addresses.
6.If the CIFS server has been configured for User Authentication, select the share in the Shares
list to display the Permissions tab and list the users available on the server who can be assigned
access to NAS target devices. You can amend permissions for individual NAS target devices.
46NAS functions
Click Edit and check the appropriate Access or No Access button. Click Update to apply the
change.
7.The NAS target device is now available as a network drive and you can target it from the
backup application. It can also be mapped as a network drive in Windows.
NOTE:The NAS target device is not optimized for general purpose file storage. The HP
StoreOnce Backup system is a NAS deduplicating appliance that is optimized for backup.
Creating an NFS share and setting permissions
NOTE:Each share has a Permissions tab. The options available on this tab depend upon the
hosts added to the Hosts list during configuration of the NFS Server. On the Permissions tab, set
the access permissions for that share for each host in the list. Available options are: Read/Write
Access, Read-Only Access, or No Access.
1.Log on to the StoreOnce GUI.
2.Select NAS and display the Share tab. This tab is used to manage all shares for both CIFS
and NFS servers.
3.Click Create.
4.Provide the following information and click Create.
•Name: the name that will be used to identify the share in Windows.
•Description: a text description of the share (optional).
•Access Protocol: select NFS.
•Share Version: leave as version 2, or change to version 1 if replicating to or from an
existing version 1 share.
•Write Protection: Only used to prevent further backup to the share. If enabled, any backup
jobs currently using that share will fail.
Shares (NAS)47
•Deduplication Enabled: Enables deduplication if the check box is selected (default); unselect
to create a non-deduplication share. Deduplication cannot be enabled or disabled once
the share is created.
•Encryption Enabled: to enable Data at Rest Encryption for the new share, check this box.
This feature requires a special license. If the license is not installed, an information message
is displayed next to the check boxstating Not Licensed. See “Security Features” (page 12)
and “Licensing” (page 12) for more information.
The Network Path is <IP address>:/nas/<sharename>.
The option to enable Write Protection should only be used to prevent further backup to the
share. If enabled, any backup jobs currently using that share will fail.
5.Set permissions. Select the share and display the Permissions tab. You may set the access
permissions for that share for each host in the list. Check the appropriate box: Read/Write
Access, Read-Only Access, or No Access. At this time, you also have the option to disable
two additional items:
•Root Squash: By default, root_squash is enabled when NAS NFS stores are created. This
squashes the root permissions for the client so that it is not possible to access or create
files on the NFS server as root; the client always has non-root user permission. StoreOnce
3.9.0 introduced an option to allow users to disable NFS root_squash after a NFS store
has been created and gives a client permission to access or create files on the NFS share
as root user.
IMPORTANT:Unless “root” permission is required, do not disable root_squash (by
unticking the checkbox), as it can make the system insecure.
•Secure Ports: By default, secure ports are enabled when NAS NFS shares are created.
By default you can connect on the port below 1024 for NFS (Privileged ports). Disabling
Secure Ports allows connection to the ports higher than 1024 for NFS.
IMPORTANT:Unless required to connect to ports higher than 1024, do not disable
Secure Ports.
48NAS functions
6.Click Create.
A warning is displayed that any backup jobs in progress will fail. Click Yes to continue.
7.The share is now available as a network drive to be mounted from a UNIX or Linux server so
that it may be a target for the backup application. See the HP StoreOnce Linux/UnixConfiguration Guide for more information on mounting shares.
NOTE:The share is not optimized for general purpose file storage. The HP StoreOnce Backup
system is an NAS deduplicating appliance that is optimized for backup.
Once you have created the share, if the correct license has been applied, the Secure EraseMode drop down box appears. Enable Secure Erase by selecting a number of Overwrite
Passes. See “Editing share details” (page 44).
Best practices for mounting an NFS share
Use the —o forcedirectio or the —o sync option when configuring an NFS share to prevent
issues with “out of order delivery”. See the HP StoreOnce Linux/Unix Configuration Guide.
NOTE:The sync patches require an rpm update of the operating system before the —o sync or
-o forcedirectio mount options can be specified.
Table 9 NFS share mount options
OptionVersionOperating system
“sync” patch and —o sync mount option10SLES
-o sync mount option11
“sync” patch and —o sync mount option5RHEL
-o sync mount option6
—o forcedirectio option11iv2HP-UX
—o forcedirectio option11iv3
—o forcedirectio option9Solaris
—o forcedirectio option10
—o forcedirectio option5.3AIX
—o forcedirectio option6.1
—o forcedirectio option7.1
Shares (NAS)49
5 Replication functions
Select Replication from the StoreOnce menu item to display all aspects and tasks associated with
replication.
There are four tabs on the main Replication page and two further Navigator options for configuring
VT mappings and NAS mappings. The Status tab is the default.
Users with an Admin login can create mappings and configure replication. Operators can use this
page to view replication settings.
Replication settings
•Status tab (page 52)
•Partner Appliances tab (page 52)
•Local Settings tab (page 57)
•Event History tab (page 60)
Replication mappings
•VT Mappings (Replication) (page 61)
•Recovering a source appliance, VTL devices (page 67)
•NAS Mappings (Replication) (page 70)
•Recovering a source appliance (NAS shares) (page 76)
Replications actions are applied and monitored at appliance level. For a definition of an appliance,
see What is an appliance (page 50).
NOTE:With the current version of the software there are no equivalent CLI commands available
for the tasks described in this section.
HP strongly recommends reading the HP StoreOnce Concepts and Configuration Guidelines, which
is available from the HP web site. These guidelines provide a detailed discussion about replication
deployment strategies, terminology, and include examples using the Replication and Recovery
wizards.
NOTE:A license is required for replication on the target appliance.
What is an appliance?
Replication can take place between different models of StoreOnce Backup systems. The GUI refers
to both Replication Targets and Sources as appliances, so it is important to understand the different
meanings of “appliance” across the product models.
•In a StoreOnce 2700, 4500, 4700, and 4900, the appliance is the physical device or server
that contains the data to be replicated. All mapping is done using the physical IP addresses
of the target and source StoreOnce Backup systems.
•In a StoreOnce VSA, the appliance is the virtual device or server that contains the data to be
replicated. All mapping is done using the IP addresses of the target and source StoreOnce
Backup systems.
•In a StoreOnce 6500 and B6200, the appliance is the Service Set that contains the data to
be replicated. This means that each StoreOnce 6500 or B6200 Backup system has at least
two Service Sets that can be selected as appliances. (A fully expanded HP StoreOnce 6500
or B6200 Backup system would have eight Service Sets.) All mapping is done using the virtual
IP addresses of the target and source Service Sets.
Within this section of the GUI, the terms appliance and Service Set are synonymous.
50Replication functions
How do I identify the IP address of a Service Set?
When configuring replication between different models of StoreOnce Backup systems, be aware
that:
•Replication targets on a StoreOnce 26xx, 2700, 42xx, 44xx, 4500, 4700, and 4900 Backup
system require the IP address of the appliance.
•Replication targets on an StoreOnce VSA Backup system have two virtual NICs supported,
meaning you can have a maximum of two IP addresses for the VSA.
•Replication targets on a StoreOnce 6500 or B6200 Backup system require identification of
the Data VIF IP address of the appropriate Service Sets (also referred to as a node). Each HP
6500 and B6200 Backup system may have up to eight Service Sets (the minimum is two
Service Sets).
NOTE:Service Set Data VIF IP addresses are used for data traffic and are not the same as
the Cluster Management IP address used to log onto the HP StoreOnce Management Console.
You cannot configure the replication targets using the IP address used to log on to the HP
StoreOnce Management Console.
To identify the Data VIF IP from the HP StoreOnce GUI
1.Select the Service Set in the list on the HP StoreOnce page.
2.Locate its Data VIF IP at the bottom of the System Information.
To identify the Data VIF IP from the StoreOnce CLI
Use the net show config command and locate the Node Specific Parameters.
Identify the Network Virtual Data IP entries under each node. The following example is an
extract from the output of the net show config command:
# net show config
----------------------
Network Name: current
Network Description: Management on (2) 1Gb ports (bonded), Data/Replication on (2) 10Gb ports (bonded)
Write Protected: no
DNS Servers: 172.160.10.1
Port Sets: portSet1 portSet2
Management VIF: 172.160.20.1
----------------------
Number of Networks: 2
Number of VLANs configured: 0 out of possible 128
----------------------
Network: subnet1
----------------------
IP Addresses: 192.168.20.60,192.168.20.61,192.168.20.62,192.168.20.63
Net Mask: 255.255.0.0
Domain Name:
Gateway:
Default Network: no
Net Usage: data
What is an appliance?51
VLAN tag:
Port Set: portSet1 with these interfaces: eth5 eth7
Encryption Links:
Bonding Mode: 1 (Active Passive Bonding)
---------------------Network: subnet2
---------------------IP Addresses: 172.160.20.2,172.160.20.3
Net Mask: 255.255.224.0
Domain Name: mydomain.com
Gateway: 172.160.10.2
Default Network: yes
Net Usage: mgmt
VLAN tag:
Port Set: portSet2 with these interfaces: eth0 eth2
Encryption Links:
Bonding Mode: 1 (Active Passive Bonding)
Status tab
The top half of the Status tab contains information about replication throughput and active sessions.
•Replication Throughput Totals: These tables show an average throughput over a period time,
so they will not produce accurate data right away.
•Active Sessions: This identifies the number of source and target jobs that are running, and the
number of source appliances that are connected. This information is useful when monitoring
performance.
The bottom half of the Status tab contains a list of Active Jobs. Click and highlight any of the status
details to display more information about the job.
Partner Appliances (Replication)
The Partner Appliances tab displays the replication status of all Target and Source HP StoreOnce
Backup systems configured for use with this HP StoreOnce Backup system.
52Replication functions
There are three tabs:
•Target Appliances tab (page 53)
•Source Appliances tab (page 55)
•Source Appliance permissions (page 56)
The bottom half of the page displays information about any blackout windows that apply to the
selected appliance.
Target Appliances tab
This tab allows you to view the details of all target appliances. Users with an Admin login can use
the tab to:
•To add a target appliance (administrators only) (page 54)
•To edit or remove a Target Appliance (administrators only) (page 55)
•Run Traceroute (page 55)
NOTE:Although administrators can add Target Appliances on this page, it is not necessary to
do so before mapping configurations because this option is also available when running the
Replication wizard.
Summary appliance details and target appliance parameters
The following status details are shown for both Target and Source appliances.
Table 10 Summary Appliance details
The name of the appliance.Appliance Name
The health of the appliance; this shows you whether the appliance is running or not.Appliance Status
The IP address of the appliance.Appliance Address
The serial number of the appliance.Serial Number
The amount of free space on the appliance.Free Space
Whether the appliance is online or not.Online
The protocol of the appliance software.Protocol Version
Partner Appliances (Replication)53
Click on an appliance to view more detailed status information in the bottom half of the screen,
as described in the following table.
Table 11 Target appliance parameters
Target Appliance tab (some fields are editable).
Appliance Name
Appliance Address
Number
Number
Blackout Window Active
The name that is used to identify the Target Appliance. You specify it on the Local Appliance
tab of the partner appliance.
The product class of the appliance, such as HP 6500 or HP 4700.Product Class
The IP address of the Target Appliance. You specify it when you add the Target Appliance
and can edit it later.
The serial number of the Target Appliance; it cannot be edited.Serial Number
The port number that will be used for command protocol.Command Protocol Port
The port number that will be used for data protocol.Data Protocol Port
Indicates whether the Target Appliance is available or not.Available
Identifies the replication protocol in use.Replication Protocol
The amount of user data stored on the Target Appliance.User Data Stored
Shows the capacity of the Target Appliance.Capacity
Shows the amount of free space on the Target Appliance.Free Space
Shows the software version of the Target Appliance.Software Version
Shows the current system time.System Time
Shows whether a blackout window is currently active or not. This means that no replication
will occur.
Blackout Windows
Any blackout windows that have been specified will be reflected in this weekly calendar.
During these times, the selected Target Appliance is not available for replication.
Administrators may edit and delete blackout windows from here or from the Local Settings
tab.
To add a target appliance (administrators only)
1.Click Add Target Appliance.
Figure 1 Create new target appliance
2.Enter the Target Appliance Address.
54Replication functions
NOTE:If the Target Appliance is on an HP 6500 or B6200 Backup system, enter the Data
VIF IP address of the required Service Set. See How do I identify the IP address of a service
set? (page 51).
3.The default values for the Command and Data Protocol Port Numbers cannot be changed. If
replication needs to take place through a firewall, the network administrator must open (TCP)
ports 9387 (Command Protocol) and 9388 (Data Protocol).
4.Click Add Target Appliance.
To edit or remove a Target Appliance (administrators only)
•Select the appliance and click Edit to edit the Appliance Name, IP address, and protocol port
details of the target appliance.
•Select the appliance and click Delete to remove an appliance from the list of Target Appliances
available to that source.
Run Traceroute
Click Run Traceroute to verify the local appliance can communicate with the target appliance and
identify the number of hops and latency in the routing.
Source Appliances tab
This tab displays the details of all source appliances.
If the HP StoreOnce Backup system also has Replication Target libraries, there may be multiple
Source Appliances.
NOTE:Source Appliances are appliances that have added the local appliance or Service Set
as a Target Appliance. Only Source Appliances currently connected to the Target Appliance are
listed.
The Source Appliances tab is not editable.
Table 12 Source appliance parameters
Source Appliance tab (no fields are editable).
The name of the Source Appliance.Appliance Name
The product class of the appliance, such as HP B6200 or HP 4430.Product Class
The IP address of the Source Appliance.Appliance Address
The serial number of the Source Appliance.Serial Number
Indicates whether the Source Appliance is available or not.Available
The amount of data stored on the Source Appliance.User Data Stored
Shows the capacity of the Source Appliance.Capacity
Shows the amount of free space on the Source Appliance.Free Space
Shows the software version of the Source Appliance.Software Version
System Time
The day of the week and local time (in 24 hour time) of the system. The system time is set
using the CLI time commands; see the HP StoreOnce Backup System CLI Reference Guide
for details.
Blackout Windows
Any blackout windows that have been specified will be reflected in this weekly calendar.
During these times, the selected Source Appliance is not available for replication.
The throttling (bandwidth limiting) setting. See “Bandwidth Limiting tab” (page 59) for details.Throttling (Kbps)
Partner Appliances (Replication)55
Source Appliance Permissions tab
Source Appliance Permissions are disabled by default. In this state, there is no control over mapping
between share and library devices on the Target and the Source Appliances.
This tab contains an Enabled check box that, when selected, allows administrators to lock the ability
to create share and library mappings. When the Replication wizard is run and mappings are
configured, the Target will only have access to a list of sources that are allowed to replicate to it.
The tab also incorporates a wizard that becomes active when an administrator adds a new source
appliance to list, as described in the procedure below.
To configure access permissions to source appliances (administrators only)
1.Click Edit and check the Enabled box.
2.Click Update.
A wildcard entry in the Source Appliances list allows configuration of permissions across all
source appliances. However, this does not set permissions for individual appliances.
56Replication functions
Table 13 Source Appliances parameters
Serial Number
Appliance Name
Appliance Status
Appliance Address
Configured Mappings
The serial number for the required Service Set. This information can be found on the
top-level HP StoreOnce page.
The name of the appliance for which you have specified the serial number and cannot
be altered.
The status of the appliance for which you have specified the serial number and cannot
be altered.
The address of the appliance for which you have specified the serial number and
cannot be altered.
Indicates whether any mappings have been configured on the source appliance. This
is important because any mappings that already exist will be retained regardless of
any access permissions you subsequently set up for libraries and shares on that
appliance.
3.Click Add. A wizard prompts the necessary steps to add a new source appliance to the list.
Provide the serial number of the appliance and specify initial access permissions for all libraries
and all shares on that appliance.
4.Once the appliance is added to the list of Source Appliances, permissions can be configured
for it.
To configure permissions (administrators only)
1.Select the source appliance in the list. There are two tabs; one for Libraries, and one forShares.
2.Click Edit. Check the Access box for those shares and libraries to which access should be
granted. These are the shares and libraries that will be displayed when the mapping
configuration step is run in the Replication wizard. It will not be possible to create a new share
or library from the wizard.
3.Click Update to apply the permissions.
Local Settings (Replication) tab
This tab contains three additional tabs that show the settings for the local HP StoreOnce Backup
system:
•General Settings tab (page 58)
•Bandwidth Limiting tab (page 59)
•Blackout Windows tab (page 60)
Local Settings (Replication) tab57
General settings tab
Users with an Admin login may edit and maintain these settings. Other users may only view them.
1.Select the General Settings tab.
2.Click Edit to make the fields editable. See Table 14.
3.Click Apply to apply the settings.
Table 14 General Settings (Replication)
Appliance
Maximum Jobs
Synchronization Progress
Logging
Out of Sync Notification
Settings
The name of the appliance, its current status, and the product class. You can only edit the
appliance name. The default name is the network host name of the appliance (as configured
at installation). You can change this to something more user friendly and easier to identify
the appliance on the Management Console of the local and partner appliances. The name
can be anything meaningful to the user, such as the geographical location of the appliance.
The Appliance Supported Protocol Version shows which versions of replication protocol are
supported, so in the unlikely event of incompatible versions it will be visible to the user.
Replication auto negotiates to the lowest supported protocol on either end.
The maximum number of source and target jobs that can run concurrently. If running backups
at the same time as replication, the default value of target jobs can be reduced to avoid
using too much WAN bandwidth and overloading the target appliance and reserve appliance
performance.
An event is generated each time a mapping goes out of sync and goes back into sync. This
field applies to periodic sync progress updates while the mapping remains out of sync
resulting in emails (if emails are configured) but not SNMP traps. Use these fields to enable
progress logging for Library and Share synchronization and to specify the logging interval.
While the library or share is out of sync, emails are sent periodically indicating how many
slots or entries are still out of sync. This information is also logged to the user Event Log. One
email is sent for each log entry made for each library or share that is out of sync.
Use these fields to specify the amount of time a mapping needs to be out of sync before a
sync issue is shown in the Issue tab. When an event is generated it results in an entry in the
user Event Log and an email and/or an SNMP trap if the appliance is configured to send
these. These notifications are in addition to a standard notification email sent whenever a
mapping first becomes unsynchronized and another when synchronization is achieved.
Configure Replication
Ports
58Replication functions
Replication ports should only be changed if replication is blocked by a router on the WAN.
The ports must be the same on both source and target appliances. If in doubt, do NOT
change the port configuration.
IMPORTANT:If replication takes place through a firewall, the network administrator must open
(TCP) ports 9387 (Command protocol) and 9388 (Data protocol) to allow the replication traffic
to pass to and from the HP StoreOnce Backup systems.
Bandwidth Limiting tab
This tab allows users with an Admin login to apply a general bandwidth setting and configure
bandwidth limiting windows.
Bandwidth limiting can be used to avoid saturating the WAN with low bandwidth replication to
free up bandwidth for other processes and applications. A minimum of 2Mb/s per concurrent job
is recommended. At least 512Kbps per concurrent job is required for reliable operation. These
limits apply to all outbound replication jobs from this local appliance.
1.Display the Bandwidth Limiting tab.
2.Check the General Limit Enabled box. Determine the recommended general bandwidth limit,
which is a simple calculation of:
(Max WAN Speed) x (Max Desired WAN Usage%).
A Bandwidth Limit Calculator is provided on this tab to work out limit values.
3.Click Edit to edit the Bandwidth Limiting Windows.
Configure up to two windows for each day. Use the spinners to select the Start Of Restriction
and End Of Restriction times. Enter the appropriate Bandwidth Limit in each required window.
(If you use the Bandwidth Limit Calculator, enter the value from the Recommended Limit field.)
Check the appropriate Apply First/Second Restriction check boxes. This ensures the specified
times are enabled. If it is not checked, the times are ignored.
NOTE:All settings are applied to the HP StoreOnce Backup system, not for individual jobs.
The Bandwidth Limit windows override the General Limit when the time specified for the
window is active. Outside of Bandwidth Limit windows the General Limit applies.
Local Settings (Replication) tab59
4.Click Apply.
Blackout Windows tab
This option allows users with an Admin login to specify times when replication should not occur,
for example during planned maintenance or heavy network traffic. You can configure multiple
blackout windows.
NOTE:This setting relates to the local appliance in its role as a source or target device. No
replication jobs will start if the Source or Target Appliance for a mapping is in blackout, and any
running jobs for the mapping will be paused.
1.Select the Blackout Windows tab.
2.Click Edit.
3.Check the box next to the required day of the week.
4.The time boxes become editable. Use the spinner menus to select the appropriate hours.
5.Set up as many blackout windows as required.
6.Verify the Apply First Time Restriction box is checked. This ensures the specified times are
enabled. If not checked, the times are ignored.
7.To enable a second blackout window, ensure the Apply Second Time Restriction box is checked.
The second blackout window for each day must occur after the first blackout window for that
day.
8.Click Apply. On the Appliance tab, the calendar for the Source and Target Appliances reflects
the changes.
Pause replication jobs
The Pause Replication Jobs button on the Blackout Windows tab places all replication jobs on hold
immediately. Click a second time to resume replication jobs.
Event History (Replication) tab
This page shows the log of all completed replication events on the appliance.
60Replication functions
This page presents a time and date stamped list of significant replication events with severity status
and associated messages. It also displays source and target details for the replication event. The
most recent information is at the top of the list.
•Select an event in the list to view its details below.
•The Clear Event History button may be used to clear the list.
•The History will be maintained if the HP StoreOnce Backup system is power cycled.
Searching the event history
Click + Show Search Box to display a Filter field and two drop-down menus. Use the right-hand
drop-down menu to filter for Severity, for example, to display all Error messages. Use the middle
drop-down menu to select a column (or All) and then type a search string into the Filter box.
VT Mappings (Replication)
This page displays details of all replication mappings between source and target libraries. Admin
users may use the two wizards on this page to configure replication mappings and recover mappings
after a disaster. (NAS share mappings are managed on a separate page.)
VT Mappings (Replication)61
Use this page to:
•View source and target library mappings (all users), see Source and target library
mappings (page 62).
Admin users may also remove slot mappings and edit slot mappings.
•Run the Replication Wizard to create new mappings (Admin users only), see Running the
•Run the Recovery Wizard to restore mappings (Admin users only), see Recovering a source
appliance, VTL devices (page 67).
NOTE:Only administrators can manage mappings. You can only map and replicate libraries
of the same version.
Source and target library mappings
The top part of the VT Mappings page contains a list of all available local libraries. Local libraries
are the libraries configured on this HP StoreOnce Backup system.
•Non-replicating: a library on this HP StoreOnce Backup system with slots not yet mapped for
replication. Replication and Recovery Wizards are available only with non-replicating libraries.
•Replication Source: a library on this HP StoreOnce Backup system with cartridges mapped for
replication. You do not have to map all cartridges in a Replication-Source Library, and the
Replication-Target Library need not contain the same number of cartridges as the
Replication-Source Library.
•Replication Target: a library on this HP StoreOnce Backup system with slots that hold cartridges
replicated from a Replication-Source library. The option is available to recover individual
cartridges from Replication-Target libraries.
62Replication functions
NOTE:When selecting a non-replicating library, you can run the Replication or Recovering
wizard.
•Use the Replication wizard to create slot mappings for the non-replicating library to make the
library a Source library. See Running the replication wizard (virtual tape devices) for more
information.
•Use the Recovery wizard to recover cartridges from a Target Library. See Recovering a source
appliance, VTL devices for more information.
Table 15 Replication library parameters
The name of the library, defined when the library device was created.Name
Replication Role
Mapped/Total Slots
Replication status
The role, which may be Non-replicating, Replication-Source, or
Replication-Target. All library devices are initially Non-replicating until slots
have been configured using this page.
The status of the local library (such as online).Status
The amount of user data stored.User Data Stored
The amount of space used on the disk.Size On Disk
The number of slots that have been mapped out of the total number of slots
configured on the library device.
The emulation type configured for that library.Device Type
The longest time out of sync.Longest Time Out Of Sync
The version number of the library.Library Version
Replication status, which may be Synchronised, Synchronising, or Pending
Synchronisation.
Slot mappings
Select a local library to display slot mappings for that library.
Users with an Admin login may also remove a slot mapping by clicking the Remove button.
Table 16 Slot mapping parameters
Replication-Source or Replication-Target library selected
Slot Mapping Name
Source/Target Appliance Serial
Number
Source/Target Library Name
Blackout Window Active
The slot mapping name. It is created when you run the wizard to define the
grouping of slots that you select.
The name of the Target Appliance to which cartridges will be replicated.Source/Target Appliance Name
The IP address of the Target Appliance to which cartridges will be replicated.Source/Target Appliance Address
Indicates whether a replication link is established with the partner appliance.Source/Target Appliance Online
The serial number of the Target Appliance to which cartridges will be
replicated.
The name of the library to which cartridges will be replicated on the Target
Appliance.
The status of the partner library (such as online).Source/Target Library Status
Time in hours that replication has been out of sync.Time Out Of Sync
Relates to the local appliance in its role as a source or target appliance. No
replication jobs will be started if the source or target appliance for a mapping
are in blackout, and any running jobs for the mapping will be paused.
Shows whether the mapping is synchronized or not.Replication Status
VT Mappings (Replication)63
Slot mapping details
The tabs at the bottom of this page show more detailed mapping information for the selected library
and slot mapping.
Mapping details tab
This tab details mapping details between source and target libraries. If a source library is selected,
it will indicate if Recovery is in process. If a target library is selected, it will indicate if the target
library is visible to the host. All other information is identical for both source and target libraries.
For example, use this tab to determine:
•The number of mapped slots and replication status.
•The average throughput of data.
NOTE:Multiple VTL Library sources can replicate into a single VTL Library target offering
consolidation benefits. This process is known as Fan-in.
Users with an Admin login may edit the Mapping Name on this tab.
Slot details
This tab displays details for each mapped slot in the selected slot mapping. It includes average
throughput data for each slot. When selecting a source library, users with an Admin login can:
•Edit the Target Slot to which a Source Slot is mapped.
•Enable the Recover First checkbox, which enables a user to request that a mapped slot be
recovered from Target to Source, if required (this is sometimes known as reverse replication).
Running the replication wizard (virtual tape devices)
When selecting a non-replicating library, you can run the Replication or Recovery Wizard.
The Replication Wizard is used to create new mappings between non-replicating libraries (which
become Replication Source Libraries) and either existing or new Target Libraries.
IMPORTANT:The Replication Wizard does not allow creation of an encrypted target library. To
replicate from an encrypted Source library, first create the Target library and enable encryption
so the Target library is also encrypted.
1.Create a non-replicating library on the Source Appliance.
2.Create a backup rotation scheme and allow the first full backup to run.
3.Decide how to seed the first full backup on the Target Appliance. Are you seeding across the
WAN or can you colocate the Target Appliance on the same LAN as the Source Appliance?
See the HP StoreOnce Backup system Concepts and Configuration Guide for a more detailed
discussion about seeding.
4.Go to the Replication—VT Mappings page and select a non-replicating library to be converted
to a Replication Source Library.
5.Click Start Replication Wizard. At the Welcome screen, click Next.
64Replication functions
TIP:Click show/hide details box to check how many target appliances are permitted and
the number of target appliances currently configured.
6.Select a Target Appliance from the list and click Next.
NOTE:To select an appliance not yet on the list, click Add Target Appliance. Enter the Target
Appliance IP Address or fully qualified domain name. The default values for the Command
and Data Protocol Port Numbers cannot be edited. (If replication takes place through a firewall,
the network administrator must open (TCP) ports 9387 (Command protocol) and 9388 (Data
protocol) to allow the replication traffic to pass to and from the HP StoreOnce Backup systems.)
Click Add Target Appliance.
See How do I identify the IP address of a service set? (page 51).
7.The wizard then moves to the Select Target Library step. Select a library on the target appliance
and click Next.
VT Mappings (Replication)65
NOTE:To create a new library on the target appliance, click Create New Target Library.
Configure details as done with creating a new library device.
When creating libraries on a target device it is possible to create libraries with 0 (zero) drives.
Attempting to create a library with more drives than those available on the target will fail with
a suggestion that there may be too many drives already in use on the target.
You cannot create a new target library if Source Appliance Permissions is enabled on the
selected target appliance. Instead, the library must first be created on the target before mapping
from the source.
The Replication Wizard does not allow creation of an encrypted target library. To replicate
from an encrypted Source library, first create the Target library and enable encryption so that
the Target library is also encrypted.
8.At the Edit Slot Mapping step, enter a Slot Mapping Name. The slot number and barcodes of
all source cartridges are displayed. A new barcode is generated on the target library (these
barcodes will be overwritten with those of the source when replication starts). By default, all
slots on the Source are selected for mapping and mapped to available slots on the Target
library. To deselect cartridges from this slot mapping configuration, select Unmapped from
the Target Slot Name drop-down menu.
66Replication functions
9.Click Next to display a summary of the replication configuration that you have created.
10. Click Apply to create the slot mapping configuration. Click OK at the Wizard Complete
prompt.
Replication of cartridges will start as soon as the libraries have been synchronised. Look at
the Replication Status field on the Library Details section of the VT Mappings page. It changes
from “Pending Synchronisation” to “Synchronising” to “Synchronized”.
NOTE:If unable to colocate the Target Appliance on the same LAN as the Source Appliance
to improve replication performance, relocate the Target Appliance to the target site as soon
as the cartridges are synchronized.
NOTE:VTLs configured as non-deduplicating can replicate to both deduplicating and
non-deduplicating target libraries. For example, this can be useful to:
•Replicate data that does not deduplicate, such as compressed files.
•Replicate a copy of critical data needed for instant recovery.
Recovering a Source Appliance (Virtual Tape devices)
The Replication Recovery wizard allows Admin users to recover mapping configurations after a
disaster.
VT Mappings (Replication)67
For example: the remote site has lost both the host servers and the StoreOnce system. New hardware
was purchased and installed, and the administrator now wants to recover data to the StoreOnce
Backup system and then restore to the host server. Before the failure, a mapping existed between
a Source Library on the remote site StoreOnce Backup system and a Target Library on the Data
Center StoreOnce Backup system. After the failure, the Source Library is missing but the mapping
may or may not still exist.
CAUTION:If you replace the disks in the source StoreOnce Backup system and keep the original
appliance, the source to target mapping will still exist on the repaired StoreOnce Backup system.
You MUST BREAK this mapping BEFORE carrying out recovery. If the mapping is left unbroken,
the now-blank Source Library (on the replacement disks) will overwrite the data on the Target
Library, effectively losing backup data on both Source and Target Libraries.
1.Create a new non-replicating library on the Source Appliance (either by running the Installation
wizard or by using the Devices page).
2.Go to the Replication–VT Mappings page and select the new non-replicating library.
3.Click Start Recovery Wizard. At the Welcome screen, click Next.
4.At the Select Target Appliance Step, select Add the Target Appliance and provide the IP
address of the previous replication target device.
5.Select the existing Target Library, or the non-replicating library that was the Target Library
before mapping was broken, from which slots should be recovered.
TIP:Use the Click to show/hide details box to view further information about configured
and maximum shares, libraries, and mappings.
68Replication functions
6.If the library is an existing Target Library, select the Slot Mapping that was configured and
click Next. If the mapping was broken and the source library reverted to non-replicating, you
can add a new slot mapping.
If the Target Library supports multiple library Fan In, the library may still be a Replication
Target if other mappings exist. Recover by adding the mapping back to map the unmapped
slots to the new Source Library.
7.All slots in the Target Library are selected by default, but you can deselect any cartridges that
should not be recovered to the Source Library by checking the Pending One off Recovery box.
8.Click Next to display the Summary page.
VT Mappings (Replication)69
9.Click Apply to run reverse replication.
10. As soon as reverse replication completes for each slot, the data may be recovered to the host
using the original backup application. This can take time because ALL the data must reverse
replicate over the WAN link.
11. New backups can now run to the Source Appliance and replication will run normally without
further configuration.
NAS Mappings (Replication)
This page displays details of all replication mappings between source and target shares. Admin
users may use the two wizards on this page to configure replication mappings and recover mappings
after a disaster. (VT library mappings are managed on a separate page.)
Use this page to:
•View source and target share mappings (all users). See Source and target share
details (page 71).
Admin users may also remove share mappings and edit share mappings.
•Run the Replication Wizard to create new share mappings (Admin users only). See Running
the replication wizard (NAS) (page 72).
•Run the Replication Recovery Wizard to recover share mappings. See Recovering a source
appliance (NAS shares) (page 76).
NOTE:Only administrators can manage mappings. You can only map and replicate deduplicating
shares and map shares of the same version.
70Replication functions
NOTE:The above example shows the page layout when mappings were created and a Replication
Source or a Replication Target share is selected. If a non-replicating share is selected, no mappings
are configured and the screen displays the Replication and Recovery Wizards.
Source and target share details
The top half of the NAS Mappings page contains a list of all available NAS shares that were
configured on this HP StoreOnce Backup system.
•Non-replicating: a share on this HP StoreOnce Backup system that has not yet been mapped
for replication. Replication and Recovering Wizards are available only with non-replicating
shares.
•Replication Source: a share on this HP StoreOnce Backup system that has been mapped for
replication.
•Replication Target: a share on this HP StoreOnce Backup system that has been replicated from
a Replication-Source share.
NOTE:When selecting a non-replicating share, you can run the Replication or Recovery Wizard.
•Use the Replication Wizard to create slot mappings for the non-replicating share; it becomes
a Source share. See Running the replication wizard (NAS) (page 72) for more information.
•Use the Recovery Wizard to recover files from a Target share. See Recovering a source
appliance (NAS shares) (page 76) for more information.
Table 17 Local share parameters
DescriptionField
The name of the share, defined when the share was created.Name
Replication Role
Access Protocol
Replication Status
The role, which may be Non-replicating, Replication Source, or Replication
Target. All shares are initially non-replicating until mappings have been
configured using this page.
The status of the local share, such as Online.Status
The amount of user data stored.User Data Stored
The amount of space used on the disk.Size On Disk
The access protocol that was configured when the NAS share was created:
CIFS or NFS.
The longest time out of sync.Longest Time Out Of Sync
The share version number.Share Version
Replication status, which may be Synchronised, Synchronising, or Pending
Synchronisation.
Share mappings
Select a local share to display its mapping.
Users with an Admin login may also remove a share mapping by clicking on the Remove button.
CAUTION:Do not delete a replication mapping while a backup or restore operation is in progress,
because the source device is temporarily taken offline and any backup or restore jobs will fail.
NAS Mappings (Replication)71
Table 18 Share mapping parameters
Replication-Source or Replication-Target share selected
Mapping Name
Source/Target Appliance Online
Number
Source/Target Share Name
Blackout Window Active
The share mapping name. It is created when you run the wizard to create the
share mapping.
The name of the Target Appliance to which entries will be replicated.Source/Target Appliance Name
The IP address of the Target Appliance to which entries will be replicated.Source/Target Appliance Address
Indicates whether a replication link is established with the partner appliance
or not.
The serial number of the Target Appliance to which entries will be replicated.Source/Target Appliance Serial
The name of the share to which entries will be replicated on the Target
Appliance.
The status of the partner share, such as Online.Source/Target Share Status
Relates to the local appliance in its role as a source or target appliance. No
replication jobs will be started if the source or target appliance for a mapping
are in blackout, and any running jobs for the mapping will be paused.
Shows the amount of time in hours that replication has been out of sync.Time Out Of Sync
Shows whether the mapping is synchronized.Replication Status
Share mapping details
The two tabs at the bottom of this page show more detailed mapping information for the selected
share and share mapping.
Mapping Details tab
This tab details mapping details between source and target shares. If a source share is selected,
it will tell you whether Recovery is in process. All other information is identical for both source and
target shares. For example, use this tab to find out:
•The status of mappings.
•The average throughput of data.
Administrators may edit the Mapping Name on this tab.
File Details tab
This tab displays mapping details for each directory and files within it including average throughput
data for each file. You cannot edit any details on this tab, but you can click on any column heading
to sort by that column.
Running the replication wizard (NAS)
The Replication Wizard creates new mappings between non-replicating NAS shares (which become
Replication Source shares) and existing or new Target shares. (See Recovering a source appliance
(NAS shares) (page 76) for information about the Recovery wizard.)
NOTE:NAS replication is a 1:1 relationship from the source to the target. Fan-in, replicating
from multiple sources to a single target (available for VTL and Catalyst replication), is not available
with NAS replication.
1.Create a non-replicating share on the Source Appliance.
2.Allow the first full backup to run.
72Replication functions
3.Decide how to seed the first full backup on the Target Appliance. (See the HP StoreOnceBackup system Concept Guide.)
•If seeding across the WAN or can colocate the Target Appliance on the same LAN as
the Source Appliance, go to step 4.
•If seeding using physical media:
1.Create the share on the Remote Site share.
2.Map to the NAS share on the Source Appliance and copy the files from the NAS
share to a USB disk.
3.Transport the USB disk to the replication target site.
4.Insert the USB disk into a host server on the same sub-net as the Target Appliance.
Map to the NAS Share on the Target Appliance and copy the files across from the
USB disk at the source site.
4.Go to the NAS Mappings page.
5.Select a non-replicating share to be converted to a Replication Source Share and click StartReplication Wizard.
6.Proceed to the Select Target Appliance step.
TIP:Click show/hide details box to check how many target appliances are permitted and
the number of target appliances that are currently configured.
7.Select a Target Appliance from the list and click Next.
NAS Mappings (Replication)73
NOTE:To select an appliance not yet on the list, click Add Target Appliance. Enter the Target
Appliance IP Address or fully qualified domain name. The default values for the Command
and Data Protocol Port Numbers may not be edited. (If replication needs to take place through
a firewall, the network administrator will need to open (TCP) ports 9387 (Command protocol)
and 9388 (Data protocol) to allow the replication traffic to pass to and from the HP StoreOnce
Backup systems.) Click Add Target Appliance.
See also How do I identify the IP address of a service set? (page 51).
8.The wizard then moves to the Select Target Share step. Select a share on the target appliance
and click Next.
74Replication functions
NOTE:To create a new share on the target appliance, click Create New Target Share. Set
up the details as you would normally do when creating a new share. You cannot create a
new target share if the appliance to be used as the target has Replication Source Permissions
enabled.
When creating a new share, a warning indicates that it will take a few seconds for the new
share to come online. Click OK.
NOTE:The share version of the source and target NAS shares must be the same. You can
change a share from version 1 to version 2, but you cannot change from version 2 to version
1. In addition, you cannot change from version 1 to version 2 if replication mapping is in
place; you must first remove the replication mapping, ensure both the source and target devices
are on StoreOnce software version 3.11.00 or higher (upgrade if necessary), change the
source and target shares to version 2, and then reapply the replication mapping.
9.Give the Share Mapping a name and click Next.
NAS Mappings (Replication)75
10. The Summary screen is displayed. Click Apply to create the share mapping configuration.
Replication of files will start immediately.
NOTE:If you can colocate the Target Appliance on the same LAN as the Source Appliance
to improve replication performance, relocate the Target Appliance to the target site as soon
as the files are synchronized.
Recovering a Source Appliance (NAS shares)
There are two ways of recovering NAS shares mappings after a disaster.
•Reverse replication using the wizard (page 76)
•Promotion of Target share over the WAN (page 79)
IMPORTANT:If you replace the disks in the source StoreOnce Backup system and keep the
original appliance, the source to target mapping will still exist on the repaired StoreOnce Backup
system. You MUST BREAK this mapping BEFORE carrying out recovery. If the mapping is left
unbroken, the now blank Source Share (on the replacement disks) will overwrite the data on the
Target Share, effectively losing backup data on both Source and Target Shares.
Reverse replication using the wizard
IMPORTANT:If you replace the disks in the source StoreOnce Backup system and keep the
original appliance, the source to target mapping will still exist on the repaired StoreOnce Backup
system. You MUST BREAK this mapping BEFORE carrying out recovery. If the mapping is left
unbroken, the now blank Source Share (on the replacement disks) will overwrite the data on the
Target Share, effectively lose backup data on both Source and Target Shares.
In this example, the remote site lost both the host servers and the StoreOnce Backup system. New
hardware was purchased and installed, and the administrator must recover data to the StoreOnce
Backup system and restore to the host server. Before the failure, a mapping existed between a
Source Share on the remote site StoreOnce Backup system and a Target Share on the Data Center
StoreOnce Backup system. After the failure, the Source Share is missing; the mapping may or may
not still exist.
1.Create a new non-replicating share on the Source Appliance (using the Create button on the
NAS Shares page).
76Replication functions
2.Reverse seed the first full restore. The simplest way to do this is to use a USB disk, as described
below. It is also possible to recover across the WAN, but this may place an unacceptable
load on bandwidth or time availability.
It is possible to reverse seed the first full restore using a USB disk, as follows:
•Map from the host at the target site to the NAS share on the HP StoreOnce Backup system
and copy the share to a USB disk attached to the host.
•Transport the media to the Replication Source site and attach it to a host.
•Map from a host at the source site to the new share on the Replication Source and copy
across the data from the USB disk before running the Recovery Wizard.
3.Go to the Replication—NAS Mappings page and select the new non-replicating share.
4.Click Start Recovery Wizard.
5.At the Select Target Appliance step, select Add Target Appliance and provide the IP address
of the previous replication target device.
6.Select the existing Target. This is the Target NAS share from which files should be recovered.
Click Next.
NAS Mappings (Replication)77
NOTE:If the mapping has been broken, an entry will indicate non-replicating share (instead
of Replication Target).
7.At the Edit Share Mapping step, either adopt the mapping that had been configured or create
a new mapping and click Next.
8.The Summary screen is displayed. Click Adopt to run reverse replication.
78Replication functions
9.As soon as reverse replication completes, the data may be recovered to the host using the
original backup application.
10. New backups can now run to the Source Appliance and replication will run normally without
further configuration.
Promoting a Target Share over the WAN using NAS
In this example, the remote source site lost both the host servers and the StoreOnce system. New
server hardware was purchased and installed, and the administrator must recover data to the
server. The administrator has not installed a new StoreOnce Backup system and is going to recover
data directly to the server from the Data Center StoreOnce appliance over the WAN (which will
take a long time).
NOTE:The procedure described below retains the ability to back up to the Target Share. If this
is not required, an easier solution may be to recover data from the Target Share, which is read-only.
NOTE:Keep in mind that recovering high volumes of data by this method (over the WAN) will
take a considerable amount of time. Recovering data at the data centre is much faster and once
recovered it can be transported to the remote site.
Before the failure, a mapping existed between a Source Share on the remote site StoreOnce Backup
system and a Target Share on the Data Center StoreOnce Backup system. After the failure, the
mapping still exists but the Source Share is missing. The Target Share on the Data Center StoreOnce
Backup system is still in Target Share mode, it has not had its mappings removed.
1.On the Target Appliance in the Data Center, go to the Replication—NAS Mappings page,
select the Target Share, and remove the mapping between it and the lost Source Share.
2.The Target Share becomes a non-replicating share.
3.Make sure the backup application is targeting the newly non-replicating share at the data
centre and recover the data using the backup application at the data center.
4.At this point there is no HP StoreOnce Source Appliance at the remote site. If one is installed
at a later date, reverse recover the data and configure replication as described in Reverse
replication using the wizard (page 76).
NAS Mappings (Replication)79
6 HP StoreOnce Catalyst functions
The following StoreOnce Catalyst functions are available:
•Viewing and managing StoreOnce Catalyst settings, StoreOnce Catalyst (page 81)
•Viewing and managing Catalyst stores, Catalyst Stores (page 87)
For general information about StoreOnce Catalyst, see What is HP StoreOnce Catalyst (page 80).
NOTE:With the current version of the software there are no equivalent CLI commands available
for the tasks described in this section.
IMPORTANT:If Catalyst operations pass through a firewall, the network administrator must open
(TCP) ports 9387 (Command protocol) and 9388 (Data protocol) to allow the Catalyst traffic to
pass to and from the HP StoreOnce Backup systems.
Licensing requirements
OST/Catalyst devices require a license to be used at both source and target but do NOT require
an additional replication license. To use the security features Data at Rest Encryption or Secure
Erase, you must apply a Security license.
OST plug-in
For supported Symantec Netbackup and Backup Exec backup products, a free plug-in application
is required on each backup application media server that will use the Catalyst functionality. This
can be downloaded from https://www.software.hp.com/kiosk. The plug-in required is different
for Netbackup and Backup Exec.
Login credentials are:
User Name: STOREONCE_KIOSK
Password: STOREONCEAPPS
What is HP StoreOnce Catalyst?
HP StoreOnce Catalyst is a StoreOnce function that allows:
•Backup applications to back up data to a target store on the HP StoreOnce Backup system.
Deduplication may occur on the media server or on the HP StoreOnce Backup system.
•Backup applications to copy jobs between HP StoreOnce Backup systems. All configuration
is carried out from the backup application, which makes this an attractive alternative to using
the replication function on the HP StoreOnce Backup system.
This function requires a backup application that supports HP StoreOnce Catalyst. The HP OST
plugins should also be installed on any Media Servers that will be transferring data to the StoreOnce
Backup system. Refer to http://www.hp.com/go/ebs for up-to-date details on supported
applications.
IMPORTANT:Much of the information displayed on the HP StoreOnce Catalyst pages is taken
directly from the backup application. It is strongly recommended to give jobs and media server
groupings names on the backup application that will be meaningful when displayed on the
StoreOnce Catalyst pages.
80HP StoreOnce Catalyst functions
Benefits of HP StoreOnce Catalyst
•The backup application is in full control of data for the full lifecycle of the backup data.
•The backup application has full visibility of all items and jobs on the HP StoreOnce Backup
system.
•Deduplication can occur on either the media server or HP StoreOnce Backup system, which
ensures efficient use of the available bandwidth.
•There is no limiting geometry, such as cartridges for VTL libraries.
•There is no enforced limit on the number of items within a store.
•Copy jobs are instigated from the application and have none of the complexities of replication
mapping.
•Space reclamation is much more automated and easier to implement if catalyst devices types
are used.
StoreOnce Catalyst terminology
•StoreOnce Catalyst: the name of the StoreOnce function.
•StoreOnce Catalyst stores: the targets/device types in which backups are stored on the HP
StoreOnce Backup system.
•StoreOnce Catalyst items: the items stored in the StoreOnce Catalyst stores on the HP StoreOnce
Backup system.
•StoreOnce Catalyst clients: the generic term for applications that connect using the StoreOnce
Catalyst interface.
•Data jobs: any backup or restore job.
•StoreOnce Catalyst Optimized Backups: one of the main advantages of HP StoreOnce Catalyst
is that deduplication may occur on either the media server or the HP StoreOnce Backup system.
If deduplication occurs on the media server, only unique data is sent to the HP StoreOnce
Backup system and a low bandwidth network link is adequate. If the media server sends all
the data and deduplication is carried out on the HP StoreOnce Backup system, a high
bandwidth network link is required. It is often faster to deduplicate on the media server due
to the combined CPU power of multiple media servers and reduced network traffic. However,
actual performance varies depending upon the data and disk I/O speeds.
•Copy jobs: allow backup applications to create true copies of the data and not mirror images.
The backup application specifies the store on the source StoreOnce Backup system for the
outbound copy job and a target store on the destination StoreOnce Backup system for the
inbound copy job. Once copied, the two versions are independent of each other; on either
the source or destination StoreOnce Backup system data may subsequently be deleted, moved,
or added to, as required, from the backup application.
•StoreOnce Catalyst Optimized Copy: all copy jobs are optimized. This means that the copy
job is completed in a bandwidth-efficient manner. The two stores negotiate so that only unique
data is transferred.
StoreOnce Catalyst page
This page has a number of tabs that provide access to the following StoreOnce Catalyst functions:
•StoreOnce Catalyst status tab (page 82)
•StoreOnce Catalyst settings tab (page 83)
•StoreOnce Catalyst clients tab (page 84)
StoreOnce Catalyst terminology81
•StoreOnce Catalyst blackout windows tab (page 85)
•StoreOnce Catalyst bandwidth limiting windows tab (page 86)
Select StoreOnce Catalyst from the Navigator to display the StoreOnce Catalyst page and associated
tabs.
NOTE:Click + to expand the StoreOnce Catalyst topic in the Navigator and access the Catalyst
Stores topic.
StoreOnce Catalyst Status tab
The Status tab displays details about:
•StoreOnce Catalyst Status and Protocol Versions
•StoreOnce Catalyst Copy and Data Job Throughput Totals
•Active Sessions
Details refresh every 10 seconds, so this information provides a useful overview of Catalyst activity
on the StoreOnce Backup system. The data displayed on this status page is generally for information
purposes only; do not make inferences based on the values shown.
Table 19 Throughput totals and active sessions
DescriptionField
The left-hand column shows throughput averages for Catalyst Copy and Data Jobs.StoreOnce Catalyst
Copy and Data Job
Throughput Totals
(recent averages)
Active Sessions
Bandwidth indicates the actual physical network bandwidth being used. Throughput indicates
the perceived or logical network bandwidth used (it includes the efficiency achieved through
deduplication). These are aggregate numbers (). The throughput numbers should correlate with
those shown on the graphs on the Activity page.
The right-hand column shows the number of jobs of each type that are running. See StoreOnce
key parameters (page 137) for more information about the maximum number of different job
types.
Data Jobs Running shows the number of backup and restore jobs that are running on the
appliance.
Outbound Copy Jobs Running shows the number of copy jobs running to another appliance.
Inbound Copy Jobs Running shows the number of copy jobs coming in from another appliance.
More about Job types
Different backup applications can use different terminology for data transfers. From a Catalyst
perspective, if data is being moved between the HP StoreOnce Backup system and a media or
application server, this is a data job. If the transfer is between two HP StoreOnce Backup systems,
this is a Catalyst Copy job. For Copy jobs, the HP StoreOnce Backup system is responsible for all
data movement (although the process is initiated by the backup application software). For data
jobs the backup application is responsible for the data movement.
82HP StoreOnce Catalyst functions
If the copy job numbers are high (close to the maximum), no user action is required. Copy activities
happen under the control of the StoreOnce Backup system and it will optimize the queuing and
running of jobs based on the resources available. If the Data job count starts getting high, the HP
StoreOnce Backup system is being loaded quite heavily. You may see jobs failing to start or running
slowly (although the aggregate performance across the many jobs should still be high) due to
insufficient resources being available.
NOTE:The maximum data jobs value is not guaranteed in all cases. In some situations, such as
when heavily loaded, the actual maximum may be less (based on resources available to the box
at that time).
StoreOnce Catalyst Settings tab
The StoreOnce Catalyst Settings tab is used to view the settings that apply to Catalyst functions
and jobs for all nodes on the HP StoreOnce Backup system. Users with an Admin login may also
edit these settings.
IMPORTANT:First enable Client Access Permission Checking on this page to assign permissions
when subsequently configuring clients and stores. (If you do not set permissions, all clients can
access all stores.) Client access is also enabled in the ISV backup software.
To edit settings (administrators only)
1.Click Edit.
2.Amend fields as required and click Update.
Table 20 StoreOnce Catalyst Settings fields
DescriptionField
Client Access Permission Checking
Maximum Concurrent Outbound Copy
Jobs
Maximum Concurrent Data and
Inbound Copy Jobs
When enabled, the Clients tab is active and the Permissions tab on the Stores
page is active. These tabs enable control over which clients (backup
applications) can access which stores on the StoreOnce Backup system. If you
do not set permissions, all clients will be able to access all stores.
The maximum number of outbound copy jobs that can be processed
concurrently. Copy jobs are placed in a queue and processed as soon as
volume of jobs and any configured blackout windows or bandwidth limiting
allow. The backup application polls the HP StoreOnce Backup system to identify
when copy jobs are complete. It is recommended to limit the maximum number
of concurrent outbound copy jobs to 1 per 512 kbps of available bandwidth.
The maximum number of data and inbound copy jobs that can be processed
concurrently. Blackout windows and bandwidth limiting do not apply to these
jobs.
This defaults to 9387 and cannot be edited.Command Protocol Port Number
This defaults to 9388 and cannot be edited.Data Protocol Port Number
StoreOnce Catalyst page83
IMPORTANT:If Catalyst operations pass through a firewall, the network administrator must open
(TCP) ports 9387 (Command protocol) and 9388 (Data protocol) to allow the Catalyst traffic to
pass to and from the HP StoreOnce Backup systems.
StoreOnce Catalyst Clients tab
This tab is only active if the Client Access Permission Checking box on the Settings tab is enabled.
It allows setting up a list of clients (backup applications) that will be displayed on the Permissions
tab to restrict client access to a store.
NOTE:The client backup application must first be configured with a client identifier before you
can add details to this tab. See the client backup application documentation for more information
about configuring identifiers.
To add a client (administrators only)
1.Click Add.
2.Enter the name of the client and a description.
NOTE:The client application must be configured with a client identifier, such as
MediaServer1. This identifier is entered in the Client field. Note that no spaces are allowed
in the Client field.
3.Check the features that you desire (if they are supported by the client application):
•Enter a password and confirm the password.
•Check Allow Store Creation.
•Check Manage Server Properties.
•Check Manage Client Permissions.
NOTE:Only enable features on the Clients tab that are supported by your client application.
4.Click Update.
Table 21 StoreOnce Catalyst Clients fields
Client
84HP StoreOnce Catalyst functions
DescriptionField
The client identifier is a user-defined string set through the backup application
software which can be used on the HP StoreOnce Backup system to identify a
client. For example, there may be multiple media servers sharing the same ID;
so, the identifier is not a client machine name or a name generated by the
software. Best practice is to ensure that the name created on the backup
application is meaningful for use in searches on the StoreOnce Backup system.
Description
Password
Allow Store Creation
Manage Server Properties
Manage Client Permissions
This is a description that can be included on the StoreOnce Backup system
when the administrator adds a client.
If the client backup application supports this, you can provide a client password
(client passwords are optional and can also be left blank). Once set, any client
that connects will need to supply the password along with their client id. Refer
to your client application's documentation for further details.
If the client application supports it, you may also enable clients to create stores
remotely from this tab. Refer to your client application's documentation for
further details.
If the client backup application supports this, you can manage the server from
the client backup application rather than the HP StoreOnce Backup system.
When enabled, four settings can be managed through the backup application:
Blackout Windows, Throttling Windows, Max number of Data jobs, and Max
number of Copy Jobs. Refer to your client application's documentation for
further details.
If the backup application supports this, you can remotely manage which Client
IDs exist in the system and which Client IDs are able to access which stores.
Only enable this if the backup software supports this feature. Refer to your client
application's documentation for further details.
WARNING!When enabled, this feature allows anyone with access to the
backup application the ability to change the Client ID settings, thereby giving
users on one system control over and full access to all backup targets.
NOTE:A Client ID must be defined from the GUI and then enabled for this
feature before a backup application using that Client ID can connect to the
StoreOnce appliance and further manipulate data for other Client IDs.
StoreOnce Catalyst Blackout Windows tab
The fields at the top of this tab show the System Time and whether a Blackout Window is currently
active or not. The information below displays the start and stop times of any blackout windows
that have been configured for outbound copy jobs.
Users with an Admin login may specify times when outbound copy jobs should not occur, for
example during planned maintenance or heavy network traffic. Multiple blackout windows may
be configured.
Blackout windows override any attempts by ISV software to perform Catalyst Copies. ISV software
will retry continually until a blackout window is finished.
NOTE:Blackout windows are available on most StoreOnce functions to ensure all StoreOnce
services run efficiently and do not compete for resources. For example, if running backup, restore,
replication, and Catalyst Store operations with no break (24 hours a day), housekeeping cannot
complete and performance will suffer. This is a complex subject; see also HP StoreOnce Backupsystem Concepts and Configuration Guidelines.
StoreOnce Catalyst page85
To edit StoreOnce Catalyst blackout windows (administrators only)
1.Select the Blackout Windows tab.
2.Click Edit.
3.Check the box next to the required day of the week.
4.The time boxes become editable. Use the spinner menus to select the appropriate hours.
5.Set up as many blackout windows, as required.
6.Make sure the Apply First Time Restriction box is checked. This ensures the times that have
been specified are enabled. If it is not checked, the times are ignored.
7.To enable a second blackout window, make sure the Apply Second Time Restriction box is
checked. The second blackout window for each day must occur after the first blackout window
for that day.
8.Click Apply.
To pause copy jobs (administrators only)
The Pause Copy Jobs button on the Blackout Windows tab places all outbound copy jobs on hold
immediately. Click Pause Copy Jobs a second time to resume outbound copy jobs.
StoreOnce Catalyst Bandwidth Limiting Windows tab
There are four sections to this tab, all of which relate to bandwidth limiting on outbound copy jobs.
•Status: details the current bandwidth limit, if any.
•General bandwidth limit: administrator users may enable and apply a general bandwidth
limit. This is a simple calculation of:
(Max WAN Speed) x (Max Desired WAN Usage%).
•Bandwidth limit calculator: provided to help work out limit values for the general bandwidth
limit and the bandwidth limiting windows.
•Bandwidth limiting windows: administrator users may specify certain times when different
bandwidth limits may apply. Any bandwidth limit entered will overwrite the general bandwidth
limit.
Bandwidth limiting can be used to avoid saturating the WAN to free up bandwidth for other
processes and applications. A minimum of 2Mbps per concurrent job is recommended. At least
512Kbps per concurrent job is required for reliable operation. These limits apply to all outbound
copy jobs from this .
86HP StoreOnce Catalyst functions
To edit bandwidth limiting (administrators only)
1.Display the Bandwidth Limiting Windows tab.
2.Check the General Limiting Enabled box and determine the recommended general bandwidth
limit, which is a simple calculation of:
(Max WAN Speed) x (Max Desired WAN Usage%).
Use the bandwidth limit calculator provided on this page to work out limit values, if required.
3.Click Edit to edit the Bandwidth Limiting Windows.
Configure up to two windows for each day.
Verify the appropriate Apply First/Second Restriction check boxes are checked. This ensures
the specified times are enabled. If not checked, the times are ignored. Then manually enter
the required Bandwidth Limit in each required window.
Use the bandwidth limit calculator provided on this page to work out limit values, if required.
NOTE:All settings are applied to the HP StoreOnce Backup system and not for individual
jobs. The Bandwidth Limit windows override the General Limit when the time specified for the
window is active. The General Limit applies outside of Bandwidth Limit windows.
4.Click Apply.
Catalyst Stores page
Select StoreOnce Catalyst—Stores from the Navigator to display the Stores page and tabs.
The top half of the Stores page shows all stores configured for the appliance. Click on a store to
display its details in the lower half of the page. Users with an Admin login may edit these settings
or delete stores, and may also create new stores.
The lower half of the page has the following tabs:
•Store Details tab (page 88), includes functions for creating and managing stores
•Permissions tab (page 90)
Catalyst Stores page87
•Item Summary tab (page 90)
•Data jobs tab (page 92)
•Outbound copy jobs tab (page 95)
•Inbound copy jobs tab (page 99)
Table 22 Store fields
Name
Status
Items
User Data Stored
Size On Disk
Dedupe Ratio
Store details tab
The Store Details tab displays the details that were specified when the store was created. Users
with an Admin logon may create and edit store details and delete stores.
DescriptionField
The name of the store. This may be created manually through the HP StoreOnce Backup system
or generated by the backup application.
The version of the store.Version
The status of the store. When you create a store you will see the status change until it becomes
Online.
The date and time that the store was created.Created
The number of Catalyst items contained within the store.Number of Catalyst
The amount of data stored. This is the amount of data that the user has backed up and reconciles
with the logical data recorded on the backup application.
The size of the store on the disk. This is the physical disk space consumed; the actual size after
deduplication.
The dedupe ratio which is the ratio of duplicate data against new data identified in the data
job.
88HP StoreOnce Catalyst functions
Table 23 Store details
DescriptionField
Name
Data Job Retention
Period (Days)
Inbound Copy Job Log
Retention Period
(Days)
Outbound Copy Job
Log Retention Period
(Days)
Transfer Policy
Secondary Transfer
Policy
The name of the store. This may be created manually through the HP StoreOnce Backup system
or generated by the backup application.
A description for the store.Description
The retention period for information about data jobs. This information is displayed on the Data
Jobs tab, which provides a log of all data job activity. The default is 90 days.
The retention period for information about inbound copy jobs. This information is displayed
on the Inbound Copy Jobs tab, which provides a log of all data job activity. The default is 90
days.
The retention period for information about outbound copy jobs. This information is displayed
on the Outbound Copy Jobs tab, which provides a log of all data job activity. The default is
90 days.
This may be High or Low.Primary (Default)
• High means all data is sent from the media server and deduplicated on the HP StoreOnce
Backup system. This can also be described as target-side deduplication.
• Low means that the media server deduplicates the data and sends only unique data. This
can also be described as source-side deduplication.
The primary transfer policy is the default transfer policy for the server. Each media server may
be configured individually to use the most efficient transfer policy. As long as the two transfer
policies have different values, the media server will determine which is the most bandwidth
efficient transfer policy to use.
This may be High or Low (see definitions in row above) and is normally the opposite to the
Primary transfer policy so that the media server can choose to use which is most appropriate.
However, if you wish to enforce the transfer policy that the media server uses, set both Primary
and Secondary transfer policies to the same value.
Secure Erase Mode
Once the library is created and the correct license is applied, the Secure Erase Mode box
appears on the Store Details tab. The selection box defaults to None, meaning Secure Erase
is disabled. To enable Secure Erase, select the preferred number of Overwrite Passes (1, 3,
5, or 7). If enabled, this feature allows you to securely erase confidential data that may have
unintentionally been backed up as part of a regular backup job. See “Security
Features” (page 12) and “Licensing” (page 12) for more information.
To create a new store (administrators only)
1.Click Create at the top right of the StoreOnce Catalyst Stores page.
2.Provide the store details as described in Table 23 (page 89).
NOTE:If the proper license was applied, an Encryption Enabled check boxis displayed. To
enable encryption for the new store, you must do it at this time by checking the Encryption
Enabled box. See “Security Features” (page 12) and “Licensing” (page 12) for more
information.
When you have completed the store details, click Create.
Catalyst Stores page89
3.The store is created and displayed in the Stores list where its status changes from Creating to
Online. To enable the Secure Erase feature (if you have a license), see “To edit store details
(administrators only)” (page 90).
To edit store details (administrators only)
1.Select the store in the list to display its details and then click Edit.
2.Amend details as appropriate and click Update to apply them.
NOTE:Once the store is created and if the proper license is applied, a Secure Erase Mode
box is displayed. If enabled, this feature allows you to securely erase confidential data that
may have unintentionally been backed up as part of a regular backup job. See “Security
Features” (page 12) and “Licensing” (page 12) for more information.
To delete a store (administrators only)
Select the required store and then click on Delete in the Store Details tab to delete it. You will be
prompted to confirm that this is what you wish to do; click Delete to delete the store, or click Cancel
to cancel the command.
Permissions tab (administrators only)
This tab is only active if the Client Access Permission Checking box has been enabled on the Settings
tab. The Client list is only populated with individual clients or client groupings if you configured
clients on the Clients tab.
You can set the Physical Data Size Quota and Logical Data Size Quota (on the Store Details tab)
to use in conjunction with Client-Permissions. This allows you to effectively define how much space
a particular user is allowed to use on the HP StoreOnce Backup system. This may be useful with
many users using the same system and you wish to control how much disk space is available to
individual users.
1.Click Edit to change the permissions.
2.The default setting is No Access, which means that the client cannot access the store for data
or copy jobs. Click the appropriate Access button for the client(s) who should have access,
then click Update.
Item summary tab
This tab provides summary details of each item in the store.
•Use the filter options to locate the required item(s).
•By default, 50 items are displayed per page. This can be changed from the Items Per Page
drop-down. Use the scroll bar to scroll through all items on the page or use the Prev or Next
buttons to display more pages.
•Once items are displayed, Admin users may use the Delete button to delete a selected item.
NOTE:This is not recommended. It is better to let the backup application remove items to
ensure integrity within backup catalog. Only use Delete as a last resort.
•All users may use the buttons under the item details to show Related Data Jobs, Outbound
Copy Jobs, or Inbound Copy Jobs for the selected item.
90HP StoreOnce Catalyst functions
NOTE:This tab provides a report; it is not automatically refreshed.
1.If necessary, click + to display the filter options.
Check the boxes against the options that you wish to use. Specify as many options as possible
to narrow the search results. Wild cards or boolean logic (AND/OR filters) are not supported.
•The item name is a unique identifier that is always defined on the backup application.
•Sub-string matches are supported, so the filter will return any item that contains the
character string that has been entered. With Item Name you can also specify that it should
be an Exact Match.
•With the Created and Last Modified fields, enter a range of dates.
•The Tag Lists allow you to filter any tags that the client may have added to the data. You
may enter as many tags as required; they should be space separated, with no commas.
If you leave All Match unchecked, the filter will retrieve all items that have any of the tags
specified. If you check All Match, it will retrieve only those items that have all the tags
specified.
2.Click Show Items.
3.A report listing items is displayed.
Table 24 Item summary fields
DescriptionField
The name of the item. This is the name that is generated by the backup application.Item Name
The date that the item was created.Created
The date that the item was last modified.Last Modified
Catalyst Stores page91
Table 24 Item summary fields (continued)
DescriptionField
A list of any tags to include or exclude when searching for the item.Tag List
The size of the data within the item.Data Size
4.Click on an item within a list to display further details about it in the lower part of the page.
Table 25 Item summary details
DescriptionField
The name of the item. This is the name that is generated by the backup application.Item Name
The date that the item was created.Created
A list of any tags that are attached to this item.Tag List
The date that the item was last modified.Last Modified
The size of the data within the item.Data Size
The version of the item. Currently, this is always 1.Version
Meta Data Size
Data jobs tab
This tab provides a log with details about data jobs for the selected store.
•Use the filter options to locate the required job(s).
•By default, 50 items are displayed per page. This may be changed from the Items Per Page
drop-down. Either use the scroll bar to scroll through all items on the page or use the Prev or
Next buttons to display more pages.
•Values that you set in Settings control how long data jobs are retained for (default is 90 days).
NOTE:This tab provides a report; it is not automatically refreshed.
The size of the meta data associated with the item. Meta data is created by the backup
application.
The dedupe block size. Currently, the block value is always Variable.Dedupe Block Size
92HP StoreOnce Catalyst functions
1.If necessary, click + to display the filter options.
Check the boxes against the options that you wish to use. Specify as many options as possible
to narrow the search. Wild cards and boolean logic (AND/OR filters) are not supported.
•The name of the item is a unique identifier that is always defined on the backup
application. Similarly, the client name is defined on the backup application. Best practice
is to ensure that client names are also meaningful for use in searches on the StoreOnce
Backup system.
•Sub-string matches are supported, so the filter will return any item that contains the
character string that has been entered. With Item Name and Client you can also specify
that it should be an Exact Match.
•With the Start Time and End Time fields, enter a range of dates and times.
•Select a Status which may be Running, Completed or Cancelled.
2.Click Show Jobs.
3.A report listing data jobs is displayed. Use the Sort Results option to sort the results
alphabetically.
Catalyst Stores page93
Table 26 Data job fields
DescriptionField
Item Name
Data Written
Write Throughput
The name of the item within data job. This name is created by the backup application.
Each data job may have multiple items.
The status of the data job item, which may be:Status
• Running: in progress
• Completed: the item has completed successfully, this does not mean the data job has
completed, only the item, and does not reconcile with the backup application job
completion status
• Cancelled: the Status Information provides more details, for example, the data
connection has been lost between the HP StoreOnce Backup system and the media
server (this is unlikely to occur)
• Unexpected error: the StoreOnce Backup system has experienced a problem whole
processing the item
• Insufficient disk space: it will be necessary to clear some disk space or add more storage
• Link failure: IP connectivity has been lost and the backup application must retry the job
• System shutdown: System has been shut down
NOTE:The backup application must be configured to tidy up any incomplete or orphaned
items before retrying the job.
The amount of user data that was written. This reconciles with the information in the backup
application's log, but note that a backup job may span multiple items.
The write throughput speed. The first figure, expressed in MB/s, is the logical bandwidth;
the second figure, expressed in Mb/s is the physical bandwidth consumed. The %
bandwidth saving depends upon whether the store has been configured for source-side
deduplication with a low-bandwidth transfer policy, or target-side deduplication with a
high-bandwidth transfer policy. See Store Details tab (page 88).
Read Throughput
Client Identifier
The amount of user data that was read.Data Read
The read throughput speed. This only has one value because read throughput is always
high throughput without any % saving.
The client that initiated the data job, as defined on the backup application. The IP address
in the brackets is for information and not part of the client name. It is best practice to
ensure that a meaningful name is given to the client within the backup application. If no
client was defined on the backup application, only the IP address is shown.
The time the job started.Start Time
The time the job ended.End Time
94HP StoreOnce Catalyst functions
4.Click on an item within a list to display further details about it in the lower part of the page.
Table 27 Data job details
DescriptionField
Item Name
Status
Data Written
The name of the item within data job. This name is created by the backup application.
Each data job may have multiple items.
The status of the data job item, as described in the previous table.
NOTE:The backup application must be configured to tidy up any incomplete or orphaned
items before retrying the job.
Status information, as appropriate to the Status reported.Status Information
The time the job started.Start Time
The time the job ended.End Time
A name that identifies the client user who created the item.Client Identifier
Displays the IP address of the server that created the item.Client Address
The name of the application that created the item.Application Identifier
The deduplication ratio.Deduplication Ratio
The amount of user data that was written. This reconciles with the information in the backup
application's log, but note that a backup job may span multiple items.
The length of time that data was written in MB/s.Write Duration
The write throughput speed, expressed in MB/s, is the logical bandwidth.Write Throughput
The amount of data transferred.Data Transferred
Bandwidth Saving
Read Throughput
Outbound copy jobs tab
This tab provides a log with details of all outbound copy jobs for the selected store.
•Use the filter options to locate the required job(s).
•By default, 50 items are displayed per page. This may be changed from the Items per Page
drop-down. Either use the scroll bar to scroll through all items on the page; or use the Prev or
Next buttons to display more pages.
•Values that you set in Settings control how long outbound copy jobs are retained for (default
is 90 days).
NOTE:This tab provides a report; it is not automatically refreshed.
The bandwidth utilisation in Mb/s. This is the physical bandwidth consumed.Bandwidth Utilisation
The amount of bandwidth saved. The % bandwidth saving depends upon whether the
store has been configured for source-side deduplication with a low-bandwidth transfer
policy, or target-side deduplication with a high-bandwidth transfer policy. See Store Details
tab (page 88).
The amount of data read.Data Read
The length of time that data was read in MB/s.Read Duration
The read throughput speed. Read throughput is always high throughput without any %
saving.
Catalyst Stores page95
1.If necessary, click + to display the filter options.
Check the boxes against the options that you wish to use. Specify as many options as possible
to narrow the search. Wild cards and boolean logic (AND/OR filters) are not supported.
•The name of the item is a unique identifier that is always defined on the backup
application. Similarly, the client name is defined on the backup application. Best practice
is to ensure that client names are also meaningful for use in searches on the StoreOnce
Backup system.
•Sub-string matches are supported, so the filter will return any item that contains the
character string that has been entered. With Item Name and Client you can also specify
that it should be an Exact Match.
•With the Start Time and End Time fields, enter a range of dates and times.
•Select a Status which may be Pending, Running, Paused, Completed, or Cancelled.
2.Click Show Jobs.
3.A report listing outbound copy jobs is displayed. Use the Sort Results option to sort the results
alphabetically.
Table 28 Outbound copy job fields
DescriptionField
Item Name
Status
The name of the item being copied from the outbound copy job. This name is created by
the backup application.
The status of the outbound copy job, which may be Queued, Paused, Running, Cancelled,
or Completed. If the status information displays —, no further information is available.
NOTE:The backup application must be configured to tidy up any incomplete or orphaned
items before retrying the job.
96HP StoreOnce Catalyst functions
The amount of data to be copied in the copy job.Data Size
The copy speed.Copy Throughput
Table 28 Outbound copy job fields (continued)
DescriptionField
Target Appliance
Target Store
Target Item Name
Client Identifier
The address of the target server. The target is the other StoreOnce Backup system to which
the job is being copied from the this HP StoreOnce Backup system. All target details are
specified by the backup application when the outbound copy job is created.
The name of the target store on the StoreOnce Backup system to which the job is being
copied.
The name of the target item on the StoreOnce Backup system to which the job is being
copied. All item names are defined by the backup application.
The client that initiated the outbound copy job. The client name is defined in the backup
application.
The time the job was queued.Queued Time
The time the job started.Started Time
The time the job ended.Stopped Time
Catalyst Stores page97
4.Click on an item within a list to display further details about it in the lower part of the page.
Table 29 Outbound copy job fields
DescriptionField
Item Name
Status
Status Information
Client Identifier
Time
The name of the item being copied from the outbound copy job. This name is created by
the backup application.
The status of the outbound copy job, which may be Queued, Paused, Running, Cancelled,
or Completed. If the status information displays —, no further information is available.
NOTE:The backup application must be configured to tidy up any incomplete or orphaned
items before retrying the job.
Status information. This will be a — unless the job has been cancelled or paused. See
System Information messages (page 103) for more information about events that may cause
a job to be cancelled or paused.
The percentage of the copy job that has been completed.Percent Complete
The client that initiated the outbound copy job. The client name is defined in the backup
application.
Displays the IP address of the server that created the item.Client Address
The name of the application that created the item.Application Identifier
The time the copy job was queued.Queued Time
The time the copy job was started.Started Time
The time the job ended.Stopped Time
The estimated completion time, if the copy job is still running.Estimated Completion
Target Appliance
Target Store
Target Item Name
Source Item Size
Source Item Last
Modified
Offset
Size
Copy Offset
The address of the target server. The target is the other StoreOnce Backup system to which
the job is being copied from the this HP StoreOnce Backup system. All target details are
specified by the backup application when the outbound copy job is created.
The name of the target store on the StoreOnce Backup system to which the job is being
copied.
The name of the target item on the StoreOnce Backup system to which the job is being
copied. All item names are defined by the backup application.
The copy speed.Copy Throughput
The size of the source item to be copied; this may be larger than the data size value (but
no smaller).
The date that the source item was last modified. This is useful if you need to check whether
the source item might have been modified during the copy attempt. An error message is
also generated if the source item is modified whilst copying.
This identifies where the data to be copied occurs within the source item.Source Item Copy
This identifies the size of the data to be copied within the source item.Source Item Copy
This identifies where the data to be copied should be placed within the destination item.Destination Item
The amount of time taken to copy the data.Copy Duration
Bandwidth Saving
98HP StoreOnce Catalyst functions
The amount of data copied, which should match the data size.Data Copied
The bandwidth utilisation in Mb/s. This is the physical bandwidth consumed.Bandwidth Utilisation
The amount of bandwidth saved. The % bandwidth saving depends upon whether the
store has been configured for source-side deduplication with a low-bandwidth transfer
Table 29 Outbound copy job fields (continued)
DescriptionField
policy, or target-side deduplication with a high-bandwidth transfer policy. See Store Details
tab (page 88).
Unsuccessful Retry
Attempts
Time
Cancelled
To cancel a copy job
HP recommends canceling copy jobs via the backup application and only using the GUI as a last
resort. This ensures that the backup application catalog stays in sync with the backup images.
1.Select the job to be cancelled in the outbound copy job list.
2.Click Cancel Job.
3.At the confirmation prompt, click OK.
Inbound copy jobs tab
This tab provides a log with details about inbound copy jobs for the selected store.
•Use the filter options to locate the required job(s).
•By default, 50 items are displayed per page. This may be changed from the Items per Page
drop-down. Either use the scroll bar to scroll through all items on the page; or use the Prev or
Next buttons to display more pages.
If there are multiple unsuccessful attempts, a network link may be down or a blackout
window may be scheduled.
This is the time that the next copy will be attempted, if the previous one was unsuccessful.Next Copy Attempt
This indicates whether the user has cancelled the copy job or not.Copy Operation
•Values that you set in Settings control how long inbound copy jobs are retained for (default
is 90 days).
NOTE:This tab provides a report; it is not automatically refreshed.
Catalyst Stores page99
1.If necessary click + to display the filter options.
Check the boxes against the options that you wish to use. Specify as many options as possible
to narrow the search. Wild cards and boolean logic (AND/OR filters) are not supported.
•The name of the item is a unique identifier that is always defined on the backup
application. Similarly, the client name is defined on the backup application. Best practice
is to ensure that names are also meaningful for use in searches on the StoreOnce Backup
system.
•Sub-string matches are supported, so the filter will return any item that contains the
character string that has been entered. With Item Name and Client you can also specify
that it should be an Exact Match.
•With the Start Time and End Time fields, enter a range of dates and times.
•Select a Status which may be Pending, Running, Paused, Completed, or Cancelled.
2.Click Show Jobs.
3.A report listing inbound copy jobs is displayed. Use the Sort Results option to sort the results
alphabetically.
100 HP StoreOnce Catalyst functions
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.