Client

Topics | How To | Related Topics


Overview

Configurable Properties

Using UNC Paths for Job Results Directory

Client Connectivity

Client Configuration Considerations

Operation Window

Audit Trail


Overview

A client is a logical grouping of the agents installed on a computer. A client level is created in the CommCell Browser the first time an agent is installed on a computer.

You can perform client operations as long as the client is available and has agents installed on that computer. Operations performed on clients are applicable to all the agents that are installed on that client.

DB2 DPF Pseudo-Client

For the DB2 DPF iDataAgent, the DB2 DPF pseudo-client and its corresponding instance serve as a logical grouping of DB2 DPF database partitions that are housed on various clients. See Overview - DB2 DPF iDataAgent for more information. The pseudo-client is not automatically created in the CommCell Browser by the software; you must create and configure it using the Create a DB2 DPF Client procedure.

RAC Pseudo-Client

For the Oracle RAC iDataAgent, the RAC pseudo-client serves as a logical grouping of one or more Oracle iDataAgent instances within a RAC pseudo-client instance. See Overview - Oracle RAC iDataAgent for more information. The pseudo-client is not automatically created in the CommCell Browser by the software; you must create and configure it using the Create a RAC Client procedure.

NAS NDMP Clients

The software for the NAS NDMP iDataAgents is installed automatically as part of the MediaAgent installation. Additional software components must also be installed and configured as part of NAS NDMP iDataAgent Deployment; however, the client is not automatically created in the CommCell Browser. To add the client to the CommCell, refer to the following procedure:

SRM Oracle Agent

For the SRM Oracle Agent, the agent software is installed on a proxy client. Once the installation is complete, the agent and the Oracle database information must be configured from the client level in the CommCell Console. For step-by-step instructions, see Add Oracle Database.

SRM NAS Agent

For the SRM NAS Agent, the agent software is installed on a proxy client. Once the installation is complete, the agent and the NAS file server must be configured from the client level in the CommCell Console. For step-by-step instructions, see Add NAS Filer.

SRM NetWare Proxy Agent

For the SRM NetWare proxy Agent, the agent software is installed on a proxy client. Once the installation is complete, the agent and the NetWare server information must be configured from the client level in the CommCell Console. For step-by-step instructions, see Add NetWare Server.

Clustered Environments

Information on whether the client is a physical or virtual client is displayed in the Client Properties.

Decoupled Installs

Agent and/or MediaAgent software can be installed on a computer that is not part of a CommCell. For more information, see De-coupled Install.

A client or MediaAgent can be pre-configured on the CommServe using the Register a Client Computer procedure, and it can be subsequently connected to a computer with client and/or MediaAgent software already installed. A Product License(s) will be consumed when you perform this procedure.

The two parts involved in a Decoupled Install can be performed in any order, but must both be performed before the client and/or MediaAgent are functional in the CommCell.


Configurable Properties

Once installed, the client computer is configured and is therefore able to manage the data or volumes. You can change the following aspects of the configuration:

Activity Control

You can enable or disable all operations for this CommCell object and all objects below it. For more information, see Activity Control.

Configuring the CDR Log File Location

You can specify the location on the source and destination computers for saving replication log files for ContinuousDataReplicator. For step-by-step instructions, see Specify CDR Log File Location on Source and Destination Computers.

Optimizing Data for Search

When Exchange agents (except Exchange Database iDataAgent) are installed on a client, you can enable optimization of Exchange data prior to a data protection operation in order to perform an accurate end-user search on delegated mailboxes and online Exchange data from the Search Console. Whenever you enable the delegated search feature for Exchange data from the Browse/Search/Recovery dialog in the Control Panel, you will be prompted to enable optimization of data for search from the Exchange client level. For step-by-step instructions, see Optimize Data for Search.

Configuring the Proxy for Exchange

When 32-bit Exchange agents are installed in non-standard configurations, such as off-host proxy or 32-bit on 64-bit, this property must be configured on the client hosting the Exchange Server to establish communications between the 32-bit Exchange agents and the Exchange Server in order to support Outlook Add-In and/or OWA functionality. The proper setting for this property depends on the type of installation configuration, as discussed below:

This field should be configured after installing the Exchange agents and the OWA Proxy Enabler; it can be configured either before or after the installation of the DataArchiver Outlook Add-In (if applicable), but it must be configured before using Outlook Add-In and/or OWA in the configurations mentioned above. For step-by-step instructions, see Configure the Proxy for Exchange.

Configuring the Search Server URLs

When the client is configured as a Web Search Server to support content index and search capabilities from the Search Console, options are provided that allow you to view or change the URLs used to access the Search Console and User Administration page. When the client is an Exchange Server, an option is provided that allows you to associate a Web Server to the client for searching.

For step-by-step instructions, see Configure the Search Server URLs.

Data Collection

You can configure Data Collection for a Client Group or for a Client. For more information, see Data Collection.

Data Encryption

You can enable or disable the encryption of data for transmission over unsecure networks and for storage on media. For more information, see Data Encryption.

Job Configuration

You can set the following job configuration options:

  • Change the name of the computer in the operating system.
  • Make sure that the computer is available in the network with the new name. (DNS lookup or other name resolution facilities are appropriately configured to resolve the new name of the computer.)
  • Ensure that all applications running on the computer, such as SQL server, Exchange, Server, Oracle database, etc., function with the new name.

TIP

Use ping (or other such network connectivity utilities) to verify whether the computer that has a new name is accessible. Also, ensure that the other computers in the network are accessible to the computer with the new name.

Name Management

You can change the name of the Client/MediaAgent computer if the Host name is changed. See Name Management for more information.

Do not use spaces when specifying a new name for the Client.

User Security

You can perform the following functions:

For more information, see User Administration and Security.

Associate or Disassociate Clients

You can associate or disassociate clients to or from a client computer group.

Version

The Version tab displays the software version and post-release service packs and updates installed for the component. See Version for an overview.

Data Interface pairs

You can add, delete, and view data interface pairs between the client and other CommCell computers. The Advanced tab of the client's Properties dialog box contains options to configure new data interface pairs and view and delete any existing data interface pairs. For more information on data interface pairs, see Data Interface Pairs.


Using UNC Paths for Job Results Directory

UNC paths are supported for job results directory by the Exchange Database iDataAgent 2007 and above when configured in Cluster Continuous Replicator environment. Also note that Windows iDataAgent is also supported when configured in this environment.

Note that while assigning UNC paths, the designated directory must be ONE level below the directory which is shared for this purpose. Examples:

\\machine1\<share_name>\job_results\ is shared. Then specify \\machine1\<share_name>\job_results\job_results_1 as the job results directory.

\\machine1\<share_name>\job_results\ is shared. Then specifying \\machine1\<share_name>\job_results as the job results directory is not supported.

User Impersonation for Accessing the Job Results Directory

On a Windows client, you need to specify a Windows User Account with the appropriate privileges to access the job results directory.

User impersonation requires that the specified user have write permissions to the product installation folders; otherwise, the user impersonation account may not take effect. This is especially true if the associated computer is not part of a domain and if the user is not a domain user. Additionally, users will need full permissions (registry rights) to the following registry key: \\HKEY_LOCAL_MACINE\SOFTWARE\CommVault Systems.

In addition, if UNC paths are used for job results and subclient contents are specified as UNC paths, the user impersonation account used for the job results directory must have access to both paths.

For the File System iDataAgent, the user impersonation occurs only once; therefore, the user impersonation account specified for the job results directory will take precedence and will be used to back up the contents of the UNC path included in the subclient content.

For the Exchange iDataAgent, the account must have the following:

For step-by-step instructions, see Change the User Account for Accessing the Job Results Directory.


Client Connectivity

You can check whether or not a client is accessible in the CommCell by using the Check Readiness option in the CommCell Console.

When selected, this option will display a message indicating whether or not the client is accessible. If the client is not accessible, you can check the Service Control Manager to ensure the client's services are running.

For step-by-step instructions, see Check Client Connectivity.

If the CommNet Agent software is installed on the CommServe, client readiness check runs only during a certain time of day for the CommNet Server. By default, the client check runs every 24 hours from 1:00 PM to 2:00 PM.

Use the following registry keys to mandate the client readiness check to run within a specified time range.

  1. To change the time range: ClientCheckWindowStartHour and ClientCheckWindowEndHour.
  2. To change the frequency: ClientCheckInterval.

The first client readiness check will be triggered only after half an hour of each service restart honoring the values set above.


Client Configuration Considerations

Consider the following when configuring your clients:


Operation Window

You can configure operation rules at this level using the Operation Window. See Operation Window for an overview.


Audit Trail

Operations performed with this feature are recorded in the Audit Trail. See Audit Trail for more information.


Back to Top