Topics | How To | Related Topics
Using UNC Paths for Job Results Directory
Client Configuration Considerations
A client is a logical grouping of the agents installed on a computer. A client level is created in the CommCell Browser the first time an agent is installed on a computer.
You can perform client operations as long as the client is available and has agents installed on that computer. Operations performed on clients are applicable to all the agents that are installed on that client.
For the DB2 DPF iDataAgent, the DB2 DPF pseudo-client and its corresponding instance serve as a logical grouping of DB2 DPF database partitions that are housed on various clients. See Overview - DB2 DPF iDataAgent for more information. The pseudo-client is not automatically created in the CommCell Browser by the software; you must create and configure it using the Create a DB2 DPF Client procedure.
For the Oracle RAC iDataAgent, the RAC pseudo-client serves as a logical grouping of one or more Oracle iDataAgent instances within a RAC pseudo-client instance. See Overview - Oracle RAC iDataAgent for more information. The pseudo-client is not automatically created in the CommCell Browser by the software; you must create and configure it using the Create a RAC Client procedure.
The software for the NAS NDMP iDataAgents is installed automatically as part of the MediaAgent installation. Additional software components must also be installed and configured as part of NAS NDMP iDataAgent Deployment; however, the client is not automatically created in the CommCell Browser. To add the client to the CommCell, refer to the following procedure:
For the SRM Oracle Agent, the agent software is installed on a proxy client. Once the installation is complete, the agent and the Oracle database information must be configured from the client level in the CommCell Console. For step-by-step instructions, see Add Oracle Database.
For the SRM NAS Agent, the agent software is installed on a proxy client. Once the installation is complete, the agent and the NAS file server must be configured from the client level in the CommCell Console. For step-by-step instructions, see Add NAS Filer.
For the SRM NetWare proxy Agent, the agent software is installed on a proxy client. Once the installation is complete, the agent and the NetWare server information must be configured from the client level in the CommCell Console. For step-by-step instructions, see Add NetWare Server.
Information on whether the client is a physical or virtual client is displayed in the Client Properties.
Agent and/or MediaAgent software can be installed on a computer that is not part of a CommCell. For more information, see De-coupled Install.
A client or MediaAgent can be pre-configured on the CommServe using the Register a Client Computer procedure, and it can be subsequently connected to a computer with client and/or MediaAgent software already installed. A Product License(s) will be consumed when you perform this procedure.
The two parts involved in a Decoupled Install can be performed in any order, but must both be performed before the client and/or MediaAgent are functional in the CommCell.
Once installed, the client computer is configured and is therefore able to manage the data or volumes. You can change the following aspects of the configuration:
You can enable or disable all operations for this CommCell object and all objects below it. For more information, see Activity Control.
You can specify the location on the source and destination computers for saving replication log files for ContinuousDataReplicator. For step-by-step instructions, see Specify CDR Log File Location on Source and Destination Computers.
When Exchange agents (except Exchange Database iDataAgent) are installed on a client, you can enable optimization of Exchange data prior to a data protection operation in order to perform an accurate end-user search on delegated mailboxes and online Exchange data from the Search Console. Whenever you enable the delegated search feature for Exchange data from the Browse/Search/Recovery dialog in the Control Panel, you will be prompted to enable optimization of data for search from the Exchange client level. For step-by-step instructions, see Optimize Data for Search.
When 32-bit Exchange agents are installed in non-standard configurations, such as off-host proxy or 32-bit on 64-bit, this property must be configured on the client hosting the Exchange Server to establish communications between the 32-bit Exchange agents and the Exchange Server in order to support Outlook Add-In and/or OWA functionality. The proper setting for this property depends on the type of installation configuration, as discussed below:
This field should be configured after installing the Exchange agents and the OWA Proxy Enabler; it can be configured either before or after the installation of the DataArchiver Outlook Add-In (if applicable), but it must be configured before using Outlook Add-In and/or OWA in the configurations mentioned above. For step-by-step instructions, see Configure the Proxy for Exchange.
When the client is configured as a Web Search Server to support content index and search capabilities from the Search Console, options are provided that allow you to view or change the URLs used to access the Search Console and User Administration page. When the client is an Exchange Server, an option is provided that allows you to associate a Web Server to the client for searching.
For step-by-step instructions, see Configure the Search Server URLs.
You can configure Data Collection for a Client Group or for a Client. For more information, see Data Collection.
You can enable or disable the encryption of data for transmission over unsecure networks and for storage on media. For more information, see Data Encryption.
You can set the following job configuration options:
TIP Use ping (or other such network connectivity utilities) to verify whether the computer that has a new name is accessible. Also, ensure that the other computers in the network are accessible to the computer with the new name. |
You can change the name of the Client/MediaAgent computer if the Host name is changed. See Name Management for more information.
Do not use spaces when specifying a new name for the Client. |
You can perform the following functions:
For more information, see User Administration and Security.
You can associate or disassociate clients to or from a client computer group.
The Version tab displays the software version and post-release service packs and updates installed for the component. See Version for an overview.
You can add, delete, and view data interface pairs between the client and other CommCell computers. The Advanced tab of the client's Properties dialog box contains options to configure new data interface pairs and view and delete any existing data interface pairs. For more information on data interface pairs, see Data Interface Pairs.
UNC paths are supported for job results directory by the Exchange Database iDataAgent 2007 and above when configured in Cluster Continuous Replicator environment. Also note that Windows iDataAgent is also supported when configured in this environment.
Note that while assigning UNC paths, the designated directory must be ONE level below the directory which is shared for this purpose. Examples:
\\machine1\<share_name>\job_results\ is shared. Then specify \\machine1\<share_name>\job_results\job_results_1 as the job results directory.
\\machine1\<share_name>\job_results\ is shared. Then specifying \\machine1\<share_name>\job_results as the job results directory is not supported.
On a Windows client, you need to specify a Windows User Account with the appropriate privileges to access the job results directory.
User impersonation requires that the specified user have write permissions to the product installation folders; otherwise, the user impersonation account may not take effect. This is especially true if the associated computer is not part of a domain and if the user is not a domain user. Additionally, users will need full permissions (registry rights) to the following registry key: \\HKEY_LOCAL_MACINE\SOFTWARE\CommVault Systems.
In addition, if UNC paths are used for job results and subclient contents are specified as UNC paths, the user impersonation account used for the job results directory must have access to both paths.
For the File System iDataAgent, the user impersonation occurs only once; therefore, the user impersonation account specified for the job results directory will take precedence and will be used to back up the contents of the UNC path included in the subclient content.
For the Exchange iDataAgent, the account must have the following:
Remote Access can be granted by right-clicking My Computer | Properties | Remote | Select Remote Users | Add and then specifying the domain\user in the Select User dialog box in the computer hosting the UNC path.
For step-by-step instructions, see Change the User Account for Accessing the Job Results Directory.
You can check whether or not a client is accessible in the CommCell by using the Check Readiness option in the CommCell Console.
When selected, this option will display a message indicating whether or not the client is accessible. If the client is not accessible, you can check the Service Control Manager to ensure the client's services are running.
For step-by-step instructions, see Check Client Connectivity.
If the CommNet Agent software is installed on the CommServe, client
readiness check runs only during a certain time of day for the CommNet
Server. By default, the client check runs every 24 hours from 1:00 PM to 2:00 PM.
Use the following registry keys to mandate the client readiness check to run within a specified time range.
The first client readiness check will be triggered only after half an hour of each service restart honoring the values set above. |
Consider the following when configuring your clients:
The Collect File records the path and name of each scanned file that is to be backed up; therefore, the collect file size is determined by the number of files to be backed up and the length of the file path and file name. If you are working with very deep directory structures, the file paths will be longer, and this impacts the collect file size. When performing full backups of large file systems with a mix of short and long file paths, plan on collect file growth of approximately 50MB for every 1 Million files. Plan on 100MB-200MB per one million files if most of the files in your backup operation have very long file paths (200 + characters in length). Incremental and Differential backups tend to back up fewer files than full backups, and so create smaller collect files.
You can configure operation rules at this level using the Operation Window. See Operation Window for an overview.
Operations performed with this feature are recorded in the Audit Trail. See Audit Trail for more information.