Topics | How To | Related Topics
How to Setup and Run a Migration Archive Operation
Migration Archiving Considerations
Registry Keys for Migration Archiving
Migration Archiving of data allows preservation, transparent retrieval, and discovery of information held within file system and Network Attached Storage (NAS) environments. Migration archiving reduces the size of data on the primary storage and decreases the duration of backup operations by the corresponding iDataAgent. Migrating data from file systems and NAS devices to secondary, tiered-storage maximizes storage utilization across the enterprise.
Migration archiving can optionally create stubs that contain information about the archived data to facilitate end-users with non-browse recovery operations from third-party applications. Migrated data can also be recovered from the CommCell Console using the browse recovery operation whether the stubbing feature is enabled or disabled. Additionally, migration archiving employs centralized, policy-based storage to reduce costs and simplify management.
Migration archiving operations use:
These rules specify criteria for the types of data to archive. These rules are configured on a per subclient basis. Rules are grouped by:
It is recommended to set minimum file size to 2 Kb so that files to be archived are at least the size of the stub.
Data Classification Rules - With the addition of Data Classification Enabler, migration archiving can archive files based on rules beyond traditional files and folder paths. These rules include or exclude folders/files "owned" by specific individuals or specific folders/files in archive operations. With Data Classification, data is classified according to its use, type, and value that allows flexibility in creating rules that meet the changing needs of organizations.
Migration archiving also supports using an On Demand File List to archive data though the use of an external list of files. This can be useful for data protection administrators to archive the data they want on demand, regardless of the archiving rules. On demand file lists can be used as a stand-alone method of performing manual archiving, or it can be used with the criteria established in the Archiving Rules.
The following section provides the steps to set up and run a Migrate Archive Operation:
By default, this option is selected and archiving rules are initially disabled. When selected, all archiving rules will be ignored except for Stub Rules. |
Stubs serve as placeholders for the data that is moved to secondary storage. Protecting stubs is useful to maintain the ability of non-browse recovery operations. For example, if there is a disk failure, the data can be restored along with the stubs. This reduces the size of the data in the volume as stubs consume less space.
Stubs can be protected by running a backup as follows:
Stubs from Local File System instance can be backed up by running a Full backup from the Windows File System iDataAgent.
Stubs from Celerra and FPolicy instance can be backed up running a Full backup from the NAS NDMP iDatAgent.
For more details on Celerra Instance, see Managing Celerra Data.
For more details on FPolicy Instance, see Managing NetApp Data.
Stubs from Network File Share instance can be backed up by running a Full backup from the Windows File System iDataAgent. In this case, the backup must be run from a client that does not have the File Share Archiver Client installed.
For more details on Network File Share Instance, see Managing Network File Share Data.
File access times when both File Archiver and File System iDataAgents are installed
Archiving files based on file access times has special considerations. Ordinarily the action of backing up a file using the File System backup agent will cause the file access time to change to the time of the backup. This action may have an undesired effect on the archiver agent if you want to archive files based on access times.
To workaround this situation, you should either use Classic File Scan with the Preserve File Access Time option selected as the scan method OR a software snapshot (VSS or Qsnap) to accomplish the backup. If the software snapshot fails (i.e. VSS service unavailable or unable to quiesce the volume), you can use the Open Files Failure Actions dialog box to select the desired action to be performed.
Windows 2008 servers have access time update disabled by default. The user must enable access time update for migration rules to work properly. This attribute is configurable on Windows 2003 and is enabled by default.
Stubs are not included by default in Incremental Backups when the Classic Scan method is used to scan files. This means that stubs created after the most recent full backup may be lost if the operating system or file structure where the stubs reside is destroyed or rendered unusable before the next full backup is run. However, the archived data is still recoverable through a browse recovery operation from the CommCell Console.
iDataAgents can be configured to include stubs in Incremental Backups (and in turn Synthetic Full Backups ) so that stubs are not lost. Stubs can be included in Incremental Backups as follows:
Enable the Use Change Journal or Use Data Classification option on the backup set of the associated File System iDataAgent prior to running the incremental backup. See Using Change Journal, Classic File Scan, or Data Classification Enabler for Backups.
Before performing any migration archiving procedures, review the following information:
Some items fail because they are locked by the operating system or application and cannot be opened at the time of the data protection operation. This often occurs with certain system-related files and database application files.
Do not set a quota for an object (such as a volume, directory, or user) that is lower than the amount already used. Doing so may cause improper results for data protection or recovery operations.
Similarly for Celerra Proxy subclients, file names cannot be longer than 242 bytes as Windows has a 260 byte limitation on file names.
When a mount point contains stubbed files and it is moved, a reboot is required in order to recall the stubs.
Use the following registry keys to modify the default behavior of the Migration Archiver Agent:
Topic | Registry Key(s) | Description | |
Access and Modified Times | GXHSMSERVICEKEEPTIMES | Migration archiving and stub recovery operations change the access and modified time on files. An enhancement that allows the recovery administrator to preserve the original file access time and modified time during migration archiving and stub recovery. See Registry Keys (GXHSMSERVICEKEEPTIMES and GXHSMSTUBKEEPTIMES) for more information on enabling this feature for all instance types except Celerra. | |
GXHSMSERVICEKEEPTIMES | Stub pruning looks at the modified time of the file to determine eligibility for pruning stubs. If you use the GXHSMSERVICEKEEPTIMES and GXHSMSTUBKEEPTIMES registry keys, the modified time will be preserved. This means that when you run a migration with these registry keys enabled, the preserved modified time will always be older than the time that the file was stubbed. As such, if you use the Prune stub only after n days option, you should ensure that the modified time is not being preserved. Therefore, be sure to disable the GXHSMSERVICEKEEPTIMES and GXHSMSTUBKEEPTIMES registry keys (which are enabled by default) when you use this option. | ||
GXHSM_PRESERVE_ACCESSTIME_ONMIGRTNS | The access and modified times on files during migrations and recalls are preserved by default. You can stop preserving these times by using the GXHSM_PRESERVE_ACCESSTIME_ONMIGRTNS and GXHSM_PRESERVE_ACCESSTIME_ONRECALLS registry keys. | ||
Access Control Lists (ACLs) | GXHSMSERVICERESTOREACLS | You can determine how to handle ACLs on a stub with regard to migration archiving. You can choose either to replace the original ACLs on the stub after migration archiving or to preserve the original ACLs on the stub. See GXHSMSERVICERESTOREACLS in Registry Keys for more information. | |
Hidden and System Files | GXHSMIFINDDISABLEHIDDEN | If you want to enable the scanning and archiving of hidden and system files, you can set the value of the GXHSMIFINDDISABLEHIDDEN registry key to N for this purpose. Although scanning and archiving of read-only files is supported without the use of a registry key, if you want to enable stubbing and recall capabilities for read-only files, then the value of the GXHSMSTUBPERSERVEREADONLY registry key must be set to Y. | |
Log Files | GXHSMSTUBLOGFAILFILESTRUNCATE | You can determine whether the existing log file associated with your job should be truncated or appended to. See GXHSMSTUBLOGFAILFILESTRUNCATE in Registry Keys for more information. | |
Re-Stubbing | GXHSMMAINTAINSTUBCACHE | In order to speed up migration archiving operations, the software will
or can attempt to re-stub files under the following conditions:
In this case, during migration archiving, the system will simply swap the file for the stub in the stub cache, thereby speeding up the operation by not transferring or storing it again. This feature is enabled by default; however, it can be disabled by setting the GXHSMMAINTAINSTUBCACHE registry key value to N. |
|
Stubs as Sparse Files | GXHSMSTUBCREATESPARSE | Stub files are created as sparse files by default so that the file system can utilize space more efficiently. However, if you would like to configure the system to create stub files that are not sparse files, then the value of the the GXHSMSTUBCREATESPARSE registry key must be set to N. | |
GXHSMIGNORESPARSE | You can determine how to handle file migration archiving with regard to the sparse attribute. You can choose either to ignore the sparse attribute when archiving files or to archive only files without the sparse attribute set. See GXHSMIGNORESPARSE in Registry Keys for more information. | ||
|
|||
Stub Port Number | EVMGRC_REMOTE_PORT_OVERRIDE | You can override the stub file port number by using the EVMGRC_REMOTE_PORT_OVERRIDE registry key. Use this key when the port number changes. Keep in mind that using this key defeats the benefit of being able to recall data using different port numbers for multiple Agents. When the key does not exist, the File Share Archiver client uses the stub content to determine port number. For 7.0 stubs, refer to the EVMGRC_REMOTE_PORT registry key. | |
Stub Pruning | GXHSMSTUBKEEPTIMES | Stub pruning is unaffected by the status of GXHSMSTUBKEEPTIMES as the system takes the modification time from the stub content. | |
Delayed Stubbing | GXHSM_Delay_Stub_Enable | Delayed stubbing is a process that can be enabled by creating GXHSM_Delay_Stub_Enable key on the computer where the agent is installed. It helps in optimizing the stubbing and the backup process, particularly resuming the backup phase. |