Overview - Unix File System iDataAgents


Choose from the following topics:

Related Topics:


Introduction

The Unix File Systems iDataAgents are backup and restore vehicles for file system data (i.e., files and directories) residing on Unix computer systems. These File System iDataAgents are just several of a group of iDataAgents that provide backup and restore support for different kinds of data in what is often a heterogeneous network environment. The following figure shows one such example (for the Solaris File System iDataAgent).


Supported Data Types

In general, each Unix File System iDataAgent except for the IRIX File System iDataAgent supports data protection operations for the appropriate Unix File System (UFS) data. In some cases, operations for some other File System data (e.g., CD-ROM File System [cdfs]) may be also supported. Also, some iDataAgents support additional file systems.

File Systems Supported by the Unix File System iDataAgents

The Unix File System iDataAgents support the following file system types:

Supported File System(s)

Unix File System iDataAgent(s) Providing Support

Advanced File System (advfs) Tru64
CD-ROM File System (cdfs) All
Enhanced Journal File System (JFS2) AIX
Extended 2 File System (ext2) Linux
Extended 3 File System (ext3) Linux
Extended 4 File System (ext4) Linux
General Parallel File System (GPFS) Linux
Hierarchical File System (HFS) HP-UX
Journal File System (JFS) AIX, HP-UX
Oracle Cluster File System (OCFS2) Linux
Reiser File System (reiserfs) Linux
Red Hat File System GFS 5.2 Linux
Unix File System (UFS) All except IRIX
VERITAS File System (VxFS) AIX, HP-UX, Linux, Solaris
VERITAS Cluster File System (VxCFS) AIX, HP-UX, Linux, Solaris
'X' File System (XFS) IRIX and Linux
Zettabyte File System (ZFS) Solaris 10 6/06 64-bit only

In addition, the following section and two tables provide specific information on the effect of supported data types on browses, backups and restores by the various Unix File System iDataAgents. The right-most column in each table provides references to the appropriate commentary, requirements, and/or restrictions for each scenario. If the reference is flagged by "*", be sure to check the referred section for further information if necessary.


Effect of Data Types on Browse Operations by Unix File System iDataAgents

For Browse operations involving On Demand backup sets, you can browse either a single symbolic link pointing to a raw device or the actual path leading to the device. You can also browse the same if the symbolic link points to one or more intermediate symbolic links and both the original link and the intermediate links are contents in the same subclient. However, if they are not part of the same subclient, you can browse only the contents of the symbolic link; you cannot browse the actual raw device data file in this case.

On the other hand, for Browse operations involving regular backup sets, you can browse only the symbolic link to the raw device that was provided as the subclient content during a backup; you cannot browse the path pointing to the actual raw device in this case. Under this scenario, you can browse the same if the symbolic link points to one or more intermediate symbolic links without regard as to whether the original link and the intermediate links are contents in the same subclient.


Effect of Data Types on Backups by Unix File System iDataAgents

Backup Dispositions Affected Data Types/Characteristics Eligible Unix File System iDataAgents References (*Requirements/*Restrictions)
Backups can be run successfully for:
  • files with holes
by any *See Holed Files in Subclient Content.
  • sparse files (files with little non-holed data) using ufsdump
by Solaris *See Registry Keys:
FileSystemAgent (nDUMPSIZE x); iDataAgent (nDUMPPERCENT x)
  • files with advisory locks
by any except AIX See Locked/Open Files.
  • raw device files, including block and character, that are either explicitly identified or referenced via one or more symbolic links
by AIX, HP-UX, Linux and Solaris *See Configure the Agent to Backup Raw Devices
  • a maximum path level of 10 symbolic links pointing to each raw device
by AIX, HP-UX, Linux and Solaris *See Configure the Agent to Backup Raw Devices
  • files whose name contains non-ASCII characters as long as the appropriate locales are set
by any *See Handling Files With Non-ASCII Characters.
  • virtual machines for VMware ESX Server 2.5 and higher
by Red Hat Linux AS 3.0 32-bit with kernel RH 2.4.21-15.ELsmp and glibc 2.3.2-95.20 (as guest OS/virtual machine) on VMware ESX Server * See Back up VMware Virtual Machines.
  • share with Macintosh File System data, including encoded resource fork data.
by any  
Backups cannot be run successfully for:
  • files with mandatory locks
by any except AIX See Locked/Open Files.
  • files whose name including the path contains more than 1024 (1023 for AIX) characters
by any (with slight variation for AIX as noted) See Maximum Filename Length for Unix File System iDataAgent Restores.
  • ACLs
by HP-UX 11.00 vxfs File System on PA-RISC, and any version of Linux other than Red Hat Linux AS 3.0 and SuSE Linux Enterprise Server 9.0  
  • data in a raw device whenever a directory that houses either that raw device or a link to the device is specified as the subclient content
by AIX, HP-UX, Linux and Solaris  
Backups might not be run successfully for:
  • remote scripts with one or more blank lines at the top of the scripts
by any *See Backup Considerations.

Effect of Data Types on Restores by Unix File System iDataAgents

Restore Dispositions Affected File Types/Characteristics Eligible Unix File System iDataAgents References (*Requirements/*Restrictions)
Restores can be run successfully for:
  • files with holes
by any *See Restore Data - Unix File System.
  • data targeted for an NFS-mounted file system
  • raw device files, including block and character, that are either explicitly identified or referenced via one or more symbolic links
by AIX, HP-UX, Linux and Solaris *See Restore Unix Raw Devices.
  • a maximum path level of 10 symbolic links pointing to each raw device
by AIX, HP-UX, Linux and Solaris *See Restore Unix Raw Devices.
  • files whose name contains non-ASCII characters as long as the appropriate locales are set
by any *See Handling Files With Non-ASCII Characters.
  • virtual machines for VMware ESX Server 2.5 and higher
by Red Hat Linux AS 3.0 32-bit with kernel RH 2.4.21-15.ELsmp and glibc 2.3.2-95.20 (as guest OS/virtual machine) on VMware ESX Server *See Restore VMware Virtual Machines.
  • share with Macintosh File System data, including encoded resource fork data.
by any See Restore Macintosh File System Resource Fork Data.
Restores cannot be run successfully for:
  • ACLs
by HP-UX vxfs File System on PA-RISC, and any version of Linux other than Red Hat Linux AS 3.0 and SuSE Linux Enterprise Server 9.0  
  • ACL data of files targeted for directories with the sticky bit on
by any See Restore Data - Unix File System.
  • files including "[]" and/or "\" that are not first browsed
  • files whose name including the path contains more than 1024 (1023 for AIX) characters
by any (with slight variation for AIX as noted) See Maximum Filename Length for Unix File System iDataAgent Restores.
Restores should not be run for:
  • quota files in place or out of place
by Tru64 See Restore Data - Unix File System.
  • running executable files
by any except HP-UX
Restores might not be successfully run for:
  • files out-of-place even if the files have fewer than 1024 (1023 for AIX) characters
by any (with slight variation for AIX as noted) See Maximum Filename Length for Unix File System iDataAgent Restores.

Back to Top


Tree Levels in the Unix File System iDataAgent

When the Unix File System iDataAgent is installed, the following levels are automatically created in the CommCell Browser.

papaya: Client

File System: Agent

defaultBackupSet: Backup Sets

default: Subclients

License Requirement

To perform a data protection operation using this Agent a specific Product License must be available in the CommServe® Server.

Review general license requirements included in License Administration. Also, View All Licenses provides step-by-step instructions on how to view the license information.


Holed Files in Subclient Content

Holed files are files that, while not using large blocks of memory for actual data, do use empty blocks, inflating the file size. These files can be backed up. However, when they are restored, the size of empty blocks may not be the same as before. See also Backup Considerations for This Agent.

Back to Top


Disaster Recovery Considerations

Back to Top