Replication Configuration - Workstation Backup Agent

Topics | How To | Related Topics


  This feature/product/platform is deprecated in this release. See Deprecated Features, Products, and Platforms for more information.

Overview

Replication Scenario

Network Bandwidth Throttling

Orphan Files

Fan-In Recovery Points

Fan-In Backup Set

Best Practices


Overview

Workstation Backup Agent uses ContinuousDataReplicator on the destination computer to manage the backup data secured from the Workstation Agent source. Managing the backup data includes, creating recovery points to access point-in-time data, and back up the recovery points for future access. This document explains the configurations required in the destination computer and other replication options required for the successful data protection operations using Workstation Backup Agent.


Replication Scenario

Workstation Backup source computers are configured to the destination computer in a Fan-In configuration setup.

Fan-In: Replication from multiple Source computers to a single Destination computer:

In a Fan-In configuration, multiple computers on the LAN or WAN have their data replicated to a single computer, either local or remote. This provides protection of all of the source computers against catastrophic failure, while maximizing the use of resources by directing all the data to a single destination computer.

Most of the configuration of replication and Recovery Point options can be accomplished from the Fan-In tab of the Agent Properties on the destination computer, and these settings are automatically applied to all the source computer.

Scalability

Although the scalability of a Fan-In setup can vary based on network and system resources, it is recommended that each Fan-In setup contains no more than 100 source clients.

For maximum performance and robustness, the total number of Replication Pairs configured for the same source volume should be kept to a minimum. If multiple Replication Pairs must be configured for the same source volume, the recommended upper limit is five.

For more information, see Using ContinuousDataReplicator in a Fan-In Configuration.


Network Bandwidth Throttling

Throttling allows you to configure the rate of data transfer over the network, based on the throttling parameters. The various throttling options (including throttling amount and rules) can be configured at the Agent level, in the Operational Parameters tab of the agent properties screen.

The following can be configured on the Source computer:

Throttling Amount 

In the throttling amount, maximum network transfer rate, is measured in megabits per second (Mbps).

On Windows, the setting for Throttling Amount will apply to each pipeline engaged in replication activity, not the aggregate of all pipelines for all Replication Pairs on the computer. With respect to the number of pipelines that will be active at any one time, review the following based on an example of having a Throttling Amount setting of 10Mbps:

On UNIX, the setting for Throttling Amount will apply to the aggregate of all pipelines for all Replication Pairs on the computer. With respect to the number of pipelines that will be active at any one time, review the following based on an example of having a Throttling Amount setting of 30Mbps:

If your destination computer is serving that function for multiple source computer, you may need to set this limit on each of the source computers, such that the destination computer has sufficient time for log replay from all source computers. Note that the Throttling Amount must be specified first, before you can create Bandwidth Throttling Rules (see next item.)

Bandwidth Throttling Rules

The scheduled network throttling, specifying a time range, and a percentage of maximum transfer rate, specified as the Throttling Amount, during that time range. Once again, the limit set here will apply to the aggregate of all activity on the source computer, comprised of the replication activities of all Replication Pairs. This setting allows you to select high and low (or no) activity periods in a manner similar to the 'operation window' concept used when scheduling the activities of job-based Agents.

Considerations

For step-by-step instructions, see Configure Network Bandwidth Throttling.

Back to Top


Orphan Files

Files that are in the destination directory, but not the source directory, are orphan files. You can choose to ignore, log, or delete such files that are identified in the destination path; these settings are configured in the Orphan Files tab of the Replication Set Properties.

By default, the Orphan File Processing is turned off and the orphan files are moved from the destination directory to another location and are available for restore. You can select the Show Deleted Items option in the browse screen to view and restore orphan files.

To configure Orphan File settings, see Configure Orphan File Processing for step-by-step instructions.

To view Orphan Files, see View Orphan Files for step-by-step instructions.

Things to Consider

See Restore Deleted Items to restore Orphan Files.

Back to Top


Fan-In Recovery Points

Fan-In Recovery Points consist of snapshots of a Destination Path, created to preserve a point-in-time data on the destination computer in a Fan-In configuration. Snapshot-based Recovery Points can be created, and backed up, affording additional data protection options for recovery of your data. In addition, Recovery Points can be mounted, and for Windows can also be shared, and thus made available to users on the network.

Recovery Points consist of snapshots created on the destination computer by the specified snapshot engine, without any reference to the state of the source computer. It simply represents a point-in-time on the destination computer, and is thus more useful for file system data than for application data. To use Recovery Points, see the following for step-by-step procedures:

Backups of Recovery Points

Recovery Points can be configured to be backed up automatically when they are created. In addition, you can select any existing Recovery Point and perform an immediate full backup on-demand. This backup capability is only available if the source and destination computers have the appropriate File System iDataAgent installed. For more information about installing, configuring, and using File System iDataAgents, see Windows File System.

The following types of backups are supported:

See the following for step-by-step procedures:

Deleting Recovery Points

When the maximum number of Recovery Points is reached, based on the maximum number you specified, or based on the maximum number of recovery points allowed by the system, they are automatically deleted by the system in the order they were created (oldest first) unless one of the Recovery Points to be deleted is in use.

Recovery Points can also be deleted manually. For step-by-step procedures, see Delete a Fan-In Recovery Point.

Pre/Post Commands for Recovery Points

You can specify commands to run either before a Recovery Point is created and/or after a Recovery Point is created. For general information about Pre/Post commands, see Pre/Post Processes.

See the following for step-by-step procedures for Pre/Post Processes:


Fan-In Backup Set

The default backup set can be used to backup fan-in data for the Workstation Backup Agent. This capability is available if the destination computer has Windows File System iDataAgent installed.

When using file system subclients in default backup set for SnapProtect operations or backing up fan-in data, snapshots of the data are registered as archive files and are used for various data protection and recovery operations. Since the system volume information is critical for the Workstation backup data, ensure that the System Volume Information is included in the subclient content. Ensure that the system volume information is not excluded from the subclient content due to filters.


Best Practices

It is recommended that you keep the following in mind when performing data replication:


Back to Top