Copyright © 2002 Legato Systems, Inc. <0.2 Venu Varma D 1777/1778 <0.2 Venu Varma D 1777/1778 Legato Confidential ()

Slides:



Advertisements
Similar presentations
MFA for Business Banking – Security Questions with 2nd Request Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
Advertisements

MFA for Business Banking – Security Questions with Reset Multifactor Authentication: Quick Tip Sheets Note to Financial Institutions: We are providing.
Copyright © 2000 by RT Lawrence Corporation. La Mirada, California, USA. All Rights Reserved. RTLFiRST – Special Processing Logic User Definable Special.
Logical and Physical Design of an Information System
Copyright © 2006 Help Desk Systems, Inc. All rights reserved. Overview of Help Desk Systems Inc. (HDSI) HDSI offers a hosted, web based trouble ticket.
Adding SMS functionality to WhatsUp Gold
1 Dynamic DNS. 2 Module - Dynamic DNS ♦ Overview The domain names and IP addresses of hosts and the devices may change for many reasons. This module focuses.
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 6 Managing and Administering DNS in Windows Server 2008.
Premier Director Document Imaging
 Copyright Wipro Technologies JSP Ver 1.0 Page 1 Talent Transformation Java Server Pages.
 Copyright I/O International, 2013 Visit us at: A Feature Within from Vendor Payment Terms User Friendly Maintenance 
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
Copyright © 2002 Legato Systems, Inc. Legato Confidential.
14.1 © 2004 Pearson Education, Inc. Exam Planning, Implementing, and Maintaining a Microsoft Windows Server 2003 Active Directory Infrastructure.
MIS Chapter 51 Chapter 5 – Managing File Access MIS 431 Created Spring 2006.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment, Enhanced Chapter 10: Server Administration.
Lesson 5: Configuring Print and Document Services
Cisco Confidential © 2010 Cisco and/or its affiliates. All rights reserved. 1 MSE MSAP Functional Specifications Presenter Name: Patrick Nicholson.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to SysAid.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
DB Audit Expert v1.1 for Oracle Copyright © SoftTree Technologies, Inc. This presentation is for DB Audit Expert for Oracle version 1.1 which.
Lesson 46: Using Information From the Web copy and paste information from a Web site print a Web page download information from a Web site customize Web.
Security and Digital Recording System Students: Gadi Marcu, Tomer Alon Supervisor: Erez Zilber Semester:Spring 2004 Characterization Presentation.
SMS Gateway OZEKI NG Document version: v Adding SMS functionality to Sharepoint.
Login Screen This is the Sign In page for the Dashboard Enter Id and Password to sign In New User Registration.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # ) Chapter Two Deploying Windows Servers.
DONE-10: Adminserver Survival Tips Brian Bowman Product Manager, Data Management Group.
5 Copyright © 2007, Oracle. All rights reserved. Configuring the Oracle Network Environment.
Login Screen This is the Sign In page for the Dashboard New User Registration Enter Id and Password to sign In.
Threat Management Gateway 2010 Questo sconosciuto? …ancora per poco! Manuela Polcaro Security Advisor.
What is Sure BDCs? BDC stands for Batch Data Communication and is also known as Batch Input. It is a technique for mass input of data into SAP by simulating.
Oracle 10g Administration Oracle Shared Server Copyright ©2006, Custom Training Institute.
Gorman, Stubbs, & CEP Inc. 1 Introduction to Operating Systems Lesson 12 Windows 2000 Server.
Copyright © 2002 Legato Systems, Inc. Authentication Version 1 Katrina Illari d1614 Authentication Version 1 Katrina Illari d June 2005 Legato Confidential.
111 EMC CONFIDENTIAL—INTERNAL USE ONLY NMC -- NW Administration NMC Team NetWorker 7.3 TOI July 28, 2005.
Module 9 Configuring Messaging Policy and Compliance.
Time Saving Tips & Tricks Enable System Administrator Access to All User Logins In the past, in order for Salesforce.com System Administrators to be able.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Two Installing and Configuring Exchange Server 2003.
Copyright © 2002 Legato Systems, Inc. AlphaStor 3.1 Support in NW Dan Gajanovic Legato Confidential.
Module 9 Configuring Messaging Policy and Compliance.
Chapter 3: Authentication, Authorization, and Accounting
NT4 SP4 Security Jack Schmidt - Fermilab
Copyright © 2002 Legato Systems, Inc. Version: 1.0 Author: Shu-na Chu Doc d1795 Version: 1.0 Author: Shu-na Chu Doc d1795 8/11/2005 Legato Confidential.
NetWorker Wizard (Keystone) Developers Tom FrencelRock Brown Wenlu MaGeorge Shioyama Aditya Kapoor June 30, 2005.
Packaging for Voracity Solutions Control Panel David Turner.
© 2004 EMC Corporation. All rights reserved. 111 nsr_shutdown Changes in NetWorker 7.3 nsr_shutdown’s Redesign for Scalability Bryce Tompkins
9,825,461,087,64 10,91 6,00 0,00 8,00 Information and Communication Networks HiPath ProCenter Compact Reporting.
Network Analyzer :- Introduction to Wireshark. What is Wireshark ? Ethereal Formerly known as Ethereal GUINetwork Protocol Analyzer Wireshark is a GUI.
Configuring and Troubleshooting Identity and Access Solutions with Windows Server® 2008 Active Directory®
FriendFinder Location-aware social networking on mobile phones.
NetTech Solutions Troubleshooting Office Applications Lesson Seven.
Page 1 of 42 To the ETS – Create Client Account & Maintenance Online Training Course Individual accounts (called a Client Account) are subsets of the Site.
111 EMC CONFIDENTIAL—INTERNAL USE ONLY Copyright © 2002 Legato Systems, Inc. Peter Booth 14July, 2005.
5 Copyright © 2008, Oracle. All rights reserved. Testing and Validating a Repository.
1 Upgrades Option Selection Audience: All Audiences. Module Scope: This process shows the upgrade selection option for entitled or paid upgrades at the.
© 2005 Avaya Inc. All rights reserved. Avaya – Proprietary & Confidential. For Internal Use Only. CTI Adapter for Salesforce.com Overview Emerging Products.
1 © 2004 Cisco Systems, Inc. All rights reserved. Session Number Presentation_ID Cisco Technical Support Seminar Using the Cisco Technical Support Website.
In this session, you will learn to: Create and manage views Implement a full-text search Implement batches Objectives.
Setting up Client Tunnel Endpoints Lucent Security Products Configuration Example Series.
Maria Alandes Pradillo, CERN Training on GLUE 2 information validation EGI Technical Forum September 2013.
Access Grid Workshop – APAC ‘05 Node Services Development Thomas D. Uram Argonne National Laboratory.
Dynamic Host Configuration Protocol
SQL Database Management
Fundamental of Databases
Module Overview Installing and Configuring a Network Policy Server
Carson Schaller and Patrick Kelly
Introduction of Week 3 Assignment Discussion
This is the Sign In page for the Dashboard
Presentation transcript:

Copyright © 2002 Legato Systems, Inc. <0.2 Venu Varma D 1777/1778 <0.2 Venu Varma D 1777/1778 Legato Confidential ()

Legato Systems, Inc - Confidential and Proprietary 2 Introduction Prerequisites for attending this TOI session Overview and Benefits of the new feature Installation considerations How to configure/enable the feature Using the feature Licensing considerations Architecture and internal Design Debugging techniques and tips Questions and Answers

Legato Systems, Inc - Confidential and Proprietary 3 Prerequisites Familiarity with Networker administration

Legato Systems, Inc - Confidential and Proprietary 4 Overview and Benefits The problem One retention time for all clone instances. When the saveset expires, all clone instances expire at the same time. The problem is solved by assigning individual retention policy for each clone instance..

Legato Systems, Inc - Confidential and Proprietary 5 Overview and Benefits (cont.) Benefits from this feature User can set different retention policies for each clone instance. Volume expiration is tied to the clone retention policy, not the save set retention policy. As a result volumes can be recycled more frequently.

Legato Systems, Inc - Confidential and Proprietary 6 Overview and Benefits (cont.) System requirements to use feature Nothing special. Part of the Networker server Where to learn more Keystone Networker Clone Retention Policy SRS d1777 Keystone Networker Clone Retention Policy SDS d1778

Legato Systems, Inc - Confidential and Proprietary 7 Installation/Upgrade Considerations Changes to installation None 7.3 server is compatible with pre 7.3 clients. But older clients will not be able to set clone retention time using command line options. They can use pool retention policy.

Legato Systems, Inc - Confidential and Proprietary 8 Configuring the Feature How to enable and/or configure this feature Added a new attribute “Retention policy” to the Pool resource. This sets the retention offset for all clone instances in volumes in that pool. List new attributes/settings and what they mean If at all possible capture screen output as a.gif or.jpeg

Legato Systems, Inc - Confidential and Proprietary 9 Configuring the Feature (cont.) The pool policy is configured using the GUI. The following screen shot shows the steps for setting the retention policy.

Legato Systems, Inc - Confidential and Proprietary 10 Configuring the Feature (cont.) Clone retention period can be specified using command line using –y option with the commands save, savegrp, nsrclone, nsrstage, nsrssc and scanner. Nsrmm command accept –e option for retention period

Legato Systems, Inc - Confidential and Proprietary 11 Using the Feature No new commands. The following commands have been modified to support this feature. Save, savegrp, scanner, nsrclone, nsrstage, nsrssc and nsrmm Command syntax Save and savegrp commands have –w and –y options Nsrclone, scanner, nsrstage and nsrssc have –y option Nsrmm has –e Please refer to the man page for details on other options for these commands.

Legato Systems, Inc - Confidential and Proprietary 12 Using the Feature (cont.) How to display clone retention times Use mminfo with –r “clretent(26)” option to display the clone retention time Example mminfo -c trout "volume,ssid,cloneid,ssbrowse(26),ssretent(26),clretent(26),level,sumfl ags,clflags,name" volume ssid clone id browse time retention time clone retention time lvl fl clflg name trout.legato.com /30/05 23:59:59 06/30/06 23:59:59 06/30/06 23:59:59 cb /space/venu/install/dev/bin/nsrd trout.legato.com /30/05 23:59:59 06/30/06 23:59:59 06/30/06 23:59:59 cb /space/venu/install/dev/bin/nsrexecd trout.legato.com_c /30/05 23:59:59 06/30/06 23:59:59 06/30/06 23:59:59 cb /space/venu/install/dev/bin/nsrd trout.legato.com_c /30/05 23:59:59 06/30/06 23:59:59 08/30/05 11:18:05 cb /space/venu/install/dev/bin/nsrexecd

Legato Systems, Inc - Confidential and Proprietary 13 Using the Feature (cont.) Things to remember 1. By default, browse and retention times are derived from the client resource. 2. Save set retention must always be equal to or greater than the browse time. 3. If saving or cloning to a pool that has retention policy specified, the pool policy will override the policy from client resource. 4. If retention policy is specified in the command line, it will override policies from pool and client resource. 5. When cloning a saveset without specifying a retention policy (command line or pool) the retention time of the clone instance will be the same as savesets retention. 6. The expiration time of a volume is the max of retention times of all clone instances on that volume. 7. If user specifies a browse time as a command line option (save -w), but does not specify a retention time, the retention time of the save set is max of specified browse time and retention time from client resource.

Legato Systems, Inc - Confidential and Proprietary 14 Licensing Considerations This feature is not licensed

Legato Systems, Inc - Confidential and Proprietary 15 Questions and Answers Any questions that have not been answered yet?

Legato Systems, Inc - Confidential and Proprietary 16 nsrmmd nsrmmdbd Media database Architecture and Internal Design

Legato Systems, Inc - Confidential and Proprietary 17 Architecture and Internal Design (cont.) The individual clone retention values are stored as an attribute in the save set record in the media database. The name of the attribute is NSRATTR_MMDB_SSC_RETENTION. The clients of media database send the attribute NSRATTR_CLONE_POLICY with clone retention offset to media database. Media database converts that passed in value to NSRATTR_MMDB_SSC_RETENTION after validating the value against the saveset and volume.

Legato Systems, Inc - Confidential and Proprietary 18 Debugging Techniques and Tips Error messages customers might see “retention time must be in the future” This error means the time specified with –y or –w option is in the past. The fix is to use a future time.

Legato Systems, Inc - Confidential and Proprietary 19 Debugging Techniques and Tips (cont.)

Legato Systems, Inc - Confidential and Proprietary 20 Known Issues and Limitations Known issues and/or bugs Description – scanner command does not handle individual clone retention times properly. The clone retention times of scanned in clone instances inherit save set's recycle time. LGTpa78104 Workaround : Specify retention time using –y option when scanning in a clone instance

Legato Systems, Inc - Confidential and Proprietary 21 Questions and Answers Any questions that have not been answered yet? Thanks for attending