Chapter 8 eDirectory Data Recovery Tools

Chapter 7 discussed various utilities that can assist you in diagnosing and understanding NDS/eDirectory issues. In this chapter, you’ll learn about tools that will help in protecting and recovering lost DS information. Such information may have been deleted by mistake or you may need to restore a crashed server to a working state.

NOTE

Chapter 11 complements the information presented in this chapter. This chapter covers recovery tools in general and offers some one-step solutions to simple DS recovery needs, while Chapter 11 presents examples of specific DS issues in detail.

The following topics are discussed in this chapter:

Image   Backing up and restoring DS with Storage Management Services (SMS) and using the eDirectory Management Tool Box (eMBox)

Image   NDS/eDirectory recovery using Server Specific Information (SSI) data after a server crash

Image   Recovering lost passwords and lost Admin user account

Image   Detecting and adding objects that are blocked by Inherited Rights Filters (IRFs)

SMS Backup and Restore

Storage Management Services (SMS), developed by Novell, provides a standard for data, devices, media, and storage management interfaces. With the appropriate agents, SMS can be configured to service different targets—such as NetWare, NDS/eDirectory, Unix, and so on (as long as there is an agent available for the target)—from a single backup engine. To fully understand the terminology and appreciate why you need an SMS-compliant backup solution for your NetWare network, the following sections offer a brief architectural overview of SMS and some sample SMS backup implementations.

SMS Architecture

SMS divides the storage management function into four areas of responsibility:

Image   Transparent communications interface

Image   Target-specific agent

Image   Storage engine

Image   Device interface

These are incorporated into four modules or applications, as illustrated by Figure 8.1.

FIGURE 8.1 Novell’s SMS architectural overview.

image

The Storage Management Data Requester (SMDR) provides transparent local and Remote Procedure Call (RPC) links between the SMS modules running on the storage engine and the SMS modules running on the target. When you’re running an SMS-compliant tape backup software on a NetWare server that is backing up a remote NetWare server, for example, SMDR.NLM must be running on both servers to facilitate the communication; a Windows SMDR module (called w32smdr.exe) is included with eDirectory for Windows and is installed in drive:Novell dssms.

TIP

SMDR versions prior to 5.00 depend on SPX and, thus, IPX. Starting with SMDR 5.00 (shipped with NetWare 5), it is protocol independent. For NetWare 5 and later, this requester can use TCP/IP to communicate with other SMDRs. Although SMDR 5.00 and higher can be configured to support TCP/IP and SPX/IPX, both protocols are supported by default. The SPX protocol is used with SMDR versions prior to 5.00.

The ability to back up data from a specific operation system platform is provided through the Target Service Agent (TSA), which runs on the target. In SMS parlance, an SMS target is what you want to back up (the source of your data). The TSA is SMS’s access road to a target’s data. Through a set of generic Target Service APIs, SMS can read from, write to, and scan the target. All of SMS, except the TSA, treats the target’s data as “black box data”—only the TSA knows the target’s data structure. Generally, one TSA is required for each target. The following are the different TSA modules available for NetWare:

Image   TSANDS.NLMTo back up and restore tree-wide DS data.

Image   TSA410.NLMTo back up and restore the file system of a Net-Ware 4.1x or 4.2 server.

Image   TSA500.NLMTo back up and restore the file system of a NetWare 5.x server.

Image   TSA600.NLMTo back up and restore the file system of a NetWare 6.0 server.

Image   TSAFS.NLMTo back up and restore the file system (traditional, NSS, and cluster-enabled volumes) of a NetWare 6.5 server.

Image   TSADOSP.NLMTo back up and restore files from the DOS partition on a NetWare server. (Shipped only with NetWare 5.0 and NetWare 5.1.)

Image   TSAPROXY.NLMTo facilitate backup and restore files on Windows workstations running Novell Client software and have the Windows TSA agent running.

Image   TSADOS.NLMTo facilitate backup and restore files on DOS workstations running Novell Client software and with TSASMS.COM loaded.

Image   GWTSA.NLMTo back up and restore GroupWise mailboxes and related information.

TIP

TSAFS supports backup of open files on NSS volumes if the CopyOnWrite feature is enabled. Only the last closed version of the file is backed up. The Supervisor right is required to back up open files. To enable CopyOnWrite on a single NSS volume, at the server console, enter nss /FileCopyOnWrite=volume_name. For more information about using NSS server console commands refer to NSS documentation.

TSA500 and higher support both the traditional NetWare file system and the Novell Storage Services (NSS) released with NetWare 5 and above. The initial release of TSA500, however, does not support NSS mounted DOS FAT file systems. If you need to back up a DOS partition, use TSADOSP.NLM instead. To back up from or restore to the DOS FAT partition on a Net-Ware 6.0 and later server, load DOSFAT.NSS and TSA600.NLM (or TSAFS.NLM for NetWare 6.5). After loading the DOSFAT.NSS module, any DOS FAT partitions are dynamically made available as logical volumes. TSA600/TSAFS considers these logical volumes as resources for backup and restore.

Storage Management Engine (SME) is the heart of an SMS-compliant backup system. Its main task is to retrieve and dispense data. It is in this module where third-party vendors provide value-added features, such as maintaining a database of backed up files and management of tapes.

Instead of directly communicating with the various types of storage devices, SMS communicates with them via the Storage Device Interface (SDI) module. With the assistance of Media Manager, SDI provides SMS a logical view of the media and storage devices. Because of this, any applications using SDI can use all SMS-compatible devices without making any changes. In essence, SDI is a storage device abstraction layer within the SMS architecture, so the higher layers within SMS, such as the SME, don’t need to know how to address a specific storage device for data retrieval or writing to it.

System Independent Data Format

SMS’s capability to work with many different types of targets or services (such as NetWare file systems, eDirectory, Windows 2000, and so on) whose data structures are varied is due to the System Independent Data Format (SIDF). SIDF specifies how a target’s data is formatted, who does the formatting, how a session is placed on the media, and so on. The TSA is responsible for formatting and “deformatting” the target’s data set (such as file data and name-space information) according to the specification. The SME simply writes the SIDF-formatted data to the storage media. Therefore, in concept, SMS’s use of SIDF is very similar to the use of XDR (External Data Representation) in NFS (Network File System) developed by Sun Microsystems, except the receiving side (the SME) does not deformat the data before recording it.

SMS Backup Session Example

The interactions between the various SMS modules are complex. The following example offers you a high-level look at how an SMS backup session works and gives you some insights into how and why SMS-compliant software functions the way it does. The example assumes that the SMS engine (SME, SDI, and SMDR) is running on a NetWare 6.5 server and it is backing up the SYS volume of a remote NetWare 5.1 server, which has a TSA and SMDR running (see Figure 8.2):

1.   The user selects the backup media to use. This connects the SME to SDI.

2.   The user selects NETWARE5-B as the target. During this process the SMDRs on each server connect to each other; this is transparent to the user as well as the SME programmer. Through the SMDR connection, the SME running on NETWARE65 connects to the TSA running on NETWARE5-B.

NOTE

If the SME is backing up local data, the SMDR is bypassed so that all communication between the SME and TSA becomes direct.

3.   The SME asks the TSA to provide a list of resources or data sets the user can choose to back up. The SME presents this list to the user for selection.

4.   The user selects the SYS volume and specifies that the file system trustees are to be backed up as well.

5.   The SME sends the user selections back to the TSA.

6.   The TSA then scans (searches) NETWARE5-B for the specified data sets (resources).

7.   Upon finding a data set that matches the selection criteria, the TSA formats the data set (which includes file attributes, file names, name space information and so on) according to SIDF specifications and sends it to the SME.

8.   File system trustee assignments are backed up as follows:

a.   For each given file or directory, the TSA reads the Directory Entry Table (DET) to determine whether any trustees are assigned.

b.   If a trustee assignment is found, TSA reads the trustee—this is stored as an object ID and not a DS object name.

c.   The object ID is then translated into a full DS object name.

d.   The TSA formats the data according to SIDF specifications and sends it to the SME.

9.   The SME sends the received data to SDI, through Media Manager and device-specific driver, for storage on the (selected) media.

10.   Steps 6 through 9 are repeated until all data sets matching the user selection criteria are found and stored.

FIGURE 8.2 The SYS volume of the NETWARE5-B server is being backed up, across the wire, by NETWARE65.

image

You can use a non-SMS solution to back up your file system provided it is NetWare-aware (so file system trustee information is properly backed up). Because it doesn’t make use of TSA, however, it cannot back up NDS/eDirectory; some of the DS files are kept open by DS.NLM and thus can’t be backed up or copied by conventional means—unless it provides its own agent.

SBackup for NetWare

Included with NetWare (from NetWare 3.0 and up) is an SMS-compliant backup utility called SBackup. It is an NLM-based tape backup program. NetWare 5 and higher ship with an enhanced version of this backup engine, called SBCon. It contains all the functionality provided by earlier versions of SBackup and has the following enhancements:

Image   Autoloader support

Image   Enhanced user interface (SBCon)

Image   Windows workstation graphical interface (NWBack32)—NWBack32 is not included with NetWare 6.5

Image   Multiple and repeatable job scheduling

Image   Concurrent jobs can run on multiple devices (but not on same device)

Image   Runs on earlier versions of NetWare and is compatible with all TSAs

Image   Runs in an IP-only environment if preferred

NOTE

If multiple backup and restore jobs are submitted to run at the same time on the same device, the second and subsequent jobs will receive an error because the device (tape drive or other device) is busy servicing the current job. The error message does not make it sufficiently clear that the problem is simply that the device is in use. To avoid this conflict, set the execution time for subsequent jobs to run sometime after prior jobs are completed or submit concurrent jobs to different devices.

The sections that follow outline the necessary steps for backing up and restoring your NDS/eDirectory using SBCon, which is shipped with NetWare 6.5. Before learning that, however, you need to know how to correctly set up and configure SMS for your DS environment.

Configuring SMDR and QMAN

As mentioned earlier in this chapter, SMS-compliant applications make use of SMDR, and SBCon is no exception. Unlike previous versions of SMDR that use Service Advertising Protocol (SAP) to locate other SMDRs on the network, the newer SMDR uses DS and the Service Location Protocol (SLP). Older versions of SMDR advertised the server name where it was loaded using SAP type 0x23F. This mechanism worked well in small LAN environments, but did not scale well in large environments and does not work at all in a pure IP environment. In a pure IP environment, SMDR uses either DS or SLP as a service locator instead of SAPs.

NOTE

SMDR v5.04 and later can use SLP for locating other SMDRs. This enables SMDRs to locate other SMDRs running on servers belonging to different trees. Every SLP-enabled SMDR will register itself in the SMDR.Novell domain when loaded. The SLP-enabled SMDRs will query this domain for locating registered SMDRs.

NOTE

Each server that will be running SMS-compliant software needs to have its own SMDR object.

You need to install and configure SMDR and QMAN (SMS Queue Manager) before you can use any SMS applications, such as SBCon. Some third-party SMS applications may include their own queue manager instead of using QMAN. The configuration can be done during the server installation by choosing to install SMS, or you can add this service at a later time using NWConfig. If SMDR fails to load or if the SMDR object is corrupted, you can restore it to the state when the server was first installed and before it was configured. To do so, you need to delete two configuration files and two DS objects using the steps in the following procedure:

1.   Log in to the server as a user that has Admin rights.

2.   Make your working directory SYS:ETCSMS.

3.   There are two files within this directory, SMDR.CFG and SBACKUP.CFG (SBCON.CFG on NetWare 6.0 and later). Both of these files are text based and can be viewed with any text editor. Either delete or rename these two files. (There is also a TSA.CFG file on NetWare 6.5 servers but you don’t need to delete this file.)

4.   Use a management tool, such as NetWare Administrator, to locate the two SMS-related objects in the tree. Usually these two objects are generally in the container where the NCP Server object is located. If the objects are not there, look through the tree for them. Once they are found, delete them. The default names of the objects are “SMS SMDR Group” and “server name Backup Queue.” For example, for a server named “NETWARE65,” the object names are “SMS SMDR Group” and “NETWARE65 Backup Queue.”

5.   At the server console prompt, type LOAD SMDR NEW. The NEW switch brings up the SMDR Configuration Screen (see Figure 8.3), and you’re asked for three pieces of information:

Image   The default context for the SMDR group: enter the desired context (such as OU=Servers.O=Company) or press Enter to use the default context.

Image   The default SMDR context: enter the desired context (such as OU=Servers.O=Company) or press Enter to use the default context.

Image   The name and password of the user who has managing rights to the object that will be created in the specified context: An example of a user name is given. When entering the user name, use absolute fully distinguished naming such as

     .CN=Admin.OU=Servers.O=Company.

FIGURE 8.3 The SMDR configuration screen.

image

     The previous steps create a new SYS:ETCSMSSMDR.CFG configuration file that looks similar to this:

            #This is SMDR default configuration file
            #Lines beginning with # are treated as comment

            SMDR Context: OU=toronto.O=dreamlan
            SMDR Group Context: OU=toronto.O=dreamlan

            #Both the protocols are enabled

6.   At the server console prompt, type LOAD QMAN NEW. The NEW switch brings up the SMS Queue Manager Configuration Screen (see Figure 8.4). Similar to configuring SMDR, you’ll be asked to specify the context and the name of the SMS Job Queue. After the job queue name is created, the name of the user who has managing rights is requested. This time, however, an example of the user name is not given. Follow the previous step’s suggestion for the user naming. It is suggested that the same user be given rights to the queue object as the SMS group object.

FIGURE 8.4 The SMS Queue Manager configuration screen.

image

     If everything is entered correctly, the configuration screen clears and a console message similar to the following is displayed:

            Started service the job queue .CN=NETWARE65 Backup Job
            Queue.OU=toronto.O=dreamlan
            Using transfer buffer size 65536 bytes.

     Also, this step creates a new SYS:ETCSMSSBACKUP.CFG (SBCON.CFG on NetWare 6.0 and later) configuration file that looks similar to this:

# This is QMANAGER Configuration file
# Lines beginning with # are treated as comment.
# QMAN.NLM reads the information from this file when
# loaded
Sbackup Job Queue: .CN=NETWARE65 Backup Job Queue.
Image OU=toronto.O=dreamlan
# Default Transfer buffer size
# Transfer Buffer Size: 64000

Now you’re ready to run SBCon.

Backing Up eDirectory

In NetWare 5 and above, the SBackup NLM has been renamed to SBCON.NLM (NetWare Storage Management Console; on NetWare 6.5 it is referred to as SMS—Backup Management Console) and has a slightly different look than previous versions of SBackup (see Figure 8.5). The main difference is in the Job Administration option, which enables you to create, submit, and administer jobs in a DS queue.

FIGURE 8.5 The version of SBackup shipped with NetWare 5 and above is now called SBCon.

image

WARNING

You should be aware that NDS/eDirectory partition boundary information is not backed up; therefore, you should keep a written record of your DS tree partition placement. If no partition information exists when a restore is performed (for instance, after a total loss of a DS tree), the entire tree structure is placed into one partition ([Root]). You must then manually re-create the partitions and replicas.

The following steps outline how you can use SBCon to back up your DS tree. It is assumed that you have already correctly installed and configured your tape device:

1.   Load the controller and storage device driver for your tape device, if not already loaded. Load NWTAPE.CDM if required by the device driver.

2.   Load TSANDS.NLM on one of your NetWare servers (SMDR will be auto-loaded if not already loaded). On NetWare 6.5 servers, you can run the SMSSTART.NCF file at the console that loads SMDR, TSAFS, and TSANDS.

TIP

You only need to load TSANDS on one server. For best performance, you should load TSANDS.NLM and SBCON.NLM on the server holding the most replicas. This reduces the amount of tree-walking required during the backing up of the whole DS tree.

NOTE

If you see the “SMDR Group Context is invalid” message displayed when SMDR is loading, this means you have not completely configured the SMDR object. Refer to the earlier section, “Configuring SMDR and QMAN,” to (re)configure SMDR.

3.   On the server with the tape device, load QMAN.NLM and then load SBCON.NLM.

4.   From the Main Menu, select Storage Device Administration.

5.   From the Select a Device menu, highlight the device you want to use (see Figure 8.6). If the device is an autoloader, press Enter to display a list of loaded media.

FIGURE 8.6 Select the backup device and media using the Select a Device menu.

image

TIP

If SBCon can’t communicate with the tape drive, or if the console LIST DEVICES command shows the device in an Unbound state, ensure NWTAPE.CDM is loaded. If the LIST DEVICES console command sees the tape device properly, but SBCon does not recognize the device, it’s possible that SBCon does not support the tape device. A list of SBCon-supported tape devices can be found in TID #10059850.

6.   Highlight the media you want to use and press Enter to select it.

7.   Press Esc to return to the Main Menu.

NOTE

Steps three through six are not absolutely necessary. These steps help you ascertain whether the job will be able to access the tape device or not before you submit the job.

8.   Select Job Administration.

9.   Select Backup from the Select Job menu.

10.   Use the Target Service option of the Backup Options menu to select the target server. If the selected target server has multiple TSAs running, such as TSANDS and TSAFS, you also need to select the appropriate service. The name of the TSANDS service is server name.Novell Directory (for example, NETWARE_65_A.Novell Directory; see Figure 8.7).

FIGURE 8.7 Select the TSANDS service for backup.

image

11.   You’re then prompted for a username and password with sufficient DS rights to back up the tree; use the .username.org naming syntax. Upon successful login, a message similar to “You are connected to the target service name <Press ENTER to continue>” is displayed. In the Target Service option, you’ll now see the DS tree name listed.

12.   Use the What to Back Up? option to select backing up the whole Directory tree, the schema, objects or a branch of the tree. After selecting the option, the List Resources menu is displayed.

13.   Press Insert to bring up a list of DS resources that you can select for backup (see Figure 8.8). To back up the schema, for example, highlight Schema in the Full Directory Backup menu, press Enter, and the Schema menu is displayed; you’ll see “[..]” in the menu. Press Esc and the word Schema is now shown in the List Resources menu indicating it will be backed up.

FIGURE 8.8 You can back up the whole tree, the schema, the selected objects or the selected branches of the tree.

image

NOTE

Selecting Full Directory Backup will back up all objects in the tree, including schema. Selecting SYS volume backup will also back up Server Specific Information (SSI) data, which is important when restoring a crashed server (see the “Server Recovery Using Server Specific Information Data” section later in this chapter for more details.)

TIP

To make it easier to back up portions of the DS tree, you can create a TSANDS.CFG file, which enables you to specify the names of containers where you want backups to begin. TSANDS.CFG is a text file listing DS contexts (one per line) located in the SYS:SYSTEMTSA directory on the server that TSANDS.NLM is loaded on. When this file is present, SBCon lists the additional contexts as available resources that you can select for backup. Note that not all backup programs support the additional resources made available by TSANDS.CFG.

14.   Repeat Step 13 to select any other DS resources you want to back up.

15.   Enter a description (up to 23 characters), such as NETWARE 6.5 tree backup, in the Description field.

16.   Use the Device/Media Name field to select the tape device that will be used.

17.   Use the Advanced Options menu to schedule when the job will run (see Figure 8.9) and to designate whether it’s a repeating job (see Figure 8.10).

FIGURE 8.9 Use the Advanced Backup Options menu to further control what data to back up and to schedule the job.

image

FIGURE 8.10 You can schedule the job as a run-once or as a recurring job.

image

18.   Use the Append Session option to specify whether the data on the tape is to be appended or overwritten.

19.   Press Esc and select Yes in response to the Do you want to submit a job? prompt. At this point, you are returned to the Select Job menu.

The job will execute automatically at the scheduled time. You can use the Current Job List option to manage the submitted jobs: from the Main Menu, select Job Administration, Current Job List. A list of queued jobs is displayed in the Queue Job menu. Similar to managing print jobs, you can put a backup job on hold and change its execution time and scheduling (see Figure 8.11).

FIGURE 8.11 Use the Current Job List to manage submitted SBCon jobs.

image

You can monitor the runtime status of an executing job by highlighting the job in the Queue Job menu and pressing Insert. A real-time display similar to the one that existed in previous versions of SBackup is shown (see Figure 8.12). From this menu, you can delete or stop the job by pressing Delete.

FIGURE 8.12 Real-time status of a currently executing job.

image

You can also check the execution status of a job using SBCon’s status screen. SBCon creates two NLM screens; one is the user menu screen and the other an SMS Activity Log screen (see Figure 8.13). The information displayed in the SMS Activity Log screen is recorded in the SYS:SYSTEMTSALOGACTIVITY.LOG file and available for review at a later time. Alternatively, you can use SBCon’s run logs to determine what resources were backed up and whether there were any errors. You can access the run log from the Main Menu: Log File Administration, View a log file. To access the error log, use Log File Administration, View an Error File to access the error log. By default, the SMS activity and SBCon run files are stored in the SYS:SYSTEMTSALOG directory.

FIGURE 8.13 SBCon reports the success or failure of a given job using the SMS Activity Log screen.

image

NOTE

SME.NLM is auto-loaded when the backup job starts and is unloaded after the job finishes.

Restoring eDirectory

The mechanics for restoring DS using SBCon is very similar to that of backing up DS except now your source is the tape instead of TSANDS. You can restore a single object, a branch of the tree, or the whole Directory tree. Before you restore DS data from a tape backup, you need to be aware of the following implications to your existing tree:

Image   A restore of DS from tape backup does not overwrite the existing database with a copy like that on the tape. Instead, the DS restore process will attempt to re-create all the objects that existed when the backup was performed.

Image   When a restore is performed under disaster recovery conditions, in which the original DS database has been destroyed and server reinstalled, the DS objects and attributes restored from the tape are added to the minimal DS tree provided by the NDS/eDirectory installation process. This results in a tree that is the same as the one saved to tape.

Image   If, however, a DS tree still exists on the server to which the restore is being performed, a restore will attempt to append to the existing tree, rather than overwrite it. In the best possible case, the restore process will have no visible effect at all. The worst possible case will result in additional, unwanted objects being added to the existing tree structure, leaving the old, corrupted structures intact, and possibly adding additional corrupt elements.

The following steps outline how to use SBCon to restore your DS (we assume that you have already correctly installed and configured your tape device):

1.   Load the controller and storage device driver for your tape device, if not already loaded. Load NWTAPE.CDM if required by the device driver.

2.   Load TSANDS.NLM on one of your NetWare servers. (SMDR will be auto-loaded if not already loaded.)

3.   On the server with the tape device, load QMAN.NLM and then load SBCON.NLM.

4.   Select Job Administration.

5.   Select Restore from the Select Job menu to bring up the Restore Options menu (see Figure 8.14).

FIGURE 8.14 Configure your restore options using this menu.

image

6.   Select the Target Service to select the server to which you want to restore DS. Press Enter to bring up a list of servers running TSAs. If the selected server has multiple TSAs running, such as TSANDS and TSAFS, you also need to select the appropriate service. The name of the DS service is server name.Novell Directory (for example, NETWARE_65_A.Novell Directory).

7.   You’re then prompted for a username and password with sufficient DS rights to the tree; use the .username.org naming syntax. Upon successful login, a message similar to “You are connected to target service name <Press ENTER to continue>” is displayed. In the Target Service option, you’ll now see the DS tree name listed.

8.   Enter a description (up to 23 characters) to identify the job in the Description field.

9.   Select the device and media on which DS data is stored.

10.   Select the correct session on the media containing the DS data you want to restore.

11.   Use Advanced Options to set any filters desired in restoring the DS, whether any existing objects should be overwritten, and configure the execution time and run schedules (see Figure 8.15).

FIGURE 8.15 The Advanced Restore Options menu.

image

WARNING

Be careful when configuring the Overwrite Parent and Overwrite Child options. Any recent DS-related changes (this does not include file system trustee assignments, because they are not stored in DS) to the object, including password, will revert the values to whatever they were at the time of the backup.

12.   Press Esc and then select Yes in response to the Do you want to submit a job? prompt. You’re then returned to the Select Job menu.

WARNING

Depending on the backup solution used, the trustees of [Root] might not be restored during a DS restore from tape. Admin will be the only user with full trustee rights to [Root] after a tape restore, even if other users had an explicit trustee assignment to [Root]. However, Security Equal To rights will be restored, and if a user has security equal to Admin, the user will have the same rights that admin has (which is usually full rights to the tree).

As previously mentioned in the “Backing Up eDirectory” section, your job will execute automatically at the scheduled time. You can manage and monitor your restore jobs through the Current Job List option.

Backing Up and Restoring Schema Extensions

During a DS backup, the TSANDS.NLM sends every object—those defined by both native (base) and extended schemas—to the backup program for backup. Versions of TSANDS.NLM prior to v4.14, however, do not send the extended schema definitions of the object types you have added to the DS database. Consequently, the resulting backup of DS contains information for objects defined in an extended schema, but not the extended schema data that defined those objects. This means that before you restore these DS objects, you have to first re-extend the schema so the definitions for extended objects exist in the tree during the restore. If this is not done, NDS/eDirectory will contain restored objects that it doesn’t know how to use and will display them as Unknown objects.

The version of TSANDS.NLM shipped with NetWare 4.11 and higher, as well as the one included in SMSUP6.EXE and higher for NetWare 4.10, backs up and restores any schema extensions by default. You no longer have to re-extend the schema before DS can recognize restored objects defined by an extended schema.

Backup and Restore Services on Windows

Novell has extended the SMS architecture to include Windows NT and higher. You can use any SMS-compliant backup/restore utility to perform backup and restore operations on your eDirectory database located on your Windows eDirectory server. You can also back up the eDirectory on Windows database to a NetWare server, and vice versa. The following components facilitate the SMS-based backing up and restoring of data on Windows systems.

SMSEngn is a basic Storage Management Engine (see Figure 8.16) provided by Novell for Windows NT and higher. Unlike its NetWare cousin SBCon, SMSEngn can only back up to or restores data from a set of files—a data file (.DAT) and an index file (.IDX). A BackupLog.log file is either created or overwritten if it already exists. You will need to back up these files to a tape or other removable media as part of the Windows file system backup.

FIGURE 8.16 SMS Backup and Restore Engine for Windows.

image

When eDirectory is installed, the SMDR and TSANDS are set up by default as a Windows service (called “W32 SMDR”). The service is always available though it may be disabled or stopped. You can verify its status via Program Settings, Control Panel, Administrative Tools, Services on Windows 2000 and higher, or Program Settings, Control Panel, Services for Windows NT. If it is not listed in the Services applet, start W32SMDR.EXE located in the drive:NovellNDSSMS directory.

ndsbackup for Unix

The ndsbackup utility is a Unix command-line utility that allows you to back up and restore eDirectory objects to and from a single file (referred to as the ndsbackupfile). Like all Unix utilities, the actions of the ndsbackup utility are controlled by command line options. The command line options that you can give are a string of characters containing exactly one function letter (c, r, t, s, or x) and zero or more function modifiers (letters or digits). The string contains no space characters, and function modifier arguments are listed on the command line in the same order as their corresponding function modifiers appear in the string. The supported command line options and function modifier arguments are listed in Table 8.1.

TABLE 8.1 ndsbackup Parameters

Image
Image

The command syntax for ndsbackup is

ndsbackup function [modifier options] [option arguments]
Image [-a admin.org] [-I include-file] [eDirectoryobject]

WARNING

The order of the option arguments is dependent on the order of the specified modifier options. For instance, ndsbackup fR means the ndsbackupfile needs to be specified before the name of replica server.

To archive, restore, or list eDirectory objects, you need to specify the fully distinguished name of a leaf object or container that is to be archived, extracted, or listed. To archive the whole tree, specify the Tree object (or leave the eDirectoryObject name from the command line). You can also back up the eDirectory schema by specifying Schema as the eDirectory object.

NOTE

ndsbackup is not an SMS-based application. It uses standard NDS/eDirectory APIs to access the tree, which means the target server does not need to have TSANDS running.

The following is a partial output from ndsbackup when backing up the whole tree:

[RH9-eDir root]# ndsbackup cfRv fullbackup.april-01-2004
Image  10.6.6.1 -a admin.xyzcorp

Password :
a .O=XYZCorp.
a .OU=IS_Admins.O=XYZCorp.
a .OU=Groups.OU=IS_Admins.O=XYZCorp.
a .CN=RootAdmins.OU=Groups.OU=IS_Admins.O=XYZCorp.
a .OU=Tree_Admins.OU=Groups.OU=IS_Admins.O=XYZCorp.
a .CN=Admin.OU=IS_Admins.O=XYZCorp.
a .OU=Scripts.OU=IS_Admins.O=XYZCorp.
a .OU=Company.O=XYZCorp.
a .OU=East.OU=Company.O=XYZCorp.
a .OU=Scripts.OU=East.OU=Company.O=XYZCorp.
a .OU=West.OU=Company.O=XYZCorp.
a .OU=Scripts.OU=West.OU=Company.O=XYZCorp.
a .CN=Admin.OU=Company.O=XYZCorp.
a .CN=LDAP_Proxy_User.OU=Company.O=XYZCorp.
[RH9-eDir root]#

In the previous example, the order of the function modifiers is fR, which means the name of the ndsbackupfile is fullbackup.april-01-2004 while the address of the replica server is 10.6.6.1. An eDirectoryObject name is not provided, thus the backup mode defaults to full backup. Since there is no command line option to specify a password (this is for security reasons—but it also makes automating the backup process more challenging), ndsbackup prompts you for the password, which is not echoed (not even as a series of asterisks). If you omit the -a option, you will be prompted for the username.

NOTE

ndsbackup will not accept input from a redirected file (for example, “< filename”). Thus you cannot circumvent security and send the password to ndsbackup that way.

The “a” that appears in front of each object name in the ndsbackup output is the result of the verbose (v) option. It indicates that each of those objects is being archived.

You can customize the backup process of the ndsbackup utility by choosing specific eDirectory objects to be excluded or included in the backup session. Whether you use exclude (X) or include (-I) usually depends on the size of the data you want to back up, compared to the size you do not want to back up. As an example, to back up most of the eDirectory tree structure while omitting only a small part, use the exclude option to omit the part you do not want to back up as it is more efficient than using include and needing to specify everything else.

NOTE

Everything that you do not want specifically excluded is included. After you exclude part of the structure, you cannot include objects below that container.

Third-Party SMS-Compliant Backup Solutions

There are a number of third-party SMS-compliant backup solutions available for NetWare. Although not required, we recommend that when selecting a server-based application (such as a SMS-compliant backup solution) for your NetWare servers be certain the product has Novell’s YES, Tested and Approved certification.

In order to receive a Novell YES, Tested and Approved certification, generally referred to as the YES certification, a software application must be subjected to a number of testing criteria, such as low memory conditions to see how the application handles exceptions. In the case of backup systems, testing requires that the client/server application correctly back up and restore NetWare volume (which includes NSS volumes), file, and eDirectory information.

NOTE

YES certification of products that works with Novell Nterprise Linux Services and product certifications for SuSE Linux (SUSE LINUX READY Program) are also available. Visit www.suse.com for more information about SuSE product certifications.

Novell Technical Support works closely with companies that test products through Novell DeveloperNet. If you call Novell for end-user or system integrator support and your network incorporates YES, Tested and Approved third-party products, Novell technicians can reference existing support documentation such as YES Bulletins and TIDs. If the error persists, technicians can duplicate the situation in one of Novell’s labs or work with the product vendor, leveraging the relationship that was developed during the testing process to resolve the problem. In short, YES, Tested and Approved is Novell’s first line of interoperability assurance for Novell customers.

Every YES, Tested and Approved product has a YES Bulletin that details what products were used in the testing—such as versions of Novell products, network adapters, controller devices, and supported drivers. The YES Bulletin also indicates specific product configuration, date of the testing, special network configuration information or other related information important to product interoperability in the network environment. For example, a YES Bulletin can tell you whether a particular backup solution can properly back up and restore all the various file formats supported on your network or whether a device driver handles memory over 16MB correctly. This information may be in the form of a configuration note or a line item indicating whether or not certain functionality is supported.

NOTE

Visit the YES, Tested and Approved Bulletin Search page (developer.novell.com/yessearch/Search.jsp) to search for the latest certified products and to view existing YES Bulletins.

The following are some of the more popular backup system choices that have received the YES certification:

Image   VERITAS Backup Exec for NetWare Version 9.1 (YES Bulletin #70552)—Formally developed by Seagate, VERITAS Backup Exec was the first NetWare 5–certified data protection solution. Because NetWare 5 and higher can be configured to run in a pure IP environment, Backup Exec for NetWare fully supports IP and IPX protocols, ensuring your data protection no matter how you configure the network. As a fully SMS-compliant backup application, Backup Exec protects any size Novell Storage Services (NSS) volume by utilizing Novell (or VERITAS–developed) Target Service Agents—even terabyte size volumes. In addition, Backup Exec’s NDS protection includes all objects, containers, and extended schema, plus additional client network information that has been added in NetWare 5 and above. For more information about VERITAS Backup Exec for NetWare, visit www.veritas.com.

Image   BrightStor ARCserve Backup for NetWare v9 (YES Bulletin #69429)—Originally developed by Cheyenne, Computer Associates International, Inc.’s BrightStor is an enterprisewide storage management software product that enables you to back up and restore data on NetWare servers and all workstations attached to those servers. Similar to Backup Exec, BrightStor is a fully SMS-compliant backup solution that supports NSS volumes and works over both IPX and IP. For more information about BrightStor ARCserve Backup for NetWare, visit www.ca.com.

Image   Backup Express v2.1.5 (YES Bulletin #71325)—Originally developed by Arcadia Software, Syncsort Inc.’s Backup Express is an enterprise-class backup and restore solution designed for Unix, Linux, Windows, and NetWare environments. Backup Express supports any combination of Unix, Linux, Windows, NetWare, and Network Data Management Protocol/Network Attached Storage (NDMP/NAS) devices in a Storage Area Network (SAN) environment. It can perform backup of all data directly across the fiber or iSCSI network, dynamically share all tape drives, and control this single enterprise environment with a single catalog and easy-to-use GUI. Backup Express’s distributed architecture allows it to back up to any device in the network whether it is running Unix, Linux, Windows, or NetWare, while maintaining a single central catalog for the entire enterprise. For more information about Backup Express, visit www.syncsort.com.

From our experience, the major YES certified data backup solutions players for the Intel platform are BrightStor ARCserve and VERITAS Backup Exec. Many large sites that have mainframes use a combination of BrightStor ARCserve and Backup Exec along with some form of mainframe-based backup solution (such as IBM’s Tivoli Storage Management, formerly called ADSM) for their enterprisewide backup strategies.

There are a number of good, but not YES certified, backup solutions favored by customer sites. Chief among these solutions is Legato’s Networker for NetWare (www.legato.com/products/networker/netware.cfm).

NOTE

When searching for a NetWare backup solution, you should not limit your selections to YES-certified products. Rather, you should evaluate a number of them and pick what works best for your particular needs and environment.

Server Recovery Using Server-Specific Information Data

With the release of NetWare 4.11, Novell introduced some enhancements to TSA modules to provide more efficient backup and restore capabilities for NDS, as well as more efficient server recovery after a failure.

In a multiple-server environment, one server can go down while the rest of the servers in its replica list remain intact. If the hard disk containing the SYS volume on one server becomes damaged, the entire server is affected. A hard disk failure involving SYS affects the entire server and halts all NetWare operating system activities. Because the eDirectory files are stored on SYS, losing this volume is equivalent to removing NetWare and eDirectory from the file server. (The same is true for Windows and Unix/Linux if the disk hosting eDirectory is down.)

WARNING

Because of the changes made in eDirectory 8.7, Server Specific Information backups created by filesystem TSAs or third-party backup tools are not supported for NetWare 5.1 and 6.0 servers running eDirectory 8.7 or 8.7.1. Instead, to restore a crashed server, you need to utilize the eDirectory Management Toolbox’s Backup eMTool.

NetWare 6.0/SP3 and later running eDirectory 8.7.1 or later support the SSI information generated using file system TSA but the restoration requires using the eDirectory Backup eMTool.

Because of this, the information provided in this section is applicable to all versions of NDS and eDirectory up to and including eDirectory 8.6.x.

To simplify the complex recovery procedure necessary in previous versions of NetWare, enhancements that were made to the filesystem TSA module (TSA410.NLM for NetWare 4.1x) help facilitate server recovery in this scenario. The same improvements are carried into later versions of file system TSA for NetWare 5 and higher.

NOTE

For NetWare 4.10, you need to use TSA410.NLM dated July 23, 1996, or later (for example, v4.14 or higher) to receive the same functionality as the version of TSA410.NLM that shipped with NetWare 4.11. The updated TSA410 can be found in SMSUP6.EXE (or newer) available from the Novell Support web site at support.novell.com.

The enhanced file system TSA provides a new major SMS resource, called Server Specific Info (SSI), that appears in the list of Resources displayed by SMS-based backup applications along with the SYS volume and other mounted volumes (see Figure 8.17). The Server Specific Info resource should be backed up on a regular basis, as it plays an important role in server recovery. Selecting the Server Specific Info option stores critical server information into five files that can be used for recovery purposes:

Image   SERVDATA.NDSThis (binary) file contains server-specific DS information, such as the schema information and server-centric object IDs. The information is used by Install/NWConfig to recover from a SYS volume drive failure. On Windows, this file is called $svnds.bak.

Image   DSMISC.LOGThis is a text file containing a list of replicas, including replica types, which the backed up server held at the time of backup. It also provides a list of the other servers that were in the failed server’s replica ring. Use this information to reestablish replicas on the server. On Windows, this file is called dsbackup.log.

     The following is an example DSMISC.LOG file:

Sunday, January 31, 2004    8:26:56 pm
Backing up server-specific NDS data
Current partition/replica list
Partition .[Root]., current replica list:
      .NETWARE65-A.XYZCorp, type master
      .NETWARE65-C.XYZCorp, type read/write

Image   VOLSINFO.TXTThis text file contains needed information about the server’s volumes, including name space, compression, and data migration information, at the time of backup. Use this file as a guide to re-create the lost volumes during the recovery process. (Not applicable to Windows.)

     The following is an example VOLSINFO.TXT file—note that the SHARED volume has compression enabled:

NETWARE65-A
Sunday, January 31, 2004    8:26:56 pm

SYS:
   Supported Name Spaces:
      DOS
      MACINTOSH
      NFS
      LONG

SHARED:
   Supported Name Spaces:
      DOS
      MACINTOSH
      NFS
      LONG
   Extended File Formats:
      Compression is enabled.

Image   STARTUP.NCFThis is a copy of the server’s STARTUP.NCF file. (Not applicable to Windows.)

Image   AUTOEXEC.NCFThis is a copy of the server’s AUTOEXEC.NCF file. (Not applicable to Windows.)

FIGURE 8.17 The Server Specific Info resource.

image

NOTE

The DSMISC.LOG file is also used by NetWare to record schema changes, and all entries to the file are done as appends. You should review the contents and size of this file periodically to ensure it is not taking up unnecessary disk space.

Conversely, the dsbackup.log on Windows is overwritten every time the local server information is backed up.

Because the backup service on Unix/Linux does not make use of SMS, no SSI data is available. To recover from a crashed Unix server, use eMBox as discussed later in this chapter.

The general steps to restore eDirectory to a single server are as follows:

1.   Retrieve Server Specific Information data for the crashed server.

2.   Clean up the replica ring.

3.   Install the new server.

4.   Add the new server to previously defined replica rings.

5.   Verify eDirectory was successful restored.

To begin this operation, you need to first know how to create the SSI files so they can be retrieved when needed. This is discussed in the following section.

Creating SSI Files

There are two ways to back up SSI data using your SMS-based application. The first method is to select Server Specific Info from the list of available resources when doing a file system backup. The second way is to simply select a full file system backup of the entire NetWare server—the SSI data is included by default.

TIP

If you have a server crash and SSI files are not available, you can try the recovery procedure outlined in the “Recovering a Crashed SYS Volume or Server” section in Chapter 11.

NOTE

If your backup software doesn’t show SSI as an available resource, check with the vendor before assuming that these files are being included in a full system backup.

If your backup program doesn’t support SSI, you can create the SSI files using SBCon. Use SBCon to schedule two jobs that execute daily (or frequently so you have up-to-date SSI files): one job that backs up and another that restores the SSI data. The restore step is necessary to create the actual SSI files on the SYS volume so your regular backup application can then back up these files to tape. Otherwise, the backup process simply creates the SSI files in server memory and then writes them to tape directly. The downside of this method is that SBCon uses the same tape as your backup software, which is sometimes not possible due to formatting requirements, unless you have two tape drives on your server.

NOTE

When SSI data is backed up, a copy of SERVDATA.NDS is created in SYS:SYSTEM, but not the other SSI files.

An alternative to the previous method is to use the MakeSSI utility from DreamLAN Network Consulting. This NLM is specifically designed to create the previously mentioned SSI data files (see Figure 8.18). Run the NLM just prior to your backup schedule so you can back up the SSI files to tape, ensuring you have a set of SSI files that matches the data backed up on tape. See www.dreamlan.com/makessi.htm for more information about the NLM.

FIGURE 8.18 Creating NetWare SSI files using MakeSSI.

image

NOTE

Although SSI is a file system TSA resource, the actual backup and restore of SSI data is performed by the DSBACKER.NLM, which is auto-loaded by the file system TSA as needed.

As there is no file system TSA for Windows, the procedure to create SSI files for Windows servers is slightly different than that for NetWare. The two files that make up the SSI data on Windows are created using the install.dlm as follows:

1.   Start install.dlm from NDSCons.

2.   Select the Backup local server information option (see Figure 8.19) and click Next.

FIGURE 8.19 Creating Windows SSI files using install.dlm.

image

3.   Enter a username and password that has Supervisor rights to the tree.

4.   Select the directory in which the two SSI files will be created. The default is drive:NovellNDSDIBFiles.

5.   Click Finish to create the files.

6.   The content of dsbacklog.log is displayed for your information. Click Done to exit.

You should then back up $svnds.bak and dsbackup.log as part of your regular file system backup procedure.

Restoring a Failed NetWare eDirectory Server

The information presented in this section explains how to restore NDS/eDirectory (prior to eDirectory 8.7) for a specific NetWare server after you have a hardware failure that involves the SYS volume. The procedure is not applicable when you are upgrading or replacing server hardware—instead, refer to the “Upgrading/Replacing Hardware on NetWare” section in your eDirectory 8.6.x documentation.

TIP

You can also use the NetWare Migration Wizard, which can be downloaded for free from download.novell.com, to upgrade or replace NetWare server hardware while maintaining the NDS/eDirectory information.

Following are steps to restore a crashed server or a SYS volume in a multiserver tree where DS information is replicated:

WARNING

These steps assume you have a current backup of the SSI data for the failed server. If you do not, you can try the procedure outlined in the “Recovering a Crashed SYS Volume or Server” section in Chapter 11, or refer to TID #10010922 entitled “Removing a Crashed Server from the NDS Tree” that covers how to recover from a server crash. However, the TID tells you to delete the Server and Volume objects, which will render all your Directory Map, Print Queue, etc. objects non-functional, and you’ll have to manually recreate these objects after a restore. When you don’t have SSI data to work with, and the procedure in Chapter 11 doesn’t help you, the information in this TID may be used.

1.   Don’t panic!

2.   Don’t delete the NCP Server or Volume objects for the failed server from the DS. Leave them intact to preserve references that other objects (such as Directory Map objects) may have to these objects as well as any DS trustee assignments made. If the NCP Server or Volume objects are deleted and you have objects that depend on them, you’ll need to re-establish the relationships through a selective DS restore.

WARNING

As discussed in Chapter 2 and elsewhere, when an object is missing its mandatory attributes, it will turn into an Unknown object. Because of this, you need to pay special attention when doing a partial DS restore so that any dependent object(s) are also restored, otherwise the restored object may not be functional.

3.   From your most recent tape backup of the failed server, restore the “Server Specific Information” files to another server. These SSI files, SERVDATA.NDS, DSMISC.LOG, VOLSINFO.TXT, STARTUP.NCF, and AUTOEXEC.NCF, will be restored to a subdirectory, named after the failed server in the DOS “8.3” naming format, under SYS:SYSTEM. For example, if the server was called TEST-NW6A, the SSI files will be restored to SYS:SYSTEMTEST-NW6.A.

4.   If the failed server held a Master replica of any partition, go to another server in the replica ring that has either a Read/Write or Read-Only replica and use DSRepair to promote that replica to a Master. (You can use the information recorded in DSMISC.LOG to determine what replicas were stored on the failed server and which servers are in the respective replica rings.) Repeat this step for every Master replica stored on the failed server. You then need to clean up the replica rings to remove the downed server from the lists. (Refer to the “Replica Ring Inconsistency” section in Chapter 11 for detailed steps.)

TIP

After your replica ring cleanup, you should spot-check the DSTrace output on a number of servers to see whether the replica rings are okay and verify that everything is synchronizing correctly. You don’t want to install a server into a tree that’s not fully synchronized.

NOTE

You can’t use NDS Manager or ConsoleOne to perform the task in Step 4 as they require the Master replica to be up and all servers in the replica ring to be available. You must use DSRepair for this step.

5.   If the failed server contained any non-Master replicas, you need to clean up the replica rings following the procedures given in the “Replica Ring Inconsistency” section in Chapter 11.

6.   Install the new server hardware or new hard drive (if it was only the SYS volume that had failed). Do not yet connect the new server to your network; leave it in an isolated environment.

7.   Install the NetWare operating system on the new hardware as per your standard procedure to set up the LAN and disk driver and create the volumes. (Use VOLSINFO.TXT to determine how many volumes you had on the crashed server, their names, and whether additional name spaces are required.)

     When prompted for server name and server ID (in NetWare 5 and higher; internal IPX network number in NetWare 4), enter the same server name and addressing information. (Use the AUTOEXEC.NCF included with the SSI for these data.)

     When you reached the point of installing DS information, create a new (temporary) tree. This allows you to complete the OS re-installation with the minimal amount of trouble.

     The reason behind creating a temporary DS tree at this point is that the GUI installation program in NetWare 5 and later doesn’t have the option (that is available in NWCONFIG.NLM; and in INSTALL.NLM in NetWare 4) for you to restore DS data using SSI information. You could, however, not create a temporary tree by aborting out of the GUI setup when prompted for DS information and use NWConfig to restore the DS data and manually copy the server files. But it can get confusing and is a lot more extra work—something you don’t need during a disaster recovery. Also, the up side of this technique is that you can build the server off-site (or have a hot standby server pre-built) and then bring it in to replace the crashed server.

8.   After the server OS installation is complete, restart the server (but keeping it off the production network) to ensure everything is working okay. Apply any server updates, such as Support Pack, that you have previously installed and then restart the server again to ensure the updates haven’t messed anything up.

WARNING

Do not restore file system data until after eDirectory has been restored. When file system data is restored, the process looks for the trustee objects in eDirectory. If an object that is a trustee does not exist in the eDirectory database (such as in a new installation before eDirectory has been fully restored), the rights assignments for that object will not be restored.

     Log in from a workstation to test the server LAN card configuration, exercise the hard drives, and so on. After you’re satisfied that the hardware is working correctly, create a directory off the root of your SYS volume and place the five SSI files there. The most important file is SERVDATA.NDS. Log out from the workstation after you’ve copied the files.

     If your new server’s hardware configuration is different from the crashed server’s (such as different network card, thus different driver), make a backup copy of the new STARTUP.NCF and AUTOEXEC.NCF files as they will be overwritten when you restore the SSI data.

NOTE

If your set of SSI files is small enough, you can place them on a diskette instead.

9.   At the server console, load NWCONFIG.NLM (or INSTALL.NLM in the case of NetWare 4) and use the Directory Options selection to remove DS from this new server.

10.   Connect the server to your production environment. Bring up your server and load NWConfig (or Install) and select the Directory Options menu.

11.   Select the Install Directory Services onto this server option. At the screen to “Select a Directory tree,” press F5 (the option to Restore NDS, as indicated at the bottom right of the screen; see Figure 8.20).

FIGURE 8.20 Restore SSI data by pressing F5.

image

TIP

Do not select a tree by pressing Enter. A new window comes up with two options: A: (the default) or “Press <F3> to specify a different path”.

     If your SSI files are on a diskette, insert the disk and continue with the restore. Otherwise, press F3 and specify the path to where the SSI files were copied to in Step 8.

     Alternatively, you can use the Restore local server information after hardware failure option from the Directory backup and restore options menu to restore the SSI files, as shown in Figure 8.21.

FIGURE 8.21 Restore SSI data via the Restore local server information after hardware failure option.

image

     After you enter the path and press Enter, the SSI files will be copied to the SYS volume. DSMISC.LOG, VOLSINFO.TXT, and AUTOEXEC.NCF are copied to the SYS:SYSTEM directory; STARTUP.NCF is copied to the DOS partition. DS information is restored at this point, using the data contained in SERVDATA.NDS. Unlike a traditional DS restore using SMS, TSANDS.NLM is not required for this. Once this is complete, DS is fully functional on the server, except that the partitions and replicas have not yet been re-established.

12.   You may also need to re-establish licensing information. For NetWare 4, you reinstall the license(s) using INSTALL.NLM.

13.   Prepare the restored directory for integration into the original tree by executing the following DSRepair commands in the order specified:

1.   DSREPAIR-SI (Repairs replica numbers on partition objects); option is not available for eDirectory 8.5 or below

2.   DSREPAIR-RD (Local database repair)

3.   DSREPAIR-RN (Repairs network addresses)

4.   DSREPAIR-SR (Requests local schema switch); command-line option is not available for eDirectory 8.5 or below but can instead use Advanced options menu, Global schema operations, Reset local schema.

     This is a cleanup process. It’s okay to see error messages displayed during the cleanup.

14.   Use DSTrace to verify that the schema has synchronized fully. From the server console, type

SET DSTRACE = ON (Activates the NDS transactions screen)
SET DSTRACE = +SCHEMA (Displays schema information)
SET DSTRACE = +IN (Monitors inbound synchronization
image traffic)

     Watch for the message “All processed = YES” on the trace status screen. Once the schema is synchronized, you are ready to re-establish replicas.

15.   With the information recorded in the DSMISC.LOG file, re-establish the original replicas using NDS Manager or ConsoleOne. We recommend you place the replicas on the new server before file system restore so that any external references that might result from file system trustee assignments are minimized.

16.   If the new server’s hardware configuration is not identical to that of the old server’s, you’ll need to change the restored AUTOEXEC.NCF and STARTUP.NCF files to match the new settings, using the backup copies you made in Step 8. After making the changes, restart the server to ensure the changes are okay.

17.   At this point, you can restore the file system from your most recent backup. You should be careful when restoring the SYS volume data to ensure that you don’t overwrite any new Support Pack files with older ones. If you’ve made modifications to your AUTOEXEC.NCF, make certain the older copy from your restore operation does not overwrite it.

18.   After the file system restore is complete, restart the server one more time to ensure that the restore didn’t overwrite any important system files. Perform a spot-check on some of the restored directories and files for trustee assignments, file ownership, and so on. Also spot-check DS objects to ensure you don’t have any Unknowns. Bindery-based objects and any DS objects (such as Print Queues) that depend on object IDs should restore correctly because of the SSI information. In the event that Print Queue objects, for example, are not recovered correctly, you need to recreate them.

19.   Install, if necessary, any additional server-based add-on products.

This procedure should work with NetWare 4.10 but we have not tested it in that environment. Also, there’s a bug in TSA410.NLM for NetWare 4.10 wherein replica information is not recorded in the DSMISC.LOG file. A workaround is to use MakeSSI (discussed in the previous section) on NetWare 4.10 servers as MakeSSI creates a PARTINFO.LST file, which is equivalent to the DSMISC.LOG file, as far as recording replica information goes. Also, you need to use the most recent TSA410.NLM as older versions (before v4.14) don’t support SSI.

Restoring a Failed Windows eDirectory Server

The information presented in this section explains how to restore eDirectory 8.5 or 8.6 (but not 8.7 or later) for a specific Windows server after you had a hardware failure that involves the disk hosting eDirectory. The procedure is not applicable when you are upgrading or replacing server hardware—instead, refer to the “Upgrading/Replacing Hardware on Windows NT/2000” section in your eDirectory 8.6.x documentation.

NOTE

Unlike the case with NetWare servers, you cannot use the NetWare Migration Wizard to upgrade or replace Windows server hardware as the Wizard is for NetWare-only.

The steps to restore a crashed Windows server or a damaged disk hosting eDirectory in a multiserver tree where DS information is replicated are very similar to that for NetWare outlined in the previous section. Instead of repeating the same information, we point out the differences in the procedure where applicable:

Image   The Windows SSI information consists of two files, $svnds.bak and dsbackup.log, and are located in drive:NovellNDSDIBFiles by default.

Image   To remove Directory Services from a Windows server, use install.dlm. From NDSCons, select install.dlm, click Start, click Remove Directory Services, and click Finish. You will need to authenticate as a user that has Supervisor rights to the tree.

TIP

If the Remove Directory Services option is grayed out, you can remove DS as follows. First, shut down eDirectory using NDSCons, Shutdown. Then manually remove all files in drive:NovellNDSDIBFiles, including subdirectories. Restart eDirectory using NDSCons, Startup.

Image   To restore eDirectory information using SSI files, again use install.nlm. From NDSCons, select install.dlm, click Start, click Restore Local Server Information after a Hardware Failure, click Next. Specify the path to the $svnds.bak and click OK.

Image   To prepare the restored directory for integration into the original tree, execute the following DSRepair commands:

Image   From NDSCons, select dsrepair.dlm, enter –si in the Startup Parameters field, click Start to repair replica numbers on partition objects. DSRepair’s GUI will not be displayed and will automatically exit when repair is completed.

Image   From NDSCons, select dsrepair.dlm, click Start. From the Repair menu, Local Database Repair. From the Servers menu, Repair All Network Addresses. From the Schema menu, Reset Local Schema.

Image   To verify that the schema has synchronized fully using DSTrace, from NDSCons, select dstrace.dlm, click Start. Choose Edit, Options, click Clear All and mark Schema, Inbound Sync Detail, and Inbound Synchronization, then click OK. Watch for the message “All processed = YES” on the trace status screen.

When restoring file systems on the Windows server, ensure you do not overwrite the current eDirectory files with the older versions from your backup.

Changes to NetWare SSI Data

Due to some internal database structure changes in eDirectory 8.7, Server Specific Information backups created by file system TSAs or third-party backup tools are not supported for NetWare 5.1 and 6.0 servers running eDirectory 8.7 or 8.7.1. In eDirectory 8.7.3, SSI is now supported using the hot backup functionality. As in previous versions, file system TSA calls the DSBACKER.NLM to create the backup, but now DSBACKER.NLM also calls BACKUPCR.NLM to create a backup using the Backup eMtool functionality.

NOTE

As BACKUPCR.NLM makes use of eDirectory Backup eMTool to create SSI data, this means you need to have iManager installed and RBS configured in order to create SSI data on NetWare servers.

Table 8.2 lists recommendations for creating and restoring SSI data depending on the NetWare and eDirectory versions.

TABLE 8.2 Recommended Backup and Restore Methods for NetWare SSI Data

Image

The main differences in SSI data created by NetWare 6.0 with eDirectory 8.7.1 and later are as follows:

Image   Larger file size—The former method of SSI backup contained only a small portion of the database. Now, because the backup file contains all the information about all directory objects on the server, it is much bigger. It will be roughly the same size as the database.

Image   User-defined file location—In former versions of SSI backup, only one file, SERVDATA.NDS, was created in the SYS:SYSTEM directory. Because the file was smaller, it was not critical where the data was placed before copying off to tape. With eDirectory 8.7.1 and later you can use a file system TSA to create a full backup of the database. Instead of five files in former versions of SSI backup, only three files are involved (see Table 8.3). For one of these, SSIBACK.BAK, the file location is user definable.

Image   Restore using Backup eMTool—The SSI data can only be restored using the Backup eMTool.

TABLE 8.3 NetWare SSI Files for eDirectory 8.7.1 and Later

Image

eDirectory Backup eMTool

The eDirectory Backup eMTool allows you to back up and restore the eDirectory database and associated files on an individual server. It has the following benefits:

Image   Same tool for all platforms supported by eDirectory 8.7 and later.

Image   Provides hot continuous backup. You can back up your server without closing the eDirectory database, and you still get a complete backup.

Image   Supports a quick restore of an individual server. This is especially helpful in the event of hardware failure.

Image   Scalability. You can back up a server whose eDirectory database contains tens or hundreds of millions of objects. The speed of the backup process is limited mainly by I/O channel bandwidth.

Image   Can support a quick restore of the tree, when used with replica planning and DSMaster servers. Even without using DSMaster servers, some level of recovery for the tree should be possible.

Image   Lets you perform tasks remotely. You can perform most backup and restore tasks using iManager or the Java eMBox Client.

Image   Lets you back up related files. You can back up files on the server that are related to the database, such as Novell International Cryptographic infrastructure (NICI) security files, stream files, and any files you specify (such as AUTOEXEC.NCF).

Image   Can restore eDirectory to the state it was in at the moment before it went down, if you use continuous roll-forward logging.

Image   Makes hardware upgrade simpler. Doing a cold backup and then restoring the eDirectory database is an easy way to transfer the server’s identity to a new machine or safeguard it while you make changes such as hardware upgrades.

Image   Works within the distributed nature of eDirectory. You can ensure that a restored server matches the synchronization state that other servers in the tree expect by turning on continuous roll-forward logging.

Image   Allows unattended backups. You can create batch files to run unattended backups through the eMBox Client.

Even though there are many nice features and benefits in the eDirectory Backup eMTool, it also has some drawbacks to be aware of. The main drawback is that it only deals with the database and associated files on an individual server; it does not support backup and restore for individual objects, branches of the tree, or the whole tree. Therefore, unless you have a single-server eDirectory tree or are making use of DSMaster servers, you will need an SMS-compliant backup solution to fully back up the tree whose partitions are distributed on more than one server. In essence, eDirectory Backup eMTool provides the same functionality as SSI data but with enhancement features.

TIP

For a Unix-only eDirectory tree, you can use ndsbackup to back up and restore individual objects, branches of the tree, or the full tree, including schema.

The second drawback is that eDirectory Backup eMTool must be used in conjunction with file system backups to put the eDirectory files safely on tape. Another drawback is that for a multiple-server tree, to back up a server you need to upgrade all the servers that are in the same replica ring to eDirectory 8.5 or later. This is because the restore verification process is backward compatible only with 8.5 or later.

Lastly, the eDirectory Management Tool Box (eMBox), of which eDirectory Backup eMTool is a component, depends on RBS to function. Should something unforeseen happen to the RBS configuration, you are unable to access the Backup eMTool. Although not likely if you plan your partition replication strategy properly, you might get yourself into a Catch-22 situation where you need to use Backup eMTool to restore your eDirectory DIB but the only replica containing the RBS containers is in the DIB that you are trying to restore.

TIP

It is sufficient to install iManager on just one server in the tree, launch iManager from that server, and then perform most functions on many objects in the tree. iManager makes calls to eDirectory when creating or modifying objects. eDirectory is responsible for finding the object in the tree and performing the specific function. This is independent of whether or not iManager is installed on other servers in the tree.

The only requirement when performing server-centric eMBox tool functions (such as backup, DSRepair, and so on) through iManager or the eMBox Client is that the server you are trying to perform this function on must have eDirectory 8.7 or later installed.

Overview of Backup eMTool Restore Process

When you direct the Backup eMTool to begin the restore process, either through iManager or the eMBox Client, the following steps are taken by the Backup eMTool:

1.   The DS Agent is closed.

2.   The current active DIB set is switched from the DIB set with filename extension .NDS to a new DIB set named .RST. (The existing DS database is left on the server; if the restore verification fails it will once again become the active DIB set.)

3.   The restore is performed, restoring to the DIB set named .RST.

4.   The DIB set is disabled by setting a Login Disabled attribute on the [Pseudo Server] object. This prevents the DS Agent from being able to open and using this DIB set.

5.   The roll-forward log settings are reset to the default. This means that after a restore, roll-forward logging on the server is always set to Off, and the location of the roll-forward logs is reset to the default (drive:NovellNDSDIBFiles ds.rfl). (If you want roll-forward logging turned on for this server, you must re-create your configuration for roll-forward logging after the restore, to make sure it is turned on and the logs are being saved in a fault-tolerant location. After turning on the roll-forward logs, you must also do a new full backup.)

6.   Verification of the restored .RST database is performed. The server attempts to verify the consistency of the data that has been restored. It does this by contacting every server that it shares a replica with and comparing the transitive vectors. The output from this verification process is printed in the log file. If the transitive vector on the remote server is ahead of the local vector, then data is missing from the restore, and the verification fails. For more information about the verification process, see the following section, “Transitive Vectors and the Restore Verification Process.”

     Here is an example of the information that’s recorded in the log file if verification fails for one of the replicas, showing the transitive vectors that were compared:

Server: T=EDIR-873-TEST-TREEO=XYZCorpCN=WIN2K-A
   Replica: T=EDIR-873-TEST-TREEO=XYZCorp
      Status: ERROR = -6034
         Local TV             Remote TV

         s3D35F377 r02 e002   s3D35F3C4 r02 e002
         s3D35F370 r01 e001   s3D35F370 r01 e001
         s3D35F363 r03 e001   s3D35F363 r03 e001
         s3D35F31E r04 e004   s3D35F372 r04 e002
         s3D35F2EE r05 e001   s3D35F2EE r05 e001
         s3D35F365 r06 e003   s3D35F365 r06 e003

7.   If verification is successful, .RST is renamed to .NDS and the login disabled attribute is cleared so it becomes the active eDirectory database on the server. If verification fails, the .RST DIB is not renamed, and the active DIB set is set back to .NDS.

The restore verification process is backward compatible only with eDirectory 8.5 or later (due to the transitive vector requirement). If the server you are restoring participates in a replica ring with a server running a version of NDS earlier than eDirectory 8.5, the restore log will show a -666 error (incompatible DS version) for that replica. This does not indicate whether the replicas are out of sync; it merely indicates that the restore verification was unable to compare the transitive vectors because the version of eDirectory was earlier than 8.5. When this happens, the database will not open (by default) because the restore verification was not completely successful. If in your best judgment, however, it is safe to open the database, you can use the override restore option in the eMBox Client to make the restored DIB active. Refer to the later section “Recovering the DIB If Restore Verification Fails” on how to recover the server from a failed restore verification process.

Transitive Vectors and the Restore Verification Process

A transitive vector is a time stamp for a replica. The vector consists of the number of seconds since midnight of January 1, 1970 (a common reference point used by all DS-related time functions), the replica number, and the current event number. Here’s an example of a transitive vector:

s3D35F377 r02 e002

In the context of backup and restore, it’s important because the transitive vector is used to verify that the server restored is in sync with the replica rings it participates in.

Servers that hold replicas of the same partition communicate with each other to keep the replicas synchronized. Each time a server communicates with another server in the replica ring, it keeps a record of the transitive vector the other server had when they communicated. These transitive vectors allow the servers in a replica ring to know what information needs to be sent to each replica in the ring to keep all the replicas synchronized. When a server is unavailable, it stops communicating, and the other servers don’t send updates or change the transitive vector they have recorded for that server until the server starts communicating again.

When you restore eDirectory on a server, the restore verification process compares the transitive vector of the server being restored to the other servers in the replica ring. This is done to make sure the replicas being restored are in the same state the other servers expect.

If the transitive vector on the remote server is ahead of the local vector, then data is missing from the restore, and the verification fails. As an example, data might be missing because you did not turn on continuous roll-forward logging before the last full or incremental backup, you did not include the roll-forward logs in the restore, or the set of roll-forward logs you provided for the restore was not complete.

Hot Continuous Backup and Roll-Forward Logs

The eDirectory Backup eMTool provides hot continuous backup of the eDirectory database on an individual server. This feature allows you to back up eDirectory on your server without closing the database and still get a complete backup that is a snapshot of the moment when the backup began. This means you can create a backup at any time and eDirectory will remain accessible by your users and other clients throughout the process. Hot continuous backup is the default behavior.

The Backup eMTool also lets you turn on roll-forward logging to keep a record of transactions in the database since the last backup. This allows you to restore a server to the state it was in at the moment before it went down. In a single-server environment, roll-forward logging is not required for the restore verification process, but the log files enable you to restore eDirectory to the moment before it went down instead of just to the last backup. In a multiserver tree, however, you must turn on roll-forward logging for all servers that participate in a replica ring, so that you can restore a server to the synchronization state that the other servers expect. If you don’t, then when you try to restore from your backup files you will get errors and the database will not open. Roll-forward logging is off by default.

NOTE

The concept of Backup eMTool’s hot backup plus roll-forward logging is not new. It is essentially the same as that of the full data backup plus incremental backups you are accustomed to when dealing with file system backups. The difference is that roll-forward log files contain a history of changes since the last full or incremental backup.

eDirectory automatically creates a record of transactions in a log file before committing them to the database. By default, the log file for these records is reused over and over (consuming only a small amount of disk space), and the history of changes to the eDirectory database is not saved. When you turn on continuous roll-forward logging, the history of changes is saved in a set of consecutive roll-forward log files. Roll-forward logging does not reduce server performance; it simply saves the log file entries that eDirectory is already creating.

When using the continuous roll-forward logging feature, you must be aware of the following issues:

Image   Turn on roll-forward logging before a backup is done. This enables you to use this feature for restoring the database.

Image   For fault tolerance, make sure that the roll-forward logs are placed on a different storage device than eDirectory. For security, you should also restrict user rights to the logs.

Image   Document the location of the roll-forward logs so you can backup the log files to tape.

Image   Monitor the available disk space where the logs are located. If you run out of disk space and roll-forward logs cannot be created, eDirectory will stop responding—much like the situation with legacy versions of NDS when NetWare’s Transaction Tracking System (TTS) shuts down.

Image   If the logs are turned off or lost, turn them back on, then do a new full backup to ensure that you can make a full recovery.

Image   If you turn on logging of stream files, the roll-forward logs use up disk space much more quickly. When logging of stream files (such as login scripts or any attribute that uses the SYN_STREAM syntax) is turned on, the whole stream file is copied into the roll-forward log every time there is a change. You can slow the growth of the log files by turning off roll-forward logging of stream files and, instead, back them up only when you do an incremental or full backup.

Image   Don’t change the name of a roll-forward log file. If the filename is different than when the log was created, the log file can’t be used in a restore.

Removal of eDirectory from a server also removes all the roll-forward logs. If you want to be able to use the logs for restoring in the future, copy the roll-forward logs to another location before removing eDirectory.

Configuring and Maintaining Roll-Forward Logs

The roll-forward log feature is off by default. It is easiest to use iManager for this task. Follow these steps to enable roll-forward logging on a given server:

1.   Log into iManager as a user with Supervisor rights.

2.   Click the Roles and Tasks button.

3.   Click eDirectory Maintenance, Backup Configuration.

4.   Specify the server that you want to configure and click Next.

5.   If not already authenticated to the server, you will be prompted for a username and password. Enter the requested information and click Next.

6.   The Backup Configuration Wizard (see Figure 8.22) is displayed showing the current setting.

FIGURE 8.22 Configuring roll-forward logging.

image

7.   Change the status of Roll-forward logging to On.

8.   Specify a Roll-forward logs directory. For fault-tolerance purposes, this directory should be on a separate drive or volume than where eDirectory is installed.

9.   Set maximum and minimum file sizes as desired.

10.   Click Start to save the new settings.

11.   Document your settings.

You need to do this for every server that you want to use roll-forward logging on.

We strongly suggest that you periodically back up the log files and remove unused logs from the server to free up disk space. Use the following procedure to identify, back up, and remove roll-forward logs that are safe to remove:

1.   Make a note of the name of the last unused roll-forward log. You can find out the name of the last unused roll-forward log in the following ways:

Image   In iManager, click eDirectory Maintenance, Backup Configuration and read the filename displayed, as shown in Figure 8.23.

FIGURE 8.23 Determining the name of the last unused roll-forward log.

image

Image   In the eMBox Client, use the backup.getconfig command in the interactive mode. If using the GUI mode, backup, Retrieve backup configuation, Run.

     The last unused roll-forward log is the most recent roll-forward log the database has completed and is no longer using to record transactions. It’s called the last unused roll-forward log because the database has finished writing to it and has begun a new log file so it does not need to have this one open any more. The current roll-forward log in which the database is recording transactions is in use and is still needed by the database.

2.   Do a file system backup of the roll-forward logs to put them all safely on tape.

3.   Manually remove the roll-forward logs that are older than the last unused roll-forward log.

WARNING

Be cautious when removing roll-forward logs from the server. Check to ensure you have a backup copy of the log files before you delete them.

The last unused roll-forward log simply indicates which file the database has just completed and closed. It does not mean it’s safe to remove that file from the server. You must make sure that you remove only files that you have a tape backup for.

Although Backup eMTool is rather easy to use and more powerful than the former SSI option, there is quite a bit of manual maintenance work in regard to the roll-forward log files.

Backing Up a Server Using Backup eMTool

The eDirectory Backup eMTool can back up data from an eDirectory database to one or more files on the server where the backup is being performed. You can do a full or incremental backup. The backup files contain information necessary to restore eDirectory to the state it was in at the time of the backup. The results of the backup process are written to the log file you specify.

Backups performed using iManager are hot continuous backups, meaning that the eDirectory database is kept open and accessible during the process, and you still get a complete backup that is a snapshot of the moment when the backup began. To perform a cold backup (a backup with the database closed) or an unattended backup, you must use the eMBox Client.

The following steps illustrate how to back up a server using iManager:

1.   Log into iManager as a user with Supervisor rights.

2.   Click the Roles and Tasks button.

3.   Click eDirectory Maintenance, Backup.

4.   Specify the server that you want to backup and click Next.

5.   If not already authenticated to the server, you will be prompted for a username and password. Enter the requested information and click Next.

6.   Specify the backup file options, such as full, incremental and name and location of the backup file (see Figure 8.24), optionally a maximum file size for the backup data file, and then click Next.

FIGURE 8.24 Server backup options.

image

NOTE

When a maximum file size is specified, after the first file (whose name is what you specified) has reached the specified file size, subsequent files are created as filename.xxxxx, where xxxxx ranges from 00001 to FFFFF.

7.   Specify whether to include NICI files in the backup. Novell recommends that you always include NICI files.

8.   Specify whether to include stream files in the backup.

9.   Specify any additional files to back up via an include file. This include file is a text file that exists on the file system of the server you are backing up and contains a list of semicolon-separated files.

WARNING

The filenames must not have any spaces or hard returns between each entry and the last entry must have a semicolon after its name; embedded spaces within a filename is okay. For example, SYS:SYSTEMAUTOEXEC.NCF;SYS:PUBLICCUSTOM_APP.EXE;.

10.   Click Start.

TIP

To make it easier to move the backup files to another storage device, you can specify the maximum size of eDirectory backup files. You can also use a third-party file compression tool (for instance, HRZIP.NLM on NetWare [www.novell.com/coolsolutions/tools/1099.html]; WinZIP on Windows; gzip on Unix) on the files after they are created. The backup files can be compressed by approximately 80%.

The backup log file contains a list of files that were backed up, such as the NICI files and any files you specified using an include file. The log file looks similar to the following:

¦==================DSBackup Log: Backup================¦
Backup type: Full
Log file name: d:ackupsfullbackup.log
Backup started: 2004-4-11’T19:59:45
Backup file name: d:ackupsfullbackup.data
Server name: T=W2K-873-TEST-TREEO=XYZCorpCN=W2KC-NDS
Current Roll Forward Log: 00000001.log
DS Version: 1055098
Backup ID: 4079DBF1
Backing up security file: C:WIN2K iciNICIFK
Backing up security file: C:WIN2K ici icintacl.exe
Backing up security file: C:WIN2K iciNICISDI.KEY
Backing up security file: C:WIN2K icisystemXmgrcfg.ks2
Backing up security file: C:WIN2K icisystemXmgrcfg.ks3
Backing up security file: C:WIN2K iciXARCHIVE.000
Backing up security file: C:WIN2K iciXMGRCFG.NIF
Backing up security file: C:WIN2K icixmgrcfg.wks
Backing up file: c:infoackup-1.pcx
Backing up file: c:infoackup-3.pcx
Backing up file: c:infoackup-2 Temp.pcx
Starting database backup...
Starting new file: d:ackupsfullbackup.data.00001
Starting new file: d:ackupsfullbackup.data.00002
Starting new file: d:ackupsfullbackup.data.00003
Starting new file: d:ackupsfullbackup.data.00004
Database backup finished

Completion time 00:04:12
Backup completed successfully

Make sure you do a file system backup shortly after the eDirectory backup is created, to put the eDirectory backup files (including the log file) safely on tape since the Backup eMTool only places them on the server.

NOTE

You will need the backup log file in order to perform a restore.

To perform a cold backup (for the purpose of hardware upgrade, for example) or a scheduled unattended backup (via system batch files and scripts), you need to use the eMBox Client, and not iManager. Refer to the “eDirectory Management Toolbox” section in Chapter 7 for more information about using the eMBox Client.

Restoring a Server Using Backup eMTool

The most important part of restoring the eDirectory database is making sure it is complete. Because of the file dependencies (having the correct roll-forward logs for the specific backup and so on), you must ensure the following prerequisites have been met before restoring an eDirectory database to a server:

Image   All servers that share a replica with the server to be restored are up and communicating. This allows the restore verification process to check with servers that participate in the same replica ring.

Image   You have gathered all the backup files you need. The full backup and subsequent incremental backup files are copied to one directory on the server to be restored. And all the roll-forward logs since the last backup are in one directory on the server to be restored (so Backup eMTool can locate them), with the same filenames they had when they were created.

TIP

For procedures on how to confirm that you have the correct backup files before performing a restore or how to determine which are the correct files if names were changed, refer to the “Locating the Right Backup Files for a Restore” section in eDirectory 8.7 (or later) documentation.

TIP

If you do not have all the necessary backup files, you can try the procedure outlined in the “Recovering a Crashed SYS Volume or Server” section in Chapter 11. You can also refer to TID #10010922, titled “Removing a Crashed Server from the NDS Tree,” which covers how to recover from a server crash.

Image   You have installed eDirectory, in a new temporary tree. You bring up the server in a new tree at first because you will create the server with the same name it had before the failure. Furthermore, you don’t want to cause confusion in the original tree by putting the newly installed server in the tree before the restore has re-created the server’s complete identity. Completing the restore process for the database will put the server back into its original tree.

Image   If any applications or objects need to find this server by its IP address, ensure the same IP address is used for the restored server.

Image   (NetWare only) Make sure the name of the server you are restoring to is the same as the name of the failed server. If the names are not the same, you might encounter errors, such as Volume objects not being correct after the restore.

Image   (NetWare only) Be sure to restore file system data only after eDirectory has been fully restored. Otherwise, you will lose file system trustee information.

During the restore process, the eDirectory Backup eMTool first restores the full backup. After this is complete, the Backup eMTool prompts you to enter the filenames of the incremental backup files. It provides you with the ID of the next file. After all incremental files are restored, the Backup eMTool moves on to the roll-forward logs.

After you have gathered all the necessary files and have placed them in the same directory, perform the restore using either iManager or the eMBox Client. The following outlines the server restore from backup files procedure using iManager:

1.   Ensure that the prerequisites listed at the beginning of this section are met.

2.   Log into iManager as a user with Supervisor rights.

3.   Click the Roles and Tasks button.

4.   Click eDirectory Maintenance, Restore.

5.   Specify the server that you want to restore and click Next.

6.   If not already authenticated to the server, you will be prompted for a username and password. Enter the requested information and click Next.

7.   Specify the name of the backup and log files you want to use (see Figure 8.25), then click Next.

FIGURE 8.25 Specifying the backup files for restore.

image

8.   Specify additional restore options (see Figure 8.26), then click Next. In most cases, the following check boxes should be selected for a proper restore:

Image   Restore database

Image   Activate the restored database after verification

Image   Open the database after completion of restore

Image   Restore security files (meaning NICI files)

Image   If you are restoring roll-forward logs, make sure you include the full path to the logs, including the directory that is automatically created by eDirectory, usually named nds.rfl.

Image   Activate the restored database after verification

FIGURE 8.26 Specifying additional restore options.

image

9.   Click Start to initiate the restore process.

10.   If the restore verification fails, refer to the later section “Recovering the DIB If Restore Verification Fails.”

11.   If you restored NICI security files, restart the server after the eDirectory restore is complete to reinitialize NICI.

12.   Verify that the server is re-introduced into the production tree correctly and check that all replicas on this server are properly synchronized.

NOTE

The restore process turns off roll-forward logging and resets the configuration for roll-forward logging back to the default, which is Off. You will need to re-enable it if the server is part of a replica ring.

You should perform a full backup soon after the server restore process is complete. The new full backup is necessary so that you are prepared for any failures that might occur before the next full backup is scheduled to take place.

Recovering the DIB If Restore Verification Fails

To ensure data consistency, the Backup eMTool restore process includes a verification step, which compares transitive vectors in the eDirectory database on the server being restored against other servers in the replica ring. If the transitive vectors do not match, the verification fails. This usually indicates that data is missing from the files you used for the restore. Data might be missing for one of the following reasons:

Image   You did not turn on roll-forward logging before the last backup was performed.

Image   You did not include the roll-forward logs in the restore.

Image   The set of roll-forward logs you provided for the restore was not complete.

Verification failure might be caused by one of the servers in the replica ring running a version of NDS earlier than eDirectory 8.5. By default the restored eDirectory database will not open after the restore if Backup eMTool determines it is inconsistent with the other replicas.

If you have all the backup files and roll-forward logs necessary for a complete restore but forget to provide all of them during the process, you can simply run the restore again with a complete set of files. If the restore is complete on a second try, the verification can succeed and the restored database will open.

If you do not have all the backup files and roll-forward logs necessary to make the restore complete so that verification will be successful, you must follow the instructions outlined later in this section to recover the server. Here is an outline of what information you can recover if verification fails:

Image   You can still recover the server’s identity and file system rights (for a NetWare server).

Image   You cannot recover any replicas on this server from backup, but the server can still be used for the replicas it contained after you follow the recovery procedure in this section. You must remove the server from the replica ring and use advanced Restore options and the DSRepair Tool to bring the server to a state where it can be put back in the replica ring. Then you can re-add the desired replicas to it.

Image   If this server had the sole copy of any partition of the database (there were no other replicas of the partition), the partition unfortunately cannot be recovered.

If eDirectory Backup eMTool verification fails to recover the server’s identity, use the following procedure to recover and re-add it to the replica ring:

1.   Clean up the replica rings per the steps given in the “Replica Ring Inconsistency” section in Chapter 11.

2.   Change the replica information on the server to external references, so that the server does not consider it to be part of a replica ring. After you remove the replicas from the server in this way, you can unlock the database. To accomplish this step, you need to use the advanced restore mode in the eMBox Client—you cannot use iManager for this step—to override the default restore behavior:

Image   Launch the eMBox Client using the instructions presented in the “eDirectory Management Toolbox” section in Chapter 7. You can use either the interactive mode (-i) or the graphical mode (-g).

Image   If using the GUI mode, enable both the Show command line and Advanced mode options via the Settings menu.

Image   Log into the server you want to restore. If using the interactive mode, enter the following command:

           backup.restadv -v -l logfilename

     If using the GUI mode (see Figure 8.27), click Backup, Advanced restore options, mark Override restore, and click Run. This advanced restore option will rename the .RST database (the database that was restored but failed the verification) to .NDS, but keep the database locked.

FIGURE 8.27 Using the advanced restore option in eMBox Client.

image

Image   At the server console, run DSRepair with the -XK2 switch to change all replica information on the server to external references:

NetWare

DSREPAIR -XK2 -RD

Windows

From NDSCons, select dsrepair.dlm, enter –rd –xk2 in the Startup Parameters field, and click Start.

Unix

ndsrepair -R -Ad -xk2

DSREPAIR.NLM and dsrepair.dlm will not display their menu and will exit automatically after the repair is finished when the -rd switch is specified.

You can also use the DSRepair eMTool for this step (see Figure 8.28). Click dsrepair, Repair local database, uncheck all options, click Use temporary eDirectory database during repair?, click (xk2):Convert all replicas into external references, and click Run.

FIGURE 8.28 Using the advanced repair option to change all replica information on the server to external references.

image

Image   When the repair is finished, remove the lockout and open the database. If using the interactive mode, enter the following command:

          backup.restadv -o -k -l logfilename

     The -o opens the database and the -k removes the lockout.

     If using the GUI mode (see Figure 8.29), click backup, Advanced restore options, mark Open database when finished, mark Remove lockout on database, and click Run.

FIGURE 8.29 Unlock and open the database.

image

3.   You can now re-add the server into the replica rings using either ConsoleOne or iManager. When you have followed these steps and the replication process is complete, the server should function as it did before the failure (with the exception of any partitions that were not replicated and, therefore, can’t be recovered).

4.   If you restored NICI security files, after completing the restore and replication, restart the server to reinitialize NICI.

5.   If you want to use roll-forward logging on this server, you must re-create your configuration for roll-forward logging to make sure it is turned on and the logs are being saved in a fault-tolerant location. After turning on the roll-forward logs, you must also do a new full backup.

This last step is necessary because during a restore, the configuration for roll-forward logging is set back to the default, which means that roll-forward logging is turned off and the location is set back to the default. The new full backup is necessary so that you are prepared for any failures that might occur before the next full backup is scheduled to take place.

Third-Party Data Recovery Utilities

As NDS/eDirectory and DS software development tools have been available for many years, a number of third-party DS-specific utilities are available to help you manage your NDS/eDirectory trees more easily and effectively, as well as to recover lost DS data. The following introduces you to some third-party tools that can help you to recover lost DS data, and, in Chapter 12, you’ll find a discussion of some third-party NDS/eDirectory management applications.

NOTE

Due to the lack of documented APIs necessary to access eDirectory under a data recovery situation by Novell for non-NetWare platforms, the discussions in this section are limited to DS trees where there are NetWare servers present. Should you have a need to recover a lost Admin password or Admin user in an eDirectory tree where there is no NetWare servers hosting replicas, contact Novell for assistance: Visit support.novell.com/additional/telephone.html for a list of telephone numbers for your region.

Recovering a Lost Admin Password

It is not uncommon to forget a password, especially one that’s considered to be a good, secure password. What can you do if the Admin password is lost, either due to human error or deliberate sabotage? If you have a backup Admin user that has Write rights to Admin’s Access Control List (ACL) attribute then you can simply use it to reset Admin’s password.

What if you don’t have a user that can reset Admin’s password? There are a few solutions that you can try.

TIP

It is generally recommended that a password should not be a common (single) word that is easily guessed; however, instead of using a meaningless word for your password, such as “435ggerpwe”, combine a few meaningful (thus easily remembered) words together into a password, such as “try2guessthispassword”.

The first technique is to make use of Bindery Services. If you have a server that holds a writable replica (Master or Read/Write) of the partition containing the Admin object, you can use one of the two following methods:

Image   Log in to that server using the bindery Supervisor ID, and use a bindery-based management utility, such as SYSCON, to change Admin’s password. (You can download a copy of SYSCON.EXE from Novell’s knowledgebase; see TID #1003215.)

Image   If you don’t know the bindery Supervisor’s password, you can use one of the NLM tools (such as SetPwd), available on the Internet, to reset the Admin password.

Image   Open an incident with Novell Technical Support. NTS can help you to reset Admin’s password via remote access.

Image   DreamLAN Networking Consulting has a DSPass NLM that can reset an NDS User object password without Bindery Services, or can reset a bindery password if Bindery Services is enabled. Visit www.dreamlan.com/dspass.htm for more information.

NOTE

Although there are other NLMs easily available on the Internet that can be used to change Admin’s password, DSPass is the only YES certified solution (YES Bulletin #44431) that runs on NetWare 4.10 and higher and works with all versions of NDS and eDirectory.

Because these NLMs require server console access, you should always take appropriate steps and care to secure your server console from both physical and remote (for example, RConsole) unauthorized access. Third-party utilities, such as DreamLAN Network Consulting’s SSLock for NDS and Protocom Development Systems’ SecureConsole can enhance your server console security. See Chapter 15 for additional information.

Recovering a Lost Admin User Account

If you administered NetWare networks prior to NetWare 4.0, you know that the user Supervisor can’t be deleted (at least not by accident and not through standard management tools such as SYSCON). With NetWare 4 and higher, however, it is possible for you to (accidentally) remove the Admin user and leave yourself with an unmanageable NDS/eDirectory tree! Chapter 15 contains information on how to safeguard your administrative accounts so you’ll never have an unmanageable tree. In the unpleasant event that you’ve lost your Admin user, here are some solutions.

If it is a single-server test tree or a tree that can easily be recreated, you can use the following steps to re-create a new Admin user:

1.   Remove DS by loading the NWConfig or Install NLM with the -DSREMOVE command-line switch. (For example, LOAD NWCONFIG -DSREMOVE.)

2.   Select Directory Options.

3.   Select Remove Directory Services from the server.

4.   Press Enter after reading the warning message.

5.   Select Yes to the Remove Directory Services? prompt.

6.   Press Esc when prompted for the Admin user and password.

7.   Select Yes to the Remove the Directory without logging in recommended? prompt.

8.   After DS has been removed, exit NWConfig and reload NWConfig without the -DSREMOVE switch.

9.   Use the Directory Options to reinstall DS. You’ll be asked to create the Admin user.

WARNING

The steps described will destroy your current DS tree! The file system data will not be touched, however.

Another solution is to open an incident with Novell Technical Support. NTS can help you to create a user with Supervisor rights to [Root] and, thus, admin rights to your tree, via remote access.

Yet another option is to use the MakeSU (“Make SuperUser”) NLM from DreamLAN Networking Consulting. This can create a DS User object that has Supervisor rights to [Root]. Visit www.dreamlan.com/makesu.htm for more information.

Unlike the first option, the last two options will create an Admin user in a nondestructive manner.

NOTE

There are a couple of other NLMs available on the Internet that can create a lost Admin user. MakeSU, however, is the only YES-certified solution (YES Bulletin #44435) that runs on NetWare 4.10 and higher and works with all versions of NDS and eDirectory.

Detecting and Gaining Access to IRF-Blocked Objects

Similar to NetWare file system’s Inherited Rights Filters (IRFs), DS administrators can apply IRFs to DS objects so they are not accessible by other users except those that have trustee assignments. The one main difference between file system IRFs and DS IRFs is that you can use IRF to block Supervisor access to DS objects while you can’t do this in file systems. Therefore, it is not uncommon for security-conscious DS administrators to protect administrative accounts, such as Admin and admin-equivalent user objects, using IRFs. For details on how to protect DS objects, especially Admin-type user objects, from tampering, see Chapter 15. The following section deals with what to do if you need access to IRF-blocked objects.

IRF-blocked objects can be categorized into three types: visible but unmanageable (you can’t delete or modify them), invisible but manageable, and invisible and unmanageable. The invisible objects are generally referred to as stealth objects. You can’t see stealth objects easily using the standard management utilities, such as ConsoleOne, because the IRF blocked the Browse right to the object. They can be detected, however, using certain techniques (if they leave a “footprint” via ACL assignments, for example) and using specialized utilities. You’ll find a discussion of one of the utilities, Hidden Object Locator, in Chapter 15.

NOTE

Another stealth object detector is the NDSTree utility, available from DreamLAN Network Consulting. For more information, see www.dreamlan.com/ndstree.htm.

Once the unmanageable object names are determined, you can regain access to them using one of the following methods:

Image   Open an incident call with Novell Technical Support.

Image   Use the MakeSU NLM to create a DS User object or grant an existing user object full DS right to the stealth or unmanageable object.

Write Your Own Utility

Although there are a large number of utilities available to assist you in data recovery, every network is unique, and you may have specific requirements that the available utilities do not address. If you have some programming background or have access to a programmer, coding your own recovery utility is an option.

A wide variety of tools that interface with network services and NDS/eDirectory are available for your choosing. You’re not limited to using the C programming language, as was the case in the past when programming for NetWare and other operating systems. Novell and third-party vendors offer class libraries, JavaBeans, scripting languages (such as Visual Basic, JavaScript and Perl), and C/C++ APIs to support the widest range of developer participation and opportunity. Chapter 10 offers some examples on how you can “roll your own” data recovery utilities.

Summary

This chapter covered a number of tools that can help you in protecting and recovering lost NDS/eDirectory information and help you re-create a lost Admin user. The following topics were discussed:

Image   Backing up and restoring DS with Storage Management Services (SMS) and using eDirectory Management Tool Box (eMBox)

Image   NDS/eDirectory recovery using Server Specific Information (SSI) data after a server crash

Image   Recovering lost passwords and lost Admin user accounts

Image   Detecting and gaining objects that are blocked by Inherited Rights Filters (IRFs)

The next chapter shows how to combine the various tools discussed up to this point to maximize their capability.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.142.197.212