Chapter 10
OES NetWare File Storage and Management

Instant Access

Managing Logical Volumes

image To create, delete, or enlarge a logical volume, use the volume management options in iManager or the console-based NSSMU.

image To mount/dismount, or activate/deactivate a logical volume, use the volume management options in iManager or the console-based NSSMU.

image To move or split a logical volume, use the volume management options in iManager.

image To mount a server’s DOS partition as a logical volume, load DOSFAT.NSS at the server console.

Managing Disk Space

image To manage file compression, use NoRM to set file compression SET parameters.

image To limit users’ disk space, use volume management options in iManager.

Managing Files

image To salvage or purge deleted files, use the NetWare Utilities option in the Novell client or ConsoleOne.

image To display information about files and directories, use ConsoleOne.

Using Distributed File System

image To create and manage DFS junctions, use ConsoleOne.

Using iSCSI

image Configure iSCSI partitions with NoRM or the console-based NSSMU.

image Configure an iSCSI initiator with the iSCSI Services options in NoRM.

Backing Up and Restoring Files

image To back up and restore network files, use SBCON from the server console (or a remote RConsoleJ session). For a more comprehensive backup/restore solution, use a third-party backup product that is SMS-compliant.

image Use file and pool snapshots to make it much easier to back up network data.

Understanding the NetWare File System

File storage and management are the core of any network server, and NetWare has long offered the capability to manage files in many ways. Answering questions about file security, file criticality, available disk space, and the potential for offline or near-line storage can go a long way in helping you determine how best to configure and manage your file system environment.

The first step toward planning and managing an effective file system is to understand the Novell Storage Services (NSS). First released in limited fashion with NetWare 5, NSS provides tremendous flexibility to the NetWare file structure. But beyond NSS, there are also issues of archiving data and newer network-based storage options.

This chapter looks at the various file storage options available in OES NetWare and discusses the advantages and potential pitfalls of each. You will note that this chapter doesn’t include a discussion of traditional NetWare volumes. This topic has been discussed for 20 years, and there isn’t a lot left to say. Furthermore, traditional volumes are lacking when compared to the NSS option. However, for further information on traditional NetWare volumes, there is a library of information available, and Appendix E, “Where to Go for More Information,” can point you in the right direction.

Novell Storage Services

NSS is a powerful storage and file system that provides an efficient way to use all the space on your storage devices. The first concept with which you should become familiar in the NetWare file system is the volume. A NetWare volume is the highest level in the file system hierarchy, and is the structure within which directories and files are maintained. Each NetWare server will have at least one volume, SYS, which contains all the NetWare system files and utilities. You can then create additional volumes on the server as necessary to serve your file-management needs.

The volume is the last link in the NSS chain. Figure 10.1 gives a high-level view of the NSS architecture, which includes the following:

image NSS partitions—A partition is a logical organization of space on a hard disk and represents the lowest level of organization for disk storage. Partitions prepare space on storage devices to be used in an organized and structured way by defining the ways in which the file system will interact with the storage devices.

image NSS storage poolsNSS storage pools are created in partitioned space. A storage pool is a specified amount of space you obtain from all your storage devices. Within the storage pool, you will create the NSS volumes you need on the server. Only one storage pool can exist on a partition, but you can create an unlimited number of NSS volumes in each storage pool, thereby removing partition constraints to the number of volumes that can be created.

image NSS volumes—The volumes you create from NSS storage pools are called logical volumes. As noted in Figure 10.1, they are logical volumes because the space used to create a given volume can come from a variety of storage devices. It is not contiguous space. A logical volume can be set to a specific size, or allowed to grow dynamically according to the amount of physical space assigned to the pool. This enables you to add and store any size or any number of files you need without having to create other partitions. You can add any number of volumes to a storage pool as long as you have available physical space in the pool.

Figure 10.1. A high-level view of the NSS architecture.

image

Beyond these three NSS building blocks, you should be aware of several concepts related to the configuration and management of NSS volumes:

image NSS management—You will use NoRM for configuring and managing your NSS environment. It gives you the ability to control and change your server’s storage characteristics from any place with an Internet connection.

image Overbook your storage pool—Individual logical volumes cannot exceed the size of a storage pool. However, because you can create multiple logical volumes in a single storage pool, OES NetWare permits the total space allocated to logical volumes to exceed the actual pool size. This feature, called overbooking, can be an efficient way to manage your file system because it enables your volumes to grow organically over time instead of being locked into a rigid structure that can leave space unused.

image Deactivate/activate logical volumes and storage pools—You might temporarily need to prevent user access to storage pools or volumes to perform maintenance. Instead of bringing down the server, you can deactivate individual storage pools. When you deactivate a storage pool, users will not have access to any of the volumes in that pool.

image Fast error correction and data recovery—Because NSS is a journaled file system; it can quickly recover data after a file system crash. Instead of scanning the file system for corruption, NSS replays the latest set of changes to make sure they were written correctly. The file system either recovers the changed information or returns it to its original condition prior to the transaction.

image Immediately save data to disk—The Flush Files Immediately feature saves your file data to disk immediately after you close the file instead of caching it in memory and waiting for the next disk write cycle. This prevents your data from being at risk between disk write cycles, at the cost of slower file system performance overall.

image Retain previously saved files (Snapshot)—The File Snapshot feature keeps an original copy of all open files so they can be archived by your backup utility. By capturing the most recent closed copy of the file, Snapshot guarantees that you still have a solid copy of the file with which to work. OES NetWare also offers pool snapshots, so you can preserve a view of an entire storage pool at any point in time. This option can be a valuable addition to your data protection and archive capabilities.

image Transaction Tracking System (TTS)—Transaction Tracking System protects database applications by backing out transactions that are incomplete due to a system failure. To enable TTS for an NSS volume, type the following command at the server console. You can also place the NSS transaction command in your AUTOEXEC.NCF so that TTS starts automatically:


nss /transaction=<volume name>


image Review the modified file listNSS maintains a list of files that have been modified since the previous backup. To save time, your backup utility has to review only this list rather than scanning the entire file system for modified files.

image Enable file compressionNSS supports file compression. This enables you to decide whether to compress the files in your volumes for more efficient use of storage device space. After it’s enabled, however, you cannot disable file compression without re-creating the volumes.

image Data shredding—The data shredding feature overwrites purged disk blocks with random patterns of hexadecimal characters. This is a security option that helps prevent the use of a disk editor to attempt to recover purged files. You can require up to seven random shred patterns to be written over deleted data.

image User space restrictions—From iManager, you can now limit the amount of space available to an individual user on a logical volume.

image Directory space restrictions—From iManager, you can now limit the space that can be assigned to a given directory or subdirectory.

image CD-ROMs as read-only logical volumesNSS offers full CD-ROM support for ISO9660 and HFS formats. Simply insert the CD-ROM into the server-mounted CD-ROM drive and it will be automatically mounted as a new NSS volume.

image No memory required for mounting volumesNSS does not require large amounts of memory to mount volumes because it does not scan the entire file system during the mounting process. After the mounting is complete, NSS does not load files into memory until you access them. Therefore, no additional memory is required when you add files and mount volumes.

image Hot fix—Over time, sections of your server hard disks might start to break down and lose their ability to store data reliably. NSS supports hot fix to prevent data from being written to unreliable blocks. Hot fix redirects the original block of data to the hot fix redirection area, where the data can be stored correctly. To redirect a block of data, the operating system records the address of the defective block. Then the server no longer attempts to store data in that block. By default, 2% of a disk’s space is set aside as the hot fix redirection area. You can increase or decrease this amount. If hot fix is enabled, it is always active unless the disk fails or the redirection area is full. You can view hot fix activity in NoRM by selecting the Disk/LAN Adapters link. Click on the disk adapter to which the drive is attached and click the appropriate drive link. The Redirection Blocks column will show you how many blocks have been redirected to the hot fix area.

Warning

If you notice the number of redirected blocks increasing, it’s a sign that your drive is ready to fail. You should immediately back up your data and replace the drive to prevent an unplanned outage.

Tip

You can disable the hot fix redirection area when you create disk partitions, which will save partition space. This can be useful if you are using a RAID system that provides its own fault tolerance. If you do not enable hot fix when the partition is created, you can add it later only by deleting the volumes from the partition, adding hot fix, and restoring the volumes from a backup.

image Repair storage pools instead of individual volumes—Use the repair utilities VERIFY and REBUILD to repair NSS systems. VERIFY and REBUILD function on the pool level rather than the individual volume level. Unlike VREPAIR for traditional NetWare volumes, these utilities should be used only as a last resort to recover the file system after data corruption:

image VERIFY checks the file system integrity for an NSS pool by searching for inconsistent data blocks or other errors. This utility indicates whether there are problems with the file system.

image REBUILD verifies and uses the existing leaves of an object tree to rebuild all the other trees in the system. You need to deactivate pools (and all the volumes in the pools) before you run REBUILD so that users cannot access the volumes you are rebuilding. When you deactivate a storage pool, all the volumes in the pool automatically deactivate.

image RAID supportNSS provides software support for RAID 0 (data striping), RAID 1 (data mirroring), and RAID 5 (data striping with parity) to give you a robust set of options for protecting your server data. You can create and manage software RAID through iManager or through the console-based NSS Management utility (NSSMU).

Understanding these NSS concepts will make it easier for you to plan and manage your NetWare file system.

Planning the File System

Now that you know a little about NSS, you can start planning your OES NetWare file system. Consider the following tips for creating a robust, accessible, and easy-to-manage file system:

image If possible, place SYS in its own storage pool and segregate it from the rest of the non-NetWare applications and data that will be on your OES NetWare server. This will help ensure that the system always has the space it needs for internal operations and promote a stable storage environment for OES NetWare services and utilities.

image To simplify data backup, separate applications and data into distinct volumes. Application volumes will be relatively stable over time, so they can be backed up less frequently than a data volume in which files are changing constantly. For more information about backing up files, see the “Backing Up and Restoring Files” section later in this chapter.

image If different applications will be available to different groups of users, try to organize the applications’ directory structures so that you can assign comprehensive rights in a parent directory. This can help prevent you from having to create multiple individual rights assignments at lower-level subdirectories. For more information about file system rights, see Chapter 7, “Users and Network Security.”

image If you want to use file compression to compress less frequently used files, try to group those types of files into directories separate from other files that are used more often. That way you can turn on compression for the less-used directories and leave it turned off for the frequently used directories. For more information about file compression, see the “File Compression” section later in this chapter.

image Decide whether you want users’ daily work files to reside in personal directories, in project-specific directories, or in some other type of directory structure. Encourage your users to store their files on the network so that the network backup process can back up those files regularly, and so the files can be protected by NetWare security.

image Decide whether you want users to have their own individual home directories.

Tip

You can have home directories created automatically when you create a new user, as explained in Chapter 7.

These tips can help you effectively plan your file system. In addition, you should take into consideration the directories that NetWare creates auto-matically during installation, as well as a plan for directories that will contain applications. These issues are described in the following sections.

NetWare System Directories

When you install a NetWare server for the first time, there are several directories created by the system with which you should be familiar. These directories contain most of the tools, utilities, and configuration files that you need to configure, monitor, and manage your OES NetWare server. All NetWare system-related directories are created in volume SYS:, including the following:

image SYSTEM holds nearly all the NLMs and utilities that you will use to configure, manage, and monitor an OES NetWare server. You will become familiar with SYS:SYSTEM as you look for files, compare file versions, and perform other troubleshooting operations.

image PUBLIC holds all the NetWare tools, utilities, and user-related files for an OES NetWare network. Any user created in a NetWare environment will have default access to SYS:PUBLIC so that he can access the tools he needs to set up his client access. Over time, you can add other utilities to this directory if you want all users to have access to them.

image ETC is similar to the /ETC file in a Unix environment. It mostly holds configuration files related to network communications, such as protocol configuration, routing tables, DNS and DHCP configuration, audit files, and backup configuration files. It also holds several of the default NetWare log files, such as CONSOLE.LOG.

image LOGIN holds those files to which users need access even though they are not yet logged in to the NetWare environment. This includes language-specific files, the graphic elements used with NoRM’s Java-based interface, and the basic utilities necessary to help accomplish a NetWare login.

image APACHE2 and ADMINSRV hold the system files related to the Apache Web Server. This includes the Apache admin server (which supports all OES NetWare web-based administrative tools such as Web Manager, NoRM, and iManager) and the Apache Web Server used for creating an actual website and providing web services hosted on OES NetWare. For more information on Apache Web Server, see Chapter 13OES Web Foundations.”

image TOMCAT holds the system files related to the Tomcat Servlet engine. For more information on Tomcat, see Chapter 13.

Warning

Because the SYS volume contains many directories containing files required for running and managing your NetWare network, do not rename or delete any of them without making absolutely sure they’re unnecessary in your particular network’s situation. This is another good reason not to mix your business applications and data with the system files on SYS.

There are many other directories related to specific services that you can load on an OES NetWare server, and you can create additional directories and subdirectories in volume SYS.

Nonsystem Directories

For files not directly related to NetWare or your network environment, it makes more sense to create a separate file structure. That way there will be fewer chances for problems to be introduced into your core NetWare system through extraneous installation, configuration, or management activities.

You need to consider application and file placement when planning your NetWare file system. By doing so, you can create a file structure in which it is much easier to assign proper trustee rights so that users have access to what they need, without granting them access to things they don’t. For example, general-use applications can be organized in an APPS volume, each in its own subdirectory. That way, rights to these applications can be easily assigned high in the directory structure where they will flow down, through inheritance, to all subdirectories. For more information about file system rights, see Chapter 7.

If an application requires that it be installed at the root of a file system, NetWare gives you the flexibility of installing the application where it makes sense and then creating a root drive mapping to fool the application into thinking it is operating from a root location in the file system. Creating a root drive mapping requires the redirector capabilities of either the Novell client or the NetDrive client. See Chapter 3, “OES NetWare Clients,” for more information on the Novell client. See Chapter 12, “OES NetWare File Access,” for more information on NetDrive.

You can create a map root from the client, but if it is needed for a large number of users, a much better way is to include the map command in the appropriate login script. That way the map operation will be performed automatically when each user logs in and you don’t have to worry about making changes to every workstation. For example, you can add the following command to a container login script to map a root drive for all users within the container:

MAP ROOT S16:=VOL1:APPSABC


For more information about login scripts, see Appendix B, “NetWare Login Scripts.”

If you decide to host an application from the NetWare server, you should flag the application’s executable files as Shareable, Read-Only (S, Ro). This enables the application to be used by multiple users simultaneously, but prevents users from inadvertently deleting or modifying it. This is an additional layer of protection beyond that provided by restricting access to the files at the directory level. For more information on file system rights, see Chapter 7.

Working with NSS Volumes

The first NSS volume, SYS:, was created automatically when you installed OES NetWare. However, you can also create additional storage structures as needed, both during the installation process and after the server installation is complete. Given that, it is probably a good idea to understand the technology and storage concepts a little before you start doing a lot of storage management. You can configure and manage NSS after installation with iManager or the console-based NSS Management utility (NSSMU).

With NSS, you use partitions, storage pools, and logical volumes. You create logical volumes in storage pools that are composed of free space from the various storage devices in your server.

NSS uses free space from multiple storage devices. NSS enables you to mount up to 255 volumes simultaneously and store up to 8 trillion files in a single volume—up to 8TB (terabytes) in size.

The main components of the NSS file system were introduced at the beginning of this chapter. The following sections explain how to create and work with NSS resources.

NetWare Partitions

With NSS, you probably won’t have to manage NetWare partitions directly because they are automatically created to support the storage pools you define. However, if you want a partition-level view or you want to create non-NSS partitions, you can do so from NoRM by following these steps:

1. Launch NoRM and select Partition Disks from the Navigation frame.

2. At the Partition Disks page, you can create a new partition by clicking the Create link next to any of the listed available free space (see Figure 10.2).

Figure 10.2. Using partition disks to manage partitions from NoRM.

image

3. At the File System Creation Operations page, specify the type of volume you want to create and click the creation operation you want to perform. You can choose from NSS, traditional NetWare, and iSCSI partition types. Based on your choice, you will see different options for proceeding with the partition creation process.

It’s easier to work with NSS partitions through iManager because all the tools for pool and volume management are there as well. iSCSI is discussed later in this chapter. For more information on traditional NetWare volumes, see the OES NetWare online documentation.

Storage Pools

A storage pool is a specific amount of space you obtain from one or more storage devices in your server. OES NetWare has integrated the partition-creation process into the process for creating storage pools. NSS storage pools provide the flexibility of NSS. They can be created to span one or multiple partitions on the hardware side, and can be divided into one or multiple logical volumes on the user side.

After a pool is created, you can add storage devices to your server and then expand the pool to include the space available on the new storage device. To create a new storage pool, complete the following steps:

1. Launch iManager, open the Storage link, and select Pools in the Navigation frame.

2. At the Pool Management page, specify the server with which you want to work. This will bring up the storage pool information for that server, as shown in Figure 10.3.

Figure 10.3. Managing storage pools from iManager.

image

3. Click New to create a new storage pool.

4. Specify the name of the storage pool and click Next. Make sure to follow the naming conventions as outlined.

5. At the Select Device and Space page, choose the storage device(s) from which the new storage pool will get its space, specify the amount of space for each device, and then click Finish. Check Activate on Creation if you want the pool to be available as soon as it is created.

After the pool is created, you will be returned to the Pool Management page, from which you can perform various configuration tasks on storage pools and view the characteristics of pools that have been created. Configuration options include the following:

image New—Enables you to create new storage pools, as described previously.

image Delete—Enables you to delete an existing storage pool. You cannot delete the SYS pool in this way because that would remove the NetWare operating system.

image Rename—Enables you to rename an existing storage pool.

image Activate—Makes a pool, and all volumes associated with that pool, available for use.

image Deactivate—Removes a pool, and all volumes associated with that pool, from service. Users cannot access data on an inactive pool. This might be done so you can perform maintenance on the pool or its associated volumes.

image Increase Size—Enables you to add space to a storage pool.

image Snapshot—Creates a point-in-time view of an active storage pool. This is very helpful when backing up pool data because your backup application can back up from the snapshot, thereby avoiding potential open file issues that can make backing up network data so difficult. A pool snapshot will be visible from the Pools view in iManager as a separate storage pool. Information about backing up network data with Novell’s Storage Management Services (SMS) is provided later in this chapter.

image Update eDirectory—If you have modified or renamed a storage pool, use this option to update the eDirectory pool object with the new information and characteristics.

image (Conditional) Deleted Volumes—If you have deleted volumes from a storage pool, you can use this option to salvage or purge those deleted volumes.

image (Conditional) Offline—If you select a pool snapshot, this option is available to take the selected snapshot offline.

These options give you granular control over the management and performance of the storage pools on your NetWare server.

Logical Volumes

After a storage pool has been created, you are ready for NSS logical volumes. NSS volumes can be set to a specific size or set to grow dynamically within the storage pool according to the amount of storage space that is needed over time. When set to grow dynamically, NSS volumes can automatically take advantage of new storage devices after their space is added to their associated storage pool.

After you’ve created the volume, you must mount it before network users can access it. To create and mount a new NSS volume, complete the following steps:

1. Launch iManager, open the Storage link, and select Volumes in the Navigation frame.

2. At the Volume Management page, specify the server with which you want to work. This will bring up the volume information for that server, as shown in Figure 10.4.

Figure 10.4. Managing server volumes from iManager.

image

3. Click New to create a new volume.

4. Specify the name of the volume and click Next. Make sure to follow the naming conventions as outlined.

5. At the Select a Pool and Volume Quota page, provide the required information and click Next:

image Storage pool—Check the box next to the storage pool from which the volume will be created. You can also click the New Pool button to create a new storage pool for this volume. Doing this will drop you into step 4 of the storage pool creation process, discussed previously.

image Allow Volume Quota to Grow to Pool Size—If you don’t want to specify a volume quota, check this box to let the volume grow dynamically to fit the available pool space.

6. At the Attribute Information page, make your selections and click Finish:

image Backup—This option marks the volume data for backup, similar to setting the Archive bit on a file or directory.

image Compression—Turns data compression on for this volume. Compression will use volume space much more efficiently at the cost of read performance. If volume data is not used constantly, compression can be a good idea.

image Data shredding—Instructs NetWare to overwrite deleted data with random characters to prevent recovery with disk reader software. Specify how many overwrite passes to make (1[nd]7).

image Directory quotas—Sets a limit on the amount of space that any directory can occupy. This might be useful for restricting the size of application, log, or user directories you don’t want to grow beyond a certain point.

image Flush files immediately—Instructs NetWare to write data to disk immediately upon file close, rather than waiting for the next write cycle.

image Migration—Enables support for near-line storage, such as optical subsystems. Migration creates a look-up key in the volume’s File Allocation Table (FAT) that describes how to retrieve the data from the near-line storage system.

image Modified file list—Displays a list of files modified since the last backup cycle. This is useful for archive utilities, so they don’t have to scan the entire volume for changed files.

image Salvage files—Instructs NetWare to keep deleted files until the space is needed for new data, so they can be recovered if necessary.

image Snapshotfile level—Instructs NetWare to keep a copy of the last closed version of each open file in this volume. That way, archive utilities can save the copy to provide some protection in the event of data loss.

image User space quotas—Enables you to set usage limits for individual eDirectory users. When a quota is reached, users will be unable to save any more files until they have made space for them by removing other files.

image User-level transaction model—Enables NetWare’s Transaction Tracking System (TTS) for the volume. This helps protect databases from corruption that might occur if a failure happens during a database transaction. With TTS turned on, an incomplete transaction is completely backed out and restored to its original state prior to the transaction. TTS protects data by making a copy of the original data before it is overwritten by new data. Then, if a failure of some component occurs in the middle of the transaction, TTS restores the data to its original condition and discards the incomplete transaction.

Note

TTS is enabled on volume SYS: by default because it is used to protect the eDirectory database from corruption.

image On creation—Enables you to specify whether to activate and/or mount the new volume upon creation. Activating a volume is what makes it available for use. Mounting a volume is a trivial exercise that sets a pointer in the Volume Mapping Table so that NetWare knows how to access it. If left unchecked, you can activate and mount a volume from the Volume Management page in iManager.

After the volume has been created, you will be returned to the Volume Management page, from which you can perform various configuration tasks on existing volumes and view the characteristics of volumes that have been created. Configuration options include the following:

image New—Enables you to create new volumes, as described previously.

image Delete—Enables you to delete an existing volume. You cannot delete volume SYS: in this way because that would remove the NetWare operating system. All data on a deleted volume is removed, but salvage and purge options for deleted volumes are available at the storage pool level.

image Rename—Enables you to rename an existing volume.

image Activate—Makes a volume available for mounting and use by the server.

image Deactivate—Makes a volume temporarily unavailable for use by the server. A volume cannot be mounted while it is deactivated.

image Mount—Makes a volume available for use by network users, who can then access the volumes through any of the access methods supported by OES NetWare.

image Dismount—Makes a volume temporarily unavailable for use by network users.

image Move—Made possible by the NetWare Distributed File System (DFS), the Move option enables you to move an existing volume from its current storage pool to another pool, either on the same server or a different server in the same eDirectory tree. After a move operation, all data is moved automatically, but users can continue to access the data as if it were still in its original location. DFS performs a transparent redirection of requests to the new volume location. DFS is discussed in more detail later in this chapter.

image Split—Also leveraging DFS, the Split option enables you to select any portion of an existing volume, at the directory level, and install it into a new volume, either on the same server or on another server in the same eDirectory tree. After a split operation, all data is moved automatically, but users can continue to access the data as if it were still in its original location. DFS performs a transparent redirection of requests to the new volume location. DFS is discussed in more detail later in this chapter.

image Properties—This option enables you to make changes to volume attributes, as defined when the volume was created. Volume attributes were discussed previously, during the volume creation process.

image User quotas—If you have enabled the User Space Restrictions attribute on a volume, use this option to set those space restrictions. This is often useful for limiting the amount of space available to users’ home directories. For more information on user home directories, see Chapter 7.

image Update eDirectory—If you have modified or renamed a volume, use this option to update the eDirectory volume object with the new information and characteristics.

These volume configuration options give you granular control over the management and performance of the volumes on your NetWare servers.

Mounting a DOS Partition as an NSS Volume

You can mount a server’s DOS partition as an NSS volume so that you can access its files like any other network volume. To do this, load DOSFAT.NSS on the OES NetWare server. Type the following command at the server console:


DOSFAT.NSS


This command loads the necessary NLMs to support the DOS partition as a logical volume. It also mounts the DOS partition as a volume with the name DOSFAT_x, where x is the drive letter of the DOS partition—usually C.

Repairing NSS Pools with REBUILD

When a problem occurs in the NSS environment, repairs are made at the storage pool level rather than at the volume level. This is a change for those of you familiar with VREPAIR.NLM from older versions of NetWare. NSS provides two tools to perform these repair operations:

image VERIFY—This utility checks the file system integrity for an NSS pool by searching for inconsistent data blocks or other errors. This utility indicates whether there are problems with the file system.

image REBUILD—This utility actually makes repairs to the NSS storage pool should they prove necessary. You need to deactivate pools (and all the volumes in the pools) before you run REBUILD so that users do not attempt to access the volumes you are rebuilding. When you deactivate a storage pool, all the volumes in the pool automatically deactivate. REBUILD also copies errors and transactions into an error file called volume_name.RLF at the root of the DOS drive on your server. Every time you rebuild a particular NSS volume, the previous error file is overwritten. If you want to keep old error files, move them to another location. You can check the error file whenever an NSS volume does not come up in active mode after a rebuild.

Note

REBUILD should be a last resort and is seldom necessary. The NSS file system is journaled, meaning that it keeps a log of disk activities while they are executing. When a disk crash or other problem occurs, NSS automatically rolls the file system state back to a known good state and then reexecutes the operations in the journal to bring the system back up to date.

To run VERIFY, which is an assessment of the storage pool, type the following command at the server console:


nss /poolverify


NSS provides a list of pools from which you can select. The VERIFY operation will return a summary screen of storage pool information, as shown in Figure 10.5.

Figure 10.5. Summary report from the console-based VERIFY.

image

Should it become necessary, you can run REBUILD by typing the following command at the server console:


nss /poolrebuild


NSS provides a list of pools from which you can select. REBUILD verifies and accounts for all data blocks in the storage pool. If there are any errors, the errors appear on the screen; otherwise, it reverts to the active state. You must reactivate the pool and remount volume(s) before users can access them again.

Note

There are many other NSS options available from the command line in addition to REBUILD and VERIFY, but much of this functionality is more easily accessible from your web-based management tools. For more information on NSS command-line functions, see the OES NetWare online documentation.

Saving Disk Space

OES NetWare offers a few simple features to help you conserve disk space if it becomes an issue:

image File compression, which compresses less frequently used files, has been shown to conserve up to 63% of your hard disk space. However, your specific experience will vary depending on the types of files being stored on the server.

image Restricting users’ disk space enables you to decide how much room user data can consume on a given volume.

image Purging files enables you to free up disk space by removing files that have been deleted but are still retained in a salvageable state. (You can also salvage deleted files, instead of purging them, but of course that doesn’t free up any disk space.)

Although none of these is a replacement for adding disk space to your server, they can help you keep things running smoothly while you prepare to upgrade your hardware.

File Compression

File compression typically can save up to 63% of the server’s hard disk space by compressing unused files. Compressed files are automatically decompressed when a user accesses them, so the user doesn’t necessarily know that the files were compressed.

Volumes are automatically enabled to support compression should you enable that attribute when the volume is created. You can also enable support for compression after the fact by modifying a volume’s properties with iManager.

After compression is enabled on a volume, it cannot be disabled, except at the server level, using the following SET parameter:


SET Enable File Compression = ON|OFF


This parameter can be set using NoRM and selecting Set Parameters. It is found in the Common File System section. Changing this SET parameter to OFF will suspend compression activities only. There is no way to remove compression capabilities from a volume, except to delete and re-create the volume.

Managing Compression

By default, after the volume is enabled and compression is turned on, files and directories are compressed automatically after they’ve been untouched for 14 days.

You can change several aspects of file compression, however, such as how long the files wait before being compressed, the time of day the compression activity occurs, and which files never get compressed. To control file compression, you can use two file and directory attributes and several SET parameters.

To specify compression for specific files or directories, you can assign them the following file and directory attributes with NoRM. To do this, select the Volumes link in the Navigation frame, and browse to the directory or file for which you want to set the compression attributes:

image Don’t Compress—Instructs NetWare to never compress the file or directory, even if compression is turned on for a parent directory.

image Immediate Compress—Instructs NetWare to compress the file or directory immediately, without waiting for the standard inactivity period.

The SET parameters that affect file compression enable you to control compression characteristics for all enabled volumes on the server. You can set options such as when compression happens, how many files can be compressed at the same time, how many times a file must be accessed before it is decompressed, and so on. The easiest way to view and change these parameters is with NoRM, but you can also use MONITOR.NLM or the appropriate SET console command at the server console.

Warning

Remember that if you change a SET parameter, the change affects all files and directories in all volumes on the server that have been enabled for compression.

To change the SET parameters, complete the following steps:

1. Launch NoRM and click the Set Parameters link in the Navigation frame.

2. In the Set Parameter Categories window, click Common File System.

3. Modify any of the following compression-related SET parameters by clicking the value currently associated with that parameter.:

image Compression Daily Check Stop Hour=HOUR—Specifies the hour when the file compressor stops searching volumes for files that need to be compressed. If this value is the same as the Compression Daily Check Starting Hour value, the search starts at the specified starting hour and goes until all compressible files have been found. The default is 6 (6:00 a.m.). Values range from 0 (midnight) to 23 (11:00 p.m.).

image Compression Daily Check Starting Hour=HOUR—Specifies the hour when the file compressor begins searching volumes for files that need to be compressed. The default is 0 (midnight). Values range from 0 to 23 (11:00 p.m.).

image Minimum Compression Percentage Gain=NUMBER—Specifies the minimum percentage that a file must be able to be compressed to remain compressed. The default is 20. Values range from 0 to 50.

image Enable File Compression=ON|OFF—When set to On, file compression is allowed to occur on volumes that are enabled for compression. If set to Off, file compression won’t occur, even though the volume is still enabled for compression. The default is On.

image Maximum Concurrent Compressions=NUMBER—Specifies how many volumes can compress files at the same time. Increasing this value can slow down server performance during compression times. The default is 2. Values range from 1 to 8.

image Convert Compressed to Uncompressed Option=NUMBER—Specifies how a compressed file is stored after it has been accessed. The default is 1. Values range from 0 = always leave the file compressed; 1 = leave the file compressed after the first access within the time frame defined by the Days Untouched Before Compression parameter, and then leave the file uncompressed after the second access; 2 = change the file to uncompressed after the first access.

image Decompress Percent Disk Space Free to Allow Commit=NUMBER—Specifies the percentage of free disk space that is required on a volume before committing an uncompressed file to disk. This helps you avoid running out of disk space by uncompressing files. The default is 10. Values range from 0 to 75.

image Decompress Free Space Warning Interval=TIME—Specifies the interval between warnings when the volume doesn’t have enough disk space for uncompressed files. The default is 31 min 18.5 sec. Values range from 0 sec (which turns off warnings) to 29 days 15 hours, 50 min 3.8 sec.

image Deleted Files Compression Option=NUMBER—Specifies how the server handles deleted files. The default is 1. Values range from 0 = don’t compress deleted files; 1 = compress deleted files during the next day’s search; 2 = compress deleted files immediately.

image Days Untouched Before Compression=DAYS—Specifies how many days a file or directory must remain untouched before being compressed. The default is 14. Values range from 0 to 100000.

These SET parameters give you robust control over the compression process. However, you should always remember that enabling compression can lead to slower file system performance due to the processor-intensive nature of file compression/decompression.

Restricting Users’ Disk Space

You can restrict how much disk space a user can fill up on a particular volume. This can help prevent individual users from using an excessive amount of disk space. NSS volumes enable you to enable/disable this support through the User Space Restrictions attribute.

To set space restrictions, open the Volumes page in iManager (in the Storage group.) Click User Quotas to open a page from which you can select users and assign them a maximum amount of disk space they can use on a given volume (see Figure 10.6). You can also see how existing restrictions have been set and how much space users have available in their quota.

Figure 10.6. Using iManager to set and view user volume quotas.

image

Purging and Salvaging Files

When files are deleted from a NetWare server, they are not actually removed from the server’s hard disk. Instead, they are retained in a salvageable state. Deleted files are usually stored in the same directory from which they were originally deleted. If, however, the directory itself was also deleted, the deleted files are stored in a special directory called DELETED.SAV at the volume’s root.

EXCEPTIONS TO THE SALVAGEABLE STATE

Deleted files are maintained in this salvageable state unless one of the following occurs:

image The file is salvaged, restoring it to its original form.

image The server runs out of free space on the disk and begins to overwrite files that have been deleted for a specified period of time. The oldest deleted files are overwritten first. A configurable SET parameter defines the amount of time a file must remain deleted before it can be overwritten.

image The administrator or user purges the file. (When purged, a file is completely removed from the disk and cannot be recovered.) You can purge files with ConsoleOne.

image The Immediate Purge attribute can be set at the file, directory, or volume level to prevent files from being salvaged. You can set this attribute with ConsoleOne.

image The administrator uses SET Immediate Purge of Deleted Files = ON. All volumes on that server will immediately purge deleted files. (The default for this parameter is Off.)

After any one of these events occurs, the file is no longer salvageable.

PURGING AND SALVAGING FILES

You, or any user, can use the Novell client utilities to either purge or salvage a deleted file or directory. To do so, right-click the red N in the system tray, select NetWare Utilities, and choose either Salvage or Purge.

You can also use ConsoleOne to salvage and purge files by completing the following steps:

1. Launch ConsoleOne and browse to the directory containing the files or directories you want to salvage or purge.

2. From the View menu, select Deleted File View.

3. In the View window (right side), select a file or directory.

4. Click either the Salvage or Purge button on the ConsoleOne toolbar, as shown in Figure 10.7.

Figure 10.7. Using ConsoleOne to salvage or purge deleted files.

image

5. If you salvage files from an existing directory, the files are restored to that directory. If you salvage files from a deleted directory, the files are restored into the DELETED.SAV directory at the root of the volume.

This provides both users and administrators with a tool for recovering deleted files.

Note

If you have data shredding enabled, it will occur when a file is purged, not when it is deleted. If you have very sensitive materials on which you want to use data shredding, it might be a good idea to enable the Immediate Purge attribute for the file or directory where such data is stored.

NetWare Distributed File System

Distributed File System (DFS) for OES NetWare effectively enables you to directory-enable your NetWare volumes. It enables you to create virtual directory structures of data that exist on multiple servers in the eDirectory tree. A DFS junction can be applied at any point in your file system. All it does is point to the actual location of the volume referred to by the junction. In effect, it is a file system alias.

It is DFS and the DFS junction that makes it possible to move and split NetWare volumes. When a junction is created, a unique ID for the junction is stored in the Volume Location Database (VLDB). When a user requests access to data through a junction, the Novell client uses the junction’s unique ID to search the VLDB for the path to the physical location of the data. It then retrieves and displays the data from its physical location transparently.

Junctions eliminate the need for a user to understand where data is stored on the network. By creating junctions, it is possible to make all a user’s data appear as if it is located on a single server, when in fact it is distributed across several servers. This can greatly simplify the interface to network-stored data and reduce the complexity of drive mappings that must be managed by your IT staff.

Using DFS Junctions

OES NetWare does not include a web-based interface for performing DFS management, so you have to use ConsoleOne if you are going to use DFS. There are a few tasks associated with using DFS, described next.

CREATING A DFS MANAGEMENT CONTEXT

You must create at least one DFS management context in your eDirectory tree. The DFS management context will hold the VLDB. You can create more than one DFS management context if you want to better support a dispersed network infrastructure. That way, VLDBs can be controlled locally. To create a DFS management context, complete the following steps:

1. Launch ConsoleOne and browse to the container object—organization (O) or organizational unit (OU)—that you want to use as the DFS management context.

2. Right-click the container and select New, DFS Management Context.

3. At the Select the Servers screen, select a server or servers to host the VLDB and click Next. Use the right and left arrows to select and deselect servers.

4. At the Specify Database Location screen, specify where you want to store the VLDB on the server and click Finish. The default location is SYS:ETC. Make sure you check Load NLMs automatically when the server restarts if you want VLDB.NLM to load automatically when the server boots.

After the management context is created, you can view VLDB information and perform a few basic VLDB tasks by right-clicking the Server object that is running VLDB and selecting Properties. Double-click the Supported Services tab and select NSS VLDB.

CREATING A DFS JUNCTION

After the DFS management context is created and the service is started on the server you selected, you can create DFS junctions. To create a DFS junction, complete the following steps:

Note

Only NetWare 6 or newer servers can host DFS junctions, but junctions can point to both NSS and Traditional NetWare 5.1 volumes.

1. Launch ConsoleOne and browse to the subdirectory where you want to create a DFS junction. You can also create a new subdirectory for this purpose. You can also select a volume object to create a junction at the root of a volume.

2. Right-click the subdirectory and select New, Shortcut, Junction.

3. At the Target Information screen, browse to the volume to which you want the junction to point and click Next.

4. Specify the name of the Junction object and click Finish. After the junction is created, you might need to refresh ConsoleOne before you will see the new object.

After created, a DFS junction appears as any other directory or folder in your file system. You can leverage DFS junctions using the latest Novell client, the Microsoft Windows CIFS protocol, or the XTier protocol for web services. If you attempt to use a DFS junction from some other method, you will see a small file but will not be able to read or open it.

Moving and Splitting Volumes

Moving and splitting volumes provides unsurpassed flexibility in managing the location of data on your NetWare servers. Moving a volume involves transferring all the data associated with a given NetWare volume to another location, which can be on the same server or a different server in the same directory tree. When a volume is moved, a junction is left behind to point to the new location of the data.

Splitting a volume enables you to move some portion of an NSS volume to a different location, which can be on the same server or a different server in the same directory tree. When a volume is split, a junction is left behind to point to the new location of the data.

A few caveats exist with moving and splitting volumes. They include the following:

image You can move or split volumes only to a destination NSS volume. The source volume for a split must be NSS, but for a move it can be either NSS or traditional.

image When you specify the context for a source volume, use the full context with both leading and trailing dots.

image DFS supports the capability to resume an operation if a server crash or some other type of event interrupts it. When the server restarts, the DFS operation will continue where it left off.

image If at all possible, DFS operations should only be performed during off hours when files in the affected volume are closed. DFS cannot transfer open files, although it can keep track of them and enable you to deal with them manually. For more information, see the OES NetWare online documentation.

Volume moves and splits are performed from iManager. To move a volume, complete the following steps:

1. Launch iManager, open the Storage link, and select Volumes in the Navigation frame.

2. Specify the server that holds the volume you want to Move.

3. Select the volume you want to move and click Move.

4. Specify the name of the server to which you want to move the volume and click Next. If you want to schedule the move operation to take place at some later time, you can specify that as well.

5. Specify the name of the moved volume on the new server and click Next. The volume name must be unique on the destination server and follow all standard volume naming conventions.

6. Specify the storage pool into which the new volume will be created and click Next. You can also create a new storage pool.

7. Select the appropriate volume attributes for the new volume and click Finish.

At this point, all volume data, attributes, and access controls are moved to the new server. To split a volume, complete the following steps:

1. Launch iManager, open the Storage link, and select Volumes in the Navigation frame.

2. Specify the server that holds the volume you want to split.

3. Select the volume you want to move and click Split.

4. At the Split Volume page, specify the name of the server to which you want to move the split portion of the volume, and then specify the directory at which the split should occur. Click Next. If you want to schedule the move operation to take place at some later time, you can specify that as well.

5. Specify the name of the split volume and click Next. The volume name must be unique on the destination server and follow all standard volume naming conventions.

6. Specify the storage pool into which the split volume will be created and click Next. You can also create a new storage pool.

7. Select the appropriate volume attributes for the new volume and click Finish.

At this point, the split portion of the volume will be moved to the location specified. A DFS junction is left at the point of the split so that the data from the split volume will still be accessible as if it were still in its original location.

Network Attached Storage with iSCSI

The small computer system interface (SCSI) is a standard for connecting storage devices to a computer. The SCSI standard requires a specialized 50-pin connector and ribbon cable between the SCSI controller and the hard drive. Given this limitation, SCSI devices typically have to be connected directly, and in close proximity to, the computer for which they are providing disk storage.

iSCSI is a new standard that makes it possible to transmit SCSI communications over a network by encapsulating them in standard TCP/IP data packets. This enables you to create a low-cost Storage Area Network (SAN) using regular high-speed network hardware, and avoid the considerable costs previously associated with fiber-based SAN architectures. A SAN enables you to consolidate network storage resources for multiple OES NetWare servers.

iSCSI can be configured in a variety of ways, including a nondedicated system in which the iSCSI disk array is accessed through the normal network backbone, a dedicated system in which the iSCSI disk array is accessed through a separate network dedicated to serving the needs of the iSCSI environment, and a storage router option in which the dedicated iSCSI network uses specialized iSCSI router hardware to achieve even greater performance. You can evaluate your needs and choose the iSCSI solution that makes the most sense to you.

iSCSI Basics

There are two main components to the OES NetWare iSCSI environment. The software necessary to use an OES NetWare server is installed with the OES NetWare operating system. You don’t have to do any special installation routine to use iSCSI.

Initiator software is installed on each server that will use the shared iSCSI storage. The initiator software enables an OES NetWare server or cluster to communicate with an iSCSI storage server or other iSCSI target over a normal TCP/IP network. At this time, the initiator software is supported only on OES NetWare.

Target software is installed on a NetWare server that will act as a disk controller for the shared iSCSI storage. A shared disk subsystem is attached directly to the OES NetWare server running the target software. The target software enables external initiators to access the shared disk system.

Alternatively, a dedicated iSCSI router can be used for the target, in which case the OES NetWare target software is unnecessary. The iSCSI router must comply with iSCSI Internet Draft Specification 20. A shared disk subsystem is attached directly to the iSCSI router according to the manufacturer’s instructions.

Configuring the iSCSI Environment

When you have determined the best iSCSI architecture for your needs, you are ready to configure the iSCSI environment. If you have chosen to use an iSCSI router as an iSCSI target, refer to the iSCSI storage router documentation for configuration details.

CONFIGURING AN ISCSI TARGET

There are three main steps to configuring OES NetWare as an iSCSI target:

1. Create an iSCSI partition.

2. Load iSCSI target software.

3. Create storage pools and logical volumes on the target disk subsystem.

You can use either NoRM or the console-based NSS Management utility (NSSMU) to create the iSCSI partition on your target subsystem. To create an iSCSI partition with NoRM, complete the following steps:

1. Launch NoRM, making sure that you specify the server name or IP address of the server that will function as the iSCSI target.

2. In NoRM, select Partition Disks in the Navigation frame.

3. In the Content frame, locate the disk subsystem that will be used for iSCSI and click the Create link next to the free space associated with the device.

4. In Partition Type, select Novell iSCSI and click Create a New Partition.

5. Specify the size of the iSCSI partition and click CREATE.

With the iSCSI partition created, load the iSCSI target software on the server by entering the following command at the server console:

ton


You can unload the iSCSI target software by typing the following at the server console:

toff


6. With the iSCSI target software loaded, use iManager to create NSS partitions, storage pools, and logical volumes on the iSCSI partition. The iSCSI partition will appear as a separate disk device to iSCSI initiators, so you still need to create an NSS partition on the iSCSI partition. The process for creating NSS partitions, pools, and volumes was discussed previously in this chapter.

CONFIGURING ISCSI INITIATORS

To configure an OES NetWare server as an iSCSI initiator, you must first load the initiator software on the server by entering the following at the server console:

ion


To configure the initiator software, use NoRM to complete the following steps:

1. Launch NoRM, making sure that you specify the server name or IP address of the server that will function as the iSCSI target.

2. Select the iSCSI Services link in the Navigation frame.

3. In the Content frame, click Add Target.

4. Specify the IP address of the iSCSI target that is connected to the shared storage system and click Next. If the iSCSI disk subsystem is connected to an OES NetWare server, the IP address is that of the NetWare server. If you are using an iSCSI router, the IP address is that of the iSCSI router.

5. Select the target(s) with which you want this initiator to establish an iSCSI session and click Next. Each target listed corresponds to an iSCSI partition you have created, so you can potentially have multiple targets associated with a single IP address.

6. At the server console of the initiator, use the List Devices command to have the server locate the new iSCSI storage device. The iSCSI subsystem will be listed along with other storage devices directly connected to the server.

With the target and initiator configured, you can access the iSCSI disk subsystem as if it were a directly attached resource on each OES NetWare server configured as an initiator for that iSCSI device. Mapping drives, trustee rights, and directory and file attributes will all work identically to a directly connected storage device.

Backing Up and Restoring Files

Although current storage technologies, such as RAID, hot-swappable hard drives, and network-attached storage are making servers ever more secure in their capability to maintain data, there are still many ways in which data can be lost or corrupted. For those situations, it is necessary to have a backup of your network data so that lost files can be recovered.

OES NetWare provides a data backup-and-restore infrastructure known as Storage Management Services (SMS). SMS makes it possible to copy your network data, including files, directories, the eDirectory database, and even data from other servers and clients, to an offline storage system such as tape or optical disk. With a well-developed backup strategy, you can be confident that you will always have a current copy of your network data so you can restore files should the unthinkable occur.

There are several network backup solutions on the market today. The third-party backup solutions for NetWare build upon the SMS foundation to deliver their solutions. OES NetWare includes a fairly basic server-based backup interface called SBCON. This utility will get the job done, but it lacks many of the conveniences, such as flexible scheduling options, that third-party products have.

Backing up network files involves more than just making a copy of the files. It’s important to use a backup product, such as SBCON, that backs up not just the files but also the NetWare information associated with those files, such as trustee rights, inherited rights filters, and file and directory attributes.

A solid backup strategy is critical to the well-being of your network. The following section describes backup strategies that can be employed to protect your valuable data.

Planning a Backup Strategy

Planning is critical to developing an effective backup strategy. A well-planned backup strategy will avoid those headaches associated with finding and restoring files should that be necessary. It will reduce the time it takes to perform data backups and help keep your network humming along. When planning your backup strategy, consider the following:

image How frequently should you make backups?

image What type of medium are you going to use to back up your data?

image How should you rotate your backup media?

image Where will your backup copies be stored?

image How and when will you test the restore procedure?

Tip

Although it is possible to back up eDirectory database files, restoring them is a prescription for major grief. Rather than trying to restore eDirectory objects from tape, use partition replication to restore objects to a server. For more information on eDirectory design and replication, see Chapter 6, “Novell eDirectory.”

PLANNING A BACKUP SCHEDULE

An important part of determining how often you need to back up your data revolves around how rapidly significant changes to your data occur, and how important those changes are. A lot of this depends on your line of business. If your data changes rapidly, and those changes must be protected, you should plan on daily backups of that information. If your data changes more slowly, or if re-creating the lost data isn’t a big deal, perhaps a weekly backup schedule will do the trick.

Backup products enable you to determine not only when to back up your network, but also what types of information you back up each time. There isn’t much point in backing up all your network data every night if only a few of the files are changing each day.

If you don’t need a full backup every time, you can perform what is known as an incremental backup. In an incremental backup, changed files are detected, and only they are backed up. One particularly efficient way of backing up your network involves both incremental and full backup routines.

One day a week, perform a full backup of the network. Then, on each subsequent day during that week, perform an incremental backup of only those files that have changed. Using this strategy, you can restore your entire system, if necessary, by first restoring the weekly backup, and then applying each daily backup to get your files back to their state the day prior to the system failure. This achieves full data protection while minimizing the time it takes to perform the daily backup routines.

Finally, a differential backup is a twist on the incremental backup. Differential backups are the same as incremental backups except that the archive bit is not reset as part of the backup process. This means that each differential backup will include all changed data since the last full backup, eliminating the need to restore multiple backup sessions to recover all file changes since the last full backup.

Tip

Backup products that are NSS-aware can speed up incremental backups significantly by leveraging the NSS Modified File List (MFL). The MFL maintains a list of changed files so that the backup software doesn’t have to review every file manually to see which have changed since the last backup.

Another tip for minimizing backup time is to organize your directory (folder) structure so that often-changed files are separate from seldom-changed files. For example, there’s no point in wasting your time by frequently backing up files such as applications and utilities, which seldom change. If you put applications in one directory and work files in another, you can skip the application directory completely during incremental backups, making the process go faster.

Finally, be sure to document your backup schedule and keep a backup log. A written record of all backups and your backup strategy can help someone else restore the files if you aren’t there.

CHOOSING YOUR BACKUP MEDIUM

Before purchasing a backup device, you must decide what kind of backup medium you want to use. Many manufacturers’ backup products can back up data onto a variety of storage media, but it’s a good idea to know what you want before you buy something that limits your choices. The medium you choose will probably depend on the following factors:

image How much you’re willing to spend.

image How large your network is.

image How long you need to retain your backed-up data. (Some media deteriorate after a few years; other media have a 100-year guarantee.)

Tape is still the most common backup medium in use today, especially in small- to medium-sized businesses. Tapes are relatively easy to use, can be used in any size network, and are fairly inexpensive.

Note

One of the downsides of tape is that backup manufacturers may use different, proprietary tape formats that aren’t compatible with each other. Two tape standards have been established (one from Novell and another from Microsoft), so some efforts have been made to standardize on one or the other, but there are still differences between manufacturers. Be sure any backup product you buy is compatible with any other system with which you need to share tapes.

You should study the pros and cons of the various tape formats to find the best balance between cost and performance before making a decision. For example, SBCON supports the following tape formats:

image 0.25 inch

image 4mm (use only Digital Data Storage[nd]certified tapes)

image 8mm

If you are interested in very long-term storage, tapes suffer because they will break down over time. Optical storage such as CD-writeable disks and DVDs provide a storage medium that is much more resistant to the ravages of time. However, these solutions typically are significantly more expensive than tape solutions, and SBCON does not currently support an optical backup method. You will need to use a third-party solution in this case.

If you are unsure about the best storage medium for you, talk to your resellers about your specific needs and let them help you choose the best fit for your storage needs.

PLANNING THE MEDIA ROTATION

When you are using rewriteable media, such as tapes, plan to have multiple sets of backup media that can be rotated. This way you keep multiple datasets available at all times. If your current backup is corrupted for any reason, you can still fall back to an older copy. Many network administrators use three or more sets of backup media and cycle through them, one each week. That way, three or more backup datasets are available at any given time. The number of tapes or disks you need depends on the rotation schedule you select.

Some backup products offer preset rotation schedules for you. They will automatically prompt you for the right set of media and keep track of the schedule.

DECIDING WHERE TO STORE THE BACKUPS

Another important aspect of your backup strategy is to plan where to store your backups. If you have backups of noncritical data, you might be comfortable keeping them onsite. However, when storing backups onsite, you should at least store them in a room separate from the server’s room. If a fire breaks out in the server room, your backup tapes won’t do you much good if they’re lying melted beside the server.

For mission-critical data, you might need to keep backups in an offsite location. That way, if a physical disaster occurs (such as a fire, flood, or earthquake), they’ll be safe. If the data is critical enough to store offsite, but you also want to have immediate access to it, consider making two copies and storing one offsite and the other onsite.

TESTING THE RESTORE PROCESS

A backup is useful only if the data in it can be restored successfully. Too many people discover, too late, a problem with their backups when they’re in the middle of an important data restore process. One way to avoid this is to practice restoring files in a lab environment. This will not only familiarize your staff with the process, but will also test the quality and integrity of your backup data. By practicing, you can identify problems you didn’t realize you had. Don’t wait until it’s too late.

The correct frequency for testing your restore process is dependent upon the frequency of your backups and the criticality of your data. For very sensitive systems, monthly tests might be necessary, but for most environments, a quarterly test of your restore process will probably be sufficient.

Preparing to Use SBCON

SBCON is a console-based utility included in OES NetWare that can be used to back up all the different file formats that can be stored on your server: DOS, Macintosh, Windows NT/2000/XP, Windows 95/98, and Unix.

There are five major steps involved in configuring the OES NetWare backup system for use:

1. Install the Storage Management Services (SMS) on an OES NetWare server. SMS is the collection of files and utilities that comprise the NetWare backup solution. It also provides a foundation and common interface for third-party vendors that enable their backup applications to communicate with NetWare.

2. Install a backup device and load the device’s drivers on a server. This server will be the host server (the backup server).

3. Load the necessary backup NLMs on the host server.

4. Load the appropriate Target Service Agents (TSAs) on any servers or workstations whose files you want to back up. These servers and workstations are called targets.

5. Launch the Storage Management Engine (SME) on either the host server or a workstation. The SME is the interface from which you will run backup and restore operations. SBCON is the OES NetWare SME.

You will perform the first three steps in this process whether you choose to use SBCON or some other utility as your preferred SME. Several third-party vendors offer backup/restore utilities that function as SMEs. They have designed their systems to integrate with the NetWare SMS so that they don’t have to re-create the low-level interface with the operating system.

INSTALLING STORAGE MANAGEMENT SERVICES

You can install SMS during the installation of OES NetWare by choosing it as an optional Novell service. You also can install SMS after the fact through iManager or the graphical server console. To install SMS through iManager, complete the following steps:

1. Insert the NetWare 6.5 SP3 CD 1 (Operating System) into your workstation.

2. Launch iManager and open the Install and Upgrade link in the Navigation frame.

3. Select Install NetWare 6.5 Products, and then click Remote Product Install in the Content frame.

4. At the Target Server screen, select the server to which you want to install SMS and click Next. Authenticate as an Admin user for your eDirectory tree and click OK.

5. At the components screen, click Clear All and select only Storage Management Services. Click Next.

6. At the Summary screen, click Copy Files. You will be prompted to insert the NetWare 6.5 SP3 CD 2 (Products). After the SMS files are copied, click Close to complete the installation.

With SMS installed, you are now ready to configure the backup/restore environment on your OES NetWare server.

SETTING UP THE HOST SERVER AND TARGETS

Before you can run SBCON, you must first prepare the host server and any targets you want to back up by completing the following steps:

1. Attach the backup device (tape or disk drive) to the host server, following the manufacturer’s instructions.

2. Load the necessary backup device drivers on the host server, again following manufacturer’s instructions.

3. Confirm that the device is loaded, and recognized by NetWare, by launching NoRM and opening Partition Disks. You should see the backup device listed as a device. If you don’t see your backup device listed, use the following console command to register the device with NetWare:

SCAN FOR NEW DEVICES


Tip

Place the commands that load the backup device drivers in the server’s STARTUP.NCF file if you want them to load automatically when the server is rebooted.

4. SMS includes SMSSTART.NCF to load the basic SMS modules on an OES NetWare server. It is stored in SYS:SYSTEM. You can put the SMSSTART command in your AUTOEXEC.NCF file if you want to load SMS modules automatically when the server boots:

image SMDR.NLM—This is the SMS Data Requester. It automatically creates an SMS SMDR Group object in the server’s context. The SMS SMDR Group object will contain each server and workstation to be backed up by this host server.

image TSAFS.NLM—This is the TSA for OES NetWare servers. This module enables you to back up data stored on this server.

Additional SMS modules might also be needed, depending on your specific needs. They must be loaded manually from the server console or the AUTOEXEC.NCF. These optional SMS modules include the following:

image SMSDI.NLM—This is the SMS Device Interface module, which will enable the SBCON program to communicate with the backup device.

image QMAN.NLM—This is the SMS Queue Manager, which will create a job queue for the backup utility to use. The backup queue object is named <servername> Backup Queue (where <servername> is the name of the server on which QMAN.NLM is running).

image TSANDS.NLM—This TSA enables you to back up the eDirectory database. It’s usually best to load this on a server that contains a replica of the eDirectory tree’s largest partition.

Note

Because NSS supports mounting the DOS partition as a logical volume, you can use the nss /DOSFAT command to make the DOS partition accessible to your SMS backup operations.

5. (Optional) If you are going to back up any other target servers from this host server, you need to load the appropriate TSA(s) on the target server. The TSA modules that might be appropriate for a target server, which is not also functioning as a host, include the following:

image TSA600—Load on NetWare 6 target servers.

image TSA500—Load on NetWare 5 target servers.

image TSA410—Load on NetWare 4 target servers.

image TSADOSP—Load on a target server if you want to back up its DOS partition. This NLM is necessary only on older versions of NetWare.

When these steps are completed, the host server is prepared, and the target server is ready to be backed up.

Backing Up Files with SBCON

After you’ve loaded the necessary NLMs on the host server and loaded a TSA on the target server or workstation, you are ready to back up the target’s files. OES NetWare provides SBCON.NLM as a console-based utility for backing up network data.

SBCON enables you to select the type of backup you want to perform. There are three choices (all of which can be customized for your particular needs):

image Full backup—This option backs up all network files. It removes the Archive file attribute—assigned to a file whenever the file is changed—from all files and directories. When the file is backed up, most backup products can remove the attribute so that the next time the file is changed, the attribute is once again assigned.

image Incremental backup—This option backs up only files that were modified since the last full backup. It does not remove the Archive attribute from these files.

image Differential backup. This option backs up only files that were modified since the last full or incremental backup. It removes the Archive attribute from these files.

SMS is cluster-enabled, meaning that it can run on a server cluster. It is also capable of backing up cluster-enabled pools by using the same procedure outlined next for regular SMS targets. For more information on Novell Cluster Services (NCS), see Chapter 8, “Multiprocessor and Cluster Support.”

To use SBCON to back up files, complete the following steps:

1. Load SBCON from the server console. You can also perform these tasks remotely using RConsoleJ. For more information on RConsoleJ, see Chapter 4, “OES Management Tools.”

2. From the main menu, choose Job Administration and then choose Backup.

3. At the Backup Options screen, configure the backup session (see Figure 10.8). When finished, press Esc to save your options:

image Target service—Select the target server to back up. Enter a suitable username and password for the target. Specify the user’s full name, with context and a leading dot.

image What to back up—Press Enter to open the List Resources box. Press Ins and browse the list of volumes, directories, and files until you locate what you want to back up. Press Enter to select the item and Esc to move it to the List Resources box. When you have selected all the resources you want to back up, press Esc to return to the Backup Options menu.

image Description—Enter a descriptive name for this backup session. This description will be used during a restore process, so be as specific as possible. Include dates and specific paths included in the backup session if possible.

image Device/media name—Choose the backup device and medium you will use. If only one device is available, the backup program will choose it for you. Specifying wildcard characters (*.*) will select the default device.

Figure 10.8. The Backup Options screen in SBCON is used to create a new backup job.

image

4. Open the Advanced Options menu to select specific session characteristics for the backup. Press Esc to save your choices:

image Backup type—Specify Full, Differential, or Incremental backup.

image Subsets of what to back up—Specify Include and Exclude options to customize what you want to back up. Use Exclude options when you want to back up most of the file system while omitting only a small part. Everything that you don’t specifically exclude is backed up. Use Include options when you want to back up only a small portion of the file system. Everything you don’t specifically include is excluded.

image Scan options—Specify what types of data to exclude from the backup process. Options include subdirectories, trustee rights, hidden files, and the like.

image Execution time—Specify the time you want the backup to occur. If you don’t modify this, it will start immediately.

image Scheduling—Specify a schedule for the job you are creating, if you want it to run on a regular basis without having to reconfigure it each time.

5. Next to Append Session, select Yes if your backup device enables you to put multiple sessions on a medium, and if one or more sessions are already on the medium you’re using. Select No to overwrite any existing sessions.

6. When asked whether you want to submit a job, select Yes to submit it to the SMS queue.

When the job is submitted, SBCON runs the backup session as configured, at the time specified.

Restoring Files with SBCON

To restore files from a backup, you need to prepare the host server and targets the same way you did for the backup procedure.

After you’ve loaded the necessary NLMs on the host server and loaded a TSA on the target server or workstation, use SBCON to restore files. To use SBCON to restore files to an SMS target server, complete the following steps:

1. Load SBCON from the server console.

2. From the main menu, choose Job Administration and then choose Restore.

3. At the Restore Options screen, configure the restore session (see Figure 10.9). When finished, press Esc to save your options:

image Target service—Select the target server. Enter a suitable username and password for the target. Specify the user’s full name, with context and a leading dot.

image Description—Specify the name for this restore session. This name can be used to identify the restore session in the SBCON job queue.

image Device/media name—Choose the backup device and medium from which you will restore the data. If only one device is available, the backup program will choose it for you. Specifying wildcard characters (*.*) will select the default device.

image Session to Restore—Specify the name of the session that you want to restore. Press Enter to see a list of all available sessions on the device/media you have chosen. You will see the description names you specified when each backup session was created.

Figure 10.9. The Restore Options screen in SBCON is used to restore a backup to an SMS target.

image

4. Advanced Options is the last option on the Restore Options screen. Use it to configure the specific session characteristics for the restore operation. Press Esc to save your choices:

image Rename data sets—If you want to restore the data to a different location, specify the specific path here.

image Subsets of what to restore—Specify Include and Exclude options to customize what you want to restore. Use Exclude options when you want to restore most of the file system while omitting only a small part. Everything that you don’t specifically exclude is restored. Use Include options when you want to restore only a small portion of the file system. Everything you don’t specifically include will not be restored.

image Open mode options—Specify what types of data to exclude from the restore process. Options include data streams, trustee rights, space restrictions, and the like.

image Overwrite parent—Specify whether you want to overwrite existing data that might exist for parent objects, which include servers, volumes, and directories.

image Overwrite child—Choose whether to overwrite files without regard for last backup time or date of existing file.

image Execution time—Specify the time you want the restore operation to occur. If you don’t modify this, it will start immediately.

image Scheduling—Specify a schedule for the job you are creating if you want it to run on a regular basis without having to reconfigure it each time.

When asked whether you want to submit a job, select Yes to submit the restore operation to the SMS queue.

As with the backup process, upon submission, SBCON runs the restore session as configured, at the time specified.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.142.240.210