Solved

Auxiliary Copy support for CA ARC SERVE Backup

Posted on 2010-08-18
8
930 Views
Last Modified: 2012-05-10
Does CA ARC SERVE Backup support Auxiliary Copy. Makes exact copies of backup tapes for redundancy. Copies are quicker to generate than actual backups. Copies can be kept onsite for disaster recovery.
0
Comment
Question by:jobby1
  • 5
  • 3
8 Comments
 
LVL 6

Expert Comment

by:dax_bad
ID: 33472953
Hi Jobby,

What version of CA ARCserve Backup are you using?

For R12 and up:
Use the data migration (Staging) feature to create a Clone/Auxilliary copy

How to set this up:

1. Modify the job you want to make a copy of and select the "staging" tab next to the "source" tab.
2. Select the target group for the first backup set ie. some tape drive or tape library (Your selections in "Destination" tab will now be the destination for the copy of the first backup set).
3. Check "enable staging" and set the media to "*" and the media pool prefix to the prefix of the target pools for the first set (not the copy) then click the "Policy" button.
4. Select the "Miscellaneous" tab (the first to tabs is used to set a delay fro the copy process)
5. Check all checkboxes and enter the media info in the textboxes. Select Append (a new set will be created every full set if using GFS jobs)
  "Media prefix" -> This is the prefix for the actual media name ie. prefix_mediapool_date
  "Media pool" -> ie LAN and if the job is GFS type, then 3 pools will be created with xxx_DLY, XXX_WLY, XXX_MLY.
6. Click ok and then start and follow the guide to submit the job

If you're shipping your copies to more than 1 offsite storage you should consider using media management? This can be a bit cryptic though, and sometimes its easier to just use specific prefixes to identify your tapes and their location ie. call you second copies for Clone_xxx or the likes

For R11.5.4 and down:
You will have to create a script/cmd-let that uses the tapecopy.exe from CA to create copies of your backup sets. This can be run as a post-job execution or as its own generic job.

Hope that answers your question.

Cheers
Daniel
0
 

Author Comment

by:jobby1
ID: 33490875
I believe the auxiliary can be another tape lib. Pls confirm. Do you have the screen shot for the same. I am using version R12
0
 
LVL 6

Expert Comment

by:dax_bad
ID: 33490889
It can...

We are using a virtual tapelibrary (an EMC clariion disk library emulating  an Adic scalar i2000) and a physcical (Adic scalar i500). First backup set goes to the disk library, 2nd copy is made of the 1st set and put on to tapes. You can then if you want a 3third copy, copy the tapes again to tapes so either a

D2T2T (Disk to Tape to Tape) or T2T (Tape to Tape) setup

Under the library/drive selection tabs, you just select the correct target destination for your data


0
 
LVL 6

Expert Comment

by:dax_bad
ID: 33490891
I can attach a screendump on monday if you prefer that :-)
0
Scale it in WD Gold

With up to ten times the workload capacity of desktop drives, WD Gold hard drives employ advanced technology to deliver among the best in reliability, capacity, power efficiency and performance.

 

Author Comment

by:jobby1
ID: 33491083
Ok attach the screen on monday. I can wait. Prefer to have T2T (Tape to Tape) setup
0
 
LVL 6

Expert Comment

by:dax_bad
ID: 33491574
The tape library selected under "Staging" will be used for the first copy, and the tape library selected under "Destination" will be used for the aux copy.
0
 
LVL 6

Accepted Solution

by:
dax_bad earned 500 total points
ID: 33499139
here's the screendumps requested (Create a new job or modify an existing):

CDL is our virtual tape library emulating a physcical ADIC i2000 tape library (1st copy)
ADIC is our physcical ADIC i500 tape library (2nd copy)

Hope this helps
staging.png
policy.png
dest.png
sched.png
0
 

Author Comment

by:jobby1
ID: 33518259
Thank u very much. It worked.
0

Featured Post

Top 6 Sources for Identifying Threat Actor TTPs

Understanding your enemy is essential. These six sources will help you identify the most popular threat actor tactics, techniques, and procedures (TTPs).

Join & Write a Comment

Suggested Solutions

By default, Carbonite Server Backup manages your encryption key for you using Advanced Encryption Standard (AES) 128-bit encryption. If you choose to manage your private encryption key, your backups will be encrypted using AES 256-bit encryption.
VM backups can be lost due to a number of reasons: accidental backup deletion, backup file corruption, disk failure, lost or stolen hardware, malicious attack, or due to some other undesired and unpredicted event. Thus, having more than one copy of …
This tutorial will walk an individual through configuring a drive on a Windows Server 2008 to perform shadow copies in order to quickly recover deleted files and folders. Click on Start and then select Computer to view the available drives on the se…
This tutorial will show how to configure a new Backup Exec 2012 server and move an existing database to that server with the use of the BEUtility. Install Backup Exec 2012 on the new server and apply all of the latest hotfixes and service packs. The…

746 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

12 Experts available now in Live!

Get 1:1 Help Now