Solved

Tivoli and Symantec Endpoint

Posted on 2013-12-30
7
1,034 Views
Last Modified: 2014-05-07
Dear Team,

        We have sql failover cluster ( Node-1,Node-2)  Domain ( Node-3) and Backup server (Node-4). Installed TSM sql client on Node-1&2, Taking backup using Tivoli 5.5 for the past 3 years. Installed Symantec Endpoint protection on Node-1&2, Now the backup performance has dramatically reduced like 32-40 MB/s. Before symmantec it was 92-100 MB/s.
Please advise
0
Comment
Question by:dinagaran2000
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
  • 2
  • 2
7 Comments
 
LVL 59

Expert Comment

by:Kevin Cross
ID: 39748373
If I remember correctly (it's been over 8 years), my old company that used Tivoli and Symantec together ran into this issue.  The problem was SAV's live scan.  I know we ended up removing SAV completely on some systems, but I remember that being the combination of Symantec, Tivoli, and Netware client.  However, you may need to consider that option if the issue persists.  

As a first attempt, though, disable SAV's real-time protection and schedule scans when backups are not running.  If that fixes the issue, you can look into activating real-time scan but excluding specific directories.  I will try to research and see if I find specific ones as it has been a while.  I would target Tivoli and SQL backup directories (vaguely remember it was trying to scan temp files and SQL files being copied by Tivoli).  Again, I will see if I can find a KB article.
0
 
LVL 16

Accepted Solution

by:
max_the_king earned 500 total points
ID: 39750878
Hi,
you should at least exclude from AV scanning:

1. entire directories where the SQL DBs are
2. the C:\program files\Tivoli\tsm directory

hope this helps
max
0
 
LVL 59

Expert Comment

by:Kevin Cross
ID: 39751133
Thank you for the confirmation, max_the_king!  I could not find the specific KB article, but I was certain it was real-time scan exclusions of the above directories that fixed the problem for us.
0
Free eBook: Backup on AWS

Everything you need to know about backup and disaster recovery with AWS, for FREE!

 
LVL 38

Expert Comment

by:younghv
ID: 40048458
I've requested that this question be closed as follows:

Accepted answer: 500 points for mwvisa1's comment #a39748373

for the following reason:

This question has been classified as abandoned and is closed as part of the Cleanup Program. See the recommendation for more details.
0
 
LVL 16

Expert Comment

by:max_the_king
ID: 40048459
Hi,
i cannot find any "mwvisa1" comment on this question ...
0
 
LVL 38

Expert Comment

by:younghv
ID: 40048478
max -
Next time, just click on the hyperlink (Accepted answer: 500 points for mwvisa1's comment http:#a39748373).
This question was posted before the changes allowing EE Members to modify their own display name.
0

Featured Post

Use Case: Protecting a Hybrid Cloud Infrastructure

Microsoft Azure is rapidly becoming the norm in dynamic IT environments. This document describes the challenges that organizations face when protecting data in a hybrid cloud IT environment and presents a use case to demonstrate how Acronis Backup protects all data.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

In this article we will get to know that how can we recover deleted data if it happens accidently. We really can recover deleted rows if we know the time when data is deleted by using the transaction log.
Workplace bullying has increased with the use of email and social media. Retain evidence of this with email archiving to protect your employees.
This tutorial will walk an individual through the steps necessary to install and configure the Windows Server Backup Utility. Directly connect an external storage device such as a USB drive, or CD\DVD burner: If the device is a USB drive, ensure i…
This tutorial will walk an individual through the process of configuring basic necessities in order to use the 2010 version of Data Protection Manager. These include storage, agents, and protection jobs. Launch Data Protection Manager from the deskt…

733 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question