Quantcast
Channel: The Official System Center Data Protection Manager Team Blog
Viewing all 293 articles
Browse latest View live

DPM 2012 : Enhancements to Hyper-V Protection

$
0
0

DPM-2010-logo_thumb_thumb_thumb_thum

Data Protection Manager for System Center 2012 provides significant performance improvement for backup and more flexibility in recovery for Hyper-V deployments.

Hyper-V Express Full Backup: DPM 2012 has made significant improvement in Stand Alone Hyper-V backup performance by extending the Change Block Tracking for the Hyper-v on a standalone installation workload.  With Change Block Tracking, DPM transfers only the changed blocks to DPM server rather than reading the complete VHD files to find the changed blocks.  Apart from improving the backup performance (and so allowing admins to have more RPOs), the enhancement improves the overall Hyper-V server performance by reducing the number of IOs required for a backup. 

Hyper-V ILR option when DPM installed on a Guest:  Ability to recover only “required” files off of a backed up virtual machine is one of most sought after feature (called ILR) in Hyper-V Workloads of DPM.  With DPM 2010, customers were able to do ILR when DPM installed on a physical machine.  As virtualization is getting more and more prominent in enterprise deployments, DPM customers have been looking for ways to deploy DPM on a guest OS.  With DPM 2012, DPM 2012 deployment on a guest will also be able to provide Hyper-V ILR feature.  Also, the ILR can now be used in more scenarios of DPM physical deployments. 

 

The following matrix captures the enhancements and difference between DPM 2010 and DPM 2012.

DPM Version

2k8

2k8R2

DPM 2010 installed on physical machine

Hyper-v feature need to be enabled on the DPM Server to recover using ILR feature.

Hyper-v feature need to be enabled on the DPM Server to utilize ILR feature.

DPM 2012 installed on physical machine

Hyper-v feature need to be enabled on DPM Server to recover using ILR feature.

No pre-requisites

 

- On Behalf of

Neela Syam Kolli | Senior Program Manager | Microsoft Corporation


System Center Data Protection Manager 2012 agent installation fails with error 319

$
0
0

hotfixJust a quick heads up on one more new KB article we published today:

=====

Symptoms

Pushing the System Center Data Protection Manager 2012 (DPM) agent to a target computer fails with the following error:

Install protection agent on name.domain.com failed:
Error 319: The agent operation failed because of a communication error with the DPM Agent Coordinator service on name.domain.com.
Error details: The RPC server is unavailable (0x800706BA)
Recommended action: 1) Verify that name.domain.com is remotely accessible from the DPM server.
2) If a firewall is enabled on name.domain.com, make sure that it is not blocking requests from the DPM server. Refer to the DPM Deployment Guide for more information on configuring the firewall for DPM.

The DPM-Alerts event log displays the following event.

Log Name: DPM Alerts
Source: DPM-EM
Date: <date>
Event ID: 370
Task Category: None
Level: Warning
Keywords: Classic
User: N/A
Computer: name.domain.com
Description:

Agent operation failed. (ID: 370)
The agent operation failed because of a communication error with the DPM Agent Coordinator service on name.domain.com. (ID: 319)

Cause

The Windows firewall on the target computer blocked dpmac.exe from accepting incoming network connections.

Resolution

Temporarily disable the Windows Firewall on the target computer when deploying the agent. Once the installation completes the Windows Firewall can be re-enabled.

More Information

Enabling Windows Firewall logging (default location: %windir%\System32\LogFiles\Firewall) may list no blocked packets but you will notice the following event:

The Microsoft Windows Firewall event logs contains the following event.
Log Name: Microsoft-Windows-Windows Firewall With Advanced Security/Firewall
Source: Microsoft-Windows-Windows Firewall With Advanced Security
Date: <date>
Event ID: 2011
Task Category: None
Level: Information
Keywords:
User: LOCAL SERVICE
Computer: name.domain.com
Description:
Windows Firewall was unable to notify the user that it blocked an application from accepting incoming connections on the network.

Reason: Inbound notifications are not enabled
Application Path: C:\windows\microsoft data protection manager\dpm\protectionagents\ac\4.0.1617.0\dpmac.exe
IP Version: IPv6
Protocol: TCP
Port: 5719
Process Id: 3740
User: SYSTEM

Note In some instances the initial attempt to push the agent to the protected server will fail with the error below and subsequent installations fail with the 319 error:

Install protection agent on name.domain.com failed:
Error 347: An error occurred when the agent operation attempted to create the DPM Agent Coordinator service on name.domain.com.
Error details: Security must be initialized before any interfaces are marshalled or unmarshalled. It cannot be changed one initialized.
Recommended action: Verify that the Agent Coordinator service on name.domain.com is responding, if it is present. Review the error details, take the appropriate action, and then retry the agent operation.

=====

For the most current version of this article please see the following:

2621989: System Center Data Protection Manager 2012 agent installation fails with error 319

J.C. Hornbeck | System Center Knowledge Engineer

App-V Team blog: http://blogs.technet.com/appv/
AVIcode Team blog: http://blogs.technet.com/b/avicode
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
OOB Support Team blog: http://blogs.technet.com/oob/
Opalis Team blog: http://blogs.technet.com/opalis
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
OpsMgr Support Team blog: http://blogs.technet.com/operationsmgr/
SCMDM Support Team blog: http://blogs.technet.com/mdm/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

clip_image001 clip_image002

Configuring SMTP Server information in System Center Data Protection Manager fails with error ID: 2013

$
0
0

hotfixJust a quick heads up on one more new KB article we published today:

=====

Symptoms

Configuring SMTP Server information in System Center Data Protection Manager 2010 and System Center Data Protection Manager 2012 (DPM) fails with the following error:

ID: 2013
Details: Logon failure: unknown user name or bad password

Cause

This can occur if you configure credentials for a non-authenticated SMTP server as DPM expects credentials for an authenticated SMTP server. Configuring a non-authenticated SMTP server only supplies the SMTP server name, server port, and "from" address. Because of this, DPM passes incorrect information resulting in the error.

Resolution

Fill in all the fields of the SMTP Server dialog with the correct information including a username and password.

More Information

DPM requires the population of ALL the fields under the SMTP Server options regardless whether the SMTP server accepts anonymous connections or not.

When providing a username and password, ensure the account has administrative privileges on the DPM server. A non-administrative account receives the following error.

An authentication error occurred when trying to connect to the SMTP server. (ID: 518)
You typed an incorrect user name, password, or SMTP server name. Type the correct user name or password to enable e-mail delivery of reports and alerts notifications.

=====

For the most current version of this article please see the following:

2020373: Configuring SMTP Server information in System Center Data Protection Manager fails with error ID: 2013

J.C. Hornbeck | System Center Knowledge Engineer

App-V Team blog: http://blogs.technet.com/appv/
AVIcode Team blog: http://blogs.technet.com/b/avicode
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
OOB Support Team blog: http://blogs.technet.com/oob/
Opalis Team blog: http://blogs.technet.com/opalis
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
OpsMgr Support Team blog: http://blogs.technet.com/operationsmgr/
SCMDM Support Team blog: http://blogs.technet.com/mdm/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

clip_image001 clip_image002

System Center Data Protection Manager storage pool Dynamic Disk goes offline after rebooting

$
0
0

hotfixHere’s another new KB article we published today. This one describes and issue where a dynamic disk goes offline after a reboot:

=====

Symptoms

Consider the following scenario:

 

  • You have a Windows Server 2003 Service Pack 2 computer running System Center Data Protection Manager (DPM).
  • The storage pool for DPM is presented through the iSCSI initiator.
  • You add the disk to the storage pool and disk is converted to a dynamic disk.
  • The dynamic disk is used for replica and recovery point backup.

After rebooting the DPM server, the dynamic disk shows to be offline.

Cause

The disk shows to be offline because the recovery point creation fails with the error "Replica is inconsistent".

Resolution

To resolve this issue complete the following steps:

1. Configure the DPM service startup type to Automatic.

2. Reboot the DPM server.

3. Check the Disk in the Disk Management console and verify that it remains online.

More Information

The iSCSI user guide says dynamic disks are not supported on Windows Server 2003, Windows XP or Windows 2000 servers.

http://download.microsoft.com/download/A/E/9/AE91DEA1-66D9-417C-ADE4-92D824B871AF/uGuide.doc

While the iSCSI User Guide indicates that this scenario is not supported, DPM has code to activate dynamic disks when DPM needs to read or write to a disk in the DPM storage pool. The timing issues mentioned in the Users Guide may result in the End User Recovery shares failing to come back on line until you stop and restart the server service.

Using an iSCSI disk for the DPM storage pool in DPM 2007 when running Windows Server 2003 is supported but may result in unexpected behavior from the DPM Server, especially during a restart of the DPM Server.

=====

For the most current version of this article please see the following:

2008480: System Center Data Protection Manager storage pool Dynamic Disk goes offline after rebooting

J.C. Hornbeck | System Center Knowledge Engineer

App-V Team blog: http://blogs.technet.com/appv/
AVIcode Team blog: http://blogs.technet.com/b/avicode
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
OOB Support Team blog: http://blogs.technet.com/oob/
Opalis Team blog: http://blogs.technet.com/opalis
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
OpsMgr Support Team blog: http://blogs.technet.com/operationsmgr/
SCMDM Support Team blog: http://blogs.technet.com/mdm/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

clip_image001 clip_image002

Troubleshooting Data Protection Manager System State and Bare Metal Backup

$
0
0

toolsignHello, Shane Brasher here. I’d like to go over some very basic troubleshooting steps used to narrow down some common causes on initial replication and just plain replication failures for System State and Bare Metal backups.

Troubleshooting a System State or BMR backup failures can be frustrating as there are a lot of underlying components that come into play during the process. This post is not to discuss the Data Protection Manager (DPM) architecture but rather basic troubleshooting by approaching the problem in a logical way. The steps below offer a guideline to resolving these issues.

Does a system state backup fail or does the BMR fail? This is an important question as the backup for system state and BMR are handled differently. A system state backup uses the Windows Server Backup feature to take a snapshot of the system state and saves it locally to the server before moving it to the DPM server storage pool. A BMR backup uses also uses the Windows Server backup feature but once the snapshot is taken, it moves the data directly to the DPM server without saving it locally first.

As you may already know, a BMR backup includes the system state. Realizing this, there are two questions:

a.) Is it the system state failing?

OR

b.) Is the system state succeeding but it’s the BMR that failing.

This is easily narrowed down by just selecting the System State in the protection group. If this fails then we can narrow this down even further in the next step discussed later on. If the system state succeeds, then add the BMR to the protection. If this fails then we can narrow this down even farther by looking into the VSS writers, amount of space etc….. discussed later.


Can you take a system state or BMR backup locally via wbadmin or does this also fail?
This is another key question to ask ourselves. Again, DPM triggers the Windows Server backup feature to take the system state snapshot. If the WSB on the local server is not functioning correctly for the snapshot, then DPM never comes into the picture. The WSB feature must be functioning properly for this to be a success. This can be done by the command prompt to test out this functionality.

For system state: Wbadmin start systemstatebackup -backuptarget:e:
For BMR: wbadmin start backup -allcritical -backupTarget:<any existing drive name>:

If the commands above fail, then DPM never comes into the picture and an investigation as to what may be wrong with the WSB on that local server should be looked into. Event logs, Backup Event logs and WSB backup logs can be useful tools from this point.

Backup event logs:

clip_image002

DPM Event Logs:

Error#1
Log Name: DPM Alerts
Source: DPM-EM
Date: 
Event ID: 3106
Task Category: None
Level: Error
Keywords: Classic
User: N/A
Computer: HyperVServer.Contoso.com
Description:
The replica of System Protection on HyperVServer.Contoso.comis inconsistent with the protected data source. All protection activities for data source will fail until the replica is synchronized with consistency check. (ID: 3106) DPM is out of disk space for the replica. (ID: 58)

Error #2
Log Name: DPM Alerts
Source: DPM-EM
Date: 
Event ID: 3100
Task Category: None
Level: Warning
Keywords: Classic
User: N/A
Computer: HyperVServer.Contoso.com
Description:

The used disk space on the computer running DPM for the replica of System Protection has exceeded the threshold value of 90%, or there is not enough disk space to accommodate the changed data. If you do not allocate more disk space, synchronization jobs may fail. (ID: 3100)

WSB logs

Leveraging WSB backup logs located in %windir%\logs\WindowsServerBackup .
You will need to convert the etl logs in order to be read. This can be done via Logparser found at: LogParser:

http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=24659

Example: Note the highlighted in red below which clearly shows that the local server does NOT have enough free space available for the snapshot.

2]15cc.134c 04/08/2011-19:17:48.895 [blbengutils Blbvhdhelper.cpp@2153] EXIT: CBlbVhdHelper::GetVolumeVHDInfo
[2]15cc.134c 04/08/2011-19:17:48.895 [blbengutils BlbFillCatalogTemplateInfo BlbCatalogUtils.cpp@1542] INFO:ullTotalSourceSpace = (1745592774144) ullTotalSourceFreeSpace = (819589386752)ullExcludedFileSize = (34346196992)
[2]15cc.134c 04/08/2011-19:17:48.895 [blbengutils BlbFillCatalogTemplateInfo BlbCatalogUtils.cpp@1554] ERROR:Backup target space is not enough, TotalSourceSpace(1745592774144), TotalSourceFreeSpace(819589386752), TotalExcludedFileSize(34346196992), ReclaimableSize(0), CurrentBackupSize(0), TotalTargetFreeSpace(80434085888)
[2]15cc.134c 04/08/2011-19:17:48.895 [blbengutils BlbSecurityUtils.cpp@1203] ENTER: CBlbImpersonationHelper::Revert
[2]15cc.134c 04/08/2011-19:17:48.895 [service engine.cpp@4046] EXIT: CBlbEngine::CreateTemplate
[0]14EC.14A4::04/08/2011-19:17:48.895 [clinew]CreateTemplate failed: 0x80780048
[0]14ec.14a4 04/08/2011-19:17:48.895 [clinew backup.cpp@2401] ENTER: PublishBackupFailureEvents
[0]14ec.14a4 04/08/2011-19:17:48.895 [clinew CBLBCli::OutputOnConsole blbcli.cpp@842] INFO:CLIOUTPUT:There is not enough free space on the backup storage location to back up the data.
[0]14ec.14a4 04/08/2011-19:17:48.895 [util blbtrace.cpp@853] ENTER: BlbStopTracing

Are there any vss related errors in either the event log of the DPM or target server? For all backups, we leverage Volume Shadow Copy service (VSS) to take the snapshots. If VSS is not healthy, then a successful backup to the DPM server may not be successful. If an issue with VSS is severe enough, then a volume may actually be thrown into “shadow copy protected” mode and successful backups will fail until this is rectified. A good proactive measure can be taken by making sure you have the latest VSS by way of Windows Update and\or the latest version via hotfix.

What’s the state of the VSS writers? Is it performing a snapshot? Check the health of the vss writers on the protected server by the use of a simple command from a command prompt.

vssadmin list writers”--do the writers show up in a failed or hung state. A “waiting for completion” is
normail but a failed state indicates an issue. Make sure the ASR (Automated System Recovery)
writer is in a healthy state.
vssadmin list shadows”- --do you see a snapshot being taken? If you never see a snapshot being
taken on the protected server before being transferred to the DPM server, then a harder look at the
protected server needs to be done.

Are the page files for both the target and DPM server set correctly? Page file allocation is very important on both the DPM server and the target server. This is even more so if the server is under a heavy load. As a general rule of thumb a server needs to have 1.5 x RAM installed for a pagefile.
DPM is a little more demanding than that as covered in:
http://technet.microsoft.com/en-us/library/ff399244.aspx : “DPM requires a pagefile size that is 0.2 percent the size of all recovery point volumes combined, in addition to the recommended size (generally, 1.5 times the amount of RAM on the computer). For example, if the recovery point volumes on a DPM server total 3 TB, you should increase the pagefile size by 6 GB.”

I highlighted the word “requires” to emphasis that this is not really a suggestion or an option so much as DPM will need this as a minimal requirement in order to function optimally.

Do you have enough free space on both the target server and the DPM server? On the target server, if there is not adequate free space for the snapshot of the system state to be saved, then this effort will fail. If you have more than one disk at your disposal, then you can work around this by altering the PSDatasourceConfig.xml file on the protected server to save the system state to another location.
This article explains the process to accomplish this: Backup of Protected Computer System State
http://technet.microsoft.com/en-us/library/bb809015.aspx
As a general rule of thumb the system state will typically require 15 GB of space on the computer. Of course this will vary from server to server depending on the bloat of the registry.

If there is not enough free space on the DPM server replica or recovery point volume, then you will need to allocate more space for this datasource in the protection group. This can be done by following the steps outlined in “How to Modify Disk Allocationhttp://technet.microsoft.com/en-us/library/ff399705.aspx
If you do not have enough space in the storage pool, then you can add another disk to accommodate your growth. Adding Disks to the Storage Pool http://technet.microsoft.com/en-us/library/ff399691.aspx

Let’s assume that you have allocated additional space in the replica volume and recovery point volume for some growth and you’ve selected to option for autogrow. If you have issues with autogrow failing, then you can reference the following article on how to troubleshoot as to what may be the cause.

How to use and troubleshoot the Auto-heal features in DPM 2010
http://blogs.technet.com/b/dpm/archive/2011/06/06/how-to-use-and-troubleshoot-the-auto-heal-features-in-dpm-2010.aspx

Is the windows server backup service installed? As mentioned before, this feature must be installed on the target server in order for either the system state or BMR backup to take place. This is an easy thing to check for with in server manager and can be added as a feature.

Common error if the WSB role is not installed:

“DPM failed to create the system state backup. If you are trying to create the system state of a Windows 2008 Server operating system, verify that the Windows Server Backup (WSB) is installed, and that there is enough free disk space on the protected server to store the system state. (ID 30214 Details: Internal error code: 0x809909FB)

Be aware of possible conflicting jobs by other applications. Leverage the system and application event logs and the trace logs. The DPM trace logs found in %Program Files%\Microsoft DPM\DPM\Temp, are name MSDPMCurr.errlog etc…. They can be opened with notepad an analyzed. Although not always intuitive, you can find the relevant pieces to note by searching for the Protection Group name or the server name.

Trace logs example:
*************
12C0 17C0 03/09 15:22:02.094 01 TaskExecutor.cs(334) D3BA345D-6222-4E34-86FB-37C12608671D WARNING <q1:Parameter
Name="protectedgroup" Value="TestServer-System_State-BMR" />

12C0 17C0 03/09 15:22:02.094 01 TaskExecutor.cs(334) D3BA345D-6222-4E34-86FB-37C12608671D WARNING <q1:Parameter Name="datasourcename" Value="System Protection" />

12C0 17C0 03/09 15:22:02.094 01 TaskExecutor.cs(334) D3BA345D-6222-4E34-86FB-37C12608671D WARNING <q1:Parameter Name="servername" Value="TestServer.contoso.com" />

12C0 17C0 03/09 15:22:02.094 01 TaskExecutor.cs(269) D3BA345D-6222-4E34-86FB-37C12608671D NORMAL Task retired abnormally (error=SimilarTaskExistsForDatasource; 0; None)

Note the error=SimilarTaskExistsForDatasource

Common Questions:

Question 1) When DPM 2010 backups the system state to tape, does it backup system state straight to tape, or does it backup to a folder on local disk and then backups up the systemstatebackup folder to tape?

Answer 1) Windows server backup creates a local Systemstate backup, then DPM will backup that folder to the tape.

Question 2) Does the systemstatebackup folder get deleted after the backup is complete or does the folder remain on the local disk?

Answer 2) The folder remains on the local disk and will be overwritten by the next systemstate backup.

Questions 3) Upon a BMR backup I don’t see a WindowsImageBackup folder created or I don’t see it’s contents change when the BMR backup is taking place?

Answer 3) BMR backups are directly written to the storage pool disk.

Question 4) Can you perform a BMR to directly to tape?

Answer 4) No you cannot. DPM will give you the following warning:

clip_image003

Question 5) A BMR backup on one server is much larger than a BMR backup on another as a comparison?

Answer 5) This will depend on what is in the critical volume and registry size. The BMR backup will include a critical volumes.

Example: I once worked on an issue to where a BMR backup of one HyperV server was taking over 1 TB of space on the DPM storage pool. The cause was that they had all of the VHD’s on the C:\. Since a BMR backup includes the critical volume, in this case C:\, it will add the VHD’s to that backup. This required a huge amount of space needed to accommodate the VHD’s.

Hopefully for those of you who have issues with System State and BMR backups, this blog post can offer you some assistance on making some progress when addressing those problems.

Resources

Videos:

System State: http://www.microsoft.com/showcase/en/us/details/bb0b5339-445b-4298-8705-350f13227b93

BMR: http://www.microsoft.com/showcase/en/us/details/bec0b1c6-d1fd-41f0-b4bc-df5791dfc68d

Articles:

139822 How to Restore a Backup to Computer with Different Hardware
http://support.microsoft.com/default.aspx?scid=kb;EN-US;139822

263532 How to perform a disaster recovery restoration of Active Directory on a computer with a different hardware configuration
http://support.microsoft.com/default.aspx?scid=kb;EN-US;263532

249694 How to move a Windows installation to different hardware
http://support.microsoft.com/default.aspx?scid=kb;EN-US;249694

Backup of Protected Computer System State
http://technet.microsoft.com/en-us/library/bb809015.aspx

How ASR Works
http://technet.microsoft.com/en-us/library/cc758365(WS.10).aspx
Automated System Recovery (ASR) in Windows Server 2008 and Vista SP1
http://blogs.technet.com/b/filecab/archive/2008/02/11/automated-system-recovery-asr-in-windows-server-2008-and-vista-sp1.aspx

Deciding between System State Backup and Allcritical Backup in Windows Server 2008
http://blogs.technet.com/b/filecab/archive/2009/05/04/deciding-between-system-state-backup-and-allcritical-backup-in-windows-server-2008.aspx

Shane Brasher | Senior Support Escalation Engineer

App-V Team blog: http://blogs.technet.com/appv/
AVIcode Team blog: http://blogs.technet.com/b/avicode
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
OOB Support Team blog: http://blogs.technet.com/oob/
Opalis Team blog: http://blogs.technet.com/opalis
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
OpsMgr Support Team blog: http://blogs.technet.com/operationsmgr/
SCMDM Support Team blog: http://blogs.technet.com/mdm/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

clip_image001 clip_image002

Data Protection Manager 2010 and Bare Metal Restore

$
0
0

toolsignHello, I’m Shane Brasher and I’m part of the Microsoft System Center Data Protection Manager team. I’d like to discuss the process of performing a successful Bare Metal Restore (BMR) via Data Protection Manager 2010.

So everything is running fine, but then the phone rings….there’s been a catastrophic failure of a critical server that needs to be up and running yesterday. You have a Bare Metal backup of this server in DPM - so now what? Which buttons do I click? Which options do I choose?

Just like a System State backup, BMR uses the Windows Server Backup feature on the target server for both a BMR backup and restore. There is one main difference on the backup process however. A System State backup saves the System State locally to the target server before transferring the data to DPM; a BMR backup copies the snapshot directly to the BMR storage pool.

Let’s walk through the process of completing a Bare Metal Restore to a DPM protected server. We are operating under the assumption that you have successfully installed the DPM agent on a protected server and have a successful BMR backup for that server. The process is as below.

General BMR Restore Process

1. Recovery the BMR to a network share

2. Give the share correct permissions

3. Boot to the 2008 or 2008R2 install DVD

4. Select the “Repair your computer” option

5. Go through the prompts for the restore

Bare Metal Restore Walkthrough

This environment involves:

1 member server
1 DC
1 Data Protection Manager 2010

Walkthrough

We will start by making sure we have the BMR recovery points created. Once done, we will restore the recovery point to a network share.

Here we see that we have a BMR backup successfully taken which resides on the DPM server:

clip_image002

Recover the BMR to a network share
We go to the recovery tab and select the server for which we have the BMR backup taken. Right click on Bare Metal Recovery and elect to “Recover”:

clip_image004

The Recovery wizard starts and we select to restore to a network folder:

clip_image006

We then select the folder on the local DPM server previously created for the restore:

clip_image008

Note: The network share does not have to reside on the DPM server, but rather any share that is accessible to the target server.

We then choose to “apply security settings of the destination computer”:

clip_image010

We then see a summary of our choices:

clip_image012

Once started, we can see the Recovery Status:

clip_image014

We can also go to the Monitoring tab and select the “Jobs” tab to also see the job in progress there as well.

clip_image016

Once finished, we will need to give the share in which we restored to proper permissions.

Giving the share the correct permissions

Looking at the folder structure, we see the following:

clip_image018

It’s the “DPM_Recovered_At_<Date-Time>” folder we will need to give “read” permissions to. In this case we will share the folder with the name of “BMRRestore”:

clip_image019

And will give this folder “read” permissions:

clip_image021

Boot the target server to the 2008 or 2008R2 install DVD.

After you place the install DVD into the target server, elect to go through the install process:

clip_image022

Select to “Repair your computer” in the bottom left corner:

clip_image024

You will get a display that will show the currently installed operating systems that are options to perform the BMR for. In this case, we have just one selection:

clip_image025

The recovery tool window now populates. We will select the “Windows Complete PC Restore” option:

clip_image026

A prompt now displays a failure for a backup location. You can select “cancel” as we will be performing a BMR restore over the network and not from a local location residing on this server:

clip_image027

Once “cancel” is selected you will see a window that will allow us an option to “Restore a different backup” radio button. Once you select that, choose “next”:

clip_image028

In the next window, we select the “Advanced” button:

clip_image029

From this, we need to specify to “Search for a backup on the network”:

clip_image030

clip_image031

This is assuming that you have a functioning DHCP server on the network to allocate ip addresses.

NOTE: Again, at this point we are operating under the assumption that there is a functioning DHCP server online providing ip addresses. If not then netsh can be used to assign an ipaddress.

a. Shift+F10 to open a command window

b. Ipconfig - to list interfaces and ip addresses - make a note of the network connection name "Local Area Connection" if you have more than one

c. Navigate the netsh command to:

netsh
interface
tcp
ipv4

Example syntax: set address "Local Area Connection" static 192.168.1.1 255.255.255.0 192.168.1.1 1

In the next window, you will specify the server and share name.
Type in the \\<servername>\<ShareName> In this case \\DPM2010\BMRRestore":

clip_image032

Credentials have to be specified”

clip_image033

Here is the output that you should see which shows the location, recent backup information and server name:

clip_image035

Once selected and you click “Next” the following is shown:

clip_image037

Select the backup available and then “Next”.   The following screen shows some advanced options that you may want to select if you have specific disk drivers to install along with some advanced options:

clip_image039

This is now a confirmation shown":

clip_image040

You then get a confirmation that all data will be erased during the BMR recovery process:

clip_image041

After selecting “OK”, the process begins:

clip_image042

Once completed the server reboots and the Bare Metal Recovery is complete.

Hopefully this helps you understand the steps needed for a successful Bare Metal Restore of a protected server. As a suggestion to exercise a disaster recovery scenario, it is always beneficial to test out these steps in a test environment and be familiar with what is involved.

Resources:

BMR recovery walkthrough video: http://www.microsoft.com/showcase/en/us/details/bec0b1c6-d1fd-41f0-b4bc-df5791dfc68d

Prescriptive Guidance on BMR vs System State By Data Source:  http://technet.microsoft.com/en-us/library/ff634241.aspx

Shane Brasher | Senior Support Escalation Engineer

App-V Team blog: http://blogs.technet.com/appv/
AVIcode Team blog: http://blogs.technet.com/b/avicode
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
OOB Support Team blog: http://blogs.technet.com/oob/
Opalis Team blog: http://blogs.technet.com/opalis
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
OpsMgr Support Team blog: http://blogs.technet.com/operationsmgr/
SCMDM Support Team blog: http://blogs.technet.com/mdm/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

clip_image001 clip_image002

Data Protection Manager 2010 and System State Restore

$
0
0

toolsign_thumb2Hello, I’m Shane Brasher. I’d like to discuss the System State Restore Process, basically a walkthrough if you will. First however let’s discuss a high level view of what is done during the backup of a server system state.

From a very high level, Data Protection Manger (DPM) contacts the agent on a protected server and requests that a backup of the system state be performed. The target server initializes the Windows Server Backup (WSB) feature to take the snapshot and store it locally. Once the system state snapshot is successfully done, the backup is then transferred to the DPM server. The reason that understanding this is important is for a system state restore, we use this same Windows Server Backup feature to accomplish our goals. In the walkthrough below, you will see that we will use DPM to restore the System State recovery point to a network share and then on the target server use wbadmin to locate and perform the actual restore of the system state.

System State Restore Walkthrough

This environment involves:

1 member server
1 DC
1 Data Protection Manager 2010
System State Restore Process

1. Create a System State recovery point

2. Perform a restore of the System State to a network share

3. Go to the target server and via wbadmin command prompt access the System State share for the version

4. Use the version number to start the System State restore

5. Reboot

Let’s walk through the whole process.

Here we have a successful system state backup of our protected server:

clip_image002

Perform a restore of the System State to a network share

We go to the recovery tab to locate the recovery point to perform a restore. In this case we will restore to a share on the local DPM server. Navigating to the recovery tab in DPM and selecting the correct server and system state that we wish to restore, we right click the system state and select “recover”:

clip_image004

We opt to Recover to a “network folder” which is our only option in this case:

clip_image006

We choose a folder already created on the desktop of the DPM server:

clip_image008

And we opt to apply the security settings of the destination computer:

clip_image010

Next we are given a summary of our choices:

clip_image012

Finalizing our recovery, we see the progress taking place:

clip_image014

If we choose, we can go to the “Monitoring” tab and then the “Jobs” tab to see the disk based recovery also taking place here as well:

clip_image016

Now we will have to share out the folder in which we have saved the system state to. Looking at our folder structure we see the following. It is the DPM_Recovered_At_<Date and Time> folder we will have to share with “Read access”:

clip_image018

To keep things simple, we will share this folder with the name of “SystemState”:

clip_image019

And we will make sure everyone has “Read” access to it:

clip_image020

Using wbadmin on the target machine

We then go to the target server. Opening up the command prompt on the target server, we use the following syntax to get the version indentifier.

• Syntax: wbadmin get versions –backuptarget: <ServerWhereTheRecoveredSSResides\Share>
In our case: wbadmin get versions –backuptarget: \\DPM2010\SystemState

Example:

clip_image021

The output will be:

Backup time: 10/11/2011 5:05AM
Backup target: Fixed Disk labeled C:
Version identifier: 10/11/2011-12:05
Can Recover: Application(s), System State

Example:

clip_image022

It’s the version identifier information that we will use in our next syntax.

Our next syntax for wbadmin will be using the information obtained from the last syntax.

Syntax: wbadmin start systemstaterecovery –version:<version from the previous command> -backuptarget:\\<ServerWhereShareResides>\<ShareName>

Example:
wbadmin start systemstaterecovery –version:10/11/2011-12:05 –backuptarget:\\DPM2010\SystemState

clip_image024

Select “Y” for yes. Once started you will see the process taking place:

clip_image025

Once complete, a reboot will be needed. You can also note the restore log created for a reference if needed:

clip_image027

After the reboot, your server should have a successful restore of the system state for this target server.

Resources:

System State Recovery Walkthrough: http://www.microsoft.com/showcase/en/us/details/bb0b5339-445b-4298-8705-350f13227b93

Recovering System State: http://technet.microsoft.com/en-us/library/ff634180.aspx

Shane Brasher | Senior Support Escalation Engineer

App-V Team blog: http://blogs.technet.com/appv/
AVIcode Team blog: http://blogs.technet.com/b/avicode
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
OOB Support Team blog: http://blogs.technet.com/oob/
Opalis Team blog: http://blogs.technet.com/opalis
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
OpsMgr Support Team blog: http://blogs.technet.com/operationsmgr/
SCMDM Support Team blog: http://blogs.technet.com/mdm/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

clip_image001 clip_image002

Troubleshooting Hyper-V protection failures due to networking problems

$
0
0

toolsignThere are many failures that can happen when protecting Hyper-V hosts and CSV’s that are a result of the Cluster network configuration not being optimized for redirected mode communication. In most cases these problems will only happen under a heavy load, and when it happens we can lose access to the storage that houses the CSV, Virtual machines may reboot or backups may simply fail.

The following errors codes will be logged on the DPM server when the Cluster network configuration is not optimized. These error codes assume that you have already installed Service Pack 1 for Windows Server 2008 R2. Install it to get the available VSS and Hyper-V component updates.

ErrorCode: 0x8007173D (-2147018947):
Back up is in progress. Please wait for backup completion before trying this operation again.

ErrorCode: 0xC000020C (-1073741300):
The specified network name is no longer available.

ErrorCode: 0x80042308 (-2147212536):
VSS_E_OBJECT_NOT_FOUND: The specified object was not found.

ErrorCode: 0x8099090E (-2137454322):
CMDPROC_E_RESPONSE_TIMEOUT (cmdtypes.h:122)

ErrorCode: 0x8007274C (-2147014836):
A connection attempt failed because the connected party did not properly respond after a period of time, or established connection failed because connected host has failed to respond.

The first step in addressing these errors is to use the following KB article to verify that the Cluster network configuration is configured as expected:

2473194: DPM 2010 Hyper-V protection Configuring cluster networks for CSV redirected access (http://support.microsoft.com/default.aspx?scid=kb;EN-US;2473194)

Attempting to utilize a single network adapter for all traffic will quickly expose these problems. More commonly, a separate Live Migration network will not be setup and used, thus the network will quickly become saturated.

There are also post SP1 hotfixes available that will resolve many of the network communication problems:

2263829: The network connection of a running Hyper-V virtual machine may be lost under heavy outgoing network traffic on a computer that is running Windows Server 2008 R2 SP1 (http://support.microsoft.com/kb/2263829)

961804: Virtual machines are missing in the Hyper-V Manager Console or when you create or start a virtual machine, you receive one of the following error codes: "0x800704C8", "0x80070037" or "0x800703E3" (http://support.microsoft.com/default.aspx?scid=kb;EN-US;961804)

2494016: Stop error 0x0000007a occurs on a virtual machine that is running on a Windows Server 2008 R2-based failover cluster with a cluster shared volume, and the state of the CSV is switched to redirected access (http://support.microsoft.com/default.aspx?scid=kb;EN-US;2494016)

2494162: The Cluster service stops unexpectedly on a Windows Server 2008 R2 failover cluster node when you perform multiple backup operations in parallel on a cluster shared volume (http://support.microsoft.com/default.aspx?scid=kb;EN-US;2494162)

When all of these changes have been implemented you can also add the following registry keys to increase the number of retries and decrease the time between retries.

[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Microsoft Data Protection Manager\Agent\CSV]
"CsvMaxRetryAttempt"=dword:000000C8
"CsvAttemptWaitTime"=dword:0002bf20

CsvMaxRetryAttempt: Adjusts the maximum number of times (Default is 1) the DPM agent will attempt to claim the CSV volume. The value 0xC8 = 200 times.

CsvAttemptWaitTime: Adjusts the amount of time in milliseconds to wait between retry attempts. The value 0x2bf20 = 3 minutes.

Michael Vargo | Support Escalation Engineer

App-V Team blog: http://blogs.technet.com/appv/
AVIcode Team blog: http://blogs.technet.com/b/avicode
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
OOB Support Team blog: http://blogs.technet.com/oob/
Opalis Team blog: http://blogs.technet.com/opalis
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
OpsMgr Support Team blog: http://blogs.technet.com/operationsmgr/
SCMDM Support Team blog: http://blogs.technet.com/mdm/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

clip_image001 clip_image002


Troubleshooting: DPM volumes are flagged as missing and VolSnap logs event ID 86

$
0
0

imageHi everyone, Marc Reynolds here. I have seen some issues recently where DPM volumes are flagged as “missing” in the DPM console so I wanted to take a minute and show you an easy way to fix this.

Symptoms

In System Center Data Protection Manager, DPM volumes are showing as missing. In the DPM admin console (MMC) under Management\Disk, the storage pools disks have a red "x". In Disk Manager the disks have a status of "Errors" and the volumes are listed as "Healthy at Risk". The option to reactivate the disks is grayed out.  In addition, the system event log may contain the following volsnap error:

Log Name: System
Source: volsnap
Date: 
Event ID: 86
Task Category: None
Level: Error
Keywords: Classic
User: N/A
Computer: DPMServer.domain.com
Description:
Volume C:\...es\Microsoft DPM\DPM\Volumes\Replica\File System\vol_79ec325a-145d-4bfc-a089-68fed8e0aeed is offline for shadow copy protection. A read or write failure to shadow copy storage occurred. Please ensure that the shadow copy storage is still present in the system. Please try clearing the protection fault or restart the computer. If all else fails, revert out of shadow copy protection mode to reclaim the use of the volume while losing the shadow copies.

Cause

Disk I/O errors have caused the disk to log errors and the volumes to be flagged as "Healthy at Risk". DPM checks the status of the volumes and if it finds a volume in any state other than "Healthy" it reports the volume as missing and the DPM jobs linked to that volume will fail.

Resolution

  1. Stop DPM
  2. In Disk Manager right click on the disk(s) with "Errors" and take it offline
  3. Once the disk is offline, right click and bring it back online
  4. Once it comes online, the volumes should now show as "Healthy" and the volume missing errors will no longer be present in DPM.

If any of the volumes are showing up in Disk Manager as "Raw" you will need to bring them out of Shadow Copy Protection mode using vshadow-x64.exe

Marc Reynolds | Senior Support Escalation Engineer

App-V Team blog: http://blogs.technet.com/appv/
AVIcode Team blog: http://blogs.technet.com/b/avicode
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
OOB Support Team blog: http://blogs.technet.com/oob/
Opalis Team blog: http://blogs.technet.com/opalis
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
OpsMgr Support Team blog: http://blogs.technet.com/operationsmgr/
SCMDM Support Team blog: http://blogs.technet.com/mdm/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

clip_image001 clip_image002

How to Troubleshoot Tape Library Sharing Configuration Issues in DPM 2010

$
0
0

image

Hello, Chuck Whitson here from the Data Protection Manager Team here in Texas. Lately, we’ve had several customers run into issues with sharing their tape library between multiple DPM servers so I’ve put together some of the things that have been known to interfere with configuring tape library sharing as well as a couple other gotchas. The following steps have resolved most of those cases that we’ve seen.

1. Check SQL Services

Make sure both the ‘SQL Server (MSDPM2010)” service and the “SQL Server Agent (MSDPM2010)” service on each DPM server sharing the library are configured to start as the same domain user account. Below is an example of how the services should be configured:

SQL Server (MSDPM2010) Service Account:

clip_image001[1]

SQL Server Agent (MSDPM2010) Service Account:

clip_image002[1]

Note: The account used to start these services must also be a member of the local administrators group on each DPM server sharing the library.

2. Check the Medium Changer Device in Device Manager

The LCS (Library Control Server) server is the only DPM server that controls the medium changer. All other servers need to have the device disabled in device manager. Open device manager and make sure the device is disabled on all of the client machines and only enabled on the LCS server as shown below:

clip_image003[1]

If you disable or enable the device and are prompted with a message asking you to reboot the server, please do so.

NOTE The medium changer device can zoned to just the server hosting the LCS role on the SAN. This is a supported scenario. However, keep in mind that it will be more difficult to change the server that hosts the LCS role if you ever need to.

3. Windows Firewall

Prior to configuring tape library sharing, you may need to disable the Windows Firewall on each DPM server that will be sharing the library. After tape library sharing has been configured, you can re-enable the Windows Firewall.

To disable the Windows Firewall, open an administrative command prompt and type the following commands, hitting Enter after each line.

netsh
firewall
advfirewall
set allprofiles state off

To re-enable the Windows Firewall, change the last line to read the following:

set allprofiles state on

4. Distributed Transaction Coordinator (MSDTC)

Tape library sharing utilizes the Distributed Transaction Coordinator (MSDTC) service to communicate between the servers sharing the library. Without this service, the configuration or operation will most likely fail. Verify this service is configured to start automatically and is running prior to configuring tape library sharing.

5. DPMLA.xml

The DPMLA service is the service responsible for controlling the library. This service sometimes will leverage the use of the DPMLA.xml file to obtain the SCSI connection configuration of the library and its associated drives. If you’ve ever run DPMDriveMappingTool.exe to generate this file for your library, you will want to make sure that the DPMLA.xml file does not exist on the client DPM servers. The client DPM servers get their library configuration from the LCS server and do not need to leverage the DPMLA.xml file. However, if you ever move your LCS role to a different server, you will want to make sure that you move this file as well to the new server hosting the LCS role. The DPMLA.xml file is located in the “…\Microsoft DPM\DPM\Config” folder.

6. Configure the SQL Port and setting the SPN

A. Discover the dynamic port on which TCP/IP is configured

Open SQL Server Configuration Manager and expand the protocols for SQL Server Network Configuration. Choose the TCP/IP protocol and right-click on it and select properties. Choose the IP Addresses tab and scroll down to the bottom. You should see a window similar to the following showing the TCP Dynamic Port for “IPAll”:

clip_image004[1]

B. Set the Static Port

Take the dynamic port found in the previous step. In this example, the port is 55335. Remove the 0 from the property named “TCP Dynamic Ports” so it is blank. Update the value of “TCP Port” for all IPs listed with the value obtained from step 6A. Here is an example:

clip_image005[1]

Do this on each DPM server sharing the library including the LCS.

C. Set the SPN in Active Directory from a domain controller

For each DPM server that is sharing the library, run the following commands from an administrative command prompt on your domain controller:

setspn -A MSSQLSvc/<HostName of DPM> <DomainName\UserName>

setspn -A MSSQLSvc/<FQDN of DPM> <DomainName\UserName>

setspn -A MSSQLSvc/<HostName of DPM>:<StaticPort> <DomainName\UserName>

setspn -A MSSQLSvc/<FQDN of DPM>:<StaticPort> <DomainName\UserName>

You want to perform each of these commands for each DPM server. Therefore, replace <HostName of DPM> and <FQDN of DPM> with the hostname and fully-qualified domain name of the DPM server. The <StaticPort> is the port discovered in step 6A above. Use the same domain account from step 1 for the <DomainName\UserName>. Remember to do this from the domain controller for each DPM server that is sharing the library.

7. Update AD Delegation of Computer Objects in Active Directory

Open Active Directory Users and Computers and find the computer objects for each DPM server. Right-click on each DPM server that shares the library and choose properties. Select the delegation tab and set the delegation to “Trust this computer for delegation to any service (Kerberos only)” as shown below:

clip_image006[1]

8. Update AD Delegation of User Objects in Active Directory

Open Active Directory Users and Computers and find the user object that is used to start the SQL services in Step 1 above. Right-click on the user object and choose properties. Select the Delegation tab and choose the option “Trust this user for delegation to any service (Kerberos only)” option as shown below:

clip_image007[1]

9. Reboot.

If you made any changes through Step 6-8, you’ll want to reboot for the changes to take.

10. LCS Role Server

In rare situations, moving the LCS role to a different server has resolved issues of the library configuration not getting updated on a specific client DPM server. Remove tape library sharing on all of the servers and configure a different server as the LCS server. Use the batch files in the next step to assist with removing tape library sharing and reconfiguring a different LCS server.

11. Start Over

As a last resort, remove tape library sharing and reconfigure it on all servers. If during the configuration there was ever a failure, you will have to remove tape library sharing and reconfigure it. To help with this, you may want to add the commands necessary to remove and configure tape library sharing in batch files. Here are the batch files we use:

Enable-Server.cmd:

AddLibraryServerForDpm.exe -ShareLibraryWithDpm <CLIENT1_FQDN>

AddLibraryServerForDpm.exe -ShareLibraryWithDpm <CLIENT2_FQDN>

AddLibraryServerForDpm.exe -ShareLibraryWithDpm <CLIENT3_FQDN>

Enable-Client.cmd:

AddLibraryServerForDPM -DPMServerWithLibrary <LCS_FQDN>

SetSharedDPMDatabase -InstanceName <LCS_FQDN>\MSDPM2010

Disable-Server.cmd:

AddLibraryServerForDPM -ShareLibraryWithDPM <LCS_FQDN> -Remove

SetSharedDPMDatabase –RemoveDatabaseSharing

Disable-Client.cmd:

SetSharedDPMDatabase -RemoveDatabaseSharing

AddLibraryServerForDPM -DPMServerWithLibrary <LCS_FQDN> -Remove

Save the above batch files in the …\Microsoft DPM\DPM\Setup folder. Replace <LCS_FQDN> with the fully qualified name of the LCS server and <CLIENT#_FQDN> with the fully qualified name of each client (one for each client). Go ahead and modify / copy each batch file to all servers that way it will be easier to switch the LCS role if at any point you need to.

After any of the library sharing commands above, if you receive the following error:

Incorrect Server Name. Provide Fully Qualified Domain Name. For example: myserver.mydomain.mycompany.com

Set the following registry key on all of your DPM servers:
HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Lsa\Kerberos\Parameters
Entry: MaxTokenSize
Data type: REG_DWORD
Value: 65535

Chuck Whitson | Senior Support Escalation Engineer

App-V Team blog: http://blogs.technet.com/appv/
AVIcode Team blog: http://blogs.technet.com/b/avicode
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
OOB Support Team blog: http://blogs.technet.com/oob/
Opalis Team blog: http://blogs.technet.com/opalis
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
OpsMgr Support Team blog: http://blogs.technet.com/operationsmgr/
SCMDM Support Team blog: http://blogs.technet.com/mdm/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

The Forefront Server Protection blog: http://blogs.technet.com/b/fss/
The Forefront Identity Manager blog : http://blogs.msdn.com/b/ms-identity-support/
The Forefront TMG blog: http://blogs.technet.com/b/isablog/
The Forefront UAG blog: http://blogs.technet.com/b/edgeaccessblog/

clip_image001 clip_image002

Reminder: BIG Webcast - Transforming IT with Microsoft Private Cloud - Tomorrow Jan 17th

$
0
0

There is a really important web cast that is happening tomorrow that I wanted to remind you all about.  You won't want to miss it.

Here is the description of the event.  Registration link is below.

The definition, business value, and technology benefits of the “the cloud”
have been hotly debated in recent months. Most agree that cloud computing can
accelerate innovation, reduce costs, and increase business agility in the
market. In 2012, cloud computing will transition from hype and discussion, to
part of every enterprise’s reality, and IT is uniquely positioned to lead this
transformation and help business reap the benefits of cloud computing.

Join us for a virtual event designed to help you explore your cloud options.
It’s your chance to interact with Microsoft experts and with IT leaders like
yourself, who have been putting cloud technology to work in their own
organizations. You’ll be among the first to hear the latest private cloud news
from Microsoft.

Transforming IT with Microsoft Private CloudStart Time
Private cloud discussion with Microsoft executives: Insights and
news
  • Satya Nadella, President, Server and Tools Business, Microsoft
  • Brad Anderson, Corporate Vice President, Management and Security Division,
    Microsoft
8:30AM PST | 16:30 UTC
Executive panel and Q&A: Guidance and best practices
  • Brad Anderson, Corporate Vice President, Management and Security Division,
    Microsoft
  • Jacky Wright, Vice President, IT Strategic Services, Microsoft IT
  • Rand Morimoto, Chief Executive Officer, Convergent Computing
9:00AM PST | 17:00 UTC
Envisioning Your Private Cloud: A scenario based demonstration
from the Microsoft Technology Center in Redmond, WA.
9:30AM PST | 17:30 UTC

Please go to the Registration to sign up!

If you can't watch the web cast live, it will be recorded and available on demand.

See you there!

System Center 2012 RC Released & New Licensing Information

$
0
0

At the webcast this morning Satya Nadella, President of the Server and Tools Division, and Brad Anderson, Corporate Vice President of Management and Security at Microsoft announced the availability of System Center 2012 RC and introduced the new licensing model for System Center.  The entire suite is now available for download from one convenient location.

Please go watch the recording of the web cast to learn more!

Also - check out Brad Anderson's blog post:

System Center 2012: Where Public and Private Clouds Meet

Get more information

See where you stand with our Private Cloud Assessment

Download the Microsoft Private Cloud Whitepaper

For the latest news and updates, case studies, demos, and more visit the Microsoft Private Cloud web site

Download evaluation software or attend our Microsoft Virtual Academy courses.

Upcoming Learning Opportunities for System Center 2012

$
0
0

So - now that the Release Candidate of System Center 2012 is out and the general availbility is fast approaching you may be starting to get more serious about getting up to speed on System Center 2012.  Am I right?

Don't even worry!  We are here to help you get up to speed fast with lots of different opportunities to learn from Microsoft presenters, MVPs, and other experts in System Center.

Here is a list of some of the upcoming events:

System Center Universe

January 19th in Austin, TX and webcast live around the world.  That's tomorrow!!

We have a great lineup of speakers from Microsoft, MVPs, and other experts.

This event was sponsored by Microsoft and some of our partners and is the first of its kind.

Check out the Agenda and Speakers.  While you are at it check out the Sponsors!

Register here: http://www.systemcenteruniverse.com/UserGroupViewings

There is also a version of it in Asia which you can attend in person or watch the live stream:

http://www.systemcenteruniverse.asia/

Microsoft Jump Start - Creating and Managing a Private Cloud with System Center 2012

This is a Microsoft produced two day training presented by our Technical Product Managers for free as a live virtual classroom.

February 21-22, 2012 9:00 AM - 5:00 PM PST

You can see the course outline, speakers, and register at the site:

http://mctreadiness.com/MicrosoftCareerConferenceRegistration.aspx?pid=298

Microsoft Management Summit 2012

Last, but certainly not least is the Microsoft Management Summit.  This is the big daddy.  An entire week of nothing but System Center and management!  There are literally hundreds of sessions, self-paced labs, instructor-led labs, birds of a feather sessions, etc.

It will be held in Vegas at the Venetian again this year.

April 16-20

You can see the agenda, sponsors, and register at the MMS site:

http://mms-2012.com

Hurry, early bird registration that saves you $275 ends on January 27th!

Microsoft Enterprise Product Roadmap Webcast

$
0
0

nroadcastPlease join us for a high level discussion into Microsoft software investments designed to cover most of the major product lines.  This will be a 35,000 foot view into the following areas:

  • Windows Family
  • Virtualization
  • Office System
  • Unified Communications
  • IT Management
  • Security

This particular webcast is scheduled for Friday, January 20 at 1:00pm Pacific Time although others are scheduled as well.  See this link for more information.

J.C. Hornbeck | System Center & Security Knowledge Engineer

Get the latest System Center news on Facebook and Twitter:

clip_image001 clip_image002

App-V Team blog: http://blogs.technet.com/appv/
AVIcode Team blog: http://blogs.technet.com/b/avicode
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
OOB Support Team blog: http://blogs.technet.com/oob/
Opalis Team blog: http://blogs.technet.com/opalis
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
OpsMgr Support Team blog: http://blogs.technet.com/operationsmgr/
SCMDM Support Team blog: http://blogs.technet.com/mdm/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

The Forefront Server Protection blog: http://blogs.technet.com/b/fss/
The Forefront Identity Manager blog : http://blogs.msdn.com/b/ms-identity-support/
The Forefront TMG blog: http://blogs.technet.com/b/isablog/
The Forefront UAG blog: http://blogs.technet.com/b/edgeaccessblog/

Fix: The DPM console crashes and logs Event ID 945 when making any changes

$
0
0

imageHi everyone, Marc Reynolds here. I have seen some issues recently where the System Center Data Protection Manager Admin Console crashes and logs an Event ID 945 any time any changes were made.   The information below describes the issue, how to identify it and how you can easily resolve it.

Symptoms

The DPM console crashes when you try to make any change in DPM (e.g. adding a protection group, installing an agent, modifying disk allocation). MSDPM logs error 945 in the Application Event log showing the exception "Cannot insert the value NULL into column 'owner_sid', table 'msdb.dbo.sysjobs'; column does not allow nulls. INSERT fails."

Log Name: Application
Source: MSDPM
Date: 1/4/2012 1:21:11 AM
Event ID: 945
Task Category: None
Level: Error
Keywords: Classic
User: N/A
Computer: <dpm server name>

Description:
The description for Event ID 945 from source MSDPM cannot be found. Either the component that raises this event is not installed on your local computer or the installation is corrupted. You can install or repair the component on the local computer.
If the event originated on another computer, the display information had to be saved with the event.
The following information was included with the event:
Unable to connect to the DPM database because of a general database failure. Make sure that SQL Server is running and that it is configured correctly.
Problem Details:

<FatalServiceError><__System><ID>19</ID><Seq>7119</Seq><TimeCreated>1/4/2012 7:21:11 AM</TimeCreated><Source>DpmThreadPool.cs</Source><Line>163</Line><HasError>True</HasError></__System><ExceptionType>SqlException</ExceptionType><ExceptionMessage>Cannot insert the value NULL into column 'owner_sid', table 'msdb.dbo.sysjobs'; column does not allow nulls. INSERT fails.
The statement has been terminated.</ExceptionMessage><ExceptionDetails>System.Data.SqlClient.SqlException: Cannot insert the value NULL into column 'owner_sid', table 'msdb.dbo.sysjobs'; column does not allow nulls. INSERT fails.
The statement has been terminated.

at System.Data.SqlClient.SqlConnection.OnError(SqlException exception, Boolean breakConnection)
at System.Data.SqlClient.TdsParser.ThrowExceptionAndWarning(TdsParserStateObject stateObj)
at System.Data.SqlClient.TdsParser.Run(RunBehavior runBehavior, SqlCommand cmdHandler, SqlDataReader dataStream, BulkCopySimpleResultSet bulkCopyHandler, TdsParserStateObject stateObj)
at System.Data.SqlClient.SqlCommand.FinishExecuteReader(SqlDataReader ds, RunBehavior runBehavior, String resetOptionsString)
at System.Data.SqlClient.SqlCommand.RunExecuteReaderTds(CommandBehavior cmdBehavior, RunBehavior runBehavior, Boolean returnStream, Boolean async)
at System.Data.SqlClient.SqlCommand.RunExecuteReader(CommandBehavior cmdBehavior, RunBehavior runBehavior, Boolean returnStream, String method, DbAsyncResult result)
at System.Data.SqlClient.SqlCommand.InternalExecuteNonQuery(DbAsyncResult result, String methodName, Boolean sendToPipe)
at System.Data.SqlClient.SqlCommand.ExecuteNonQuery()
at Microsoft.Internal.EnterpriseStorage.Dls.DB.SqlRetryCommand.ExecuteNonQuery()
at Microsoft.Internal.EnterpriseStorage.Dls.Scheduler.SqlAgentHelper.AddJob(String jobName, String jobOwner, String categoryName)
at Microsoft.Internal.EnterpriseStorage.Dls.Scheduler.SqlAgentHelper.RegisterSchedule(Schedule schedule)
at Microsoft.Internal.EnterpriseStorage.Dls.Scheduler.ConsistencyCheckHelper.PerformDBOperation()
at Microsoft.Internal.EnterpriseStorage.Dls.Scheduler.CommandHelper.Execute(SqlContext sqlContext)
at Microsoft.Internal.EnterpriseStorage.Dls.Scheduler.ConsistencyCheckHelper.Execute()
at Microsoft.Internal.EnterpriseStorage.Dls.Scheduler.SchedulerImpl.CheckDlsSchedules(Hashtable dlsSchedules, Hashtable sqlSchedules, ConsistencyCheckHelper consistencyCheckHelper)
at Microsoft.Internal.EnterpriseStorage.Dls.Scheduler.SchedulerImpl.ConsistencyCheck()
at Microsoft.Internal.EnterpriseStorage.Dls.Intent.IMCatalogDB.Rollback()
at Microsoft.Internal.EnterpriseStorage.Dls.Intent.IT.ProtectedGroupTranslator.TranslateGroup(IMCatalogType IMCatalogXmlPassed)
at Microsoft.Internal.EnterpriseStorage.Dls.Engine.CIntentServices.ConfigureProtectedGroup(UInt16* bstrIMCatalogXml)
at Microsoft.Internal.EnterpriseStorage.Dls.Engine.CCoreServices.ConfigureProtectedGroup(CCoreServices* , UInt16* bstrIMCatalogXml, tagSAFEARRAY** exceptionResult)</ExceptionDetails></FatalServiceError>

Cause

The registry keys for the SqlAgentAccoutName and SchedulerJobOwnerName are incorrectly formatted using UPN syntax.

Resolution

Change the following registry values from the username@domain.com format to domain\username:

Path: HKLM\software\microsoft\microsoft dpm\setup

Keys: SchedulerJobOwnerName and SqlAgentAccountName

Marc Reynolds | Senior Support Escalation Engineer

Get the latest System Center news on Facebook and Twitter:

clip_image001 clip_image002

App-V Team blog: http://blogs.technet.com/appv/
AVIcode Team blog: http://blogs.technet.com/b/avicode
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
OOB Support Team blog: http://blogs.technet.com/oob/
Opalis Team blog: http://blogs.technet.com/opalis
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
OpsMgr Support Team blog: http://blogs.technet.com/operationsmgr/
SCMDM Support Team blog: http://blogs.technet.com/mdm/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

The Forefront Server Protection blog: http://blogs.technet.com/b/fss/
The Forefront Identity Manager blog : http://blogs.msdn.com/b/ms-identity-support/
The Forefront TMG blog: http://blogs.technet.com/b/isablog/
The Forefront UAG blog: http://blogs.technet.com/b/edgeaccessblog/


Replica inconsistent and insufficient disk space on BMR (Bare Metal Recovery) Backup (How To Fix)

$
0
0

image

New from our community driven TechNet Wiki:

System Center Data Protection Manager 2010 (DPM 2010) offers with its new console in the creation of a protection group in System Protection, a new option called "Bare Metal Recovery".

This option saves the operating system files (System State) and critical volumes (excluding user data) to restore it very quickly to new hardware. This feature existed in DPM 2007 with Software Removal Tool.

The problem is that sometimes the BMR backup "Bare Metal Recovery" is not working properly and fails with the message "Replica inconsistent" caused by "insufficient disk space"…

SOURCE: Replica inconsistent and insufficient disk space on BMR (Bare Metal Recovery) Backup (How To Fix)

J.C. Hornbeck | System Center & Security Knowledge Engineer

Get the latest System Center news on Facebook and Twitter:

clip_image001 clip_image002

App-V Team blog: http://blogs.technet.com/appv/
AVIcode Team blog: http://blogs.technet.com/b/avicode
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
OOB Support Team blog: http://blogs.technet.com/oob/
Opalis Team blog: http://blogs.technet.com/opalis
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
OpsMgr Support Team blog: http://blogs.technet.com/operationsmgr/
SCMDM Support Team blog: http://blogs.technet.com/mdm/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

The Forefront Server Protection blog: http://blogs.technet.com/b/fss/
The Forefront Identity Manager blog : http://blogs.msdn.com/b/ms-identity-support/
The Forefront TMG blog: http://blogs.technet.com/b/isablog/
The Forefront UAG blog: http://blogs.technet.com/b/edgeaccessblog/

System Center 2012 Operations Manager incorrectly reports that a restricted System Center 2012 Data Protection Manager action completed successfully

$
0
0

hotfixHere’s a new Knowledge Base article we published today. This one talks about an issue where a restricted user can attempt certain actions that they don't have permission to yet get a (false) message indicating it was successful.

=====

Symptoms

When using System Center 2012 Operations Manager (OpsMgr) to manage System Center 2012 Data Protection Manager (DPM) servers and leveraging the role-based access control, it is possible that a restricted user can attempt certain actions that they don't have permission to and get a message indicating it was successful.

Checking the jobs view in DPM for the given protection group will show that the job is not actually initiated in DPM. Restrictions for the user will be followed.

This is most likely to happen only when dealing with a protection group. When the same action is attempted at the data source level, users will be presented with the expected message indicating the action is not allowed.

Cause

This is caused by unexpected return values from the agent task in OpsMgr.

Resolution

The DPM team is aware of the condition and is working on a resolution that will be targeted for the next DPM QFE.

It is important to note that the action is not actually being performed. There is no unexpected elevation of privileges. The roles as defined in OpsMgr are being honored at all times.

More Information

Following are examples of the expected behavior and the erroneous message.

If a restricted user attempts to launch a consistency check for a data source from the OpsMgr console, initially a message will be displayed indicating the job is being sent.

Run Consistency Check on data source
Status: Run Consistency check on data source

This will then be followed by an error indicating the user does not have permission.

Failed to start <task type> on data source
You do not have permissions to perform this action. Your DPM administrator must give you permissions to any one of the following tasks - Run <task type> (ID: 33238)

If the same user attempts to initiate the consistency check, but this time at the protection group level, the experience changes and an erroneous message is displayed. First, an indication that job is being sent will be displayed.

Run Consistency Check on Protection Group
Status: Run Consistency Check on Protection Group

At this point, OpsMgr reports that the job was successfully started.

Run Consistency Check on Protection Group
Status: Successfully started consistency check on Protection Group

The above message is the erroneous message as the job will not be started on the DPM server.

=====

For the most current version of this article please see the following:

2665983 : System Center 2012 Operations Manager incorrectly reports that a restricted System Center 2012 Data Protection Manager action completed successfully

J.C. Hornbeck | System Center & Security Knowledge Engineer

Get the latest System Center news on Facebook and Twitter:

clip_image001 clip_image002

App-V Team blog: http://blogs.technet.com/appv/
AVIcode Team blog: http://blogs.technet.com/b/avicode
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
OOB Support Team blog: http://blogs.technet.com/oob/
Opalis Team blog: http://blogs.technet.com/opalis
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
OpsMgr Support Team blog: http://blogs.technet.com/operationsmgr/
SCMDM Support Team blog: http://blogs.technet.com/mdm/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

The Forefront Server Protection blog: http://blogs.technet.com/b/fss/
The Forefront Identity Manager blog : http://blogs.msdn.com/b/ms-identity-support/
The Forefront TMG blog: http://blogs.technet.com/b/isablog/
The Forefront UAG blog: http://blogs.technet.com/b/edgeaccessblog/

SCOM 2012 DPM 2012

System Center 2012 Data Protection Manager console sub menu items may show up more than once

$
0
0

hotfixHere’s a new Knowledge Base article we published today on DPM 2012. This one talks about an issue where some console menu items may show up multiple times:

=====

Symptoms

In System Center 2012 Data Protection Manager (DPM), console sub menu options such as "Expand All" and "Collapse All" may show up more than once under the VIEW menu.

Cause

This issue occurs because DPM console is unable to refresh the Main Menu options.

Resolution

This is a known issue in System Center 2012 Data Protection Manager and will be addressed in a future DPM update.

=====

For the most current version of this article please see the following:

2666436 : System Center 2012 Data Protection Manager console sub menu items may show up more than once

J.C. Hornbeck | System Center & Security Knowledge Engineer

Get the latest System Center news on Facebook and Twitter:

clip_image001 clip_image002

App-V Team blog: http://blogs.technet.com/appv/
AVIcode Team blog: http://blogs.technet.com/b/avicode
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
OOB Support Team blog: http://blogs.technet.com/oob/
Opalis Team blog: http://blogs.technet.com/opalis
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
OpsMgr Support Team blog: http://blogs.technet.com/operationsmgr/
SCMDM Support Team blog: http://blogs.technet.com/mdm/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

The Forefront Server Protection blog: http://blogs.technet.com/b/fss/
The Forefront Identity Manager blog : http://blogs.msdn.com/b/ms-identity-support/
The Forefront TMG blog: http://blogs.technet.com/b/isablog/
The Forefront UAG blog: http://blogs.technet.com/b/edgeaccessblog/

Data Protection Manager Agent Network Troubleshooting

$
0
0

Toolbox3Hi everyone, Shane Brasher here with some tips on how to troubleshoot networking issues related to the DPM Agent.  The goal of this article is not to make you a networking expert or to provide in-depth networking training, but rather provide you with basic skills and knowledge of specific tools used to assess communication problems with Data Protection Manager (DPM) traffic.

One of the most common issues that is seen with the System Center Data Protection Manager Agent here in product support is connectivity issues and port blockage. This document will go over some of the key troubleshooting methodologies used in addressing these types of issues such as:

a.) You can’t push out your DPM agent to a server via the DPM management console.
b.) You manually install your agent, but the communication is still not working with the DPM server.

Naturally, if a connectivity or port blockage issue is diagnosed, then the DPM administrator may have to work with the Networking Administrator or the Directory Services Administrator in certain circumstances.  For example, if you suspect that the routing tables on a router are missing a route due to an unsuccessful tracert result, then a collaborative effort with the Networking Administrator will be needed to check out the router.  Another example is if the Windows Integrated Firewall for the servers on your domain is configured via GPO and does not have the rule exception for the DPMRA ports, then the Active Directory Administrator will need to be collaborated with in order to change the GPO.

The DPM Agent - What is the agent for? What purpose does it serve?

The DPM agent is a component installed on a server for which we intend to backup by Data Protection Manager. It is what performs the function of tracking changed blocks of data selected to be backed up and is also responsible for transferring data being backed up to the Data Protection Manager Server.

The Startup Type for the DPM agent service (DPMRA) is manual and runs as a Local System Account on each protected machine. The DPM agent will only be started when contacted by the DPM server when a job is scheduled to run. Once a scheduled job has completed DPMRA service will remain running for five minutes before the service is stopped.

The protection agent software consists of two components: the protection agent itself and an agent coordinator. The agent coordinator is software that is temporarily installed on a protected computer during installation, update, or un-installation of a protection agent.

DPM CONNECTIVITY

Before we start looking at some of the tools used for troubleshooting we first need to know which ports that DPM uses for its operations. The below article lists the ports in use for DPM 2007, DPM 2010 and DPM 2012.

NOTE There is an additional port for DPM 2012 certificate use that will be addressed in another article.

DPM PORTS

http://technet.microsoft.com/en-us/library/ff399341.aspx

Protocol

Port

Details

DCOM

135/TCP
Dynamic

The DPM control protocol uses DCOM. DPM issues commands to the protection agent by invoking DCOM calls on the agent. The protection agent responds by invoking DCOM calls on the DPM server.

TCP port 135 is the DCE endpoint resolution point used by DCOM.

By default, DCOM assigns ports dynamically from the TCP port range of 1024 through 65535.

TCP

5718/TCP
5719/TCP

The DPM data channel is based on TCP. Both DPM and the protected computer initiate connections to enable DPM operations such as synchronization and recovery.

DPM communicates with the agent coordinator on port 5718 and with the protection agent on port 5719.

DNS

53/UDP

Used between DPM and the domain controller, and between the protected computer and the domain controller, for host name resolution.

Kerberos

88/UDP 88/TCP

Used between DPM and the domain controller, and between the protected computer and the domain controller, for authentication of the connection endpoint.

LDAP

389/TCP
389/UDP

Used between DPM and the domain controller for queries.

NetBIOS

137/UDP
138/UDP
139/TCP
445/TCP

Used between DPM and the protected computer, between DPM and the domain controller, and between the protected computer and the domain controller, for miscellaneous operations. Used for SMB directly hosted on TCP/IP for DPM functions.

Now that we know which ports are needed, how do we determine between two points if the ports are being blocked or not? We have many tools both built in or that can be downloaded at our disposal.

Let’s start off simple with a few command line tests that can be done that are quick and easy. There are other networking variables to consider such as DNS, arp cache, IPsec etc... but for purposes of this article we are keeping things as simple as possible and are just covering some basic tests that anyone can do with just a little practice.

Troubleshooting tools for DPM connectivity include:

a.) “Ping” to test out name resolution and it traffic can route properly to the destination.
b.) "tracert" to test out the routing
c.) “Net view” accessibility to the server itself.
d.) “Sc” command line to test out RPC connectivity
e.) “WBEMTEST” to test out our DCOM connection.
e.) “Wmic” to test out our DCOM connection.
f.) Netstat to list the ports in use.
g.) Tasklist to list the currently running processes
h.) Tcpview gui for port listing
i.) Integrated firewall logging
j.) Netmon
k.) Toggling Chimney and RSS

The Ping command - “Can I get there from here?”

Ping is probably one of the most widely used built in tools used to test out overall connectivity. I won’t go into all of the switches that can be used, but will briefly cover the basic use and just a few switches for ping.

Ping Test #1 Testing overall communication

The most simple ping test is just pinging the host name of the server, it’s as simple as that.
From a command prompt type: ping <ServerName>

Example:

C:\Users\administrator>ping MemberServer

Pinging MemberServer.contoso.com [10.10.10.10] with 32 bytes of data:

Reply from 10.10.10.10: bytes=32 time=6ms TTL=128
Reply from 10.10.10.10: bytes=32 time<1ms TTL=128
Reply from 10.10.10.10: bytes=32 time=1ms TTL=128
Reply from 10.10.10.10: bytes=32 time=1ms TTL=128

Ping statistics for 10.10.10.10:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 0ms, Maximum = 6ms, Average = 2ms

The successful reply tells us that not only can we resolve the name to an IP address but that we know how to get there, so routing is probably working. We will go over testing out the routing via tracert command later.

Ping Test #2 Testing MTU Size

Sometimes communication can fail in route from the DPM server to the protected server if the packet size being sent is larger than what a router or firewall will allow to a segment receiving a smaller packet size . The router may be configured to send an ICMP "destination unreachable" message back to the sending host or if not then the packet is discarded. In such cases when the packet is discarded, this is known as a black hole router and is discussed in:

How to troubleshoot Black Hole Router issues http://support.microsoft.com/kb/314825

Although this scenario is not as common as it was in the past due to the new TCP networking features in 2008 that enable Black Hole router detection, it is still worth checking as this does crop up from time to time.

This can be diagnosed with pinging the destination with a specific packet size with two specific switches.
-l <size> Send buffer size.
-f Set Don't Fragment flag in packet (IPv4-only).

Success Example:
C:\Users\administrator>ping MemberServer -l 1472 -f

Note the “-l” and the “-f “ switch.
-l <size> Send buffer size.
-f Set Don't Fragment flag in packet (IPv4-only).

We are using these switches to test the MTU size of 1472 between the two servers.
Note: Information on Maximum Transmission Unit (MTU) will be provided at the end of this section.

Pinging MemberServer.contoso.com [10.10.10.10] with 1472 bytes of data:

Reply from 10.10.10.10: bytes=1492 time=1ms TTL=128
Reply from 10.10.10.10: bytes=1492 time=1ms TTL=128
Reply from 10.10.10.10: bytes=1492 time=1ms TTL=128
Reply from 10.10.10.10: bytes=1492 time=1ms TTL=128
Ping statistics for 10.10.10.10:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 1ms, Maximum = 1ms, Average = 1ms

Here we see a success of an MTU size of 1472. We specified the –l to set the buffer to 1472 and used the –f to specify do not fragment. The value of 1472 came from the default Ethernet MTU of 1500 minus 28 for the IP and ICMP header.

Reference: http://technet.microsoft.com/en-us/library/cc958871.aspx “The ICMP Echo Request header is 8 bytes, and the IP header is normally 20 bytes. In the Ethernet case shown here, the link layer MTU contains the maximum-sized Ping buffer plus 28, for a total of 1500 bytes”

Failure Example: Here we see an example of a failure of the MTU size specified.

C:\Users\administrator>ping MemberServer -l 1472 -f

Pinging MemberServer.com [10.10.10.10] with 1472 bytes of data:

Packet needs to be fragmented but DF set.
Packet needs to be fragmented but DF set.
Packet needs to be fragmented but DF set.
Packet needs to be fragmented but DF set.
Ping statistics for 10.10.10.10:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss)

Let’s lower the MTU value some to a lower number. Let’s choose 1272 in place of 1472:

C:\Users\administrator>ping MemberServer -l 1272 -f

Pinging MemberServer.com [10.10.10.10] with 1472 bytes of data:

Packet needs to be fragmented but DF set.
Packet needs to be fragmented but DF set.
Packet needs to be fragmented but DF set.
Packet needs to be fragmented but DF set.
Ping statistics for 10.10.10.10:
Packets: Sent = 4, Received = 0, Lost = 4 (100% loss)

We can continue to lower the packet size until we find an acceptable size that is successful.  In addition if the successful packet size is smaller than expected (e.g. you have a gigabit link and are only getting a MTU of 500) you aren’t getting the throughput as expected and can experience packet loss especially during high bandwidth demand.

Note two things above.
1.) We get the message telling us that the packet needs fragmented.
2.) We experienced a 100% loss.

Well now that we know this, now what? How do we fix this?

There are some ways to address this such as:

a.) Reconfiguration of the router or switch to allow a larger packet size.
b.) A firmware update may be needed for the router or switch.
c.) On the server enable black hole detection.

Our purpose for the moment is to diagnose where the failure may be at. A collaborative effort is suggested of course with your Network Administrator should you be experience this type of behavior with what is considered a Black Hole Router. Additional information can be found in the articles below.

Ping : http://technet.microsoft.com/en-us/library/cc952252.aspx

169790 How to Troubleshoot Basic TCP/IP Problems : http://support.microsoft.com/default.aspx?scid=kb;EN-US;169790

314825 How to Troubleshoot Black Hole Router Issues : http://support.microsoft.com/default.aspx?scid=kb;EN-US;314825

The Default MTU sizes for different networking topologies : http://support.microsoft.com/kb/314496

New Networking Features in Windows Server 2008 and Windows Vista : http://technet.microsoft.com/en-us/library/bb726965.aspx

Tracert - “What route (path) do I take from here to there?”

Tracert is an easy to use utility for testing out the routing between two servers using ICMP.  The route taken is displayed as in the example below:

Success Example:

C:\Users\administrator>tracert MemberServer

Tracing route to MemberServer.Contoso.com [10.10.10.10]
over a maximum of 30 hops:
1 <1 ms <1 ms <1 ms 10.10.10.1
2 41 ms 27 ms 29 ms router [10.10.10.2]
Trace complete.

Failure Example:

C:\Users\administrator>tracert 10.10.10.55

Tracing route to 10.10.10.55 over a maximum of 30 hops
1 1 ms <1 ms <1 ms 192.168.1.1
2 * * * Request timed out.
3 * * * Request timed out.
4 * * * Request timed out.

etc……

This result tells us that we don’t know how to get there. From this point you may want to check that your default gateways are valid and that your routing tables on the server and the intermediate devices on the network are correct.

For additional information on tracert see the additional information below:

Tracert : http://technet.microsoft.com/en-us/library/ff961507(WS.10).aspx

How to Use TRACERT to Troubleshoot TCP/IP Problems in Windows : http://support.microsoft.com/kb/314868

Routing Tables : http://technet.microsoft.com/en-us/library/cc957845.aspx

Understanding the IP routing table : http://technet.microsoft.com/en-us/library/cc787509(WS.10).aspx

Net View - “What shares are available to me over the network on this server?”

The net view command is used to view the accessible shares on a remote computer. The ADMIN$ share on the Protected Machine must be accessible from the DPM Server using the account that you are planning to install the agent with. The net view command is a quick way to test this.

Success Example:

C:\Users\administrator>net view \\MemberServer /all

Shared resources at \\MemberServer
Share name Type Used as Comment
-------------------------------------------
ADMIN$ Disk Remote Admin
C$ Disk Default share
D$ Disk Default share
IPC$ IPC Remote IPC
print$ Disk Printer Drivers
Users Disk
The command completed successfully.

Failure Example:

C:\Users\Administrator >net view \\BogusServer

System error 53 has occurred.
The network path was not found.

How to Use the NET VIEW Command to View Shared Resources : http://support.microsoft.com/kb/141229

SC test for RPC connectivity - “Can I reach this server with RPC traffic?”

Now we test RPC and connectivity to Service Control Manager (SCM) by using Service Controller or rather the SC command. This displays a list of services on the remote server when successful:

Sc \\<protected server name> query

A successful output will tell us that RPC connection to the Service Control Manager on the server is accessible.

Success Example:

C:\Users\administrator> sc \\MemberServer query

SERVICE_NAME: AeLookupSvc
DISPLAY_NAME: Application Experience
TYPE : 20 WIN32_SHARE_PROCESS
STATE : 4 RUNNING
(STOPPABLE, NOT_PAUSABLE, IGNORES_SHUTDOWN)
WIN32_EXIT_CODE : 0 (0x0)
SERVICE_EXIT_CODE : 0 (0x0)
CHECKPOINT : 0x0
WAIT_HINT : 0x0

etc….

The list may be quiet long so for purposes of this document there’s no reason to list the full output. The key point to remember is if it’s successful or not. A failed output is given below:

Failure Example:

C:\Users\administrator>sc \\Server1 query

[SC] OpenSCManager FAILED 1722:
The RPC server is unavailable.

If we know for a fact that “Server1” is a valid server name and we receive the results of “RPC server is unavailable.” Then assuming that ping and tracert are successful, showing we know how to get to the server, then we can conclude that the possible cause is RPC port blockage.

For additional information:

SC query
http://technet.microsoft.com/en-us/library/dd228922(WS.10).aspx
http://technet.microsoft.com/en-us/library/bb490995.aspx

WBEMTEST - Is DCOM accessible?

For this test we can use WBEMTEST for testing out our DCOM connection. This is yet another built in tool that we can use for testing this. There is an excellent walkthrough already written on how to do this at the following link:

Troubleshooting Agent Deployment in Data Protection Manager 2007 - Networking
http://blogs.technet.com/b/askcore/archive/2008/05/01/troubleshooting-agent-deployment-in-data-protection-manager-2007-networking.aspx

Should the test fail with WBEMTEST then verify the DCOM settings as per:

Troubleshooting Agent Deployment in Data Protection Manager 2007 - DCOM
http://blogs.technet.com/b/askcore/archive/2008/05/09/troubleshooting-agent-deployment-in-data-protection-manager-2007-dcom.aspx

WMIC

Test WMI/DCOM. when successful this command lists some basic information about the remote server.

Syntax:
Wmic /node:"<protected server name>" OS list brief

“list”---WMIC verb
“brief”—WMIC adverb
“/node”—Specifying computer name
“OS”—list information about the operating system

Example of success:

C:\Users\administrator>wmic /node:MemberServer OS list brief

BuildNumber Organization RegisteredUser SerialNumber SystemDirectory Version

7600 Microsoft Admin 12345-678-1234567-12345 C:\Windows\system32 6.1.7600

Example of failure:

C:\Users\administrator>wmic /node:BogusServer OS list brief

Node – BogusServer
ERROR:
Description = The RPC server is unavailable.

While it’s true that there can be misconfigured DCOM settings to cause inaccessibility, we will not cover that in this article as we are just looking at this from a networking perspective. For more information in this regards you can reference the following:

Troubleshooting Agent Deployment in Data Protection Manager 2007 - DCOM
http://blogs.technet.com/b/askcore/archive/2008/05/09/troubleshooting-agent-deployment-in-data-protection-manager-2007-dcom.aspx

Additional Information

WMIC verbs : http://technet.microsoft.com/en-us/library/cc784966(WS.10).aspx

WMIC switches : http://technet.microsoft.com/en-us/library/cc787035(WS.10).aspx

Running Windows Management Instrumentation Command-line : http://technet.microsoft.com/en-us/library/cc782919(WS.10).aspx

Netstat - What ports are listening or are being used?

Netstat is another handy built in tool for determining active TCP connections and the ports listing. There are other switches for netstat but we will only focus on a few.

We will use netstat in conjunction with tasklist (listed below) to determine the following:

a.) Can we establish a DPM connection over the DPM port 5718?
b.) Can we be sure that it’s the DPMRA service using that port and not something else?

Syntax: Netstat –ano

The “-ano” switch gives you:
-a Displays all connections and listening ports.
-n Displays addresses and port numbers in numerical form.
-o Displays the owning process ID associated with each connection.

Example:

C:\Users\administrator>netstat –ano

Active Connections
Proto Local Address Foreign Address State PID
TCP 10.10.10.10:58891 157.54.62.44:56281 ESTABLISHED 3608
TCP 10.10.10.10:59628 10.251.16.114:443 ESTABLISHED 1904
TCP 10.10.10.10:60075 157.54.41.53:7575 ESTABLISHED 3608
TCP 10.10.10.10:61763 10.37.38.16:5061 ESTABLISHED 3708
TCP 10.10.10.10:64475 65.53.103.24:1745 ESTABLISHED 1112
TCP 10.10.10.10:65292 157.54.41.53:7576 ESTABLISHED 3608
TCP 10.10.10.10:3143 65.53.65.78:5718 ESTABLISHED 5512

Note the port of 5718 and the PID listed there. We know that this is a DPM port how can we be sure that another service isn’t listening. We can use “netstat –anob” to list the executables as well or we can use tasklist as per below.


Tasklist

Tasklist can be used to list the currently running processes and associated PIDs. I personally prefer Tasklist over using netstat with the “b” switch as tasklist is also handy in seeing what services is associated with svchost.exe.

Syntax: tasklist /svc

C:\Users\administrator>tasklist /svc

Image Name PID Services
========================= ========
OUTLOOK.EXE 3608 N/A
IncidentManagement.Client 1904 N/A
communicator.exe 3708 N/A
DPMRA.exe 5512 DPMRA
svchost.exe 252 CryptSvc, Dnscache, LanmanWorkstation,
napagent, NlaSvc, TermService

Note that we can see that the PID of 5512 belongs to the DPMRA service. So the output from both netstat and tasklist verifies that the current service which is DPMRA on this server is using the 5718 port.  Below is an article on how to use the Netstat output and Tasklist output to assess if another process is listening to the DPMRA ports of 5718 or 5719.

947682 The DPM protection agent service cannot start in System Center Data Protection Manager 2007 : http://support.microsoft.com/default.aspx?scid=kb;EN-US;947682

TCPView

TCPview is a free utility that you can use to accomplish the same thing as netstat and tasklist but with a gui interface.

TCP view : http://technet.microsoft.com/en-us/sysinternals/bb897437

TCPView can show you the ports, protocol, IP addresses in use, and processes. The output can be saved into a text file for reference later on.

clip_image002

Integrated Firewall Logging - “Is the Windows integrated firewall causing an issue?”

Port blockage by the integrated firewall is definitely not out of the realm of impossibility and a commonly over looked cause of DPM agent communication. I’ve bolded that sentence to stress again that this is often overlooked. When the agent is installed by a manual installation the DPMRA rules “should” be created properly to allow traffic. Even if this is done correctly, there is still the possibility of someone changing the firewall rules manually or by GPO applied or even creating a new more restrictive rule. Toggling the firewall off is a good step to follow to rule out that variable.

Turning off the integrated firewall can be done in one of three ways:

a.) From the command prompt

b.) From the mmc or computer management

c.) From netsh

The choice to turn off the integrated firewall is often a rather sensitive decision due to company policies and\or change request. As such, it may be to your advantage to enable and analyze the firewall logging first.

Turning the integrated firewall off by Command prompt

To turn off the firewall via the command prompt you can type: “net stop bfe”

You will be prompted for a confirmation. This is the easiest method but does stop other services. (IKE, Ipsec, TMG if installed) . This being the case, you may not want to go this route if it is unknown as to what other services are needed for this server at the time. You may want to choose one of the other methods below.

Turning the integrated firewall off by the Netsh command

To disable the Windows Firewall, open an administrative command prompt and type the following commands, hitting Enter after each line.

netsh
firewall
advfirewall
set allprofiles state off

Example:
clip_image004
To re-enable the Windows Firewall, change the last line to read the following: set allprofiles state on

Turning off the integrated firewall by MMC
To turn it off via the MMC snap-in. Add the “Windows Firewall with Advanced Security” for the local computer OR you can access it via Computer Management. Right click the top of the tree and select properties.

clip_image006

You will be presented with the following:

clip_image008

There are three things to note:

a.) There are three profiles - Private profile, Public profile and Domain profile.
b.) You “may” but not always see the domain GPO overriding the option to disable the firewall.
c.) You do have logging to reference if needed.

KEY POINTS

If a GPO is overriding the ability to turn off the firewall by the graphical user interface (GUI), then you may have to do so via the command prompt (net stop bfe). This will temporarily turn it off for testing, it will, however, possibly be turned back on upon a GPO refresh (default GPO refresh is 15 minutes). Remember though that turning off the firewall by net stop bfe also turns off other services as mentioned previously.
If you are not allowed to turn it off at all, then rely on firewall logging to tell us what’s going on. You will have the option to enable dropped packets and successful packets. I suggest you log both.

The most important things to note when referencing the logs are:

a.) Action (dropped or allowed)
b.) Protocol
c.) Source and destination IP.

Firewall logging is done on a per profile basis.

Default path: C:\Windows\System32\LogFiles\Firewall\pfirewall.log

Sample log below shows the dropped packets for ICMP, TCP 445, TCP 135, UDP 137 between the source IP address of 10.10.10.100 and destination IP address 10.10.10.50.

clip_image010

Additional information:

System Center Data Protection Manager 2012 agent installation fails with error 319 : http://support.microsoft.com/kb/2621989

TMG Setup for DPM Communication : http://blogs.technet.com/b/dpm/archive/2010/12/06/new-video-tmg-setup-for-dpm-communication.aspx

DPM Traffic and Chimney and RSS - Is TCP Chimney or RSS causing an issue?

In order to answer that questions we first need to understand what is TCP chimney and RSS.  TCP Chimney and RSS are enhancements to increase the throughput and packet processing of network traffic.

RSS technology enables the processing of network packets belonging to the same TCP connections to be distributed across multiple processors in the system if your server has more than one processor.

TCP Chimney Offload is a networking technology that helps transfer the workload from the server CPU to a network adapter during network data transfer. This is of course assuming the adapter can support it.

If it’s an enhancement, why would I want to turn it off?”

Sometimes, however, “the network adapter is not powerful enough to handle the offload capabilities at high throughput. For example, enabling segmentation offload can reduce the maximum sustainable throughput on some network adapters because of limited hardware resources.” ---Quoted from the performance article found at: http://msdn.microsoft.com/en-us/windows/hardware/gg463394

There is also a list of common symptoms you may see if TCP offload is not working as expected. This is discussed in:

948496 An update to turn off default SNP features is available for Windows Server 2003-based and Small Business Server 2003-based computers http://support.microsoft.com/default.aspx?scid=kb;EN-US;948496

The bottom line is if TCP Chimney and\or RSS is not operating properly or as expected then undesirable behavior can be seen such as DPM traffic is extremely slow and\or even failed in some cases. This includes not just DPM replication issues but also failed instances of a DPM agent push. There are various SNP, TCP offloading hotfixes that may apply in some instances to make DPM traffic better. Implementing such hotfixes is best determined via the networking administrator.

Most often if TCP Chimney is not functioning properly then an update of the NIC driver will correct the problem. This is important to remember as updating the NIC driver is often overlooked as a possible solution. Please remember that a NIC is only as good as the driver that is written for it and an updated driver may correct many underlying issues.

If it is suspected that TCP Chimney or RSS is not operating as expected then try toggling them off for testing. Doing this is simple and turning off TCP Chimney or RSS does NOT require a reboot of the server. When finished with your testing they can easily be turned back on.  To turn off TCP chimney or RSS you can follow the netsh syntax below:

Chimney

To determine the current status of TCP Chimney Offload: netsh int tcp show global
To disable chimney: netsh int tcp set global chimney=disabled
To enable chimney: netsh int tcp set global chimney=enabled

RSS

To determine the current status of RSS, follow these steps: netsh int tcp show global

To disable RSS: netsh int tcp set global rss=disabled
To enable RSS: netsh int tcp set global rss=enabled

Example:
clip_image012

Note the following from the output above:

a.) Both chimney and RSS are in use.
b.) We have effectively turned them both off and received a confirmation that our changes took affect.

951037 Information about the TCP Chimney Offload, Receive Side Scaling, and Network Direct Memory Access features in Windows Server 2008:
http://support.microsoft.com/default.aspx?scid=kb;EN-US;951037

Netmon

For a networking administrator, netmon is an extremely useful tool to help determine what’s taking place on the wire. There is a saying however that I’ve heard all too often. “Reading netmon traces is more of an art than it is a science.” Covering all the ins and out of all the types of traffic and the differences therein of baseline behavior vs. failed or abnormal traffic will not be covered in this document. The discussion of protocol analysis can go very deep on just the basics alone. Although we are not going in-depth over Netmon usage it still warrants mentioning as a tool to be used by someone who is savvy in protocol analysis.

If you are interested in obtaining or sharpening this skill then below are a few links to send you down that path.

Netmon: http://www.microsoft.com/downloads/details.aspx?displaylang=en&FamilyID=983b941d-06cb-4658-b7f6-3088333d062f
OneClick-This will allow you to take a network capture. In some cases may be easier to use than Netmon : http://www.microsoft.com/download/en/details.aspx?id=6537

Basics of Reading Traces : http://support.microsoft.com/kb/169292

Putting it all together - Well this is a lot of stuff, where do I begin? Which tool do I use first and when?

There is no “absolute” order that must be followed but we will start by keeping it simple.

If you are trying to push out a DPM agent to a server and it fails then I suggest you test the following.

From the DPM server to the protected server
ping <protected server name>
net view \\<protected server name>
Sc \\<protected server name> query
Wmic /node:"<protected server name>" OS list brief
Wbemtest

Ping
If ping fails, then use tracert to see where the traffic dies at.
If ping fails, then check the integrated firewall on the target server.
If ping fails by using the name, then test by pinging the ip address of the target server.
If ping fails with name but works with IP, then check the DNS registration.
If ping works, then test with netview.

Netview
If net view fails, with error 53, then make sure the computer name is correct AND that file and printer sharing are enabled.
If net view fails, with "System error 5 has occurred. Access is denied." verify that you are logged on using
an account that has permission to view the shares on the remote computer.
If net view with the name fails then test with net view \\ipaddress if this works then name resolution may be an issue.
a.) Go to the target server and from a command prompt type: “ipconfig /flushdns” then enter. Then type
“ipconfig /registerdns” then enter. This flushes the dns resolver cache on the local server and re-
registers the name with DNS.
b.) From the DPM server at a command prompt type: “ipconfig /flushdns” and enter. Then type
“ipconfig /registerdns”

Does net view work now?  If net view succeeds then make sure the ADMIN$ is listed.

SC
Does SC \\<ServerName> query fail? If so:
a.) Check the target server integrated firewall to see if RPC traffic is locked down and being denied.
Either turn off the firewall and\or rely on the firewall logging as discussed earlier.
b.) If there are any firewalls in between the DPM server and target server make sure the RPC port range
is opened. Remember the port range is assigned dynamically from the TCP port range of 1024
through 65535.

This port range can be configured to be restricted but will need careful consideration and a collaborative effort with the Networking administrator as it will affect other types of traffic.

How to configure RPC dynamic port allocation to work with firewalls : http://support.microsoft.com/kb/154596

WMIC and WBEMTEST

If “wmic /node:"<protected server name>" OS list brief” fail and\or WBEMTEST fail then follow:

Troubleshooting Agent Deployment in Data Protection Manager 2007 – DCOM : http://blogs.technet.com/b/askcore/archive/2008/05/09/troubleshooting-agent-deployment-in-data-protection-manager-2007-dcom.aspx

Ports and TCP Chimney and RSS
If everything seems to check out by following the steps above then check the ports on the target server and of course try turning off TCP chimney and RSS for testing. Use Netstat or Tcpview and check the firewall logging again for any denied traffic.

Conclusion

Data Protection Manager agent communication can be difficult to chase down. There are many more tools built in, publically downloaded that are free or purchased that you can use and we all have our favorites that we like to use more than others. I just touched base on the ones commonly used in Data Protection Manager Support. They are relatively quick and simple to help cut to the chase as to where the problem may be at on such issues. If everything seems to fall into place as successful communication from a networking perspective then follow the three articles below in the “additional resources” section below and reference the DPM event logs and DPM error logs located at:

Client Side Activity-- %Program Files%\Microsoft Data Protection Manager\DPM\Temp
DPM Server Activity-- %Program Files%\Microsoft DPM\DPM\Temp

They can be opened with notepad for a look as to what may be happening as to the cause of the failure.

Additional Resources

Troubleshooting Agent Deployment in Data Protection Manager 2007 : http://blogs.technet.com/b/askcore/archive/2008/04/23/troubleshooting-agent-deployment-in-data-protection-manager-2007.aspx

Troubleshooting Agent Deployment in Data Protection Manager 2007 – DCOM : http://blogs.technet.com/b/askcore/archive/2008/05/09/troubleshooting-agent-deployment-in-data-protection-manager-2007-dcom.aspx

Troubleshooting Agent Deployment in Data Protection Manager 2007 – Networking
http://blogs.technet.com/b/askcore/archive/2008/05/01/troubleshooting-agent-deployment-in-data-protection-manager-2007-networking.aspx

Shane Brasher | Senior Support Escalation Engineer

Get the latest System Center news on Facebook and Twitter:

clip_image001 clip_image002

App-V Team blog: http://blogs.technet.com/appv/
AVIcode Team blog: http://blogs.technet.com/b/avicode
ConfigMgr Support Team blog: http://blogs.technet.com/configurationmgr/
DPM Team blog: http://blogs.technet.com/dpm/
MED-V Team blog: http://blogs.technet.com/medv/
OOB Support Team blog: http://blogs.technet.com/oob/
Opalis Team blog: http://blogs.technet.com/opalis
Orchestrator Support Team blog: http://blogs.technet.com/b/orchestrator/
OpsMgr Support Team blog: http://blogs.technet.com/operationsmgr/
SCMDM Support Team blog: http://blogs.technet.com/mdm/
SCVMM Team blog: http://blogs.technet.com/scvmm
Server App-V Team blog: http://blogs.technet.com/b/serverappv
Service Manager Team blog: http://blogs.technet.com/b/servicemanager
System Center Essentials Team blog: http://blogs.technet.com/b/systemcenteressentials
WSUS Support Team blog: http://blogs.technet.com/sus/

The Forefront Server Protection blog: http://blogs.technet.com/b/fss/
The Forefront Identity Manager blog : http://blogs.msdn.com/b/ms-identity-support/
The Forefront TMG blog: http://blogs.technet.com/b/isablog/
The Forefront UAG blog: http://blogs.technet.com/b/edgeaccessblog/

dpm 2007 dpm 2010 dpm 2012 system center 2012 data protection manager

Release Candidate of System Center 2012 Integration Packs for Orchestrator Released!

$
0
0

Following the release of System Center 2012 Release Candidate, Microsoft is pleased to announce the availability of the Release Candidate of the Orchestrator Integration Packs for the following System Center 2012 components:

  • System Center 2012 Virtual Machine Manager
  • System Center 2012 Operations Manager
  • System Center 2012 Data Protection Manager
  • System Center 2012 Service Manager

In addition, Release Candidate Orchestrator Integration Packs are also available for the following legacy System Center products:

  • System Center Operations Manager 2007 R2
  • System Center Service Manager 2010
  • System Center Virtual Machine Manager 2008 R2
  • System Center Data Protection Manager 2010
  • System Center Configuration Manager 2007

All of the above listed Integration Packs allow customers and partners to gain better automation and integration across their datacenter and private cloud environments by standardizing IT process and systems activities to drive greater consistency and improve operational ROI.

To obtain the Release Candidate Integration Pack download, visit http://www.microsoft.com/download/en/details.aspx?displaylang=en&id=28725

System Requirements:

System Center 2012 Component Support: System Center 2012 RC Orchestrator must be installed prior to installing the System Center 2012 RC Integration Packs.

Installation Instructions:

System Center 2012 RC Orchestrator Integration Packs

  • Download the System_Center_2012_Orchestrator_Integration_Packs.EXE file from the link above
  • Double click on System_Center_2012_Orchestrator_Integration_Packs.EXE
  • Follow the on screen prompts to extract the Integration Packs
  • After you extract the Integration Pack files, you must register them with the System Center 2012 RC Orchestrator management server and then deploy it to Runbook Servers and Runbook Designers. For instructions on how to install Integration Packs, see http://go.microsoft.com/fwlink/?LinkID=239936.

Related Resources:

Integration Pack Installation Instructions http://go.microsoft.com/fwlink/?LinkID=239936

System Center 2012 http://go.microsoft.com/fwlink/?LinkId=216991

Integration Pack Guide http://go.microsoft.com/fwlink/?LinkId=220929

 

This Release Candidate contains the following:

  • Orchestrator Integration Pack for System Center 2012 Virtual Machine Manager
    • 30 Runbook Activities including: Create Checkpoint, Create New Disk, Create New
      Disk from VHD, Create Network Adapter, Create User Role, Create VM From
      Template, Create VM from VHD, Create VM from VM, Get Checkpoint, Get Disk, Get
      Network Adapter, Get User Role, Get User Role Quota, Get VM, Manage Checkpoint,
      Move VM, Remove User Role, Remove VM, Repair VM, Resume VM, Run VMM PowerShell
      Script, Shut Down VM, Start VM, Stop VM, Suspend VM, Update Disk, Update
      Network Adapter, Update User Role Property, Update User Role Quota and Update
      VM.
    • RunVMM PowerShell Script allows runbooks to easily interact with the SC2012
      VMM PowerShell surface.
  • Orchestrator Integration Pack for System Center 2012 Service Manager
    • 13 Runbook Activities including: Create Change with Template, Create
      Object, Create Incident with Template, Create Related Object, Create
      Relationship, Delete Relationship, Get Activity, Get Object, Get Relationship,
      Monitor Object, Update Activity, Upload Attachment and Update Object.

  • Orchestrator Integration Pack for System Center 2012 Operations Manager
    • 8 Runbook Activities including: Create Alert, Get Alert, Get Monitor,
      Monitor Alert, Monitor State, Start Maintenance Mode, Stop Maintenance Mode and
      Update Alert.
  • Orchestrator Integration Pack for System Center 2012 Data Protection Manager
    • 9 Runbook Activities including: Create Recovery Point, Get Data Source,
      Get Recovery Point, Get DPM Server Capacity, Protect Data Source, Recover
      SharePoint, Recover SQL, Recover VM and Run DPM PowerShell Script
    • Run DPM PowerShell Script allows runbooks to easily interact with the SC2012
      DPM PowerShell surface.
  • Integration Packs for System Center Virtual Machine Manager 2008 R2, Operations Manager 2007 R2, Configuration Manager
    2007, Service Manager 2010, Data Protection Manager 2010 (unchanged from previous RC).
    • (YES!) Start/Stop Maintenance Mode for a Windows or Unix computer now recurses
      through all child monitors on that computer!
    • New published data from Get Alert and Monitor Alert:CompanyKnowledge, ManagementPackMonitorName,
      MonitoringRuleName, ManagementPackName, ManagementPackFriendlyName,
      ManagementPackDisplayName, ManagementPackId, ManagementPackVersion,
      ManagementPackIsSealed

Post RC:

  • Integration Pack for System Center 2012 Configuration Manager
Viewing all 293 articles
Browse latest View live


<script src="https://jsc.adskeeper.com/r/s/rssing.com.1596347.js" async> </script>