Using Asigra DS-Client Logs

How to understand backup operations using the DS-Client logs

For Lewan Managed Data Protection customers wanting additional information beyond what is available in the daily or weekly reports, the Asigra software provides the ability to look at the DS-Client activity logs. This post assumes that the user has installed or been given access to the DS-User interface and is able to connect to their DS-Client server.
A previous blog post (http://blog.lewan.com/2012/03/29/asigra-ds-user-installation-and-log-file-viewing/) addressed the installation of the DS-User along with some basics on the activity logs. This post will provide additional detail regarding the data provided by the activity logs.

Open the DS-User interface and connect to the appropriate DS-Client

media_1370017433779.png

From the menus select “Logs” and open the “Activity Log”

media_1370017447703.png

Set the parameters for logs desired

media_1370017475203.png

By default the system will display all logs for the current and previous days. For this exercise only backup activity will be required. The date and time range as well as specific nodes (backup clients) or backup sets can also be selected.
Once all options have been set, click the “Find” button to locate the specified logs.

Backup windows

media_1370017539988.png

For each set backed up, the start time, end time and total duration of the backup job can be observed. Each column can be sorted to assist in viewing.

On line Data Changed

media_1370018486463.png

The column labeled “Online” indicates to total size of changed files for the backup. That is the total amount of space used by all files which had any chage since the last backup session. For example a server with a 30 GB database which has daily updates and 4 new 1 MB documents would show 32,216,449,024 (30 GB + 4 MB). This is the amoutn of data copied from the backup client to the DS-Client.

Data Transmitted to the cloud

media_1370018516767.png

The column labeled “Transmitted…” shows the actual amount of data changed and copied to the cloud based device. This is the amount of data contained in changed blocks from all of the changed files, after compression and encryption. If, in the example above, the database file only had 1 MB of changes the Transmitted column would contain a number similar to 5,242,880 (roughly 5 MB).

Determining error and warning causes

media_1370019239770.png

In some cases a backup set will show a status of “Completed with Errors” or “Completed with Warnings”. In most cases the errors and warnings are inconsequential but should usually be looked at.
Select the line containing the backup set in question and click on the “Event Log” button

Backup Session Event Log

media_1370018398623.png

Each event in the backup session is listed in the log. Errors are flagged with a red ‘X’ and warnings with a yellow ‘!’. Selecting the event will show the detail. In the example shown above a file is stored for which the backup user does not have permission to read the file. Other common errors are due to a file being used by another process and a file which has been moved or deleted between the initial scan of the file system and the attempt to access it for backup.
In some cases there will be a large number of errors “The network name cannot be found.” These usually indicate that there is a problem with the network connection between the DS-Client and the backup target but could be caused by a reboot of the backup target or other connectivity issues.

For our Managed Data Protection customers, the Lewan Operations team checks backup sets for errors on a daily basis and will correct any critical issues.

Additional analysis

media_1370020250336.png

The activity log can also be saved to a file (text or Excel spreadsheet) for additional analysis. Right-click anywhere in the activity log and select “Save As”. Used the resulting dialog to configure the location and file type.

SAVE! SAVE! SAVE!

Have you ever been in the middle of an important document when your computer crashes or freezes and realize you didn’t save it? You are not alone! I think we’ve all been there a time or two…or three! But there may be hope for us yet! The Auto Recovery (AutoSave) feature is here to help!

Depending upon the Microsoft Office version that you have, AutoRecovery (AutoSave) is a feature that will recover a document if your computer loses power or if a program error occurs while working in a document.

This feature will create a file similar to “AutoRecover Save of <file name>.doc.” When the program is restarted, the application will search your system for any of these files. Some documents may not be recoverable especially, if you’ve never saved the document before.  And even if you have saved the document, you may lose recent changes. Once the program you were working in is restarted, it will automatically attempt to open the autorecovery files. If it does so successfully, then you will be able to save the document.

This is a truly valuable feature that Microsoft Office offers. But in order for it work, it must be enabled. To view instructions on how to enable this feature, go to: http://office.microsoft.com/en-us/word-help/automatically-save-and-recover-office-files-HP010140729.aspx.

Lewan & Associates is now Lewan Technology

LEWAN DEBUTS BRAND REFRESH HIGHLIGHTING TECHNOLOGY EXPERTISE

May 9, 2013, Denver, CO—Next month will mark 41 years of Lewan delivering great products, solutions, services and technologies to businesses in the Rocky Mountain region. In conjunction, we are excited to announce a brand refresh to compliment our growing business.

Lewan & Associates is now Lewan Technology.

This is an exciting time at Lewan as we continue to grow and expand our technology offerings to further support our customers’ needs. As our solutions grow, we also want to continue growing the Lewan brand to remain current and fresh. Part of this growth will pair the highly recognized and respected Lewan name with another word that represents our present breadth and width of solutions. With that, welcome to today’s Lewan: “Lewan Technology”. We will say goodbye to the “& Associates” part of our branding and usher in clearer picture of what we do best: technology.

“Lewan Technology is dedicated, as we have always been, to world class products, world class services, and a world class customer experience. Our name now emphasizes our commitment to technology leadership as well.” Fred Cannataro, CEO & President of Lewan Technology.

About Lewan
Rely on Lewan Technology to manage your print and IT solutions so you can focus on core business. As a subsidiary of Xerox, you can depend on our 40+ years of providing local service and support, backed by the trusted Xerox name. With regional Rocky Mountain offices and a national network of long-standing partnerships, you have a single point of contact for all of your technology needs.

Contact Information:
http://www.lewan.com
1.888.LEWAN11
solutions@lewan.com

Gaining user acceptance for your desktop virtualization project

So proud of Lewan’s own Kenneth Fingerlos who will be speaking next week at Citrix Synergy. A link to his session overview is available on the Citrix Blog: Gaining user acceptance for your desktop virtualization project | Citrix Blogs. Well done, Kenneth! Read his post to the Citrix Blog below:

Gaining user acceptance for your desktop virtualization project
By Kenneth Fingerlos

With the IT press being dominated with articles on the pitfalls of BYO, MDM, MAM, mobile data and cloud-based services it’s clear that enterprise IT and end-users are thinking about different things. When we look at the OS on our compute devices it’s clear that more and more end-user concerns are driving the decisions which go into the design of the devices.

When IT takes on desktop virtualization we focus on costs, security and efficiency. We assess our users to help us determine what is needed for them to do their jobs. With that knowledge we optimize our designs to minimize costs and provide just what every user needs. We focus on single image management and questions of if MCS or PVS might be a better way to deliver our unified images. Do we need a 3rd party personalization manager or can we make due to with roaming profiles or perhaps we can drop personalization all together.

Meanwhile our users are purchasing iPads and Androids at an alarming rate.

It’s common for IT to focus on securing our borders, centralizing our data and developing the most efficient infrastructures we can. It is after all what good IT people are trained to. We read the design guides and perform our Assess Design Deploy process faithfully. We know who our user groups are and what applications they need. We’ve created pristine template images, with all of our corporate graphics and the approved list of applications pre-installed. In short, our design is textbook perfect we’ve addressed all of IT’s project goals and we’re ready to begin roll-out.

Why then do our users balk at adopting virtualized desktops? Often stalling or delaying projects indefinitely?

Often when projects reach the user testing phase we find that users are reluctant and frequently actively resistant to adopting new virtualized desktops. When presented with the new “IT Optimized” desktop paradigm our users blatantly refuse to use it. And the project stalls.

Let’s explore why users are resistant, and what we (IT) can do to help ease them into a new model. We’ll talk about easy use cases and end user wins. We’ll talk about marketing desktop virtualization to our users. We’ll talk about some not-so-easy scenarios that we may want to put off and tackle after the project has some steam and victories on the record. We’ll talk about gold images, RemotePC, personal vDisk, personalization and dedicated desktops. But most importantly we’re going to talk about what users are looking for and how we bring them on-board with the project.

Come join me Friday, May 24th in SYN216: Gaining user acceptance for your desktop virtualization project at Synergy Los Angeles to talk about these issues and learn how to not only drive user adoption but to convert your users into your project’s largest promoters.

Kenneth Fingerlos has been working in IT since 1996 in various roles including systems admin, IT manager and IT consultant with a focus on all aspects of datacenter and end-user computing. Kenneth currently holds certifications from VMware and Citrix and works as a systems architect with Citrix Platinum partner Lewan & Associates. Twitter: @Kfingerlos

Lewan Achieves Veeam Gold/Platinum Partner Status

veeam backup, lewan gold parnterOur Enterprise Solutions team has been hard at work in the lab, training to become solutions experts for Veeam Data Protection and Backup tools. Their hard work, dedication and opportunity to train with Veeam’s technical team has earned Lewan the recognition of Gold Partner status in the Veeam ProPartner Program. Congratulations!

View all of Lewan’s Vendor Partners: http://www.lewan.com/vendorpartners

Asigra File Recovery

Self service recovery of one or more files from Asigra file system backup.

In the DS-User Interface, Open restore dialog for backup set

media_1330636107098.png

Select recovery objects

media_1330636203533.png

For restore of most recent backup of a directory, browse to specific folder and select that folder.
For other options select Show Files or Advanced

Selection of an individual file

media_1330636222955.png

Advanced selection options

media_1330636256503.png

Default is the latest generation of data (most recent backup)
See Asigra DS-Client documentation for detailed description of options

Selection of a backup session for selective data option

media_1330636265951.png

Data selected from specific backup session

media_1330636271712.png

Note that not all data will be included in any backup session. The “From” date may need to be moved in order to pick up files which had not changed at the time of a particular session.

Restore files to original location

media_1330636318699.png

Use this option with caution as more recent versions of files may be overwritten

Alternate restore options

media_1330636383356.png

The server, destination share and path may all be changed.
Note that by default the entire directory structure is restored below the destination. The full path is noted in the bottom pane. The path can be truncated (from the top directory shown in red) by incrementing the counter on the right.

Overwrite warning pop-up

media_1330636389349.png

Keep default performance options

media_1330636393563.png

Other restore options

media_1330636404531.png

Normally these are left at the default.

Restore progress window

media_1330638166441.png

Restored files

media_1330636526139.png

Note full path of restore

To document the restore open the Activity Log

media_1333641354850.png

Select the parameters to locate the specific restore job

media_1333641382015.png

Select the restore job and open the detailed log

media_1333641393788.png
media_1333641398887.png

Right-Click on the log entries and select “Save As…”

media_1333641424187.png

Select a directory location and appropriate name for the log file

media_1333641453260.png