ENTERPRISE

Exchange Server 2007 : Backup and Recover Data (part 2) - Backup and Recovery with Server 2008

1/16/2011 3:20:09 PM

Backup and Recovery with Server 2008

Logically, if Server 2008 doesn’t support a streaming online backup of Exchange databases, you have to pursue a third-party solution. The support is still in place internally for streaming backups (although remote streaming backup support has been removed on Server 2008). What you are looking for in a backup solution is one that supports both streaming and VSS solutions.

You might look into a third-party solution that can perform the streaming backup (or VSS backup), but remember that you cannot make a remote streaming backup regardless of the solution you employ because a remote backup with Exchange 2007 SP1 and Server 2008 is not supported.

Microsoft offers a solution called Microsoft System Center Data Protection Manager (DPM) 2007, shown in Figure3. The Microsoft System Center product line is designed to assist administrators with managing their server infrastructures. Data protection is a key aspect of administrative management and so the DPM is designed to assist with Exchange, SQL, SharePoint Services, and even file shares from 2003/2008 Windows servers.

Figure 3. Using DPM to perform an Exchange 2007 backup.

Note

Both Server 2003 and 2008 have VSS capabilities. With Server 2003, the NTBackup program cannot perform VSS backups, so you require a third-party solution to take advantage of this solution. Server 2008 Windows Server Backup does include this feature; however, as already mentioned, not for Exchange. In both cases, you can install Data Protection Manager. This provides VSS support for your Server 2003 system and provides VSS and standard backup support for both Server 2003 and Server 2008.


We can say much regarding the capabilities of DPM. A few items that stand out are that it has the capability to perform more than a storage group or database backup and restoration. You can also restore an individual mailbox or Public Folder, which is a time saver and eliminates an administrative headache. Keep in mind though that third-party solutions offer that capability too, and DPM, although not a third-party solution, is still an external solution. It’s a solution that doesn’t come with the operating system, costs you money, and requires time to learn, similar to a third-party backup solution. It simply comes from Microsoft and that might appeal to you in that it should function well with other Microsoft products, in this case Exchange 2007 with all of its features.

One of the features supported by DPM is the high availability options and creating copies of your data from the passive nodes of your clusters. You have the capability to go from disk to disk and then to tape for your offline solution.

Finally, DPM uses VSS shadow copies (a feature not supported by NTBackup) to create quick block-level difference backups.

What are Volume Shadow Copies?

Volume Snapshot Service, or Volume Shadow Copies (typically expressed as VSS) is a feature that we might be more familiar with functionally than technologically. The reason we say this is because it isn’t a new concept; in fact, we have had aspects of VSS in our Windows operating system since Windows XP SP1. Server 2003, 2008, and Vista all have aspects of VSS implemented. If you have used the System Restore or Previous Versions features, you have used a form of VSS.

However, the question is: What is VSS?

Simply put, your system takes a point-in-time snapshot of your data. It first looks at what you have from the first snapshot and then, rather than performing complete backups going forward, looks for changes to data and only backs up the changes.

Here is the overall process of an Exchange backup using VSS:

  1. The VSS requester (your backup software, which is going to have to be a third-party solution for Exchange with either Server 2003 or 2008) is told to begin the VSS backup or create the shadow copy.

  2. The VSS writer (the Exchange database information store) freezes the databases to ensure you have no new writes to the databases. Note that for this reason, with continuous replication solutions and clusters, it is recommended you use the passive copy of the database because you have less of a chance that the procedure will fail due to writes coming in.

  3. The VSS provider (the hardware and software that create the snapshot) creates the snapshot.

  4. The VSS writer is told when the copy is complete and will allow writes to the database again.

  5. The VSS requester (your backup software) lets you know the copy was complete.

There are varieties of ways the technology is advancing on all fronts (software and hardware) to improve the way these copies work. However, overall they are faster and take up less disk space then a traditional backup would.

Other  
  •  Exchange Server 2007 : Design and Deploy Disaster Recovery Settings - Recover Deleted Items and Mailboxes
  •  Exchange Server 2007 : Design and Deploy Disaster Recovery Settings - Design for Disaster
  •  Architecting a SharePoint 2010 Deployment : Choosing the Right Hardware for SharePoint
  •  Architecting a SharePoint 2010 Deployment : Understanding the Reasons for Deploying Multiple Farms
  •  Understanding the SharePoint Server Roles
  •  Installing Exchange Server 2010 : Installing the Edge Transport Server
  •  Installing Exchange Server 2010 : Installing dedicated server roles
  •  Installing Exchange Server 2010 : Check the Exchange installation
  •  Introducing SharePoint 2010 (part 2)
  •  Introducing SharePoint 2010 (part 1)
  •  Installing Exchange Server 2010 : Unattended setup
  •  Performing a typical Exchange Server 2010 install
  •  Installing the Exchange Server 2010 prerequisites
  •  Outlining Improvements in SharePoint 2010
  •  Understanding the Capabilities of SharePoint 2010
  •  Exchange Server 2010 server roles (part 3) - Edge Transport Server role
  •  Exchange Server 2010 server roles (part 2)
  •  Exchange Server 2010 server roles (part 1) - Mailbox Server role
  •  Exchange Server 2010 and Active Directory
  •  Microsoft Enterprise Library : Non-Formatted Trace Listeners
  •  
    Video
    Top 10
    Straighten Teeth for Better Portraits (part 1)
    Windows 7 : Configuring Network Connectivity - Configuring DirectAccess
    Create virtual desktop with nSpaces (Part 1)
    Algorithms for Compiler Design: ELIMINATING INDUCTION VARIABLES
    SQL Server 2008 : Multiple Sources with SQL Server Integration Services
    What's Your Strategy For Today’s Server Room Challenges?
    Monster Wars
    Sharepoint 2007: Upload a File - Upload a File from the Web Interface
    Developing the SAP Data Center : Data Center Physical Requirements
    Windows Server 2008 : Active Directory Federation Services
    Most View
    Themes on Windows Phone 7 Devices (part 2) - Changing the Theme & Detecting the Currently Selected Theme
    ASP.NET 4 : Getting More Advanced with the Entity Framework (part 2) - Updates, Inserts, and Deletes
    Programming .NET Security : Using the Code-Access Security Policy Tool (part 1) - Administering Policy Levels
    Mobile Commerce Applications, Part 2
    Working with Access and Connectivity Policies in Vista
    CPU System Workshop (Part 3) - Enermax Platimax 1000w, Kingston Hyperx Genesis KHX2400C11D3K4/8GX
    Angry Bird Space - They are back (Part 2)
    Programming Microsoft SQL Server 2005 : FOR XML Commands (part 2) - FOR XML EXPLICIT
    Wireless Networking Essentials (Part 1) : Wireless Adapters Or NICs, Wireless Router & Wireless Access Point
    All in One - The iDevice To Rule Them All
    BizTalk 2006 : Editing and Resubmitting Suspended Messages (part 2) - Pseudo-Walkthrough to Perform Edits and Resubmits
    Infrastructure Security: The Application Level
    Windows Server 2008 : Transport-Level Security - Active Directory Rights Management Services
    Biggest tips guide ever! (Part 3) - Security
    Birds Of Prey (Part 1) - Flight, Gaze, Eagle silhouette
    The best of the web (Part 1) - Lfttt & Diaspora
    Exchange Server 2010 : Implementing Client Access and Hub Transport Servers - Understanding the Hub Transport Server
    10 best products of the past 200 issues (part 2)
    Choosing A... Laptop
    Beginning Android 3 : The Input Method Framework - Fitting In