06-11-2014 01:35 AM
I have a server with 3000 orphanned placeholders and we are still trying to decide how to deal with this .. In the meantime The server seems to be making a large number of recalls and we cannt seemt o find our whats doing the recalls
I have the follwing enry in the registry to exluded exe EVPlaceholderService.exe;beremote.exe;mcshield.exe;bpfis.exe;bpbkar32.exe;Explorer.exe;
Any ideas how to find out whats doing the recalls ?
Solved! Go to Solution.
06-11-2014 02:10 AM
Hi Yabole,
Besides process monitor another is to dtrace placeholder service on the file server - Rob Wilcox has a good post on it :)
http://www.symantec.com/connect/blogs/how-find-process-recalling-placeholder
Another place is to look is the IIS logs on the EV Server and filter by those download.asp urls - you can find if they are happening at nights/during the days etc..number of items and which Archive ID's what files/savesets
Basically all placeholders are hardcoded with a url in the form of:
http://evserver1.domain.local/EnterpriseVault/download.asp?VaultID=15E70F1A34D89EE459542AB53D6777BA21110000evserver1&SavesetId=201303072697221~201303071618130000~Z~F0794377C3D58EDEB0F9BC0F80C86AA1&Request=NativeItem
This is the ArchiveID or VaultID - VaultID=15E70F1A34D89EE459542AB53D6777BA21110000evserver1. You can look this up in the Vault Admin Console so that will give you an idea which FSA archivepoint is being accessed.
Saveset - which you track which file was being downloaded
SavesetId=201303072697221~201303071618130000~Z~F0794377C3D58EDEB0F9BC0F80C86AA1
And you can search in SQL to give you more info:
https://www-secure.symantec.com/connect/downloads/useful-sql-query-item-details
Lastly how to get rid of orphaned placeholders:
1. Shortcut Deletion tab of Archive task - schedule that to run and clear the shortcuts which are orphaned by storage expiry or by deletions which failed delete on delete
2. FSAutility - http://www.symantec.com/business/support/index?page=content&id=HOWTO97253
HTH
06-11-2014 01:52 AM
Hi Yobole,
I would suggest to use Process monitor on the File Server to find out which application is recalling the files.
I can see in the exclude we have beremote.exe(Backup Exec agent) included but.. Are you using any other backup application then that needs to be excluded too..
you can also refer this article on how to exclude.
http://www.symantec.com/docs/TECH51039
Regards,
A_J
06-11-2014 02:10 AM
Hi Yabole,
Besides process monitor another is to dtrace placeholder service on the file server - Rob Wilcox has a good post on it :)
http://www.symantec.com/connect/blogs/how-find-process-recalling-placeholder
Another place is to look is the IIS logs on the EV Server and filter by those download.asp urls - you can find if they are happening at nights/during the days etc..number of items and which Archive ID's what files/savesets
Basically all placeholders are hardcoded with a url in the form of:
http://evserver1.domain.local/EnterpriseVault/download.asp?VaultID=15E70F1A34D89EE459542AB53D6777BA21110000evserver1&SavesetId=201303072697221~201303071618130000~Z~F0794377C3D58EDEB0F9BC0F80C86AA1&Request=NativeItem
This is the ArchiveID or VaultID - VaultID=15E70F1A34D89EE459542AB53D6777BA21110000evserver1. You can look this up in the Vault Admin Console so that will give you an idea which FSA archivepoint is being accessed.
Saveset - which you track which file was being downloaded
SavesetId=201303072697221~201303071618130000~Z~F0794377C3D58EDEB0F9BC0F80C86AA1
And you can search in SQL to give you more info:
https://www-secure.symantec.com/connect/downloads/useful-sql-query-item-details
Lastly how to get rid of orphaned placeholders:
1. Shortcut Deletion tab of Archive task - schedule that to run and clear the shortcuts which are orphaned by storage expiry or by deletions which failed delete on delete
2. FSAutility - http://www.symantec.com/business/support/index?page=content&id=HOWTO97253
HTH