Skip navigation

Exchange & Outlook UPDATE, Exchange Edition, May 24, 2002

The ESE backup process, Exchange resources, and new products

Exchange and Outlook UPDATE, Exchange Edition—brought to you by Exchange & Outlook Administrator, a print newsletter from Windows & .NET Magazine that contains practical advice, how-to articles, tips, and techniques to help you do your job today.
http://www.exchangeadmin.com


THIS ISSUE SPONSORED BY

Quest Software: WHO'S SENDING ALL THAT EMAIL?
http://www.quest.com/landing/winnetmag_exchange0520.asp

Windows & .NET Magazine Webinars
http://www.winnetmag.com/seminars/veritas
(below COMMENTARY)


SPONSOR: QUEST SOFTWARE: WHO'S SENDING ALL THAT EMAIL?

WOULD YOU LIKE TO ANALYZE YOUR EXCHANGE USAGE WITH A CLICK? Want to diagnose Exchange bottlenecks with a glance?
If you answer YES, it's time to download your FREE trials of our solutions for Exchange management. MessageStats(tm) allows you to create Web-enabled reports on Exchange usage. Automate those reports the CIO is always asking for! Answer critical compliance questions and measure your ability to meet SLAs.

Just one glance at Spotlight(r) can tell you the root cause of bottlenecks when they occur. MessageStats and Spotlight have virtually zero footprint and support Exchange 5.5 and 2000. Download your free trials today!
http://www.quest.com/landing/winnetmag_exchange0520.asp


May 24, 2002—In this issue:

1. COMMENTARY

  • The ESE Backup Process: An Inside Look

2. ANNOUNCEMENTS

  • Cast Your Vote for Our Readers' Choice Awards!
  • Attend Our Free Windows Security Solutions Webinar!

3. RESOURCES

  • Exchange XADM: How to Back Up and Restore an Exchange 2000 Server Computer
  • Featured Thread: Backing up Exchange 5.5

4. NEW AND IMPROVED

  • UltraBac Software Announces UltraBac 7.0

5. CONTACT US

  • See this section for a list of ways to contact us.

1. COMMENTARY
(contributed by Jerry Cochran, News Editor, [email protected])

  • THE ESE BACKUP PROCESS: AN INSIDE LOOK

  • I recently updated my understanding of Exchange Server backups and restores (I'm always discovering new things about Exchange) and learned quite a bit about how Exchange backs up databases. This week, I want to give you an under-the-hood look at the Exchange Extensible Storage Engine (ESE) backup process. Next week, I'll cover the ESE restore operation.

    Starting Off
    Several important operations occur at the start of Exchange's backup process. When you initialize a full backup operation, ESE begins by flushing all the dirty pages in its cache (i.e., the Information Store—IS—buffers) to disk and halting the checkpoint. The checkpoint won't advance until the backup operation is complete. (When you run a partial backup such as a differential, incremental, or copy backup, ESE lets the checkpoint advance because the backup operation doesn't touch the databases.) Next, ESE creates patch files for each database you're backing up. ESE uses patch files in special circumstances during backup operations to ensure database integrity. (In Exchange 2000 Server Service Pack 2—SP2—Microsoft figured out how to avoid the need to flush dirty pages that cause patching operations, so SP2 doesn't need to use patch files.)

    Copying the Databases
    The next step in the backup process involves backing up the database files. The backup application uses backup API calls to pass to ESE a list of databases to be backed up. These database are open files (remember Exchange backups let you back up the databases online), so the backup application doesn't simply copy the databases to the backup set. Instead, ESE begins to send the backup application 64KB chunks of database pages (sixteen 4KB pages at a time) in sequential order. During this crucial step, ESE performs a checksum on each page; any errors cause the backup operation to terminate with the -1018 error. (See "Understanding -1018, -1019, and -1022 Database Errors," http://www.exchangeadmin.com, InstantDoc ID 25236, for a description of this error.) ESE continues this process until it has sent the backup application all the pages for each database.

    Back Up the Transaction Logs
    Next, ESE must store the transaction logs to the backup set. As I mentioned earlier, ESE halts the checkpoint at the beginning of the backup. Although the checkpoint is halted, ESE continues to write transactions to the log files and continues to flush dirty pages from the database cache to disk. To back up the log files, the backup application uses the HrESEBackupGetLogAndPatchFiles API call to request a list of log files (and patch files, if applicable) from ESE. When ESE receives this call, it closes the current log file, saves the file as the next log generation in a sequential list, and opens a new E0n.log file (n refers to the storage group—SG—instance of the log file). In the case of a full backup, ESE then returns a list of log files to the backup application; this list starts with the current log generation (in which the checkpoint was halted) and ends with the log generation that ESE just closed (i.e., E0n.log minus 1). In the case of an incremental or differential backup, ESE returns a list beginning with the oldest log generation on disk and ending with the most recently closed log generation. Using this list, the backup application can open file handles to the log files and copy them to the backup set. During this operation, ESE ensures that no log generation is missing from the sequence passed to the backup application.

    Truncate the Logs
    After the log files have been stored to the backup set, they aren't needed on disk. During full and incremental backup operations, ESE truncates the log files on disk after it receives the HrESEBackupTruncateLog API call from the backup application. The lower of either the checkpoint log generation or the log generation listed in the database header for the current full backup determines which log files ESE truncates. (To view the header, use the Eseutil program with the /mh parameter.) After the log files are truncated, the backup operation is complete and the backup application closes the backup set. At this point, ESE can return to normal database-engine operations and permit the checkpoint to advance.

    The backup operation for the Exchange ESE is intricate and can be confusing. However, understanding how this important operation works is crucial. The way you structure your backups and the combination of full, incremental, or differential backups that you employ determines the recoverability of your valuable Exchange data. As an exercise to better understand this process, you might want to consider testing backup operations in a lab environment.


    SPONSOR: WINDOWS & .NET MAGAZINE WEBINARS

    RAISING WINDOWS 2000 AVAILABILITY - FREE WEBINAR
    How can you reduce (or eliminate) data loss and downtime in the event of a site-wide disaster? Attend the latest free Webinar from Windows & .NET Magazine and get the answers including what kind of fault-tolerant disk setup to use, what clustering is (and isn't!) good at, and best practices for boosting SQL and Exchange availability. Register (for FREE) today!
    http://www.winnetmag.com/seminars/veritas


    2. ANNOUNCEMENTS
    (brought to you by Windows & .NET Magazine and its partners)

  • CAST YOUR VOTE FOR OUR READERS' CHOICE AWARDS!

  • Which companies and products do you think are the best on the market? Nominate your favorites in four different categories for our annual Windows & .NET Magazine Readers' Choice Awards. You could win a T-shirt or a free Windows & .NET Magazine Super CD, just for submitting your ballot. Click here! http://www.winnetmag.com/readerschoice

  • ATTEND OUR FREE WINDOWS SECURITY SOLUTIONS WEBINAR!

  • If you're using Windows 2000 to run mission-critical applications, you know Win2K has security concerns. The Windows & .NET Magazine's Security Solutions Summit, a half-day online event, addresses where the vulnerabilities lie, how you can strengthen your enterprise's security, and how you can exploit the same tools that hackers use. Register today!
    http://www.winnetmag.com/seminars/security

    3. RESOURCES

  • EXCHANGE XADM: HOW TO BACK UP AND RESTORE AN EXCHANGE 2000 SERVER COMPUTER

  • Each week, Microsoft posts several Exchange Server how-to articles to its Knowledge Base. This week, learn how to back up and restore an Exchange 2000 Server system.
    http://support.microsoft.com/default.aspx?scid=kb;en-us;q258243

  • FEATURED THREAD: BACKING UP EXCHANGE 5.5

  • Stacia has run into some problems while using the Windows 2000 Backup utility to back up her Exchange Server 5.5 Service Pack 4 (SP4) Information Store (IS). To offer your advice or join the discussion, go to the following URL:
    http://www.exchangeadmin.com/forums/thread.cfm?cfapp=72&thread_id=105322&mc=10

    4. NEW AND IMPROVED
    (contributed by Bob Kretschman, [email protected])

  • ULTRABAC SOFTWARE ANNOUNCES ULTRABAC 7.0

  • UltraBac Software announced UltraBac 7.0 backup software, which contains several new and enhanced features compared with earlier versions. New features include an available Exchange 2000 Server agent, an enhanced Oracle agent, an expanded Scheduler, and the ability to remotely administer other UltraBac installations. The Exchange 2000 agent can run local and remote backups of live databases without shutting them down. UltraBac has redesigned UltraBac 7.0's underlying software code to provide additional compatibility and features as technology evolves. For pricing and additional information, contact UltraBac at 425-644-6000 or on the Web.
    http://www.ultrabac.com

    5. CONTACT US
    Here's how to reach us with your comments and questions:

    (please mention the newsletter name in the subject line)

    This email newsletter is brought to you by Exchange & Outlook Administrator, the print newsletter with practical advice, tips, and techniques covering migration, backup and restoration, security, and much more. Subscribe today!
    http://www.exchangeadmin.com/sub.cfm?code=neei23xxup

    Receive the latest information about the Windows and .NET topics of your choice. Subscribe to our other FREE email newsletters.
    http://www.winnetmag.net/email

    Hide comments

    Comments

    • Allowed HTML tags: <em> <strong> <blockquote> <br> <p>

    Plain text

    • No HTML tags allowed.
    • Web page addresses and e-mail addresses turn into links automatically.
    • Lines and paragraphs break automatically.
    Publish