Thanks. I don't have many Windows servers being used with these kinds of files. Everything here is via SAN/CIFS/DFS connections via shares. I will roll these out via CLOPTSET.
On Mon, Jun 19, 2017 at 4:22 PM, Tom Alverson <tom.alver...@gmail.com> wrote: > I have these commands in the DSM.OPT file (this is a normal windows server > backup, not a SAN) > > EXCLUDE "*:\...\~*.pst.tmp" > > EXCLUDE "*:\...\~*.ppt" > > EXCLUDE "*:\...\~*.pptx" > > EXCLUDE "*:\...\~*.xlsx" > > EXCLUDE "*:\...\~*.xlsM" > > EXCLUDE "*:\...\~*.docx" > > EXCLUDE "*:\...\~*.xlsb" > > On Mon, Jun 19, 2017 at 1:24 PM, Zoltan Forray <zfor...@vcu.edu> wrote: > > > Tom, > > > > I hate using weird/special characters in excludes for fear of casting too > > wide of a net. But, as you said, there is no need to attempt to backup > > M$Office temp files. > > > > So, is this what you use to exclude them, via CLOPTSET? > > > > EXCLUDE '*:\...\~*.pptx' > > EXCLUDE '*:\...\~*.xlsx' > > EXCLUDE '*:\...\~*.docx' > > > > > > On Fri, Jun 2, 2017 at 11:28 AM, Tom Alverson <tom.alver...@gmail.com> > > wrote: > > > > > For starters I would exclude all of the office temp files like ~*.xlsx > as > > > shown in your example. These are just small temp files that have the > > name > > > of the user who has opened the file in them. > > > > > > On Fri, Jun 2, 2017 at 8:49 AM, Zoltan Forray <zfor...@vcu.edu> wrote: > > > > > > > We have 3-Windows 2012R2 servers (current client is 7.1.3) that are > > used > > > to > > > > backup numerous (>50-each) DFS (were CIFS) mounts, each having their > > own > > > > TSM NODE and schedule that includes Objects that point to the > > filesystem > > > > (i.e. \\rams.adp.vcu.edu\SOM\TSM\GA\*). > > > > > > > > This is done so each mount/group/area/directory/department can > > > administer > > > > their own backups via the webclient and unique ports for each. > > > > > > > > One problem we have always struggled with is Open Files. Invariably, > > we > > > > constant get errors like: > > > > > > > > ANE4987E (Session: 278819, Node: ISILON-DWS) Error processing '\\ > > > > rams.adp.vcu.edu\dws\WilderSchool\Shared\Administrative\GVPA_FIN\GPA > > > > Department\Center for Public Policy\CPP Fiscal Officer\Com > > > > Logs\FY17\~$CURA_Com Log_FY17_2017.04.15.xlsx': *the object is in use > > by > > > > another process* > > > > > > > > Since snapshotproviderfs doesn't work, how else can we handle open > > files > > > > and getting backups, albeit fuzzy, of these files? > > > > > > > > -- > > > > *Zoltan Forray* > > > > Spectrum Protect (p.k.a. TSM) Software & Hardware Administrator > > > > Xymon Monitor Administrator > > > > VMware Administrator > > > > Virginia Commonwealth University > > > > UCC/Office of Technology Services > > > > www.ucc.vcu.edu > > > > zfor...@vcu.edu - 804-828-4807 > > > > Don't be a phishing victim - VCU and other reputable organizations > will > > > > never use email to request that you reply with your password, social > > > > security number or confidential personal information. For more > details > > > > visit http://infosecurity.vcu.edu/phishing.html > > > > > > > > > > > > > > > -- > > *Zoltan Forray* > > Spectrum Protect (p.k.a. TSM) Software & Hardware Administrator > > Xymon Monitor Administrator > > VMware Administrator > > Virginia Commonwealth University > > UCC/Office of Technology Services > > www.ucc.vcu.edu > > zfor...@vcu.edu - 804-828-4807 > > Don't be a phishing victim - VCU and other reputable organizations will > > never use email to request that you reply with your password, social > > security number or confidential personal information. For more details > > visit http://infosecurity.vcu.edu/phishing.html > > > -- *Zoltan Forray* Spectrum Protect (p.k.a. TSM) Software & Hardware Administrator Xymon Monitor Administrator VMware Administrator Virginia Commonwealth University UCC/Office of Technology Services www.ucc.vcu.edu zfor...@vcu.edu - 804-828-4807 Don't be a phishing victim - VCU and other reputable organizations will never use email to request that you reply with your password, social security number or confidential personal information. For more details visit http://infosecurity.vcu.edu/phishing.html