Overview and Concepts
Some definitions used throughout our documentation, and other high-level information about how Zmanda Pro operates.
Terms and Definitions
Admin User: A user with elevated privileges who can create backup users, define backup policies, access job history, configure email notifications, and manage backup and restore operations.
Backup Users (Sometimes referred to simply as Users): Accounts used to log into devices with the Zmanda Pro client software installed. They can be mapped to actual end-users, or they can be mapped to different devices. For example, a user may be created for each employee in a company, or, separate users can be created for each server managed by an IT team. In both cases, there should be a 1-to-1 mapping of users to devices for security and performance reasons.
The password for each backup user is essential for encrypting backup data. See here for more information.
Devices: Systems with the Zmanda Pro client software installed, which can be based on Windows, Linux, or macOS. These devices execute tasks like deduplication, encryption, compression, and data transmission. Each device is associated with a single backup user.
Protected Items: Data sources, including filesystems, shares, databases, disk images, VMs, M365, or other relevant sources.
Storage Vaults: Storage locations for backed-up data, serving as the units for deduplication and encryption. Vaults can be provisioned from various storage media, including local disks, mounted filesystems, and cloud storage. It's important to note that data deduplication does not occur across different Storage Vaults. Storage vaults are only accessible by a single backup user.
Security & Encryption
See here for more information on how Zmanda handles encryption.
Custom Commands
Zmanda Pro allows you to execute commands before and after backup jobs, allowing you more control over backup workflows. Possible uses include running commands to dump databases, taking filesystem snapshots, running rsync or rclone scripts, and more. The commands run on the device where the agent is installed.
Commands can be configured on three levels:
Protected Items: Execute commands tailored to individual items, such as dumping a database before its backup.
Storage Vaults: Implement custom commands for storage vaults, like performing unique network authentication procedures.
Schedules: Automate actions linked to schedules, enabling tasks like shutting down your computer after a backup.
Command Execution Sequence: During a backup job, commands are executed in this order:
Schedule Before
Protected Item Before
Storage Vault Before
Backup
Storage Vault After
Protected Item After
Schedule After
Shell Built-ins for Enhanced Flexibility: Expand your command capabilities by incorporating shell built-ins, ensuring compatibility with your operating system through either cmd.exe or /bin/sh execution.
Environment Variables
When executing custom before or after commands, the following environment variables are available:
BACKUP_TOOL_USERNAME
Type: String
BACKUP_TOOL_DEVICE_ID
Type: String
BACKUP_TOOL_JOB_ID
Type: String
BACKUP_TOOL_JOB_STATUS
Type: Integer
Comment: Job status is accessible exclusively within After commands.
Device Registration
Devices must be registered to a particular user before storage vaults and protected items can be configured. Registration may be done directly on the client system or remotely for silent installation. We recommend a 1:1 mapping of users to devices for the best performance and security.
Backup Approach
Zmanda Pro employs a backup strategy by initially dividing data into variable-sized chunks, which are individually compressed, encrypted, and then uploaded. The process utilizes data-dependent chunking, effectively breaking down a file into consistent chunks even in the presence of random inserts.
In a backup job, a list of files and the required chunks for their reconstruction are created. Subsequent incremental backup jobs recognize existing chunks on the server, eliminating the need for re-uploading.
Key features of this chunking technique include:
Both the oldest and most recent backup jobs can be restored at the same speed.
Duplicate data doesn't necessitate additional storage due to identical chunks (deduplication).
There is no requirement to re-upload the entire file, regardless of the number of backup jobs.
The server doesn't need to be trusted to decrypt data.
Zmanda Pro Console
You can access the Zmanda Pro console by logging in with an admin or user account, allowing you to perform remote backups and restores. Logging in as an admin lets you configure jobs across different users. Logging in as a backup user lets you control jobs only for that user.
Windows clients and graphical Linux clients have a Zmanda Pro GUI directly on the client. Only backup user credentials can be used to log in to this interface.
Last updated