-->![Microsoft Exchange Rpc Client Access Not Starting Sbs 2011 Remote Microsoft Exchange Rpc Client Access Not Starting Sbs 2011 Remote](/uploads/1/2/6/6/126661624/188573259.jpg)
![Microsoft exchange rpc client access not starting sbs 2011 remote control Microsoft exchange rpc client access not starting sbs 2011 remote control](/uploads/1/2/6/6/126661624/493418990.png)
This article describes how to troubleshoot issues that may occur in application protection in Data Protection Manager (DPM).
![Microsoft Exchange Rpc Client Access Not Starting Sbs 2011 Remote Microsoft Exchange Rpc Client Access Not Starting Sbs 2011 Remote](/uploads/1/2/6/6/126661624/188573259.jpg)
I finaly found the solution after 2 days of work. The Microsoft Exchange RPC Client Access service was not starting with the server booting up, after starting this service outlook opened on my clients. Apr 27, 2011 Official SBS Blog: Exchange Services May Not Start Automatically After a Reboot; Quote from the above on which services may fail to start: Microsoft Exchange Information Store; Microsoft Exchange RPC Client Access (SBS 2011 Server Only) Microsoft Exchange Forms Based Authentication (SBS 2011 Server Only). In distributed computing, a remote procedure call (RPC) is when a computer program causes a procedure (subroutine) to execute in a different address space (commonly on another computer on a shared network), which is coded as if it were a normal (local) procedure call, without the programmer explicitly coding the details for the remote interaction. That is, the programmer writes essentially.
Original product version: System Center 2012 R2 Data Protection Manager, System Center 2012 Data Protection Manager
Original KB number: 4457488
Original KB number: 4457488
Microsoft SQL Server
Issue | Possible cause | Resolution |
---|---|---|
DPM calculates space requirements incorrectly. | The database that you are protecting contains a SQL FILESTREAM. | DPM only considers the size of the .mdf and .ldf files when calculating space requirements for a database. |
The DPM server stops responding when performing backup and consistency checks of databases on clusters. | There are a large number (more than 500) database files in a database on the SQL Server cluster. | Protecting SQL Server clusters that have many database files in a database affects the performance of the DPM server. You have to wait for DPM to complete the process. |
Scheduled SQL Server protection jobs don't start. | Resources on the protected computer are unavailable, so SQL Server agent is unable to start. | Restart the computer. |
DPM is unable to protect a SQL Server database. | You must have the required software installed to protect a computer that is running SQL Server. | The following versions of SQL Server must be installed on the instance of SQL Server that's hosting the database that you want to protect:
Note DPM supports Standard, Enterprise, Workgroup, and Express Editions of SQL Server. Important You must start the SQL Server VSS Writer Service on the SQL Server. By default, the SQL Server VSS Writer Service is turned off when you install SQL Server 2005. To start the SQL Server VSS Writer Service 1. Select Start, point to Administrative Tools, and then select Services. 2. On the Services screen, scroll down, right-click SQL Server VSS writer, and then select Start. Caution After you start the SQL Server VSS Writer Service, we recommend that you don't stop the service. If your backups begin to fail, make sure that the SQL Server VSS Writer Service is started. |
The SQL Server VSS Writer service fails during protection. | If you are protecting SQL Server 2005 on a Windows Server 2008 operating system, you must install SQL Server 2005 SP2. | For information about how to run editions of SQL Server on Windows Server 2008, see Using SQL Server in Windows 8 and later versions of Windows operating system. |
SQL Server database backup fails. | If you delete one of the database files from the SQL Server but don't remove it from the database, the SQL Server VSS Writer Service will continue to report the deleted file, and DPM will be unable to locate it when it backups are performed. | Delete the database log files by using the following query: ALTER DATABASE <file name>.mdf REMOVE FILE <file name>_log.ldf Note You will be unable to restore to the original location from the backups that existed before you deleted the log files because the file doesn't exist. To resolve this issue, you must restore the database files and then attach the database to the instance of SQL Server. |
When you run an inquiry job in the DPM New Protection Group Wizard, such as viewing a list of data sources, if other instances SQL Server VSS Writers are enumerating the same data source, the DPM server will crash. | This can occur in the following scenario, where you have two SQL Server VSS writers, SqlServerWriter and MSDEWriter.
Then you set the value of the registry key to zero (0). This causes both the MSDEwriter and SQLServerWriter writers to start enumerating the SQL Server 2005 databases. | To resolve this issue, you must set the value of the HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesVSSSettingsMSDEVersionChecking registry key to 1 (a nonzero value) so that the MSDEWriter is the only writer that enumerates the SQL Server 2005 databases. |
Database protection on an instance of SQL Server 2005 fails. | If you are protecting a database on an instance of SQL Server 2000 and you upgrade to SQL Server 2005, database protection on the instance of SQL Server 2005 will fail. | After you upgrade to SQL Server 2005 and then restart the SQL Server VSS Writer service, DPM will not map the existing replica to the protected database, because the new VSS writer enumerates the new database. Therefore DPM recognizes it as a new data source. If this issue occurs, we recommend that you stop protection for the database that is hosted on the upgraded instance of SQL Server 2005, and then use the Create New Protection Wizard to reconfigure protection. Note After you reconfigure protection, DPM Administrator Console displays the protected database as two separate nodes. The protection status in the Protection task area is displayed as an inactive replica for one of the database nodes, and the DPM Recovery UI displays two database nodes that have the same name. No data loss occurs for this issue. |
SQL Server 2000 database replica creation job fails running on a 64-bit computer. | Replica creation jobs may fail on a SQL Server 2000 database that's running on a 64-bit computer in Windows in Windows (WOW) mode. | If a replica creation job fails on a SQL Server 2000 database that is running on a 64-bit computer in Windows (WOW) mode, check the Event Viewer on the SQL Server for Event ID 20 Volume Shadow Copy Service error. |
SQL Server full transaction log causes synchronization job failures. | If the database transaction log unexpectedly becomes full on a computer that is running SQL Server, synchronization jobs start to fail. | For information about how to resolve this problem, see Troubleshoot a Full Transaction Log (SQL Server Error 9002). |
DPM protection jobs start to fail. | If DPM is protecting a SQL Server database that is using mirroring or log shipping, after a failover the protected primary database will no longer be online and your DPM protection jobs start to fail. | If you plan to fail-back to the primary database, do the following:
If you don't plan to fail-back to the primary database, we recommend that you remove the database from protection and then configure protection for the new database. To remove the primary database, do the following:
|
Incremental synchronizations fail for the SQL Server master database. | DPM doesn't support configuring incremental synchronizations for SQL Server master databases. | DPM allows for log backups for databases that are configured to use the full and bulk-logged recovery models. However, log backups cannot run against the SQL Server master database. Additionally, don't set the synchronization frequency for the master database to Just before a recovery point because there are no backup logs to get from the protected server during the recovery. |
DPM isn't protecting SQL Server 2005 databases. | SQL Server 2005 includes database snapshots that appear in the New Protection Group Wizard as regular databases. However, DPM does not support protecting database snapshots for recovery. | You can view database snapshots in the Microsoft SQL Server Management Studio in the Database Snapshots folder. |
Hyper-V server
Issue | Possible cause | Resolution |
---|---|---|
Backups fail for replica virtual machines. | Other jobs may be in progress. | Make sure that there are no conflicting jobs when the backup occurs. |
Hyper-V virtual machine backups are not working. | You may have iSCSI target storage provider enabled on the protected computer. | Add the following sub key to the registry: HKEY_LOCAL_MACHINESoftwareMicrosoftMicrosoft Data Protection ManagerAgentUseSystemSoftwareProvider |
Migrating a virtual machine by using remote storage from a stand-alone back end to a CSV back end will cause Consistency Check to fail with an Access Denied message. | Data Protection Manager runs a nightly job that updates the data source information. Run a manual Consistency Check to resolve this issue. | |
DPM error: DPM failed to synchronize changes for Microsoft Hyper-V Backup Using Child Partition Snapshot<VM Name> on <Resource Group> because the snapshot volume didn't have sufficient storage space to hold the churn on the protected computer (ID 30115 Details: Unknown error (0x8004231f) (0x8004231F)) | There is insufficient storage in the snapshot pool. | Verify that the SAN has enough available storage to create hardware snapshots. |
DPM error: The VSS application writer or the VSS provider is in a bad state. Either it was already in a bad state or it entered a bad state during the current operation. (ID 30111 Details: Unknown error (0x800423f4) (0x800423F4)) VMMS event: No snapshots to revert were found for virtual machine 'CSVVM02'. (Virtual machine ID 4774EF60-F4B6-47D6-A0B9-60452C6B7FE8) | Automounting of volumes might not be enabled on the protected computer. | Enable automounting by using the following command: Mountvol /E |
DPM error: The VSS application writer or the VSS provider is in a bad state. Either it was already in a bad state or it entered a bad state during the current operation. (ID 30111 Details: Unknown error (0x80042306) (0x80042306)) | The hardware provider vetoed snapshot creation. | This likely a configuration issue. Check the application event logs for VSS hardware provider events and validate the storage configuration with your SAN vendor. |
The operation failed for Microsoft Hyper-V Backup Using Child Partition SnapshotWin7.01 on Win7.01.dpmcsv1.DC505.LAB because the data source isn't available. (ID 30169 Details: Unknown error (0x80042308) (0x80042308)) | Live migration caused the virtual machine to move to another node while the backup was in progress. Cluster disks are in a bad state. Data source was deleted. | 1. Rerun the backup job. 2. Diagnose the storage volume for the virtual machine. For information about how to back up virtual machines on CSV, in the DPM 2010 Operations Guide, see Considerations for Backing Up Virtual Machines on CSV with the System VSS Provider. |
DPM error: Failed to prepare a Cluster Shared Volume (CSV) for backup as another backup using the same CSV is in progress. (ID 32612 Details: Unknown error (0x8007173d) (0x8007173D)) | Too many parallel backups are competing for the same CSV LUN. | For information about how to enforce serial backups, in the DPM 2010 Operations Guide, see Considerations for Backing Up Virtual Machines on CSV with the System VSS Provider. |
DPM error: An unexpected error occurred during job execution. (ID 104 Details: Element not found (0x80070490)) | There might be a failed disk in the cluster. | Repair or remove the failed disk in the cluster. |
Backup of Hyper-V virtual machines are stalled and no data transfer occurs. | TCP Chimney Offloading may be active. | Run netsh int tcp set global chimney=disabled to disable TCP Chimney Offloading. |
Windows servers
Issue | Possible cause | Resolution |
---|---|---|
When you use WSB, the following errors might occur:
| Performing backups by using WSB on a server that DPM is protecting can interfere with the backups that DPM uses. | If you are using WSB, do the following:
|
File server
Issue | Possible cause | Resolution |
---|---|---|
A Volume Missing error occurs for some of your protected server volumes. | The DPM server cannot identify the volumes. | Follow these steps to remove the Volume Missing status. 1. In Administrator Console, select Management, and then select Disks. 2. On the tool ribbon, select Rescan. The current disk data is displayed. 3. Close Administrator Console, and then restart it. Check for any missing volume alerts in the details pane, and address them. 4. In the Protection task area, verify that DPM removed the Volume Missing status. |
Inconsistent drive letter references in the New Protection Group Wizard. | If you change a volume drive letter and don't restart the computer before you create a protection group for that volume, inconsistent drive letter references may appear in the New Protection Group Wizard. | To display the correct drive letters in the New Protection Group Wizard, you must update the drive letters in SQL by following these steps: 1. Remove the volume from the protection group, keeping the replicas. 2. Read the volume to the protection group. |
The recovery point time is not consistent with synchronization time. | When a recovery point is created, it reflects the time of the most recent change to the protected volume. For example, if a recovery point is scheduled to be created at 11:00 A.M. and the most recent change to the protected volume occurred at 8:30 A.M., the recovery point that was created at 11:00 A.M. will display a time stamp of 8:30 A.M. | No action is required. |
Replicas are marked as inconsistent. | After a volume is marked as Missing, DPM only brings the volume back online during the next disk modification operation, such as Allocate disk space, or after restarting the computer. DPM then marks the replica as inconsistent. | You must run a manual consistency check. For information about performing a consistency check, in DPM Help, see How to Synchronize a Replica. |
Client computers
Issue | Possible cause | Resolution |
---|---|---|
Recovery points are missing. | If scheduled recovery point creation and synchronization/consistency check for a client are run at the same time, the recovery point creation is skipped. | To avoid the loss of a recovery point for such clients, schedule an additional recovery point creation at a low-usage time so that the client computers that miss the recovery point creation have a recovery point created later. |
Backups of client computers that are connected to corporate network through DirectAccess failure with RPC server unavailable error. | Edge traversal is blocked in the firewall settings. | 1. Open the Windows Firewall console (select Start, select Run, and then type firewall.cpl). 2. In the left pane, select Advanced settings. 3. Select Inbound rules, and then scroll down to DPMRA and DPMRA_DCOM_135. 4. Double-click each rule, and then navigate to the Advanced tab. 5. In the Edge traversal group item, select Allow edge traversal. |
Access denied when you try to retrieve information from the Windows Management Instrumentation (WMI) service. | This error can occur when you try to add a computer that is running Windows XP SP3 to the DPM server and a Group Policy setting is blocking the WMI service on the subject computer. | To resolve this error, do the following:
|
SharePoint
Issue | Possible cause | Resolution |
---|---|---|
The SQL Server alias does not resolve on the SQL Server Agent and protection for the Windows SharePoint Services farm fails. | The Windows SharePoint Services farm is unable to use a SQL Server alias that was created by using cliconfg.exe. | You must reconfigure the SQL Server alias by using the SQL Server Configuration Manager. |
Not all the SQL Server aliases are configured on the front-end web server. | Check the list of servers on the Central Administration page of the SharePoint farm. Identify the SQL Server aliases from the list of SQL Server computers. Determine whether all the SQL Server aliases are configured on the SharePoint front-end web server (the one that communicates with the DPM server). | |
The SQL Server alias is not of type TCP/IP. | DPM supports only TCP/IP SQL Server aliases. Reconfigure the aliases to type TCP/IP. | |
SQL Server client connectivity components are not installed on the front-end web server. | Install the SQL Server client connectivity components on the front-end web server. | |
For Windows SharePoint Services 3.0/MOSS 2007 farms, SQL Server 2005 client connectivity components are not installed on the front-end web server. | Regardless of the version of SQL Server on the back-end servers, for MOSS 2007 and Windows SharePoint Services 3.0, you should install the SQL Server 2005 client connectivity components on the front-end web server. Also, make sure that all the aliases are configured by using this version of the client connectivity components. | |
Windows SharePoint Services database log files are not truncated. | If the path of any Windows SharePoint Services database log file exceeds 150 characters, DPM cannot truncate the log file. | We recommend running periodic scripts to truncate your Windows SharePoint Services database log files. |
The Copy-Only registry value is set for the specific SharePoint farm on the DPM server. | This registry entry has to be deleted. It is in the following path on the DPM server with the name the same as the name of the Config database of the farm:HKEY_LOCAL_MACHINESoftwareMicrosoftMicrosoft Data Protection ManagerCopyBackups | |
The Do not truncate logs setting is enabled for the SQL Server on which the SharePoint databases reside. | This can be reset by using the following Windows PowerShell command: Set-DPMGlobalProperty -Dpmserver $DPMMachineName -TruncateSharePointDbLogs $true | |
The server process could not be started because the configured identity is incorrect. Check the user name and password (0x8000401A). | If the password is reset for the Windows SharePoint Services farm, protection will fail. | At the command prompt, run ConfigureSharePoint.exe to reset the password. For more information about how to manage password changes, see Plan for administrative and service accounts in SharePoint Server. |
Replica inconsistent alerts for one or more SQL Server databases that were previously a part of the SharePoint farm appear in the Monitoring pane. | DPM keeps the existing recovery points of the databases that are removed from the SharePoint farm. This can occur if the removed database is recovered by using DPM or if DPM was upgraded. | Resolve the alert by selecting Inactivate the alert. |
Some SharePoint farm's consistency check jobs seem to have stopped (no data transfer has occurred for a long time). | The consistency check was triggered while recovery of one of the farm's components was in progress. | Cancel the consistency check job and restart the consistency check for the farm from the Protection pane. |
The SharePoint catalog task fails with HR 0x80004003 (Invalid Pointer). | There is a network connectivity issue between the SharePoint front-end web server and the back-end server. | Rerun the catalog job by using Windows PowerShell. |
Exchange Server
Issue | Possible cause | Resolution |
---|---|---|
DPM cannot protect Exchange Server data. | The eseutil.exe and ese.dll versions that are installed on the most recent edition of Exchange Server must be the same versions that are installed on the DPM server. | You must update eseutil.exe and ese.dll on the DPM server if they are updated on a computer that is running Exchange Server after an upgrade or an update.is applied. |
After you rename an Exchange Server storage group, the new name does not appear in the New Protection Group Wizard. | If you use the original storage group name, data recovery fails when you try to unmount the database. | After you rename an Exchange Server storage group, you must restart the Microsoft Exchange Information Store service before you create a new protection group. To start the Microsoft Exchange Information Store service 1. Select Start, point to Administrative Tools, and then select Services. 2. On the Services screen, scroll down, right-click Microsoft Exchange Information Store, and then select Restart. |
DPM doesn't support incremental backups if circular logging is enabled for Exchange Server storage groups. | You cannot enable circular logging if you want incremental backups for Exchange Server storage groups. | For successful incremental backups, we recommend that you disable circular logging for the protected storage group. After you disable circular logging, restart the Microsoft Exchange Information Store service (MSExchangeIS). To disable circular logging 1. Select Start, point to Programs, point to Microsoft Exchange, and then select System Manager. 2. If the Administrative Groups branch exists in the navigation pane, expand it, expand the appropriate administrative group's branch, expand the Servers branch, and then expand the appropriate server's branch. If the Administrative Groups branch does not exist, expand the Servers branch in the navigation pane, and then expand the appropriate server's branch. (To expand a branch, double-click the branch or select the plus sign (+) to the left of the branch.) 3. Right-click the storage group for which you want to disable circular logging, and then select Properties. 4. Clear the Enable Circular Logging check box, and then select OK. 5. Restart the Microsoft Exchange Information Store service (MSExchangeIS). To restart MSExchangeIS 1. Select Start, select Run, and then type services.msc to start the Services snap-in. 2. Right-click Microsoft Exchange Information Store, and then select Start. Note If you do not want to disable circular logging, you can modify the protection group properties so that synchronizations occur just before you create the recovery point. To change the synchronization frequency - In the New Protection Group Wizard, on the Specify Short-Term Protection Policy page, select Just before a recovery point. |
Replica initialization and express full backup operations stop before completion. | When you are protecting data on a computer that is running a version of Exchange Server, the DPM server must include the Ese.dll and eseutil.exe files that are located in the Exchange Server installation location. | To protect data on a computer that is running Exchange Server, follow these steps: 1. On the computer that is running Exchange Server, copy Ese.dll and eseutil.exe from the Exchange Server installation location to the DPM server installation location. The default installation location on the DPM server is <drive>:Program FilesMicrosoft Data Protection ManagerDPMbin. 2. Cancel the replica initialization and express full backup jobs that did not finish. 3. Restart the canceled express full backup jobs. 4. Run a synchronization with consistency check for canceled replica initialization jobs. Note We recommend that you use the same processor architecture for the DPM server and the computer that is running Exchange Server. If your processor architecture is different, you must do the following: 1. Install the version of Exchange Server that you are protecting on a test server that is consistent with the hardware of the DPM server. 2. From the test server, copy Ese.dll and eseutil.exe from the Exchange Server installation location to the DPM server installation location. The default installation location on the DPM server is <drive:>Program FilesMicrosoft Data Protection ManagerDPMbin. |
The VSS writer does not clear Backup in progress state for the storage group. | In the released versions of Exchange Server 2007 and Exchange Server 2003, if you cancel the backup on a storage group in a particular interval (between PrepareForBackup and DoSnapshot), the VSS writer doesn't clear Backup in progress state for the storage group. | To recycle the VSS writer for: Event ID 2024 A - Restart the Microsoft Exchange Information Store service to recycle the VSS writer. Event ID 2024 B - Restart the Exchange Server Replication service (Exssrv.exe) to recycle the VSS writer. |
The Microsoft Exchange Information Store service does not appear on the Select Group Members page of the New Protection Group Wizard. | If the Exchange Local Continuous Replication (LCR) VSS replica writer is enabled, the Microsoft Exchange Information Store service will not appear on the Select Group Members page of the New Protection Group Wizard. | To display the Exchange LCR-enabled storage groups in the DPM New Protection Group Wizard, use the following set key command to disable the (LCR) VSS replica writer: Registry location: HKEY_LOCAL_MACHINESoftwareMicrosoftExchangeReplayParameters DWORD name: EnableVssWriter Value data: 0 |
All data replication jobs fail. | If the versions of Exchange Server Database Utilities (eseutil.exe) and ese.dll that are installed on the most recent edition of the protected Exchange Server differ from the versions that are installed on the DPM server, all data replication jobs will fail. | The eseutil.exe and ese.dll versions that are installed on the most recent edition of Exchange Server must be the same versions that are installed on the DPM server. For example, if you are protecting Exchange Server 2003 SP2, Exchange Server 2007, and Exchange Server 2007 SP1, you must copy eseutil.exe and ese.dll from the server that is running Exchange Server 2007 SP1 to the DPM server. The following scenarios show the versions of eseutil.exe and ese.dll that you must install on the DPM server:
|
Exchange Server protection fails. | If the Exchange writer is turned off for the Volume Shadow Copy Service in Windows Small Business Server 2003, protection will fail. | By default, the Setup program for Windows Small Business Server 2003 turns off the Microsoft Exchange Server 2003 writer for the Volume Shadow Copy Service. To protect data that uses DPM, the Exchange Server 2003 writer must be turned on. To turn on the Exchange writer 1. Select Start, select Run, type regedit, and then select OK. 2. Locate and then double-click the following registry subkey: HKEY_LOCAL_MACHINESYSTEMCurrentControlSetServicesMSExchangeISParametersSystem 3. Double-click the Disable Exchange Writer value. 4. In the Value data text box, change the value from 1 to 0, and then select OK. 5. Exit Registry Editor. 6. Select Start, point to Administrative Tools, and then select Services. 7. Stop and then restart the Microsoft Exchange Information Store service. |
Local continuous replication (LCR) protection fails and returns a Volume Shadow Copy Service (VSS) error. | If the Exchange Server replication service isn't restarted after the registry key is set, LCR fails for the storage group. | Restart the replication service after you update the registry key. |
Setting and unsetting the eseutil flag through the command-line interface (CLI) fails. | The preferred server may not have been specified. | Provide the topology as PT_CCR_ACTIVE_ONLY together with the RunEseUtilConsistencyCheck option. |
The consistency check fails and returns RMGenericError. | The consistency check will fail if indexing, encryption, or Single Instance Storage (SIS) is enabled for the folder that contains the .edb file. | To resolve this issue, disable indexing, encryption, and SIS for the folder that contains the .edb file. |
System protection
Issue | Possible cause | Resolution |
---|---|---|
Bare Metal Recovery (BMR) backups fail and return an Access Denied error. | You have migrated from System State protection to BMR protection. | 1. Remove BMR protection. 2. Modify protection group and include BMR protection. |
One or more prerequisites for protecting this data source are missing on your Windows Server 2008 operating system. | This error occurs if the Windows Server Backup utility isn't installed on the protected server. | To resolve this issue, do the following: - To install the Windows Server Backup utility, open a command prompt with administrative credentials and run: Start /wait ocsetup WindowsServerBackup /quiet /norestart Note To open a command prompt with administrative credentials, select Start, point to All Programs, select Accessories, right-click Command Prompt, and then select Run as administrator. |
Virtual server
Issue | Possible cause | Resolution |
---|---|---|
You may see the error message One or more volumes are missing for the following application: <Virtual machine name>. Make sure that the dependent volumes for the data sources are online when you select a Virtual Server 2005 R2 based virtual machine. | For Virtual Server 2005 R2, DPM doesn't support backing up virtual machines hosted on a volume that doesn't have a drive letter. Note This problem doesn't apply to Hyper-V virtual machines. | Provide a drive letter mount point for the volumes on which the VHD files exist and try to select for backup with DPM again. |
Data on the virtual machine is unavailable for protection. | Virtual Server 2005 R2 Service Pack 1 (SP1) may not be installed on the server that you want to protect. | Install Virtual Server 2005 R2 Service Pack 1 (SP1) on the server that you want to protect. |
Backup fails on the virtual machine with unknown error 0x800423f3. | The Virtual Server VSS Writer service doesn't support online backup for the client virtual machine. | Use Windows Event Viewer on the Virtual Server machine to determine whether Event ID 1044 exists. If this event exists, the virtual machine cannot run online backups. You can run offline backups by updating the following registry subkey. Locate: HKEY_LOCAL_MACHINESOFTWAREMicrosoftVirtual Server1.0BackupBackupType<VMNAME> Set the value to 0. |
Online backup fails. | Online backups fail if the virtual machine contains volumes that don't support shadow copies (FAT 32 file systems). Additionally, if the shadow copies exist on different virtual machine volumes, the backup fails. | Make sure that the virtual machine is running before configuring the backup, and then delete the entries for the virtual machines for which the online backup is failing.HKEY_LOCAL_MACHINESOFTWAREMicrosoftVirtual Server1.0BackupBackupType . |
In distributed computing, a remote procedure call (RPC) is when a computer program causes a procedure (subroutine) to execute in a different address space (commonly on another computer on a shared network), which is coded as if it were a normal (local) procedure call, without the programmer explicitly coding the details for the remote interaction. That is, the programmer writes essentially the same code whether the subroutine is local to the executing program, or remote. This is a form of client–server interaction (caller is client, executor is server), typically implemented via a request–response message-passing system. In the object-oriented programming paradigm, RPCs are represented by remote method invocation (RMI). The RPC model implies a level of location transparency, namely that calling procedures are largely the same whether they are local or remote, but usually they are not identical, so local calls can be distinguished from remote calls. Remote calls are usually orders of magnitude slower and less reliable than local calls, so distinguishing them is important.
RPCs are a form of inter-process communication (IPC), in that different processes have different address spaces: if on the same host machine, they have distinct virtual address spaces, even though the physical address space is the same; while if they are on different hosts, the physical address space is different. Many different (often incompatible) technologies have been used to implement the concept.
History and origins[edit]
Request–response protocols date to early distributed computing in the late 1960s, theoretical proposals of remote procedure calls as the model of network operations date to the 1970s, and practical implementations date to the early 1980s. Bruce Jay Nelson is generally credited with coining the term 'remote procedure call' in 1981.[1]
Remote procedure calls used in modern operating systems trace their roots back to the RC 4000 multiprogramming system,[2] which used a request-response communication protocol for process synchronization.[3] The idea of treating network operations as remote procedure calls goes back at least to the 1970s in early ARPANET documents.[4] In 1978, Per Brinch Hansen proposed Distributed Processes, a language for distributed computing based on 'external requests' consisting of procedure calls between processes.[5]
One of the earliest practical implementations was in 1982 by Brian Randell and colleagues for their Newcastle Connection between UNIX machines.[6] This was soon followed by 'Lupine' by Andrew Birrell and Bruce Nelson in the Cedar environment at Xerox PARC.[7][8][9] Lupine automatically generated stubs, providing type-safe bindings, and used an efficient protocol for communication.[8] One of the first business uses of RPC was by Xerox under the name 'Courier' in 1981. The first popular implementation of RPC on Unix was Sun's RPC (now called ONC RPC), used as the basis for Network File System (NFS).
In the 1990s, with the popularity of object-oriented programming, an alternative model of remote method invocation (RMI) was widely implemented, such as in Common Object Request Broker Architecture (CORBA, 1991) and Java remote method invocation. RMIs in turn fell in popularity with the rise of the internet, particularly in the 2000s.
Message passing[edit]
RPC is a request–response protocol. An RPC is initiated by the client, which sends a request message to a known remote server to execute a specified procedure with supplied parameters. The remote server sends a response to the client, and the application continues its process. While the server is processing the call, the client is blocked (it waits until the server has finished processing before resuming execution), unless the client sends an asynchronous request to the server, such as an XMLHttpRequest. There are many variations and subtleties in various implementations, resulting in a variety of different (incompatible) RPC protocols.
An important difference between remote procedure calls and local calls is that remote calls can fail because of unpredictable network problems. Also, callers generally must deal with such failures without knowing whether the remote procedure was actually invoked. Idempotent procedures (those that have no additional effects if called more than once) are easily handled, but enough difficulties remain that code to call remote procedures is often confined to carefully written low-level subsystems.
Sequence of events[edit]
- The client calls the client stub. The call is a local procedure call, with parameters pushed on to the stack in the normal way.
- The client stub packs the parameters into a message and makes a system call to send the message. Packing the parameters is called marshalling.
- The client's local operating system sends the message from the client machine to the server machine.
- The local operating system on the server machine passes the incoming packets to the server stub.
- The server stub unpacks the parameters from the message. Unpacking the parameters is called unmarshalling.
- Finally, the server stub calls the server procedure. The reply traces the same steps in the reverse direction.
Standard contact mechanisms[edit]
To let different clients access servers, a number of standardized RPC systems have been created. Most of these use an interface description language (IDL) to let various platforms call the RPC. The IDL files can then be used to generate code to interface between the client and servers.
Analogues[edit]
Notable RPC implementations and analogues include:
Language-specific[edit]
- Java's Java Remote Method Invocation (Java RMI) API provides similar functionality to standard Unix RPC methods.
- Go provides package rpc for implementing RPC, with support for asynchronous calls.
- Modula-3's network objects, which were the basis for Java's RMI[10]
- RPyC implements RPC mechanisms in Python, with support for asynchronous calls.
- Distributed Ruby (DRb) allows Ruby programs to communicate with each other on the same machine or over a network. DRb uses remote method invocation (RMI) to pass commands and data between processes.
- Erlang is process oriented and natively supports distribution and RPCs via message passing between nodes and local processes alike.
- Elixir builds on top of the Erlang VM and allows process communication (Elixir/Erlang processes, not OS processes) of the same network out-of-the-box via Agents and message passing.
Application-specific[edit]
- Action Message Format (AMF) allows Adobe Flex applications to communicate with back-ends or other applications that support AMF.
- Remote Function Call is the standard SAP interface for communication between SAP systems. RFC calls a function to be executed in a remote system.
![Microsoft exchange rpc client access not starting sbs 2011 remote control Microsoft exchange rpc client access not starting sbs 2011 remote control](/uploads/1/2/6/6/126661624/493418990.png)
General[edit]
- NFS (Network File System) is one of the most prominent users of RPC
- Open Network Computing Remote Procedure Call, by Sun Microsystems
- D-Bus open source IPC program provides similar function to CORBA.
- SORCER provides the API and exertion-oriented language (EOL) for a federated method invocation
- XML-RPC is an RPC protocol that uses XML to encode its calls and HTTP as a transport mechanism.
- JSON-RPC is an RPC protocol that uses JSON-encoded messages
- JSON-WSP is an RPC protocol that uses JSON-encoded messages
- SOAP is a successor of XML-RPC and also uses XML to encode its HTTP-based calls.
- ZeroC's Internet Communications Engine (Ice) distributed computing platform.
- Etch framework for building network services.
- Apache Thrift protocol and framework.
- CORBA provides remote procedure invocation through an intermediate layer called the object request broker.
- Libevent provides a framework for creating RPC servers and clients.[11]
- Windows Communication Foundation is an application programming interface in the .NET framework for building connected, service-oriented applications.
- Microsoft .NETRemoting offers RPC facilities for distributed systems implemented on the Windows platform. It has been superseded by WCF.
- The Microsoft DCOM uses MSRPC which is based on DCE/RPC
- The Open Software Foundation DCE/RPC Distributed Computing Environment (also implemented by Microsoft).
- Google Protocol Buffers (protobufs) package includes an interface definition language used for its RPC protocols[12] open sourced in 2015 as gRPC.[13]
- WAMP combines RPC and Publish-Subscribe into a single, transport-agnostic protocol.
- Google Web Toolkit uses an asynchronous RPC to communicate to the server service.[14]
- Apache Avro provides RPC where client and server exchange schemas in the connection handshake and code generation is not required.
- Embedded RPC is lightweight RPC implementation developed by NXP, targeting primary CortexM cores
- KF Trusted Execution Environment uses proxy and objects marshaling to communicate objects across sandboxes
- msgpack-rpc is a lightweight RPC implementation using MessagePack to serialize data. It is used in the text editor Neovim.
See also[edit]
Microsoft Exchange Rpc Client Access Not Starting Sbs 2011 Remote Access
References[edit]
- ^Bruce Jay Nelson (May 1981). Remote Procedure Call. PARC CSL-81-9 (Also CMU-CS-81-119). Xerox Palo Alto Research Center. PhD thesis.
- ^'Per Brinch Hansen • IEEE Computer Society'. www.computer.org. Retrieved 2015-12-15.
- ^Brinch Hansen, Per (1969). RC 4000 Computer Software: Multiprogramming System(PDF). Copenhagen, Denmark: Regnecentralen.
- ^James E. White (December 23, 1975). 'A High-Level Framework for Network-Based Resource Sharing'. RFC 707. Augmentation Research Center. Retrieved July 11, 2011.
- ^Brinch Hansen, Per (November 1978). 'Distributed processes: a concurrent programming concept'(PDF). Communications of the ACM. 21 (11): 934–941. CiteSeerX10.1.1.107.3108. doi:10.1145/359642.359651.
- ^Brownbridge, David R.; Marshall, Lindsay F.; Randell, Brian (1982). 'The Newcastle Connection'(PDF). Software – Practice and Experience. 12 (12): 1147–1162. doi:10.1002/spe.4380121206. Archived from the original(PDF) on 2016-08-16. Retrieved 2016-08-16.
- ^Birrell, Andrew D.; Nelson, Bruce Jay (1984). 'Implementing remote procedure calls'(PDF). ACM Transactions on Computer Systems. 2: 39–59. doi:10.1145/2080.357392.
- ^ ab'1994 – Andrew Birrell, Bruce Nelson: Remote Procedure Call'. Software System Award citation. Association for Computing Machinery. Archived from the original on April 2, 2012. Retrieved July 11, 2011.
- ^'SIGOPS Hall of Fame Award'. Special Interest Group on Operating Systems. Association for Computing Machinery. Retrieved July 11, 2011.
- ^The A-Z of Programming Languages: Modula-3 - a-z of programming languagesArchived 2009-01-05 at the Wayback Machine. Computerworld. Retrieved on 2013-07-17.
- ^libevent: Main Page. Monkey.org. Retrieved on 2013-07-17.
- ^'Protocol Buffers - Google's data interchange format'. Google project website. Retrieved November 1, 2011.
- ^'gRPC open-source universal RPC framework'. Google project website. Retrieved September 7, 2016.
- ^'Google Web Toolkit'. Google project website. Retrieved November 1, 2011.
Microsoft Exchange Rpc Client Access Not Starting Sbs 2011 Remote Control
External links[edit]
- RFC 1057 - Specifies version 1 of ONC RPC
- RFC 5531 - Specifies version 2 of ONC RPC
- Remote Procedure Calls (RPC) — A tutorial on ONC RPC by Dr Dave Marshall of Cardiff University
- Introduction to RPC Programming — A developer's introduction to RPC and XDR, from SGI IRIX documentation.
Microsoft Exchange Rpc Client Access Not Starting Sbs 2011 Remote Download
Retrieved from 'https://en.wikipedia.org/w/index.php?title=Remote_procedure_call&oldid=982939641'