avtar.exe
(see Dell article Avamar - How to interpret avtar backup log status lines)avtar
process for the storage I/O by intercepting files which avtar
is trying to access.
avtar
process for access to the snapshot that was taken as part of the backup.
As a test, temporarily disable the anti-virus on-access or real-time scanning feature and rerun the backup.
Temporarily configure a test Virtual Machine (VM) to do client-level backup with no anti-virus installed record timing then install anti-virus and compare.
Compare the performance of the latest backup with earlier backups where real-time scanning was active. To do this, review a complete client log for Backed-up.
Manually add --status=120
in additional options to increase the frequency of status messages for testing.
avtar Info <6083>: Backed-up 344.3 GB in 862.43 minutes: 24 GB/hour (1,508,688 files/hour)
If backup performance is improved with on-access scanning disabled, configure the anti-virus software to trust application activity by Avamar binaries or to ignore the reads.
In addition to the avtar.exe
, the executables to trust or safe-list from anti-virus ON ACCESS SCANNING are below. The files are typically installed in the c:\program files\avs\bin
folder:
avsql.exe Microsoft SQL Server avexchglr.exe Exchange Server GLR avexvss.exe Exchange Server axionfs.exe Exchange Server GLR avoracle.exe Oracle avlotus.exe Lotus Notes avscc.exe Desktop Icon avagent.exe Communication service between the client and Avamar server avvss.exe Disaster Recovery, BMR avmossvss.exe SharePoint Servers avupdate.exe Client update tool
After resolving this type of interference from anti-virus software, if backup performance is still low, see Dell article: Avamar slow backup performance - how to troubleshoot and identify bottlenecks (RESOLUTION PATH)
The behavior described occurs with any anti-virus program that performs "real-time" or "on-access" scanning.
Below are links to suggested articles of various anti-virus vendors' online documentation that discuss the behavior or how to mitigate it.
Some anti-virus programs keep hash or MD5 checksums of excluded or safe listed programs. When upgrading Avamar software, the hash or MD5 checksum must be recalculated per software vendor requirements.
Symantec EndPoint Protection
Trend Micro Office scan
Sophos
Quick Heal Endpoint Security
ESET Endpoint anti-virus
Panda Security
CrowdStrike
Microsoft
Carbon Black
Fortinet
Trellix (FireEye)
Cisco AMP
Rapid7