6a - Installing new clients.
- automated methods (i.e. deployment
software)
- CLI
6b - Updating existing clients
- automated methods (i.e. deployment
software, LiveUpdate, etc)
- CLI
Also:
7. Policy/schedule tweaks per user requests
8. Supplying backup configuration information and/or proofs for
Audit (i.e. SOX) or Legal requests (or the app/DB just got turned over to a new
admin who wants to know what's going on with this box)
- screenshots
- CLI
- reporting solutions (3rd party or
otherwise)
9. Restores
10.
Testing new backup software versions, including EEBs
11.
Upgrading existing backup servers to new software versions
Probably think of more the next time I talk with a user. =)
- John Nardello
It’s taking me forever, but I’m
still plodding along on developing the outline for my latest book.
I have a question for you about
managing a NetBackup system. What are the things you find yourself doing
on a regular basis and how do you do them? Let me give you a few
examples.
- Monitoring backup
success/failure.
- CLI
- NBU
GUI
- third party
product
- Rerunning failed
backups
- Putting tapes in a
tape library, making them ready to use
- Getting tapes
offsite
- I send originals
and don’t make duplicates
- I send duplicates
and make them via scripting
- I use NBU
Vault
- Monitoring for
capacity/throughput issues
- Installing new
clients
I’m not taking a survey of the
different methods, here. I’m just trying to make sure my list of recurring
activities is complete.
Thanks in advance for any
help.
________________________________________________________ Curtis Preston |
VP Data Protection GlassHouse
Technologies, Inc.
T: +1 760 710 2004 | C: +1 760 419 5838 | F: +1 760
710 2009 cpreston AT glasshouse DOT com
| www.glasshouse.com Infrastructure ::
Optimized
This
email and any files transmitted with it are confidential and intended solely for
the use of the individual or entity to whom they are addressed. If you have
received this email in error please notify the system manager. This message
contains confidential information and is intended only for the individual named.
If you are not the named addressee you should not disseminate, distribute or
copy this e-mail.
|