Veritas-bu

[Veritas-bu] Disk based backups with Netbackup 4.5fp3

2003-10-14 09:52:27
Subject: [Veritas-bu] Disk based backups with Netbackup 4.5fp3
From: andrew.walker AT liberty.co DOT za (Andrew Walker)
Date: Tue, 14 Oct 2003 15:52:27 +0200
This is a multi-part message in MIME format.

------=_NextPart_000_001C_01C3926B.2ADFECA0
Content-Type: text/plain; charset="iso-8859-1"
Content-Transfer-Encoding: 7bit

Hi,

I am currently investigating the theory of backing up images to disk and
then Vaulting them to tape once the backup has been completed using
Netbackup Vault.

The process that I have been following in my test plan is as follows
1) Manually initiate a backup to disk.
2) Manually initiate the vaulting profile which duplicates the disk image to
tape and then forces expires the disk image in 1 hour.

The first problem that I had was that after the hour the disk image reflects
that it should have expired, but the disk image was still present. This
could be see by the bpimagelist command for the client and a ctime command
against the EXPIRATION field in the client.f file.
I have queried this with Veritas and the answer there is that this would be
a standard  process as the image will only clear when a nights schedule
ends, or I can implement a work around solution of a manual process of
creating the CLEAN_IN_BACKGROUND file and running the
bpimage -cleanup -allclients command to delete the expired
images.(TECHNOTE - 236274)

I have tested the scheduling process as specified by Veritas by scheduling
everything but it seems that even though the image is set to expire, the
actual disk image will only clear once the scheduled backups have been run,
which in this case would be the next nights backup schedule.

With the limited resources that I have I can not afford to hold two nights
images on disk.

If there is anyone else who is following the same process, please can you
advise me on the process that you follow to backup the images to disk, vault
them to tape and then clear them in the shortest time possible.

Thank you in advance.
Andrew Walker


*******************************************************************

The e-mail and attachments are confidential and intended only for selected 
recipients.  If you have received it in error, you may not in any way disclose 
or rely on the contents.  You may not keep, copy or distribute the e-mail. 
Should you receive it, immediately notify the sender of the error and delete 
the e-mail.Also note that this form of communication is not secure, it can be 
intercepted, and may not necessarily be free of errors and viruses in spite of 
reasonable efforts to secure this medium.

*******************************************************************


------=_NextPart_000_001C_01C3926B.2ADFECA0
Content-Type: text/html; charset="iso-8859-1"
Content-Transfer-Encoding: quoted-printable

<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 4.0 Transitional//EN">
<HTML><HEAD>
<META http-equiv=3DContent-Type content=3D"text/html; charset=3Diso-8859-1">
<META content=3D"MSHTML 6.00.2800.1226" name=3DGENERATOR></HEAD>
<BODY>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D459251913-14102003>Hi,</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D459251913-14102003></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D459251913-14102003>I am curr=
ently=20
investigating the theory of backing up images to disk and then&nbsp;Vaultin=
g=20
them to tape once the backup has been completed using Netbackup Vault.=20
</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D459251913-14102003></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D459251913-14102003>The proce=
ss that I=20
have been following in my test plan&nbsp;is as follows</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D459251913-14102003>1)&nbsp;M=
anually=20
initiate a backup to disk.</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D459251913-14102003>2) Manual=
ly initiate=20
the vaulting profile which duplicates the disk image to tape and then force=
s=20
expires the disk image in 1 hour.</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D459251913-14102003></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D459251913-14102003>The first=
 problem=20
that I had was that after the hour the disk image reflects that it should h=
ave=20
expired, but the disk image was still present. This could be see by the=20
bpimagelist command for the client and a ctime command against the EXPIRATI=
ON=20
field in the client.f file.</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D459251913-14102003>I have qu=
eried this=20
with Veritas and the answer there is that this would be a standard&nbsp; pr=
ocess=20
as the image will only clear when a nights schedule ends, or I can implemen=
t a=20
work around solution of a manual process of creating the CLEAN_IN_BACKGROUN=
D=20
file and running the bpimage -cleanup -allclients command to delete the exp=
ired=20
images.(TECHNOTE - 236274)</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D459251913-14102003></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D459251913-14102003>I have te=
sted the=20
scheduling process as specified by Veritas by scheduling everything but it =
seems=20
that even though the image is set to expire, the actual disk image will onl=
y=20
clear once the scheduled backups have been run, which in this case would be=
 the=20
next nights backup schedule.</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D459251913-14102003></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D459251913-14102003>With the =
limited=20
resources that I have I can not afford to hold two nights images on=20
disk.</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D459251913-14102003></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D459251913-14102003>If there =
is anyone=20
else who is following the same process, please can you advise me on the pro=
cess=20
that you follow to backup the images to disk, vault them to tape and then c=
lear=20
them in the shortest time possible.</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D459251913-14102003></SPAN></FONT>&nbsp;</DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D459251913-14102003>Thank you=
 in=20
advance.</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN class=3D459251913-14102003>Andrew=20
Walker</SPAN></FONT></DIV>
<DIV><FONT face=3DArial size=3D2><SPAN=20
class=3D459251913-14102003></SPAN></FONT>&nbsp;</DIV><FONT SIZE=3D3><BR>
<BR>
*******************************************************************<BR>
<BR>
The e-mail and attachments are confidential and intended only for selected =
recipients.  If you have received it in error, you may not in any way discl=
ose or rely on the contents.  You may not keep, copy or distribute the e-ma=
il. Should you receive it, immediately notify the sender of the error and d=
elete the e-mail.Also note that this form of communication is not secure, i=
t can be intercepted, and may not necessarily be free of errors and viruses=
 in spite of reasonable efforts to secure this medium.<BR>
<BR>
*******************************************************************<BR>
</FONT>
</BODY></HTML>

------=_NextPart_000_001C_01C3926B.2ADFECA0--

<Prev in Thread] Current Thread [Next in Thread>