cancel
Showing results for 
Search instead for 
Did you mean: 

Netbackup functionality queries

Allen_John
Level 4

Does Netbackup do following functions...........

(Appliance would be the latest. now a days its 5230)

a. Netbackup do Integrity Check ?

b. SNMP Support ?

c. Event Base backups ?

 

7 REPLIES 7

Mark_Solutions
Level 6
Partner Accredited Certified

a) What exactly do you mean by this? Do you mean verifying the backup image after it is written? If so it just verifies the catalog entries rather than doing a full image verification after a backup

b) The appliance has an SNMP MIB and alerting available - NetBackup itself has A free component named OpsCenter which has full reporting and alerting - the alerting from this component support SNMP and also has an Appliance monitoring section now built in

c) No. If I understand you correctly you are asking along the lines of ... If event A happens then run backup job A ... if that is what you are looking for it doesn't do it. It doe however have a lot of command line options throughout so it is easily integrated into other software for firing things off. It does integrate with Symantec Critcal System Protection so it can react and lock itself down in the event of a detected intrusion / attack

Hope this helps

Marianne
Level 6
Partner    VIP    Accredited Certified

Sounds like Tender questions....

Allen_John
Level 4

a. I dont just want to verify only the Catalog entry. I mean verify the data stored on Netbackup. Access the data => re-assembled and presented in its orignal form. A process discover a discrepancy

b. solved ;)

c. This point mean suppose if the client (Oracle/SQL or etc) has a data size 500GB. and also there is a schedule define to take the full backup once a day at 3PM. Suppose if the data size exceds to 1TB before the schedule the backup policy should triggered.

===========

Yeah Van D it seems but its client query ;)

Mark_Solutions
Level 6
Partner Accredited Certified

a) This can be done but is a manual process - either a verify on the backup image or test restore

b) good :)

c) This is not a built in feature - you would need an outside monitoring process to check for the condition - it is easy then to trigger a backup, but there is not built in process within NetBackup to do this

Allen_John
Level 4

 

Thanks Mark for your words

 

a) This can be done but is a manual process - either a verify on the backup image or test restore

 

@ Mark Your words

a) What exactly do you mean by this? Do you mean verifying the backup image after it is written? If so it just verifies the catalog entries rather than doing a full image verification after a backup

 
 
Verifying the catalog entry is enough ? to verify the backup data ?
================================================
Actually my client queried me about a solution which can verify the stored data =>re-assemble it and present data in its orignal forum

Marianne
Level 6
Partner    VIP    Accredited Certified

The integrity question seems to be based on Data Domain internal integrity check.

We recently came across similar questions in a tender.

This was Symantec's response:

NetBackup Appliances leverage enterprise class hardware RAID controllers and all backup data is stored in a RAID 6 configuration with one or more hot spares. RAID 6 is a dual-parity architecture that offers a high-level of data redundancy and fault resiliency and is capable of protecting against two simultaneous disk failures without any manual intervention. All appliance system data is stored on mirrored RAID 1 configuration which offers 100 percent data redundancy. 

To meet stringent data reliability and constant uptime requirements, NetBackup Appliances utilize Veritas File System, a technology that has for more than 25 years been the standard for Online Transaction Processing (OLTP) and critical application solutions. It has an inherent capability of data protection and file awareness and has been chosen by numerous organizations where the highest levels of data integrity and availability are required.

Veritas File System employs a circular intent log with all changes written to this intent log in a synchronous manner before they are periodically flushed out to their actual disk blocks. By using this intent log, Veritas File System can recover from system downtime in a fraction of the time. When restarted, Veritas File System simply scans the intent log, noting which file system changes had completed and which had not, and proceeds accordingly. Veritas File System was designed as a journaling file system and as such adds a great degree of both availability and integrity to the NetBackup Appliance as compared to devices built on top of older block based file systems that have later added or bolted on journaling technology.

Preventing data collisions
Data deduplication systems identify duplicate data by matching digital fingerprints against an existing database of protected data and while extremely rare, this fingerprinting methodology can generate a false match. The data deduplication technology found in the NetBackup Appliance eliminates this risk through a dual fingerprint approach, which adds another layer of protection on top of the base MD5 data identification. Potential data collisions are prevented by the combination of two hashes resulting in a new fingerprint that is neither MD5 nor SHA-x. The combined hash eliminates the chance of a collision and effectively protects the system against artificially generated MD5 collision files. 

Critical element protection, NetBackup Appliances provide backup copies of critical elements by automatically maintaining dual copies of each critical deduplication element during key periods of transaction processing. If needed, these secure copies are used to facilitate a self-recovery inside the NetBackup Appliances, ensuring data consistency. During normal operations, the NetBackup Appliance ensures the consistency of the data written to and residing in the deduplication storage pool, thus guaranteeing all data referenced in the catalog can be successfully retrieved. Multiple verification and consistency checks exist to help prevent external causes, such as hardware and power failures, from leaving the appliance in an inconsistent state. These consistency checks can be configured to run at regular intervals to check for either the existence of file data, to validate the cyclic redundancy check (CRC) checksum for the data or to recalculate the individual deduplication fingerprints of each data segment. Should any potential data corruption be detected, self-recovery processes are run and alerts are sent to the administrator.

Mark_Solutions
Level 6
Partner Accredited Certified

If you have a tender with such specific questions then in my experience the decision has already been made as to what they plan to buy - I even saw one tender that actually mentioned the manufacturers name in the text - real give away!!

Good luck