05-07-2010 05:20 PM
Is anyone else having problems with the BackupExec support in NetBackup? I'm a new NetBackup user (we're migrating from BackupExec).
I have, after much trial and error, discovered how to inventory and execute Phase I import properly. I did inventory by running the following, where XXXXXX is the Media ID:
"C:\Program Files\VERITAS\Volmgr\bin\vmphyinv.exe" -rn 0 -verbose -ml XXXXXX
I did notice that vmphyinv.exe seems to hang after changing the GUID, volume pool, and description (I suspect it's on the "Logically update EMM database, if required" step), but by that point it's already updated the tape record, so Ctrl-C seems to be ok.
Import phase 2 started 5/7/2010 3:43:46 PM 15:43:47 INF - Importing policy fil1-full-weekly, schedule win_full (backupexecsrvr_1269154358), media id XXXXXX, created on 03/20/2010 22:52:38. 15:43:55 INF - If Media id XXXXXX is not in a robotic library administrative interaction may be required to satisfy this mount request. 15:50:58 INF - Waiting for mount of media id XXXXXX on server nbumaster.domain.com for reading. 15:51:20 INF - Waiting for positioning of media id XXXXXX on server nbumaster.domain.com for reading. 15:51:20 INF - Beginning import on server nbumaster.domain.com of client backupexecsrvr. 15:51:20 /C/ 15:51:20 /C/boot.ini 15:51:20 /C/BOOTSECT.DOS 15:51:20 /C/COMMAND.COM 15:51:20 /C/console.txt 15:51:20 /C/IO.SYS 15:51:20 /C/MSDOS.SYS 15:51:20 /C/msizap.exe 15:51:20 /C/NTDETECT.COM 15:51:20 /C/ntldr 15:51:20 /C/ssiw.log 15:51:20 /C/wininst.txt 15:51:36 INF - Import of policy fil1-full-weekly, schedule win_full (backupexecsrvr_1269154358) failed, socket write failed.
15:51:36 INF - Importing policy fil1-full-weekly, schedule win_full (backupexecsrvr_1269154700), media id XXXXXX, created on 03/20/2010 22:58:20. 15:51:44 INF - If Media id XXXXXX is not in a robotic library administrative interaction may be required to satisfy this mount request. 15:51:46 INF - Waiting for positioning of media id XXXXXX on server nbumaster.domain.com for reading. 15:52:27 INF - Beginning import on server nbumaster.domain.com of client backupexecsrvr. 15:52:27 /D/ 15:52:27 /D/only_one_file_at_root.txt 15:52:31 INF - Import of policy fil1-full-weekly, schedule win_full (backupexecsrvr_1269154700) failed, socket write failed.
The other subsequent volumes fail in the same way - they enumerate any files in the root of the volume, but then crash when trying to parse the first subdirectory.
I created the directory "C:\Program Files\VERITAS\NetBackup\logs\mtfrd" prior to the most recent attempt, and the matching output looks something like this:
15:43:49 [7100.4340] <2> set_safe_buffers: log_curr_path_len = 1280, log_buffer_size = 6320 15:43:54 [7100.4340] <2> initialize_sockets: insock = 636, outsock = 1372 15:43:54 [7100.4340] <2> arg = C:\Program Files\Veritas\NetBackup\bin\mtfrd.exe 15:43:54 [7100.4340] <2> arg = -t 15:43:54 [7100.4340] <2> arg = -v 15:43:54 [7100.4340] <2> arg = -Y 15:43:54 [7100.4340] <2> arg = -Q 15:43:54 [7100.4340] <2> arg = -q 15:43:54 [7100.4340] <2> arg = -J 15:43:54 [7100.4340] <2> arg = restoreid=33.000 15:43:54 [7100.4340] <2> arg = -f 15:43:54 [7100.4340] <2> arg = - 15:43:54 [7100.4340] <2> using verbose level : 0 15:43:54 [7100.4340] <2> INF - TAR STARTED 15:43:54 [7100.4340] <2> Setting network receive buffer size to 32032 bytes 15:51:20 [7100.4340] <2> mtf_det_blk_type : Block type : SSET, Attribs: 65536, os_id:14 15:51:20 [7100.4340] <2> read_sset: importing set number 1, unix date 1269154358 15:51:20 [7100.4340] <2> mtf_det_blk_type : Block type : VOLB, Attribs: 0, os_id:14 15:51:20 [7100.4340] <2> set_device_name_ntfs: device name is /C/ 15:51:20 [7100.4340] <2> mtf_det_blk_type : Block type : DIRB, Attribs: 0, os_id:14 15:51:20 [7100.4340] <2> mtf_det_blk_type : Block type : FILE, Attribs: 0, os_id:14 15:51:20 [7100.4340] <2> mtf_det_blk_type : Block type : FILE, Attribs: 0, os_id:14 15:51:20 [7100.4340] <2> mtf_det_blk_type : Block type : FILE, Attribs: 0, os_id:14 15:51:20 [7100.4340] <2> mtf_det_blk_type : Block type : FILE, Attribs: 0, os_id:14 15:51:20 [7100.4340] <2> mtf_det_blk_type : Block type : FILE, Attribs: 0, os_id:14 15:51:20 [7100.4340] <2> mtf_det_blk_type : Block type : FILE, Attribs: 0, os_id:14 15:51:20 [7100.4340] <2> mtf_det_blk_type : Block type : FILE, Attribs: 0, os_id:14 15:51:20 [7100.4340] <2> mtf_det_blk_type : Block type : FILE, Attribs: 0, os_id:14 15:51:20 [7100.4340] <2> mtf_det_blk_type : Block type : FILE, Attribs: 0, os_id:14 15:51:20 [7100.4340] <2> mtf_det_blk_type : Block type : FILE, Attribs: 0, os_id:14 15:51:20 [7100.4340] <2> mtf_det_blk_type : Block type : FILE, Attribs: 0, os_id:14 15:51:20 [7100.4340] <2> mtf_det_blk_type : Block type : DIRB, Attribs: 0, os_id:14 15:51:37 [6388.5776] <2> set_safe_buffers: log_curr_path_len = 1280, log_buffer_size = 6320 15:51:42 [6388.5776] <2> initialize_sockets: insock = 580, outsock = 1372 15:51:42 [6388.5776] <2> arg = C:\Program Files\Veritas\NetBackup\bin\mtfrd.exe 15:51:42 [6388.5776] <2> arg = -t 15:51:42 [6388.5776] <2> arg = -v 15:51:42 [6388.5776] <2> arg = -Y 15:51:42 [6388.5776] <2> arg = -Q 15:51:42 [6388.5776] <2> arg = -q 15:51:42 [6388.5776] <2> arg = -J 15:51:42 [6388.5776] <2> arg = restoreid=33.000 15:51:42 [6388.5776] <2> arg = -f 15:51:42 [6388.5776] <2> arg = - 15:51:42 [6388.5776] <2> using verbose level : 0 15:51:42 [6388.5776] <2> INF - TAR STARTED 15:51:42 [6388.5776] <2> Setting network receive buffer size to 32032 bytes 15:52:27 [6388.5776] <2> mtf_det_blk_type : Block type : SSET, Attribs: 65536, os_id:14 15:52:27 [6388.5776] <2> read_sset: importing set number 2, unix date 1269154700 15:52:27 [6388.5776] <2> mtf_det_blk_type : Block type : VOLB, Attribs: 0, os_id:14 15:52:27 [6388.5776] <2> set_device_name_ntfs: device name is /D/ 15:52:27 [6388.5776] <2> mtf_det_blk_type : Block type : DIRB, Attribs: 0, os_id:14 15:52:27 [6388.5776] <2> mtf_det_blk_type : Block type : FILE, Attribs: 0, os_id:14 15:52:27 [6388.5776] <2> mtf_det_blk_type : Block type : DIRB, Attribs: 0, os_id:14
@for /F "delims=" %i in ('dir /od /b /s %LOCALAPPDATA%\Symantec\NetBackup\*.conf') do @ copy /Y "%i" "%APPDATA%\VxSS\credentials"