cancel
Showing results for 
Search instead for 
Did you mean: 

Searches in Netbackup

screech27
Level 3

I was familar with NBU version 7.5 and performed searches via command line as follows - this worked perfectly every time.

E:\program files\veritas\netbackup\bin\admincmd>bpflist –client orlhm-drfiler-a –d 04/01/14 –e 07/07/14 –rl 999

–policy orlhm_drfiler_a_mirror_enrollment_documents –pt NDMP | find “0003713971” > c:\student.txt

 

Now a new job with NBU 7.6.0.4.  Converted the search to the correct information at the new job and it would fail.  Finally got this command to work:

E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -option GET_ALL_FILES | find "Personal.pst" > c:\
output5.txt

 

I have a few questions:

 

First regarding command line searches.  If I add the switch -policy and then the policy name, I get an error 'No entity was found'.  I really need to search by policy as searching by our Filer itself simply has way too much to search thru! 

Second, is there anyway to use a wildcard in searches?  I have tried to use "*.pst" and then ".\.pst" and both of them resulted in no entity was found.

Lastly, we do have ops center analytics and I would like to try to use it for searches.  I think I have to setup an index server but have not been able to find documentation as to what is needed or how to go about this.

I've had a case open with Symantec for 2 weeks, on 3rd engineer.  And so far all suggestions have not worked.

Could really use someone with experience in searches to provide some insight!

 

Thanks in advance to all my NBU buddies!

 

 

 

1 ACCEPTED SOLUTION

Accepted Solutions

mnolan
Level 6
Employee Accredited Certified

Glad we could get that working via the case! Thanks for posting it for those following along via the forum. :)

View solution in original post

20 REPLIES 20

mnolan
Level 6
Employee Accredited Certified

Policy name is case sensitive. (Windows is not, but the database most definitely is...)

Is that the issue?

What is your case #?

 

-Edit- In addition you should pipe to findstr and use the wildcards available.

https://technet.microsoft.com/en-us/library/bb490907.aspx

Nicolai
Moderator
Moderator
Partner    VIP   

Sorry, no option to use wildcards,  bpflist is a list command, not a search command

This bpflist command works listing NDMP backup specifying a policy

bpflist -client YYY-06-dm2  -d 04/01/2015 -policy XX_NDMP_VNX-DM2 -pt NDMP -rl 999 -option GET_ALL_FILES

make sure client is specifyed with the right name - ndmp and ndmp.acme.com is not the same host for netbackup.

As mnolan mentioned, match case, NDMP_POLICY and ndmp_policy is not the same for Netbackup.

mnolan
Level 6
Employee Accredited Certified

Thats why he is piping to a search cmd

 

"GET_ALL_FILES | find "Personal.pst" "

Except per my recommendation piping to findstr and using wildcards might work out.

screech27
Level 3

Hi, it is case # 09054338.  Opened about 2-3 weeks ago.  I am aware about it being case sensitive, searching for Personal.pst vs personal.pst brings different results.  I am SURE I type the policy name exactly as it is specified, but the no entity found happens each time.

And with the Symantec engineer we did try the findstr with the "*.pst" or "./.pst", still no entity found - response with findstr and wild card:

E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 05/01/2015 -pt NDMP -rl 999 -policy OOCNMDP04_nt05643f -option GET_ALL_FILES
| findstr ".\.pst" > C:\output2.txt
no entity was found

Example using search without wildcard and adding policy name:

E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 05/01/2015 -pt NDMP -rl 999 -policy OOCNMDP04_nt05643f -option GET_ALL_FILES
| find "personal.pst" > C:\output3.txt
no entity was found

Here is the actual policy name copied from NBU Admin - OOCNDMP04_nt05643f

Thanks for all your ideas!

 

screech27
Level 3

Another note - if I just add to the search findstr "./.pst" and do not add the -policy switch, it seems like the command runs, it creates the output file, but there is nothing in it at all.  I went thru the manual restore process and see many files with .pst as the extension for the client in the date range specified.

mnolan
Level 6
Employee Accredited Certified

Could you provide output from this command?

 

bpclimagelist -client orlhm-drfiler-a -s 04/01/2015 -e 05/01/2015 -st 19

screech27
Level 3

The client name listed above is from my old employer, so that wouldn't work.  So I tried to run it with the current employer and client name of oocsvondmp..

I got an error with the -st part:

E:\Program Files\Veritas\NetBackup\bin>bpclimagelist -client oocsvondmp -s 04/01
/2015 -e 05/01/2015 -st 19
bpclimagelist: unrecognized option -st
USAGE: bpclimagelist [-U | -Likelydate] [-Listseconds]
      [-client clientname] [-server servername] [-BE]
      [-t FULL | INCR | CINC | UBAK | UARC | TLOG | ANY | NOT_ARCHIVE]
      [-policy policy_name] [-keyword "keyword phrase"] [-ct client_type]
      [-s mm/dd/yyyy HH:MM:SS] [-e mm/dd/yyyy HH:MM:SS]


So I tried it without the st -19.  It seemed to work, but nothing on the screen.  So I set it to show output to a file.  It created the file, but it was empty

E:\Program Files\Veritas\NetBackup\bin>bpclimagelist -client oocsvondmp -s 04/01
/2015 -e 05/01/2015 > c:\bpclimagelist.txt

 

mnolan
Level 6
Employee Accredited Certified

Yes I mistyped, relayed the correct information to your support engineer, reviewing the information it retrieved.

screech27
Level 3

Got it mnolan!  Here are the results:

Backed Up         Expires       Files      KB     C Sched Type      Policy
----------------  ---------- -------- ----------- - --------------- ------------
04/30/2015 13:00  08/01/2015   345819   303081963 N Full Backup     OOCNDMP05_nt05643h
04/30/2015 12:15  08/01/2015  3136539  2351359475 N Full Backup     OOCNDMP04_nt05643f
04/29/2015 20:35  07/31/2015    28661      657784 N Cinc Backup     OOCNDMP08_oocsvonas
04/29/2015 14:11  07/31/2015   685916  2561360270 N Full Backup     OOCNDMP07_oocsvonas
04/29/2015 14:11  07/31/2015  2818207  1912938512 N Full Backup     OOCNDMP03_nt05643d
04/29/2015 14:11  07/31/2015  1894834  1173516140 N Full Backup     OOCNDMP08_oocsvonas
04/28/2015 14:00  07/30/2015  3900137  1815196138 N Full Backup     OOCNDMP02_nt05643c
04/27/2015 18:00  07/29/2015   149624  1638281856 N Full Backup     OOCNDMP06_oocpst
04/23/2015 15:55  07/25/2015   112719   134990024 N Cinc Backup     OOCNDMP05_nt05643h
04/23/2015 13:20  07/25/2015    93075   117768890 N Cinc Backup     OOCNDMP04_nt05643f
04/22/2015 15:00  07/24/2015   250508   841761692 N Cinc Backup     OOCNDMP08_oocsvonas
04/22/2015 15:00  07/24/2015    71309  1751799077 N Cinc Backup     OOCNDMP07_oocsvonas
04/22/2015 15:00  07/24/2015   138869    73934844 N Cinc Backup     OOCNDMP03_nt05643d
04/21/2015 15:00  07/23/2015   542545   343081356 N Cinc Backup     OOCNDMP02_nt05643c
04/20/2015 21:00  07/22/2015     3048   603446664 N Cinc Backup     OOCNDMP06_oocpst
04/16/2015 15:00  07/18/2015   108363   129152866 N Cinc Backup     OOCNDMP05_nt05643h
04/16/2015 12:30  07/18/2015   124200   157322255 N Cinc Backup     OOCNDMP04_nt05643f
04/15/2015 15:00  07/17/2015   255816   816207204 N Cinc Backup     OOCNDMP08_oocsvonas
04/15/2015 15:00  07/17/2015    41337  1589006212 N Cinc Backup     OOCNDMP07_oocsvonas
04/15/2015 15:00  07/17/2015   124286    68677948 N Cinc Backup     OOCNDMP03_nt05643d
04/14/2015 15:00  07/16/2015   509736   271984506 N Cinc Backup     OOCNDMP02_nt05643c
04/13/2015 21:00  07/15/2015     3069   590047624 N Cinc Backup     OOCNDMP06_oocpst
04/09/2015 15:00  07/11/2015    57785    30247066 N Cinc Backup     OOCNDMP05_nt05643h
04/09/2015 12:30  07/11/2015    90201   132938589 N Cinc Backup     OOCNDMP04_nt05643f
04/08/2015 15:00  07/10/2015    34997   959125550 N Cinc Backup     OOCNDMP07_oocsvonas
04/08/2015 15:00  07/10/2015   106693    66235867 N Cinc Backup     OOCNDMP03_nt05643d
04/08/2015 15:00  07/10/2015   253452   619362827 N Cinc Backup     OOCNDMP08_oocsvonas

 

mnolan
Level 6
Employee Accredited Certified

Reviewed the information, policy (not the one listed here but the actual one from the case) is not listed in the output.

bpflist will fail with the (227) no entity found when the policy either does not come back in the results or has incorrect case.

 

bpflist working correctly.

 

mnolan
Level 6
Employee Accredited Certified

Per the open case, we have successfully run the bpflist command utilizing the correct policy name, client name and policy type.

Now for the findstr fun.

 

Again Microsoft does list some patterns and wildcards that can be used:

https://technet.microsoft.com/en-us/library/bb490907.aspx

 

I have also found that regular Windows command line wildcards work such as []

So for example if you wanted something that ended in atch but wanted results to be any letter

[A-Z,a-z]atch or just batch and patch, [b,p]atch but were not sure if they were capitalized, [B,b,P,p]atch

screech27
Level 3

Thanks Matthew for your help!  This is the command that did work - searching for a particular file name with a client and policy listed -  So far I have only 2 hits in the output file, but it is still running. 

E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -policy OOCNDMP04_nt05643f -option GET_ALL_FILES
| find "personal.pst" > c:\output7.txt

So based on what you wrote above, there is no acceptable standard wildcard to find any characater.  So *.pst would not work. In my case they had no idea what the pst was called, so the [A-Z, a-z] wouldn't work, no idea how many characters.

I'm happy to be able to search by policy however!!!  I'll need to accept that.

My other part of the question is we do have ops center analytical.  I attempted to do a search but it didn't work.  Someone told me I have to create an 'index server' to use ops center for searches and set each policy to allow indexing.  If I go thru all this, can you use wild cards in ops center searches?  If it basically does the same as this command, probably not worth the effort to go thru all this...

 

 

mnolan
Level 6
Employee Accredited Certified

I am unsure of what features are in that search ability, but I do know that yes you will need an indexing server to utilize that.

 

Back to the findstr

 

if you | findstr .pst

You are asking for a wildcard then pst

if you want to find just .pst you need to cancle out the . as a single char wildcard

search with this

| findstr \.pst 

if you want to 

 

You don't need a * as findstr is already trying to find anything with a line containing your search query but again per the MS doc, you can use * for example b.*ing 

Also, if you want your pattern to only match at the *end* of inpiut, which might be useful while searching for an extension, you can use the following

| findstr /e \.pst

screech27
Level 3

Hi Matthew, I talked to Jason and we worked thru some of the wildcard options.  Unfortunately none of them worked!  Here is what I typed!

E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -policy OOCNMDP_nt05643f -option GET_ALL_FILES |
find "personal.pst" > C:\output5.txt
no entity was found

E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -policy OOCNMDP04_nt05643f -option GET_ALL_FILES
| findstr \.pst > C:\output8.txt
no entity was found

E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -policy OOCNMDP04_nt05643f -option GET_ALL_FILES
| find \.pst > C:\output8.txt
FIND: Parameter format not correct
no entity was found

E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -policy OOCNMDP04_nt05643f -option GET_ALL_FILES
| findstr /e \.pst > C:\output8.txt
no entity was found

E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -policy OOCNMDP04_nt05643f -option GET_ALL_FILES
| find /e \.pst > C:\output8.txt
FIND: Invalid switch
no entity was found

E:\Program Files\Veritas\NetBackup\bin>

 

screech27
Level 3

Just ran it a different way and this didn't work either

E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -policy OOCNMDP04_nt05643f -option GET_ALL_FILES
| find .pst > C:\output8.txt
FIND: Parameter format not correct
no entity was found

sdo
Moderator
Moderator
Partner    VIP    Certified

Why not just use 'bplist' with these two switches:

-I     ignore case

-PI    path independent, i.e. match anywhere on the path

...because bplist can use the wildcard character "*"...

...for example:

>bplist -C master01 -s 01/01/1970 00:00:00 -PI -I -R 999 -l -b *uPgRaDe*2*.pDf
-rwx------ root;Admi root;None      782846 04 Jul 11:33 J:\NBU_MANUALS\NetBackup_7.6_Upgrade_Guide_ver2.pdf
-rwx------ root;Admi root;None      782846 04 Jul 11:29 J:\NBU_MANUALS\NetBackup_7.6_Upgrade_Guide_ver2.pdf

...and the other switches used:

-C       clientname

-s       start date dd/mm/yyyy hh:mm:ss

-R 999   recurse up to 999 folder depth

-l       display file details, which will include a date to show

-b       tells the '-l' switch to display the backup image date time

...so the listing will tell you all occurences of the matched file name and the datetime of the backup image within which the file was found.

screech27
Level 3

E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -policy OOCNDMP04_nt05643f -option GET_ALL_FILES
| find ".pst" > c:\output10.txt

 

IT WORKS!!!!! 

 

Resolution was to use find ".pst" without any * or \  - no wildcard needed!

mnolan
Level 6
Employee Accredited Certified

Glad we could get that working via the case! Thanks for posting it for those following along via the forum. :)

sdo
Moderator
Moderator
Partner    VIP    Certified

In fact, bpflist can pattern match too:

> bpflist -d 01/01/1970 00:00:00 -option GET_ALL_FILES IGNORE_CASE -rl 999 -pattern *uPgRaDe*2*.pDf
FILES 10 13          0 1436005994 0 master01 TEST001 master01_1436005994 - *NULL* 1 0 unknown unknown 0 0 *NULL*
59 783140 51 92 320900 1 0 0 -1 /J/NBU_MANUALS/NetBackup_7.6_Upgrade_Guide_ver2.pdf 33216 root;Administrators@BUILTIN root;None@MASTER01 782
846 1389885046 1435998475 1389885046
FILES 10 13          0 1436005779 0 master01 TEST001 master01_1436005779 - *NULL* 1 0 unknown unknown 0 0 *NULL*
59 783140 51 92 320900 1 0 0 -1 /J/NBU_MANUALS/NetBackup_7.6_Upgrade_Guide_ver2.pdf 33216 root;Administrators@BUILTIN root;None@MASTER01 782
846 1389885046 1435998475 1389885046​