07-08-2015 02:10 PM
I was familar with NBU version 7.5 and performed searches via command line as follows - this worked perfectly every time.
E:\program files\veritas\netbackup\bin\admincmd>bpflist –client orlhm-drfiler-a –d 04/01/14 –e 07/07/14 –rl 999
–policy orlhm_drfiler_a_mirror_enrollment_documents –pt NDMP | find “0003713971” > c:\student.txt
Now a new job with NBU 7.6.0.4. Converted the search to the correct information at the new job and it would fail. Finally got this command to work:
E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -option GET_ALL_FILES | find "Personal.pst" > c:\
output5.txt
I have a few questions:
First regarding command line searches. If I add the switch -policy and then the policy name, I get an error 'No entity was found'. I really need to search by policy as searching by our Filer itself simply has way too much to search thru!
Second, is there anyway to use a wildcard in searches? I have tried to use "*.pst" and then ".\.pst" and both of them resulted in no entity was found.
Lastly, we do have ops center analytics and I would like to try to use it for searches. I think I have to setup an index server but have not been able to find documentation as to what is needed or how to go about this.
I've had a case open with Symantec for 2 weeks, on 3rd engineer. And so far all suggestions have not worked.
Could really use someone with experience in searches to provide some insight!
Thanks in advance to all my NBU buddies!
Solved! Go to Solution.
07-10-2015 01:32 PM
Glad we could get that working via the case! Thanks for posting it for those following along via the forum. :)
07-08-2015 02:59 PM
Policy name is case sensitive. (Windows is not, but the database most definitely is...)
Is that the issue?
What is your case #?
-Edit- In addition you should pipe to findstr and use the wildcards available.
https://technet.microsoft.com/en-us/library/bb490907.aspx
07-09-2015 01:59 AM
Sorry, no option to use wildcards, bpflist is a list command, not a search command
This bpflist command works listing NDMP backup specifying a policy
bpflist -client YYY-06-dm2 -d 04/01/2015 -policy XX_NDMP_VNX-DM2 -pt NDMP -rl 999 -option GET_ALL_FILES
make sure client is specifyed with the right name - ndmp and ndmp.acme.com is not the same host for netbackup.
As mnolan mentioned, match case, NDMP_POLICY and ndmp_policy is not the same for Netbackup.
07-09-2015 06:11 AM
Thats why he is piping to a search cmd
"GET_ALL_FILES | find "Personal.pst" "
Except per my recommendation piping to findstr and using wildcards might work out.
07-09-2015 06:29 AM
Hi, it is case # 09054338. Opened about 2-3 weeks ago. I am aware about it being case sensitive, searching for Personal.pst vs personal.pst brings different results. I am SURE I type the policy name exactly as it is specified, but the no entity found happens each time.
And with the Symantec engineer we did try the findstr with the "*.pst" or "./.pst", still no entity found - response with findstr and wild card:
E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 05/01/2015 -pt NDMP -rl 999 -policy OOCNMDP04_nt05643f -option GET_ALL_FILES
| findstr ".\.pst" > C:\output2.txt
no entity was found
Example using search without wildcard and adding policy name:
E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 05/01/2015 -pt NDMP -rl 999 -policy OOCNMDP04_nt05643f -option GET_ALL_FILES
| find "personal.pst" > C:\output3.txt
no entity was found
Here is the actual policy name copied from NBU Admin - OOCNDMP04_nt05643f
Thanks for all your ideas!
07-09-2015 06:34 AM
Another note - if I just add to the search findstr "./.pst" and do not add the -policy switch, it seems like the command runs, it creates the output file, but there is nothing in it at all. I went thru the manual restore process and see many files with .pst as the extension for the client in the date range specified.
07-09-2015 06:50 AM
Could you provide output from this command?
bpclimagelist -client orlhm-drfiler-a -s 04/01/2015 -e 05/01/2015 -st 19
07-09-2015 02:12 PM
The client name listed above is from my old employer, so that wouldn't work. So I tried to run it with the current employer and client name of oocsvondmp..
I got an error with the -st part:
E:\Program Files\Veritas\NetBackup\bin>bpclimagelist -client oocsvondmp -s 04/01
/2015 -e 05/01/2015 -st 19
bpclimagelist: unrecognized option -st
USAGE: bpclimagelist [-U | -Likelydate] [-Listseconds]
[-client clientname] [-server servername] [-BE]
[-t FULL | INCR | CINC | UBAK | UARC | TLOG | ANY | NOT_ARCHIVE]
[-policy policy_name] [-keyword "keyword phrase"] [-ct client_type]
[-s mm/dd/yyyy HH:MM:SS] [-e mm/dd/yyyy HH:MM:SS]
So I tried it without the st -19. It seemed to work, but nothing on the screen. So I set it to show output to a file. It created the file, but it was empty
E:\Program Files\Veritas\NetBackup\bin>bpclimagelist -client oocsvondmp -s 04/01
/2015 -e 05/01/2015 > c:\bpclimagelist.txt
07-10-2015 07:26 AM
Yes I mistyped, relayed the correct information to your support engineer, reviewing the information it retrieved.
07-10-2015 07:36 AM
Got it mnolan! Here are the results:
Backed Up Expires Files KB C Sched Type Policy
---------------- ---------- -------- ----------- - --------------- ------------
04/30/2015 13:00 08/01/2015 345819 303081963 N Full Backup OOCNDMP05_nt05643h
04/30/2015 12:15 08/01/2015 3136539 2351359475 N Full Backup OOCNDMP04_nt05643f
04/29/2015 20:35 07/31/2015 28661 657784 N Cinc Backup OOCNDMP08_oocsvonas
04/29/2015 14:11 07/31/2015 685916 2561360270 N Full Backup OOCNDMP07_oocsvonas
04/29/2015 14:11 07/31/2015 2818207 1912938512 N Full Backup OOCNDMP03_nt05643d
04/29/2015 14:11 07/31/2015 1894834 1173516140 N Full Backup OOCNDMP08_oocsvonas
04/28/2015 14:00 07/30/2015 3900137 1815196138 N Full Backup OOCNDMP02_nt05643c
04/27/2015 18:00 07/29/2015 149624 1638281856 N Full Backup OOCNDMP06_oocpst
04/23/2015 15:55 07/25/2015 112719 134990024 N Cinc Backup OOCNDMP05_nt05643h
04/23/2015 13:20 07/25/2015 93075 117768890 N Cinc Backup OOCNDMP04_nt05643f
04/22/2015 15:00 07/24/2015 250508 841761692 N Cinc Backup OOCNDMP08_oocsvonas
04/22/2015 15:00 07/24/2015 71309 1751799077 N Cinc Backup OOCNDMP07_oocsvonas
04/22/2015 15:00 07/24/2015 138869 73934844 N Cinc Backup OOCNDMP03_nt05643d
04/21/2015 15:00 07/23/2015 542545 343081356 N Cinc Backup OOCNDMP02_nt05643c
04/20/2015 21:00 07/22/2015 3048 603446664 N Cinc Backup OOCNDMP06_oocpst
04/16/2015 15:00 07/18/2015 108363 129152866 N Cinc Backup OOCNDMP05_nt05643h
04/16/2015 12:30 07/18/2015 124200 157322255 N Cinc Backup OOCNDMP04_nt05643f
04/15/2015 15:00 07/17/2015 255816 816207204 N Cinc Backup OOCNDMP08_oocsvonas
04/15/2015 15:00 07/17/2015 41337 1589006212 N Cinc Backup OOCNDMP07_oocsvonas
04/15/2015 15:00 07/17/2015 124286 68677948 N Cinc Backup OOCNDMP03_nt05643d
04/14/2015 15:00 07/16/2015 509736 271984506 N Cinc Backup OOCNDMP02_nt05643c
04/13/2015 21:00 07/15/2015 3069 590047624 N Cinc Backup OOCNDMP06_oocpst
04/09/2015 15:00 07/11/2015 57785 30247066 N Cinc Backup OOCNDMP05_nt05643h
04/09/2015 12:30 07/11/2015 90201 132938589 N Cinc Backup OOCNDMP04_nt05643f
04/08/2015 15:00 07/10/2015 34997 959125550 N Cinc Backup OOCNDMP07_oocsvonas
04/08/2015 15:00 07/10/2015 106693 66235867 N Cinc Backup OOCNDMP03_nt05643d
04/08/2015 15:00 07/10/2015 253452 619362827 N Cinc Backup OOCNDMP08_oocsvonas
07-10-2015 07:50 AM
Reviewed the information, policy (not the one listed here but the actual one from the case) is not listed in the output.
bpflist will fail with the (227) no entity found when the policy either does not come back in the results or has incorrect case.
bpflist working correctly.
07-10-2015 09:16 AM
Per the open case, we have successfully run the bpflist command utilizing the correct policy name, client name and policy type.
Now for the findstr fun.
Again Microsoft does list some patterns and wildcards that can be used:
https://technet.microsoft.com/en-us/library/bb490907.aspx
I have also found that regular Windows command line wildcards work such as []
So for example if you wanted something that ended in atch but wanted results to be any letter
[A-Z,a-z]atch or just batch and patch, [b,p]atch but were not sure if they were capitalized, [B,b,P,p]atch
07-10-2015 11:12 AM
Thanks Matthew for your help! This is the command that did work - searching for a particular file name with a client and policy listed - So far I have only 2 hits in the output file, but it is still running.
E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -policy OOCNDMP04_nt05643f -option GET_ALL_FILES
| find "personal.pst" > c:\output7.txt
So based on what you wrote above, there is no acceptable standard wildcard to find any characater. So *.pst would not work. In my case they had no idea what the pst was called, so the [A-Z, a-z] wouldn't work, no idea how many characters.
I'm happy to be able to search by policy however!!! I'll need to accept that.
My other part of the question is we do have ops center analytical. I attempted to do a search but it didn't work. Someone told me I have to create an 'index server' to use ops center for searches and set each policy to allow indexing. If I go thru all this, can you use wild cards in ops center searches? If it basically does the same as this command, probably not worth the effort to go thru all this...
07-10-2015 11:43 AM
I am unsure of what features are in that search ability, but I do know that yes you will need an indexing server to utilize that.
Back to the findstr
if you | findstr .pst
You are asking for a wildcard then pst
if you want to find just .pst you need to cancle out the . as a single char wildcard
search with this
| findstr \.pst
if you want to
You don't need a * as findstr is already trying to find anything with a line containing your search query but again per the MS doc, you can use * for example b.*ing
Also, if you want your pattern to only match at the *end* of inpiut, which might be useful while searching for an extension, you can use the following
| findstr /e \.pst
07-10-2015 12:15 PM
Hi Matthew, I talked to Jason and we worked thru some of the wildcard options. Unfortunately none of them worked! Here is what I typed!
E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -policy OOCNMDP_nt05643f -option GET_ALL_FILES |
find "personal.pst" > C:\output5.txt
no entity was found
E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -policy OOCNMDP04_nt05643f -option GET_ALL_FILES
| findstr \.pst > C:\output8.txt
no entity was found
E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -policy OOCNMDP04_nt05643f -option GET_ALL_FILES
| find \.pst > C:\output8.txt
FIND: Parameter format not correct
no entity was found
E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -policy OOCNMDP04_nt05643f -option GET_ALL_FILES
| findstr /e \.pst > C:\output8.txt
no entity was found
E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -policy OOCNMDP04_nt05643f -option GET_ALL_FILES
| find /e \.pst > C:\output8.txt
FIND: Invalid switch
no entity was found
E:\Program Files\Veritas\NetBackup\bin>
07-10-2015 12:19 PM
Just ran it a different way and this didn't work either
E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -policy OOCNMDP04_nt05643f -option GET_ALL_FILES
| find .pst > C:\output8.txt
FIND: Parameter format not correct
no entity was found
07-10-2015 12:28 PM
Why not just use 'bplist' with these two switches:
-I ignore case -PI path independent, i.e. match anywhere on the path
...because bplist can use the wildcard character "*"...
...for example:
>bplist -C master01 -s 01/01/1970 00:00:00 -PI -I -R 999 -l -b *uPgRaDe*2*.pDf -rwx------ root;Admi root;None 782846 04 Jul 11:33 J:\NBU_MANUALS\NetBackup_7.6_Upgrade_Guide_ver2.pdf -rwx------ root;Admi root;None 782846 04 Jul 11:29 J:\NBU_MANUALS\NetBackup_7.6_Upgrade_Guide_ver2.pdf
...and the other switches used:
-C clientname -s start date dd/mm/yyyy hh:mm:ss -R 999 recurse up to 999 folder depth -l display file details, which will include a date to show -b tells the '-l' switch to display the backup image date time
...so the listing will tell you all occurences of the matched file name and the datetime of the backup image within which the file was found.
07-10-2015 12:31 PM
E:\Program Files\Veritas\NetBackup\bin>bpflist -client oocsvondmp -d 04/01/2015
-e 06/28/2015 -pt NDMP -rl 999 -policy OOCNDMP04_nt05643f -option GET_ALL_FILES
| find ".pst" > c:\output10.txt
IT WORKS!!!!!
Resolution was to use find ".pst" without any * or \ - no wildcard needed!
07-10-2015 01:32 PM
Glad we could get that working via the case! Thanks for posting it for those following along via the forum. :)
07-10-2015 01:55 PM
In fact, bpflist can pattern match too:
> bpflist -d 01/01/1970 00:00:00 -option GET_ALL_FILES IGNORE_CASE -rl 999 -pattern *uPgRaDe*2*.pDf FILES 10 13 0 1436005994 0 master01 TEST001 master01_1436005994 - *NULL* 1 0 unknown unknown 0 0 *NULL* 59 783140 51 92 320900 1 0 0 -1 /J/NBU_MANUALS/NetBackup_7.6_Upgrade_Guide_ver2.pdf 33216 root;Administrators@BUILTIN root;None@MASTER01 782 846 1389885046 1435998475 1389885046 FILES 10 13 0 1436005779 0 master01 TEST001 master01_1436005779 - *NULL* 1 0 unknown unknown 0 0 *NULL* 59 783140 51 92 320900 1 0 0 -1 /J/NBU_MANUALS/NetBackup_7.6_Upgrade_Guide_ver2.pdf 33216 root;Administrators@BUILTIN root;None@MASTER01 782 846 1389885046 1435998475 1389885046