cancel
Showing results for 
Search instead for 
Did you mean: 

Utility for explore a image file

HEMANPR
Level 6
Hello People
I just looking (Its Exist) a utility for see the files inside a image file ( View the image file like a Windows Explore) to see the content of the image.

Any Idea???

Thanks
1 ACCEPTED SOLUTION

Accepted Solutions

mph999
Level 6
Employee Accredited
You can use the catconvert command on the .f file


Martin

View solution in original post

16 REPLIES 16

J_H_Is_gone
Level 6
That is what the BAR does, it shows you the contents of the image file.  Letting you see what files, and size and last modified date, and what tape it is on.

What more are you wanting to see that you need a different way to look at it?

HEMANPR
Level 6
You can use BAR if you have the image available (unexpired image file) but If you want to see a image on a duplication backup, you can't use BAR without import the image file.
The reason why I need a utility for view  what contains the duplication job and see If the duplication have the correct information before send offsite.

ROFPR
Level 4
Is there any reason why you don't want to do an import?

Marianne
Moderator
Moderator
Partner    VIP    Accredited Certified
You want to verify images on a duplicated, unexpired tape?
Why not use the verify option in the Catalog section of the GUI (or bpverify from cli)? Using the verify utility will mount the tape and compare contents with catalog info.
Alternatively you can read up on how to use tar to read tapes. Admin Guide II has this section under Reference Topics:
Reading backup images with tar

If that still does not convince you, promote the duplicate to primary and test restoring from it.
You can then promote the original primary again before sending the duplicate offsite.

Omar_Villa
Level 6
Employee

you can use bplist and point it to the image you have and list all the files in it, not sure if is what you need.

regards.

lu
Level 6
If it's not in the catalog, use /usr/openv/netbackup/bin/tar

HEMANPR
Level 6
People
I just want to see the contains (In Files) of a image file. Like a Windows Explorer
I cant use a Import option If I add the incorrect files, we need to import other images until import what we need. I dont want to add many  images to my db.

I just try to find a utility for example: you type the image name and then you can see the contains in file of that image.
Example:
server01_123456789_image 
C:\hello.txt
C:\Windows
C:\text.jpg

That what I need. Its possible do this in VERITAS NETBACKUP???

Will_Restore
Level 6
Do you want to read the physical tape or view the contents of the image?
Backup ID (image name) is the same whether original tape or duplicate tape. 

mph999
Level 6
Employee Accredited
You can use the catconvert command on the .f file


Martin

Marianne
Moderator
Moderator
Partner    VIP    Accredited Certified
I can see you getting frustrated trying to explain what is it that you need and seemingly all of us battling to understand...
Let me try again to understand: The image file that you're referring to (server01_123456789_image) - is this the actual disk backup (tar) image and not the catalog image file on the master server under ..db/images/<client>/.... ?
The disk images on my lab system have filenames like these:
mariannelt_1262938740_C1_F1.1262938740.img
mariannelt_1262938740_C1_F1.1262938740.info
mariannelt_1262938740_C1_F2.1262938740.img
mariannelt_1262938740_C1_F2.1262938740.info

So - if it's the tar image that you want to explore, you can have another look at my previous post where I suggest that you read up on using tar to read tapes. I have personally never tried it, but it's the only way that I think might work. The rest of us trust the NetBackup catalog and know that what we see in BAR (read from the image catalog file under ..db/images/<client>/...)  corresponds with the actual tar image on disk or on tape.




HEMANPR
Level 6
Marin How I can use this command? Or where I can find this command?

HEMANPR
Level 6
The cat_convert its a utility for  generate a list of media which are offsite. I want to see what files (Windows Files) are inside the image.

HEMANPR
Level 6
Im going to try this.
Where I can find more info about this process?

Thanks Marianne

Marianne
Moderator
Moderator
Partner    VIP    Accredited Certified
The process is described in NetBackup AdminGuide II for Windows on page 58. As I've said previously - I have never tried it.

Some info about cat_convert (from Commands manual):
cat_convert converts NetBackup catalog .f files between version 3.4, 4.0v or 4.5 ASCII format and 4.5 or later binary format. It automatically detects the source catalog file format and converts it to the other format. NetBackup 6.5 does not support writing new ASCII catalog images. However, it still supports
the ability to read existing ASCII catalog images.
The -dump option enables users to view the contents of the binary catalog image .f (dot-f) files. Run cat_convert -? to see this new option. It echoes the contents of the .f file to stdout in a readable format. It also has helper options to use to limit the output to only certain records in the file or a subset of the
output columns.


Stumpr2
Level 6
It has been a few years and a few NB versions ago but this may still work.

When I was working for VERITAS as an onsite consultant at Kellogg Company I had to migrate their current backup solution to NetBackup. I had to prove what was backed up on a client was actually on the tape. I used bpverify with the verbose option and a logfile. Every file was placed into the logfile while bpverify was running. There is also a hook for running the bpverify on any copy number -cn <copy number>
Check out the man page on bpverify.

The verify in the GUI  is loacated under "catalog" and it also allows you to choose copy number 2

Stumpr2
Level 6
How to determine exactly what data is on a piece of media for a specific client
http://support.veritas.com/docs/192760

Details:
This TechNote contains a procedure on how to list the data that has been backed up on a piece of media for a specific client. It must be emphasized, that the procedure addresses the LOGICAL aspect of obtaining this information, rather than the PHYSICAL aspect. By this, it is meant that the NetBackup catalog/databases are queried for this information and that there is no actual physical reading of media (tape) involved.


1. Run the Images on Media report.  
 
This report can be generated from the NetBackup Administration window under Reports. Alternatively, it can also be obtained from the command line by running:
 

 
# /usr/openv/netbackup/bin/admincmd/bpimmedia -U  (UNIX Platforms)
 
> <install_path>\VERITAS\NetBackup\bin\admincmd\bpimmedia -U (Windows Platforms)
 

 

 
2. Output from the report will include the Backup-ID, consisting of the client hostname and a 10-digit number (ctime).

 
    For instance:  sptsunnb21_1020090543
 

 
Should the backup id be truncated, use bpimmedia -l to reveal the full image name (see TechNote 245443 in the "Related Documents" section below).
 

 

 
3. At a command line, enter the command:  
# bpflist -d  01/01/2000 -client <client name> -backupid <backupid> -rl 10

For instance:  
# bpflist -d  01/01/2000 -client sptsunnb21 -backupid sptsunnb21_1020090543 -rl 10
  Where -rl is the recursive level, or how deep into the directory structure the command is to report on.
 

 

 
This command can be found in:
 
/usr/openv/netbackup/bin/admincmd (UNIX Platforms)
 
<install_path>\VERITAS\NetBackup\bin\admincmd (Windows Platforms)
 

 
A list of files backed up for that Backup-ID will then be listed, an example snippet of which is given below:
 

 
FILES 3 0          0 1020090543 0 sptsunnb21 arch_se sptsunnb21_1020090543 - *NULL* 50 0 unknown unknown 0 0 *NULL*
1 0 5 49 1 1 0 0 35651584 /etc/ 16877 root sys 0 1019840056 1019963446 1019963446
2 107 16 53 2 1 0 0 35651584 /etc/.cpr_config 33188 root root 2236 1019761725 1019761725 1019808550
3 0 16 51 5 1 0 0 35651584 /etc/.group.lock 33152 root other 0 1018537843 1013170296 1018537843
4 0 16 51 6 1 0 0 35651584 /etc/.hosts.lock 33152 root other 0 1018537843 1005135443 1018537843
5 402 11 50 7 1 0 0 35651584 /etc/.login 33188 root sys 524 1018537843 993411837 1019808550
6 0 14 50 10 1 0 0 35651584 /etc/.pwd.lock 33152 root root 0 1018537843 1017904466 1018537843

and so on..