VxBSACreateObject: Failed with error
Hi all, I need your help, my manager Netbackup on a Windows 2008 operating system and Netbackup 7. We have an integration with RMAN but when I run the backup sguente send us the error. The owner forOracle engine is ORACLE and the NetBackup with another user named NetBackup, and integrate the same group of DBA but still sends me the same error. INF - Begin progress logging for process: (14464.15088) INF - Using policy BMB_SMCHFMPROD4_HFM_Ora_Onl_D to perform a user directed Oracle Stream Based backup. INF - Starting Oracle Recovery Manager. INF - Using: "f:\app\hfm\product\11.2.0\dbhome_1\bin\rman.exe" INF - Connection info: target 'netbackup/*****@HFM' rcvcat 'RMANHFM/*****@rmanbm' INF - Start of Recovery Manager input. INF - # ----------------------------------------------------------------- INF - # RMAN command section INF - # ----------------------------------------------------------------- INF - RUN { INF - ALLOCATE CHANNEL ch00 INF - TYPE 'SBT_TAPE'; INF - SEND 'NB_ORA_CLIENT=SMCHFMPROD4,NB_ORA_SID=HFM,NB_ORA_POLICY=BMB_SMCHFMPROD4_HFM_Ora_Onl_D,NB_ORA_SERV=mxqrsbur,NB_ORA_SCHED=Diario'; INF - BACKUP INF - INCREMENTAL LEVEL=0 INF - FORMAT 'bk_u%u_s%s_p%p_t%t' INF - TAG 'rl_t%t_s%s_p%p' INF - DATABASE; INF - RELEASE CHANNEL ch00; INF - # Backup Archived Logs INF - sql 'alter system archive log current'; INF - ALLOCATE CHANNEL ch00 INF - TYPE 'SBT_TAPE'; INF - SEND 'NB_ORA_CLIENT=SMCHFMPROD4,NB_ORA_SID=HFM,NB_ORA_POLICY=BMB_SMCHFMPROD4_HFM_Ora_Onl_D,NB_ORA_SERV=mxqrsbur,NB_ORA_SCHED=Diario'; INF - BACKUP INF - FORMAT 'arch_u%u_s%s_p%p_t%t' INF - ARCHIVELOG INF - ALL INF - DELETE INPUT; INF - RELEASE CHANNEL ch00; INF - # Control file backup INF - ALLOCATE CHANNEL ch00 INF - TYPE 'SBT_TAPE'; INF - SEND 'NB_ORA_CLIENT=SMCHFMPROD4,NB_ORA_SID=HFM,NB_ORA_POLICY=BMB_SMCHFMPROD4_HFM_Ora_Onl_D,NB_ORA_SERV=mxqrsbur,NB_ORA_SCHED=Diario'; INF - BACKUP INF - FORMAT 'ctrl_u%u_s%s_p%p_t%t' INF - CURRENT CONTROLFILE; INF - RELEASE CHANNEL ch00; INF - } INF - End of Recovery Manager input. INF - Start of Recovery Manager output. INF - Recovery Manager: Release 11.2.0.1.0 - Production on Fri Feb 3 23:27:50 2012 INF - connected to target database: HFM (DBID=1249472717) INF - connected to recovery catalog database INF - allocated channel: ch00 INF - channel ch00: SID=696 device type=SBT_TAPE INF - channel ch00: starting incremental level 0 datafile backup set INF - input datafile file number=00012 name=I:\HFM\DATAFILE\CISFM.DMP INF - input datafile file number=00014 name=H:\HFM\DATAFILE\CISODIWORK.DMP INF - input datafile file number=00015 name=I:\HFM\DATAFILE\CISFM01.DMP INF - input datafile file number=00016 name=I:\HFM\DATAFILE\CISFM02.DMP INF - input datafile file number=00017 name=I:\HFM\DATAFILE\CISFM03.DMP INF - input datafile file number=00019 name=G:\HFM\DATAFILE\CISEA01.ORA INF - input datafile file number=00020 name=G:\HFM\DATAFILE\CISEA02.ORA INF - input datafile file number=00021 name=G:\HFM\DATAFILE\CISEA03.ORA INF - input datafile file number=00022 name=G:\HFM\DATAFILE\CISEA04.ORA INF - Begin progress logging for process: (2436.13472) INF - Start backup of backup piece: (bk_u0vn2e6rs_s31_p1_t774314876) INF - Server status = 241 ERR - Server exited with status 241: the specified schedule is the wrong type for this request INF - input datafile file number=00007 name=H:\HFM\DATAFILE\CISEPMA.DMP INF - input datafile file number=00018 name=H:\HFM\DATAFILE\CISODIWORK2.DMP INF - input datafile file number=00003 name=E:\HFM\DATAFILE\O1_MF_UNDOTBS1_78OBHVV8_.DBF INF - input datafile file number=00013 name=H:\HFM\DATAFILE\CISODI.DMP INF - input datafile file number=00001 name=E:\HFM\DATAFILE\O1_MF_SYSTEM_78OBH3V0_.DBF INF - input datafile file number=00002 name=E:\HFM\DATAFILE\O1_MF_SYSAUX_78OBHK1G_.DBF INF - input datafile file number=00005 name=J:\HFM\DATAFILE\CISHSS.DMP INF - input datafile file number=00008 name=J:\HFM\DATAFILE\CISHBI.DMP INF - input datafile file number=00011 name=E:\HFM\DATAFILE\CISFDM.DMP INF - input datafile file number=00004 name=E:\HFM\DATAFILE\O1_MF_USERS_78OBJ9N7_.DBF INF - released channel: ch00 INF - RMAN-00571: =========================================================== INF - RMAN-00569: =============== ERROR MESSAGE STACK FOLLOWS =============== INF - RMAN-00571: =========================================================== INF - RMAN-03009: failure of backup command on ch00 channel at 02/03/2012 23:28:12 INF - ORA-19506: failed to create sequential file, name="bk_u0vn2e6rs_s31_p1_t774314876", parms="" INF - ORA-27028: skgfqcre: sbtbackup returned error INF - ORA-19511: Error received from media manager layer, error text: INF - VxBSACreateObject: Failed with error: INF - Server Status: the specified schedule is the wrong type for this request INF - Recovery Manager complete. INF - End of Recovery Manager output. INF - End Oracle Recovery Manager.4.2KViews1like3CommentsSerious Error
Dear, good morning. I would like to make clear in this discussion, the importance that we give the integrity of our data, in particular our emails. We constantly see people everywhere reporting infections on their desktops and applications, but I do not see reporting as contracted. Importance would be a good integrity of our emails because we feed them well (cybercriminals) with new weapons by obtaining data on which they should not. Social networks registered with corporate e-mail, blogs registered with corporate e-mail etc., make each day are more targeted. As security expert, I always make sure that after all always looking for a culprit for a serious infection or destructive, and at the end of everything as it always has to have a fault, this is a security solution, but we learn that , we have to create its own policy of security as well. Attached to this discussion, is a video explaining the step taken by an attacker to collect e-mails and perform intrusion attempts with new weapons all the time are created by these criminals. Remember, a cracker does not use steps "maldados," they create their own weapons and new weapons to attack, so we never have a 100% solution, but if you create a good security policy in yourself, then it will be secured 100%, because a good percentage depends on your security solution, and so another good percentage is up to you forever! I hope you enjoyed. Big hug to everyone.Solved3.1KViews1like12CommentsDSM has encountered the following busy resource
guys trying to remove the MSDP server by following the below mentioned technote but stuck at POINT 7 http://www.symantec.com/business/support/index?page=content&id=TECH150431 getting the follwoing error.. gssuanbmas01:/usr/openv/netbackup/bin/admincmd # ./nbdevconfig -deletedp -dp gsglgnbapp01_Pool7 -stype PureDisk DSM has encountered the following busy resource: gsglgnbapp01_Pool7, mount point = PureDiskVolume failed to delete disk pool, invalid command parameter gssuanbmas01:/usr/openv/netbackup/bin/admincmd # i have run nbrbutil to find if there are any processes associated to that media server but there isnt any.. gssuanbmas01:/usr/openv/netbackup/bin/admincmd # ./nbrbutil -dump | grep gsglgnbapp01 gssuanbmas01:/usr/openv/netbackup/bin/admincmd # i have rebooted the media server that am going to remove but no joy.. i have run couple of times bpimage and nbdelete commands to make sure there its all okay but no joy. any help would highly be appreciated.Solved2.7KViews0likes1Commentjob status - complete with exceptions
there are some backup jobs run in Backup Exec 2012 , only two full backup jobs complete with exceptions in the lastest backup task. The credential of this backup job test result was failed. we haven't change any password or credential of this job. Exceptions Details: can't open this item \\posdb1\[ROOT]/oracle/app/grid/product/11.2.0/log/posdb1/srvm/eonsd_0.log.lck - skiped. can't open this item \\posdb1\[ROOT]/var/run/iscsid.pid - skiped. can't open this item \\posdb1\[ROOT]/var/run/multipathd.pid - skiped. can't open this item \\posdb1\[ROOT]/var/run/atd.pid - skiped. can't open this item \\posdb1\[ROOT]/var/run/sm-client.pid - skiped. can't open this item \\posdb1\[ROOT]/var/run/sendmail.pid - skiped. can't open this item \\posdb1\[ROOT]/var/run/iscsiuio.pid - skiped.Solved2.4KViews1like8CommentsSymantec Enterprise Vault - UK Partner advice.
Hi, We are currently using Enterprise Vault v10.0.2.1112 for Exchange, SharePoint and File Shares (FSA). Due to issues and concerns we are now considering dropping the SharePoint and FSA components and only retaining Exchange (maybe even dropping that). Can anyone advise on/recommend some UK Partners who can assist us, as i'm sure most of our issues/concerns are down to our set-up and not the product itself. The sweetener for any partners will be the potential consultancy if we decide to stay with Enterprise Vault and upgrade to the latest release, and the possibility of procuring and installing additional Enterprise Vault add-ons. Regards, SurinderSolved1.9KViews0likes5CommentsPlug-in for Vmware Vcenter Appliance
I have installed de Backup exec Plugin for on vmware (version 2.1). WithvCenter Client i connect to thevCenter Applianbe. When i click on the tab Symantec Backup Exec and log te backup server i see no info (see attachment). The same view when i log on a singe ESXi server. Is the vcenter appliancenot supported. Vmware vCenter Serverapplicance 5.5.0 2442330 Vmware ESXi 5.5.0 1623387 Vsphere Client 5.5.0 Thanks Abdel BelgdourSolved1.8KViews0likes4CommentsVmware View and Netbackup 7.6
Hello, I'm trying to backup a VDI environment w/ Netbackup. I'm able of using the VIP (vmware inteligente policy) that I can backup everyting starting w/ VDESK* using linked clones I was trying to use an option (clicking Advanced at vmware pannel) select "dont backup boot disk" that was supposed to be perfect, the only problem is that Vmware do not understand the Snapshot that Netbackup needs to execute. does anyone have won this challenge? I do not want to install an agente in every virtual desktop so I 'll have some problem W/ DNS and I really don't want to :) I have read something about create the persistant disk in a different datastore, so Vmware dont recomend that. Best Regards Any Idea will be very usefull1.3KViews0likes5CommentsPhrases that scare security professionals
Given the findings of some practices and routines, it is easy to know what the problems are with the security companies. It is your case? The scenes are classic. A child with chocolate smeared shirt says, categorically: "It was not me." Or the phone rings and mother assures you, "There's nothing to worry about." Or a systems administrator who carries a box of tapes back up guarantees: "Within minutes, all information will be retrieved." In some cases, the first words you hear - despite the distance between them and the truth - are enough to tell you everything you need to know. In some cases, the first words you hear - despite the distance between Them and the truth - are enough to tell you everything you need to know. The same applies to the world of information security. The same applies to the world of information security. Some words sound reassuring, but we know they often point out problems of internal security, technical resources or the people and processes involved in the protection systems. Get to know some of the phrases "revealing secrets" that signal the imminence of problems in security. One. One We have a culture of safety We have a culture of safety "No, you do not have" is the immediate response of the professionals. "No, you have not's" is the immediate response of the professionals. Even if only mentally. Even if only mentally. This is the kind of phrase that comes from companies that started with five people - in the traditional family business model - and, as they grew, a snap themselves operating with thousands of people without governance or policies. This is the kind of phrase That comes from companies That started with five people - in the traditional family business model - and, As They grew to snap Themselves Thousands of people operating with or without governance policies. Some exchanged and its "safety culture" are enough to buy a good espresso in a quiet corner allowing look to the horizon and find out how much work lies ahead. Some Exchanged and its "safety culture" are enough to buy a good espresso in a quiet corner Allowing look to the horizon and find out how much work lies ahead. The simple fact is that without support guidelines or feedback mechanisms (feedback), security is defined differently by each and is not verified by anyone. The simple fact is without support guidelines That common mechanisms or feedback (feedback), security is defined differently by each and is not verified by anyone. There are no metrics for compliance with the "culture" and a "safety culture" is hidden by a practice of "do your job". If there are rules, write them down. If there are rules, write down Them. If technology is put into action to implement or monitor the rules, write that down too. If technology is put into action to Implement or monitor the rules, write down That too. If people break the rules, comply with what was agreed. If the rules undermine the legitimacy of the business when completed, change them. 2nd. 2nd. IT security is information security IT security is the security of information Information security is not the same thing in the information technology security. If the term "information security" is used in the same way that "IT security", it invariably means that nobody has taken decisions not primarily security techniques that affect departments - IT, human resources, legal, audit and perhaps others in the organization. Join those who have influence in the departments listed above and decide whether information (not paper documents or equipment) is an asset of the company, such as computers and desks. Decide whether the company authorizes people to do jobs, logical and physical access to information as individuals. Decides Whether the company authorizes people to the jobs, logical and physical access to the information Individuals. Take these policies in group decisions. Take these policies in group decisions. Then maybe there will be more time to decide "how to" manage security - rather than trying to guess ... 3rd. 3rd. This does not apply to the chief This does not apply to the chief Although this is becoming less of an issue in public, occasionally an executive simply refuses to follow security guidelines that he himself approved. Although this is less of an issue Becoming in public, occasionally an executive simply Refuses to follow security guidelines That he himself approved. Unless you are prepared to meticulously document all "escapades" following the model of forensics and then deliver them to the directors or the police (or just quit), be prepared to work around the situation. Most bad apples can be managed by applying the Machiavellian sense of having influence the relationship of the other: they must at least pretend to lead by example, while continuing to do whatever they do behind closed doors. Few will admit it, but many Organizations simply put in the budget and install a DSL line access to "guests" in the halls of top executives and Their Eyes close to anything that is plugged into That line. This is not a desirable solution, but if you still solve these executives sign the documents required by Sarbanes-Oxley, the rest comes from the ability to deny knowledge of security professionals. 4th. 4th. Our department gets information security IT staff Our department gets information security IT staff Titles do not matter. Titles of not matter. A report by a security expert at the IT director is always a security administrator, even if that person has the job of information security officer. The problem is that in the corporate world the word "officer" usually means that professional has the authority to verify and monitor whether all the techniques and processes that control proprietary information are efficient. An IT security administrator is usually involved in designing technical control and therefore can not be "self-audit" and make sure that IT is doing the right thing, particularly if it relates to someone within IT. The security professional with the position of "officer" should always report the same level or higher as the IT director. The security professional with the position of "officer" should always report the same level or higher to the IT director. 5th. 5th. We have a password policy We have a password policy Speaking directly, a document that specifies the size, shape and complexity of a password is a technical standard or procedure, not a policy. Speaking directly, the document that specifies the size, shape and complexity of the password is a technical standard or procedure, not a policy. Politics is a directory for directing business, something like "individuals must be identified uniquely and authenticated priority to have the condition to access the company's assets." Politics is a business directory for directing, something like "Individuals must be authenticated and uniquely Identified priority to have the condition to access the company's assets." Note that this example policy involves "what" to do about people and access, not "how" to construct a sequence of character types. 6th. 6th. Our executives have copies of all passwords Our executives have copies of all passwords Although the idea to make a young student faint, ex ist indeed managers who demand that their direct employees to disclose their individual passwords. Although the idea to make the faint young student, ex ist indeed managers who demand That Their direct employees to Disclose Their individual passwords. The explanation for this is always: "What if someone is fired or sick? How could we find your documents?." When this happens, the only effective strategy is to tell anyone who asks such a thing: "If you do, then you are a suspect in any negative situation that arises. When this happens, the only effective strategy is to tell anyone who ASKs such a thing: " You'll never be Able to fire anybody because you will Also be a suspect. "Or you can always summarize it all in a simple:" Grow friend. " 7th. 7th. The brand is our standard I have nothing against the major hardware vendors in the market, but when the personal shopping company says: "Our standard is Dell" (or any other brand), what they are really saying is: "We play our standards security out the window in exchange for discounts and now we buy whatever the vendor offers. " I have nothing against the major hardware vendors in the market, but When the personal shopping company says: "Our standard is Dell" (or any other brand), What They are really saying is: "We play our security standards out the window in exchange for discounts and now we buy whatever the vendor offers. "It's the equivalent of shopping that her great-aunt in a store with inflated prices, getting happy because" a product is discounted 75%. " It's the equivalent of shopping That her great-aunt in the store with inflated prices, getting happy because "the product is discounted 75%." The point is, that both her great-aunt when IT people in the real world have other decisions to make and are commodity PCs. The point is, that her great-aunt ambos When IT people in the real world have other Decisions to make and are commodity PCs are all sure to choose the product from a vendor and maintain applications with it for a while. It's all right to choose the product from the vendor and Maintain applications with it for a while. But a manufacturer is not a technical standard and there is a problem in that mix if anyone does their homework. But the manufacturer is not a technical standard and there is a problem in That mix if anyone does Their homework. When a manufacturer makes changes in line or software product - especially when that part of an equipment manufacturer and network security such as Cisco Systems - it is important to have clearly defined functional requirements to assess whether the products still work as desired. When the customers not know what They want, any bargain Seems to be what you need. 8th. 8th. Hey, where did that come from? It is conceivable that those highly technical users should organize their own equipment as well as support them. On the other hand, this means that the area of IT and support personnel were knocked out by hardware manufacturers that provide only an 0800 number that never works. Security policies must be present everywhere, including the bathrooms attached to the wall behind the toilet paper of an organization. Security policy in the company can be exposed Also next to the bathroom towels. The important thing is to be clear and known to all. Solving this problem is a fundamental respect. Solving this problem is a fundamental respect. Start with the basic governance and making it clear that there are rules, with much effort and communication, this will at least make the "safety culture" a settled matter. 9th. 9th. We ship to the firewall rules ... Most network administrators cowers with the words mentioned above. Still, many will still send free email with a copy of the firewall rules. Worse, they have an OEM or a freelance consultant who set up the firewall for them and retain the single copy of the rules. These rules, if they present complexity, provide a detailed map of the security scheme of the company, with important information about the identity of internal networks and services and how to make them a target. No serious security professional would date a copy of the firewall rules of someone without a specific requirement to do so. A competent auditor of information systems certificate or other auditor will review firewall rules directly into the system administrator and can not take. The Competent auditor of information systems certificate or other auditor will review firewall rules Directly into the system administrator and can not take. If you see a copy of your corporate firewall rules put in an audit report, especially an audience, get ready to redo the design of IP ... and call their lawyers. Their lawyers and call.Solved1.3KViews2likes6CommentsNetbackup java windows administrator console installation on My Laptop
hi, Im Maruthi From AJAX FIORI, im trying to installing GUI but not happeing pls find attach file about problem invaild value for NB-Java configuration option PBX_PORT:null.staus:520 configuration file:c:\\program Files\\veritas\\java\nbjconfSolved1.2KViews0likes2CommentsEV for Mac 10.0.2.1057 login failure
I'm running OS X 10.8.2 and finally got to attempt authentication thanks to the release of EV for Mac 10.0.2.1057. Unfortunately the logins are failing. My credentials are correct. I found http://www.symantec.com/business/support/index?page=content&id=TECH165380 but I'm not clear on whether that's my problem or not. Strangely enough we do have a newly established one-way trust to another forest. I'm not crossing that though. My account is in the same domain as the Exchange servers and my mailbox. Does the mere presence of a one-way trust cause this issue? Any news on a forthcoming fix for the issue described on 165380? T.I.A.Solved1.2KViews0likes6Comments