Basics – Showing NetWorker Dependencies
This well and truly falls into the “old dog learns new trick” category. During a discussion last week about how NetWorker tracks dependencies (a topic near to my heart), someone mentioned a way to get...
View ArticleBasics – NetWorker Multiple Virtual Machine Recovery Operation
Here’s a really great function of NetWorker: being able to kick off the recovery of multiple virtual machines simultaneously. One operation, multiple image based recoveries. It barely takes any more...
View ArticleUsing NetWorker with Data Domain Retention Lock
You know when you’ve got a secret herb or spice you use in a recipe that turns it from “this is good” to “holy cow this is great!”? Well, I’ll let you in on a little secret: Data Domain retention lock...
View ArticleThis is not a political post
Or rather, it shouldn’t be. There should be nothing political in saying we should have equality for all. As a gay man, the rights I have stemmed in no small way from people protesting that they’d had...
View ArticleI’d like to speak to your CIPO, please
Chief Information Officers. Chief Information Security Officers. You see those roles, and variants of them advertised all the time. And to be perfectly frank, I’m kind of tired of hearing that I need...
View ArticleData Protection Software 19.3 – What’s New?
Last week saw the release of version 19.3 of Dell Data Protection Software – Avamar, NetWorker, Data Protection Advisor and Data Protection Central. Over the coming weeks I’ll provide some more...
View ArticleBasics – Using the NetWorker HTML UI for File-Level Recovery
One of the changes introduced in NetWorker 19.3 was the inclusion of file-level recoverability from traditional backups via the NetWorker HTML5 UI (NWUI). Use cases within the NWUI are growing with...
View ArticleBasics – FLR from BBB in NWUI
I’ve been mostly offline for a bit over a week. On Thursday 25 June my husband and I made the hardest choice we’d ever had to make in the almost 24 years we’ve been together. Our oldest cat, Stitch,...
View ArticleWhat’s new in PowerProtect Data Manager 19.5?
Last week saw the release of PowerProtect Data Manager (PPDM) 19.5. That’s the fifth release of PPDM since its inception, and the second for 2020. There’s a raft of new features and updated to PPDM in...
View ArticleBasics – Getting NetWorker Client Details
A question that comes up regularly is “how do I find out the NetWorker version and other details for my clients?” If you turn on diagnostic mode in NMC, you can get some of these details, but it’s also...
View ArticleBasics – File-level recovery from agent-based backups in PPDM
A lot of the PPDM content I’ve shown thus far has revolved around virtual machine backups. But sometimes you need agent-based backups for systems. Increasingly, that’s because they’re actually still...
View ArticleBackup Administrators Should Stick to Their Knitting
How often do you hear the term “stick to your knitting!” these days? It seems whenever a celebrity or sportsperson says something like “Maybe we should do something about climate change”, there’s a...
View ArticleAvamar Basics – Recovering a Virtual Machine as a new Guest
Have you used the Avamar HTML5 UI (AUI)? It’s such an easy to use interface, and I love the way it simplifies workflows and operational tasks. In the video below, you can see just how simple a virtual...
View ArticleAvamar Basics – VMware Changed Block Tracking Recoveries
One of the most useful recoveries you can do in Avamar, NetWorker or PowerProtect Data Manager is the changed block tracking recovery. Within VMware, a changed block tracking (CBT) recovery is what you...
View ArticleNetWorker Architecture Basics
If you’re approaching NetWorker for the very first time, it might seem a little intimidating. There are a lot of user manuals for NetWorker, and being a true enterprise backup product, it does have a...
View ArticleGoodbye, Drobo
The FARR model of data protection starts with fault tolerance – a fundamental requirement to provide a guarantee of data integrity and recoverability. As a data protection professional, I tend to take...
View ArticleDDOS 7.3 loves the Cloud
Data Domain isn’t just hardware – the hardware-based systems pack some punch, of course, but core to the system functionality is the Data Domain software. This is the third release of the DDOS 7 tree,...
View ArticleData Domain Basics – Hardening Password Controls
While you can integrate Data Domain with an external authentication service such as LDAP or ActiveDirectory, not everyone chooses to do that. Further, there are some essential accounts (such as...
View ArticleBunkers vs Vaults
I want to spend a little while talking about bunkers vs vaults. I’ve been thinking about what constitutes a vault vs a bunker quite a bit recently, and there are two reasons why this keeps percolating...
View ArticleNetWorker Basics – Getting More from nsrcapinfo
If you want a view of the front end TB (FETB) utilisation on your NetWorker server, you turn to the nsrcapinfo utility. By default, it looks at your backup history over the past 60 days and builds a...
View Article