VeeamON 2024 | #BounceForwardThrowback (Win Custom Shoes!)
Top technical сommunity program
Run by users, for users
Start FREE on-demand training
Hello everyone,VSPC allows us to be alerted when a computer has not been backed up for a specific number of days.However, when a device has multiple jobs configured, what if one of those jobs has not been running for some time while other jobs did? An example scenario is this:Job 1: when a backup target is connectedJob 2: daily at midnightWhat is job 1 never gets executed as the target is never connected but job 2 does?Is there a way I could be alerted? Thank you in advance.Daniele Capuano
Hi,Anyone can help with this error from a physical server backup?“10:30:32 Calculating digests Error: Could not find file 'C:\Windows\TEMP\tmp171E.tmp'. Could not find file 'C:\Windows\TEMP\tmp171E.tmp'. “
Güçlendirilmiş depolama ile ilgili paylaşımından sonra birçok kişiden mesaj geldi. Bu konuda kullanıcılarının kafalarının karışık olduğu anlaşılıyor. Gelen sorular arasında en yaygın olanları;Windows Repository olur mu?Cifs olur mu?NFS olur mu?Fiziksel bir sunucu mu olmak zorunda?Sunucunun arkasına NFS bağlasak olur mu?Sanal sunucu olur mu?Windows'u immutable yapabilir miyiz? Güçlendirilmiş depolama çözüm için fiziksel sunucu ve buna bağlı disk sistemi gerekir. Bu disk sistemi FC, ISCSI , DAS, internal disk olabilir. Bunun nedeni ise XFS ile formatlanmasıdır. Yukarida belirttiğim bir çok duruma XFS ile format atılamamaktadır. Sanal olması durumunda ise tüm sunucular saldırıdan etkileneceği için bu sistem de etkilenir. Bu nedenler ile fiziksel sunucu ve bağlı disk sisitemi zorunludur. Unutulmaması gereken en önemli konu saldırı anında yedeklerimiz ilk savunma noktamız ve bunun için dokümanlarda belirtildiği şekilde yapınızı güvenli olarak oluşturmamız lazım. Detaylı her türlü bilgi Veea
Any can help to solve this error please?“2024/3/27 11:04:52 :: Unable to truncate SQL server transaction logs. Details: Failed to truncate SQL server transaction logs for instances: MSSQLSERVER. “It is from a backup job of a physical server.
Running VBR v12.0. Created a backup job. Ran the job and got an error so went back in and try to edit the job. I got the error below. First time, I encountered this error. The backup log just showed the same information. I have a similar job running in our “staging” VBR but not having any error. The backup job is a storage snapshot and does handle SQL transaction logging. I saw in the Veeam’s Forum the same error message but this was for a backup copy job. What do you think is happening here?
We have Kasten K10 on installed via operator on multiple clusters. All of the K10 instances seem to have excessive amounts of helm revision when viewed with helm history k10 Is this normal behavior? We seem to be getting ~200 revisions per hour.
hi veeam communityI researched air gap backup and came across a company called stonefly that I found interesting.I wanted to know if anyone has experience using this solutionhttps://stonefly.com/backup/dr365-for-veeam/Automated Air-Gapping: Enable/Disable physical or logical air-gapping directly from the Veeam data platform through seamless integration with StoneFly. In your opinion, what is the best solution for having an air gap?What solution do you use?
Hello again! Onto my second post for world backup day, this time looking at the moments leading up to a disaster. In this post we’re going to look at ways to proactively prevent failures. After all, the best backups are the (tested) ones that didn’t need to be used because everything is fine.Let’s kick this off with a trip down memory lane. During the days that all storage media was a traditional hard drive with spinning disks, it was typically pretty obvious when a hard drive was failing, we could hear issues such as failed bearings or the scratching of a needle as these were mechanical faults that were developing. However, when we look at flash storage, which doesn’t contain any mechanical parts, the lack of being able to hear problems developing can result in people taken by surprise when storage fails.Nearly 30 years ago, Compaq released S.M.A.R.T into the public domain, providing a standard of storage health for all vendors. S.M.A.R.T (Self-Monitoring, Analysis, and Reporting Tech
Hey Community -Sorry to be the bearer of unpleasant security news as of late, but better to be proactive rather than reactive, as they say, right? 🤷🏻♂️It appears the Agenda Ransomware group, which was first detected in 2022, has been ramping up infiltrations recently. It’s ransomware, Agenda (aka Qilin and Water Galura), infected the likes of healthcare, manufacturing, and educational entities 2years ago, but have since rewrote their ransomware to now target OS’s, and specifically geared towards the VMware hypervisor.This new variant was detected by TrendMicro , which they say “comes with a variety of new functionalities and stealth mechanisms, & sets its sights squarely on VMware vCenter and ESXi servers.”You can read more about this ransomware variant in the article below, as well as the TM link above:https://www.darkreading.com/cloud-security/agenda-ransomware-vmware-esxi-serversI’m not aware of any messaging by VMware as of yet about a potential patch/fix for this threat. If
It appears there has been a noticed exploit vulnerability in Linux Kernels v5.14 up to v6.6. The exploit seems to be a “privilege escalation from unprivileged user to root user. And, it should be noted that the exploit can read/write any physical memory on the device, but uses it to become root user. An important note is that the exploit requires nf_tables to be present, and unprivileged user namespaces. This can be checked with commands specified in the README.md file in the repo.”You can read more about this and the context/background of the exploit at the following link:https://pwning.tech/nftables/It is highly recommended to update your kernel as it seems this was patched in February. To check which kernel you have, simply type hostnamectl and check the Kernel heading:
Already have an account? Login
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.
Sorry, we're still checking this file's contents to make sure it's safe to download. Please try again in a few minutes.
Sorry, our virus scanner detected that this file isn't safe to download.