Blogs and podcasts
Bring your knowledge and expertise while creating blogs and podcasts
- 753 Topics
- 6,213 Comments
Let's take a look at the new restore endpoints in the Veeam Backup and Replication API - For clarity, I am not talking about the Enterprise Manager API but the new api attached directly to your VBR install - This is future of automating VBR and I could not be more excited about having this decouple from Enterprise Manager. So, what is a first class disk? Essentially its bunch of capabilities that VMware have opened up in the vSphere API allowing for vendors (or you..) to create block devices independently of a virtual machine. Veeam have hooked into this allowing for you to restore individual disks from a restore point, they create a new datastore over their vPower NFS magic and make this disk available for consumption. High level steps we need to take programatically to make this work Perform the FCD restore using the Veeam B&R API Find the attached/restored file via the vSphere API (vStorageObjectManager) Reconfigure our target VM to attach the restored VMDK file sitting mounte
I had a scenario in the lab where some partitions were not optimal for use but I wanted to keep the installation of Windows. In just 15 minutes, I was able to do a bare metal recovery with the Veeam Agent for Microsoft Windows and resize the partitions. This was best set with a video, enjoy!
One of the many features that Veeam Backup and Replication provide to ensure an organization can successfully recover their backups every day and in case of a malware emergency is the ability to scan your backup images for latent malware before they are restored. This goes beyond the ability to scan for possible entropic encryption of a server during backup by scanning for the malware that has caused the encryption. If an infection is detected then the restore can be aborted, or the server can be restored but not get connected to a network.Secure Restore is the name of the Veeam Backup and Replication feature that does the malware scan before restoring. Secure restore can restore Windows servers fromVMs from any hypervisor Physical servers that are protected with Veeam Agent for Windows. From backups stored on immutable block storage. From backups stored on immutable object storage. From backups stored on NFS/SMB shares Secure restore can be run before recovery is performed from the
If you are not sure how much space you might need, then an excellent “unofficial” tool tool created by @Timothy Dewin is available at http://rps.dewin.me/ - The Restore Point Simulator.The tool can help you size for:Backup jobs Backup copy jobs Replication jobsWhile the tool appears straight forward, I have noticed on several occasions people misunderstood which data to input: Common mistakes include sizing a backup copy job and then inputting the size of the source VBK file as the used size GB. This would mean you are doubling up data reductions which will of course not happen. A very cool feature is the easy Export check box that will give you a URL to come back and review the estimate and how did you reach it:
Hi everyone,some days ago I posted about TailscaleBetter than Just VPN for the Home LabNow, I will show a couple cases Im using it for:RDP to my lab Now, from my laptop and anywhere with internet access, I can connect to my “JumpStation” to get into my HomeLab, exactly! and it has a great feature called “Magic DNS” that it does call the remote machine from the Tailscale name, so no IP address needed. Remote access to my Lab Network Yes, you read it right it has a feature that enables the bypass / routing of the networks you have in the Tailscale host, so you can access that network from the remote connected device, in case you need to access a device that has not capability to install Tailscale in it, I use it to access my router, my center and my storage appliance. Proxy form outside routing my internet traffic. Exactly, now I can activate the “Exit node” feature that allows me to route all the client traffic to the “Tailscale” selected host to get to the internet, very useful when we
Today’s #VMCE2020 #DailyQuiz walkthrough is ready. Are you using the Secure Restore feature? Which AV vendor are you using? Did you realize you can use other vendors too?Try this question and more at https://rasmushaslund.com/vmce-practice-exam/
As you probably have already noticed:VMware released vSphere 7.0 U2 recently This is currently not supported by Veeam. I want to share some important news for this new version that is relevant to backup. See this link for the complete list of core storage improvements:https://blogs.vmware.com/virtualblocks/2021/03/09/vsphere-7-u2-core-storage VMFS SESparse Snapshot Improvements Read performance will be improved by redirecting reads to where data is located (chain or base-disk). Up to now, reads go through the whole snapshot chain and the base-disk. So when you read not-changed data, systems reads from base-disk directly, instead of checking snapshot chain as well. Performance Improvements on VMFSImproved write performance on thin provisioned disks. This is about first writes. It should reduce the potential effects of first writes when using thin-provisioned disks. NFS Improvements I am not very experienced with NFS in vSphere, so this is the improvement:With the release of vSphere 7.0
Veeam recently released Veeam Backup for Microsoft 365 v6, as part of getting up to speed with the release, I’ve been reviewing the help center documentation. Today I came across an interesting note within the backup applications section, something that was completely missing from the release notes. It said:Using multiple applications may impact the performance of your production SharePoint environment. This functionality will be deprecated in future versions of Veeam Backup for Microsoft 365.https://helpcenter.veeam.com/docs/vbo365/guide/backup_applications.html?ver=60 For a while, the advice to leverage the best backup performance from SharePoint Online and SharePoint Online derived services, such as OneDrive for Business, has been to leverage multiple backup applications. This note indicates a change in stance that may indicate changes behind the scenes. I try not to speculate too much on this blog, so whether this is due to additional testing, a change in guidance or requirement fr
In the following link you can read improvements in vSphere 7.0 U1 for data protection. Areas of improvements are: Network QoS for Backup Traffic Improved backup job resilience Improvements in scalability for concurrent backup jobs vSphere APIs for I/O Filtering (VAIO) improvementshttps://blogs.vmware.com/virtualblocks/2020/11/18/whats-new-in-vsphere-7-u1-for-data-protection
Wonderful initiative for Community and Friends.You have probably heard Danny Allan announcing at Veeam ON: Veeam Software people believe in empowering and enhancing female talent and support a more diverse environment across our ENTIRE ecosystem that is why 150 women will participate to a FREE VMCE Training.If you are interested or if you know the perfect candidate this is the registration link! 💚https://go.veeam.com/women-in-it-empowerment
Network throttling is not used in every environment. Mostly in connection with branch offices. Here it is essential to not overload the connection to the head quarter. To throttle network before, you had to configure source and destination network and time windows to limit bandwidth for backup traffic.With v12 there are new features:Generally use public addresses for target range. Option to never throttle restore activities. Select a time frame to higher the limit.
Hi everyone.If you missed it, Microsoft just released H1 2023 for Exchange Server 2019. Included in this release is the ability to use Modern Authentication in an Exchange Server only environment. In Case You Missed it, What is Modern Authentication? There are numerous resources describing the functionality of Modern Authentication in technical detail, but my goal here is to provide a conceptual overview of Basic Authentication vs Modern Authentication. Basic AuthenticationBasic Authentication, as the name might suggest, is a simplistic form of authentication. A client attempts to communicate to a resource that is protected, and the resource requests a username & password, you supply a valid username & password, and you’re granted access to the resource. Every time you want to access this resource, you need to provide the username & password. This was actually one of the main driving forces behind security considerations such as mandating HTTPS on websites, to avoid credent
So, today I’m gonna show you a simple comparison with 1 VM per job versus 2 or more VM per jobs. On my scenario I have 2 VM for my Active Directory environment with 40GB size each.----------------------------------------------------------------------------------------------------------------------------So, in first example I create 1 job per VM: In this shape it consume exactly 40GB on my repository: ----------------------------------------------------------------------------------------------------------------------------In the second example a create a unique job for the same 2 VM’s: And in this shape it consume 37GB on my repository:---------------------------------------------------------------------------------------------------------------------------- How can we see deduplication of Veeam B&R gives a good space on our backups.In this environment was only 2 small VMs, but now you can imagine how this impact an entire datacenter.
One of the challenges that I have faced learning Kubernetes is persistent storage. It is a steep learning curve but one of the most essential areas elements necessary to make containers become a real force in the world of computing. There are many flavors of Kubernetes persistent storage and making the right choice for your workload and application s is no trivial matter.Would it not be nice if there was some helpful utility to test and validate my persistent storage setup?Well now there is thanks to Veeam Kasten’s Kubestr!As stated on its web page “Kubestr is a collection of tools to discover, validate and evaluate your kubernetes storage options.”Lets take a look at what this thing can do:You can download Kubestr here: https://github.com/kastenhq/kubestr/releases/tag/v0.4.13 I chose the Linux binary and downloaded to my control node.Untar the the tarball and you are ready to go. In linux make the file kubestr executable by typing in sudo chmod +x kubestr Then run .kubestr and it will
This Friday - I am presenting on SysAdmin Day 2022 with Sagi Brody - one of the Veeam Vanguards.But I need YOUR HELP - What is your best SysAdmin Story? I will feature it on the show and stream. Tell me a good one - I’ll share it! You can join the show to see if your session is featured also! This Friday at 11:00 AM New York time, Sagi and I will be LIVE on 4 Veeam social feeds (LinkedIn, Facebook, YouTube and Twitter) with a special stream. Join us on the LinkedIN feed here.I have a story that, for now, I will only refer to as “The Coworker” and Sagi will share his best SysAdmin Day story as well.But what is your best SysAdmin Day story? Do you have a save the day moment? What about those pesky dev is actually production situations? Believe it or not - the SysAdmins are still heroes. I would love to hear your stories and any appreciation story to go with it.Speaking of appreciation…. Veeam’s celebration of SysAdmin Day puts some prizes on the line. We are doing a lucky draw where you
So part one of the Veeam Backup for Microsoft 365 discusses the shared responsibility model and outlines both Microsoft and Customer responsibilities. I also took at why you need to backup briefly but will dive more into this for part two. You can find resource links and part one here - Part 1 When it comes to backing up your Microsoft 365 data, there are seven reasons why you NEED to back it up -Accidental deletion: This is actually the most common cause of data loss in Microsoft 65. If you delete a user, whether you meant to or not, that deletion will then be replicated across the netw rk. A backup could restore that user, either to on-premises Exchange or Microsoft 365. Retention policy gaps and confusion: Retention policies in Microsoft 365 are designed to help organizations comply with regulations, laws and internal policies that require that they retain or delete content; they are not back ps. But even if you do rely on your retention policy in place of a backup, these retention
This is a small-scale amateur emulation of a hacker’s website defacing followed by a Kasten restore.I have created a small static website with Nginx deployed in Kubernetes. The Geoff Burke Propaganda website is designed to boast a positive image of the individual, hard working and healthy living and to inspire Management to make the right decision at salary review time.A group of malicious hackers gained access to the website and replaced the content with completely false information and quite obviously fake photos. However, Kasten was backing up the Website so in no time at all and before company management had a chance to view, truth and integrity were restored.Here is my website: Malicious hackers however replaced the page and photos with this vicious slander: Luckily, I chose Kasten to backup my website so I was able to quickly restore from backup: My Policy backups every hour and exports to an Offsite S3 as well allowing me to abide by the 3-2-1 rule of backup. I will pick the l
If you had this on your 2022 IT bingo card, well done, you probably should try the lottery. If you’re less psychically gifted however, this announcement is slightly bizarre. Microsoft announced yesterday that they’re intending to retire their Basic SKU IP Addresses. Here’s everything we need to know. Basic SKU only, Standard SKU Unaffected It wouldn’t be much of a cloud if we couldn’t access it, so don’t worry, only Basic SKUs will be impacted by this change. Microsoft have announced that on the 30th September 2025, Basic SKU IP addresses will be retired.Further, from the 31st March 2025, you won’t be able to provision new Basic SKU IP addresses. How do these SKUs differ? Static/Dynamic IP AddressesAll IP Address allocations are static within the Standard SKU, whereas the Basic SKU offers Dynamic/Static for IPv4 and Dynamic is the only option for IPv6. Security ModelStandard SKU IP Addresses follow the ‘Secure-by-Default’ model. This means it’s mandatory to utilise a Network Security G
I hope, this post safes you the time I spent to figure this out.Normally I do not install Veeam Enterprise Manager (EM) unless there is a use case - like indexed file search. With it, EM can search a index - created at backup time. So no mount of restore-points is necessary to find files in backups. For more information see here:https://helpcenter.veeam.com/docs/backup/em/understanding_search.html?ver=110According to my knowledge, index search is able to lists all file-versions in selected time range. For this you have to filter your search:ProblemIn multiple VBR v11 + EM environments I had the situation that index search results shows just latest file version in result. I spent some time to troubleshoot, ask colleagues, recherche. Finally I get an answer in R&D forum:https://forums.veeam.com/veeam-backup-replication-f2/search-not-behaving-like-i-would-expect-t72642.htmlShort answerIndexed search should show all file versions. This feature is broken in v11 and will be fixed.
Best Practices In my opinion it is very important to keep this best practice in mind If the integration API is unavailable due to licensing restrictions, or if any other deduplication appliance is used, the appliance should be considered non-integrated.In order to optimize throughput for deduplication appliances, please use the following configuration guidelines: Job configurationThe following settings are configured in the backup job “Edit” wizard under Storage > Advanced. Options not defined in this table are optional and not related to backup repositories using deduplication storage.Setting Value Tab: Backup Backup mode Incremental Create synthetic full backups periodically Enabled - if integrated Transform previous backup chains into rollbacks Disabled Create active full backups periodically Enabled - if non-integrated Tab: Maintenance Perform backup file health check Disabled Defragment and compact full backup file Disabled Tab: Storage Ena
In this week's episode of #HomelabWednesdays, I show you how to migrate your domain controller and VMware vCenter Server to a new network without issues.Don’t forget to subscribe to get automatic notifications whenever a new video is released.
Why does Microsoft require additional system requirements? How to check if you have Secure Boot and TPM enabled
Windows 11 enables security by design from the chip to the cloud. Recently, Windows 11 was announced to raise security baselines with new built-in hardware security requirements that will give customers the confidence that they are even more protected from the chip to the cloud on certified devices. Windows 11 is redesigned for hybrid work and security with built-in hardware-based isolation, proven encryption, and our strongest protection against malware. Also, Windows 11 makes it easier for customers to get the most protection from these advanced attacks out of the box with the requirement of a TPM 2.0 chip to help ensure they benefit from security backed by a hardware root-of-trust. You may want to see Measured Boot, Secure Boot, Trusted Boot, and Early Launch Anti-Malware: How to secure the Windows 10 boot process, and Windows 11 Feature-specific, Hardware and Software Requirements: How to upgrade to Windows 11 from Windows 10 as a Windows Insider. Windows 11 focuses on increasing
Hello Community!This will be a non-Veeam post today, but I thought it would be worthwhile to share about a vSphere network issue I encountered recently, and the steps I took to resolve it, in case any of you experience a similar occurrence. PROBLEMI had 1 ESXi Host in a Cluster which, when VMs in a certain subnet were connected to a segregated vSS and PG, there would be no network connectivity. No pings. No network connection of any kind. I use vSS and not vDS, so one might think there could be a configuration issue, rightfully so. But, I use PowerCLI to configure my Hosts, and all of them were configured using this same PCLI script, so the chances of that being the case was virtually zero. And, the other Hosts in this Cluster, when VMs were connected to the same subnet (vSS & PG), connectivity was fine. The following are some troubleshooting steps I took to try and narrow the cause down:Viewed first to see if the vmnic Teaming Policy in the vSS was set to ‘active’. Believe it or n
Login to the community
Log in with your Veeam account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.