Blogs and podcasts
Bring your knowledge and expertise while creating blogs and podcasts
- 479 Topics
- 3,558 Comments
How To deploy Veeam Agent Protection GroupAre two physical nodes of an MS cluster and MSSQL instance in the clusterReference:Installing Veeam Agent for Microsoft Windows - Veeam Agent for Microsoft Windows GuideGetting Started - Veeam Agent for Microsoft Windows GuideInstallation and Configuration - Veeam Agent for Microsoft Windows GuideCreate new Protection GroupThe account used to perform a consistent backup of an MSSQL DB must be entered either in the Local group Administrators or enter the user side MSSQL studio with permissions of DBA Admin\Owner.You require different sets of Microsoft SQL permissions in the following cases:Installation (remote or local): current account needs CREATE ANY DATABASE permission on the SQL server level. After database creation this account automatically gets a db_owner role and can perform all operations with the database. If the current account does not have this permission, a Database Administrator may create an empty database in advance and grant t
Today I’ve noticed that Veeam have released the full upcoming agenda for their premier data protection event: VeeamON 2022!I just want to talk through some of the personal highlights I spotted from the agenda.Hands on Labs (Virtual & In-person) Veeam Backup & Replication v12That is not a typo, Veeam must be feeling pretty confident about the shape of v12 by now as next month they’ll be allowing hands on labs of this unreleased product. Check out the description below:In this lab, you will be working with a Veeam Backup & Replication V12 environment where you will learn the basics of Veeam Backup & Replication, test out some of our upcoming new features, and perform typical Veeam backup operator tasks though an interactive step-by-step lab guide.I can only speculate as to what upcoming features will be available to test, but I’m looking forward to seeing what Veeam have been cooking up since v11 launched last year. Veeam Backup & Replication with Immutable Linux Hard
Hi all, I share the lab I created to test the CDP feature.HW List:VmwareServer: 4 UCSC-C220-M5SX - VMware ESXi, 6.5.0, 15256549 VCSA 6.7.0 15129973 Storage: Dell Storage SC 5020 VBR+CDP-Proxy Source 1x4 vCPU – 16 Gb RAM CDP-Proxy Target 1x4 vCPU – 16 GB RAM System Requirements - User Guide for VMware vSphere (veeam.com) Requirements and Limitations - User Guide for VMware vSphere (veeam.com) Backup Infrastructure for CDP - User Guide for VMware vSphere (veeam.com)Deploy & Configure CDP proxy VBR on source & target Vmware datacenterDeploy & Configure CDP proxy on Target DCInstalling I/O FilterInstalling I/O Filter - User Guide for VMware vSphere (veeam.com)KB4096: VeeamCDP I/O filter installation fails with “The agent’s workflow is blocked” erroresxcli software acceptance set --level CommunitySupported on all your Esxi.07/10/2021 10:53:39 Error Installing CDP components on cluster: CDP-Source... Error: The operation is not allowed in the current state.The operation is
Most of you probably already know or have heard this statement: Snapshots are not backups! Just last week a German hosting provider did lose 1500 snapshots because of failing hardware. And who hasn’t experienced some horror stories about (forgotten) VMware snapshots. Because of that I wanted to highlight this with a dedicated blog post. What is a snapshot? In general a snapshot is a frozen point in time state of a certain system or data. While we're often referring to snapshots in case of virtual machines, there are other variations like storage or file snapshots. For virtual machines, snapshots set the virtual disks to read only state and redirect all changes to a different disk file(the details may differ depending on the hypervisor). They can be used for quick rollbacks or during VM backups. Normally those are only created temporarily(or at least the should). Storage or file snapshots can be used for versioning and can also be replicated to different systems; those tend to have a lo
You can think what you want about Facebook, but they operate a massive amount of compute and storage unites. And it seems, they have some scientist investigating interesting phenomenon like this. To be honest, it is not primary backup related but in the second instance it is restore related 😀Briefly summarized:They found out, CPU can perform computations incorrectly. So it comes to silent data corruption by CPU. According to their observations these failures are reproducible and not transient. When you think about data-reduction technologies like compression this really can cause problems. As the following article describes, these corruptions occur at scale. Interesting is also how they test their hardware.Read more details here:https://blocksandfiles.com/2022/03/18/facebook-investigates-silent-data-corruption/
I have been a Veeam Vanguard for five years now and was fortunate enough to have attended the VeeamON 2017 event in New Orleans, and it was fantastic. Great sessions, lots of networking and meeting more of the Veeam folks as well as Vanguards.Being a Vanguard is a real honour, and many people ask me when they see my Veeam Vanguard jacket or shirt - What is Veeam? My answer is a typical one - it is backup software for your infrastructure for now and the future, leading to a conversation around technology, backups, and many other things.This year's event is back in Las Vegas in the hybrid mode with in-person and virtual attendees. It will be the first event since 2019 in Miami that will be back to live attendance which is a great thing. In the last couple of years, with the COVID pandemic, the switch to all virtual has left many people feeling disconnected, including me, so getting back to being able to speak to people and share technology stories will be great.One other great benefi
It's been almost a month since the release of Veeam Backup for Microsoft 365 v6. If you're looking for all the details of v6, then check out @MicoolPaul’s post: Until now no bigger problems were discovered or reported. There's only a known issue, that the CPU load in idle is higher then usual; no big issue, but if you want to solve that, there's a hotfix available: https://www.veeam.com/kb4294 One change, which didn’t get much attention so far, is the newly designed setup: I really like the new fresh look, compared to the old setup. It’s clean, modern and good looking. And it also updates the Veeam Explorers during the setup/upgrade process; in previous versions, those had to be manually installed. Want a comparison to the old setup? Here’s how it looked in v5. What do you think? Which setup is the better one?
Hello to share a new vulnerabilitySpringShell attacks target about one in six vulnerable orgs (bleepingcomputer.com)(1) New Messages! (checkpoint.com)Spring4Shell: Detect and mitigate vulnerabilities in Java Spring | Dynatrace | Dynatrace newsWhat is Spring4Shell?Spring4Shell is a critical vulnerability in the Spring Framework, an open source platform for Java-based application development. Because 60% of developers use Spring for their main Java applications, many applications are potentially affected.Spring is popular because it enables software engineers to more easily write and test code to maintain modular applications. Other libraries enable developers to become less dependent on enterprise web servers and, therefore, reduce configuration complexity and cost.Spring4Shell is one of three vulnerabilities published on March 30:Spring Core RCE (critical): CVE-2022-22965 a.k.a. Spring4Shell or SpringShell Affected library: org.springframework:spring-bean Information exposure in Spring
With the release of Veeam Backup for Microsoft 365 v6 the Self Service Portal was also unleashed. In this video we run through a scenario where a new tenant is being onboarded from the Service Provider point of view as well as what steps need to be actioned by the tenants.
Veeam Backup & Replication supports and understands vSphere tags allowing the creation of Backup and Replication Jobs by selecting VMs to backup based on Tags.Tags concept was introduced in vSphere 5.5 and basically it is a label you can assign to any object (VMs, storage and so on...) in the vSphere inventory. You can assign a tag to a specific category to better identify a VM type or simply the installed OS.The use of Tags during Jobs configuration is pretty easy to configure. In the configuration wizard click Add button to add objects to backup. Click the tag icon to display VMs and Tags, select the item you want to include in the job then click Add.Using Tags you no longer need to edit a specific Backup or Replication Job to add or remove a VM. A simple click in the Tags panel of the particular VM in vSphere Client does the trick.No Backup tag?... why you should use it? Well, the No Backup Tag can be used to specify which VMs are not included in any backup on purpose. In big en
Sometimes you just want to do a quick test which requires S3.You can in seconds flat setup a Minio instance on your laptop for this purpose.Go to Minio’s download page: Run the Powershell command as shown in the instructions: Minio will be downloaded: The instructions on the Minio page say to set a username and password. I did this below but when I brought up Minio it still had the default password. Create a directory where your test buckets will reside: Now run the server: As you can see the root user was still the default minioadmin and password minioadmin but for testing purposes we can leave that, or you can login and make the change. Go to your browser and type your laptop ip address in the url and port 9000 http://your ip:9000 Login and create a bucket by pressing the circled button in the lower right: Bucket created you are ready to go!! Keep in mind this is an http S3 setup. For testing VBR capacity tier offload you would need to use https or use a registry key in Veeam
After my last post highlighting the Veeam software that reaches end of support in 2022, I wanted to expand this further and discuss software that Veeam works with that will be approaching end of life in 2022. Why does this matter when I’m just trying to protect the data?Times change, and software changes with them, until it’s no longer supported. At any point, a patch to an operating system, a .NET framework update, or anything else really, could end up with the software no longer being backed up properly, or not working at all in production. Without valid support there’s no process to get a fix, and whilst your backup software may still be in support with Veeam, if the vendor won’t fix the problem, it’s time to start panicking.With this in mind, lets explore the software & operating systems being declared end of life in 2022 so we can start planning our upgrades/migrations if necessary. MicrosoftWe may as well start with one of, or potentially the largest software vendor in the wo
The following disclosure vulnerability (CVE-2022-22948) was reported to VMware by Yuval Lazar (@Ul7raVi0l3t) of Pentera. To remediate this vulnerability, apply the patch in the response matrix below as it applies to you. The vCenter Server contains an information disclosure vulnerability due to improper permission of files. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.5.Below are the affected productsVMware vCenter Server (vCenter Server) VMware Cloud Foundation (Cloud Foundation)An information disclosure vulnerability in VMware vCenter Server was privately reported to VMware. Updates are available to remediate this vulnerability in affected VMware products.Known Attack VectorsA malicious actor with non-administrative access to the vCenter Server may exploit this issue to gain access to sensitive information.ResolutionTo remediate CVE-2022-22948 apply the patches listed in the 'Fixed Version' column of the 'R
Just a quick reminder to everyone that all good things must end at some point. The following products will no longer be supported by Veeam from the 1st January 2022.Veeam Backup & Replication 9.x Veeam ONE 9.x Veeam Disaster Recovery Orchestrator 2.0 (Formerly known as Veeam Availability Orchestrator) Veeam Agent for Microsoft Windows v3 Veeam Agent for Linux v3Also in the near future is the end of support for the following products:Veeam Service Provider Console v3 (March 2022) Veeam Backup for Microsoft Office 365 v3 (April 2022) Veeam Backup for Microsoft Office 365 v4 (November 2022)You may be thinking “I haven’t seen an update for a long time for these products, I thought it was end of life anyway”. That’s because Veeam have a two-stage sunset policy for support. Stage One: End of FixWhen a Veeam product reaches end of fix, no further updates/patches or hotfixes are created for this as the general rule. In extreme case-by-case circumstances, an exception may be made. But you c
Veeam recently released Veeam Backup for Microsoft 365 v6, as part of getting up to speed with the release, I’ve been reviewing the help center documentation. Today I came across an interesting note within the backup applications section, something that was completely missing from the release notes. It said:Using multiple applications may impact the performance of your production SharePoint environment. This functionality will be deprecated in future versions of Veeam Backup for Microsoft 365.https://helpcenter.veeam.com/docs/vbo365/guide/backup_applications.html?ver=60 For a while, the advice to leverage the best backup performance from SharePoint Online and SharePoint Online derived services, such as OneDrive for Business, has been to leverage multiple backup applications. This note indicates a change in stance that may indicate changes behind the scenes. I try not to speculate too much on this blog, so whether this is due to additional testing, a change in guidance or requirement fr
It is always interesting, when thinking of special situations, to ask: What happens, when …Here are the answers to at least a few of these questions - for immutable backups in VBR v11:What happens, when…… removing immutable restore points?Task starts and ends up with errors. No restore point is removed.Warning when trying to remove immutable files… hacker changes date/time on Veeam server to remove files with next backup run?Excellent question! But it will not work! Configured period of time is checked at Linux server, not at Veeam B&R Server! So a job running one year in the future will create new files, it cannot delete old ones.… enabling feature at existing repository, not compatible with hardened repository?Veeam checks if there are backup jobs configured with an incompatible backup chain. If found, error is shown:Error with not compatible backups… changing a backup job writing to immutable repository?When backup chain is changed to an incompatible one, error is shown:… days
IntroductionVeeam Capacity Tier allows the addition of an object storage-based extent to a Veeam Scale-Out Backup Repository (SOBR). This object storage could be on-premises or could be hosted by a cloud provider. Regardless of your chosen platform, Capacity Tier provides a cost-effective way to tier backup data from on-prem 'Performance' extents to Object for longer-term storage.We encourage you to read and understand the Product documentation on Capacity Tier at https://helpcenter.veeam.comThere are a number of reasons why switching Capacity Tier vendor might make sense to you. Perhaps there was a change in your corporate strategic alliances, or perhaps a simple cost analysis has revealed that deeper savings could be found elsewhere.Switching object vendor comes with a few challenges:You need to keep your old Capacity tier around until its retention expires and you want to be able to restore from it as well. You don't have "spare" performance tier storage available and thus creating
There are two critical CVEs that affect Veeam Backup & Replication and account for two of the three critical Veeam Backup & Replication CVEs, and the most serious of the products affected. The Critical Veeam Backup & Replication vulnerability notes include: CVE-2022-26500 | CVE-2022-26501CVE-2022-26500, CVE–2022-26501: These two CVEs relate to Veeam Backup & Replication allow executing malicious code remotely without authentication. This may lead to gaining control over the target system. This carries a CVSS rating of 9.8 and is classified as Critical.Cause? – The vulnerability is caused by the Veeam Distribution Service, running on TCP 9380 by default, allows unauthenticated users to access internal Veeam API functions. An attacker may send input to the Veeam API which may allow uploading and executing malicious code.It is worth nothing that patches are available for Veeam 11a and 10a as follow11a – Build 184.108.40.2061 P20220302: https://www.veeam.com/kb4245?ad=in-text-l
Here I am talking about backup encryption, which is performed by Veeam. Not by a hacker. It is a good idea to enable this feature.Why to monitor this? A attacker could enable backup encryption or change existing encryption key without being noticed. If so, backup jobs continue to run without any problem. But you are not able to use them for restore because you simple cannot decrypt them! For monitoring encryption password changes reports Backup Objects Change Tracking and Backup Infrastructure Audit can be used. With this reports you see when encryption password was created or modified.To control if somebody selected another encryption password from the list, use the report Job Configuration Change Tracking. For more information see my full feature blog post here: https://vnote42.net/2022/02/09/monitor-hardened-repository-with-veeam-one-v11a/
This week I had the opportunity to do a presentation at a nice executive briefing with a number of our key partners and customers. I love hearing from the field and it is nice to have those authentic conversations.I also like to know what is the latest from other brands in the industry. I live and breathe backup, but like all technology. One of the presentations today was around networking hardware solutions. The first 15 minutes of the presentation were focused on explaining the delays in confirming part availability, lead times with products, supply chain challenges with various materials and components. I’m sure some of these challenges exist across the board in enterprise and consumer IT devices.Right at that moment it dawned on my how awesome Veeam is in this current conditions. Software-Defined, Hardware Agnostic and Cloud-Ready. This is more valuable than ever as it dawned on me that Veeam has from the start taken Data Portability very seriously. Consider some of these capabilit
I know, this topic does not fit that well here, but today is Pi day! As I once studied mathematics, I am still very interested in these topics. Because this day is celebrated all over the world with funny activities and jokes, I hope some of you can get some fun out of it. At least it is a interesting topic at some cocktail parties See some jokes here:https://www.goodhousekeeping.com/life/entertainment/g35447831/pi-day-jokes/?slide=1Direct examples:What did pi say when someone asked if it could explain what Pi Day was again? "I don't want to repeat myself." Did you know that 3.14% of sailors are Pi-rates?
Hello,In this article I will tell you about the Veeam Instant VM Recovery feature.We follow our backup processes, we send our backups to different locations, we take backups to tape cassettes, right?We must apply the 3-2-1 rule in our infrastructure. We can return our backups; Well, can we provide service with performance and working as soon as possible in times of crisis?What is Instant VM Recovery?Instant VM Recovery restores your virtualization platform by running the virtual machine directly from backed up files rather than keeping users waiting for hours. Thus;Short recovery times (RTOs) are achieved.Downtime is minimized.Downtime of critical virtual machines is minimized.How does it work?Instant VM Recovery uses vPower technology to directly place a VM image from a compressed and deduplicated backup file to a vSphere or Hyper-V host.Since there is no need to export the entire VM from the backup and then copy it to the backup device, you can restart the virtual machine from backup
"Mastering Veeam Backup & Replication 11" is now in publication (since February 2022) and is ready to order either the book or e-book/kindle.Well, since writing my first book on v10, I debated to myself about writing the update of the book to v11. It took me some time to process and think about if I wanted to do it, which I then took the plunge. This time, the process was much smoother as I had already done the first book and understood the templates, formatting, etc. The team at Packt worked with me again and my busy schedule to create something I think that everyone will enjoy reading. Whether you are a newbie with Veeam or a seasoned expert, you can learn something I think from this book.Protect your cloud, virtual, and on-premises environments by implementing Veeam's powerful backup and replication technologyKey FeaturesGain in-depth knowledge of CDP and Hardened Repositories to use in your virtual environment Explore Veeam's monitoring and reporting utility - Veeam ONE - a
Cloud adoption continues to increase as organisations are either taking their first steps into the cloud, or progressing their IT strategies, whether it’s a full cloud migration, multi-cloud or delivering a hybrid architecture.A great workload to leverage the cloud has been as a backup repository. By using the cloud, we can meet multiple improvements to our 3-2-1-1-0 minimum strategy for backups. In case you aren’t familiar with the 3-2-1-1-0 strategy, it is:3 copies of data, across 2 different backup media types, 1 of which must be off-site to the production environment, 1 backup at least must be offline or “immutable”, with 0 backup validation errors. Security BoundariesOne threat that the 3-2-1-1-0 strategy doesn’t cover explicitly is the concept of security boundaries. It is entirely possible to achieve all 3-2-1-1-0 objectives purely within your own environment, or exclusively within a single cloud, but there are problems with either approach, as we’ll look into now. Internally Ma
Login to the community
Log in with your Veeam account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.