News, guidelines and various community projects
Hi,I would like to offload Archives to AWS Glacier. I added a AWS Glacier Repository to an sobr as archive exent. Once offloading starts I get the following error messages.I thing that the gateway server is not able to connect by ssh to the ec2 proxy appliance? Are these Appliances deployed in advance, or just temporary during archive offloading job? It is a new deploy, we didnt use these feature. 01:42:55 Failed to provision a proxy appliance: Unable to connect by SSH to appliance. 04:3201:47:28 Queued for processing at 28.04.2021 01:47:28 01:47:33 Task failed. Error: Unable to archive backups: no proxy appliances are available. 01:47:33 Processing finished with errors at 28.04.2021 01:47:33
I had the discussion two times last week, so I think it is worth sharing here.You may have noticed, VMware deprecated image level backup of its vCenter Appliance (VCSA) with vSphere 7. What does this mean? Basically, it is still supported to do image level backup and restore with VCSA 7.0. But it will not be supported in future releases. Notice that U1 and U2 are still 7.0 versions. With 7.n, with n>0, VMware will not support image restore of VCSA any more. From my perspective, this step was taken because problems arise when restoring this Linux appliance. I have seen many appliances requiring a filesystem check after restore or crash. When you are lucky, everything works fine afterwards. If not, you have to file a support ticket.To avoid this, VMware offers a new way for VCSA backup. Since 6.5 it is possible to run file-based backups and restore of VCSA. Since 6.7 this can be scheduled. With this, new protocols are supported as well: FTP, FTPS, HTTP, HTTPS, SFTP, NFS, or SMB. Pleas
With the recent topic of how to change the IP/DNS Name of the vCenter recently posted I wanted to share for those with experience in SQL how you can modify the vCloud URL within Veeam.This requires some SQL knowledge and that you shut down the Veeam services during the process. The main query is as follows:SELECT * FROM Hosts WHERE type=1 OR type=6 OR type=14; Under the "options" column for the relevant row(s) we're going to see the reference(s) to the old cell hostname. Then once you are ready follow these steps:0) Veeam Configuration Backup1) Stop Veeam Services2) Backup VeeamBackup SQL DB3) SELECT * FROM Hosts WHERE type=1 OR type=6 OR type=14;4) Copy the "options" value5) Modify the copied "options" column value to have the new VCD URL6) Note the id column of the related row7) Perform the update query on the objects that need the new URL:UPDATE Hosts SET options='NEW_options_VALUE' WHERE id='ID_FROM_STEP_6';8) Start Services9) Open Console, and "next" through the properties of the
How can we see here, vCenter IP/FQDN is not possible to change inside of Veeam B&R. In my case I put the IP of vCenter server on Veeam Backup & Replication and now I’d like to change it to a hostname accordingly the DNS server name. So, first of all we need to open the Console / PowerShell on burger menu of Veeam B&R. So, at this moment we need type the command:$Servers = Get-VBRServer -name "old-name-or-ip"On my case the IP of my vCenter server is 192.168.10.100. After that we just need type the following command:$Servers.SetName("new-name-or-ip")On my scenario it is ROM2SRVVLVC01. And now, with this two only commands we can see that the vCenter name was changed on Veeam Backup & Replication: To finish I just rescan the vCenter server again to see all the set up is ok.
Hi,I’d be interested in getting feedback from people that are already using HPE Apollo’s or other high density servers with local storage as repository server. It seems that a lot of people are currently planning to use them.what is you setup? Number of servers? Number of disks? Which type and size of RAID? Number of VM’s / source data how is your performance? do you use them only as backup target or as copy source as well? which filesystem ReFS/XFS with blockcloning/reflink
For my first Veeam Community post, I thought I would share with you all something I’ve been doing for over a decade - an exam prep Study Guide; this one being for VMware VCP-DCV 2021. For those who haven’t followed me over the years, I started creating these “outlines”, i.e. Study Guides, for my own benefit to help me with tech cert exam prep. I then thought others in the community may benefit using them, so I decided to share them online. I generally post them on Twitter, so if you’d like to follow me, you can do so from here.When reviewing the VMware ‘Blueprint’ for the DCV 2021 exam as compared to the 2020 exam, I was initially overwhelmed by the additional content for 2021. As I dove deeper into the 2021 exam Objectives, it turns out a lot of them were similar to what was asked to know for the 2020 exam, so it wasn’t too bad to review. As with most of my Guides, I enjoyed learning about the new tech VMware implemented with vSphere 7 - e.g. Identity Federation & Lifecycle Manage
i had some discussion on the matter of retention times in context of protection against ransomware/insider attacks. Setting up a hardened repository and making data immutable for a certain amount of time is great stuff to implement. But how long is long enough?I can remember some research or reports stating there is an "average" discovery time of ransomware / encrypted data , but i cant seem to find the articles anymore.What would people here recommend for setting retention times for specifically protecting against these attacks?I'm thinking about something arround 14 - 31 days of immutable daily backups at minimum. Any shorter has higher chance of matching an attackers' maximum amount of patience for example, to just let data expire on the repo before taking action perhaps.Or are you seeing pretty short detection times in your experience and the most recent backup was used most of the time to recover? I'm crossposting from the R&D forum. Perhaps it is better to dicuss this here.
Hi,We are having some backups copied to an AWS bucket using Veeam Backup and Replication 11. The backups have been copying up to the bucket okay but today I was going to practice restorations and am a little confused about whether I did a restore from the internet or from the performance tier. The log said the restore was from AWS Veeam Object1 which should be the Amazon server. It seemed kind of quick. I was expecting it to take hours for a small server. It was 34 minutes. Maybe de-duplication is really good.This was in the log:Restoring Hard disk 1 (40 GB) : 30.3 GB restored at 18 MB/s [nbd] 3.9 GB downloaded from capacity tier, 9.9 GB copied from performance tierSo far I haven’t seen any documentation that specifically walks us through restoration from a bucket.It’s possible I’m still thinking of our network speed with a 2015 frame of mind. I want to be sure I’m doing this right. Thanks,Bob
I am using Veeam Backup & Replication 9.5 Update 4.My backups are sent to Amazon S3 buckets after 30 days.I am trying to do a Instant VM recovery from a Restore Point located in the S3 bucket.I ran the restore and the Log file is telling me.Restore session Status: In progress.Log (Last 2 lines)<machine name> has been recovered successfullyWaiting for user to start migrationI don’t know where to go from here. I am having a hard time finding any documentation for this.Using vSphere Client version 188.8.131.52000Any help would be appreciated.
Hey everyone,I wanted to share this recent blog post I made with yourselves as whilst it’s not directly related to Veeam, I was helping someone that had locked themselves out of a Veeam database and needed to take a native backup for a support case with Veeam. I was recently helping a customer create a SQL database backup for a support ticket and noticed that they had an interesting SQL Server configuration. There was only a single account with sysadmin rights, the sa account, but this account wasn’t allowed to sign in. The SQL Server was domain joined but there was just a single group allowed with Windows Authentication and that had the “public” server role only.There are a few reasons this could happen, accidental permission changes, or groups and/or user accounts being deleted from the domain that had been assigned the sysadmin role as examples. Thankfully it’s not the end of the world for you if you find yourself in this situation. Breaking Back into your database! This will invol
Hello There, I just wanted to share an issue I had on one of my customer to avoid others the problem:We setup a standard Veeam Backup & replication Server on a W2019 VM and a Std SQL 2019 on another one to host the DBs from VBR and Enterprise Manager.The DBA from the customer insisted to setup an alias for the DB server when pointing Veeam to its Database server as it’s their best practice to facilitate migration (He was obviously not aware how easy it is to move Veeam Database). So he setup a CNAME that pointed to the real SQL server.The setup went well using the CNAME. We created a “management job” to save Veeam by itself, VBR+SQL servers. The job detected the roles and proceeded as normal but failed on SQL VSS processing. We spent a lot of time to validate that permissions were right (the DBA didn't gave us the sysadmin rights on the backup service account, wise guy) and that the service account on the SQL had the proper permissions too for the VSS writers. Long Story short: I f
Hello, we are using file-to-tape jobs to archive old files like pst files. After running the file-to-tape job we delete the files on the file-system.In the Veeam B&R console you can find the archived files in the “files” section and you can search the file name. This information is stored in the tape catalog data and you can find this by double clicking on the tapes, too. So this information is saved in the database, but how can i migrate or export/import this information to another veeam server? I am currently migrating some smaller Veeam server together to one single management server and the smaller server will be used as backup proxy. (without db) So on a new Veeam server i will get this information only by doing a inventory and catalog of all the old tapes.Is there another solution for this ?
Today’s topic will be regarding Cloud Native workloads within Azure & AWS and how best to adhere to Veeam’s 3-2-1-1-0 best practices and how concepts can differ from traditional on-premises data protection. Remember the 3-2-1-1-0 best practice is a minimum desired standard and going above and beyond these minimums will help your data availability and recoverability objectives.The public cloud has provided a huge transformation opportunity for organisations, the pay as you go model enables organisations to deploy quickly and without the overheads of infrastructure management. But these platforms are still part of a shared-responsibility model, with a key risk that you retain being, the protection of your data.3 - Copies of Your DataLets start with the easiest one. Three copies of your data, including your production data. Public cloud services such as Azure will inform you that they retain three synchronous copies of your data as a minimum via their “Locally Redundant Storage” offer
Hi Folks, I found that Rancher have a free certification. Rancher is Kubernetes but not a build it yourself one like Kubeadm. They also created the k3s version of Kuberentes that runs on a lot of appliances. I have gone through the first lessons and they are very straight forward. https://academy.rancher.com/courses/course-v1:RANCHER+K101+2019/about cheers
One of my clients (public sector) has high security requirements for his IT environment – including backup and storage.I found the following statement from VEEAM about the used encryption standards and methods in Veeam Backup and Replication:“Veeam Backup & Replication supports the following encryption standards and methods:Data EncryptionTo encrypt data blocks in backup files and files archived to tape, Veeam Backup & Replication uses the 256-bit AES with a 256-bit key length in the CBC-mode. This is designed to support the FIPS 140-2 standard. More information around that standard can be found here. As a part of Veeam Backup & Replication’s ability to generate a key based on a password, it uses the Password-Based Key Derivation Function, PKCS #5 version 2.0 as a part of NIST Publication 800-132. Veeam Backup & Replication uses 10,000 HMAC-SHA1 iterations and a 512-bit salt. More information can be found here. Veeam Backup & Replication uses the following hashing a
Hello, I have been asked by one of Veeam partners about my take if it comes to Veeam support for VMware Horizon VDI platform, despite the choice of taking the POC option I also chose to take your input on this. Considering that VMware Horizon VDI is based on ESXi, do we still consider the desktops(Instances) or sockets as unit of licensing? If so, is there any operational implication or/and limitation if it comes to operations and protection of the VMware Horizon components? Just to mention I was able to get this old article (posted 2011) but with many Veeam versions since then I decided not to fully reference ithttps://forums.veeam.com/vmware-vsphere-f24/vmware-view-best-practices-backing-up-vdi-server-clients-t6517.html
It is not uncommon to reset root password in VMware VCSA (vCenter Service Appliance). This can be necessary when account is locked or password is expired. Normally, you have to shut it down, enter GRUB and edit start parameter to boot into bash. There you can reset root password. Afterwards you boot VM again. Here is the link to this procedere: https://kb.vmware.com/s/article/2147144With vCenter 6.7 U1 it us much easier! Since then it is possible to use a Single-Sign On (SSO) administrator account (for example: firstname.lastname@example.org) to login to Appliance Interface (Port 5480) and shell. And exactly this can be used to reset the root password. In short it goes like this: Take a snapshot/backup of VCSA - it is always a good idea to start with a backup Login as a SSO-administrator using a SSH client or console. Enable and start shell: shell.set --enable true shell Change root password sudo passwd root DoneHere is the link to the more detailed VMware KB-article: https:/
Login to the community
Log in with your Veeam account
Enter your username or e-mail address. We'll send you an e-mail with instructions to reset your password.