Veritas NetBackup™ Logging Reference Guide

Last Published:
Product(s): NetBackup (9.0.0.1, 9.0)
  1. Using logs
    1.  
      About logging
    2.  
      Logging levels
    3.  
      Log retention and log size
    4. Changing the logging levels
      1.  
        Set the Media Manager debug logging to a higher level
      2.  
        Changing the logging level on Windows clients
    5. About unified logging
      1.  
        Gathering unified logs for NetBackup
      2.  
        Types of unified logging messages
      3.  
        File name format for unified logging
      4.  
        Originator IDs for the entities that use unified logging
      5.  
        About changing the location of unified log files
      6.  
        About rolling over unified log files
      7.  
        About recycling unified log files
      8.  
        About using the vxlogview command to view unified logs
      9.  
        Examples of using vxlogview to view unified logs
      10.  
        Examples of using vxlogmgr to manage unified logs
      11.  
        Examples of using vxlogcfg to configure unified logs
    6. About legacy logging
      1.  
        UNIX client processes that use legacy logging
      2.  
        PC client processes that use legacy logging
      3.  
        File name format for legacy logging
      4.  
        Directory names for legacy debug logs for servers
      5.  
        Directory names for legacy debug logs for media and device management
      6.  
        How to control the amount of information written to legacy logging files
      7.  
        About limiting the size and the retention of legacy logs
      8.  
        Configuring the legacy log rotation
    7.  
      Setting retention limits for logs on clients
    8.  
      UNIX logging with syslogd
    9.  
      Logging options with the Windows Event Viewer
  2. Backup process and logging
    1.  
      Backup process
    2. NetBackup process descriptions
      1.  
        Backup and restore startup process
      2.  
        Backup and archive processes
      3.  
        Backups and archives - UNIX clients
      4.  
        Multiplexed backup process
    3.  
      About backup logging
    4.  
      Sending backup logs to Technical Support
  3. Media and device processes and logging
    1.  
      Media and device management startup process
    2.  
      Media and device management process
    3.  
      Shared Storage Option management process
    4.  
      Barcode operations
    5.  
      Media and device management components
  4. Restore process and logging
    1.  
      Restore process
    2.  
      UNIX client restore
    3.  
      Windows client restore
    4.  
      About restore logging
    5.  
      Sending restore logs to Technical Support
  5. Advanced backup and restore features
    1.  
      SAN Client Fiber Transport backup
    2.  
      SAN Client Fiber Transport restore
    3.  
      Hot catalog backup
    4.  
      Hot catalog restore
    5. Synthetic backups
      1.  
        Logs to accompany problem reports for synthetic backups
      2.  
        Creating legacy log directories to accompany problem reports for synthetic backup
  6. Storage logging
    1.  
      NDMP backup logging
    2.  
      NDMP restore logging
  7. NetBackup Deduplication logging
    1.  
      Deduplication backup process to the Media Server Deduplication Pool (MSDP)
    2.  
      Client deduplication logging
    3.  
      Deduplication configuration logs
    4.  
      Media server deduplication/pdplugin logging
    5.  
      Disk monitoring logging
    6.  
      Logging keywords
  8. OpenStorage Technology (OST) logging
    1.  
      OpenStorage Technology (OST) backup logging
    2.  
      OpenStorage Technology (OST) configuration and management
  9. Storage lifecycle policy (SLP) and Auto Image Replication (A.I.R.) logging
    1.  
      About storage lifecycle policies (SLPs) and Auto Image Replication (A.I.R.)
    2.  
      Storage lifecycle policy (SLP) duplication process flow
    3.  
      Automatic Image Replication (A.I.R.) process flow logging
    4.  
      Import process flow
    5.  
      SLP and A.I.R. logging
    6.  
      SLP configuration and management
  10. NetBackup secure communication logging
    1.  
      About NetBackup secure communication logging
    2.  
      Tomcat logging
    3.  
      NetBackup web services logging
    4.  
      Command-line logging
    5.  
      NetBackup cURL logging
    6.  
      Java logging
    7.  
      Embeddable Authentication Client (EAT) logging
    8.  
      Authentication Services (AT) logging
    9.  
      vssat logging
    10. NetBackup proxy helper logging
      1.  
        Originator ID 486
    11. NetBackup proxy tunnel logging
      1.  
        Originator ID 490
    12.  
      PBX logging
    13.  
      Sending secure communication logs to Veritas Technical Support
  11. Snapshot technologies
    1.  
      Snapshot Client backup
    2.  
      VMware backup
    3.  
      Snapshot backup and Windows open file backups
  12. Locating logs
    1.  
      Overview of NetBackup log locations and processes
    2.  
      acsssi logging
    3.  
      bpbackup logging
    4.  
      bpbkar logging
    5.  
      bpbrm logging
    6.  
      bpcd logging
    7.  
      bpcompatd logging
    8.  
      bpdbm logging
    9.  
      bpjobd logging
    10.  
      bprd logging
    11.  
      bprestore logging
    12.  
      bptestnetconn logging
    13.  
      bptm logging
    14.  
      daemon logging
    15.  
      ltid logging
    16.  
      nbemm logging
    17.  
      nbjm logging
    18.  
      nbpem logging
    19.  
      nbproxy logging
    20.  
      nbrb logging
    21.  
      NetBackup Vault logging
    22.  
      NetBackup web services logging
    23.  
      NetBackup web server certificate logging
    24.  
      PBX logging
    25.  
      reqlib logging
    26.  
      Robots logging
    27.  
      tar logging
    28.  
      txxd and txxcd logging
    29.  
      vnetd logging
  13. NetBackup Administration Console logging
    1.  
      NetBackup Administration Console logging process flow
    2.  
      Enabling detailed debug logging for the NetBackup Administration Console
    3.  
      Setting up a secure channel between the NetBackup Administration Console and bpjava-*
    4.  
      Setting up a secure channel between the NetBackup Administration Console and either nbsl or nbvault
    5.  
      NetBackup Administration Console logging configuration on NetBackup servers and clients
    6.  
      Logging Java operations for the NetBackup Remote Administration Console
    7.  
      Configuring and gathering logs when troubleshooting NetBackup Administration Console issues
    8.  
      Undo logging
  14. Using the Logging Assistant
    1.  
      About the Logging Assistant
    2.  
      Logging Assistant sequence of operation
    3.  
      Viewing the Logging Assistant records
    4.  
      Adding or deleting a Logging Assistant record
    5.  
      Setting up debug logging
    6.  
      Set minimum debug logging
    7.  
      Disabling debug logging

Synthetic backups

The typical NetBackup backup process accesses the client to create a backup. A synthetic backup is a backup image created without using the client. Instead, a synthetic backup process creates a full or a cumulative incremental image by using previously created backup images called component images.

Note:

Synthetic archives do not exist.

For example, an existing full image and subsequent differential incremental images can be synthesized to create a new full image. The previous full image and the incrementals are the component images. The new synthetic full image behaves like a backup that is created through the traditional process. The new synthetic full image is a backup of the client that is as current as the last incremental. The synthetic image is created by copying the most current version of each file from the most recent component image that contains the file. A synthetic backup must be created in a policy with the True Image Restore with Move Detection option selected. This option enables the synthetic backup to exclude the files that have been deleted from the client file system from appearing in the synthetic backup.

Like a traditional backup, nbpem initiates a synthetic backup. It submits a request to nbjm to start the synthetic backup process and nbjm then starts bpsynth, which executes on the master server. It controls the creation of the synthetic backup image and the reading of the files that are needed from the component images. If directory bpsynth exists in the debug log directory, additional debug log messages are written to a log file in that directory.

bpsynth makes a synthetic image in several phases:

Table:

Phase

Description

1 - Prepare catalog information and extents

In phase 1, bpsynth makes a synthetic backup request to the database manager, bpdbm. It uses the entries and the TIR information from the catalogs of the component images to build the catalog for the new synthetic image. It also builds the extents to be copied from the component images to the synthetic image. The bpdbm service returns the list of extents to bpsynth. (An extent is the starting block number and the number of contiguous blocks within a specific component image.) A set of extents is typically copied from each component image onto the new synthetic image.

The following figure shows how phase 1 operates:

2 - Obtain resources

In phase 2, bpsynth obtains write resources (storage unit, drive, and media) for the new image. It also reserves all the read media containing component images and obtains the drive for the first media to be read.

When the component images reside on BasicDisk, no resource reservation is done.

3 - Copy data

In phase 3, bpsynth starts the writer bptm (for tape and disk) on the media server to write the new synthetic image. It also starts a reader bptm (tape) or bpdm (disk) process for each component image on a media server that can access the component image. The reader process reads all extents for the component image.

The following figure shows how phase 3 operates:

Note that bpsynth only starts the parent bptm (writer) and bpdm (reader) process on the media server. The parent in turn starts a child process. The parent and child communicate by means of buffers in shared memory.

The bpsynth process sends the extents (starting block and count) for each component image to the corresponding child bptm or bpdm reader process.

The parent bptm or bpdm reader process reads the data from the appropriate media into the shared buffers. The child bptm or bpdm reader process sends the data in the shared buffers to the child bptm writer process over a socket. The child bptm writer process writes the data into the shared buffers. The parent bptm writer process copies the data from the shared buffers to the media and notifies bpsynth when the synthetic image is complete.

4 - Validate the image

In phase 4, the bpsynth process validates the image. The new image is now visible to NetBackup and can be used like any other full or cumulative incremental backup.

Synthetic backup requires that true image restore (TIR) with move detection be selected for each component image, and that the component images are synthetic images.