Veritas NetBackup™ Appliance Troubleshooting Guide
- About using the Troubleshooting Guide
- Best practices
- About troubleshooting tools
- Working with log files
- Disaster recovery
- Disaster recovery scenarios
- Appliance sustained power interruption
- Appliance hardware failure
- Complete loss of appliance with recoverable attached storage disks
- NetBackup Appliance database corruption
- NetBackup Appliance catalog corruption
- NetBackup Appliance error messages
About best practices
This section lists the best practices for working with the appliance hardware and software. It includes the following sections:
Table: Sections in the best practices chapter
Section | Description | Link |
---|---|---|
Locating the NetBackup Appliance serial number | This section provides the steps to obtain the serial number of your appliance. | |
About Fibre Channel HBA card configuration verification | This section provides the steps to verify the installation and configuration of a SAN Client Fibre Channel HBA card. | See About Fibre Channel HBA card configuration verification. |
About Notification settings | This section provides the importance for enabling the Notification and re-directs you to the MyAppliance portal to register your appliance and edit registration details. | |
About the IPMI sub-system | This section provides a brief description on why IPMI sub-systems are vital and need to be configured for your appliance. | |
About password management and recovery | This section provides the steps to be followed to recover your password. | |
About IPv4 and IPv6 network support | This section provides the guidelines for configuring the IPV4 and IPV6 addresses. | |
About enabling BMR options | This section provides a brief description on the application and benefits of enabling the BMR options when the appliance is configured as a master server. | |
About deleting LDAP or Active Directory users | This section provides the precautions you need to take while deleting LDAP or Active Directory users from the NetBackup Appliance. | See About deleting users. |
In addition to these sections, you can also refer to the best practices specific to disaster recovery.
More Information