SlideShare ist ein Scribd-Unternehmen logo
1 von 7
Process for Restoring a single file or folder using the Veritas NetBackup 
restore GUI. 
 Login to the Master and open the NetBackup Administration Console. 
 Go to the File Menu and Select Backup, Archive and Restore. 
 From the Backup, Archive and Restore Console go to File Menu and click 
Specify NetBackup Machines and Policy Type 
HP Restricted
 You will get a window as below. 
HP Restricted
 Mention the NetBackup Master name in the “Server to use for backup and 
restores” drop down box. By default the entry will be there, and NEVER 
change the server entry! Doing so will cause all subsequent backups and 
restores to fail on that master. 
 Mention the client name, the one for which you are running the restore in the 
“Source client for restores” drop down box. If it is not present add the Client 
name from the Edit Client list tab. 
 Mention the client name, the one to which you want to restore in the 
“Destination client for restores” drop down box and click “O.K” once you 
made the selection. By default this will be the same as source client. If you 
want to restore to a different client use the Edit Client list tab and do the 
modifications. 
 From the Backup, Archive and Restore Console go to File Menu and click 
‘Select Files and Folders to Restore…’ and click ‘from Normal Backup…’ 
 If you see the following information popup, please follow directions below. 
HP Restricted
· Remember: If it is a UNIX restore, choose "Standard" on the "Policy 
type for restores” in the “Specify NetBackup Machines and Policy Type, 
or you will not be able to see the backups. 
 Lists of Backups that have run are shown in the "NetBackup History" 
window. Full Backups are represented by a green circle, incrementals are 
represented with blue. 
 From the "History" window, select the date of the backup for which restore 
is needed. 
 If you want to select a range of backups. Click on the top left "incremental 
backups" restore while holding down the "shift" key. Click on the bottom 
right "full backups". By doing this you have selected the full from the 26th 
through the incremental to the 1st. You will be able to view the most 
updated files during this range by performing your selection this way. 
 Expand each directory to find the file from the “All Folders” pane on the 
left side of the console and place a check mark on that. 
HP Restricted
 Go to ‘Actions’ Select ‘Start Restore of Marked Files …’ 
HP Restricted
 Click ‘Start Restore’ 
 From the ‘Activity Monitor’ ensure that Restore is running fine. 
HP Restricted
 Click ‘Start Restore’ 
 From the ‘Activity Monitor’ ensure that Restore is running fine. 
HP Restricted

Weitere ähnliche Inhalte

Ähnlich wie File system restore netbackup

Lc solutions sop manual2
Lc solutions sop manual2Lc solutions sop manual2
Lc solutions sop manual2RAVI KANT
 
training materials.ppt
training materials.ppttraining materials.ppt
training materials.pptWakumaTeshome
 
Model Management Manual 2009 Short
Model Management Manual 2009 ShortModel Management Manual 2009 Short
Model Management Manual 2009 ShortRobert Coutinho
 
Baijan Savalan Hysys v8.0
Baijan Savalan Hysys v8.0Baijan Savalan Hysys v8.0
Baijan Savalan Hysys v8.0Baijan Savalan
 
Introduction to spss 2
Introduction to spss 2Introduction to spss 2
Introduction to spss 2Michael Taiwo
 
Create a basic performance point dashboard epc
Create a basic performance point dashboard   epcCreate a basic performance point dashboard   epc
Create a basic performance point dashboard epcEPC Group
 
Coc 4 backup and restore
Coc 4 backup and restoreCoc 4 backup and restore
Coc 4 backup and restoreDanilo Anos
 
Orangescrum Time Log Add-on User Manual
Orangescrum Time Log Add-on User ManualOrangescrum Time Log Add-on User Manual
Orangescrum Time Log Add-on User ManualOrangescrum
 
Dual Booting Win7 and ubuntu
Dual Booting Win7 and ubuntuDual Booting Win7 and ubuntu
Dual Booting Win7 and ubuntuRavi Malik
 
Eassos Recovery Manual
Eassos Recovery ManualEassos Recovery Manual
Eassos Recovery ManualEassos Ltd.
 
A practical-guide-for-“essbase-backup-and-recovery-part-ii -
A practical-guide-for-“essbase-backup-and-recovery-part-ii - A practical-guide-for-“essbase-backup-and-recovery-part-ii -
A practical-guide-for-“essbase-backup-and-recovery-part-ii - Abdoulaye M Yansane
 
Reconnaissance Security Use Case
Reconnaissance Security Use Case	Reconnaissance Security Use Case
Reconnaissance Security Use Case Protect724manoj
 
Calm Tips & Tricks – Axiell Training
Calm Tips & Tricks – Axiell TrainingCalm Tips & Tricks – Axiell Training
Calm Tips & Tricks – Axiell TrainingAxiell ALM
 
Fundamental of Information Technology
Fundamental of Information Technology Fundamental of Information Technology
Fundamental of Information Technology haider ali
 

Ähnlich wie File system restore netbackup (20)

Lc solutions sop manual2
Lc solutions sop manual2Lc solutions sop manual2
Lc solutions sop manual2
 
training materials.ppt
training materials.ppttraining materials.ppt
training materials.ppt
 
Max dna installation
Max dna installationMax dna installation
Max dna installation
 
Model Management Manual 2009 Short
Model Management Manual 2009 ShortModel Management Manual 2009 Short
Model Management Manual 2009 Short
 
Baijan Savalan Hysys v8.0
Baijan Savalan Hysys v8.0Baijan Savalan Hysys v8.0
Baijan Savalan Hysys v8.0
 
Ccleaner command
Ccleaner commandCcleaner command
Ccleaner command
 
Introduction to spss 2
Introduction to spss 2Introduction to spss 2
Introduction to spss 2
 
Getting Started With Valuate by REFM
Getting Started With Valuate by REFMGetting Started With Valuate by REFM
Getting Started With Valuate by REFM
 
Windows FAQs
Windows FAQsWindows FAQs
Windows FAQs
 
Phylogenetic tree
Phylogenetic treePhylogenetic tree
Phylogenetic tree
 
Create a basic performance point dashboard epc
Create a basic performance point dashboard   epcCreate a basic performance point dashboard   epc
Create a basic performance point dashboard epc
 
Coc 4 backup and restore
Coc 4 backup and restoreCoc 4 backup and restore
Coc 4 backup and restore
 
Orangescrum Time Log Add-on User Manual
Orangescrum Time Log Add-on User ManualOrangescrum Time Log Add-on User Manual
Orangescrum Time Log Add-on User Manual
 
Dual Booting Win7 and ubuntu
Dual Booting Win7 and ubuntuDual Booting Win7 and ubuntu
Dual Booting Win7 and ubuntu
 
Eassos Recovery Manual
Eassos Recovery ManualEassos Recovery Manual
Eassos Recovery Manual
 
A practical-guide-for-“essbase-backup-and-recovery-part-ii -
A practical-guide-for-“essbase-backup-and-recovery-part-ii - A practical-guide-for-“essbase-backup-and-recovery-part-ii -
A practical-guide-for-“essbase-backup-and-recovery-part-ii -
 
SPSS: Quick Look
SPSS: Quick LookSPSS: Quick Look
SPSS: Quick Look
 
Reconnaissance Security Use Case
Reconnaissance Security Use Case	Reconnaissance Security Use Case
Reconnaissance Security Use Case
 
Calm Tips & Tricks – Axiell Training
Calm Tips & Tricks – Axiell TrainingCalm Tips & Tricks – Axiell Training
Calm Tips & Tricks – Axiell Training
 
Fundamental of Information Technology
Fundamental of Information Technology Fundamental of Information Technology
Fundamental of Information Technology
 

Mehr von M Shariff

Md Mahmood Shariff_Resume
Md Mahmood Shariff_ResumeMd Mahmood Shariff_Resume
Md Mahmood Shariff_ResumeM Shariff
 
Ms exchange restoration data protector
Ms exchange restoration data protectorMs exchange restoration data protector
Ms exchange restoration data protectorM Shariff
 
QLSql database restoration netbackup
QLSql database restoration  netbackupQLSql database restoration  netbackup
QLSql database restoration netbackupM Shariff
 
Training netbackup6x2
Training netbackup6x2Training netbackup6x2
Training netbackup6x2M Shariff
 
Doc1mount request doc
Doc1mount request docDoc1mount request doc
Doc1mount request docM Shariff
 

Mehr von M Shariff (6)

Md Mahmood Shariff_Resume
Md Mahmood Shariff_ResumeMd Mahmood Shariff_Resume
Md Mahmood Shariff_Resume
 
Resume
ResumeResume
Resume
 
Ms exchange restoration data protector
Ms exchange restoration data protectorMs exchange restoration data protector
Ms exchange restoration data protector
 
QLSql database restoration netbackup
QLSql database restoration  netbackupQLSql database restoration  netbackup
QLSql database restoration netbackup
 
Training netbackup6x2
Training netbackup6x2Training netbackup6x2
Training netbackup6x2
 
Doc1mount request doc
Doc1mount request docDoc1mount request doc
Doc1mount request doc
 

Kürzlich hochgeladen

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentPim van der Noll
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024TopCSSGallery
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 

Kürzlich hochgeladen (20)

Emixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native developmentEmixa Mendix Meetup 11 April 2024 about Mendix Native development
Emixa Mendix Meetup 11 April 2024 about Mendix Native development
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024Top 10 Hubspot Development Companies in 2024
Top 10 Hubspot Development Companies in 2024
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 

File system restore netbackup

  • 1. Process for Restoring a single file or folder using the Veritas NetBackup restore GUI.  Login to the Master and open the NetBackup Administration Console.  Go to the File Menu and Select Backup, Archive and Restore.  From the Backup, Archive and Restore Console go to File Menu and click Specify NetBackup Machines and Policy Type HP Restricted
  • 2.  You will get a window as below. HP Restricted
  • 3.  Mention the NetBackup Master name in the “Server to use for backup and restores” drop down box. By default the entry will be there, and NEVER change the server entry! Doing so will cause all subsequent backups and restores to fail on that master.  Mention the client name, the one for which you are running the restore in the “Source client for restores” drop down box. If it is not present add the Client name from the Edit Client list tab.  Mention the client name, the one to which you want to restore in the “Destination client for restores” drop down box and click “O.K” once you made the selection. By default this will be the same as source client. If you want to restore to a different client use the Edit Client list tab and do the modifications.  From the Backup, Archive and Restore Console go to File Menu and click ‘Select Files and Folders to Restore…’ and click ‘from Normal Backup…’  If you see the following information popup, please follow directions below. HP Restricted
  • 4. · Remember: If it is a UNIX restore, choose "Standard" on the "Policy type for restores” in the “Specify NetBackup Machines and Policy Type, or you will not be able to see the backups.  Lists of Backups that have run are shown in the "NetBackup History" window. Full Backups are represented by a green circle, incrementals are represented with blue.  From the "History" window, select the date of the backup for which restore is needed.  If you want to select a range of backups. Click on the top left "incremental backups" restore while holding down the "shift" key. Click on the bottom right "full backups". By doing this you have selected the full from the 26th through the incremental to the 1st. You will be able to view the most updated files during this range by performing your selection this way.  Expand each directory to find the file from the “All Folders” pane on the left side of the console and place a check mark on that. HP Restricted
  • 5.  Go to ‘Actions’ Select ‘Start Restore of Marked Files …’ HP Restricted
  • 6.  Click ‘Start Restore’  From the ‘Activity Monitor’ ensure that Restore is running fine. HP Restricted
  • 7.  Click ‘Start Restore’  From the ‘Activity Monitor’ ensure that Restore is running fine. HP Restricted