Veritas NetBackup™ Virtual Appliance Documentation
- Getting started
- Deployment and initial configuration
- Post initial configuration procedures
- Configuring
- About configuring Host parameters for your appliance on the NetBackup Virtual Appliance
- Alerting
- About SNMP
- About Call Home
- Using
- About storage configuration
- About viewing storage space information using the Show command
- About NetBackup Virtual Appliance as a VMware backup host
- About running NetBackup commands from the appliance
- About mounting a remote NFS
- About Auto Image Replication from a NetBackup Virtual Appliance
- About storage configuration
- Logging
- Troubleshooting
- About NetBackup support utilities
- Security
- About Symantec Data Center Security on the NetBackup Virtual Appliance
- Setting the appliance login banner
- Managing users
- About authenticating LDAP users
- About authenticating Active Directory users
- About authenticating Kerberos-NIS users
- About user authorization on the NetBackup Virtual Appliance
- Creating NetBackup administrator user accounts
- Section I. Commands
- Commands overview
- Appendix A. Appliance commands
- Appendix B. Network commands
- Appendix C. Support commands
- Appendix D. Monitor commands
- Appendix E. Settings commands
- Appendix F. Reports commands
- Appendix G. Manage commands
About data integrity
The Deduplication Pool storage in NetBackup Virtual Appliance provides the following data integrity checks to ensure that successful data restores:
Any inadvertent data modifications that can cause data corruption are automatically detected and rectified if possible. Any unrecoverable data corruption issues are reported to the storage administrator by the NetBackup Console's Disk Reports UI (
).A CRC value is computed for each object created for the backup job in the Deduplication pool. A background process continuously verifies the CRC signatures to ensure that backup data is not tampered with and can be restored successfully when needed. The deduplication pool design naturally isolates any data corruption from uncorrupted portions of the pool, preventing corruption from spreading throughout the deduplication pool.