Please enter search query.
Search <book_title>...
Veritas Access Administrator's Guide
Last Published:
2018-08-12
Product(s):
Access (7.3.2)
Platform: 3340
- Section I. Introducing Veritas Access
- Section II. Configuring Veritas Access
- Adding users or roles
- Configuring the network
- Configuring authentication services
- Section III. Managing Veritas Access storage
- Configuring storage
- Configuring data integrity with I/O fencing
- Configuring ISCSI
- Veritas Access as an iSCSI target
- Configuring storage
- Section IV. Managing Veritas Access file access services
- Configuring your NFS server
- Setting up Kerberos authentication for NFS clients
- Using Veritas Access as a CIFS server
- About Active Directory (AD)
- About configuring CIFS for Active Directory (AD) domain mode
- About setting trusted domains
- About managing home directories
- About CIFS clustering modes
- About migrating CIFS shares and home directories
- About managing local users and groups
- Configuring Veritas Access to work with Oracle Direct NFS
- Configuring an FTP server
- Configuring your NFS server
- Section V. Managing the Veritas Access Object Store server
- Section VI. Monitoring and troubleshooting
- Section VII. Provisioning and managing Veritas Access file systems
- Creating and maintaining file systems
- Considerations for creating a file system
- Modifying a file system
- Managing a file system
- Creating and maintaining file systems
- Section VIII. Configuring cloud storage
- Section IX. Provisioning and managing Veritas Access shares
- Creating shares for applications
- Creating and maintaining NFS shares
- Creating and maintaining CIFS shares
- Using Veritas Access with OpenStack
- Section X. Managing Veritas Access storage services
- Deduplicating data
- Compressing files
- About compressing files
- Compression tasks
- Configuring SmartTier
- Configuring SmartIO
- Configuring episodic replication
- Episodic replication job failover and failback
- Configuring continuous replication
- How Veritas Access continuous replication works
- Continuous replication failover and failback
- Using snapshots
- Using instant rollbacks
- Configuring Veritas Access with the NetBackup client
- Section XI. Reference
Adding or deleting patterns to the list of files in backups
You can add or delete specified patterns to or from the files that you want to include or exclude from NetBackup backups. For example, you can create a backup policy with different patterns such that only .gif
files are backed up and .iso
files are excluded.
See the backup_netbackup(1) man page for detailed examples.
To add or delete the given pattern to the list of files included for backup
- Add the specified pattern to the files that are included for backup.
For adding specified patterns to included files:
Backup> netbackup include_list add pattern [policy] [schedule]
For deleting specified patterns from included files:
Backup> netbackup include_list delete pattern [policy] [schedule]
To add or delete a given pattern to the list of files excluded from backup
- Add a given pattern to the list of files that are excluded from backup.
For adding a given pattern to excluded files:
Backup> netbackup exclude_list add pattern [policy] [schedule]
For deleting the given pattern from excluded files:
Backup> netbackup exclude_list delete pattern [policy] [schedule]