Veritas NetBackup™ Commands Reference Guide

Last Published:
Product(s): NetBackup & Alta Data Protection (9.1)
  1. Introduction
    1.  
      About NetBackup commands
    2.  
      Navigating multiple menu levels
    3.  
      NetBackup command conventions
    4.  
      NetBackup Media Manager command notes
    5.  
      IPV6 updates
  2. Appendix A. NetBackup Commands
    1.  
      acsd
    2.  
      add_media_server_on_clients
    3.  
      backupdbtrace
    4.  
      backuptrace
    5.  
      bmrc
    6.  
      bmrconfig
    7.  
      bmrepadm
    8.  
      bmrprep
    9.  
      bmrs
    10.  
      bmrsrtadm
    11.  
      bp
    12.  
      bparchive
    13.  
      bpbackup
    14.  
      bpbackupdb
    15.  
      bpcatarc
    16.  
      bpcatlist
    17.  
      bpcatres
    18.  
      bpcatrm
    19.  
      bpcd
    20.  
      bpchangeprimary
    21.  
      bpclient
    22.  
      bpclimagelist
    23.  
      bpclntcmd
    24.  
      bpclusterutil
    25.  
      bpcompatd
    26.  
      bpconfig
    27.  
      bpdbjobs
    28.  
      bpdbm
    29.  
      bpdgclone
    30.  
      bpdown
    31.  
      bpduplicate
    32.  
      bperror
    33.  
      bpexpdate
    34.  
      bpfis
    35.  
      bpflist
    36.  
      bpgetconfig
    37.  
      bpgetdebuglog
    38.  
      bpimage
    39.  
      bpimagelist
    40.  
      bpimmedia
    41.  
      bpimport
    42.  
      bpinst
    43.  
      bpkeyfile
    44.  
      bpkeyutil
    45.  
      bplabel
    46.  
      bplist
    47.  
      bpmedia
    48.  
      bpmedialist
    49.  
      bpminlicense
    50.  
      bpnbat
    51.  
      bpnbaz
    52.  
      bppficorr
    53.  
      bpplcatdrinfo
    54.  
      bpplclients
    55.  
      bppldelete
    56.  
      bpplinclude
    57.  
      bpplinfo
    58.  
      bppllist
    59.  
      bpplsched
    60.  
      bpplschedrep
    61.  
      bpplschedwin
    62.  
      bppolicynew
    63.  
      bpps
    64.  
      bprd
    65.  
      bprecover
    66.  
      bprestore
    67.  
      bpretlevel
    68.  
      bpschedule
    69.  
      bpschedulerep
    70.  
      bpsetconfig
    71.  
      bpstsinfo
    72.  
      bpstuadd
    73.  
      bpstudel
    74.  
      bpstulist
    75.  
      bpsturep
    76.  
      bptestbpcd
    77.  
      bptestnetconn
    78.  
      bptpcinfo
    79.  
      bpup
    80.  
      bpverify
    81.  
      cat_convert
    82.  
      cat_export
    83.  
      cat_import
    84.  
      configureCerts
    85.  
      configureCertsForPlugins
    86.  
      configureMQ
    87.  
      configurePorts
    88.  
      configureWebServerCerts
    89.  
      create_nbdb
    90.  
      csconfig cldinstance
    91.  
      csconfig cldprovider
    92.  
      csconfig meter
    93.  
      csconfig reinitialize
    94.  
      csconfig throttle
    95.  
      duplicatetrace
    96.  
      importtrace
    97.  
      jbpSA
    98.  
      jnbSA
    99.  
      ltid
    100.  
      manageClientCerts
    101.  
      mklogdir
    102.  
      nbauditreport
    103.  
      nbcallhomeproxyconfig
    104.  
      nbcatsync
    105.  
      NBCC
    106.  
      NBCCR
    107.  
      nbcertcmd
    108.  
      nbcertupdater
    109.  
      nbcldutil
    110.  
      nbcloudrestore
    111.  
      nbcomponentupdate
    112.  
      nbcplogs
    113.  
      nbcredkeyutil
    114.  
      nbdb_admin
    115.  
      nbdb_backup
    116.  
      nbdb_move
    117.  
      nbdb_ping
    118.  
      nbdb_restore
    119.  
      nbdb_unload
    120.  
      nbdb2adutl
    121.  
      nbdbms_start_server
    122.  
      nbdbms_start_stop
    123.  
      nbdc
    124.  
      nbdecommission
    125.  
      nbdelete
    126.  
      nbdeployutil
    127.  
      nbdevconfig
    128.  
      nbdevquery
    129.  
      nbdiscover
    130.  
      nbdna
    131.  
      nbemm
    132.  
      nbemmcmd
    133.  
      nbfindfile
    134.  
      nbfirescan
    135.  
      nbftadm
    136.  
      nbftconfig
    137.  
      nbgetconfig
    138.  
      nbhba
    139.  
      nbholdutil
    140.  
      nbhostidentity
    141.  
      nbhostmgmt
    142.  
      nbhypervtool
    143.  
      nbidpcmd
    144.  
      nbimageshare
    145.  
      nbinstallcmd
    146.  
      nbjm
    147.  
      nbkmiputil
    148.  
      nbkmscmd
    149.  
      nbkmsutil
    150.  
      nboraadm
    151.  
      nborair
    152.  
      nbpem
    153.  
      nbpemreq
    154.  
      nbmlb
    155.  
      nbperfchk
    156.  
      nbplupgrade
    157.  
      nbrb
    158.  
      nbrbutil
    159.  
      nbregopsc
    160.  
      nbreplicate
    161.  
      nbrepo
    162.  
      nbrestorevm
    163.  
      nbseccmd
    164.  
      nbserviceusercmd
    165.  
      nbsetconfig
    166.  
      nbsmartdiag
    167.  
      nbsnapimport
    168.  
      nbsnapreplicate
    169.  
      nbsqladm
    170.  
      nbstl
    171.  
      nbstlutil
    172.  
      nbstop
    173.  
      nbsu
    174.  
      nbsvrgrp
    175.  
      netbackup_deployment_insights
    176.  
      resilient_clients
    177.  
      restoretrace
    178.  
      stopltid
    179.  
      tldd
    180.  
      tldcd
    181.  
      tpautoconf
    182.  
      tpclean
    183.  
      tpconfig
    184.  
      tpext
    185.  
      tpreq
    186.  
      tpunmount
    187.  
      verifytrace
    188.  
      vltadm
    189.  
      vltcontainers
    190.  
      vlteject
    191.  
      vltinject
    192.  
      vltoffsitemedia
    193.  
      vltopmenu
    194.  
      vltrun
    195.  
      vmadd
    196.  
      vmchange
    197.  
      vmcheckxxx
    198.  
      vmd
    199.  
      vmdelete
    200.  
      vmoprcmd
    201.  
      vmphyinv
    202.  
      vmpool
    203.  
      vmquery
    204.  
      vmrule
    205.  
      vmupdate
    206.  
      vnetd
    207.  
      vssat
    208.  
      vwcp_manage
    209.  
      vxlogcfg
    210.  
      vxlogmgr
    211.  
      vxlogview
    212.  
      W2KOption
  3.  
    Index

Name

nbauditreport — Generate and view an audit report

SYNOPSIS

nbauditreport -sdate "MM/DD/YY [HH:[MM[:SS]]]" [-edate "MM/DD/YY [HH:[MM[:SS]]]" -ctgy [ALERT | ASSET | ASSETGROUP | AUDITCFG | AUDITSVC | AZFAILURE | BPCONF | CATALOG | CERT | CONFIG | CONNECTION | DATAACCESS | HOLD | HOST | JOB | LICENSING | LOGIN | POLICY | POOL | PROTECTION_PLAN_SVC | RETENTION_LEVEL | SEC_CONFIG | SLP | STORAGESRV | STU | TOKEN | USER] -user username[:domainname] -fmt [SUMMARY | DETAIL | PARSABLE] [-notruncate] [-pagewidth NNN] [-order [DTU | DUT | TDU | TUD | UDT | UTD]]

 

On UNIX systems, the directory path to this command is /usr/openv/netbackup/bin/admincmd/

On Windows systems, the directory path to this command is install_path\NetBackup\bin\admincmd\

DESCRIPTION

The nbauditreport command lets you create and view a NetBackup audit report.

When auditing is configured in a NetBackup environment, the following user-initiated actions in NetBackup are recorded and available to view in an audit report:

  • Actions that change the NetBackup configuration. Examples are policy creation, deletion, and modification, and changing the audit settings.

  • Actions that change NetBackup run-time objects. These actions include initiating a restore job and starting or stopping the audit service.

This command only creates and displays the audit report. You must use the nbemmcmd -changesetting -AUDIT ENABLED and nbemmcmd -changesetting -AUDIT DISABLED commands to enable and disable auditing itself.

For more about auditing and audit reports, see the NetBackup Administrator's Guide, Volume I and NetBackup Security and Encryption Guide.

OPTIONS

-ctgy [ALERT | ASSET | ASSETGROUP | AUDITCFG | AUDITSVC | AZFAILURE | BPCONF | CATALOG | CERT | CONFIG | CONNECTION | DATAACCESS | HOLD | HOST | JOB | LICENSING | LOGIN | POLICY | POOL | PROTECTION_PLAN_SVC | RETENTION_LEVEL | SEC_CONFIG | SLP | STORAGESRV | STU | TOKEN | USER]

Specifies the type of information to be displayed in the audit report. The audit function records and displays information on the use-initiated actions for the pertinent area (job, pool, etc.). The following are the possible values for this option and the items that are audited for each value:

  • ALERT - failure in alert generation or failure in sending email notifications.

  • ASSET - deleting an asset, such as a vCenter server or a virtual machine, as part of the POST /asset-cleanup process in the Asset Database API.

  • ASSETGROUP - creating, modifying, or deleting an asset group as well any action on an asset group for which a user is not authorized.

  • AUDITCFG - auditing configuration changes

  • AUDITSVC - starting and stopping the NetBackup Audit service (nbaudit)

  • AZFAILURE - authorization failures

  • BPCONF - changes to the bp.conf file (UNIX only).

  • CATALOG - verifying and expiring images; and reading front-end usage data

  • CERT - certificate deployment

  • CONFIG - changes made to the configuration settings (for example SMTP server configuration) or to the excluded status codes list for alerts

  • CONNECTION - dropped host connections

  • DATAACCESS - the audit messages that are related to success and failure of access to different NetBackup operations. For NetBackup 9.1, audit messages are displayed for restore and browse images operations only.

  • HOLD - create, modify, and delete hold operations.

  • HOST - NetBackup host database-related operations

  • JOB - job changes

  • LICENSING - track any access to information that is related to licensing

  • LOGIN - logon attempts

  • POLICY - Adding, deleting, or updating policy attributes, clients, schedules, and backup selections lists.

  • POOL - disk storage pool changes

  • PROTECTION_PLAN_SVC - modifications to the protection plan

  • RETENTION_LEVEL - changes to the retention level

  • SEC_CONFIG - changes made to the security configuration settings

  • SLP - Creating, modifying, or deleting a storage lifecycle policy (SLP) when initiated through a NetBackup graphical user interface, API, or the nbstl command. Successful attempts to activate or suspend an SLP from a NetBackup graphical user interface or API are also audited and logged. Activating and suspending an SLP using the nbstlutil command are not audited.

  • STORAGESRV - storage server information

  • STU - storage unit changes

  • TOKEN - authorization tokens

  • USER - adding or deleting users

The default condition, when none of the options are specified, is to display the audit report of all categories.

-fmt [SUMMARY | DETAIL | PARSABLE]

Specifies the output format of the audit report.

  • SUMMARY is the default condition (no option used). The audit report is a summary only. It displays the audit report in columnar format using the description, user, and timestamp headings.

  • DETAIL displays a comprehensive list of auditing information. For example, when a policy is changed, this view lists the name of the attribute, the old value, and the new value.

  • PARSABLE displays the same set of information as the DETAIL report but in a parsable format. The report uses the pipe character (|) as a separator of the audit data. Use keywords available with the report (DESCRIPTION, ACTION, OLDV, NEWV, etc.) to parse the audit record.

    The parsable report contains the following fields:

    • DESCRIPTION. The details of the action that was performed. The details include the new values that are given to a modified object and the new values of all attributes for a newly created object. The details also show any deleted objects.

    • TIMESTAMP. The time that the action occurred. The time is displayed in Coordinated Universal Time (UTC) and is indicated in seconds.

    • CATEGORY. The category of user action that was performed. Categories such as POLICY may contain several sub-categories such as schedules or backup selections. Any modifications to a sub-category are listed as a modification to the primary category. The categories are as follows:

      ALERT - failure in alert generation or failure in sending email notifications.

      AUDITCFG - Auditing configuration changes

      AUDITSVC - Starting and stopping the NetBackup Audit service (nbaudit)

      AZFAILURE - Requests that fail authorization checks

      BPCONF - Changes to the bp.conf file (UNIX only)

      CATALOG - Verifying and expiring images; and reading front-end usage data

      CERT - Creating, revoking, renewing, and deploying of certificates and specific certificate failures

      CONFIG - changes made to the configuration settings (for example SMTP server configuration) or to the excluded status codes list for alerts

      DATAACCESS - The audit messages that are related to success and failure of access to different NetBackup operations. For NetBackup 9.1, audit messages are displayed for restore and browse images operations only.

      HOLD - Create, modify, and delete hold operations.

      HOST - Information that is related to NetBackup host database operations.

      JOB - Job changes such as cancelations or deletions

      LICENSING - track any access to information that is related to licensing

      LOGIN - The success and failure that is related to NetBackup Administration Console and NetBackup API logon attempts.

      POLICY - Modification to policy attributes, clients, schedules, or backup selections

      POOL - Disk storage pool changes

      PROTECTION_PLAN_SVC - modifications to the protection plan

      RETENTION_LEVEL - changes to the retention level

      SEC_CONFIG - Information that is related to changes that are made to the security configuration settings

      SLP - Creation, modification, or deletion SLP attributes or windows when they are initiated through a NetBackup graphical user interface, API, or the nbstl command.

      STORAGESRV - Storage server creation, modification, or deletion

      STU - Storage unit creation, modification, or deletion

      TOKEN - Creating, deleting, and cleanup of tokens and specific token issuing failures

      USER - Adding or deleting users

    • CONNECTION - Information about the dropped host connections.

    • ACTION. The activity that was performed. The following actions are possible for all categories: Detailed descriptions of the specific activities that are performed for each action are found in the DESCRIPTIONS and the DETAILS fields of the command output.

    • REASON. Reason that is given for the performed action if any. If the audit reason for host and host ID-to-host name mapping operations contains more than 512 characters, the reason text is truncated to 512 characters.

    • DETAILS. Detailed information on the activity that is separated into attributes (ATTR_num), each with a descriptive name followed by OLDV/NEWV (old value/new value) pair.

      Example for a policy deletion: ATTR_1: Policy Type OLDV: Standard NEWV:

-notruncate

Displays the old and new values of a changed attribute on separate lines in the details section of the report. This option is used with the -fmt DETAIL option.

-order [DTU | DUT | TDU | TUD | UDT | UTD]

Specifies the order in which the information is displayed in the parsable format of the audit report. This option can be used only with the -fmt PARSABLE option. The D, T, and U designators represent the following:

  • D - description

  • T - timestamp

  • U - user

-pagewidth NNN

Specifies the page width for the details section of the audit report. This option is used with the -fmt DETAIL option.

-sdate mm/dd/yyyy-hh:mm:ss | mm/dd-hh:mm -edate mm/dd/yyyy-hh:mm:ss | mm/dd-hh:mm

Sets the start date-time (-sdate) or the end date-time (-edate) of the audit report data that you want to view. No time indication is necessary.

If the start date is specified and the end date is not, the displayed audit data is from the specified start time to the present. If the end date is specified and the start date is not, the displayed audit data is up to the end date.

-user username[:domainname]

Indicates the name of the user for whom you want to display audit information.

EXAMPLES

Example 1 - Display all audit events that are reported from April 1, 2013 to the present.

# nbauditreport -sdate 04/01/13

USER         DESCRIPTION                                                TIMESTAMP   
Admin@entry  Schedule 'test1' was added to Policy 'test1'               04/06/13 
Admin@entry  Audit setting(s) of master server 'server1' were modified  04/06/13
Admin@entry  Audit setting(s) of master server 'server1' were modified  04/06/13 
sys@server1  The nbaudit service on master server 'server1' was started 04/06/13 
sys@server1  The nbaudit service on master server 'server1' was stopped 04/06/13 
sys@server1  The nbaudit service on master server 'server1' was started 04/06/13 

Audit records fetched: 7

Example 2 - Display a detailed audit report for when Joe modified a set of policy attributes. Because the policy was changed only one time since 6/8/13, one audit record is retrieved.

# nbauditreport -fmt DETAIL -ctgy POLICY -sdate 6/8/13

DESCRIPTION: Attributes of Policy 'pol_stugrp' were modified
USER: joe
TIMESTAMP: 06/08/2013 19:14:25
CATEGORY: POLICY
ACTION: MODIFY
DETAILS:
    ATTRIBUTE                OLD VALUE                 NEW VALUE
  1 Proxy Client
  2 Residence                                          stu_grp
  3 Collect TIR info         2                         0
  4 Checkpoint Restart       0                         1
  5 Checkpoint Interval      0                         15
  6 Data Mover Type          2                         -1
  7 Collect BMR Info         1                         0
  8 Policy Generation        1                         2

Audit records fetched: 1

The DETAILS entry shows the old value and new value of all the attributes that Joe changed.

Example 3 - Display an audit report for all hold operations that were performed since August 30, 2013.

# nbauditreport -ctgy HOLD -sdate "08/30/13 22:46:50" -fmt DETAIL 
DESCRIPTION: Hold with hold name test hold for report1 is created
USER: root@aellora.mydomain.com
TIMESTAMP: 08/30/13 22:47:56
CATEGORY: HOLD
ACTION: CREATE
REASON:
DETAILS:
    ATTRIBUTE             OLD VALUE             NEW VALUE
  1 On-hold image list                          nakul2.mydomain.co 

DESCRIPTION: Hold with hold name test hold for report1 is created
USER: root@aellora.mydomain.com
TIMESTAMP: 08/30/13 22:47:54
CATEGORY: HOLD
ACTION: CREATE
REASON: 

Audit records fetched: 2

Example 4 - Display a detailed audit report for all security operations.

# nbauditreport -ctgy SEC_CONFIG -fmt DETAIL
DESCRIPTION: Updated 'Role' 'Default VMware Administrator'
USER: secadmin@domain
TIMESTAMP: 05/02/2021 10:38:24
CATEGORY: SEC_CONFIG
ACTION: MODIFY
REASON:
DETAILS:
   ATTRIBUTE                OLD VALUE    NEW VALUE
 1 User principal                        domain:vmadmin:nt

Audit records fetched: 1