NetBackup™ NAS Administrator's Guide
- Section I. About NAS backups
- Section II. Using NAS-Data-Protection (D-NAS)
- D-NAS overview
- Pre-requisites for D-NAS configuration
- Configure D-NAS policy for NAS volumes
- Using accelerator
- Replication using D-NAS policy
- Restoring from D-NAS backups
- Troubleshooting
- Section III. Using NDMP
- Introduction to NetBackup for NDMP
- About NetBackup for NDMP
- Types of NDMP backup
- About assigning tape drives to different hosts
- Installation Notes for NetBackup for NDMP
- Configuring NDMP backup to NDMP-attached devices
- About Media and Device Management configuration
- About creating an NDMP policy
- About enabling or disabling DAR
- Configuring NDMP backup to NetBackup media servers (remote NDMP)
- Configuring NDMP DirectCopy
- Accelerator for NDMP
- Remote NDMP and disk devices
- Using the Shared Storage Option (SSO) with NetBackup for NDMP
- Backup and restore procedures
- Troubleshooting
- Using NetBackup for NDMP scripts
- Introduction to NetBackup for NDMP
About the track logs for accelerator
NetBackup accelerator uses track log to detect the new, change, and modify files in the subsequent Full and Increment backups. The track log is a binary file that you should not attempt to edit. For D-NAS policy each backup stream maintains its own track log. The number of backup streams depend on the policy attribute
.Track log location on backup host:
Windows:
Install_path\NetBackup\track\master_server\storage_server\client\policy_name\backup selection\S1\
Linux:
Install_path/netBackup/track/master_server/storage_server/client/policy_name/backup_selection/S1/
Track log location on primary server:
Windows:
Install_path\NetBackup\db\track\master_server\storage_server\client\policy_name\backup selection\S1\
Linux:
Install_path/NetBackup/db/track/master_server/storage_server/client/policy_name/backup_selection/S1/
Where S1, S2… Sn
are the number of streams.
You can manually delete track logs safely if any of the following situations occur:
You disable the
option.The backup selections are changed.
The policy is renamed.
The storage server that is used to perform the backup is changed.
The primary server that is used to control the backups is changed.