NetBackup命令详解:NBU日常操作与配置

需积分: 42 7 下载量 106 浏览量 更新于2024-07-24 收藏 558KB PDF 举报
"NBU基本操作命令主要涉及NetBackup系统的维护和管理,包括查看和配置命令,例如bpps用于监控进程,bpconfig用于修改或显示全局配置属性。这些命令对于理解NetBackup服务的状态和优化其性能至关重要。" NetBackup,全称Symantec NetBackup,是一款广泛使用的数据保护解决方案,它提供了企业级的数据备份和恢复功能。在NBU系统中,了解和掌握一些基础的命令行操作对于日常维护和问题排查十分必要。 1. **bpps** 命令: `bpps` 是用来列出系统上运行的与NetBackup相关的进程及其统计信息。通过添加 `-a` 参数,可以包含介质管理器进程,而 `-x` 参数则进一步包含介质管理器进程和其他共享进程,如 `pbx_exchange`,这对于监控NetBackup服务的状态和性能非常有用。 2. **bpconfig** 命令: `bpconfig` 用于查看或修改NetBackup的全局配置属性,这些属性对所有策略和客户端操作都有影响。你可以使用这个命令来设置或查看NetBackup管理员的电子邮件地址、目录库清理时间间隔、映像数据库清理间隔等。例如: - `-M` 参数指定全局配置属性所在的主服务器。 - `-U` 参数可以用于显示特定类型的用户列表。 - `-cleanup_inthours` 设置不进行目录库清理的最短时间段,默认为12小时。 - `-cd` 参数用于设置映像数据库的压缩间隔,例如`bpconfig-cd604800`表示设置为7天。 - `-to` 参数可以设置介质装入的超时时间,如`bpconfig-to1800`设置为1800秒。 3. **bpgetconfig** 命令: `bpgetconfig` 是一个辅助工具,用于获取NetBackup的配置信息。它可以作为一个独立的程序来运行,帮助管理员查询特定的配置设置。 除了这些命令,NetBackup还提供了许多其他的命令,如`bprestore`用于恢复数据,`bpdbm`用于数据库管理,`bptm`用于跟踪管理等。理解并熟练运用这些命令,可以有效地管理和维护NetBackup环境,确保数据保护流程的顺畅进行。在实际操作中,应参考NetBackup的官方文档,如《NetBackup管理指南》,以获取更详细的用法和选项说明。
2019-02-13 上传
Legal Notice Copyright © 2017 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are trademarks or registered trademarks of Veritas Technologies LLC or its affiliates in the U.S. and other countries. Other names may be trademarks of their respective owners. This product may contain third party software for which Veritas is required to provide attribution to the third party (“Third Party Programs”). Some of the Third Party Programs are available under open source or free software licenses. The License Agreement accompanying the Software does not alter any rights or obligations you may have under those open source or free software licenses. Please see the Third Party Legal Notice Appendix to this Documentation or TPIP ReadMe File accompanying this product for more information on the Third Party Programs. The product described in this document is distributed under licenses restricting its use, copying, distribution, and decompilation/reverse engineering. No part of this document may be reproduced in any form by any means without prior written authorization of Veritas Technologies LLC and its licensors, if any. THE DOCUMENTATION IS PROVIDED "AS IS" AND ALL EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON-INFRINGEMENT, ARE DISCLAIMED, EXCEPT TO THE EXTENT THAT SUCH DISCLAIMERS ARE HELD TO BE LEGALLY INVALID. VERITAS TECHNOLOGIES LLC SHALL NOT BE LIABLE FOR INCIDENTAL OR CONSEQUENTIAL DAMAGES IN CONNECTION WITH THE FURNISHING, PERFORMANCE, OR USE OF THIS DOCUMENTATION. THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS SUBJECT TO CHANGE WITHOUT NOTICE. The Licensed Software and Documentation are deemed to be commercial computer software as defined in FAR 12.212 and subject to restricted rights as defined in FAR Section 52.227-19 "Commercial Computer Software - Restricted Rights" and DFARS 227.7202, et seq. "Commercial Computer Software and Commercial Computer Software Documentation," as applicable, and any successor regulations, whether delivered by Veritas as on premises or hosted services. Any use, modification, reproduction release, performance, display or disclosure of the Licensed Software and Documentation by the U.S. Government shall be solely in accordance with the terms of this Agreement.