Am 02.10.2015 um 11:41 schrieb Georg Altmann:
> 
> 
> Am 01.10.2015 um 19:58 schrieb John Drescher:
>>> Yes, I know this, but AFAIK this does not apply in a disaster recovery
>>> situation where you have to scan volumes with bscan.
>>> In this situation I figure it would be very useful to find the last
>>> backups of the catalog and the bacula server to feed them to bscan.
>>> With large volumes bscan will sit there for a long time, scanning all
>>> volumes.
>>>
>>
>> Put the catalog backup (and bacula configs) in its own pool so its
>> easy to find. Then restore the catalog (and configs) with bscan and
>> then you should not need to bscan individual volumes.
> 
> Yes that would be a solution.
> 
> I did a disaster recovery exercise yesterday. After setting up the
> machine and getting bacula up and running with the file storage I found
> it easy enough to scan the last 10 backups or so to find a recent catalog.
> I know that my catalog backups are relatively small, i.e. < 1 GB. So I
> can avoid scanning the large ones and find the catalog backup quickly.
> This is what works for me:
> 
> % cd /vol/bacula
> % ls  | tail -n 10 | while read f ; do if [ $(du -b "$f" | cut -f1) -le
> $((1024*1024*1024)) ] ; then bscan "/vol/bacula/$f"; fi ; done
> %
> 
> Here /vol/bacula is where the file storage is mounted. tail -n 10 takes
> the 10 latest files by date. The if with du tests for file sizes smaller
> than 1 GB. bscan needs a full path to identify the device. To actually
> add catalog entries use bscan -s.
> 
> So unless one has a very large amount of backups/volumes this should be
> practical enough without the need to put catalog backups in a separate
> pool or putting job names in volume labels. I will stick with plain
> numbered volume labels. End of story. Just in case: This approach
> obviously does not work with tape storage.
> 
> Thanks for all the input!
> 
> 
> Regards,
> Georg
> 

-- 
PGP-Key: 0x1E320E65
D150 7783 A0D1 7507 1266  C5B3 BBF1 9C42 1E32 0E65

I don't like the idea of secret agencies to analyse and archive
personal communication. GnuPG is available as open source, free as as in
freedom, as a countermeasure. I use http://www.enigmail.net/ for Mozilla
Thunderbird. If you can, please use a frontend of your choice to send me
encrypted e-mail. See http://www.gnupg.org/ for an overview.

Attachment: signature.asc
Description: OpenPGP digital signature

------------------------------------------------------------------------------
_______________________________________________
Bacula-devel mailing list
Bacula-devel@lists.sourceforge.net
https://lists.sourceforge.net/lists/listinfo/bacula-devel

Reply via email to