The backup-archive client has an option, SKIPNTSECURITYCRC [NO | YES] with
NO being the default.

Reference:

https://www.ibm.com/support/knowledgecenter/SSEQVQ_8.1.6/client/r_opt_skipntsecuritycrc.html

When this option is set to YES, security changes are not used to determine
whether the file is changed. That is, if the ONLY change to the file is to
the security attributes, then the file is not considered changed (but if
the file is backed up due to other changes, the security attributes are
included in the backup).

Be careful setting this option, though:

1. Practically speaking, this is the kind of change you make once. That is,
do not toggle this option back and forth between YES and NO. Of course you
can certainly do that, but you will defeat the purpose of changing the
value to begin with. It is not a "one-time" skip of security changes. It is
a "lifestyle" for your backups. :-)

2. Files that undergo ONLY security changes are not backed up during
incremental backup. Consider this scenario:

- Day 1: File is backed up (for reasons other than security changes)

- Day 2: Security is changed on the file. File is not backed up because no
other changes occurred.

- Day 3. Security is changed on the file. File is not backed up because no
other changes occurred.

- Day 4. User wants to revert the most recent (Day 3) security changes, and
asks you to restore the file with the security changes from day 2. That
will not be possible if you configure SKIPNTSECURITYCRC YES. But you can
revert to the Day 1 backup, assuming your copygroup retention settings have
not caused the older backup to expire.


2. If you later decide to put this option back to its default
(SKIPNTSECURITYCRC NO) then you might see a one-time very big backup,
because at that time, any files whose change is only to security, will be
backed up, resulting possibly in a backup workload that is larger than
usual.

In sum: Best practice to ensure most complete incremental backup is to
allow the data to be backed up, even if only the security has changed.
Proceed with caution, thinking about future ramifications of using this
option.

Best regards,

Andy

____________________________________________________________________________

Andrew Raibeck | IBM Spectrum Protect Level 3 | stor...@us.ibm.com

"ADSM: Dist Stor Manager" <ADSM-L@VM.MARIST.EDU> wrote on 2018-10-30
14:57:47:

> From: Robert Talda <r...@cornell.edu>
> To: ADSM-L@VM.MARIST.EDU
> Date: 2018-10-30 14:58
> Subject: Re: Windows ARL change
> Sent by: "ADSM: Dist Stor Manager" <ADSM-L@VM.MARIST.EDU>
>
> Harold:
>   Have same issue - often several times a year as departments here
> administer their own servers - and no magic bullet.  Probably
> doesn’t help other than “misery loves company”
>
>   Keeping fingers crossed someone smarter than I has a workaround,
> Bob
>
> Robert Talda
> EZ-Backup Systems Engineer
> Cornell University
> +1 607-255-8280
> r...@cornell.edu
>
>
> > On Oct 30, 2018, at 11:20 AM, Vandeventer, Harold [OITS]
> <harold.vandeven...@ks.gov> wrote:
> >
> > Our "server security" folks are making several changes in Windows
> Access Rights at the top of a folder structure which then cascades
> all the way down to all files.  This is being done on several nodes.
> >
> > Is there a way to avoid Spectrum Protect from backing up all those
> files, most of which haven't changed in content other than the ARL
property?
> >
> > We charge back to agencies based on the bytes in auditocc table.
> The ARL change results in a double up of the cost.
> >
> > The nodes are running various 7.x versions.
> >
> > Thanks for any guidance you might have.
> >
>

Reply via email to