Andy, et al:
  I should have mentioned this - this is exactly the strategy we are pursuing: 
moving backups of large Windows filesystems to container storage pools and 
enabling client-side deduplication.  SP client will be working hard - but 
little or no data will be transferred to the server.

  Do we get any credit for thinking of this ourselves in advance?

Bob

Robert Talda
EZ-Backup Systems Engineer
Cornell University
+1 607-255-8280
r...@cornell.edu


> On Nov 13, 2018, at 7:59 AM, Andrew Raibeck <stor...@us.ibm.com> wrote:
> 
> Yes, technically speaking, it is possible, but is certainly not trivial. If
> this is a requirement please consider opening an RFE for this.
> 
> Have you looked at deduplication? Those would certainly mitigate the impact
> of security-only changes.
> 
> Best regards,
> 
> Andy
> 
> ____________________________________________________________________________
> 
> Andrew Raibeck | IBM Spectrum Protect Level 3 | stor...@us.ibm.com
> 
> "ADSM: Dist Stor Manager" <ADSM-L@VM.MARIST.EDU> wrote on 2018-11-13
> 05:16:25:
> 
>> From: Hans Christian Riksheim <bull...@gmail.com>
>> To: ADSM-L@VM.MARIST.EDU
>> Date: 2018-11-13 07:30
>> Subject: Re: Windows ARL change
>> Sent by: "ADSM: Dist Stor Manager" <ADSM-L@VM.MARIST.EDU>
>> 
>> Is it technically possible to develop a client that extracts the ACLs
>> during backup and store these as separate metadata? We are having the
> same
>> challenge and who knows how much unnecessary backup data our customers
> are
>> paying for.
>> 
>> Hans Chr.
>> 
>> On Tue, Nov 6, 2018 at 7:25 PM Andrew Raibeck <stor...@us.ibm.com> wrote:
>> 
>>> Hi Bob,
>>> 
>>> If SKIPNTPERMISSIONS YES is in effect, then SKIPNTSECURITYCRC might be
>>> moot, but yes, you have the idea.
>>> 
>>> I would agree that setting SKIPNTSECURITYCRC YES and using the default
>>> SKIPNTPERMISSIONS value can present a challenge since you cannot know
> which
>>> files are restored with the latest permissions.
>>> 
>>> If security permissions are important to the organization, then best to
>>> just use the default values and back them up. If the organization
> chooses
>>> to skip the permissions during the regular incremental backup, then
> best be
>>> sure an alternate permissions backup and recovery plan is in place.
> Example
>>> of a follow-on complication: What if someone does a restore, but
> forgets to
>>> apply the separate procedure to put the correct permissions back?
>>> 
>>> For the general usage case, I can only repeat what I said earlier (lest
>>> someone else coming into the middle of this discussion misses it):
> Best
>>> practice to ensure the most complete incremental backup is to allow the
>>> data to be backed up, even if only the security has changed. Before
> doing
>>> otherwise, proceed with caution, thinking about future ramifications of
>>> using non-default values for these options.
>>> 
>>> Regards,
>>> 
>>> Andy
>>> 
>>> 
>>> 
> ____________________________________________________________________________
> 
>>> 
>>> Andrew Raibeck | IBM Spectrum Protect Level 3 | stor...@us.ibm.com
>>> 
>>> "ADSM: Dist Stor Manager" <ADSM-L@VM.MARIST.EDU> wrote on 2018-11-06
>>> 11:13:21:
>>> 
>>>> From: Robert Talda <r...@cornell.edu>
>>>> To: ADSM-L@VM.MARIST.EDU
>>>> Date: 2018-11-06 11:19
>>>> Subject: Re: Windows ARL change
>>>> Sent by: "ADSM: Dist Stor Manager" <ADSM-L@VM.MARIST.EDU>
>>>> 
>>>> Andy, et al:
>>>>  Shared the meat of this discussion with our end users.  A question
>>>> came up about restores.
>>>> 
>>>> Scenario:  Large Windows File Server on which the SP client is
>>>> configured with the SKIPNTSECURITYCRC is set to YES.
>>>> 
>>>> End of academic year arrives in June with the usual turnover in
>>>> faculty and grad students, requiring a major permissions change that
>>>> impacts most of the files on the server.
>>>> However, the backups aren’t impacted because the SKIPNTSECURITYCRC
>>>> is set.  So the only files backed up with the new security are those
>>>> that are new or those with content changes.
>>>> This is an annual event
>>>> 
>>>> Middle of November, file server melts down and all the files have to
>>>> be restored.
>>>> 
>>>> Because new backup of copies were NOT made when security changes
>>>> were made, won’t the files be restored with the permissions as of
>>>> the time of backup?
>>>> 
>>>> I believe the answer is “YES” - which results in a potential mess
>>>> for the end users.  Consider the case of a Word document created by
>>>> a postdoc 3 years ago that hasn’t been modified since but is still
>>>> used on an on-going basis by one or more classes.  The postdoc left
>>>> 2 years ago, so the file permissions on the file server were updated
>>>> accordingly - but no new backup copy created. In particular, a new
>>>> owner was assigned.   But when the file is restored, it is restored
>>>> with the permissions that have the postdoc as the owner.
>>>> 
>>>> If that is so, then the end users don’t see much of a win from the
>>>> SKIPNTSECURITYCRC - while it saves a backup copy, it introduces the
>>>> potential for a lot more work finding and fixing all the outdated
>>> permissions.
>>>> 
>>>> Now, if the SKIPNTPERMISSIONS option was also enabled, then this
>>>> issue goes away, because end users have already accepted that upon
>>>> restore, a permissions  setting has to occur.
>>>> 
>>>> So, in our environment, it appears that settings should be either
>>>> - SKIPNTPERMISSIONS and SKIPNTSECURITYCRC enabled; OR
>>>> - SKIPNTPERMISSIONS and SKIPNTSECURITYCRC disabled
>>>> 
>>>> Am I on the right track?
>>>> 
>>>> Bob
>>>> 
>>>> Robert Talda
>>>> EZ-Backup Systems Engineer
>>>> Cornell University
>>>> +1 607-255-8280
>>>> r...@cornell.edu
>>>> 
>>>> 
>>>>> On Nov 1, 2018, at 10:39 AM, Andrew Raibeck <stor...@us.ibm.com>
>>> wrote:
>>>>> 
>>>>> Hi Bob,
>>>>> 
>>>>>> Upon restore, user must rebuild security permissions.
>>>>> 
>>>>> Are you perhaps thinking of the SKIPNTPERMISSIONS option, which
> forgoes
>>>>> backup of any permissions? In that case, for sure you have to
> rebuild
>>>>> security permissions after the restore. Outside of a user-specific
> edge
>>>>> case, do not specify that option, just use the implicit default
> (which
>>>>> happens to be NO).
>>>>> 
>>>>> SKIPNTSECURITYCRC is not the same, as it merely removes the
> permissions
>>>>> from the criteria that go into determining whether files have
> changed.
>>>>> However, when files are backed up, permissions are included with
> the
>>>>> backup, provided you did not set SKIPNTPERMISSIONS YES.
>>>>> 
>>>>> In the scenario I described previously, if you restore the backup
> taken
>>> on
>>>>> Day 1, then the permissions in effect at the time of the backup are
>>>>> restored.
>>>>> 
>>>>> Best regards,
>>>>> 
>>>>> Andy
>>>>> 
>>>>> 
>>> 
>>> 
> ____________________________________________________________________________
> 
>>> 
>>>>> 
>>>>> Andrew Raibeck | IBM Spectrum Protect Level 3 | stor...@us.ibm.com
>>>>> 
>>>>> "ADSM: Dist Stor Manager" <ADSM-L@VM.MARIST.EDU> wrote on
> 2018-11-01
>>>>> 09:39:55:
>>>>> 
>>>>>> From: Robert Talda <r...@cornell.edu>
>>>>>> To: ADSM-L@VM.MARIST.EDU
>>>>>> Date: 2018-11-01 09:41
>>>>>> Subject: Re: Windows ARL change
>>>>>> Sent by: "ADSM: Dist Stor Manager" <ADSM-L@VM.MARIST.EDU>
>>>>>> 
>>>>>> Andy:
>>>>>> As always, thanks for chiming in.
>>>>>> 
>>>>>> I was aware of this option but was hesitant to recommend it
>>>>>> because of a side effect that you didn’t list:
>>>>>> 
>>>>>> Upon restore, user must rebuild security permissions.
>>>>>> 
>>>>>> So, if the fileserver/NAS had a strict permissions scheme that
> was
>>>>>> easy to apply after a restore, then this option is viable.
>>>>>> 
>>>>>>  This is what bedevils us here - a lot of our units here at
>>>>>> Cornell have file servers and NASs with complex permissions, and
> so
>>>>>> the issue comes down to what is the least amount of pain: bumps in
>>>>>> cost due to occasional big backups (we are a charge-back service)
> or
>>>>>> trying to figure out a way to save permissions outside of Spectrum
>>>>>> Protect that can be used to rebuild those permissions in a
> disaster
>>>>> scenario.
>>>>>> 
>>>>>> Needless to say, all our customers have gone the big backup
> route.
>>>>>> Probably attribute additional charge to usual "Cost of working at
> a
>>>>>> university” account
>>>>>> 
>>>>>> Bob
>>>>>> 
>>>>>> Robert Talda
>>>>>> EZ-Backup Systems Engineer
>>>>>> Cornell University
>>>>>> +1 607-255-8280
>>>>>> r...@cornell.edu
>>>>>> 
>>>>>> 
>>>>>>> On Oct 31, 2018, at 8:46 AM, Andrew Raibeck <stor...@us.ibm.com>
>>> wrote:
>>>>>>> 
>>>>>>> The backup-archive client has an option, SKIPNTSECURITYCRC [NO |
> YES]
>>>>> with
>>>>>>> NO being the default.
>>>>>>> 
>>>>>>> Reference:
>>>>>>> 
>>>>>>> https://www.ibm.com/support/knowledgecenter/SSEQVQ_8.1.6/client/
>>>>>> r_opt_skipntsecuritycrc.html
>>>>>>> 
>>>>>>> When this option is set to YES, security changes are not used to
>>>>> determine
>>>>>>> whether the file is changed. That is, if the ONLY change to the
> file
>>> is
>>>>> to
>>>>>>> the security attributes, then the file is not considered changed
> (but
>>>>> if
>>>>>>> the file is backed up due to other changes, the security
> attributes
>>> are
>>>>>>> included in the backup).
>>>>>>> 
>>>>>>> Be careful setting this option, though:
>>>>>>> 
>>>>>>> 1. Practically speaking, this is the kind of change you make
> once.
>>> That
>>>>> is,
>>>>>>> do not toggle this option back and forth between YES and NO. Of
>>> course
>>>>> you
>>>>>>> can certainly do that, but you will defeat the purpose of
> changing
>>> the
>>>>>>> value to begin with. It is not a "one-time" skip of security
> changes.
>>>>> It is
>>>>>>> a "lifestyle" for your backups. :-)
>>>>>>> 
>>>>>>> 2. Files that undergo ONLY security changes are not backed up
> during
>>>>>>> incremental backup. Consider this scenario:
>>>>>>> 
>>>>>>> - Day 1: File is backed up (for reasons other than security
> changes)
>>>>>>> 
>>>>>>> - Day 2: Security is changed on the file. File is not backed up
>>> because
>>>>> no
>>>>>>> other changes occurred.
>>>>>>> 
>>>>>>> - Day 3. Security is changed on the file. File is not backed up
>>> because
>>>>> no
>>>>>>> other changes occurred.
>>>>>>> 
>>>>>>> - Day 4. User wants to revert the most recent (Day 3) security
>>> changes,
>>>>> and
>>>>>>> asks you to restore the file with the security changes from day
> 2.
>>> That
>>>>>>> will not be possible if you configure SKIPNTSECURITYCRC YES. But
> you
>>>>> can
>>>>>>> revert to the Day 1 backup, assuming your copygroup retention
>>> settings
>>>>> have
>>>>>>> not caused the older backup to expire.
>>>>>>> 
>>>>>>> 
>>>>>>> 2. If you later decide to put this option back to its default
>>>>>>> (SKIPNTSECURITYCRC NO) then you might see a one-time very big
> backup,
>>>>>>> because at that time, any files whose change is only to security,
>>> will
>>>>> be
>>>>>>> backed up, resulting possibly in a backup workload that is larger
>>> than
>>>>>>> usual.
>>>>>>> 
>>>>>>> In sum: Best practice to ensure most complete incremental backup
> is
>>> to
>>>>>>> allow the data to be backed up, even if only the security has
>>> changed.
>>>>>>> Proceed with caution, thinking about future ramifications of
> using
>>> this
>>>>>>> option.
>>>>>>> 
>>>>>>> Best regards,
>>>>>>> 
>>>>>>> Andy
>>>>>>> 
>>>>>>> 
>>>>> 
>>> 
>>> 
> ____________________________________________________________________________
> 
>>> 
>>>>> 
>>>>>>> 
>>>>>>> Andrew Raibeck | IBM Spectrum Protect Level 3 |
> stor...@us.ibm.com
>>>>>>> 
>>>>>>> "ADSM: Dist Stor Manager" <ADSM-L@VM.MARIST.EDU> wrote on
> 2018-10-30
>>>>>>> 14:57:47:
>>>>>>> 
>>>>>>>> From: Robert Talda <r...@cornell.edu>
>>>>>>>> To: ADSM-L@VM.MARIST.EDU
>>>>>>>> Date: 2018-10-30 14:58
>>>>>>>> Subject: Re: Windows ARL change
>>>>>>>> Sent by: "ADSM: Dist Stor Manager" <ADSM-L@VM.MARIST.EDU>
>>>>>>>> 
>>>>>>>> Harold:
>>>>>>>> Have same issue - often several times a year as departments here
>>>>>>>> administer their own servers - and no magic bullet.  Probably
>>>>>>>> doesn’t help other than “misery loves company”
>>>>>>>> 
>>>>>>>> Keeping fingers crossed someone smarter than I has a workaround,
>>>>>>>> Bob
>>>>>>>> 
>>>>>>>> Robert Talda
>>>>>>>> EZ-Backup Systems Engineer
>>>>>>>> Cornell University
>>>>>>>> +1 607-255-8280
>>>>>>>> r...@cornell.edu
>>>>>>>> 
>>>>>>>> 
>>>>>>>>> On Oct 30, 2018, at 11:20 AM, Vandeventer, Harold [OITS]
>>>>>>>> <harold.vandeven...@ks.gov> wrote:
>>>>>>>>> 
>>>>>>>>> Our "server security" folks are making several changes in
> Windows
>>>>>>>> Access Rights at the top of a folder structure which then
> cascades
>>>>>>>> all the way down to all files.  This is being done on several
> nodes.
>>>>>>>>> 
>>>>>>>>> Is there a way to avoid Spectrum Protect from backing up all
> those
>>>>>>>> files, most of which haven't changed in content other than the
> ARL
>>>>>>> property?
>>>>>>>>> 
>>>>>>>>> We charge back to agencies based on the bytes in auditocc
> table.
>>>>>>>> The ARL change results in a double up of the cost.
>>>>>>>>> 
>>>>>>>>> The nodes are running various 7.x versions.
>>>>>>>>> 
>>>>>>>>> Thanks for any guidance you might have.
>>>>>>>>> 
>>>>>>>> 
>>>>>> 
>>>> 
>>> 
>> 

Reply via email to