ChiXC
3 Silver

Which CLI command can be used to report Networker job status for each client?

Jump to solution

I would like to monitor the job results for individual clients covered by Policy/Workflow/Action with a script. The CLI command ‘jobquery’ can be used to monitor the results of workflows. But which command can be used to report the status of individual actions in a workflow? In addition, we found multiple cases when the protection group of a policy/workflow/action contains multiple clients, for example we use a NSR rule to include all the VMs in a VMware folder in a protection group, a backup failure of a VM might not trigger the failure of the backup action, and the status of the workflow was also successful. That means you will not notice that the backup for a VM failed if you just check at the workflow and action level. I need a way to check job status at the client level.

DPA does report job status at client level. But the data sources used by DPA have their own issues about reporting multiple instances of the same job or missing sub-jobs.

0 Kudos
1 Solution

Accepted Solutions
ChiXC
3 Silver

Re: Which CLI command can be used to report Networker job status for each client?

Jump to solution

After reading bingo.1’s comments, I realized that there is no single CLI command that I can use to check job status at client level. I finally got some spare time to look around for the log file option per bingo.1’s suggestion. It seems the Networker log file \EMC NetWorker\nsr\logs\policy_notifications.log provides some detailed status information about each scheduled policy/workflow/action. But be careful, you need to check not only the “Action status:”, but also the detailed “---Failed backups---“, “--- Failed Clone Save Sets ---“ and other details. For example, I have seen a case with a successful VM backup action for a VM folder, but the backup of one VM failed while the backups for all other VMs succeed.

Although the syntax of this log file is little bit messy, it is not difficult to write a script to extract only failed jobs at client level for a specific time period. Such a script can be run, for example, by a daily scheduled job to send out an alert email when there is any failed client backup or clone job during the previous day.

I will mark this reply as the solution in order to close this threat.

 

View solution in original post

0 Kudos
2 Replies
bingo.1
4 Ruthenium

Re: Which CLI command can be used to report Networker job status for each client?

Jump to solution

IMHO it is not possible to check for action on the client level.

I can only suggest that you write a script which will investigate the logs for appropriate messages.

The other possibility is that you compare statistical information. For example you could compare the last backups with the previous ones and find out if there is one missing.

Not an easy job to be done ...

 

0 Kudos
ChiXC
3 Silver

Re: Which CLI command can be used to report Networker job status for each client?

Jump to solution

After reading bingo.1’s comments, I realized that there is no single CLI command that I can use to check job status at client level. I finally got some spare time to look around for the log file option per bingo.1’s suggestion. It seems the Networker log file \EMC NetWorker\nsr\logs\policy_notifications.log provides some detailed status information about each scheduled policy/workflow/action. But be careful, you need to check not only the “Action status:”, but also the detailed “---Failed backups---“, “--- Failed Clone Save Sets ---“ and other details. For example, I have seen a case with a successful VM backup action for a VM folder, but the backup of one VM failed while the backups for all other VMs succeed.

Although the syntax of this log file is little bit messy, it is not difficult to write a script to extract only failed jobs at client level for a specific time period. Such a script can be run, for example, by a daily scheduled job to send out an alert email when there is any failed client backup or clone job during the previous day.

I will mark this reply as the solution in order to close this threat.

 

View solution in original post

0 Kudos