To determine whether a file has had the encryptasm applied (or any other asm type) you can use the nsrinfo command. The aes display has been there since NetWorker 7.5.
An example for a specific file is below. You could do the -n namespace and display all the files (or grep for asm_type=aes)
LOL! I thought I remembered a flag being set somewhere that I could check. I will remove the passphrase and try to do a restore and see what's in the file!
Indeed, there is a flag with scanner and restore to specify passphrase, but to my knowledge I haven't seen any flag with mminfo to see if backup set is encrypted or not. I would argue that is something that EMC would need to add for sure as that checking out this with mminfo would be piece of cake.
The nsrinfo utility utilizes indexdb which has the information on each file in the saveset. The mminfo utility uses mmdb which does not have the granularity of the file within the saveset.
Using mminfo would have resulted in reporting that a saveset contains an encrypted file but not the reporting of the individual file. The use of nsrinfo allowed for reporting of an individual file within a saveset.
rochem1
23 Posts
0
October 11th, 2012 10:00
To determine whether a file has had the encryptasm applied (or any other asm type) you can use the nsrinfo command. The aes display has been there since NetWorker 7.5.
An example for a specific file is below. You could do the -n namespace and display all the files (or grep for asm_type=aes)
/usr/sbin/nsrinfo -N /clientfilenamethatshouldbeencrypted client.example.com
scanning client `client.example.com' for all savetimes from the backup namespace
/clientfilenamethatshouldbeencrypted , date=1239408074 Fri Apr 10 17:01:14 2009, asm_type= aes
ble1
4 Operator
•
14.4K Posts
0
October 5th, 2012 16:00
2 approaches:
- check dedupe ratio on save set. If it sucks, aes encryption is on
- do restore and check content of files - if filled with zeros, it works
Sam_Powell
1 Rookie
•
17 Posts
0
October 10th, 2012 12:00
LOL! I thought I remembered a flag being set somewhere that I could check. I will remove the passphrase and try to do a restore and see what's in the file!
ble1
4 Operator
•
14.4K Posts
0
October 11th, 2012 09:00
Indeed, there is a flag with scanner and restore to specify passphrase, but to my knowledge I haven't seen any flag with mminfo to see if backup set is encrypted or not. I would argue that is something that EMC would need to add for sure as that checking out this with mminfo would be piece of cake.
Sam_Powell
1 Rookie
•
17 Posts
0
October 11th, 2012 12:00
Awesome! That got me almost all the way there! Maybe it's just the difference between Unix and windows, but I needed to add a -v to the command.
C:\Users\ITBACKUP>nsrinfo -v -N "R:\xxxx\DEPARTMENTS\I T\SPOWELL\Backup_Test_File_2012_10_10.txt" homedata
scanning client `homedata' for all savetimes from the backup namespace
WIN ASDF v2 file `R:\xxxx\DEPARTMENTS\I T\SPOWELL\Backup_Test_File_2012_10_10.txt', NSR size=812, date=1349942424 10/11/2012 1:00:24 AM, asm-type= aes, file size=66
1 objects found
For completeness sake, here's the output with a capital V. It doesn't list the asm-type...
C:\Users\ITBACKUP>nsrinfo -V -N "R:\xxxx\DEPARTMENTS\I T\SPOWELL\Backup_Test_File_2012_10_10.txt" homedata
scanning client `homedata' for all savetimes from the backup namespace
R:\xxxx\DEPARTMENTS\I T\SPOWELL\Backup_Test_File_2012_10_10.txt, size=812, off=3671214208, app=backup(1), date=1349942424 10/11/2012 1:00:24 AM
1 objects found
Thanks a ton! I knew there was a flag somewhere. Odd that it's not available from mminfo though...
rochem1
23 Posts
1
October 11th, 2012 13:00
The nsrinfo utility utilizes indexdb which has the information on each file in the saveset. The mminfo utility uses mmdb which does not have the granularity of the file within the saveset.
Using mminfo would have resulted in reporting that a saveset contains an encrypted file but not the reporting of the individual file. The use of nsrinfo allowed for reporting of an individual file within a saveset.
ble1
4 Operator
•
14.4K Posts
0
October 11th, 2012 14:00
Indeed, makes sense.