OceanProtect Backup Storage

NetBackup OST Compatibility Testing Report

1. Overview

1.1 Objective

The objective of this testing report is to test the compatibility between OceanProtect backup storage and NetBackup OST plugin(hereinafter referred to as ‘NBU OST’).

1.2 Scenario

The test covers different backup and restoration scenarios and workloads, including basic functions, target A.I.R, accelerator, granular recovery, WORM, optimized deduplication, optimized synthesis, etc.

2. Environment Configuration

2.1Networking Diagrams for Verification

Networking diagram for verifying functions

The Windows and Linux hosts are deployed on the ESXI Server.

2.2 Hardware and Software Configurations

2.2.1 OceanProtect X8000 Configuration

Table 2-1 Single OceanProtect X8000 configuration (SSD)

Name

Description

Quantity

OceanProtect engine

OceanProtect X8000 with two controllers

2

10GE front-end interface module

4 x 10 Gbit/s SmartIO interface module

4

SAS SSD

3.84 TB SAS SSD

16

2.2.2 Hardware Configuration

Table 2-2 Hardware configuration

Name

Description

Quantity

Function

VMware ESXi server

x86 server

  • CPU: 2 x Gold 6130
  • Memory: 256 GB
  • Main storage disk: 4 x 960 GB SSDs
  • Backup service network: 2 x 10GE optical ports

1

Install testing Windows and Linux hosts

Backup, restoration, and remote replication of VMware VMs

Hyper-V server

x86 server

  • CPU: 2 x Gold 6130
  • Memory: 256 GB
  • Main storage disk: 4 x 960 GB SSDs
  • Backup service network: 2 x 10GE optical ports

1

Install testing Windows and Linux hosts

Backup, restoration, and remote replication of Hyper-V VMs

10GE switch

CE6800

2

10GE switch on the backup & replication service plane

Management switch

GE switch

1

Network switch on the management plane

2.2.3 Test Software and Tools

Table 2-3 Test software and tools

Software

Description

Quantity

VMware ESXi 7.0

VMware virtualization platform

1

vCenter 7.0

VMware virtualization management software

1

NetBackup 10.3

NetBackup data management software

1

Red Hat 8.4

Linux OS

1

SSH client software

SSH terminal connection tool.

1

3. Test Cases

3.1 Basic Functions

3.1.1 Creation of Storage Server, Diskpool and STU

Objective

To verify that the backup system can create storage server, disk pool and STU, and can backup up with policy name same as client name

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Create a storage server, disk pool, storage unit, and policy. The policy name is the same as the client name.
  2. Insert the 1 GB file testfile_1 and perform full backup.
  3. Restore data and verify data consistency in testfile_1.
  4. Insert the 1 GB file testfile_2 and perform differential incremental backup.
  5. Restore the data and verify the data consistency of testfile_2.
  6. Modify the 1 GB file testfile_2 and perform permanent incremental backup.
  7. Restore the data and verify the data consistency of testfile_2.

Expected Result

  1. In step 3, the full backup and the restoration succeeds.
  2. In step 5, the differential incremental backup and restoration succeeds.
  3. In step 6, the permanent incremental backup and restoration succeeds.

Test Result

1. Create a storage server, disk pool, storage unit, and policy. The policy name is the same as the client name.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b3775724dae8768680cfcc/65b25ef539cc4839ecd62e42/B682FE1E2B0AB6CB75202AD696FA3EF3D6AC2CD94A3BA5F8F6BE0C5EC0745328


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b3775724dae8768680cfcc/65b25ef539cc4839ecd62e42/8770C074F507B04184EC53B83F16FBBDBA82A28C1D8F8F1B19DEA0EA2799B996

2. Insert the 1 GB file testfile_1 and perform full backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b3775724dae8768680cfcc/65b25ef539cc4839ecd62e42/D7F6AD3423B7425EC6120935F704A38B6797AD411102355425F42914045CC399

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b3775724dae8768680cfcc/65b25ef539cc4839ecd62e42/D7922C81CA90BE022271E5DE41F49FBD2B6BAB9D316D1DD6024D3952EC60EFCC

3. Restore data and verify data consistency in testfile_1.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b3775724dae8768680cfcc/65b25ef539cc4839ecd62e42/F01766D77BABE7E7043A797F4A79F6E397D0C97FEFC233D18AE70131CCE2DE35

4. Insert the 1 GB file testfile_2 and perform differential incremental backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b3775724dae8768680cfcc/65b25ef539cc4839ecd62e42/ABCB021D5628384DB691331E9FACCD7F2A6FDF3D72B4105B57E80660ABC2AE5E

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b3775724dae8768680cfcc/65b25ef539cc4839ecd62e42/9B3F391D1AB0E5B0566093A4A2D3FA56DFB86F8AD6F535146D3FC53E0ABB40F6

5. Restore the data and verify the data consistency of testfile_2.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b3775724dae8768680cfcc/65b25ef539cc4839ecd62e42/65C23A3EBC881A1C2181C937331B7940A215B01CD41A682ED33E032D8CCFB1EA

6. Modify the 1 GB file testfile_2 and perform permanent incremental backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b3775724dae8768680cfcc/65b25ef539cc4839ecd62e42/277609AF7BB6F596203EB0550AE8A8FE76F8207E8EA61670AEEA5D86C1AE1A17

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b3775724dae8768680cfcc/65b25ef539cc4839ecd62e42/1713E802382B73BADF7CCC7F39EC34316ECCA29E80EC0F10E06E37A4B8C1F86C

7. Restore the data and verify the data consistency of testfile_2.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b3775724dae8768680cfcc/65b25ef539cc4839ecd62e42/78E1A11F47CB1C3E19037B0C74E38C6ED7400551C22C3D0EFB8C28CCB402A795

Conclusion


Passed

Remarks

3.1.2 Open Storage Backup, Import, Verify

Objective

To verify that the backup system with OceanProtect can backup, import and pass the verification

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Log in to the Master Server as the system administrator.
  2. Configure the file replication link relationships between the source LSU and multiple destination LSUs (A->B and A->C).
  3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.
  4. Configure storage units and import policies on each destination end.
  5. On the source end, configure a backup policy based on the replication SLP policy.
  6. Set a scheduled backup task and perform the backup.
  7. Execute the replication task when the replication period arrives.
  8. Compare the data consistency between the A and B primary/secondary, observe the capacity change, link relationship, and bottom-layer resource usage.
  9. Check whether data is written to node C.

Expected Result

  1. In step 3, the configuration is set successfully.
  2. In step 7, the replication succeeds. The copy is imported to the specified Master Server on the destination end.
  3. In step 8, the primary/secondary data and capacity were consistent, and the link relationship existed.
  4. In step 9, no data was written to node C.

Test Result

1. Log in to the Master Server as the system administrator.

2. Configure the file replication link relationships between the source LSU and multiple destination LSUs (A->B and A->C).

Primary end

3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b0b33324dae8768665ec08/7E3A6B132A98C7366EB0A4538DD719F6D71EDF202CBFC5804345F5FC480B9505

//The configuration is successful.

4. Configure storage units and import policies on each destination end.

From B

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b0b33324dae8768665ec08/53FB4148FF9734F31A363C62058FEA94F25BC4BCDDA9CB8C42D8BFC8312B404A

From C

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b0b33324dae8768665ec08/C2ACF6EA1CED22C14ED21678627B855E4FFD9BFCF2229F1C392CBA71CA6F8EEE

5. On the source end, configure a backup policy based on the replication SLP policy.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b0b33324dae8768665ec08/A7C0A8A732A82C9174B694BD1DCF3358477029A42673315CDF0C4C468C74345B

6. Set a scheduled backup task and perform the backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b0b33324dae8768665ec08/37445101BEC5FD228FB3DB58A2EE64ED6CEC8FE5C08CBBDFC028454BA5626AAC

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b0b33324dae8768665ec08/29A1870FF3DA8CA0CE5AC0759152758C392EF6FA421CE121940291AAA5134BC2

7. Execute the replication task when the replication period arrives.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b0b33324dae8768665ec08/0D2887AA5F58488AF78E070602C897A0F76DBE0C729A50D8245602856A4AD785

//The replication is successful. The copy is imported to the specified Master Server on the destination end.

8. Compare the data consistency between the A and B primary/secondary, observe the capacity change, link relationship, and bottom-layer resource usage.

//The primary/secondary data and capacity are consistent, and the link relationship exists.

Data

link

9. Check whether data is written to node C.

//No data is written to node C.

Conclusion


Passed

Remarks

3.1.3 Duplicate from BasicDisk to OST

Objective

To verify that the backup system can duplicate from basic disk to OST

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Create a storage unit of the basic disk type and complete a backup. (Software compression is enabled in the policy.)
  2. Create a storage server, disk pool, and storage unit, and set the type to HyperProtect.
  3. Copy the backup copy in step 1 to the OST storage created in step 2.
  4. Restore data in the OST storage and verify data consistency.

Expected Result

  1. In step 3, the copy of the backup is successful.
  2. In step 4, the restoration of the data is successful.

Test Result

1. Create a storage unit of the basicdisk type and complete a backup. (Software compression is enabled in the policy.)

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b3a5d124dae8768681ae27/D9949B93DABDA0846C77BA0E7FC28D3D67E6F3D0DAFE248372B53C41E069AC17

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b3a5d124dae8768681ae27/4A750541485FC8FAED1C63BB72942032138181943009352EE84400A1CC3C938E

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b3a5d124dae8768681ae27/3D720D6EB3C1FEDD9430B318E09104FD2774527C3295B673CF29AB0CCC85DF55

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b3a5d124dae8768681ae27/C3A69C09DDE223909B86CC963E2757557B8A8DD74471805E1F18CA9C0A915C87

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b3a5d124dae8768681ae27/34557444B3FCDDA2DBBEB50C6AE02D42D1E2E0ABE0C699DEDF92710A2E1BBD36

2. Create a storage server, diskpool, and storage unit, and set the type to HyperProtect.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b3a5d124dae8768681ae27/04D6D79E2A558E76B0691C91FB0B305EEAAA9EBA5D1198DACD3305C906E0DA34

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b3a5d124dae8768681ae27/B4DBC9BFEF6AC9608C184898FE022E43D932F527A259547AADC051FD6DD9D69C


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b3a5d124dae8768681ae27/6356D148AEC02C1BB965F9796FD81BCB3982164F9E237BD7768C51A909B29E2F


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b3a5d124dae8768681ae27/721A5547C59670F794BCC57063F927C748237DA85FE2B45B386BFFF7E32DAC79

3. Copy the backup copy in step 1 to the OST storage created in step 2.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b3a5d124dae8768681ae27/4E279C9087B9B21CA2524F3A0454A67EBC9CBC2384B081AA61C39944A03CE703

4. Restore data in the OST storage and verify data consistency.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b3a5d124dae8768681ae27/7B9CA8ECE0AA76FFB024AA2C30D996688E65BB278D967B3977E1ADD1BD8A9F72

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b3a5d124dae8768681ae27/79FE20E2672244C1D54A0B0345768407F246ACE25CCF303ADF3300FD0DC47DE4

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b3a5d124dae8768681ae27/0435BB9A912492D27E69CEEFB708544D35D1A29E9A57663524E2267022A831E6

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b3a5d124dae8768681ae27/239BBCDACF6014067A1DC29A791842A3A06EF5647739C994E287E4F53E0C13CB

Conclusion


Passed

Remarks

3.1.4 Cumulative Incremental Backup

Objective

To verify that the backup system can perform full restore of backup image and cumulative incremental backup

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Create a storage server, disk pool, storage unit, and policy. The VM does not support compression.
  2. Insert the 1 GB file testfile_1 into the VM and perform a full backup of the VM.
  3. Restore data and verify data consistency in testfile_1.
  4. Insert the 1 GB file testfile_2 into the VM and perform differential incremental backup for the VM.
  5. Restore the data and verify the data consistency of testfile_2.
  6. Modify the 1 GB file testfile_2 on the VM and perform permanent incremental backup.
  7. Restore the data and verify the data consistency of testfile_2.

Expected Result

  1. In step 3, the restoration of the VM is successful and data is consistent.
  2. In step 5, the restoration of the VM is successful and data is consistent.
  3. In step 7, the restoration of the VM is successful and data is consistent.

Test Result

1. Create a storage server, disk pool, storage unit, and policy. The VM does not support compression.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/e6cdfcc1cf574bebb186b78b5dd728ec/65b08bdc24dae8768665184e/34B652E19B8BC087C23CF7AD3441F7C467FE42DDE34BFE34A9097DD2FED861E2
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/e6cdfcc1cf574bebb186b78b5dd728ec/65b08bdc24dae8768665184e/B35103D243FB4E9C93733031092708540496D2E0B65365B8E8827DEDFCD1F4B8
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/e6cdfcc1cf574bebb186b78b5dd728ec/65b08bdc24dae8768665184e/05B24C6EA0758669FCC463F4E7CBEA22C80E6492D8ECDD4581FD4482BC674DF9
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/e6cdfcc1cf574bebb186b78b5dd728ec/65b08bdc24dae8768665184e/42047514E1D2086636E305520D96135643EA510F11A2276545B9CBFF0CA66121

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/8B5B37935C0D7FA1F9CD612533E22F3454077D158044D22A28D5835308E65CD4

2. Insert the 1 GB file testfile_1 into the VM and perform a full backup of the VM.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/F9784835DBF904D2632373CBD72CFED53F32DD08AC1B9E6495BC164F1ADEE666

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/CC917722237497022D84DFBC72C7FAA62971CF6497D4AB40C9B845AF5F78F459

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/F7D657A8BA2FF1A26A74D4AF6FAECEA2450FCD8ABE2CE360A945C4FD34FB3D2E

3. Restore data and verify data consistency in testfile_1.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/19C41474ADD35E8A1657A92BF86058822DA1680E9718098A285A60739477434A

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/CAF42763FC942BE2A07BDFF5D9B97FCAF26CE0ACE80E787CC9D07EF338BDE066

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/F931FB9686D9281C347251F24CE4363A5D9851BE48A9B9512DE4DA0C83BB9DF3

4. Insert the 1 GB file testfile_2 into the VM and perform differential incremental backup for the VM.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/916CB317D6A4615221BEF6DAE25907073FADF24AE4A28E53F58D89AD330FBB25

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/6E9373AE6FBFC478C1836BA014268AD9F2950DF8F5A09AF8F05367E5279206A5

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/94B87C7A20D6CF94E567FBA6477B0C1EA4CB70A6AE01CFCA179DF6B615F07122

5. Restore the data and verify the data consistency of testfile_2.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/F374AB20B24598E101A0F282C19142D8508131CBD868178E51ADB273C5E9BC52
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/6BD0F2265F746CB3AD5A8014CDE36C651DA92AFB3B45936F1EEC7D36D17F2522

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/DF0661336646D6ED16A300A31C6476ACBB9FF0E58061DC5A68DB49CF65CE86F5

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/641A3AE776122B23A9B9F6C1A3E4ACEBBB3EE728509994438BBA64CD2E66B28C

6. Modify the 1 GB file testfile_2 on the VM and perform permanent incremental backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/6DD266250124CCE90985C8E8A9877C7FF7C7CDE43D089E95CBF6E44E637A184C
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/FD8ACFB33871F04488A1CC742817086FC166FBBEF5E3D68B9CFAD27E04BFC62E

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/BC6509587454254CFE470BCB39ABA6BA9E22194DCF9747C824E056926C27E542

7. Restore the data and verify the data consistency of testfile_2.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/28AD674D324DFF2FC884E93B623A512F8F5E2EB5F53066037135438CD8E4269F
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/07EC4BDC9B5DECBE9D49F060F6EBF9702D42BD5B781496E41411EDF275B14F68

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b08bdc24dae8768665184e/BCCC1BDB1743197D6EB78229884C52C653A0C0A28EE1A1016ACDA806AB7F6ED5

Conclusion


Passed

Remarks

3.1.5 Inline Tape Copy Backup and Restore

Objective

To verify that the backup system can perform the inline tape copy backup and restore

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Log in to the Master Server as the system administrator.
  2. Configure the Duplication SLP policy on the source master server and select Common Duplication.
  3. On the source end, configure a backup policy based on the Duplication SLP policy.
  4. Set a scheduled backup task and perform the backup.
  5. When the replication period arrives, the replication task is executed.
  6. Use the mirroring recovery in the tape library to verify data consistency.

Expected Result

  1. In step 2, the configuration is successful.
  2. In step 5, the copy is successfully copied and imported to the tape library.
  3. In step 6, the restoration is successful and data is consistent.

Test Result

1. Log in to the Master Server as the system administrator.

2. Configure the Duplication SLP policy on the source master server and select Common Duplication.

//The configuration is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/f2ceb30b11bd4c4ba0149e2a9139f59f/65bc95892fd120700284fffa/5DAEA94C5D56C6EAAF3A2D8E2F6B92EF4444C34A2E6B11C509CE91B7BB23BE07

3. On the source end, configure a backup policy based on the Duplication SLP policy.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65bc95892fd120700284fffa/486FA592A331B0230BDB8A721B8F555A9FF05C5C5CC3DAFE9FDD18266F9B81A1

4. Set a scheduled backup task and perform the backup.

Timed

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65bc95892fd120700284fffa/E26D65FCC5A7941344CA9C642E60B7A5CD047985F67F896D820C5F51259C0694

Backing Up

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65bc95892fd120700284fffa/5EF3A78B238D70ED5D55FE247AC681025AF919DD28D6F8AE548CFE62A7B08926

5. When the replication period arrives, the replication task is executed.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65bc95892fd120700284fffa/1BC1E5854926B7AF107F6ACD20BEB4880F4DAB1F4DAE916DC3E9356802441340

//The copy is successfully copied and imported to the tape library.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65bc95892fd120700284fffa/B161F1FB11E159443EE55F0A7BC039BF86F158112EF7BD83DC26015C15084BE2

6. Use the mirroring recovery in the tape library to verify data consistency.

Select mirror to copy to tape library

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65bc95892fd120700284fffa/F8F30272C7E2635F9B4B25191C1B0BFCA3E07B635E4D28FB5450C1011F14E61B

Restored successfully.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65bc95892fd120700284fffa/F560CC05CFE140F965F836B98AA134545013A962F390A2BD2C015350BFD0E582

// Data consistency

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65bc95892fd120700284fffa/68E295C79CA5BFC99626E39764E3C548934A40C4DCE9E29BEBFFC39477B3C435

Conclusion


Passed

Remarks

3.1.6 Policy Configuration for OpenStorage

Objective

To verify that the backup system can config policy for the OceanProtect

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Create a storage server, disk pool, storage unit, and policy.
  2. Insert the 1 GB file testfile_1 and perform full backup.
  3. Restore data and verify data consistency in testfile_1.
  4. Insert the 1 GB file testfile_2 and perform differential incremental backup.
  5. Restore the data and verify the data consistency of testfile_2.
  6. Modify the 1 GB file testfile_2 and perform permanent incremental backup.
  7. Restore the data and verify the data consistency of testfile_2.

Expected Result

  1. In step 3, the restoration of the fileset is successful and data is consistent.
  2. In step 5, the restoration of the fileset is successful and data is consistent.
  3. In step 7, the restoration of the fileset is successful and data is consistent.

Test Result

1. Create a storage server, disk pool, storage unit, and policy.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/52CB1FF6C242F6F0009BFEEA25DCD6BD2C76D02D5FA6109421CD3CC97C4DAE67
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/A848C06D398D700251A5DBB46BDBB0BA3130687CEC938F79C042608430069A4E

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/7FC4C66F7323F6A00467371BE9FAD523A3D835A7921CA7FA50023F9C5DDF0D79

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/D9F373627717B98197D45F54D81A3FCDDB763FBBC68ED9EBFE2F83907AA399E4

2. Insert the 1 GB file testfile_1 and perform full backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/E1A5CBEE0EE1B27299780EA84C206B4C61621B8543E87DC7F039D454020A0D11

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/69434C6C9E153A53635661545277C88FC30FC738ADD45BC7EE35EE22CF2F613A

3. Restore data and verify data consistency in testfile_1.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/CA8BB0C08D04FB0077D780BAD5DEAD515F7002A0735E7AA37E17CC9309BA1CF3

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/63D8BA8702B2DDF8E412A360FE6C5640801D8D3679773D00BD656C55529E4C2D

4. Insert the 1 GB file testfile_2 and perform differential incremental backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/9EC0AD5B9BF89E7371EBC957B88978AC09B5107E3DD9D8B31C8BDADC69E7BDBE

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/AFD9BC26F89BFDBA37C11E6D9C5DA69F3C7ED22DEB1B171B0391D1783F321365

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/120CD147B9C2788349F0AEE2436E7F05B3C6838880C769A0E15F7E7EFBB1E1F6
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/9D16E6A2D7934DC9BF8645C152F9EF639053974552C64914D8696A2933037EB3

5. Restore the data and verify the data consistency of testfile_2.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/5C8AE958E3F17C730015C054EA5AF68A7EBB471FB024E2835E5E05E2E283D218

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/2EEBABBCA117B91220F91FE0DBDE726165689CB9C11976E532BB61CFE484AC91

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/209146082F9C2AA9FCAB11E9632EE5E5A2A81511AE6E5B2EE87D243BD5A731FD

6. Modify the 1 GB file testfile_2 and perform permanent incremental backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/E51D1F7F2260FB9A9974DE3CAB0B37D66FCD8FE2FDEDC20A1FF7ADF0D5FD6E51

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/8C5296ECAB71736F4D2AC816B7532B6CB52C3277AFA9B396201BF2A6C1E39274

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/CAA8C45F572ADDE96A8A52AEA35BA3B263475B41B493C8F00179C2CC98C0FA3F

7. Restore the data and verify the data consistency of testfile_2.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/356E66C6598EC03CACB8A54FE1E84E42B07F610CE329AA41D4E939453420CA61
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/D73A1ABFC95F2CBE5CFB7854975ABA407FAADBE181B16A0609E6F32C06D43A9C

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/0F826FB7BEC098714E850B65833C352D32C52AF5BC98EA426CCB2AA078BF193C



http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/45E7873314720A01CEDBBE1A64CB67FA88BB958802DD033EBE0E1D8F81765768


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b21ec739cc4839ecd4cb16/4A7A6C7290F55C95E0D9232824AEC0E765548E892A2077C1A5C01A8E9E48FC6E

Conclusion


Passed

Remarks

3.1.7 Backup with TIR Move Detect

Objective

To verify that the backup system can backup with TIR Move Detect

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

1. When creating a standard backup policy, select the TIR and mobile monitoring functions.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b74f052fd12070024fac52/6009486BE3E40ABBD71C225331C10EEFC84E2A3301BF9D03CCF03E3F37AAB257

2. Create multiple folders dir1 and dir2 and files file1, file2, file3, file4, and file5 in the directory and perform a full backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b74f052fd12070024fac52/63CE6FF58CE35A9F30A8C6FF9F8A451F5C2D28C30952043E7F9F1297C06DF2F2

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b74f052fd12070024fac52/1C49B5843EF665820CB031B4A613215D6A40D41F3B91045D21CD6BD6B7A80F71

3. Change file1 to file001, move file4 and file5 to dir1 and dir2, and perform an incremental backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b74f052fd12070024fac52/DE1DB3D9E95F5AF45E71936CB94A8A288092CBE180EB2579D180FDDC3291655D

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b74f052fd12070024fac52/7B9339824109A60A98AD7428C56E8D434AB27BC446CF6920359FC8787517B5AD

4. Use the TIR copy to perform a full restoration.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b74f052fd12070024fac52/F141FAEB3DABE710B5DFF01EEE73BB2F9B17AD27D3DDD34C5481A129D2846167

Expected Result

  1. In step 1, after the switch is turned on, the policy is successfully created.
  2. In step 2, the full backup is successful.
  3. In step 3, the incremental backup is successful.
  4. In step 4, data is successfully restored. The restored data is file001, file2, and file3. File4 and file5 are stored in dir1 and dir2.

Test Result

1. After the switch is turned on, the policy is successfully created.

2. The full backup is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b74f052fd12070024fac52/A1BC174EAFA8219EF74CFD0220B33B64BCEDFA47867BB10F46C170685108FE2A

3. The incremental backup is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b74f052fd12070024fac52/22846BDE3C209E53E03A63196C87A0FAC5601794688C63EB7702253FB6A5092B

4. Data is successfully restored. The restored data is file001, file2, and file3, and file4 and file5 are stored in dir1 and dir2, respectively.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b74f052fd12070024fac52/37E610EA30AB849E3D44E7570DCF8E62DE6A0EAE34E9C5E7F5CF016F8BA5BDB4

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b74f052fd12070024fac52/E17EDC48FF883A435F139C20068E03AE0FC543C22FCCDB3746D22FF128A9383D

Conclusion


Passed

Remarks

3.1.8 Backup with TIR No Move Detect

Objective

To verify that the backup system can backup with TIR No Move Detect

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

1. When creating a standard backup policy, select TIR and disable the mobile monitoring function.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b749922fd12070024f3bad/828751689DFB7205FA449C1D5D9A3E65FD29FC25E20970A87390CB23A0B557D6

2. Create multiple folders dir1 and dir2 and files file1, file2, file3, file4, and file5 in the directory and perform a full backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b749922fd12070024f3bad/2785CFA8367B42423C36AC99036B08A44E8F16C505D01C296868526EB7B64B80

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b749922fd12070024f3bad/AD86CB4158B07A1DEA24384E15DFA83F53F9DEDBE084F9C5B6D6FC6E3C9D9E10

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b749922fd12070024f3bad/74D62B9CA57B0651EF09D9B8B41491DE20FD86533E12E7EBF83D84205D9EF811

3. Change file1 to file001, move file4 and file5 to dir1 and dir2, and perform an incremental backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b749922fd12070024f3bad/0B58A55F055C658A663D16B1B137F6843AFB8A4CD569B635A3A9461BA8D00865

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b749922fd12070024f3bad/06E571999C641EED56B465F73F493531ED6FB93073DA20125656B9DF02C9EC98

4. Use the TIR copy to perform a full restoration.

Expected Result

  1. In step 1, after the switch is turned on, the policy is successfully created.
  2. In step 2, the full backup is successful.
  3. In step 3, the incremental backup is successful.
  4. In step 4, data is successfully restored. After the restoration, the restored data is file001, file2, and file3. File4 and file5 are stored in dir1 and dir2.

Test Result

1. After the switch is turned on, the policy is successfully created.

2. The full backup is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b749922fd12070024f3bad/1C260ABFD7BCCB0F3183750B44D8216DE816A7652E384280D2E7A9D2D8F5F9CE

3. The incremental backup is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b749922fd12070024f3bad/81D4271A1225BE11FAF9F123C2E06A52D07C7DB5E90FBFCBDCC887E11C257F93

4. Data is successfully restored. After the restoration, the data is file001, file2, and file3. File4 and file5 are stored in dir1 and dir2, respectively.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b749922fd12070024f3bad/06B3EDB0EC1C4BDC95FE53F22C7C11186D9B33C6B0ACE51333DE510FD5891C06

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b749922fd12070024f3bad/0F51F2FF6192BDF7AFDF4D8654A6FE611DAE0E985607DE84C9C7277F5D527D17

Conclusion

Passed

Remarks

3.1.9 User Archive Backup

Objective

To verify that the backup system can perform the user archive backup

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Create a standard backup policy (create the backup type of the archive backup).
  2. Insert the testfile_1 file and manually perform the archive backup.
  3. After the backup is complete, check whether testfile_1 exists.
  4. Restore testfile_1 and verify data consistency.

Expected Result

  1. In step 2, the archive backup is successful.
  2. In step 3, the testfile_1 does not exist.
  3. In step 4, the restoration of testfile_1 is successful and data is consistent.

Test Result

1. Create a standard backup policy (create the backup type of the archive backup).

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/05b8a21cca0947dd8aac7ee756898794/65b7a1c339cc4839ec063903/3282439F643E6D47EB980E365E883D2C1685410A0A5C9555C6EEFEA0A4029E3F
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b7a1c339cc4839ec063903/C53DACB81A054863E5FC9C7B72B85E6EFB7264B117F06C125386EC2DABA99FE2

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/05b8a21cca0947dd8aac7ee756898794/65b7a1c339cc4839ec063903/951BC75CFEE025B8D4DF781B8DC631968ECAC1DB361F7EAEA33879035D236089

2. Insert the testfile_1 file and manually perform the archive backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/05b8a21cca0947dd8aac7ee756898794/65b7a1c339cc4839ec063903/076A531A9769BCF51B1639FAE54CFC2A656D2CA89E549EEE07A2C44FBABB68DA

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b7a1c339cc4839ec063903/421018DDDCE5B15115C0369FFD19D3DD0E7FE74844A84C942DA8EF809F636760

3. After the backup is complete, check whether testfile_1 exists.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b7a1c339cc4839ec063903/2A10E0B3152363BC511C2B2BAB1E50A69925EDB2EF9EBE1EEDF006A71159488C

4. Restore testfile_1 and verify data consistency.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b7a1c339cc4839ec063903/0B8214AE68180BFE3CAC30556BF570E48491BF51EA57A2E6821B919A9280CC48

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b7a1c339cc4839ec063903/4DBC0029FEDD01C8E482A651943F037F037D876B78206492D0121B621AD628D3

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b2024039cc4839ecd3900f/65b7a1c339cc4839ec063903/18670BAC5C24B7A900F41258459DCC06E7FF06CBAB7C110CAACE3361461332E6

Conclusion


Passed

Remarks

3.2 Replication

3.2.1 Targeted Auto Image Replication

3.2.1.1 Targeted A.I.R. Manual Replication, Target STS Session via Source STS

Objective

To verify that the backup system can configure one-to-one LSU replication relationship;

To verify that the backup system can perform backups/restores with one-to-one targeted A.I.R.;

To validate persistence and copying of image_def on targeted A.I.R. related images;

To verify the targeted A.I.R. manual replication, target STS session via source STS

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Log in to the Master Server as the system administrator.
  2. Configure the file replication link between the source Linux LSU and the target Windows LSU (A->B).
  3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.
  4. Configure storage units and import policies on each destination end.
  5. On the source end, configure a backup policy based on the replication SLP policy.
  6. Set a scheduled backup task and perform the backup.
  7. Execute the replication task when the replication period arrives.
  8. Compare the data consistency between the A and B primary/secondary, observe the capacity change, link relationship, and bottom-layer resource usage.

Expected Result

  1. In step 3, the configuration is set successfully.
  2. In step 7, the replication is successful. The copy is imported to the specified Master Server on the destination end.
  3. In step 8, the primary/secondary data and capacity are consistent, and the link relationship exists.

Test Result

1. Log in to the Master Server as the system administrator.

2. Configure the file replication link between the source Linux LSU and the target Windows LSU (A->B).

From the end

Primary end

3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/b9beb779d16c45e8b6cda2ebd9f7c035/65ae423139cc4839ecaf4516/85A879CBC084DF79B1B84B8F23A116BFDD5BEEBE8265DB5D4ABAEF2B173C2752

//The configuration is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/b9beb779d16c45e8b6cda2ebd9f7c035/65ae423139cc4839ecaf4516/F85F589C1C2B0D709A704AF3DA41F1B4B99A8D6E2B263EEB9241898F4C09C092

4. Configure storage units and import policies on each destination end.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b0c79439cc4839ecc6dcf8/CBEA9F3E5FBA94216AC12F6D482F96F39673523F557EA04850AC33F7C43CD4FA


5. On the source end, configure a backup policy based on the replication SLP policy.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b0c79439cc4839ecc6dcf8/CBDEE63DE982FA60E330EC0B728AEE1B69D9C4A1040C71DBB428D5541995639C

6. Set a scheduled backup task and perform the backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b0c79439cc4839ecc6dcf8/A7F0C5E4ED6F9A6E899EBEEB9D994C4558B8E4FB85F2047CFB1E3F71E64DC30A

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b0c79439cc4839ecc6dcf8/B8F311F4874EC7E7C7FBCEF9825B220C260BD876A3BA3DFA3203753997D36298

7. Execute the replication task when the replication period arrives.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b0c79439cc4839ecc6dcf8/6D3B52CF34AB213D85FF7ABB9EEEF75C3AB916D86273FC80F191AB055C8F6B97

//The replication is successful. The copy is imported to the specified Master Server on the destination end.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b0c79439cc4839ecc6dcf8/331B6D51D904A75BB07821DCC5BF0B06F7E0B85824964A8E1069B2031FFDC8D7

8. Compare the data consistency between the A and B primary/secondary, observe the capacity change, link relationship, and bottom-layer resource usage.

Data

//The primary/secondary data and capacity are consistent, and the link relationship exists.

Conclusion


Passed

Remarks

3.2.1.2 Bi-directional Targeted A.I.R. Replication

Objective

To verify that the backup system can perform bi-directional targeted A.I.R. replication

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Log in to the Master Server as the system administrator.
  2. Configure the file replication link relationship between the source Linux LSU and the target Windows LSU (A->B and B->A).
  3. Configure the replication SLP policy on the master servers of source A and source B. Select Replication and Target master server.
  4. Configure the storage unit and import policy on each destination end.
  5. Configure a backup policy based on the replication SLP policy on source ends A and B.
  6. Set a scheduled backup task and perform the backup.
  7. Execute the replication task when the replication period arrives.
  8. Compare the data consistency between the A and B primary/secondary, observe the capacity change, link relationship, and bottom-layer resource usage.

Expected Result

  1. In step 3, the configuration is set successfully.
  2. In step 7, the replication is successful. The copy is imported to the specified Master Server at the destination end.
  3. In step 8, the primary/secondary data and capacity are consistent, and the link relationship exists.

Test Result

1. Log in to the Master Server as the system administrator.

2. Configure the file replication link relationship between the source Linux LSU and the target Windows LSU (A->B and B->A).

A-B

The main

From the

B-A

The main

From the

3. Configure the replication SLP policy on the master servers of source A and source B. Select Replication and Target master server.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/9c6954164fc34ec4acf8cf6ec28649a5/65b0ee450105145b3d5e5433/868C405D51187868ACC5B6F3E72C0EBCBA0666A1EC2C651BAE9AE108171C285D

//The configuration is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/9c6954164fc34ec4acf8cf6ec28649a5/65b0ee450105145b3d5e5433/1D4DFD3B7769F607591BB8F8CF88FB2EE3A5CC644F1B7CA90499A4B459A02B32

4. Configure the storage unit and import policy on each destination end.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/9c6954164fc34ec4acf8cf6ec28649a5/65b0ee450105145b3d5e5433/39BD57C4D8754A12F26B2E5DD2C2E2308892BDF5D5154191CA8E610AC772DC5A

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/9c6954164fc34ec4acf8cf6ec28649a5/65b0ee450105145b3d5e5433/422A1957CC117B6258DA59B46CEE80BCCE3B6FCBCB0B7F178E65285980A58317

5. Configure a backup policy based on the replication SLP policy on source ends A and B.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/9c6954164fc34ec4acf8cf6ec28649a5/65b0ee450105145b3d5e5433/42B8365345054005152A0BF2D5DE72C49C7207EB8C191458163EDF84FD8F3D77

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/9c6954164fc34ec4acf8cf6ec28649a5/65b0ee450105145b3d5e5433/352C64FE745F647A5B3E10113CABDF7298F6F1956657F62EDF54CFC7F26E9F81

6. Set a scheduled backup task and perform the backup.

Timed

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/9c6954164fc34ec4acf8cf6ec28649a5/65b0ee450105145b3d5e5433/C24F1D87F8A7E2A7D941B5A03FDAB15739E256AB5C73392D34BFCD61412D395B

Backup 1

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/9c6954164fc34ec4acf8cf6ec28649a5/65b0ee450105145b3d5e5433/29E45C1EA2C9D83B280634F399A45AB14EBA092BEA3F2E1322E7935118404F59

Backup 2

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/9c6954164fc34ec4acf8cf6ec28649a5/65b0ee450105145b3d5e5433/E9C93A775F7C7CF86DBA90F8F143E79DFE6CA2A7935EE14ECC254A391CFA2C09

7. Execute the replication task when the replication period arrives.

Replication 1

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/9c6954164fc34ec4acf8cf6ec28649a5/65b0ee450105145b3d5e5433/5428BD72BE6181BCFEA15E59BA71E926D795C13C76FF47D2AB21EE9738BEF33A

Replication 2

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/9c6954164fc34ec4acf8cf6ec28649a5/65b0ee450105145b3d5e5433/BA4872C4031C6EBE2C5ECD39243FA7F19C426849A053EF5597388E202AB0035B

//The replication is successful. The copy is imported to the specified Master Server at the destination end.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/9c6954164fc34ec4acf8cf6ec28649a5/65b0ee450105145b3d5e5433/EC9616F8A4A36361A38E5A79D7A5147CB51D6D0A4D1DF28841E3DB7DFCF80658


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/9c6954164fc34ec4acf8cf6ec28649a5/65b0ee450105145b3d5e5433/AB8D5D1233F08D05F8243F42FAEFA142E3434251C30BC65AED144CECB6821BF5

8. Compare the data consistency between the A and B primary/secondary, observe the capacity change, link relationship, and bottom-layer resource usage.


Data

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/9c6954164fc34ec4acf8cf6ec28649a5/65b0ee450105145b3d5e5433/4EF4E3D681BA727E3C502D7A5D2A933A0D01AB5DFCF35344C2307C11CCA1B969

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/9c6954164fc34ec4acf8cf6ec28649a5/65b0ee450105145b3d5e5433/4F1211C4AB33D4C7FA21CDB8C20E5A9EF50E15479783F11B72C6565E841B1A89

link

//The primary/secondary data and capacity are consistent, and the link relationship exists.

Conclusion


Passed

Remarks

3.2.1.3 Inject NetBackup Failure During Targeted A.I.R. Replication

Objective

To verify that the backup system can perform normally when injecting NetBackup failure during targeted A.I.R. replication.


To verify that the backup system can trigger multiple events for a single targeted AIR image (initial replication failed)

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Log in to the Master Server as the system administrator.
  2. Configure the file replication link relationship (A -> B) between the source LSU and a destination LSU.
  3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.
  4. Configure storage units and import policies on each destination end.
  5. On the source end, configure a backup policy based on the replication SLP policy.
  6. Set a scheduled backup task and perform the backup.
  7. When the replication period arrives, the replication task is executed. During the replication process, power off the interface module where the replication port resides.
  8. The interface card is powered on. The replication link recovers and the data are replicated in the next replication period.
  9. Compare the data consistency between the A and B primary/secondary, observe the capacity change, link relationship, and bottom-layer resource usage.

Expected Result

  1. In step 3, the configuration is set successfully.
  2. In step 7, replication fails. The copy remains in the target file system.
  3. In step 8, the data is successfully replicated in the next replication period.
  4. In step 9, the primary/secondary data and capacity are consistent, and the link relationship exists.

Test Result

1. Log in to the Master Server as the system administrator.

2. Configure the file replication link relationship (A -> B) between the source LSU and a destination LSU.

3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.

//The configuration is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65af69960105145b3d516094/EE592FBC3F4630DF964643A882AD0AB06678B4C7BB6EA7D631ADD6EF66C4096A

4. Configure storage units and import policies on each destination end.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65af69960105145b3d516094/6E3885BF43FC93A537B108EDD91A2669DAB9361C53C8D8B0696BF1A9811CB59B

5. On the source end, configure a backup policy based on the replication SLP policy.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65af69960105145b3d516094/7404AECC28CDBE187F272B229AEACA1CE5EAF0E524CCBBBF50B6C2CDB2B9A662

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65af69960105145b3d516094/A79E5EAFF5A286496F4846AD2AC68EFAA64BA1D2956972AF804D957FC1673534

6. Set a scheduled backup task and perform the backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65af69960105145b3d516094/9E6A41EE16C26C2265C56D8EDCE1A17F893B45A55997E81320BF92206250F967

7. When the replication period arrives, the replication task is executed. During the replication process, power off the interface module where the replication port resides.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65af69960105145b3d516094/B8670F1A475DC844D0877936477C66877B776D6C9D22AC8E6F01FA97CAD5A52E

//Replication failed. The copy remains in the target file system.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65af69960105145b3d516094/5E499315A282EB5F20B52C51CFAEFE80170AB28C0108CCA457E6F35B885AA7AB

8. The interface card is powered on. The replication link recovers and data is successfully replicated in the next replication period.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65af69960105145b3d516094/81312C0E3F29A980EBD9124FC05E0F599ADA3F14ABC43903077E032C36638EEF
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65af69960105145b3d516094/7A60ABA0E980B2EBE9DDEE44F658B921B2C315765C13D66072FE2C99ED321B82

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65af69960105145b3d516094/3B8EE736751BEA21401608AEE0839A3F65252FDE30CE4ACCADB8C93ED4D403CF

9. Compare the data consistency between the A and B primary/secondary, observe the capacity change, link relationship, and bottom-layer resource usage.

// primary/secondary data is consistent,

Master:

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65af69960105145b3d516094/A2DF5A2657D35EEE6C9FCBF865F01547AC6CABD553AE25D5DCFB6863A299F1A0

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65af69960105145b3d516094/208122F2C3A0339068235C2AF4CFD482ABAACA30033878F4B287637186688F40

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65af69960105145b3d516094/BFDC24144F2BF595E3C3F25459E858DD6E70BF4742393738912D9D287241875D

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65af69960105145b3d516094/6C37956C99FBDEA17858E06426CFE79D5D0B4DCE6A5D8CB2E36A689444AC1478

From the

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65af69960105145b3d516094/274B62CED3CC703CFCBCC6EF4021B40A743A86B2D02B503C9B4CB8FBD1F05334

Consistent capacity,

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65af69960105145b3d516094/69A5CF8592153267B3F590C99E7C44C7A4C739971C6C30474F20E5A9D6ADB02C

The link relationship exists.

Conclusion


Passed

Remarks

3.2.1.4 Break Implementation Replication Link During Targeted A.I.R. Replication

Objective

To verify that the backup system can perform normally when breaking implementation replication link during targeted A.I.R replication

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Log in to the Master Server as the system administrator.
  2. Configure the file replication link relationship (A -> B) between the source LSU and a destination LSU.
  3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.
  4. Configure storage units and import policies on each destination end.
  5. On the source end, configure a backup policy based on the replication SLP policy.
  6. Set a scheduled backup task and perform the backup.
  7. When the replication period arrives, the replication task is executed. During the replication, restart the NetBackup process.
  8. After the NetBackup process restarts, data is successfully replicated in the next replication period.
  9. Compare the data consistency between the A and B primary/secondary, observe the capacity change, link relationship, and bottom-layer resource usage.

Expected Result

  1. In step 3, the configuration is set successfully.
  2. In step 7, replication fails. The copy remains in the target file system.
  3. In step 8, the data is successfully replicated in the next replication period.
  4. In step 9, the primary/secondary data and capacity are consistent, and the link relationship exists.

Test Result

1. Log in to the Master Server as the system administrator.

2. Configure the file replication link relationship (A -> B) between the source LSU and a destination LSU.

3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b4bd812fd120700237b994/1B6150877F19358179173DD5D74BCE53CF307789892166A8ABC5611B3BCE29CB

//The configuration is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b4bd812fd120700237b994/38A6C92B85D00696070D0BF7D6939113042036BE95F740F58C324BB26D748622

4. Configure storage units and import policies on each destination end.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b4bd812fd120700237b994/040AAF151531D1B636D5E94581D45A262F64694001B4AA5F3F9A3E5F9B1D461D

5. On the source end, configure a backup policy based on the replication SLP policy.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b4bd812fd120700237b994/295AE29EDECA45200066E45BFD67B31C903255D5A72A40EBDC84A44C08DDC3A1

6. Set a scheduled backup task and perform the backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b4bd812fd120700237b994/40B8BEC3ED5A7C4A954779DA4EBF509186A23FEECEFE7BA784AC60157AB75B68

7. When the replication period arrives, the replication task is executed. During the replication, restart the NetBackup process.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b4bd812fd120700237b994/FDF7A9D628FA79B96F7ABDE6E81ED15C6CF9228B59A8EC9801844A274E4C8812

//Replication failed. The copy remains in the target file system.

Residue

8. After the NetBackup process restarts, data is successfully replicated in the next replication period.

9. Compare the data consistency between the A and B primary/secondary, observe the capacity change, link relationship, and bottom-layer resource usage.

//The primary/secondary data and capacity are consistent, and the link relationship exists.

Data

Conclusion


Passed

Remarks

3.2.1.5 Targeted A.I.R. Replication when Target Data Storage is Full

Objective

To verify that the backup system can perform targeted A.I.R. replication when target data storage is full

To verify that the targeted AIR can import non-existent images

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Log in to the Master Server as the system administrator.
  2. Configure the file replication link relationship (A->B) between the source Linux LSU and the target Windows LSU. B. The capacity of the storage LSU is less than 10 GB.
  3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.
  4. Configure storage units and import policies on each destination end.
  5. On the source end, configure a backup policy based on the replication SLP policy and perform backup.
  6. After the backup is complete, manually execute the replication task.

Expected Result

  1. In step 3, the configuration is set successfully.
  2. In step 5, the backup task is successful.
  3. In step 6, the replication fails and an error indicating insufficient capacity is reported.

Test Result

1. Log in to the Master Server as the system administrator.

2. Configure the file replication link relationship (A->B) between the source Linux LSU and the target Windows LSU. B. The capacity of the storage LSU is less than 10 GB.

3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/b9beb779d16c45e8b6cda2ebd9f7c035/65ae423139cc4839ecaf4516/85A879CBC084DF79B1B84B8F23A116BFDD5BEEBE8265DB5D4ABAEF2B173C2752

//The configuration is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/b9beb779d16c45e8b6cda2ebd9f7c035/65ae423139cc4839ecaf4516/F85F589C1C2B0D709A704AF3DA41F1B4B99A8D6E2B263EEB9241898F4C09C092

4. Configure storage units and import policies on each destination end.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/b9beb779d16c45e8b6cda2ebd9f7c035/65ae423139cc4839ecaf4516/ECCAF3E120AA1A82EE4245F4B0DE6960B6682640EF5E6CDC146EB0B216DFBC4C

5. On the source end, configure a backup policy based on the replication SLP policy and perform backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/b9beb779d16c45e8b6cda2ebd9f7c035/65ae423139cc4839ecaf4516/504BD1352D34FC9960E03850BA939ACFB53EF2B272F2FAC257AB30F0985A3582

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65ae423139cc4839ecaf4516/FA9DD71AE6EE681314B3360D60689EC23883EBEB5B1C2C88D438D8AC954654A2

//The backup is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65ae423139cc4839ecaf4516/1C71FC424E843AEE72C05D4E799FE6C33A1490DF0A5AABED41DCFCC29E36C0EA

6. After the backup is complete, manually execute the replication task.

// Replication failed and an error indicating insufficient capacity is reported.

Conclusion


Passed

Remarks

3.2.1.6 Trigger Multiple Events for A Single Targeted AIR Image (previous replication succeeded)

Objective

To verify that the backup system can trigger multiple events for a single targeted AIR image (previous replication succeeded)

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

1. Configure the SLP. Site A replicates data to site B in the domain, and then transmits data from site B to site C through the target air.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b85cc72fd120700259d6eb/8D41938B049A61004D0B2A6542A45D41E9563D2921D67B2D17766C4CD0E5CD4C

2. Manually start the backup task and wait until the replication task is complete.

3. Import and restore data at sites B and C, and verify data consistency.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b85cc72fd120700259d6eb/FDCFE0E7F1D180267C2F2715BC7BBA3972D1F8F1D02067326423F1496B8794FA

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b85cc72fd120700259d6eb/7F07F68E4A3F760F1A1FCF153130AB04B4D1AC6F14DE08F8A113B3DED4BA0A93

4. Perform the backup again and verify that the replications are still successful.

Expected Result

  1. In step 1, the policy is created successfully.
  2. In step 2, the backup task, intra-domain replication, and Target Air are successful.
  3. In step 3, all the restoration tasks are successful, and the data is consistent after the restoration.
  4. In step 4, after the backup is successful, the backup is still successful.

Test Result

1. The policy is created successfully.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b85cc72fd120700259d6eb/234CBFCF1531C612F9645E20C19AA32FA808EC670C4DE3BFB6FBE1CEF4E8BF33

2. The backup task, intra-domain replication, and Target Air are successful.

Backing Up

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b85cc72fd120700259d6eb/B349860B602A4B9A906C7AC1F024628CA606C1A7C25F346732215965855C01FD

Intra-domain

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b85cc72fd120700259d6eb/902E4D795DB8630DD419887B5948ED765EE22334543256CE7319E39F88F8C134

AIR

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b85cc72fd120700259d6eb/D150856F49E46693026CC770198056BBC6215A5B6C7246EABC5056B886C2E773

3. All the restoration tasks are successful, and the data is consistent after the restoration.

B Recovery

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b85cc72fd120700259d6eb/7A1043D59207EF6F7967BA2A3E499CFCC1A4183FF7823739B6868E107FFB4FA0

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b85cc72fd120700259d6eb/960027AB9FA7584ABF016F607F03C4D43199D6574CC3797E6C9B5F72CA118071

C Recovery

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b85cc72fd120700259d6eb/80BDF0CEF4AF197F95D31CE06D7B05E098006AC5D878404F57CF15A13676366A

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b85cc72fd120700259d6eb/2A668349E70D79DD725D722D7E7FEA8AC6D2FB8AC089462C7A3C9E7B8EDBFA45

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b85cc72fd120700259d6eb/3224CF109B4B1EE734861DCBF278D304EF4CCB2A173E402720C47079149ABC84

File

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b85cc72fd120700259d6eb/B5161F0DC483AAD55BBEC4DC2C2CDE014A72AF8673B1E2AA8AE5E952C93D2D92

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b85cc72fd120700259d6eb/9E815E97B979B088DEBE2E0A2749C7E3124CA463ED938A5C1B8130B8F0016FA8

4. After the backup is successful, the backup is still successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b85cc72fd120700259d6eb/D152417460242C1B47882403EF00C910D998296B6F4AB80A2733C3E5F6624BFF

Conclusion


Passed

Remarks

3.2.1.7 Perform Backups/Restores with Fan-out Targeted A.I.R

Objective

To verify that the backup system can configure fan-out (one-to-many) LSU replication

To verify that the backup system can perform backups/restores with fan-out targeted A.I.R.

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Log in to the Master Server as the system administrator.
  2. Configure the file replication links between the source LSU and multiple destination LSUs (A->B、A->C、A->D和A->E).
  3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.
  4. Configure the storage unit and import policy on the destination end.
  5. On the source end, configure a backup policy based on the replication SLP policy.
  6. Set a scheduled backup task and perform the backup.
  7. Execute the replication task when the replication period arrives.
  8. Import and restore the secondary copy and verify data consistency.

Expected Result

  1. In step 3, the configuration is set successfully.
  2. In step 7, the replication is successful. The copy is imported to the specified Master Server at the destination end.
  3. In step 8, the primary/secondary data and capacity are consistent, and the link relationship exists.

Test Result

1. Log in to the Master Server as the system administrator.

2. Configure the file replication links between the source LSU and multiple destination LSUs (A->B、A->C、A->D和A->E).

3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.

//The configuration is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/95DE9B382EED3AF010E3FDBA4E543E416F98A68B629E8F9615394CFED0EEF89C

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/D0DA6E5F0AC21266593CC44F232F20F4CE9E3A4AAB62374044935411F28B237D

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/2CB807E14A9833FB1DBF9660519227AD5185D73733622893FA7389EECD49091F


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/C8A9A9A5EF88A25FBAAA8DFE981176AF58AB5F9E7047EEEB4C0E8298C7324A38

4. Configure the storage unit and import policy on the destination end.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/E80C6BA9F7953DC64724DE7254E2D7C74A692B329C91F10C075EB17312137BB3

5. On the source end, configure a backup policy based on the replication SLP policy.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/B5DD349D46957DDA28F7A8E468F7D35238C20895997C7D3B052505480EB30A13

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/7D04CC56FE6045CB1C5BFF9D0864C9B665C4227AEADE6F2B765ED42293877A85

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/FE21F1E3E7DF15B559902F00C64B0F3FE93D2E191A598C81032567F843C1E093

6. Set a scheduled backup task and perform the backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/3D808725DB3C1E79428366E50CF08A533BCC799003A97743FC8AFB73210499AC

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/719E0765229D455BB548FD43E9B6F1D505DC815C1E94FD8B2A24A199FC1112F1

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/45167441FCB69CD17EC43EB4BD2034FA363C0C46733AA894823AE1EB0689112F

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/37CA142C494B3804EAEB8597255CD73C49E2BCF0F92FA37B005281A12B0FD09D

7. Execute the replication task when the replication period arrives.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/E616661E93BF2D0139AB64AF83B2A91F71771434C5118F9948369DCC792F413D

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/A71C9C56DC5FE8F14B24FA7D6FDF393ED092BD18B145A3D9E70C23632B65230C

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/6FF46745CC718806124F30978408CE5C3113948D6749AD2AF9FDB9D59787B67B

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/B72208ED2D2F82FCAA7AF2F4FEF47D67C5FD4757CD23055D6BB62C5F1FEA600D

//The replication is successful. The copy is imported to the specified Master Server at the destination end.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/A842BF159C15ED5C45DAC971840D9E527342366BE02448BB153EECD4C743208B

8. Import and restore the secondary copy and verify data consistency.

// Data consistency

Primary 001

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/D79ABB15EF31A537BD89B3CD303A94A3B1E14C903ACE6316B56719C9B9E523E8

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/47CC94E1636AF4C9EB18042FD1B4727BF6AD43488D937CE762A833FA2A70EF51

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/A00C4B405320AD011B9333F396FC957DED4AF5E2AF2DC268A9E7EFC4F78DA345

Primary 002

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/E65546410930350664F24905E8B0FE2292912C30F10C15A5DDBA1261C7233025
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/8AD01FBFEFD85BA4ED1D2DBEA96097CAB771396AC6031E96A0843610C1484CA7

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/2935DD3306FFF275E479AB683430750448F2DBD051AFD81E44BD39052311F158

Main 003

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/8E37CB2E77415D95AC09E5419CF528C1BD79126B4E0478CEC7576CB3A512D93A

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/1202D70984A3D7796EF1B3CC71D3D8692BB98D20B79711E23ADB1C06D5B7B771

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/88CB8E2242A30035D8FD71F4BB6094A5194B4ADE92E07F75BEDB49E374EF8632

Main 004

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/0F0FECFF842FC4876405A4EBB7FB1A13BD1044562819EB7A3EEAC7005C62FED0

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/BF7E4FC5319493B08FB7B0930884336C8F3B467C7D3F9C4A1E54775A9B08B700

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/96C47EA356B73FB5B2C5CC0B3107CABB70AE476D51485B573383E275AB404B2A

From 001

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/82617AABBA1E71F893CF57ABEF8F378C3810C559D4649F0D27CA3FE96E9416E9


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/654B100EB0207E0633B205CA8C0F09CB5A42BA4E07D85B20BD4FFB593330F307

From 002

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/DD00DE2B90E3786F27654CB504E828DCFB4380985C6AB943F1336160276457E0

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/D9CAA5B287CEC0E38D87AD894D49CEB10D11844C6D2B693300470A74C048BF27

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/0E967E2508C15DA084E8E44EA86B5A2801175DFA6BF3DEA785752FCF57420A86

From 003

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/4192CACF4B197637D2EB8BAAA5E1DDA1DC4ACCDE8A69160F0E86BD54024EA6FF

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/FA828EE15D0BC384500648F47590C386B9EB287C4415FC6A0743E7D690FE43AA

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/8075A77092BB71CE36D48087D8A52ACE93DB8038CE008990336865B8216B8899

From 004

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/FD506CC8062E442840474FAC29357107FA80E925531CB9510F6A1DF29C83538D

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b8d7ee0105145b3da8e0c3/1A36936EF1457162BD5C105A886222E264EBD8001CA5874DD0B63AE9154C2121

Conclusion


Passed

Remarks

3.2.1.8 Perform Backups/Restores with Cascaded Targeted A.I.R

Objective

To verify that the backup system can configure cascaded LSU replication

To verify that the backup system can perform backups/restores with cascaded targeted A.I.R.

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Log in to the Master Server as the system administrator.
  2. Configure the file replication link relationship between the source LSU and multiple destination LSUs (A->B->C).
  3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.
  4. Configure storage units and import policies on each destination end.
  5. On the source end, configure a backup policy based on the replication SLP policy.
  6. Set a scheduled backup task and perform the backup.
  7. Execute the replication task when the replication period arrives.
  8. Compare the data on the primary/secondary of A, B, and C, observe the capacity change, link relationship, and bottom-layer resource usage.

Expected Result

  1. In step 3, the configuration is set successfully.
  2. In step 7, the replication is successful. The copy is imported to the specified Master Server at the destination end.
  3. In step 8, the primary/secondary data and capacity are consistent, and the link relationship exists.

Test Result

1. Log in to the Master Server as the system administrator.

2. Configure the file replication link relationship between the source LSU and multiple destination LSUs (A->B->C).

3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b0c79d24dae87686667ea9/023AE9B9F430A0B95286205C26237304B15DAE587423002200F09FFB19E19174

//The configuration is successful.

4. Configure storage units and import policies on each destination end.

B

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b0c79d24dae87686667ea9/95BDE284BA5A08E3AC88E37E734F6126270E5C0BCA9A997C480A1C74B7026182

C

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b0c79d24dae87686667ea9/8F1B675C6B8BC70202F6F69554B4D7FC9D9DC6A2ABDD1814C68C0EC09A63860D

5. On the source end, configure a backup policy based on the replication SLP policy.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b0c79d24dae87686667ea9/F7D76EA521967F82CDA4E9DBDD3CF80E236B51983B8178ED097E7D18424AFEE5

6. Set a scheduled backup task and perform the backup.

Timed

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b0c79d24dae87686667ea9/D400238BDA5849BC8C35803ADA04A2DA2369C9A93A8C837E18D18993108CEB28

Backing Up

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b0c79d24dae87686667ea9/164DF1DD5F80BF723FBBFBB28C2F8CB5F185A3FFB17EEE2E312F98687AFF6175

7. Execute the replication task when the replication period arrives.

A Replication

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b0c79d24dae87686667ea9/39CDB9476DBF7010A4A4F99022FFD8C797636071E39A6FAA50213E655DEBB0C3

B Replication

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b0c79d24dae87686667ea9/C91BA06596960071E4D813F8E9264B253BF863BAF3C04D57C4D9524E54FA6DF4

//The replication is successful. The copy is imported to the specified Master Server at the destination end.

Imported

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b0c79d24dae87686667ea9/9E62BC52B0EEEF5EB7C7A6F8D9B832C7507BE84B8251D5C6E3FC1DD11BD8825C

8. Compare the data on the primary/secondary of A, B, and C, observe the capacity change, link relationship, and bottom-layer resource usage.

//The primary/secondary data and capacity are consistent, and the link relationship exists.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b0c79d24dae87686667ea9/9CC8CBFA5D5C26E47A24899BE35CEB4864A1DB2F27B12C63454180D2949771F4

C

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65b8d60c2fd12070025e57c7/65b0c79d24dae87686667ea9/46E6AF523CBCEFA55CC1EEAFEAA7396A4823D4CEFD413A3BB4CFDC39276579DB

Conclusion


Passed

Remarks

3.2.1.9 OST – Targeted A.I.R [ Backup – Duplication – Replication – Import from Replica]

Objective

To verify that the backup system can perform targeted A.I.R with following orders [ Backup – Duplication – Replication – Import from Replica] and [Backup – Duplication – Duplication]

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Configure the SLP. Site A replicates data to site B within the domain, and then site B replicates data to site C within the domain.
  2. Manually start the backup task and wait until the replication task is complete.
  3. Import and restore data at sites B and C, and verify data consistency.

Expected Result

  1. In step 2, the replication is successful. The copy is imported to the specified Master Server at the destination end.
  2. In step 3, the primary/secondary data and capacity are consistent, and the link relationship exists.

Test Result

1. Configure the SLP. Site A replicates data to site B within the domain, and then site B replicates data to site C within the domain.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b70ea924dae87686a24c52/58D9617EB4919A748B26622CD6DFBDF12D8EB317A10F6075CB4F18D80626BBB2

2. Manually start the backup task and wait until the replication task is complete.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b70ea924dae87686a24c52/EC8622164EB7DC50391B58BCE624D48E79F393E91E4D6DDE0FA0E8CB4A60CC5E

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b70ea924dae87686a24c52/F55FFEED95D48EFA15DA38F3301083B9078F7D085768AE795A2300F2B143D825

3. Import and restore data at sites B and C, and verify data consistency.

A

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b70ea924dae87686a24c52/6BB897B55D2546B495ADF183BD82EE979F2EE155C82D131CCFF1915E11789C64

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b70ea924dae87686a24c52/871C1C46452F67B5EB65BBF12BAB112717468AA58A651A46AB31416E69E5F2CF

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b70ea924dae87686a24c52/5C4E0DD090D3794A4A4CECE5E2DACBDCBD2B5542E86F841EA340CFE315EA09FD


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b70ea924dae87686a24c52/32BD1B2DD5F10337D6B81BE186B321C7A568077029F31F9C270DA2D7666E1113

B

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b70ea924dae87686a24c52/4AFA22FFC6EDADDB172C1E35F5E5E872F5C62DA7399EC8D119441B6BFD70B9AF
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b70ea924dae87686a24c52/3FAC2951EBC2628F8B05C59D25FB11F4FD0AD87ED715C550F01AD82E6AC5F381

C

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b70ea924dae87686a24c52/D1E4DA70134DDAEC4EDD43CE13B563A85CD25CCA7411C9F70CC5BA908A0EA1AF

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b70ea924dae87686a24c52/505DAB5FF382544AD42093A4411E655C70321EE854BAAEE4FDEE85827291840F

Conclusion


Passed

Remarks

3.2.1.10 OST – Targeted A.I.R [ Backup – Replication – Import from Replica]

Objective

To verify that the backup system can perform targeted A.I.R with following orders [Backup – Replication – Import from Replica]

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Log in to the Master Server as the system administrator.
  2. Configure the file replication link relationship between the Windows source LSU and the Linux target LSU (A->B).
  3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.
  4. Configure the storage unit and import policy on each destination end.

Expected Result

  1. In step 3, the configuration is set successfully.
  2. In step 4, the storage unit and import policy are configured successfully on each destination end.

Test Result

1. Log in to the Master Server as the system administrator.

2. Configure the file replication link relationship between the Windows source LSU and the Linux target LSU (A->B).

3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.

//The configuration is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/6BD40EC6C485A26F48516BE8E249D69C8D36C02816EDB2E0F4DE99FDB7899D0C

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/F62DBD2FDC312CA8A71124F9282B979C715AB53BD13F51B274D209F106B3562F

4. Configure the storage unit and import policy on each destination end.

Conclusion


Passed

Remarks

3.2.2 Optimized Duplication

3.2.2.1 OST – Backup and Restore Using Optimized Duplication-Enabled Storage Lifecycle Policy

Objective

To verify that the backup system can backup using optimized duplication-enabled storage lifecycle policy

To verify that the backup system can backup with true image restore using optimized duplication-enabled storage lifecycle

To verify that the backup system can restore optimized duplicate duplicated image

To verify that the backup system can restore TIR enable optimized duplicate duplicated image

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Log in to the Master Server as the system administrator.
  2. Configure the file replication link relationship (A->B) between the source LSU and multiple destination LSUs.
  3. On the source master server, configure the replication SLP policy and select Common Replication.
  4. Configure storage units on each destination end.
  5. On the source end, configure a backup policy based on the replication SLP policy (TIR is enabled for the backup policy).
  6. Set a scheduled backup task and perform the backup.
  7. When the replication period arrives, the replication task is executed.
  8. Import a copy from the secondary end and use the TIR mirror to restore the data to verify data consistency.

Expected Result

  1. In step 3, the configuration is set successfully.
  2. In step 7, the replication is successful. The copy is imported to the specified Master Server on the destination end.
  3. In step 8, the restoration is successful and data is consistent.

Test Result

1. Log in to the Master Server as the system administrator.

2. Configure the file replication link relationship (A->B) between the source LSU and multiple destination LSUs.

3. On the source master server, configure the replication SLP policy and select Common Replication.

//The configuration is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b4a40c2fd120700236a16d/BFE19F7E1C88FCB198349AA257560926A68E5782373C081E25D14D40F5A098CA

4. Configure storage units on each destination end.

5. On the source end, configure a backup policy based on the replication SLP policy (TIR is enabled for the backup policy).

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b4a40c2fd120700236a16d/070BB5DB9BBA80CBF4214E5E6A2AF61492E21448C744D16659AFCF0BA82ED74E

6. Set a scheduled backup task and perform the backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b4a40c2fd120700236a16d/6CF3976E6A9EE3175FD4B8B826F979A27DC2107BB51784BFEA4080E09EDDCEE0

7. When the replication period arrives, the replication task is executed.

//The replication is successful. The copy is imported to the specified Master Server on the destination end.

8. Import a copy from the secondary end and use the TIR mirror to restore the data to verify data consistency.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b4a40c2fd120700236a16d/1F056A5A275763837FA2D8CF04D1B925F3A8AFCEDD1EA6B77E841349BB28F6DF

Restored successfully.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b4a40c2fd120700236a16d/C63F3B33D210AAB9E3399B2A0BED4777934BCF0F542BBF3143073079270CF2E7

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b4a40c2fd120700236a16d/73AE7546FD6AF74C0AC53EE070252672C26D6527A2A4DEED9DB549E3AD04EE21

Secondary data

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65af5f6e24dae8768659d8ff/65b4a40c2fd120700236a16d/3633D46790E6EB74B1BAC60081E813AF22AF199FEF0AC8DBB4E230AD4BF56AD8

Conclusion


Passed

Remarks

3.3 Accelerator

3.3.1 Accelerator

3.3.1.1 OST – Confirm STS Functionality and Performance with Accelerator

Objective

To verify that the backup system can confirm STS functionality and performance with accelerator, with accelerator and multistreaming, with accelerator and true image restore, and with accelerator for INC backups

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

1. Create a storage server, disk pool, storage unit, and policy. (Enable the accelerator, TIR, and multi-stream function).

2. Insert the 1 GB file testfile_1 into the file system of the active node and perform differential incremental backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d711f824dae87686cab29f/AD0DC81D1B1C06E462DD76B60488C1F3C93CA59ABEC1A3D02FDC0CB14F8B90E7

3. Perform TIR restoration and verify the data consistency of testfile_1.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d711f824dae87686cab29f/F34259ADF646472B485054C3B0FC75B6DD9F5308059B5E8A52B2AD32477D6C9B

4. Insert the 1 GB file testfile_2 into the file system of the host and perform a synthetic full backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d711f824dae87686cab29f/12E4EB311A76017F3277A282ABADFD28B453A86D6B57F20CF13C1674EB75933B

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d711f824dae87686cab29f/AFEE5677EF7C9CCE3F7315AF8E442DE54C959F2B52AED12CC094FD2ABB38D625

5. Perform standard restoration and verify data consistency between testfile_1 and testfile_2.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d711f824dae87686cab29f/7369D6BD11049A37C3E5947544DBE35F2BA7EC7A13F2F5BDF75E7E1D87385307

Expected Result

  1. In step 1, the storage server, disk pool, and storage unit are created successfully.
  2. In step 2, the TIR incremental backup is successful.
  3. In step 3, the TIR data is restored successfully and the data is consistent.
  4. In step 4, the accelerated backup is successful.
  5. In step 5, the standard restoration is successful, and the data is consistent after the restoration.

Test Result

1. The storage server, disk pool, and storage unit are created successfully.

2. The TIR incremental backup is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d711f824dae87686cab29f/5F469D2DCCD4825C9D275E8DC500C807FD6B27A7625FE5C112858A11DF164E96

3. The TIR data is restored successfully and the data is consistent.

Restored successfully.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d711f824dae87686cab29f/ADD3A64392B4C4BDCC294697AA08A2B82AA80147E3F2DB0637AEE2AE35706474

Data Consistency

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d711f824dae87686cab29f/F91C7D3F5A7E4C4B082DC00AA22065D18FD7FF3F7180BB7F5E6B6FADF3946E80

3. The accelerated backup is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d711f824dae87686cab29f/089956734619C4C7A0C45EEA7A074563259B30ADF9789E2036CE56280E2E81E4

4. The standard restoration is successful, and the data is consistent after the restoration.

Restored successfully.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d711f824dae87686cab29f/E0B2945B169F0FBE2FB7D0BAAF4AA9E903FA60FBECEBDB82CCBD0172BD12FC83

Data Consistency

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d711f824dae87686cab29f/B02D5A1BAEBDFC631553205E74B0B37707A0687F00C23973FC8792096BCE913B

Conclusion


Passed

Remarks

3.3.1.2 Confirm STS Functionality with Accelerator and Multistreaming for NDMP

Objective

To verify that the backup system can confirm STS functionality and performance with simple accelerator for NDMP

To verify that the backup system can confirm STS functionality with accelerator and multistreaming for NDMP

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Create a storage server, disk pool, storage unit, and policy (enable the accelerator and enable the multi-streaming function).
  2. Insert data testfile_1 into the NDMP and perform incremental backup.
  3. Insert data testfile_2 into the NDMP and perform the accelerated backup.
  4. Restore data and verify data consistency between testfile_1 and testfile_2.

Expected Result

  1. In step 1, the storage server, disk pool, and storage unit are created successfully.
  2. In step 2, the incremental backup is successful.
  3. In step 3, the accelerated backup is successful.
  4. In step 4, the restoration is successful, and the data is consistent after the restoration.

Test Result

1. Create a storage server, disk pool, storage unit, and policy (enable the accelerator and enable the multi-streaming function).

Creating a storage server

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d73a130105145b3dc24a71/803CD2EE5CAD3956854DB4B5483CF18A325C0CD99D194DE85EFE0D912383BEAC

disk pool

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d73a130105145b3dc24a71/0C912954C4151CC54A9DB4F504F199BBCC65B56FDA2A9C161D442F77739F2070

storage unit

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d73a130105145b3dc24a71/2672544B59A0C0DD84637EE8BA3F87284634A9C427E03B4DD88E101AC0942E47

Policy configuration

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d73a130105145b3dc24a71/EF11C860BE726C52480451A47830373AE3B9429E54CCB9504998E36874613459

2. Insert data testfile_1 into the NDMP and perform incremental backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d73a130105145b3dc24a71/F3A52270B6F04B9584E1A90378AA9D1C3C40EAE72090697543E5F9FB2977D6AB

3. Insert data testfile_2 into the NDMP and perform the accelerated backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d73a130105145b3dc24a71/A7BCF8B6D7F437902A4E7CC5B717F0C50BE28676BE867AD40980AC0B3A308FD4


4. Restore data and verify data consistency between testfile_1 and testfile_2.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d73a130105145b3dc24a71/497B2679257FF7AD68A34E8D074DFA2C60401F329FEAFB987B42EC5670F7DF1C

Mount the corresponding file system.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d73a130105145b3dc24a71/8C676446AF01DE3C0EB51900F9F0556B2B991040FEEE2360A54C59AA07362275

Test01 is successfully restored.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d73a130105145b3dc24a71/C3001E7426DC175B9D0F14F10BA578EED7F8A7E530E71FE638EB2C47C8DA6ABB

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d73a130105145b3dc24a71/DBFB9E3DB814078F625607E712ABB70D7C083537FE7CA1D66CE1B6A675960448

Test02 is restored successfully.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d73a130105145b3dc24a71/CC6E057BD97F2C5FCEF032BB48693E12D067E32B283A69765ACC0494C67E31E7


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d73a130105145b3dc24a71/79F58FE876255C35192818985D2B6FDEB5D0C4325BB7B5FC7C510679C9D1992F


Conclusion


Passed

Remarks

3.3.1.3 Confirm STS Functionality with Accelerator and VMware

Objective

To verify that the backup system can confirm STS functionality with accelerator and VMware

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Create a storage server, disk pool, storage unit, and policy (enabling the accelerator).
  2. Insert the 1 GB file testfile_1 into the VM and perform incremental backup.
  3. Insert the 1 GB file testfile_2 into the VM and perform accelerated backup.
  4. Restore data and verify data consistency between testfile_1 and testfile_2.

Expected Result

  1. In step 1, the storage server, disk pool, and storage unit are created successfully.
  2. In step 2, the incremental backup is successful.
  3. In step 3, the accelerated backup is successful.
  4. In step 4, the restoration is successful, and the data is consistent after the restoration.

Test Result

1. Create a storage server, disk pool, storage unit, and policy (enabling the accelerator).

storage server

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d749062fd12070027a265c/F19466B01018B33AC47C7CB75EB4662D6A96A9993E01D5A85D14D614A0A1698E

disk pool

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d749062fd12070027a265c/338902A1447513670619AD7CFC5CE3FE5799485CE39B4EFA85F18BC37B26BEBB

storage unit

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d749062fd12070027a265c/D874336A8E280955C68AB89C8FE7285F83FFD2F9FB3FF06909523BAC726E911C

policy (enabling the accelerator)

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d749062fd12070027a265c/E2269FEA0F8FB49AC4D06F7516B88C1C79DA2B6BAB1EC56EBF9CA25A06CDA803


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d749062fd12070027a265c/540B3FB352248FBD60B1C608DF6E02BD4E61B28D6B29120DB517EE69924093E9


2. Insert the 1 GB file testfile_1 into the VM and perform incremental backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d749062fd12070027a265c/CB85CE7ED73E514E1F71EC8EF6C4D0FA6BE857255FDFD1D73864EA1D296EDFCD


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d749062fd12070027a265c/9B65B9B8BD0FC25876617B94342CBEB31475205C4E27D0EDCB807213ECA00A0A

3. Insert the 1 GB file testfile_2 into the VM and perform accelerated backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d749062fd12070027a265c/776013A547507788C58DF8F2F2103A2D50E7BEBF76505A33D9127208ECB66346


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d749062fd12070027a265c/275A2FE99CA3F6F13DA026DB505C3670785B31EE9E850D236715D1FE367842C9

4. Restore data and verify data consistency between testfile_1 and testfile_2.


Restored

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d749062fd12070027a265c/F443D97E308007FD99E60644E86B01B383057DE890D72DCC978C2C979C161D08
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d749062fd12070027a265c/F5F3C2392C41E64827F36C87CC4ACCDD6A12759814BD9F70568F96CB9605430D


test01

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d749062fd12070027a265c/357391E926CF298124BF80E99C999A97F91DE1372B0007094BB5706C9AD2BC74

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d749062fd12070027a265c/2761DAFEEC5D7E0033DF5FEDF027416BF77EA33DBF7CE011BB06D900CD808D06

test02

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d749062fd12070027a265c/A45394D8B97FE7DE51DA1F17F31D7D1A63FC896814B3C6390772F59B6BA4A129

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d749062fd12070027a265c/3FFCED6E3BCE7B89B017B72ADFDF724F9F34AF1436F5FCAEF2333A4E237754F7


Conclusion


Passed

Remarks

3.3.4 Confirm STS Functionality and Performance with Accelerator and GRT

Objective

To verify that the backup system can confirm STS functionality and performance with accelerator and GRT

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

1. Create a storage server, disk pool, storage unit, and policy (enabling the accelerator).

storageserver

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/ff7f3d1964904c59ac08495fcfb1573e/65d6b93f2fd12070027533f3/8D58E82C6BCED1394C143387B951382DB3CA758524AB25766F6CFC37418EE5F5

diskpool

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/ff7f3d1964904c59ac08495fcfb1573e/65d6b93f2fd12070027533f3/7FD98DEC2EEEF818EE5CBC4307D4ABE179B3B37E2271320C51237BBB54C99E13

storageunit

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/ff7f3d1964904c59ac08495fcfb1573e/65d6b93f2fd12070027533f3/76271CA33B15C79BC5AD3E80E5542E6F9C9AD11740B07A9E0FDDC842DFF43742

2. Insert the 1 GB file testfile_1 into the VM and perform full backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d6b93f2fd12070027533f3/F6B8E1ADC6B4AA163FC808CD5087EF09E4368DD78DB0C1E2FA4868FC5E3D6ECA

3. Insert the 1 GB file testfile_2 into the VM and perform incremental backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d6b93f2fd12070027533f3/26780B812C84341B469E4F78B610A4F5C8904C25E850B4DA251B1E0FF3936018

4. Modify the 1 GB file testfile_2 on the VM and perform accelerated backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d6b93f2fd12070027533f3/482B5094E55D09634FFEA43C0876E1A869DEEDC4860E94D9090CD5BB6CA397B5

5. Perform fine-grained restoration, restore only testfile_2, and verify data consistency.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d6b93f2fd12070027533f3/99404000A6D98B10DB6C1E453F16DF63A097CE905EB9C2E839F9C06AD695A266

Expected Result

  1. In step 1, the storage server, disk pool, and storage unit are created successfully.
  2. In step 2, the full backup is successful.
  3. In step 3, the differential incremental backup is successful.
  4. In step 4, the backup is successfully accelerated.
  5. In step 5, the fine-grained restoration is successful and data is consistent.

Test Result

1. The storage server, disk pool, and storage unit are created successfully.

2. The full backup is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d6b93f2fd12070027533f3/4A30E7EFC2D5435A944B4142981CE977508FF2D985FFD210116FA92820E8D077

3. The differential incremental backup is successful.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d6b93f2fd12070027533f3/8D785209EF8A639E3BD1FB123E94622C41EEC74C28385425F5B27428B8E657D4

4. The backup is successfully accelerated.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d6b93f2fd12070027533f3/2B45D4423226DBBA42C60EB4607A3EADDCC530C862EE88D73A73FAEC2CD028FC

5. Fine-grained restoration is successful and data is consistent.

Restored successfully.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d6b93f2fd12070027533f3/3B84D9AFBBE9CEDBAC7AF68F0618D5B99AC2E88B325D89B4FD67E3037B999B49

Data Consistency

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d711f70105145b3dc01a79/65d6b93f2fd12070027533f3/3F3369AE2574506F5AD4FD145333C834CE9161AC52E32131E62437BD6F08FF28

Conclusion


Passed

Remarks

3.3.2 Optimized Synthetics

3.3.2.1 Optimized Synthetic Backup and Restore

Objective

To verify that the backup system can perform scale differential incremental, synthetic full backup, and optimized synthetic backup and restore

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common file system should be created on the storage array.

Procedure

  1. Create a storage server, disk pool, storage unit, and policy.
  2. Insert the 1 GB file testfile_1 into the file system of the active node and perform incremental backup.
  3. Insert the 1 GB file testfile_2 into the file system of the host and perform a synthetic full backup.
  4. Restore data and verify data consistency between testfile_1 and testfile_2.

Expected Result

  1. In step 1, the file clone function in the OST plugin is enabled successfully.
  2. In step 2, the incremental backup is successful.
  3. In step 3, the synthetic full backup is successful
  4. In step 4, the restoration of data is successful and data is consistent.

Test Result

1. Create a storage server, disk pool, storage unit, and policy.

Policy Settings

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65a260730105145b3ddaec09/65d5feed0105145b3db67c80/833E762AA73346E97B363EDFAE44EC0F8BE5F80DF8B6773DCCF5BAF34D52AC33
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65a260730105145b3ddaec09/65d5feed0105145b3db67c80/6A83007C73B8A7F709406B1A4ABB6FF6C99E623C57859D8FDCB02AAC740BD54D

Enable fileclone.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65a260730105145b3ddaec09/65d5feed0105145b3db67c80/2188703CA68F3E3BF0B817BF87F42460AAE59DEAC1628D102BB08759550EB0E3

2. Insert the 1 GB file testfile_1 into the file system of the active node and perform incremental backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65a260730105145b3ddaec09/65d5feed0105145b3db67c80/F312529A8B696642413F9F1752A28DD28763C728E2C3C68AEC8EB680A7FCE737

3. Insert the 1 GB file testfile_2 into the file system of the host and perform a synthetic full backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65a260730105145b3ddaec09/65d5feed0105145b3db67c80/6FC83210FC86F84412EAA10B1F46720935FFF70E6E369E17D7BB494BE2398ABC

4. Restore data and verify data consistency between testfile_1 and testfile_2.

First backup

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65a260730105145b3ddaec09/65d5feed0105145b3db67c80/E151CD66DD7CFE35B59BE0718E0526025C9E388549648A40E4B47E4782B5F976

Second Increment

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65a260730105145b3ddaec09/65d5feed0105145b3db67c80/B67C285F49C8FEE82A1F109AF006FA9C8B170547EC43873C061C39491997E02B

Conclusion


Passed

Remarks

3.4 Recovery

3.4.1 Granular Recovery Technology

3.4.1.1 Optional GRT-Testing Media Server Configuration

Objective

To verify that the backup system can perform selective restore of file on image and optional GRT-testing media server configuration

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The common CIFS file system should be created on the storage array.

Procedure

  1. Create a storage server, diskpool, and storage unit.
  2. Back up all files and restore them.
  3. Perform differential incremental backup and restore files.
  4. Permanently perform incremental backup and restore files.

Expected Result

  1. In step 2, the backup and restoration of all files are successful.
  2. In step 3, the differential incremental backup and restoration of files are successful.
  3. In step 4, the permanent incremental backup and restoration are successful.

Test Result

1. Create a storage server, diskpool, and storage unit.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65a260730105145b3ddaec09/65a260730105145b3ddaec0b/6B8DDECFFD6D6BFEAD9552F4640C199CC750F0503A918276E7427B9E71DF80C5

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65a260730105145b3ddaec09/65a260730105145b3ddaec0b/260E8D5C1023DCFD7299BCF4FDB014C70F8A24A4DBD4605922A308B2563C3D40

2. Back up all files and restore them.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65a260730105145b3ddaec09/65a260730105145b3ddaec0b/0BEA9344BED83A1C7DB7203735F0A69A725948D9E0120C09D09AD65B064C683A

3. Perform differential incremental backup and restore files.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65a260730105145b3ddaec09/65a260730105145b3ddaec0b/B524E22B3E599F96DF01BF1D5FCD7838D42767E01AD3C47D0875A898A6F51C67
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65a260730105145b3ddaec09/65a260730105145b3ddaec0b/95A70247CC040E34988B7754D76D5E5C0B13B94AF55FB788A2EE10CA1D5CF1DF

4. Permanently perform incremental backup and restore files.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65a260730105145b3ddaec09/65a260730105145b3ddaec0b/DBC225967064CC74BEB07B0EDE5D7BD9643C8FC75AB1F8A032490C6BB19972A7

Conclusion


Passed

Remarks

3.5 Data Security

3.5.1 WORM

3.5.1.1 OST – WORM Optimized Duplication Tests

Objective

To verify that the backup system can perform WORM import

To verify that the backup system can perform WORM optimized duplication

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The WORM file system should be created on the storage array.

Procedure

  1. Log in to the Master Server as the system administrator.
  2. Configure the file replication link relationship between the source LSU of the worm and the non-destination LSU of the worm. (A -> B)
  3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.
  4. Configure storage units on each destination end.
  5. On the source end, configure a backup policy based on the replication SLP policy.
  6. Set a scheduled backup task and perform the backup.
  7. Execute the replication task when the replication period arrives.
  8. Compare the data consistency between the A and B primary/secondary, observe the capacity change, link relationship, and bottom-layer resource usage.
  9. Check whether the copy on node B can be modified and deleted.
  10. On the source end, configure a backup policy based on the replication SLP policy.
  11. Set a scheduled backup task and perform the backup.
  12. Execute the replication task when the replication period arrives.
  13. Compare the data consistency between the A and B primary/secondary, observe the capacity change, link relationship, and bottom-layer resource usage.

Expected Result

  1. In step 3, the configuration is set successfully.
  2. In step 7, the replication is successful. The copy is imported to the specified Master Server at the destination end.
  3. In step 8, the primary/secondary data and capacity are consistent, and the link relationship exists.
  4. In step 9, the copy of node B can be modified and deleted.
  5. In step 12, the replication is successful. The copy is imported to the specified Master Server on the destination end.
  6. In step 13, the primary/secondary data and capacity are consistent, and the link relationship exists.

Test Result

1. Log in to the Master Server as the system administrator.

2. Configure the file replication link relationship between the source LSU of the worm and the non-destination LSU of the worm. (A -> B)

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/C3239876F0676B6CD5F8FC5BC1C8AF3B83B3338725CB9AB936929BBD3D42AA1F

3. On the source master server, configure the replication SLP policy, select Replication, and select Target master server.

//The configuration is successful.

4. Configure storage units on each destination end.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/87BF615EED8AD2B971BDB274FECCB06642B6C7480322C27F301CD335FEF007FB

5. On the source end, configure a backup policy based on the replication SLP policy.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/72580CABC38E0C46C8E9C074BC5C4D107059D54244AD24E4F4900FFE1A31F0AE

6. Set a scheduled backup task and perform the backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/12CA3C8BE0DF40BCA87D658FE177159B52DFA81973F93A9462EBB2B115ED1E65

7. Execute the replication task when the replication period arrives.

//The replication is successful. The copy is imported to the specified Master Server at the destination end.

Backup task

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/5DDA0A0FD03034A1B87C8DB7F95B47D235981220933BFA9544B492CF8DB56893

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/EEF123480B813348FD1E4CABD6C38B8F363390498627ED7471111F84E61810A3

8. Compare the data consistency between the A and B primary/secondary, observe the capacity change, link relationship, and bottom-layer resource usage.

original

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/FA4FC0961345C719C4B24A36C17FDE41DB8F45AF9B55907508A6097B3C73A3FB

copy 1 is the primary.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/B3728FCF2CE7D25E1BF85B3C9376C4204C5DB2995E7311CEEBFBF40D1D75E10A

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/90245EAFEE89817D9669ED44843A6A727BFBC93B7FC48A13BAACFECCE60ADA95

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/B7047F16E5214039B255178BBD19A546BB2FB9C5A677DD4E3FC227A090B24935

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/798B8DA81B6E6353E4AB189747A2247ECFA5268B0DFC6F1C581711506560F37B

Set copy2 to primary.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/102DC614A0592E4A2C84AF391CAFA92D4D214F86E9B9937B89191FB77A8BF81A


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/E32111A48E3503B5FE3BFA273145B9F087472F71D818FFCD9810E9D94FBB8249


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/3A777299B528198BF98BAB1EC0A89F5D5EF3F9ABBC5431B7333B2F07307BA498

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/E139FAC4E734516D8DAF3010F0BFC745EBB53A58059361694C0164F3DF3A67D6

//The primary/secondary data and capacity are consistent, and the link relationship exists.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/C6444205F6EA4C047A6CF446BCBB390A8238B16B14AFF2D57BC46A99699C70B7


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/D95A77396AFFB49EC6A6D616FA9330169EC66F2ED97B483AB6C758B14B8A0C81


9. Check whether the copy on node B can be modified and deleted.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/2AC018AD4CEA2E3A5857046A69C22FACE9D54DFF3D5D030E351DC643F67687B0

//The copy of node B can be modified and deleted.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d4535724dae87686b14447/B3C515376AEE19EB7B32F464F9B7808239E2DB9017CBEF40D232D10F37B3D933

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/4E11BB94C08E47C9BF7B576AFDDBFDA59C3A89C8034BABD4E07E2F79801B2C7A

10. On the source end, configure a backup policy based on the replication SLP policy.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/8643688C29E34745C4E9566415FCAC808291BE3A11D42D2EFEAFEE9544AAB8A7

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/161D950995EE7A637A583EE1B197E76E58CDC8A00FC4B1A20705D446D4445B4D


11. Set a scheduled backup task and perform the backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/DBEEF0999E1DF956B19AE4E515B49CF80B35C5A8C69D66F991E6C8C9676D64B2


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/13E02AC4D128BC2ED67A61D58404C68BB5865992A581E7F79B5FDCEEDD7E6AC3

12. Execute the replication task when the replication period arrives.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/467B86D6E0E94CB4A868811979ECA2746B0F775D6E0E8C72945EF7559F2C6140

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/566EA206A254450400F5192CB70D0F539716D5E9CE368F94F8D1A1217F1803F2

//The replication is successful. The copy is imported to the specified Master Server on the destination end.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/B68D1A0655C10D814DABEBAF171C42021963CAFEF00F2F0508A02FA89CFC3F60


13. Compare the data consistency between the A and B primary/secondary, observe the capacity change, link relationship, and bottom-layer resource usage.


Capacity

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/51EC89C943D0087593581A2D7E39FB137BF783C27384A85E2B4F821617DD1E65

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/AC1BA1B39FBF62322507D7F1591C35E2257F9D3692528FA9721A65878AE60CFC

link

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/CD995905D62FB5F3D9A4B817CB929E7FF91C95D49C9378A45157736D74C7B104

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/7F6A851158261F3C21C990D21F279116409C201DFE2490664E697BE2F2EB7002

//The primary/secondary data and capacity are consistent, and the link relationship exists.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/28DF090186671F91A5B9E4009E6881454762BA66AF68397C4151884AE19043FA

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/E232397F1E4A7A9D5C4589849E5214C044101797BE89F97494FCCA65F82CDF80

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/1DEEB2C56CAF5EA4420126B04DF3DB769300C14698D871DEA218111F14593F7F

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/57F1170E366D2E7BC1BA9AC139DA34F2272F5E2F8707222E957A47468033B37A

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/7EF3A0DB6C29AE8A51D23741FD4C316C770FC5C9D8B82B5B87B80A76890D05A8

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65abc2d02fd1207002e3bd6d/65af29a039cc4839ecb8d08d/F1DD962612CD702D2249A352502E6768EA8E2014A9D785A99D3D99A562366DED

Conclusion


Passed

Remarks

3.5.1.2 OST – WORM Image Expiration

Objective

To verify that the WORM image can expire normally

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The WORM file system should be created on the storage array.

Procedure

  1. A regulation-level worm file system is created on the storage.
  2. Add storage servers, disk pools, and storage units to the NBU.
  3. Create a backup task to back up the image to the Worm file system and set the protection period.
  4. Modify the document outside the protection period.
  5. Delete files beyond the protection period.

Expected Result

  1. In step 4, the modification of the document fails.
  2. In step 5, the deletion of the document succeeds.

Test Result

1. A regulation-level worm file system is created on the storage.

2. Add storage servers, disk pools, and storage units to the NBU.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d33b8e24dae87686a6f6fd/237EBAF26F0E9D6CB444F02D2BA08C19A53EB5D044CAA70F833AF2E6ACBE950C
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d33b8e24dae87686a6f6fd/B0FC069D721B85AA2136E676B1BD676003481D99BB85F42F47B5D6E8D62D9AA8

3. Create a backup task to back up the image to the Worm file system and set the protection period.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d33b8e24dae87686a6f6fd/60EFAB4F61FE8EBCBC83A3DBA0FD7DBDB361247447E610FA285D5AD1AC60C917

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d33b8e24dae87686a6f6fd/A15555B062988352926446C569649F78980F1806BB7C2A99B28A8F4276D04084


4. Modify the document outside the protection period.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d33b8e24dae87686a6f6fd/952487C37CE4F9E913416D11DAAA884369486695C91CDE0E8E6251C10719FCF6


① Changing the Protection Period

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d33b8e24dae87686a6f6fd/A98A91E4061C3944AA9562596A5FACC97E78C601B4D048C4F0BB259B86D941BE

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d33b8e24dae87686a6f6fd/7706828E50696E59F8B33590E7B9CDE88FA39B2B11122A2306B67F2786B9AED1

② Modify File

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d33b8e24dae87686a6f6fd/2F8EA05982775B2AD4AEFC155CD4B098B16B86A203409B2508127F6B32D9B28D

5. Delete files beyond the protection period.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d33b8e24dae87686a6f6fd/9A6F9C082EFC3BA26A0D20EE629947E6B89A4FF11DB7E617A69341B45995DD05

Conclusion


Passed

Remarks

3.5.1.3 OST – WORM Extended Expiration

Objective

To verify that the backup system can extend WORM expiration

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The WORM file system should be created on the storage array.

Procedure

  1. A regulation-level worm file system has been created on the storage.
  2. Add the storage server, diskpool, and storage unit on the NBU.
  3. Create a backup task to back up the image to the Worm file system and set the protection period.
  4. Extend the protection period of the image within the protection period.

Expected Result

  1. In step 3, the protection period is set successfully.
  2. In step 4, the protection period is extended successfully.

Test Result

1. A regulation-level worm file system has been created on the storage.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d3112024dae87686a6302c/FB0C6D28181E920CAC9D0FFDDA117E49F3F6168989486916F174C0D752862F1D

2. Add the storage server, diskpool, and storage unit on the NBU.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d3112024dae87686a6302c/CB7A18670BCE82D3BE12B6EEFC5E8BFDCCC94090513D30E7642E0B8E4EAF0E2C


3. Create a backup task to back up the image to the Worm file system and set the protection period.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d3112024dae87686a6302c/AD3AB2FC0B84226E53A1485742697702BE1876DEC04FE464CD4AB47DC9A87AA6


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d3112024dae87686a6302c/5930F57446BE8CC43B5CD2792F2E273EDC1F068B940791D37D73655DA581B7A0


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d3112024dae87686a6302c/83A2AFDBEC83E8AF2BEF291B083E7E199B8D6F50DCB888177182E62B98C0CA81

4. Extend the protection period of the image within the protection period.

fronts

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d3112024dae87686a6302c/65EBDED40C153DACB8990AC4238D457A2F1E34526186DA398E5A1D90B7FBD229

change

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d3112024dae87686a6302c/BB4DCFF9A2B78F420A90029C1C03195DE1E1AD7927071A86023D1A5EF03D5801

After

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d3112024dae87686a6302c/BC8F1A0EBBCB41B84783D39BB7DB1F22D131A6D22B5540465E4B620B95C33906

Delete

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d3112024dae87686a6302c/BD2C1DB6C83969050AF69102C707913178113A66D162130D33B671877187534A

Conclusion


Passed

Remarks

3.5.1.4 OST – WORM LSU Check Point Restart

Objective

To verify that the backup system can perform WORM LSU check point restart

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The WORM file system should be created on the storage array.

Procedure

  1. Create a storage server, disk pool, storage unit, and policy. Enable resumable download and set the interval to 5 minutes.
  2. Insert the 100 GB file testfile_1 and perform full backup.
  3. During the backup, the task is suspended for 10 minutes.
  4. Pause the task for three minutes and resume the backup task. The backup is complete.
  5. After the restoration, check data consistency. After the copy expires, verify space reclamation.

Expected Result

  1. In step 4, the backup task is completed successfully.
  2. In step 5, the data is consistent. After the copy expires, the space is successful reclaimed.

Test Result

1. Create a storage server, disk pool, storage unit, and policy. Enable resumable download and set the interval to 5 minutes.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d54f8724dae87686bb41bf/BB2D44118EFDB07B256427982EC6094C036430F94108EB755197404D1FD41D50
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d54f8724dae87686bb41bf/56B82CE7AA1C67257A03ACA3A34C55140498DFFBA962DDB0F883110C7A00869E
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d54f8724dae87686bb41bf/FE7A805DD3C3CBC524E436CCEAF8FCEF0FD9CFF678947B8D8FB8D421FADF1EA2
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d54f8724dae87686bb41bf/8859D46CE57D29CCD6B5F89EAFCDFAEBEED571732D524F01C41C9C2206463A12


2. Insert the 100 GB file testfile_1 and perform full backup.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d54f8724dae87686bb41bf/FC716DCFBA802B4E36D713B7CFC5B37F81CA8251E741D2486F0BDD8396E7C6EB

3. During the backup, the task is suspended for 10 minutes.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d54f8724dae87686bb41bf/B9DD79AEEECDD22E7BD47772F92D166EF5AF8B1EB3496C1A050CC71CC57CC1BC
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d54f8724dae87686bb41bf/30C460ECA410DD89EFB62C835DE30CF985FF54C5B6336B6706BCEE9C50C94D34

4. Pause the task for three minutes and resume the backup task. The backup is complete.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d54f8724dae87686bb41bf/FA5D9882A072B429F82153F7DDDE6522B8419180067F32D532FA39D9DC8B025B

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d54f8724dae87686bb41bf/1BAE71D2B7F4983989BA303E9BD470D305C26D48F3C41F3742E97D6DD77D682D

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d54f8724dae87686bb41bf/02977240B1A9F815965711CF797F3483B458F772841C1084E810CD4CE52E38A8

5. After the restoration, check data consistency. After the copy expires, verify space reclamation.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d54f8724dae87686bb41bf/BB923CEDF935E6E5861B7643DB93A889CA934E648E6E23F0A3EDE5F44E8A6562

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d54f8724dae87686bb41bf/EF01467B8A3CABBE662364AADFCD03264315B2472965E7628524E10386B56176

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d54f8724dae87686bb41bf/8B85745A337EB4F953F63ECA256DACECC125FF600C44C062A8AB89BAAF939832

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d54f8724dae87686bb41bf/F09C4D9CBBE02785BD7A512E75F565BC962FF39FD99B65F285CD891FC1CB4C3C

Conclusion


Passed

Remarks

3.5.1.5 OST – WORM LSU Full Error

Objective

To verify that the backup system can raise WORM LSU full error

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The WORM file system should be created on the storage array.

Procedure

  1. Use the Worm file system to create a storage server, disk pool, and storage unit, set the high watermark threshold to 80%, and preconfigure data to the LSU so that the capacity reaches 80%.
  2. Back up another group of data to the LSU so that the capacity of the LSU exceeds 80% but falls below 100%.
  3. Delete all copies and back up a group of data to the LSU again. The data size exceeds the total capacity of the LSU.

Expected Result

  1. In step 2, the insufficient disk space or high-water mark error is raised and the backup of client exited.
  2. In step 3, the no space left on device error is raised, and the backup is aborted.

Test Result

1. Use the Worm file system to create a storage server, disk pool, and storage unit, set the high watermark threshold to 80%, and preconfigure data to the LSU so that the capacity reaches 80%.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d2c4e239cc4839ec03a5b3/59772745FC1DC3242DDDE462A78FC5CD1D2CC6BA724F5AF9AA0F24011FCE77A9
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d2c4e239cc4839ec03a5b3/AB2BC747DD812BCA5831D81093AB3489B59196C451BFDA7BADE26BA755257FBF

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d2c4e239cc4839ec03a5b3/6A46709DA3116C0DB5129108C560709AE5E1DF9FF9F81EB693C39664C49B151D

2. Back up another group of data to the LSU so that the capacity of the LSU exceeds 80% but falls below 100%.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d2c4e239cc4839ec03a5b3/DAE16943790A4D9340EB797EA17C0BF126B8AAAFB6C6D3B781BA440111C73F5C

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d2c4e239cc4839ec03a5b3/38475109213D96D759DE666867026DFE48C5DC4D83EA4D457FE20F24619D4035

3. Delete all copies and back up a group of data to the LSU again. The data size exceeds the total capacity of the LSU.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d2c4e239cc4839ec03a5b3/900351D9EC509003A4D69343821048C3E6BE9793063B7E8CBD4186613A365A36
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d2c4e239cc4839ec03a5b3/89A9BF349B730E825AA4A306C312F7DDE3B182082975AE6B7D2204614ABE6555

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d2c4e239cc4839ec03a5b3/C8C11AEC42F650DD4B8DB2FDB8AC4B54A18D63EA45CBE5EDB0B691E57C70EEB9


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d2c4e239cc4839ec03a5b3/29BC2C50ECF7E863B9398C7EFFC011A208A4BFCFB34D57DFD6386B396BC2A1FF

Conclusion


Passed

Remarks

3.5.1.6 OST – WORM Indelibility and Immutability

Objective

To verify the WORM indelibility and immutability of the backup system

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The WORM file system should be created on the storage array.

Procedure

  1. A regulation-level worm file system has been created on the storage.
  2. Add the storage server, diskpool, and storage unit on the NBU.
  3. Create a backup task to back up the image to the Worm file system and set the protection period.
  4. The image expires within the protection period.
  5. Modify and delete files within the protection period.

Expected Result

  1. In step 3, the backup task is successful.
  2. In step 5, the modification and deletion of files fail.

Test Result

1. A regulation-level worm file system has been created on the storage.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d31c8e39cc4839ec05bd2e/41318190DB44B8BA439D37F4AD26C3E0D0EFE28C1E1A5642979F24483BDBE650

2. Add the storage server, diskpool, and storage unit on the NBU.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d31c8e39cc4839ec05bd2e/BF63D50EB7A868BAAE42CCC4BB5F400CBC494574FD7EA51AEDC20CEA718C9328

3. Create a backup task to back up the image to the Worm file system and set the protection period.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d31c8e39cc4839ec05bd2e/C4255CE02721E05DCA87F3EC03117BAE751370C4B836AD8A53A20A4F0411FE1B

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d31c8e39cc4839ec05bd2e/8C70DD664B22B73BBF281EF31A98AB1B438754DE00F77DC1BE76801D0F67FB7A

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d31c8e39cc4839ec05bd2e/BD02C1BAA3F3D5259252ADDC100337BD502D5BBE872F1E84CAD3917F07C34684

4. The image expires within the protection period.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d31c8e39cc4839ec05bd2e/C99072E6AE9E54B816F51FFF2D3C2CA87C10F396B85D6676063F5D8EF12CA311

5. Modify and delete files within the protection period.

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d31c8e39cc4839ec05bd2e/EAB1E2FDA841627CEA937014335596A6FFABB2738A6A40532A45323027974CC1

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d31c8e39cc4839ec05bd2e/FF9D0E7C7995FC0957AAD77529C745A187B78D17C104EE38536DFDD2F98D973B


Conclusion


Passed

Remarks

3.5.1.7 OST – WORM Retention Levels

Objective

To verify WORM retention levels of the backup system

Networking

Networking diagram for verifying functions

Prerequisites

  1. The backup system should be available and accessible.
  2. The NBU OST plugin should be installed and configured properly.
  3. The storage server should be created using the data protection administrator role account.
  4. The WORM file system should be created on the storage array.

Procedure

  1. Create a Worm file system on the storage system and set the maximum and minimum protection periods to 4 days and 2 days respectively.
  2. Add the storage server, worm disk pool, and storage unit to the NBU.
  3. Set the worm lock period to 1 day and 5 days.
  4. Set the worm protection period to 2, 3, or 4 days.

Expected Result

  1. In step 3, setting worm lock period fails.
  2. In step 4, setting worm protection period succeeds.

Test Result

1. Create a Worm file system on the storage system and set the maximum and minimum protection periods to 4 days and 2 days respectively.
2. Add the storage server, worm disk pool, and storage unit to the NBU.
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d56b392fd1207002681ce5/10A6A4A8AE5E73CDA31671A07FC7DFB0C72685E20D772AF6374827ECEB52D374http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d56b392fd1207002681ce5/EC8A9049B88328D8BA3E4E24BAFC7A02E12057B818E0206B82CC42FCEEDAFE54http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d56b392fd1207002681ce5/E5C157EDA7FE86CDB8F4D15637AA59B3FDE19CCE7F0EF02366AB5EC983FCB7C1 3. Set the worm lock period to 1 day and 5 days. 1day
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d56b392fd1207002681ce5/F449158B5759BE2FDA811FAF477BD22D34F7579647AE3CC542D5A685CD0603A0

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d56b392fd1207002681ce5/0A19283EB53FE3F33176331E0CB08FB4445F3F9ADBE5D468589D05017C31D344

5 day
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d56b392fd1207002681ce5/C0BDA233B8219D75FCAB33E4D7BDC5914C711E1B0C2DE0A12D7D9CCA12B3963F


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d56b392fd1207002681ce5/0A19283EB53FE3F33176331E0CB08FB4445F3F9ADBE5D468589D05017C31D344



4. Set the worm protection period to 2, 3, or 4 days.

2 days
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d56b392fd1207002681ce5/188472937DC4361AF5D3F061E9987C49251BC6C61697963C57782643428F9AE2


http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d56b392fd1207002681ce5/AFD91EE7D101CCB92936EE8E8E16F222D52B85FB1F2DC06E7F16324667649B42


3 days
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d56b392fd1207002681ce5/0DBABBCB2AF1399E87F04A55C7249DA98BF971255F2E1315408D957972F86880

http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d56b392fd1207002681ce5/1407D3541C46A91182B1E77961ADFD24B7A25336F8CA054A7C59550C982D7E91


4 days
http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d56b392fd1207002681ce5/9D77069C933EB364B40971EB90F9571B2AAA47676A52A914F423E8DD82CBE2B7http://s3-kp-szv-gen.hics.huawei.com/obs-tdb-product-green-01/%2Fdatafoundation/02_dorado_v6/sr/6d7469b9963443a3ba190f6e651642b5/65d2c0ed0105145b3d99e91f/65d56b392fd1207002681ce5/6DF089596C797023B57480954DD57F3FE886BE447D74F0B4210473E90A80EC6D


Conclusion


Passed

Remarks

4. Verification Result

4.1 Test Result

Table 4-1 The following table lists the result of each test case.

Category

Case No.

Case Name

Test Result

Basic Functions

3.1.1

Creation of Storage Server, Disk Pool and STU

Pass

3.1.2

Open Storage Backup, Import, Verify

Pass

3.1.3

Duplicate from BasicDisk to OST

Pass

3.1.4

Cumulative Incremental Backup

Pass

3.1.5

Inline Tape Copy Backup and Restore

Pass

3.1.6

Policy Configuration for OpenStorage

Pass

3.1.7

Backup with TIR Move Detect

Pass

3.1.8

Backup with TIR No Move Detect

Pass

3.1.9

User Archive Backup

Pass

Replication

3.2.1.1

Targeted Auto Image Replication

Pass

3.2.1.2

Bi-directional Targeted A.I.R. Replication

Pass

3.2.1.3

Inject NetBackup Failure During Targeted A.I.R. Replication

Pass

3.2.1.4

Break Implementation Replication Link During Targeted A.I.R. Replication

Pass

3.2.1.5

Targeted A.I.R. Replication when Target Data Storage is Full

Pass

3.2.1.6

Trigger Multiple Events for A Single Targeted AIR Image (previous replication succeeded)

Pass

3.2.1.7

Perform Backups/Restores with Fan-out Targeted A.I.R

Pass

3.2.1.8

Perform Backups/Restores with Cascaded Targeted A.I.R

Pass

3.2.1.9

OST – Targeted A.I.R [ Backup – Duplication – Replication – Import from Replica]

Pass

3.2.1.10

OST – Targeted A.I.R [ Backup – Replication – Import from Replica]

Pass

3.2.2.1

OST – Backup and Restore Using Optimized Duplication-Enabled Storage Lifecycle Policy

Pass

Accelerator

3.3.1.1

OST – Confirm STS Functionality and Performance with Accelerator

Pass

3.3.1.2

Confirm STS Functionality with Accelerator and Multistreaming for NDMP

Pass

3.3.1.3

Confirm STS Functionality with Accelerator and VMware

Pass

3.3.1.4

Confirm STS Functionality and Performance with Accelerator and GRT

Pass

3.3.2.1

Optimized Synthetic Backup and Restore

Pass

Recovery

3.4.1.1

Optional GRT-Testing Media Server Configuration

Pass

Data Security

3.5.1.1

OST – WORM Optimized Duplication Tests

Pass

3.5.1.2

OST – WORM Image Expiration

Pass

3.5.1.3

OST – WORM Extended Expiration

Pass

3.5.1.4

OST – WORM LSU Check Point Restart

Pass

3.5.1.5

OST – WORM LSU Full Error

Pass

3.5.1.6

OST – WORM Indelibility and Immutability

Pass

3.5.1.7

OST – WORM Retention Levels

Pass

4.2 Conclusion

According to the test results, OceanProtect backup storage supports basic functions, target A.I.R, accelerator, granular recovery, WORM, optimized deduplication, and optimized synthesis of NetBackup OST. OceanProtect backup storage is compatible with NetBackup OST plugin.