<img src="//bat.bing.com/action/0?ti=5794969&amp;Ver=2" height="0" width="0" style="display:none; visibility: hidden;">

The Cost of and How to Prevent a Data Security Breach

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] October 12, 2017 [fa icon="tags'] Email Security, Data Security, Information Security, Data Backup & Recovery, Data Storage

Data breaches have been a hot topic the last few weeks with the Equifax mess headlining the news. Today it seems like there is a new company losing its customers’ personal data every week.

Read More [fa icon="long-arrow-right"]

Are you confident in your Disaster Recovery plan? Request a Free Review

[fa icon="pencil'] Posted by Scott Pelletier [fa icon="calendar'] August 30, 2016 [fa icon="tags'] Data Security, Data Backup & Recovery, Data Storage, Managed Services, Cloud Computing, Microsoft Azure, Managed Infrastructure & Helpdesk

In the case of an outage, it's important for organizations to prepare their disaster recovery (DR) strategy now so they have a plan in place to prevent business downtime and revenue loss.

Read More [fa icon="long-arrow-right"]

How To: Azure Resource Manager VM Level Backup & Restore Without Snapshots

[fa icon="pencil'] Posted by Phillip Martin [fa icon="calendar'] August 25, 2016 [fa icon="tags'] Microsoft, Microsoft Windows, Microsoft Azure, PowerShell, How To Guide, Data Backup & Recovery

One basic task I found very underwhelming in the Microsoft Azure Resource Manager (ARM) portal was the backup. If you're thinking about taking a snapshot of a server as a precaution before you make any updates—sorry—snapshots don’t exist. You'll have to replace snapshots with backup and restore. I’ll break this down into the three parts: Backup, Recover, and Restore.

Read More [fa icon="long-arrow-right"]

How to Manually Populate the Software Cache in CommVault v11

[fa icon="pencil'] Posted by Dan Booth [fa icon="calendar'] June 28, 2016 [fa icon="tags'] Virtualization, Data Backup & Recovery, How To Guide, CommVault

In prior versions, the ability to populate the software cache was done automatically but this feature has been removed. But by manually populating the software cache, the push of agents in the environment can be done immediately after the upgrade of the CommCell versus waiting hours for the automatic download to finish.

In this post I’ll walk you through the steps required to populate the software cache using the Copy Software feature built into CommVault.

Read More [fa icon="long-arrow-right"]

Commvault Simpana v9.0 End of Product/Support Life Announced

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] April 26, 2016 [fa icon="tags'] Data Backup & Recovery, Lewan News & PR, CommVault, Product Announcements

When these announcements cross my desk, I sometimes worry how many people actually pay attention, especially when the end of life date is still a year away.

So I want to call attention to one of the latest Commvault End of Product/Support Life announcements: Simpana v9.0.

Read More [fa icon="long-arrow-right"]

Lewan Named as 2015 CRN Triple Crown Award Top IT Services Companies

[fa icon="pencil'] Posted by Allie Perry [fa icon="calendar'] December 9, 2015 [fa icon="tags'] Managed Services, Virtualization, Data Backup & Recovery, Lewan Awards & Certifications, Cloud Computing, Managed Infrastructure & Helpdesk, Data Security, IT Solutions, Data Storage, Unified Communication & Collaboration

Lewan Technology is proud to announce that we have been honored with the esteemed 2015 CRN Triple Crown Award, recognizing standout top IT services companies. Lewan was chosen as one of just 57 North American companies to qualify for the list.

Read More [fa icon="long-arrow-right"]

Media Agent Networking

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] November 5, 2013 [fa icon="tags'] Data Backup & Recovery

I get a lot of questions about the best way to configure networking for backup media agents or media servers in order to get the best throughput. I thought a discussion of how the networking (and link aggregation) works would help shed some light.

Read More [fa icon="long-arrow-right"]

Asigra Linux Restore with 'sudo'

[fa icon="pencil'] Posted by Doug Oakes [fa icon="calendar'] July 8, 2013 [fa icon="tags'] Managed Services, Data Backup & Recovery, Linux, How To Guide, Cloud Computing

Conduct an Asigra restore to a UNIX or Linux server using sudo credentials

Verify that user is listed in /etc/sudoers file on restore target system

The sudo utility allows users root level access to some (or all) subsystems without requiring users to know the root password. Please look at documentation for the sudo utility for more information.

From Asigra restore dialog, choose files to be restored

Select Alternate location and click on '>>'

Enter server name or IP address for restore target and check both "Ask for credentials" and "'sudo' as alternate user'

Enter username and password for user configured in /etc/sudoers file

Enter "root" and same password as in previous step

Do NOT enter the 'root' password. The sudo utility uses the regular user's password.

Select restore location and truncate path, if required

Accept defaults

Restore in progress...

Verify restore completed


Read More [fa icon="long-arrow-right"]

Using Asigra DS-Client Logs

[fa icon="pencil'] Posted by Doug Oakes [fa icon="calendar'] May 31, 2013 [fa icon="tags'] Managed Services, Data Backup & Recovery, How To Guide

How to understand backup operations using the DS-Client logs

For Lewan Managed Data Protection customers wanting additional information beyond what is available in the daily or weekly reports, the Asigra software provides the ability to look at the DS-Client activity logs. This post assumes that the user has installed or been given access to the DS-User interface and is able to connect to their DS-Client server.
A previous blog post (http://blog.lewan.com/2012/03/29/asigra-ds-user-installation-and-log-file-viewing/) addressed the installation of the DS-User along with some basics on the activity logs. This post will provide additional detail regarding the data provided by the activity logs.

Open the DS-User interface and connect to the appropriate DS-Client

From the menus select "Logs" and open the "Activity Log"

Set the parameters for logs desired

By default the system will display all logs for the current and previous days. For this exercise only backup activity will be required. The date and time range as well as specific nodes (backup clients) or backup sets can also be selected.
Once all options have been set, click the "Find" button to locate the specified logs.

Backup windows

For each set backed up, the start time, end time and total duration of the backup job can be observed. Each column can be sorted to assist in viewing.

On line Data Changed

The column labeled "Online" indicates to total size of changed files for the backup. That is the total amount of space used by all files which had any chage since the last backup session. For example a server with a 30 GB database which has daily updates and 4 new 1 MB documents would show 32,216,449,024 (30 GB + 4 MB). This is the amoutn of data copied from the backup client to the DS-Client.

Data Transmitted to the cloud

The column labeled "Transmitted..." shows the actual amount of data changed and copied to the cloud based device. This is the amount of data contained in changed blocks from all of the changed files, after compression and encryption. If, in the example above, the database file only had 1 MB of changes the Transmitted column would contain a number similar to 5,242,880 (roughly 5 MB).

Determining error and warning causes

In some cases a backup set will show a status of "Completed with Errors" or "Completed with Warnings". In most cases the errors and warnings are inconsequential but should usually be looked at.
Select the line containing the backup set in question and click on the "Event Log" button

Backup Session Event Log

Each event in the backup session is listed in the log. Errors are flagged with a red 'X' and warnings with a yellow '!'. Selecting the event will show the detail. In the example shown above a file is stored for which the backup user does not have permission to read the file. Other common errors are due to a file being used by another process and a file which has been moved or deleted between the initial scan of the file system and the attempt to access it for backup.
In some cases there will be a large number of errors "The network name cannot be found." These usually indicate that there is a problem with the network connection between the DS-Client and the backup target but could be caused by a reboot of the backup target or other connectivity issues.

For our Managed Data Protection customers, the Lewan Operations team checks backup sets for errors on a daily basis and will correct any critical issues.

Additional analysis

The activity log can also be saved to a file (text or Excel spreadsheet) for additional analysis. Right-click anywhere in the activity log and select "Save As". Used the resulting dialog to configure the location and file type.


Read More [fa icon="long-arrow-right"]

Lewan Achieves Veeam Gold/Platinum Partner Status

[fa icon="pencil'] Posted by Lewan Solutions [fa icon="calendar'] May 14, 2013 [fa icon="tags'] Virtualization, VMware, Data Backup & Recovery, Lewan Awards & Certifications

Our Enterprise Solutions team has been hard at work in the lab, training to become solutions experts for Veeam Data Protection and Backup tools. Their hard work, dedication and opportunity to train with Veeam’s technical team has earned Lewan the recognition of Gold Partner status in the Veeam ProPartner Program. Congratulations!

Read More [fa icon="long-arrow-right"]

[fa icon="envelope"] Subscribe to Email Updates



[fa icon="comments-o"] Follow us

Get even more great content, photos, event info and industry news.



[fa icon="calendar"] Recent Posts