06-11-2008
Login as root and run the following
# for i in `bppllist`
> do
> bppllist $i -U
> done
The Policies, themselves, can be found in the /opt/openv/netbackup/db/class directory, class being the old name for the policy.
As for removing a policy from the GUI - that also will remove the policy from the /opt/openv/netbackup/db/class directory.
If someone deleted your policies, just home that your Master Server backup has been successful!
Last edited by Grippo; 06-11-2008 at 04:59 AM..
10 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
Veritas NetBackup, how does it work?? I mean, I know it is used for backups and restores but really, can anybody give me a brief or any explanation that sums up basically what it is about besides the fact that it does backups and restores??? Please, if you have any information, I would appreciate... (2 Replies)
Discussion started by: TRUEST
2 Replies
2. Filesystems, Disks and Memory
Hello,
I am setting up scripts to do shadow image backups but have found a pitfall I cannot figure out how to work around. Basically what I need to figure out is how to launch a bunch of bpbackups, and then have the script pause until all of the children have exited. The problem is that bpbackup... (2 Replies)
Discussion started by: 98_1LE
2 Replies
3. Solaris
Hi,
Anyone know netbackup 3.4 on Solaris 8 .
Currently I use root to perform backup / monitoring ...etc .
Can I create a user call "backup" and perform the same task
What permission should I give the "backup" user . (1 Reply)
Discussion started by: civic2005
1 Replies
4. HP-UX
Hello all. I have a HP-UX 11.11 system that I need to install Netbackup 6.5 onto. After I mount the cd drive and run the 'install' command, it comes back with the following error:
usage: install file
WHAT options is it talking about? When I look at the documentation from Netbackup, it... (4 Replies)
Discussion started by: impunchdrunk
4 Replies
5. UNIX for Dummies Questions & Answers
What is the command to find out if a policy has been run and if it has the date it was last run? (0 Replies)
Discussion started by: mr_crosby
0 Replies
6. Solaris
i am using veritas admenistration console to control all backup operations of our servers .
we use SUN LT25 LTO library connected to a backupserver running solaris 8 .
i was wondering if there is a command that i can use from solaris so that i can activate and deactivate some policeis , rather... (4 Replies)
Discussion started by: ppass
4 Replies
7. Solaris
Hi All,
We are currently running Veritas netbackup. We are currently having a few issues where were unable to log in due to several errors. Out usual fix for this is to recycle the backup servers however due to the nature of the information being backed up this is done by someone else and... (1 Reply)
Discussion started by: rickyclayton201
1 Replies
8. UNIX for Dummies Questions & Answers
Would I be able to get the report (text format) of an activity monitor view of a netbackup via command line? I am trying to make a script out of it that would be run daily an be saved in a txt document which would could be viewed for history purpose. I need minimal details only like policy name,... (0 Replies)
Discussion started by: ryan_estiya
0 Replies
9. UNIX for Dummies Questions & Answers
Hello experts,
I will be joining a company in a few days time which put me in veritas netbackup project.
Can anyone please let me know how much knowledge of unix is needed for veritas netbackup?They will be providing training on netbackup.So i want to learn unix till then to make my base strong.... (1 Reply)
Discussion started by: Rajesh14
1 Replies
10. Shell Programming and Scripting
hey guys..........i am currently working on shell script that resolves status code 58 in netbackuptool .............this error is actually coz when server cannot communicate to the client so i am trying to write a shell script to do this automatically instead of series of steps... (0 Replies)
Discussion started by: Pawan Ramnani
0 Replies
LEARN ABOUT DEBIAN
aa-easyprof
AA-EASYPROF(8) AppArmor AA-EASYPROF(8)
NAME
aa-easyprof - AppArmor profile generation made easy.
SYNOPSIS
aa-easyprof [option] <path to binary>
DESCRIPTION
aa-easyprof provides an easy to use interface for AppArmor policy generation. aa-easyprof supports the use of templates and policy groups
to quickly profile an application. Please note that while this tool can help with policy generation, its utility is dependent on the
quality of the templates, policy groups and abstractions used. Also, this tool may create policy which is less restricted than creating
policy by hand or with aa-genprof and aa-logprof.
OPTIONS
aa-easyprof accepts the following arguments:
-t TEMPLATE, --template=TEMPLATE
Specify which template to use. May specify either a system template from /usr/share/apparmor/easyprof/templates or a filename for the
template to use. If not specified, use /usr/share/apparmor/easyprof/templates/default.
-p POLICYGROUPS, --policy-groups=POLICYGROUPS
Specify POLICY as a comma-separated list of policy groups. See --list-templates for supported policy groups. The available policy
groups are in /usr/share/apparmor/easyprof/policy. Policy groups are simply groupings of AppArmor rules or policies. They are similar
to AppArmor abstractions, but usually encompass more policy rules.
-a ABSTRACTIONS, --abstractions=ABSTRACTIONS
Specify ABSTRACTIONS as a comma-separated list of AppArmor abstractions. It is usually recommended you use policy groups instead, but
this is provided as a convenience. AppArmor abstractions are located in /etc/apparmor.d/abstractions. See apparmor.d(5) for details.
-r PATH, --read-path=PATH
Specify a PATH to allow owner reads. May be specified multiple times. If the PATH ends in a '/', then PATH is treated as a directory
and reads are allowed to all files under this directory. Can optionally use '/*' at the end of the PATH to only allow reads to files
directly in PATH.
-w PATH, --write-dir=PATH
Like --read-path but also allow owner writes in additions to reads.
-n NAME, --name=NAME
Specify NAME of policy. If not specified, NAME is set to the name of the binary. The NAME of the policy is often used as part of the
path in the various templates.
--template-var="@{VAR}=VALUE"
Set VAR to VALUE in the resulting policy. This typically only makes sense if the specified template uses this value. May be specified
multiple times.
--list-templates
List available templates.
--show-template=TEMPLATE
Display template specified with --template.
--templates-dir=PATH
Use PATH instead of system templates directory.
--list-policy-groups
List available policy groups.
--show-policy-group
Display policy groups specified with --policy.
--policy-groups-dir=PATH
Use PATH instead of system policy-groups directory.
--author
Specify author of the policy.
--copyright
Specify copyright of the policy.
--comment
Specify comment for the policy.
EXAMPLE
Example usage for a program named 'foo' which is installed in /opt/foo:
$ aa-easyprof --template=user-application --template-var="@{APPNAME}=foo" --policy-groups=opt-application,user-application
/opt/foo/bin/FooApp
BUGS
If you find any additional bugs, please report them to Launchpad at <https://bugs.launchpad.net/apparmor/+filebug>.
SEE ALSO
apparmor(7) apparmor.d(5)
AppArmor 2.7.103 2012-07-16 AA-EASYPROF(8)