Browsing Posts in Veeam

Reading Time: 2 minutesSometimes you may want to replace an existing Veeam vSphere proxy with a new one, for example because you choose a different Linux distribution (maybe you are looking at some CentOS Linux alternatives). One option is add a new proxy, but you may have already some setting related to the old proxy and you don’t want to reconfigure everything. The other option is replace the proxy with a new with the SAME IP and SAME name!

Reading Time: 2 minutesLike every hardware and software components, before apply a VMware vSphere upgrade or update you have to check all compatibility aspects. One is related to the backup software that can be critical because you may loose the capability to perform backup and/or restore. Of course this apply also to “minor” update, like vSphere 8.0U3. For Veeam Backup & Replication there is a specific Veeam KB (KB 2443) that provides information about compatibility between VMware vSphere and Veeam Backup & Replication. And finally, some weeks after ESXi 8.0.3 become GA, there is an official support for vSphere […]

Reading Time: 3 minutesBackup content can be safe during the backup, but maybe there are some security threads that are not yet been identify (like 0-day attack) or maybe the backup data are corrupoted (like guest filesystem corruption). SureBackup is the Veeam technology that allows you to test machines backups and check if you can recover data from them. You can verify any restore point of a backed-up machine. For SureBackup, Veeam Backup & Replication uses a regular image-based backup. SureBackup job can operate in two different recovery verification modes:

Reading Time: 2 minutesBackup Scan using YARA rule is one of the new feature of Malware detection methods in Veeam Backup & Replication 12.1. During the Scan Backup session, does one of the following:Finds the last clean restore pointAnalyzes the content for specific informationDuring the restore session with the Secure Restore option, detects malware activity as specified in the YARA rule.

Reading Time: 9 minutesVeeam Backup & Replication 12 supports different malware detection methods that works in different way and can be used together to reach different scopes. Note: new features have been added in version 12.3! The first main diffecence is that some works inline (during the backup process on the source data) and other works with a post-processing directly on restore points saved on the repositories. For this reason also the load of those malware detection activities can be on different Veeam components, basically on the proxy servers for inline methods and the mount servers for the post-processing methods.

Reading Time: 2 minutesNote: this article has been updated by Linux versions supported by Veeam Backup & Replication (December 2024). Veeam Backup & Replication has several roles and for some of them you can use a Linux OS to implement specific roles. Considering that CentOS Linux 7 will reach end of life (EOL) on June 30, 2024 will be really important know which versions and which distributions are supported.

Reading Time: 2 minutesLike every hardware and software components, before apply a VMware vSphere upgrade or update you have to check all compatibility aspects. One is related to the backup software that can be critical because you may loose the capability to perform backup and/or restore. For Veeam Backup & Replication there is a specific Veeam KB (KB 2443) that provides information about compatibility between VMware vSphere and Veeam Backup & Replication.

© 2025-2011 vInfrastructure Blog | Disclaimer & Copyright