Verification

The verification function builds a virtual rehearsal environment within the virtualization infrastructure using the backup system, providing a network-isolated environment. During subsequent data verification tasks, the virtual machines requiring validation are placed within this rehearsal environment via instant recovery, enabling the execution of various verification operations.

The New Verification Job wizard for opens. Please complete the wizard follow the below steps.

Step 1. Verification Method

there are 2 method that you can select, Full recoverability verification and Backup data verification and security scan.

For the Full recoverability verification,This method is designed for verifying backup data of entire systems (physical/virtual). By establishing application groups, virtual labs, and isolated networks, it fully simulates an environment identical to production. Within the isolated environment, it verifies whether backup objects can boot normally, network connectivity, and other aspects to confirm the complete recoverability of backup data.

For the Backup data verification and security scan,this method verifies the integrity and security of backup data. For any type of backup data, integrity checks can confirm whether data corruption has occurred. For full-system backups (physical/virtual), virus scanning can be performed to ensure the security of the backup data.

Verification Type: Automatic or manual verification can be selected.

Automatic Verification: Periodically validates the latest/specified backup data based on configured time policies. Multiple verification methods can be configured, with results aggregated and output as a verification report.

Manual Verification: Used for sampling verification of specified backup data. After establishing the verification environment and loading verification objects, manual operations can be performed on the verification host. This method does not generate verification reports.

Virtual Lab: Serving as the foundational infrastructure for isolated network environments, the virtual lab can be custom-built or automatically constructed by verification tasks.

Step 2: Verification Source

In this screen, the verification method and data source for verification need to be specified.

For the Full recoverability verification,select the Select Data Source.

After selecting the data source, the VM List will be shown in right, by expanding a VM, users can configure the VM configurations and verification options.

Under the General tab, users can optionally customize the number of CPUs, cores per CPU socket, the RAM size of the VM to be verified, and the OS type os this VM.

Under the Advanced tab, users can configure the verification options. These options are necessary when running automatic verification jobs, if manual verification job, the advanced tab will not show up.

To verify the validity of the VM backups, the verification options including Ping test, Heartbeat test and Screenshot capturing.

In the Verification Time field, it defines the verification time of this VM after it’s powered on. The verification operations will be done within the given time (in seconds). After that the verification will timeout.

In the Network Configuration you can configure network settings for the virtual machine.

For the Backup data verification and security scan:

General Configuration, click to select time points and configure operating system types.

Verification Configuration, configure virus scanning and integrity verification.

Virus Scanning enable to perform virus scans based on configuration. This feature is disabled by default.

Integrity Verification is that If the source task enables integrity verification, task data integrity checks are enabled here by default.

Step 3: Verification Strategy

For an Automatic Verification job, the Verification Method can be configured between Verify Now and Verify by time strategy.

If Verify Now, the verification will start right after the job is created, once done, the verification job status will be changed to pending, it will not run again until users manually start it when needed.

If Verify by time strategy, users have to configure the time schedule of running the verification regularly on daily, weekly or monthly basis.

For the Backup data verification and security scan, Backup Node IP Address: Select the IP address of the backup node, which is used for communication with production clients.

Number of Concurrently Verified Objects: Set the number of objects that can be verified concurrently by the task. Default is 1.

Ignore Node Resource Limits: If resource limits are set on the backup node, backup tasks running on that node will operate under those constraints. Backup tasks are subject to resource limits by default. For tasks with higher priority, enabling this setting allows them to bypass node resource limits. This feature is disabled by default.

Step 4: Review & Confirm

After completing the above-mentioned settings, you are able to review and confirm all the settings of the verification job to be created. By clicking on Submit to confirm creating the verification job.

results matching ""

    No results matching ""