All articles in Architecture

Protecting Oracle KVM with Veeam

In this post we will review the configuration of Veeam Backup & Replication and integration with Oracle KVM to protect virtual machines running on this platform. We will also see some important characteristics in relation to disks, types of disks in KVM and how to create disks to obtain Changed Block Tracking in incremental backups.

Continue reading Protecting Oracle KVM with Veeam
 

Incident Response Plan with NIST 800-61, 800-53r5, Mitre ATT&CK and Veeam

In today's cybersecurity landscape, being prepared for incidents is as crucial as preventing them. NIST regulations 800-61 and 800-53r5, along with the Mitre ATT&CK enterprise matrix, provide solid guidelines for creating an effective incident response plan. In this post, we will review the importance of these frameworks and how the Veeam Platform it is a strategically in incident response.

Continue reading Incident Response Plan with NIST 800-61, 800-53r5, Mitre ATT&CK and Veeam
 

Which Operating System is More Secure?

In this post, we will review the operating systems most used by organizations in IT environments, whether in the public cloud or local data centers, asking the typical question, which operating system is more secure? Microsoft Windows, Linux, OpenBSD, FreeBSD? Or, from another point of view, what are the protection measures that will be applied to operating systems? Is only Firewall and Antivirus enough? Is it sufficient to disable the SSH service in Linux environments? Is it enough to not use root?

Continue reading Which Operating System is More Secure?
 

How to use Kasten K10 with Google Anthos

One of the architectures that are used in multiple clients with hybrid infrastructure is Google Anthos, a beautiful technology that allows to deploy clusters of Kubernetes in different environments using Google settings Kubernetes Engine, GKE, as well as adding other distributions to Google Anthos from different providers or public clouds. In this post, we will review the Anthos architecture and where to install Kasten K10 to protect applications.

Continue reading How to use Kasten K10 with Google Anthos
 

Kasten K10 Authentik

One of the characteristics of Kasten K10 most used, is the integration with centralized Authentikation and identity systems, through different protocols, for the management of access to the different clusters of kubernetes using RBAC by means of K10 and/or for the access of K10 Multi-Cluster in environments with multiple clusters of kubernetes. In this post, we will review the easy setup of Authentik and integration with Kasten K10.

Continue reading Kasten K10 Authentik
 

How to Install vSphere CSI Driver on RedHat OpenShift 4.x

One of the recurring queries we have lately is how to configure the vSphere CSI Driver in environments OpenShift 4.x without the need to use the operator that VMWare already developed, but that is only supported for production from version 4.10 of OpenShift. Therefore, in this guide we will review how to install and configure the driver version.ones earlier than 4.10 without the need to use the VMware operator.

Continue reading How to Install vSphere CSI Driver on RedHat OpenShift 4.x
 

Veeam Cloud Connect Performance

One of the most used platforms to offer remote management services, backup, disaster recovery, among others is Veeam Cloud Connect with Veeam Service Provider Console, which enable service providers to offer multiple optionsones of data protection. also exists Veeam Cloud Connect for Enterprise that allows large companies to offer services internally according to the needs of their business. In this post we will review a simple configuration to improve the performance of receiving data.

Continue reading Veeam Cloud Connect Performance
 

Veeam Agent for Solaris and Veeam 11a

In this post we will review one of the new features in the latest version of Veeam Backup & Replication 11a which has been recently released and includes console management of Veeam Backup & Replication for Unix agents, Veeam Agent for Solaris and Veeam Agent for AIX

Continue reading Veeam Agent for Solaris and Veeam 11a
 

Veeam Immutable Repository with Red Hat Enterprise Linux

In this post, we will review installing an Immutable repository from Veeam With Red Hat Enterprise Linux, we previously reviewed an application for Ubuntu called VeeamHubRepo, which allows us to easily set up an immutable repository on Ubuntu Linux. Now we will review how to do the configuration in Red Hat Enterprise Linux, with a small script for the configuration of the repository automatically and in an easy to use way.

Continue reading Veeam Immutable Repository with Red Hat Enterprise Linux
 

Good practices Veeam Oracle RMAN plugin

In this post we will review the best practices when installing, configuring and managing Veeam Plugin for Oracle RMAN, based on the experience of multiple installationsoneyes I reviewedones in different companies of various sizes. Including simple architectures, as well as complex architectures in high availability with Oracle RAC on different platforms x86, SPARC, Power. The objective of this post is to try to maintain a configuration standard and tasks to be carried out in order to maintain an ideal environment for Oracle data protection. In addition, this post includes a guide to update to the new version of backup files generated by the Plugin in its latest release.

Continue reading Good practices Veeam Oracle RMAN plugin