The connection backup, also known as data backup contains the audit files and connection metadata of a connection. It can be configured as a scheduled policy and is saved to a backup server.
For details on how to perform a connection backup of a connection, see: Creating data backups. It is a three-step process:
Configure a system backup. Restoring a data backup works only if a matching system configuration and metadata is available, that is, if a system backup is restored first.
Create a backup policy at Policies > Backup & Archive/Cleanup > Backup policies.
Navigate to <Protocol name> Control > Connections. Select the connection you want to back up. Select the previously created backup policy in the Backup policy field.
For details on how to restore the configuration and data of One Identity Safeguard for Privileged Sessions (SPS) from a complete backup, for example, after a hardware replacement, see: Restoring SPS configuration and data.
Saving the created audit trail files and indexing metadata of a connection to a remote share. This is a copy operation in terms of data files.
Recovery: In case of a hardware replacement, creating configuration export, system backup and connection backups is essential.
Migration: Creating a machine identical to another SPS machine.
The audit trails of the connection, that is, the .zat files storing the recorded activities of the administrators. For details on audit trails, see Audit Policies.
The index of the audit trail that makes the content of the audit trail searchable. For details on indexing audit trails, see Indexing audit trails.
NOTE: Audit trails and index files are large. This means that backing up a connection requires a significant amount of free hardware space. Make sure you have enough free hardware space for those connections that you want to back up.
The connection archive, also known as data archive contains the audit files and connection metadata of a connection. In terms of contents, it is similar to a connection backup. It can be configured as a scheduled policy and is saved to an archive server. Archiving transfers data from One Identity Safeguard for Privileged Sessions (SPS) to an external storage solution, cleanup removes (deletes) old files. Archived data can be accessed and searched, but cannot be restored (moved back) to the SPS appliance.
For details on how to perform a connection archive of a connection, see: Archiving or cleaning up the collected data. It is a two-step process:
Create an archive policy at Policies > Backup & Archive/Cleanup > Archive/Cleanup policies.
Navigate to <Protocol name> Control > Connections. Select the connection you want to archive. Select the previously created archive policy in the Archive/Cleanup policy field.
|
Caution:
Hazard of data loss Never delete an Archive Policy if data has been archived with it. This will make the already archived data inaccessible. Do not "remake" an Archive Policy (that is, deleting an Archive Policy and then creating another one with the same name but different parameters). This will make data inaccessible, and identifying the root cause of the issue complicated. If you want to change the connection parameters (that is when you perform a storage server migration), you must make sure that the share contents and file permissions are kept unmodified and there are no archiving or backup tasks running. On the other hand, if you want to add a new network share to your archives, proceed with the following steps:
It is also safe to extend the size of the network share on the server side. |
Moving the created audit trail files and indexing metadata of a connection to a remote share. This is a move operation in terms of data files. Archived data can be accessed and searched, but cannot be restored (moved back) to the SPS appliance.
Freeing up hardware space on SPS.
The audit trails of the connection, that is, the .zat files storing the recorded activities of the administrators. For details on audit trails, see Audit Policies.
The index of the audit trail that makes the content of the audit trail searchable. For details on indexing audit trails, see Indexing audit trails.
To track down support requests, the One Identity Support Team might request you to collect system-state and debugging information. This information is collected automatically, and contains log files, the anonymized excerpt of the configuration export file of One Identity Safeguard for Privileged Sessions (SPS), and various system-statistics. To generate a support bundle, navigate to Basic Settings > Troubleshooting > Create support bundle.
The exported file is a zip-compressed archive.
The name of the exported file is debug_info-<hostname>YYYYMMDDHHMM. Sensitive data like key files and passwords are automatically removed from the configuration files.
For details on how to create a support bundle, see: Collecting logs and system information for error reporting.
Collecting a snapshot of the past week's system-state information for the One Identity Support Team for troubleshooting and debugging purposes.
Collecting information about a specific error by generating data for a defined time interval where the event that causes the error is reproduced. This is also used by the One Identity Support Team for troubleshooting and debugging purposes.
Debug logs, Connection logs and OS logs of the past week, one file per day. If there are too many events in a day, the log file in the support bundle only contains a truncated version of the connection logs. In this case, the complete log file is only accessible at /var/log/messages-<day>.
An excerpt of the configuration export file:
The anonymized version of the configuration XML file
Plugins, which include the complete plugin .zip file and the plugin source code.
System-state information, for example, version details, statistics, memory usage, system warnings, and so on.
List of core files. This list might indicate previous system crashes.
RAID controller information
Upgrade logs
Dashboard data
To increase the log level of the non-connection-related events, for example, to add the commands executed by the One Identity Safeguard for Privileged Sessions (SPS) web interface to the logs, enable debug level logging at Basic Settings > Management > Verbose system logs > Enable.
These logs are accessible at /var/log/scb-<day>.
Our Support Team uses this to investigate the reasons behind a web user interface-related issue.
Logs generated by the SPS web interface.
System daemon logs.
Logs of periodic cron jobs.
© 2024 One Identity LLC. ALL RIGHTS RESERVED. Conditions d’utilisation Confidentialité Cookie Preference Center