Accessing Linux Volumes with the Veeam Data Integration API
The Data Integration API is one of my favourite features that was released in v10. This isn’t only because it builds on existing technologies contained within Veeam Backup & Replication, but also because of what it represents in terms of the way customers think about previously stagnant backup data sitting in repositories. It’s all about the activation of data, the presentation of that data and then, the manipulation of that data to reach some outcome. Basically it’s about making the data remain valuable, when once is was locked away and only required in times of disaster.
Veeam Data Integration API allows you to represent data of backup files as a mounted Windows folder. You can take a restore point of the backup file, mount it as a Windows folder and access application data that is available in the backup created by Veeam Backup & Replication.
The ability to mount volumes instantly also means there is no time wasted in waiting for what could be long a recovery process and you don’t need to worry about additional storage as the data is read directly from the backup repositories. This technology works natively with Windows based volumes as we are mounting a volumes via iSCSI to a remote or local Windows Server. When it comes to Linux, the mounting of the volume will still happen, but reading the data in the mounted restore point requires a final step.
In the embedded YouTube Live video, I go through the basics of the Data Integration API, and then walk through in example of how to kick off a mount session via PowerShell and then use a third part tool (Diskternals Linux Reader in this case) to make the Linux Partition readable in Windows. For an example of the PowerShell code required to mount the volumes, check out this post by Vanguard Ben Young.
Take advantage of the Data Integration API feature to make smarter and more informed business decisions with your data, all while not impacting the performance of your production environment. Whether it be evaluating security breaches, enhancing security protections or garnering critical insights from your data, this solution is a great tool to get started now. For more information on this great feature and different use cases, check out this video.