{"id":5950,"date":"2020-05-08T17:41:32","date_gmt":"2020-05-08T16:41:32","guid":{"rendered":"https:\/\/www.n-able.com\/?p=5950"},"modified":"2021-07-13T13:17:08","modified_gmt":"2021-07-13T12:17:08","slug":"backup-monitoring-part-3-triaging-your-devices","status":"publish","type":"post","link":"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices","title":{"rendered":"Backup Monitoring: Part 3\u2014Triaging Your Devices"},"content":{"rendered":"<p>In\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/backup-monitoring-part-1-manage-exception\" target=\"_blank\" rel=\"noopener\">part one<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.n-able.com\/blog\/backup-monitoring-part-2-defining-success\" target=\"_blank\" rel=\"noopener\">part two<\/a>\u00a0of this backup monitoring series we covered the basic tenants of backup success. For example, how to look at a device Timestamp (TS) to determine if it is online, sort devices by OS type (OT) and Creation Date (CD) and see when the Total Last Successful Session (TL) occurred. Success metrics such as these are time sensitive. They remain valuable only as long as they\u2019re still relevant\u2014and they lose value as time passes. But you can use these metrics to identify things you should work to correct now. For example, there is minimal value in troubleshooting why a device had five open file errors when it\u2019s been offline for more than 72 hours. However, you can work to get that device online. Once it is, you can run a new backup job before beginning to troubleshoot failures, error counts, or other configuration issues.<\/p>\n<p>Following this premise, I\u2019ve summarized six steps to help you identify and triage problem backup devices:<\/p>\n<ol>\n<li>Prioritization<\/li>\n<li>Connectivity<\/li>\n<li>Errors<\/li>\n<li>Selections<\/li>\n<li>Synchronization<\/li>\n<li>Configuration<\/li>\n<\/ol>\n<h2>1. Setting priorities<\/h2>\n<p>While you should monitor all protected devices to ensure you\u2019re meeting your agreed upon service-level agreements (SLAs), not all of those devices warrant the same response. I suggest you prioritize management of those devices based on which ones are most important. It makes sense to start with the most business-critical devices from your higher profile clients.<\/p>\n<p>For example, a\u00a0<a href=\"https:\/\/www.solarwindsmsp.com\/products\/backup\/server-backup?promo=blog\" target=\"_blank\" rel=\"noopener\">server<\/a>\u00a0is typically more important than a workstation. The same can be inferred for a CEO or business owner\u2019s laptop. Make sure to prioritize the devices of your larger, high-profile customers over smaller, less strategic ones. Use this (or other criteria you define as a baseline) to figure out which devices need your attention first. But don\u2019t make it your only guidance. If one of your customers is down, then you need to prioritize data recovery over backup success and get them back online and running.<\/p>\n<h2>2. Maintain connectivity<\/h2>\n<p>Try not to get sidetracked looking at backup failures and error counts. Instead, first work on identifying the devices that are offline. If a set of devices aren\u2019t connected to the cloud, they won\u2019t backup. There is minimal value in diagnosing backup issues you can\u2019t immediately address. Flag or log the backup error to review later since it\u2019s irrelevant until you can re-establish connectivity to the device. It could be offline because the system is offline, the backup software is uninstalled, or services have stopped or are blocked. It\u2019s possible the firewalls are preventing access, users are on vacation, or the network is simply down. Start by pinging the device, confirm the backup agent is installed, restart the backup services, check connectivity to the management server, and rule out things like geo restrictions, firewalls, or antivirus that could block access. Once you have the device back online and the backup agent responding, run a new backup job to protect any new data and then see if any of the prior errors are still present.<\/p>\n<h2>3. Addressing errors<\/h2>\n<p>Address total failures before you address partial failures since it\u2019s better to have some backup data than no backup data. Failures could be for the entire device or just a single data source. Large error counts are commonly indicative of permissions issues, open or locked files, offline files, insufficient VSS snapshot resources, unplanned system restarts, etc. Large error counts might seem to be more important than small error counts, but that\u2019s not always the case. Small error counts could be just as critical. For instance, it\u2019s a crucial error if you can\u2019t access the entire C:\\ drive or there are no selections made for a data source.<\/p>\n<p>Look for error trends across multiple devices and over time. Determine if the error counts are consistent from day to day, or if they only occur on certain days or times when other maintenance windows and tasks happen to be running. See if the impacted devices are part of the same domain or behind the same external IP address. Check to see if any third-party backup or security software is also using VSS.<\/p>\n<h2>4. Selections<\/h2>\n<p>By this point your backup success rate should start to increase. You can now begin confirming your device and data sections. Ask yourself if you are protecting all your customers\u2019 important data or if they\u2019re suffering from data under-protection. Is your environment configured to automatically protect external volumes as they are added to a system? Are you monitoring for the addition of new users and systems to the network? Consider enabling device discovery, automated deployment, and some form of backup profile to save yourself the installation efforts.<\/p>\n<p>Over protection can also be detrimental to your backup success. Take Microsoft SQL and Microsoft Hyper-V as examples. You should confirm the application or another tool isn\u2019t also performing snapshots, dumps, replication, or backups of the same data. Without proper setup, your backups could interfere with each other. Choosing to exclude data that is redundant or has zero recovery value can also help improve backup success, save bandwidth, reduce backup sizes, and potentially reduce costs. Look for and remove duplicate selections across multiple data sources. Setup exclusion filters that prevent you from backing up items such as temporary files, dump directories, media libraries, patch and AV updates, etc.<\/p>\n<h2>5. Synchronization and performance<\/h2>\n<p>Your backups may be successful, but are they completing within the desired timeframe? If you\u2019re using a Local Speed Vault, is the data fully synchronized locally and off-site? When was the last successful off-site backup completed? Are you throttling uploads or downloads? Decreasing selections, adding exclusions, or adjusting bandwidth throttling can help you fine tune performance. But it\u2019s also possible you simply have too much changing data to support the desired backup schedule frequency. You may want to look at your session logs to see where the longest and largest backups happen. Consider adjusting your schedules to run less frequently throughout the day or week, and with less overlap from other backups on the same network. If that\u2019s not an option, it may be time to consider adding more bandwidth at this site.<\/p>\n<h2>6. Configuration and retention<\/h2>\n<p>Even the best technicians sometimes deploy backup in a hurry. When that happens, things often get missed. Even if it isn\u2019t deployed in a hurry, things can get overlooked. If your backups settings (selections, security, retention, etc.) aren\u2019t consistent within a client (or across your clients) then you may find yourself guessing at whether you\u2019re able to meet your agreed upon SLA or SLO. Data retention can be critical when it comes to ransomware recovery or compliance and your customers may need to have archives enabled to retain data for more than a default 28 days. Data security is also important. Have you audited your devices to ensure you\u2019ve setup the desired security measures, including proxies, remote access, and GUI passwords? Have you validated you have the correct encryption keys recorded?<\/p>\n<h2>7. Staying healthy<\/h2>\n<p>It may take some time initially, but once you get your backup dashboard to the point it\u2019s predominantly green with successes you\u2019ll find it easier to maintain. It\u2019s important to remember you\u2019re not alone. Don\u2019t hesitate to reach out to your technical support, sales engineering, account manager, customer success team, or Head Nerd if you need assistance with error resolution.<\/p>\n<p><em>Eric Harless is the Head Backup Nerd at SolarWinds MSP. Eric has worked with SolarWinds Backup since 2013 and has over 25+ years of data protection industry experience in sales, support, marketing, systems engineering, and product management.<\/em><\/p>\n<p><em>You can follow Eric on Twitter\u00a0at @backup_nerd<\/em><\/p>\n<p><strong>Other blogs in this series<\/strong><\/p>\n<ul>\n<li><a href=\"https:\/\/www.n-able.com\/blog\/backup-monitoring-part-1-manage-exception\" target=\"_blank\" rel=\"noopener\">Backup Monitoring: Part 1\u2014Manage by Exception<\/a><\/li>\n<li><a href=\"https:\/\/www.n-able.com\/blog\/backup-monitoring-part-2-defining-success\" target=\"_blank\" rel=\"noopener\">Backup Monitoring: Part 2\u2014Defining Success<\/a><\/li>\n<li><a href=\"https:\/\/www.n-able.com\/blog\/backup-monitoring-part-4-tracking-and-controlling-usage\" target=\"_blank\" rel=\"noopener\">Backup Monitoring, Part 4\u2014Tracking and Controlling Usage<\/a><\/li>\n<li class=\"p1\"><a href=\"https:\/\/www.n-able.com\/blog\/backup-monitoring-part-5-tuning-your-backup-selections\" target=\"_blank\" rel=\"noopener\">Backup Monitoring: Part 5\u2014Tuning Your Backup Selections<\/a><\/li>\n<li class=\"p1\"><a href=\"https:\/\/www.n-able.com\/blog\/backup-monitoring-part-6-securing-your-backup-devices\" target=\"_blank\" rel=\"noopener\">Backup Monitoring: Part 6\u2014Securing Your Backup Devices<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Check out six steps to help you identify and triage problem devices and get your backups running successfully.<\/p>\n","protected":false},"author":45,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"class_list":["post-5950","post","type-post","status-publish","format-standard","hentry","topic-backup-disaster-recovery","topic-head-nerds"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Backup Monitoring: Part 3\u2014Triaging Your Devices - N-able<\/title>\n<meta name=\"description\" content=\"Check out six steps to help you identify and triage problem devices and get your backups running successfully.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Backup Monitoring: Part 3\u2014Triaging Your Devices - N-able\" \/>\n<meta property=\"og:description\" content=\"Check out six steps to help you identify and triage problem devices and get your backups running successfully.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices\" \/>\n<meta property=\"og:site_name\" content=\"N-able\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NableMSP\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-08T16:41:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-13T12:17:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Eric Harless\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Nable\" \/>\n<meta name=\"twitter:site\" content=\"@Nable\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"Eric Harless\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices\"},\"author\":{\"name\":\"Eric Harless\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/17837915039282731e00c56fd2b18ff2\"},\"headline\":\"Backup Monitoring: Part 3\u2014Triaging Your Devices\",\"datePublished\":\"2020-05-08T17:41:32+01:00\",\"dateModified\":\"2021-07-13T12:17:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices\"},\"wordCount\":1319,\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"articleSection\":[\"Backup &amp; Disaster Recovery\",\"Head Nerds\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices\",\"url\":\"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices\",\"name\":\"Backup Monitoring: Part 3\u2014Triaging Your Devices - N-able\",\"isPartOf\":{\"@id\":\"https:\/\/www.n-able.com\/fr#website\"},\"datePublished\":\"2020-05-08T17:41:32+01:00\",\"dateModified\":\"2021-07-13T12:17:08+00:00\",\"description\":\"Check out six steps to help you identify and triage problem devices and get your backups running successfully.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Backup &amp; Disaster Recovery\",\"item\":\"https:\/\/www.n-able.com\/fr\/blog\/category\/backup-disaster-recovery\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Backup Monitoring: Part 3\u2014Triaging Your Devices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.n-able.com\/fr#website\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"name\":\"N-able\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.n-able.com\/fr#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.n-able.com\/fr?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.n-able.com\/fr#organization\",\"name\":\"N-able\",\"url\":\"https:\/\/www.n-able.com\/fr\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"contentUrl\":\"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg\",\"width\":\"1024\",\"height\":\"1024\",\"caption\":\"N-able\"},\"image\":{\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/NableMSP\",\"https:\/\/x.com\/Nable\",\"https:\/\/www.linkedin.com\/company\/n-able\",\"https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.n-able.com\/fr#\/schema\/person\/17837915039282731e00c56fd2b18ff2\",\"name\":\"Eric Harless\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g\",\"caption\":\"Eric Harless\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Backup Monitoring: Part 3\u2014Triaging Your Devices - N-able","description":"Check out six steps to help you identify and triage problem devices and get your backups running successfully.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices","og_locale":"fr_FR","og_type":"article","og_title":"Backup Monitoring: Part 3\u2014Triaging Your Devices - N-able","og_description":"Check out six steps to help you identify and triage problem devices and get your backups running successfully.","og_url":"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices","og_site_name":"N-able","article_publisher":"https:\/\/www.facebook.com\/NableMSP","article_published_time":"2020-05-08T16:41:32+00:00","article_modified_time":"2021-07-13T12:17:08+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/03\/share-image.jpg","type":"image\/jpeg"}],"author":"Eric Harless","twitter_card":"summary_large_image","twitter_creator":"@Nable","twitter_site":"@Nable","twitter_misc":{"\u00c9crit par":"Eric Harless","Dur\u00e9e de lecture estim\u00e9e":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices#article","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices"},"author":{"name":"Eric Harless","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/17837915039282731e00c56fd2b18ff2"},"headline":"Backup Monitoring: Part 3\u2014Triaging Your Devices","datePublished":"2020-05-08T17:41:32+01:00","dateModified":"2021-07-13T12:17:08+00:00","mainEntityOfPage":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices"},"wordCount":1319,"publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"articleSection":["Backup &amp; Disaster Recovery","Head Nerds"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices","url":"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices","name":"Backup Monitoring: Part 3\u2014Triaging Your Devices - N-able","isPartOf":{"@id":"https:\/\/www.n-able.com\/fr#website"},"datePublished":"2020-05-08T17:41:32+01:00","dateModified":"2021-07-13T12:17:08+00:00","description":"Check out six steps to help you identify and triage problem devices and get your backups running successfully.","breadcrumb":{"@id":"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.n-able.com\/fr\/blog\/backup-monitoring-part-3-triaging-your-devices#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Backup &amp; Disaster Recovery","item":"https:\/\/www.n-able.com\/fr\/blog\/category\/backup-disaster-recovery"},{"@type":"ListItem","position":2,"name":"Backup Monitoring: Part 3\u2014Triaging Your Devices"}]},{"@type":"WebSite","@id":"https:\/\/www.n-able.com\/fr#website","url":"https:\/\/www.n-able.com\/fr","name":"N-able","description":"","publisher":{"@id":"https:\/\/www.n-able.com\/fr#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.n-able.com\/fr?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.n-able.com\/fr#organization","name":"N-able","url":"https:\/\/www.n-able.com\/fr","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/","url":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","contentUrl":"https:\/\/www.n-able.com\/wp-content\/uploads\/2021\/02\/logo-n-able-vertical-dark.svg","width":"1024","height":"1024","caption":"N-able"},"image":{"@id":"https:\/\/www.n-able.com\/fr#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/NableMSP","https:\/\/x.com\/Nable","https:\/\/www.linkedin.com\/company\/n-able","https:\/\/www.youtube.com\/channel\/UClnp77HHg4aME-S-3fWQhFw"]},{"@type":"Person","@id":"https:\/\/www.n-able.com\/fr#\/schema\/person\/17837915039282731e00c56fd2b18ff2","name":"Eric Harless","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/56c41ecf08fcd382a32156d4ea9794e938671da99f7732339d73562470cb2581?s=96&d=mm&r=g","caption":"Eric Harless"}}]}},"_links":{"self":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/5950","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/users\/45"}],"replies":[{"embeddable":true,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/comments?post=5950"}],"version-history":[{"count":0,"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/posts\/5950\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.n-able.com\/fr\/wp-json\/wp\/v2\/media?parent=5950"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}