PowerProtect Data Manager
PowerProtect Data Manager
Version 19.2
Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.” DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED
IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.
Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property
of their respective owners. Published in the USA.
Dell EMC
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.DellEMC.com
Preface 9
As part of an effort to improve product lines, periodic revisions of software and hardware are
released. Therefore, all versions of the software or hardware currently in use might not support
some functions that are described in this document. The product release notes provide the most
up-to-date information on product features.
If a product does not function correctly or does not function as described in this document,
contact a technical support professional.
Note: This document was accurate at publication time. To ensure that you are using the latest
version of this document, go to the Support website https://www.dell.com/support.
Note: References to Data Domain systems in this documentation, in the UI, and elsewhere in
the product include Data Domain systems and the new PowerProtect DD systems.
Purpose
This document describes how to install, configure, and administer PowerProtect Data Manager
software.
Audience
This document is intended for the host system administrator who is involved in managing,
protecting, and reusing data across the enterprise by deploying PowerProtect Data Manager.
Revision history
The following table presents the revision history of this document.
Table 1 Revision history
Related documentation
The following publications provide additional information:
l PowerProtect Data Manager Administration and User Guide
Describes how to configure the software.
l PowerProtect Data Manager Release Notes
Contains information on new features, known limitations, environment, and system
requirements for the software.
l PowerProtect Data Manager Security Configuration Guide
Contains security information.
l PowerProtect Data Manager Cloud Disaster Recovery Administration and User Guide
Describes how to deploy Cloud DR, protect VMs in the AWS cloud, and run recovery
operations.
l PowerProtect Data Manager for Cyber Recovery User Guide
Describes how to install, upgrade, patch, and uninstall the Dell EMC PowerProtect Cyber
Recovery software.
l PowerProtect Data Manager API documentation: https://developer.dellemc.com
Contains the PowerProtect Data Manager APIs and includes tutorials to guide to you in their
use.
You can use the following resources to find more information about this product, obtain support,
and provide feedback.
Special notice conventions that are used in this document
The following conventions are used for special notices:
NOTICE Identifies content that warns of potential business or data loss.
Note: Contains information that is incidental, but not essential, to the topic.
Typographical conventions
The following type style conventions are used in this document:
Bold Used for interface elements that a user specifically selects or clicks,
for example, names of buttons, fields, tab names, and menu paths.
Also used for the name of a dialog box, page, pane, screen area with
title, table label, and window.
Italic Used for full titles of publications that are referenced in text.
Monospace Used for:
l System code
l System output, such as an error message or script
l Pathnames, file names, file name extensions, prompts, and
syntax
l Commands and options
You can use the following resources to find more information about this product, obtain support,
and provide feedback.
Note: You can specify the hostname or the IP address of the appliance.
ln -s /etc/ssl/certificates/customer/customer.pem cert.pem
ln -s /etc/ssl/certificates/customer/customerkey.pem private-key.pem
Getting Started
The Getting Started page provides configuration options that are required when the system is
first deployed.
The Getting Started page appears upon first deployment of PowerProtect Data Manager and
opens to this page by default until you click Skip This.
You can access the Getting Started page at any time by selecting System Settings > Getting
Started.
Options Description
Support View and configure Secure Remote Services (SRS), Email Setup, Auto
Support, Logs, System Health.
VMware vCenter Opens the Infrastructure > Asset Sources page where you can add a
vCenter instance as an asset source so that it can be added to a
protection policy.
Protect Assets Opens the Protection Policies page where you can manage Protection
Life Cycle workflows for all asset types.
l Recovery—Recovery statistics
l Health—Details about the health of the system, including
services, licenses, support, protection engines, server backups,
and uptime.
PowerProtect Data Manager refreshes the data hourly unless you run
an ad-hoc discovery.
Jobs
Reporting
Additional UI options
The following table describes the icons located in the PowerProtect Data Manager banner.
Option Description
Click to enter search criteria to find assets, jobs, logs, and alerts.
Managing users
Only the Admin role can manage users.
The following roles can view users, roles, identity sources, and user groups:
l Admin
l User
l Export and Recovery Admin
Users can see only their own role within their own account.
Note: User authorization grants or denies users access to PowerProtect Data Manager
resources. Authorization is the same for locally authorized users and Microsoft Windows
Active Directory/LDAP users.
You can create local users to perform management tasks. When you create a local user account,
you must assign a role to the user.
Add a user
You must have administrator credentials to add a user.
Procedure
1. Select Administration > Users.
The Users window appears.
2. Click Add.
4. Click Save.
Results
The newly added user appears in the Users window.
Reset a password
Local users can reset a forgotten password using this procedure.
Before you begin
l The user must be a a local user.
l A reset password mail server must be configured.
l LDAP and Windows Active Directory users cannot reset their password using this procedure.
Contact the system administrator to reset your password.
About this task
Local users can receive an email with a link to reset their password. The reset password link in the
email expires in 20 minutes, after which time they must request another link.
Procedure
1. In the PowerProtect Data Manager login page, click Forgot Password.
2. In the Forgot Password dialog box, type your user name, click Send Link, and click OK to
dismiss the informational dialog box.
The system sends a message to the email address associated with your user name.
3. Open the email and click the link.
4. In the Reset Password dialog box, type a new password in the New Password and
Confirm New Password fields, and click Save.
The PowerProtect Data Manager login page appears.
5. Log in with your user name and new password.
Roles
A role defines the privileges and permissions that a user has to perform a group of tasks. When a
user is assigned a role, you grant the user all of the privileges that are defined by the role. Only one
role can be associated to a user account.
Admin role
Admin
The Admin role is responsible for setup, configuration, and all PowerProtect Data Manager
management functions. The Admin role provides systemwide access to all functionality across all
organizations. One default Admin role is assigned at PowerProtect Data Manager deployment and
installation. You can add and assign additional Admin roles to users in your organization who
require full access to the system.
This table outlines the privileges and tasks that are associated with the Admin role.
Privileges Tasks
Privileges Tasks
User role
User
The User role is responsible for monitoring the PowerProtect Data Manager Dashboard, Activity
Monitor, and Notifications. The User role provides read-only access to monitor activities and
operations. Assign the User role to users in your organization who monitor Dashboard activities,
Activity Monitor, and Notifications but do not require the ability to configure the system.
This table outlines the privileges and tasks that are associated with the User role.
Privileges Tasks
Privileges Tasks
Privileges Tasks
Table 8 Export and Recovery Admin role privileges and tasks (continued)
Privileges Tasks
l Rollback to Production
l Recovery to New Location
l Export for Reuse
Privileges
PowerProtect Data Manager privileges define the tasks that a user can perform and these
privileges are assigned to roles.
Privilege Task
Privilege Task
Manage Data Source l Create, read, edit, and delete a data source.
Assets
l Create, view, edit, and delete the policy in the protection
group resource.
l Create, view, edit, and delete asset group resources.
l Create, view, edit, patch, and delete tag category resources.
Monitoring Privileges
This table defines the Monitoring Privileges.
Privilege Task
View Historical Data l View historical data that relates to plans, arrays, data
targets, data sources, and capacity data.
Privilege Task
Manage Policies l Create, view, edit, and delete the policy for a protection policy
resource.
l Create, view, edit, and delete a policy definition resource.
l Create, view, edit, and delete schedule resources.
l Create, view, edit, and delete an objective definition resource.
l Create, read, edit, and delete an action definition.
Privilege Task
Export for Reuse l Create, view, edit, and start export and reuse operations.
Roll back to l Create, view, edit, and start rollback to production operations.
Production
Recovery to Alternate l Create, view, edit, and start recovery to alternate location
Location operations.
Privilege Task
Privilege Task
Privilege Task
Privilege Task
Privilege Task
Privilege Task
Managing keychains
You can create, edit, delete, and view keychain credentials.
Add credentials
Procedure
1. Select Administration > Credentials > Add.
The Add Credentials window appears.
2. Enter the following information, and then click Save.
l Type—The type of credential you would like to add
l Username—The username associated with the credential you are adding
l Password—The password associated with the username
LDAP or AD authentication
When you authenticate users through an external authentication authority, users can log in with
their authority username and password. The authority username and password are managed by
Lightweight Directory Access Protocol (LDAP), Lightweight Directory Access Protocol over SSL
(LDAPS), Microsoft Active Directory server (AD), or a Microsoft Active Directory server over SSL.
When the user's credentials are validated, the Authentication Service issues a token for the user.
The PowerProtect Data Manager GUI uses the token information to authorize the user's activities.
Note: You can configure only one authority.
Attribute Description
Attribute Description
l LDAP
Server Address Type the protocol and hostname or IP address of the LDAP or
Active Directory server, in the following format:
protocol://hostname_or_ip_address
where:
Domain Type the base distinguished name (DN) of the LDAP or Active
Directory authority.
For example, dc=pp_lab, dc=ldap.example.com
Port Type the port number that the external authentication authority
uses.
l For LDAP and Active Directory, the default port number is 389.
l For LDAPS and Active Directory over SSL, the default port
number is 636.
User Search a. Type the objectClass that the authentication service uses
when searching for users in the LDAP or AD hierarchy.
b. Ensure that you specify a search path that is relative to the
base DN that you specified in the Domain option.
For example:
l For an Active Directory configuration, specify the value in the
objectClass property for an AD user. For example, type user.
l For an LDAP configuration, specify the value in the objectClass
property. For example, type account.
Group Search a. Type the objectClass of the search path that you want the
authentication service to use when searching for groups in the
LDAP or AD hierarchy.
b. Ensure that you specify a search path that is relative to the
base DN that you specified in the Domain attribute.
Attribute Description
For example:
l For an Active Directory configuration, specify the value in the
objectClass property for an AD group. For example, type
group.
l For an LDAP configuration, specify the value in the objectClass
property for an LDAP group. This value should be a structural
objectClass. For example, type group.
Query User Type a user account that has full read access to the LDAP or AD
directory, in the following formats:
l For Active Directory, the format is user@domain, or the DN
of the query user. For example,
[email protected] or
cn=administrator,dc=example,dc=com.
l For LDAP, the format is user@domain. For example,
[email protected].
Query Password Type the password of the user account that you specified in the
Query User attribute.
Attribute Description
User Search Path Type the DN of the search path that the authentication service
uses when searching for users in the LDAP or AD hierarchy. Ensure
that you specify a search path that is relative to the base DN that
you specified in the Domain option. For example:
l For an AD configuration, specify the value in the objectClass
property for an AD user.
l For an LDAP configuration, specify the value in the account
object class.
User Group Search Path Type the DN of the search path that the authentication service
should use when searching for groups in the LDAP or AD hierarchy.
Ensure that you specify a search path that is relative to the base
DN that you specified in the Domain attribute. For example:
l For an AD configuration, specify the value in the objectClass
property for an AD group.
l For an LDAP configuration, specify the value in the posixGroup
object class.
Group Attribute Name Type the attribute that the authentication service should use to
validate the group name in the LDAP or AD hierarchy.
For example:
l For an AD configuration, specify sAMAccountName.
l For an LDAP configuration, specify cn.
Group Member Attribute Type the attribute that the authentication service should use to
validate the group member in the LDAP or AD hierarchy.
Attribute Description
For example:
l For an AD configuration, specify member.
l For an LDAP configuration, specify memberUid.
User Attribute ID Type the attribute that the authentication service should use to
validate the username in the LDAP or AD hierarchy.
For example:
l For an AD configuration, specify sAMAccountName.
l For an LDAP configuration, specify cn.
5. Click Save.
6. Assign LDAP or AD groups to a role. The section Add LDAP group-to-role mapping on page
34 provides instructions.
This step is required before you can log in to the UI with an LDAP or AD account.
2. Select the indentity source for which you would like to edit group-to-role mapping, and then
click New Group Map.
3. Assign the same LDAP or AD groups to a different role.
4. Click Add.
Based on this AD configuration, specify the following values for PowerProtect Data Manager LDAP
configuration options:
l Domain: dc=iddlab, dc=com
l Hostname: idd-ad-iddlab.com
l User Search: One of the following values: top, inetOrgPerson, or user
l User Attribute ID: cn
Configure the idd-ad.iddlab.com authority
The following figure provides an example of the group attributes that are required to configure the
idd-ad.iddlab.com authority.
Based on the properties of Protection_admins, specify the following values for the LDAP
configuration options:
l Group Search: top or group
l Group Attribute Name: sAMAccountName
Based on this configuration, specify the following values for the LDAP configuration options:
l Domain: dc=alberta,dc=emc,dc=com
l Hostname: alberta.lss.emc.com
l Group Search: groupOfUniqueNames.
Note: Only structural object classes may be values for the group search. So, in the
example, although top is an object class, only groupOfUniqueNames can be used as a
group search value.
l Group Attribute Name: cn
Specify values in the user search attribute
The following figure provides an example of the value to specify in the user search attribute.
Figure 4 LDAP Admin user search attribute
Based on this configuration, specify the following values for the LDAP configuration options:
l User Search: One of the following objectClass values: top, person, organizationalPerson,
or inetOrgPerson
l User Attribute ID: cn
To resolve this issue, ensure that the values in the Query User and Query Password fields are
correct.
To resolve this issue, ensure that the value in the Domain field is correct.
To resolve this issue, ensure that you specify the Server Address field in the following format:
l For an LDAP or Active Directory authority: ldap://hostname_ip_address
l For an LDAPS or Active Directory over SSL authority: ldaps://hostname_ip_address
Note: Discovery time is based on networking bandwidth. The resources that are
discovered and those that are doing the discovery take a performance hit each time that
you go through a discovery process. It might appear that PowerProtect Data Manager is
not updating the storage data while the discovery is in progress.
PowerProtect Data Manager can add up to three assets of the same type simultaneously
and up to 10 assets simultaneously.
8. In the Storage window, click Discover to refresh the window with any newly discovered
storage systems.
When a discovery completes successfully, the Status column updates to OK.
Results
PowerProtect Data Manager displays External Data Domain systems only in the Storage window
Name column. PowerProtect Data Manager displays Data Domain Management Center storage
types in the Managed By column.
its progress. If you want to fail over a production VM, from PowerProtect Data Manager, you
select a network in the cloud, start the DR failover operation, and then bring up the restored VM
within AWS.
To learn about Cloud DR work flows within PowerProtect Data Manager, see the PowerProtect
Data Manager Cloud Disaster Recovery Administration and User Guide.
Prerequisites
Ensure that a SQL Server environment meets the following prerequisites before you install the
Microsoft application agent:
l Install the following applications on the Windows host:
n Microsoft SQL Server
n The SQL Server Management Studio (SSMS)
n .NET Framework 4.0
If you are installing ItemPoint for table-level recovery, install .NET Framework 4.5.
l In the PowerProtect Data Manager UI, select Agent Downloads from the System Settings
menu, select the Microsoft application agent download package,
msappagent192_win_x64.zip, and then download the package to the Windows SQL
Server host.
l Log in to the SQL Server host as an Administrator to install the Microsoft application agent.
l To deploy the Common Language Runtime (CLR) assembly, ensure that you have
Administrator access to the SQL Server host and the master database. If the SQL Server host
is running in a domain, ensure that you have access as a Domain administrator.
6. On the Change Install Location page, perform one of the following tasks:
l To install the Microsoft application agent in the default folder, leave the installation
location as-is.
The default installation folder is C:\Program Files\DPSAPPS\MSAPPAGENT.
l To specify a different installation location, perform the following steps: .
a. Click Change.
b. In the dialog box that appears, specify the installation location.
c. Click OK.
7. Click Next.
8. On the Configure Installation Options page, specify any of the following installation
options, as required:
l To integrate the Microsoft application agent with PowerProtect for centralized or self-
service protection of SQL Server data, select the following options, as required:
n To install the Microsoft application agent software, select Application Direct.
n To install the SQL Server Management Studio plug-in user interface, select SSMS
Plug-in.
You can use the SSMS plug-in to perform self-service SQL Server backup and
restore operations.
n To enable table-level restores, select ItemPoint.
This option installs ItemPoint for Microsoft SQL Server, which you can use to
perform table-level restores.
n You must specify the PowerProtect appliance details by performing the following
steps:
a. Select PowerProtect Data Manager Integration.
b. In the Appliance Hostname or IP address field, type the hostname or IP address
of the PowerProtect server.
Note: Installation of the Microsoft application agent requires port 7000 on SQL
Server and port 8443 on PowerProtect to be open bidirectionally. These ports
enable communication between the Microsoft application agent and
PowerProtect.
l To install the VM Direct Engine to recover application-aware SQL virtual machine
backups, select the following options, as required:
Note: By default, when a SQL Server virtual machine is added to a virtual machine
application-aware protection policy in PowerProtect Data Manager, the Microsoft
application agent and ItemPoint silently install on the protected virtual machine.
When you are restoring a VM Direct Engine backup to an alternate virtual machine
that is not part of a protection policy, you must install the Microsoft application
agent on the target virtual machine.
n Select VM Direct Engine.
Note: The PowerProtect appliance details are disabled when you select the VM
Direct Engine option.
n To install the SQL Server Management Studio plug-in user interface, select SSMS
Plug-in.
n To enable table-level restores, select ItemPoint.
This option installs ItemPoint for Microsoft SQL Server, which you can use to
perform table-level restores.
c. In the User name and Password fields respectively, type the username and the
password of the user who has the privileges to deploy the CLR Assembly.
d. Click Deploy.
e. Click Install.
f. After the deployment completes, click Next.
11. On the Complete the Setup page, click Finish.
c. In the User name and Password fields, type the credentials for the user who has the
privileges to remove CLR assembly.
d. Click Remove.
e. After the removal completes, click Next.
5. On the Complete the Setup page, click Finish.
Results
The Microsoft application agent is uninstalled.
"10.25.115.113"
"10.25.115.112"
"10.25.115.145"
Retention lock is not supported for discovered existing backups in PowerProtect Data
Manager.
Onboarding of DD Boost-over-FC backups is not supported.
With the onboarding capability, PowerProtect provides the following centralized features:
l Visibility of both existing backups and any new self-service or PowerProtect Data Manager
policy-driven backups of onboarded assets.
l Automatic configuration of target protection storage based on the PowerProtect Data
Manager protection policies that are used for your database.
l All the other functionality that is provided for PowerProtect Data Manager protection policies.
When you create a protection policy, the PowerProtect Data Manager software creates a storage
unit on the specified Data Domain backup host that is managed by PowerProtect Data Manager.
All subsequent backups will go to this new storage unit. This implementation overrides the backup
host and storage unit information that is provided in the script with the backup host and storage
unit information that is provided by PowerProtect Data Manager.
3. Register and approve the Microsoft application agent in PowerProtect Data Manager.
Manage the File System agent on page 84 provides information.
After a few minutes of approving the SQL host, all the old backup copies start to be
discovered. Depending on the number of backups, the discovery and subsequent visibility of
the backups in PowerProtect Data Manager can take some time. The retention time of the
discovered existing backup copies will be equal to the retention time set in the protection
policy plus 14 days rounded off to the next day.
4. Discover and add the credentials for the SQL application host.
Discover an Oracle or SQL application host on page 111 provides information.
5. Create a protection policy to protect the SQL host. For onboarding assets, only a subset of
databases can be onboarded. It is not mandatory for all the databases on the host to be
onboarded.
Add a protection policy for SQL database protection on page 122 provides information.
The first backup after onboarding must be a full backup:
l The first centralized backup is automatically promoted to a full backup.
l The first self-service backup is automatically performed as a full backup.
Note: You cannot perform a backup to a secondary Data Domain device. You can only
restore from a secondary Data Domain device.
6. Perform a self-service backup of the Microsoft SQL databases. Onboarded assets can be
part of either a centralized or self-service protection policy.
Performing self-service backups of Microsoft SQL databases on page 166 provides
information.
Use the backup discovery tool for PowerProtect Data Manager management of
existing backups
To enable the PowerProtect Data Manager management of existing backups after you have
upgraded from a previous version of Microsoft application agent, you must run the backup
discovery tool, AgentBackupDiscovery.exe. Existing backups are Microsoft application agent
backups that you performed before integrating the Microsoft application agent with the
PowerProtect Data Manager software.
NOTICE After you run the backup discovery tool, you can continue to use the existing backup
scripts to perform the Microsoft application agent backups. Ensure that all the databases
backed up with a particular script are added to a single protection policy. By default, the
PowerProtect Data Manager overrides the Data Domain details by using the storage unit from
the protection policy. If you do not want the Data Domain details to be overridden, use the -a
"SKIP_DD_OVERRIDE=TRUE" option in the backup scripts.
To discover the existing backups by using the backup discovery tool, perform the following steps.
1. In the Microsoft application agent installation directory, C:\Program Files\DPSAPPS
\MSAPPAGENT\bin, run AgentBackupDiscovery.exe as the administrator.
The Discovery of existing backups dialog box appears.
Note: If the program does not start but displays the following message, an ongoing backup
discovery process is running, as invoked by the PowerProtect Data Manager:
When the discovery process is complete, you can run the backup discovery tool.
2. In the Data Domain system list in the dialog box, select the appropriate Data Domain IP address
or hostname, storage unit, and username for the existing backups that you want the
PowerProtect Data Manager software to discover.
Note: Select only one storage unit at a time. After discovery is complete for the storage
unit, you can run the backup discovery tool again to discover the backups of another
storage unit.
3. In the Client hostname field, you can change the client hostname from the default local
hostname as needed.
To enable the backup discovery for an AAG or FCI, you must specify the appropriate client
hostname:
l If the host is part of an AAG, specify the Windows cluster name.
l If the host is part of a SQL virtual server or FCI, specify the virtual server name.
4. In the Backup discovery time period field, select the number of months for the time period,
as the time in the past when the backups were performed. You can select 1 month, 2 months,
or 3 months for the time period.
5. After you have specified the required field values, click Generate.
When the PowerProtect Data Manager software completes the generation of the backup
metadata or breadcrumbs, the following message appears in the dialog box. Depending on the
number of old backups, the generation of breadcrumbs can take some time:
Prerequisites
Ensure that you meet the required prerequisites before you add an Oracle asset.
Verify that the environment meets the following requirements:
l Ensure that all clocks on both the Oracle host and PowerProtect Data Manager are time-
synced to the local NTP server to ensure discovery of the backups.
l Ensure that the Oracle host and the PowerProtect Data Manager network can see and resolve
each other.
l Ensure that port 7000 is open on the Oracle host.
l If you are going to register Oracle RAC nodes to PowerProtect Data Manager, set the
db_domain parameter on every RAC node in the RAC database instance:
1. Use sqlplus to log in to your database.
2. Run the command: sqlplus / as sysdba
3. Run the command: show parameters db_domain
The following output is displayed:
NAME TYPE VALUE ------------------------------------ -----------
------------------------------
db_domain string SQL> alter system set db_domain='admdb'
scope=spfile sid='*';
System altered.
1. shutdown immediate;
2. startup;
2. Change the ownership of the tar file to the oracle user by running the following command:
Uncompress the downloaded tar file using the oracle user by running the following
command:
3. Ensure that no backups are running. Stop the RMAN processes before you install the Oracle
RMAN agent.
4. As one of the system's Oracle users (recommended), run the install.sh script:
$ install.sh
6. If ORACLE_HOME is set in the environment, the install.sh script displays the following
type of prompt. Type n, as required for a new installation:
The Oracle RMAN agent library, libddobk.so, does not exist in /space/
oracle/app/oracle/product/12.1.0/dbhome_1/lib.
Do you want to update settings in /space/oracle/app/oracle/product/
12.1.0/dbhome_1 directory so that RMAN scripts from previous
installation can be reused? (y or n) n
7. To verify the installed version of Oracle RMAN agent, run the following command:
$ /home/oracle/opt/dpsapps/rmanagent/bin/ddutil -i
ddutil -s
User: PLC-PROTECTION-1557475568457
Type: PRIMARY
2. If the pre-19.2 Oracle RMAN agent is integrated with eCDM, perform the following steps to
upgrade the eCDM software to PowerProtect Data Manager software:
a. In the eCDM UI menu, select Upgrade under System Settings.
b. To upload the upgrade package, click Upload Package.
The following message appears when the package has been uploaded:
State: UPGRADED
3. To stop the eCDM agent on the Oracle RMAN agent client host, run the following command:
/usr/local/ecdm/ecdm-agent/bin/ecdm-agent.bin stop
4. Upgrade the Oracle RMAN agent according to the instructions in Install the Oracle RMAN
agent on page 58.
For example, when you run the install.sh script to perform the upgrade, the following
type of output appears:
install.sh
Do you want to install under the default installation directory /home/
oracle/opt/dpsapps/rmanagent? (y or n) y
An Oracle RMAN agent already exists. Do you want to continue the
installation? (y or n) y
Installing the Oracle RMAN agent.
Copying the lockbox libraries to /home/oracle/opt/dpsapps/rmanagent/
lib/.
Copying libddobk.so to /home/oracle/opt/dpsapps/rmanagent/lib/.
Copying libDDBoost.so to /home/oracle/opt/dpsapps/rmanagent/lib/.
Copying ddutil to /home/oracle/opt/dpsapps/rmanagent/bin/.
Copying the dependency libraries to /home/oracle/opt/dpsapps/rmanagent/
lib/.
Copying the ddbmcon program to /home/oracle/opt/dpsapps/rmanagent/bin/.
Upgrading the lockbox.
Import operation is not needed because the lockbox version is already
updated.
As a PowerProtect Data Manager user, update the existing Data Domain
details? (y or n) y
Data Domain server name: 10.36.52.98
Data Domain Storage Unit name: PLC-PROTECTION-1557475568457
Successfully updated the DD Boost credentials in the lockbox.
As a PowerProtect Data Manager user, update the existing Data Domain
details? (y or n) n
Updated the lockbox.
Successfully installed the Oracle RMAN agent.
Do you want to uninstall the previous Oracle RMAN agent in /u01/app/
oracle/product/12.1.0/dbhome_1 directory? (y or n) y
The Oracle RMAN agent is uninstalled.
Do you want to update settings in /u01/app/oracle/product/12.1.0/
dbhome_1 directory so that RMAN scripts from previous installation can
be reused? (y or n) y
Updating settings in the /u01/app/oracle/product/12.1.0/dbhome_1
directory.
Settings are updated.
Installation is completed.
5. If you upgraded the eCDM software to PowerProtect Data Manager software in step 2,
perform the following steps to uninstall the eCDM agent and install the PowerProtect agent:
a. To uninstall the eCDM agent, run the rpm -e ecdm-agent-3.0.0-15_1.x86_64
command. For example:
rpm -e ecdm-agent-3.0.0-15_1.x86_64
Uninstalling ecdm-agent...
ecdmagent.service - eCDM Agent Service
Loaded: loaded (/etc/systemd/system/ecdmagent.service; enabled)
:
b. To install the PowerProtect agent, run the rpm -ivh adm-agent-19.x.x. rpm
command, where x.x is the current version. For example:
Updating / installing...
1:adm-agent-19.1.0-1_SNAPSHOT201904#################################
[100%]
Installing adm-agent...
2019/05/10 14:48:56 Adding current path for configurations: /usr/
local/ecdm/ecdm-agent/bin
2019/05/10 14:48:56 nameLogfile logfile
2019/05/10 14:48:56 Flags &{ControlAction:install Unregister:false
Upgrade:false LogFile:/usr/local/ecdm/ecdm-agent/logs/admagent.log
Port:7000 AgentID: ECDMHost: ECDMPort:8443 ECDMScheme:https
AppAgentPaths:[]}
2019/05/10 14:48:57 ADM Agent daemon control 'install' is successful
6. To register the Oracle RMAN agent to the PowerProtect server, run the register.sh
script. For example:
/usr/local/ecdm/ecdm-agent/bin/register.sh
2019/05/10 14:49:25 Adding current path for configurations: /usr/local/
ecdm/ecdm-agent/bin
2019/05/10 14:49:25 nameLogfile logfile
2019/05/10 14:49:25 Flags &{ControlAction:stop Unregister:false
Upgrade:false LogFile:/usr/local/ecdm/ecdm-agent/logs/admagent.log
Port:7000 AgentID: ECDMHost: ECDMPort:8443 ECDMScheme:https
AppAgentPaths:[]}
2019/05/10 14:49:25 ADM Agent daemon control 'stop' is successful
Enter PowerProtect Data Manager IP/Hostname: blrv136h018.lss.emc.com
Enter App Agent Home (press enter for default home /home/oracle/opt/
dpsapps/rmanagent):
unregister host
2019/05/10 14:49:35 Adding current path for configurations: /usr/local/
ecdm/ecdm-agent/bin
:
Do you want to set the default retention time for automatic retention
management by PowerProtect of existing backups? (y or n) y
Provide default retention time in number of days: 2
Allow SYSDBA access for RMAN agent? (y or n) y
2019/05/10 14:49:45 Adding current path for configurations: /usr/local/
ecdm/ecdm-agent/bin
2019/05/10 14:49:45 nameLogfile logfile
2019/05/10 14:49:45 Flags &{ControlAction:start Unregister:false
Upgrade:false LogFile:/usr/local/ecdm/ecdm-agent/logs/admagent.log
Port:7000 AgentID: ECDMHost:blrv136h018.lss.emc.com ECDMPort:8443
ECDMScheme:https AppAgentPaths:[/home/oracle/opt/dpsapps/rmanagent]}
2019/05/10 14:49:45 ADM Agent daemon control 'start' is successful
7. To complete the upgrade, manually approve the Oracle RMAN agent from the PowerProtect
Data Manager server. Manage the File System agent on page 84 provides information.
You can run the uninstall.sh script manually or automatically. To enable the automatic
operation, you must set the appropriate environment variables as listed in Table 19 on page 63:
l When the variables are not set, the script runs manually and prompts for the required values.
l When the variables are set, the script runs automatically and performs the uninstallation
according to the environment variable settings.
Note: It is not necessary to uninstall the Oracle RMAN agent for an upgrade. An existing
Oracle RMAN agent is overwritten during an upgrade.
Perform the following steps to uninstall the Oracle RMAN agent.
Procedure
1. Ensure that backup and restore operations are not in progress when you uninstall the Oracle
RMAN agent.
2. If you want the uninstallation script to run automatically, ensure that
RMAN_AGENT_HOME and RMAN_AGENT_UNINSTALL_OPTIONS are set as described in
Table 19 on page 63.
To verify the value of an environment variable, run the echo command. For example:
# echo $RMAN_AGENT_HOME
/home/oracle/opt/dpsapps/rmanagent
# export RMAN_AGENT_HOME=/opt/dpsapps/rmanagent
# ./uninstall.sh
4. If the script does not run automatically, type the appropriate values at the prompts:
a. When prompted, specify whether you want to enter the directory pathname of the
Oracle RMAN agent installation:
If you type y, then the script prompts for the installation location. Type the complete
pathname of the installation location, without a slash (/) at the end.
b. When prompted, specify whether you want the lockbox and configuration file to be
removed:
c. If the script detects an additional installation of Oracle RMAN agent, the script prompts
whether to uninstall that version. You can specify to keep or uninstall the software.
The script removes the Oracle RMAN agent software and prints the following message:
When you perform a self-service backup managed by PowerProtect Data Manager, the
PowerProtect Data Manager protection policy settings for the given database will override the
target protection storage settings specified in the RMAN backup script, including the Data
Domain server hostname and storage unit name.
1. Install and register the required PowerProtect Data Manager application data management
(ADM) agent on the Oracle RMAN agent host as described in Install the PowerProtect Data
Manager agent on page 65.
2. Enable the ddbmcon program to connect to the local Oracle databases during PowerProtect
Data Manager operations. How the Oracle RMAN agent communicates with PowerProtect
Data Manager on page 67 provides details.
3. Verify the connectivity from the ddbmcon program to the Oracle database by using the
ddutil program with the required options. Verify the connectivity from ddbmcon on page
71 provides details.
4. Ensure that the /etc/oratab file contains a complete list of all the Oracle SIDs on the host.
The Oracle RMAN agent uses the information in the file to discover the database resources on
the system, which enables the PowerProtect Data Manager operations.
In an Oracle RAC environment, ensure that the /etc/oratab file contains an entry for each
database instance. Manually add any database instance entries that do not yet exist in the file.
Each entry must have the following format:
<ORACLE_SID>:<ORACLE_HOME>:<N|Y>
Note: Only with Oracle RAC 12.2 or later, each entry can have the following format:
<DATABASE_UNIQUE_NAME>:<ORACLE_HOME>:<N|Y>
As recommended by Oracle, ensure that all the archived redo logs in the Oracle RAC
environment reside on shared storage or a shared cluster file system that is accessible from all
the RAC nodes. Select one node to be the backup node and set the IS_RAC_BACKUP_NODE
parameter accordingly, as described in Configuration file requirements for connection to local
databases on page 68.
Updating / installing...
1:admagent-19.2.0-1_SNAPSHOT201904################################# [100%]
Installing adm-agent...
2019/05/10 14:48:56 Adding current path for configurations: /usr/local/
ecdm/ecdm-agent/bin
2019/05/10 14:48:56 nameLogfile logfile
2019/05/10 14:48:56 Flags &{ControlAction:install Unregister:false
Upgrade:false LogFile:/usr/local/ecdm/ecdmagent/logs/admagent.log
Port:7000 AgentID: ECDMHost:ECDMPort:8443 ECDMScheme:https AppAgentPaths:
[]}
2019/05/10 14:48:57 ADM Agent daemon control 'install' is successful
Please run /usr/local/ecdm/ecdm-agent/bin/register.sh to register this
system to a Dell EMC PPDM Server.
If OS authentication is disabled for one or more Oracle databases on the
client, refer to Oracle RMAN Agent Administration Guide to use another
authentication option for discovery.
3. To register the Oracle RMAN agent with the PowerProtect Data Manager server, run the
register.sh script:
/usr/local/ecdm/ecdm-agent/bin/register.sh
a. When prompted by the register.sh script, type the hostname or IP address of the
PowerProtect Data Manager home:
Enter App Agent Home (press enter for default home /home/oracle/opt/
dpsapps/rmanagent):
c. When prompted, you can set the retention time as the number of days that the
PowerProtect Data Manager will retain any backups that already exist on the system:
Do you want to set the default retention time for automatic retention
management by PowerProtect of existing backups? (y or n) y
Provide default retention time in number of days: 1
d. When prompted, specify whether Oracle OS authentication will use the SYDBDA role
when connecting to Oracle. If you type n, then OS authentication will use the
SYSBACKUP role:
The script completes by starting the daemon that connects to PowerProtect Data
Manager:
adm-agent-19.2.0-1_SNAPSHOT20190530071531.x86_64
3. If the adm agent exists on the Oracle client, uninstall the adm agent by running the following
command:
# rpm -e adm-agent-19.2.0-1_SNAPSHOT20190530071531.x86_64
How the Oracle RMAN agent communicates with PowerProtect Data Manager
The Oracle RMAN agent program ddbmcon handles all communication between the Oracle RMAN
agent and PowerProtect Data Manager.
Note: You cannot run the ddbmcon program manually. The program is only run by the
PowerProtect Data Manager agent.
When the ddbmcon program performs discovery, backup, or deletion operations, it connects to
the Oracle database. The following authentication methods are supported:
1. Database authentication—The ddbmcon program first tries to connect to the Oracle database
instance by using database authentication. The program tries to use the database
administrator username and password to connect to the database instance.
2. Oracle wallet authentication—If database authentication fails or is not enabled, the ddbmcon
program tries to connect by using Oracle wallet authentication. The program tries to use the
parameter settings from the configuration file to connect to the database instance.
3. Operating system authentication—If Oracle wallet authentication also fails or is not enabled,
the ddbmcon program tries to connect by using operating system authentication. The program
tries to change the real process user ID to the Oracle installation user ID, to connect to the
database instance.
The ddbmcon program tries all these authentication methods for each Oracle database instance.
The program reports a connection error if it cannot connect to the database instance by using any
of these methods. If one of these methods succeeds, the ddbmcon program ignores the other
authentication methods and proceeds to retrieve the information as used by the PowerProtect
Data Manager.
Ensure that you enable one of these three authentication methods for the ddbmcon program. For
maximum ease of use, it is recommended that you enable the operating system authentication
method. Both the database and Oracle wallet authentication methods require additional
configuration steps on the Oracle host and parameter settings in the configuration file
rman_agent.cfg.
# #############################################################################
#
# rman_agent.cfg
#
# All rights reserved.
#
# Oracle RMAN agent 19.2
#
# This template is designed to help users to configure the authentication of
# RMAN agent. Check the product administration guide for a complete list of
# all the supported parameters and rules for editing the configuration file.
#
# Make a copy of this file before making any modifications.
# To enable a parameter, uncomment or add the parameter in the file and
# specify its value.
#
# #############################################################################
#
# #############################################################################
# Oracle parameters.
# There can be repetitive sections of Oracle parameters. The Oracle database
# the parameters belong to is described in the section name: SID_name. The
# name here must be replaced by the SID of the database.
# #############################################################################
[SID_name]
# ORACLE_SERVICE =
# ORACLE_USER =
# ORACLE_OS_USER =
# TNS_ADMIN =
# RMAN_CATALOG_SERVICE =
# RMAN_CATALOG_USER =
# IS_RAC_BACKUP_NODE =
To set a particular parameter in the configuration file, such as ORACLE_SERVICE, remove the #
symbol at the start of the parameter line and add the parameter value after the equal sign (=).
You can complete the following settings in the configuration file:
l SID_name is mandatory for each authentication method when you set any parameters in the
file for a particular system ID (SID). [SID_name] (for example, [SID_orcl]) must appear on a
separate line before all the parameter settings for the SID:
n For Oracle 10g, 11g, and non-RAC systems, SID_name must match the SID in the /etc/
oratab file.
n For Oracle 12c RAC systems, SID_name must match the SID that runs on the local host.
Note: Each Oracle SID on the same system requires its own entries in the configuration
file. You must use the same configuration file for all the Oracle SIDs.
Authentication requirements
The following subtopics provide details about the three authentication methods that the ddbmcon
program supports.
Note: If the lockbox does not exist when you run the ddutil command, the command creates
the lockbox in the default directory.
The options -C and -a USER_TYPE=DATABASE_ADMIN are mandatory. If you do not specify the
other -a options, -a DATABASE_SIDS=<database_SIDs> and -a
USERNAME=<administator_username>, the command prompts for the database SIDs and
administrator username. The command always prompts for the administrator password.
If multiple databases exist on the system and all use the same administrator username and
password, you can add the credentials for all the databases to the lockbox with the same ddutil
command. You must specify the database SIDs as a comma-separated list. For example:
ddutil -C -a USER_TYPE=DATABASE_ADMIN
ddutil -C -a USER_TYPE=DATABASE_ADMIN -a
DATABASE_SIDS=orcl1,orcl2,orcl3,orcl4,orcl5,db1,db2 -a USERNAME=SYS
To enable the database authentication method, you must also set the following parameters for
each required SID in the rman_agent.cfg configuration file:
l Set ORACLE_SERVICE and ORACLE_USER. ORACLE_USER must match the username that is
saved in the lockbox.
l If the Oracle Net configuration files reside in a non-default directory, set TNS_ADMIN to the
directory pathname.
l If an RMAN catalog is used, set RMAN_CATALOG_SERVICE and RMAN_CATALOG_USER.
For example, the rman_agent.cfg configuration file includes the following settings to enable the
database authentication for the database SID orcl:
[SID_orcl]
ORACLE_SERVICE = DBFS
ORACLE_USER = ORACLE1
TNS_ADMIN = /home/oracle/wallet
To confirm that database authentication is enabled, you can log in as the root user and run the
ddutil commands as described in Verify the connectivity from ddbmcon on page 71.
l Set ORACLE_SERVICE to the TNS or Net service name. For example, set the parameter to the
value DBFS.
l If the Oracle Net configuration files reside in a non-default directory, set TNS_ADMIN to the
directory pathname.
l If an RMAN catalog is used, set RMAN_CATALOG_SERVICE and RMAN_CATALOG_USER.
For example, the rman_agent.cfg configuration file includes the following settings to enable the
Oracle wallet authentication for the database SID orcl:
[SID_orcl]
ORACLE_SERVICE = DBFS
TNS_ADMIN = /home/oracle/<alternate_TNS_location>
To confirm that Oracle wallet authentication is enabled, you can log in as the root user and run the
ddutil commands as described in Verify the connectivity from ddbmcon on page 71.
[SID_orcl]
ORACLE_OS_USER = ORACLE1
To confirm that operating system authentication is enabled, you can log in as the root user and run
the ddutil commands as described in Verify the connectivity from ddbmcon on page 71.
l Host verification
l Instance verification
l RMAN verification
Host verification
To perform the host verification, run the ddutil -v host command as the root user.
The ddutil -v host command output includes the Oracle instances found on the system and
basic information about each Oracle instance.
For example, the following ddutil -v host command lists one Oracle instance and the
authentication method as database authentication:
ddutil -v host
Instance verification
To perform the instance verification, run the ddutil -v inst command as the root user. The
command tests the OCI connection to the database, and provides similar output to the host
verification command. In addition, the output lists the database objects that are discovered. You
can use the command to determine if the ddbmcon program has the required read access for the
database objects.
For example, the following ddutil -v inst command lists one Oracle instance and the
database objects. The authentication method is listed as database authentication:
ddutil -v inst
RMAN verification
To perform the RMAN verification, run the ddutil -v rman command as the root user. This
verification is required only if you use an RMAN catalog. Database authentication or Oracle wallet
authentication can be used to connect to an RMAN catalog. (Operating system authentication
cannot be used with the RMAN catalog.)
The ddutil -v rman command tests whether the ddbmcon program can connect to the target
database and catalog database through an RMAN script, as required to perform an active deletion
of Oracle backups.
Note: To enable an active deletion through RMAN, the Data Domain credential must be stored
in the lockbox.
The ddutil -v rman command displays the following three sections of output for the RMAN
verification:
1. Target database connection information:
l Authentication type, listed as operating system user, Oracle database user, or Oracle wallet
user.
l For operating system authentication, only the operating system user is listed.
l For database authentication, the operating system user, Oracle service, and database user
are listed.
l For Oracle wallet authentication, the Oracle service and TNS_ADMIN value are listed.
2. Catalog database connection information:
l Authentication method, listed as Oracle database user or Oracle wallet user.
l For database authentication, the database service and database user are listed.
l For Oracle wallet authentication, the Oracle service and TNS_ADMIN value are listed.
3. Output of the RMAN script, which shows the connection information and any error messages.
For example, the following ddutil -v rman command displays the three sections of output,
showing that the database authentication method is used for both the target database and catalog
database:
ddutil -v rman
RMAN output:
4>
5>
connected to target database: CER (DBID=1040017416)
connected to recovery catalog database
Recovery Manager complete
ddutil -s
User: RMAN87-SS-CT-blrv35a029-a7bc3
Type: PRIMARY
User: RMAN87-SS-CT-blrv35b179-c9de5
Type: PRIMARY
"10.25.115.113"
"10.25.115.112"
"10.25.115.145"
l Visibility of both existing backups and any new self-service or PowerProtect Data Manager
policy-driven backups of onboarded assets.
l Retention management of all backups. The retention time of existing backups can be set during
the PowerProtect Data Manager registration.
l Automatic configuration of target protection storage based on the PowerProtect Data
Manager protection policies that are used for your database.
l All the other functionality that is provided for PowerProtect Data Manager protection policies.
Self-service operations use the Data Domain backup host and storage unit managed by
PowerProtect Data Manager
With Oracle RMAN agent 19.1 or later, you can provide the Data Domain backup host and storage
unit in the RMAN scripts. After you use PowerProtect Data Manager to add an asset to the
protection policy, you might want to keep using the existing RMAN scripts instead of or along with
scheduling backups through PowerProtect Data Manager.
When you create a protection policy, the PowerProtect Data Manager software creates a storage
unit on the specified Data Domain backup host that is managed by PowerProtect Data Manager.
All subsequent backups will go to this new storage unit. This implementation overrides the backup
host and storage unit information that is provided in the script with the backup host and storage
unit information that is provided by PowerProtect Data Manager.
Setting and reporting the retention time for existing backups
With Oracle RMAN Agent 19.1 or later, any backups that are performed before you add an asset to
a PowerProtect Data Manager protection policy are considered existing backups. You can set the
retention time for existing backups during registration with the PowerProtect Data Manager
server by using the register.sh script. This retention time is reported to PowerProtect Data
Manager during backup discovery.
Note: If a retention time is not specified for existing backups, the backup copies in
PowerProtect Data Manager will never expire.
Support existing Oracle RMAN agent backups with PowerProtect Data Manager
Learn how to support existing Oracle RMAN agent backups.
Procedure
1. Upgrade the Oracle RMAN agent on the Oracle server host.
Upgrade the Oracle RMAN agent on page 60 provides information.
2. Register and approve the Oracle RMAN agent in PowerProtect Data Manager.
Manage the File System agent on page 84 provides information.
After a few minutes of approving the Oracle agent, all the old backup copies start to be
discovered. Depending on the number of backups, the discovery and subsequent visibility of
the backups in PowerProtect Data Manager can take some time. The retention time of the
discovered existing backup copies will be equal to the retention time set in the protection
policy plus 14 days and 1 day.
3. Discover and add the credentials for the Oracle RMAN agent host.
Discover an Oracle or SQL application host on page 111 provides information.
4. Create a protection policy to protect the Oracle RMAN agent host.
Add a protection policy for Oracle database protection on page 125 provides information.
The first backup after onboarding must be a full backup:
5. Perform a self-service Application Direct backup of Oracle databases. Onboarded assets can
be part of either a centralized or self-service protection policy.
Performing self-service backups of Oracle databases on page 166 provides information.
Note: You cannot perform a backup to a secondary Data Domain device. You can only
restore from a secondary Data Domain device
fsagent-19.2.0.0.exe /s PPDMHostName=<<PPDM-server-IP>>
fsagent-19.2.0.0.exe /s PPDMHostName=<<PPDM-server-IP>>
ProductInstallPath="D:\alternate-path"
Note: PPDMHostName is a mandatory option in the command line. If a value is not provided,
the product is installed without PowerProtect registration, and no backups can be initiated
from the UI. Specifying ProductInstallPath is optional, but if used, the value cannot be empty.
Silent uninstallation commands
To perform a silent uninstall without uninstalling common components (such ADM or BBB), run:
fsagent-19.2.0.0.exe /s /uninstall
l Add IP Address
Perform the following steps:
a. Type the IP Address for the application agent.
b. Specify the date until which the application agent is pre-approved.
c. Click Save.
l CSV Filename
Perform the following steps:
a. Click the Choose File icon.
Note: The contents of the .CSV file must be in the following format, for example:
"10.25.115.113"
"10.25.115.112"
"10.25.115.145"
l Ensure that the host and the PowerProtect Data Manager network can see and resolve each
other.
l If using replication, ensure that you add a secondary Data Domain system.
Example 1 Format 1: One restore device group and one restore storage group
This format is optimal when you have one restore device group and one restore
storage group. In this format:
Example 1 Format 1: One restore device group and one restore storage group (continued)
[PRIMARY_SYSTEM]
DDBOOST_USER = <boost_user>
DEVICE_HOST = <dd_host>
DEVICE_PATH = <ddboost_devPath>
DDVDISK_USER = <vdisk_user>
# RESTORE_DEVICE_POOL = <device_pool>
# RESTORE_DEVICE_GROUP = <device_group>
# DD_BOOST_FC =
# DD_PORT =
VMAX_FASTX_RESTORE_SG = <restore_sg>
# SELECT_VISIBLE_RESTORE_DEVICES =
|
|
|
[BACKUP_SOURCE_DEVICES]
# SRC_DEVICE1 = 000196700638:00F1A
# SRC_DEVICEn =
SRC_GROUP1 = <symmId:SourceGrp1>
SRC_GROUP2 = <symmId:SourceGrp2>
SRC_GROUP3 = <symmId:SourceGrp3>
# SRC_GROUPn =
Example 2 Format 2: Multiple restore device groups and restore storage groups
This format is optimal when you have multiple restore device groups and restore
storage groups. In this format:
l For each source storage group, there should be a corresponding restore storage
group and restore device group.
l The same number of entries must exist for RESTORE_DEVICE_GROUP and
VMAX_FASTX_RESTORE_SG as the number of source storage groups in a 1:1
mapping, and the order should be maintained, as in the first
RESTORE_DEVICE_GROUP and VMAX_FASTX_RESTORE_SG entry should correspond
to SRC_GROUP1, the second RESTORE_DEVICE_GROUP and
VMAX_FASTX_RESTORE_SG entry should correspond to SRC_GROUP2, and so on.
l Since there should only be one entry of RESTORE_DEVICE_GROUP and
VMAX_FASTX_RESTORE_SG, other entries should be commented.
Example 2 Format 2: Multiple restore device groups and restore storage groups (continued)
[PRIMARY_SYSTEM]
DDBOOST_USER = <boost_user>
DEVICE_HOST = <dd_host>
DEVICE_PATH = <ddboost_devPath>
DDVDISK_USER = <vdisk_user>
# RESTORE_DEVICE_POOL = <device_pool_sg1>
# RESTORE_DEVICE_GROUP = <device_group_sg1>
# RESTORE_DEVICE_GROUP = <device_group_sg2>
# RESTORE_DEVICE_GROUP = <device_group_sg_3>
# DD_BOOST_FC =
# DD_PORT =
VMAX_FASTX_RESTORE_SG = <restore_sg1>
# VMAX_FASTX_RESTORE_SG = <restore_sg2>
# VMAX_FASTX_RESTORE_SG = <restore_sg3>
# SELECT_VISIBLE_RESTORE_DEVICES =
|
|
|
[BACKUP_SOURCE_DEVICES]
# SRC_DEVICE1 = 000196700638:00F1A
# SRC_DEVICEn =
SRC_GROUP1 = <symmId:SourceGrp1>
SRC_GROUP2 = <symmId:SourceGrp2>
SRC_GROUP3 = <symmId:SourceGrp3>
# SRC_GROUPn =
3. Install the Storage Direct agent on the Storage Direct/ProtectPoint host system.
Installing or Upgrading Storage Direct on page 94 provides information.
4. Approve the Storage Direct agent in the PowerProtect Data Manager UI on each Storage
Direct/ProtectPoint host system.
Manage the Storage Direct agent on page 98 provides information.
5. Ensure that the Storage Direct agent has been discovered.
Discover a Storage Direct agent host on page 112 provides information.
6. In the PowerProtect Data Manager UI, verify that the VMAX assets (storage groups) have
been discovered, and that the host name appears next to these assets.
Add and discover the SMIS server for the Storage Direct agent on page 113 provides
information about how to verify that these assets have been discovered, and Add a
protection policy for Storage Direct protection on page 132 provides information about
adding assets to a protection policy.
7. Create a protection policy in the PowerProtect Data Manager UI by selecting the Storage
Group policy type and choosing the I want PPDM to automatically provision and manage
all storage needed to achieve this objective option.
Add a protection policy for Storage Direct protection on page 132 provides information.
8. Review the configuration file that is automatically generated upon the successful
configuration of the Storage Direct agent in PowerProtect Data Manager to ensure that the
file contains the information identified in Additional setup and configuration file
requirements for existing Storage Direct users on page 89. This file is required to perform
self-service backup and restore.
Add a protection policy for Storage Direct protection on page 132 provides information
about the type of information that the configuration file contains, and how this file is used
when executing the backup command.
Note: Do not make any changes to this configuration file.
9. Run the protectpoint snapbackup create command with the configuration file name
specified in order to perform the self-service backup.
The Storage Direct Agent Installation and Administration Guide, and the After you finish
section of Add a protection policy for Storage Direct protection on page 132, provide
information about running this command with the configuration file.
3. Modify your existing configuration file(s) to ensure that the file contains the information
required by PowerProtect Data Manager to run the VMAX Storage Group policy, and to
ensure the file is in an acceptable format, as described in the section Additional setup and
configuration file requirements for existing Storage Direct users on page 89.
4. Upgrade the Storage Direct agent on the Storage Direct/ProtectPoint host system.
Installing or Upgrading Storage Direct on page 94 provides information.
5. Approve the Storage Direct agent in the PowerProtect Data Manager UI on each Storage
Direct/ProtectPoint host system.
Manage the Storage Direct agent on page 98 provides information.
6. Ensure that the Storage Direct agent has been discovered.
Discover a Storage Direct agent host on page 112 provides information.
7. In the PowerProtect Data Manager UI, verify that the VMAX assets (storage groups) have
been discovered, and that the host name appears next to these assets.
Add and discover the SMIS server for the Storage Direct agent on page 113 provides
information about how to verify that these assets have been discovered, and Add a
protection policy for Storage Direct protection on page 132 provides information about
adding assets to a protection policy.
8. Create a protection policy in the PowerProtect Data Manager UI by selecting the Storage
Group policy type and choosing the I will provision and manage my own storage option.
Add a protection policy for Storage Direct protection on page 132 provides information.
9. Review the configuration file that is automatically generated upon the successful
configuration of the Storage Direct agent in PowerProtect Data Manager to ensure that the
file contains the information identified in Additional setup and configuration file
requirements for existing Storage Direct users on page 89. This configuration file will be
used going forward instead of your previous configuration file(s) to perform self-service
backup and restore.
Add a protection policy for Storage Direct protection on page 132 provides information
about the type of information that the configuration file contains, and how this file is used
when executing the backup command for the initial snapshot.
Note: Do not make any changes to this configuration file.
10. Run the protectpoint snapbackup create command with the configuration file name
specified in order to perform the self-service backup.
The Storage Direct Agent Installation and Administration Guide, and the After you finish
section of Add a protection policy for Storage Direct protection on page 132, provide
information about running this command with the configuration file.
gunzip storagedirectagent192_<platform>.tar.gz
install.sh
Note: During the installation, you are prompted for the hostname or IP address of the
PowerProtect Data Manager. As an alternative, you can include the --server option
when you run the install.sh installation script, as in the following:
install.sh --server=<PowerProtect_Data_Manager_server_hostname_or_IP>
To obtain a list of all the available command options for the install.sh command, run the
command install.sh --help or install.sh -h. The command also supports the --
debug or -d option for debugging purposes.
gunzip storagedirectagent192_<platform>.tar.gz
install.sh -u
Note: Later in the upgrade, you are prompted for the hostname or IP address of the
PowerProtect Data Manager. As an alternative, you can include the --server option
when you run the install.sh -u command, as in the following:
install.sh -u --
server=<PowerProtect_Data_Manager_server_hostname_or_IP>
Procedure
1. Select Infrastructure > Application Agents.
2. In the Application Agents window, select the entry that contains the host name, and click
Approve.
The status changes from Awaiting Approval to Registered.
Note: The Auto whitelist option, which enables you to pre-approve application
agents automatically, is disabled by default. When you enable this option, the Storage
Direct agent registration is approved automatically.
l By default, PowerProtect Data Manager enforces SSL certificates during communication with
vCenter Server. If a certificate appears, click Verify to accept the certificate.
Note: It is highly recommended that you do not disable certificate enforcement. If disabling
the certificate is required, carefully review the instructions in the section Disable SSL
certification on the vCenter Server on page 200
Procedure
1. Select Infrastructure > Asset Sources.
The Asset Sources window appears.
2. Select the vCenter tab.
3. Click Add.
The Add vCenter dialog displays.
4. Specify the source's attributes:
a. In the Name field, specify the vCenter Server name.
b. In the Address field, specify the fully qualified domain name (FQDN) or the IP address.
Note: For a vCenter Server, we recommend that you use the FQDN instead of the IP
address.
c. In the Port field, specify the port for communication if you are not using the default port,
443.
5. Under Host Credentials, choose an existing entry from the list to use for the vCenter user
credentials. Alternatively, you can click Add from this list to add new credentials, and then
click Save.
Note: Ensure that you specify the credentials for a user whose role is defined at the
vCenter level, as opposed to being restricted to a lower level container object in the
vSphere object hierarchy.
6. If you want to make a subset of the PowerProtect Data Manager UI's functionality available
within the vSphere Client, move the vSphere Plugin slider to the right.
Available functionality includes the monitoring of active virtual machine/VMDK protection
policies, and restore options such as Restore to Original, Restore to New, and Instant
Access.
Note: You can unregister the vSphere plug-in at any time by moving the slider to the
left.
7. If the vCenter's SSL certificate cannot be trusted automatically, a dialog box appears
requesting certificate approval. Review the certificate and click Verify.
8. Click Save.
The vCenter Server information that you entered now appears as an entry in a table on the
Asset Sources window.
The initial vCenter Server discovery identifies all ESX clusters, hosts, and virtual machines within
the vCenter Server. Subsequent discoveries are performed automatically, according to a fixed
interval, to identify any additional or changed VMware entities since the last discovery operation.
You can also manually initiate a discovery of VMware entities at any time from the vCenter tab of
the Asset Sources window by selecting a vCenter Server and clicking Discover.
Upon vCenter Server and virtual asset discovery, the PowerProtect Data Manager VM Direct
protection engine facilitates the management of virtual assets as PowerProtect Data Manager
resources for the purposes of backup and recovery. We recommend that you also add an external
VM Direct Engine in the Protection Engines window. You can protect virtual machine assets by
manually adding the assets to a virtual machine protection policy, or by using dynamic filters to
determine which assets will be included in a protection policy according to pre-defined rules.
Setting vCenter 6.0 and later required privileges PowerCLI equivalent required privileges
Setting vCenter 6.0 and later required privileges PowerCLI equivalent required privileges
Setting vCenter 6.0 and later required privileges PowerCLI equivalent required privileges
l The ESX Host/Cluster list enables you to choose on which cluster or ESX host you want
to deploy the additional VM Direct Engine.
l The Network list shows all the networks that are available under the selected ESX Host/
Cluster.
l The Data Store list shows all datastores that are accessible to the selected ESX Host/
Cluster based on ranking (whether the datastores are shared, local, or NFS), and
available capacity (the datastore with the most capacity appearing at the top of the list).
l You can choose the specific datastore on which the VM Direct appliance will reside or
leave the default selection of <automatic> to enable PowerProtect Data Manager to
determine the best location to host the VM Direct appliance.
l The Transport Mode list enables you to force using only Hot Add or only Network Block
Device (NBD) transport modes or to default to Hot Add mode and failback to NBD only if
Hot Add cannot be used.
Note: When configuring the VM Direct appliance in a VMware Cloud on AWS
environment, ensure that you select the transport mode as Hot Add only. VMware
Cloud on AWS does not support the NBD transport mode.
3. Click Save.
The VM Direct appliance is added to the VM Direct Engines pane. Note that it may take
several minutes before the additional VM Direct appliance is registered in PowerProtect
Data Manager. The VM Direct appliance appears in the vSphere Client window.
Results
When an extra VM Direct appliance is deployed and registered, this appliance is used by
PowerProtect Data Manager instead of the embedded VM Direct appliance for any data protection
operations involving virtual machine protection policies, unless all added VM Direct appliances are
unavailable. If no added VM Direct appliance is available, the embedded VM Direct appliance is
used as a fallback to perform limited scale backups and restores. If you do not want to use an
added VM Direct appliance, you can disable that proxy. Additional VM Direct actions on page 109
provides more information.
After you finish
If the VM Direct appliance deployment fails, review the network configuration of PowerProtect
Data Manager in the System Settings window to correct any inconsistencies in network
properties. After successfully completing the network reconfiguration, you must delete the failed
VM Direct appliance and then add the VM Direct appliance in the Protection Engines window.
When configuring the VM Direct appliance in a VMware Cloud on AWS environment, if the VM
Direct appliance is deployed to the root of the cluster instead of inside the Compute-
ResourcePool, you must move the VM Direct appliance inside the Compute-ResourcePool.
2. In the far right of the VM Direct Engines pane, click the three vertical dots.
3. From the menu, select Disable.
Note: A disabled VM Direct Engine is not used for any new protection activities, and is not
automatically upgraded during an PowerProtect Data Manager upgrade.
Delete a VM Direct Engine
When you disable a VM Direct Engine, the Delete button is enabled. If you no longer require the
VM Direct Engine, perform the following steps to delete the engine:
1. Select the VM Direct Engine that you want to remove from the table in the VM Direct Engines
pane.
2. In the far right of the VM Direct Engines pane, click the three vertical dots.
3. From the menu, select Disable.
4. Click Delete.
Enable a disabled VM Direct Engine
When you want to make a disabled VM Direct Engine available again for running new protection
activities, perform the following steps to re-enable the VM Direct Engine.
1. Select the VM Direct Engine that you want to re-enable from the table in the VM Direct
Engines pane.
2. In the far right of the VM Direct Engines pane, click the three vertical dots.
3. From the menu, select Enable.
Note: If a PowerProtect Data Manager version upgrade occurred while the VM Direct Engine
was disabled, a manual redeployment of the VM Direct Engine is also required.
Redeploy a VM Direct Engine
If a PowerProtect Data Manager software update occurred while a VM Direct Engine was disabled,
or an automatic upgrade of the VM Direct Engine did not occur due to network inaccessibility or an
environment error, the Redploy option enables you to manually update the VM Direct Engine to
the current version in use with the PowerProtect Data Manager software. Perform the following
steps to manually redeploy the VM Direct Engine.
1. Select the VM Direct Engine that you want to redeploy from the table in the VM Direct
Engines pane.
2. In the far right of the VM Direct Engines pane, click the three vertical dots.
3. If the VM Direct Engine is not yet enabled, select Enable from the menu.
4. When the VM Direct Engine is enabled, select Redploy from the menu.
The VM Direct Engine is redeployed with its previous configuration details.
Discovery time is based on networking bandwidth. The resources that are discovered and
those that are doing the discovery take a performance hit each time that you go through a
discovery process. It might appear that PowerProtect Data Manager is not updating the
Asset Sources data.
Note: Click Discover at any time if any additions or other changes to your Asset
Sources have taken place outside of the PowerProtect Data Manager environment.
Results
If the database is properly configured, these application hosts can now be added to a
PowerProtect Data Manager protection policy.
5. Click Save.
Results
When the File System is configured correctly, it can be added to a PowerProtect Data Manager
protection policy.
5. Click Save.
Results
If the Storage Direct agent is properly configured, the storage group assets can now be added to a
PowerProtect Data Manager Storage Group protection policy.
Add and discover the SMIS server for the Storage Direct
agent
In order to enable protection of data with the Storage Direct agent in PowerProtect Data
Manager, the addition of an SMIS server is required. The SMIS server facilitates the discovery of
LUNs for the storage groups configured in the VMAX. Perform the following steps to discover the
SMIS server as an asset source in the PowerProtect Data Manager UI.
Procedure
1. Select Infrastructure > Asset Sources.
The Asset Sources window appears.
2. Select the SMIS server tab.
3. Click Add.
The Add SMIS Server dialog box appears.
4. Provide the name, IP address, and port number of the SMIS server.
5. Under Host Credentials, choose an existing entry from the list to use for the SMIS server
user credentials, or click Add from this list to add new credentials.
6. Click Verify to check that the trusted certificate is valid for the specified host.
7. Click Save.
An entry appears for SMIS in the table on the Asset Sources window.
Note: A message does not appear if credential verification for this host was
unsuccessful. If the credentials are invalid, the status of the SMIS server entry in the
SMIS Server tab of the Infrastructure > Asset Sources window will indicate Failed.
8. Select the checkbox next to the entry and click Discover to initiate discovery of the assets,
or storage groups, in the VMAX.
Note: Asset discovery is also initiated by default after registration of the host to
PowerProtect Data Manager, and at daily intervals. Discovery time is based on
networking bandwidth. Note that each time that you initiate a discovery process, the
resources that are discovered and those that are handling the discovery impact system
performance.
When the discovery completes successfully, the Discovery Status column updates to OK.
After you finish
PowerProtect Data Manager initiates the automatic discovery of the assets (storage groups)
within the VMAX. To verify the discovery of storage groups, go to the Infrastructure > Assets
window and select the VMAX Storage Groups tab. Upon host registration with the PowerProtect
Data Manager server, all of the assets for the host (both those currently protected and
unprotected) display in the Assets window along with the host name.
Note: Ensure that you run a Discover of the SMIS server each time that you add a LUN to a
storage group.
l Protection policies................................................................................................................116
l Before you a create protection policy................................................................................... 118
l Add a protection policy for virtual machine protection......................................................... 118
l Add a protection policy for SQL database protection...........................................................122
l Add a protection policy for Oracle database protection....................................................... 125
l Add a protection policy for File System protection.............................................................. 129
l Add a protection policy for Storage Direct protection..........................................................132
l Add a Cloud Tier protection policy....................................................................................... 136
l Edit a protection policy........................................................................................................ 137
l Add or remove assets in a protection policy......................................................................... 137
l Removing expired backup copies......................................................................................... 138
l Export protection ................................................................................................................139
l Delete a protection policy.................................................................................................... 139
l Add a Service Level Agreement........................................................................................... 140
l Export Asset Compliance..................................................................................................... 142
l Dynamic filters .................................................................................................................... 143
Protection policies
Protection policies define sets of objectives that apply to specific periods of time. These objectives
drive configuration, active protection, and copy-data-management operations that satisfy the
business requirements for the specified data. Each plan type has its own set of user objectives.
Users with the System Admin role can create protection policies.
You can create the following types of protection policies:
l VMware Virtual Machines
l SQL Databases
l Oracle Databases
l File Systems
Table 21 Supported PowerProtect Data Manager protection policies and Storage Units by Data
Domain version
4 100 6
6
8
32 100 14
48
64 100 32
96
Differential 6 hours
Full Daily
l For Microsoft SQL Server AAG configurations, the database administrator specifies the AAG
backup preferences for backup in the Microsoft SQL Server Management Studio (SSMS).
These preferences control which AAG node is selected as the preferred node when you
perform a transaction log backup of AAG databases.
Procedure
1. Select Protection > Protection Policies.
2. In the Protection Policies window, click Add.
The Add Policy wizard appears.
3. On the Type page, specify the following fields, and then click Next:
l Name—Type a descriptive name for the protection policy.
l Description—Type a description for the policy.
l Type—Select Virtual Machine, which includes protection for SQL application-aware
virtual machines.
4. On the Purpose page, select from the following options to indicate the purpose of the new
protection policy group, and then click Next:
l Crash Consistent—Select this type for point-in-time backup of virtual machines.
l Application Aware —For virtual machines with a SQL application installed, select this
type to quiesce the application to perform the SQL database and transaction log backup.
When you select this type, you also need to provide Windows account credentials for the
virtual machine. You can provide the credentials at the protection lifecycle level and/or
the virtual machine asset level. When you provide the credentials at both levels, the
virtual machine asset credentials override the policy credentials.
l Exclusion—Select this type if there are virtual machine assets within the protection
policy that you plan to exclude from data protection operations.
5. In the Assets page, select the unprotected assets that you want to back up as part of this
protection policy, and then click Next.
If the virtual machines that you want to protect are not listed, do one of the following:
l Click Find More Assets to perform an updated asset discovery of the vCenter.
l Use the Search box to search by asset name.
l Select vCenter Hierarchy or All Virtual Machines from the filter on the right side of the
window to display a different view.
Note: When you configure a virtual machine application-aware protection policy to
protect a Microsoft SQL Server Always On availability group (AAG), you must add all
the virtual machines for that AAG to the same policy, to ensure proper protection.
Failure to do so might result in missed transaction log backups.
For the virtual machine application-aware case, the Assets page displays a warning about
the AAG policy configuration requirement.
Note: For Microsoft SQL Server AAG configurations, the database administrator can
specify the AAG backup preferences for a transaction log backup in the Microsoft
SQL Server Management Studio.
l Keep For—Specify the retention period for the backup.
l Start Time—Specify the time of day to start initiating backups.
l End Time—Specify the time of day to stop initiating backups.
Note: Any running backups will complete.
l Create Full—Select this option if you want to periodically force a full (level 0) backup,
and then specify how often to create these backups. When you select this option, the
backup chain is reset.
Note:
When a new asset is added to a protection policy during a scheduled backup window,
the backup starts right away. However, if an asset is added to a protection policy
outside of the scheduled backup window, the backup does not start until the next time
that backups are configured to run.
If a new asset is added to a protection policy that has a weekly or monthly backup
schedule and the current time is within the scheduled Start Time and End Time, the
backup runs right away, regardless of the date. If the current time is not within the
scheduled Start Time and End Time, the backup does not start until the next time that
backups are configured to run.
l To add a system, select Add, and complete the details in the Storage Target window.
Add Protection Storage provides instructions.
When you select the destination storage, the Space field updates with the available capacity
on the system.
13. Click Set Storage Quotas to set storage space restrictions for a Data Domain MTree or
Storage Unit to prevent the consumption of excess space. There are two kinds of quota
limits—hard limits and soft limits. You can set either a soft or hard limit or both a soft and
hard limit. Both values must be integers, and the soft value must be less than the hard value.
Note: When you set a soft limit and the limit is reached, an alert is generated but data
can still be written to the Data Domain. When you set a hard limit and the limit is
reached, data cannot be written to the MTree. Therefore, all data protection operations
fail until data is deleted from the MTree. The Data Domain Operating System
Administration Guide provides more information about MTree quota configuration.
a. Capacity Quota — Controls the total size of pre-compression data written to the Data
Domain.
b. Stream Quota — The number of concurrent streams allowed on the system during data
protection operations. Setting a Stream Quota limit can help ensure that system
performance is not impacted negatively if a data protection operation is consuming too
many system resources.
14. Select the Retention Lock check box to enable retention locking for these backups on the
selected system.
Note: Primary backups are assigned a default retention lock period of 14 days.
Replicated backups, however, are not assigned a default retention lock period. If you
select this check box for a replicated backup, ensure that you set the Keep For field in
the Add Primary Replicate backup schedule dialog to a minimum number of 14 days so
that the replicated backup does not expire before the primary backup.
15. From the Network interface list, select a network interface card (NIC), if applicable.
16. Click Next.
The Summary page appears.
17. Review the protection policy group configuration details. Except for the protection policy
type, you can click Edit next to any completed details to change the protection policy
information. When completed, click Finish.
An informational message appears to confirm that PowerProtect Data Manager has saved
the protection policy. When the new protection policy group is created, PowerProtect Data
Manager automatically performs a full backup. For virtual machines, if you have not yet
added a VM Direct appliance, the backup is performed using the embedded VM Direct
appliance. Subsequent backups are performed according to the schedule specified.
18. Click OK to exit the window, or click Go to Jobs to open the Jobs window to monitor the
backup of the new protection policy group.
Note: The name that you specify here becomes part of the Data Domain MTree
entry.
b. In the Description field, specify a short description of the protection policy. For
example, For example, SQL Prod Daily Backups
b. To specify the credentials, click Set Credentials. You can specify new credentials or
select existing credentials from the list.
c. Click Save.
d. Click Next.
The Assets page appears.
5. Select the unprotected assets that you want to add to the backup of this protection policy
group. The window enables you to filter by asset name to locate the required assets.
6. Click Next.
If you selected Exclusion in the Purpose page, the Summary page appears. Proceed to the
final two steps.
If you selected Centralized Protection or Self-Service Protection, the Schedule page
appears.
7. Click + Backup.
The Add Primary Backup dialog box appears.
8. Specify the backup schedule fields:
l For Centralized Protection:
a. In the Recurrence field, select the interval at which the backup job runs within the
window that you specify.
Recurrence relates to Start Time and End Time fields.
When you select Hourly, Daily,Weekly, and Monthly recurrence, you are selecting
the interval at which the backup job runs within the window that you specify.
b. In the Create Full field, specify the interval in hours to create a full backup.
The interval should be between 1 hour to 12 hours.
c. To create an incremental differential backup, click Differential, and then specify the
interval in minutes.
d. To create a log, click Log, and then specify the interval in minutes.
e. In the Keep For field, specify the retention time.
f. In the Start Time field, specify the time when new backups are initiated in this policy.
g. In the End Time field, specify the time after which no new backups are initiated in
this policy. It does not mean that any policy that is running is stopped.
h. Click OK.
Note:
When a new asset is added to a protection policy during a scheduled backup
window, the backup starts right away. However, if an asset is added to a
protection policy outside of the scheduled backup window, the backup does not
start until the next time that backups are configured to run.
If a new asset is added to a protection policy that has a weekly or monthly backup
schedule and the current time is within the scheduled Start Time and End Time,
the backup runs right away, regardless of the date. If the current time is not
within the scheduled Start Time and End Time, the backup does not start until
the next time that backups are configured to run.
The Schedule page updates with the newly added backup schedule.
l For Self-Service Protection:
a. In the Keep For field, specify the retention time.
b. Click OK.
After completing a backup schedule, you can change any schedule details by selecting the
checkbox next to the added schedule and clicking Edit.
9. To reduce the number of backups when daily, weekly, and/or monthly backups coincide,
turn on auto promotion:
a. Select the checkbox next to the added schedule and click + Backup.
b. Complete the schedule details in the Add Promotion Backup dialog box, and then click
OK.
10. To replicate these backups to a remote Data Domain system:
a. Select the checkbox next to the added schedule and click Replicate.
b. Complete the schedule details in the Add Primary Replication dialog box, and then click
OK.
Note: To enable replication, ensure that you add a remote Data Domain system as the
replication location. Add Protection Storage provides detailed instructions about adding
a remote Data Domain system.
limits—hard limits and soft limits. You can set either a soft or hard limit or both a soft and
hard limit. Both values must be integers, and the soft value must be less than the hard value.
Note: When you set a soft limit and the limit is reached, an alert is generated but data
can still be written to the Data Domain. When you set a hard limit and the limit is
reached, data cannot be written to the MTree. Therefore, all data protection operations
fail until data is deleted from the MTree. The Data Domain Operating System
Administration Guide provides more information about MTree quota configuration.
a. Capacity Quota — Controls the total size of pre-compression data written to the Data
Domain.
b. Stream Quota — The number of concurrent streams allowed on the system during data
protection operations. Setting a Stream Quota limit can help ensure that system
performance is not impacted negatively if a data protection operation is consuming too
many system resources.
16. Select the Retention Lock check box to enable retention locking for these backups on the
selected system.
Note: Primary backups are assigned a default retention lock period of 14 days.
Replicated backups, however, are not assigned a default retention lock period. If you
select this check box for a replicated backup, ensure that you set the Keep For field in
the Add Primary Replicate backup schedule dialog box to a minimum number of 14 days
so that the replicated backup does not expire before the primary backup.
Procedure
1. Select Protection > Protection Policy.
The Protection Policy window appears.
2. Click Add.
The Add Policy wizard appears.
3. In the Type page, specify the new protection policies group fields. For example, if you are
creating a protection policy for daily backups in the Oracle production environment:
a. In the Name field, specify the name of the protection policy. For example, Oracle Prod
Databases
Note: The name that you specify here becomes part of the Data Domain MTree
entry.
b. In the Description field, specify a short description of the protection policy. For
example, Oracle Prod Daily Backups
c. In theType field, select Oracle database.
d. Click Next.
The Purpose page appears.
4. In the Purpose page, specify the following fields to indicate the purpose of the new
protection policy group:
a. The type of protection policies group.
For an Oracle database, you can select from three types:
l To use PowerProtect Data Manager to manage all protection centrally, click
Centralized Protection
l To use Oracle to create local backup protection, click Self-Service Protection.
PowerProtect Data Manager creates a protection policy and manages extra stages.
l If there are Oracle assets within the protection policy that you plan to exclude from
data protection operations, click Exclusion.
b. To specify the credentials, click Set Credentials. You can specify new credentials or
select existing credentials from the list.
Authentication requirements on page 69 provides details about the authentication
requirements for an Oracle database.
Note: Credentials that you set at the host level supersede the credentials that you
set at the protection policy level.
c. Click Next.
The Assets page appears.
5. Select the unprotected assets that you want to add to the backup of this protection policy
group. The window enables you to filter by asset name to locate the required assets.
Additionally, you can change the assets view to display all assets discovered by
PowerProtect Data Manager, or a hierarchical view to display the assets in a tree structure
underneath the application host. A hierarchical view might be helpful, for example, if you
have added multiple Oracle or SQL databases, so that you can more easily identify which
assets belong to which database.
6. Click Next.
If you selected Exclusion in the Purpose page, the Summary window appears. Proceed to
the final two steps.
b. Complete the schedule details in the Add Promotion Backup dialog box, and then click
OK.
10. To replicate these backups to a remote Data Domain system:
a. Select the checkbox next to the added schedule and click Replicate.
b. Complete the schedule details in the Add Primary Replication dialog box, and then click
OK.
Note: To enable replication, ensure that you add a remote Data Domain system as the
replication location. Add Protection Storage provides detailed instructions about adding
a remote Data Domain system.
a. Capacity Quota — Controls the total size of pre-compression data written to the Data
Domain.
b. Stream Quota — The number of concurrent streams allowed on the system during data
protection operations. Setting a Stream Quota limit can help ensure that system
performance is not impacted negatively if a data protection operation is consuming too
many system resources.
16. Select the Retention Lock check box to enable retention locking for these backups on the
selected system.
Note: Primary backups are assigned a default retention lock period of 14 days.
Replicated backups, however, are not assigned a default retention lock period. If you
select this check box for a replicated backup, ensure that you set the Keep For field in
the Add Primary Replicate backup schedule dialog box to a minimum number of 14 days
so that the replicated backup does not expire before the primary backup.
Note: The name that you specify here becomes part of the Data Domain MTree
entry.
b. In the Description field, specify a short description of the protection policy. For
example, File System Prod Daily Backups
c. In theType field, select File System.
d. Click Next.
The Purpose page appears.
4. In the Purpose page, specify the following fields to indicate the purpose of the new
protection policy:
a. The type of protection policies group.
For File System, you can select from three types:
l To use PowerProtect Data Manager to manage all protection centrally, click
Centralized Protection
l To use the File System to create local backup protection, click Self-Service
Protection. PowerProtect Data Manager creates a protection policy and manages
extra stages.
l If there are assets within the protection policy that you plan to exclude from data
protection operations, click Exclusion.
b. Click Next.
The Assets page appears.
5. Select the unprotected assets that you want to add to the backup of this protection policy
group. The window enables you to filter by asset name to locate the required assets.
Additionally, you can change the assets view to display all assets discovered by
PowerProtect Data Manager, or a hierarchical view to display the assets in a tree structure
underneath the application host. A hierarchical view might be helpful, for example, if you
have added multiple File Systems, so that you can more easily identify which assets belong
to which host.
Note: PowerProtect Data Manager does not support including CSV and non-CSV
volumes in the same protection policy.
6. Click Next.
If you selected Exclusion in the Purpose page, the Summary page appears. Proceed to the
final two steps.
If you selected Centralized Protection or Self-Service Protection, the Schedule page
appears.
7. Click + Backup.
The Add Primary Backup dialog box appears.
8. Specify the backup schedule fields:
l For Centralized Protection:
a. In the Recurrence field, select the interval at which the backup job runs within the
window that you specify.
Recurrence relates to Start Time and End Time fields.
When you select Hourly, Daily,Weekly, and Monthly recurrence, you are selecting
the interval at which the backup job runs within the window that you specify.
b. Create Copy—Specify how often to create an incremental backup.
c. To create a log, click Log, and then specify the interval in minutes.
d. In the Keep For field, specify the retention time.
e. In the Start Time field, specify the time when new backups will be initiated in this
policy.
f. In the End Time field, specify the time after which no new backup will be initiated in
this policy. It does not mean that any policy that is running is stopped at this time.
g. Create Full—Select this option if you want to periodically force a full (level 0)
backup, and then specify how often to create these backups. By default, if you do not
select this option, all subsequent backups are incremental backups.
Note:
It is not mandatory to create periodic full backups. When you select this option,
the File System agent forces the next backup to be a Full Backup. A full backup
ensures protection from potential corruption that can be carried over from
previous backups. However, these backups require more time and resources.
If you do not select this option, the File System agent identifies changes since the
last full backup and uses the previous backup copy to create a new full backup.
h. Click OK.
Note:
When a new asset is added to a protection policy during a scheduled backup
window, the backup starts right away. However, if an asset is added to a
protection policy outside of the scheduled backup window, the backup does not
start until the next time that backups are configured to run.
If a new asset is added to a protection policy that has a weekly or monthly backup
schedule and the current time is within the scheduled Start Time and End Time,
the backup runs right away, regardless of the date. If the current time is not
within the scheduled Start Time and End Time, the backup does not start until
the next time that backups are configured to run.
The Schedule page updates with the newly added backup schedule.
l For Self-Service Protection:
a. In the Keep For field, specify the retention time.
b. Click OK.
After completing a backup schedule, you can change any schedule details by selecting the
checkbox next to the added schedule and clicking Edit.
9. To reduce the number of backups when daily, weekly, and/or monthly backups coincide,
turn on auto promotion:
a. Select the check box next to the added schedule and click + Backup.
b. Complete the schedule details in the Add Promotion Backup dialog box, and then click
OK.
10. To replicate these backups to a remote Data Domain system:
a. Select the checkbox next to the added schedule and click Replicate.
b. Complete the schedule details in the Add Primary Replication dialog box, and then click
OK.
Note: To enable replication, ensure that you add a remote Data Domain system as the
replication location. Add Protection Storage provides detailed instructions about adding
a remote Data Domain system.
limits—hard limits and soft limits. You can set either a soft or hard limit or both a soft and
hard limit. Both values must be integers, and the soft value must be less than the hard value.
Note: When you set a soft limit and the limit is reached, an alert is generated but data
can still be written to the Data Domain. When you set a hard limit and the limit is
reached, data cannot be written to the MTree. Therefore, all data protection operations
fail until data is deleted from the MTree. The Data Domain Operating System
Administration Guide provides more information about MTree quota configuration.
a. Capacity Quota — Controls the total size of pre-compression data written to the Data
Domain.
b. Stream Quota — The number of concurrent streams allowed on the system during data
protection operations. Setting a Stream Quota limit can help ensure that system
performance is not impacted negatively if a data protection operation is consuming too
many system resources.
16. Select the Retention Lock check box to enable retention locking for these backups on the
selected system.
Note: Primary backups are assigned a default retention lock period of 14 days.
Replicated backups, however, are not assigned a default retention lock period. If you
select this check box for a replicated backup, ensure that you set the Keep For field in
the Add Primary Replicate backup schedule dialog box to a minimum number of 14 days
so that the replicated backup does not expire before the primary backup.
2. Click Add.
The Add Policy window appears.
3. In the Type page, specify the new protection policy fields.
a. In the Name field, specify the name of the protection policy. For example, Storage
Direct VMAX Policy
Note: The name that you specify here becomes part of the Data Domain MTree
entry.
b. In the Description field, specify a short description of the protection policy. For
example, Storage Direct VMAX Policy Daily Backups.
c. In the Type field, select Storage Group.
d. Click Next.
The Purpose page appears.
4. In the Purpose page, specify the following fields to indicate the purpose of the new
protection policy:
a. Select from one of the following options:
l If you are a new Storage Direct user, select I want PPDM to automatically provision
and manage all storage needed to achieve this objective.
l If you are an existing Storage Direct user, select I will provision and manage my own
storage.
b. Click Next.
The Assets page appears.
5. Select the unprotected storage groups that you want to add to the backup of this
protection policy group. Within this page, you can filter by host or asset name to locate the
required assets. Ensure that any assets you add to the policy have a host name entry in the
Host column.
The Assets page displays the storage groups attached to the host that are currently
unprotected (storage groups that have not been assigned to a protection policy).
Note: If the desired assets do not display, cancel the policy creation and run the Storage
Direct host discovery again:
a. Go to Infrastructure > Asset Sources.
b. Select the App/File System Host tab.
c. Select the Storage Direct agent host and click Discover.
d. Go back to Protection > Protection Policies to recreate the protection policy.
6. Click Next.
The Schedule page appears.
7. Click + Backup.
The Add Primary Backup dialog box appears.
8. In the Keep For field, specify the retention time, and then click OK to exit the dialog.
The Schedule page updates with the new details. You can change this information by
selecting the check box next to the added schedule and clicking Edit.
9. Select the check box next to the added schedule for the primary backup.
If you are a new Storage Direct user, the Storage Name and Network interface lists and
the Retention Lock check box are enabled for selection. If you are an existing Storage
Direct user, the Data Domain destination is selected automatically and you will not be able to
modify the selection. Additionally, the Retention Lock check box will be unselected and
disabled.
10. From the Storage Name list:
l For the primary backup, select a destination from the list of existing Data Domain
systems.
l For the replicated backup, select a second destination from the list of existing Data
Domain systems.
When you select the destination storage, the Space field updates with the available capacity
on the system.
11. From the Network interface list, select a network interface card (NIC), if applicable.
12. Select the Retention Lock check box to enable retention locking for these backups on the
selected system.
Primary backups are assigned a default retention lock period of 14 days, so the backup will
be locked for 14 days or until expiry of the retention period specified in the Keep For field,
whichever is less.
13. Click Set Storage Quotas to set storage space restrictions for a Data Domain MTree or
Storage Unit to prevent the consumption of excess space. There are two kinds of quota
limits—hard limits and soft limits. You can set either a soft or hard limit or both a soft and
hard limit. Both values must be integers, and the soft value must be less than the hard value.
Note: When you set a soft limit and the limit is reached, an alert is generated but data
can still be written to the Data Domain. When you set a hard limit and the limit is
reached, data cannot be written to the MTree. Therefore, all data protection operations
fail until data is deleted from the MTree. The Data Domain Operating System
Administration Guide provides more information about MTree quota configuration.
a. Capacity Quota — Controls the total size of pre-compression data written to the Data
Domain.
b. Stream Quota — The number of concurrent streams allowed on the system during data
protection operations. Setting a Stream Quota limit can help ensure that system
performance is not impacted negatively if a data protection operation is consuming too
many system resources.
14. To reduce the number of backups when daily, weekly, and/or monthly backups coincide,
turn on auto promotion:
a. Select the checkbox next to the added schedule and click + Backup.
b. Complete the schedule details in the Add Promotion Backup dialog box, and then click
OK.
15. To replicate the primary backup to a secondary Data Domain system:
a. Select the checkbox next to the added schedule and click Replicate. The Add Primary
Replication dialog box appears, indicating that MTree replication will be added for
replication of the backup to a secondary Data Domain system.
Note: The retention period used will be the same Keep For value that you specified
for the backup schedule.
b. Click OK.
Note: To enable replication, ensure that you add a second Data Domain system for use
as the replication location. Add Protection Storage provides detailed instructions about
adding a secondary or remote Data Domain system.
Before executing the backup command, run the following command for the host to verify
snapshots will be created for each storage group in the protection policy, and to ensure that a
successful relationship has been established between the source device and the backup FTS
device for movement of data from the VMAX to Data Domain.
symsnapvx - sid xxx -sg storage group name list
An X in the Flags section of this output, as shown in the following, indicates that the relationship
has been established without any issues.
Once the snapshot(s) and relationship are verified, you can run the following command to perform
the self-service backup. Note that this command example is from a Windows system.
C:\Program Files\DPSAPPS\ppfsagent\config>protectpoint snapbackup create
description "Backup using sdm configuration" VMAX policy name.config
Upon successful completion of the backup, output similar to the following displays:
Figure 7 Snapbackup command output
8. Select the protection policy that you created and select Cloud Tier.
9. In the Add Cloud Tier dialog box, set the following parameters and then click OK:
l Select the appropriate target from the Cloud Target list.
l For Tier After, set a time of at least 2 weeks.
Procedure
1. Select Protection > Protection Policy.
The Protection Policy window opens.
2. Select the protection policy that you want to modify, and click Edit.
The Edit Policy window opens on the Summary page.
3. In the Name, Description, or Schedule rows, click Edit.
The Edit Policy window displays the appropriate page according to your selection. For
example, if you click Edit next to the Name or Description rows, the Type page opens.
4. After making your changes, click Next to save the changes and go to the Summary page.
5. On the Summary page, click Finish
An informational dialog displays.
6. Click OK to exit the dialog, or click Go to Jobs to open the Jobs window to monitor the
backup of the new protection policy.
Procedure
1. Select Protection > Protection Policy.
The Protection Policy window appears.
2. Select the protection policy that you want to modify, and click Edit.
The Edit Policy window opens on the Summary page.
3. In the Assets row, click Edit.
The Assets page appears.
4. To add an asset to the protection policy, click + Add.
The Add Unprotected Assets dialog displays any assets that are unprotected.
5. Select the unprotected assets that you want to add to the policy, and click Add.
The added assets now appear in the table on the Assets page.
6. To remove assets, select the assets that you want to remove from the backup of this
protection policy, and click Delete.
The window enables you to filter by asset name to locate the required assets. You can
change the assets view to display all assets that are discovered by PowerProtect Data
Manager.
7. Click Next to save the changes and go to the Summary page.
8. In the Summary page, click Finish
An informational dialog box appears.
9. Click OK to exit the dialog box, or click Go to Jobs to open the Jobs window to monitor the
backup of the new protection policy.
Export protection
This option enables you to export protection jobs and compliance records to a .CSV file so that you
can download an Excel file of protection results data.
Procedure
1. Select Protection > Protection Policy.
The Protection Policy window appears, which displays the following information:
l Asset type
l Purpose
l Group Name
l Number of Protected Assets
l Asset Capacity
l Number of Failures
l Number of SLA Violations
2. Select the protection policy for which you would like to export the protection records.
If you do not select a protection policy, PowerProtect Data Manager exports the protection
records for all the protection policies.
3. Click Export.
The Export Asset Protection window appears.
4. Specify the following fields for the export:
a. The Time Range.
The default is Last 24 hours.
This refers to the last complete midnight-to-midnight 24-hour period; that is, yesterday.
So, any events that have occurred since the most recent midnight are not in the CSV
export. For example, if you run the CSV export at 9am, any events that have occurred in
the last 9 hours are not in the CSV export. This is to prevent the overlapping of or partial
exporting when queried mid-day on a regular or irregular basis.
Procedure
1. Select Protection > Protection Policy.
2. Select the policy you want to delete and click Delete.
2. Select the type of asset for which you want to add the SLA, and click Add.
The Add Service Level Agreement Type window appears.
3. Select the type of SLA that you want to add, and then click Next.
l Policy. If you choose this type, go to step 4
l Backup. If you choose this type, go to step 5.
l Promotion. If you choose this type, go to step 6.
l Replication. If you choose this type, go to step 7.
You can select only one type of Service Level Agreement.
4. If you selected Policy, specify the following fields regarding the purpose of the new Policy
SLA:
a. The SLA Name.
b. If applicable, select Minimum Copies, and specify the number of Backup and
Replication.
c. If applicable, select Maximum Copies, and specify the number of Backup and
Replication.
d. If applicable, select Available Location and select the applicable locations. To add a
location, click Add Location.
Options are:
l In—Include locations of all copies in the SLO locations. Does not require every SLO
location to have a copy.
l Must In—Include locations of all copies in the SLO locations. Requires every SLO
location to have at least one copy.
l Exclude—Locations of all copies must be other than SLO locations.
c. If applicable, select Compliance Window, and then set the duration, which refers to the
time it takes to create the backup copy. Ensure that the Start Time and End Time of
backup copy creation falls within the Compliance Window duration specified.
These are the times in which you can expect the specified activity to take place. Any
specified activity that occurs outside of this Start Time and End Time triggers an alert.
e. If applicable, set the Retention Time Objective, and specify the number of Days, Months,
Weeks or Years.
f. If applicable, select the Verify Retention Lock is enabled for all copies option. This
option is disabled by default.
g. Click Finish, and go to step 9.
The SLA Compliance window appears with the newly added SLA.
6. If you selected Promotion, specify the following fields regarding the purpose of the new
Promotion SLA:
a. The SLA Name.
b. If applicable, specify the Recovery Point Objective.
c. If applicable, select the Verify expired copies are deleted option.
Verify expired copies are deleted is a compliance check to see if PowerProtect Data
Manager is deleting expired copies. This option is disabled by default.
d. If applicable, set the Retention Time Objective, and specify the number of Days, Months,
Weeks or Years.
e. If applicable, select the Verify Retention Lock is enabled for all copies option. This
option is disabled by default.
f. Click Finish, and go to step 9.
The SLA Compliance window appears with the newly added SLA.
7. If you selected Replication, specify the following fields regarding the purpose of the new
Replication SLA:
a. The SLA Name.
b. If applicable, select the Compliance Window, and specify the Start Time and End Time.
These are the times which are permissible and in which you can expect the specified
activity to take place. Any specified activity that occurs outside of this start time and
end time triggers an alert.
d. If applicable, set the Retention Time Objective, and specify the number of Days, Months,
Weeks or Years.
e. If applicable, select the Verify Retention Lock is enabled for all copies option. This
option is disabled by default.
f. Click Finish, and go to step 9.
The SLA Compliance window appears with the newly added SLA.
8. Add the newly added SLA to the protection policy. Select Protection > Protection Policy.
9. In the Schedule section of the Summary window, click Edit.
10. Do one of the following, and then click Next:
l Select the newly added Policy SLA from the Set Policy Level SLA list.
l Create and add the new SLA policy from theSet Policy Level SLA list.
The Summary window appears.
11. Click Finish.
An informational message appears to confirm that PowerProtect Data Manager has saved
the protection policy.
12. Click Go to Jobs to open the Jobs window to monitor the backup and compliance results, or
click OK to exit.
Note: Compliance checks occur automatically every day at 2 am Coordinated Universal
Time (UTC).
13. In the Jobs window, click next to an entry to view details on the SLA Compliance result.
l Policies At Risk
l Objectives Out of Compliance
l Impacted Assets
2. Select the SLA for which you would like to export the compliance records.
3. Click Export Asset Compliance.
The Export Asset Compliancewindow appears.
4. Specify the following fields for the export:
a. The Time Range.
The default is Last 24 hours.
This refers to the last complete midnight-to-midnight 24 hour period; that is, yesterday.
So, any events that have occurred since the most recent midnight are not included in the
CSV export. For example, if you run the CSV export at 9am, any events that have
occurred in the last 9 hours are not included in the CSV export. This is to prevent the
overlapping of or partial exporting when queried mid-day on a regular or irregular basis.
b. The Job Status.
c. Click Download .CSV .
If applicable, the navigation window appears for you to select the location to save the
CSV file.
5. If applicable, save the CSV file in the desired location and click Save.
Dynamic filters
Dynamic filters enable you to automatically determine which assets are assigned to protection
policies when the assets are discovered, based on the filter's rule definitions (rules for inclusion).
When you define a dynamic filter for a protection policy, note the following requirements:
l A protection policy must exist prior to creating the dynamic filter.
l An asset can only belong to one protection policy.
l Virtual machine tags created in the vSphere Client can only be applied to a dynamic filter.
l To ensure the protection of homogeneous assets, the dynamic filter must specify a storage
asset type.
l A virtual machine application-aware protection policy that protects a Microsoft SQL Server
Always On availability group (AAG) must include all the virtual machines of the AAG in the
same protection group. Failure to meet this requirement might result in Microsoft SQL Server
transaction log backups being skipped. Ensure that the dynamic filters are designed to include
all the AAG virtual machines.
the tags will be applied and whether more than one tag in the category can be applied to an object.
Within a single rule, you can apply up to 50 rule definitions to tags and categories, as shown in the
following example where Category is the category name and Bronze is the tag name:
l Category:Category1,Tag:Bronze1
l Category:Category2,Tag:Bronze2
l Category:Category3,Tag:Bronze3
l ... Category:Category50,Tag:Bronze50
In the above example, category names and tag names that exceed 9 or 7 characters respectively,
reduce the limit for rule definitions in a single rule to less than 50. When rule definitions exceed the
maximum limit, no virtual machines are backed up as part of the group, because no members are
associated with the group. As a best practice, keep the number of rule definitions within a single
rule to 10 or fewer and, in cases where there are a large number of rule definitions within a single
rule, keep the number of characters in category or tag names to 10 or fewer.
To view existing tags for vCenter in the vSphere Client, select Menu > Tags & Custom
Attributes, and then select the Tags tab. Click a tag link in the table to view the objects
associated with this particular tag.
For PowerProtect Data Manager to include tagged assets in a dynamic filter based on the tags
created for the vCenter, you must assign at least one tag to at least one virtual machine. Note that
tags associated with containers of virtual machines (for example, a virtual machine folder) are not
currently supported for tag associations to assets.
Note: Once virtual machines are associated with tags, the association is not reflected in the
PowerProtect Data Manager UI until the timeout period has completed. The default timeout to
fetch the latest inventory from vCenter is 15 minutes. When adding a dynamic filter and using
tags as the asset filter, you must select VM Tags.
2. Click the Virtual Machines, SQL Databases, Oracle Databases, or File System tab to
select the type of host for which you would like to add the dynamic filter, and then click
Add .
The Add Dynamic Filter wizard opens on the Protection Policy page.
3. Select the target protection policy for the dynamic filter and click Next.
The Asset Filter page appears.
4. Specify the following fields to indicate the purpose of the new Dynamic Filter:
2. To change a dynamic filter's priority, select the dynamic filter and click Up or Down.
The smaller value has the higher priority.
View copies
You can view summaries of protected copy sets in the system. PowerProtect Data Manager
displays details such as the name of the storage system that contains the copy set, system usage,
location, date the copy set was created, date the copy set expires, size, and recovery time.
Procedure
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets. Alternatively,
select Recovery > Assets.
All the assets in the system display.
2. Select an asset, or select one of the following tabs to view assets by type:
l Virtual Machines.
l Oracle Databases.
l SQL Databases.
l File System.
l VMAX Storage Groups.
The entire list of assets that are associated with this type displays in the right pane.
Note: You can also search for assets by name.
To access the Restore and Overwrite Original VM, Create and Restore to New VM, and Instant
Access VM recovery types, or the Restore Individual Virtual Disks option, select one or more
virtual assets and then click Restore to launch the Restore wizard.
To access the File Level Restore and Direct Restore to ESXi recovery options, select a virtual
asset and then click View Copies.
In both instances, you must select a backup copy in the first page of the Restore wizard before
you can go to the Options page, which displays the available recovery options.
Note: For all options, recovery in the PowerProtect Data Manager UI can only be performed if
the backup or replica is on a Data Domain system. If a replica backup does not exist on such
storage, you must manually replicate this backup to Data Domain storage before performing
the restore.
The following sections describe each recovery option and provide instructions to perform the
recovery.
Note: SQL virtual machine full database and transaction log restore from application-aware
virtual machine protection policies must be performed using Microsoft application agent tools.
The section Restore an application-aware virtual machine backup provides more information.
resources such as the datastore and cluster are no longer available, the restore fails and a
Restore to New is required.
Procedure
1. In the PowerProtect Data Manager UI, select Recovery > Assets and select the Virtual
Machines tab.
The Recovery window displays all virtual machines available for recovery.
2. Select the checkbox next to the appropriate virtual machines and click Restore.
You can also use the filter in the Name column to search for the name of the specific virtual
machine.
4. If the backup is on a Data Domain system, click DD, and then select from one of the
available copies that display in the table.
5. Click OK to save the selection and exit the dialog, and then click Next.
6. On the Purpose page, select Restore Entire VMs to restore the image-level virtual machine
backup to the original location, and then click Next.
The Restore Type page displays.
7. On the Restore Type page, select Restore and Overwrite Original VM, and then click
Next.
The Options page appears, displaying the current configuration of the virtual machine along
with any disks that have been added since the last backup.
8. On the Options page, if there are any hard disks in the current virtual machine configuration
that were not part of the original backup:
l Select Delete disks that will be detached to remove these disks upon restore.
l Unselect Delete disks that will be detached to keep these disks in their original
folder(s) on the virtual machine after the restore. Note that these disks will not be in the
virtual machine configuration, but after the restore you can then use the vSphere Client
to manually reattach or download these disks as appropriate.
9. Click Next.
The Summary page appears with a confirmation message indicating that the virtual machine
will be powered off and that the virtual machine in the datastore will revert to the point in
time of the selected backup copy before being powered back on.
10. On the Summary page, click Restore.
An informational dialog box appears indicating that the restore has started.
11. Go to the Jobs window to monitor the restore.
A restore job appears with a progress bar and start time.
4. If the backup is on a Data Domain system, click DD, and then select from one of the
available copies that display in the table.
5. Click OK to save the selection and exit the dialog, and then click Next.
6. On the Purpose page, select Restore Individual Virtual Disks to restore specific VMDKs,
and then click Next.
The Select Disks page displays.
7. From the Backup Properties pane, select the VMDKs that you want to restore, and then
click Next. Note that individual VMDKs can only be restored to the original location.
The Summary page appears with a confirmation message indicating that the selected
disk(s) will be overwritten in the current configuration with the copy from the backup.
8. On the Summary page, click Restore.
An informational dialog box appears indicating that the restore has started.
9. Go to the Jobs window to monitor the restore.
A restore job appears with a progress bar and start time.
Restore to new
A restore to a new location enables you to create a new virtual machine using a copy of the original
virtual machine backup. Other than having a new name or location and a new vSphere VM Instance
UUID, this copy is an exact replica of the virtual machine that you backed up with the protection
policy in PowerProtect Data Manager.
Before you begin
Review Prerequisites to virtual machine restore before you perform this procedure.
Procedure
1. Select the checkbox next to the appropriate virtual machines and click Restore.
You can also use the filter in the Name column to search for the name of the specific virtual
machine.
3. If the backup is on a Data Domain system, click DD, and then select from one of the
available copies that display in the table.
4. Click OK to save the selection and exit the dialog, and then click Next.
5. On the Purpose page, select whether you want to restore the entire virtual machine, or only
specific virtual machine disks (VMDKs), and then click Next.
Note: Individual VMDKs can only be restored to the original location.
6. On the Restore Type page, select Create and Restore to New VM, and then click Next.
7. On the VM Information page:
a. Select whether you want to use the original virtual machine name or rename the new
virtual machine by appending a suffix to the original name. If the location for the new
virtual machine restore will be a different folder than the original location, you can use
the original name.
b. From the Restore to vCenter list, select the vCenter server for the new virtual machine
restore. This list displays any vCenter server that has been added from the Assets
window.
When you select a vCenter server, available data centers appear.
l To restore all disks to the same location, keep the Configure per disk slider to the left,
and then select the datastore from the Storage list.
l To restore disks to different locations, move the Configure per disk slider to the right,
and then:
a. Select a datastore for each disk from the Storage list.
b. Select the type of provisioning you want to apply to the disk from the Disk Format
list.
11. On the Options page:
a. For Select Access Level, keep the slider set to Yes if you want to enable instant access
for this restore.
When you select this option, the virtual machine is created and powered on while
temporarily accessing the VMDKs from Data Domain storage. Storage vMotion is
initiated to the target datastore. The virtual machine becomes available for use when it is
powered on.
b. (Optional) For the recovery options, select Power on the virtual machine when the
recovery completes and Reconnect the virtual machine's NIC when the recovery
completes. Power on the virtual machine when the recovery completes is selected
by default when instant access is enabled.
c. Click Next.
12. On the Summary page, verify that the information you specified in the previous steps is
correct, and then click Restore.
13. Go to the Jobs window to monitor the restore.
A restore job appears with a progress bar and start time. You can also click next to the
job to verify what steps have been performed, for example, if the instant access session has
been created.
3. If the backup is on a Data Domain system, click DD, and then select from one of the
available copies that display in the table.
4. Click OK to save the selection and exit the dialog, and then click Next.
5. On the Purpose page, select whether you want to restore the entire virtual machine, or only
specific virtual machine disks (VMDKs), and then click Next.
Note: Individual VMDKs can only be restored to the original location.
6. On the Restore Type page, select Instant Access VM, and then click Next.
7. On the VM Information page:
a. Select whether you want to use the original virtual machine name for the instant access
virtual machine restore, or rename the instant access virtual machine by appending a
suffix to the original name.
b. From the Restore to vCenter list, select the vCenter server for the instant access
virtual machine restore. You can select the vCenter of the original virtual machine
backup, or another vCenter. This list displays any vCenter server that has been added
from the Assets window.
When you select a vCenter server, available data centers appear.
2. Select the checkbox next to the desired virtual machine and click View Copies.
You can also use the filter in the Name column to search for the name of the specific virtual
machine.
The Recovery > Assets window provides a map view in the left pane and copy details in the
right pane.
When a virtual machine is selected in the map view, the virtual machine name displays in the
right pane with the copy locations underneath. When you select a specific location in the
left pane to view the copies, for example, on a Data Domain system, the copies on that
system display in the right pane.
3. If the backup is on a Data Domain system, click DD, and then select from one of the
available copies that display in the table.
4. In the right pane, select the checkbox next to the virtual machine backup you want to
restore, and then click File Level Restore.
The File Level Recover wizard appears.
5. On the Select Target VM page, choose from one of the following options:
l Perform the file-level restore to the original virtual machine.
l Search for the destination virtual machine by typing the name.
l Browse from the available vCenter servers to locate the destination virtual machine.
6. On the Mount Copy page:
a. Type the user credentials to access the virtual machine that you want to recover objects
to in order to initiate the disk mount. This user should have privileges to install the FLR
Agent, which is required to perform file level restore. For Windows virtual machines, this
is an administrator account. For Linux virtual machines, this requires the root user
account.
Note: Once you approve storing the credentials for the virtual machine, the user
credentials prompt will not appear unless the credentials change.
b. (Optional) Leave Keep FLR Agent Installed selected if you want the FLR Agent to
remain on the destination virtual machine after the restore completes.
c. Click Start Mount to initiate the disk mount.
A progress bar identifies when the mount has completed.
Note: You cannot browse the contents of the virtual machine backup until the
mounting of the destination virtual machine completes successfully.
d. When the mount completes successfully, click Next.
7. On the Select Files to Recover page:
a. Expand individual folders to browse the original virtual machine backup, and select the
objects you want to restore to the destination virtual machine.
b. Click Next.
Note: When browsing for objects to recover on this page, each directory/hard drive
appears twice. Therefore, when you select an object from one location, the object will
be selected in the duplicate location as well.
b. Click Next.
9. On the Summary page:
a. Review the information to ensure that the restore details are correct.
b. Click Restore.
10. Go to the Jobs window to monitor the restore.
A restore job appears with a progress bar and start time.
The Recovery > Asset window provides a map view in the left pane and copy details in the
right pane.
When a virtual machine is selected in the map view, the virtual machine name displays in the
right pane with the copy locations underneath. When you select a specific location in the
left pane to view the copies, for example, on a Data Domain system, the copies on that
system display in the right pane.
3. If the backup is on a Data Domain system, click DD, and then select from one of the
available copies that display in the table.
4. In the right pane, select the checkbox next to the virtual machine backup you want to
restore, and then click Direct Restore to ESXi.
The Direct Restore to ESXi wizard appears.
5. On the Options page:
a. (Optional) Select Reconnect the virtual machine's NIC when the recovery
completes, if desired. Power on the virtual machine when the recovery completes is
selected by default.
b. Click Next.
6. On the ESX Host Credentials page:
a. In the ESX Host field, type the IP of the ESX server where you want to restore the
virtual machine backup.
b. Specify the root Username and Password for the ESX Server.
c. Click Next.
7. On the Datastore page, select the datastore where you want to restore the virtual machine
disks, and then click Next.
l To restore all of the disks to the same location, keep the Configure per disk slider to the
left, and then select the datastore from the Storage list.
l To restore disks to different locations, move the Configure per disk slider to the right,
and then:
a. For each available disk that you want to recover, select a datastore from the Storage
list.
b. Select the type of provisioning you want to apply to the disk from the Disk Format
list.
8. On the Summary page:
a. Review the information to ensure that the details are correct.
b. Click Restore.
9. Go to the Jobs window to monitor the restore.
A restore job appears with a progress bar and start time.
The Recovery > Assets window provides a map view in the left pane and copy details in the
right pane.
When a file system is selected in the map view, the file system name displays in the right
pane with the copy locations underneath. When you select a specific location in the left
pane to view the copies, for example, on a Data Domain system, the copies on that system
display in the right pane.
3. Click DD, and then select from one of the available copies that display in the table.
4. In the right pane, select the checkbox next to the file system backup you want to restore,
and then click Restore.
The Restore wizard appears.
5. On the Select Target Location page, choose from one of the following options, and then
click Next.
l Restore to original — Restore the file system to the original location.
l Restore to a new location on the original host — Select the destination file system asset
(volume) from the list of available assets on the host.
l Restore to a new host — Browse from the available hosts to locate and select a
destination host and file system.
Note: If the destination file system asset already contains some data, this data will be
overwritten.
c. Create a storage group in the alternate VMAX with the value specified in the
configuration file (VMAX_FASTX_RESTORE_SG).
d. Add vDisk devices in the Data Domain to a vDisk pool specified in the configuration file
(RESTORE_DEVICE_POOL).
e. Encapsulate these vDisk devices and add them to the storage group created in step b.
6. On the Choose the VMAX Storage Group page, select the destination storage group where
the data will be rolled back to. The alternate storage group should have the same size LUN
and geometry as the source storage group.
7. Click Finish.
Once the restore completes successfully, you can mount LUNs in the destination storage
group to any host.
8. Go to the Jobs window to monitor the restore.
A restore job appears with a progress bar and start time.
l The OS user passwords and PowerProtect Data Manager login are set to the lockbox phrase
previously provided in step 6.
run {
allocate channel c1 type SBT_TAPE parms ‘SBT_LIBRARY=rman_agent_home/lib/
libddobk.so’, ENV=(RMAN_AGENT_HOME=rman_agent_home, STORAGE_UNIT=XYZ,
BACKUP_HOST=bu-ddbealin-17.lss.emc.com)’;
run {
allocate channel c1 type SBT_TAPE parms ‘SBT_LIBRARY=rman_agent_home/lib/
libddobk.so’, ENV=(RMAN_AGENT_HOME=rman_agent_home, STORAGE_UNIT=XYZ,
BACKUP_HOST=bu-ddbealin-17.lss.emc.com)’;)’;
allocate channel c2 type SBT_TAPE parms ‘SBT_LIBRARY=rman_agent_home/lib/
libddobk.so’, ENV=(RMAN_AGENT_HOME=rman_agent_home, STORAGE_UNIT=XYZ,
BACKUP_HOST=bu-ddbealin-17.lss.emc.com)’;)’;
allocate channel c3 type SBT_TAPE parms ‘SBT_LIBRARY=rman_agent_home/lib/
libddobk.so’, ENV=(RMAN_AGENT_HOME=rman_agent_home, STORAGE_UNIT=XYZ,
BACKUP_HOST=bu-ddbealin-17.lss.emc.com)’;)’;
allocate channel c4 type SBT_TAPE parms ‘SBT_LIBRARY=rman_agent_home/lib/
libddobk.so’, ENV=(RMAN_AGENT_HOME=rman_agent_home, STORAGE_UNIT=XYZ,
BACKUP_HOST=bu-ddbealin-17.lss.emc.com)’;)’;
-a "DFA_SI_DD_HOST=<server_name>"
Specifies the name of the Data Domain server that contains the storage unit where you want
to back up the databases.
-a "DFA_SI_DEVICE_PATH=<storage_unit_and_path>"
Specifies the name and the path of the storage unit where you want to direct the backup.
-a "DFA_SI_DD_USER=<username>"
Specifies the protection storage username.
You must register the hostname and the protection storage username in the lockbox to enable
the Microsoft application agent to retrieve the password for the registered user.
These details are provided in the .app.settings file on both Linux and Windows hosts. If the
default installation path was used, the .app.settings file is at /opt/dpsfsagent/
settings/.app.settings on a Linux host and C:\Program Files\DPSFSAGENT
\settings\.app.settings on a Windows host. More information about how to use the admin
utility to query the list of backups for an asset, see Using the ddfsadmin utility for File Systems.
Note: This command uses only the retention period that was specified when the self-service
protection policy was created.
To perform a self-service backup, use the storage unit and username that was created on the Data
Domain system when the policy was created. PowerProtect Data Manager discovers these
backups and enables centralized restore operations. You can also perform a manual restore
operation.
run {
allocate channel c1 type SBT_TAPE parms ‘SBT_LIBRARY=rman_agent_home/lib/
libddobk.so’, ENV=(RMAN_AGENT_HOME=rman_agent_home, STORAGE_UNIT=XYZ,
BACKUP_HOST=bu-ddbealin-17.lss.emc.com)’;)’;
restore database;
recover database;
run {
allocate channel c1 type SBT_TAPE parms ‘SBT_LIBRARY=rman_agent_home/lib/
libddobk.so’, ENV=(RMAN_AGENT_HOME=rman_agent_home, STORAGE_UNIT=XYZ,
BACKUP_HOST=bu-ddbealin-17.lss.emc.com)’;)’;
allocate channel c2 type SBT_TAPE parms ‘SBT_LIBRARY=rman_agent_home/lib/
libddobk.so’, ENV=(RMAN_AGENT_HOME=rman_agent_home, STORAGE_UNIT=XYZ,
BACKUP_HOST=bu-ddbealin-17.lss.emc.com)’;)’;
allocate channel c3 type SBT_TAPE parms ‘SBT_LIBRARY=rman_agent_home/lib/
libddobk.so’, ENV=(RMAN_AGENT_HOME=rman_agent_home, STORAGE_UNIT=XYZ,
BACKUP_HOST=bu-ddbealin-17.lss.emc.com)’;)’;
allocate channel c4 type SBT_TAPE parms ‘SBT_LIBRARY=rman_agent_home/lib/
libddobk.so’, ENV=(RMAN_AGENT_HOME=rman_agent_home, STORAGE_UNIT=XYZ,
BACKUP_HOST=bu-ddbealin-17.lss.emc.com)’;)’;
restore database;
recover database;
ddfsadmin backup query -local -v="C:\\" -t=5 will display a list of local
backups in C:\ taken within the last five days.
ddfsadmin sync
The following is the usage for the ddfsadmin sync command:
sync -local options: Sync local record file with record file on DD
sync -remote options: Sync remote record file with file in the local
options:
-d=<DD host>: Protection storage system host IP
-u=<DD username>: Protection storage system username
-s=<DD device path>: Protection storage system device path
-p=<DD password>: Protection storage system password.[Optional]
-h "DFA_SI_DD_HOST=<server_name>"
Specifies the name of the protection storage system server that contains the backup.
When you have a remote (secondary) protection storage system server that has replicated
databases to restore, type the name of the secondary server. A user on the secondary
protection storage system server must be in the same group as the primary protection storage
system server.
c. Click Start.
3. To delete a backup:
a. Select a backup from the list.
b. Click Delete.
The system displays a warning to confirm you want to delete the backup. Click Yes to
proceed.
4. Click Close.
4. When the progress message indicates that the save operation is complete, click Close.
5. In the Summary tab in the Protocols pane, click NFS Exports.
6. Under NFS Protocols > Exports, select the Data Domain MTree from the list of exports and
click Add Clients.
7. In the Add Clients window, provide the following information, and then click OK.
l Client—IP address or host name of the PowerProtect Data Manager.
l Accept the default settings for the rest of the fields.
l Current Selection—Ensure that the list includes no_root_squash, which is required
for permission for your system to change the directory structure on the NFS share.
l Data Domain System—IP address or host name of the Data Domain System where you
created the MTree with NFS Export
l NFS Export Path—the path of the NFS Export
Results
The initial backup runs, and then backups are automatically triggered every hour.
5. To export the log file for an alert to a .cvs file, select the alert and click Export.
5. To view task details and summary information, click to the left of an individual job task,
and then complete the following steps:
a. On the Steps tab, review the summary information, which describes the task activity.
To view the information for a step, expand the step by clicking the arrow (>) .
Note: If a policy with both protection and Cloud Data Recovery (CDR) stages fails, the CDR
job is cancelled and cannot be restarted.
Procedure
1. In the PowerProtect Data Manager UI left navigation pane, select Jobs.
The Jobs window appears, displaying only completed jobs by default. You can filter the
information that appears in the Jobs window. Monitoring and viewing jobs on page 181
provides more information.
2. To restart a failed job, select Running, select the failed job from the list, and then click
Restart.
3. To restart a failed task:
a. Click to the left of the job name.
The Details pane appears on the right.
b. In the Task Summary section, click the link that indicates the total number of tasks.
c. Select a failed task, and then click Restart.
d. Click Close.
Results
To view the status of the restarted job or task, select Running at the top of the Jobs window. The
status indicates Running or Queued.
Procedure
1. In the PowerProtect Data Manager UI left navigation pane, select Jobs.
The Jobs window appears, displaying only completed jobs by default. You can filter the
information that appears in the Jobs window. Monitoring and viewing jobs on page 181
provides more information.
2. To cancel a job, select Running, select a job that is in-progress, and then click Cancel.
Note: If a job is almost complete, the cancellation might fail. If the cancellation fails, a
message displays indicating that the job cannot be canceled.
b. In the Task Summary section, click the link that indicates the total number of tasks.
c. Select a task that is in-progress, and then click Cancel.
Note: If a task is almost complete, the cancellation might fail. If the cancellation fails,
a message displays indicating that the task cannot be canceled.
d. Click Close.
Results
The Jobs window displays the status of the canceled job or task. If the cancellation is successful,
then the status eventually changes to Canceled. If the cancellation is not successful, then the
status might indicate either Success or Critical.
b. In the Task Summary section, click the link that indicates the total number of tasks.
c. Select a completed task, and then click Export Log.
The dialog box also lists any required certificates. Continuing indicates acceptance of the
certificate.
Results
The overall package status covers critical upgrades for the PowerProtect Data Manager. Other
subcomponents, such as Agents and vProxies, may still be processing, or even fail. This does not
impact the overall status of the upgrade. You can view the state of each subcomponent by
expanding the package that was installed.
Note: If the upgrade fails, you must delete the failed package before uploading a new package
(or the same package) to try again.
After you finish
If you created a manual snapshot, use the vSphere Client to delete the snapshot:
1. Right-click the appliance and select Manage Snapshots.
2. In the Manage Snapshots window, select the snapshot and click Delete.
/usr/local/brs/lib/secretsmgr/bin/secretsmgr-tls-upgrade
l Compatibility information.....................................................................................................192
l Power off the PowerProtect Data Manager OVA.................................................................192
l Creating a dedicated vCenter user account and assigning the role in vCenter..................... 192
l Best practices with the VM Direct appliance....................................................................... 195
l Troubleshooting backup configuration issues...................................................................... 200
l Troubleshooting virtual machine backup issues....................................................................201
l Recover a failed PowerProtect Data Manager backup........................................................ 205
l Troubleshooting virtual machine restore issues................................................................... 205
l Troubleshoot recovery of PowerProtect Data Manager.......................................................212
l Application agent and File System agent co-existence.........................................................212
l Microsoft application agent for SQL Server application-aware protection........................... 214
l Troubleshooting Microsoft Application Agent discoveries on Windows 2008 and Application
Direct...................................................................................................................................216
l Supporting more than 50 database clients........................................................................... 216
l File System agent limitations............................................................................................... 216
l Storage Direct agent limitations...........................................................................................218
l Time synchronization required between PowerProtect Data Manager and the systems it
interfaces with..................................................................................................................... 221
l PowerProtect Data Manager allows completion of protection policy when storage unit on the
Data Domain cannot be created........................................................................................... 221
l Viewing the DD Boost storage unit password.......................................................................221
Compatibility information
Software compatibility information for the PowerProtect Data Manager software is provided in the
eLab Navigator, available at https://elabnavigator.emc.com/eln/modernHomeDataProtection.
Setting vCenter 6.0 and later required privileges PowerCLI equivalent required privileges
Setting vCenter 6.0 and later required privileges PowerCLI equivalent required privileges
Setting vCenter 6.0 and later required privileges PowerCLI equivalent required privileges
Setting vCenter 6.0 and later required privileges PowerCLI equivalent required privileges
l Register
l Remove
l Unregister
Note: You cannot use Hot Add mode with IDE Virtual disks and therefore backup of these
disks will be performed using NBD mode.
l During policy configuration, assign virtual machines to a protection group based on logical
grouping to allow for better scheduling of backups that will help you avoid resource contention
and create more organized logs for review.
l When configuring or unconfiguring a very large number of virtual machines (300 or more) in a
protection policy, an error message might display indicating that the request is too large. You
can click OK and proceed, but system performance will be impacted due to the size of the
request. As a best practice, it is recommended to use dynamic filters to automatically
determine which assets are assigned to protection policies when the assets are discovered.
l When you plan the backups, ensure that PowerProtect Data Manager supports the disk types
that you use in the environment. Currently, PowerProtect Data Manager does not support the
following disk types:
n Independent (persistent and non-persistent)
n RDM Independent - Virtual Compatibility Mode
n RDM Physical Compatibility Mode
l The VM Direct appliance uses Changed Block Tracking (CBT) by default. If CBT is disabled on
the virtual machine, then it will enable CBT automatically. If you add a disk to the virtual
machine after the first full backup, for the next policy run a full backup will be performed
automatically for the newly added disk, and an incremental backup will be performed for the
existing disk.
l When backing up thin-provisioned Virtual Machines or disks for Virtual Machines on NFS
datastores, an NFS datastore recovery does not preserve thin provisioning. VMware
knowledge base article 2137818 at http://kb.vmware.com/kb/2137818 provides more
information.
l Virtual Machines with extremely high IO may face hangs during consolidation due to the ESXi
forced operation called synchronous consolidate. Plan your backups of such Virtual Machines
according to the amount of workload on the Virtual Machine.
Component Requirements
Component Requirements
Web browser The latest version of the Google Chrome browser in order to access
the PowerProtect Data Manager UI.
l Ensure that the virtual machine has access to and name resolution for the Data Domain
system.
l Ensure that the virtual machine firewall has port rules for Data Domain.
l For application-aware backups, ensure that Microsoft SQL Server instances are enabled for
data protection using a SYSTEM account, as described in the software and security
requirements section of the topic Microsoft Application Agent for SQL Server application-
aware protection.
Number of concurrent 50 (10G VMware uses Network File Copy (NFC) protocol
NBD backups per ESXi network) to read VMDK using NBD transport mode. You
Server need one VMware NFC connection for each VMDK
file being backed up. The VMware Documentation
provides more information on vCenter NFC
session connection limits.
Embedded VM Direct appliance (the 4 The embedded proxy is only used as a fallback when all
proxy pre-bundled with the other proxies are disabled or in Failed state.
PowerProtect Data Manager
software)
If these messages appear, you can use PowerCLI commands to disable and then enable CBT
without powering off the virtual machines as described in the VMware knowledgebase article at
https://kb.vmware.com/selfservice/search.do?
2. Run cbs stop to stop the cbs service, and then cbs start to restart the service.
3. Run vmdm stop to stop the vmdm service, and then vmdm start to restart the service.
4. Perform a test to determine if SSL certificate disabling was successful by adding a vCenter
Server using the vCenter's IP address (if the SSL certificate uses FQDN), and then verify that
the asset source was added and virtual machine discovery was successful.
To resolve this issue, ensure that you have configured an NFS export for the full path of the DD
Boost storage unit and that the appliance is an Export client.
Data Domain storage unit mount command failed with error: 'Cannot resolve FQDN: The
name or service not known'
This error message appears when the appliance cannot contact the Data Domain System by using
the specified FQDN. To resolve this issue, ensure that you can resolve the FQDN and IP address of
the Data Domain System.
VM Direct appliance configuration settings cannot be modified after adding the VM Direct
appliance
After adding a VM Direct appliance, the only field you can modify is the Transport Mode. Any
other configuration changes require you to delete and then re-add the VM Direct appliance.
Additional VM Direct actions on page 109 provides more information.
Network configuration settings are not restored with virtual machine after recovery of a vApp
backup
Network configuration settings are not backed up with the virtual machine as part of a vApp
backup. As a result, when you restore a vApp backup, you must manually reconfigure the
network settings.
Virtual machine alert "VM MAC conflict" may appear after successful recovery of virtual machine
After performing a successful recovery of a virtual machine through vCenter version 6, an
alert may appear indicating a "VM MAC conflict" for the recovered virtual machine, even
though the new virtual machine will have a different and unique MAC address. You must
manually acknowledge the alert or clear the alert after resolving the MAC address conflict.
Note that this alert can be triggered even when the MAC address conflict is resolved.
The VMware release notes at http://pubs.vmware.com/Release_Notes/en/vsphere/60/
vsphere-vcenter-server-60u2-release-notes.html provide more information.
Hot Add backups fail when datacenter names contain special characters
Virtual machine backups fail when the datacenter name contains special characters and the
transport mode specified for VM Direct backups is Hot Add only. Avoid using special
characters in the datacenter name, for example, "Datacenter_#2@3", or specify Hotadd with
fallback to Network Block Device for the transport mode.
Hot Add backups fail when virtual machine protection policy configured with Virtual Flash Read
Cache value
When using Hot Add transport mode for a virtual machine protection policy, the backup fails
with the following error if configured with the Virtual Flash Read Cache (vFRC) value:
Backups fail for resource pools recreated with the same name as deleted pool
When you delete a resource pool in vCenter and then recreate a resource pool with the same
name, backups fail. Re-configure the protection group with the newly created resource pool.
Specify NBD for datastores if VM Direct should use NBD mode only
For a VM Direct appliance that will only use NBD transport mode, you must also specify the
datastores for which you want the proxy to perform only NBD backups to ensure that any
backups of virtual machines running on these datastores are always performed using NBD
mode. This also ensures that the same NBD-only proxies are never used for backups of virtual
machines residing on any other datastores.
SQL Server application-consistent backups fail with error "Unable to find VSS
metadata files in directory"
SQL Server application-consistent virtual machine backups might fail with the following error when
the disk.EnableUUID variable for the virtual machine is set to False.
Unable to find VSS metadata files in directory C:\Program Files\DPSAPPS
\MSVMAPPAGENT\tmp\VSSMetadata.xxxx.
To resolve this issue, ensure that the disk.EnableUUID variable for the virtual machines included in
an SQL Server application-consistent backup is set to True.
Failed to lock Virtual Machine for backup: Another EMC VM Direct operation
'Backup' is active on VM
This error message appears when a backup fails for a virtual machine, when previous backups of
the virtual machine was abruptly ended and the VM annotation string was not cleared.
To resolve this issue, clear the annotation string value for the virtual machine.
1. Connect to the vCenter server and navigate Home > Inventory > Hosts and Clusters.
2. Select the virtual machine, and then select the Summary tab.
3. Clear the value that appears in the EMC Proxy Session field.
Backups fail if certain characters are used in the virtual machine name,
datastore, folder, or datacenter names
When you use spaces or special characters in the virtual machine name, datastore, folder, or
datacenter names, the .vmx file is not included in the backup. The VM Direct appliance does not
back up objects that include the following special characters, in the format of character/escape
sequence:
l & %26
l + %2B
l / %2F
l = %3D
l ? %3F
l % %25
l \ %5C
l ~ %7E
l ] %5D
Workaround
To manually release the lock on the virtual machine:
1. Open the vSphere Web Client.
2. Select the virtual machine and select Summary.
3. Select Custom attribute and click Edit.
4. Remove the attribute EMC VM Direct Session.
Case Description
Database has When a database has been restored, this database will be skipped during
been restored transaction log backup because there is no Backup Promotion.
Case Description
System System databases are automatically skipped for transaction log backup.
Database
Database State Database is not in a state that allows backup. For example, the database is in
the NORECOVERY state.
Recovery Database is in SIMPLE recovery model, which does not support transaction
Model log backup
Other Backup Most recent backup for the database was performed by a different backup
Product product.
New Database Database was created after most recent full backup.
Backup Failure Database was in state to allow backup, backup was attempted, but backup
failed.
All skipped databases will be backed up as part of the next full backup. Also, a skipped database
will not result in msvmagent_appbackup.exe failure. The only instance in which
msvmagent_appbackup.exe would potentially fail is if all databases failed to back up.
The msvmagent_appbackup.exe program generates a history report of the databases, if the
database backup status was success/skipped/failed, and a reason if they were skipped or failed if
applicable. This history report is visible in the action logs for the VM Direct Engine, which are
available as part of the appbackup logs.
Note: For SQL virtual machine application-consistent data protection, the SQL and operating
system versions follow the NMM support matrix available at http://
compatibilityguide.emc.com:8080/CompGuideApp/.
l Run a discovery of the Data Domain Management Center (DDMC) and ensure that discovery
completed successfully for virtual machine copies.
l Check the discovery logs for any exceptions or errors that might have occurred during
discovery.
Virtual machine restore fails with name resolution error
A virtual machine restore might fail with the following error due to network issues between Data
Domain and PowerProtect Data Manager or the vCenter/ESXi:
Ensure that you have proper name resolution between the Data Domain and PowerProtect Data
Manager /vCenter/ESX.
DD NFS share not removed after restore to original
The DD NFS share might not be removed after a successful virtual machine restore to original.
When this occurs, the restore hangs and the following DD NFS clients appear enabled in the Data
Domain.
Figure 9 DD NFS clients still enabled after restore
If you encounter this issue, you can wait 24 hours for PowerProtect Data Manager to clean up the
DD NFS shares, or you can stop the restore and clean up the DD NFS clients manually by
performing the following steps:
1. Restart the VMDM service by typing /usr/local/brs/lib/vmdm/bin/vmdm restart.
2. Clean up DD NFS clients by typing nfs del <Path> <Client>.
3. In the vSphere Client's Configuration tab, manually unmount the EMC-vProxy-vm-qa-
xxxxx DDNFS datastore that is mounted on the ESXi host.
Virtual machine restore fails with error due to VM Direct corruption
A virtual machine restore might fail with the following error due to corruption of the VM Direct
Engine that is running in PowerProtect Data Manager:
com.emc.dpsg.vproxy.client.VProxyManager - Error(createSession):
javax.net.ssl.SSLException:
Unrecognized SSL message, plaintext connection
Ensure that the vproxyd service is running in PowerProtect Data Manager by typing the following
command.
ps xa | grep vproxy
Ensure that the vproxy rpm is installed as expected in PowerProtect Data Manager by typing the
following command.
rpm -qa | grep vProxy
When logged in as the root user, restart the vproxyd service on PowerProtect Data Manager by
typing the following command.
systemctl restart vproxyd
Virtual machine restore fails with error "Unable to create NAS Datastore"
A virtual machine restore might fail with the following error when a change is made to the DD
restore user role in Data Domain:
Ensure that the DD user performing the restore has the admin role. You can change the user's
status in Data Domain by identifying the Data Domain user that starts with ecdmsu-admin and
using the following commands:
To check the user's status, type user show list
To change the role of the user, type user change role < ecdmsu-admin-xxxxxxxxxxxxx>
admin
Virtual machine restore fails with error "User UserEARA does not have proper privileges"
A virtual machine restore fails with the error "User UserEARA does not have proper privileges"
when the user does not have adequate privileges to perform the restore operation.
Ensure that the PowerProtect Data Manager user performing the restore belongs to System
Tenant and has the Export and Recovery Admin role.
Virtual machine restore fails when the previous restore of this virtual machine is in progress
or did not complete
A virtual machine restore fails with the following error if the previous restore operation for the
same virtual machine is still in progress or did not complete successfully:
Error : There is another running restore operation that conflicts with this
request.
If the previous restore operation for this virtual machine is still in progress, monitor the progress in
PowerProtect Data Manager until the restore completes. If the virtual machine restore is complete
but the task stops responding, then you must manually cancel the restore in PowerProtect Data
Manager by restarting the VMDM service. You can restart the VMDM service by typing /usr/
local/brs/lib/vmdm/bin/vmdm restart.
virtual machine by the VM Direct appliance during the file-level restore operation. The VM Direct
appliance detects the available software on the client and updates the Agent software with the
new version of software from its repository. If the update does not occur automatically, contact a
Dell EMC technical support professional for a procedure to update the VM Direct software
repository with the latest version of the Agent software packages.
Procedure
1. Log in to the system console as a non-root user.
2. Run the sudo passwd root command.
Enter the new password twice to set a password for the root account.
3. Run the sudo passwd -u root command to unlock the root account.
4. Specify the root user credentials in the Dell EMC Data Protection Restore Client and
proceed to complete the file-level restore operation at least once.
While performing the file-level restore operation for the first time, remember to select Keep
FLR agent.
5. After performing the above steps at least once, you can revert the root account to the
locked state and use non-root account for future file-level restore requests. Non-root user
can lock the root account with the sudo passwd -l root command.
l msiexec.exe
l diskpart.exe
l cmd.exe
On Linux:
l blkid
l udevadm
l readlink
l rpm
l bash
Note: On Linux LVM, LVM2 rpm version 2.02.117 or later is required. Also, additional binaries
required on Linux LVM include dmsetup, lvm, and vgimportclone.
user cannot perform a file-level restore to the end user's profile, and an error displays
indicating "Unable to browse destination." For any user account control (UAC) interactions,
the administrator must wait for the mount operation to complete, and then access the backup
folders located at C:\Program Files (x86)\EMC\vProxy FLR Agent\flr
\mountpoints by logging into the guest virtual machine using Windows Explorer or a
command prompt.
l When you perform file-level restore on Windows 2012 R2 virtual machines, the volumes listed
under the virtual machine display as "unknown." File-restore operations are not impacted by
this issue.
l When you perform file-level restore on Ubuntu/Debian platforms, you must enable the root
account in the operating system. By default, the root account will be in locked state.
l You can only restore files and/or folders from a Windows backup to a Windows machine, or
from a Linux backup to a Linux machine.
l You must install VMware Tools version 10 or later. For best results, ensure that all virtual
machines run the latest available version of VMware Tools. Older versions are known to cause
failures when you perform browse actions during file-level restore or SQL retore operations.
l You can perform file-level restore across vCenters as long as the vCenters are configured in
PowerProtect Data Manager, and the source and target virtual machine have the same guest
operating system. For example, Linux to Linux, or Windows to Windows.
l File-level restore does not support the following virtual disk configurations:
n LVM thin provisioning
n Unformatted disks
n FAT16 file systems
n FAT32 file systems
n Extended partitions (Types: 05h, 0Fh, 85h, C5h, D5h)
n Two or more virtual disks mapped to single partition
n Encrypted partitions
n Compressed partitions
l File-level restore of virtual machines with Windows dynamic disks is supported with the
following limitations:
n The restore can only be performed when recovering to a virtual machine different from the
original. Also, this virtual machine cannot be a clone of the original.
n The restore can only be performed by virtual machine administrator users.
n If Windows virtual machines were created by cloning or deploying the same template, then
all of these Windows virtual machines may end up using the same GUID on their dynamic
volumes.
l File-level restore does not restore or browse symbolic links.
l File-level restore of Windows 8, Windows Server 2012 and Windows Server 2016 virtual
machines is not supported on the following file systems:
n Deduplicated NTFS
n Resilient File System (ReFS)
n EFI bootloader
Agent installation and 1. New installation of both l Uninstalling the last agent
uninstallation agents with: installed on the host un-
registers the host from
a. SQL Application agent
PowerProtect Data
or Oracle Application
Manager. Any new agent
l After un-registering a
host, the host's assets
will still display in the UI in
order to support restore
of these assets to a
different host. However,
backups will not be
initiated on these assets
as the protection policies
will be disabled.
frequency of backups. The Microsoft application agent is run on the virtual machine to perform
the transaction log backup. Backups are written directly to the Data Domain associated with
the protection policy. A transaction log backup is only performed for databases in the proper
state; otherwise, databases are skipped.
l Database restore, flat file restore, table-level restore, or database Instant Access restore to
the source virtual machine or an alternate virtual machine. To perform restores to an alternate
virtual machine, that virtual machine must be an asset of PowerProtect Data Manager.
However, instance-level restores can only be performed to the original source instance. For
more details on how to use Microsoft application agent to restore SQL databases backed up
with an application-aware VM protection policy, see the PowerProtect Microsoft Application
Agent SQL Server User Guide.
The Microsoft application agent software package is bundled with the PowerProtect Data
Manager appliance, and is automatically configured on a virtual machine when you add the virtual
machine asset to a VM application-aware protection policy. As part of the VM protection policy
configuration, both the VM Direct Agent and the Microsoft application agent are installed on the
virtual machine. The Microsoft application agent installation includes the software components
required for self-service restore, including the SQL Server Management Studio Microsoft App
Agent plug-in and ItemPoint. After the agent installations, configuration information for the Data
Domain is also sent to the virtual machine, calling the Microsoft application agent to perform the
lockbox configuration. Subsequent protection policy backups and self-service restore operations
jobs will also use this information without any further action required. During application-aware
SQL Server full backups and transaction log backups, PowerProtect Data Manager upgrades the
VM Direct Agent and Microsoft application agent software packages as required.
The virtual machine credentials provided in the protection policy or within the virtual machine
asset are used during Microsoft application agent installation and during SQL Server full and
transaction log backups. The Microsoft application agent is first called to validate the virtual
machine SQL configuration. The agent verifies that the SQL Server is installed and running, and
that the provided virtual machine credentials have the necessary permissions to perform an SQL
Server backup.
In order to perform SQL Server application-consistent data protection for virtual machines, the
Microsoft application agent requires the following:
l The Microsoft application agent runs under the virtual machine credentials provided in the VM
protection policy or virtual machine asset for installation and data protection operations.
Configure all SQL Server instances on the virtual machine to grant account rights for this
account to perform SQL database backup and recovery operations:
n Add the account to SQL logins.
n Grant the account the sysadmin role.
l Network connectivity, hostname resolution, and firewall ports between the Data Domain
device and the virtual machines that are part of SQL Server application-consistent protection
policies and restore to alternate operations. This connectivity is required to enable the
Microsoft application agent to perform client direct operations to Data Domain.
l VMware vCenter server version 6.5 or later.
l VMware ESXi server version 6.5 or later.
l VMware Tools version 10.1 or later.
l Enable the UUID attribute (disk.EnableUUID=TRUE) in the vSphere Client.
l The virtual machine must use SCSI disks only, and the number of available SCSI slots must at
least match the number of disks. For example, a virtual machine with 7 disks will only require
one SCSI controller, but a virtual machine with 8 disks will require 2 SCSI controllers.
l The VM Direct Engine requires live network connectivity to the ESXi where the targeted SQL
virtual machine resides.
Procedure
1. Modify the following parameter in the /usr/local/brs/lib/zuul/conf/
application.yml file.
MaxTotalConnections = (Number of clients * 12)
2. Increase the value in the MaxTotalConnections parameter by a factor of 12 for every client.
For example, to protect 70 SQL clients, set the parameter to MaxTotalConnections=840.
3. Restart the Zuul service:
zuul restart
n HyperVisor files. Note that the File System agent is installed primarily in the guest operating
system for the backup of guest file system volumes, and is not dependent on the underlying
HyperVisor.
n Data belonging to individual application writers.
n Unsupported application writer's files.
l For any ESXi version 6.5 and earlier host with Trident storage attached, the Windows
operating system deployment/installation cannot proceed and File System agent backup and
restore operations will fail if the DiskMaxIOSize parameter is not configured with the proper
value. Ensure that you set the DiskMaxIOSize to 1024 KB.
l It is recommended to use different mount points for each drive. Reusing mount points might
cause unexpected issues during File System discovery.
l The File System agent does not support non-English operating systems. Software
compatibility information for the PowerProtect Data Manager software and the File System
agent is provided in the eLab Navigator, available at https://elabnavigator.emc.com/eln/
modernHomeDataProtection.
l If a Windows or Linux File System host is unregistered from PowerProtect Data Manager and
then re-registered with a different FQDN, because PowerProtect Data Manager recognizes
the registration as a new host by its new name, duplicate asset entries will appear in the UI—
those for the host registered earlier, as well as for the host registered by the new name. This
does not impact backup and restore functionality on the new host.
l IPv6 is not supported. Use IPv4 instead.
l Image-level recovery to a system volume is not supported.
l Recovery of ReFS or deduplicated volumes to Windows 2008 R2 is not supported.
l If File System host discovery does not occur on Windows hosts, verify that the fs plugin -
adm-fs-4.0.0-1-SNAPSHOT-windows-amd64.exe plug-in file has been copied to
C:\Program Files\DPSFSAGENT\ADM Agent\bin. Note that copying the file to this
location can take 10-15 minutes. When the plug-in file appears in this location, initiate a manual
discovery from the UI's Asset sources window.
l File system discovery requires an ext3, ext4, or XFS file system type. Note, however, that
PowerProtect Data Manager does not support ext4 file systems on SuSE Linux Enterprise
Server (SLES) version 11 SP1-SP4 platforms.
l If a Windows or Linux File System host has DNS incorrectly configured or is part of a
workgroup with a dummy DNS suffix added, centralized restore of a backup copy performed
on this host will fail. This is because the storage name on the protection storage system is
created with the actual shortname of the host, and does not include the incorrect suffix. For
the same reason, a restore from PowerProtect Data Manager will also fail if the host name or
domain name of the client is changed and then re-registered to PowerProtect Data Manager.
As a workaround, use the ddfsrc command with the -c flag, with the short name as input to
restore the required copies. More information on how to use the ddfsrc command is provided
in the section Performing self-service restore of a File System host on page 169.
l If the File System agent will co-exist with the Microsoft SQL or Oracle application agents, it is
recommended that you use either the IP address or FQDN for registering both agents.
Registering one agent using an IP address and another using the FQDN will require you to re-
approve the host in PowerProtect Data Manager, and might cause other unexpected
inconsistencies.
l For a protection policy backup with assets from different hosts, the backup status displays as
"Failed" in the UI if the backup of one asset within the policy fails.
l Running the ddfssv and ddfsrc commands to perform self-service backup and restore of
File Systems fails if you provide the Data Domain host name for the DFA_SI_DD_HOST
variable.
l A File System backup might fail with the error Insufficient space exists in the
volume group for creating shadow of the volume when there is not enough
space in the volume group for a block based backup to succeed. Each volume group on LVM2
or VxVM must have at least 10% free space.
l On the Linux hosts that have the UEFI Secure Boot option enabled, block based backup drivers
do not load, and the error message insmod: ERROR: could not insert module /
lib/ modules/ 3.10.0-693.el7.x86_64/ extra/nsrbbb.ko: Required key
not available appears. As a workaround, you can disable the Secure Boot option.
l On Linux, the block based incremental backups consistently fail and display a message similar
to save: Block Based Error subsystem error while performing Block
Based Backup. Check if any other process is already accessing the snapshot, or delete the
snapshot manually, and then try again.
l If the Bytes of sector sizes of the source and target volumes are different, PowerProtect Data
Manager does not support block based image recoveries. For example, you cannot perform a
block based image recovery of a volume that has 4096 as the Bytes of sector size to a volume
that has 512 as the Bytes of sector size, and vice versa.
To work around this issue, change the directory to the location of install.sh and
run ./install.sh.
Encapsulation fails during policy creation if retention lock exists on VMAX or SMIS services
not running
During protection policy creation, a process called encapsulation occurs, which involves creating
backup and restore FTS devices on the VMAX and linking the Data Domain vDisk with FTS. If a
retention lock exists on the VMAX, or if the SMIS services are not running, encapsulation fails.
To ensure that there is no retention lock on the VMAX, run the following command as the root
user from the SMIS server:
symcfg list -lockn all
Output similar to the following displays:
S Y M M E T R I X L O C K S
If SMIS services are not running, an exception appears in the logs indicating that the storsvd
service is not available and so a connection to SMIS cannot be established using the SYMAPI calls.
If this exception occurs:
1. Run the following command as the root user from the SMIS server to verify the status of
storsvd:
./stordaemon show storsrvd
If the service is unavailable, the message *** Daemon storsrvd is not currently
running appears.
2. Restart the service by running ./stordaemon start storsrvd.
3. Run the ./stordaemon show storsrvd command again to verify the status is now
Running.
4. To view the remote server details, run ./stordaemon action storsrvd -cmd show
server.
5. To view the network configuration, run ./stordaemon action storsrvd -cmd show -
netinfo.
DDBOOST_USER = 148_78-xxxxx-932c9
DEVICE_HOST = IP address
DEVICE_PATH = /148_78-xxxxx-932c9-SU
DDVDISK_USER = 148_78-xxxxx-932c9
#RESTORE_DEVICE_POOL = 148_78-xxxxx-932c9
#RESTORE_DEVICE_GROUP = R-sdm_xxxxx_SG7-0638
#RESTORE_DEVICE_GROUP = R-sdm_xxxxx_SG8-0638
# DD_BOOST_FC =
# DD_PORT =
VMAX_FASTX_RESTORE_SG = R-sdm_xxxxx_SG7-0638
#VMAX_FASTX_RESTORE_SG = R-sdm_xxxxx_SG8-0638
To work around this issue, comment the VMAX_FASTX_RESTORE_SG attribute and un-comment
RESTORE_DEVICE_POOL and one of the entries for RESTORE_DEVICE_GROUP.
MTree replication fails when adding replication stage for multiple protection policies if
assets have the same user/vDisk pool
For an existing Storage Direct user who has upgraded to the Storage Direct agent for
PowerProtect Data Manager 19.2, an MTree replication job fails with an error similar to the
following if you have the same user/vDisk pool for protected assets and you attempt to create
multiple protection policies for these assets with a replication stage.
Unable to create DataDomain user xxxx, User xxxx already exists.
To work around this issue, manually add the secondary Data Domain details in the configuration
file.
Replication not supported for assets in a Storage Group policy for existing Storage Direct
users if replication already configured for stand-alone agent
The addition of a replication stage as part of a Storage Group protection policy in PowerProtect
Data Manager is not supported for existing Storage Direct users' assets if replication has already
been configured on the stand-alone Storage Direct (ProtectPoint) agent.
To import these assets for primary backup policy creation, you need to remove the secondary Data
Domain details from the configuration file before importing the file during the Storage Direct agent
for PowerProtect Data Manager 19.2 upgrade
l System settings...................................................................................................................224
l System Support...................................................................................................................227
l Modifying the PowerProtect Data Manager virtual machine disk settings...........................235
l Configure the Data Domain system..................................................................................... 237
System settings
You can use the PowerProtect Data Manager UI to modify system settings that are typically
configured during PowerProtect Data Manager installation.
3. Click Save.
2. Select User name of the user password that you want to edit and click Edit.
The Change the password for the root user window appears.
3. Type the existing password in the Old Password field.
4. Type the new password in the New Password field, and then retype it in the Confirm
Password field.
5. Click Save.
License types
Learn about the licenses that are available.
The following list provides information about the license types:
l Trial license—Applied automatically on installation of PowerProtect Data Manager and enables
full use of the product without applying a license key for up to 90 days. When the trial period
ends, PowerProtect Data Manager continues to operate with full functionality, so you can
apply a permanent license.
l Front-end protected capacity by terabyte or FETB—The primary model of eLicensing, which is
based on the actual capacity that you want to protect. For example, you can purchase a 100-
TB license, which enables you to protect up to 100 TB of actual data.
l Socket-based—Licensed per CPU socket on virtual machine hosts being backed up and/or
replicated.
Note: When you upgrade from a previous release, for example, 3.0.0-18, to PowerProtect Data
Manager, any existing license and its associated secure remote services (SRS) connection are
removed from the system, and replaced with the 90-day trial license. If you have a valid FETB
or Socket-based license for PowerProtect Data Manager, ensure that you upload this license
and set up the associated SRS connection.
Perpetual and term-based (subscription) licensing
Licensed software is offered in perpetual and term-based licenses. Your quote will identify whether
your license rights are perpetual or term-based.
A perpetual license enables you to use the software for as long as you are in compliance with the
terms of the license agreement.
A term-based license enables you to use the software for a specified period of time, as long as you
are in compliance with the terms of the license agreement. At the end of the license term, you
must either stop using the software, extend the license term, or purchase new licenses through an
agreement with Dell EMC.
System Support
You can use the PowerProtect Data Manager UI to manage and modify support settings, such as
the mail server setup and Secure Remote Services registration, that are typically configured during
installation.
To access the Support window, click the icon in the top-right, and then select System
Settings > Support.
2. Move the Enable Auto Support slider to Disabled, and then click Save.
3. Select System Settings > Support > Secure Remote Services
The Secure Remote Services Configuration dialog box appears.
4. Click Delete to remove the Secure Remote Services gateway.
Callhome
When you register an SRS gateway, you also enable the Callhome feature, which allows Technical
Support Engineers to collect data that is related to troubleshooting device and PowerProtect Data
Manager software issues. Callhome does not collect any personal information.
Callhome populates three reports—a telemetry report, an alert summary report, and a
PowerProtect Central report. The following table lists the information that Callhome collects for
the telemetry report.
Integrated Storage l General Information (Model type, system serial number, installed
hardware, MAC addresses, WWPN’s, alerts
l Server Usage
l Active Tier resources, Filesys compression,
l General Status (System Memory summary, Alerts, Alert History,
Network Hardware, Trust information, Certificate details, Disk
Status, Filesys status, NFS status, lw-status)
l Software Configuration (License details)
l Virtual Hardware Configuration (Network configuration,
Hardware details, PCI info, System Ports)
l Cluster configuration (Node details, Storage Policy, Compute
Policy)
l File System cleaning configuration and statistics
l File System encryption configuration/status
l File System statistics
l File System compression statistics that relate to deduplication
and compression achievements of ingested data.
l Network statistics
l NFS Statistics
l DD Boost Statistics
l Storage Layer Statistics
l System Statistics
l Processes information
l Kernel information
Callhome collects details about the following objects for the PowerProtect Central report:
l Protection Life Cycle
l Service Level Agreement
l Assets
l Storage Systems
l Data targets
l Protection Details
l Compliance Details
l Audit logs
e. User Name:
The user name associated with the PowerProtect Data Manager SMTP email server.
f. Password:
The password associated with the PowerProtect Data Manager SMTP email server.
3. Click Send Test Email.
PowerProtect Data Manager sends a test email.
4. Click Save.
Procedure
1. Select System Settings > Support > Logs.
2. Click Add to add a log bundle.
The Add Log Bundle window appears.
3. Select the systems for the log bundle (Data Manager and/or VM Direct), set the log bundle
duration, and click Save.
The range can be a maximum period of 7 days up to the current date. The range must be a
minimum of 1 day.
The Jobs window displays the progress of the log bundle creation. Additionally, a green
banner in the UI indicates that the log bundle has successfully been created. If you want to
dismiss the banner, click X.
4. To delete the log bundle, select the box to the left of log bundle and click Delete.
The Log Capacity indicates how much space in GB remains on the disk for logs and the
percentage of the disk in use for log storage.
5. To download the log bundle, click the bundle name.
To view the health of system components, click the icon in the top-right, select System
Settings > Support, and then select System Health.
The following table provides a summary of each component state.
Status Description
Running This state appears when the associated service or component is running with
full functionality. When all components are in running state, the state of the
appliance is operational.
Initializing This state appears when the component is starting. When the component
successfully starts, the state changes to Running.
Maintenance This state appears when the associated service is in maintenance. In the
maintenance state, components have limited functionality. Infrastructure
services do not go into maintenance state. When other components are in
maintenance, the appliance state is also maintenance.
Quiesce This state appears when the service that is associated with the component is
stopping.
Shut down This state appears when the service has stopped.
Status Description
No response This state appears when the service that is associated with the component is
running, but the service is not responding.
Application Data Management Service Provides the status of the Application Data
Management Service.
and predictive analytics. The data reported to PowerProtect Central includes configuration data,
historical metrics and health score data.
Procedure
1. Select System Settings > Support > Auto Support.
2. Click Enable Auto Support or Disable Auto Support.
Results
When Auto Support is enabled, PowerProtect Central reports are sent automatically.
To log in to PowerProtect Central, click the Reporting menu item, or go to https://
powerprotectcentral.emc.com
For more information on PowerProtect Central, refer to the PowerProtect Central Online Support
site.
For example, to resize the disk to 700 GB, type: resize 1 752GB
d. Type quit.
a. In the Export Name field, specify the name of the Data Domain MTree.
b. If you have not yet created the Data Domain MTree, follow the prompts to create the
MTree and click Close.
c. In the Directory path field, specify the full directory path for Data Domain MTree that
you created. Ensure that you use the same name for the directory.
d. Click OK.
A message appears to indicate that the NFS export configuration save is in progress and
then complete.
e. Click Close.
Note: If you are logged into the vSphere Client when the vCenter discovery occurs in
PowerProtect Data Manager, ensure that you log out and then log back in for PowerProtect to
display.
If the virtual assets in the vCenter have not yet been assigned to a virtual machine protection
policy in PowerProtect Data Manager, only the PowerProtect Data Manager name displays in the
portlet when you select a virtual machine. Adding the virtual machine to a PowerProtect Data
Manager protection policy updates the portlet with more information, as shown in the following
figure.
Figure 12 PowerProtect portlet with protected virtual machine
Once you complete the tasks to set up and run a virtual machine protection policy in PowerProtect
Data Manager, you can perform the following PowerProtect Data Manager functionality within the
vSphere Client:
l In the Summary window, view information about protection policies and, if policies have been
run in PowerProtect Data Manager, information about available protection copies.
l In the Monitor window, actively monitor in-progress backup and restore operations for the
virtual machine protection policy, and view information for successfully completed protection
copies that are available for restore.
l Perform a Restore to Original, Restore to New, or Instant Access restore. You can initiate a
restore from the Monitor window, or by right-clicking a virtual machine and selecting
PowerProtect > Restore.
Note: If you edit the vCenter Server in the PowerProtect Data Manager UI to unregister
the vSphere Plugin for PowerProtect Data Manager, these PowerProtect Data Manager
privileges are not removed from the user group.
l For the virtual asset (virtual machine, cluster, host) and all its child elements, add permissions
to the Virtual machine power user group that you have enabled with PowerProtect Data
Manager privileges. To add these permissions, select the asset in the left pane of the vSphere
Client, and then click the Permissions tab.
l Add a virtual machine protection policy in the PowerProtect Data Manager UI's Protection >
Protection Policies window to schedule a backup of the virtual machine(s). Add a protection
policy for virtual machine protection on page 118 provides information.
3. On the Select Copy page, for each virtual machine that is listed in the table, select the radio
button next to the virtual machine and click Choose Copy.
The Choose Copy dialog appears.
Note: If you click Next without choosing a copy, the most recent backup copy is used.
4. If the backup is on a Data Domain system, click DD, and then select from one of the
available copies that display in the table.
5. On the Purpose page, select whether you want to restore the entire virtual machine, or only
specific virtual machine disks (VMDKs), and then click Next.
Note: Individual VMDKs can only be restored to the original location.
6. On the Restore Type page, select from one of three available restore options. The wizard
updates to display the pages relevant to the restore type that you select, and are identical
to the Restore wizards for these options that appear in the PowerProtect Data Manager UI.
Note, however, that selections such as the vCenter, resource pool, and datastore will be
limited to what the logged in vSphere user has access to, and not necessarily what an
administrator user in the PowerProtect Data Manager UI would be able to view and select.
l For Instant Access restore, review the section Restore an instant access virtual machine
on page 153.
l For Restore to New, review the section Restore to new on page 151.
l For Restore to Original, review the section Restore to original virtual machine on page
149.
7. On the Summary page, review your selections and then click Restore.
Results
An entry for the restore job displays in the Recent Tasks pane of the Monitor window, and also
the Recovery > Running Activities window of the PowerProtect Data Manager UI.
After you finish
For Instant Access restores, when the virtual machine is powered on and you select the virtual
machine in the left pane of the Summary window, the session information displays within the
PowerProtect portlet. If you require this session for longer than the time you specified during
setup, you can click Extend Session and increase session availability by up to 7 days.
l PowerProtect Data Manager image backup and recovery for VMware Cloud on AWS........ 246
l Configure the VMware Cloud on AWS web portal console.................................................. 246
l Amazon AWS web portal requirements................................................................................247
l Interoperability with VMware Cloud on AWS product features............................................ 247
l vCenter server inventory requirements............................................................................... 248
l VMware Cloud on AWS configuration best practices.......................................................... 248
l Add a VM Direct appliance.................................................................................................. 248
l Protection and recovery operations.................................................................................... 249
l Interoperability with VMware Cloud on AWS product features............................................250
l Unsupported operations in VMware Cloud on AWS ............................................................250
l Troubleshooting VMware Cloud on AWS ............................................................................250
SDDC, the PowerProtect Data Manager server does not allow you to add the vCenter Server
by using the server's public FQDN or IP address.
l It is recommended that you deploy the Data Domain system as a virtual appliance in the
Amazon Virtual Private Cloud (VPC). During the SDDC creation, connect the SDDC to an AWS
account, and then select a VPC and subnet within that account.
l The Data Domain system running in the Amazon VPC must be connected to the VMware SDDC
through the VMware Cloud Elastic Network Interfaces (ENIs). This action allows the SDDC,
the services in the AWS VPC, and subnet in the AWS account to communicate without having
to route traffic through the internet gateway.
l The same ENI channel is recommended for access to Data Domain systems.
For more information about configuring ENIs, see https://vmc.vmware.com/console/aws-link.
l If DDVE is running in the Amazon VPC, configure the inbound and outbound firewall rules of
the compute gateway for Data Domain connectivity.
For detailed information on what incoming on outgoing ports need to be opened for
PowerProtect-VM proxy solution, refer to the PowerProtect Data Manager 19.2 Security
Configuration Guide.
l If using NSX-T, configure the DNS to resolve to the internal IP address of the vCenter server.
Navigate to SDDC Management > Settings > vCenter FQDN and select the Private vCenter
IP address so that you can directly access the management network over the built-in firewall.
Additionally, ensure that you open TCP port 443 of the vCenter server in both the
management gateway and the compute gateway.
l The ESX Host/Cluster list enables you to choose on which cluster or ESX host you want
to deploy the additional VM Direct Engine.
l The Network list shows all the networks that are available under the selected ESX Host/
Cluster.
l The Data Store list shows all datastores that are accessible to the selected ESX Host/
Cluster based on ranking (whether the datastores are shared, local, or NFS), and
available capacity (the datastore with the most capacity appearing at the top of the list).
l You can choose the specific datastore on which the VM Direct appliance will reside or
leave the default selection of <automatic> to enable PowerProtect Data Manager to
determine the best location to host the VM Direct appliance.
l The Transport Mode list enables you to force using only Hot Add or only Network Block
Device (NBD) transport modes or to default to Hot Add mode and failback to NBD only if
Hot Add cannot be used.
Note: When configuring the VM Direct appliance in a VMware Cloud on AWS
environment, ensure that you select the transport mode as Hot Add only. VMware
Cloud on AWS does not support the NBD transport mode.
3. Click Save.
The VM Direct appliance is added to the VM Direct Engines pane. Note that it may take
several minutes before the additional VM Direct appliance is registered in PowerProtect
Data Manager. The VM Direct appliance appears in the vSphere Client window.
Results
When an extra VM Direct appliance is deployed and registered, this appliance is used by
PowerProtect Data Manager instead of the embedded VM Direct appliance for any data protection
operations involving virtual machine protection policies, unless all added VM Direct appliances are
unavailable. If no added VM Direct appliance is available, the embedded VM Direct appliance is
used as a fallback to perform limited scale backups and restores. If you do not want to use an
added VM Direct appliance, you can disable that proxy. Additional VM Direct actions on page 109
provides more information.
After you finish
If the VM Direct appliance deployment fails, review the network configuration of PowerProtect
Data Manager in the System Settings window to correct any inconsistencies in network
properties. After successfully completing the network reconfiguration, you must delete the failed
VM Direct appliance and then add the VM Direct appliance in the Protection Engines window.
When configuring the VM Direct appliance in a VMware Cloud on AWS environment, if the VM
Direct appliance is deployed to the root of the cluster instead of inside the Compute-
ResourcePool, you must move the VM Direct appliance inside the Compute-ResourcePool.
l In the Monitor window, actively monitor in-progress backup and restore operations for the
virtual machine protection policy, and view information for successfully completed protection
copies that are available for restore.
l Perform a Restore to Original, Restore to New, or Instant Access restore. You can initiate a
restore from the Monitor window, or by right-clicking a virtual machine and selecting
PowerProtect > Restore.