Dell EMC Avamar for VMware User Guide 18.1 Dell Inc. June 2020 Rev. 06 Notes, c
Dell EMC Avamar for VMware User Guide 18.1 Dell Inc. June 2020 Rev. 06 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2001 - 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. Figures.......................................................................................................................................... 7 Tables............................................................................................................................................8 Preface..........................................................................................................................................9 Chapter 1: Introduction.................................................................................................................. 13 Data protection overview....................................................................................................................................................13 Image backup..................................................................................................................................................................13 Guest backup..................................................................................................................................................................15 Considerations................................................................................................................................................................ 16 Changed block tracking.......................................................................................................................................................17 Image backup virtual machine quiescing........................................................................................................................... 17 Image backup and recovery support in Amazon Web Services (AWS)........................................................................18 Chapter 2: Configuration and Setup................................................................................................19 Best practices.......................................................................................................................................................................19 (Optional) Configuring support for multiple vCenters.....................................................................................................19 Installing Avamar Administrator software........................................................................................................................ 20 Configuring vCenter-to-Avamar authentication............................................................................................................. 20 Adding vCenter authentication certificates to the MCS keystore.......................................................................... 21 Disabling MCS certificate authentication....................................................................................................................21 Creating a dedicated vCenter user account....................................................................................................................22 Adding a vCenter client...................................................................................................................................................... 24 Auto-discovery of virtual machines...................................................................................................................................25 Configuring domain mapping rules for VM auto-discovery......................................................................................25 Creating a rule................................................................................................................................................................25 Deploying proxies.................................................................................................................................................................26 Proxy Deployment Manager.........................................................................................................................................27 Deploying proxies with Proxy Deployment Manager................................................................................................ 28 Upgrading proxies................................................................................................................................................................29 Upgrading Avamar proxies from release 7.2 or newer..............................................................................................30 Upgrading Avamar proxies from releases prior to release 7.2................................................................................. 30 Maintaining proxies..............................................................................................................................................................33 Reregistering a proxy with an Avamar server............................................................................................................33 Changing the proxy guest operating system admin password................................................................................34 Changing the proxy guest operating system root password...................................................................................34 Additional Avamar server configuration............................................................................................................................34 Configuring automatic proxy selection....................................................................................................................... 34 Configuring the MCS to support both guest and image backup............................................................................ 35 Chapter 3: Administration..............................................................................................................36 Clients and containers.........................................................................................................................................................36 Contents Contents 3 Dynamic versus static containers................................................................................................................................36 Dynamic container behavior.........................................................................................................................................36 How independent and container protection interact................................................................................................37 Icons which represents VMware entity type and state............................................................................................37 Adding clients and containers............................................................................................................................................ 38 Editing clients and containers............................................................................................................................................ 39 Viewing protected virtual machines..................................................................................................................................40 Viewing a replicated virtual machine name......................................................................................................................40 Monitoring the vCenter connection..................................................................................................................................40 Manually synchronizing Avamar Administrator with a vCenter......................................................................................41 Renaming a vCenter client..................................................................................................................................................41 VMware Image Dataset......................................................................................................................................................42 Adding guest backup throttling parameters to a dataset.............................................................................................. 42 Groups...................................................................................................................................................................................42 Default Proxy Group......................................................................................................................................................42 Default Virtual Machine Group.....................................................................................................................................42 Virtual machine and proxy relationships within groups.............................................................................................42 Changing proxy datastore and group assignments.........................................................................................................43 Chapter 4: Backup........................................................................................................................ 44 Limitations............................................................................................................................................................................ 44 Perform an on-demand backup of a virtual machine by using AUI ..............................................................................45 Performing an on-demand backup by using the Avamar Administrator...................................................................... 46 Set advanced plug-in options in the AUI.....................................................................................................................47 Scheduling backups.............................................................................................................................................................48 Automatically including virtual machines in a group..................................................................................................48 Log truncation backups......................................................................................................................................................50 Scheduled backups with Microsoft SQL log truncation...........................................................................................50 Scheduled backups with Microsoft Exchange log truncation.................................................................................. 51 Monitoring backups.............................................................................................................................................................52 Canceling backups...............................................................................................................................................................52 Support for vCenter HA failover for inflight backups.....................................................................................................52 Configure a backup to support VMware encryption...................................................................................................... 53 VMware encryption support limitations......................................................................................................................53 Configure a backup to support vSAN encryption........................................................................................................... 53 Chapter 5: Restore....................................................................................................................... 56 Image and file-level restore guidelines..............................................................................................................................56 Monitoring restores.......................................................................................................................................................56 Canceling restores.........................................................................................................................................................56 Instant access................................................................................................................................................................ 57 Restore an instance of a VM backup by using the AUI ...........................................................................................58 Image backup overview.......................................................................................................................................................61 Image-level restore limitations......................................................................................................................................61 Restoring the full image or selected drives to the original virtual machine............................................................62 Restoring the full image or selected drives to a different virtual machine.............................................................63 Mounting Windows VMDKs from an image backup................................................................................................. 64 Restore the full image or selected drives to a new virtual machine by using Avamar Administrator.................65 File-level restore (FLR).......................................................................................................................................................66 4 Contents Performance improvements for file-level restore..................................................................................................... 66 File-level restore supported configurations................................................................................................................66 File-level restore limitations..........................................................................................................................................68 Perform a file-level restore (FLR) operation by using AUI.......................................................................................69 Perform a file-level restore (FLR) operation by using the Data Protection Backup and Recovery File- Level Restore UI........................................................................................................................................................ 69 Restoring specific folders or files to the original virtual machine by using Avamar Administrator......................70 Restoring specific folders or files to a different virtual machine by using Avamar Administrator........................71 Chapter 6: Backup Validation......................................................................................................... 73 Overview...............................................................................................................................................................................73 What is validated............................................................................................................................................................73 VM Backup Validation groups...................................................................................................................................... 73 Performing an on-demand backup validation.................................................................................................................. 73 Scheduling backup validations........................................................................................................................................... 74 Chapter 7: Protecting the vCenter Management Infrastructure........................................................ 76 Overview...............................................................................................................................................................................76 Backing up the vCenter management infrastructure..................................................................................................... 76 Implementing guest backups of vCenter management infrastructure................................................................... 77 Creating a dataset for vCenter management infrastructure backups....................................................................77 Adding a backup client for vCenter database hosts................................................................................................. 78 Recovering vCenter management infrastructure from Avamar backups.................................................................... 78 Support for vCenter HA failover for inflight backups.....................................................................................................78 Chapter 8: Protecting ESX Hosts................................................................................................... 80 Overview.............................................................................................................................................................................. 80 Limitations...................................................................................................................................................................... 80 Task List..........................................................................................................................................................................80 Adding ESX host authentication certificates to the MCS keystore..............................................................................81 Creating a dedicated ESX host user account...................................................................................................................81 Adding an ESX host as a vCenter client...........................................................................................................................83 Deploying a proxy in a standalone ESX host....................................................................................................................84 Deploying a proxy appliance in an ESX host using the vSphere Client...................................................................84 Manually configuring proxy network settings............................................................................................................85 Registering and activating the proxy with the Avamar server................................................................................ 85 Disassociating an ESX host from a vCenter.................................................................................................................... 86 Chapter 9: Avamar image backup and recovery for VMware Cloud on Amazon Web Services (AWS).....87 Avamar image backup and recovery for VMware Cloud on AWS.................................................................................87 Configure the VMware Cloud on AWS web portal console...........................................................................................87 Amazon AWS web portal requirements........................................................................................................................... 88 vCenter server inventory requirements........................................................................................................................... 88 Deploy the vProxy OVA on a vCenter server in VMware Cloud on AWS....................................................................88 Configure vCenter-to-Avamar authentication for VMware Cloud on AWS................................................................89 Avamar image backup and restore for VMware Cloud on AWS best practices......................................................... 89 Unsupported Avamar operations...................................................................................................................................... 90 Appendix A: Manually deploying proxies...........................................................................................91 Contents 5 Overview............................................................................................................................................................................... 91 Downloading the proxy appliance template file................................................................................................................91 Deploying the proxy appliance in vCenter.........................................................................................................................91 Deploying a proxy appliance in vCenter using the vSphere Web Client.......................................................................92 Registering and activating the proxy with the Avamar server...................................................................................... 93 Configuring proxy settings in Avamar Administrator......................................................................................................94 Performing optional proxy performance optimization.................................................................................................... 94 Appendix B: vSphere Data Ports.....................................................................................................95 Required data ports............................................................................................................................................................ 95 Appendix C: Using VMware vRealize Log Insight..............................................................................96 About VMware vRealize Log Insight.................................................................................................................................96 Configuring the Log Central Reporting Service.............................................................................................................. 96 Configuring Log Forwarding Agents ................................................................................................................................ 97 Appendix D: Plug-in Options.......................................................................................................... 98 How to set plug-in options.................................................................................................................................................98 VMware Image backup plug-in options............................................................................................................................ 98 VMware Image restore plug-in options...........................................................................................................................100 Windows VMware GLR plug-in options..........................................................................................................................100 Appendix E: Troubleshooting.........................................................................................................101 Installation and configuration problems and solutions....................................................................................................101 Problems adding vCenter Server as Avamar client..................................................................................................101 Proxy network settings................................................................................................................................................101 Error when registering guest backup or Windows recovery target client.............................................................101 Backup problems and solutions.........................................................................................................................................101 Backup does not start..................................................................................................................................................101 Backups fail with “No Proxy” or “No VM” errors.....................................................................................................102 Changed block tracking does not take effect..........................................................................................................102 Proxies are not assigned to backup jobs...................................................................................................................102 VM snapshot fails backups due to incorrect pre-evaluation of available space.................................................. 102 Backup and restore of vFlash Read Cache enabled VMs will use NBD transport mode....................................102 Exchange log truncation unsupported when VMDK is encrypted via vSphere...................................................103 Restore problems and solutions.......................................................................................................................................103 Preexisting snapshots cause restores to fail............................................................................................................ 103 Restore to new virtual machine not available when physical RDM disks are involved....................................... 103 FLR browse of a granular disk backup without a partition table is not supported.............................................. 104 Fault tolerance disabled when restore to new virtual machine is performed.......................................................104 Restore to new virtual machine to Virtual SAN 5.5 will fail ...................................................................................104 Powering on an instant access vFlash-VM backup to a host without flash capacity configured fails ............104 Maximum number of NFS mounts with instant access issue................................................................................ 104 File-level restore on RHEL 5 requires the standard C++ library............................................................................105 File-level restore of a folder or file name containing certain special characters fails..........................................105 File-level restore to user profile fails when Admin Approval Mode is enabled.....................................................105 Glossary..................................................................................................................................... 106 6 Contents 1. Image backup diagram...................................................................................................................................................13 2. Default proxy virtual machine specifications......................................................................................................14 3. Example independent and container protection.............................................................................................. 37 4. Account Management tab.........................................................................................................................................38 5. Virtual machine and proxy relationships within groups.................................................................................43 6. Example nested container structure.....................................................................................................................45 7. Example nested container structure......................................................................................................................61 Figures Figures 7 1. Revision history..................................................................................................................................................................9 2. Typographical conventions........................................................................................................................................ 10 3. Guest backup installation resources...................................................................................................................... 15 4. Minimum required vCenter user account privileges.......................................................................................22 5. Example chart for gathering proxy information................................................................................................31 6. Example chart for gathering proxy information, continued.........................................................................31 7. Virtual machine properties..........................................................................................................................................31 8. Avamar Administrator icons .....................................................................................................................................37 9. Required permissions for the Avamar Administrator.....................................................................................54 10. Image restore toolbar buttons................................................................................................................................ 61 11. FLR support partitioning scheme...........................................................................................................................67 12. File system support for FLR.................................................................................................................................... 67 13. LVM support for FLR................................................................................................................................................. 67 14. Multi-device support for FLR................................................................................................................................. 67 15. Important vCenter management infrastructure components................................................................. 77 16. Minimum required ESX host user account privileges.................................................................................. 82 17. Required vSphere data ports..................................................................................................................................95 18. Backup options for Avamar VMware Image plug-in.................................................................................... 98 19. Restore options for Avamar VMware Image plug-in..................................................................................100 Tables 8 Tables As part of an effort to improve the product lines, revisions of the software and hardware are periodically released. Therefore, some functions that are described in this document might not be supported by all versions of the software or hardware currently in use. The product release notes provide the most up-to-date information on product features. Contact the technical support professional when a product does not function correctly or does not function as described in this document. NOTE: This document was accurate at publication time. To find the latest version of this document, go to Online Support (https://support.EMC.com). Purpose This publication describes various methods and strategies for protecting VMware virtual machines. Audience The information in this publication is intended for system administrators familiar with: • Basic Avamar system administration principles, and procedures found in uploads/Industriel/ avamar-vmware-guide.pdf
Documents similaires
-
142
-
0
-
0
Licence et utilisation
Gratuit pour un usage personnel Attribution requise- Détails
- Publié le Sep 17, 2021
- Catégorie Industry / Industr...
- Langue French
- Taille du fichier 0.5635MB