Docu 91954
Docu 91954
Version 18.2
Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.” DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED
IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.
Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property
of their respective owners. Published in the USA.
Dell EMC
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.DellEMC.com
Figures 9
Tables 11
Preface 13
Appendix D EMC Backup and Recovery plug-in for Vmware Backup appliance
restores 265
FULLVM (Image-level) Restore................................................................266
Performing a FULLVM restore.....................................................266
Canceling a FULLVM restore....................................................... 267
Instant Access restore (for Data Domain systems only).............. 267
Restore from last backup.............................................................269
Direct to host recovery................................................................ 270
Glossary 273
1 Revision history...........................................................................................................13
2 Style conventions........................................................................................................15
3 NetWorker VMware Protection with vProxy appliance requirements......................... 22
4 Incoming port requirements........................................................................................23
5 Outgoing port requirements....................................................................................... 24
6 Performance and scalability factors............................................................................28
7 MSVMAPPAGENT binaries called by vProxy.............................................................. 51
8 Supported characters in SQL database names........................................................... 54
9 Minimum required vCenter user account privileges ................................................... 59
10 Schedule icons........................................................................................................... 111
11 Schedule icons...........................................................................................................116
12 Backup log files......................................................................................................... 138
13 FLR privilege requirements........................................................................................ 177
14 Recovery log files......................................................................................................215
15 Application information values ..................................................................................221
16 VADP recovery privileges ........................................................................................ 224
01 December 14, 2018 First release of this document for NetWorker 18.2.
Related documentation
The NetWorker documentation set includes the following publications, available on the
Support website:
l NetWorker E-LAB Navigator
Provides compatibility information, including specific software and hardware
configurations that NetWorker supports. To access E-LAB Navigator, go to
https://elabnavigator.emc.com/eln/elnhome.
l NetWorker Administration Guide
Describes how to configure and maintain the NetWorker software.
l NetWorker Network Data Management Protocol (NDMP) User Guide
Describes how to use the NetWorker software to provide data protection for
NDMP filers.
l NetWorker Cluster Integration Guide
Contains information related to configuring NetWorker software on cluster servers
and clients.
l NetWorker Installation Guide
Provides information on how to install, uninstall, and update the NetWorker
software for clients, storage nodes, and servers on all supported operating
systems.
l NetWorker Updating from a Previous Release Guide
Describes how to update the NetWorker software from a previously installed
release.
l NetWorker Release Notes
Contains information on new features and changes, fixed problems, known
limitations, environment and system requirements for the latest NetWorker
software release.
l NetWorker Command Reference Guide
Provides reference information for NetWorker commands and options.
l NetWorker Data Domain Boost Integration Guide
Provides planning and configuration information on the use of Data Domain
devices for data deduplication backup and storage in a NetWorker environment.
l NetWorker Performance Optimization Planning Guide
Contains basic performance tuning information for NetWorker.
l NetWorker Server Disaster Recovery and Availability Best Practices Guide
Describes how to design, plan for, and perform a step-by-step NetWorker disaster
recovery.
l NetWorker Snapshot Management Integration Guide
Describes the ability to catalog and manage snapshot copies of production data
that are created by using mirror technologies on storage arrays.
l NetWorkerSnapshot Management for NAS Devices Integration Guide
Describes how to catalog and manage snapshot copies of production data that are
created by using replication technologies on NAS devices.
Note: Contains information that is incidental, but not essential, to the topic.
Typographical conventions
The following type style conventions are used in this document:
Bold Used for interface elements that a user specifically selects or clicks,
for example, names of buttons, fields, tab names, and menu paths.
Also used for the name of a dialog box, page, pane, screen area with
title, table label, and window.
Italic Used for full titles of publications that are referenced in text.
Monospace Used for:
l System code
l System output, such as an error message or script
l Pathnames, file names, file name extensions, prompts, and
syntax
l Commands and options
You can use the following resources to find more information about this product,
obtain support, and provide feedback.
Where to find product documentation
l https://www.dell.com/support
l https://community.emc.com
Where to get support
The Support website https://www.dell.com/support provides access to product
licensing, documentation, advisories, downloads, and how-to and troubleshooting
information. The information can enable you to resolve a product issue before you
contact Support.
To access a product-specific page:
1. Go to https://www.dell.com/support.
2. In the search box, type a product name, and then from the list that appears, select
the product.
Knowledgebase
The Knowledgebase contains applicable solutions that you can search for either by
solution number (for example, KB000xxxxxx) or by keyword.
To search the Knowledgebase:
1. Go to https://www.dell.com/support.
2. On the Support tab, click Knowledge Base.
3. In the search box, type either the solution number or keywords. Optionally, you
can limit the search to specific products by typing a product name in the search
box, and then selecting the product from the list that appears.
Live chat
To participate in a live interactive chat with a support agent:
1. Go to https://www.dell.com/support.
System requirements
The following table lists the required components for NetWorker VMware Protection
with the vProxy appliance.
When you install or upgrade NetWorker and deploy the vProxy appliance, ensure that
the NetWorker server and storage node are at the same version, and that you use the
latest version of the vProxy appliance.
Component Requirements
NetWorker NetWorker 18.2 server software with NMC.
Note: The NetWorker storage node should
be the same version as the NetWorker
server.
vCenter server l Version 5.5, 5.5 U2, 5.5 U3a, 5.5 U3b, 5.5
U3d, 6.0, 6.0 U1b, 6.0 U2, 6.5, 6.50b, 6.7.
Note: Version 6.5 and later is required
to perform Microsoft SQL Server
application-consistent protection.
l Linux or Windows platform, or VC
appliance.
ESX/ESXi server l Version 5.5, 5.5 U2, 5.5 U3a, 5.5 Ub, 6.0
U1, 6.0 U1b, 6.0 U2, 6.5, 6.50b, 6.7.
Note: Version 6.5 and later is required
to perform Microsoft SQL Server
application-consistent protection.
l Automatically enables Changed Block
Tracking (CBT) on each virtual machine.
Component Requirements
Compatibility information
The NetWorker Online Compatibility matrix provides software compatibility
information for the NetWorker release, which includes NetWorker VMware Protection
with the vProxy appliance.
Port requirements
The NetWorker VMware Protection solution requires the ports outlined in the
following tables.
Note: The vProxy appliance does not support the use of a non-default vCenter
HTTPS port. To perform data protection operations using the vProxy appliance,
ensure that your vCenter server uses the default 443 HTTPS port.
vProxy Appliance Data Domain 22, 111, 131, 161, 2049, Data Domain
2052 management
Figure 2 Port requirements for NetWorker VMware Protection with the vProxy appliance
hotadd mode only set hotadd = 25 and nbd = 0. If you want to use NBD mode only,
set hotadd = 0 and nbd = 10.
l In order for backup and recovery operations to use Hotadd mode on a VMware
Virtual Volume (VVol) datastore, the vProxy should reside on the same VVol as the
virtual machine.
Number of concurrent NBD 50 (10G VMware uses Network File Copy (NFC) protocol to
backups per vCenter server network) read VMDK using NBD transport mode. You need one
VMware NFC connection for each VMDK file being
backed up. The VMware Documentation provides more
information on vCenter NFC session connection limits.
Virtual machines concurrent 100 100 Can be achieved with a combination of the number of
backups per vCenter server proxies multiplied by the number of configured hotadd
sessions per vProxy.
Number of proxies per 8 8 proxies with 12-13 hotadd sessions on each proxy can
vCenter protect 100 virtual machines concurrently. If more than
8 proxies are required per vCenter, configure the
hotadd limits on the proxies to ensure that no more
than 100 proxy streams run concurrently against any
given vCenter.
Number of workflows per 64 8 Ensure that you do not to exceed 2000 virtual
VMware policy machines per VMware policy.
Number of virtual machines 2000 Ensure that you do not to exceed 2000 virtual
per workflow machines per VMware policy.
Note that the maximum of 2000 virtual machines per
workflow is only applicable to the first FULL backup to
Data Domain, and does not apply to CBT-based
incremental backups of the virtual machines.
Number of vCenter servers 5 3 Per policy you can use 5 vCenter servers in the
per policy respective workflows and trigger concurrent backups.
Total number of virtual 2000 1000 You can run multiple vProxy policies concurrently as
machines in a single long as the total number of concurrent backup streams
NetWorker policy does not exceed the vCenter limits indicated in this
table.
In the case of a single vCenter, stagger the schedules
for policies to ensure that all the backups for a policy
complete before the backups of the next policy begin.
Backup Optimization modes During creation of a VMware type group in NMC, you
can select a backup optimization mode of either
Capacity or Performance. Performance mode results
in additional space use on the Data Domain device
Configuration checklist
The following configuration checklist provides best practices and troubleshooting tips
that might help resolve some common issues.
Basic configuration
l Synchronize system time between vCenter, ESX/ESXi/vSphere, and the vProxy
appliance
l Assign IPs carefully — do not reuse any IP address
l Use FQDNs (Fully Qualified Domain Names) everywhere
l For any network related issue, confirm that forward and reverse DNS lookups
work for each host in the datazone.
NetWorker configuration
l Ensure that the relevant devices are mounted.
l Ensure that vProxy IP addresses are populated in DNS, and that the NetWorker
server has name resolution for the vProxy host names.
l The vCenter plug-in (HTML5 or flash-based) requires the NetWorker server and
NetWorker Authentication service to be installed on the same machine.
l Wait until you successfully configure a policy before you run the policy.
l A message appears after successful vProxy registration in NMC.
Network configuration settings do not get restored with virtual machine after
recovery of a vApp backup
Network configuration settings are not backed up with the virtual machine as part
of a vApp backup in NetWorker. As a result, when you restore a vApp backup, you
must manually reconfigure the network settings.
vProxy appliance configured with dual stack or IPv6 only is not supported
The vProxy appliance does not support dual stack (IPv4 and IPv6) or IPv6 only
addressing. If you want to run backups and restores using the vProxy appliance,
use IPv4 addressing for the vProxy and disable IPv6.
Concurrent vProxy workflows on the same virtual machine is not supported when not
using a vCenter server
NetWorker does not support running multiple vProxy workflows concurrently
(backup, image-level recovery, or file-level restore operations) on the same
virtual machine when not using a vCenter server in your environment.
Data Domain system requires REPLICATION license when clone of VMware backup
performed to same system as the backup
When cloning VMware backups using NetWorker VMware Protection with the
vProxy appliance, if the clone is performed to the same Data Domain system as
the backup, a REPLICATION license is required on the Data Domain system.
Virtual machine alert "VM MAC conflict" may appear after successful recovery of
virtual machine
After performing a successful recovery of a virtual machine through vCenter
version 6, an alert may appear indicating a "VM MAC conflict" for the recovered
virtual machine, even though the new virtual machine will have a different and
unique MAC address. You must manually acknowledge the alert or clear the alert
after resolving the MAC address conflict. Note that this alert can be triggered
even when the MAC address conflict is resolved.
The VMware release notes at http://pubs.vmware.com/Release_Notes/en/
vsphere/60/vsphere-vcenter-server-60u2-release-notes.html provide more
information.
Backups fail for resource pools recreated with the same name as deleted pool
When you delete a resource pool in vCenter and then recreate a resource pool
with the same name, backups fail. Re-configure the protection group with the
newly created resource pool.
Specify NBD for datastores if proxies should use NBD mode only
For proxies that only use NBD transport mode (proxies where you specify a value
greater than 0 for the NBD maximum sessions limit), you must also specify the
datastores for which you want the proxy to perform only NBD backups to ensure
that any backups of virtual machines running on these datastores are always
performed using NBD mode. This also ensures that the same NBD-only proxies
are never used for backups of virtual machines residing on any other datastores.
Retries, Retry Delay, and the Inactivity Timeout options for VMware backup action
are not supported
The Retries, Retry Delay, and the Inactivity Timeout options that appear during
creation of a VMware backup action in the NetWorker Management Web UI and
NMC are not supported. You can ignore these options when creating the backup
action.
VMware View in the NetWorker Administration map view does not display when
configuration for Virtual Machines within the vCenter is incomplete
When you use VMware View, the map view does not appear when the
configuration for one or more Virtual Machines in the vCenter is incomplete. To
avoid this issue, remove the incomplete Virtual Machine configurations from
vCenter.
Cannot select a vProxy or the cloned vProxy when you create a VMware group
When you create a new protection group, you cannot select vProxy or clones of
the vProxy from the hosts list. To use the clone vProxy as a normal virtual
machine, clear the annotation string This is EMC Backup and Recovery
vProxy Appliance in the Notes section of the cloned vProxy virtual machine.
Datastore cluster does not display in the Datastore selection drop-down of NMC
Recovery wizard for Virtual Machine Recovery or Virtual Disk Recovery types
If a vCenter server contains a datastore cluster, the datastore cluster name does
not display for selection during image-level recoveries using either the Virtual
Machine Recovery or Virtual Disk Recovery types in the NMC NetWorker
Administration Recovery wizard. When performing the recovery to a datastore
cluster, ensure that you select any valid datastore within the cluster that contains
enough free space to accommodate the virtual machine.
l In the Network IP address field, specify an IPv4 address for the vProxy
appliance.
l In the Default gateway field, specify the IP address of the gateway host.
l In the Network Netmask/Prefix field, specify the netmask for an IPv4
Network IP address.
4. On the OVF Template Details window, review the product details such as the
product name, version, vendor, publisher, and download size, and then click
Next.
5. On the Accept License Agreements window, the EULA appears. Review the
EULA and then click Accept.
6. On the Name and Location window, specify a name for the virtual appliance,
and optionally the inventory location, for example a datacenter or VM folder.
Click Next.
7. If the location you selected in the previous step has more than one available
host, the Host / Cluster window appears. Select the ESXi host or cluster on
which you want to deploy the virtual appliance, and then click Next.
8. On the Resource Pool window, perform one of the following tasks, and then
click Next.
l When you deploy the virtual appliance in a cluster with multiple hosts, select
the specific host in the cluster on which to deploy the virtual appliance.
Note: If DRS is enabled, the target host is automatically selected.
l When you deploy the virtual appliance on a host with a resource pool or
vApp, select the resource pool or vApp on which to deploy virtual appliance.
9. On the Storage window, select the destination datastore on which to store the
virtual appliance files, and then click Next.
10. On the Disk Format window, select the disk format.
EMC recommends that you select Thick Provision Lazy Zeroed to ensure that
amount of storage space allocated to the virtual appliance is available.
11. On the Network Mapping window, select the Source and Destination networks
to use with the appliance, and then click Next.
12. On the Ready to Complete window, review the deployment configuration
details. If you will immediately configure the appliance, select Power on after
deployment, and then click Finish.
The Deploying window appears and provides status information about the
deployment.
3. In the Username field, specify a new vCenter user account that has permissions
to perform backups.
4. In the Password field, specify the password for this vCenter user account.
5. If the vCenter server is deployed in the Cloud and this option is currently
unselected, select the Deployed in Cloud checkbox.
Note: When you select Deployed in Cloud, a parameter will appear in the
backup action logs that indicates HypervisorMode: VMC. When the
checkbox is not selected, the parameter indicates HypervisorMode:
vSphere.
6. Click Save.
Results
The changes will appear automatically in the VMware vCenters pane. If the changes
do not appear, click the Refresh icon.
Note: If you want to delete a vCenter resource from NetWorker, select the entry
in the VMware vCenters pane and click the Delete icon.
When specifying the maximum sessions value for the transport modes,
ensure that at least one transport mode is set to a value greater than 0. If
you want to enable only one of the transport modes, set the maximum
sessions for the transport mode you do not want to use to 0.
c. In the User ID field, specify the admin user account.
d. In the Password field, specify the password for the admin user account on
the vProxy appliance. The default password is a3dp@m8n.
Note: Any additional fields on this tab not specified here are optional.
8. Click OK.
When specifying the maximum sessions value for the transport modes,
ensure that at least one transport mode is set to a value greater than 0. If
you want to enable only one of the transport modes, set the maximum
sessions for the transport mode you do not want to use to 0.
6. Click Finish.
Results
When vProxy registration is initiated, a notification displays at the top of the window
that a request was submitted. You can monitor the status and progress of the
registration from the Tasks tab on this page.
Once registration is complete, you can use the vProxy for backups of VMware
protection policies. You can also edit the configuration settings for the vProxy by
clicking the Edit icon, or remove the vProxy by clicking the Delete icon.
Procedure
1. In the NetWorker Administration window, click Protection.
2. In the left navigation pane, expand the NetWorker server and click VMware
View.
3. In VMware View, right-click on the vCenter you added and select Install
vCenter plugin.
The vCenter Plugin Install dialog displays.
Figure 3 Install vCenter Plugin in NMC
Figure 4 vCenter plug-in for Dell EMC NetWorker in the vSphere Client
Note: If you installed the HTML-5 based plug-in, you can use the vcui log file
available at /nsr/authc/logs/vcui.log to assist with troubleshooting issues
with the Dell EMC NetWorker interface. If you installed the flash-based plug-in,
you can use the ebr-server log file available at /nsr/authc/logs/ebr-
server.log to assist with troubleshooting issues with the VM Backup and
Recovery interface.
Remove and reinstall the HTML5-based vCenter plug-in from the vSphere Client
In vSphere version 6.5 and later, the html-5 based vCenter plug-in appears as Dell
EMC NetWorker in the vSphere Client. If you need to remove the HTML5-based
plug-in and then reinstall the plug-in, perform the following steps.
Procedure
1. Stop the vSphere Client services.
2. Log into vCenter Server's MOB at http://vcenter-server/mob.
3. Click the content link.
4. Click the ExtensionManager link.
5. Click the UnregisterExtension link.
6. Enter the value com.dell.emc.nw and click the Invoke Method link.
7. Enter the value com.emc.networker.backup and click the Invoke Method link.
8. Enter the value com.emc.networker.recover and click the Invoke Method
link.
9. On the vCenter server, manually remove the plug-in from the /vsphere-
client-serenity folder. The path is /etc/vmware/vsphere-
client/vc-packages/vsphere-client-serenity on Linux, and
C:\ProgramData\VMware\vCenterServer\cfg\vsphere-client\vc-
packages\vsphere-client-serenity on Windows.
10. Restart the vSphere Client services.
11. Perform the steps in the section Install the vCenter plug-in for the vSphere
Client to re-install the HTML5-based plug-in, and verify that the Dell EMC
NetWorker interface appears in the vSphere Client.
Remove the flash-based vCenter plug-in from the vSphere Web Client
In NetWorker 9.2.x and earlier versions, the vCenter plug-in for vProxy backup and
recovery is a flash-based plug-in that appears as VM Backup and Recovery in the left
pane of the vSphere Web Client. vSphere versions 6.5 and later and NetWorker 18.x
both this plug-in and the html-5 based vCenter plug-in that appears as Dell EMC
NetWorker in the vSphere Web Client. If upgrading to NetWorker 18.x and you no
longer require the flash-based plug-in, perform the following steps in order to
manually remove VM Backup and Recovery from the vSphere Web Client.
Procedure
1. Stop the vSphere Web Client services.
2. Log into vCenter Server's MOB at http://vcenter-server/mob.
3. Click the content link.
4. Click the ExtensionManager link.
5. Click on the UnregisterExtension link.
6. Enter the value com.emc.networker and click the Invoke Method link.
7. Enter the value com.emc.networker.backup and click the Invoke Method link.
8. Enter the value com.emc.networker.recover and click the Invoke Method
link.
9. On the vCenter server, manually remove the plug-in from the /vsphere-
client-serenity folder. On vCenter 6.0 and 6.5, the path is /etc/
vmware/vsphere-client/vc-packages/vsphere-client-serenity
on Linux, and C:\ProgramData\VMware\vCenterServer\cfg\vsphere-
client\vc-packages\vsphere-client-serenity on Windows.
10. Restart the vSphere Web Client services.
Results
When the vCenter plug-in is validated, log in to the vSphere Client for the vCenter to
verify the installation. If the installation was successful, depending on the plug-in type
selected an entry for Dell EMC NetWorker or VM Backup and Recovery appears in
the Menu drop-down in the task bar, as shown in the following, and also appears in
the left navigation pane when you select Home.
Figure 5 vCenter plug-in for Dell EMC NetWorker in the vSphere Client
Note: If you installed the HTML-5 based plug-in, you can use the vcui log file
available at /nsr/authc/logs/vcui.log to assist with troubleshooting issues
with the Dell EMC NetWorker interface. If you installed the flash-based plug-in,
you can use the ebr-server log file available at /nsr/authc/logs/ebr-
server.log to assist with troubleshooting issues with the VM Backup and
Recovery interface.
Procedure
1. Create a vmwareAdmin group in NetWorker that contains the following
privileges at a minimum:
l View Security Settings
l View Application Settings
l Remote Access All Clients
l Operate NetWorker
l Monitor NetWorker
l Operate Devices and Jukeboxes
l Recover Local Data
l Recover Remote Data
l Backup Local Data
Results
The Active Directory user that you create using these steps will only have access to
the HTML-5 or flash-based vCenter plug-in, and cannot be used to log in to the Dell
EMC Data Protection Restore Client or the NetWorker Management Console. If
you also need to provide access to these applications, then add those required
privileges as described in the section File-level restore as a domain user.
quiesce by VMware Tools. After running the policy, the catalog and index
information for the SQL server backup is stored on the Data Domain device. When
the backup is performed as part of the VMware image-level backup, the SQL data
files are backed up as part of the VMDKs during the vProxy image backup. The
sections Creating a VMware backup action and Creating an action for Microsoft
SQL Server application-consistent protection provide more information.
l Transaction log backup—When configuring a NetWorker policy's workflow and
VMware backup action with the Advanced Application Consistency option, select
Transaction log backup to enable transaction log backups for SQL Instances
running in the virtual machine, and set the Interval attribute in the backup policies
workflow properties to specify the frequency of backups. Backups are written
directly to Data Domain under the SDSF backup folder that was created by the
NetWorker save set session. Transaction log backup is only performed for
databases in the proper state, otherwise databases are skipped. The section
Create a VMware backup action provides more information.
l Restore of SQL Server instance or individual SQL Server databases—The Dell
EMC Data Protection Restore Client includes an App mode that allows you to
restore an entire SQL Server instance to the original virtual machine and original
instance, and restore individual SQL Server databases to the original database on
the original virtual machine, to multiple instances on the same virtual machine, or
to an alternate location (different virtual machines/SQL instances on the same or
a different vCenter), as well as the ability to roll-forward transaction log backups.
The section Restoring SQL Server application-consistent backups provides more
information.
During advanced application-consistent backup for both SQL Server FULL backup and
transaction log backup, vProxy installs or upgrades the vProxy Agent and
MSVMAPPAGENT software packages. On a new virtual machine without these
software packages installed, the vProxy Agent uses the VM Administrator Credentials
from the backup action to install the vProxy Agent, using the vCenter VIX API to copy
packages into the guest virtual machine and run the install. Once the vProxy Agent is
installed in the virtual machine, vProxy communicates with the vProxy Agent to install
the MSVMAPPAGENT package.
On a system with vProxy and MSVMAPPAGENT already installed, vProxy performs a
version check of the MSVMAPPAGENT by running the
Msvmagent_discovery.exe program to report the installed program version and, if
necessary, perform an upgrade if the vProxy software repository contains a later
version.
Note: Ensure that you manually uninstall in-guest agents (VM app agent for
Microsoft Applications) from an alternate virtual machine that is not protected by
a SQL application-consistent backup workflow. Also, if you are restoring to an
alternate virtual machine that is not protected by a SQL application-consistent
workflow, note that the agents will not be automatically uninstalled once the
restore is complete. If you want to remove these agents, you must manually
uninstall the agents.
The following table provides a list of the MSVMAPPAGENT binaries that are called by
the vProxy, and the operations these binaries perform.
Table 7 MSVMAPPAGENT binaries called by vProxy
Msvmagentcatsnap.exe Catalogs the SQL VSS Full backup that Called by vProxy once the virtual
was performed by VMware Tools as an machine image snapshot has completed.
App Agent VSS Full backup of SQL
Server instances. Catalog is written to
Data Domain.
Msvmagent_appbackup.exe Performs transaction log backup. Called by vProxy for transaction log
backup workflows.
The Msvmagent_appbackup.exe
program will back up all SQL instances in
the virtual machine.
Msvmagent_appbackup.exe
performs transaction log backup only,
and does not create a virtual machine
image backup.
Msvmagent_snapshotrestore.exe Performs restore of SQL VSS Full Called by vProxy during restore of SQL
backup. Database FULL backup.
Prior to the restore, the virtual machine
image backup is mounted on the target
virtual machine. The
Msvmagent_snapshotrestore.exe
copies the VSS manifest documents
from the backup, and uses those
documents to perform a VSS-aware
restore of the SQL database. The SQL
database files are copied from the
mounted backup VMDK to the original
location of the database, and during the
VSS post restore, the SQL VSS Writer
completes recovery of the backup. If
Msvmagent_apprestore.exe Performs restore of individual SQL Called by vProxy during restore of the
transaction log backup. transaction log backup.
For each transaction log restore,
Msvmagent_apprestore.exe
receives the Data Domain path for the
backup and performs a SQL VDI restore
of the transaction log backup. For
intermediate transaction logs, the
database is left in the NORECOVERY
state. For the final transaction log
restore, the database is either recovered
or left in the NORECOVERY state if you
specify this option. The STOPAT feature
may also be used for the final
transaction log restore if you specify this
option. The msvmagent_apprestore.exe
command also supports SQL Alternate
restore and instructs SQL the SQL
instance to be restored and to change
database name and file locations as
selected by the customer.
Special character FULL and transaction log FULL and transaction log
backup restore
~ Tilde Supported Supported
Special character FULL and transaction log FULL and transaction log
backup restore
$ Dollar Supported Supported
If these messages appear, you can use PowerCLI commands to disable and then
enable CBT without powering off the virtual machines as described in the VMware
knowledgebase article at https://kb.vmware.com/selfservice/search.do?
cmd=displayKC&docType=kc&docTypeID=DT_KB_1_1&externalId=1031873, or
perform the following steps to clean up CBT:
1. Power down the virtual machine.
2. Remove CBT flags.
3. Delete CTK files from the datastore.
4. Power ON the virtual machine.
https://<IP_address_vCenter_Server>:5480
l Browse datastore
l Configure datastore
l Low level file operations
l Move datastore
l Remove datastore
l Remove file
l Rename datastore
vApp l Export
l Import
Virtual Machine
9. Click OK.
10. From the Assigned Role drop-down list, select the role you created.
11. Confirm that the Propagate to children box is checked.
12. Click OK.
e. In the NetWork Type page, change the value in the Adapter Type field to
VMXNET 3, and assign this vNIC to the appropriate virtual machine port
group. Select the Connect at power on checkbox if it is not selected.
Figure 8 Change Adapter Type
f. Select the appropriate virtual machine port group for the production
network/VLAN, and then click Next.
g. In the Ready to Complete page, verify the information and then click
Finish.
4. Right click the vProxy appliance and select Power > Power On.
5. Configure the second NIC on the vProxy appliance:
a. After you power on the vProxy appliance, log in as root to the vProxy
appliance Console by using the vSphere Client.
b. Type yast2 to invoke the YaST configuration tool.
c. Select Network Devices and press Enter.
The Network Devices dialog appears.
d. Select Network Settings and press Enter.
The Network Settings dialog appears.
e. In the Overview tab, select the Second Ethernet Adapter labeled eth1.
f. Use the tab key to select Edit and press Enter.
g. From the Network Card Setup, use the tab key to access Statically
assigned IP Address and select using the spacebar. Use the tab key to
select IP Address and enter the IP Address, the Subnet Mask, and the host
name of the vProxy appliance. Ensure that these settings come from the
production network/VLAN.
h. Use the tab key to select Edit, and then press Enter.
i. (Optional when setting up second NIC) From Network Settings, use the tab
key to select Overview. Use the right-arrow key to select Hostname/DNS.
Use the tab key to select and then specify the following fields:
l Host name
l Domain name for the production network
l Policy for DNS configuration
l Name Server 1 for production network
l Name Server 2 for backup network
l Domain Search for both production and backup network.
j. From Network Settings, use the tab key to select Hostname/DNS.Use the
right-arrow key to select Routing, and update the routing table by setting
the Default Gateway to the gateway/address for the backup network, if not
already set.
Figure 9 Routing table with backup network gateway
m. Use the tab key to select OK, and then press Enter.
n. Use the tab key to select Quit, and then press Enter.
6. Restart the vProxy appliance.
7. Login to the vProxy appliance and confirm that you can ping the vCenter
production network IP.
You can now proceed with registering the vProxy appliance with the NetWorker
server on the backup subnet/VLAN. This will require selecting the vCenter
server running on the production network in the drop-down.
You can use a non-routable private address space for the subnet used for the backup
traffic/data, providing that:
l All devices/vNICs using a private IP address exist on the same physical switch, and
l There is a DNS server on the non-routed private network so that the proxies can
perform a reverse lookup for its host name.
Note: A private address space-based network is an optional example and not a
requirement.
curl -O ftp://valid_ftp_needed/software/scripts/proxycp.jar
For sites where direct download using curl is unavailable, use WinSCP to transfer
the script to the VMware Backup appliance or external proxy.
5. Change the permissions on proxycp.jar:
Migration pre-requisites
When you migrate a VMware Backup appliance policy to a vProxy policy, a pre-check
occurs automatically to determine that compatibility requirements are met.
These requirements include verification of the following items:
l The Data Domain OS (DD-OS) is DDOS version 5.7, 6.0.0.30, 6.0.1-10, or 6.1.x and
later DDOS versions. Note that use of the DD Retention Lock feature on vProxy
backup and clone actions requires DDOS 6.1.x and later.
l The NetWorker server and storage node version are the same. For example,
NetWorker 18.2.
l The vProxy is available on the vCenter server, and is the correct version for the
NetWorker release. For NetWorker 18.2, this is version 3.0.x.
l The vCenter server is a minimum of version 5.5.
If this check discovers any compatibility issues that can cause problems migrating all
policies, the issues are reported and migration is cancelled. If using the command line
to migrate policies, you can specify a force flag (-f) to ignore these errors and
proceed with the migration to correct any issues afterwards, however it is
recommended that the pre-check requirements be met prior to proceeding with the
migration. Issues discovered during the pre-check will be logged and displayed even
when using the force flag.
Additionally, if you used dual stack (Both IPv4 and IPv6) for the VMware Backup
appliance, ensure that you switch to IPv4 only. The vProxy appliance does not support
dual stack (both IPv4 and IPv6), and so the migration from the VMware Backup
appliance to the vProxy appliance fails with a dual stack configuration. If you
previously used IPv4 only, no configuration change is required.
Results
A Migrate Operation Results dialog box opens which provides a real-time report of
the analyzation and the migration until the process completes. You can then choose to
export a log of the analyzation or migration as a report by clicking Export Log File.
Figure 12 Migrate Operation Results dialog
perform a pre-migration check before migrating. The command line supports multiple
policies for each run.
Before you begin
To perform a pre-check only before migrating, run nsrvbaupgrade -c. It is
recommended that you resolve any pre-check errors, including unsupported software
versions, before completing the migration in order for backups to complete
successfully.
Procedure
1. Open a command prompt.
2. Specify the nsrvbaupgrade command in the following format:
nsrvbaupgrade –p policy [-c] [-f] [-v] where:
l -p policy specifies one or more policies to migrate
l -c runs the pre-check only
l -f forces the migration to ignore a pre-check failure
l -v specifies verbose mode
Procedure
1. Delete the vProxy appliance from NMC, as described in the section Deleting the
vProxy host.
2. Log in to the vCenter server by using the vSphere Client.
3. Remove the vProxy appliance from the vCenter by powering off the appliance
and then deleting the vProxy virtual machine from the disk.
4. Deploy the new vProxy appliance and configure the network settings, as
described in the section "Deploy the vProxy appliance".
Note: When upgrading to NetWorker 18.1 and later from a previous release,
if the hotadd and nbd transport modes were configured with different non-
zero values for maximum sessions, ensure that you change these settings to
the same non-zero value. Setting different non-zero values for both
transport modes is not supported in NetWorker 18.1 and later.
5. Add the newly deployed vProxy appliance to the NetWorker server and
configure the appliance, as described in the section Configuring the vProxy in
NetWorker.
6. After vProxy appliance registration completes, verify that a valid certificate
appears in the NMC NetWorker Administration window by enabling diagnostic
mode and adding the column VM vProxy certificate.
Redeploying a vProxy
The procedure to redeploy a vProxy appliance requires you to perform the same steps
that you performed when you deployed the original vProxy host.
About this task
After you deploy the vProxy appliance, perform the following steps:
Procedure
1. Delete the vProxy by performing the steps in the section "Deleting the vProxy
host".
2. Deploy the vProxy by performing the procedures in the section "Deploy the
vProxy appliance".
3. Configure the vProxy using the steps in the section "Configuring the vProxy in
NetWorker".
Procedure
1. From the vSphere Client application, open a console window on the vProxy
appliance or use ssh to connect to the appliance from a host that has network
access to the vProxy appliance.
2. Log in to the appliance with the root account.
The default password for the root account is changeme.
3. Use the pam_tally2 command to unlock the admin account.
For example:
The pam_tally2 man page provides more information about the pam_tally2
command and how to configure the maximum number of login attempts for a user
account.
work list is composed of one or several work items. Work items include client
resources, virtual machines, save sets, or tags. You can chain multiple actions
together to occur sequentially or concurrently in a workflow. All chained actions use
the same work list.
When you configure an action, you define the days on which to perform the action, as
well as other settings specific to the action. For example, you can specify a destination
pool, a retention period, and a target storage node for the backup action, which can
differ from the subsequent action that clones the data.
When you create an action for a policy that is associated with the virtual machine
backup, you can select one of the following data protection action types:
l Backup — Performs a backup of virtual machines in vCenter to a Data Domain
system. You can only perform one VMware backup action per workflow. The
VMware backup action must occur before clone actions.
l Clone — Performs a clone of the VMware backup on a Data Domain system to any
clone device that NetWorker supports (including Data Domain system or tape
targets). You can specify multiple clone actions. Clone actions must occur after
the Backup action.
You can create multiple actions for a single workflow. However, each action applies to
a single workflow and policy.
The following figure provides a high level overview of the components that make up a
data protection policy in a datazone.
Figure 13 Data Protection Policy
c. If it does not exist, add the DD Boost user to the Users with DD Boost
Access table:
a. Click the + (Add) button that is located above the table and to the right.
b. In the User list, select an existing local user, or select Create a new
Local User and then create a user account.
c. Click Add, and then click Close.
4. For file-level restore and instant access restore only, on Protocols, select NFS,
ensure that NFS status is enabled, and then click OK.
The vProxy appliance dynamically creates and deletes the NFS shares, as
required.
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay
the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.
b. Use the Start Time spin boxes to specify the time to start the actions in the
workflow.
c. Use the Interval attribute spin boxes to specify how frequently to run the
actions that are defined in the workflow over a 24-hour period. The default
Interval attribute value is 24 hours, or once a day. When you select a value
that is less than 24 hours, the Interval End attribute appears. To specify the
last start time in a defined interval period, use the spin boxes.
d. Use the Restart Window attribute spin boxes to specify the duration of time
in which NetWorker can manually or automatically restart a failed or
canceled workflow.
7. Under Notifications, from the Notify list, select an appropriate notification
option.
l To use the notification configuration that is defined in the policy resource to
specify when to send a notification, select Set at policy level.
l To send notifications with information about each successful and failed
workflow and action after all the actions in the policy complete, select On
Completion.
l To send a notification with information about each failed workflow and
action after all the actions in the policy complete, select On Failure.
8. Under Notify, when you select the On Completion option or On failure option,
the Command field appears. Use this field to configure how NetWorker sends
the notifications. You can use the nsrlog command to send the notifications
to a log file.
The default notification action is to send the information to the
policy_notifications.log file. By default, the Protecting virtual
machines policy_notifications.log file is located in the /nsr/logs
directory on Linux and in the C:\Program Files\EMC NetWorker\nsr
\logs folder on Windows.
Use the default mailer program on Linux to send email messages or the
smtpmail application on Windows:
l To send notifications to a file, type the following command, where
policy_notifications.log is the name of the file:
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
mail -s subject recipient
l For NetWorker Virtual Edition (NVE), to send an email notification, type the
following command:
/usr/sbin/sendmail -v recipient_email "subject_text"
l On Windows, to send a notification email, type the following command:
smtpmail -s subject -h mailserver recipient1@mailserver
recipient2@mailserver...
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay
the SMTP email message.
9. Click NEXT.
10. Under Associate Group, do one of the following to assign the workflow to a
group:
l Select an existing group, and click FINISH to create a workflow.
l Click ADD to create a group. The section Create a VMware group using the
NetWorker Management Web UI provides more information on creating
groups.
After you finish
Create the actions that will occur in the workflow.
3. Click on an existing workflow to create an action. The action type can be one of
the following:
Note: For NetWorker 18.2, only the VMware (vProxy) action type is
supported.
policy or workflow that contains the action is started, clear this option. By
default, this option is selected.
7. Click NEXT.
8. From the Destination Storage Node list, select the storage node that contains
the devices where you want to store the backup data.
Note: When you deploy the vCenter server in the Cloud, a parameter
displays in the backup action logs that indicates HypervisorMode: VMC.
When not deployed in the Cloud, the parameter indicates HypervisorMode:
vSphere.
9. From the Destination Pool, select the media pool in which to store the backup
data.
10. Specify the NetWorker Retention Period value.
After the retention period expires, the save set is removed from the client file
index and marked as recyclable in the media database during an expiration
server maintenance task.
11. Select Apply Lock under DD Retention Lock to enable retention lock for the
virtual machines included in this backup action. Note that the device used for
backing up these virtual machines must also have DD Retention lock enabled.
12. Use the Lock Period spin boxes to specify the duration the virtual machines will
remain on the Data Domain device before the retention lock expires.
13. Click NEXT.
14. Under VMware-specific Configuration, select one of the following vProxy
options:
l Automatic—Select this option to allow NetWorker to choose the vProxy
host for backups.
l Manual—Specify this option to select the vProxy host that NetWorker
users for backups. Provide the name of the vProxy host in the vProxy Name
field.
15. Under Application Consistency, select Quiesce Application to enable
application-consistent protection as part of the policy backup action, which
includes protection of the Microsoft SQL Server. You can then select from the
Basic and Advanced options.
l Select the Basic option to create a backup copy for applications during
virtual machine quiescing. No additional processing is performed.
l Select the Advanced option to create an SQL server application-consistent
backup during virtual machine quiescing, and optionally create a transaction
log backup for all SQL Server instances.
When you select the Advanced option, the following additional options appear:
l Transaction Log Backup—Select this option, if you want to perform a
transaction log backup of SQL databases in the virtual machine as part of
the policy backup action.
Note: During SQL Server configuration, the NT AUTHORITY\SYSTEM
login must be granted SQL login and SQL sysadmin role rights in order to
perform transaction log backups.
l Quiesce Timeout—Specify the amount of time, in minutes, to wait for the
quiesce operation on the virtual machine to time out before failing. If not
selected, the backup action proceeds even if quiescing was not performed,
c. Click NEXT.
If the date pattern is Recurring:
a. Select the backup level, and then define the override schedule to occur on a
specific day, week, month, quarter, or year.
b. Click NEXT.
Note: To remove an override schedule, delete the entry.
22. Under Notifications, from the Notify list, select an appropriate notification
option.
l To avoid sending notifications, select Ignore.
l To send notifications on completion of the action, select On Completion.
l To send a notification only if the action fails to complete, select On Failure.
23. Specify the Command to configure how NetWorker sends the notifications.
You can use the nsrlog command to send the notifications to a log file.
The default notification action is to send the information to the
policy_notifications.log file. By default, the Protecting virtual
machines policy_notifications.log file is located in the /nsr/logs
directory on Linux and in the C:\Program Files\EMC NetWorker\nsr
\logs folder on Windows.
Use the default mailer program on Linux to send email messages or the
smtpmail application on Windows:
l To send notifications to a file, type the following command, where
policy_notifications.log is the name of the file:
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
mail -s subject recipient
l For NetWorker Virtual Edition (NVE), to send an email notification, type the
following command:
/usr/sbin/sendmail -v recipient_email "subject_text"
l On Windows, to send a notification email, type the following command:
smtpmail -s subject -h mailserver recipient1@mailserver
recipient2@mailserver...
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay
the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.
25. From the Start Time list, select one of the following options to specify the time
to start the action. Use the spin boxes to set the hour and minute values.
l Set at Workflow level—Do not enforce an action start time. The action will
start at the time defined by the workflow.
l Absolute—Start the action at the time specified by the values in the spin
boxes.
l Relative—Start the action after the period of time defined in the spin boxes
has elapsed after the start of the workflow.
26. Select Concurrent to enable concurrent operations for the action.
27. In the Parallelism field, specify the maximum number of concurrent operations
for the action.
28. From the On Failure list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but
continue with subsequent actions in the workflow, select Abort Action.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort Workflow.
29. In the Soft Limit field, select the amount of time after the action starts to stop
the initiation of new activities. The default value of 0 (zero) indicates no amount
of time.
30. In the Hard Limit field, select the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no amount
of time.
31. Click NEXT.
The Action Configuration Summary appears.
32. Review the settings that you have configured, and then click FINISH.
After you finish
(Optional) Create a clone action to automatically clone the save sets after the backup.
A clone action is the only supported action after a backup action in a workflow.
6. To ensure that the action runs when the policy or workflow that contains the
action is started, select Enabled. To prevent the action from running when the
policy or workflow that contains the action is started, clear this option. By
default, this option is selected.
7. If the action is part of a sequence of actions in a workflow path, from the
Driven By list, select the action that should precede this action.
8. Click NEXT.
9. Select the Delete source save sets after clone completes option to instruct
NetWorker to delete the data from the source volume after cloning to the
destination volume completes. This is equivalent to staging the save sets.
10. Under Devices and Volumes, define the volumes and devices to which
NetWorker sends the cloned data:
a. From the Source Storage Node list, select the source storage node for a
clone action, that is, the storage node from which clone data is read.
b. From the Destination Storage Node list, select the storage node with the
devices on which to store the cloned save sets.
c. From the Destination Pool list, select the target media pool for the cloned
save sets.
11. Specify the NetWorker Retention Period value.
After the retention period expires, the save set is removed from the client file
index and marked as recyclable in the media database during an expiration
server maintenance task.
12. If you want to have the same retention period as that of the backup action,
select Keep Retention Same as Backup.
Note: If you select this option, you cannot configure the NetWorker
retention period.
13. Select Apply Lock under DD Retention Lock to enable retention lock for the
virtual machines included in this clone action.
14. Use the Lock Period spin boxes to specify the duration the virtual machines will
remain on the Data Domain device before the retention lock expires.
15. Click NEXT.
16. From the Schedule (for all days) list, select one of the following options:
l Execute—Perform a clone action on the specified day.
l Skip—Do not perform a clone action on the specified day.
17. From the Customize list, select a weekly or monthly schedule for the action.
l To specify a schedule for each day of the week, select Each day of the
week.
l To specify a schedule for each day of the month, select Each day of the
month.
18. (Optional) Select Override Options to configure overrides for the task that is
scheduled on a specific day.
Note: If you select this option, you must configure the overrides using
either fixed dates or recurring dates.
c. Click NEXT.
If the date pattern is recurring:
a. Select the level, and then define the override schedule to occur on a specific
day, week, month, quarter, or year.
b. Click NEXT.
Note: To remove an override schedule, delete the entry.
21. Under Notifications, from the Notify list, select an appropriate notification
option.
l To avoid sending notifications, select Ignore.
l To send notifications on completion of the action, select On Completion.
l To send a notification only if the action fails to complete, select On Failure.
22. Specify the Command to configure how NetWorker sends the notifications.
You can use the nsrlog command to send the notifications to a log file.
The default notification action is to send the information to the
policy_notifications.log file. By default, the Protecting virtual
machines policy_notifications.log file is located in the /nsr/logs
directory on Linux and in the C:\Program Files\EMC NetWorker\nsr
\logs folder on Windows.
Use the default mailer program on Linux to send email messages or the
smtpmail application on Windows:
l To send notifications to a file, type the following command, where
policy_notifications.log is the name of the file:
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
mail -s subject recipient
l For NetWorker Virtual Edition (NVE), to send an email notification, type the
following command:
/usr/sbin/sendmail -v recipient_email "subject_text"
l On Windows, to send a notification email, type the following command:
smtpmail -s subject -h mailserver recipient1@mailserver
recipient2@mailserver...
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay
the SMTP email message.
a. (Optional) From the Policy list, select a policy that you want to assign the
group to.
b. (Optional) From the Workflow list, select a workflow that you want to
assign the group to.
Note: The applicable workflows corresponding to the selected policy are
only available for selection.
d. Click the + icon to add a filter, and click the - icon to remove a filter.
e. Click NEXT.
f. (Optional) Select the save set resource criteria.
g. Click FINISH.
If the filter type is Static:
a. Click NEXT.
b. Enter a list of comma separated save set IDs, and click ADD.
Note: You can also use the search function to filter the save set IDs
from the Selected Saveset ID List.
c. Click FINISH.
a. (Optional) From the Policy list, select a policy that you want to assign the
group to.
b. (Optional) From the Workflow list, select a workflow that you want to
assign the group to.
Note: The applicable workflows corresponding to the selected policy are
only available for selection.
e. Click NEXT.
f. From the vCenter list, select a vCenter server that contains the VMware
objects that you want to protect, or click ADD VCENTER to add a vCenter
server. The section Add the vCenter server using the NetWorker
Management Web UI provides instructions to add a vCenter server.
g. Select a pre-defined rule that you want to apply for any VMware objects
that are dynamically included in the group based upon the rule criteria, or
click ADD RULE to create a new rule and click EDIT RULE to modify an
existing rule. The section Create or edit a rule using the NetWorker
Management Web UI provides more information on creating and editing
rules.
h. Under Include/Exclude Resources, select the objects (Datacenter, ESXi
host, virtual machine, resource pool, vApp, or disk) to include in the group.
i. Click Preview to view a list of the static and dynamic virtual machines and
objects that have been added to the group.
j. Click Finish.
b. Specify the object type properties that the rule uses to determine a match.
It can be the object's name, path, or tag. The available properties depend on
the object type.
l Virtual Machine - name, vSphere tag
l ESXi Host/Cluster - path, vSphere tag
l Virtual App - name, vSphere tag
l Virtual Machine Folder - name, path, vSphere tag
l Datacenter - name, path, vSphere tag
l Resource Pool - path, vSphere tag
d. Click the Browse icon to select the vCenter server and vSphere tag and
click OK to exit the dialog.
Note: This option is available only if you select the vSphere tag property
type in the definition.
e. Click the + icon to add a rule definition, and click the - icon to remove a rule
definition.
7. Click Create.
The Rule is successfully created.
8. Repeat steps 1 through 7 for any additional rules that you want to create.
Note: You can associate a rule to a group, if dynamic selection is enabled
when creating groups. The section Create a VMware group using the
NetWorker Management Web UI provides more information on creating
groups.
Note:
l You cannot change the name of a rule.
l If you want to delete a rule, select the rule that you want to delete, and
click Delete. However, a rule cannot be deleted, if it is associated with a
group.
To use these pre-configured data protection policies, you must add clients to the
appropriate group resource.
Note: NMC also includes a pre-configured Server Protection policy to protect the
NetWorker and NMC server databases.
Platinum policy
The Platinum policy provides an example of a data protection policy for an
environment that contains supported storage arrays or storage appliances and
requires backup data redundancy. The policy contains one workflow with two actions,
a snapshot backup action, followed by a clone action.
Figure 14 Platinum policy configuration
Gold policy
The Gold policy provides an example of a data protection policy for an environment
that contains virtual machines and requires backup data redundancy.
Silver policy
The Silver policy provides an example of a data protection policy for an environment
that contains machines where file systems or applications are running and requires
backup data redundancy.
Bronze policy
The Bronze policy provides an example of a data protection policy for an environment
that contains machines where file systems or applications are running.
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.
7. In the Restricted Data Zones tab, leave the Restricted Data Zone field blank.
NetWorker VMware Protection with the vProxy appliance does not currently
support the protection of virtual machines within a Restricted Data Zone.
8. Click OK.
After you finish
You can now create the workflow, group, and actions for the policy.
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
8. In the Running section, perform the following steps to specify when and how
often the workflow runs:
a. To ensure that the actions that are contained in the workflow run when the
policy or workflow starts, in the Enabled box, leave the option selected. To
prevent the actions in the workflow from running when the policy or
workflow that contains the action starts, clear this option.
b. To start the workflow at the time that is specified in the Start time
attribute, on the days that are defined in the action resource, in the
AutoStart Enabled box, leave the option selected. To prevent the workflow
from starting at the time that is specified in the Start time attribute, clear
this option.
c. To specify the time to start the actions in the workflow, in the Start Time
attribute, use the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the
workflow over a 24-hour period, use the Interval attribute spin boxes. If you
are performing transaction log backup as part of application-consistent
protection, you must specify a value for this attribute in order for
incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you
select a value that is less than 24 hours, the Interval End attribute appears.
To specify the last start time in a defined interval period, use the spin boxes.
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
10. In the Running section, perform the following steps to specify when and how
often the workflow runs:
a. To ensure that the actions that are contained in the workflow run when the
policy or workflow starts, in the Enabled box, leave the option selected. To
prevent the actions in the workflow from running when the policy or
workflow that contains the action starts, clear this option.
b. To start the workflow at the time that is specified in the Start time
attribute, on the days that are defined in the action resource, in the
AutoStart Enabled box, leave the option selected. To prevent the workflow
from starting at the time that is specified in the Start time attribute, clear
this option.
c. To specify the time to start the actions in the workflow, in the Start Time
attribute, use the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the
workflow over a 24-hour period, use the Interval attribute spin boxes. If you
are performing transaction log backup as part of application-consistent
protection, you must specify a value for this attribute in order for
incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you
select a value that is less than 24 hours, the Interval End attribute appears.
To specify the last start time in a defined interval period, use the spin boxes.
11. In the Groups group box, specify the protection group to which the workflow
applies.
To use a group, select a protection group from the Groups list. To create a
protection group, click the + button that is located to the right of the Groups
list.
12. The Actions table displays a list of actions in the workflow. To edit or delete an
action in the workflow, select the action and click Edit or Delete. To create one
or more actions for the workflow, click Add.
The Actions table organizes the information in sortable columns. Right-click in
the table to customize the attributes that appear.
13. To create the workflow, click OK.
9. (Optional) Select the Dynamic Association checkbox if you plan to apply rules
that will determine which virtual machines and containers are dynamically
included in the group based upon the rule criteria. The section Enabling a
VMware group with Dynamic Association and applying rules in NMC provides
more information on enabling a policy/group with Dynamic Association and
applying rules.
10. From the vCenter drop-down, select the vCenter server that contains the
VMware objects that you want to protect, and then select the objects
(Datacenter, ESX host, virtual machine, resource pool, vApp, or disk) to include
in this group. Any objects selected here will be considered static objects, which
means that the items will be included in the group until unselected, even when
Dynamic Association is enabled.
Note: If the vCenter list is empty, cancel the task and, using the NMC
Protection window, right-click VMware View in the left pane, and select
Refresh.
11. (Optional) If the group as Dynamic Association enabled, from the Rule drop-
down, select a pre-defined rule that you want to apply for any VMware objects
that will be dynamically included in the group based upon the rule criteria, or
click + to open the Create Rule window and create a new rule. The section
Enabling a VMware group with Dynamic Association and applying rules in NMC
provides more information on associating a VMware group with rules.
12. Click Preview All Virtual Machines to view a list of the static and dynamic
virtual machines and objects that have been added to the group. In this window,
you can also unselect a virtual machine or VMDK to exclude the item from the
backup. When an object is unselected, an entry for the object appears in the
Excluded VM list.
13. Click OK to exit the Preview Virtual Machines window, and then click OK to
finish creating or editing the group.
Figure 15 Changing the Backup Optimization mode in the vProxy protection group
A VMware group with Dynamic Association enabled can include both static and
dynamic objects:
l Virtual machines and containers from the vCenter that are manually selected when
you create or edit the group in NMC are known as static objects, because their
inclusion in the group does not change unless you unselect an item.
l Virtual machines and containers that are only included in the group according to
the rules assigned when you create or edit the group in NMC are known as
dynamic objects, because their inclusion in the group can change over time based
on whether the items continue to match the rule criteria.
When creating or editing the group, you can preview both static and dynamic contents
to ensure that the protection policy will include all the virtual machines and containers
that you want protect in the backup. Additionally, you can specify a virtual machine
exclusion list for the VMware protection group to exclude particular virtual machines
or VMDKs from being backed up as part of the group.
When a VMware protection group is associated with one or more rules, the rules are
executed against the vCenter inventory when the policy backup is started in order to
filter the group contents according to the rule criteria.
Creating and viewing tags in the vSphere Web Client
In order to support the dynamic selection of VMware objects based on the user-
defined rules created in NMC, vSphere tags in the vSphere Web Client allow you to
attach metadata to the objects in the vSphere inventory to make these objects easier
to sort and search. Tags are supported in vSphere versions 6.5 and later.
When you create a tag in the vSphere Web Client, the tag can be assigned to a
category in order to group related tags together. When defining a category, you can
also specify the object types the tags will be applied to, and whether more than one
tag in the category can be applied to an object. Within a single rule, there is a
maximum limit of 50 rule definitions applicable to tags and categories, as shown in the
following example where Category is the category name and Bronze is the tag name:
l Category:Category1,Tag:Bronze1
l Category:Category2,Tag:Bronze2
l Category:Category3,Tag:Bronze3
l and so on up to Category:Category50,Tag:Bronze50
In the above example, if the number of characters associated with category name or
tag name are more than 9 or 7 characters respectively, then the maximum limit for
rule definitions in a single rule will be further reduced from 50. Exceeding the
maximum limit for rule definitions will result in no virtual machines being backed up as
part of this group, since there will be no members associated with the group. As a best
practice, it is recommended to keep the number of rule definitions within a single rule
to 10 or less and, in cases where there are a large number of rule definitions within a
single rule, it is also recommended to keep the number of characters in category/tag
names to 10 or less.
The vSphere Web Client displays any tags that have been created for the vCenter
under Tags & Custom Attributes in the left pane. When you click Tags & Custom
Attributes, select the Tags tab. A table lists the available tags. Click on a tag link in
the table to view the objects associated with this particular tag.
Note: Once virtual machines are associated with tags, the association will not be
reflected in the NMC NetWorker Administration window's VMware View until
the timeout period has completed. The default timeout for NetWorker to fetch the
latest inventory from vCenter is 15 minutes.
3. In the General tab, type a name for the rule, and select the Datastore Type
from the drop-down. The default Datastore Type is VMware.
4. In the Rule Definition pane, click Add.
5. In the Rule Definition pane:
a. For the Type column's drop-down, select the object type, for example,
VirtualMachine.
b. For the Property column's drop-down, select from one of the available
options, for example, Tag.
c. For the Operator column's drop-down, select from one of the available
options, for example, Equals.
d. Click Browse to display a list of all the categories and tags that have been
created on that vCenter server. Select the tag you want to apply to the rule
and click OK to exit the dialog.
Note: Tags are only supported in vSphere versions 6.5 and later.
6. Repeat steps 2 through 5 for any additional rules you want to create.
Note: If adding multiple rules, in order to specify whether to apply more
than one rule to the group, select either All or Any from the Match Type
drop-down.
7. When finished adding rules, return to the Protection window and right-click the
desired group in the left pane, and then select Properties from the drop-down.
The Edit Group window displays.
8. If not already selected, select the Dynamic Association checkbox, and then
select any virtual machine(s) in this workflow that you want to include in the
group regardless of the rules applied. These objects are known as static objects.
9. Select the desired rule from the Rule drop-down that you want to apply to the
other virtual machines in the workflow to determine which objects will be
dynamically included.
10. Click Preview All Virtual Machines to view a list of the static and dynamic
virtual machines and objects that have been added to the group. In this window,
you can also unselect a virtual machine or VMDK to exclude the item from the
backup. When an object is unselected, an entry for the object appears in the
Excluded VM list.
11. Save the changes in the Edit Group window, and close the window.
Results
When you select the specific VMware group in the Protection window, the vCenter
Objects Selected field displays the list of virtual machines that are statically selected.
Similarly, Protected VMs in VMware View only displays the virtual machines that are
statically protected.
l If the action should run concurrently with an action, in the Previous box,
select the concurrent action, and then select the Concurrent checkbox.
10. Specify a weekly or monthly schedule for the action:
l To specify a schedule for each day of the week, select Weekly by day.
l To specify a schedule for each day of the month, select Monthly by day.
11. Click the icon on each day to specify the backup level to perform.
Backup levels for NetWorker VMware Protection include the following.
Note: Any backup level that displays in the wizard but is not identified in
this table is not supported for VMware.
13. From the Destination Storage Node box, select the storage node that contains
the devices where you want to store the backup data.
Note: When you deploy the vCenter server in the Cloud, a parameter
displays in the backup action logs that indicates HypervisorMode: VMC.
When not deployed in the Cloud, the parameter indicates
HypervisorMode: vSphere.
14. From the Retention spin boxes, specify the amount of time to retain the
backup data.
After the retention period expires, the save set is removed from the client file
index and marked as recyclable in the media database during an expiration
server maintenance task.
15. Select the Apply DD Retention Lock checkbox to enable retention lock for the
virtual machines included in this backup action. Note that the device used for
backing up these virtual machines must also have DD Retention lock enabled in
the NMC Device Properties window, or DD Retention Lock must be enabled
during device creation.
16. In the DD Retention Lock Time box, specify the duration the virtual machines
will remain on the Data Domain device before the retention lock expires. During
this time, these virtual machine backups cannot be overwritten, modified, or
deleted for the duration of the retention period, although the backups can be
mounted and unmounted. The retention time period set here must fall within the
minimum and maximum values set for the Data Domain Mtree, and should be
lower than or equal to the NetWorker Retention Period.
21. Although the Retries, Retry Delay, and the Inactivity Timeout options appear,
this action does not support these options and you can ignore these values.
22. In the Parallelism field, specify the maximum number of concurrent operations
for the action.
23. From the Soft Limit list, select the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
amount of time.
24. From the Hard Limit list, select the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no amount
of time.
25. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To
specify the year, use the spin boxes. You can set an override in the following
ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, and then perform one of the
following steps:
n To define an override that occurs on a specific day of the week, every
week, select Specified day, and then use the lists. Click Add Rules
based override.
n To define an override that occurs on the last day of the calendar month,
select Last day of the month. Click Add Rules based override.
Note:
n You can edit or add the rules in the Override field.
n To remove an override, delete the entry from the Override field.
26. From the Send Notifications list box, select whether to send notifications for
the action:
l To use the notification configuration that is defined in the Policy resource to
send the notification, select Set at policy level.
l To send a notification on completion of the action, select On Completion.
l To send a notification only if the action fails to complete, select On Failure.
15. In the Parallelism field, specify the maximum number of concurrent operations
for the action. This value should not exceed 25.
16. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.
Note: If any of the actions fail in the workflow, the workflow status does
not appear as interrupted or cancelled. NetWorker reports the workflow
status as failed.
17. From the Send Notifications list box, select whether to send notifications for
the action:
l To use the notification configuration that is defined in the Policy resource to
send the notification, select Set at policy level.
18. From the Soft Limit list, select the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
amount of time.
19. From the Hard Limit list, select the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no amount
of time.
20. Optional, in Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the
following options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the
time defined by the workflow.
l Absolute—Start the action at the time specified by the values in the spin
boxes.
l Relative—Start the action after the period of time defined in the spin boxes
has elapsed after the start of the workflow.
21. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To
specify the year, use the spin boxes. You can set an override in the following
ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, and then perform one of the
following steps:
n To define an override that occurs on a specific day of the week, every
week, select Specified day, and then use the lists. Click Add Rules
based override.
n To define an override that occurs on the last day of the calendar month,
select Last day of the month. Click Add Rules based override.
Note:
n You can edit or add the rules in the Override field.
n To remove an override, delete the entry from the Override field.
3. Click Yes.
The Media window displays the save sets contained within the policy. If the save sets
are additionally part of an application-consistent policy, a green check mark appears in
the VM App Consistent column.
In the Host Name field, type the IP address of the host, and provide the vCenter
Server username and password credentials. Additionally, if the vCenter server is
deployed in the Cloud, select the Deployed in Cloud checkbox, and then click OK.
Note: When you select Deployed in Cloud, a parameter displays in the backup
action logs that indicates HypervisorMode: VMC. When the checkbox is not
selected, the parameter indicates HypervisorMode: vSphere.
When you add the vCenter server to VMware View, the following actions occur:
To refine items displayed in the right details pane, select containers in the
Virtualization node hierarchy in the left pane. For example, if an individual Cluster is
selected in the Virtualization node, only child elements associated with that Cluster
display.
To filter the visible items to show only protected VMs, unprotected VMs, or
overprotected VMs, click the links located above the right pane, as shown in the
following figure.
Note: When you enable a VMware group with Dynamic Association, the
protected VMs reflect those virtual machines that are statically protected, and
does not include virtual machines that get dynamically added to the group after
rules are applied.
Figure 23 Filtering results in VMware View
The filtering function works the same in Table view as in Map view. Links provided
above the details pane allow you to display only overprotected virtual machines,
unprotected virtual machines, or all virtual machines in the environment. The
NetWorker Administration Guide provides general information on using tables in the
Administration window.
Note: In Table view, the Host field contains an undefined value for virtual
machines or containers that are part of a cluster. The Map view provides a link to
the cluster.
A prompt displays in the right pane with fields required to connect to the
NetWorker server.
3. For the NetWorker server, type the following information:
a. In the Username field, type the NetWorker administrator username.
b. In the Password field, type the NetWorker administrator password.
c. In the NetWorker Server field, type the IP address of the NetWorker
server.
d. In the Port field, type 9090.
Start a vProxy policy in the vSphere Client Dell EMC NetWorker interface
To start a vProxy backup policy by using the Dell EMC NetWorker interface in the
vSphere Client, perform the following steps.
Procedure
1. In the vSphere Client, if not already selected, click Dell EMC NetWorker in the
left pane.
When a connection to the NetWorker server is established, links to Basic Tasks
appear in the right pane.
2. From the Basic Tasks pane, click Assign Backup Policy, or click the Protection
3. Click the arrow to the left of a policy to expand and view the policy and
workflow details. You can click the Items link under the Workflow to display the
virtual machines protected by this workflow.
4. If you do not need to add or remove any virtual machines from the workflow,
click the three dots next to the policy and select Backup all sources or Backup
only out of date sources from the drop-down.
Results
A dialog displays indicating that the policy was successfully started. To close the
dialog, click OK. You can then click the blue arrows in the lower right corner of the
window to monitor the progress of the policy in the Recent Tasks pane.
Figure 31 Recent Tasks pane
Add virtual machines to a vProxy policy in the vSphere Client Dell EMC
NetWorker interface
Perform the following steps to edit a vProxy policy to add virtual machines to a
workflow by using the Dell EMC NetWorker interface in the vSphere Client.
Procedure
1. In the vSphere Client, if not already selected, click Dell EMC NetWorker in the
left pane.
When a connection to the NetWorker server is established, links to Basic Tasks
appear in the right pane.
2. Click Assign Backup Policy.
A list of available vProxy policies that were created in NMC displays in the right
pane.
3. Click the arrow to the left of a policy to expand and view the policy and
workflow details. You can click the Items link under the Workflow to display the
virtual machines protected by this workflow.
4. To add virtual machines to the workflow, click the three dots next to the policy
and select Edit from the drop-down.
Figure 33 Edit a vProxy policy
The Editing backup policy dialog displays with available backup sources.
5. Select any virtual machines or VMDKs in the inventory you want to protect with
this workflow, and then click Finish.
Results
Any virtual machines or VMDKs added to the workflow now appear when you click the
Items link under the workflow in the Policies pane.
4. Click Connect.
Results
When a connection to the NetWorker server is established, the Getting Started pane
appears.
3. Highlight the policy and workflow you want to run and click Backup now in the
top-right corner.
Results
You can monitor the progress of the backup in the Running tab of the Recent Tasks
pane.
Note: If you cancel a workflow from the vSphere Web Client and then want to
restart the backup, ensure that you restart the workflow from the vSphere Web
Client. If a workflow that was started from the vSphere Web Client is restarted
from the NMC NetWorker Administration window, the backup fails.
4. Select any virtual machines or VMDKs in the inventory you want to protect with
this workflow and click Finish.
Results
Any virtual machines or VMDKs added to the workflow appear under Sources in the
bottom of the Backup pane.
Backup operations
The following troubleshooting items provide some direction on how to identify and
resolve common issues with vProxy backups.
SQL Server application-consistent backups fail with error "Unable to find VSS metadata files in
directory"
SQL Server application-consistent virtual machine backups might fail with the
following error when the disk.enableUUDI variable for the virtual machine is set to
False.
Unable to find VSS metadata files in directory C:\Program Files
\DPSAPPS\MSVMAPPAGENT\tmp\VSSMetadata.xxxx.
To resolve this issue, ensure that the disk.enableUUDI variable for the virtual machines
included in an SQL Server application-consistent backup is set to True.
Failed to lock Virtual Machine for backup: Another EMC vProxy operation 'Backup' is active on
VM
This error message appears when a backup fails for a virtual machine, when previous
backups of the virtual machine was abruptly ended and the VM annotation string was
not cleared.
To resolve this issue, clear the annotation string value for the virtual machine.
1. Connect to the vCenter server and navigate Home > Inventory > Hosts and
Clusters.
2. Select the virtual machine, and then select the Summary tab.
3. Clear the value that appears in the EMC Proxy Session field.
“The following items could not be located and were not selected {client name}.”
This error can occur when the backed up VM(s) cannot be located during Edit of a
backup job. This is a known issue.
Windows 2008 R2 VMs may fail to backup with “disk.EnableUUID” configured to “true.”
Windows 2008 R2 backups may fail if the VM is configured with the disk.EnableUUID
parameter set to true. To correct this problem, manually update the vmx configuration
parameter disk.EnableUUID to false by using the vSphere Web Client:
1. Shut down the VM by right clicking the VM and selecting Shut Down Guest OS.
2. Right click the VM and select Edit Settings.
3. Click VM Options.
4. Expand the Advanced section and click Edit Configuration.
5. Locate the name disk.EnableUUId and set the value to false.
6. Click OK on the next two pages.
7. Right click the VM and select Power On.
After you update the configuration parameter, the backups of the Windows 2008 R2
VM should succeed.
When VMs are moved in or out of different cluster groups, associated backup sources may be
lost
When you move hosts into clusters with the option to retain the resource pools and
vApps, the containers get recreated, not copied. As a result, the container is no longer
the same container even though the name is the same. To resolve this issue, validate
or recreate any backup jobs that protect containers after moving hosts in or out of a
cluster.
Backups fail if certain characters are used in the virtual machine name, datastore, folder, or
datacenter names
When you use spaces or special characters in the virtual machine name, datastore,
folder, or datacenter names, the .vmx file is not included in the backup. The vProxy
appliance does not back up objects that include the following special characters, in the
format of character/escape sequence:
l & %26
l + %2B
l / %2F
l = %3D
l ? %3F
l % %25
l \ %5C
l ~ %7E
l ] %5D
To resolve this issue, increase the values in the max target sessions and target
sessions attributes for the clone device. The NetWorker Administration Guide describes
how to modify the properties of a device.
Lock placed on virtual machine during backup and recovery operations continues for 24 hours if
vProxy appliance fails
During vProxy backup and recovery operations, a lock is placed on the virtual machine.
If a vProxy appliance failure occurs during one of these sessions, the lock gets
extended to a period of 24 hours, during which full backups and transaction log
backups will fail with the following error until the lock is manually released:
Cannot lock VM 'W2K8R2-SQL-2014' (vm-522): Another EMC vProxy
operation 'Backup' is active on VM vm-522.
Workaround
To manually release the lock on the virtual machine:
1. Open the vSphere Web Client.
2. Click on the virtual machine and select Summary.
3. Select Custom attribute and click Edit.
4. Remove the attribute EMC vProxy Session.
System System databases are automatically skipped for transaction log backup.
Database
Database State Database is not in a state that allows backup. For example, the database is in
the NORECOVERY state.
Recovery Database is in SIMPLE recovery model, which does not support transaction
Model log backup
Other Backup Most recent backup for the database was performed by a different backup
Product product.
New Database Database was created after most recent full backup.
Backup Failure Database was in state to allow backup, backup was attempted, but backup
failed.
All skipped databases will be backed up as part of the next full backup. Also, a skipped
database will not result in msvmagent_appbackup.exe failure. The only instance in
which msvmagent_appbackup.exe would potentially fail is if all databases failed to
back up.
The msvmagent_appbackup.exe program generates a history report of the
databases, if the database backup status was success/skipped/failed, and a reason if
they were skipped or failed if applicable. This history report is visible in the action logs
for the vProxy, which are available on the NetWorker server and also available on the
client as part of the appbackup logs.
Note: For SQL virtual machine application-consistent data protection, the SQL
and operating system versions follow the NMM support matrix available at
https://elabnavigator.emc.com/eln/modernHomeDataProtection.
Increase the vCenter query timeout before starting a VMware backup action
Before starting a VMware backup action, NetWorker queries the vCenter server to
determine if any changes have occurred in the items selected for backup. You can
increase the timeout value by setting the
NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT environment variable.
The amount of time for the query to complete depends on several factors, including
the network response time, the size of the vCenter, and the number of resources free
on the NetWorker server. The default timeout of the query is 30 minutes, after which
the backup fails with the following error:
nsrvproxy_save NSR warning Dispatcher: Request timed out
Perform the following steps to set the
NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT environment variable to a higher
timeout value. Note that the timeout value is in seconds. In this example, a value of
2700 (or 45 minutes) is used.
1. Set up the environment variable:
l On Linux, add the following lines to the /nsr/nsrrc file:
NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT=2700
export NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT
l On Windows, add a new variable called
NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT under Environment
variables > System variables, and specify a value of 2700.
2. On the NetWorker server, connect to nsradmin:
nsradmin -p nsrexec
3. Select/Print the 'NSRLA' resource:
p type: nsrla
4. Append to the attribute:
append environment variable names:
NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT
5. Select/Print the 'NSRLA' resource again to verify your changes:
p type: nsrla
The last attribute should display as environment variable names:
NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT.
On the NetWorker server, the location of log files for individual backups differ on
Windows and LINUX:
l Linux—/nsr/logs/policy/policy_name
l Windows—C:\Program Files\EMC NetWorker\logs\policy
\policy_name
where policy_name is the name of the policy resource associated with the backup
action.
Additional logging with the VMBackup broker
Debug logging of the vmbackup broker of nsrd is disabled by default. To turn on
additional logging, you can touch an empty file at <nsr>/tmp/vmbackup_logging.
Enabling of additional logging can be performed while other operations are in progress,
and a NetWorker restart is not required. To turn off additional logging, you can
remove the same file.
MSVMAPPAGENT logs
You can access logs related to MSVMAPPAGENT from the following locations:
l Discovery log: C:\Program Files\DPSAPPS\MSVMAPPAGENT\logs
\msvmagent_discovery.log
l FULL backup: C:\Program Files\DPSAPPS\MSVMAPPAGENT\logs
\msvmcatsnap.log
l Transaction log backup: C:\Program Files\DPSAPPS\MSVMAPPAGENT\logs
\msvmagent_appbackup.log
l Restore of FULL backup: C:\Program Files\DPSAPPS\MSVMAPPAGENT
\logs\msvmagent_snapshotrestore.log
l Restore of transaction log backup: C:\Program Files\DPSAPPS
\MSVMAPPAGENT\logs\msvmagent_apprestore.log
vProxy logs
You can access these vProxy logs from the following locations:
l FULL and transaction log backups: /opt/emc/vproxy/runtime/logs/
vbackupd/BackupVmSessions-sessionnumber.log
l InspectBackup logs: /opt/emc/vproxy/runtime/logs/vsessionsd/
inspectBackup-sessionnumber.log
l Mount session logs: /opt/emc/vproxy/runtime/logs/vflrd/mount-
sessionnumber.log
l Browse session logs: /opt/emc/vproxy/runtime/logs/vflrd/browse-
sessionnumber.log
l Recover App sessions logs: /opt/emc/vproxy/runtime/logs/vflrd/
application-sessionnumber.log. Note that a few minutes after
completion, these logs are moved to /opt/emc/vproxy/runtime/logs/
recycle/.
b. In the Management user field, specify the username for a Data Domain user
that has admin access. For example, sysadmin. The Management user should
have Data Domain administrator privileges.
c. In the Management password field, specify the password of the
management user.
d. In the Management port field, specify the management port. By default, the
port is 3009.
Note: The NetWorker Data Domain Boost Integration Guide provides
information about the Cloud unit field and use of the Cloud tier device.
l config-user-dn
l config-user-dn-password
l config-user-object-class
l config-user-search-path
l config-user-id-attr
l config-group-search-path
l config-group-name-attr
l config-group-object-class
l config-group-member-attr
l config-active-directory
2. Register the AD domain user to NetWorker either using the command line or the
NetWorker Management Console user interface.
If using the command line:
For example, to create a tenant user ADuser with the alias FLR, run
authc_config -u administrator -e add-tenant -D tenant-
name=ADuser -D tenant-alias FLR -p password
7. Log in to the Dell EMC Data Protection Restore Client as the AD user, in the
format <tenant>\<domain>\<userid>. For example, default\rideblr.com
\ADuser.
Results
You can now perform file-level restore as an Active Directory user.
After selecting the Virtual Machine Recovery type, you can perform recovery of
individual virtual machines, or (for revert and virtual machine recovery options)
recovery from multiple virtual machines.
Procedure
1. In the Select the Recovery Type page, select Virtual Machine Recovery, and
then select a vCenter server to recover from using the Source vCenter server
drop-down. Click Next.
2. In the Select the Virtual Machine to Recover page, enter the name of the
source virtual machine(s) to recover from, or perform a search for the virtual
machine. Additionally, you can use the tabs on this page to choose a single
virtual machine or multiple virtual machines from a selected backup, or browse
the source vCenter to determine the required virtual machine source. When you
locate and choose the desired virtual machine(s), click Next.
3. In the Select the Target Backups page, select the virtual machine backup(s)
you want to restore from the Available Backups pane. This pane lists both
primary backups and, if available, clone copies. If you selected recovery from
multiple virtual machines, you can switch between virtual machines to browse
each machine's available backups by using the Virtual Machine Name drop-
down. Click Next.
4. In the Select the Virtual Machine Recovery method page, select from one of
the available recovery options:
l Revert (or rollback) a virtual machine
l Instant Recovery of a virtual machine (direct restore from a Data Domain
device)
l Virtual Machine recovery (recovery to a new virtual machine)
l Virtual Disk recovery (recover VMDKs to an existing virtual machine)
l Emergency recovery (recovery to an ESX host)
l File Level recovery (recover files from VMDKs to a file system, or as a
download).
Figure 43 Select the Virtual Machine Recovery method
Results
Subsequent wizard options change based on the recovery option selected, as
described in the following sections.
Note: The entire VMDK will be rolled back unless you have CBT enabled, in
which case only the changed blocks will be moved.
Procedure
1. In the Select the Virtual Machine Recovery Method page:
a. Select Instant Recovery.
b. Click Next.
2. In the Configure the Instant Recovery Options page:
a. Select the location where you want to restore the virtual machine in the
vCenter environment.
This does not have to be the original location, and can also be on a different
vCenter server.
b. Ensure that you select the Power on virtual machine and Reconnect to
network options.
c. Click Next.
Figure 46 Configure the Instant Recovery
If you have a single disks, or multiple disks with multiple datastores, you can
perform the following:
l Choose to recover a collection of all the available hard drives.
l Select a different datastore than the original datastore.
l Select a different datatore for each disk you want to recover.
l Specify the datastore where the virtual machine configuration files reside.
Optionally, select the Power on virtual machine and Reconnect to network
options to power on and reconnect after the recovery, and then click Next.
Results
The Check the Recovery Results page will display the duration of the recovery, and a
log file entry when the virtual machine recovery is complete.
c. Click Next.
4. In the Perform the Recovery page:
a. Specify a name for the recovery.
b. Check the summary at the bottom of the page to ensure all the details are
correct.
c. Click Run Recovery.
Results
The Check the Recovery Results page will display the duration of the recovery, and a
log file entry when the disk recovery is complete.
Note: When you start a VMDK recovery, the virtual machine will be powered off
automatically without issuing a warning message.
Emergency Recovery
The next virtual machine recovery option available in the NMC Recovery wizard is an
Emergency Recovery. An Emergency Recovery is required when you need to restore
the virtual machine to an ESXi host.
Before you begin
Emergency Recovery requires a vProxy set up on the ESXi host prior to running the
recovery.
Additionally, ensure that you disconnect the ESXi host from the vCenter server.
About this task
Note: During an Emergency Recovery, the vProxy gets associated with the ESXi
host and is unavailable for other operations on the vCenter server. Wait until the
recovery completes before initiating any other operations on the vProxy.
To complete the Recovery wizard with the Emergency Recovery method, perform the
following:
Procedure
1. In the Select the Virtual Machine Recovery Method page:
a. Select Emergency Recovery.
b. Click Next.
2. In the Configure the Emergency Recovery page:
a. Specify the target ESXi server in the vCenter environment.
b. Click Connect.
The Proxy Selection and Recovery Data panes get populated with the ESXi
server details.
3. In the Proxy Selection pane, if a proxy is not discovered, add a new proxy
which is deployed in vCenter but not added to NetWorker.
4. For the disks in the Recovery Data pane:
a. Select a datastore.
b. Optionally, select the Power on virtual machine and Reconnect to
network options.
c. Click Next.
5. In the Select Alternate Recovery Sources page:
a. Select the original disk backup, or a clone copy if one is available.
b. If recovering from a clone that is not on a Data Domain device, or recovering
from a Data Domain Cloud Tier device, specify the staging pool.
6. In the Perform the Recovery page:
a. Specify a name for the recovery and check the summary at the bottom of
the page to ensure all the details are correct.
b. Click Run Recovery.
Results
The Check the Recovery Results page will display a progress bar with the duration of
the recovery, and a log file entry when the Emergency Recovery is complete.
Note: The progress bar may not update correctly when you perform an
Emergency Recovery directly to the ESXi host.
When the Mount Results pane shows that the mount has succeeded, click
Next.
Note: This user should have privileges to install the FLR Agent, which is
required to perform file level recovery. For Linux virtual machines, this
requires the root user account or an equivalent sudo local user account, as
described in the section "FLR Agent installation on Linux platforms" of FLR
Agent requirements.
Results
The Check the Recovery Results page displays the duration of the recovery, and a
log file entry when the file level recovery is complete.
Additionally, make note of the name indicated in the Volume column for all of
the volumes you do not want to recover from, as you will require this
information in steps 5 and 6.
2. Click Close to display the Save Progress dialog, and then specify a name for
the recover and click Save to save your progress.
3. In the NMC Administration window, click Devices to display the Devices
window.
4. In the left navigation pane, select Devices. The list of devices displays in the
right pane.
5. For each volume you do not want to recover from that you made note of in step
1, locate the corresponding device, and make note of that device name.
6. For each device you identify as corresponding with those volumes, right-click
the device and select Unmount from the drop-down, and then also select
Disable from the drop-down.
Note: Ensure that no backups are currently running to these devices prior
to unmounting.
10. In the Perform the Recovery page, specify a name for the recovery and check
the summary at the bottom of the page to ensure all the details are correct.
Click Run Recovery.
The Check the Recovery Results page will display the duration of the
recovery, and a log file entry when the recovery is complete.
11. In the NMC Administration window, click Devices to return to the Devices
window, and in the left navigation pane, select Devices to display the list of
devices in the right pane.
12. For each device that you unmounted and disabled in step 6, right-click the
device and select Enable from the drop-down, and then select Mount from the
drop-down.
From the Backups and Clones pane, select from one of the available primary or
cloned backups, and then select the Recovery drop-down to choose from one of the
image-level recovery types available, or file level recovery. Additionally, ensure that
you specify the correct time range of the backup(s) that you want to recover.
5. In the Summary page, review the recovery details and then click Finish.
Results
The wizard exits and a message displays along the top of the VMware Recovery
window to indicate that a recovery request was submitted. Select Monitoring in the
left pane to view the duration and status of the recovery operation.
6. Click Next.
The Summary page displays.
7. In the Summary page, review the recovery details and then click Finish.
Results
The wizard exits and a message displays along the top of the VMware Recovery
window to indicate that a recovery request was submitted. Select Monitoring in the
left pane to view the duration and status of the recovery operation.
g. Click Next.
The Destination Location page displays.
4. In the Destination Location page, select the location in the vCenter server
where you want to recover the virtual machine, and then click Next.
The Summary page displays.
5. In the Summary page, review the recovery details and then click Finish.
Results
The wizard exits and a message displays along the top of the VMware Recovery
window to indicate that a recovery request was submitted. Select Monitoring in the
left pane to view the duration and status of the recovery operation.
Note that the status might not update to "Completed" or "Succeeded" upon a
successful instant recovery. If this occurs, cancel the corresponding NetWorker
restore task in the vSphere Client and the status will update correctly in the
NetWorker Management Web UI.
Note: To optimize use of NetWorker and Data Domain resources, it is strongly
recommended that you stop the instant recovery session once you satisfy your
recovery objectives.
Emergency Recovery
Select Emergency when you need to restore the virtual machine to an ESXi host.
Before you begin
Emergency recovery requires a vProxy set up on the ESXi host prior to running the
recovery.
Additionally, ensure that you disconnect the ESXi host from the vCenter server.
About this task
Note: During an Emergency Recovery, the vProxy gets associated with the ESXi
host and is unavailable for other operations on the vCenter server. Wait until the
recovery completes before initiating any other operations on the vProxy.
To complete the Recovery wizard with the Emergency Recovery method, perform the
following:
Procedure
1. In the VMware Recovery window's Backups and Clones pane, select from one
of the available primary or cloned backups, and then select the Recovery drop-
down.
2. From the Image Level drop-down, select Emergency.
The Recover wizard launches.
3. In the Configuration page:
a. From the ESX Server drop-down, select the IP of the ESX server in the
vCenter environment where you want to restore the virtual machine backup.
b. Specify the root Username and Password for the ESX Server.
c. In the Virtual Machine Name field, specify the name of the new virtual
machine.
d. Select Power On to power on the virtual machine after the recovery
completes.
Note: If the virtual machine is currently powered on, a dialog displays
requesting confirmation to power off the virtual machine. Additionally, if
a change has occurred in the virtual machine configuration since the
backup, a warning message displays.
e. Select Reconnect NIC to reconnect the network interface card after the
recovery completes.
f. If required, set a Debug level if you want to enable debug logs. The default
level is 0.
g. Click Next.
The VMware Proxy Configuration page displays.
4. In the VMware Proxy Configuration page:
a. For Proxy Selection Type, if the desired proxy has been discovered, select
an existing vProxy for the recovery. Alternatively, you can use a new vProxy
that is deployed in the vCenter but not yet added in NetWorker by selecting
Register a new VMware Proxy.
b. From the Select Proxy drop-down, select one of the registered vProxies.
c. Click Next.
The Disk Selection page displays.
5. In the Disk Selection page:
a. Use the VM Configuration Files drop-down to select the datastore where
the virtual machine configuration files will reside.
b. Select Use same datastore for all disks to use the same datastore that you
selected for the configuration files. This option is enabled by default. Clear
this option to select one or more of the available hard disks, and select a
Destination Datastore for each selected disk. The default Destination
Datastore selected is the original datastore, however, you can select a
different datastore for each disk you want to recover.
6. Click Next.
The Summary page displays.
7. In the Summary page, review the recovery details and then click Finish.
Results
The wizard exits and a message displays along the top of the VMware Recovery
window to indicate that a recovery request was submitted. Select Monitoring in the
left pane to view the duration and status of the recovery operation.
Note: The progress bar may not update correctly when you perform an
Emergency Recovery directly to the ESXi host.
d. Click Mount.
The disk mount initializes and a progress bar displays.
Note: You cannot browse the contents of the virtual machine backup until
the mounting of the destination virtual machine completes successfully.
6. When the mount completes successfully, click Next.
The Source Data page displays.
7. In the Source Data page, select individual folders to browse the contents of the
backup, and select the objects you want to recover. You can select all objects in
a folder by clicking the checkbox to the left of the Name field in the Contents
pane.
When any objects in a folder are selected, that folder is highlighted in blue in the
Folders pane. After selecting the objects that you want to recover, click Next.
for other types of VBA recovery, provided that you still have an active VBA
instance.
l For the recovery of VBA backups, the staging pool must be a clone pool of
type Data Domain.
Procedure
1. In the NetWorker Management Web UI, go to Recover > VMware Recovery
The VMware Recovery window appears
2. From the Select vCenter drop-down, select a vCenter server.
A list of virtual machines in the vCenter displays.
3. Select the desired virtual machine, and then select one of the duration options
from the Showing results for drop-down in the Backups and Clones pane.
A list of primary and clone backups of the virtual machine performed within that
duration appear in a table within the Backups and Clones pane. The table
contains a column that allows you to identify which backups are legacy VBA
backups.
4. Click the filter icon in the lower left corner of the Backups and Clones pane,
and select VBA Backups and click OK.
A column appears in the table that allows you to identify which backups are
legacy VBA backups.
5. Select one of the available primary or cloned backups that indicates VBA, and
then click the Recovery drop-down.
6. From the drop-down, select Image Level, and then select the Revert or New
Virtual Machine recovery type. Note that these are the only supported types
for recoveries of VBA backups.
The Recover wizard launches.
7. Complete the Recover wizard according to the type you selected.
Note: When you select the staging pool for recovery, ensure that at least
one volume does not contain a copy of the selected save set. Alternatively,
if a save set is already recovered, then you can select the recovered save
set for further recoveries of the same virtual machine.
Results
When the recovery is initiated, the vProxy performs resurrection on a staging pool to
convert the VBA backups to a vProxy-readable format, and then restores the virtual
machine. Note that the staging pool should reside on a Data Domain system.
Note: Before you start a file-level restore, review the prerequisites in the section
File-level restore prerequisites, as well as File-level restore and SQL restore
limitations to ensure that you can perform file-level restores in your configuration.
This message provides an option to deploy the FLR Agent by providing the appropriate
credentials. Review the user requirements in the following sections for Linux and
Windows platforms to determine which users are supported.
FLR Agent installation on Linux platforms
The FLR Agent installation on Linux virtual machines requires that you use the root
account, or be a user in the operating system's local sudousers list. If credentials for
any other user are provided for the target virtual machine, the FLR Agent installation
fails, even if this user has privileges similar to a root user.
To allow a non-root user/group to perform the FLR Agent installation, provide sudo
access to the following files at a minimum:
l rpm command (SLES, RHEL, CentOS) and dpkg command (Debian/Ubuntu)
l /opt/emc/vproxyra/bin/postinstall.sh
l /opt/emc/vproxyra/bin/preremove.sh
Note the following additional requirements:
l Using the local sudouser for the FLR Agent installation requires NetWorker 18.2
and later and vProxy 3.0.1-1 or later. Any earlier versions will require you to use the
root account for the FLR Agent installation
l The sudo user/group must be configured for no password prompt
l The sudo user/group must be provided with the no requiretty option.
l To browse files for a file-level restore when you have user elevation enabled, you
must have appropriate authority in the guest virtual machine operating system, for
example, being allowed to run vflrbrowse via sudo without prompting for a
password.
l To perform a file-level restore when you have user elevation enabled, you must
have appropriate authority, for example, being allowed to run vflrcopy via sudo
without prompting for a password.
Once you complete the FLR Agent installation on the target virtual machine using the
root user account or a sudouser with the minimum file access requirements, you can
perform file-level restore operations as a non-root user on supported Linux platforms.
File-level restore on Linux is only supported on Red Hat Enterprise Linux versions 6
and 7, and SuSE Linux Enterprise Server versions 11 and 12.
FLR Agent installation on Windows
FLR Agent installation on Windows virtual machines requires that you use
administrative privileges. If the provided credentials for the target virtual machine do
not have administrative privileges, theFLR Agent installation fails. Once you complete
the FLR Agent installation on the target virtual machine using administrative
privileges, you can perform file-level restore using a non-administrator user.
FLR Agent installation on Windows for UAC-enabled Windows virtual machines
FLR Agent installation on a User Account Control (UAC) enabled Windows virtual
machine requires you to perform one of the following:
l Provide the credentials of the administrator user.
l Disable UAC during the FLR Agent installation, and then re-enable on completion.
On Windows versions 7, 8, and 10, the administrator account is disabled by default. To
enable the account, complete the following steps:
1. To activate the account, open a command prompt in administrative mode, and
then type net user administrator /active: yes.
2. To set a password for the administrator account, go to Control Panel > User
Accounts and select the Advanced tab. Initially, the account password is blank.
3. In the User Accounts pane, right-click the user and select Properties, and then
clear the Account is disabled option.
To disable UAC during the FLR Agent installation and then re-enable on completion of
the installation, complete the following steps:
1. Log in to the Dell EMC Data Protection Restore Client as an administrator user
to initiate a request to launch the FLR Agent installation window.
2. In the FLR Agent installation window, select the Keep vProxy FLR on target
virtual machine option.
3. Open regedit and change the EnableLUA registry key value at HKLM\SOFTWARE
\Microsoft\Windows\CurrentVersion\Policies\System to
0x00000000. By default, this is set to 1.
4. Proceed with the FLR Agent installation.
5. Open regedit and reset the EnableLUA registry key to the previous value to re-
enable UAC.
File-level restore and SQL database/instance level restore only supported from primary or clone
backup on a Data Domain device
NetWorker only supports file-level restore and SQL database/instance level restore
operations from a primary or cloned backup when the save set is on a Data Domain
device.
If a cloned backup does not exist on the Data Domain device, you must manually clone
a save set from the tape device to Data Domain before launching the Dell EMC Data
Protection Restore Client.
If backups reside on a non-Data Domain Device such as Cloud Boost, tape, Cloud Tier,
or AFTD, the backups do not display in the Dell EMC Data Protection Restore
Client. In this case, use NMC to identify and clone the save sets back to the Data
Domain device.
Procedure
1. Log in to the system console as a non-root user.
2. Run the sudo passwd root command.
Enter the new password twice to set a password for the root account.
3. Run the sudo passwd -u root command to unlock the root account.
4. Specify the root user credentials in the Dell EMC Data Protection Restore
Client and proceed to complete the file-level restore operation at least once.
While performing the file-level restore operation for the first time, remember to
select Keep FLR agent.
5. After performing the above steps at least once, you can revert the root account
to the locked state and use non-root account for future file-level restore
requests. Non-root user can lock the root account with the sudo passwd -l
root command.
NetWorker privileges required by File-level restore and SQL database/instance level restore
users
A new user group, VMware FLR Users, requires NetWorker privileges for User and
Admin logins to perform file-level restore and SQL database/instance level restore
operations in the Dell EMC Data Protection Restore Client.
Specify the following privileges for the VMware FLR Users group by using the NMC
NetWorker Administration window or nsradmin.
User Admin
Remote Access All Clients Remote Access All Clients
l readlink
l rpm
l rsync
l bash
Note: On Linux LVM, LVM2 rpm version 2.02.117 or later is required. Also,
additional binaries required on Linux LVM include dmsetup, lvm, and
vgimportclone.
Create a user in the NetWorker authentication service (User mode file-level restore only)
When performing file-level restore in User Mode, you must create a user in the
Networker Management Console (NMC) using the Manage Authentication Service
Users option, and make note of the password as you will require this information when
logging in to the Dell EMC Data Protection Restore Client.
Before you begin
For file-level restores on Linux virtual machines, the root account or an equivalent
sudo local user account credentials is required for the target virtual machine in order
to install the FLR Agent. The section "FLR Agent installation on Linux platforms" of
FLR Agent requirements provides more details.
For file-level restores on Windows virtual machines, if the provided credentials for the
target virtual machine do not have administrative privileges, theFLR Agent installation
fails. To perform a file-level restore using a non-administrator user, ensure that the
FLR Agent is already installed on the target machine using administrative privileges.
Procedure
1. In the NMC NetWorker Administration window, click Server to open the
Server window.
2. In the left navigation pane, highlight User Groups, and then right-click and
select Manage Authentication Service Users.
Figure 54 Manage Authentication service users
6. Right click VMware FLR Users and select Properties. In the User field, create
an entry for the user created in step 4 (for example, user1), in the format
user=user1,host=NW server FQDN.
Results
You can now use this new user to log into the Dell EMC Data Protection Restore
Client.
l When you enable Admin Approval Mode (AAM) on the operating system for a
virtual machine (for example, by setting Registry/
FilterAdministratorToken to 1), the administrator user cannot perform a
file-level restore to the end user's profile, and an error displays indicating "Unable
to browse destination." For any user account control (UAC) interactions, the
administrator must wait for the mount operation to complete, and then access the
backup folders located at C:\Program Files (x86)\EMC\vProxy FLR
Agent\flr\mountpoints by logging into the guest virtual machine using
Windows Explorer or a command prompt.
l The FLR Agent installation on Linux virtual machines requires you to use the root
account, or be a local sudouser with the minimum required file access, as
described in the section FLR Agent requirements. Note that using the sudouser for
the FLR Agent installation requires NetWorker 18.2 or later and vProxy 3.0.1-1 or
later. Any earlier versions will require you to use the root account for the FLR
Agent installation. Once the FLR Agent installation is completed by a root user,
you can perform file-level restore operations as a non-root user.
l Mounting a Linux virtual machine for file-level restore requires a local Linux
account with permissions to the file system files.
l When you perform file-level restore on Ubuntu/Debian platforms, you must enable
the root account in the operating system. By default, the root account will be in
locked state.
l File-level restore is not supported on Ubuntu/Debian ext4 file systems.
l When running the NetWorker server on Windows platforms, file-level restore
session logs are not kept.
l For file-level restores on Windows 2012 R2 virtual machines, the volumes listed
under the virtual machine display as "unknown." File-restore operations are not
impacted by this issue.
l File-level restore of virtual machines with Windows dynamic disks is supported
with the following limitations:
n The restore can only be performed when recovering to a virtual machine
different from the original. Also, this virtual machine cannot be a clone of the
original.
n The restore can only be performed by virtual machine administrator users.
n If Windows virtual machines were created by cloning or deploying the same
template, then all of these Windows virtual machines may end up using the
same GUID on their dynamic volumes.
l File-level restore of Windows 8, Windows Server 2012 and Windows Server 2016
virtual machines is not supported on the following file systems:
n Deduplicated NTFS
n Resilient File System (ReFS)
n EFI bootloader
Restore operations and performance limitations
Review the following limitations related to file-level restore operations and
performance considerations.
l When a file-level restore or SQL restore operation is in progress on a virtual
machine, no other backup or recovery operation can be performed on this virtual
machine. Wait until the file-level restore session completes before starting any
other operation on the virtual machine.
l When the backup chain for an SQL instance restore contains 30 or more
transaction log backups, a message indicating the required permissions to
complete this action does not display in the Dell EMC Data Protection Restore
Client. Check the flr-server log for an error message similar to the following
to determine what additional privileges are required:
ERROR c.e.f.u.ProcessRestores - Failed restore attempt:
Recover request failed: Permission denied, user does not
have 'Create Application Settings' or 'Configure NetWorker'
privilege to create this resource - NSR recover.
l SQL instance restore fails in the Dell EMC Data Protection Restore Client when
the backup chain contains more than 75 transaction log backups. In such
scenarios, ensure that you perform a SQL database restore for each database in
the SQL instance one at a time.
l When you switch between different Data Domain devices for backup and clone
operations, the SQL transaction log backup does not get promoted to FULL on the
primary backup device. As a result, the transaction log backup fails with the error
Previous backup path must be specified for Transaction Log
backup. Note that this issue does not occur when the same Data Domain device
is used for the backup and clone.
If relabelling of the primary device has occurred, or you added a new Data Domain
device, unselect the Tlog backup option for the Backup Action, and then run the
SQL application-consistent workflow. After the FULL backup and clone
completion, re-select the Tlog backup option for the Backup Action and run the
SQL application-consistent workflow again. Subsequent transaction log backups
and clones will complete successfully.
l For file-level restore of high-density file systems (more than few hundred files/
folders), it is recommended to use either the NetWorker Management Web UI or
the Dell EMC Data Protection Restore Client (User or Admin mode, as
applicable) instead of the Recovery wizard in the NMC NetWorker
Administration window.
l A restore of individual SQL Server databases or instances in the Dell EMC Data
Protection Restore Client will overwrite the existing database, even if your
NetWorker version provides an option where you can unselect Overwrite the
existing DB.
l A SQL database restore to alternate is only supported for restoring from a lower
SQL version to a higher SQL version.
l The Dell EMC Data Protection Restore Client incorrectly allows you to select a
VMware Backup appliance as a destination client for file-level restore.
l After migrating from the VMware Backup appliance to the vProxy appliance, the
Dell EMC Data Protection Restore Client may continue to display VMware
Backup appliance backups along with the new vProxy backups for virtual
machines. Note, however, that you will only be able to perform file-level restore
from the new vProxy backups.
l After migrating from the VMware Backup appliance to the vProxy appliance, new
vProxy backups of virtual machines that were previously backed up with the
VMware Backup appliance will not be visible in the Dell EMC Data Protection
Restore Client in Admin mode. You must log in using User mode to view and
recover from these backups.
l You cannot use clone volumes for file-level restore when the primary backup
volume is unmounted or unavailable. The restore will fail looking for backup
volumes. If this occurs, dynamic staging allows you to use the secondary copy by
staging the requested virtual machine backups from the clone to an available
backup volume and then recovering the virtual machine.
l Browsing a large number of files at once may cause Internet Explorer to become
slow or unresponsive. The Chrome and Mozilla browsers issue a warning when
encountering a difficulty handling many files, but Internet Explorer does not.
l In a large environment where many virtual machines appear in the Dell EMC Data
Protection Restore Client, the navigation buttons (Back, Next, Finish) may
appear very small, requiring you to zoom in to see the options. It is recommended
that you use the latest versions of the Chrome or Firefox browsers to avoid the
issue.
l File-level restore supports direct restore from a cloned backup only if the clone
copy is on a Data Domain device.
l File-level restore does not restore or browse symbolic links.
l When you create partitions, fill the lower ordered indices first. For example, you
cannot create a single partition and place it in the partition index 2, 3, or 4. You
must place the single partition in partition index 1.
Using the Dell EMC Data Protection Restore Client for file-level restore and
SQL restore
The Dell EMC Data Protection Restore Client, which you access through a web
browser, allows you to select specific virtual machine backups as file systems, and
then browse the file system to locate the directories and files you want to restore. The
browser also allows you to restore individual SQL databases and instances.
The login page of the Dell EMC Data Protection Restore Client features two tabs—
an FLR tab for virtual machine file and folder restore, and an App tab for SQL
database and instance restore.
Additionally, the Dell EMC Data Protection Restore Client operates in one of two
user modes:
l User—For file-level restore, a user account that can restore folders or files to the
original virtual machine, as described in the section Restoring specific folders or
files to the original virtual machine in User mode.
For SQL restore, a user account that can restore individual SQL databases and
instances to the original machine from the virtual machine you are logged into.
This user can be an Authentication Service user, as described in the section
Restore of SQL Server application-consistent backups.
l Admin—For file-level restore, a NetWorker administrator account or
Authentication Service user that can restore folders or files from a different virtual
machine to any available destination client, as described in the section Restoring
specific folders or files from different virtual machines in Admin mode.
For SQL restore, a NetWorker administrator account or Authentication Service
user that can restore individual SQL databases and instances to the original
machine from any virtual machine you have access to that contains an SQL Server
application-consistent backup, or restore to a different virtual machine, as
described in the section Restore of SQL Server application-consistent backups.
Note: When a file-level restore operation is in progress on a virtual machine, no
other backup or recovery operation can be performed on this virtual machine.
Wait until the file-level restore session completes before starting any other
operation on the virtual machine.
Restoring specific folders or files to the original virtual machine in User mode
To restore specific folders and files to the original virtual machine on Windows and
Linux virtual machines, select the User tab in the Dell EMC Data Protection Restore
Client login page. In this mode, you connect to the Dell EMC Data Protection
Restore Client from a virtual machine that has been backed up by the vProxy
Appliance.
Before you begin
For the Data Domain resource, ensure that you provide the management credentials
and, if required, enter the export path appropriately. The section Entering
management credentials for the Data Domain resource (instant recovery and User
mode file-level restore only)provides detailed steps.
Additionally, you must create a user in the NetWorker Authentication Service by using
the NetWorker Management Console (NMC), as described in the section Create a
user in the NetWorker authentication service (User mode file-level restore only).
Procedure
1. Open a browser from the virtual machine that the restored files will be
recovered to, and enter a URL that points to the NetWorker server host and
indicates file-level restore. For example:
https://NetWorker server:9090/flr
Note: For User recoveries, you must connect to the NetWorker server from
a web browser on the virtual machine that will receive file-level restore
data.
The Dell EMC Data Protection Restore Client login window appears.
2. Select the User tab and the FLR tab, and then log in to the Dell EMC Data
Protection Restore Client with the user credentials of the virtual machine to
which you are logged in. This user account should also belong to the NetWorker
user group "VMware FLR Users" in order to be authorized to perform file-level
restore. The section NetWorker privileges required by File-level restore users
provides more information.
When you log in, the Select Backups page displays with a list of backups for
the local virtual machine.
3. On the Select Backups page, use the drop-down list to view the available
backups. You can set the backup filter to view backups on a specific day or
within a specific date range. Highlight a backup and double-click or drag and
drop to move the backup to the Selected Items pane. Click Next.
Note: When you click Next, if a folder hierarchy does not appear, the Dell
EMC Data Protection Restore Client may not support the file system in
use on the virtual machine. The section File-level restore limitations
provides more information.
4. On the Restore Options page, navigate to the file system drive where you want
to restore the items and select an existing folder, or specify a new folder name
in the restore destination, and then click Next.
Figure 58 Select restore location
Note: Additionally, you can select the Overwrite existing files and folders
option if you want to replace the existing files with the recovered files.
5. On the Select items to restore page, browse and select the files and folders
available for recovery. Note that you can sort items by Name, File size, or Date,
and you can also search for a specific file or folder name. To mark an item for
recovery, double-click the item, or drag and drop the item into the Selected
Items pane.
clicking the icon located in the upper right-hand corner of the window.
When you click the icon, the Restore Detail pane slides into view on the
right side of the window, displaying the ongoing restore operations. Clicking the
entry displays the progress of the restore and a recovery logs download option.
Figure 60 Restore Monitoring
Restoring specific folders or files from different virtual machines in Admin mode
To restore specific folders or files from a different virtual machine, select the Admin
tab in the Dell EMC Data Protection Restore Client login page. Once connected, you
can browse, select, and restore files and folders from any virtual machine that you
backed up with the vProxy Appliance. You can then restore items to the virtual
machine on which you are currently logged in, or to any available destination virtual
machine.
Procedure
1. Open a browser and specify a URL that points to the NetWorker server and
indicates FLR, as in the following example:
https://NetWorker server:9090/flr
The Dell EMC Data Protection Restore Client login window appears.
2. Click the Admin tab and the FLR tab, and then log in to the Dell EMC Data
Protection Restore Client with the NetWorker Authentication Service User
credentials.
Note: When using Admin mode, ensure that the user you specify for the
NetWorker server login has the correct privileges to use this option.
When you log in, the Select Backups page appears with a list of all the virtual
machines that were backed up by using the vProxy Appliance. The available
backups appear under each virtual machine, as shown in the following.
Figure 61 Select the backup(s) to restore from
Note: After migrating from the VMware Backup appliance to the vProxy
appliance, new vProxy backups of virtual machines that were previously
backed up with the VMware Backup appliance will not be visible in the Dell
EMC Data Protection Restore Client in Admin mode. You must log in using
User mode to view and recover these backups.
3. On the Select Backups page, use the arrows to the right of the entry to view
the available backups. You can set the backup filter to view backups on a
specific day or within a specific date range. Highlight a backup and double-click
or drag and drop to move the backup to the Selected Items pane. Click Next.
4. On the Restore Options page, select a destination virtual machine.
A login dialog box similar to the following figure appears for the restore
destination.
Figure 62 Select restore location
5. Log in to the destination virtual machine to initiate the mounting of the backup.
6. After you successfully log in, select the restore location. If desired, specify a
new folder name in this location. Click Next.
Note: Additionally, you can select the Overwrite existing files and folders
option if you want to replace the existing files with the recovered files.
7. On the Select items to restore page, browse and select the files and folders
available for recovery. Note that you can sort items by Name, File size, or Date,
and you can also search for a specific file or folder name. To mark an item for
recovery, double-click the item, or drag and drop the item into the Selected
Items pane.
Within this window, you can also discover and select the total number of items
available for recovery by scrolling to the far right of the directory structure and
right-clicking the icon located on the vertical scroll bar, as shown in the
following figure.
Figure 64 Total items available for recovery
clicking the icon located in the upper right-hand corner of the window.
When you click the icon, the Restore Detail pane slides into view on the
right side of the window, displaying the ongoing restore operations. Clicking the
entry displays the progress of the restore and a recovery logs download option.
machine does not have any running SQL Instances, an error will be displayed. You may
select the SQL instance from this where you want to restore the database. The ability
to select a different SQL Instance is only possible for individual database restore, and
when performing SQL Instance restore you are restricted to selecting the original SQL
Instance.
NetWorker automates the complete restore of SQL databases, restoring the database
FULL and any transaction log backups as a single operation according to the following
sequence:
l The primary FULL database backup is identified, mounted on the original virtual
machine, and the SQL database files from the FULL backup are restored to the
original database.
l If a transaction log backup was selected, the series of transaction logs that
occurred after the FULL backup to the selected transaction log are restored in
sequence.
NetWorker automates the complete restore of SQL instances according to the
following sequence:
l The master database is restored first, then msdn, then model. During this
restore, the SQL instance restarts in single-user mode as required by the
Microsoft SQL Server to restore the master database. When the restore
completes, the SQL services restart in multi-user mode.
l Each remaining database is restored individually, and includes the backup versions
present in the currently selected backup.
The Dell EMC Data Protection Restore Client provides the ability to monitor the
restore operations while in progress by enabling the Polling feature, which is disabled
by default. Once enabled, when you click the icon, the Restore Detail pane slides
into view on the right side of the window, displaying the ongoing restore operations.
Clicking the entry displays the progress of the restore and a recovery logs download
option.
Microsoft SQL Server instances in the original virtual machine to allow SYSTEM
account login and membership in the SQL sysadmin role.
Procedure
1. Open a browser from the virtual machine that the SQL databases or instances
will be recovered to, and enter a URL that points to the NetWorker server host
and indicates file-level restore. For example:
The Dell EMC Data Protection Restore Client login window appears.
2. Select the User or Admin tab, and then select the App tab.
Note: For User mode recoveries, you must connect to the NetWorker
server from a web browser on the virtual machine that the SQL database or
instance will be restored to.
4. On the Select App Backups page, use the arrows to the right of the entry to
browse and select from the available SQL Server application-consistent
backups, including all SQL instances, databases, and backup versions.
To select a backup version, expand the SQL instance and database to display
the backup versions pane, and then click the backup version item once or drag
and drop the item to move the backup to the Selected Items pane. You may be
required to scroll right to view the backup versions.
To select a SQL database or instance, drag and drop the entry to move the item
to the Selected Items pane. Note that you cannot drag and drop the SQL
database or instance when the entry has been expanded to view its children. If
you expanded the entry, reselect the virtual machine, and then select the SQL
database or instance to enable drag-and-drop.
Note: The backup filter is set to the last seven days by default. You can
expand the date range further back if desired.
When the mount completes, all SQL instances running on the selected virtual
machine display in this window.
Note: If the SQL Server is not installed, or there are no SQL instances
running, an error displays. If this occurs, log out of the Dell EMC Data
Protection Restore Client to cancel the mount.
6. Select the SQL instance where you want to restore the database, and then click
Next.
The Restore Options page displays.
7. On the Restore Options page, set the Diagnostic logging level, if required.
The default level is 0.
8. Select Leave the DB in recovery state if you want to activate the SQL Server
NORECOVERY database restore option, which places the database in a
recovering state upon completion of the restore and is useful for special
situations such as restoring transaction log backups taken by third-party
applications. Note that this option is not available for SQL instance restore. This
option also overwrites the database and then leaves the database in restoring
state.
9. In the Target Database Name field, you can type a new name if you want to
change the name of the database, or leave the current name. By default, this
field displays the name of the database at the time of backup.
Note: If you change the database name, the new name must comply with
the Microsoft SQL Server rules for database naming. Also, if you change
the name and another database with the same name already exists on the
target virtual machine and SQL instance, a warning displays that this
database will be overwritten if you proceed.
10. For the restore location, select from one of the following options under Restore
files to:
l Original Location—Select this option to restore the database files to the
original, or current, location. This option is only available if the original virtual
machine and SQL instance were selected as the restore target. By default,
the files are restored to the database location as it was at the time of
backup. Note, however, that if the database file locations were changed
after the backup, the files will be restored to the changed location.
l Default data path—Select this option to restore the database files to the
default data path for the target SQL Server instance. Each SQL Server
instance has a configuration variable for the default database data path and
log file path. When you select this option, all SQL data files will be restored
to the default data path, and all log files will be restored to the default log
path.
l Folder —Allows you to specify the folders where you want to restore the
database and log files. With this option, you can specify two folder locations
on the target virtual machine; one folder to store all the data files for the
database, and another folder to store all the log files for the database. Click
Browse to navigate the file system on the target virtual machine and select
the desired folders. By default, both folder locations are populated with the
SQL default data paths for the target SQL Server instance. Note that you
can only select an existing folder and cannot create a new folder using the
Dell EMC Data Protection Restore Client.
11. Select Restore Stop At Time if you want to restore transaction logs from the
backup version that occurred before the specified restore date and time. This
option is only available when you select a specific transaction log backup.
12. Click Restore.
Note: A restore of individual SQL Server databases or instances in the Dell
EMC Data Protection Restore Client will overwrite the existing database.
13. In the Restore Confirmation dialog, click Yes to continue the restore and
overwrite the existing database, or No to exit the restore.
If you changed the name of the database and another database with the same
name already exists on the target virtual machine and SQL instance, an
additional warning displays that this database will be overwritten if you proceed.
If you changed the name of the database and the name does not match any
available databases on the target virtual machine and SQL instance, an
additional warning displays indicating that a new database will be created.
14. To enable the polling feature so that you can monitor the status of the restore,
click the hourglass icon located in the upper right-hand corner of the window
and set to ON. By default, the polling feature is set to OFF due to the memory
consumption that occurs when the server is queried every few seconds for the
restore status.
15. Once the polling feature is enabled, you can monitor the status of the restore by
clicking the icon located in the upper right-hand corner of the window.
When you click the icon, the Restore Detail pane slides into view on the
right side of the window, displaying the ongoing restore operations. Clicking the
entry displays the progress of the restore and a recovery logs download option.
For SQL database restore, a single line displays. For SQL instance restore, one
line per database displays. In both cases, the Target field indicates the database
associated with the progress line.
A prompt displays in the right pane with fields required to connect to the
NetWorker server.
3. For the NetWorker server, type the following information:
a. In the Username field, type the NetWorker administrator username.
b. In the Password field, type the NetWorker administrator password.
c. In the NetWorker Server field, type the IP address of the NetWorker
server.
d. In the Port field, type 9090.
Figure 71 NetWorker connection information in the vSphere Client
Results
When a connection to the NetWorker server is established, the Basic Tasks pane
appears, as shown in the following.
Figure 72 Dell EMC NetWorker Basic Tasks pane
Note: If this list does not contain a virtual machine that was recently backed
up, refresh the window.
3. From the Client pane, click the radio button next to the virtual machine that
you want to recover.
A list of available restore points for that virtual machine displays in the right
pane. You can also specify a date range to view only the virtual machine
backups that were performed within that range.
4. Within the Restore pane, click the radio button next to the desired restore
point.
5. In the top-right of the Restore pane, click the Action icon and select Restore
from the drop-down.
Figure 74 Select Restore from the Action drop-down
Note: If this list does not contain a virtual machine that was recently backed
up, refresh the window.
3. From the Client pane, click the radio button next to the virtual machine that
you want to recover.
A list of available restore points for that virtual machine display in the right
pane. You can also specify a date range to view only the virtual machine
backups that were performed within that range.
4. Within the Restore pane, click the radio button next to the desired restore
point.
5. In the top-right of the Restore pane, click the Action icon and select Restore
from the drop-down.
Figure 77 Select Restore from the Action drop-down
Note: If this list does not contain a virtual machine that was recently backed
up, refresh the window.
3. From the Client pane, click the radio button next to the virtual machine that
you want to recover.
A list of available restore points for that virtual machine displays in the right
pane. You can also specify a date range to view only the virtual machine
backups that were performed within that range.
4. Within the Restore pane, click the radio button next to the desired restore
point.
The Content pane displays the virtual disks available for recovery.
5. Select the checkbox next to the disk(s) in the Content pane that you want to
recover. When selected, the disk will appear in the Restore Selection pane.
6. Click the Action icon and select Restore from the drop-down.
WARNING When you start a VMDK recovery, the virtual machine will be
powered off automatically without issuing a warning message.
Results
You can monitor the progress of the recovery in the Recent Tasks pane. Once the
recovery completes successfully, power ON the virtual machine to validate the
recovery.
Note: If this list does not contain a virtual machine that was recently backed
up, refresh the window.
3. From the Client pane, click the radio button next to the virtual machine that
you want to recover.
A list of available restore points for that virtual machine display in the right
pane. You can also specify a date range to view only the virtual machine
backups that were performed within that range.
4. Within the Restore pane, click the radio button next to the desired restore
point.
5. Click the Action icon and select Restore from the drop-down.
Figure 83 Select Restore from the Action drop-down
7. Click Next.
The Advanced Config page displays.
8. Specify a name for the new virtual machine, and then click Next.
The Location page displays.
9. Expand the vCenter server tree and select a destination for recovery within the
vCenter server, and then click Next.
The Host/Cluster page displays.
10. Select a host within the destination datacenter, and then click Next.
The Resource Pool page displays.
11. Select a resource pool, and then click Next.
12. In the Summary page, review the information and then click Finish to start the
recovery.
Results
You can monitor the progress of the recovery in the Recent Tasks pane. Once the
instant restore completes, use storage vMotion to save the virtual machine, and then
cancel the vSphere NetWorker Recovery task to delete the datastore. Power ON the
virtual machine to validate the recovery.
4. Click Connect.
Results
When a connection to the NetWorker server is established, the Getting Started pane
appears.
Procedure
1. Login to the vSphere Web Client as an administrator.
2. In the vSphere Web Client, click VM Backup and Recovery in the left pane.
When a connection to the NetWorker server is established, the Getting
Started pane appears.
3. Click Restore to open the Restore pane.
A list of virtual machines available for recovery displays.
Figure 86 Virtual machines for recovery in the Restore pane
If you do not see the virtual machine backup listed, refresh the window.
4. Browse the list of virtual machines and select the virtual machine backup you
want to recover. You can expand the virtual machine backup to view a list of
restore points from which to select.
Figure 87 Select a restore point
5. Select one of the restore points by clicking the checkbox next to the backup
time, and then click Restore.
The Restore Backup wizard launches.
6. In the Set Restore Options page of the Restore Backup wizard, leave the
default Restore to original location selected and click Next.
8. Specify a datastore for the virtual machine, and then click Next.
9. In the Ready to Complete page, click Finish to start the recovery.
Results
You can monitor the progress of the recovery in the Running tab of the Recent Tasks
pane. Once the recovery completes successfully, power ON the virtual machine to
validate the recovery.
7. In the Select Backup page, verify that the correct VMDK is selected and click
Next.
8. In the Set Restore Options page, uncheck the default Restore to original
location and then click Next.
9. Click Choose to browse the existing virtual machine where the VMDK needs to
be restored in the vCenter.
Figure 91 Set Restore Options for VMDK recovery
10. Specify a datastore for the VMDK, and then click Next.
11. In the Ready to Complete page, click Finish to start the recovery.
Results
You can monitor the progress of the recovery in the Running tab of the Recent Tasks
pane.
Note: When you start a VMDK recovery, the virtual machine will be powered off
automatically without issuing a warning message.
Results
You can monitor the progress of the recovery in the Running tab of the Recent Tasks
pane. Once the instant access recovery completes, use storage vMotion to save the
virtual machine, and cancel the vSphere NetWorker Recovery task to delete the
datastore. Power ON the virtual machine to validate the recovery.
Note: NetWorker 18.x releases do not feature a new version of the VADP proxy.
For VADP, NetWorker 18.x only supports recoveries that were configured in a
previous release. The NetWorker Online Compatibility Guide available on the Dell
EMC Online Support site at https://support.emc.com/products/1095_NetWorker
provides the most up-to-date compatibility information.
This chapter contains the following topics:
'HKEY_LOCAL_MACHINE/SOFTWARE/Wow6432Node/VMware, Inc./VMware
Virtual Disk Development Kit'
Transport modes
The VADP proxy host supports advanced transport modes for image-level recovery.
You can set the configured network transport mode to the following values during
recovery:
l SAN (Storage Area Network)—Selecting this mode completely offloads the CPU,
memory or I/O load on the virtual infrastructure. The I/O is fully offloaded to the
storage layer where the data is read directly from the SAN or iSCSI LUN.
SAN mode requires a physical proxy with SAN access, and the VMs need to be
hosted on either Fibre Channel or iSCSI-based storage. The corresponding VMFS
volumes must be visible in the Microsoft Windows Disk Management snap-in of
the VADP proxy host.
l Hotadd—In this mode, the I/O happens internally through the ESX I/O stack using
SCSI hot-add technology. This provides better I/O rates than NBD/NBDSSL.
However, selecting this mode places CPU, memory and I/O load on the ESX
hosting the VADP proxy.
Hotadd mode requires a virtual proxy, and the ESX hosting the virtual proxy should
have access to all the datastores where the VMs are hosted So, if the datastores
are SAN/iSCSI/NFS and if the ESX server where the VADP proxy resides is
separate from the ESX server where the VMs are hosted, then:
n In the case of SAN LUNs the ESX hosting the proxy and the ESX hosting the
VMs should be part of the same fabric zones.
n In the case of iSCSI LUNs the ESX hosting the proxy and the ESX hosting the
VMs should be configured for the same iSCSI-based storage targets.
n In the case of NFS datastores, the ESX hosting the proxy and the ESX hosting
the VMs should be configured for the same NFS mount points.
l NBD (Network Block Device): in this mode, the CPU, memory and I/O load gets
directly placed on the ESX hosting the production VMs, because the data has to
move through the same ESX and reach the proxy over the network. NBD mode
can be used either for physical or virtual proxy, and also supports all storage types.
l NBDSSL (Network Block Device with SSL): NBDSSL transport mode is the same
as NBD except that the data transferred over the network is encrypted. Data
transfer in NBDSSL mode can therefore be slower and use more CPU due to the
additional load on the VADP host from SLL encryption/decryption.
You can set multiple transport modes to be used by the VADP proxy host using the
pipe symbol “|” (for example, san|nbd|nbdssl).
By default, the transport mode field in the NetWorker User program is blank. Specify
one transport mode to use for recovery.
More information on configuring transport modes is provided in Configuring the VADP
proxy host and Hypervisor resource. The transport modes are outlined in the table
Table 15 on page 221.
attributes into all the VADP proxy client instances. Note, however, that when a
virtual proxy is used, it cannot be created by copying the template of other VMs
that are being protected.
If vCenter is configured in the environment, there must be a Hypervisor resource for
the vCenter server hosting the VMs that use VADP. You may also need to create a
Hypervisor resource if you cannot use VMware View in the NMC NetWorker
Administration window.
If vCenter is not configured in the environment, there must be a Hypervisor resource
created for each server in the environment.
You must create the corresponding Hypervisor resource in the NetWorker server prior
to starting the VADP recovery.
Creating a NetWorker client for the VADP Proxy host by using the Client
properties windows
About this task
Procedure
1. In the NMC NetWorker Administration Protection window, right-click
Clients, and select New.
The Create Client dialog box displays.
2. Select the General tab.
3. In the Name attribute field, type the name of the proxy.
4. Select the Apps and Modules tab, shown in the following figure.
VADP_HYPERVISOR=any.vc
VADP_HYPERVISOR=another.vc
VADP_BACKUPROOT=G:\mnt
VADP_TRANSPORT_MODE=Hotadd
6. Click OK.
Assigning the VADP User role to the user specified in the NetWorker
Hypervisor resource
About this task
Note: Refer the appropriate VMware Basic System Administration or Datacenter
Administration Guide documentation for steps to assign a role to user.
VMware documentation can be found at http://www.vmware.com/support/pubs/
Procedure
1. Log in to the vCenter Server with Administrator privileges using vSphere Client.
2. Select the vCenter server in the left pane.
3. Click the Permissions tab in the right pane.
4. Right-click inside the right pane and select Add Permission.
5. Add the NetWorker Hypervisor user and assign the VADP User role.
6. Ensure Propagate to Child Objects is enabled and click OK.
Setting Privileges
Global l Cancel task
l Licenses
l Log Event
l Settings
Setting Privileges
Virtual machine > Configuration l Add existing disk
l Add new disk
l Add or Remove device
l Advanced
l Change CPU count
l Change Resource
l Disk change Tracking
l Disk Lease
l Extend virtual disk
l Host USB device
l Memory
l Modify device settings
l Raw device
l Reload from path
l Remove disk
l Rename
l Reset guest information
l Settings
l Swapfile placement
l Upgrade virtual machine compatibility
Setting Privileges
l Update task
Procedure
1. Launch the NetWorker User program on the NetWorker server or VADP proxy.
2. Browse the file system for the VM client and select file to recover, as outlined in
the NetWorker Administration Guide’s Recovery chapter.
3. Set the destination directory to the CIFS share of the VM client.
4. Recover the files onto the CIFS share.
5. At the VM client, move the files from the CIFS share to the appropriate
directory.
Note: The user must have the Remote Access All Clients privilege.
used to recover the VM image. If the current Datazone pass phrase was created
after a password-protected backup was performed, you must provide the
password that was in effect when the VM image was originally backed up.
5. In the VADP Restore dialog box, type the following information depending on
the type of recovery and then click the Start button.
Restore to VMware vCenter (VC):
VADP:datastore=”config=stor1#disk1=stor2#disk2=stor3”
recover.exe -S 413546679 -o
VADP:host=esxDemo1.emc.com;
VADP:transmode=Hotadd
Recover VMs that have a mix of VADP image-level and traditional guest based backups
If your VMs have a mix of both VADP image level backups and traditional guest based
(also known as client based) backups, you may have to use the following recovery
procedure.
Example
The following VM (host name mars) has a mix of both VADP and traditional guest
based backups. This example shows how to recover a traditional backup save set on
the VM by first locating the time of the backup save set using the mminfo command
and then by using that time with the recover command. The host name of the
NetWorker server in this example is jupiter.
full FULLVM
kuma-6.RO Data Domain mars 5/24/2011 10:59:22 PM 5243 MB 1440475890
cb full FULLVM
C:\recover -t "5/24/2011 10:38:39 PM" -s jupiter -c mars
Notice that in the previous example output from the mminfo command, the first two
lines listed are for traditional backup and the last two lines are for a VADP backup,
which is denoted with the save set name, FULLVM. The NetWorker Command
Reference Guide provides more information about using the recover command to mark
(select) files and to perform the recovery.
DISKPART
SAN POLICY=OnlineALL
Note: After the recovery is successful, SAN POLICY can be changed back
to the default value (SAN POLICY=offline or SAN POLICY=offlineshared).
After this entry has been added, run the following command in the VADP proxy
host to verify that the IPv4 address is being resolved:
C:\Users\Administrator>ping <vCenter hostname>
VMDirectPath restrictions
The following restrictions apply during the configuration of VMDirectPath:
l The ESX host must be rebooted after VMDirectPath is enabled.
l The VM must be powered down when VMDirectPath is enabled in order to add the
PCI/PCIe device directly to the VM.
l Using Fibre Channel tape drives in a VM is not supported without VMDirectPath in
production environments due to the lack of SCSI isolation. Tape drives can be
configured and used without VMDirectPath, but the support is limited to non-
production environments.
The VMware knowledge base article http://kb.vmware.com/kb/1010789 provides
information on configuring VMDirectPath.
The following features are not available for a VM configured with VMDirectPath, as
the VMkernel is configured without the respective device under its control when
passed to a VM:
l vMotion
l Storage vMotion
l Fault Tolerance
l Device hot add (CPU and memory)
l Suspend and resume
l VADP Hotadd transport mode (when used as virtual proxy)
Note: If using VMDirectPath in a NetWorker VADP virtual proxy host, then the
transport modes are limited to either NBD or NBDSSL. This is due to a
VMware limitation.
The following technical note provides additional information on VMDirectPath:
http://www.vmware.com/pdf/vsp_4_vmdirectpath_host.pdf
l If other VMs that reside on the same ESX/ESXi are sharing the underlying
hardware (physical CPU), it may be required to add more vCPU and dedicating
underlying hardware by using CPU affinity settings.
l To achieve optimal performance, it is recommended that the guest VM acting as
the DSN has a minimum of 4 GB of memory available with 2 vCPUs allocated.
l If multiple target sessions are needed in each device and 4 or more vCPUs are
assigned to the VM, ensure that there are enough devices available for backup
operations. An insufficient amount of devices can result in less throughput due to
CPU scheduling overhead of the Hypervisor.
l Ensure that the device drivers for the HBA are updated on the guest operating
system.
Note: Ensure that you select Remove from virtual machine and not
Remove and delete… when unmounting.
This appendix describes how to protect the vCenter server Appliance (VCSA) and the
Platform Services Controllers (PSC). It is intended for virtual administrators who
utilize the distributed model of the vCenter server and require protection of the
complete vCenter server infrastructure.
l It is recommended to schedule the backup of the vCenter server when the load on
the vCenter server is low, such as during off-hours, to minimize the impact of
vCenter virtual machine snapshot creation and snapshot commit processing
overhead.
l Ensure that there are no underlying storage problems that might result in long stun
times.
l Keep the vCenter virtual machine and all of its component virtual machines in one
single isolated protection policy. The protection policy should not be shared with
any other virtual machines. This is to ensure that the backup times of all vCenter
Server component virtual machines are as close to each other as possible.
l If using one or more external Platform Services Controllers, it is recommended to
have one dedicated vProxy associated to the workflow for the entire vCenter
server virtual machines backup. This will ensure that the backup times of all
vCenter Server component virtual machines are as close to each other as possible.
l Set the maximum Hotadd session limit of the dedicated vProxy to an appropriate
number to avoid queuing of backups. It is recommended to set the maximum
Hotadd session limit to 25 and the maximum NBD session limit to 0 (zero).
l Ensure that the backup start time of the vCenter Server does not overlap with any
operations for other protected virtual machines being managed by this vCenter so
Procedure
1. In the NMC NetWorker Administration Recover window, select Recover >
New from the main menu.
The Recover Configuration wizard opens on the Select the Recovery Type
page. Virtual Machine Recovery is the second option displayed in the
Recovery Type pane.
2. In the Select the Recovery Type page, select Virtual Machine Recovery, and
then select a vCenter server to recover from using the Source vCenter server
drop-down. Click Next.
3. In the Select the Virtual Machine to Recover page, enter the name of the
source virtual machine(s) to recover from, or perform a search for the virtual
machine. Additionally, you can use the tabs on this page to choose a single
virtual machine or multiple virtual machines from a selected backup, or browse
the source vCenter to determine the required virtual machine source. After
selecting the desired virtual machine(s), click Next.
4. In the Select the Target Backups page, select the virtual machine backup(s)
you want to restore from the Available Backups pane. This pane lists both
primary backups and, if available, clone copies. If you selected recovery from
multiple virtual machines, you can switch between virtual machines to browse
each machine's available backups by using the Virtual Machine Name drop-
down. Click Next.
5. In the Select the Virtual Machine Recovery method page, select Emergency
recovery, and then click Next.
6. In the Configure the Emergency Recovery page, specify the target ESXi
server in the vCenter environment, and then click Connect. The Proxy
Selection and Recovery Data panes get populated with the ESXi server details
7. In the Proxy Selection pane, if a proxy is not discovered, add a new proxy
which is deployed in vCenter but not added to NetWorker.
8. For the disks in the Recovery Data pane, select a datastore, and then
optionally, select the Power on virtual machine and Reconnect to network
options. Click Next.
9. In the Select Alternate Recovery Sources page, select the original disk backup
or select a clone copy if one is available. If recovering from a clone that is not on
a Data Domain device, or recovering from a Data Domain Cloud Tier device,
specify the staging pool. Click Next.
10. In the Perform the Recovery page, specify a name for the recovery and check
the summary at the bottom of the page to ensure all the details are correct, and
then click Run Recovery.
11. After the recovery operation, wait until the virtual machine restarts, and then
log into the vCenter Server Appliance shell as root
12. Verify that all PSC and vCenter services are running.
l For an appliance, run the service-control --status --all command in
the appliance shell.
l For a vCenter installed on Windows, from the Windows Start menu, select
Control Panel > Administrative Tools > Services.
After you finish
During an Emergency Recovery, the vProxy gets associated with the ESXi host and is
unavailable for other operations on the vCenter server. Wait until the recovery
completes before initiating any other operations on the vProxy.
1. Create one lifecycle group and add the vCenter virtual machine and PSC virtual
machine to the group. This will ensure that snapshots are taken at the same time.
2. Ensure that you select the full virtual machine and not individual disks.
3. Run the scheduled or on-demand (ad-hoc) policy.
Note: Ensure that you back up all vCenter server and PSC instances at the same
time
Recovery
Depending on the failure, you can perform virtual machine recovery by using one of
the following methods:
l Restore to original — This method is valid only when the VCSA is intact and
running, but corrupted.
l Recover as a new virtual machine to a managed ESXi server: Use this method of
you have completely lost your VCSA. Note that this vCenter must be registered
with NetWorker.
l Emergency recovery to an ESXi server. For Emergency recovery, perform the
steps specified in the section Restore an embedded PSC with Emergency
Recovery.
Note: In the event of a complete environment failure, PSC should be restored
first, followed by the vCenter server restore.
The following scenarios provide specific instructions based on the number of vCenter
server appliances and external PSCs in the environment and the extent of the failure.
vCenter server appliance(s) with one external PSC where PSC fails
Procedure
1. Perform an image-level recovery of the PSC by using one of the methods
indicated above, and then power ON the virtual machine.
2. Verify that all PSC services are running.
l For a PSC deployed as an appliance, run the service-control --status
--all command in the appliance shell.
l For a PSC installed on Windows, from the Windows Start menu, select
Control Panel > Administrative Tools > Services.
3. Log into the vCenter server appliance shell as root.
4. Verify that no vCenter services are running, or stop any vCenter services that
are running by typing service-control --stop.
5. Run the vc-restore script to restore the vCenter virtual machines.
l For a vCenter server appliance, type vcenter-restore -u
psc_administrator_username -p psc_administrator_password
l For a vCenter Server installed on Windows, navigate to C:\Program
Files\VMware\vCenter Server\, and then run vcenter-restore -u
psc_administrator_username -p psc_administrator_password
vCenter server appliance with multiple PSCs where one PSC is lost, one
remains
Procedure
1. Repoint the vCenter instance (insert link) to one of the functional PSC in the
same SSO domain.
Note: Log in to all vCenter servers one by one to determine which vCenter
log in fails. This will be the vCenter that requires the repoint steps.
Note: If the login test to any vCenter server appliance fails, then the
restored PSC is not the PSC that the vCenter server appliance is pointing
to, in which case you may be required to perform a repoint, as described
above.
5. Deploy the new PSC and join to an active node in the same SSO domain and
site.
6. Repoint vCenter connections as required
Additional considerations
Review the following additional considerations when backing up and restoring the
vCenter server and PSC.
l Backing up the vCenter server will not save the Distributed switch (vDS)
configuration as it is stored on the hosts. As a best practice, back up the vDS
configuration by using a script that can be used after restoring the virtual center.
l After restoring the PSC, verify that replication has been performed as designed by
using the following commands to display the current replication status of a PSC
and any of the replication partners of the PSC:
n For VCSA, go to /usr/lib/vmware-vmdir/bin and type ./vdcrepadmin -
f showpartnerstatus -h localhost -u administrator -w
Administrator_Password
n For Windows, open a command prompt and type cd "%VMWARE_CIS_HOME
%"\vmdird\
l For the vCenter server or PSC, do not select advanced quiesce-based backup
options. Selecting these options will result in application quiescing on virtual
machines, which impacts the overall environment due to stunning.
The VMware vCenter server documentation, available at https://
docs.vmware.com/en/VMware-vSphere/index.html, provides more information about
the vCenter server and PSC.
Command reference
Use the following command to start or stop services in the vCenter server/PSC, or
obtain the status:
service-control -status/start/stop -all
You can use other Replication topology commands, as in the following example.
/usr/lib/vmware-vmdir/bin/vdcrepadmin -f showpartners -h
localhost -u PSC_Administrator -w password
Note: You can replace localhost with another PSC FQDN to obtain all of the
partnerships in the current vSphere domain.
Prerequisites
Domain Name System (DNS) resolution is critical for NetWorker deployment and
configuration. All infrastructure components should be resolvable through a fully
qualified domain name (FQDN). This is especially important for the NetWorker Server,
NetWorker vProxy, Data Domain appliance, and CloudBoost appliance. Resolvable
means that components are accessible through both forward (A) and reverse (PTR)
look-ups.
Review the following prerequisites prior to configuring NetWorker in a VMware Cloud
on AWS. Also, ensure that you plan your firewall according to these prerequisites.
VMware Cloud on AWS web portal console
In the VMware Cloud on AWS web portal console, note the following requirements:
l If using NSX-T, configure the DNS to resolve to the internal IP address of the
vCenter server. Navigate to SDDC Management > Settings > vCenter FQDN and
select the Private vCenter IP address so that you can directly access the
management network over the built-in firewall. Additionally, ensure that you open
TCP port 443 of the vCenter server in both the management gateway and the
compute gateway.
l By default, there is no external access to the vCenter Server system in your SDDC
(Software Defined Data Center). You can open access to your vCenter Server
system by configuring a firewall rule. Set the firewall rule in the compute gateway
of VMware Cloud on AWS to enable communication to the vCenter public IP
address from the desired logical network of your SDDC. The NetWorker server will
not allow you to add the vCenter Server if this firewall rule is not configured in the
SDDC.
l The default compute gateway firewall rules prevent all virtual machine traffic from
reaching the internet. To allow your NetWorker Server virtual machine to connect
to the internet, you need to create a compute gateway firewall rule to allow
outbound traffic on the logical network that your NetWorker Server virtual
machine is connected to.
l Configure DNS to allow machines in your SDDC to resolve fully-qualified domain
names (FQDNs) to IP addresses belonging to the internet. The NetWorker Server
will not allow you to add the vCenter Server using the server's public FQDN or IP
address if the DNS server is not configured in your SDDC.
l It is recommended that you deploy the Data Domain system as a virtual appliance
in the Amazon VPC (Virtual Private Cloud) of your choice. During the SDDC
creation, ensure that you connect your SDDC to an AWS account, and select a
VPC and subnet within that account.
l The Data Domain system running in your Amazon VPC must be connected to your
VMware SDDC by using the VMware Cloud Elastic Network Interfaces (ENIs),
allowing your SDDC and services in the AWS VPC and subnet in your AWS
account to communicate without requiring the routing of traffic through the
internet gateway. The same ENI channel is recommended for access to Data
Domain systems (for the vProxy solution) and access to cloud object storage (for
the CloudBoost solution). Detailed steps on configuring ENI are provided by
VMware at https://vmc.vmware.com/console/aws-link.
l Ensure that you configure the inbound and outbound firewall rules of your
compute gateway for Data Domain connectivity if DDVE is running in your Amazon
VPC.
Amazon AWS web portal
In the AWS web portal, note the following requirements:
l Configure the inbound and outbound firewall rules of your Amazon VPC security
group to provide connectivity between the VMware SDDC compute gateway and
Data Domain connectivity if Data Domain is running in your Amazon VPC.
l If cloning from one Data Domain system to another, ensure that you configure the
inbound rule for the security group in AWS to allow all traffic from the respective
private IPs of Data Domain Virtual Editions running in your Amazon VPC.
l If you have more than one Data Domain running in AWS to perform cloning, then
ensure that both Data Domain systems can ping each other using the FQDNs.
vCenter server inventory
In the vCenter Server inventory of your SDDC, note the following requirements:
l An internal DNS name lookup server must be running inside the vCenter inventory.
This will be referenced by all the workloads running in the VMware SDDC.
l The internal DNS server must have Forwarders enabled to access the internet.
This is required in order to resolve the vCenter Server's public FQDN
8. On the Review details window, review the product details such as the product
name, version, vendor, publisher, and download size, and then click Next.
9. On the License agreements window, review and accept the EULA, and then
click Next.
10. On the Select storage window, select the disk format and the destination
datastore where the virtual appliance files will be stored, and then click Next.
It is recommended that you select Thick Provision Lazy Zeroed to ensure that
amount of storage space allocated to the virtual appliance is available.
11. On the Select networks window, select the Destination Network. Provide the
IP address in the text box and click Next.
12. On the Customize template window, expand Networking properties, and then
specify the following attributes:
a. In the Network IP address field, specify the IP address for the vProxy
appliance.
b. In the Default gateway field, specify the IP address of the gateway host.
c. In the Network Netmask/Prefix field, specify the netmask for an IPv4
Network IP address.
d. In the DNS field, specify the IP address of the DNS servers, separated by
commas.
e. In the FQDN field, specify the fully qualified domain name of the vProxy
appliance.
13. Expand Timezone settings, and then perform the following tasks:
a. in the Timezone setting field, select the time zone.
b. SSH into the vProxy appliance using root credentials and run the following
command: /usr/bin/timedatectl set-timezone new-timezone.
Note: To set a time zone outside of the list supported by the vProxy
appliance, you need to change the time zone manually.
14. Expand Password settings, and then perform the following tasks:
a. In the Root password field, specify a password for the root account or leave
the field blank to use the default password. The default password is
changeme.
b. In the Admin password field, specify a password for the admin account or
leave the field blank to use the default password. The default password is
a3dp@m8n.
15. Click Next.
The Ready to Complete window displays.
16. On the Ready to Complete window, review the deployment configuration
details, and then click Finish.
Results
The Deploying template task appears in the vCenter and provides status information
about the deployment.
l Add the vCenter Server to the NetWorker Server using either the public FQDN of
the vCenter Server or the public IP address of the vCenter Server. It is
recommended to use the FQDN.
l When adding the vCenter Server to the NetWorker Server, specify the login
credentials for the cloudadmin user
l When configuring the vProxy in the NetWorker Server, set the Maximum NBD
sessions for the vProxy to zero. VMware Cloud on AWS does not support NBD
transport mode.
Composites
xy x followed by y
x|y x or y (prefer x)
Repetitions
x* zero or more x, prefer more
x{n} exactly n x
Repetitions
x{n}? exactly n x
Note: The counting forms x{n,m}, x{n,}, and x{n} reject forms that create a
minimum or maximum repetition count above 1000. Unlimited repetitions are not
subject to this restriction.
Grouping
(re) numbered capturing group (submatch)
Flags
i case-insensitive (default false)
\A at beginning of text
\z at end of text
Escape sequences
\a bell ( ≡ \007 )
\n newline ( ≡ \012 )
Escape sequences
\* literal * , for any punctuation character *
\s whitespace ( ≡ [\t\n\f\r ] )
Cc control
Cf format
Co private use
Cs surrogate
L letter
Ll lowercase letter
Lm modifier letter
Lo other letter
Lt titlecase letter
Lu uppercase letter
M mark
Mc spacing mark
Me enclosing mark
Mn non-spacing mark
N number
Nd decimal number
Nl letter number
P punctuation
Pc connector punctuation
Pd dash punctuation
Pe close punctuation
Pf final punctuation
Pi initial punctuation
Po other punctuation
Ps open punctuation
S symbol
Sc currency symbol
Sk modifier symbol
Sm math symbol
So other symbol
Z separator
Zl line separator
Zp paragraph separator
Zs space separator
\D not \d VIM
\W not \w VIM
NetWorker 18.2 does not support the VMware Backup appliance (VBA) solution. If you
have VBA backups from previous Networker releases, you can recover those backups
from the NetWorker Management Web UI by using the vProxy, however, the
recovery types available in this UI are limited to a Revert or New Virtual Machine
restore. For other recovery types, such as VMDK-level, you can continue to use the
vSphere Web Client EMC Backup and Recovery user interface.
This appendix includes the following topics:
2. In EMC Backup and Recovery, on the Restore tab, use the Restore points
from drop-down to select the appliance from which you want to restore.
EMC Backup and Recovery displays the virtual machines that are available to
restore.
3. Click the virtual machine that you want to restore to expand its backups.
Use the Filter drop-down to display a specific VM and related items. You can
also click a backup to display the VMDK level and select a single VMDK for
restore, if you only want to restore that disk.
4. Select a backup, and then click Restore.
The Restore Backup wizard launches.
5. On the Select Backup page, verify that the list of backups is correct. Remove
any backup that you want to exclude, and click Next.
6. On theSet Restore Options page, perform one of the following tasks:
l Select the Restore to original location option to restore the backup to its
original location. If the VMDK file still exists at the original location, the
restore process overwrites the file.
l Unselect the Restore to original location option, and specify a new name
and destination where the virtual machine or VMDK will be restored.
7. Optionally, select Advanced options to set the VM to Power On and
Reconnect NIC after the restore process completes.
Note: Reconnect NIC is enabled by default and greyed out. Only when you
select Power On are you given the option to clear the Reconnect NIC
option.
8. Click Next.
9. On the Ready to complete page, verify the selections. The wizard displays a
summary of the number of machines that will be replaced (restore to the
original location) and the number of machines that will be created (restore to a
new location).
10. To change any of the settings for your restore request, either use the Back
button to return to the appropriate screen, or click the appropriate numbered
step title to the left of the wizard. If the settings are correct, then click Finish.
The Restore Backup wizard displays a message that the restore process
initiated successfully.
11. Click OK.
You can monitor the restore progress by using the Recent Tasks pane.
Note: If you selected Reconnect NIC during the restore process, then
confirm the network configuration for the newly-created virtual machine.
Once the restore completes, the new virtual machine NIC might use the
same IP address as the original virtual machine, which will cause conflicts.
Results
When the recovery starts, a recovery session also displays in NMC. Any activities that
occur on the vCenter side are visible on the NMC side.
backups, the same as you would perform a typical FULLVM restore. No further
configuration is required to use this feature.
About this task
The Instant Access restore operation has the following limitations:
l The free space on the Data Domain system must be equal to or greater than the
total disk size of the VM being restored, as the restore does not take into account
the actual space required after deduplication occurs. If there is insufficient disk
space, an error appears indicating "Insufficient disk space on datastore," and
creation of the target VM fails.
l You cannot use the Instant Access button when you select more than one
different Data Domain system backup for multiple VMs.
l You can perform only one Instant Access restore at a time. Ensure that you
vMotion the VM to a different datastore and that you unmount the datastore
before performing another instant access restore for the Data Domain system.
l You cannot recover multiple save sets concurrently using Instant Access restore.
Procedure
1. In the EMC Backup and Recovery user interface, select the Restore tab.
EMC Backup and Recovery displays the virtual machines that are available to
restore.
2. Click a virtual machine to expand the list of available backups, from which to
restore.
Note: You cannot browse and select backup data at the disk level.
3. Select the backup that you want to restore, and click Instant Access.
The Instant Access wizard opens to the Select Backup page.
Figure 103 Select a backup
4. Verify that the list of backups is correct, remove any backups that you want to
exclude from the restore, and click Next.
The Set Instant Access Options page displays.
5. Specify a new name and destination for the restore, and click Next.
The Ready to complete page displays.
Figure 105 Ready to complete
This glossary contains terms related to disk storage subsystems. Many of these terms
are used in this manual.
Backup proxy The system designated as the off-host backup system. This is a host with NetWorker
client package installed and the VADP software.
changed block tracking A VMkernel feature that keeps track of the storage blocks of virtual machines as they
change over time. The VMkernel keeps track of block changes on virtual machines,
which enhances the backup process for applications that have been developed to take
advantage of VMware’s vStorage APIs.
checkpoint A system-wide backup, taken only after 24 hours (and at the time of the checkpoint
after that first 24 hours have elapsed), that is initiated within the vSphere Web Client
and captures a point in time snapshot of the EMC Backup and Recovery appliance for
disaster recovery purposes.
client Host on a network, such as a computer, workstation, or application server whose data
can be backed up and restored with the backup server software.
client file index Database maintained by the NetWorker server that tracks every database object, file,
or file system backed up. The NetWorker server maintains a single index file for each
client computer. The tracking information is purged from the index after the browse
time of each backup expires.
EMC Backup and The EMC Backup and Recovery appliance (or VMware Backup Appliance) is an
Recovery Appliance appliance that, when deployed, enables VMware backup and clone policy creation in
NMC, and enables the EMC Backup and Recovery plug-in in the vSphere Web Client to
assign VMs to those policies.
EMC Data Protection A browser that allows for file-level restores, where specific folders and files are
Restore Client restored to the original virtual machine on Windows and Linux virtual machines.
file-level restore (FLR) Allows local administrators of protected virtual machines to browse and mount backups
for the local machine. From these mounted backups, the administrator can then restore
individual files. FLR is accomplished using the EMC Data Protection Restore Client. See
“Using File Level Restore” on page 63 for additional information on FLR.
hotadd A transport mode where the backup related I/O happens internally through the ESX I/O
stack using SCSI hot-add technology. This provides better backup I/O rates than NBD/
NBDSSL.
inactivity timeout Time in minutes to wait before a client is considered to be unavailable for backup.
JAR (Java Archive) A file that contains compressed components needed for a Java applet or application.
managed application Program that can be monitored or administered, or both from the Console server.
media database Database that contains indexed entries of storage volume location and the life cycle
status of all data and volumes managed by the NetWorker server.
metadata VSS-defined information that is passed from the writer to the requestor. Metadata
includes the writer name, a list of VSS components to back up, a list of components to
exclude from the backup, and the methods to use for recovery. See writer and See VSS
component.
NBD A transport mode over LAN that is typically slower than hotadd mode. In NBD mode,
the CPU, memory and I/O load gets directly placed on the ESX hosting the production
VMs, since the backup data has to move through the same ESX and reach the proxy
over the network. NBD mode can be used either for physical or virtual proxy, and also
supports all storage types.
NBDSSL A transport mode that is the same as NBD except that the data transferred over the
network is encrypted. Data transfer in NBDSSL mode can therefore be slower and use
more CPU due to the additional load on the VADP host from SLL encryption/
decryption.
NetWorker administrator NetWorker server user who may add, change, or delete NetWorker server users.
NetWorker Management Software program that is used to manage NetWorker servers and clients. The NMC
Console (NMC) server also provides reporting and monitoring capabilities for all NetWorker processes.
NetWorker server Computer on a network that runs the NetWorker server software, contains the online
indexes, and provides backup and restore services to the clients and storage nodes on
the same network.
online indexes Databases located on the NetWorker server that contain all the information pertaining
to the client backups (client file index) and backup volumes (media index).
Open VM Tools Open VM Tools (open-vm-tools) is the open source implementation of VMware Tools
for Linux guest operating systems.
recover To restore data files from backup storage to a client and apply transaction (redo) logs
to the data to make it consistent with a given point-in-time.
SAN (storage area A transport mode that, when used, completely offloads the backup related CPU,
network) memory or I/O load on the virtual infrastructure. The backup I/O is fully offloaded to
the storage layer where the data is read directly from the SAN or iSCSI LUN. SAN
mode requires a physical proxy.
save NetWorker command that backs up client files to backup media volumes and makes
data entries in the online index.
save set 1. Group of tiles or a file system copied to storage media by a backup or snapshot
rollover operation.
2. NetWorker media database record for a specific backup or rollover.
single step backup and See image level backup and recovery.
recovery
storage node Computer that manages physically attached storage devices or libraries, whose backup
operations are administered from the controlling NetWorker server. Typically a
“remote” storage node that resides on a host other than the NetWorker server.
update enabler Code that updates software from a previous release. It expires after a fixed period of
time.
VADP An acronym for vStorage APIs for Data Protection. VADP enables backup software to
perform centralized virtual machine backups without the disruption and overhead of
running backup tasks from inside each virtual machineVADP supersedes the VCB
framework for VMware backups.
vCenter An infrastructure management tool that provides a central point for configuring,
provisioning, and managing virtualized IT environments, and is part of the VMware
Virtual Infrastructure package.
Virtual machine Software that creates a virtualized environment between the computer platform and its
operating system, so that the end user can install and operate software on an abstract
machine.
VMDK Virtual Machine Disk (VMDK) is a file or set of files that appears as a physical disk drive
to a guest operating system. These files can be on the host machine or on a remote file
system. These files are commonly called VMDK files because of the .vmdk extension
that VMware adds to these files.
VMware Backup The VMware Backup Appliance (or EMC Backup and Recovery appliance) is an
Appliance appliance that, when deployed, enables VMware backup and clone policy creation in
NMC, and enables the EMC Backup and Recovery plug-in in the vSphere Web Client to
assign VMs to those policies.
VMware Tools Installed inside each virtual machine, VMware Tools enhance virtual machine
performance and add additional backup-related functionality.
VSS (Volume Shadow Microsoft technology that creates a point-in-time snapshot of a disk volume.
Copy Service) NetWorker software backs up data from the snapshot. This allows applications to
continue to write data during the backup operation, and ensures that open files are not
omitted.
writer Database, system service, or application code that works with VSS to provide metadata
about what to back up and how to handle VSS components and applications during
backup and restore. See VSS (Volume Shadow Copy Service).