Docu 81578
Docu 81578
User Guide
302-003-201
REV 03
Copyright © 2001-2018 Dell Inc. or its subsidiaries. All rights reserved.
Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.“ DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED
IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.
Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners.
Published in the USA.
Dell EMC
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.DellEMC.com
Figures 7
Tables 9
Preface 11
Chapter 1 Introduction 17
Data protection overview............................................................................ 18
Image backup................................................................................. 18
Guest backup................................................................................ 20
Considerations............................................................................... 21
Changed block tracking.............................................................................. 23
Image backup virtual machine quiescing..................................................... 23
Image backup and recovery support in Amazon Web Services (AWS)........24
Chapter 3 Administration 51
Clients and containers................................................................................ 52
Dynamic versus static containers.................................................. 52
Chapter 4 Backup 63
Limitations..................................................................................................64
Performing an on-demand backup..............................................................65
Set advanced plug-in options in the AUI........................................ 67
Scheduling backups....................................................................................69
Automatically including virtual machines in a group....................... 69
Log truncation backups.............................................................................. 72
Scheduled backups with Microsoft SQL log truncation..................72
Scheduled backups with Microsoft Exchange log truncation......... 74
Monitoring backups.................................................................................... 75
Canceling backups......................................................................................75
Support for vCenter HA failover for inflight backups.................................. 76
Chapter 5 Restore 77
Overview.................................................................................................... 78
Image and file-level restore guidelines........................................................ 78
File-level restore supported configurations....................................78
Performance improvements for file-level restore...........................79
Limitations.................................................................................................. 79
Restoring the full image or selected drives to the original virtual machine....
81
Restoring the full image or selected drives to a different virtual machine... 82
Restoring specific folders or files to the original virtual machine................ 84
Restoring the full image or selected drives to a new virtual machine.......... 86
Restoring specific folders or files to a different virtual machine................. 88
Instant access............................................................................................ 89
Restoring the virtual machine........................................................ 90
Performing post-restore migration and clean-up........................... 92
Mounting Windows VMDKs from an image backup.....................................92
Configuring the recovery target machine...................................... 92
Restoring and mounting the Windows VMDKs...............................93
Monitoring restores.................................................................................... 94
Canceling restores......................................................................................94
What is validated........................................................................... 96
VM Backup Validation groups........................................................ 96
Performing an on-demand backup validation..............................................96
Scheduling backup validations.................................................................... 98
Glossary 139
1 Revision history........................................................................................................... 11
2 Typographical conventions..........................................................................................12
3 Guest backup installation resources........................................................................... 20
4 Default vCenter certificate locations.......................................................................... 30
5 Minimum required vCenter user account privileges.................................................... 32
6 Example chart for gathering proxy information...........................................................45
7 Example chart for gathering proxy information, continued......................................... 45
8 Avamar Administrator icons and what they mean....................................................... 53
9 Image restore toolbar buttons.................................................................................... 78
10 Important vCenter management infrastructure components.....................................103
11 Minimum required ESX host user account privileges..................................................110
12 Required vSphere data ports.....................................................................................124
13 Backup options for Avamar VMware Image plug-in................................................... 130
14 Restore options for Avamar VMware Image plug-in.................................................. 132
As part of an effort to improve its product lines, EMC periodically releases revisions of
its software and hardware. Some versions of the software or hardware currently in
use do not support every function that this document describes. The product release
notes provide the most up-to-date information on product features.
If a product does not function correctly or does not function as described in this
document contact an EMC technical support professional.
Note
This document was accurate at publication time. Go to EMC Online Support (https://
support.EMC.com) to find the latest version of this document.
Purpose
This publication describes various methods and strategies for protecting VMware
virtual machines.
Audience
The information in this publication is intended for system administrators familiar with:
l Basic Avamar system administration principles, and procedures found in the
Avamar Administration Guide
l Other Avamar client software information (primarily installation, and configuration
procedures) found in various Avamar client guides
Related documentation
The following EMC publications provide additional information:
l Avamar Compatibility and Interoperability Matrix
l Avamar Release Notes
l Avamar Administration Guide
l Avamar Operational Best Practices Guide
NOTICE
The Notice convention emphasizes important information about the current topic.
Note
The Note convention addresses specific information that is related to the current
topic.
Typographical conventions
In this document, EMC uses the typographical conventions that are shown in the
following table.
Monospace font with bold Type yes. Use for user input.
typeface
l Technical notes provide technical details about specific product features, including
step-by-step tasks, where necessary.
l White papers provide an in-depth technical perspective of a product or products
as applied to critical business issues or requirements.
Knowledgebase
The EMC Knowledgebase contains applicable solutions that you can search for either
by solution number (for example, esgxxxxxx) or by keyword.
To search the EMC Knowledgebase:
1. Click Search at the top of the page.
2. Type either the solution number or keywords in the search box.
3. (Optional) Limit the search to specific products by typing a product name in the
Scope by product box and then selecting the product from the list that appears.
4. Select Knowledgebase from the Scope by resource list.
5. (Optional) Specify advanced options by clicking Advanced options and specifying
values in the available fields.
6. Click Search.
Online communities
Go to EMC Community Network at http://community.EMC.com for peer contacts,
conversations, and content on product support and solutions. Interactively engage
online with customers, partners, and certified professionals for all EMC products.
Live chat
To engage EMC Customer Support by using live interactive chat, click Join Live Chat
on the Service Center panel of the Avamar support page.
Service Requests
For in-depth help from EMC Customer Support, submit a service request by clicking
Create Service Requests on the Service Center panel of the Avamar support page.
Note
To open a service request, you must have a valid support agreement. Contact an EMC
sales representative for details about obtaining a valid support agreement or with
questions about an account.
To review an open service request, click the Service Center link on the Service
Center panel, and then click View and manage service requests.
Enhancing support
EMC recommends that you enable ConnectEMC and Email Home on all Avamar
systems:
l ConnectEMC automatically generates service requests for high priority events.
l Email Home sends configuration, capacity, and general system information to EMC
Customer Support.
Comments and suggestions
Comments and suggestions help EMC to continue to improve the accuracy,
organization, and overall quality of the user publications. Send comments and
suggestions about this document to DPAD.Doc.Feedback@emc.com.
Please include the following information:
Introduction 17
Introduction
Image backup
Image backup uses VMware vStorage API for Data Protection (VADP) to protect
virtual machine data.
Image backup is fully integrated with vCenter Server to provide detection of virtual
machine clients, and enable efficient centralized management of backup jobs.
Figure 1 Image backup diagram
Proxies
Image backups and restores require deployment of proxy virtual machines within the
vCenter.
Proxies run Avamar software inside a Linux virtual machine, and are deployed using an
appliance template (.ova) file or the Proxy Deployment Manager.
Once deployed, each proxy provides these capabilities:
l Backup of Microsoft Windows and Linux virtual machines (entire images or
specific drives)
l Restore of Microsoft Windows and Linux virtual machines (entire images or
specific drives)
l Selective restore of individual folders and files to Microsoft Windows and Linux
virtual machines
Each proxy is capable of performing eight simultaneous backup or restore operations,
in any combination.
Proxies are allowed in any part of the Avamar Administrator account management tree
except the vCenter Server domain or subdomains. Additionally, you should not
activate proxies into the root domain (/), as this will cause problems during system
migration.
Although it is possible to restore across datacenters (that is, use a proxy deployed in
one datacenter to restore files to a virtual machine in another datacenter), restores
take noticeably longer than if the proxy and the target virtual machine are both
located in the same datacenter. Therefore, for best performance, use the Proxy
Deployment Manager to recommend the ideal deployment configuration.
Snapshots
The image backup process requires temporary creation of a virtual machine snapshot.
If the virtual machine is running at the time of backup, this snapshot can impact disk
I/O and consume disk space on the datastore in which the virtual machine resides.
Snapshot creation and deletion can take a long time if the virtual machine runs a heavy
disk I/O workload during backup
Avamar image backup supports the following types of virtual disks:
l Flat (version 1 and 2)
l Raw Device Mapped (RDM) in virtual mode only (version 1 and 2)
l Sparse (version 1 and 2)
Other virtual disk types are not supported.
Image backup 19
Introduction
Guest backup
Guest backup protects virtual machine data by installing Avamar client software on
the virtual machine just as if it were a physical machine, then registering and
activating that client with an Avamar server. No special configuration is required.
Note
When registering virtual machine clients protected by guest backup, do not register
them to a vCenter domain. Doing so prevents the administrator from locating or
managing that virtual machine in Avamar Administrator. Instead register any virtual
machine clients protected by guest backup to some other domain or subdomain (for
example, /clients).
The following table lists Avamar client guides, which provide detailed instructions for
installing Avamar client software in virtual machines.
Client Publication
IBM AIX file systems Avamar Backup Clients User Guide
IBM DB2 databases hosted on IBM AIX, Red Avamar for IBM DB2 User Guide
Hat and SUSE Linux, and Microsoft Windows
Microsoft Office SharePoint implementations Avamar for SharePoint VSS User Guide
Microsoft SQL Server databases Avamar for SQL Server User Guide
Client Publication
Oracle databases hosted on IBM AIX, Red Avamar for Oracle User Guide
Hat, and SUSE Linux, Sun Solaris, and
Microsoft Windows
Considerations
These are the various considerations of using either image or guest backup to protect
virtual machine data.
Ease of implementation
Image backup:
l Can leverage vCenter to discover virtual machines, and add them to the Avamar
server in batches.
l Requires a moderate amount of initial setup and configuration.
Guest backup:
l Supports any virtual machine running an operating system for which Avamar client
software is available.
l Supports applications such as DB2, Exchange, Oracle, and SQL Server databases.
l Easily fits into most existing backup schemes; day-to-day backup procedures do
not change.
l Avamar client software must be individually installed, and managed inside each
virtual machine.
Efficiency
Image backup:
Considerations 21
Introduction
frequent or on-demand full image backup might be used to protect the full machine.
This scheme accommodates scenarios with limited backup windows.
In order to support using both image and guest backup to protect the same virtual
machine, you must configure the Avamar MCS to allow duplicate client names.
Crash-consistent quiescing is the least desirable level of quiescing because the virtual
disk image being backed up is consistent with what would occur by interrupting power
to a physical computer. File system writes might or might not be in progress when
power is interrupted. Because of that, there is always a chance of some data loss.
File system-consistent quiescing is more desirable because the virtual machine is
allowed to complete any file system writes before the disk is backed up. This level of
quiescing is only available on Windows virtual machines capable of providing Windows
Volume Snapshot Service (VSS) services, and that are running VMware Tools.
Application-consistent quiescing is the most desirable level of quiescing because, in
addition to the advantages provided by file system-consistent quiescing, applications
are notified that a backup has occurred so that they can clear their transaction logs.
Application-consistent quiescing is only available on Windows Vista/2008 and later
virtual machines that are running VMware Tools.
l Best practices.................................................................................................... 28
l (Optional) Configuring support for multiple vCenters........................................ 28
l Installing Avamar Administrator software...........................................................29
l Configuring vCenter-to-Avamar authentication................................................. 29
l Creating a dedicated vCenter user account........................................................ 31
l Adding a vCenter client...................................................................................... 34
l Auto-discovery of virtual machines.................................................................... 35
l Deploying proxies............................................................................................... 38
l Upgrading proxies.............................................................................................. 43
l Maintaining proxies............................................................................................ 48
l Additional Avamar server configuration..............................................................49
Best practices
Follow these best practices when configuring your system.
Verify ESX and vCenter certificates
Use properly registered certificates from a trusted provider that match DNS names
for ESX and vCenter.
Use fully qualified ESX Server hostnames
When adding new ESX Servers to vCenter environments, you should adhere to the
VMware recommended practice of naming ESX Servers with fully qualified hostnames
(not an IP address or simple hostname). Using anything other than a fully qualified
hostname can result in network connection failures due to incorrect SSL certificate
handling.
Recommendations for high change-rate clients
When protecting high change rate clients, such as database hosts, use guest backup,
or store image backups on a Data Domain system.
Linux /etc/vmware-vpx/ssl/rui.crt
where alias is a user-defined name for this certificate, which can often be the
file name.
7. Type the keystore password.
8. Type yes, and press Enter to trust this certificate.
9. (Optional) If you will be protecting more than one vCenter with this Avamar
server, add those vCenter certificates now.
cd /usr/local/avamar/lib
cp rmi_ssl_keystore rmi_ssl_keystore.date
Note
The user account must be added to the top (root) level in each vCenter you intend to
protect.
Procedure
1. Create a vCenter user account with privileges listed in the following table.
Note
You must create this user account at the vCenter level. If you create it at any
other level (for example, at a datacenter level), backups will fail.
l Configure
l Power on
l Reset
l VMware Tools install
vApp l Export
l Import
l vApp application configuration
c. Type the vCenter web services listener data port number in the Port field.
443 is the default setting.
d. Type the vCenter user account name in the User Name field.
e. Type the vCenter user account password in the Password field.
f. Type the vCenter user account password again in the Verify Password field.
g. (Optional) To enable auto-discovery of VMs on the vCenter, select Enable
dynamic VM import by rule. Auto-discovery of virtual machines on page
35 contains more information.
h. (Optional) If Enable dynamic VM import by rule is selected, determine
whether to enable Change Block Tracking for imported VMs by selecting
Enable change block tracking.
i. (Optional) Type a contact name in the Contact field.
j. (Optional) Type a contact telephone number in the Phone field
k. (Optional) Type a contact email address in the Email field.
l. (Optional) Type a contact location in the Location field.
5. Click OK.
Results
Adding a vCenter client in Avamar Administrator automatically:
l Adds the vCenter client to the Default Group.
However, this client is not activated as normal Avamar clients are. Therefore, no
backups are performed for it on behalf of the Default Group.
l Creates vCenter Server domain hierarchy.
l Creates a VirtualMachines subdomain within that vCenter Server domain
hierarchy.
l Creates a Default Virtual Machine Group.
This group performs scheduled backups for the target virtual machines. This group
cannot be deleted without first deleting the virtual center domain.
If the vCenter was already registered as a normal backup client (for example, to
support guest level backup), attempting to add that same vCenter as a vCenter client
will fail because the system will not allow you to register the same client twice. If this
occurs, you must:
1. Retire the existing vCenter client in Avamar Administrator.
2. Add the vCenter as a vCenter client (using this procedure).
3. Reinvite the retired vCenter client as a normal client to support guest level backup
from the vCenter Server.
b. Enter the domain that the auto-discovered VM should be included in. If the
domain entered here does not exist, it will be automatically created.
6. To add additional domain mapping rules, click Add Domain Mapping.
This allows for multiple domain mapping rules, which will select different VMs
on the vCenter to map to different Avamar domains under the vCenter client.
7. Click OK when the vCenter client configuration is complete.
Creating a rule
Rules are used to automatically map auto-discovered VMs to domains, and to assign
backup policies to auto-discovered VMs. Rules use one or more filtering mechanisms
to determine whether VMs qualify under the rule.
There are three mechanisms to open the New Rules dialog box:
l During vCenter client configuration, by selecting Enable dynamic VM import by
rule and then selecting New Rule... from the Rule drop-down list in the Domain
Mapping list.
Note
The VM Tag selection is only available with vCenter 6.0 and greater.
Creating a rule 37
Configuration and Setup
Best practice for rule creation is to ensure that rules are mutually exclusive, to
avoid the situation where a VM might qualify under multiple rules.
Deploying proxies
Deploy one or more proxies on each vCenter you intend to protect with image backup.
Functional overview
Proxy Deployment Manager assists administrators with proxy deployment by offering
a recommendation as to the number of proxies that should be deployed in each
vCenter, and a recommended ESX host location for each proxy.
When generating a recommendation, Proxy Deployment Manager performs a static
point-in-time analysis of the virtual infrastructure. This analysis gathers data about the
virtual infrastructure, such as the number of virtual machines, the number of
datastores, and the number of virtual machines hosted in each datastore.
Users specify a data change rate and backup window duration for their site.
Proxy Deployment manager then calculates the optimum number of proxies required
to back up those virtual machines in the time allotted by the backup window. Proxy
Deployment Manager also considers the datastore and ESX host topology, and
suggests an optimal ESX host location for each proxy so that all datastores are
protected.
This calculated proxy deployment topology is offered as a recommendation. This
recommendation can be accepted as offered, or modified to meet specific site
requirements.
Before proxies can be deployed, each recommended proxy must be configured by
specifying:
l Proxy name
l Avamar server domain where the proxy will reside
l Proxy IP address
l Datastore assignment
l Network settings:
n Which existing virtual network to use
n DNS server(s)
n Network gateway
n Network mask
After all proxies are configured, clicking Apply creates the proxy virtual machines with
the specified configuration settings.
You can generate new proxy deployment recommendations at any time. This is useful
for periodically reevaluating and optimizing proxy deployments when significant
changes have occurred in the virtual infrastructure.
1. Open a command shell and log in to the Avamar server as user admin.
2. Switch user to root by typing su - .
3. Open /etc/vcs/dm.properties in a UNIX text editor.
4. Change the proxy_ingest_rate_gb_per_hour setting.
5. Save your changes and close /etc/vcs/dm.properties.
Protecting against proxy over commit
By default, each Avamar proxy is configured to allow 8 concurrent backup jobs. This
setting is known to work well for most customer sites.
EMC recommends against increasing the number of concurrent jobs to more than 8
because it can lead to a condition in which too many backup jobs are queued for a
given proxy (proxy over commit). This causes uneven distribution of backup jobs
among proxies, and can also cause a bottleneck in which backup jobs to take longer to
complete than they otherwise might.
Some sites might benefit from configuring some proxies to allow fewer concurrent
backup jobs. This generally requires deploying additional proxies, but can result in
more even distribution of backup jobs among proxies, as opposed to concentrating or
clustering backups in a certain area of the virtual infrastructure.
Optimization for level-1 incremental change block backups
When Proxy Deployment Manager generates a proxy deploy recommendation, it does
so by calculating how many proxies are required to sustain normal backup operations.
One of the assumptions about normal backup operation is that backups will be level-1
incremental or changed block backups, not level-0 full backups.
Level-0 backups inherently take longer and use more proxy resources. Therefore,
large new virtual machine deployments can adversely affect the ability to complete all
required backups in the time allotted by the backup window.
For this reason, whenever possible phase-in large new virtual machine deployments in
order to give the system an opportunity to ingest the necessary level-0 backups.
If a phased-in deployment is not possible, another approach is to tolerate the failed
backups that will occur due to proxy over commit. Once the system begins to settle,
proxy resources will be under committed, and those virtual machines will eventually be
backed up. Administrators should monitor the situation closely to ensure that the
system does settle and that the virtual machines eventually do successfully back up.
Note
Avamar will attempt to deploy proxies where needed, but it is impossible to know all
details about the environment so it is important you verify the proxy deployment
manager does not over allocate proxies beyond the maximum supported.
Note
You must be prepared to specify the proxy name, IP address, fully qualified DNS
server name or IP address, network gateway and network mask for each proxy
you add.
Upgrading proxies
Upgrading Avamar proxies from release 7.2 or newer
Use this procedure to upgrade Avamar proxies from release 7.2 or newer to release 7.3
or newer.
Procedure
1. In Avamar Administrator, select VMware > Proxy Deployment Manger.
The Proxy Deployment Manger window appears.
2. Choose a vCenter.
Existing proxies in the topology tree for the selected vCenter that need to be
upgraded will be indicated with a ! symbol as well as a tooltip that indicates that
the proxy has an update pending.
3. Click Apply to upgrade the proxies.
Upgrading proxies 43
Configuration and Setup
l VM client
n IP address
n Gateway
n DNS servers
n Netmask
l Policy
n Domain
n Datastores protecting
n Group membership
The following example charts demonstrate how this information should be gathered
prior to upgrading proxies:
Viewing VM configuration
Procedure
1. In the vSphere Client or vSphere Web Client, navigate to VMs and Templates
view.
2. Locate existing proxies. For each proxy:
a. Note the VM and folder names.
b. Select the Summary tab.
c. Note the host, storage (datastore) and network.
d. Right click and select Edit Settings....
l If using the vSphere Web Client, navigate to the vApp Options tab and note
the IP, gateway, DNS, and netmask.
l If using the vSphere Client (Windows):
a. Navigate to the Options tab.
Key Value
vami.ip0.EMC_Avamar_Virtual_Machine_Combined_Proxy IP address
vami.gateway.EMC_Avamar_Virtual_Machine_Combined_Proxy Gateway
vami.DNS.EMC_Avamar_Virtual_Machine_Combined_Proxy DNS
servers
vami.netmask0.EMC_Avamar_Virtual_Machine_Combined_Proxy Netmask
Maintaining proxies
Reregistering a proxy with an Avamar server
Use these instructions to reregister an existing proxy with an Avamar server.
Procedure
1. Launch the vSphere Client or vSphere Web Client, and log in to the vCenter
Server.
2. Locate the proxy you want to reregister.
3. Right click Power > Shut Down Guest.
4. Click Yes to confirm that you want to shut down the guest operating system.
5. Right click Power > Power Off.
6. Click Yes to confirm that you want to power off the proxy virtual machine.
7. Right-clickOpen Console.
A console window appears.
8. Right click Power > Power On.
9. Monitor the console window until the following message appears:
Please press a key now if you want to re-register this
proxy with Avamar Administrator. Continuing in 10
seconds...
10. Click inside the console window and press Enter.
11. Type the Avamar server DNS name, and then press Enter.
12. Type an Avamar server domain name, and then press Enter.
The default domain is “clients.” However, your Avamar system administrator
may have defined other domains, and subdomains. Consult your Avamar system
administrator for the domain you should use when registering this client.
Note
Administration 51
Administration
Note
Empty containers such as a folder or resource pool are allowed to be added to MCS.
When VMs or vApps are added to a container, they are automatically protected by
Avamar. During a backup, MCS will skip a container if it is empty.
Icon Description
vCenter Servers
Unactivated
Note
Icon Description
Powered off.
Template.
Proxies
Disabled
Unactivated.
Other entities
vCenter folder.
vApp.
Resource pool.
l Typing one or more characters filter field only shows clients that contain
those characters.
l
Clicking the button splits the two panes vertically.
Note
Resource pools are not visible in the VMs & Templates tab. They are only
visible in the Hosts & Clusters tab.
l VMware entities that already exist as Avamar clients are grayed out.
l Proxy virtual machines cannot be selected.
l For each VMware entity, the following information is shown in the right
properties pane:
n Name—Entity name.
n Location—Folder location.
l The following information is shown in the right properties pane for virtual
machines:
n Guest OS—Virtual machine operating system.
n Server—ESX Server or cluster hostname where the virtual machine
resides.
n Template—Whether or not the virtual machine is a template.
n Powered On—Whether or not the virtual machine is currently powered
on.
n Changed Block—Whether or not changed block tracking is turned on.
5. In the tree, select a folder that contains a VMware entity.
Contents of the folder are listed in the right properties pane.
6. (Optional) To view all entities within the selected folder, select Show sub-
entities.
7. In the right properties pane, select a folder, resource pool, virtual machine or
vApp.
8. If adding a container, set the Dynamic checkbox to make this a dynamic
container, or set the Static checkbox to make this a static container.
9. To enable changed block tracking, select Enable changed block tracking.
If changed block tracking is not enabled, each virtual machine image must be
fully processed for each backup, which might result in unacceptably long
backup windows, or excessive back-end storage read/write activity.
Note
Enabling changed block tracking will not take effect until any of the following
actions occur on the virtual machine: reboot, power on, resume after suspend,
or migrate.
Results
Connections to the vCenter can be stopped, started, and restarted. Stop the
connections for vCenter upgrades, and start them when the upgrade has completed. If
vCenter is shutdown, connections become invalid and must be reestablished. If this
occurs, Avamar Administrator cannot display the vCenter structure or virtual
machines.
ssh-agent bash
ssh-add ~admin/.ssh/admin_key
8. Stop the MCS by typing dpnctl stop mcs.
9. Start the MCS and the scheduler by typing:
3. Click the Options tab, and then click Show Advanced Options.
4. If the client supports Network usage throttle, type a nonzero value in the
Network usage throttle (Mbps) field.
Begin with a low value such as 20. Then monitor the next backup session to
verify that this has resolved any ESX Server CPU usage issues.
5. Click OK.
Groups
Groups have important behavioral differences when used with image backup and
restore.
Virtual machines VM-1 and VM-2 store their data in DATASTORE-1 and
DATASTORE-2, respectively.
Within Avamar Administrator, proxies have been assigned to protect vCenter
datastores as follows:
l PROXY-1 has been assigned to DATASTORE-1 and DATASTORE-2
l PROXY-2 has been assigned to DATASTORE-2
l PROXY-3 has been assigned to DATASTORE-3
Datastore assignments are made at the proxy level in the Edit Client dialog box.
A group (GROUP-1) is created, to which virtual machines VM-1 and VM-2 are added.
In order to protect these virtual machines, proxies must also be added to the group as
follows:
l PROXY-1, because it is assigned to both DATASTORE-1 and DATASTORE-2, can
protect both VM-1 and VM-2.
l PROXY-2, because it is only assigned to DATASTORE-2, is optional as long as
Proxy-1 exists in the group.
l PROXY-3, because it is only assigned to DATASTORE-3, cannot protect either
VM-1 or VM-2.
Every group must include enough proxies to support all the datastores assigned to
every client. Otherwise, when a backup is initiated and a proxy cannot be located to
perform the backup, the backup will fail with an Activity monitor status of no proxy.
Note
Click Show sub-domain clients to show all available virtual machine clients.
l Limitations......................................................................................................... 64
l Performing an on-demand backup..................................................................... 65
l Scheduling backups........................................................................................... 69
l Log truncation backups...................................................................................... 72
l Monitoring backups............................................................................................75
l Canceling backups............................................................................................. 75
l Support for vCenter HA failover for inflight backups..........................................76
Backup 63
Backup
Limitations
These are the known limitations of Avamar for VMware image backup.
All backups must be initiated from Avamar Administrator
All image backups must be initiated from Avamar Administrator. You cannot initiate
backups from the virtual machine or proxy.
Changing a virtual machine's disk configuration forces a full backup
Changing a virtual machine’s disk configuration (either adding or removing a disk),
causes the next entire image backup to be processed as a full backup (that is, all
virtual disks are processed and changed block tracking is not used), which will require
additional time to complete. Backups of specific disks are not affected, unless that
disk is previously unknown to Avamar.
Version 8 or higher virtual machines with disks on multiple datastores
If backing up a hardware version 8 or 9 virtual machine that has multiple disks residing
on different datastores, not all datastores will be checked for orphaned snapshots.
The only known remedy is to reconfigure the virtual machine such that all virtual disks
reside on the same datastore.
Backups involving physical RDM disks
When backing up a virtual machine that has both virtual disks and physical RDM disks,
the backup will successfully process the virtual disks, bypass the RDM disks, and
complete with the following event code:
Event Code: 30929
Category: Application
Severity: Process
Summary: Virtual machine client contains disks that cannot be
backed up or restored.
ContainerClients domain
The ContainerClients domain is a special system domain, which is populated with
virtual machines residing in VMware container entities. Avamar assumes that when
you add a VMware container to Avamar, that you will always manage the container
and all virtual machines within it as a single object. Therefore, if only you add these
virtual machines to a backup group as individual machines, rather than adding the
parent VMware container, they will not be backed up.
Nested container limitations
When backing up a VMware container that contains other containers (that is, a nested
container structure), Avamar only backs up the top-level of the hierarchy. Consider
the following example nested container structure:
Figure 4 Example nested container structure
When vApp-1 is backed up to Avamar, the vApp backup image will only contain virtual
machine backup images for vm-1 and vm-2. When vApp-1 backup is restored, only
vm-1 and vm-2 data will be restored. vApp-2 and vm-3 containers will also be present
but will not contain any data.
h. To run a script before the vmdk snapshot, type the full path and filename of
the script that will be run. Also ensure that the script timeout is sufficient for
the script to complete.
i. To run a script after the backup completes and the vmdk snapshot is
removed, type the full path and filename of the script that will be run. Also
ensure that the script timeout is sufficient for the script to complete.
j. To run a script after the backup completes and the vmdk snapshot is
removed, type the full path and filename of the script that will be run. Also
ensure that the script timeout is sufficient for the script to complete.
k. For the Windows WMware Image plug-in only, for the Snapshot quiesce
timeout (minutes) option, enter the number of minutes to wait before a
snapshot quiesce operation is considered to have failed.
l. If performing an image backup of a Microsoft SQL server, select the type of
authentication:
l NT Authentication uses the credentials entered in Guest Credentials
for authentication.
l Application Authentication uses the SQL Server Username and SQL
Server Password to log into the SQL server.
Note
Page file exclusion is supported only for Windows Servers version 2008 R2 and
above. For client versions of Windows, this option has no effect. The page file is
included in backups of Windows clients, regardless of this setting.
6. To exclude deleted file blocks from the backup, select Exclude deleted file
blocks when performing image backup on Windows VM.
7. For the Exclude files with path and filter field, type the files that you want to
exclude.
Note
If you exclude a file during backup, and then try a restore of the excluded file,
the excluded is visible but unstable.
8. To store this backup on a Data Domain system, select the Store backup on
Data Domain System checkbox, then select a Data Domain system from the
list.
9. From the Encryption method to Data Domain system list, select the
encryption method to use for data transfer between the client and the Data
Domain system during the backup.
10. For the Windows VMware Image plug-in only, select one or more Snapshot
Quiesce Options. The options include the following:
l Fail backup on snapshot quiesce error.
l If VMware tools are not running, mark completed backup as 'Complete w/
Exception' (applications are not quiesced).
11. For the Max times to retry snapshot detele option, type the maximum number
of times that a snapshot delete operation should be tried.
12. In Guest Credentials, type a virtual machine guest OS user account name and
password with sufficient privileges to run scripts before or after the backup.
For log truncation backups of Exchange servers, guest credentials must have
administrator privileges. If multiple VMs are backed up, the same credentials
must be used for all VMs.
13. To run a script before the vmdk snapshot:
a. Type the full path and filename of the script that is run.
b. Ensure that the script timeout is sufficient for the script to complete.
14. To run a script after the backup completes and the vmdk snapshot is removed:
a. Type the full path and filename of the script that is run.
b. Ensure that the script timeout is sufficient for the script to complete.
15. For the Windows VMware Image plug-in only, in the Snapshot quiesce timeout
(minutes) filed, type the number of minutes to wait before a snapshot quiesce
operation is considered to have failed.
16. If performing an image backup of a Microsoft SQL server, select the type of
authentication:
l NT Authentication uses the credentials that are entered in Guest
Credentials for authentication.
l Application Authentication uses the SQL Server Username and SQL
Server Password to log in to the SQL server.
17. If performing an image backup of a Microsoft SQL server, identify the post-
action options:
l Type the maximum number of minutes to wait before post-action operations
are considered to have failed in the Post Action Timeout (minutes) option.
l Select the type of post-action operation. LOG Truncation performs log
truncation after the backup has successfully completed.
l All disks of the VM must be selected for on-demand backup or log truncation
will not occur.
18. If performing an image backup of a Microsoft Exchange server, select the type
of post-action operation. LOG Truncation performs log truncation after the
backup has successfully completed.
19. Click FINISH.
Scheduling backups
Scheduled backups run automatically to ensure that backups occur on an ongoing
basis. You can schedule backups to run daily, weekly, or monthly.
Procedure
1. Create a dataset for the backups.
2. Create a group for the backups.
During the group creation process, you:
Note
Scheduling backups 69
Backup
Procedure
1. Create a new group as described in Scheduling backups on page 69.
2. At the Include clients page page of the wizard, select Enable automatic
member selection by rule.
3. From the Rule dropdown menu, do one of the following:
l Select an existing rule.
l Select New Rule....
If New Rule... is selected, create a new rule as described in Creating a new
rule on page 70.
VMs that have been automatically assigned to this group via rule selection will
be listed as Included (by rule) in the Membership column.
4. To include clients in this group that have not been automatically assigned to the
group, click Include.
VMs that have been manually assigned to this group through this mechanism
will be listed as Included (by user) in the Membership column.
Note
5. To exclude clients in this group that have been automatically assigned to the
group, click Exclude.
Note
Procedure
1. Open the New Rules dialog box by using one of the listed mechanisms.
2. Type a name for the rule.
3. In the Rule Definition area, select whether the rule should match Any of the
listed filter mechanisms, or All of them.
This selection allows you to configure multiple different filters to select VMs,
and to determine how these filters interact with one another to select the
correct VMs. For example, you might create a filter that uses a VM folder path
to select VMs, and another filter that uses a VM naming convention. This option
can then be used as follows to determine which VMs are included under this
rule:
l To include only VMs that are in the defined folder path and also follow the
naming convention, select All. This step excludes VMs that are in the folder
path but that do not follow the naming convention, and also excludes VMs
that follow the naming convention but are not in the folder path.
l Alternatively, to include any VMs that are either in the VM folder path or
that follow the naming convention, select Any.
Note
The VM Tag selection is only available with vCenter 6.0 and greater.
j. For Microsoft SQL Server post action, identify the post-action options:
l Enter the maximum number of minutes to wait before post-action
operations are considered to have failed in the Post Action Timeout
(minutes) option.
l Select the Type of post-action operation. LOG Truncation performs log
truncation after the backup has successfully completed.
k. Complete other information in the Options tab as necessary and click OK.
The Avamar Administration Guide contains further information about creating
and configuring datasets.
l. Click Close.
2. If multiple guest VMs are being backed up as part of this group, create a rule
that is used to select the appropriate VMs that have log truncation performed.
Creating a new rule on page 70 contains instructions for creating a rule.
3. Create a group for the backups.
During the group creation process, you:
Click Close.
2. If multiple guest VMs are being backed up as part of this group, create a rule
that is used to select the appropriate VMs that have log truncation performed.
Creating a new rule on page 70 contains instructions for creating a rule.
3. Create a group for the backups.
During the group creation process, you:
Monitoring backups
You can monitor backups to ensure that the backups complete successfully and to
troubleshoot issues. The Activity Monitor in Avamar Administrator enables you to view
status information for both on-demand and scheduled backups.
Procedure
1. In Avamar Administrator, click the Activity launcher button.
The Activity window appears.
2. Click the Activity Monitor tab.
A list of all activities appears.
3. To filter the results to display only backup activity, select Actions > Filter.
The Filter Activity dialog box appears.
4. Select All Backups from the Type list.
5. Click OK.
Canceling backups
You can cancel a backup any time before it completes. The cancellation might take
five minutes or longer. The backup may complete before the cancellation finishes.
Procedure
1. In Avamar Administrator, click the Activity launcher button.
The Activity window appears.
2. Click the Activity Monitor tab.
A list of all activities appears.
3. Select the backup from the list.
4. Select Actions > Cancel Activity.
A confirmation message appears.
5. Click Yes.
Monitoring backups 75
Backup
l Overview............................................................................................................ 78
l Image and file-level restore guidelines................................................................78
l Limitations......................................................................................................... 79
l Restoring the full image or selected drives to the original virtual machine.......... 81
l Restoring the full image or selected drives to a different virtual machine.......... 82
l Restoring specific folders or files to the original virtual machine........................ 84
l Restoring the full image or selected drives to a new virtual machine..................86
l Restoring specific folders or files to a different virtual machine.........................88
l Instant access.................................................................................................... 89
l Mounting Windows VMDKs from an image backup............................................ 92
l Monitoring restores............................................................................................94
l Canceling restores............................................................................................. 94
Restore 77
Restore
Overview
Image backup offers three levels of restore functionality: image restore, file-level
restore, and the capability to mount specific drives from a Windows image backup in
order to support application-level recovery.
Three buttons are provided above the Select for Restore contents pane, which are
not shown if a non-VMware image backup is selected:
When performing an image restore, the Restore Options dialog box is slightly
different from the typical Restore Options dialog box. The primary differences are
that virtual machine information is shown and three choices for restore destinations
are offered:
l Original virtual machine
l Different (existing) virtual machine
l New virtual machine
Once the destination selection is made, each procedure varies slightly from that point
forward.
Target VM: server cannot reach proxy: proxy via https due to
incorrect network configuration. Restoration process may take
significantly longer time. Press ‘continue’ to start the restore.
where:
l server is the name of the Avamar server.
l proxy is the name of the proxy.
Select Yes to continue the restore operation using file copy. The restore will take
significantly longer.
Note
Limitations
These are the limitations of restoring data from an image backup.
All restores must be initiated from Avamar Administrator
All restores from image backups must be initiated from Avamar Administrator. You
cannot initiate restores from the virtual machine or proxy.
When vApp-1 is backed up to Avamar, the vApp backup image will only contain virtual
machine backup images for vm-1 and vm-2. When vApp-1 backup is restored, only
vm-1 and vm-2 will be present.
Two interim solutions exist for this limitation:
l Flatten the container structure.
For example, move vm-3 under vApp-1. Then all three virtual machines will be
backed up when vApp-1 is backed up.
l Add both vApp-1 and vApp-2 to Avamar as separate container entities so that they
can be backed up separately.
When restoring, restore vApp-1 first, then restore vApp-2 into vApp-1
Restoring the full image or selected drives to the original virtual machine 81
Restore
Note
When restoring an image backup to the original virtual machine, the Configure
Destination button is disabled (grayed out).
10. (Optional) If you want to restore VMware configuration files, select Restore
virtual machine configuration.
11. (Optional) Optionally select a proxy to perform restore.
The default setting is Automatic, which enables the Avamar server to choose
the best proxy for this operation.
12. Click More Options.
The Restore Command Line Options dialog box appears.
13. Select or clear Use Changed Block Tracking (CBT) to increase performance.
14. From the Encryption method from Data Domain system list, select the
encryption method to use for data transfer between the Data Domain system
and the client during the restore.
15. Select one of the following settings in the Select Post Restore Options list:
l Do not power on VM after restore.
l Power on VM with NICs enabled.
l Power on VM with NICs disabled.
16. (Optional) To include additional plug-in options with this restore, type Enter
Attribute and Enter Attribute Value settings.
17. Click OK on the Restore Command Line Options dialog box.
18. Click OK on the Restore Options dialog box.
The following status message appears: Restore initiated.
19. Click OK.
20. If the restore target virtual machine will be using changed block tracking for
future backups, enable changed block tracking by performing any of the
following actions on that virtual machine: reboot, power on, resume after
suspend, or migrate.
A list of Avamar clients appears in the pane under the domains list.
b. From the list of clients, select the virtual machine client or VMware
container.
5. Select a backup:
a. Click the By Date tab.
b. Select the backup date from the calendar. Valid backups occurred on dates
with a yellow highlight.
A list of backups on that date appears in the Backups table next to the
calendar.
c. Select a backup from the Backups table.
6. Click the Browse for Image Restore button ( ) directly above the contents
pane.
7. In the contents pane:
l Select the All virtual disks folder checkbox to restore the entire image.
l Select one or more drives to only restore those specific drives.
8. Select Actions > Restore Now.
The Restore Options dialog box appears.
9. Select Restore to a different (existing) virtual machine as the restore
destination.
Note
Note
Only virtual machines that are powered off can be selected from the list; all
others are disabled. You are also prevented from selecting the original virtual
machine.
Where folders and files are actually restored differs according to the target virtual
machine operating system:
l Linux virtual machines
For best results when restoring specific folders or files to the original Linux virtual
machine (that is, the same virtual machine from which the backup was originally
taken), ensure that all partitions on all VMDKs are correctly mounted and that the
fstab file, which persists partition remounting on reboot, is correct. This will
ensure that files and folders are restored to original locations at the time of
backup.
If partitions are not mounted correctly, or the fstab file is not correct, partitions
will be prefixed with standard Linux disk designations (for example, sda, sdb, sdc1,
sdc2, and so forth). In these situations, folders and files are restored to the
relative path from root in the original backup.
Procedure
1. In the vSphere Client or vSphere Web Client, ensure that the target virtual
machine is powered on.
2. In Avamar Administrator, click the Backup & Restore launcher button.
The Backup, Restore and Manage window appears.
3. Click the Restore tab.
The upper left pane contains a list of domains.
4. Select a virtual machine client or VMware container:
a. Select the domain that contains the virtual machine client or VMware
container.
You cannot view clients outside the domain for the login account. To view all
clients, log in to the root domain.
A list of Avamar clients appears in the pane under the domains list.
b. From the list of clients, select the virtual machine client or VMware
container.
5. Select a backup:
a. Click the By Date tab.
b. Select the backup date from the calendar. Valid backups occurred on dates
with a yellow highlight.
A list of backups on that date appears in the Backups table next to the
calendar.
c. Select a backup from the Backups table.
6. Click the Browse for Granular Restore button ( ).
7. Optionally select a proxy to perform browse and restore, and then click OK.
The default setting is Automatic, which enables the Avamar server to choose
the best proxy for this operation.
8. Select one or more folders or files you want to restore.
9. Select Actions > Restore Now.
The Restore Options dialog box appears.
10. Select Restore everything to its original location.
11. From the Avamar encryption method list, select the encryption method to use
for data transfer between the Avamar server and the client during the restore.
The encryption technology and bit strength for a client/server connection
depends on several factors, including the client operating system and Avamar
server version. The Avamar Product Security Guide provides additional
information.
12. Click More Options.
The Restore Command Line Options dialog box appears.
13. (Optional) Select Restore Access Control List (ACL) to restore ACLs.
14. (Optional) To include additional plug-in options with this restore, type Enter
Attribute and Enter Attribute Value settings.
15. Click OK on the Restore Command Line Options dialog box.
16. Click OK on the Restore Options dialog box.
The following status message appears: Restore initiated.
17. Click OK.
A list of Avamar clients appears in the pane under the domains list.
b. From the list of clients, select the virtual machine client or VMware
container.
4. Select a backup:
a. Click the By Date tab.
b. Select the backup date from the calendar. Valid backups occurred on dates
with a yellow highlight.
A list of backups on that date appears in the Backups table next to the
calendar.
c. Select a backup from the Backups table.
5. Click the Browse for Image Restore button ( ) directly above the contents
pane.
6. In the contents pane:
l Select the All virtual disks folder checkbox to restore the entire image.
l Select one or more drives to only restore those specific drives.
7. Select Actions > Restore Now.
The Restore Options dialog box appears.
8. Select Restore to a new virtual machine as the restore destination.
Note
When restoring an image backup to a new virtual machine, the Restore virtual
machine configuration option is selected and disabled (grayed out) because
these configuration files are always required to configure the new virtual
machine.
Note
Instant access
If restoring an entire virtual machine from backups stored on a Data Domain system, a
special feature called “instant access” is available.
Instant access is similar to restoring an image backup to a new virtual machine, except
that the restored virtual machine can be booted directly from the Data Domain
system. This reduces the amount of time required to restore an entire virtual machine.
Instant access comprises the following tasks:
1. Restoring the virtual machine:
Instant access 89
Restore
Note
When used with Data Domain systems earlier than release 6.0, in order to minimize
operational impact to the Data Domain system, only one instant access is permitted at
a time. For Data Domain systems at release 6.0 or greater, 32 instant access
processes are permitted at the same time.
A list of Avamar clients appears in the pane under the domains list.
b. From the list of clients, select the virtual machine client or VMware
container.
4. Select a backup residing on the Data Domain:
a. Click the By Date tab.
b. Select the backup date from the calendar. Valid backups occurred on dates
with a yellow highlight.
A list of backups on that date appears in the Backups table next to the
calendar.
Note
When restoring an image backup to a new virtual machine, the Restore virtual
machine configuration option is selected and disabled (grayed out) because
these configuration files are always required to configure the new virtual
machine.
Note
Recovery targets can be physical or virtual machines. If you intend to use a virtual
machine as a recovery target, install the Avamar software directly on the virtual
machine just as you would if implementing guest backup.
Procedure
1. Using instructions in the Avamar Backup Clients User Guide, install Avamar
Windows client software on the recovery target machine.
2. Using instructions in the Avamar Backup Clients User Guide, register the
recovery target machine as a client with the same Avamar server storing the
image backup to be mounted.
3. Install the Windows VMware GLR plug-in software:
A list of Avamar clients appears in the pane under the domains list.
b. From the list of clients, select the virtual machine client or VMware
container.
5. Select a backup:
a. Click the By Date tab.
b. Select the backup date from the calendar. Valid backups occurred on dates
with a yellow highlight.
A list of backups on that date appears in the Backups table next to the
calendar.
c. Select a backup from the Backups table.
6. In the contents pane, select a virtual disk.
7. Click the Mount Windows VMDK button ( ).
The Select Destination Client dialog box appears.
8. Click Browse next to the Client box.
The Browse for Restore Destination Client dialog box appears.
9. Select the recovery target virtual machine, and then click OK.
The Browse Backup Status dialog box appears.
10. Click OK to confirm that the operation should continue.
The Restore Browse Options dialog box appears.
11. Select a time out value from the Amount of time to leave VMDKs mounted
list, and then click OK.
Results
A folder path appears in the right backup contents pane. The Windows VMDK is now
mounted to that folder.
Monitoring restores
You can monitor restores to ensure that the restores complete successfully and to
troubleshoot issues. The Activity Monitor in Avamar Administrator enables you to view
status information for restores.
Procedure
1. In Avamar Administrator, click the Activity launcher button.
The Activity window appears.
2. Click the Activity Monitor tab.
A list of all activities appears.
3. To filter the results to display only restore activity, select Actions > Filter.
The Filter Activity dialog box appears.
4. Select Restore from the Type list.
5. Click OK.
Canceling restores
You can cancel a restore any time before the restore completes. The cancellation
might take five minutes or longer. The restore may complete before the cancellation
finishes.
Procedure
1. In Avamar Administrator, click the Activity launcher button.
The Activity window appears.
2. Click the Activity Monitor tab.
A list of all activities appears.
3. Select the restore from the list.
4. Select Actions > Cancel Activity.
A confirmation message appears.
5. Click Yes.
l Overview............................................................................................................96
l Performing an on-demand backup validation..................................................... 96
l Scheduling backup validations............................................................................98
Backup Validation 95
Backup Validation
Overview
For image backups, the backup validation mechanism is similar to restoring a virtual
machine backup to a new virtual machine, except that once the backup is validated,
the new virtual machine is automatically deleted from vCenter.
Backup validations can be initiated for a single virtual machine backup as needed (on-
demand), or scheduled for an entire group of virtual machines. Scheduled backup
validations always use the latest completed backup for each virtual machine group
member.
What is validated
The default validation verifies that the virtual machine powers on and that the
operating system starts following the restore.
Backup validations also provide an optional capability for running a user-defined script
in order to perform custom application-level verifications. The script must exist in the
backup to be validated. You cannot run external scripts during a backup validation.
Supported script types are shell scripts for Linux virtual machines, and DOS batch files
for Windows virtual machines. Perl scripts are not supported.
A list of Avamar clients appears in the pane under the domains list.
b. From the list of clients, select the virtual machine client or VMware
container.
4. Select a backup:
a. Click the By Date tab.
b. Select the backup date from the calendar. Valid backups occurred on dates
with a yellow highlight.
A list of backups on that date appears in the Backups table next to the
calendar.
c. Select a backup from the Backups table.
5. Select Actions > Validate Backup.
The Validate Options dialog box appears.
6. Click Configure Destination.
The Configure Location wizard appears.
7. Select a vCenter, and then click Next.
8. Type an inventory location name, select a datacenter folder in the tree, and
then click Next.
9. Select a host or cluster and then click Next.
10. Select a resource pool and then click Next.
11. Select a datastore and then click Next.
12. At the Summary screen, click Finish.
13. From the Avamar encryption method list, select the encryption method to use
for data transfer between the client and the Avamar server during the backup
validation.
The encryption technology and bit strength for a client/server connection
depends on several factors, including the client operating system and Avamar
server version. The Avamar Product Security Guide provides additional
information.
14. (Optional) To run a user-defined script as part of the validation:
Note
The script must already be in the backup to be validated. You cannot run
external scripts during a backup validation.
Note
If this is a Windows virtual machine, type exit /B exitcode after the script
path and filename, where exitcode is a user-defined exit message.
d. Ensure that the Maximum script run time (minutes) setting allows
sufficient time for the script to complete.
e. Click OK.
15. Click OK on the Validate Options box.
The following status message appears: Restore request initiating.
16. Click Close.
Note
d. Click Next.
6. In the Membership screen:
a. Select checkboxes next to the virtual machines you want to be members of
this validation group.
b. Click Next.
7. In the Location screen:
a. Click Configure Location.
The Configure VM Backup Validation Location wizard appears.
b. Select a vCenter, and then click Next.
c. Select a datacenter folder in the tree, and then click Next.
100 Avamar 7.4 and Service Packs for VMware User Guide
CHAPTER 7
Protecting the vCenter Management
Infrastructure
l Overview.......................................................................................................... 102
l Backing up the vCenter management infrastructure.........................................102
l Recovering vCenter management infrastructure from Avamar backups........... 104
Overview
This topic discusses how to protect the vCenter management infrastructure (not the
virtual machines within that environment).
The vCenter runs on a 32- or 64-bit Windows host. It also comprises a database server
which can run on a different host. Some optional vSphere components require
additional databases that can be hosted on the same host as vCenter or on different
database server hosts.
The methodology for protecting vCenter management infrastructure is to implement
guest backup on each virtual host. The dataset should only back up the following
important vCenter management infrastructure components:
l License files
l SSL certificates
l Audit logs
l Windows guest customization (sysprep) files
l Database-hosted configuration settings
l UpdateManager database
l Site Recovery Manager (SRM) database
Recovering vCenter management infrastructure using Avamar backups is a two-step
process in which you first create a restore target virtual machine with a fresh
operating system image, then restore the vCenter management infrastructure
components from the latest Avamar backup.
One advantage to protecting a vCenter management infrastructure with Avamar is
that you can also use the Avamar backup to facilitate vCenter upgrades (for example,
upgrading the vCenter host from a 32- or 64-bit Windows virtual machine).
102 Avamar 7.4 and Service Packs for VMware User Guide
Protecting the vCenter Management Infrastructure
c. Click OK.
d. Repeat these steps for each important vCenter management infrastructure
component.
8. Click OK.
104 Avamar 7.4 and Service Packs for VMware User Guide
Protecting the vCenter Management Infrastructure
106 Avamar 7.4 and Service Packs for VMware User Guide
CHAPTER 8
Protecting ESX Hosts
l Overview.......................................................................................................... 108
l Adding ESX host authentication certificates to the MCS keystore...................109
l Creating a dedicated ESX host user account.....................................................110
l Adding an ESX host as a vCenter client.............................................................112
l Deploying a proxy in a standalone ESX host...................................................... 113
l Disassociating an ESX host from a vCenter.......................................................116
Overview
Image backup can be configured to protect virtual machines residing in standalone
ESX hosts.
There are two primary uses for this feature:
1. Support for minimal customer configurations.
Some customer sites use a simple VMware topology, comprising a single ESX host,
with one or more virtual machines residing on that ESX host. These sites typically
do not implement a vCenter management layer. However, the virtual machines
residing on a standalone ESX host still must be backed up in order to protect
against data loss. Adding the standalone ESX host as an Avamar vCenter client
enables those virtual machines to be backed up with image backup, rather than
guest backup.
2. Virtual vCenter disaster recovery.
Adding an ESX host as an Avamar vCenter client can be useful when virtual
machines residing on a particular ESX host must be restored, but the vCenter is
not operational. This is often the case when a virtual vCenter must be recovered
from Avamar backups. Adding the standalone ESX host as an Avamar vCenter
client enables the vCenter management infrastructure virtual machines to be
restored so that the vCenter can be restarted.
Limitations
These are the known limitation of protecting virtual machines residing in a standalone
ESX host in Avamar.
ESX versions
Support for this feature is limited to ESX 5.0 or higher. Older versions are not
supported.
Virtual vCenter disaster recovery
If you are using this feature for the purpose of recovering a virtualized vCenter from
an ESX host, you must first disassociate that ESX host from the vCenter before
restoring any virtual machines to that ESX host.
Task List
In order to protect virtual machines residing in a standalone ESX host, perform the
following tasks:
1. Ensure that the Avamar server can communicate and authenticate with the ESX
host.
Add the ESX host certificate to the Avamar MCS keystore. Otherwise, you must
disable certificate authentication for all MCS communications.
2. (Optional) Create a dedicated user account on the ESX host for use with Avamar.
3. Add the ESX host to Avamar as a vCenter client.
This enables dynamic discovery of virtual machines residing on that ESX host, so
that they can be backed up with image backup rather than guest backup.
4. Deploy one or more proxies on the ESX host.
5. Perform on-demand or scheduled image backups of virtual machines residing on
that ESX host.
108 Avamar 7.4 and Service Packs for VMware User Guide
Protecting ESX Hosts
cd /tmp
$JAVA_HOME/bin/keytool –import –file rui.crt -alias alias -
keystore rmi_ssl_keystore
where alias is a user-defined name for this certificate, which can often be the
file name.
7. Type the keystore password.
8. Type yes, and press Enter to trust this certificate.
9. (Optional) If you will be protecting more than one ESX host with this Avamar
server, add those ESX host certificates now.
10. Back up the live MCS keystore by typing:
cd /usr/local/avamar/lib
cp rmi_ssl_keystore rmi_ssl_keystore.date
Note
The user account must be added to the top (root) level in each ESX host you intend to
protect.
Procedure
1. Create a ESX host user account with privileges listed in the following table.
110 Avamar 7.4 and Service Packs for VMware User Guide
Protecting ESX Hosts
Virtual machine
112 Avamar 7.4 and Service Packs for VMware User Guide
Protecting ESX Hosts
3. In the tree, select the top-level (root) domain, and then select Actions >
Account Management > New Client(s).
The New Client dialog box appears.
4. Complete the following settings:
a. Select VMware vCenter in the Client Type list.
b. Type the ESX host fully qualified DNS name or IP address in the New Client
Name or IP field.
c. Type the ESX host web services listener data port number in the Port field.
443 is the default setting.
d. Type the ESX host administrative user account name in the User Name
field.
e. Type the ESX host administrative user account password in the Password
field.
f. Type the ESX host administrative user account password again in the Verify
Password field.
g. (Optional) Type a contact name in the Contact field.
h. (Optional) Type a contact telephone number in the Phone field
i. (Optional) Type a contact email address in the Email field.
j. (Optional) Type a contact location in the Location field.
5. Click OK.
Note
b. Click Next.
6. In the Resource Pool screen:
a. Select an ESX host or a resource pool.
b. Click Next.
7. In the Storage screen:
a. Select a storage location for this proxy.
b. Click Next.
8. In the Disk Format screen:
a. Select a disk format for this proxy.
b. Click Next.
9. In the Network Mapping screen:
a. Select a destination network from list.
b. Click Next.
10. In the Ready To Complete screen:
a. Ensure that the information is correct.
b. Click Finish.
114 Avamar 7.4 and Service Packs for VMware User Guide
Protecting ESX Hosts
Note
For best results, always register and activate proxies as described in this task. Using
the alternative method of inviting the proxy from Avamar Administrator is known to
have unpredictable results.
Perform this task for every proxy you deploy in an ESX host.
Procedure
1. From the vSphere client, locate and select an Avamar image backup proxy.
2. Right-click Power > Power On.
3. Right-clickOpen Console.
A console window appears.
4. From the Main Menu, type 1, and then press Enter.
5. Type the Avamar server DNS name, and then press Enter.
6. Type an Avamar server domain name, and then press Enter.
The default domain is “clients.” However, your Avamar system administrator
may have defined other domains, and subdomains. Consult your Avamar system
administrator for the domain you should use when registering this client.
Note
7. From the Main Menu, type 2, and then press Enter to quit.
8. (optional) If proxy certificate authentication is required, see Configuring
vCenter-to-Avamar authentication on page 29
116 Avamar 7.4 and Service Packs for VMware User Guide
APPENDIX A
Manually deploying proxies
l Overview........................................................................................................... 118
l Downloading the proxy appliance template file..................................................118
l Deploying the proxy appliance in vCenter..........................................................118
l Deploying a proxy appliance in vCenter using the vSphere Web Client..............118
l Registering and activating the proxy with the Avamar server............................121
l Configuring proxy settings in Avamar Administrator..........................................121
l Performing optional proxy performance optimization....................................... 122
Overview
Beginning with Avamar 7.2, the Proxy Deployment Manager is the preferred method
for deploying proxies. Manual proxy deployment is still supported if necessary.
Note
If adding more than one proxy, you only need to perform this task once.
Procedure
1. Open a web browser and type the following URL:
https://Avamar-server
118 Avamar 7.4 and Service Packs for VMware User Guide
Manually deploying proxies
http://vCenter-server:9443/
Note
These steps only need to be performed the first time you connect to this
vCenter Server using the vSphere Web Client. You can skip these steps on
subsequent vSphere Web Client sessions.
Deploying a proxy appliance in vCenter using the vSphere Web Client 119
Manually deploying proxies
Note
b. In the tree, select a datacenter and folder location for this proxy.
c. Click Next.
11. In the Select a resource screen:
a. Select an ESX host, cluster, vApp or resource pool.
b. Click Next.
12. In the Select Storage screen:
a. Select a storage location for this proxy.
b. Click Next.
13. In the Setup networks screen:
a. Select a Destination network from list.
b. Select an IP protocol from the list.
c. Click Next.
14. In the Customize template screen:
Note
Proxy network settings are difficult to change once they proxy is registered and
activated with the Avamar server. Therefore, ensure that the settings you enter
in the Customize template screen are correct.
a. Enter the default gateway IP address for the network in the Default
Gateway field
b. If not using DHCP, type one or more Domain Name Server (DNS) IP
addresses in the DNS field. Separate multiple entries with commas.
c. If not using DHCP, type a valid IP address for this proxy in the Isolated
Network IP Address field
d. Type the network mask in the Isolated Network Netmask field.
e. Click Next.
15. In the Ready To Complete screen:
a. Ensure that the information is correct.
b. Click Finish
120 Avamar 7.4 and Service Packs for VMware User Guide
Manually deploying proxies
Note
For best results, always register and activate proxies as described in this task. Using
the alternative method of inviting the proxy from Avamar Administrator is known to
have unpredictable results.
Perform this task for every proxy you deploy in an ESX host.
Procedure
1. From the vSphere client, locate and select an Avamar image backup proxy.
2. Right-click Power > Power On.
3. Right-clickOpen Console.
A console window appears.
4. From the Main Menu, type 1, and then press Enter.
5. Type the Avamar server DNS name, and then press Enter.
6. Type an Avamar server domain name, and then press Enter.
The default domain is “clients.” However, your Avamar system administrator
may have defined other domains, and subdomains. Consult your Avamar system
administrator for the domain you should use when registering this client.
Note
7. From the Main Menu, type 2, and then press Enter to quit.
8. (optional) If proxy certificate authentication is required, see Configuring
vCenter-to-Avamar authentication on page 29
Registering and activating the proxy with the Avamar server 121
Manually deploying proxies
Procedure
1. In Avamar Administrator, click the Administration launcher button.
The Administration window appears.
2. Click the Account Management tab.
3. In the tree, select the proxy, and then select Actions > Account
Management > Client Edit.
The Edit Client dialog box appears.
4. Click the Datastores tab, and then select all vCenter datastores that host
virtual machines you want to protect with this proxy.
5. Click the Groups tab, and then assign this proxy to one or more groups by
clicking the Select checkbox next to each group.
6. (Optional) provide contact information:
a. Type a contact name in the Contact field.
b. Type a contact telephone number in the Phone field.
c. Type a contact email address in the Email field.
d. Type a contact location in the Location field.
7. Click OK.
122 Avamar 7.4 and Service Packs for VMware User Guide
APPENDIX B
vSphere Data Ports
28102 - 28109 Avamar MCS Proxies avagent paging Avamar 7.0 and
port 7.1
Note
124 Avamar 7.4 and Service Packs for VMware User Guide
APPENDIX C
Using VMware vRealize Log Insight
server.port=8080
forward.server=Log_Insight_Server_IP
forward.port=Log_Insight_Server_port
forward.messagePerSend=10
forward.type=LogInsight
upload.forward=true
forward.delete=true
forward.dispatch=true
126 Avamar 7.4 and Service Packs for VMware User Guide
Using VMware vRealize Log Insight
2. Enter 1 at the prompt to enter the IP address of the Avamar utility node or AVE
running the Log Central Reporting Service (LCRS).
3. Enter 2 at the prompt to enable the LFA cron job.
The cron job will forward logs from the proxy to the LCRS every 10 minutes.
4. Enter 4 at the prompt to exit the program.
128 Avamar 7.4 and Service Packs for VMware User Guide
APPENDIX D
Plug-in Options
NOTICE
The Avamar software does not check or validate the information that you type in the
Enter Attribute and Enter Attribute Value fields. In addition, the values in the Enter
Attribute and Enter Attribute Value fields override settings that you specify with the
GUI controls for the options.
Setting Description
Use Changed Block Tracking (CBT) to If selected, the VMware changed block
increase performance tracking feature is used to identify areas of
the virtual machine file system that have
changed since the last backup and only
process those changed areas during the next
backup.
Note
Store backups on Data Domain system To store the backup on a Data Domain system
instead of the Avamar server, select the
checkbox and then select the Data Domain
system from the list.
Note
130 Avamar 7.4 and Service Packs for VMware User Guide
Plug-in Options
Setting Description
Encryption method to Data Domain system Specifies the encryption method for data
transfer between the client and the Data
Domain system during the backup.
Guest credentials
Username Guest operating system user account with
sufficient privileges to run scripts.
Pre-snapshot Script
Script file Full path and filename of the script that will be
run before the vmdk snapshot.
Maximum script run time (minutes) Maximum number of minutes this script is
allowed to run before timing out.
Post-snapshot Script
Script file Full path and filename of the script that will be
run after the backup completes and the vmdk
snapshot is removed.
Maximum script run time (minutes) Maximum number of minutes this script is
allowed to run before timing out.
Setting Description
Post Action Type of MSSQL The type of post-action operation to perform.
Available options are:
l LOG Truncation performs log truncation
after the backup has been performed.
When backing up a single VM, all disks of
the VM must be selected or log truncation
will not occur.
Setting Description
Use Changed Block Tracking (CBT) to If selected, the VMware changed block
increase performance tracking feature is used to identify areas of
the virtual machine file system that have
changed since the last backup and only
process those changed areas during this
restore operation.
Note
Encryption method from Data Domain system Specifies the encryption method for data
transfer between the Data Domain system
and the client during the restore.
132 Avamar 7.4 and Service Packs for VMware User Guide
APPENDIX E
Troubleshooting
Troubleshooting 133
Troubleshooting
134 Avamar 7.4 and Service Packs for VMware User Guide
Troubleshooting
-- snapshot_max_change_percent=0
Backup and restore of vFlash Read Cache enabled VMs will use NBD
transport mode
Backup and restore of vFlash Read Cache enabled VMs will use NBD transport mode
by default
vCenter will display the error:
The
device or operation specified at index '0' is not supported for the
current virtual machine version 'vmx-07'. A minimum version of
'vmx-10' is required for this operation to succeed
If hot-add is desired then please upgrade the proxy hardware version to vmx-10 or
above.
Note
SQL server log truncation does not rely on the VSS writer; therefore SQL log
truncation is supported in this case.
136 Avamar 7.4 and Service Packs for VMware User Guide
Troubleshooting
Restore to new virtual machine not available when physical RDM disks are
involved
If you back up a virtual machine that has both virtual disks and physical Raw Device
Mapping (RDM) disks, the backup will successfully process the virtual disks, bypass
the RDM disks.
However, when restoring data from one of these backups, you can restore the data to
the original virtual machine, or redirect it to another existing virtual machine.
However, you cannot restore data to a new virtual machine.
Note that because the physical RDM disks were not processed during the backup,
data residing on the physical RDM disks cannot be restored at all.
If you need to restore data to a new virtual machine, you must:
1. Manually create a new virtual machine in vCenter.
2. This new virtual machine must have the same number of virtual disks as the
original virtual machine from which the backup was taken.
3. Manually add the new virtual machine to Avamar.
4. Restore the data to this virtual machine.
Failed to mount disks. Verify that all the disks on the VM have
valid/supported partitions.
The workaround for this issue is to perform a full image backup of all disks on the VM,
then restore the files or folders from the disk that does not have a partition table.
Restore to new virtual machine not available when physical RDM disks are involved 137
Troubleshooting
vmir Error <0000>: Mount NFS datastore failed to start with error:
Failed to create Data Domain
vmir Error <0000>: NFS has reached the maximum number of supported
volumes.
The solution to this problem is to increase the number of NFS mountpoint configured
on vSphere. The VMware knowledge base article https://kb.vmware.com/selfservice/
microsites/search.do?language=en_US&cmd=displayKC&externalId=2239 contains
information and procedures to increase the number of mount points.
138 Avamar 7.4 and Service Packs for VMware User Guide
GLOSSARY
activation The process of passing the client ID (CID) back to the client, where it is stored in an
encrypted file on the client file system.
application-consistent The state of a virtual machine in which the virtual file system writes have been
completed and all running applications have been quiesced.
Avamar Administrator A graphical management console software application that is used to remotely
administer an Avamar system from a supported Windows or Linux client computer.
Avamar server The server component of the Avamar client/server system. Avamar server is a fault-
tolerant, high-availability system that efficiently stores the backups from all protected
clients. It also provides essential processes and services required for data restores,
client access, and remote system administration. Avamar server runs as a distributed
application across multiple networked storage nodes.
backup A point-in-time copy of client data that can be restored as individual files, selected data,
or as an entire backup.
changed block tracking A VMware feature that tracks which virtual machine file system blocks have changed
(CBT) between backups.
client activation The process of passing the client ID (CID) back to the client, where it is stored in an
encrypted file on the client file system.
client registration The process of establishing an identity with the Avamar server. When Avamar
recognizes the client, it assigns a unique client ID (CID), which it passes back to the
client during client activation.
crash-consistent The state of a virtual machine that is consistent with what would occur by interrupting
power to a physical computer. Because file system writes might or might not be in
progress when power is interrupted, there is always the possibility of some data loss
when backing up a crash-consistent file system.
Avamar 7.4 and Service Packs for VMware User Guide 139
Glossary
datacenter In VMware vSphere environments, a datacenter comprises the basic physical building
blocks. These physical building blocks include virtualization servers, storage networks
and arrays, IP networks, and a management server. Each vSphere vCenter can manage
multiple datacenters.
Data Domain system Disk-based deduplication appliances and gateways that provide data protection and
disaster recovery (DR) in the enterprise environment.
dataset A policy that defines a set of files, directories, and file systems for each supported
platform that are included or excluded in backups across a group of clients. A dataset is
a persistent and reusable Avamar policy that can be named and attached to multiple
groups.
ESX/ESXi Server A virtualization layer run on physical servers that abstracts processor, memory, storage,
and resources into multiple virtual machines. ESX Servers provide an integrated service
console; ESXi Servers do not.
file system-consistent The state of a virtual machine in which the virtual file system has been quiesced (that
is, all file system writes have been completed).
group A level of organization in Avamar Administrator for one or more Avamar clients. All
clients in an Avamar group use the same group policies, which include the dataset,
schedule, and retention policy.
group policy The dataset, schedule, and retention policy for all clients in an Avamar group.
guest backup A method of protecting a virtual machine in which backup software is installed directly
in the guest operating system just as if it were a physical machine.
image backup A method for protecting virtual machines hosted in a vCenter in which a backup is taken
of entire virtual disk images. Avamar for VMware image backup is fully integrated with
vCenter Server to provide detection of virtual machine clients, and enable efficient
centralized management of backup jobs
140 Avamar 7.4 and Service Packs for VMware User Guide
Glossary
MCS Management console server. The server subsystem that provides centralized
administration (scheduling, monitoring, and management) for the Avamar server. The
MCS also runs the server-side processes used by Avamar Administrator.
plug-in Avamar client software that recognizes a particular kind of data resident on that client.
plug-in options Options that you specify during backup or restore to control backup or restore
functionality.
proxy A virtual machine that is used to perform image backups, image restores, and file-level
restores of other virtual machines. Proxies run Avamar software inside a Linux virtual
machine, and are deployed in a vCenter using an appliance template (.ova) file.
registration The process of establishing an identity with the Avamar server. When Avamar
recognizes the client, it assigns a unique client ID (CID), which it passes back to the
client during client activation.
restore An operation that retrieves one or more file systems, directories, files, or data objects
from a backup and writes the data to a designated location.
retention The time setting to automatically delete backups on an Avamar server. Retention can be
set to permanent for backups that should not be deleted from an Avamar server.
Retention is a persistent and reusable Avamar policy that can be named and attached to
multiple groups.
schedule The ability to control the frequency and the start and end time each day for backups of
clients in a group. A schedule is a persistent and reusable Avamar policy that can be
named and attached to multiple groups.
Storage vMotion A VMware feature the enables migration of a live virtual machine from one datastore to
another.
vCenter Server A centralized single point of management and control for one or more VMware
datacenters.
vSphere Client A VMware software application used to control and manage a vCenter. The vSphere
Client is also known as the "thick client."
Avamar 7.4 and Service Packs for VMware User Guide 141
Glossary
vSphere Web Client A VMware web interface used to control and manage a vCenter.
142 Avamar 7.4 and Service Packs for VMware User Guide