DPA SolVe 62SP3 Implementing Plain
DPA SolVe 62SP3 Implementing Plain
DPA SolVe 62SP3 Implementing Plain
EMC believes the information in this publication is accurate as of its publication date. The information is subject to change
without notice.
The information in this publication is provided as is. EMC Corporation makes no representations or warranties of any kind with
respect to the information in this publication, and specifically disclaims implied warranties of merchantability or fitness for a
particular purpose. Use, copying, and distribution of any EMC software described in this publication requires an applicable
software license.
EMC², EMC, and the EMC logo are registered trademarks or trademarks of EMC Corporation in the United States and other
countries. All other trademarks used herein are the property of their respective owners.
For the most up-to-date regulatory document for your product line, go to EMC Online Support (https://support.emc.com).
EMC Corporation
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.EMC.com
2 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
CONTENTS
Preface 5
EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software) 3
CONTENTS
4 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
Preface
As part of an effort to improve its product lines, EMC periodically releases revisions of its
software and hardware. Therefore, some functions described in this document might not
be supported by all versions of the software or hardware currently in use. The product
release notes provide the most up-to-date information on product features.
Contact your EMC technical support professional if a product does not function properly
or does not function as described in this document.
Note
This document was accurate at publication time. Go to EMC Online Support (https://
support.emc.com) to ensure that you are using the latest version of this document.
Purpose
This document provides information on how to install DPA and set up DPA to monitor a
data protection environment. This document also describes administrative functions
such as creating users and roles, updating system settings, creating policies, and
troubleshooting data collection.
The management system governing the design and development of this product is ISO
9001:2008 certified.
Audience
This document is intended for system administrators. Readers of this document must be
familiar with the following tasks:
l Identifying the different hardware and software components that make up the backup
and replication environment.
l Following procedures to configure backup and replication operations.
l Following guidelines to locate problems and implement solutions.
Revision history
The following table presents the revision history of this document.
Table 1 Revision history
Related documentation
The DPA documentation set includes the following publications:
l EMC Data Protection Advisor Custom Reporting Guide
l EMC Data Protection Advisor Data Collection Reference Guide
l EMC Data Protection Advisor Installation and Administration Guide
l EMC Data Protection Advisor Migrator Technical Notes
l EMC Data Protection Advisor online help system
l EMC Data Protection Advisor Product Guide
EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software) 5
Preface
NOTICE
Note
6 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
Preface
Bold Used for names of interface elements, such as names of buttons, fields,
tab names, and menu paths (what the user specifically selects or
clicks)
Italic Used for full titles of publications that are referenced in text
Monospace Used for:
l System code
l System output, such as an error message or script
l Pathnames, file names, prompts, and syntax
l Commands and options
EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software) 7
Preface
8 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
CHAPTER 1
Preparing to install DPA
l Overview............................................................................................................... 10
l System requirements............................................................................................ 10
l Installation considerations....................................................................................12
l Communications settings in DPA........................................................................... 13
l DPA port settings ..................................................................................................15
l Installation and configuration overview................................................................. 18
Overview
All of EMC® Data Protection Advisor (DPA) deployments include the following
installations:
l DPA Datastore server and a DPA agent on one host
l DPA Application server and a DPA agent on another host
When you install DPA, the installation wizard takes you step by step through placement
of these components.
Installing the Application and Datastore servers on a single host is not supported. You
can connect multiple Application servers to the same Datastore server, where each
additional Application server is on its own host and the Application servers are installed
as a DPA cluster. You can install additional DPA Agents for system monitoring and remote
data collection. The Data Protection Advisor Architecture Guide provides more information.
DPA supports Datastore Replication to enable continuous, safe, and reliable replication
so that DPA can maintain a replica copy, or Slave, of the primary Datastore, or Master, for
resilience against a single point of failure.
System requirements
DPA has the following basic minimum system requirements. The EMC Data Protection
Advisor Software Compatibility Guide provides a comprehensive list of system
requirements.
Note
10 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
Preparing to install DPA
l Automatic sizing and tuning of internal DPA resource usage takes place during
installation. If resources (CPU, Memory) are taken away from the installation by other
applications performance of DPA could be adversely affected.
l Operating systems:
n Support for 64-bit operating systems only
n Microsoft Windows Server 2008 R2, 2012, 2012 R2 (x64 only)
n Red Hat Linux ES/AS 5.5, 6.0, 6.2, 6.4 (64 bit), 6.5, 7, 7.1
Run the Update Agent (up2date) to ensure that the latest operating system
patches are installed
n SUSE Linux 11 x86 (64 bit)
Run the Update Agent (up2date) to ensure that the latest operating system patches
are installed
libaio is recommended to be installed on the system and available in the system
LD_LIBRARY_PATH for performance gains
Datastore storage
For performance reasons, the installation of the DPA Datastore server on NAS-based file
systems, such as CIFS or NFS shares is not recommended because these file systems
might not have the bandwidth to manage the required I/O.
Although the standard datastore file system layout is adequate for most deployments,
you can distribute different file systems across different file systems to optimize
performance during installation under Advanced installation options.
Permissions
Ensure that you have the following permissions before you install the software to avoid
installation failure:
l Windows:
n Administrator privileges (domain or local with full access)
n If User Account Control (UAC) is enabled, use Run As Administrator
l UNIX / Linux:
n Root user
n If using security software to manage access to the root account, ensure the
permissions allow the creation of new users after you become root. This must
include the ability to create default home directories for the account to be created.
Datastore storage 11
Preparing to install DPA
Installation considerations
The DPA installation wizard presents advanced options for configuring Datastore
Replication with Master and Slave Datastores, and for configuring clustered Application
objects. If using either or both of these options, ensure that you:
l Plan the final deployment topology before beginning installation.
l Have all hosts and IP addresses predetermined and available.
If you are planning an advanced installation, contact your EMC Account Representative
for help with advanced architecture solution design.
OS resource optimization
General tuning
During installation, the installer tunes the DPA Datastore Service for the host environment
on which it is being deployed. This tuning assumes that the host is dedicated to DPA and
takes into account resources such as Disk Space, Total Memory, and CPU cores. If during
the lifetime of the DPA Datastore Service any of these physical resources are increased or
decreased, execute the dpa datastore tune command on the Datastore host. dpa
datastore tune on page 12 provides more information.
Command options
--connections (-c) <connections> — Maximum number of concurrent Datastore
connections allowed
--help — Displays the help screen
--quiet — Suppresses all output except for warning and error messages
12 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
Preparing to install DPA
Note
In the graphic above, the arrows show the initiation direction. The DPA Agent initiates
connection to DPA Application Server on 9002. For firewalls, it is based upon who
initiates the connection and on what port, and who is listening on the other side. DPA
Agent to DPA Application Server communication is on 9002 and 3741 TCP. The
communications are secure, encrypted, and compressed between the Agent and DPA
server.
The following tables detail the additional ports required on deployment hosts to allow
DPA to function correctly. The ports listed must be able to accept connections and allow
responses back on any established connection. Some network vendors describe such
handshaking communication as Bi-Directional; and such network security devices should
reflect this accordingly.
14 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
Preparing to install DPA
25 TCP port used for the SMTP service Outbound connection to SMTP
server.
389/636 (over TCP port used for LDAP integration Outbound connection to LDAP
SSL) server.
3741 TCP port used for DPA Agents communications. Outbound connection to DPA
agents
9002 TCP port used for the HTTPS service. Inbound connection over SSL
from UI, CLI and REST API
clients.
9003 TCP port used for DPA Datastore Outbound connection to DPA
communications. Datastore.
9004 TCP port used for the HTTP service. Inbound connection from UI,
CLI and REST API clients.
3741 TCP port used for DPA Agents communications. Inbound connection from DPA
Application server.
9002 TCP port used for the HTTPS service. Outbound connection over SSL to DPA
Application server.
9003 TCP port used for DPA Datastore Inbound connection from DPA
communications. Application server.
3741 TCP port used for DPA Agents Inbound connection from DPA Application
communications. server.
9002 TCP port used for the HTTPS service. Outbound connection over SSL to DPA
Application server.
25 TCP port used for the SMTP service Outbound connection to SMTP
server.
161 UDP port used for SNMP service Outbound connection to SNMP
devices.
389/636 (over TCP port used for LDAP integration Outbound connection to LDAP
SSL) server.
3741 TCP port used for DPA Agents Outbound connection to DPA
communications. agents
16 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
Preparing to install DPA
9002 TCP port used for the HTTPS service. Inbound connection over SSL from
UI, CLI and REST API clients.
9003 TCP port used for DPA Datastore Outbound connection to DPA
communications. Datastore.
9004 TCP port used for the HTTP service. Inbound connection from UI, CLI
and REST API clients.
The Installation and configuration overview lists the tasks you need to perform for
installing DPA and configuring data monitoring.
Action Comments
Set up host computer
Provide at least two hosts DPA must not be installed on servers already running other
for DPA server installation: applications. For installation in a production environment, you need
One for the initial DPA one host for the Application Service and a separate host for the
Application server, and Datastore Service. EMC recommends that you use a dedicated server
one for the Datastore. with at least 2GB of temporary space. The EMC Data Protection Advisor
Software Compatibility Guide provides more information.
A separate host is
required for the Datastore
and Application server so
that the operating system
on each server can
successfully and properly
manage the IO
18 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
Preparing to install DPA
Action Comments
performance needs of one
service and the RAM and
caching requirements of
the other service, without
the two services
competing with each other
for resources.
Provide a host for DPA Review the DPA Deployment Architecture Guide, available on EMC
Agent installation Online Support DPA documentation section, for guidelines on how to
(optional). determine number and location of Agents to be deployed.
If the DPA server is running on Windows and the discovered host(s)
are also Windows, you need not install an Agent on the discovered
host. However, we recommend that you use the Agent installed on
the DPA Server hosts for DPA Server monitoring only.
If the DPA server resides on a Linux host and you are performing
client discovery of Windows hosts, at least one DPA agent must be
installed on a Windows Agent.
Ensure that DPA and all its Occasionally DPA components are shut down or associated files are
components are quarantined by antivirus software if not defined as exceptions.
configured as exceptions
in any antivirus software.
Provision networking l Allocate a dedicated VLAN for use by the DPA Application
infrastructure and a servers. If a dedicated VLAN is not available, ask your network
shared directory if administrator for a UDP Multicast group address that can be
installing multiple used for the DPA cluster.
Application servers (DPA
clustering).
l To increase resiliency and quality of service, provision a
hardware load-balancing switch as a gateway to the DPA
Application servers.
l Configure a shared directory that will be accessible by all
Application Servers. DPA will use this shared directory for writing
scheduled reports and other temporary files that all Application
Servers need to access.
Check VMware or Hyper-V DPA has been certified to work on a Linux or Windows virtual
requirements. machine in a VMware or Hyper-V environment. The EMC Data
Protection Advisor Software Compatibility Guide provides more
information.
Open or disable firewalls If you want to use secure communication for connecting to the
for communciation Application server on port 9002, ensure that TLS (Transport Layer
between the DPA servers. Security) settings are enabled for secure communication in your
browser settings.
When installing on DPA Servers, the operating system/software–
based firewalls can be disabled or have ports opened for
Action Comments
communication between the DPA Application server, the DPA
Datastore server, and the DPA Agents prior to installing the DPA
components.
Typically, the network in which the DPA servers and DPA Agents
reside are secure and behind a network firewall. This means that you
could choose to disable operating system/software based firewalls.
If you choose to leave the operating system/software based in effect,
you must open/unblock the required ports. Communications settings
in DPA on page 13 provides information.
If on Linux and you choose to disable the firewall, run the following
commands to disable and ensure that the firewall remains disabled
after startup or reboot:
l Run iptables stop.
l Set the chkconfig utility to iptables off.
Install the host operating The EMC Data Protection Advisor Software Compatibility Guide lists the
system on the DPA required architectures and patches.
Server(s) and Agent host
and install all required
patches.
Install all required When monitoring applications or devices remotely, you may need to
software on the agent host install additional software on the Agent host. For example, the EMC
after the DPA 6.2 and NetWorker client must be installed on the Agent host if the Agent will
minor releases be used to monitor EMC NetWorker remotely.
Application Server is
ready.
If DNS is not enabled in DPA and SharePoint integration requires the IP address and FQDN to
the environment, add the enable you to publish reports to SharePoint and to configure the
IP address and FQDN of SharePoint port. The SharePoint port is configurable. The default
the SharePoint server on port, if no port is specified, is 80. You can set the port by using a
the DPA Application standard URL in the existing URL field in the SharePoint settings
server’s hosts file. dialog.
If you are going to use You need the following information for LDAP User Authentication
LDAP User Authentication configuration:
on your DPA server, gather
l LDAP Server Name/IP
the information needed
for configuration l Use SSL?
l LDAP Server Port
l LDAP Version
l Distinguished Name of Base Directory
l Identification Attribute
Download and save the To download the DPA Server, Agent, and Data Domain DataProcessor
DPA binaries tool binaries, go to the DPA downloads section of http://
support.emc.com.
20 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
Preparing to install DPA
Action Comments
Save the DPA Server and Agent binaries locally.
Save the Data Domain DataProcessor binaries according to the
specifications provided in Running Data Domain DataProcessor on
page 40.
Save the required license You must know the IP address of the primary Datastore server.
files on your local
For more information on obtaining DPA licenses or types of DPA
machine for easy access
licenses available and required, contact your EMC Account
during installation. The
Representative.
DPA installation wizard
prompts you to browse for
the license file at license
installation.
l For new non-migrated A DPA license is required to administer DPA after installation.
installations - Obtain DPA is bundled with a 60-day evaluation license. The evaluation
DPA licenses for all license is created from the time of DPA installation, is valid for up to
components that will 60 days, and allows access to all features. If you import a license
be monitored. during 60-day evaluation license period, the evaluation license is
l For migrated 5.x removed and you have access to DPA features according to license
installations - Existing you imported.
licenses will be For information on required DPA licenses or on purchasing licenses
migrated. for your DPA installation, contact your EMC sales representative.
l The CLP license is
required for new 6.2
and minor releases
functionality and
increased capacity on
a DPA instance. If you
are not adding
capacity or changing
to new 6.2 and minor
releases functionality,
import of CLP licenses
is not required. If you
are migrating from
DPA version 5.x to
version 6.2 and minor
releases, the existing
licenses are migrated
with your
configuration and
data. When not
increasing capacity or
changing functionality
on existing WLS
licenses, WLS
licenses can only
coexist with CLP
Action Comments
Provide the Solutions l A minimum of one gatekeeper per HBA per Symmetrix is
Enabler (SE) licenses. required.
l One Solutions Enabler host can discover all VNX/CLARiiON
arrays through IP address. For VNX/CLARiiON discovery, EMC
recommends installing Solutions Enabler on the DPA server.
l The EMC Data Protection Advisor Software Compatibility Guide
describes the versions of Solutions Enabler required for storage
array discovery.
Install DPA
Install the DPA software. Install the DPA server and agent according to the installation
instructions. Installing the Datastore Service on page 26, Installing
the Application Service on page 27, and Installing the DPA
agent on page 29provide more information.
Configure Symmetrix and The steps in this section apply only if you are monitoring a storage
VNX/CLARiiON array for array, database, or Microsoft Exchange Server for replication analysis.
discovery
Provide the Solutions The EMC Data Protection Advisor Software Compatibility Guide
Enabler host used to describes the versions of Solutions Enabler required for storage array
discover Symmetrix or discovery, and the software that must be installed on the Solutions
VNX/CLARiiON storage Enabler host. The host must be able to connect to the Symmetrix
arrays. array by a SAN connection. The host must have the TCP port 443 or
2163 enabled for the VNX/CLARiiON connection.
Ensure that the required Communications settings in DPA on page 13 lists the protocols and
ports between the DPA default DPA ports required for communication between the agent and
Agent host and the the monitored device or server.
monitored server or
devices are open and
communication is
possible over the
protocol.
Ensure that the DPA Permissions on page 11 lists the default settings for the DPA
credential used to connect credentials that are installed with DPA.
to the monitored device or
server is sufficient, or
22 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
Preparing to install DPA
Action Comments
have the new credential
details ready.
Set up monitoring of
RecoverPoint (if
applicable).
Discover and configure l If a remote agent is being used to import hosts, the DPA server
Application Host import (if must be able to resolve the agent host.
monitoring Microsoft
Exchange or a database).
Prepare the details of the For replication analysis, the Data protection policy details consist of:
policies that DPA will
l The type or replication, (SRDF/S, SRDF/A, MirrorView,
monitor for compliance.
RecoverPoint, and so forth).
l Whether the replication is Point-in-Time or continuous.
l The replication target destination.
For data protection reporting, the policies are:
l Chargeback Policies - For financial cost analysis of data
protection operations.
l Protection Policies - To analyze compliance with recovery time
objective (RTO) and recovery point objective (RPO) data
protection targets.
24 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
CHAPTER 2
Installing DPA
Installing DPA 25
Installing DPA
Installation of the Application service before the Datastore service results in failure of
Application service installation.
The procedures in this section are applicable to new installations. The DPA Release
Notes provides information on supported upgrades.
The DPA installer runs on Windows and Linux, provided that your Linux installation
supports running a UI. The following procedures describe installation in a Windows 64-bit
environment.
fe80::9c9b:36f:2ab:d7a2%2
Where the values before the % refer to the IPv6 of the Application server (in this
example, fe80::9c9b:36f:2ab:d7a2) and those after refer to the interface Id (in
this example, 2).
Procedure
1. Double-click the DPA server binary to start the installation.
26 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
Installing DPA
2. Click Next.
3. Read and accept End User License Agreement. Scroll to the end of the agreement to
activate the option to accept the terms of the License Agreement. Click Next.
4. In the Installation Options screen, select to install Datastore service, click Next.
5. If you do not perform an advanced installation, click Next and follow the installation
wizard.
To perform an advanced installation, select the Show Advanced Installation Options
checkbox in the Advanced Installation screen, click Next, and follow the installation
wizard.
The Advanced Options are:
l Do not register DPA services: Prevent the registration of the Datastore service with
the operating system manager. This will prevent the Datastore service from being
started after host reboot. You must use the DPA Command Line Interface to install
the service with the operating system.
l Do not start DPA services: Prevent the starting of the Datastore services after
installation. Use of the DPA Command Line Interface will be required to start the
service.
l Install with advanced datastore layout: Configure the Datastore service with the
required filesystems distributed across different disks to optimize performance.
6. When prompted, choose the installation folder.
Choose the default location or browse to another folder location.
7. Review the Pre-Installation Summary, the disk space information in particular, click
Install.
The installation proceeds.
If there is not enough disk space, cancel the installation or choose a different drive on
which to install DPA.
8. When prompted, select the IP addresses that the Datastore should listen on for
connections from the DPA Application Server(s).
9. When prompted, enter the IP address of the DPA Application Server that will use the
Datastore from step 8 and then click Add and Next.
10. When the DPA Datastore Server installation is complete, click Done.
Application server installation. To get the IPv6 Interface ID, run the ip addr show
command on the Application server and use the output to find the IPv6 Interface ID.
For example:
fe80::9c9b:36f:2ab:d7a2%2
Where the values before the % refer to the IPv6 of the Application server or the load
balancer to which the Agent wants to connect (in this example, fe80::9c9b:36f:
2ab:d7a2) and those after refer to the interface ID of the current Application server
(in this example, 2).
l If you are planning on using ESRS-VE for remote troubleshooting (recommended),
ensure that you have the ESRS-VE environment installed and configured before DPA
installation. The EMC Secure Remote Services landing page at https://
support.emc.com/downloads/37716_EMC-Secure-Remote-Services-Virtual-Edition
on EMC Online Support provides more information on ESRS-VE installations.
The Application service installation process is similar to installing the Datastore service.
Procedure
1. Double-click the DPA server binary to start the installation.
2. Click Next.
3. Read and accept End User License Agreement. Scroll to the end of the agreement to
enable the option to accept the terms of the License Agreement. Click Next.
4. In the Installation Options screen, select to install Application service, click Next.
5. If you do not perform an advanced installation, click Next and follow the installation
wizard.
The Advanced Options are:
l Do not register DPA services: Prevents the registration of the service with the
operating system service manager. This option prevents the DPA services from
being started after a host reboot.
l Do not start DPA services: Prevents the DPA services from being started after
installation. Use of the DPA command line interface is required to start the service.
l Install the DPA services as clusterable: Configures the DPA service to discover and
join any present DPA cluster.
The rest of the installation is similar to the Datastore installation.
6. Review the Pre-Installation Summary, the disk space information in particular, click
Install. The installation proceeds.
If there is not enough disk space, cancel the installation or choose a different drive to
install DPA on.
Note
A datastore connection failure error might occur if the relevant firewalls required to
communicate between Application Server and the Datastore are not open.
Communications settings in DPA on page 13 provides information.
7. In the Connect to Remote DPA Datastore step, enter the IP address for the DPA
Datastore server previously installed.
The installation resumes.
28 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
Installing DPA
8. When prompted, specify the name or IP address of the DPA Application server host
with which the DPA Agent will communicate. By default the Agent communicates with
the local Application server with IP address 127.0.0.1. In a clustered configuration
provide the IP address of the load balancing switch placed in front of the Application
servers. Click Next.
The DPA Application service installation is now complete.
fe80::9c9b:36f:2ab:d7a2%2
Where the values before the % refer to the IPv6 of the DPA Application server (in this
example, fe80::9c9b:36f:2ab:d7a2) and those after refer to the interface ID of
the Agent (in this example, 2).
Procedure
1. Double-click the DPA Agent binary to start the installation.
2. Click Next.
3. Read and accept End User License Agreement. Click Next.
4. Choose an installation folder and click Next.
5. Verify the Pre-Installation Summary and click Install.
6. Choose the Agent installation options:
l Do not start DPA Agent service - this option prevents starting of the DPA Agent
service after installation.
If you select this option, you must manually start the DPA Agent from the command
line.
If you select Do not start DPA Agent service, click Next.
Type the fully qualified domain name or the IP address of the DPA Server that
communicates with the DPA Agent.
l Agent will be used to monitor Oracle Database: Select this option to monitor an
Oracle database with the DPA Agent.
If you select this option, browse to the directory where the the DPA Agent can find
the Oracle Database device driver files.
7. Click Next.
8. In the Configure Agent window, enter the fully qualified domain name or the IP
address of the DPA Application Server that communicates with the DPA Agent.
If you are installing on Linux IPv6 and are installing Linux Agents, enter the IPv6
Interface ID of the Linux Agent.
Click Next.
9. Click Done to complete the installation.
30 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
Installing DPA
a. Start a browser and connect to DPA Server over https on port 9002. Ensure that all
pop-up blockers are disabled. For example:
https://<server_name>:9002
b. Type the username and password. Username and password fields are case-
sensitive.
c. Click Login
4. Add licenses to the DPA server.
The DPA server is installed with a 60-day temporary license.
If you are upgrading and you are not adding capacity or changing to new 6.2 SP3
functionality, no licensing changes are needed.
The CLP license is required for new 6.2 SP3 functionality and increased capacity on a
DPA instance. If you are not adding capacity or changing to new 6.2 SP3 functionality,
import of CLP licenses is not required. If you are migrating from DPA version 5.x to
version 6.2 SP3, the existing licenses are migrated with your configuration and data.
CLP and WLS license coexistence in DPA on page 43 provides more information.
If you are adding CLP licenses, ensure that you select license files with the .lic file
extension.
If you are adding WLS licenses, select license files with the .wls file extension.
After you install the license file, the DPA web console prompts you to close so it can
register the license file.
5. Log back in to the DPA web console.
6. (Recommended) If you added CLP licenses in step 4, register the DPA Application
server with the ESRS-VE. This registration process enables EMC Customer Support to
service the DPA instance.
Observe the following:
l If you are upgrading a previously registered ESRS, it is possible that ESRS will
show that it is already registered with the following error:
[ERROR] This node is already registered with an EMC Secure
Remote Support Service.
Then, ESRS shows that host IP is not available anymore with the following errors:
[ERROR] This node failed to delete with EMC Secure Remote
Support Service.
Offline: Validation error
Search EMC Knowledgebase article xxxxxx, available on http://
www.support.emc.com, for more information. This is an environment issue not
related to DPA.
l Registering ESRS after a fresh installation requires that an ESRS-VE be already
installed and reachable from the DPA Application server. If you are planning on
using ESRS-VE for remote troubleshooting (recommended), ensure that you have
the ESRS-VE environment installed and configured before DPA installation. The
EMC Secure Remote Services landing page at https://support.emc.com/
downloads/37716_EMC-Secure-Remote-Services-Virtual-Edition on EMC Online
Support provides more information on ESRS-VE installations. The EMC Data
Protection Advisor Software Compatibility Guide provides supported ESRS-VE module
and version information.
l Register a single Application service. The registration includes both DPA Datastore
and Application servers.
l If you are working in a clustered environment, register the Master Application
server with ESRS. Use the dpa app con command to check if your Application
server is Master or Slave server. The CLI section provides more information.
l When prompted for EMC Secure Remote Support username and password, provide
EMC online support credentials for registration. For example:
Output appears that indicates that the request to register the DPA server with IP
address that you typed is approved and the command is successful.
7. (Optional) If you want to configure alerting on Replication Monitoring, ensure that you
create Recoverabilty rules to the Analysis Policy and assign the rules to the desired
object. Go to Policies > Analysis Policies
8. (Optional) If you have upgraded from 6.2 SP1 or 6.2 SP2 and you would like to display
the Data Domain Overview dashboard and the Data Domain Details dashboard:
32 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
Installing DPA
Command options
--register (-r) <ESRS_IP address> — Registers the DPA Application with ESRS gateway
--update (-u) <DPA_new_IP address> — Updates the ESRS gateway with a new DPA server
IP address
--deregister (-d) — Unregisters the DPA Application server from ESRS gateway
--ping (-p) <ESRS_IP address> — Pings to obtain the DPA Application server/node
information
--help (-h) — Displays the help screen
Example
C:\Program Files\EMC\DPA\services\bin>dpa app support --register
10.11.110.111
signed certificate to encrypt Datastore server on page 34 and Using a Trusted Certificate
from a CA to encrypt the Datastore server on page 34 provide more information.
l server.crt
2. Save the self-signed certificate to the same location on the Application server that has
been saved on the Datastore server.
By default, the certificate is saved to the following location on the Datastore server:
l On UNIX: /opt/emc/dpa/services/datastore/data/
Ensure that you include the filename and path of your Trusted Certificate and key; in
the example, this is C:\SSL\apollossl.key.
2. Save the Trusted Certificate to the same location on the Application server that is has
been saved on the Datastore server.
34 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
Installing DPA
3. Run the dpa app condscert command to install the Trusted Certificate on the
the Application server. Ensure that you specify the path where to which the certificate
was saved in step 1 of this procedure. For example:
dpa app condscert C:\SSL\RSA-CombinedCertChainMachinename.cer. If no
certificate file and key file location are specified in the command line, DPA generates
its own certificates. It creates the certificate and key and puts them in the data folder.
4. Restart the DPA Datastore and Application services.
2. Restart the DPA Application service. The dpa app --help command provides
additional information.
3. (Optional) Install the certificate in those browsers that you use to access DPA. Follow
the instructions of your chosen browser.
It may take a few minutes on initial connection to open DPA when using a secure
connection.
n <install_dir>services\executive\wrapper.exe
n <install_dir>\agent\bin\dpaagent.exe
n <install_dir>\services\_jre\bin\java.exe
l DPA Datastore Server:
n <install_dir>\services\datastore\engine\bin\postgres.exe
n <install_dir>\agent\bin\dpaagent.exe
2. Exclude the following specific directories form being monitored by your antivirus
software.
l DPA Application Server:
n <install_dir>\services\standalone\**
n <install_dir>\services\tmp\**
n <install_dir>\services\shared\**
l File space on the DPA Datastore Server:
Note
If you selected advanced file system layout during Datastore installation, then
alternative directories may be used instead of the following defaults.
n <install_dir>\services\datastore\data\**
n <install_dir>\services\datastore\data\pg_log\**
36 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
CHAPTER 3
Administering DPA
Administering DPA 37
Administering DPA
The exported Datastore file is saved to the same directory where the export command
was run.
To save the exported Datastore file to a specific directory, specify the location at the end
of the command line. For example, the following command line exports the file to C:\
because that is the location specified: C:\Program Files\EMC\DPA\services
\bin>dpa datastore export C:\
38 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
Administering DPA
command replaces the existing datastore contents with the contents contained in the
Datastore export file.
Command options
--pipeline — Export to pipe
--help — Displays the help screen
--quiet — Suppresses all output except for warning and error messages
Examples
The default filename of the export is: datastore-<version> <date and time>.
For example, datastore-6_2_0_90597-2014-10-01-1135.
Where <filename> is a previously exported datastore file. The import command replaces
the existing Datastore contents with the contents contained in the Datastore export file.
Command options
--help — Displays the help screen
--quiet — Suppresses all output except for warning and error messages
<import_filename> — Filename of the exported file to import
Examples
Command options
--help (-h) — Displays the help screen
--version — Displays the tool version information
--quiet — Suppresses all output except for warning and error messages
Example
C:\Program Files\EMC\DPA\services\bin>dpa.bat app pwd
EMC Data Protection Advisor
Enter new administrator password:
Retype new administrator password:
Command completed successfully.
Completed in : 17.3secs
C:\Program Files\EMC\DPA\services\bin>
40 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
Administering DPA
and file age commands. You run only the DataProcessor for client
aggregation or for file age commands depending on your needs. Only run
both commands if you need to do so.
l The example commands in the procedure below that end in .bat are shown for
Windows. For UNIX/Linux implementation, the commands should end in .sh. For
example:
n for Windows: dd_scanner.bat
n For Linux: dd_scanner.sh
Procedure
1. Download the Data Domain DataProcessor package.
On Windows, the package is DPA-Data-Processor-Windows-x86_64-
<version>.xxxxx.zip. On UNIX, the package is DPA-Data-Processor-Linux-x86_64-
<version>.xxxxx.tar.gz, where<version> is the DPA DataProcessor version number and
xxxxx is the build number. The EMC Data Protection Advisor Release Notes provides
package location, version, and build information.
2. Extract the zip or tar.gz file to a folder on the dedicated host where you want to run the
DataProcessor tool.
3. On the DataProcessor tool host box, to go the /bin folder within installation directory
where you extracted the zip or tar.gz file.
4. To connect to the Data Domain and generate an input file for later analysis, run
dd_scanner.bat <datadomain host> <username>
where username is the Data Domain user with Admin role rights and datadomain host
is the name of the Data Domain object as it appears in the Inventory > Object Library
Storage tab.
Where:
l the input file is the gzip compressed text file that is generated by the
dd_scanner.bat command
l the dpa server is the server where the DataProcessor sends the data
l the dpa username is the username to log in to the DPA instance
The client aggregation command scans the information that was collected by the
previous dd_scanner command and sends client aggregation data to the DPA
server. The process auto-generates a folder with a name and datestamp of when the
dd_scanner command was run and when the input file was generated.
*************************************************************
** Client Aggregation **
** Version: 6.2.0. (12345) **
*************************************************************
You must leave the window open while the processes are running. If the output
indicates a failed or skipped process, rerun the command starting with the failed or
skipped process number. For example: \bin>client_aggregation.bat \data
\incoming\lxxxx111_lxx_emc_com_1401414141.txt 10.11.111.111
administrator 3
8. To analyze the input file for file age data to run the Data Domain File Distribution By
Count and Data Domain File Distribution By Size reports, run: file_age.bat <input
file> <dpa server> <dpa username>.
Where:
l the input file is the gzip compressed text file that is generated by the
dd_scanner.bat command
l the dpa server is the server where the DataProcessor sends the data
l the dpa username is the username to log in to the DPA instance
You must leave the window open while the processes are running. If the output
indicates failed or skipped process, rerun the command starting with the failed or
skipped process number.
Results
The client aggregation and file age data is available in the DPA server. DPA can report on
client aggregation and file age data for Avamar, NetWorker, NetBackup, and Oracle
RMAN.
42 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
Administering DPA
44 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)
CHAPTER 4
Uninstalling DPA
Uninstalling DPA 45
Uninstalling DPA
Add -i silent to the command if you want silent uninstallation. The uninstaller
will not ask you for input.
Results
When uninstalling the DPA Datastore, a warning indicating that the uninstaller will
remove the features that were installed during product installation appears indicating
that the database will be removed.
./Uninstall_Data_Protection_Advisor -i silent
l On Windows machines, type the following command through the command line:
Uninstall_Data_Protection_Advisor.exe -i silent
Agent-only uninstallation
You cannot uninstall only the Agent from the DPA Application server or Datastore server
installation.
If you would like to upgrade the DPA Agent, upgrade the Agent only on the existing DPA
Application server or Datastore server installation.
46 EMC Data Protection Advisor 6.2 SP3 DPA Plain Implementation (Installing the software)