NetWorker 19.1 VMware Integration Guide
NetWorker 19.1 VMware Integration Guide
NetWorker 19.1 VMware Integration Guide
Version 19.1
Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.” DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED
IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.
Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property
of their respective owners. Published in the USA.
Dell EMC
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.DellEMC.com
Figures 9
Tables 11
Preface 13
Appendix D EMC Backup and Recovery plug-in for Vmware Backup appliance
restores 267
FULLVM (Image-level) Restore................................................................268
Performing a FULLVM restore.....................................................268
Canceling a FULLVM restore....................................................... 269
Instant Access restore (for Data Domain systems only).............. 269
Restore from last backup............................................................. 271
Direct to host recovery................................................................ 272
Glossary 275
1 Revision history...........................................................................................................13
2 NetWorker VMware Protection with vProxy appliance requirements......................... 20
3 Incoming port requirements........................................................................................22
4 Outgoing port requirements....................................................................................... 22
5 Performance and scalability factors............................................................................26
6 Minimum required vCenter user account privileges ................................................... 52
7 Location of the vProxy redeployment log files ........................................................... 62
8 Schedule icons...........................................................................................................101
9 Schedule icons.......................................................................................................... 106
10 MSVMAPPAGENT binaries called by vProxy.............................................................128
11 Supported characters in SQL database names.......................................................... 130
12 SQL Skipped Database Cases and Descriptions........................................................ 135
13 Backup log files......................................................................................................... 137
14 FLR privilege requirements........................................................................................ 177
15 Recovery log files......................................................................................................215
16 Application information values ..................................................................................221
17 VADP recovery privileges ........................................................................................ 224
As part of an effort to improve its product lines, Dell EMC periodically releases
revisions of its software and hardware. Therefore, some functions that are described
in this document might not be supported by all versions of the software or hardware
currently in use. The product release notes provide the most up-to-date information
on product features.
Contact your Dell EMC technical support professional if a product does not function
correctly or does not function as described in this document.
Note: This document was accurate at publication time. Go to Dell EMC Online
Support (https://support.emc.com) to ensure that you are using the latest
version of this document.
Purpose
This document describes the integration of VMware with NetWorker.
Audience
This guide is part of the NetWorker documentation set, and is intended for use by
system administrators who are responsible for setting up and maintaining backups on
a network. Operators who monitor daily backups will also find this guide useful.
Revision history
The following table presents the revision history of this document.
Table 1 Revision history
02 July 09, 2019 The following changes are done in the guide:
l A topic is added in “vProxy limitations and
unsupported features”.
l Data domain requirements are updated in the topic
“System Requirement”.
01 March 20, 2019 First release of this document for NetWorker 19.1.
Related documentation
The NetWorker documentation set includes the following publications, available on the
Support website:
l NetWorker E-LAB Navigator
System requirements
The following table lists the required components for NetWorker VMware Protection
with the vProxy appliance.
When you install or upgrade NetWorker and deploy the vProxy appliance, ensure that
the NetWorker server and storage node are at the same version, and that you use the
latest version of the vProxy appliance.
Note: For more compatibility details and the most up-to-date versions supported,
refer to the NetWorker compatibility matrix at https://
elabnavigator.emc.com/eln/modernHomeDataProtection
Component Requirements
NetWorker l NetWorker 19.1 server software with NMC. The
NetWorker storage node should be the same version as
the NetWorker server.
l The vCenter plug-in (HTML5 or flash-based) requires
the NetWorker server and NetWorker Authentication
service to be installed on the same machine.
vProxy Appliance Version 4.0. System requirements for the vProxy include:
l CPU: 4 * 2 GHz (4 virtual sockets, 1 core for each
socket).
l Memory: 8GB.
l Disks: 2 disks (59 GB and 98 GB).
l Internet Protocol: IPv4 only.
l SCSI controller: Maximum 4.
l NIC: One vmxnet3 NIC with one port.
vCenter server l 6.0, 6.0U1, 6.0U2, 6.0U3, 6.5, 6.5U1, 6.5U2, 6.7, 6.7U1,
67U2.
l Version 6.5 and later is required to perform Microsoft
SQL Server application-consistent protection.
l Linux or Windows platform, or VC appliance.
Note: The NetWorker compatibility matrix at https://
elabnavigator.emc.com/eln/
modernHomeDataProtection provides detailed
information on NetWorker and vCenter/vSphere version
compatibility.
ESX/ESXi server l 6.0, 6.0U1, 6.0U2, 6.0U3, 6.5, 6.5U1, 6.5U2, 6.7, 6.7U1,
67U2.
l Version 6.5 and later is required to perform Microsoft
SQL Server application-consistent protection.
l Automatically enables Changed Block Tracking (CBT)
on each virtual machine.
Note: The NetWorker compatibility matrix at https://
elabnavigator.emc.com/eln/
modernHomeDataProtection provides detailed
information on NetWorker and vCenter/vSphere version
compatibility.
Component Requirements
Compatibility information
The NetWorker Online Compatibility matrix provides software compatibility
information for the NetWorker release, which includes NetWorker VMware Protection
with the vProxy appliance.
Port requirements
The NetWorker VMware Protection solution requires the ports outlined in the
following tables.
Note: The vProxy appliance does not support the use of a non-default vCenter
HTTPS port. To perform data protection operations using the vProxy appliance,
ensure that your vCenter server uses the default 443 HTTPS port.
vProxy Appliance Data Domain 22, 111, 131, 161, 2049, Data Domain
2052 management
Figure 2 Port requirements for NetWorker VMware Protection with the vProxy appliance
it is recommended that you do not install any additional tools or applications in the
appliance.
Configuration recommendations
l Ensure that the vCenter server's Datastore Browser feature
(enableHttpDatastoreAccess) is enabled to allow the backup and restore
operations to browse the datastores in the vSphere environment. The feature is
enabled by default, but you can verify that the vCenter vpxd.cfg file does not
contain the enableHttpDatastoreAccess entry or that it is set to True. For
further details, refer to the VMware Knowledge Base article at https://
kb.vmware.com/s/article/2101567.
l vProxy remote site configurations with a storage node communication latency
greater than 50 ms require a storage node in the remote site.
l For best practices related to SQL Server application-consistent protection, review
the software and security requirements in the section Enable the Microsoft VM
App Agent for SQL Server application-consistent protection.
l During policy configuration, assign virtual machines to a protection group based on
logical grouping to allow for better scheduling of backups that will help you avoid
resource contention and create more organized logs for review.
l When you plan the backups, ensure that NetWorker VMware Protection supports
the disk types that you use in the environment. Currently, NetWorker VMware
Protection does not support the following disk types:
n Independent (persistent and non-persistent)
n RDM Independent - Virtual Compatibility Mode
n RDM Physical Compatibility Mode
For RDM Dependent - Virtual Compatibility Mode, vProxy supports backup and
restore with the following limitations:
n Recover to New Virtual Machine will recover the vRDM disk as a regular thick
eager zeroed VMDK disk to the datastore selected during the restore.
n Instant Restore of Virtual Machine will recover the vRDM disk as a regular thick
eager zeroed VMDK disk.
n Revert a Virtual Machine does not support the Revert VM configuration
option if the backup includes a vRDM disk. Ensure that you do not select this
option during such restores.
l The vProxy Appliance leverages Changed Block Tracking (CBT) by default. If CBT
is disabled on the virtual machine, then it will enable CBT automatically. If you add
a disk to the virtual machine after the first full backup, for the next policy run a full
backup will be performed automatically for the newly added disk, and an
incremental backup will be performed for the existing disk. For information on
disabling CBT, refer to the section Enabling or disabling Changed Block Tracking.
l When backing up thin-provisioned Virtual Machines or disks for Virtual Machines
on NFS datastores, an NFS datastore recovery does not preserve thin
provisioning. VMware knowledge base article 2137818 at http://
kb.vmware.com/kb/2137818 provides more information.
l It is recommended that you set an appropriate NetWorker server/storage
parallelism value, according to the available resources, to reduce queuing. For
example, 5 vProxy appliances with backup and clone operations will require more
than 125 parallel sessions. Therefore, setting the parallelism for the NetWorker
server to 128 or higher (while also setting the server with 32+ GB memory and 8+
Number of concurrent NBD 50 (10G VMware uses Network File Copy (NFC) protocol to
backups per vCenter server network) read VMDK using NBD transport mode. You need one
VMware NFC connection for each VMDK file being
backed up. The VMware Documentation provides more
information on vCenter NFC session connection limits.
Virtual machines concurrent 100 100 Can be achieved with a combination of the number of
backups per vCenter server proxies multiplied by the number of configured hotadd
sessions per vProxy.
Number of workflows per 64 8 Ensure that you do not to exceed 2000 virtual
VMware policy machines per VMware policy.
Number of virtual machines 2000 Ensure that you do not to exceed 2000 virtual
per workflow machines per VMware policy.
Note that the maximum of 2000 virtual machines per
workflow is only applicable to the first FULL backup to
Data Domain, and does not apply to CBT-based
incremental backups of the virtual machines.
However, ensure that you do not exceed 100
connections per vCenter at any time during the backup
window.
Number of vCenter servers 5 3 Per policy you can use 5 vCenter servers in the
per policy respective workflows and trigger concurrent backups.
Total number of virtual 2000 1000 You can run multiple vProxy policies concurrently as
machines in a single long as the total number of concurrent backup streams
NetWorker policy does not exceed the vCenter limits indicated in this
table.
In the case of a single vCenter, stagger the schedules
for policies to ensure that all the backups for a policy
complete before the backups of the next policy begin.
Backup Optimization modes During creation of a VMware type group in NMC, you
can select a backup optimization mode of either
Capacity or Performance. Performance mode results
in additional space use on the Data Domain device
(around 20%) but significantly improves random I/O
performance for instant access restores.
Configuration checklist
The following configuration checklist provides best practices and troubleshooting tips
that might help resolve some common issues.
Basic configuration
l Synchronize system time between vCenter, ESX/ESXi/vSphere, and the vProxy
appliance
l Assign IPs carefully — do not reuse any IP address
l Use FQDNs (Fully Qualified Domain Names) everywhere
l For any network related issue, confirm that forward and reverse DNS lookups
work for each host in the datazone.
l Check the NFS settings and ensure that NFS v3 is enabled and running. If NFS v4
is enabled, ensure NFS v3 is also set to enabled in order to avoid issues with file-
level restore operations or instant recovery operations.
l For virtual machines within in application-consistent data protection policy,
network zoning must be configured to enable network connectivity between the
virtual machines and the Data Domain system.
NetWorker configuration
l Ensure that the relevant devices are mounted.
l Ensure that vProxy IP addresses are populated in DNS, and that the NetWorker
server has name resolution for the vProxy host names.
l The vCenter plug-in requires the NetWorker server and NetWorker Authentication
service to be installed on the same machine.
l Wait until you successfully configure a policy before you run the policy.
l A message appears after successful vProxy registration in NMC.
Network configuration settings do not get restored with virtual machine after
recovery of a vApp backup
Network configuration settings are not backed up with the virtual machine as part
of a vApp backup in NetWorker. As a result, when you restore a vApp backup, you
must manually reconfigure the network settings.
Concurrent vProxy workflows on the same virtual machine is not supported when not
using a vCenter server
NetWorker does not support running multiple vProxy workflows concurrently
(backup, image-level recovery, or file-level restore operations) on the same
virtual machine when not using a vCenter server in your environment.
Data Domain system requires REPLICATION license when clone of VMware backup
performed to same system as the backup
When cloning VMware backups using NetWorker VMware Protection with the
vProxy appliance, if the clone is performed to the same Data Domain system as
the backup, a REPLICATION license is required on the Data Domain system.
Virtual machine alert "VM MAC conflict" may appear after successful recovery of
virtual machine
After performing a successful recovery of a virtual machine through vCenter
version 6, an alert may appear indicating a "VM MAC conflict" for the recovered
virtual machine, even though the new virtual machine will have a different and
unique MAC address. You must manually acknowledge the alert or clear the alert
after resolving the MAC address conflict. Note that this alert can be triggered
even when the MAC address conflict is resolved.
The VMware release notes at http://pubs.vmware.com/Release_Notes/en/
vsphere/60/vsphere-vcenter-server-60u2-release-notes.html provide more
information.
Backups fail for resource pools recreated with the same name as deleted pool
When you delete a resource pool in vCenter and then recreate a resource pool
with the same name, backups fail. Re-configure the protection group with the
newly created resource pool.
Specify NBD for datastores if proxies should use NBD mode only
For proxies that only use NBD transport mode (proxies where you specify a value
greater than 0 for the NBD maximum sessions limit), you must also specify the
datastores for which you want the proxy to perform only NBD backups to ensure
that any backups of virtual machines running on these datastores are always
performed using NBD mode. This also ensures that the same NBD-only proxies
are never used for backups of virtual machines residing on any other datastores.
Retries, Retry Delay, and the Inactivity Timeout options for VMware backup action
are not supported
The Retries, Retry Delay, and the Inactivity Timeout options that appear during
creation of a VMware backup action in the NetWorker Management Web UI and
NMC are not supported. You can ignore these options when creating the backup
action.
VMware View in the NetWorker Administration map view does not display when
configuration for Virtual Machines within the vCenter is incomplete
When you use VMware View, the map view does not appear when the
configuration for one or more Virtual Machines in the vCenter is incomplete. To
avoid this issue, remove the incomplete Virtual Machine configurations from
vCenter.
Cannot select a vProxy or the cloned vProxy when you create a VMware group
When you create a new protection group, you cannot select vProxy or clones of
the vProxy from the hosts list. To use the clone vProxy as a normal virtual
machine, clear the annotation string This is EMC Backup and Recovery
vProxy Appliance in the Notes section of the cloned vProxy virtual machine.
Datastore cluster does not display in the Datastore selection drop-down of NMC
Recovery wizard for Virtual Machine Recovery or Virtual Disk Recovery types
If a vCenter server contains a datastore cluster, the datastore cluster name does
not display for selection during image-level recoveries using either the Virtual
Machine Recovery or Virtual Disk Recovery types in the NMC NetWorker
Administration Recovery wizard. When performing the recovery to a datastore
cluster, ensure that you select any valid datastore within the cluster that contains
enough free space to accommodate the virtual machine.
File level restore, emergency restore or Instant access restore on dual NIC vProxy is
supported only if VMkernel port is connected to backup subnet/VLAN
In order to use Instant Access restore, emergency restore, and file-level restore
with vproxy having dual NIC or multiple isolated VLANs configured, the
destination ESXi requires a VMkernel port connected to the backup subnet/
VLAN.
Data Domain backup data also uses the same “vProxy Production network”
portgroup, then you can ignore VM Network 2. Otherwise, ensure that you
assign the networks according to the following considerations:
l If the Data Domain backup data uses a separate private or isolated
physical network, use the optional VM Network 2 and map this network
to your desired destination network portgroup.
l If the Data Domain backup data uses a separate private or isolated
physical network, VM Network 2 should map to the “vProxy Backup
Data network” portgroup, which is the network with access to the Dell
EMC Data Domain, as indicated in the description when the network is
selected.
11. Select IPv4 from the IP protocol drop-down, and then click Next.
12. On the Customize template window, specify the following attributes, and then
click Next.
a. Expand Networking properties, and then perform the following tasks:
l In the Network IP address field, specify an IPv4 address for the vProxy
appliance.
l In the Default gateway field, specify the IP address of the gateway host.
l In the Network Netmask/Prefix field, specify the netmask for an IPv4
Network IP address.
Note: Similar to the Select networks window, if dual NIC is configured,
specify values for both VM Network and VM Network 2. If a single NIC
is configured, then specify a value only for VM Network and ignore VM
Network 2.
Note: The passwords for the root and admin account should be between
8 and 20 characters in length. Specifying a new password is mandatory
when deploying the vProxy using vCenter, otherwise the vProxy
appliance fails to power on. Ensure that you change the default
passwords of both the root and admin account during deployment.
l When you deploy the virtual appliance on a host with a resource pool or
vApp, select the resource pool or vApp on which to deploy virtual appliance.
9. On the Storage window, select the destination datastore on which to store the
virtual appliance files, and then click Next.
The Modify vCenter dialog displays, with the Hostname field greyed out as
this field cannot be changed in this dialog.
3. In the Username field, specify a new vCenter user account that has permissions
to perform backups.
4. In the Password field, specify the password for this vCenter user account.
5. If the vCenter server is deployed in the Cloud and this option is currently
unselected, select the Deployed in Cloud checkbox.
Note: When you select Deployed in Cloud, a parameter will appear in the
backup action logs that indicates HypervisorMode: VMC. When the
checkbox is not selected, the parameter indicates HypervisorMode:
vSphere.
6. Click OK.
Results
The changes will appear automatically in the visual representation of the vCenter in
the right pane of VMware View.
Note: If you want to delete a vCenter resource from NetWorker, right-click the
vCenter under VMware View and select Remove.
5. In the Hostname field, specify the FQDN or IP address of the vCenter server.
6. In the Username field, specify a vCenter user account that has permissions to
perform backups.
7. In the Password field, specify the password for the vCenter user account.
8. If the vCenter server is deployed in the Cloud, select the Deployed in Cloud
checkbox.
Note: When you select Deployed in Cloud, a parameter will appear in the
backup action logs that indicates HypervisorMode: VMC. When the
checkbox is not selected, the parameter indicates HypervisorMode:
vSphere.
9. Click Save.
An entry for the added vCenter server will appear automatically in the
Protection window's VMware vCenters pane. If an entry for the added
vCenter does not appear, click the Refresh icon. You can also use the Refresh
icon to refresh the vCenter inventory.
Results
When you select one of the available vCenter resources, the vCenter inventory
displays in the right pane of the window in a tree structure that allows you to view all
virtual machines and entities, and select individual items to view the entity's
properties. Additionally, you can toggle a switch to displays all entities (protected and
unprotected) in the tree, display only entries that are currently protected by a policy,
or display only unprotected entities. An entity that is already protected appears blue
and bolded.
Note: If you want to delete a vCenter resource from NetWorker, select the entry
in the VMware vCenters pane and click the Delete icon.
sessions per vCenter. Refer to the section "Performance and Scalability" for
recommended limits.
9. Click Next.
The VMware Proxies Configuration and Registration Summary page
displays.
10. Verify that the details are correct, and then click Configure.
Results
The jobs created for all vProxy registrations display in a table on the Check Results
page, where you can view the status, as well as the logs, for each entry. If you want to
close the wizard, you can also monitor the progress in the Monitoring pane of the
Devices window. To view the details of the job at any time, right-click an entry in the
Monitoring pane and select View Log.
When specifying the maximum sessions value for the transport modes,
ensure that at least one transport mode is set to a value greater than 0. If
you want to enable only one of the transport modes, set the maximum
sessions for the transport mode you do not want to use to 0. NetWorker
displays a warning message if you are exceeding 100 hotadd sessions per
vCenter. Refer to the section "Performance and Scalability" for
recommended limits.
8. Click OK.
When specifying the maximum sessions value for the transport modes,
ensure that at least one transport mode is set to a value greater than 0. If
you want to enable only one of the transport modes, set the maximum
sessions for the transport mode you do not want to use to 0.
l The vCenter plug-in (HTML5 or flash-based) requires the NetWorker server and
NetWorker Authentication service to be installed on the same machine.
Procedure
1. In the NetWorker Administration window, click Protection.
2. In the left navigation pane, expand the NetWorker server and click VMware
View.
3. In VMware View, right-click on the vCenter you added and select Install
vCenter plugin.
The vCenter Plugin Install dialog displays.
Figure 3 Install vCenter Plugin in NMC
Figure 4 vCenter plug-in for Dell EMC NetWorker in the vSphere Client
Note: If you installed the HTML-5 based plug-in, you can use the vcui log file
available at /nsr/authc/logs/vcui.log to assist with troubleshooting issues
with the Dell EMC NetWorker interface. If you installed the flash-based plug-in,
you can use the ebr-server log file available at /nsr/authc/logs/ebr-
server.log to assist with troubleshooting issues with the VM Backup and
Recovery interface.
Remove and reinstall the HTML5-based vCenter plug-in from the vSphere Client
In vSphere version 6.5 and later, the html-5 based vCenter plug-in appears as Dell
EMC NetWorker in the vSphere Client. If you need to remove the HTML5-based
plug-in and then reinstall the plug-in, perform the following steps.
Procedure
1. Stop the vSphere Client services.
2. Log into vCenter Server's MOB at http://vcenter-server/mob.
3. Click the content link.
4. Click the ExtensionManager link.
5. Click the UnregisterExtension link.
6. Enter the value com.dell.emc.nw and click the Invoke Method link.
7. Enter the value com.emc.networker.backup and click the Invoke Method link.
8. Enter the value com.emc.networker.recover and click the Invoke Method
link.
9. On the vCenter server, manually remove the plug-in from the /vsphere-
client-serenity folder. The path is /etc/vmware/vsphere-
client/vc-packages/vsphere-client-serenity on Linux, and
C:\ProgramData\VMware\vCenterServer\cfg\vsphere-client\vc-
packages\vsphere-client-serenity on Windows.
10. Restart the vSphere Client services.
11. Perform the steps in the section Install the vCenter plug-in for the vSphere
Client to re-install the HTML5-based plug-in, and verify that the Dell EMC
NetWorker interface appears in the vSphere Client.
Remove the flash-based vCenter plug-in from the vSphere Web Client
In NetWorker 9.2.x and earlier versions, the vCenter plug-in for vProxy backup and
recovery is a flash-based plug-in that appears as VM Backup and Recovery in the left
pane of the vSphere Web Client. vSphere versions 6.5 and later and NetWorker 18.x
both this plug-in and the html-5 based vCenter plug-in that appears as Dell EMC
NetWorker in the vSphere Web Client. If upgrading to NetWorker 18.x and you no
longer require the flash-based plug-in, perform the following steps in order to
manually remove VM Backup and Recovery from the vSphere Web Client.
Procedure
1. Stop the vSphere Web Client services.
2. Log into vCenter Server's MOB at http://vcenter-server/mob.
3. Click the content link.
4. Click the ExtensionManager link.
5. Click on the UnregisterExtension link.
6. Enter the value com.emc.networker and click the Invoke Method link.
7. Enter the value com.emc.networker.backup and click the Invoke Method link.
8. Enter the value com.emc.networker.recover and click the Invoke Method
link.
9. On the vCenter server, manually remove the plug-in from the /vsphere-
client-serenity folder. On vCenter 6.0 and 6.5, the path is /etc/
vmware/vsphere-client/vc-packages/vsphere-client-serenity
on Linux, and C:\ProgramData\VMware\vCenterServer\cfg\vsphere-
client\vc-packages\vsphere-client-serenity on Windows.
10. Restart the vSphere Web Client services.
Results
When the vCenter plug-in is validated, log in to the vSphere Client for the vCenter to
verify the installation. If the installation was successful, depending on the plug-in type
selected an entry for Dell EMC NetWorker or VM Backup and Recovery appears in
the Menu drop-down in the task bar, as shown in the following, and also appears in
the left navigation pane when you select Home.
Figure 5 vCenter plug-in for Dell EMC NetWorker in the vSphere Client
Note: If you installed the HTML-5 based plug-in, you can use the vcui log file
available at /nsr/authc/logs/vcui.log to assist with troubleshooting issues
with the Dell EMC NetWorker interface. If you installed the flash-based plug-in,
you can use the ebr-server log file available at /nsr/authc/logs/ebr-
server.log to assist with troubleshooting issues with the VM Backup and
Recovery interface.
Procedure
1. Create a vmwareAdmin group in NetWorker that contains the following
privileges at a minimum:
l View Security Settings
l View Application Settings
l Remote Access All Clients
l Operate NetWorker
l Monitor NetWorker
l Operate Devices and Jukeboxes
l Recover Local Data
l Recover Remote Data
l Backup Local Data
Results
The Active Directory user that you create using these steps will only have access to
the HTML-5 or flash-based vCenter plug-in, and cannot be used to log in to the Dell
EMC Data Protection Restore Client or the NetWorker Management Console. If
you also need to provide access to these applications, then add those required
privileges as described in the section File-level restore as a domain user.
l Move datastore
l Remove datastore
l Remove file
l Rename datastore
vApp l Export
l Import
l vApp application configuration
Virtual Machine
l Advanced
l Change CPU count
l Change resource
l Configure managed by
l Disk change tracking
l Disk Lease
l Extend virtual disk
l Host USB device
l Memory
l Modify device settings
l Raw device
l Reload from path
l Remove disk
l Rename
l Reset guest information
l Set annotation
l Settings
l Swapfile placement
l Upgrade virtual machine compatibility
9. Click OK.
10. From the Assigned Role drop-down list, select the role you created.
11. Confirm that the Propagate to children box is checked.
12. Click OK.
Migration pre-requisites
When you migrate a VMware Backup appliance policy to a vProxy policy, a pre-check
occurs automatically to determine that compatibility requirements are met.
These requirements include verification of the following items:
l The Data Domain OS (DD-OS) is DDOS version 6.0.0.30, 6.0.1-10, or 6.1.x and
later DDOS versions. Note that use of the DD Retention Lock feature on vProxy
backup and clone actions requires DDOS 6.1.x and later.
l The NetWorker server and storage node version are the same.
l The vProxy is available on the vCenter server, and is the correct version for the
NetWorker release. For NetWorker 19.1, this is version 4.0.x.
l The vCenter server is a minimum of version 6.0.
If this check discovers any compatibility issues that can cause problems migrating all
policies, the issues are reported and migration is cancelled. If using the command line
to migrate policies, you can specify a force flag (-f) to ignore these errors and
proceed with the migration to correct any issues afterwards, however it is
recommended that the pre-check requirements be met prior to proceeding with the
migration. Issues discovered during the pre-check will be logged and displayed even
when using the force flag.
3. (Optional) Right-click the vmware policy and select Policy Migration >
Analyze from the drop-down if you want to perform a compatibility pre-check
before migration.
4. Right-click the vmware policy and select Policy Migration > Migrate to start
the migration.
Figure 7 Migrating a VMware Backup appliance policy to vProxy in NMC
Results
A Migrate Operation Results dialog box opens which provides a real-time report of
the analyzation and the migration until the process completes. You can then choose to
export a log of the analyzation or migration as a report by clicking Export Log File.
Figure 8 Migrate Operation Results dialog
passwd admin
The pam_tally2 man page provides more information about the pam_tally2
command and how to configure the maximum number of login attempts for a user
account.
Procedure
1. Download the ova file from the support site and place it in the following
location:
Deployment Procedure
type
Single vProxy For a single vProxy deployment, open a command prompt, and
deployment then run the nsrvproxy_mgmt command in the following
format:
nsrvproxy_mgmt redeploy -h vProxy-host-name -z
vProxy-root-password [-x] [-f] [-u comments] [-t
timeout in minutes] [-D debug-level]
Where
l -t specifies the maximum timeout value for any active vProxy session to get
over and then start the redeployment. The default timeout value is ten
minutes.
l -x can be used when the vProxy admin password is same as that of root.
l -z is used when specifying the vProxy root password
Results
vProxy is successfully redeployed.
Limitations
The vProxy redeployment using nsrvproxy_mgmt redeploy command has a few
limitations.
l Redeployment is performed in thin provisioning mode only. If the original vProxy is
on thick provisioning, then post deployment the disk mode is changed to thin
provisioning.
l Concurrent vProxy redeployment is not supported. You can sequentially redeploy
multiple vProxy using a script.
l vProxy redeployment is not supported for vProxies that are directly deployed in
the ESXi bypassing the vCenter. If the vProxy is deployed on the ESXi bypassing
the vCenter, then you must manually redeploy the vProxy.
l The root and admin password length of the vProxy should be in between 8–20
characters only. Before redeployment, you must change the root and admin
password and update the vProxy resource in NetWorker with the updated vProxy
admin password.
l Deploying new vProxies using CLI is not supported
work list is composed of one or several work items. Work items include client
resources, virtual machines, save sets, or tags. You can chain multiple actions
together to occur sequentially or concurrently in a workflow. All chained actions use
the same work list.
When you configure an action, you define the days on which to perform the action, as
well as other settings specific to the action. For example, you can specify a destination
pool, a retention period, and a target storage node for the backup action, which can
differ from the subsequent action that clones the data.
When you create an action for a policy that is associated with the virtual machine
backup, you can select one of the following data protection action types:
l Backup — Performs a backup of virtual machines in vCenter to a Data Domain
system. You can only perform one VMware backup action per workflow. The
VMware backup action must occur before clone actions.
l Clone — Performs a clone of the VMware backup on a Data Domain system to any
clone device that NetWorker supports (including Data Domain system or tape
targets). You can specify multiple clone actions. Clone actions must occur after
the Backup action.
You can create multiple actions for a single workflow. However, each action applies to
a single workflow and policy.
The following figure provides a high level overview of the components that make up a
data protection policy in a datazone.
Figure 9 Data Protection Policy
c. If it does not exist, add the DD Boost user to the Users with DD Boost
Access table:
a. Click the + (Add) button that is located above the table and to the right.
b. In the User list, select an existing local user, or select Create a new
Local User and then create a user account.
c. Click Add, and then click Close.
4. For file-level restore and instant access restore only, on Protocols, select NFS,
ensure that NFS status is enabled, and then click OK.
The vProxy appliance dynamically creates and deletes the NFS shares, as
required.
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay
the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.
b. Use the Start Time spin boxes to specify the time to start the actions in the
workflow.
c. Use the Interval attribute spin boxes to specify how frequently to run the
actions that are defined in the workflow over a 24-hour period. The default
Interval attribute value is 24 hours, or once a day. When you select a value
that is less than 24 hours, the Interval End attribute appears. To specify the
last start time in a defined interval period, use the spin boxes.
d. Use the Restart Window attribute spin boxes to specify the duration of time
in which NetWorker can manually or automatically restart a failed or
canceled workflow.
7. Under Notifications, from the Notify list, select an appropriate notification
option.
l To use the notification configuration that is defined in the policy resource to
specify when to send a notification, select Set at policy level.
l To send notifications with information about each successful and failed
workflow and action after all the actions in the policy complete, select On
Completion.
l To send a notification with information about each failed workflow and
action after all the actions in the policy complete, select On Failure.
8. Under Notify, when you select the On Completion option or On failure option,
the Command field appears. Use this field to configure how NetWorker sends
the notifications. You can use the nsrlog command to send the notifications
to a log file.
The default notification action is to send the information to the
policy_notifications.log file. By default, the Protecting virtual
machines policy_notifications.log file is located in the /nsr/logs
directory on Linux and in the C:\Program Files\EMC NetWorker\nsr
\logs folder on Windows.
Use the default mailer program on Linux to send email messages or the
smtpmail application on Windows:
l To send notifications to a file, type the following command, where
policy_notifications.log is the name of the file:
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
mail -s subject recipient
l For NetWorker Virtual Edition (NVE), to send an email notification, type the
following command:
/usr/sbin/sendmail -v recipient_email "subject_text"
l On Windows, to send a notification email, type the following command:
smtpmail -s subject -h mailserver recipient1@mailserver
recipient2@mailserver...
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay
the SMTP email message.
9. Click NEXT.
10. Under Associate Group, do one of the following to assign the workflow to a
group:
l Select an existing group, and click FINISH to create a workflow.
l Click ADD to create a group. The section Create a VMware group using the
NetWorker Management Web UI provides more information on creating
groups.
After you finish
Create the actions that will occur in the workflow.
3. Click on an existing workflow to create an action. The action type can be one of
the following:
l Backup (Backup Subtype—VMware (vProxy))—Performs a backup of
virtual machines in vCenter to a Data Domain system. You can only perform
one VMware backup action per workflow. The VMware backup action must
occur before clone actions.
l Clone—Performs a clone of the VMware backup on a Data Domain system
to any clone device that NetWorker supports (including Data Domain system
or tape targets). You can specify multiple clone actions. Clone actions must
occur after the Backup action.
Note:
l If you have a VMware group associated with the workflow, the first
action that you can create is always a backup action, followed by any
number of clone actions.
l If you have a clone protection group (for example, Save Set ID)
associated with the workflow, you can only create clone actions.
l If you do not have any groups associated with the workflow, you can
either create a backup or a clone action.
policy or workflow that contains the action is started, clear this option. By
default, this option is selected.
8. Click NEXT.
9. From the Destination Storage Node list, select the storage node that contains
the devices where you want to store the backup data.
Note: When you deploy the vCenter server in the Cloud, a parameter
displays in the backup action logs that indicates HypervisorMode: VMC.
When not deployed in the Cloud, the parameter indicates HypervisorMode:
vSphere.
10. From the Destination Pool, select the media pool in which to store the backup
data.
11. Specify the NetWorker Retention Period value.
After the retention period expires, the save set is removed from the client file
index and marked as recyclable in the media database during an expiration
server maintenance task.
12. Select Apply Lock under DD Retention Lock to enable retention lock for the
virtual machines included in this backup action. Note that the device used for
backing up these virtual machines must also have DD Retention lock enabled.
13. Use the Lock Period spin boxes to specify the duration the virtual machines will
remain on the Data Domain device before the retention lock expires.
14. Click NEXT.
15. Under VMware-specific Configuration, select one of the following vProxy
options:
l Automatic—Select this option to allow NetWorker to choose the vProxy
host for backups.
l Manual—Specify this option to select the vProxy host that NetWorker
users for backups. Provide the name of the vProxy host in the vProxy Name
field.
16. Under Application Consistency, select Quiesce Application to enable
application-consistent protection as part of the policy backup action, which
includes protection of the Microsoft SQL Server. You can then select from the
Basic and Advanced options.
l Select the Basic option to create a backup copy for applications during
virtual machine quiescing. No additional processing is performed.
l Select the Advanced option to create an SQL server application-consistent
backup during virtual machine quiescing, and optionally create a transaction
log backup for all SQL Server instances.
When you select the Advanced option, the following additional options appear:
l Transaction Log Backup—Select this option, if you want to perform a
transaction log backup of SQL databases in the virtual machine as part of
the policy backup action.
Note: During SQL Server configuration, the NT AUTHORITY\SYSTEM
login must be granted SQL login and SQL sysadmin role rights in order to
perform transaction log backups.
l Quiesce Timeout—Specify the amount of time, in minutes, to wait for the
quiesce operation on the virtual machine to time out before failing. If not
selected, the backup action proceeds even if quiescing was not performed,
To perform the same type of backup on each day, click , and select one
of the following:
l Make All Full
l Make All Incremental
l Make All Logs Only
c. (Optional) Select Override Options to configure overrides for the task that
is scheduled on a specific day.
Note: If you select this option, you must configure the overrides using
either fixed dates or recurring dates.
d. Click NEXT.
19. Under Schedule Overrides, do the following:
a. In the Recurring Pattern attribute, if the status is Not Available, click ADD.
Otherwise, click VIEW/EDIT to specify recurring patterns. Then, select the
backup level, and define the override schedule to occur on a specific day,
week, month, quarter, or year.
The selected date is highlighted with a different color and an asterisk (*).
b. To specify a fixed date pattern, select the month and year, and then click on
each day to specify the backup level.
The selected date is highlighted with a different color.
Note:
l You can select multiple override dates.
l In the case of a fixed date pattern, to clear an override schedule, click
on the day that you want to clear the override for and select Clear
Selection. The Clear Selection option is not applicable in the case of
a recurring pattern.
l If the fixed and the recurring pattern is on the same day, the fixed
pattern gets preference. However, if you clear the fixed override
schedule, the recurring pattern is displayed.
l When creating overrides, you cannot select the previous month and
year. You also cannot create fixed overrides for the days before the
current day because the option to change the level is disabled.
l When editing overrides, you can clear existing fixed overrides for the
days before the current day. However, you cannot set any new
overrides because the option to change the level is disabled.
Use the default mailer program on Linux to send email messages or the
smtpmail application on Windows:
l To send notifications to a file, type the following command, where
policy_notifications.log is the name of the file:
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
mail -s subject recipient
l For NetWorker Virtual Edition (NVE), to send an email notification, type the
following command:
/usr/sbin/sendmail -v recipient_email "subject_text"
l On Windows, to send a notification email, type the following command:
smtpmail -s subject -h mailserver recipient1@mailserver
recipient2@mailserver...
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay
the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.
13. If you want to have the same retention period as that of the backup action,
select Keep Retention Same as Backup.
Note: If you select this option, you cannot configure the NetWorker
retention period.
14. Select Apply Lock under DD Retention Lock to enable retention lock for the
virtual machines included in this clone action.
15. Use the Lock Period spin boxes to specify the duration the virtual machines will
remain on the Data Domain device before the retention lock expires.
16. Click NEXT.
17. (Applicable only for a second clone action) In the Filter Savesets section, you
can do the following:
a. To define the criteria that NetWorker uses to create the list of eligible save
sets to clone, select Define Filters. The eligible save sets must match the
requirements that are defined in each filter. NetWorker provides the
following filter options:
l Time —In the Time section, specify the time range in which NetWorker
searches for eligible save sets to clone in the media database. Use the
spin boxes to specify the start time and the end time. The Time filter list
includes the following options to define how NetWorker determines save
set eligibility, based on the time criteria:
n Accept—The clone save set list includes save sets that are saved
within the time range and meet all the other defined filter criteria.
n Reject—The clone save set list does not include save sets that are
saved within the time range and meet all the other defined filter
criteria.
l Backup Levels —In the Backup Levels section, specify the backup levels
that you want to include or exclude, when NetWorker searches for
eligible save sets to clone in the media database. The Levels filter list
includes the following options, which define how NetWorker determines
save set eligibility, based on the backup level filter criteria:
n Accept—The clone save set list includes eligible save sets with the
selected backup levels.
n Reject—The clone save set list does not include eligible save sets
with the selected backup levels.
l Save Sets —In the Save Sets section, specify whether to include or
exclude ProtectPoint and Snapshot save sets, when NetWorker searches
for eligible save sets to clone in the media database. The Save Set filter
list includes the following options, which define how NetWorker
determines save set eligibility, based on the save set filter criteria:
n Accept—The clone save set list includes eligible ProtectPoint save
sets or Snapshot save sets, when you enable the ProtectPoint
checkbox or Snapshot checkbox.
n Reject—The clone save set list does not include eligible ProtectPoint
save sets and Snapshot save sets when you enable the ProtectPoint
checkbox or Snapshot checkbox.
l Clients —In the Client section, specify a list of clients to include or
exclude, when NetWorker searches for eligible save sets to clone in the
media database. The Client filter list includes the following options, which
define how NetWorker determines save set eligibility, based on the client
filter criteria:
n Accept—The clone save set list includes eligible save sets for the
selected clients.
n Reject—The clone save set list does not include eligible save sets for
the selected clients.
18. If you do not want to define a filter criteria, select Do Not Filter, and click
NEXT.
Note: The Filter Savesets feature is available only in the case of a second
clone action.
To perform the same type of backup on each day, click , and select one of
the following:
l Make All Execute
l Make All Skip
21. (Optional) Select Override Options to configure overrides for the task that is
scheduled on a specific day.
Note: If you select this option, you must configure the overrides using
either fixed dates or recurring dates.
b. To specify a fixed date pattern, select the month and year, and then click on
each day to specify the backup level.
The selected date is highlighted with a different color.
Note:
l You can select multiple override dates.
l In the case of a fixed date pattern, to clear an override schedule, click
on the day that you want to clear the override for and select Clear
a. Click NEXT.
b. Enter a list of comma separated save set IDs, and click ADD.
Note: You can also use the search function to filter the save set IDs from
the Selected Saveset ID List.
c. Click FINISH.
If the filter type is Dynamic:
a. Use the Maximum number of Clones spin boxes to specify the number of
clones that can be created for the save set.
b. Click NEXT.
c. (Optional) Specify one or more of the basic save set criteria.
d. Click the + icon to add a filter, and click the - icon to remove a filter.
e. Click NEXT.
f. (Optional) Select the save set resource filter.
g. Click FINISH.
Procedure
1. Select Protection > Rules.
Rules that have already been created appears. The details of the rule such as
the datasource type, condition, and usage also appears in the right pane.
2. Click ADD.
The Add Rules wizard appears.
3. In the Name field, type a name for the rule.
4. Select the Datasource Type from the drop-down. The default Datasource Type
is VMware.
5. (Optional) In the Description box, you can specify more information about the
rule.
6. Specify a matching condition. You can select All as the match type, if the item
has to meet all of the rules criteria or select Any to include the item, if the item
meets any of the criteria.
a. Specify the VMWare object type. You can select one of the following:
l Virtual Machine
l ESXi Host/Cluster
l Virtual App
l Virtual Machine Folder
l Datacenter
l Resource Pool
b. Specify the object type properties that the rule uses to determine a match.
It can be the object's name, path, or tag. The available properties depend on
the object type.
l Virtual Machine - name, vSphere tag
l ESXi Host/Cluster - path, vSphere tag
l Virtual App - name, vSphere tag
l Virtual Machine Folder - name, path, vSphere tag
l Datacenter - name, path, vSphere tag
l Resource Pool - path, vSphere tag
l regular expression
d. Click the Browse icon to select the vCenter server and vSphere tag and
click OK to exit the dialog.
Note: This option is available only if you select the vSphere tag property
type in the definition.
e. Click the + icon to add a rule definition, and click the - icon to remove a rule
definition.
7. Click Create.
The Rule is successfully created.
8. Repeat steps 1 through 7 for any additional rules that you want to create.
Note: You can associate a rule to a group, if dynamic selection is enabled
when creating groups. The section Create a VMware group using the
NetWorker Management Web UI provides more information on creating
groups.
Note:
l You cannot change the name of a rule.
l If you want to delete a rule, select the rule that you want to delete, and
click Delete. However, a rule cannot be deleted, if it is associated with a
group.
Gold policy
The Gold policy provides an example of a data protection policy for an environment
that contains virtual machines and requires backup data redundancy.
Silver policy
The Silver policy provides an example of a data protection policy for an environment
that contains machines where file systems or applications are running and requires
backup data redundancy.
Bronze policy
The Bronze policy provides an example of a data protection policy for an environment
that contains machines where file systems or applications are running.
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.
7. In the Restricted Data Zones tab, leave the Restricted Data Zone field blank.
NetWorker VMware Protection with the vProxy appliance does not currently
support the protection of virtual machines within a Restricted Data Zone.
8. Click OK.
After you finish
You can now create the workflow, group, and actions for the policy.
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
l For NetWorker Virtual Edition (NVE), to send an email notification, type the
following command:
where:
n -s subject—Includes a standard email header with the message and
specifies the subject text for that header. Without this option, the
smtpmail program assumes that the message contains a correctly
formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to
relay the SMTP email message.
n recipient1@mailserver—Is the email address of the recipient of the
notification. Multiple email recipients are separated by a space.
8. In the Running section, perform the following steps to specify when and how
often the workflow runs:
a. To ensure that the actions that are contained in the workflow run when the
policy or workflow starts, in the Enabled box, leave the option selected. To
prevent the actions in the workflow from running when the policy or
workflow that contains the action starts, clear this option.
b. To start the workflow at the time that is specified in the Start time
attribute, on the days that are defined in the action resource, in the
AutoStart Enabled box, leave the option selected. To prevent the workflow
from starting at the time that is specified in the Start time attribute, clear
this option.
c. To specify the time to start the actions in the workflow, in the Start Time
attribute, use the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the
workflow over a 24-hour period, use the Interval attribute spin boxes. If you
are performing transaction log backup as part of application-consistent
protection, you must specify a value for this attribute in order for
incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you
select a value that is less than 24 hours, the Interval End attribute appears.
To specify the last start time in a defined interval period, use the spin boxes.
Use the default mailer program on Linux to send email messages or the
smtpmail application on Windows:
l To send notifications to a file, type the following command, where
policy_notifications.log is the name of the file:
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
10. In the Running section, perform the following steps to specify when and how
often the workflow runs:
a. To ensure that the actions that are contained in the workflow run when the
policy or workflow starts, in the Enabled box, leave the option selected. To
prevent the actions in the workflow from running when the policy or
workflow that contains the action starts, clear this option.
b. To start the workflow at the time that is specified in the Start time
attribute, on the days that are defined in the action resource, in the
AutoStart Enabled box, leave the option selected. To prevent the workflow
from starting at the time that is specified in the Start time attribute, clear
this option.
c. To specify the time to start the actions in the workflow, in the Start Time
attribute, use the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the
workflow over a 24-hour period, use the Interval attribute spin boxes. If you
are performing transaction log backup as part of application-consistent
protection, you must specify a value for this attribute in order for
incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you
select a value that is less than 24 hours, the Interval End attribute appears.
To specify the last start time in a defined interval period, use the spin boxes.
For example, if the Start Time is 7:00 PM, the Interval is 1 hour, and the
Interval End is 11:00 PM., then the workflow automatically starts every hour
beginning at 7:00 PM. and the last start time is 11:00 PM.
11. In the Groups group box, specify the protection group to which the workflow
applies.
To use a group, select a protection group from the Groups list. To create a
protection group, click the + button that is located to the right of the Groups
list.
12. The Actions table displays a list of actions in the workflow. To edit or delete an
action in the workflow, select the action and click Edit or Delete. To create one
or more actions for the workflow, click Add.
The Actions table organizes the information in sortable columns. Right-click in
the table to customize the attributes that appear.
13. To create the workflow, click OK.
Note: You can also assign the group to a workflow when you create or edit a
workflow.
9. (Optional) Select the Dynamic Association checkbox if you plan to apply rules
that will determine which virtual machines and containers are dynamically
included in the group based upon the rule criteria. The section Enabling a
VMware group with Dynamic Association and applying rules in NMC provides
more information on enabling a policy/group with Dynamic Association and
applying rules.
10. From the vCenter drop-down, select the vCenter server that contains the
VMware objects that you want to protect, and then select the objects
(Datacenter, ESX host, virtual machine, resource pool, vApp, or disk) to include
in this group. Any objects selected here will be considered static objects, which
means that the items will be included in the group until unselected, even when
Dynamic Association is enabled.
Note: If the vCenter list is empty, cancel the task and, using the NMC
Protection window, right-click VMware View in the left pane, and select
Refresh.
11. (Optional) If the group as Dynamic Association enabled, from the Rule drop-
down, select a pre-defined rule that you want to apply for any VMware objects
that will be dynamically included in the group based upon the rule criteria, or
click + to open the Create Rule window and create a new rule. The section
Enabling a VMware group with Dynamic Association and applying rules in NMC
provides more information on associating a VMware group with rules.
12. Click Preview All Virtual Machines to view a list of the static and dynamic
virtual machines and objects that have been added to the group. In this window,
you can also unselect a virtual machine or VMDK to exclude the item from the
backup. When an object is unselected, an entry for the object appears in the
Excluded VM list.
13. Click OK to exit the Preview Virtual Machines window, and then click OK to
finish creating or editing the group.
Figure 11 Changing the Backup Optimization mode in the vProxy protection group
A VMware group with Dynamic Association enabled can include both static and
dynamic objects:
l Virtual machines and containers from the vCenter that are manually selected when
you create or edit the group in NMC are known as static objects, because their
inclusion in the group does not change unless you unselect an item.
l Virtual machines and containers that are only included in the group according to
the rules assigned when you create or edit the group in NMC are known as
dynamic objects, because their inclusion in the group can change over time based
on whether the items continue to match the rule criteria.
When creating or editing the group, you can preview both static and dynamic contents
to ensure that the protection policy will include all the virtual machines and containers
that you want protect in the backup. Additionally, you can specify a virtual machine
exclusion list for the VMware protection group to exclude particular virtual machines
or VMDKs from being backed up as part of the group.
When a VMware protection group is associated with one or more rules, the rules are
executed against the vCenter inventory when the policy backup is started in order to
filter the group contents according to the rule criteria.
Creating and viewing tags in the vSphere Web Client
In order to support the dynamic selection of VMware objects based on the user-
defined rules created in NMC, vSphere tags in the vSphere Web Client allow you to
attach metadata to the objects in the vSphere inventory to make these objects easier
to sort and search. Tags are supported in vSphere versions 6.5 and later.
When you create a tag in the vSphere Web Client, the tag can be assigned to a
category in order to group related tags together. When defining a category, you can
also specify the object types the tags will be applied to, and whether more than one
tag in the category can be applied to an object. Within a single rule, there is a
maximum limit of 50 rule definitions applicable to tags and categories, as shown in the
following example where Category is the category name and Bronze is the tag name:
l Category:Category1,Tag:Bronze1
l Category:Category2,Tag:Bronze2
l Category:Category3,Tag:Bronze3
l and so on up to Category:Category50,Tag:Bronze50
In the above example, if the number of characters associated with category name or
tag name are more than 9 or 7 characters respectively, then the maximum limit for
rule definitions in a single rule will be further reduced from 50. Exceeding the
maximum limit for rule definitions will result in no virtual machines being backed up as
part of this group, since there will be no members associated with the group. As a best
practice, it is recommended to keep the number of rule definitions within a single rule
to 10 or less and, in cases where there are a large number of rule definitions within a
single rule, it is also recommended to keep the number of characters in category/tag
names to 10 or less.
The vSphere Web Client displays any tags that have been created for the vCenter
under Tags & Custom Attributes in the left pane. When you click Tags & Custom
Attributes, select the Tags tab. A table lists the available tags. Click on a tag link in
the table to view the objects associated with this particular tag.
Note: Once virtual machines are associated with tags, the association will not be
reflected in the NMC NetWorker Administration window's VMware View until
the timeout period has completed. The default timeout for NetWorker to fetch the
latest inventory from vCenter is 15 minutes.
3. In the General tab, type a name for the rule, and select the Datastore Type
from the drop-down. The default Datastore Type is VMware.
4. In the Rule Definition pane, click Add.
5. In the Rule Definition pane:
a. For the Type column's drop-down, select the object type, for example,
VirtualMachine.
b. For the Property column's drop-down, select from one of the available
options, for example, Tag.
c. For the Operator column's drop-down, select from one of the available
options, for example, Equals.
d. Click Browse to display a list of all the categories and tags that have been
created on that vCenter server. Select the tag you want to apply to the rule
and click OK to exit the dialog.
Note: Tags are only supported in vSphere versions 6.5 and later.
6. Repeat steps 2 through 5 for any additional rules you want to create.
Note: If adding multiple rules, in order to specify whether to apply more
than one rule to the group, select either All or Any from the Match Type
drop-down.
7. When finished adding rules, return to the Protection window and right-click the
desired group in the left pane, and then select Properties from the drop-down.
The Edit Group window displays.
8. If not already selected, select the Dynamic Association checkbox, and then
select any virtual machine(s) in this workflow that you want to include in the
group regardless of the rules applied. These objects are known as static objects.
9. Select the desired rule from the Rule drop-down that you want to apply to the
other virtual machines in the workflow to determine which objects will be
dynamically included.
10. Click Preview All Virtual Machines to view a list of the static and dynamic
virtual machines and objects that have been added to the group. In this window,
you can also unselect a virtual machine or VMDK to exclude the item from the
backup. When an object is unselected, an entry for the object appears in the
Excluded VM list.
11. Save the changes in the Edit Group window, and close the window.
Results
When you select the specific VMware group in the Protection window, the vCenter
Objects Selected field displays the list of virtual machines that are statically selected.
Similarly, Protected VMs in VMware View only displays the virtual machines that are
statically protected.
9. Specify the order of the action in relation to other actions in the workflow:
l If the action is part of a sequence of actions in a workflow path, in the
Previous box, select the action that should precede this action.
l If the action should run concurrently with an action, in the Previous box,
select the concurrent action, and then select the Concurrent checkbox.
10. Specify a weekly, monthly, or reference schedule for the action:
l To specify a schedule for each day of the week, select Define option under
Select Schedule and period as Weekly by day.
l To specify a schedule for each day of the month, select Define option under
Select Schedule and period as Monthly by day.
l To specify a customized schedule to the action, select Select option under
Select Schedule and choose a customized schedule using the drop down
menu that is already created under NSR schedule resource.
11. Click the icon on each day to specify the backup level to perform.
Backup levels for NetWorker VMware Protection include the following.
Note: Any backup level that displays in the wizard but is not identified in
this table is not supported for VMware.
To perform the same type of backup on each day, select the backup type from
the list and click Make All.
Note: A full backup is required initially if performing application-consistent
backup of virtual machines as part of this action.
13. From the Destination Storage Node box, select the storage node that contains
the devices where you want to store the backup data.
Note: When you deploy the vCenter server in the Cloud, a parameter
displays in the backup action logs that indicates HypervisorMode: VMC.
When not deployed in the Cloud, the parameter indicates
HypervisorMode: vSphere.
14. From the Retention spin boxes, specify the amount of time to retain the
backup data.
After the retention period expires, the save set is removed from the client file
index and marked as recyclable in the media database during an expiration
server maintenance task.
15. Select the Apply DD Retention Lock checkbox to enable retention lock for the
virtual machines included in this backup action. Note that the device used for
backing up these virtual machines must also have DD Retention lock enabled in
the NMC Device Properties window, or DD Retention Lock must be enabled
during device creation.
16. In the DD Retention Lock Time box, specify the duration the virtual machines
will remain on the Data Domain device before the retention lock expires. During
this time, these virtual machine backups cannot be overwritten, modified, or
deleted for the duration of the retention period, although the backups can be
mounted and unmounted. The retention time period set here must fall within the
minimum and maximum values set for the Data Domain Mtree, and should be
lower than or equal to the NetWorker Retention Period.
17. In the vProxy section, select one of the following options:
l Auto vProxy Selection—Select this option to allow NetWorker to choose
the vProxy host for backups.
l Manual vProxy Selection—Specify this option to define the vProxy host
that NetWorker users for backups. Provide the name of the vProxy host in
the vProxy Name field.
18. From the Destination Pool box, select the media pool in which to store the
backup data.
Only pools configured with a DDBoost device appear in the drop-down.
19. In the Application Consistency section, select the Quiesce Application
checkbox to enable application-consistent protection as part of the policy
backup action, which includes protection of the Microsoft SQL Server. You can
then select from the Basic and Advanced options.
l Select the Basic option to create a backup copy for applications during
virtual machine quiescing. No additional processing is performed.
l Select the Advanced option to create an SQL server application-consistent
backup during virtual machine quiescing, and optionally create a transaction
log backup for all SQL Server instances.
When you select the option, the following fields display:
l Transaction Log Backup—Select this checkbox if you want to perform a
transaction log backup of SQL databases in the virtual machine as part of
the policy backup action. Note that if you enable transaction log backup, you
must also set a value for the Interval attribute in the Workflow properties
for this action, as specified in the section "Creating a workflow in a new
policy."
Note: During SQL Server configuration, the NT AUTHORITY\SYSTEM
login must be granted SQL login and SQL sysadmin role rights in order to
perform transaction log backups.
l Quiesce Timeout—Specify the amount of time, in minutes, to wait for the
quiesce operation on the virtual machine to time out before failing. If not
selected, the backup action will proceed even if quiescing was not
performed, unless a validation problem occurs. If an application-consistent
backup cannot complete due to a problem with validation, the backup action
will fail even if this checkbox is not selected.
l System Administrator Username and Password—Specify the virtual
machine credentials for a user with administrative privileges. All virtual
machines in the workflow should use the same System Administrator
username/password.
Note: Selecting the Advanced option will apply application-consistent
processing for all virtual machines within the parent workflow. When
selecting this option, ensure that the policy's workflow and client groups
are provisioned specifically for virtual machines that require advanced
26. From the Send Notifications list box, select whether to send notifications for
the action:
l To use the notification configuration that is defined in the Policy resource to
send the notification, select Set at policy level.
l To send a notification on completion of the action, select On Completion.
l To send a notification only if the action fails to complete, select On Failure.
15. In the Parallelism field, specify the maximum number of concurrent operations
for the action. This value should not exceed 25.
16. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the entire workflow if there is a failure with one of the jobs in the
action, select Abort workflow.
Note: If any of the actions fail in the workflow, the workflow status does
not appear as interrupted or cancelled. NetWorker reports the workflow
status as failed.
17. From the Send Notifications list box, select whether to send notifications for
the action:
l To use the notification configuration that is defined in the Policy resource to
send the notification, select Set at policy level.
l To send a notification on completion of the action, select On Completion.
l To send a notification only if the action fails to complete, select On Failure.
18. From the Soft Limit list, select the amount of time after the action starts to
stop the initiation of new activities. The default value of 0 (zero) indicates no
amount of time.
19. From the Hard Limit list, select the amount of time after the action starts to
begin terminating activities. The default value of 0 (zero) indicates no amount
of time.
20. Optional, in Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the
following options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the
time defined by the workflow.
l Absolute—Start the action at the time specified by the values in the spin
boxes.
l Relative—Start the action after the period of time defined in the spin boxes
has elapsed after the start of the workflow.
21. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To
specify the year, use the spin boxes. You can set an override in the following
ways:
l Select the day in the calendar, which changes the action task for the
specific day.
l Use the action task list to select the task, and then perform one of the
following steps:
n To define an override that occurs on a specific day of the week, every
week, select Specified day, and then use the lists. Click Add Rules
based override.
n To define an override that occurs on the last day of the calendar month,
select Last day of the month. Click Add Rules based override.
Note:
n You can edit or add the rules in the Override field.
n To remove an override, delete the entry from the Override field.
n If a schedule is associated to an action, then override option is
disabled.
occur as part of incremental backups after the initial full backup, at the interval set in
the workflow properties.
3. Click Yes.
The Media window displays the save sets contained within the policy. If the save sets
are additionally part of an application-consistent policy, a green check mark appears in
the VM App Consistent column.
Figure 15 VMware protection policy save sets in Media window
In the Host Name field, type the IP address of the host, and provide the vCenter
Server username and password credentials. Additionally, if the vCenter server is
deployed in the Cloud, select the Deployed in Cloud checkbox, and then click OK.
Note: When you select Deployed in Cloud, a parameter displays in the backup
action logs that indicates HypervisorMode: VMC. When the checkbox is not
selected, the parameter indicates HypervisorMode: vSphere.
When you add the vCenter server to VMware View, the following actions occur:
l A visual (map) or tabular representation of the vCenter environment appears in
the VMware View window.
l A client resource is created for the vCenter server with the vProxy backup type.
Using VMware View, you can also assign the policies you created in "VMware data
protection policies in NMC." to the vCenter objects.
The following sections describe the options that are available in VMware View.
To refine items displayed in the right details pane, select containers in the
Virtualization node hierarchy in the left pane. For example, if an individual Cluster is
selected in the Virtualization node, only child elements associated with that Cluster
display.
To filter the visible items to show only protected VMs, unprotected VMs, or
overprotected VMs, click the links located above the right pane, as shown in the
following figure.
Note: When you enable a VMware group with Dynamic Association, the
protected VMs reflect those virtual machines that are statically protected, and
does not include virtual machines that get dynamically added to the group after
rules are applied.
Figure 19 Filtering results in VMware View
The filtering function works the same in Table view as in Map view. Links provided
above the details pane allow you to display only overprotected virtual machines,
unprotected virtual machines, or all virtual machines in the environment. The
NetWorker Administration Guide provides general information on using tables in the
Administration window.
Note: In Table view, the Host field contains an undefined value for virtual
machines or containers that are part of a cluster. The Map view provides a link to
the cluster.
A prompt displays in the right pane with fields required to connect to the
NetWorker server.
3. For the NetWorker server, type the following information:
a. In the Username field, type the NetWorker administrator username.
b. In the Password field, type the NetWorker administrator password.
c. In the NetWorker Server field, type the IP address of the NetWorker
server.
d. In the Port field, type 9090.
Start a vProxy policy in the vSphere Client Dell EMC NetWorker interface
To start a vProxy backup policy by using the Dell EMC NetWorker interface in the
vSphere Client, perform the following steps.
Procedure
1. In the vSphere Client, if not already selected, click Dell EMC NetWorker in the
left pane.
When a connection to the NetWorker server is established, links to Basic Tasks
appear in the right pane.
2. From the Basic Tasks pane, click Assign Backup Policy, or click the Protection
3. Click the arrow to the left of a policy to expand and view the policy and
workflow details. You can click the Items link under the Workflow to display the
virtual machines protected by this workflow.
4. If you do not need to add or remove any virtual machines from the workflow,
click the three dots next to the policy and select Backup all sources or Backup
only out of date sources from the drop-down.
Results
A dialog displays indicating that the policy was successfully started. To close the
dialog, click OK. You can then click the blue arrows in the lower right corner of the
window to monitor the progress of the policy in the Recent Tasks pane.
Figure 27 Recent Tasks pane
Add virtual machines to a vProxy policy in the vSphere Client Dell EMC
NetWorker interface
Perform the following steps to edit a vProxy policy to add virtual machines to a
workflow by using the Dell EMC NetWorker interface in the vSphere Client.
Procedure
1. In the vSphere Client, if not already selected, click Dell EMC NetWorker in the
left pane.
When a connection to the NetWorker server is established, links to Basic Tasks
appear in the right pane.
2. Click Assign Backup Policy.
A list of available vProxy policies that were created in NMC displays in the right
pane.
3. Click the arrow to the left of a policy to expand and view the policy and
workflow details. You can click the Items link under the Workflow to display the
virtual machines protected by this workflow.
4. To add virtual machines to the workflow, click the three dots next to the policy
and select Edit from the drop-down.
Figure 29 Edit a vProxy policy
The Editing backup policy dialog displays with available backup sources.
5. Select any virtual machines or VMDKs in the inventory you want to protect with
this workflow, and then click Finish.
Results
Any virtual machines or VMDKs added to the workflow now appear when you click the
Items link under the workflow in the Policies pane.
4. Click Connect.
Results
When a connection to the NetWorker server is established, the Getting Started pane
appears.
3. Highlight the policy and workflow you want to run and click Backup now in the
top-right corner.
Results
You can monitor the progress of the backup in the Running tab of the Recent Tasks
pane.
Note: If you cancel a workflow from the vSphere Web Client and then want to
restart the backup, ensure that you restart the workflow from the vSphere Web
Client. If a workflow that was started from the vSphere Web Client is restarted
from the NMC NetWorker Administration window, the backup fails.
4. Select any virtual machines or VMDKs in the inventory you want to protect with
this workflow and click Finish.
Results
Any virtual machines or VMDKs added to the workflow appear under Sources in the
bottom of the Backup pane.
Changing this value to 0 overrides a VMware VDDK bug that inhibits hot-adding
an encrypted virtual machine. The VMware Release Notes provide more
information.
5. Save and close the file.
6. Run the following:
systemctl restart vbackupd.service
7. Set the following additional permissions for the vCenter user account role,
which is described in the section Create a customized role:
Cryptographic operations > Add disk
The VMware Administering VMware VSAN Guide provides more information about VSAN
encryption.
When configuring a virtual machine backup with vSAN encryption, perform the
following steps.
Procedure
1. Set the following permissions for the vCenter user account role, which is
described in the section Create a customized role:
Cryptographic operations > Add disk
If these messages appear, you can use PowerCLI commands to disable and then
enable CBT without powering off the virtual machines as described in the VMware
Msvmagentcatsnap.exe Catalogs the SQL VSS Full backup that Called by vProxy once the virtual
was performed by VMware Tools as an machine image snapshot has completed.
App Agent VSS Full backup of SQL
Server instances. Catalog is written to
Data Domain.
Msvmagent_snapshotrestore.exe Performs restore of SQL VSS Full Called by vProxy during restore of SQL
backup. Database FULL backup.
Prior to the restore, the virtual machine
image backup is mounted on the target
virtual machine. The
Msvmagent_snapshotrestore.exe
copies the VSS manifest documents
from the backup, and uses those
documents to perform a VSS-aware
restore of the SQL database. The SQL
database files are copied from the
mounted backup VMDK to the original
location of the database, and during the
VSS post restore, the SQL VSS Writer
completes recovery of the backup. If
transaction logs are to be restored, or if
the NORECOVERY option has been
specified, the database will be left in a
NORECOVERY state. The
msvmagent_snapshotrestore.exe
command also supports SQL Alternate
restore and instructs SQL the SQL
instance to be restored and to change
database name and file locations as
selected by the customer.
Msvmagent_apprestore.exe Performs restore of individual SQL Called by vProxy during restore of the
transaction log backup. transaction log backup.
For each transaction log restore,
Msvmagent_apprestore.exe
receives the Data Domain path for the
backup and performs a SQL VDI restore
of the transaction log backup. For
intermediate transaction logs, the
database is left in the NORECOVERY
state. For the final transaction log
restore, the database is either recovered
or left in the NORECOVERY state if you
specify this option. The STOPAT feature
may also be used for the final
transaction log restore if you specify this
Special character FULL and transaction log FULL and transaction log
backup restore
~ Tilde Supported Supported
Special character FULL and transaction log FULL and transaction log
backup restore
- Hyphen Supported Supported
Backup operations
The following troubleshooting items provide some direction on how to identify and
resolve common issues with vProxy backups.
SQL Server application-consistent backups fail with error "Unable to find VSS metadata files in
directory"
SQL Server application-consistent virtual machine backups might fail with the
following error when the disk.enableUUDI variable for the virtual machine is set to
False.
Unable to find VSS metadata files in directory C:\Program Files
\DPSAPPS\MSVMAPPAGENT\tmp\VSSMetadata.xxxx.
To resolve this issue, ensure that the disk.enableUUDI variable for the virtual machines
included in an SQL Server application-consistent backup is set to True.
Failed to lock Virtual Machine for backup: Another EMC vProxy operation 'Backup' is active on
VM
This error message appears when a backup fails for a virtual machine, when previous
backups of the virtual machine was abruptly ended and the VM annotation string was
not cleared.
To resolve this issue, clear the annotation string value for the virtual machine.
1. Connect to the vCenter server and navigate Home > Inventory > Hosts and
Clusters.
2. Select the virtual machine, and then select the Summary tab.
3. Clear the value that appears in the EMC Proxy Session field.
“The following items could not be located and were not selected {client name}.”
This error can occur when the backed up VM(s) cannot be located during Edit of a
backup job. This is a known issue.
Windows 2008 R2 VMs may fail to backup with “disk.EnableUUID” configured to “true.”
Windows 2008 R2 backups may fail if the VM is configured with the disk.EnableUUID
parameter set to true. To correct this problem, manually update the vmx configuration
parameter disk.EnableUUID to false by using the vSphere Web Client:
1. Shut down the VM by right clicking the VM and selecting Shut Down Guest OS.
2. Right click the VM and select Edit Settings.
3. Click VM Options.
4. Expand the Advanced section and click Edit Configuration.
5. Locate the name disk.EnableUUId and set the value to false.
6. Click OK on the next two pages.
7. Right click the VM and select Power On.
After you update the configuration parameter, the backups of the Windows 2008 R2
VM should succeed.
When VMs are moved in or out of different cluster groups, associated backup sources may be
lost
When you move hosts into clusters with the option to retain the resource pools and
vApps, the containers get recreated, not copied. As a result, the container is no longer
the same container even though the name is the same. To resolve this issue, validate
or recreate any backup jobs that protect containers after moving hosts in or out of a
cluster.
Backups fail if certain characters are used in the virtual machine name, datastore, folder, or
datacenter names
When you use spaces or special characters in the virtual machine name, datastore,
folder, or datacenter names, the .vmx file is not included in the backup. The vProxy
appliance does not back up objects that include the following special characters, in the
format of character/escape sequence:
l & %26
l + %2B
l / %2F
l = %3D
l ? %3F
l % %25
l \ %5C
l ~ %7E
l ] %5D
To resolve this issue, increase the values in the max target sessions and target
sessions attributes for the clone device. The NetWorker Administration Guide describes
how to modify the properties of a device.
Lock placed on virtual machine during backup and recovery operations continues for 24 hours if
vProxy appliance fails
During vProxy backup and recovery operations, a lock is placed on the virtual machine.
If a vProxy appliance failure occurs during one of these sessions, the lock gets
extended to a period of 24 hours, during which full backups and transaction log
backups will fail with the following error until the lock is manually released:
Cannot lock VM 'W2K8R2-SQL-2014' (vm-522): Another EMC vProxy
operation 'Backup' is active on VM vm-522.
Workaround
To manually release the lock on the virtual machine:
1. Open the vSphere Web Client.
2. Select the virtual machine and select Summary.
3. Select Custom attribute and click Edit.
4. Remove the attribute EMC vProxy Session.
Case Description
Database has When a database has been restored, this database will be skipped during
been restored transaction log backup because there is no Backup Promotion.
System System databases are automatically skipped for transaction log backup.
Database
Database State Database is not in a state that allows backup. For example, the database is in
the NORECOVERY state.
Recovery Database is in SIMPLE recovery model, which does not support transaction
Model log backup
Other Backup Most recent backup for the database was performed by a different backup
Product product.
New Database Database was created after most recent full backup.
Backup Failure Database was in state to allow backup, backup was attempted, but backup
failed.
All skipped databases will be backed up as part of the next full backup. Also, a skipped
database will not result in msvmagent_appbackup.exe failure. The only instance in
which msvmagent_appbackup.exe would potentially fail is if all databases failed to
back up.
The msvmagent_appbackup.exe program generates a history report of the
databases, if the database backup status was success/skipped/failed, and a reason if
they were skipped or failed if applicable. This history report is visible in the action logs
for the vProxy, which are available as part of the appbackup logs.
Note: For SQL virtual machine application-consistent data protection, the SQL
and operating system versions follow the NMM support matrix available at http://
compatibilityguide.emc.com:8080/CompGuideApp/.
Increase the vCenter query timeout before starting a VMware backup action
Before starting a VMware backup action, NetWorker queries the vCenter server to
determine if any changes have occurred in the items selected for backup. You can
increase the timeout value by setting the
NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT environment variable.
The amount of time for the query to complete depends on several factors, including
the network response time, the size of the vCenter, and the number of resources free
on the NetWorker server. The default timeout of the query is 30 minutes, after which
the backup fails with the following error:
nsrvproxy_save NSR warning Dispatcher: Request timed out
Perform the following steps to set the
NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT environment variable to a higher
timeout value. Note that the timeout value is in seconds. In this example, a value of
2700 (or 45 minutes) is used.
1. Set up the environment variable:
l On Linux, add the following lines to the /nsr/nsrrc file:
NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT=2700
export NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT
l On Windows, add a new variable called
NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT under Environment
variables > System variables, and specify a value of 2700.
2. On the NetWorker server, connect to nsradmin:
nsradmin -p nsrexec
3. Select/Print the 'NSRLA' resource:
p type: nsrla
4. Append to the attribute:
append environment variable names:
NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT
5. Select/Print the 'NSRLA' resource again to verify your changes:
p type: nsrla
The last attribute should display as environment variable names:
NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT.
On the NetWorker server, the location of log files for individual backups differ on
Windows and LINUX:
l Linux—/nsr/logs/policy/policy_name
l Windows—C:\Program Files\EMC NetWorker\logs\policy
\policy_name
where policy_name is the name of the policy resource associated with the backup
action.
Additional logging with the VMBackup broker
Debug logging of the vmbackup broker of nsrd is disabled by default. To turn on
additional logging, you can touch an empty file at <nsr>/tmp/vmbackup_logging.
Enabling of additional logging can be performed while other operations are in progress,
and a NetWorker restart is not required. To turn off additional logging, you can
remove the same file.
2. From the left pane, select VMware Proxies to display the virtual machine proxy
devices.
3. Right-click the virtual machine that you want to collect log bundle information
from, and then from the menu, click Log Bundle.
4. (Optional) Collect the recycled logs from the pop-up window selection.
Note: Since the temporary log bundle download occurs on the NetWorker server,
ensure that there is sufficient space on the drive where the Networker server is
installed.
Also, note that NMC cannot collect the log bundle when accessed from a remote
machine that cannot communicate with vProxy
MSVMAPPAGENT logs
You can access logs related to MSVMAPPAGENT from the following locations:
l Discovery log: C:\Program Files\DPSAPPS\MSVMAPPAGENT\logs
\msvmagent_discovery.log
l FULL backup: C:\Program Files\DPSAPPS\MSVMAPPAGENT\logs
\msvmcatsnap.log
l Transaction log backup: C:\Program Files\DPSAPPS\MSVMAPPAGENT\logs
\msvmagent_appbackup.log
l Restore of FULL backup: C:\Program Files\DPSAPPS\MSVMAPPAGENT
\logs\msvmagent_snapshotrestore.log
l Restore of transaction log backup: C:\Program Files\DPSAPPS
\MSVMAPPAGENT\logs\msvmagent_apprestore.log
vProxy logs
You can access these vProxy logs from the following locations:
l FULL and transaction log backups: /opt/emc/vproxy/runtime/logs/
vbackupd/BackupVmSessions-sessionnumber.log
l InspectBackup logs: /opt/emc/vproxy/runtime/logs/vsessionsd/
inspectBackup-sessionnumber.log
l Mount session logs: /opt/emc/vproxy/runtime/logs/vflrd/mount-
sessionnumber.log
l Browse session logs: /opt/emc/vproxy/runtime/logs/vflrd/browse-
sessionnumber.log
l Recover App sessions logs: /opt/emc/vproxy/runtime/logs/vflrd/
application-sessionnumber.log. Note that a few minutes after
b. In the Management user field, specify the username for a Data Domain user
that has admin access. For example, sysadmin. The Management user should
have Data Domain administrator privileges.
c. In the Management password field, specify the password of the
management user.
d. In the Management port field, specify the management port. By default, the
port is 3009.
Note: The NetWorker Data Domain Boost Integration Guide provides
information about the Cloud unit field and use of the Cloud tier device.
l config-user-dn
l config-user-dn-password
l config-user-object-class
l config-user-search-path
l config-user-id-attr
l config-group-search-path
l config-group-name-attr
l config-group-object-class
l config-group-member-attr
l config-active-directory
2. Register the AD domain user to NetWorker either using the command line or the
NetWorker Management Console user interface.
If using the command line:
For example, to create a tenant user ADuser with the alias FLR, run
authc_config -u administrator -e add-tenant -D tenant-
name=ADuser -D tenant-alias FLR -p password
7. Log in to the Dell EMC Data Protection Restore Client as the AD user, in the
format <tenant>\<domain>\<userid>. For example, default\rideblr.com
\ADuser.
Results
You can now perform file-level restore as an Active Directory user.
After selecting the Virtual Machine Recovery type, you can perform recovery of
individual virtual machines, or (for revert and virtual machine recovery options)
recovery from multiple virtual machines.
Procedure
1. In the Select the Recovery Type page, select Virtual Machine Recovery, and
then select a vCenter server to recover from using the Source vCenter server
drop-down. Click Next.
2. In the Select the Virtual Machine to Recover page, enter the name of the
source virtual machine(s) to recover from, or perform a search for the virtual
machine. Additionally, you can use the tabs on this page to choose a single
virtual machine or multiple virtual machines from a selected backup, or browse
the source vCenter to determine the required virtual machine source. When you
locate and choose the desired virtual machine(s), click Next.
3. In the Select the Target Backups page, select the virtual machine backup(s)
you want to restore from the Available Backups pane. This pane lists both
primary backups and, if available, clone copies. If you selected recovery from
multiple virtual machines, you can switch between virtual machines to browse
each machine's available backups by using the Virtual Machine Name drop-
down. Click Next.
4. In the Select the Virtual Machine Recovery method page, select from one of
the available recovery options:
l Revert (or rollback) a virtual machine
l Instant Recovery of a virtual machine (direct restore from a Data Domain
device)
l Virtual Machine recovery (recovery to a new virtual machine)
l Virtual Disk recovery (recover VMDKs to an existing virtual machine)
l Emergency recovery (recovery to an ESX host)
l File Level recovery (recover files from VMDKs to a file system, or as a
download).
Figure 39 Select the Virtual Machine Recovery method
Results
Subsequent wizard options change based on the recovery option selected, as
described in the following sections.
Note: The entire VMDK will be rolled back unless you have CBT enabled, in
which case only the changed blocks will be moved.
Procedure
1. In the Select the Virtual Machine Recovery Method page:
a. Select Instant Recovery.
b. Click Next.
2. In the Configure the Instant Recovery Options page:
a. Select the location where you want to restore the virtual machine in the
vCenter environment.
This does not have to be the original location, and can also be on a different
vCenter server.
b. Ensure that you select the Power on virtual machine and Reconnect to
network options.
c. Click Next.
Figure 42 Configure the Instant Recovery
If you have a single disks, or multiple disks with multiple datastores, you can
perform the following:
l Choose to recover a collection of all the available hard drives.
l Select a different datastore than the original datastore.
l Select a different datatore for each disk you want to recover.
l Specify the datastore where the virtual machine configuration files reside.
Optionally, select the Power on virtual machine and Reconnect to network
options to power on and reconnect after the recovery, and then click Next.
Results
The Check the Recovery Results page will display the duration of the recovery, and a
log file entry when the virtual machine recovery is complete.
c. Click Next.
4. In the Perform the Recovery page:
a. Specify a name for the recovery.
b. Check the summary at the bottom of the page to ensure all the details are
correct.
c. Click Run Recovery.
Results
The Check the Recovery Results page will display the duration of the recovery, and a
log file entry when the disk recovery is complete.
Note: When you start a VMDK recovery, the virtual machine will be powered off
automatically without issuing a warning message.
Emergency Recovery
The next virtual machine recovery option available in the NMC Recovery wizard is an
Emergency Recovery. An Emergency Recovery is required when you need to restore
the virtual machine to an ESXi host.
Before you begin
Emergency Recovery requires a vProxy set up on the ESXi host prior to running the
recovery.
Additionally, ensure that you disconnect the ESXi host from the vCenter server.
About this task
Note: During an Emergency Recovery, the vProxy gets associated with the ESXi
host and is unavailable for other operations on the vCenter server. Wait until the
recovery completes before initiating any other operations on the vProxy.
To complete the Recovery wizard with the Emergency Recovery method, perform the
following:
Procedure
1. In the Select the Virtual Machine Recovery Method page:
a. Select Emergency Recovery.
b. Click Next.
2. In the Configure the Emergency Recovery page:
a. Specify the target ESXi server in the vCenter environment.
b. Click Connect.
The Proxy Selection and Recovery Data panes get populated with the ESXi
server details.
3. In the Proxy Selection pane, if a proxy is not discovered, add a new proxy
which is deployed in vCenter but not added to NetWorker.
4. For the disks in the Recovery Data pane:
a. Select a datastore.
b. Optionally, select the Power on virtual machine and Reconnect to
network options.
c. Click Next.
5. In the Select Alternate Recovery Sources page:
a. Select the original disk backup, or a clone copy if one is available.
b. If recovering from a clone that is not on a Data Domain device, or recovering
from a Data Domain Cloud Tier device, specify the staging pool.
6. In the Perform the Recovery page:
a. Specify a name for the recovery and check the summary at the bottom of
the page to ensure all the details are correct.
b. Click Run Recovery.
Results
The Check the Recovery Results page will display a progress bar with the duration of
the recovery, and a log file entry when the Emergency Recovery is complete.
Note: The progress bar may not update correctly when you perform an
Emergency Recovery directly to the ESXi host.
When the Mount Results pane shows that the mount has succeeded, click
Next.
Note: This user should have privileges to install the FLR Agent, which is
required to perform file level recovery. For Linux virtual machines, this
requires the root user account or an equivalent sudo local user account, as
described in the section "FLR Agent installation on Linux platforms" of the
NetWorker VMware Integration Guide.
Results
The Check the Recovery Results page displays the duration of the recovery, and a
log file entry when the file level recovery is complete.
Additionally, make note of the name indicated in the Volume column for all of
the volumes you do not want to recover from, as you will require this
information in steps 5 and 6.
2. Click Close to display the Save Progress dialog, and then specify a name for
the recover and click Save to save your progress.
3. In the NMC Administration window, click Devices to display the Devices
window.
4. In the left navigation pane, select Devices. The list of devices displays in the
right pane.
5. For each volume you do not want to recover from that you made note of in step
1, locate the corresponding device, and make note of that device name.
6. For each device you identify as corresponding with those volumes, right-click
the device and select Unmount from the drop-down, and then also select
Disable from the drop-down.
Note: Ensure that no backups are currently running to these devices prior
to unmounting.
10. In the Perform the Recovery page, specify a name for the recovery and check
the summary at the bottom of the page to ensure all the details are correct.
Click Run Recovery.
The Check the Recovery Results page will display the duration of the
recovery, and a log file entry when the recovery is complete.
11. In the NMC Administration window, click Devices to return to the Devices
window, and in the left navigation pane, select Devices to display the list of
devices in the right pane.
12. For each device that you unmounted and disabled in step 6, right-click the
device and select Enable from the drop-down, and then select Mount from the
drop-down.
From the Backups and Clones pane, select from one of the available primary or
cloned backups, and then select the Recovery drop-down to choose from one of the
image-level recovery types available, or file level recovery. Additionally, ensure that
you specify the correct time range of the backup(s) that you want to recover.
5. In the Summary page, review the recovery details and then click Finish.
Results
The wizard exits and a message displays along the top of the VMware Recovery
window to indicate that a recovery request was submitted. Select Monitoring in the
left pane to view the duration and status of the recovery operation.
6. Click Next.
The Summary page displays.
7. In the Summary page, review the recovery details and then click Finish.
Results
The wizard exits and a message displays along the top of the VMware Recovery
window to indicate that a recovery request was submitted. Select Monitoring in the
left pane to view the duration and status of the recovery operation.
g. Click Next.
The Destination Location page displays.
4. In the Destination Location page, select the location in the vCenter server
where you want to recover the virtual machine, and then click Next.
The Summary page displays.
5. In the Summary page, review the recovery details and then click Finish.
Results
The wizard exits and a message displays along the top of the VMware Recovery
window to indicate that a recovery request was submitted. Select Monitoring in the
left pane to view the duration and status of the recovery operation.
Note that the status might not update to "Completed" or "Succeeded" upon a
successful instant recovery. If this occurs, cancel the corresponding NetWorker
restore task in the vSphere Client and the status will update correctly in the
NetWorker Management Web UI.
Note: To optimize use of NetWorker and Data Domain resources, it is strongly
recommended that you stop the instant recovery session once you satisfy your
recovery objectives.
Emergency Recovery
Select Emergency when you need to restore the virtual machine to an ESXi host.
Before you begin
Emergency recovery requires a vProxy set up on the ESXi host prior to running the
recovery.
Additionally, ensure that you disconnect the ESXi host from the vCenter server.
About this task
Note: During an Emergency Recovery, the vProxy gets associated with the ESXi
host and is unavailable for other operations on the vCenter server. Wait until the
recovery completes before initiating any other operations on the vProxy.
To complete the Recovery wizard with the Emergency Recovery method, perform the
following:
Procedure
1. In the VMware Recovery window's Backups and Clones pane, select from one
of the available primary or cloned backups, and then select the Recovery drop-
down.
2. From the Image Level drop-down, select Emergency.
The Recover wizard launches.
3. In the Configuration page:
a. From the ESX Server drop-down, select the IP of the ESX server in the
vCenter environment where you want to restore the virtual machine backup.
b. Specify the root Username and Password for the ESX Server.
c. In the Virtual Machine Name field, specify the name of the new virtual
machine.
d. Select Power On to power on the virtual machine after the recovery
completes.
Note: If the virtual machine is currently powered on, a dialog displays
requesting confirmation to power off the virtual machine. Additionally, if
a change has occurred in the virtual machine configuration since the
backup, a warning message displays.
e. Select Reconnect NIC to reconnect the network interface card after the
recovery completes.
f. If required, set a Debug level if you want to enable debug logs. The default
level is 0.
g. Click Next.
The VMware Proxy Configuration page displays.
4. In the VMware Proxy Configuration page:
a. For Proxy Selection Type, if the desired proxy has been discovered, select
an existing vProxy for the recovery. Alternatively, you can use a new vProxy
that is deployed in the vCenter but not yet added in NetWorker by selecting
Register a new VMware Proxy.
b. From the Select Proxy drop-down, select one of the registered vProxies.
c. Click Next.
The Disk Selection page displays.
5. In the Disk Selection page:
a. Use the VM Configuration Files drop-down to select the datastore where
the virtual machine configuration files will reside.
b. Select Use same datastore for all disks to use the same datastore that you
selected for the configuration files. This option is enabled by default. Clear
this option to select one or more of the available hard disks, and select a
Destination Datastore for each selected disk. The default Destination
Datastore selected is the original datastore, however, you can select a
different datastore for each disk you want to recover.
6. Click Next.
The Summary page displays.
7. In the Summary page, review the recovery details and then click Finish.
Results
The wizard exits and a message displays along the top of the VMware Recovery
window to indicate that a recovery request was submitted. Select Monitoring in the
left pane to view the duration and status of the recovery operation.
Note: The progress bar may not update correctly when you perform an
Emergency Recovery directly to the ESXi host.
Note: This feature is not supported for vProxy versions earlier than
NetWorker 18.2, even though the option is not greyed out.
d. Click Mount.
The disk mount initializes and a progress bar displays.
Note: You cannot browse the contents of the virtual machine backup until
the mounting of the destination virtual machine completes successfully.
6. When the mount completes successfully, click Next.
The Source Data page displays.
7. In the Source Data page, select individual folders to browse the contents of the
backup, and select the objects you want to recover. You can select all objects in
a folder by clicking the checkbox to the left of the Name field in the Contents
pane.
When any objects in a folder are selected, that folder is highlighted in blue in the
Folders pane. After selecting the objects that you want to recover, click Next.
by using the vProxy. Running VBA backups in NetWorker 18.2 and later is not
supported.
About this task
Note:
l You can only perform image-level recoveries of legacy VBA backups (the
Revert or New Virtual Machine recovery types). Other types or recovery are
not supported using the NetWorker Management Web UI. You can, however,
use the EMC Backup and Recovery plug-in within the vSphere Web Client
for other types of VBA recovery, provided that you still have an active VBA
instance.
l For the recovery of VBA backups, the staging pool must be a clone pool of
type Data Domain.
Procedure
1. In the NetWorker Management Web UI, go to Recover > VMware Recovery
The VMware Recovery window appears
2. From the Select vCenter drop-down, select a vCenter server.
A list of virtual machines in the vCenter displays.
3. Select the desired virtual machine, and then select one of the duration options
from the Showing results for drop-down in the Backups and Clones pane.
A list of primary and clone backups of the virtual machine performed within that
duration appear in a table within the Backups and Clones pane. The table
contains a column that allows you to identify which backups are legacy VBA
backups.
4. Click the filter icon in the lower left corner of the Backups and Clones pane,
and select VBA Backups and click OK.
A column appears in the table that allows you to identify which backups are
legacy VBA backups.
5. Select one of the available primary or cloned backups that indicates VBA, and
then click the Recovery drop-down.
6. From the drop-down, select Image Level, and then select the Revert or New
Virtual Machine recovery type. Note that these are the only supported types
for recoveries of VBA backups.
The Recover wizard launches.
7. Complete the Recover wizard according to the type you selected.
Note: When you select the staging pool for recovery, ensure that at least
one volume does not contain a copy of the selected save set. Alternatively,
if a save set is already recovered, then you can select the recovered save
set for further recoveries of the same virtual machine.
Results
When the recovery is initiated, the Networker performs resurrection on a staging pool
to convert the VBA backups to a vProxy-readable format, and then restores the virtual
machine. Note that the staging pool should reside on a Data Domain system.
This message provides an option to deploy the FLR Agent by providing the appropriate
credentials. Review the user requirements in the following sections for Linux and
Windows platforms to determine which users are supported.
FLR Agent installation on Linux platforms
The FLR Agent installation on Linux virtual machines requires that you use the root
account, or be a user in the operating system's local sudousers list. If credentials for
any other user are provided for the target virtual machine, the FLR Agent installation
fails, even if this user has privileges similar to a root user.
To allow a non-root user/group to perform the FLR Agent installation, provide sudo
access to the following files at a minimum:
l rpm command (SLES, RHEL, CentOS) and dpkg command (Debian/Ubuntu)
l /opt/emc/vproxyra/bin/postinstall.sh
l /opt/emc/vproxyra/bin/preremove.sh
Note the following additional requirements:
l Using the local sudouser for the FLR Agent installation requires NetWorker 18.2
and later and vProxy 3.0.1-1 or later. Any earlier versions will require you to use the
root account for the FLR Agent installation
l The sudo user/group must be configured for no password prompt
l The sudo user/group must be provided with the no requiretty option.
l To browse files for a file-level restore when you have user elevation enabled, you
must have appropriate authority in the guest virtual machine operating system, for
example, being allowed to run vflrbrowse via sudo without prompting for a
password.
l To perform a file-level restore when you have user elevation enabled, you must
have appropriate authority, for example, being allowed to run vflrcopy via sudo
without prompting for a password.
Once you complete the FLR Agent installation on the target virtual machine using the
root user account or a sudouser with the minimum file access requirements, you can
perform file-level restore operations as a non-root user on supported Linux platforms.
File-level restore on Linux is only supported on Red Hat Enterprise Linux versions 6
and 7, and SuSE Linux Enterprise Server versions 11 and 12.
FLR Agent installation on Windows
FLR Agent installation on Windows virtual machines requires that you use
administrative privileges. If the provided credentials for the target virtual machine do
not have administrative privileges, theFLR Agent installation fails. Once you complete
the FLR Agent installation on the target virtual machine using administrative
privileges, you can perform file-level restore using a non-administrator user.
FLR Agent installation on Windows for UAC-enabled Windows virtual machines
FLR Agent installation on a User Account Control (UAC) enabled Windows virtual
machine requires you to perform one of the following:
l Provide the credentials of the administrator user.
l Disable UAC during the FLR Agent installation, and then re-enable on completion.
On Windows versions 7, 8, and 10, the administrator account is disabled by default. To
enable the account, complete the following steps:
1. To activate the account, open a command prompt in administrative mode, and
then type net user administrator /active: yes.
2. To set a password for the administrator account, go to Control Panel > User
Accounts and select the Advanced tab. Initially, the account password is blank.
3. In the User Accounts pane, right-click the user and select Properties, and then
clear the Account is disabled option.
To disable UAC during the FLR Agent installation and then re-enable on completion of
the installation, complete the following steps:
1. Log in to the Dell EMC Data Protection Restore Client as an administrator user
to initiate a request to launch the FLR Agent installation window.
2. In the FLR Agent installation window, select the Keep vProxy FLR on target
virtual machine option.
3. Open regedit and change the EnableLUA registry key value at HKLM\SOFTWARE
\Microsoft\Windows\CurrentVersion\Policies\System to
0x00000000. By default, this is set to 1.
4. Proceed with the FLR Agent installation.
5. Open regedit and reset the EnableLUA registry key to the previous value to re-
enable UAC.
File-level restore and SQL database/instance level restore only supported from primary or clone
backup on a Data Domain device
NetWorker only supports file-level restore and SQL database/instance level restore
operations from a primary or cloned backup when the save set is on a Data Domain
device.
If a cloned backup does not exist on the Data Domain device, you must manually clone
a save set from the tape device to Data Domain before launching the Dell EMC Data
Protection Restore Client.
If backups reside on a non-Data Domain Device such as Cloud Boost, tape, Cloud Tier,
or AFTD, the backups do not display in the Dell EMC Data Protection Restore
Client. In this case, use NMC to identify and clone the save sets back to the Data
Domain device.
Procedure
1. Log in to the system console as a non-root user.
2. Run the sudo passwd root command.
Enter the new password twice to set a password for the root account.
3. Run the sudo passwd -u root command to unlock the root account.
4. Specify the root user credentials in the Dell EMC Data Protection Restore
Client and proceed to complete the file-level restore operation at least once.
While performing the file-level restore operation for the first time, remember to
select Keep FLR agent.
5. After performing the above steps at least once, you can revert the root account
to the locked state and use non-root account for future file-level restore
requests. Non-root user can lock the root account with the sudo passwd -l
root command.
NetWorker privileges required by File-level restore and SQL database/instance level restore
users
A new user group, VMware FLR Users, requires NetWorker privileges for User and
Admin logins to perform file-level restore and SQL database/instance level restore
operations in the Dell EMC Data Protection Restore Client.
Specify the following privileges for the VMware FLR Users group by using the NMC
NetWorker Administration window or nsradmin.
User Admin
Remote Access All Clients Remote Access All Clients
Create a user in the NetWorker authentication service (User mode file-level restore only)
When performing file-level restore in User Mode, you must create a user in the
Networker Management Console (NMC) using the Manage Authentication Service
Users option, and make note of the password as you will require this information when
logging in to the Dell EMC Data Protection Restore Client.
Before you begin
For file-level restores on Linux virtual machines, the root account or an equivalent
sudo local user account credentials is required for the target virtual machine in order
to install the FLR Agent. The section "FLR Agent installation on Linux platforms" of
FLR Agent requirements provides more details.
For file-level restores on Windows virtual machines, if the provided credentials for the
target virtual machine do not have administrative privileges, theFLR Agent installation
fails. To perform a file-level restore using a non-administrator user, ensure that the
FLR Agent is already installed on the target machine using administrative privileges.
Procedure
1. In the NMC NetWorker Administration window, click Server to open the
Server window.
2. In the left navigation pane, highlight User Groups, and then right-click and
select Manage Authentication Service Users.
Figure 50 Manage Authentication service users
6. Right click VMware FLR Users and select Properties. In the User field, create
an entry for the user created in step 4 (for example, user1), in the format
user=user1,host=NW server FQDN.
Results
You can now use this new user to log into the Dell EMC Data Protection Restore
Client.
l When you enable Admin Approval Mode (AAM) on the operating system for a
virtual machine (for example, by setting Registry/
FilterAdministratorToken to 1), the administrator user cannot perform a
file-level restore to the end user's profile, and an error displays indicating "Unable
to browse destination." For any user account control (UAC) interactions, the
administrator must wait for the mount operation to complete, and then access the
backup folders located at C:\Program Files (x86)\EMC\vProxy FLR
Agent\flr\mountpoints by logging into the guest virtual machine using
Windows Explorer or a command prompt.
l The FLR Agent installation on Linux virtual machines requires you to use the root
account, or be a local sudouser with the minimum required file access, as
described in the section FLR Agent requirements. Note that using the sudouser for
the FLR Agent installation requires NetWorker 18.2 or later and vProxy 3.0.1-1 or
later. Any earlier versions will require you to use the root account for the FLR
Agent installation. Once the FLR Agent installation is completed by a root user,
you can perform file-level restore operations as a non-root user.
l Mounting a Linux virtual machine for file-level restore requires a local Linux
account with permissions to the file system files.
l When you perform file-level restore on Ubuntu/Debian platforms, you must enable
the root account in the operating system. By default, the root account will be in
locked state.
l File-level restore is not supported on Ubuntu/Debian ext4 file systems.
l When running the NetWorker server on Windows platforms, file-level restore
session logs are not kept.
l For file-level restores on Windows 2012 R2 virtual machines, the volumes listed
under the virtual machine display as "unknown." File-restore operations are not
impacted by this issue.
l File-level restore of virtual machines with Windows dynamic disks is supported
with the following limitations:
n The restore can only be performed when recovering to a virtual machine
different from the original. Also, this virtual machine cannot be a clone of the
original.
n The restore can only be performed by virtual machine administrator users.
n If Windows virtual machines were created by cloning or deploying the same
template, then all of these Windows virtual machines may end up using the
same GUID on their dynamic volumes.
l File-level restore of Windows 8, Windows Server 2012 and Windows Server 2016
virtual machines is not supported on the following file systems:
n Deduplicated NTFS
n Resilient File System (ReFS)
n EFI bootloader
Restore operations and performance limitations
Review the following limitations related to file-level restore operations and
performance considerations.
l When a file-level restore or SQL restore operation is in progress on a virtual
machine, no other backup or recovery operation can be performed on this virtual
machine. Wait until the file-level restore session completes before starting any
other operation on the virtual machine.
l When the backup chain for an SQL instance restore contains 30 or more
transaction log backups, a message indicating the required permissions to
complete this action does not display in the Dell EMC Data Protection Restore
Client. Check the flr-server log for an error message similar to the following
to determine what additional privileges are required:
ERROR c.e.f.u.ProcessRestores - Failed restore attempt:
Recover request failed: Permission denied, user does not
have 'Create Application Settings' or 'Configure NetWorker'
privilege to create this resource - NSR recover.
l SQL instance restore fails in the Dell EMC Data Protection Restore Client when
the backup chain contains more than 75 transaction log backups. In such
scenarios, ensure that you perform a SQL database restore for each database in
the SQL instance one at a time.
l When you switch between different Data Domain devices for backup and clone
operations, the SQL transaction log backup does not get promoted to FULL on the
primary backup device. As a result, the transaction log backup fails with the error
Previous backup path must be specified for Transaction Log
backup. Note that this issue does not occur when the same Data Domain device
is used for the backup and clone.
If relabelling of the primary device has occurred, or you added a new Data Domain
device, unselect the Tlog backup option for the Backup Action, and then run the
SQL application-consistent workflow. After the FULL backup and clone
completion, re-select the Tlog backup option for the Backup Action and run the
SQL application-consistent workflow again. Subsequent transaction log backups
and clones will complete successfully.
l For file-level restore of high-density file systems (more than few hundred files/
folders), it is recommended to use either the NetWorker Management Web UI or
the Dell EMC Data Protection Restore Client (User or Admin mode, as
applicable) instead of the Recovery wizard in the NMC NetWorker
Administration window.
l A restore of individual SQL Server databases or instances in the Dell EMC Data
Protection Restore Client will overwrite the existing database, even if your
NetWorker version provides an option where you can unselect Overwrite the
existing DB.
l A SQL database restore to alternate is only supported for restoring from a lower
SQL version to a higher SQL version.
l The Dell EMC Data Protection Restore Client incorrectly allows you to select a
VMware Backup appliance as a destination client for file-level restore.
l After migrating from the VMware Backup appliance to the vProxy appliance, the
Dell EMC Data Protection Restore Client may continue to display VMware
Backup appliance backups along with the new vProxy backups for virtual
machines. Note, however, that you will only be able to perform file-level restore
from the new vProxy backups.
l After migrating from the VMware Backup appliance to the vProxy appliance, new
vProxy backups of virtual machines that were previously backed up with the
VMware Backup appliance will not be visible in the Dell EMC Data Protection
Restore Client in Admin mode. You must log in using User mode to view and
recover from these backups.
l You cannot use clone volumes for file-level restore when the primary backup
volume is unmounted or unavailable. The restore will fail looking for backup
volumes. If this occurs, dynamic staging allows you to use the secondary copy by
staging the requested virtual machine backups from the clone to an available
backup volume and then recovering the virtual machine.
l Browsing a large number of files at once may cause Internet Explorer to become
slow or unresponsive. The Chrome and Mozilla browsers issue a warning when
encountering a difficulty handling many files, but Internet Explorer does not.
l In a large environment where many virtual machines appear in the Dell EMC Data
Protection Restore Client, the navigation buttons (Back, Next, Finish) may
appear very small, requiring you to zoom in to see the options. It is recommended
that you use the latest versions of the Chrome or Firefox browsers to avoid the
issue.
l File-level restore supports direct restore from a cloned backup only if the clone
copy is on a Data Domain device.
l File-level restore does not restore or browse symbolic links.
l When you create partitions, fill the lower ordered indices first. For example, you
cannot create a single partition and place it in the partition index 2, 3, or 4. You
must place the single partition in partition index 1.
Using the Dell EMC Data Protection Restore Client for file-level restore and
SQL restore
The Dell EMC Data Protection Restore Client, which you access through a web
browser, allows you to select specific virtual machine backups as file systems, and
then browse the file system to locate the directories and files you want to restore. The
browser also allows you to restore individual SQL databases and instances.
The login page of the Dell EMC Data Protection Restore Client features two tabs—
an FLR tab for virtual machine file and folder restore, and an App tab for SQL
database and instance restore.
Additionally, the Dell EMC Data Protection Restore Client operates in one of two
user modes:
l User—For file-level restore, a user account that can restore folders or files to the
original virtual machine, as described in the section Restoring specific folders or
files to the original virtual machine in User mode.
For SQL restore, a user account that can restore individual SQL databases and
instances to the original machine from the virtual machine you are logged into.
This user can be an Authentication Service user, as described in the section
Restore of SQL Server application-consistent backups.
l Admin—For file-level restore, a NetWorker administrator account or
Authentication Service user that can restore folders or files from a different virtual
machine to any available destination client, as described in the section Restoring
specific folders or files from different virtual machines in Admin mode.
For SQL restore, a NetWorker administrator account or Authentication Service
user that can restore individual SQL databases and instances to the original
machine from any virtual machine you have access to that contains an SQL Server
application-consistent backup, or restore to a different virtual machine, as
described in the section Restore of SQL Server application-consistent backups.
Note: When a file-level restore operation is in progress on a virtual machine, no
other backup or recovery operation can be performed on this virtual machine.
Wait until the file-level restore session completes before starting any other
operation on the virtual machine.
Restoring specific folders or files to the original virtual machine in User mode
To restore specific folders and files to the original virtual machine on Windows and
Linux virtual machines, select the User tab in the Dell EMC Data Protection Restore
Client login page. In this mode, you connect to the Dell EMC Data Protection
Restore Client from a virtual machine that has been backed up by the vProxy
Appliance.
Before you begin
For the Data Domain resource, ensure that you provide the management credentials
and, if required, enter the export path appropriately. The section Entering
management credentials for the Data Domain resource (instant recovery and User
mode file-level restore only)provides detailed steps.
Additionally, you must create a user in the NetWorker Authentication Service by using
the NetWorker Management Console (NMC), as described in the section Create a
user in the NetWorker authentication service (User mode file-level restore only).
Procedure
1. Open a browser from the virtual machine that the restored files will be
recovered to, and enter a URL that points to the NetWorker server host and
indicates file-level restore. For example:
https://NetWorker server:9090/flr
Note: For User recoveries, you must connect to the NetWorker server from
a web browser on the virtual machine that will receive file-level restore
data.
The Dell EMC Data Protection Restore Client login window appears.
2. Select the User tab and the FLR tab, and then log in to the Dell EMC Data
Protection Restore Client with the user credentials of the virtual machine to
which you are logged in. This user account should also belong to the NetWorker
user group "VMware FLR Users" in order to be authorized to perform file-level
restore. The section NetWorker privileges required by File-level restore users
provides more information.
When you log in, the Select Backups page displays with a list of backups for
the local virtual machine.
3. On the Select Backups page, use the drop-down list to view the available
backups. You can set the backup filter to view backups on a specific day or
within a specific date range. Highlight a backup and double-click or drag and
drop to move the backup to the Selected Items pane. Click Next.
Note: When you click Next, if a folder hierarchy does not appear, the Dell
EMC Data Protection Restore Client may not support the file system in
use on the virtual machine. The section File-level restore limitations
provides more information.
4. On the Restore Options page, navigate to the file system drive where you want
to restore the items and select an existing folder, or specify a new folder name
in the restore destination, and then click Next.
Figure 54 Select restore location
Note: Additionally, you can select the Overwrite existing files and folders
option if you want to replace the existing files with the recovered files.
5. On the Select items to restore page, browse and select the files and folders
available for recovery. Note that you can sort items by Name, File size, or Date,
and you can also search for a specific file or folder name. To mark an item for
recovery, double-click the item, or drag and drop the item into the Selected
Items pane.
clicking the icon located in the upper right-hand corner of the window.
When you click the icon, the Restore Detail pane slides into view on the
right side of the window, displaying the ongoing restore operations. Clicking the
entry displays the progress of the restore and a recovery logs download option.
Figure 56 Restore Monitoring
Restoring specific folders or files from different virtual machines in Admin mode
To restore specific folders or files from a different virtual machine, select the Admin
tab in the Dell EMC Data Protection Restore Client login page. Once connected, you
can browse, select, and restore files and folders from any virtual machine that you
backed up with the vProxy Appliance. You can then restore items to the virtual
machine on which you are currently logged in, or to any available destination virtual
machine.
Procedure
1. Open a browser and specify a URL that points to the NetWorker server and
indicates FLR, as in the following example:
https://NetWorker server:9090/flr
The Dell EMC Data Protection Restore Client login window appears.
2. Click the Admin tab and the FLR tab, and then log in to the Dell EMC Data
Protection Restore Client with the NetWorker Authentication Service User
credentials.
Note: When using Admin mode, ensure that the user you specify for the
NetWorker server login has the correct privileges to use this option.
When you log in, the Select Backups page appears with a list of all the virtual
machines that were backed up by using the vProxy Appliance. The available
backups appear under each virtual machine, as shown in the following.
Figure 57 Select the backup(s) to restore from
Note: After migrating from the VMware Backup appliance to the vProxy
appliance, new vProxy backups of virtual machines that were previously
backed up with the VMware Backup appliance will not be visible in the Dell
EMC Data Protection Restore Client in Admin mode. You must log in using
User mode to view and recover these backups.
3. On the Select Backups page, use the arrows to the right of the entry to view
the available backups. You can set the backup filter to view backups on a
specific day or within a specific date range. Highlight a backup and double-click
or drag and drop to move the backup to the Selected Items pane. Click Next.
4. On the Restore Options page, select a destination virtual machine.
A login dialog box similar to the following figure appears for the restore
destination.
Figure 58 Select restore location
5. Log in to the destination virtual machine to initiate the mounting of the backup.
6. After you successfully log in, select the restore location. If desired, specify a
new folder name in this location. Click Next.
Note: Additionally, you can select the Overwrite existing files and folders
option if you want to replace the existing files with the recovered files.
7. On the Select items to restore page, browse and select the files and folders
available for recovery. Note that you can sort items by Name, File size, or Date,
and you can also search for a specific file or folder name. To mark an item for
recovery, double-click the item, or drag and drop the item into the Selected
Items pane.
Within this window, you can also discover and select the total number of items
available for recovery by scrolling to the far right of the directory structure and
right-clicking the icon located on the vertical scroll bar, as shown in the
following figure.
Figure 60 Total items available for recovery
clicking the icon located in the upper right-hand corner of the window.
When you click the icon, the Restore Detail pane slides into view on the
right side of the window, displaying the ongoing restore operations. Clicking the
entry displays the progress of the restore and a recovery logs download option.
machine does not have any running SQL Instances, an error will be displayed. You may
select the SQL instance from this where you want to restore the database. The ability
to select a different SQL Instance is only possible for individual database restore, and
when performing SQL Instance restore you are restricted to selecting the original SQL
Instance.
NetWorker automates the complete restore of SQL databases, restoring the database
FULL and any transaction log backups as a single operation according to the following
sequence:
l The primary FULL database backup is identified, mounted on the original virtual
machine, and the SQL database files from the FULL backup are restored to the
original database.
l If a transaction log backup was selected, the series of transaction logs that
occurred after the FULL backup to the selected transaction log are restored in
sequence.
NetWorker automates the complete restore of SQL instances according to the
following sequence:
l The master database is restored first, then msdn, then model. During this
restore, the SQL instance restarts in single-user mode as required by the
Microsoft SQL Server to restore the master database. When the restore
completes, the SQL services restart in multi-user mode.
l Each remaining database is restored individually, and includes the backup versions
present in the currently selected backup.
The Dell EMC Data Protection Restore Client provides the ability to monitor the
restore operations while in progress by enabling the Polling feature, which is disabled
by default. Once enabled, when you click the icon, the Restore Detail pane slides
into view on the right side of the window, displaying the ongoing restore operations.
Clicking the entry displays the progress of the restore and a recovery logs download
option.
Microsoft SQL Server instances in the original virtual machine to allow SYSTEM
account login and membership in the SQL sysadmin role.
Procedure
1. Open a browser from the virtual machine that the SQL databases or instances
will be recovered to, and enter a URL that points to the NetWorker server host
and indicates file-level restore. For example:
The Dell EMC Data Protection Restore Client login window appears.
2. Select the User or Admin tab, and then select the App tab.
Note: For User mode recoveries, you must connect to the NetWorker
server from a web browser on the virtual machine that the SQL database or
instance will be restored to.
4. On the Select App Backups page, use the arrows to the right of the entry to
browse and select from the available SQL Server application-consistent
backups, including all SQL instances, databases, and backup versions.
To select a backup version, expand the SQL instance and database to display
the backup versions pane, and then click the backup version item once or drag
and drop the item to move the backup to the Selected Items pane. You may be
required to scroll right to view the backup versions.
To select a SQL database or instance, drag and drop the entry to move the item
to the Selected Items pane. Note that you cannot drag and drop the SQL
database or instance when the entry has been expanded to view its children. If
you expanded the entry, reselect the virtual machine, and then select the SQL
database or instance to enable drag-and-drop.
Note: The backup filter is set to the last seven days by default. You can
expand the date range further back if desired.
When the mount completes, all SQL instances running on the selected virtual
machine display in this window.
Note: If the SQL Server is not installed, or there are no SQL instances
running, an error displays. If this occurs, log out of the Dell EMC Data
Protection Restore Client to cancel the mount.
6. Select the SQL instance where you want to restore the database, and then click
Next.
The Restore Options page displays.
7. On the Restore Options page, set the Diagnostic logging level, if required.
The default level is 0.
8. Select Leave the DB in recovery state if you want to activate the SQL Server
NORECOVERY database restore option, which places the database in a
recovering state upon completion of the restore and is useful for special
situations such as restoring transaction log backups taken by third-party
applications. Note that this option is not available for SQL instance restore. This
option also overwrites the database and then leaves the database in restoring
state.
9. In the Target Database Name field, you can type a new name if you want to
change the name of the database, or leave the current name. By default, this
field displays the name of the database at the time of backup.
Note: If you change the database name, the new name must comply with
the Microsoft SQL Server rules for database naming. Also, if you change
the name and another database with the same name already exists on the
target virtual machine and SQL instance, a warning displays that this
database will be overwritten if you proceed.
10. For the restore location, select from one of the following options under Restore
files to:
l Original Location—Select this option to restore the database files to the
original, or current, location. This option is only available if the original virtual
machine and SQL instance were selected as the restore target. By default,
the files are restored to the database location as it was at the time of
backup. Note, however, that if the database file locations were changed
after the backup, the files will be restored to the changed location.
l Default data path—Select this option to restore the database files to the
default data path for the target SQL Server instance. Each SQL Server
instance has a configuration variable for the default database data path and
log file path. When you select this option, all SQL data files will be restored
to the default data path, and all log files will be restored to the default log
path.
l Folder —Allows you to specify the folders where you want to restore the
database and log files. With this option, you can specify two folder locations
on the target virtual machine; one folder to store all the data files for the
database, and another folder to store all the log files for the database. Click
Browse to navigate the file system on the target virtual machine and select
the desired folders. By default, both folder locations are populated with the
SQL default data paths for the target SQL Server instance. Note that you
can only select an existing folder and cannot create a new folder using the
Dell EMC Data Protection Restore Client.
11. Select Restore Stop At Time if you want to restore transaction logs from the
backup version that occurred before the specified restore date and time. This
option is only available when you select a specific transaction log backup.
12. Click Restore.
Note: A restore of individual SQL Server databases or instances in the Dell
EMC Data Protection Restore Client will overwrite the existing database.
13. In the Restore Confirmation dialog, click Yes to continue the restore and
overwrite the existing database, or No to exit the restore.
If you changed the name of the database and another database with the same
name already exists on the target virtual machine and SQL instance, an
additional warning displays that this database will be overwritten if you proceed.
If you changed the name of the database and the name does not match any
available databases on the target virtual machine and SQL instance, an
additional warning displays indicating that a new database will be created.
14. To enable the polling feature so that you can monitor the status of the restore,
click the hourglass icon located in the upper right-hand corner of the window
and set to ON. By default, the polling feature is set to OFF due to the memory
consumption that occurs when the server is queried every few seconds for the
restore status.
15. Once the polling feature is enabled, you can monitor the status of the restore by
clicking the icon located in the upper right-hand corner of the window.
When you click the icon, the Restore Detail pane slides into view on the
right side of the window, displaying the ongoing restore operations. Clicking the
entry displays the progress of the restore and a recovery logs download option.
For SQL database restore, a single line displays. For SQL instance restore, one
line per database displays. In both cases, the Target field indicates the database
associated with the progress line.
A prompt displays in the right pane with fields required to connect to the
NetWorker server.
3. For the NetWorker server, type the following information:
a. In the Username field, type the NetWorker administrator username.
b. In the Password field, type the NetWorker administrator password.
c. In the NetWorker Server field, type the IP address of the NetWorker
server.
d. In the Port field, type 9090.
Figure 67 NetWorker connection information in the vSphere Client
Results
When a connection to the NetWorker server is established, the Basic Tasks pane
appears, as shown in the following.
Figure 68 Dell EMC NetWorker Basic Tasks pane
Note: If this list does not contain a virtual machine that was recently backed
up, refresh the window.
3. From the Client pane, click the radio button next to the virtual machine that
you want to recover.
A list of available restore points for that virtual machine displays in the right
pane. You can also specify a date range to view only the virtual machine
backups that were performed within that range.
4. Within the Restore pane, click the radio button next to the desired restore
point.
5. In the top-right of the Restore pane, click the Action icon and select Restore
from the drop-down.
Figure 70 Select Restore from the Action drop-down
Note: If this list does not contain a virtual machine that was recently backed
up, refresh the window.
3. From the Client pane, click the radio button next to the virtual machine that
you want to recover.
A list of available restore points for that virtual machine display in the right
pane. You can also specify a date range to view only the virtual machine
backups that were performed within that range.
4. Within the Restore pane, click the radio button next to the desired restore
point.
5. In the top-right of the Restore pane, click the Action icon and select Restore
from the drop-down.
Figure 73 Select Restore from the Action drop-down
Note: If this list does not contain a virtual machine that was recently backed
up, refresh the window.
3. From the Client pane, click the radio button next to the virtual machine that
you want to recover.
A list of available restore points for that virtual machine displays in the right
pane. You can also specify a date range to view only the virtual machine
backups that were performed within that range.
4. Within the Restore pane, click the radio button next to the desired restore
point.
The Content pane displays the virtual disks available for recovery.
5. Select the checkbox next to the disk(s) in the Content pane that you want to
recover. When selected, the disk will appear in the Restore Selection pane.
6. Click the Action icon and select Restore from the drop-down.
WARNING When you start a VMDK recovery, the virtual machine will be
powered off automatically without issuing a warning message.
Results
You can monitor the progress of the recovery in the Recent Tasks pane. Once the
recovery completes successfully, power ON the virtual machine to validate the
recovery.
Note: If this list does not contain a virtual machine that was recently backed
up, refresh the window.
3. From the Client pane, click the radio button next to the virtual machine that
you want to recover.
A list of available restore points for that virtual machine display in the right
pane. You can also specify a date range to view only the virtual machine
backups that were performed within that range.
4. Within the Restore pane, click the radio button next to the desired restore
point.
5. Click the Action icon and select Restore from the drop-down.
Figure 79 Select Restore from the Action drop-down
7. Click Next.
The Advanced Config page displays.
8. Specify a name for the new virtual machine, and then click Next.
The Location page displays.
9. Expand the vCenter server tree and select a destination for recovery within the
vCenter server, and then click Next.
The Host/Cluster page displays.
10. Select a host within the destination datacenter, and then click Next.
The Resource Pool page displays.
11. Select a resource pool, and then click Next.
12. In the Summary page, review the information and then click Finish to start the
recovery.
Results
You can monitor the progress of the recovery in the Recent Tasks pane. Once the
instant restore completes, use storage vMotion to save the virtual machine, and then
cancel the vSphere NetWorker Recovery task to delete the datastore. Power ON the
virtual machine to validate the recovery.
4. Click Connect.
Results
When a connection to the NetWorker server is established, the Getting Started pane
appears.
Procedure
1. Login to the vSphere Web Client as an administrator.
2. In the vSphere Web Client, click VM Backup and Recovery in the left pane.
When a connection to the NetWorker server is established, the Getting
Started pane appears.
3. Click Restore to open the Restore pane.
A list of virtual machines available for recovery displays.
Figure 82 Virtual machines for recovery in the Restore pane
If you do not see the virtual machine backup listed, refresh the window.
4. Browse the list of virtual machines and select the virtual machine backup you
want to recover. You can expand the virtual machine backup to view a list of
restore points from which to select.
Figure 83 Select a restore point
5. Select one of the restore points by clicking the checkbox next to the backup
time, and then click Restore.
The Restore Backup wizard launches.
6. In the Set Restore Options page of the Restore Backup wizard, leave the
default Restore to original location selected and click Next.
8. Specify a datastore for the virtual machine, and then click Next.
9. In the Ready to Complete page, click Finish to start the recovery.
Results
You can monitor the progress of the recovery in the Running tab of the Recent Tasks
pane. Once the recovery completes successfully, power ON the virtual machine to
validate the recovery.
7. In the Select Backup page, verify that the correct VMDK is selected and click
Next.
8. In the Set Restore Options page, uncheck the default Restore to original
location and then click Next.
9. Click Choose to browse the existing virtual machine where the VMDK needs to
be restored in the vCenter.
Figure 87 Set Restore Options for VMDK recovery
10. Specify a datastore for the VMDK, and then click Next.
11. In the Ready to Complete page, click Finish to start the recovery.
Results
You can monitor the progress of the recovery in the Running tab of the Recent Tasks
pane.
Note: When you start a VMDK recovery, the virtual machine will be powered off
automatically without issuing a warning message.
Results
You can monitor the progress of the recovery in the Running tab of the Recent Tasks
pane. Once the instant access recovery completes, use storage vMotion to save the
virtual machine, and cancel the vSphere NetWorker Recovery task to delete the
datastore. Power ON the virtual machine to validate the recovery.
Note: NetWorker 18.x releases do not feature a new version of the VADP proxy.
For VADP, NetWorker 18.x only supports recoveries that were configured in a
previous release. The NetWorker Online Compatibility Guide available on the Dell
EMC Online Support site at https://support.emc.com/products/1095_NetWorker
provides the most up-to-date compatibility information.
This chapter contains the following topics:
'HKEY_LOCAL_MACHINE/SOFTWARE/Wow6432Node/VMware, Inc./VMware
Virtual Disk Development Kit'
l Global directives (both encryption and compression directives) are not supported
by NetWorker for VADP recovery.
l Image-level recovery from a CBT-based incremental backup is not supported.
Transport modes
The VADP proxy host supports advanced transport modes for image-level recovery.
You can set the configured network transport mode to the following values during
recovery:
l SAN (Storage Area Network)—Selecting this mode completely offloads the CPU,
memory or I/O load on the virtual infrastructure. The I/O is fully offloaded to the
storage layer where the data is read directly from the SAN or iSCSI LUN.
SAN mode requires a physical proxy with SAN access, and the VMs need to be
hosted on either Fibre Channel or iSCSI-based storage. The corresponding VMFS
volumes must be visible in the Microsoft Windows Disk Management snap-in of
the VADP proxy host.
l Hotadd—In this mode, the I/O happens internally through the ESX I/O stack using
SCSI hot-add technology. This provides better I/O rates than NBD/NBDSSL.
However, selecting this mode places CPU, memory and I/O load on the ESX
hosting the VADP proxy.
Hotadd mode requires a virtual proxy, and the ESX hosting the virtual proxy should
have access to all the datastores where the VMs are hosted So, if the datastores
are SAN/iSCSI/NFS and if the ESX server where the VADP proxy resides is
separate from the ESX server where the VMs are hosted, then:
n In the case of SAN LUNs the ESX hosting the proxy and the ESX hosting the
VMs should be part of the same fabric zones.
n In the case of iSCSI LUNs the ESX hosting the proxy and the ESX hosting the
VMs should be configured for the same iSCSI-based storage targets.
n In the case of NFS datastores, the ESX hosting the proxy and the ESX hosting
the VMs should be configured for the same NFS mount points.
l NBD (Network Block Device): in this mode, the CPU, memory and I/O load gets
directly placed on the ESX hosting the production VMs, because the data has to
move through the same ESX and reach the proxy over the network. NBD mode
can be used either for physical or virtual proxy, and also supports all storage types.
l NBDSSL (Network Block Device with SSL): NBDSSL transport mode is the same
as NBD except that the data transferred over the network is encrypted. Data
transfer in NBDSSL mode can therefore be slower and use more CPU due to the
additional load on the VADP host from SLL encryption/decryption.
You can set multiple transport modes to be used by the VADP proxy host using the
pipe symbol “|” (for example, san|nbd|nbdssl).
By default, the transport mode field in the NetWorker User program is blank. Specify
one transport mode to use for recovery.
More information on configuring transport modes is provided in Configuring the VADP
proxy host and Hypervisor resource. The transport modes are outlined in the table
Table 16 on page 221.
Hypervisor resource if you cannot use VMware View in the NMC NetWorker
Administration window.
If vCenter is not configured in the environment, there must be a Hypervisor resource
created for each server in the environment.
You must create the corresponding Hypervisor resource in the NetWorker server prior
to starting the VADP recovery.
Creating a NetWorker client for the VADP Proxy host by using the Client
properties windows
About this task
be accessible from both ESX and the san | Hotadd | nbdssl | nbd.
VADP proxy. The order in which modes are
specified dictate the priority in
l Hotadd – This mode can be used which they are attempted. In
when VADP is used in a virtual proxy. the above example, the san
Because it uses the ESX I/O stack to mode is attempted first; if
move data, Hotadd is more efficient that fails the Hotadd mode is
than the transport mode NBD. attempted, and so on.
l NBDSSL – This mode is the same as
nbd except that the data transferred
over the network is encrypted. The
data transfer in nbdssl mode can be
slower and use more CPU than in the
nbd transport mode.
l NBD – VADP will use an over-the-
network protocol to access the
virtual disk. Data is read from the
storage device by the ESX host and
then sent across an unencrypted
network channel to the VADP proxy.
Please note that this mode does not
provide the offload capabilities of the
san mode (because data is still
transferred from the ESX host across
the network). However, nbd does not
require shared storage and also
enables VADP to be run inside a VM.
Procedure
1. In the NMC NetWorker Administration Protection window, right-click
Clients, and select New.
The Create Client dialog box displays.
2. Select the General tab.
3. In the Name attribute field, type the name of the proxy.
4. Select the Apps and Modules tab, shown in the following figure.
VADP_HYPERVISOR=any.vc
VADP_HYPERVISOR=another.vc
VADP_BACKUPROOT=G:\mnt
VADP_TRANSPORT_MODE=Hotadd
6. Click OK.
Assigning the VADP User role to the user specified in the NetWorker
Hypervisor resource
About this task
Note: Refer the appropriate VMware Basic System Administration or Datacenter
Administration Guide documentation for steps to assign a role to user.
VMware documentation can be found at http://www.vmware.com/support/pubs/
Procedure
1. Log in to the vCenter Server with Administrator privileges using vSphere Client.
2. Select the vCenter server in the left pane.
3. Click the Permissions tab in the right pane.
4. Right-click inside the right pane and select Add Permission.
5. Add the NetWorker Hypervisor user and assign the VADP User role.
6. Ensure Propagate to Child Objects is enabled and click OK.
Setting Privileges
Global l Cancel task
l Licenses
l Log Event
l Settings
Setting Privileges
Virtual machine > Configuration l Add existing disk
l Add new disk
l Add or Remove device
l Advanced
l Change CPU count
l Change Resource
l Disk change Tracking
l Disk Lease
l Extend virtual disk
l Host USB device
l Memory
l Modify device settings
l Raw device
l Reload from path
l Remove disk
l Rename
l Reset guest information
l Settings
l Swapfile placement
l Upgrade virtual machine compatibility
Setting Privileges
l Update task
Procedure
1. Launch the NetWorker User program on the NetWorker server or VADP proxy.
2. Browse the file system for the VM client and select file to recover, as outlined in
the NetWorker Administration Guide’s Recovery chapter.
3. Set the destination directory to the CIFS share of the VM client.
4. Recover the files onto the CIFS share.
5. At the VM client, move the files from the CIFS share to the appropriate
directory.
Note: The user must have the Remote Access All Clients privilege.
used to recover the VM image. If the current Datazone pass phrase was created
after a password-protected backup was performed, you must provide the
password that was in effect when the VM image was originally backed up.
5. In the VADP Restore dialog box, type the following information depending on
the type of recovery and then click the Start button.
Restore to VMware vCenter (VC):
VADP:datastore=”config=stor1#disk1=stor2#disk2=stor3”
recover.exe -S 413546679 -o
VADP:host=esxDemo1.emc.com;
VADP:transmode=Hotadd
Recover VMs that have a mix of VADP image-level and traditional guest based backups
If your VMs have a mix of both VADP image level backups and traditional guest based
(also known as client based) backups, you may have to use the following recovery
procedure.
Example
The following VM (host name mars) has a mix of both VADP and traditional guest
based backups. This example shows how to recover a traditional backup save set on
the VM by first locating the time of the backup save set using the mminfo command
and then by using that time with the recover command. The host name of the
NetWorker server in this example is jupiter.
full FULLVM
kuma-6.RO Data Domain mars 5/24/2011 10:59:22 PM 5243 MB 1440475890
cb full FULLVM
C:\recover -t "5/24/2011 10:38:39 PM" -s jupiter -c mars
Notice that in the previous example output from the mminfo command, the first two
lines listed are for traditional backup and the last two lines are for a VADP backup,
which is denoted with the save set name, FULLVM. The NetWorker Command
Reference Guide provides more information about using the recover command to mark
(select) files and to perform the recovery.
DISKPART
SAN POLICY=OnlineALL
Note: After the recovery is successful, SAN POLICY can be changed back
to the default value (SAN POLICY=offline or SAN POLICY=offlineshared).
After this entry has been added, run the following command in the VADP proxy
host to verify that the IPv4 address is being resolved:
C:\Users\Administrator>ping <vCenter hostname>
VMDirectPath restrictions
The following restrictions apply during the configuration of VMDirectPath:
l The ESX host must be rebooted after VMDirectPath is enabled.
l The VM must be powered down when VMDirectPath is enabled in order to add the
PCI/PCIe device directly to the VM.
l Using Fibre Channel tape drives in a VM is not supported without VMDirectPath in
production environments due to the lack of SCSI isolation. Tape drives can be
configured and used without VMDirectPath, but the support is limited to non-
production environments.
The VMware knowledge base article http://kb.vmware.com/kb/1010789 provides
information on configuring VMDirectPath.
The following features are not available for a VM configured with VMDirectPath, as
the VMkernel is configured without the respective device under its control when
passed to a VM:
l vMotion
l Storage vMotion
l Fault Tolerance
l Device hot add (CPU and memory)
l Suspend and resume
l VADP Hotadd transport mode (when used as virtual proxy)
Note: If using VMDirectPath in a NetWorker VADP virtual proxy host, then the
transport modes are limited to either NBD or NBDSSL. This is due to a
VMware limitation.
The following technical note provides additional information on VMDirectPath:
http://www.vmware.com/pdf/vsp_4_vmdirectpath_host.pdf
l If other VMs that reside on the same ESX/ESXi are sharing the underlying
hardware (physical CPU), it may be required to add more vCPU and dedicating
underlying hardware by using CPU affinity settings.
l To achieve optimal performance, it is recommended that the guest VM acting as
the DSN has a minimum of 4 GB of memory available with 2 vCPUs allocated.
l If multiple target sessions are needed in each device and 4 or more vCPUs are
assigned to the VM, ensure that there are enough devices available for backup
operations. An insufficient amount of devices can result in less throughput due to
CPU scheduling overhead of the Hypervisor.
l Ensure that the device drivers for the HBA are updated on the guest operating
system.
Note: Ensure that you select Remove from virtual machine and not
Remove and delete… when unmounting.
This appendix describes how to protect the vCenter server Appliance (VCSA) and the
Platform Services Controllers (PSC). It is intended for virtual administrators who
utilize the distributed model of the vCenter server and require protection of the
complete vCenter server infrastructure.
l It is recommended to schedule the backup of the vCenter server when the load on
the vCenter server is low, such as during off-hours, to minimize the impact of
vCenter virtual machine snapshot creation and snapshot commit processing
overhead.
l Ensure that there are no underlying storage problems that might result in long stun
times.
l Keep the vCenter virtual machine and all of its component virtual machines in one
single isolated protection policy. The protection policy should not be shared with
any other virtual machines. This is to ensure that the backup times of all vCenter
Server component virtual machines are as close to each other as possible.
l Ensure that the backup start time of the vCenter Server does not overlap with any
operations for other protected virtual machines being managed by this vCenter so
that there is no impact on other protected virtual machines during snapshot
creation and snapshot commit of the vCenter virtual machine.
l If the vCenter Server and Platform Services Controller instances fail at the same
time, you must first restore the Platform Services Controller and then the vCenter
Server instances.
Procedure
1. In the NMC NetWorker Administration Recover window, select Recover >
New from the main menu.
The Recover Configuration wizard opens on the Select the Recovery Type
page. Virtual Machine Recovery is the second option displayed in the
Recovery Type pane.
2. In the Select the Recovery Type page, select Virtual Machine Recovery, and
then select a vCenter server to recover from using the Source vCenter server
drop-down. Click Next.
3. In the Select the Virtual Machine to Recover page, enter the name of the
source virtual machine(s) to recover from, or perform a search for the virtual
machine. Additionally, you can use the tabs on this page to choose a single
virtual machine or multiple virtual machines from a selected backup, or browse
the source vCenter to determine the required virtual machine source. After
selecting the desired virtual machine(s), click Next.
4. In the Select the Target Backups page, select the virtual machine backup(s)
you want to restore from the Available Backups pane. This pane lists both
primary backups and, if available, clone copies. If you selected recovery from
multiple virtual machines, you can switch between virtual machines to browse
each machine's available backups by using the Virtual Machine Name drop-
down. Click Next.
5. In the Select the Virtual Machine Recovery method page, select Emergency
recovery, and then click Next.
6. In the Configure the Emergency Recovery page, specify the target ESXi
server in the vCenter environment, and then click Connect. The Proxy
Selection and Recovery Data panes get populated with the ESXi server details
7. In the Proxy Selection pane, if a proxy is not discovered, add a new proxy
which is deployed in vCenter but not added to NetWorker.
8. For the disks in the Recovery Data pane, select a datastore, and then
optionally, select the Power on virtual machine and Reconnect to network
options. Click Next.
9. In the Select Alternate Recovery Sources page, select the original disk backup
or select a clone copy if one is available. If recovering from a clone that is not on
a Data Domain device, or recovering from a Data Domain Cloud Tier device,
specify the staging pool. Click Next.
10. In the Perform the Recovery page, specify a name for the recovery and check
the summary at the bottom of the page to ensure all the details are correct, and
then click Run Recovery.
11. After the recovery operation, wait until the virtual machine restarts, and then
log into the vCenter Server Appliance shell as root
12. Verify that all PSC and vCenter services are running.
l For an appliance, run the service-control --status --all command in
the appliance shell.
l For a vCenter installed on Windows, from the Windows Start menu, select
Control Panel > Administrative Tools > Services.
After you finish
During an Emergency Recovery, the vProxy gets associated with the ESXi host and is
unavailable for other operations on the vCenter server. Wait until the recovery
completes before initiating any other operations on the vProxy.
Note: Ensure that you back up all vCenter server and PSC instances at the same
time
Recovery
Depending on the failure, you can perform virtual machine recovery by using one of
the following methods:
l Restore to original — This method is valid only when the VCSA is intact and
running, but corrupted.
l Recover as a new virtual machine to a managed ESXi server: Use this method of
you have completely lost your VCSA. Note that this vCenter must be registered
with NetWorker.
l Emergency recovery to an ESXi server. For Emergency recovery, perform the
steps specified in the section Restore an embedded PSC with Emergency
Recovery.
Note: In the event of a complete environment failure, PSC should be restored
first, followed by the vCenter server restore.
The following scenarios provide specific instructions based on the number of vCenter
server appliances and external PSCs in the environment and the extent of the failure.
vCenter server appliance(s) with one external PSC where PSC fails
Procedure
1. Perform an image-level recovery of the PSC by using one of the methods
indicated above, and then power ON the virtual machine.
2. Verify that all PSC services are running.
l For a PSC deployed as an appliance, run the service-control --status
--all command in the appliance shell.
l For a PSC installed on Windows, from the Windows Start menu, select
Control Panel > Administrative Tools > Services.
3. Log into the vCenter server appliance shell as root.
4. Verify that no vCenter services are running, or stop any vCenter services that
are running by typing service-control --stop.
5. Run the vc-restore script to restore the vCenter virtual machines.
l For a vCenter server appliance, type vcenter-restore -u
psc_administrator_username -p psc_administrator_password
l For a vCenter Server installed on Windows, go to C:\Program Files
\VMware\vCenter Server\, and then run vcenter-restore -u
psc_administrator_username -p psc_administrator_password
vCenter server appliance with multiple PSCs where one PSC is lost, one
remains
Procedure
1. Repoint the vCenter instance (insert link) to one of the functional PSC in the
same SSO domain.
Note: Log in to all vCenter servers one by one to determine which vCenter
log in fails. This will be the vCenter that requires the repoint steps.
Note: If the login test to any vCenter server appliance fails, then the
restored PSC is not the PSC that the vCenter server appliance is pointing
to, in which case you may be required to perform a repoint, as described
above.
5. Deploy the new PSC and join to an active node in the same SSO domain and
site.
6. Repoint vCenter connections as required
Additional considerations
Review the following additional considerations when backing up and restoring the
vCenter server and PSC.
l Backing up the vCenter server will not save the Distributed switch (vDS)
configuration as it is stored on the hosts. As a best practice, back up the vDS
configuration by using a script that can be used after restoring the virtual center.
l After restoring the PSC, verify that replication has been performed as designed by
using the following commands to display the current replication status of a PSC
and any of the replication partners of the PSC:
n For VCSA, go to /usr/lib/vmware-vmdir/bin and type ./vdcrepadmin -
f showpartnerstatus -h localhost -u administrator -w
Administrator_Password
n For Windows, open a command prompt and type cd "%VMWARE_CIS_HOME
%"\vmdird\
l For the vCenter server or PSC, do not select advanced quiesce-based backup
options. Selecting these options will result in application quiescing on virtual
machines, which impacts the overall environment due to stunning.
The VMware vCenter server documentation, available at https://
docs.vmware.com/en/VMware-vSphere/index.html, provides more information about
the vCenter server and PSC.
Command reference
Use the following command to start or stop services in the vCenter server/PSC, or
obtain the status:
service-control -status/start/stop -all
You can use other Replication topology commands, as in the following example.
/usr/lib/vmware-vmdir/bin/vdcrepadmin -f showpartners -h
localhost -u PSC_Administrator -w password
Note: You can replace localhost with another PSC FQDN to obtain all of the
partnerships in the current vSphere domain.
3. Review the Rollback tab and confirm that the latest validated checkpoint is less
than 24 hours old.
4. Log into the VBA via SSH as user admin and take a manual checkpoint by
running the command mccli checkpoint create --
override_maintenance_scheduler
5. Use the mccli command to verify that you have successfully created a
checkpoint by running: mccli checkpoint show
An output similar to the following displays:
The VBA may take 10-15 minutes to correctly shutdown. If there are issues
during the reboot, a service request should be opened with NetWorker support.
Prerequisites
Domain Name System (DNS) resolution is critical for NetWorker deployment and
configuration. All infrastructure components should be resolvable through a fully
qualified domain name (FQDN). This is especially important for the NetWorker Server,
NetWorker vProxy, Data Domain appliance, and CloudBoost appliance. Resolvable
means that components are accessible through both forward (A) and reverse (PTR)
look-ups.
Review the following prerequisites prior to configuring NetWorker in a VMware Cloud
on AWS. Also, ensure that you plan your firewall according to these prerequisites.
VMware Cloud on AWS web portal console
In the VMware Cloud on AWS web portal console, note the following requirements:
l If using NSX-T, configure the DNS to resolve to the internal IP address of the
vCenter server. Navigate to SDDC Management > Settings > vCenter FQDN and
select the Private vCenter IP address so that you can directly access the
management network over the built-in firewall. Additionally, ensure that you open
TCP port 443 of the vCenter server in both the management gateway and the
compute gateway.
l By default, there is no external access to the vCenter Server system in your SDDC
(Software Defined Data Center). You can open access to your vCenter Server
system by configuring a firewall rule. Set the firewall rule in the compute gateway
of VMware Cloud on AWS to enable communication to the vCenter public IP
address from the desired logical network of your SDDC. The NetWorker server will
not allow you to add the vCenter Server if this firewall rule is not configured in the
SDDC.
l The default compute gateway firewall rules prevent all virtual machine traffic from
reaching the internet. To allow your NetWorker Server virtual machine to connect
to the internet, you need to create a compute gateway firewall rule to allow
outbound traffic on the logical network that your NetWorker Server virtual
machine is connected to.
l Configure DNS to allow machines in your SDDC to resolve fully-qualified domain
names (FQDNs) to IP addresses belonging to the internet. The NetWorker Server
will not allow you to add the vCenter Server using the server's public FQDN or IP
address if the DNS server is not configured in your SDDC.
l It is recommended that you deploy the Data Domain system as a virtual appliance
in the Amazon VPC (Virtual Private Cloud) of your choice. During the SDDC
creation, ensure that you connect your SDDC to an AWS account, and select a
VPC and subnet within that account.
l The Data Domain system running in your Amazon VPC must be connected to your
VMware SDDC by using the VMware Cloud Elastic Network Interfaces (ENIs),
allowing your SDDC and services in the AWS VPC and subnet in your AWS
account to communicate without requiring the routing of traffic through the
internet gateway. The same ENI channel is recommended for access to Data
Domain systems (for the vProxy solution) and access to cloud object storage (for
the CloudBoost solution). Detailed steps on configuring ENI are provided by
VMware at https://vmc.vmware.com/console/aws-link.
l Ensure that you configure the inbound and outbound firewall rules of your
compute gateway for Data Domain connectivity if DDVE is running in your Amazon
VPC.
Amazon AWS web portal
In the AWS web portal, note the following requirements:
l Configure the inbound and outbound firewall rules of your Amazon VPC security
group to provide connectivity between the VMware SDDC compute gateway and
Data Domain connectivity if Data Domain is running in your Amazon VPC.
l If cloning from one Data Domain system to another, ensure that you configure the
inbound rule for the security group in AWS to allow all traffic from the respective
private IPs of Data Domain Virtual Editions running in your Amazon VPC.
l If you have more than one Data Domain running in AWS to perform cloning, then
ensure that both Data Domain systems can ping each other using the FQDNs.
vCenter server inventory
In the vCenter Server inventory of your SDDC, note the following requirements:
l An internal DNS name lookup server must be running inside the vCenter inventory.
This will be referenced by all the workloads running in the VMware SDDC.
l The internal DNS server must have Forwarders enabled to access the internet.
This is required in order to resolve the vCenter Server's public FQDN
8. On the Review details window, review the product details such as the product
name, version, vendor, publisher, and download size, and then click Next.
9. On the License agreements window, review and accept the EULA, and then
click Next.
10. On the Select storage window, select the disk format and the destination
datastore where the virtual appliance files will be stored, and then click Next.
It is recommended that you select Thick Provision Lazy Zeroed to ensure that
amount of storage space allocated to the virtual appliance is available.
11. On the Select networks window, select the Destination Network. Provide the
IP address in the text box and click Next.
12. On the Customize template window, expand Networking properties, and then
specify the following attributes:
a. In the Network IP address field, specify the IP address for the vProxy
appliance.
b. In the Default gateway field, specify the IP address of the gateway host.
c. In the Network Netmask/Prefix field, specify the netmask for an IPv4
Network IP address.
d. In the DNS field, specify the IP address of the DNS servers, separated by
commas.
e. In the FQDN field, specify the fully qualified domain name of the vProxy
appliance.
13. Expand Timezone settings, and then perform the following tasks:
a. in the Timezone setting field, select the time zone.
b. SSH into the vProxy appliance using root credentials and run the following
command: /usr/bin/timedatectl set-timezone new-timezone.
Note: To set a time zone outside of the list supported by the vProxy
appliance, you need to change the time zone manually.
14. Expand Password settings, and then perform the following tasks:
a. In the Root password field, specify a new password for the root account.
b. In the Admin password field, specify a new password for the admin
account.
Note: The passwords for the root and admin account should be between
8 and 20 characters in length. Specifying a new password is mandatory
when deploying the vProxy using vCenter, otherwise the vProxy
appliance fails to power on. Ensure that you change the default
passwords of both the root and admin account during deployment.
Results
The Deploying template task appears in the vCenter and provides status information
about the deployment.
l Add the vCenter Server to the NetWorker Server using either the public FQDN of
the vCenter Server or the public IP address of the vCenter Server. It is
recommended to use the FQDN.
l When adding the vCenter Server to the NetWorker Server, specify the login
credentials for the cloudadmin user
l When configuring the vProxy in the NetWorker Server, set the Maximum NBD
sessions for the vProxy to zero. VMware Cloud on AWS does not support NBD
transport mode.
Composites
xy x followed by y
x|y x or y (prefer x)
Repetitions
x* zero or more x, prefer more
x{n} exactly n x
Repetitions
x{n}? exactly n x
Note: The counting forms x{n,m}, x{n,}, and x{n} reject forms that create a
minimum or maximum repetition count above 1000. Unlimited repetitions are not
subject to this restriction.
Grouping
(re) numbered capturing group (submatch)
Flags
i case-insensitive (default false)
\A at beginning of text
\z at end of text
Escape sequences
\a bell ( ≡ \007 )
\n newline ( ≡ \012 )
Escape sequences
\* literal * , for any punctuation character *
\s whitespace ( ≡ [\t\n\f\r ] )
Cc control
Cf format
Co private use
Cs surrogate
L letter
Ll lowercase letter
Lm modifier letter
Lo other letter
Lt titlecase letter
Lu uppercase letter
M mark
Mc spacing mark
Me enclosing mark
Mn non-spacing mark
N number
Nd decimal number
Nl letter number
P punctuation
Pc connector punctuation
Pd dash punctuation
Pe close punctuation
Pf final punctuation
Pi initial punctuation
Po other punctuation
Ps open punctuation
S symbol
Sc currency symbol
Sk modifier symbol
Sm math symbol
So other symbol
Z separator
Zl line separator
Zp paragraph separator
Zs space separator
\D not \d VIM
\W not \w VIM
NetWorker 19.1 does not support the VMware Backup appliance (VBA) solution. If you
have VBA backups from previous Networker releases, you can recover those backups
from the NetWorker Management Web UI by using the vProxy, however, the
recovery types available in this UI are limited to a Revert or New Virtual Machine
restore. For other recovery types, such as VMDK-level, you can continue to use the
vSphere Web Client EMC Backup and Recovery user interface.
This appendix includes the following topics:
2. In EMC Backup and Recovery, on the Restore tab, use the Restore points
from drop-down to select the appliance from which you want to restore.
EMC Backup and Recovery displays the virtual machines that are available to
restore.
3. Click the virtual machine that you want to restore to expand its backups.
Use the Filter drop-down to display a specific VM and related items. You can
also click a backup to display the VMDK level and select a single VMDK for
restore, if you only want to restore that disk.
4. Select a backup, and then click Restore.
The Restore Backup wizard launches.
5. On the Select Backup page, verify that the list of backups is correct. Remove
any backup that you want to exclude, and click Next.
6. On theSet Restore Options page, perform one of the following tasks:
l Select the Restore to original location option to restore the backup to its
original location. If the VMDK file still exists at the original location, the
restore process overwrites the file.
l Unselect the Restore to original location option, and specify a new name
and destination where the virtual machine or VMDK will be restored.
7. Optionally, select Advanced options to set the VM to Power On and
Reconnect NIC after the restore process completes.
Note: Reconnect NIC is enabled by default and greyed out. Only when you
select Power On are you given the option to clear the Reconnect NIC
option.
8. Click Next.
9. On the Ready to complete page, verify the selections. The wizard displays a
summary of the number of machines that will be replaced (restore to the
original location) and the number of machines that will be created (restore to a
new location).
10. To change any of the settings for your restore request, either use the Back
button to return to the appropriate screen, or click the appropriate numbered
step title to the left of the wizard. If the settings are correct, then click Finish.
The Restore Backup wizard displays a message that the restore process
initiated successfully.
11. Click OK.
You can monitor the restore progress by using the Recent Tasks pane.
Note: If you selected Reconnect NIC during the restore process, then
confirm the network configuration for the newly-created virtual machine.
Once the restore completes, the new virtual machine NIC might use the
same IP address as the original virtual machine, which will cause conflicts.
Results
When the recovery starts, a recovery session also displays in NMC. Any activities that
occur on the vCenter side are visible on the NMC side.
backups, the same as you would perform a typical FULLVM restore. No further
configuration is required to use this feature.
About this task
The Instant Access restore operation has the following limitations:
l The free space on the Data Domain system must be equal to or greater than the
total disk size of the VM being restored, as the restore does not take into account
the actual space required after deduplication occurs. If there is insufficient disk
space, an error appears indicating "Insufficient disk space on datastore," and
creation of the target VM fails.
l You cannot use the Instant Access button when you select more than one
different Data Domain system backup for multiple VMs.
l You can perform only one Instant Access restore at a time. Ensure that you
vMotion the VM to a different datastore and that you unmount the datastore
before performing another instant access restore for the Data Domain system.
l You cannot recover multiple save sets concurrently using Instant Access restore.
Procedure
1. In the EMC Backup and Recovery user interface, select the Restore tab.
EMC Backup and Recovery displays the virtual machines that are available to
restore.
2. Click a virtual machine to expand the list of available backups, from which to
restore.
Note: You cannot browse and select backup data at the disk level.
3. Select the backup that you want to restore, and click Instant Access.
The Instant Access wizard opens to the Select Backup page.
Figure 99 Select a backup
4. Verify that the list of backups is correct, remove any backups that you want to
exclude from the restore, and click Next.
The Set Instant Access Options page displays.
5. Specify a new name and destination for the restore, and click Next.
The Ready to complete page displays.
Figure 101 Ready to complete
This glossary contains terms related to disk storage subsystems. Many of these terms
are used in this manual.
Backup proxy The system designated as the off-host backup system. This is a host with NetWorker
client package installed and the VADP software.
changed block tracking A VMkernel feature that keeps track of the storage blocks of virtual machines as they
change over time. The VMkernel keeps track of block changes on virtual machines,
which enhances the backup process for applications that have been developed to take
advantage of VMware’s vStorage APIs.
checkpoint A system-wide backup, taken only after 24 hours (and at the time of the checkpoint
after that first 24 hours have elapsed), that is initiated within the vSphere Web Client
and captures a point in time snapshot of the EMC Backup and Recovery appliance for
disaster recovery purposes.
client Host on a network, such as a computer, workstation, or application server whose data
can be backed up and restored with the backup server software.
client file index Database maintained by the NetWorker server that tracks every database object, file,
or file system backed up. The NetWorker server maintains a single index file for each
client computer. The tracking information is purged from the index after the browse
time of each backup expires.
EMC Backup and The EMC Backup and Recovery appliance (or VMware Backup Appliance) is an
Recovery Appliance appliance that, when deployed, enables VMware backup and clone policy creation in
NMC, and enables the EMC Backup and Recovery plug-in in the vSphere Web Client to
assign VMs to those policies.
EMC Data Protection A browser that allows for file-level restores, where specific folders and files are
Restore Client restored to the original virtual machine on Windows and Linux virtual machines.
file-level restore (FLR) Allows local administrators of protected virtual machines to browse and mount backups
for the local machine. From these mounted backups, the administrator can then restore
individual files. FLR is accomplished using the EMC Data Protection Restore Client. See
“Using File Level Restore” on page 63 for additional information on FLR.
hotadd A transport mode where the backup related I/O happens internally through the ESX I/O
stack using SCSI hot-add technology. This provides better backup I/O rates than NBD/
NBDSSL.
inactivity timeout Time in minutes to wait before a client is considered to be unavailable for backup.
JAR (Java Archive) A file that contains compressed components needed for a Java applet or application.
managed application Program that can be monitored or administered, or both from the Console server.
media database Database that contains indexed entries of storage volume location and the life cycle
status of all data and volumes managed by the NetWorker server.
metadata VSS-defined information that is passed from the writer to the requestor. Metadata
includes the writer name, a list of VSS components to back up, a list of components to
exclude from the backup, and the methods to use for recovery. See writer and See VSS
component.
NBD A transport mode over LAN that is typically slower than hotadd mode. In NBD mode,
the CPU, memory and I/O load gets directly placed on the ESX hosting the production
VMs, since the backup data has to move through the same ESX and reach the proxy
over the network. NBD mode can be used either for physical or virtual proxy, and also
supports all storage types.
NBDSSL A transport mode that is the same as NBD except that the data transferred over the
network is encrypted. Data transfer in NBDSSL mode can therefore be slower and use
more CPU due to the additional load on the VADP host from SLL encryption/
decryption.
NetWorker administrator NetWorker server user who may add, change, or delete NetWorker server users.
NetWorker Management Software program that is used to manage NetWorker servers and clients. The NMC
Console (NMC) server also provides reporting and monitoring capabilities for all NetWorker processes.
NetWorker server Computer on a network that runs the NetWorker server software, contains the online
indexes, and provides backup and restore services to the clients and storage nodes on
the same network.
online indexes Databases located on the NetWorker server that contain all the information pertaining
to the client backups (client file index) and backup volumes (media index).
Open VM Tools Open VM Tools (open-vm-tools) is the open source implementation of VMware Tools
for Linux guest operating systems.
recover To restore data files from backup storage to a client and apply transaction (redo) logs
to the data to make it consistent with a given point-in-time.
SAN (storage area A transport mode that, when used, completely offloads the backup related CPU,
network) memory or I/O load on the virtual infrastructure. The backup I/O is fully offloaded to
the storage layer where the data is read directly from the SAN or iSCSI LUN. SAN
mode requires a physical proxy.
save NetWorker command that backs up client files to backup media volumes and makes
data entries in the online index.
save set 1. Group of tiles or a file system copied to storage media by a backup or snapshot
rollover operation.
2. NetWorker media database record for a specific backup or rollover.
single step backup and See image level backup and recovery.
recovery
storage node Computer that manages physically attached storage devices or libraries, whose backup
operations are administered from the controlling NetWorker server. Typically a
“remote” storage node that resides on a host other than the NetWorker server.
update enabler Code that updates software from a previous release. It expires after a fixed period of
time.
VADP An acronym for vStorage APIs for Data Protection. VADP enables backup software to
perform centralized virtual machine backups without the disruption and overhead of
running backup tasks from inside each virtual machineVADP supersedes the VCB
framework for VMware backups.
vCenter An infrastructure management tool that provides a central point for configuring,
provisioning, and managing virtualized IT environments, and is part of the VMware
Virtual Infrastructure package.
Virtual machine Software that creates a virtualized environment between the computer platform and its
operating system, so that the end user can install and operate software on an abstract
machine.
VMDK Virtual Machine Disk (VMDK) is a file or set of files that appears as a physical disk drive
to a guest operating system. These files can be on the host machine or on a remote file
system. These files are commonly called VMDK files because of the .vmdk extension
that VMware adds to these files.
VMware Backup The VMware Backup Appliance (or EMC Backup and Recovery appliance) is an
Appliance appliance that, when deployed, enables VMware backup and clone policy creation in
NMC, and enables the EMC Backup and Recovery plug-in in the vSphere Web Client to
assign VMs to those policies.
VMware Tools Installed inside each virtual machine, VMware Tools enhance virtual machine
performance and add additional backup-related functionality.
VSS (Volume Shadow Microsoft technology that creates a point-in-time snapshot of a disk volume.
Copy Service) NetWorker software backs up data from the snapshot. This allows applications to
continue to write data during the backup operation, and ensures that open files are not
omitted.
writer Database, system service, or application code that works with VSS to provide metadata
about what to back up and how to handle VSS components and applications during
backup and restore. See VSS (Volume Shadow Copy Service).