Dell PowerVault DL4000 User manual

Category
Software
Type
User manual
Dell PowerVault DL4000 Backup To Disk Appliance —
Powered By AppAssure
User's Guide
Notes, Cautions, and Warnings
NOTE: A NOTE indicates important information that helps you make better use of your computer.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2013 Dell Inc.
Trademarks used in this text: Dell
, the Dell logo, Dell Boomi
, Dell Precision
, OptiPlex
, Latitude
, PowerEdge
, PowerVault
,
PowerConnect
, OpenManage
, EqualLogic
, Compellent
, KACE
, FlexAddress
, Force10
and Vostro
are trademarks of Dell
Inc. Intel
®
, Pentium
®
, Xeon
®
, Core
®
and Celeron
®
are registered trademarks of Intel Corporation in the U.S. and other countries. AMD
®
is a registered trademark and AMD Opteron
, AMD Phenom
and AMD Sempron
are trademarks of Advanced Micro Devices, Inc.
Microsoft
®
, Windows
®
, Windows Server
®
, Internet Explorer
®
, MS-DOS
®
, Windows Vista
®
and Active Directory
®
are either trademarks
or registered trademarks of Microsoft Corporation in the United States and/or other countries. Red Hat
®
and Red Hat
®
Enterprise Linux
®
are registered trademarks of Red Hat, Inc. in the United States and/or other countries. Novell
®
and SUSE
®
are
registered trademarks of Novell Inc. in the United States and other countries. Oracle
®
is a registered trademark of Oracle Corporation
and/or its affiliates. Citrix
®
, Xen
®
, XenServer
®
and XenMotion
®
are either registered trademarks or trademarks of Citrix Systems, Inc. in
the United States and/or other countries. VMware
®
,
Virtual SMP
®
,
vMotion
®
,
vCenter
®
and
vSphere
®
are registered trademarks or
trademarks of VMware, Inc. in the United States or other countries.
IBM
®
is a registered trademark of International Business Machines
Corporation.
2013 - 02
Rev. A00
Contents
Notes, Cautions, and Warnings...................................................................................................2
1 Introduction To AppAssure 5..................................................................................................11
About AppAssure 5.................................................................................................................................................11
AppAssure 5 Core Technologies............................................................................................................................11
Live Recovery...................................................................................................................................................11
Recovery Assure..............................................................................................................................................12
Universal Recovery..........................................................................................................................................12
True Global Deduplication................................................................................................................................12
AppAssure 5 True Scale Architecture....................................................................................................................12
AppAssure 5 Deployment Architecture..................................................................................................................13
AppAssure 5 Smart Agent................................................................................................................................14
AppAssure 5 Core............................................................................................................................................14
Snapshot Process............................................................................................................................................15
Replication Disaster Recovery Site Or Service Provider.................................................................................15
Recovery..........................................................................................................................................................15
Product Features Of AppAssure 5..........................................................................................................................15
Repository........................................................................................................................................................16
True Global Deduplication ...............................................................................................................................16
Encryption........................................................................................................................................................17
Replication........................................................................................................................................................18
Recovery-as-a-Service (RaaS)........................................................................................................................19
Retention And Archiving..................................................................................................................................19
Virtualization And Cloud...................................................................................................................................20
Alerts And Event Management........................................................................................................................20
AppAssure 5 License Portal.............................................................................................................................20
Web Console....................................................................................................................................................20
Service Management APIs..............................................................................................................................20
White Labeling.................................................................................................................................................21
2 Managing AppAssure 5 Licenses...........................................................................................23
About The AppAssure 5 License Portal..................................................................................................................23
About Navigation In The License Portal..........................................................................................................23
About The License Portal Server.....................................................................................................................23
About Accounts................................................................................................................................................24
About Obtaining A License Key..............................................................................................................................24
Registering Your Appliance On The License Portal................................................................................................25
Registering Your Appliance With Existing License Portal Account.................................................................25
Registering Your Appliance When You Do Not Have A License Portal Account.............................................25
Registering For A License Portal Account..............................................................................................................26
Activating A License Portal Account......................................................................................................................27
Logging On To The AppAssure 5 License Portal....................................................................................................27
Using The License Portal Wizard............................................................................................................................27
Adding A Core To The License Portal.....................................................................................................................29
Adding An Agent.....................................................................................................................................................29
Configuring Personal Settings................................................................................................................................30
Configuring Personal Security Settings..................................................................................................................30
Changing Your AppAssure License Portal Password............................................................................................31
Viewing Users.........................................................................................................................................................31
Inviting Users And Setting User Security Privileges..............................................................................................32
Editing User Security Privileges.......................................................................................................................33
Revoking User Privileges.................................................................................................................................33
About Groups..........................................................................................................................................................33
Managing Groups...................................................................................................................................................34
Adding A Group Or Subgroup...........................................................................................................................34
Deleting A Subgroup........................................................................................................................................34
Editing Group Information................................................................................................................................34
Editing Branding Settings For The Root Group.................................................................................................35
Adding Company And Billing Information For A Group....................................................................................36
Managing Licenses.................................................................................................................................................37
About License Pools.........................................................................................................................................38
Viewing Your License Key................................................................................................................................38
Assigning Group Licenses................................................................................................................................38
Assigning Subgroup Licenses..........................................................................................................................39
About Distributing License Pools between Subgroups....................................................................................39
About Billing For Licenses................................................................................................................................39
About Disposing Of Licenses...........................................................................................................................40
Configuring Advanced License Portal Settings......................................................................................................40
Managing Registered Machines............................................................................................................................40
About License Portal Reports.................................................................................................................................41
Summary Category...........................................................................................................................................41
User Category...................................................................................................................................................42
Group Category................................................................................................................................................42
Machines Category..........................................................................................................................................42
License Category..............................................................................................................................................43
Drill-Downs.......................................................................................................................................................44
Generating A Report...............................................................................................................................................45
Managing Subscriptions.........................................................................................................................................45
3 Working With The AppAssure 5 Core....................................................................................47
Accessing The AppAssure 5 Core Console............................................................................................................47
Roadmap For Configuring The AppAssure 5 Core .................................................................................................47
Managing Licenses ................................................................................................................................................47
Changing A License Key ..................................................................................................................................48
Contacting The License Portal Server .............................................................................................................48
Managing AppAssure 5 Core Settings ...................................................................................................................48
Changing The Core Display Name ...................................................................................................................48
Adjusting The Nightly Job Time ......................................................................................................................49
Modifying The Transfer Queue Settings .........................................................................................................49
Adjusting The Client Timeout Settings ............................................................................................................49
Configuring Deduplication Cache Settings .....................................................................................................49
Modifying AppAssure 5 Engine Settings .........................................................................................................50
Modifying Database Connection Settings .......................................................................................................50
About Repositories .................................................................................................................................................51
Roadmap For Managing A Repository ...................................................................................................................51
Creating A Repository ......................................................................................................................................52
Viewing Details About A Repository ...............................................................................................................53
Modifying Repository Settings ........................................................................................................................53
Adding A Storage Location To An Existing Repository ...................................................................................54
Checking A Repository ....................................................................................................................................56
Deleting A Repository ......................................................................................................................................56
Managing Security .................................................................................................................................................56
Adding An Encryption Key ...............................................................................................................................56
Editing An Encryption Key ...............................................................................................................................57
Changing An Encryption Key Passphrase .......................................................................................................57
Importing An Encryption Key ...........................................................................................................................58
Exporting An Encryption Key ...........................................................................................................................58
Removing An Encryption Key ..........................................................................................................................58
Understanding Replication ....................................................................................................................................58
About Replication ............................................................................................................................................58
About Seeding .................................................................................................................................................59
About Failover And Failback In AppAssure 5 ..................................................................................................60
About Replication And Encrypted Recovery Points ........................................................................................60
About Retention Policies For Replication ........................................................................................................60
Performance Considerations For Replicated Data Transfer ...........................................................................60
Roadmap For Performing Replication ....................................................................................................................61
Configuring Replication ...................................................................................................................................61
Monitoring Replication ....................................................................................................................................64
Pausing And Resuming Replication ................................................................................................................65
Managing Replication Settings .......................................................................................................................66
Removing Replication ............................................................................................................................................66
Removing An Agent From Replication On The Source Core............................................................................66
Removing An Agent On The Target Core.........................................................................................................67
Removing A Target Core From Replication......................................................................................................67
Removing A Source Core From Replication.....................................................................................................67
Recovering Replicated Data ............................................................................................................................67
Roadmap For Failover And Failback ......................................................................................................................68
Setting Up An Environment For Failover ..........................................................................................................68
Performing Failover On The Target Core .........................................................................................................68
Performing Failback ........................................................................................................................................69
Managing Events ...................................................................................................................................................70
Configuring Notification Groups ......................................................................................................................70
Configuring An Email Server And Email Notification Template ......................................................................71
Configuring Repetition Reduction ...................................................................................................................72
Configuring Event Retention ............................................................................................................................72
Managing Recovery ...............................................................................................................................................73
About Recovery Points ..........................................................................................................................................73
About System Information .....................................................................................................................................73
Viewing System Information ...........................................................................................................................73
Dismounting Select Recovery Points ..............................................................................................................74
Dismounting All Recovery Points ....................................................................................................................74
Downloading Installers ..........................................................................................................................................74
About The Agent Installer ......................................................................................................................................74
Downloading And Installing The Agent Installer .............................................................................................74
Managing Replication Settings ..............................................................................................................................75
About Archiving .....................................................................................................................................................75
Creating An Archive ........................................................................................................................................75
Importing An Archive ......................................................................................................................................76
Managing SQL Attachability ..................................................................................................................................76
Configuring SQL Attachability Settings ...........................................................................................................77
Configuring Nightly SQL Attachability Checks And Log Truncation ...............................................................78
About The Local Mount Utility ...............................................................................................................................78
Downloading And Installing The Local Mount Utility ......................................................................................78
Adding A Core To The Local Mount Utility ......................................................................................................79
Mounting A Recovery Point Using The Local Mount Utility ............................................................................79
Exploring A Mounted Recovery Point Using The Local Mount Utility .............................................................80
Dismounting A Recovery Point Using The Local Mount Utility .......................................................................80
About The Local Mount Utility Tray Menu ......................................................................................................81
Using AppAssure 5 Core And Agent Options...................................................................................................81
Managing Exchange Database Mountability Checks And Log Truncation ...........................................................82
Configuring Exchange Database Mountability And Log Truncation ...............................................................82
Forcing A Mountability Check .........................................................................................................................82
Forcing Checksum Checks ..............................................................................................................................83
Recovery Point Status Indicators ....................................................................................................................83
4 Protecting Workstations And Servers...................................................................................85
About Protecting Workstations And Servers ........................................................................................................85
Configuring Machine Settings ...............................................................................................................................85
Viewing And Modifying Configuration Settings ..............................................................................................85
Viewing System Information For A Machine ...................................................................................................86
Configuring Notification Groups For System Events .......................................................................................86
Editing Notification Groups For System Events ...............................................................................................88
Customizing Retention Policy Settings ............................................................................................................89
Viewing License Information ...........................................................................................................................92
Modifying Protection Schedules .....................................................................................................................92
Modifying Transfer Settings ............................................................................................................................93
Restarting A Service ........................................................................................................................................94
Viewing Machine Logs ....................................................................................................................................94
Protecting A Machine ............................................................................................................................................95
Creating Custom Schedules For Volumes .......................................................................................................96
Modifying Exchange Server Settings ..............................................................................................................96
Modifying SQL Server Settings .......................................................................................................................97
Deploying An Agent (Push Install) .........................................................................................................................97
Replicating A New Agent .......................................................................................................................................98
Managing Machines ..............................................................................................................................................99
Removing A Machine ......................................................................................................................................99
Forcing Log Truncation ...................................................................................................................................99
Replicating Agent Data On A Machine .........................................................................................................100
Setting Replication Priority For An Agent ......................................................................................................100
Canceling Operations On A Machine ............................................................................................................101
Viewing Machine Status And Other Details ..................................................................................................101
Managing Multiple Machines ..............................................................................................................................101
Deploying To Multiple Machines ..................................................................................................................101
Monitoring The Deployment Of Multiple Machines ......................................................................................105
Protecting Multiple Machines .......................................................................................................................105
Monitoring The Protection Of Multiple Machines .........................................................................................106
Managing Snapshots And Recovery Points ........................................................................................................107
Viewing Recovery Points ...............................................................................................................................107
Viewing A Specific Recovery Point................................................................................................................107
Mounting A Recovery Point For A Windows Machine ..................................................................................107
Mounting A Recovery Point Volume On A Linux Machine ............................................................................108
Removing Recovery Points ............................................................................................................................109
Forcing A Snapshot .......................................................................................................................................109
Pausing And Resuming Snapshots ...............................................................................................................110
Restoring Data .....................................................................................................................................................110
Exporting Backup Information For Your Windows Machine To A Virtual Machine ......................................110
Exporting Windows Data Using ESXi Export .................................................................................................111
Exporting Windows Data Using VMware Workstation Export ......................................................................112
Exporting Windows Data Using Hyper-V Export ...........................................................................................114
Performing A Rollback For A Windows Machine ..........................................................................................116
Performing A Rollback For A Linux Machine ................................................................................................117
About Bare Metal Restore For Windows Machines ............................................................................................118
Prerequisites For Performing A Bare Metal Restore For A Windows Machine ...........................................118
Roadmap For Performing A Bare Metal Restore For A Windows Machine ........................................................118
Creating A Bootable CD ISO Image................................................................................................................119
Loading A Boot CD ........................................................................................................................................120
Launching A Restore From The Appassure 5 Core .......................................................................................121
Mapping Volumes ..........................................................................................................................................121
Viewing The Recovery Progress ...................................................................................................................121
Starting A New Server ..................................................................................................................................122
Repairing Startup Problems ..........................................................................................................................122
Performing A Bare Metal Restore For A Linux Machine ...............................................................................122
Viewing Events And Alerts ...................................................................................................................................123
5 Protecting Server Clusters....................................................................................................125
About Server Cluster Protection In AppAssure 5 ................................................................................................125
Supported Applications And Cluster Types ..................................................................................................125
Protecting A Cluster .............................................................................................................................................126
Protecting Nodes In A Cluster .............................................................................................................................127
Process Of Modifying Cluster Node Settings ......................................................................................................128
Roadmap For Configuring Cluster Settings ..........................................................................................................128
Modifying Cluster Settings ............................................................................................................................128
Configuring Cluster Event Notifications ........................................................................................................129
Modifying The Cluster Retention Policy ........................................................................................................130
Modifying Cluster Protection Schedules ......................................................................................................131
Modifying Cluster Transfer Settings .............................................................................................................131
Converting A Protected Cluster Node To An Agent .............................................................................................131
Viewing Server Cluster Information .....................................................................................................................132
Viewing Cluster System Information .............................................................................................................132
Viewing Summary Information ......................................................................................................................132
Working With Cluster Recovery Points ...............................................................................................................133
Managing Snapshots For A Cluster .....................................................................................................................133
Forcing A Snapshot For A Cluster .................................................................................................................133
Pausing And Resuming Cluster Snapshots ...................................................................................................134
Dismounting Local Recovery Points ....................................................................................................................134
Performing A Rollback For Clusters And Cluster Nodes ......................................................................................134
Performing A Rollback For CCR (Exchange) And Dag Clusters .....................................................................134
Performing A Rollback For SCC (Exchange, SQL) Clusters............................................................................135
Replicating Cluster Data ......................................................................................................................................135
Removing A Cluster From Protection ...................................................................................................................135
Removing Cluster Nodes From Protection ...........................................................................................................135
Removing All Nodes In A Cluster From Protection ........................................................................................136
Viewing A Cluster Or Node Report ......................................................................................................................136
6 Reporting..................................................................................................................................139
About Reports ......................................................................................................................................................139
About The Reports Toolbar ..................................................................................................................................139
About Compliance Reports ..................................................................................................................................139
About Errors Reports ...........................................................................................................................................140
About The Core Summary Report ........................................................................................................................140
Repositories Summary ..................................................................................................................................140
Agents Summary ...........................................................................................................................................141
Generating A Report For A Core Or Agent ...........................................................................................................141
About The Central Management Console Core Reports ......................................................................................142
Generating A Report From The Central Management Console ...........................................................................142
7 Completing A Full Recovery Of The DL4000 Backup To Disk Appliance........................143
Create A RAID 1 Partition For The Operating System...........................................................................................143
Install The Operating System................................................................................................................................143
Run The Recovery And Update Utility...................................................................................................................144
8 Changing The Host Name Manually....................................................................................147
Stop AppAssure Core Service..............................................................................................................................147
Delete AppAssure Server Certificates.................................................................................................................147
Delete Core Server And Registry Keys.................................................................................................................147
Launching AppAssure Core With The New Hostname........................................................................................147
Change The Display Name In AppAssure.............................................................................................................148
Update Trusted Sites In Internet Explorer............................................................................................................148
9 Appendix A — Scripting........................................................................................................149
About Powershell Scripting .................................................................................................................................149
Powershell Scripting Prerequisites ...............................................................................................................149
Testing Scripts ...............................................................................................................................................149
Input Parameters .................................................................................................................................................150
AgentProtectionStorageConfiguration (namespace
Replay.Common.Contracts.Agents)AgentTransferConfiguration (namespace
Replay.Common.Contracts.Transfer)BackgroundJobRequest (namespace
Replay.Core.Contracts.BackgroundJobs)ChecksumCheckJobRequest (namespace
Replay.Core.Contracts.Exchange.ChecksumChecks)DatabaseCheckJobRequestBase (namespace
Replay.Core.Contracts.Exchange)ExportJobRequest (namespace Replay.Core.Contracts.Export)
NightlyAttachabilityJobRequest (namespace Replay.Core.Contracts.Sql) RollupJobRequest
(namespace Replay.Core.Contracts.Rollup) TakeSnapshotResponse (namespace
Replay.Agent.Contracts.Transfer)TransferJobRequest (namespace Replay.Core.Contracts.Transfer)
TransferPostscriptParameter (namespace
Replay.Common.Contracts.PowerShellExecution)TransferPrescriptParameter (namespace
Replay.Common.Contracts.PowerShellExecution)VirtualMachineLocation (namespace
Replay.Common.Contracts.Virtualization)VolumeImageIdsCollection (namespace
Replay.Core.Contracts.RecoveryPoints) VolumeName (namespace
Replay.Common.Contracts.Metadata.Storage)VolumeNameCollection (namespace
Replay.Common.Contracts.Metadata.Storage) VolumeSnapshotInfo (namesapce
Replay.Common.Contracts.Transfer)VolumeSnapshotInfoDictionary (namespace
Replay.Common.Contracts.Transfer)
............................................................................................................150
Pretransferscript.ps1 .....................................................................................................................................155
Posttransferscript.ps1 ...................................................................................................................................156
Preexportscript.ps1 .......................................................................................................................................157
Postexportscript.ps1 ......................................................................................................................................157
Prenightlyjobscript.ps1 ..................................................................................................................................158
Postnightlyjobscript.ps1.................................................................................................................................160
Sample Scripts .....................................................................................................................................................162
10 Getting Help............................................................................................................................163
Contacting Dell.....................................................................................................................................................163
Documentation Feedback.....................................................................................................................................163
1
Introduction To AppAssure 5
This chapter describes the features, functionality, and architecture of AppAssure 5.
About AppAssure 5
AppAssure 5 sets a new standard for unified data protection by combining backup, replication, and recovery in a single
solution that is engineered to be the fastest and most reliable backup for protecting virtual machines (VM), physical
machines, and cloud environments.
AppAssure 5 combines backup and replication into one integrated and unified data protection product. AppAssure 5
also provides application awareness to ensure reliable application data recovery from your backups. AppAssure 5 is
built on the new, patent-pending True Scale architecture which delivers the fastest backup performance with
aggressive, near-zero recovery time objectives (RTO), and recovery point objectives (RPO).
AppAssure 5 combines several unique, innovative, and breakthrough technologies:
Live Recovery
Recovery Assure
Universal Recovery
True Global Deduplication
These technologies are engineered with secure integration for cloud disaster recovery and deliver fast and reliable
recovery. With its scalable object store, AppAssure 5 is uniquely capable of handling up to Petabytes of data rapidly
with built-in global deduplication, compression, encryption, and replication to any private or public cloud infrastructure.
Server applications and data can be recovered in minutes for data retention (DR) and compliance purposes.
Today's legacy backup tools and first-generation VM backup tools are inefficient and ineffective. The outdated backup
tools lack the ability to handle large-scale data and do not offer the level of performance and reliability needed for
protecting business-critical applications. Combine this with complex and mixed IT environments and it presents an
administrative challenge for IT professionals and vulnerability of system data.
AppAssure 5 addresses this complexity and inefficiency through our core technology and support of multi-hypervisor
environments including those running on VMware vSphere and Microsoft Hyper-V, which comprise both private and
public clouds. AppAssure 5 offers these technological advances while dramatically reducing IT management and
storage costs.
AppAssure 5 Core Technologies
Live Recovery
AppAssure 5 Live Recovery is instant recovery technology for VMs or servers. It gives you near continuous access to
data volumes on virtual or physical servers. You can recover an entire volume with near-zero RTO and an RPO of
minutes.
AppAssure 5 backup and replication technology records concurrent snapshots of multiple VMs or servers, providing
near instantaneous data and system protection. You can resume the use of the server directly from the backup file
11
without waiting for a full restore to production storage. Users remain productive and IT departments reduce recovery
windows to meet today's increasingly stringent RTO and RPO service-level agreements.
Recovery Assure
AppAssure Recovery Assure enables you to perform automated recovery testing and verification of backups. It includes,
but is not limited to, file systems, Microsoft Exchange 2007 and 2010, and different versions of Microsoft SQL Server
2005, 2008, and 2008 R2. Recovery Assure provides 100 percent recoverability of applications and backups in virtual and
physical environments, and features a comprehensive integrity checking algorithm based on 256-bit SHA keys that
check the correctness of each disk block in the backup during archiving, replication, and data seeding operations. This
ensures that data corruption is identified early and prevents corrupted data blocks from being maintained or transferred
during the backup process.
Universal Recovery
Universal Recovery technology gives you unlimited machine restoration flexibility. You can restore your backups from
physical systems to virtual machines, virtual machines to virtual machines, virtual machines to physical systems, or
physical systems to physical systems, and carry out bare metal restores to dissimilar hardware. For example, P2V, V2V,
V2P, P2P, P2C, V2C, C2P, and C2V.
Universal Recovery technology also accelerates cross-platform moves among virtual machines. For example, moving
from VMware to Hyper-V or Hyper-V to VMware. It builds in application-level, item-level, and object-level recovery
(individual files, folders, e-mail, calendar items, databases, and applications). With AppAssure 5, you can recover or
export physical to cloud, or virtual to cloud.
True Global Deduplication
AppAssure 5 provides true global deduplication that dramatically reduces your physical disk capacity requirements by
offering space reduction ratios exceeding 50:1, while still meeting the data storage requirements. AppAssure True Scale
inline block-level compression and deduplication with line speed performance, along with built-in integrity checking,
prevents data corruption from affecting the quality of the backup and archiving processes.
AppAssure 5 True Scale Architecture
AppAssure 5 is built on AppAssure True Scale architecture. It leverages dynamic, multi-core pipeline architecture that is
optimized to consistently deliver line-speed performance for your enterprise environments. True Scale is designed from
the ground up to linearly scale and efficiently store and manage big data, and deliver RTOs and RPOs of minutes without
compromising performance. It comprises a purpose-built object and volume manager with integrated global
deduplication, compression, encryption, replication, and retention. The following diagram describes the AppAssure True
Scale architecture.
12
Figure 1. AppAssure True Scale Architecture
The AppAssure Volume Manager and scalable object store serve as the foundation of the AppAssure 5 True Scale
architecture. The scalable object store stores block-level snapshots that are captured from virtual and physical servers.
The volume manager manages the numerous object stores by providing a common repository or just-in-time storage for
only what is needed. The object store concurrently supports everything with asynchronous I/O that delivers high
throughput with minimal latency and maximizes system utilization. The repository resides on different storage
technologies such as Storage Area Network (SAN), Direct Attached Storage (DAS), or Network Attached Storage (NAS).
The role of the AppAssure Volume Manager is similar to the role of the volume manager in an operating system, as it
takes various storage devices which can be of different sizes and types and combines them into logical volumes, using
striped or sequential allocation policies. The object store saves, retrieves, maintains, and then replicates objects that
are derived from application-aware snapshots. The volume manager delivers scalable I/O performance in tandem with
global data deduplication, encryption, and retention management.
AppAssure 5 Deployment Architecture
AppAssure 5 is a scalable backup and recovery product that is flexibly deployed within the enterprise or as a service
delivered by a managed service provider. The type of deployment depends on the size and requirements of the
customer. Preparing to deploy AppAssure 5 involves planning the network storage topology, core hardware and disaster
recovery infrastructure, and security.
The AppAssure 5 deployment architecture consists of local and remote components. The remote components may be
optional to those who do not want to leverage a disaster recovery site or a managed service provider for off-site
recovery. A basic local deployment consists of a backup server called the Core and one or more protected machines
known as the agents. The off-site component is enabled using replication that provides full recovery capabilities in the
DR site. The AppAssure 5 Core uses base images and incremental snapshots to compile recovery points of protected
agents.
Additionally, AppAssure 5 is application-aware because it has the ability to detect the presence of Microsoft Exchange
and SQL and their respective databases and log files and then automatically group these volumes with dependency for
comprehensive protection and effective recovery. This ensures that you never have incomplete backups when you are
performing recoveries. Backups are performed using application-aware block-level snapshots. AppAssure 5 can also
perform log truncation of the protected Microsoft Exchange and SQL servers.
The following diagram describes the AppAssure 5 deployment architecture.
13
Figure 2. AppAssure 5 Deployment Architecture
AppAssure 5 Smart Agent
The AppAssure 5 Smart Agent is installed on the machines that is protected by the AppAssure 5 Core. The Smart Agent
tracks the changed blocks on the disk volume and then snaps an image of the changed blocks at a predefined interval of
protection. The incremental block-level snapshots’ forever approach prevents repeated copying of the same data from
the protected machine to the Core. The Smart Agent is application-aware and is dormant when not in use, with near
zero (0) percent CPU utilization and less than 20 MB of memory overhead. When the Smart Agent is active, it uses up to 2
to 4 percent CPU utilization and less than 150 MB memory, which includes transferring the snapshots to the Core. This is
much lower than the legacy software programs that use significantly higher levels of CPU and memory bandwidth, even
though they are dormant.
The AppAssure 5 Smart Agent is application-aware because it detects the type of application that is installed and also
the location of the data. It automatically groups data volumes with dependency, such as databases, and then logs them
together for effective protection and rapid recovery. After the agent is configured, it uses smart technology to keep track
of changed blocks on the protected disk volumes. When the snapshot is ready, it is rapidly transferred to the AppAssure
5 Core using intelligent multi-threaded, socket-based connections. To preserve CPU bandwidth and memory on the
protected machines, the smart agent does not encrypt or deduplicate the data at the source and agent machines are
paired with a core for protection.
AppAssure 5 Core
The AppAssure 5 Core is the central component of the AppAssure 5 deployment architecture. The Core stores and
manages all of the machine backups and provides core services for backup, recovery, and retention; replication,
archival, and management. The Core is a self-contained network-addressable computer that runs a 64-bit variant of
Microsoft Windows operating system. AppAssure 5 performs target-based inline compression, encryption, and data
deduplication of the data received from the agent. The Core then stores the snapshot backups in a repository, which can
reside on different storage technologies such as Storage Area Network (SAN), Direct Attached Storage (DAS), or
Network Attached Storage (NAS).
The repository can also reside on internal storage within the Core. The Core is managed by accessing the following URL
from a Web browser: https://CORENAME:8006/apprecovery/admin. Internally, all core services are accessible through
REST APIs. The Core services can be accessed from within the core or directly over the Internet from any application
that can send an HTTP/HTTPS request and receive an HTTP/HTTPS response. All API operations are performed over
SSL and mutually authenticated using X.509 v3 certificates.
Cores are paired with another core for replication.
14
Snapshot Process
The protection process commences with a base image followed by incremental snapshots forever. The agent uses
Microsoft Volume Shadow Copy Service (VSS) to freeze and quiesce application data to disk to capture a file-system-
consistent and an application-consistent backup. When a snapshot is created, the VSS writer on the target server
prevents content from being written to the disk. During the process of halting disk writes, all disk I/O operations are
queued and resume only after the snapshot is complete, while the operations already in flight are completed and all
open files are closed. The process of creating a shadow copy does not significantly impact the performance of the
production system. AppAssure uses Microsoft VSS because it has built-in support for all Windows internal technologies
such as NTFS, Registry, Active Directory, and so on, to flush data to disk before the snapshot. Additionally, other
enterprise applications, such as Microsoft Exchange and SQL, use VSS Writer plug-ins to get notified when a snapshot
is being prepared and when they have to flush their dirty database pages to disk to bring the database in a consistent
transactional state.
NOTE: It is important to note that VSS is used to quiesce system and application data to disk; it is not used to create
the snapshot.
The captured data is rapidly transferred to and stored on the AppAssure 5 Core. Using VSS for backup does not render
the application server in backup mode for an extended period of time because the length of time to perform the snapshot
is seconds and not hours. Another benefit of using VSS for backups is that it allows the agent take a snapshot of large
quantities of data at one time since the snapshot works at the volume level.
Replication Disaster Recovery Site Or Service Provider
The replication process in AppAssure requires a paired source-target relationship between two cores. The source core
copies the recovery points of the protected agents and then asynchronously and continuously transmits them to a target
core at a remote disaster recovery site. The off-site location can be a company-owned data center (self-managed core)
or a third-party managed service provider’s (MSP’s) location or cloud environment. When replicating to a MSP, you can
use built-in workflows that let you request connections and receive automatic feedback notifications. For the initial
transfer of data, you can perform data seeding using external media, which is useful for large sets of data or sites with
slow links.
In the case of a severe outage, AppAssure 5 supports failover and failback in replicated environments. In case of a
comprehensive outage, the target core in the secondary site can recover instances from replicated agents and
immediately commence protection on the failed-over machines. After the primary site is restored, the replicated core
can fail-back data from the recovered instances back to agents at the primary site.
Recovery
Recovery can be performed in the local site or the replicated remote site. After the deployment is in steady state with
local protection and optional replication, the AppAssure 5 Core allows you perform recovery using Recovery Assure,
Universal Recovery, or Live Recovery.
Product Features Of AppAssure 5
Using AppAssure 5, you can manage all aspects of protection and recovery of critical data using the following:
Repository
True Global Deduplication
Encryption
15
Replication
Recovery-as-a-Service (RaaS)
Retention and Archiving
Virtualization and Cloud
Alerts and Event Management
AppAssure 5 License Portal
Web Console
Service Management APIs
White Labeling
Repository
The repository uses deduplication volume manager (DVM) to implement a volume manager that provides support for
multiple volumes, each of which could reside on different storage technologies such as Storage Area Network (SAN),
Direct Attached Storage (DAS), Network Attached Storage (NAS), or cloud storage. Each volume consists of a scalable
object store with deduplication. The scalable object store behaves as a records-based file system, where the unit of
storage allocation is a fixed-sized data block called a record. This architecture allows you to configure block-sized
support for compression and deduplication. Rollup operations are reduced to metadata operations from disk intensive
operations because the rollup no longer moves data but only moves the records.
The DVM can combine a set of object stores into a volume and they can be expanded by creating additional file systems.
The object store files are pre-allocated and can be added on demand as storage requirements change. It is possible to
create up to 255 independent repositories on a single AppAssure 5 Core and to further increase the size of a repository
by adding new file extents. An extended repository may contain up to 4,096 extents that span across different storage
technologies. The maximum size of a repository is 32 Exabytes. Multiple repositories can exist on a single core.
True Global Deduplication
True Global Deduplication is an effective method of reducing backup storage needs by eliminating redundant or
duplicate data. Deduplication is effective because only a unique instance of the data across multiple backups is stored
in the repository. The redundant data is stored, but not physically; it is simply replaced with a pointer to the a unique
data instance in the repository. Conventional backup applications have been performing repetitive full backups every
week, but AppAssure performs incremental block-level backups of the machines forever. This incremental forever
approach in tandem with data deduplication helps to drastically reduce the total quantity of data committed to the disk.
The typical disk layout of a server consists of the operating system, application, and data. In most environments, the
administrators often use a common flavor of the server and desktop operating across multiple systems for effective
deployment and management. When backup is performed at the block level across multiple machines at the same time,
it provides a more granular view of what is in the backup and what is not, irrespective of the source. This data includes
the operating system, the applications, and the application data across the environment.
16
Figure 3. True Global Deduplication
AppAssure 5 performs target-based inline data deduplication. This means that the snapshot data is transmitted over to
the Core before it is deduplicated. Inline data deduplication simply means the data is deduplicated before it is committed
to disk. This is very different from at-source or post-process deduplication, where the data is deduplicated at the source
before it is transmitted to the target for storage, and in post-process the data is sent raw to the target where it is
analyzed and deduplicated after the data has been committed to disk. At-source deduplication consumes precious
system resources on the machine whereas the post-process data deduplication approach needs all the requisite data
on disk (a greater initial capacity overhead) before commencing the deduplication process. On the other hand, inline
data deduplication does not require additional disk capacity and CPU cycles on the source or on the Core for the
deduplication process. Conventional backup applications perform repetitive full backups every week, while AppAssure
performs incremental block level backups of the machines forever. This incremental forever approach in tandem with
data deduplication helps to drastically reduce the total quantity of data committed to the disk with a reduction ratio of as
much as 80:1.
Encryption
AppAssure 5 provides integrated encryption to protect backups and data-at-rest from unauthorized access and use,
ensuring data privacy. AppAssure 5 provides strong encryption. By doing so, backups of protected computers are
inaccessible. Only the user with the encryption key can access and decrypt the data. There is no limit to the number of
encryption keys that can be created and stored on a system. DVM uses AES 256-bit encryption in the Cipher Block
Chaining (CBC) mode with 256-bit keys.
Encryption is performed inline on snapshot data, at line speeds without impacting performance. This is because DVM
implementation is multi-threaded and uses hardware acceleration specific to the processor on which it is deployed.
Encryption is multi-tenant ready. The deduplication has been specifically limited to records that have been encrypted
with the same key; two identical records that have been encrypted with different keys is not be deduplicated against
each other. This design decision ensures that deduplication cannot be used to leak data between different encryption
domains. This is a benefit for managed service providers, as replicated backups for multiple tenants (customers) can be
stored on a single core without any tenant being able to see or access other tenant data. Each active tenant encryption
key creates an encryption domain within the repository where only the owner of the keys can see, access, or use the
data. In a multi-tenant scenario, data is partitioned and deduplicated within the encryption domains.
17
In replication scenarios, AppAssure 5 uses SSL 3.0 to secure the connections between the two cores in a replication
topology to prevent eavesdropping and tampering.
Replication
Replication is the process of copying recovery points and transmitting them to a secondary location for the purpose of
disaster recovery. The process requires a paired source-target relationship between two cores. Replication is managed
on a per-protected-machine basis; meaning, backup snapshots of a protected machine are replicated to the target
replica core. When replication is set up, the source core asynchronously and continuously transmits the incremental
snapshot data to the target core. You can configure this outbound replication to your company’s own data center or
remote disaster recovery site (that is, a “self-managed” target core) or to a managed service provider (MSP) providing
off-site backup and disaster recovery services. When you replicate to an MSP, you can use built-in workflows that let
you request connections and receive automatic feedback notifications.
Figure 4. Replication
Replication is self-optimizing with a unique Read-Match-Write (RMW) algorithm that is tightly coupled with
deduplication. With RMW replication, the source and target replication service matches keys before transferring data
and then replicates only the compressed, encrypted, deduplicated data across the WAN, resulting in a 10x reduction in
bandwidth requirements.
Figure 5. Read-Match-Write Replication
Replication begins with seeding, the initial transfer of deduplicated base images and incremental snapshots of the
protected agents, which can add up to hundreds or thousands of gigabytes of data. Initial replication can be seeded to
the target core using external media. This is typically useful for large sets of data or sites with slow links. The data in the
seeding archive is compressed, encrypted and deduplicated. If the total size of the archive is larger than the space
available on the removable media, the archive can span across multiple devices based on the available space on the
media. During the seeding process, the incremental recovery points replicate to the target site. After the target core
consumes the seeding archive, the newly replicated incremental recovery points automatically synchronize.
18
Recovery-as-a-Service (RaaS)
Managed service providers (MSPs) can fully leverage AppAssure 5 as a platform for delivering recovery as a service
(RaaS). RaaS facilitates complete recovery-in-the-cloud by replicating customers' physical and virtual servers along
with their data to the service provider's cloud as virtual machines to support recovery testing or actual recovery
operations. Customers wanting to perform recovery-in-the-cloud can configure replication on their protected machines
on the local cores to an AppAssure service provider. In the event of a disaster, the MSPs can instantly spin-up virtual
machines for the customer.
MSPs can deploy multi-tenant AppAssure 5-based RaaS infrastructure that can host multiple and discrete organizations
or business units (the tenants) that ordinarily do not share security or data on a single server or a group of servers. The
data of each tenant is isolated and secure from other tenants and the service provider.
Retention And Archiving
In AppAssure 5, backup and retention policies are flexible and, therefore, easily configurable. The ability to tailor
retention polices to the needs of an organization not only aids in helping to meet compliance requirements, but does so
without compromising on RTO.
Retention policies enforce the periods of time in which backups are stored on short-term (fast and expensive) media.
Sometimes certain business and technical requirements mandate extended retention of these backups, but use of fast
storage is cost prohibitive. Therefore, this requirement creates a need for long-term (slow and cheap) storage.
Businesses often use long-term storage for archiving both compliance and non-compliance data. The archive feature
supports extended retentions for compliance and non-compliance data, as well as being used for seeding replication
data to a target core.
Figure 6. Custom Retention Policy
In AppAssure 5 retention policies can be customized to specify the length of time a backup recovery point is maintained.
As the age of the recovery points approach the end of their retention period, they age out and are removed from the
retention pool. Typically, this process becomes inefficient and eventually fails as the amount of data and the period of
retention start growing rapidly. AppAssure 5 solves the big data problem by managing the retention of large amounts of
data with complex retention policies and performing rollup operations for aging data using efficient metadata
operations.
Backups can be performed with an interval of a few minutes and as these backups age over days, months, and years.
Retention policies manage the aging and deletion of old backups. A simple waterfall method defines the aging process.
19
The levels within the waterfall are defined in minutes, hours, and days; weeks, months, and years. The retention policy is
enforced by the nightly rollup process.
For long term archiving, AppAssure 5 provides the ability to create an archive of the source or target core on any
removable media. The archive is internally optimized and all data in the archive is compressed, encrypted, and
deduplicated. If the total size of the archive is larger than the space available on the removable media, the archive spans
across multiple devices based on the available space on the media. The archive also can be locked with a passphrase.
Recovery from an archive does not require a new core; any core can ingest the archive and recover data if the
administrator has the passphrase and the encryption keys.
Virtualization And Cloud
The AppAssure 5 Core is cloud-ready, which allows you to leverage the compute capacity of the cloud for recovery.
AppAssure 5 can export any protected or replicated machine to licensed versions of VMware or Hyper-V. Exports can
be ad-hoc or continuous. With continuous exports, the virtual machine is incrementally updated after every snapshot.
The incremental updates are very fast and provide standby-clones that are ready to be powered up with a click of a
button. The supported exports are:
VMware Workstation or Server on a folder
Direct export to a Vsphere or VMware ESXi host and Microsoft Server 2008 R2 Hyper-V
Alerts And Event Management
In addition to HTTP REST API, AppAssure 5 also includes an extensive set of features for event logging and notification
using e-mail, Syslog, or Windows Event Log. e-mail notifications can be used to alert users or groups of the health or
status of different events in response to an alert. The Syslog and Windows Event Log methods are used for centralized
logging to a repository in multi-operating system environments; while in Windows-only environments, only the Windows
Event Log is used.
AppAssure 5 License Portal
The AppAssure 5 License Portal provides easy-to-use tools for managing license entitlements. You can download,
activate, view, and manage license keys and create a company profile to track your license assets. Additionally, the
portal enables service providers and re-sellers to track and manage their customer licenses.
Web Console
AppAssure 5 features a new Web-based central console that manages distributed AppAssure 5 cores from one central
location. MSPs and enterprise customers with multiple distributed cores can deploy the central console to get a unified
view for central management. The AppAssure 5 Central Management Console provides the ability to organize the
managed cores in hierarchical organizational units. These organizational units can represent business units, locations,
or customers for MSPs with role-based access. The central console can also run reports across managed cores.
Service Management APIs
AppAssure 5 comes bundled with a service management API and provides programmatic access to all of the
functionality available through the AppAssure 5 Central Management Console. The service management API is a REST
API. All the API operations are performed over SSL and are mutually authenticated using X.509 v3 certificates. The
management service can be accessed from within the environment or directly over the Internet from any application
that can send and receive an HTTPS request and response. The approach facilitates easy integration with any Web
20
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163

Dell PowerVault DL4000 User manual

Category
Software
Type
User manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI