System architecture and components....................................................................................10
l
Customer Support tasks........................................................................................................ 13
Dell EMC Integrated Data Protection Appliance Product Guide7
Introduction
Document scope and audience
This document describes the administrative details of Integrated Data Protection Appliance
(IDPA).
The target audience for this document includes field personnel, partners, and customers
responsible for managing and operating IDPA. This document is designed for people familiar with
Data Protection solutions.
Product features
IDPA provides a simplified configuration and integration of data protection components in a
consolidated solution.
Integrated solution
IDPA DP4400 model is a hyperconverged, 2U system that a user can install and configure onsite.
The DP4400 includes a virtual edition of Avamar server (AVE) as a Backup Server node with an
optional NDMP Accelerator, a virtual edition of Data Domain system (DDVE) as the Protection
Storage node, Cloud Disaster Recovery, IDPA System Manager as a centralized system
management , an Appliance Configuration Manager(ACM) for simplified configuration and
upgrades, Search, Reporting and Analytics, and a compute node that hosts the virtual components
and the software.
The Search, Reporting and Analytics, and CDRA are optional. Also, you can also perform the
Search, Reporting and Analytics, and CDRA functions in a central corporate implementation.
If your organization enables communication through the Internet, as part of the initial configuration
of the system, you can register the IDPA Appliance, Avamar, Data Domain and Reporting and
Analytics components with Secure Remote Services (formerly ESRS). The Secure Remote
Services is a secure, IP-based, distributed customer service support system that provides Dell
EMC customers with command, control, and visibility of support-related activities.
Centralized management
IDPA System Manager provides advanced monitoring and management capabilities of the IDPA
from a single pane of glass and includes the following features.
l
A comprehensive dashboard that includes information about Avamar, IDPA Appliance, Data
Domain, Search, and Data Protection Advisor.
n
Backup activities
n
Replication activities
n
Assets
n
Capacity
n
Health
n
Alerts
l
A comprehensive dashboard to manage Avamar, Data Domain, Data Protection Advisor, and
Search components.
l
Advanced search and recover operations through integration with Search.
l
Comprehensive reporting capabilities
l
Cloud backups.
8Dell EMC Integrated Data Protection Appliance Product Guide
Introduction
Appliance administration
The ACM provides a graphical, web-based interface for configuring, monitoring, and upgrading the
appliance.
The ACM dashboard displays a summary of the configuration of the individual components. It also
enables the administrators to monitor the appliance, change configuration details such as changing
the Data Domain disk capacity, changing the common password for the appliance, change LDAP
settings, update customer information, and change the values in the General Settings panel. The
ACM dashboard enables you to upgrade the system and its components. It also displays the health
information of the Appliance Server and VMware components.
Backup administration
The IDPA uses Avamar Virtual Edition (AVE) servers to perform backup operations, with the data
being stored in a Data Domain system. Generally, when using the Avamar Administrator
Management Console, all Avamar servers look and behave the same. The main differences among
the Avamar server configurations are the number of nodes and disk drives that are reported in the
server monitor.
You can also add an Avamar NDMP Accelerator (one NDMP Accelerator node is supported in
DP4400) to enable backup and recovery of NAS systems. The Avamar NDMP Accelerator uses the
network data management protocol (NDMP) to enable backup and recovery of network-attached
storage (NAS) systems. The accelerator performs NDMP processing and then sends the data
directly to the Data Domain Server (DDVE Storage).
Reporting and Analytics
The Reporting and Analytics feature offers a robust reporting functionality with dedicated sections
for various features. These reports help you retrieve information about the Data Domain (DDVE )
and Avamar (AVE). Using these reports, you can identify outages in the environment, diagnose
problems, plan to mitigate risks, and forecast future trends. You can also run system and
customized reports, dashboard templates, and schedule the reports generation as per your
requirements.
Search
The Search feature provides a powerful way to search backup data within the IDPA and then
restore the backup data based on the results of the Search. Scheduled collection activities are
used to gather and index the metadata (such as keyword, name, type, location, size, and backup
server/client, or indexed content) of the backup, which is then stored within the IDPA.
Disaster recovery
The CDRA is a solution, which enables disaster recovery of one or more on-premises virtual
machines (VMs) to the cloud. CDRA integrates with the existing on-premises backup software and
a Data Domain system to copy the VM backups to the cloud. It can then run a disaster recovery
test or a failover, which converts a VM to an Amazon Web Services Elastic Compute Cloud (EC2)
instance, and then runs this instance in the cloud.
Note:
Installing CDRA, Search, and Reporting and Analytics (based on Data Protection Advisor) is
optional. Also, if these components are already configured in your environment, then the
appliance can be configured to use the central implementation in your environment. You do not
need to configure the optional components that are bundled in IDPA again.
However, the IDPA dashboard does not display any data that is associated with external
CDRA, Search, and Data Protection Advisor. Moreover, you must manage and configure any
such external instances. Also, IDPA does not support local Search and Analytics (not part of
IDPA but are centrally implemented at the customer environment) when these functions are
performed by external implementations.
Dell EMC Integrated Data Protection Appliance Product Guide9
Introduction
Scalability
The DP4400 is designed to be scalable so it can scale up with ever-changing needs. See the
Expanding storage capacity
Guide
for more information about how to add storage capacity.
l
For the DP4400 model with a capacity from 8 TB to 24 TB, you can expand the storage
section in the
Dell EMC Integrated Data Protection Appliance Product
capacity in multiples of 4 TB increments up to 24 TB. You can now expand the capacity beyond
24 TB in 12 TB increments.
l
For the DP4400 model with a capacity from 24 TB to 96 TB, you can expand the storage
capacity in 12 TB increments, and you can expand the capacity up to a maximum of 96 TB.
The following table details the configuration for the DP4400 models.
Table 2 Configuration for IDPA DP4400 Models
ModelConfiguration Details
DP4400From 8 TB up to 24 TB
From 24 TB up to 96 TB
Unified support
The same Customer Support team supports both the hardware and the software that is used in the
appliance.
System architecture and components
The IDPA integrates multiple data protection components into a single product.
Detailed configuration
The IDPA DP4400 is available in the following configurations:
NDMP Accelerator
is supported with
IDPA but is not
bundled with the
product. You must
contact Customer
Support to set it up
with IDPA.
10Dell EMC Integrated Data Protection Appliance Product Guide
Base hardware
The IDPA DP4400 includes a Dell PowerEdge R740 Server.
Embedded software
After the initial configuration, the following applications are deployed and configured:
l
Data Domain Virtual Edition
l
VMware vCenter Server
l
Avamar Virtual Edition
l
IDPA System Manager
l
Data Protection Advisor (optional)
n
Datastore Server
n
Application Server
l
Search (optional)
n
Search Index Master
l
Cloud Disaster Recovery Add-on (optional)
l
Appliance Configuration Manager
Introduction
System self-protection
The IDPA is configured to protect itself from data loss with the backup and storage applications
that are in the system.
It is protected with a predefined backup job policy that is scheduled daily and has a 30-day
retention period. The metadata is protected through a backup to the Protection Storage (Data
Domain) using checkpoints.
Table 4
Component VM backup jobs
Virtual machineBackup job
ACMManagement_VM_Backup
vCentervCenter_Backup
DP AdvisorDataProtectionAdvisor_Backup
SearchDataProtectionSearch_Backup
IDPA System ManagerDataProtectionCentral_Backup
CDRADataDomainCloudDisasterRecovery_Backup
Network connectivity overview
During the initial configuration, IP addresses are assigned to various functional components of
IDPA, typically by allocating a range of IP addresses. IDPA requires 13 IP addresses for the various
components. Using a range is the preferred method as it simplifies the assignment and reduces the
chance for errors while entering the IP addresses. When a range of IP addresses is used during the
IDPA configuration, the IP addresses are assigned in a standard order. Optionally, discrete IP
addresses can be assigned manually to each functional component.
Of these 13 IP addresses, two are required for the initial network configuration; one for the ACM
and the other for the ESXi server. After the initial network configuration is successful, the IPs for
Dell EMC Integrated Data Protection Appliance Product Guide11
Introduction
the other components can be configured using a range of 11 IP addresses. If a range of IPs is not
available, users can also set random IPs of the same subnet to the components.
Use the following table to determine which IP address is allocated to a component. The
Allocation
(first column in the table) is the value that you should add to the first IP address in the
IP Range
range.
Table 5 IP address range assignments for DP4400
IP Range
Allocation
+0
+1
+2
+3
+4
+5
+6
+7
+8
+9
+10
ExampleComponentAssigned Field
192.0.2.1
192.0.2.2
192.0.2.3
192.0.2.4
192.0.2.5
192.0.2.6
192.0.2.7
192.0.2.8
192.0.2.9
192.0.2.10
192.0.2.11
vCenterVMware vCenter Server VM
Protection storageManagement IP
Protection storageBackup IP 1
Protection storageBackup IP 2
Backup applicationAvamar Virtual Edition Server IP
Backup applicationAvamar Proxy VM
IDPA System ManagerIDPA System Manager VM
Reporting and AnalyticsApplication Server Host VM
Reporting and AnalyticsDatastore Server Host VM
SearchIndex Master Node Host VM
DD Cloud DR CDRA
(optional)
Data Domain Cloud Disaster
Recovery (DD Cloud DR) Cloud DR
Add-on (CDRA) virtual appliance
Note: IDPA is compatible with IPv4 enabled networks and does not support pure IPv6 or dual-
stack networks.
Note: For more information on the network and firewall ports that are used in IDPA, see
Network ports
in the
IDPA Security Configuration Guide
Separate management network
DP4400 models support separating the backup network traffic from the management network
traffic. For configuring separate management network you need two IP addresses one for the
management network and one for the backup settings on the ACM, and one for the ESXi server.
Use the following table to determine which IP address is allocated to a component when you
configure a separate management network. The
the value that you should add to the first IP address in the range.
Table 6
Network
12Dell EMC Integrated Data Protection Appliance Product Guide
Management IP address range assignments for the DP4400 with Dedicated Backup
Management IP Range
Allocation
+0vCenterVMware vCenter Server VM
+1Protection storageManagement IP
+2Backup applicationAvamar Virtual Edition Server
ComponentAssigned Field
.
IP Range Allocation
IP
(first column in the table) is
Table 6 Management IP address range assignments for the DP4400 with Dedicated Backup
Network (continued)
Introduction
Management IP Range
Allocation
+3Backup applicationAvamar Proxy VM
+4IDPA System ManagerIDPA System Manager VM
+5Reporting and AnalyticsApplication Server Host VM
+6Reporting and AnalyticsDatastore Server Host VM
+7SearchIndex Master Node Host VM
+8DD Cloud DR CDRA (optional) Data Domain Cloud Disaster
Table 7 Backup IP address range assignments for the DP4400 with Dedicated Backup Network
Backup IP Range AllocationComponentAssigned Field
+0Protection storageBackup IP 1
+1Protection storageBackup IP 2
+2Backup applicationAvamar Proxy VM
ComponentAssigned Field
Recovery (DD Cloud DR)
Cloud DR Add-on (CDRA)
virtual appliance
Customer Support tasks
This section describes IDPA components that require Customer Support for additional assistance.
Table 8
Customer Support tasks
TaskDescription
Licensing
Secure Remote Services
(SRS)
Physical NDMP serverFor fresh installation, configuration, and upgrade.
Latest firmware, BIOS, and
driver updates on the Dell
Server
l
For obtaining the right license keys for any of the IDPA
components.
l
For obtaining licensing for increased storage capacity.
For issues when registering customer site IDs to the SRS
gateway.
For upgrading IDPA models on Generation 14 servers.
Dell EMC Integrated Data Protection Appliance Product Guide13
Introduction
14Dell EMC Integrated Data Protection Appliance Product Guide
CHAPTER 2
Monitor and manage the appliance
This chapter introduces the features and functionality of the ACM dashboard.
Topics include:
l
About the ACM dashboard.....................................................................................................16
l
Install the IDPA post-installation patch on DataProtection-ACM........................................... 31
l
Start up the IDPA.................................................................................................................. 33
l
Access components with a browser...................................................................................... 33
l
User accounts for components..............................................................................................35
l
Change passwords and synchronize components..................................................................36
l
Configure IDPA to use specific interfaces for replication...................................................... 40
Dell EMC Integrated Data Protection Appliance Product Guide
15
Monitor and manage the appliance
About the ACM dashboard
The ACM dashboard enables you to manage settings for the appliance and individual components,
update customer support information, and upgrade software for the appliance and its components.
The ACM dashboard also performs system health monitoring for the appliance hardware.
To access the dashboard, type https://<ACM IP address>:8543/ in a web browser and log in.
The dashboard requires Google Chrome version 64 and later or Mozilla Firefox 47.2 and later.
Note: The dashboard is enabled only after configuring IDPA.
The initial view displays the Home page and tabs for Health and Upgrade.
Basic management tasks
The ACM Dashboard enables you to view system details, change the password of appliance
components, and log out from the dashboard.
Changing the appliance password
The appliance password is common for all IDPA components.
1. Click the Change Password icon.
2. Type the Current Password.
3. Type and confirm the New Password.
The password must contain 9 through 20 characters and include at least one of each type of
supported character. The following types of characters are supported:
l
Uppercase letters (A–Z)
l
Lowercase letters (a–z)
l
Numbers (0–9)
l
Special characters: Period (.), hyphen (-), and underscore (_)
Note:
A password with a period (.) as the last character (for example, Idpa1234.) is not
accepted as a valid password.
l
Must not start with a hyphen (-)
l
The password must not include common names or user names such as root or admin.
4. Click Change Password.
The password change process for ACM and all the other IDPA components is initiated. The
Password change progress shows the progress bar with status descriptions.
Note:
The password change process takes approximately 40 minutes to complete.
The password gets changed for the users in the following sequence:
1. ACM internal LDAP user idpauser
2. Storage (DDVE) sysadmin user
3. Backup Server (Avamar) users:
a. Operating system admin and operating system root
b. Avamar server users – root, mcuser, repulser, and viewuser
4. Backup server proxy operating system root user
5. IDPA System Manager(DPC) users: Operating system admin and operating system root
16Dell EMC Integrated Data Protection Appliance Product Guide
6. Reporting and analytics (DPA) users: Application Server operating system root, Datastore
operating system root, Application server administrator
7. Search(DPS) operating system root and search default LDAP root and admin
8. Cloud disaster recovery(CDRA) admin password
9. VCenter and ESXi idpauser password.
10. ACM root password
Note: Once the password is changed, ACM users will be logged out and they need to log in
again using the updated password.
Viewing version and build details
Click the Information (i) icon. The About page displays details about the IDPA software version,
build number, and the hardware version.
Logging out
Click the Logout button.
Appliance Configuration Manager dashboard
The Home tab provides an overview of the status and settings for the IDPA components and also
displays the general settings and customer information of the IDPA appliance.
Monitor and manage the appliance
On the dashboard Home tab, you can view the network configuration and product details, manage
the password, time zone, SMTP, SNMP, and NTP settings, and modify customer support
information.
You can also configure the LDAP settings, create and download log bundles, download the current
appliance configuration, shutdown the appliance, register components with Secure Remote
Services (formerly ESRS), and install optional components such as Reporting and Analytics,
Search, Data Protection Advisor, and Cloud Disaster Recovery (CDRA) if not already installed.
Note:
The Secure Remote Services (SRS) is a seperate application that can be installed and
deployed. For more information on SRS such as overview, documentation, and so on, see
You can configure the Secure Remote Services present under the General Settings panel. If
the Secure Remote Services is not configured, you can configure it by clicking the Edit icon.
Downloading the configuration details
To download a PDF containing the current details of the IDPA configuration, click the Adobe PDF
icon.
Managing system components
The Home tab contains panels for each of the following:
l
IDPA System Manager
l
Backup Server
l
Protection Storage
l
Reporting and Analytics
l
Search
l
Cloud Disaster Recovery
l
Virtualization
l
Customer Information
Dell EMC Integrated Data Protection Appliance Product Guide17
Monitor and manage the appliance
l
General Settings
Note: If a component cannot be reached on the network or has an incorrect stored credential,
the corresponding panel prompts the user to resolve the issue.
IDPA System Manager panel
The IDPA System Manager panel displays the IDPA System Manager version and component IP
address.
You can hover over the Services to view the status information for IDPA System Manager
services.
To launch the web interface, click IDPA System Manager Web UI and log in.
Note: If external LDAP has not been configured, then use the idpauser as the username. If
external LDAP has been configured, then use the external LDAP username.
For more information about IDPA System Manager workflows and capabilities, refer to the
System Manager Administration Guide
Backup Server panel
The Backup Server panel displays the component IP address, Avamar version, metadata of the
total and available backup storage, number of NDMP servers, license status of the Backup Server
node, and whether the installation of agents is in progress.
You can hover over the Services to view the status information for Avamar services.
Click Backup Server Web UI to launch the Avamar Web Interface and log in. You can download
the Avamar agents from the web interface.
For more information about the role of backup agents and how to install them, refer to the
Administration Guide
Protection Storage panel
The Protection Storage panel displays the DD OS version, component IP address, total and
available backup storage, the file system and license status of the Protection Storage node, and
any alerts that require your action.
To access additional functionality of the component, click the Protection Storage SystemManager link.
Note:
Center (DDMC) instance.
IDPA
.
Avamar
.
Protection Storage (Data Domain) cannot be managed by the Data Domain Management
Expanding storage capacity
You can expand the storage capacity by obtaining the required additional licenses through ELMS
(an electronic license management system).
Before you begin
Note:
Adding licenses to expand the storage directly from the Data Domain user interface is
not recommended, as it may result in loss of critical functionality.
About this task
Once the system detects the hardware, the Expand storage option is available in the gear icon
menu under the Protection Storage panel. For more information on expanding storage capacity,
see the Storage expansion section in the latest
Installation Guide.
18Dell EMC Integrated Data Protection Appliance Product Guide
Dell EMC Integrated Data Protection Appliance
Monitor and manage the appliance
Procedure
1. In the Protection Storage panel, mouse over the gear icon on the top right and click the
Expand storage.
The Storage expansion and license upgrade wizard appears.
2. Click Browse and select the required license files for the additional storage.
3. Click Expand.
Results
After several minutes, the dashboard reflects the increased storage capacity.
Configuring cloud long-term retention feature on IDPA
DD Cloud Tier is configured through ACM configuration. Follow the below procedures to create DD
cloud units and configure Avamar backup policies for cloud long-term retention (LTR).
Before you begin
Note: For detailed information on creating DD cloud units, refer
Administration Guide
.
Data Domain Operating System
This process refers to the procedures in the following documents:
l
Data Domain Operating System Administration Guide
l
Avamar and Data Domain System Integration Guide
for DD OS 6.0 or higher
for Avamar 7.4 or higher
Procedure
1. On the ACM home tab, click the Protection Storage System Manager link.
The Data Domain System Manager GUI is displayed.
2. Follow the "Importing CA certificates" procedure in the
Administration Guide
.
Data Domain Operating System
After importing the certificate, close the Data Domain System Manager.
3. Connect to the Avamar user interface through IDPA System Manager.
The Avamar Administrator GUI is displayed.
4. Follow the "Adding or editing a Data Domain system with cloud tier support" procedure in
the
Avamar and Data Domain System Integration Guide
Note:
The ACM makes the step that refers to "Adding a Data Domain system"
.
unnecessary. To learn how to access the Edit Data Domain System dialog box, refer to
"Editing a Data Domain system."
5. Follow the "Creating a new tier group" procedure in the
Integration Guide
6. To verify your configuration, click the Activity launcher button in Avamar Administrator
and review the list of session on the Activity Monitor tab.
Reporting and Analytics panel
The Reporting and Analytics panel displays the Data Protection Advisor (DPA) version, IP
addresses for the Application Server and the Datastore Server, the license status of the Reporting
and Analytics node, and any alerts that require your action.
You can hover over the Services to view the status information for Data Protection Advisor
services.
To load the Reporting and Analytics console, click the Reporting and Analytics Web UI link.
Avamar and Data Domain System
.
Dell EMC Integrated Data Protection Appliance Product Guide19
Monitor and manage the appliance
If Reporting and Analytics is not configured during the initial configuration process, the panel
displays a message indicating Reporting and Analytics is not configured. To configure the
Reporting and Analytics node, click the message. The Reporting and Analytics Configuration
screen is displayed. On the Reporting and Analytics Configuration screen, provide the required
license information and IP addresses and click Configure.
IDPA supports use of an external DPA implementation to analyze the system if you are running a
corporate deployment of the DPA instance. However, IDPA dashboard (ACM) does not display any
data that is associated with the external DPA separately. IDPA does not support local analytics and
search functions when an external instance of DPA or Search is used. Moreover, if you are using
an external DPA instance, you must configure and manage any such external DPA instances as
external instances cannot be configured or managed through the ACM.
Search panel
The Search panel displays the Search version, IP address for the Index Master node, and any
alerts that require your action. To load the Search console, click the Search link.
Hover over Services to view the status information for Search services.
If Search is not configured during the initial configuration process, the panel displays a message
indicating Search is not configured. To configure the Search node, click the message. The Search
Configuration screen appears. On the Search Configuration screen, provide the required IP
address and click Configure.
IDPA supports the use of an external Search node if you are running a corporate deployment of the
Search instance. However, the Search panel on the IDPA dashboard (ACM) does not display any
data that is associated with the external Search separately. IDPA does not support local analytics
and search functions when external instances of Search are used. Moreover, if you are using an
external Search instance, you must configure and manage any such external instances as external
instances cannot be configured and managed through the ACM.
Configuring clients in Search
To enable indexing for backup clients, additional configuration in Search is required.
Refer to the procedures in the "Collections" chapter of the
Administration Guide
connected to the appliance.
All the domains under Avamar get indexed automatically. Only those client domains that are added
post deployment of Search, are added manually.
Cloud Disaster Recovery panel
The Cloud Disaster Recovery panel displays the CDRA version, and alerts that require any action.
To load the Cloud Disaster Recovery console, click the Cloud Disaster Recovery Web UI link.
IDPA supports the use of an external CDRA if you are running a corporate deployment of the
CDRA instance. However, the Cloud Disaster Recovery panel on the IDPA dashboard (ACM) does
not display any events or data that is associated with the external CDRA separately. Moreover, if
you are using an external CDRA instance, you must configure and manage any such external CDRA
instances as external instances cannot be configured and managed through the ACM.
If CDRA is not configured during the initial configuration process, the panel displays Click here toconfigure Cloud Disaster Recovery, indicating that Cloud Disaster Recovery is not configured.
To configure the Cloud Disaster Recovery node, click the message. The Cloud Disaster Recovery
Configuration screen is displayed. On the Cloud Disaster Recovery Configuration screen,
provide the IP address and click Configure.
Note:
Data Protection Search Installation and
. In the Sources section of the Collections wizard, select the clients that are
20Dell EMC Integrated Data Protection Appliance Product Guide
Monitor and manage the appliance
l
Do not change the Avamar root user password before configuring CDRA from the
dashboard.
l
Do not change the Data Domain boost user password before configuring CDRA from the
Dashboard.
l
If a cloud account and email address are not configured during the CDRA configuration, the
CDRA Login page does not work. You must configure a cloud account and email address
manually in CDRA.
Connect to the cloud account and add Cloud DR targets
Connect the CDRA to the Amazon Web Services account and add targets to the account.
Before you begin
l
You have logged in to CDRA as administrator.
l
You have an AWS account that is already configured before connecting to the cloud account.
Note: IDPA performs the CDRA configuration automatically.
Procedure
1. Click Cloud Account on the menu bar.
The Connect to Cloud Account page appears.
2. Click Add Cloud Account.
3. In the Connecting toAWS Cloud account dialog box, enter the access key and the secret
key for the AWS account. http://docs.aws.amazon.com/IAM/latest/UserGuide/
id_credentials_access-keys.html provides information about obtaining the access and
secret keys.
4. To copy the IAM policy, click Copy IAM Policy.
This action copies to the buffer a JSON version of the minimum AWS user account
permissions that are required for Cloud DR implementation, which can then be applied to
AWS to set the permissions policy for the AWS user.
5. To view the Identity and Access Management (IAM) policy that represents the minimum
AWS user account permissions that are required for Cloud DR implementation, click ShowIAM Policy.
6. To save the AWS cloud account, click Verify & Save.
The CDRA verifies that the account exists before saving the cloud account information and
closing the Connecting to AWS Cloud account dialog box.
Note:
After you have provided credentials to an AWS account, you cannot change to
another AWS account.
Add cloud targets
You can add one or more cloud targets to the cloud account that includes selecting an Amazon S3
bucket and an encryption method.
Procedure
1. Click Cloud Account on the menu bar.
The Connect to Cloud Account page appears.
2. Click Add Cloud DR Target to set up one or more Cloud DR targets on the cloud account.
The Cloud DR target is the S3 bucket on AWS where data is written when VMs are backed
up to the cloud. The Cloud DR Server is deployed on one of the targets.
Dell EMC Integrated Data Protection Appliance Product Guide21
Monitor and manage the appliance
3. Enter a name for the Cloud DR target.
4. Select an Amazon S3 bucket for the Cloud DR target.
5. Click Advance security option and select an encryption method:
The Add Cloud DR Target dialog box opens.
The name entered here appears in the Avamar Administrator when creating a Cloud DR
backup policy.
OptionDescription
SSE-S3Default encryption (no cost)
SSE-KMSKey management service encryption (incurs a cost)
Note: If you select the SSE-KMS encryption method, only the default customer
managed key is supported. Changing the encryption key might cause errors with the
files in the Amazon S3 bucket.
For more information about these encryption methods, see:
Cloud DR targets are required in the AWS account before performing this task. Connect to the
cloud account and add Cloud DR targets on page 21 contains information about adding Cloud
DR targets to the AWS account.
l
AWS Marketplace terms must be accepted before deploying the Cloud DR Server.
Procedure
1. Click Cloud DR Server on the menu bar.
l
If no CDRS has been deployed, the Deploy Cloud DR Server page appears.
l
If the CDRS has already been deployed, the Cloud DR Server page appears. You cannot
deploy additional CDRS instances.
2. In the Cloud DR Server Configuration section, select the Cloud DR target on which to
deploy the Cloud DR Server.
3. To allocate IP addresses for the Cloud DR solution, provide the IPV4 CIDR Range.
4. In the User Configuration section, enter and confirm passwords for the CDRS Admin and
CDRS Monitor users.
The passwords must:
l
Be at least eight characters in length
l
Contain characters of a minimum of three of the following types:
22Dell EMC Integrated Data Protection Appliance Product Guide
Monitor and manage the appliance
n
English uppercase: A-Z
n
English lowercase: a-z
n
Numeric character: 0–9
n
Special (non-alphanumeric) characters
a. Enter and confirm passwords for the CDRS Admin and CDRS Monitor users.
b. Enter an email address for DD Cloud DR password reset requests.
When the Cloud DR Server is successfully deployed, AWS sends an email to this address
for verification. Follow the instructions in the email within 24 hours of deployment.
5. To confirm that you accept the marketplace terms, click the I have accepted the AWSMarketplace terms checkbox.
6. Click Deploy Cloud DR Server.
The CDRA begins deployment of the CDRS to the Cloud DR target. If an error occurs during
deployment, click Cleanup to delete the cloud resources that CDRS creates, and then retry
deployment.
Deploying the CDRS may take up to 30 minutes.
If the deployment is successful, the Cloud DR Server page appears, listing the hostname of
the CDRS host, and the region. Also deployed are:
l
A Virtual Private Cloud (VPC).
l
An Amazon Relational Database Services (RDS) catalog, to maintain persistent data.
l
A private subnet for communication between the RDS and CDRS.
l
A public subnet (Standard Mode) or private subnet (Professional Mode) with internet
access to be used by CDRS.
l
The CDRS EC2 instance.
The M4.Large instance type is used for the CDRS instance. To reduce deployment costs,
you may want to purchase reserved instances from AWS; otherwise an on-demand instance
is used. An elastic IP address is automatically assigned to the CDRS instance. You cannot
change this IP address.
Note:
Multiple Cloud DR Add-on appliances can connect to a single Cloud DR Server
instance. However, one Cloud DR Add-on appliance cannot connect to multiple Cloud
DR Server instances.
Results
When the CDRS is deployed, connect to the Cloud DR Server by clicking the CDRS hostname.
Create rapid recovery images for protected VMs
You can accelerate the recovery process ahead of time by creating rapid recovery images for
protected VMs.
About this task
Creating a rapid recovery image starts the rehydration process and converts the VMDK files to an
Amazon Machine Image (AMI). The recovery process then launches the recovered instance from
the AMI.
Perform this procedure when a new backup copy is available in the Amazon S3 bucket.
Dell EMC Integrated Data Protection Appliance Product Guide23
Loading...
+ 51 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.