NW Vmware DFC Docu96482
NW Vmware DFC Docu96482
Version 19.2.x
Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED “AS-IS.” DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND
WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF
MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED
IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.
Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property
of their respective owners. Published in the USA.
Dell EMC
Hopkinton, Massachusetts 01748-9103
1-508-435-1000 In North America 1-866-464-7381
www.DellEMC.com
Figures 9
Tables 11
Preface 13
Chapter 2 Deploy the vProxy appliance and configure the NetWorker datazone
37
Deploying the vProxy appliance........................................................................ 38
Deploy the vProxy OVA on a vCenter server........................................ 38
Deploy the vProxy OVA on an ESXi host.............................................. 40
VMware vCenter server management............................................................... 41
Add the vCenter server using NMC's VMware View............................. 41
Add the vCenter server using the NetWorker Management Web UI.....43
Configuring and registering the vProxy appliance............................................. 44
Configure and register the vProxy in NMC...........................................44
Add and configure the vProxy in the NetWorker Management Web UI....
46
Installing the vCenter plug-in............................................................................ 47
Install the vCenter plug-in using VMware View in NMC....................... 48
Install the vCenter plug-in using the NetWorker Management Web UI....
50
Updating the vCenter plug-in............................................................... 51
Appendix D EMC Backup and Recovery plug-in for Vmware Backup appliance
restores 261
FULLVM (Image-level) Restore...................................................................... 262
Performing a FULLVM restore........................................................... 262
Canceling a FULLVM restore............................................................. 263
Instant Access restore (for Data Domain systems only).....................263
Restore from last backup................................................................... 265
Direct to host recovery...................................................................... 266
Glossary 269
1 Revision history................................................................................................................. 13
2 Style conventions.............................................................................................................. 15
3 NetWorker VMware Protection with vProxy appliance requirements................................20
4 Incoming port requirements.............................................................................................. 22
5 Outgoing port requirements.............................................................................................. 22
6 Performance and scalability factors.................................................................................. 26
7 Minimum required vCenter user account privileges ..........................................................53
8 Location of the vProxy redeployment log files ................................................................. 62
9 Schedule icons..................................................................................................................99
10 Schedule icons................................................................................................................ 104
11 MSVMAPPAGENT binaries called by vProxy................................................................... 125
12 Supported characters in SQL database names................................................................ 128
13 SQL Skipped Database Cases and Descriptions............................................................... 132
14 Backup log files................................................................................................................134
15 FLR privilege requirements.............................................................................................. 173
16 Recovery log files............................................................................................................209
17 Application information values ........................................................................................ 217
18 VADP recovery privileges ...............................................................................................220
As part of an effort to improve its product lines, Dell EMC periodically releases revisions of its
software and hardware. Therefore, some functions that are described in this document might not
be supported by all versions of the software or hardware currently in use. The product release
notes provide the most up-to-date information on product features.
Contact your Dell EMC technical support professional if a product does not function correctly or
does not function as described in this document.
Note: This document was accurate at publication time. Go to Dell EMC Online Support
(https://support.emc.com) to ensure that you are using the latest version of this document.
Purpose
This document describes the integration of VMware with NetWorker.
Audience
This guide is part of the NetWorker documentation set, and is intended for use by system
administrators who are responsible for setting up and maintaining backups on a network.
Operators who monitor daily backups will also find this guide useful.
Revision history
The following table presents the revision history of this document.
Table 1 Revision history
02 March 05, 2020 A section on FLR support is included in the topic vProxy
limitations and unsupported features.
01 November 15, 2019 First release of this document for NetWorker 19.2.
Related documentation
The NetWorker documentation set includes the following publications, available on the Support
website:
l NetWorker E-LAB Navigator
Provides compatibility information, including specific software and hardware configurations
that NetWorker supports. To access E-LAB Navigator, go to https://
elabnavigator.emc.com/eln/elnhome.
l NetWorker Administration Guide
Describes how to configure and maintain the NetWorker software.
l NetWorker Network Data Management Protocol (NDMP) User Guide
Describes how to use the NetWorker software to provide data protection for NDMP filers.
l NetWorker Cluster Integration Guide
Contains information related to configuring NetWorker software on cluster servers and clients.
l NetWorker Installation Guide
Provides information on how to install, uninstall, and update the NetWorker software for
clients, storage nodes, and servers on all supported operating systems.
l NetWorker Updating from a Previous Release Guide
Describes how to update the NetWorker software from a previously installed release.
Note: References to Data Domain systems in this documentation, in the UI, and elsewhere in
the product include PowerProtect DD systems and older Data Domain systems.
Special notice conventions that are used in this document
The following conventions are used for special notices:
NOTICE Identifies content that warns of potential business or data loss.
Note: Contains information that is incidental, but not essential, to the topic.
Typographical conventions
The following type style conventions are used in this document:
Bold Used for interface elements that a user specifically selects or clicks,
for example, names of buttons, fields, tab names, and menu paths.
Also used for the name of a dialog box, page, pane, screen area with
title, table label, and window.
Italic Used for full titles of publications that are referenced in text.
Monospace Used for:
l System code
l System output, such as an error message or script
l Pathnames, file names, file name extensions, prompts, and
syntax
l Commands and options
You can use the following resources to find more information about this product, obtain support,
and provide feedback.
Where to find product documentation
l https://www.dell.com/support
l https://community.emc.com
Where to get support
The Support website https://www.dell.com/support provides access to product licensing,
documentation, advisories, downloads, and how-to and troubleshooting information. The
information can enable you to resolve a product issue before you contact Support.
To access a product-specific page:
1. Go to https://www.dell.com/support.
2. In the search box, type a product name, and then from the list that appears, select the
product.
Knowledgebase
The Knowledgebase contains applicable solutions that you can search for either by solution
number (for example, KB000xxxxxx) or by keyword.
To search the Knowledgebase:
1. Go to https://www.dell.com/support.
2. On the Support tab, click Knowledge Base.
3. In the search box, type either the solution number or keywords. Optionally, you can limit the
search to specific products by typing a product name in the search box, and then selecting the
product from the list that appears.
Live chat
To participate in a live interactive chat with a support agent:
1. Go to https://www.dell.com/support.
2. On the Support tab, click Contact Support.
3. On the Contact Information page, click the relevant support, and then proceed.
Service requests
To obtain in-depth help from Licensing, submit a service request. To submit a service request:
1. Go to https://www.dell.com/support.
2. On the Support tab, click Service Requests.
Note: To create a service request, you must have a valid support agreement. For details about
either an account or obtaining a valid support agreement, contact a sales representative. To
find the details of a service request, in the Service Request Number field, type the
service request number, and then click the right arrow.
To review an open service request:
1. Go to https://www.dell.com/support.
2. On the Support tab, click Service Requests.
3. On the Service Requests page, under Manage Your Service Requests, click View All Dell
Service Requests.
Online communities
For peer contacts, conversations, and content on product support and solutions, go to the
Community Network https://community.emc.com. Interactively engage with customers, partners,
and certified professionals online.
How to provide feedback
Feedback helps to improve the accuracy, organization, and overall quality of publications. You can
send feedback to DPAD.Doc.Feedback@emc.com.
System requirements
The following table lists the required components for NetWorker VMware Protection with the
vProxy appliance.
When you install or upgrade NetWorker and deploy the vProxy appliance, ensure that the
NetWorker server and storage node are at the same version, and that you use the latest version of
the vProxy appliance.
Note: For more compatibility details and the most up-to-date versions that are supported, see
the NetWorker compatibility matrix at https://elabnavigator.emc.com/eln/
modernHomeDataProtection.
Component Requirements
vProxy Appliance Version 4.0. System requirements for the vProxy include:
l CPU: 4 * 2 GHz (4 virtual sockets, 1 core for each
socket)
l Memory: 8 GB
l Disks: 2 disks (59 GB and 98 GB)
l Internet Protocol: IPv4 only or IPv6 only; dual stack not
supported
l SCSI controller: Maximum 4
l NIC: One vmxnet3 NIC with one port
vCenter server l 6.0, 6.0U1, 6.0U2, 6.0U3, 6.5, 6.5U1, 6.5U2, 6.5U3, 6.7,
6.7U1, 6.7U2, 6.7U3
l Version 6.5 and later is required to perform Microsoft
SQL Server application-consistent protection.
l Linux or Windows platform, or VC appliance
Note: The NetWorker compatibility matrix at https://
elabnavigator.emc.com/eln/
modernHomeDataProtection provides detailed
information about NetWorker and vCenter/vSphere
version compatibility.
ESX/ESXi server l 6.0, 6.0U1, 6.0U2, 6.0U3, 6.5, 6.5U1, 6.5U2, 6.5U3, 6.7,
6.7U1, 6.7U2, 6.7U3,
l Version 6.5 and later is required to perform Microsoft
SQL Server application-consistent protection.
l Automatically enables Changed Block Tracking (CBT)
on each virtual machine.
Note: The NetWorker compatibility matrix at https://
elabnavigator.emc.com/eln/
modernHomeDataProtection provides detailed
Component Requirements
VMC on AWS VMC on AWS: vProxy is compatible with SDDC version 1.6,
1.7 and 1.8
Compatibility information
The NetWorker Online Compatibility matrix provides software compatibility information for the
NetWorker release, which includes NetWorker VMware Protection with the vProxy appliance.
Port requirements
The NetWorker VMware Protection solution requires the ports that are outlined in the following
tables.
Note: The vProxy appliance does not support the use of a non-default vCenter HTTPS port. To
perform data protection operations using the vProxy appliance, ensure that your vCenter
server uses the default 443 HTTPS port.
vProxy Appliance Data Domain 22, 111, 131, 161, 2049, Data Domain
2052 management
Figure 2 Port requirements for NetWorker VMware Protection with the vProxy appliance
n Instant Restore of Virtual Machine will recover all the disks in a VM with vRDM disk as
regular thick eager zeroed VMDK disks.
n Revert a Virtual Machine does not support the Revert VM configuration option if the
backup includes a vRDM disk. Ensure that you do not select this option during such
restores.
n If all the disks and vRDM disk are restored to the same datastore, then Recover to New
Virtual Machine will recover all the disks in a VM with vRDM disk as regular thick eager
zeroed VMDK disks.
l The vProxy Appliance uses Changed Block Tracking (CBT) by default. If CBT is disabled on the
virtual machine, then it enables CBT automatically. If you add a disk to the virtual machine
after the first full backup, for the next policy run a full backup will be performed automatically
for the newly added disk, and an incremental backup will be performed for the existing disk.
For information about disabling CBT, see the section Enabling or disabling Changed Block
Tracking.
l When backing up thin-provisioned Virtual Machines or disks for Virtual Machines on NFS
datastores, an NFS datastore recovery does not preserve thin provisioning. VMware
knowledge base article 2137818 at http://kb.vmware.com/kb/2137818 provides more
information.
l It is recommended that you set an appropriate NetWorker server/storage parallelism value,
according to the available resources, to reduce queuing. For example, five vProxy appliances
with backup and clone operations require more than 125 parallel sessions. Therefore, setting
the parallelism for the NetWorker server to 128 or higher (while also setting the server with
32+ GB memory and 8+ CPUs) will suit such an environment. The NetWorker Performance
Optimization Planning Guide provides more details.
l If you require a larger number of parallel image backups, also consider setting the maximum
number of vCenter SOAP sessions to larger value. This requires careful planning and additional
resources on the vCenter Server You can configure this by modifying the following line in the
vCenter vpxd.cfg file:
<vmacore><soap><maxSessionCount> N </maxSessionCount></soap></vmacore>
This applies specifically to SDK sessions as opposed to VI client sessions.
l Each Virtual Machine backup to a Data Domain system consumes more than one session on the
Data Domain device. The default device configuration is target sessions=20 and max
session=60, however it is recommended that you configure additional devices for more than
10 parallel backups.
l Virtual Machines with extremely high IO may stop responding during consolidation due to the
ESXi forced operation called synchronous consolidate. Plan your backups of such Virtual
Machines according to the amount of workload on the Virtual Machine.
l When you work with the vCenter database either directly or by using scripts, do not change
the name attribute for the vmfolder object. VMware knowledge base article at https://
support.emc.com/kb/190755 provides more information.
l Resource contention can occur at various points during the backup cycle. When NetWorker
runs larger policies, issues due to contention of resources can occur, which impact all running
operations. Adjust your resources and times for other larger policies to avoid overlaps, and
avoid resource contention.
For example, you configure one pool that is named Bronze, with one device. If you set up a
policy where every day at 10 pm two policies called 'Bronze1' and 'Bronze2' with 400 virtual
machines each start writing to the device in the 'Bronze' pool, then the long wait for device
availability may cause unexpected delays or timeouts. To fix this, set the policy start times 4
hours apart and add more devices, to allow for stable backups.
Transport mode recommendations
Review the following recommendations for transport mode settings:
l Use hotadd transport mode for faster backups and restores and less exposure to network
routing, firewall, and SSL certificate issues. The vProxy appliance currently supports a
maximum of 25 concurrent hotadd sessions. To support hotadd mode, deploy the vProxy on an
ESXi host that has a path to the storage that holds the target virtual disk(s) for backup.
l Hotadd mode requires VMware hardware version 7 or later. Ensure that all virtual machines
that you back up with Hotadd mode are using Virtual Machine hardware version 7 or later.
l For sites that contain many virtual machines that do not support hotadd requirements, NBD
transport mode is used. This can cause congestion on the ESXi host management network.
Plan your backup network carefully for large scale NBD installs. You may consider configuring
one of the following options:
n Set up Management network redundancy.
n Set up backup network to ESXi for NBD.
n Set up storage heartbeats. http://www.vmware.com/files/pdf/techpaper/vmw-vsphere-
high-availability.pdf provides more information.
l Avoid deploying VMs with IDE virtual disks; using IDE virtual disks degrades backup
performance. Use SCSI virtual disks instead whenever possible.
Note: You cannot use hotadd mode with IDE Virtual disks and therefore backup of these
disks will be performed using NBD mode.
l If you have vFlash-enabled disks and are using hotadd transport mode, ensure that you
configure the vFlash resource for the vProxy host with sufficient resources (greater than or
equal to the virtual machine resources), or migrate the vProxy to a host with vFlash already
configured. Otherwise, backup of any vFlash-enabled disks will fail with the error "VDDK Error:
13: You do not have access rights to this file," and the error "The available virtual flash
resource '0' MB ('0' bytes) is not sufficient for the requested operation" on the vCenter
server.
l If you only want to use one transport mode, ensure that you set the maximum sessions value
for the other transport mode to 0. For example, if you want to use hotadd mode only set
hotadd = 25 and nbd = 0. If you want to use NBD mode only, set hotadd = 0 and nbd = 10.
l In order for backup and recovery operations to use Hotadd mode on a VMware Virtual Volume
(VVol) datastore, the vProxy should reside on the same VVol as the virtual machine.
Number of concurrent 48 (10G VMware uses Network File Copy (NFC) protocol
NBD backups per vCenter network) to read VMDK using NBD transport mode. You
server need one VMware NFC connection for each VMDK
file being backed up. The VMware Documentation
provides more information on vCenter NFC
session connection limits.
Virtual machines 100 100 Can be achieved with a combination of the number
concurrent backups per of proxies multiplied by the number of configured
vCenter server hotadd sessions per vProxy.
Number of workflows per 64 8 Ensure that you do not to exceed 2000 virtual
VMware policy machines per VMware policy.
Number of virtual 2000 Ensure that you do not to exceed 2000 virtual
machines per workflow machines per VMware policy.
Note that the maximum of 2000 virtual machines
per workflow is only applicable to the first FULL
backup to Data Domain, and does not apply to
CBT-based incremental backups of the virtual
machines.
However, ensure that you do not exceed 100
connections per vCenter at any time during the
backup window.
Number of vCenter 5 3 Per policy you can use 5 vCenter servers in the
servers per policy respective workflows and trigger concurrent
backups.
Total number of virtual 2000 1000 You can run multiple vProxy policies concurrently
machines in a single as long as the total number of concurrent backup
NetWorker policy streams does not exceed the vCenter limits
indicated in this table.
In the case of a single vCenter, stagger the
schedules for policies to ensure that all the
backups for a policy complete before the backups
of the next policy begin.
Configuration checklist
The following configuration checklist provides best practices and troubleshooting tips that might
help resolve some common issues.
Basic configuration
l Synchronize system time between vCenter, ESX/ESXi/vSphere, and the vProxy appliance
l Assign IPs carefully — do not reuse any IP address
l Use FQDNs (Fully Qualified Domain Names) everywhere
l For any network related issue, confirm that forward and reverse DNS lookups work for each
host in the datazone.
NetWorker configuration
l Ensure that the relevant devices are mounted.
l Ensure that vProxy IP addresses are populated in DNS, and that the NetWorker server has
name resolution for the vProxy host names.
l The vCenter plug-in requires the NetWorker server and NetWorker Authentication service to
be installed on the same machine.
l Wait until you successfully configure a policy before you run the policy.
l A message appears after successful vProxy registration in NMC.
l Dell EMC Data Protection Restore client requires NetWorker server and NetWorker
Authentication service to be installed on the same machine.
vCenter plug-in requires NetWorker server and NetWorker Authentication services running on
the same machine.
The vCenter plug-in (HTML5 or flash-based) does not support running the NetWorker server
and NetWorker Authentication service on different machines. Ensure that both are running on
the same machine.
Network configuration settings do not get restored with virtual machine after recovery of a vApp
backup.
Network configuration settings are not backed up with the virtual machine as part of a vApp
backup in NetWorker. As a result, when you restore a vApp backup, you must manually
reconfigure the network settings.
Concurrent vProxy workflow on the same virtual machine is not supported when not using a
vCenter server
NetWorker does not support running multiple vProxy workflows concurrently (backup, image-
level recovery, or file-level restore operations) on the same virtual machine when not using a
vCenter server in your environment.
Data Domain system requires REPLICATION license when clone of VMware backup that is
performed to same system as the backup
When cloning VMware backups using NetWorker VMware Protection with the vProxy
appliance, if the clone is performed to the same Data Domain system as the backup, a
REPLICATION license is required on the Data Domain system.
Virtual machine. alert "VM MAC conflict" is displayed after successful recovery of virtual
machine
After performing a successful recovery of a virtual machine through vCenter version 6, an
alert may appear to indicate a "VM MAC conflict" for the recovered virtual machine, even
though the new virtual machine will have a different and unique MAC address. You must
manually acknowledge the alert or clear the alert after resolving the MAC address conflict.
This alert can be triggered even when the MAC address conflict is resolved.
The VMware release notes at http://pubs.vmware.com/Release_Notes/en/vsphere/60/
vsphere-vcenter-server-60u2-release-notes.html provide more information.
Emergency recovery cannot be performed until vProxy registration event successful with
NetWorker.
When deploying a new vProxy that is not yet registered with NetWorker, wait for the
registration event to complete successfully with NetWorker before performing an emergency
recovery in the NMC Recovery wizard. The event appears in the logs and in NMC.
Backups fail for resource pools that are re-created with the same name as deleted pool
When you delete a resource pool in vCenter and then re-create a resource pool with the same
name, backups fail. Reconfigure the protection group with the newly created resource pool.
Specify NBD for datastores if proxies should use NBD mode only.
For proxies that only use NBD transport mode (proxies where you specify a value greater than
0 for the NBD maximum sessions limit), you must also specify the datastores for which you
want the proxy to perform only NBD backups to ensure that any backups of virtual machines
running on these datastores are always performed using NBD mode. This also ensures that the
same NBD-only proxies are never used for backups of virtual machines residing on any other
datastores.
Retries, Retry Delay, and the Inactivity Timeout options for VMware backup action are not
supported.
The Retries, Retry Delay, and the Inactivity Timeout options that appear during creation of
a VMware backup action in the NetWorker Management Web UI and NMC are not
supported. You can ignore these options when creating the backup action.
VMware View in the NetWorker Administration map view does not display when configuration for
Virtual Machines within the vCenter is incomplete
When you use VMware View, the map view does not appear when the configuration for one or
more Virtual Machines in the vCenter is incomplete. To avoid this issue, delete the incomplete
Virtual Machine configurations from vCenter.
No automatic migration tool to move from previous solution to NetWorker VMware Protection
with the vProxy appliance
An automatic migration tool to move from the previous virtual machine backup solution to the
NetWorker VMware Protection with vProxy appliance solution does not exist.
Cannot select a vProxy or the cloned vProxy when you create a VMware group
When you create a protection group, you cannot select vProxy or clones of the vProxy from
the hosts list. To use the clone vProxy as a normal virtual machine, clear the annotation string
This is EMC Backup and Recovery vProxy Appliance in the Notes section of the
cloned vProxy virtual machine.
Datastore cluster does not display in the Datastore selection drop-down of NMC Recovery
wizard for Virtual Machine Recovery or Virtual Disk Recovery types.
If a vCenter server contains a datastore cluster, the datastore cluster name does not display
for selection during image-level recoveries using either the Virtual Machine Recovery or
Virtual Disk Recovery types in the NMC NetWorker Administration Recovery wizard. When
performing the recovery to a datastore cluster, ensure that you select any valid datastore
within the cluster that contains enough free space to accommodate the virtual machine.
File level restore, emergency restore, or Instant access restore on dual network adapter vProxy is
supported only if VMkernel port is connected to backup subnet/VLAN.
To use Instant Access restore, emergency restore, and file-level restore with vProxy having
dual network adapter or multiple isolated VLANs configured, the destination ESXi requires a
VMkernel port that is connected to the backup subnet/VLAN.
Emergency recover operation using NWUI the existing/registered vProxies are not listed.
If user tries to perform emergency recover in IPV6 environment, then it is recommended to
use ESXI host FQDN instead of IPV6 address in NMC and NWUI.
Dell EMC Data Protection Restore Client requires NetWorker server and NetWorker
Authentication services running on the same machine.
The Dell EMC Data Protection Restore Client does not support running the NetWorker server
and NetWorker Authentication service on different machines. Ensure that both the
NetWorker server and NetWorker Authentication service are running on the same machine.
Recovered virtual machine fails to turn on if the source virtual machine is attached to a
dvportgroup which no longer exists
A recovered virtual machine fails to turn on if the source virtual machine is attached to a
dvportgroup which no longer exists. This issue affects the following types of restore
operations:
l Instant access recovery
l Virtual machine recovery
l Emergency recovery
To avoid this issue, manually edit the virtual machine settings and assign the required network
connection before powering on the recovered virtual machine.
When the vCenter is renamed to a different hostname, NetWorker server treats the vCenter
server as a new resource
Perform the following steps to rename the vCenter to a different hostname:
1. Create a hypervisor resource in NetWorker server pointing to the new hostname of the
vCenter.
Note: If you need the old backups, then retain both vCenter resources in NetWorker
until savesets of older vCenter expires.
2. Configure new vCenter groups and workflows and map to the required VMs in the new
vCenter.
3. Reconfigure the existing vProxy resources in NetWorker to point to the new vCenter.
4. Use NWUI H5 interface to restore any of the older vCenter backups.
Note: Restore of vCenter backup using vCenter plug-in is not supported.
IPv6 Considerations
In IPv6 enabled VMware environment, the following components should not have any unreachable
IPv4 entries in the DNS server:
l NetWorker server FQDN
l vProxy appliance FQDN
l Data Domain FQDN
l vCenter FQDN
l ESXi FQDN
The FQDNs listed above should return only AAAA records from the DNS and should not have any
unreachable IPv4 records in the DNS.
Otherwise, ensure that you assign the networks according to the following
considerations:
l If the Data Domain backup data uses a separate private or isolated physical network,
use the optional VM Network 2 and map this network to your desired destination
network portgroup.
l If the Data Domain backup data uses a separate private or isolated physical network,
VM Network 2 should map to the “vProxy Backup Data network” portgroup, which
is the network with access to the Dell EMC Data Domain, as indicated in the
description when the network is selected.
11. Select IPv4 or IPv6 from the IP protocol drop-down, and then click Next.
12. On the Customize template window, specify the following attributes, and then click Next.
a. Expand Networking properties, and then perform the following tasks:
l In the Network IP address field, specify an IPv4 or IPV6 address for the vProxy
appliance.
l In the Default gateway field, specify the IPV4 or IPV6 address of the gateway host.
l In the Network Netmask/Prefix field, specify the netmask for an IPv4 Network IP
address, or the prefix length for an IPv6 Network IP address.
Note: Similar to the Select networks window, if dual NIC is configured, specify
values for both VM Network and VM Network 2. If a single NIC is configured, then
specify a value only for VM Network and ignore VM Network 2.
13. On the Ready to Complete window, review the deployment configuration details. If you will
immediately configure the appliance, select Power on after deployment, and then click
Finish.
The Deploying window appears and provides status information about the deployment.
Note: If you are deploying vProxy on an ESXi 6.0 directly using vSphere client then you
do not have an option to set the vProxy password during deployment. You must change
the default passwords from the console window of the vProxy appliance or use the
default passwords to configure vProxy once deployed . The default password for root
account is “changeme” and for admin account is “a3dp@m8n”.
l When you deploy the virtual appliance on a host with a resource pool or vApp, select the
resource pool or vApp on which to deploy virtual appliance.
9. On the Storage window, select the destination datastore on which to store the virtual
appliance files, and then click Next.
10. On the Disk Format window, select the disk format.
It is recommended that you select Thick Provision Lazy Zeroed to ensure that amount of
storage space allocated to the virtual appliance is available.
11. On the Network Mapping window, select the Source and Destination networks to use with
the appliance, and then click Next.
12. On the Ready to Complete window, review the deployment configuration details. If you will
immediately configure the appliance, select Power on after deployment, and then click
Finish.
The Deploying window appears and provides status information about the deployment.
Note: If you are deploying vProxy on an ESXi 6.0 directly using vSphere client then you
do not have an option to set the vProxy password during deployment. You must change
the default passwords from the console window of the vProxy appliance or use the
default passwords to configure vProxy once deployed . The default password for root
account is “changeme” and for admin account is “a3dp@m8n”.
FQDN alias or shortname alias for the vCenter server when adding it to NetWorker is not
supported for the vCenter plug-in.
Procedure
1. In the NetWorker Administration window, click Protection.
2. In the left navigation pane, expand the NetWorker server, right-click VMware View, and
then select Add vCenter.
The Add vCenter window appears.
3. In the Host Name field, specify the FQDN of the vCenter server.
4. In the User Name field, specify a vCenter user account that has permissions to perform
backups.
5. In the Password field, specify the password for the account for the vCenter server.
6. If the vCenter server is deployed in the Cloud, select the Deployed in Cloud checkbox, and
then click OK.
Note: When you select Deployed in Cloud, a parameter displays in the backup action
logs that indicates HypervisorMode: VMC. When the checkbox is not selected, the
parameter indicates HypervisorMode: vSphere.
7. Click OK.
protected by a policy, or display only unprotected entities. An entity that is already protected
appears blue and bolded.
a. Right-click NetWorker.
b. Select Launch Application. The NetWorker Administration window appears.
4. On the taskbar, click the Devices button .
5. In the Device window's left navigation pane, right-click VMware Proxies and select New
VMware Proxy Wizard.
The VMware Proxy Configuration wizard wizard opens on the Select the Configuration
Method page.
6. On the Select the Configuration Method page, select Register VMware Proxies, and
then select the vCenter/ESXi server. Click Next.
The Select the VMware Proxies to Configure and Register page displays. On this page,
the VMware Proxy Selection pane displays the location of the deployed but unregistered
vProxy appliance(s) within the vCenter/ESXi server.
7. Select the checkbox next to the vProxy appliance(s) you want to configure.
8. (Optional) If you want to override the common configuration options for the selected
vProxy, click the Edit button to open the Configure VMware Proxy dialog. When finished,
click OK to save the settings.
VMware Proxy Configuration Wizard reports the status as failed if total hotadd sessions
exceeds 100 per vCenter. Registering of vProxy using the VMware Proxy Configuration
Wizard through NWUI or NMC incorrectly reports the status as failed if total hotadd
sessions for all the vProxies combined exceeds 100 per vCenter. This failed status can be
ignored because the registration actually succeeds. The status appears as failed in order to
alert the user that the total hotadd sessions have exceeded the recommended limit of 100
hotadd sessions per vCenter. Refer to the section "Performance and Scalability" for
recommended limits.
9. Click Next.
The VMware Proxies Configuration and Registration Summary page displays.
10. Verify that the details are correct, and then click Configure.
Results
The jobs created for all vProxy registrations display in a table on the Check Results page, where
you can view the status, as well as the logs, for each entry. If you want to close the wizard, you
can also monitor the progress in the Monitoring pane of the Devices window. To view the details
of the job at any time, right-click an entry in the Monitoring pane and select View Log.
5. In the expanded left navigation pane, right-click VMware Proxies and select New.
The Create NSR VMware Proxy dialog displays.
6. On the General tab, specify the FQDN of the vProxy appliance in the Name field.
Note: Any additional fields on this tab are optional.
When specifying the maximum sessions value for the transport modes, ensure that at
least one transport mode is set to a value greater than 0. If you want to enable only one
of the transport modes, set the maximum sessions for the transport mode you do not
want to use to 0. NetWorker displays a warning message if you are exceeding 100 hotadd
sessions per vCenter. Refer to the section "Performance and Scalability" for
recommended limits.
8. Click OK.
3. On the Selection page, ensure that you select the correct vCenter.
All vProxies in that vCenter inventory will display.
4. Use the Select Proxies field to select one or more vProxies, and then click Next.
5. On the Configuration page, configure the host names for the vProxies you want to register
and specify the following configuration options:
a. Select the vCenter server on which you deployed the vProxy appliance.
b. Specify the admin user account.
c. Specify the password for the admin user account on the vProxy appliance. This is the
password that was used during the vProxy deployment.
d. Specify a value in the Maximum NBD sessions or Maximum hotadd sessions attribute,
using the guidelines in the section "Performance and Scalability."
l Maximum NBD sessions—Defines the maximum virtual machine sessions that the
vProxy appliance supports when you use the NBD transport. Datastores should be
defined in the vProxy properties when using this setting to restrict NBD to these
datastores only.
l Maximum hotadd sessions—Defines the maximum number of virtual disks that
NetWorker can concurrently hotadd to the vProxy appliance. The default value is 13.
The maximum value for this attribute is 25.
When specifying the maximum sessions value for the transport modes, ensure that at
least one transport mode is set to a value greater than 0. If you want to enable only one
of the transport modes, set the maximum sessions for the transport mode you do not
want to use to 0.
VMware Proxy Configuration Wizard reports the status as failed if total hotadd sessions
exceeds 100 per vCenter. Registering of vProxy using the VMware Proxy Configuration
Wizard through NWUI or NMC incorrectly reports the status as failed if total hotadd
sessions for all the vProxies combined exceeds 100 per vCenter. This failed status can be
ignored because the registration actually succeeds. The status appears as failed in order
to alert the user that the total hotadd sessions have exceeded the recommended limit of
100 hotadd sessions per vCenter. Refer to the section "Performance and Scalability" for
recommended limits.
6. Click Finish.
Results
When vProxy registration is initiated, a notification displays at the top of the window that a
request was submitted. You can monitor the status and progress of the registration from the
Tasks tab on this page.
Once registration is complete, you can use the vProxy for backups of VMware protection policies.
You can also edit the configuration settings for the vProxy by clicking the Edit icon, or remove the
vProxy by clicking the Delete icon.
Procedure
1. In the NetWorker Administration window, click Protection.
2. In the left navigation pane, expand the NetWorker server and click VMware View.
3. In VMware View, right-click on the vCenter you added and select Install vCenter plugin.
The vCenter Plugin Install dialog displays.
Figure 3 Install vCenter Plugin in NMC
Dell EMC NetWorker or VM Backup and Recovery appears in the Menu drop-down in the task
bar, as shown in the following, and also appears in the left navigation pane when you select Home.
Figure 4 vCenter plug-in for Dell EMC NetWorker in the vSphere Client
Note: If you installed the HTML-5 based plug-in, you can use the vcui log file available
at /nsr/authc/logs/vcui.log to assist with troubleshooting issues with the Dell EMC
NetWorker interface. If you installed the flash-based plug-in, you can use the ebr-server
log file available at /nsr/authc/logs/ebr-server.log to assist with troubleshooting
issues with the VM Backup and Recovery interface.
Remove and reinstall the HTML5-based vCenter plug-in from the vSphere Client
In vSphere version 6.5 and later, the html-5 based vCenter plug-in appears as Dell EMC
NetWorker in the vSphere Client. If you need to remove the HTML5-based plug-in and then
reinstall the plug-in, perform the following steps.
Procedure
1. Stop the vSphere Client services.
2. Log into vCenter Server's MOB at http://vcenter-server/mob.
3. Click the content link.
4. Click the ExtensionManager link.
5. Click the UnregisterExtension link.
6. Enter the value com.dell.emc.nw and click the Invoke Method link.
7. Enter the value com.emc.networker.backup and click the Invoke Method link.
8. Enter the value com.emc.networker.recover and click the Invoke Method link.
9. On the vCenter server, manually remove the plug-in from the /vsphere-client-
serenity folder. The path is /etc/vmware/vsphere-client/vc-packages/
vsphere-client-serenity on Linux, and C:\ProgramData\VMware
\vCenterServer\cfg\vsphere-client\vc-packages\vsphere-client-
serenity on Windows.
10. Restart the vSphere Client services.
11. Perform the steps in the section Install the vCenter plug-in for the vSphere Client to re-
install the HTML5-based plug-in, and verify that the Dell EMC NetWorker interface
appears in the vSphere Client.
Remove the flash-based vCenter plug-in from the vSphere Web Client
In NetWorker 9.2.x and earlier versions, the vCenter plug-in for vProxy backup and recovery is a
flash-based plug-in that appears as VM Backup and Recovery in the left pane of the vSphere
Web Client. vSphere versions 6.5 and later and NetWorker 19.2 both this plug-in and the html-5
based vCenter plug-in that appears as Dell EMC NetWorker in the vSphere Web Client. If
upgrading to NetWorker 19.2 and you no longer require the flash-based plug-in, perform the
following steps in order to manually remove VM Backup and Recovery from the vSphere Web
Client.
Procedure
1. Stop the vSphere Web Client services.
2. Log into vCenter Server's MOB at http://vcenter-server/mob.
3. Click the content link.
4. Click the ExtensionManager link.
5. Click on the UnregisterExtension link.
6. Enter the value com.emc.networker and click the Invoke Method link.
7. Enter the value com.emc.networker.backup and click the Invoke Method link.
8. Enter the value com.emc.networker.recover and click the Invoke Method link.
9. On the vCenter server, manually remove the plug-in from the /vsphere-client-
serenity folder. On vCenter 6.0 and 6.5, the path is /etc/vmware/vsphere-
client/vc-packages/vsphere-client-serenity on Linux, and C:\ProgramData
\VMware\vCenterServer\cfg\vsphere-client\vc-packages\vsphere-
client-serenity on Windows.
10. Restart the vSphere Web Client services.
Results
When the vCenter plug-in is validated, log in to the vSphere Client for the vCenter to verify the
installation. If the installation was successful, depending on the plug-in type selected an entry for
Dell EMC NetWorker or VM Backup and Recovery appears in the Menu drop-down in the task
bar, as shown in the following, and also appears in the left navigation pane when you select Home.
Figure 5 vCenter plug-in for Dell EMC NetWorker in the vSphere Client
Note: If you installed the HTML-5 based plug-in, you can use the vcui log file available
at /nsr/authc/logs/vcui.log to assist with troubleshooting issues with the Dell EMC
NetWorker interface. If you installed the flash-based plug-in, you can use the ebr-server
log file available at /nsr/authc/logs/ebr-server.log to assist with troubleshooting
issues with the VM Backup and Recovery interface.
Results
The Active Directory user that you create using these steps will only have access to the HTML-5
or flash-based vCenter plug-in, and cannot be used to log in to the Dell EMC Data Protection
Restore Client or the NetWorker Management Console. If you also need to provide access to
these applications, then add those required privileges as described in the section File-level restore
as a domain user.
4. Click the SSO tab, and then select Embedded from the SSO deployment type drop-down
list.
5. Assign a password, and click Save settings.
6. Click the Summary tab, and then click the Start button next to the Server service in the
vCenter pane.
7. Log out of the session.
8. From a web browser, enter the following to connect to the vSphere Web Client:
https://<IP_address_vCenter_Server>:9443/vSphere-client/
vApp l Export
l Import
l vApp application configuration
Virtual Machine
Note: When assigning permissions, the vSphere Web Client places the curser in the
location last used. Depending on what level was selected the last time you used this
window, permissions might not get applied to the root level of the vCenter. For example,
if the last item you selected in this window was Cluster Name, permissions will be
assigned at the Cluster level. Review carefully to ensure that permissions get assigned
at the root level of the vCenter.
9. Click OK.
10. From the Assigned Role drop-down list, select the role you created.
11. Confirm that the Propagate to children box is checked.
12. Click OK.
Migration pre-requisites
When you migrate a VMware Backup appliance policy to a vProxy policy, a pre-check occurs
automatically to determine that compatibility requirements are met.
These requirements include verification of the following items:
l The Data Domain OS (DD-OS) is DDOS version 6.0.0.30, 6.0.1-10, or 6.1.x and later DDOS
versions. Note that use of the DD Retention Lock feature on vProxy backup and clone actions
requires DDOS 6.1.x and later.
l The NetWorker server and storage node version are the same.
l The vProxy is available on the vCenter server, and is the correct version for the NetWorker
release. For NetWorker 19.1, this is version 4.0.x.
l The vCenter server is a minimum of version 6.0.
If this check discovers any compatibility issues that can cause problems migrating all policies, the
issues are reported and migration is cancelled. If using the command line to migrate policies, you
can specify a force flag (-f) to ignore these errors and proceed with the migration to correct any
issues afterwards, however it is recommended that the pre-check requirements be met prior to
proceeding with the migration. Issues discovered during the pre-check will be logged and displayed
even when using the force flag.
Note: If a pre-check failure occurs upon initiating the migration, a prompt appears to
confirm that you want to ignore the errors and proceed. It is recommended that you
resolve any pre-check errors, including unsupported software versions, before
completing the migration in order for backups to complete successfully.
Results
A Migrate Operation Results dialog box opens which provides a real-time report of the
analyzation and the migration until the process completes. You can then choose to export a log of
the analyzation or migration as a report by clicking Export Log File.
Figure 8 Migrate Operation Results dialog
passwd admin
The pam_tally2 man page provides more information about the pam_tally2
command and how to configure the maximum number of login attempts for a user
account.
Deployment Procedure
type
Single vProxy For a single vProxy deployment, open a command prompt, and then run
deployment the nsrvproxy_mgmt command in the following format:
nsrvproxy_mgmt redeploy -h vProxy-host-name -z vProxy-root-
password [-x] [-f] [-u comments] [-t timeout in minutes] [-D
debug-level]
Sequential For sequential redeployment, you must create a batch file or a shell script.
deployment For example, to initiate three sequential deployments run the following
batch file or shell script.
l On a windows platform, to initiate sequential redeployment you must
create a batch file.
Deployment Procedure
type
Where
l -t specifies the maximum timeout value for any active vProxy session to get over and
then start the redeployment. The default timeout value is ten minutes.
l -x can be used when the vProxy admin password is same as that of root.
l -z is used when specifying the vProxy root password
l -h vProxyIP/FQDN is the vProxy hostname that was used for registration and exists in
the RAP resource.
l -f is used to disable the confirmation prompt.
l -D is used to set the debug level. By default, the debug level is 0.
l -u is used to display the comments.
Results
vProxy is successfully redeployed.
Limitations
The vProxy redeployment using nsrvproxy_mgmt redeploy command has a few limitations.
l Redeployment is performed in thin provisioning mode only. If the original vProxy is on thick
provisioning, then post deployment the disk mode is changed to thin provisioning.
l Concurrent vProxy redeployment is not supported. You can sequentially redeploy multiple
vProxy using a script.
l vProxy redeployment is not supported for vProxies that are directly deployed in the ESXi
bypassing the vCenter. If the vProxy is deployed on the ESXi bypassing the vCenter, then you
must manually redeploy the vProxy.
l The root and admin password length of the vProxy should be in between 8–20 characters only.
Before redeployment, you must change the root and admin password and update the vProxy
resource in NetWorker with the updated vProxy admin password.
l Deploying new vProxies using CLI is not supported
When you configure an action, you define the days on which to perform the action, as well as other
settings specific to the action. For example, you can specify a destination pool, a retention period,
and a target storage node for the backup action, which can differ from the subsequent action that
clones the data.
When you create an action for a policy that is associated with the virtual machine backup, you can
select one of the following data protection action types:
l Backup — Performs a backup of virtual machines in vCenter to a Data Domain system. You
can only perform one VMware backup action per workflow. The VMware backup action must
occur before clone actions.
l Clone — Performs a clone of the VMware backup on a Data Domain system to any clone
device that NetWorker supports (including Data Domain system or tape targets). You can
specify multiple clone actions. Clone actions must occur after the Backup action.
You can create multiple actions for a single workflow. However, each action applies to a single
workflow and policy.
The following figure provides a high level overview of the components that make up a data
protection policy in a datazone.
Figure 9 Data Protection Policy
b. If it does not appear, add the appliance to the Allowed Clients table:
a. Click the + (Add) button that is located above the table and to the right.
b. In the Client field, specify the fully qualified domain name (FQDN) of the host.
c. In the Authentication mode list, select None.
d. In the Encryption Strength list, select None.
e. Click OK.
c. If it does not exist, add the DD Boost user to the Users with DD Boost Access table:
a. Click the + (Add) button that is located above the table and to the right.
b. In the User list, select an existing local user, or select Create a new Local User and
then create a user account.
c. Click Add, and then click Close.
4. For file-level restore and instant access restore only, on Protocols, select NFS, ensure that
NFS status is enabled, and then click OK.
The vProxy appliance dynamically creates and deletes the NFS shares, as required.
The available data protection policies that you can use appears. The details of the selected
policy appear in the right pane.
2. Click ADD.
The Create Policy wizard appears.
3. Under Basic Configuration, in the Name field, type a name for the policy.
4. In the Description box, type a description for the policy.
5. Select a restricted datazone (RDZ) from the Restricted Data Zone list to specify a RDZ for
the directive.
6. Select Enable Protection Period to specify the protection period.
7. Enter the protection period value in minutes, hours, days, months, or years.
8. Click NEXT.
9. Under Notifications, from the Notify list, select an appropriate notification option.
l To avoid sending notifications, select Ignore.
l To send notifications with information about each successful and failed workflow and
action after all the actions in the policy complete, select On Completion.
l To send a notification with information about each failed workflow and action after all
the actions in the policy complete, select On Failure.
10. Under Notify, when you select the On Completion option or On failure option, the
Command box appears. Use this box to configure how NetWorker sends the notifications.
You can use the nsrlog command to send the notifications to a log file.
The default notification action is to send the information to the
policy_notifications.log file. By default, the Protecting virtual machines
policy_notifications.log file is located in the /nsr/logs directory on Linux and in
the C:\Program Files\EMC NetWorker\nsr\logs folder on Windows.
Use the default mailer program on Linux to send email messages or the smtpmail application
on Windows:
l To send notifications to a file, type the following command, where
policy_notifications.log is the name of the file:
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
mail -s subject recipient
l For NetWorker Virtual Edition (NVE), to send an email notification, type the following
command:
/usr/sbin/sendmail -v recipient_email "subject_text"
l On Windows, to send a notification email, type the following command:
smtpmail -s subject -h mailserver recipient1@mailserver
recipient2@mailserver...
where:
n -s subject—Includes a standard email header with the message and specifies the
subject text for that header. Without this option, the smtpmail program assumes that
the message contains a correctly formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP
email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
7. Under Notifications, from the Notify list, select an appropriate notification option.
l To use the notification configuration that is defined in the policy resource to specify
when to send a notification, select Set at policy level.
l To send notifications with information about each successful and failed workflow and
action after all the actions in the policy complete, select On Completion.
l To send a notification with information about each failed workflow and action after all
the actions in the policy complete, select On Failure.
8. Under Notify, when you select the On Completion option or On failure option, the
Command field appears. Use this field to configure how NetWorker sends the notifications.
You can use the nsrlog command to send the notifications to a log file.
The default notification action is to send the information to the
policy_notifications.log file. By default, the Protecting virtual machines
policy_notifications.log file is located in the /nsr/logs directory on Linux and in
the C:\Program Files\EMC NetWorker\nsr\logs folder on Windows.
Use the default mailer program on Linux to send email messages or the smtpmail application
on Windows:
l To send notifications to a file, type the following command, where
policy_notifications.log is the name of the file:
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
mail -s subject recipient
l For NetWorker Virtual Edition (NVE), to send an email notification, type the following
command:
/usr/sbin/sendmail -v recipient_email "subject_text"
l On Windows, to send a notification email, type the following command:
smtpmail -s subject -h mailserver recipient1@mailserver
recipient2@mailserver...
where:
n -s subject—Includes a standard email header with the message and specifies the
subject text for that header. Without this option, the smtpmail program assumes that
the message contains a correctly formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP
email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
9. Click NEXT.
10. Under Associate Group, do one of the following to assign the workflow to a group:
l Select an existing group, and click FINISH to create a workflow.
l Click ADD to create a group. The section Create a VMware group using the NetWorker
Management Web UI provides more information on creating groups.
After you finish
Create the actions that will occur in the workflow.
l If you have a clone protection group (for example, Save Set ID) associated with the
workflow, you can only create clone actions.
l If you do not have any groups associated with the workflow, you can either create a
backup or a clone action.
l The section Create a VMware backup action using the NetWorker Management Web UI
provides more information on creating VMware backup actions.
l The section Create a clone action using the NetWorker Management Web UI provides
more information on creating clone actions.
10. From the Destination Pool, select the media pool in which to store the backup data.
11. Specify the NetWorker Retention Period value.
After the retention period expires, the save set is removed from the client file index and
marked as recyclable in the media database during an expiration server maintenance task.
12. Select Apply Lock under DD Retention Lock to enable retention lock for the virtual
machines included in this backup action. Note that the device used for backing up these
virtual machines must also have DD Retention lock enabled.
13. Use the Lock Period spin boxes to specify the duration the virtual machines will remain on
the Data Domain device before the retention lock expires.
To perform the same type of backup on each day, click , and select one of the
following:
l Make All Full
l Make All Incremental
l Make All Logs Only
l Make All Skip
c. (Optional) Select Override Options to configure overrides for the task that is scheduled
on a specific day.
Note: If you select this option, you must configure the overrides using either fixed
dates or recurring dates.
d. Click NEXT.
19. Under Schedule Overrides, do the following:
a. In the Recurring Pattern attribute, if the status is Not Available, click ADD. Otherwise,
click VIEW/EDIT to specify recurring patterns. Then, select the backup level, and define
the override schedule to occur on a specific day, week, month, quarter, or year.
The selected date is highlighted with a different color and an asterisk (*).
b. To specify a fixed date pattern, select the month and year, and then click on each day to
specify the backup level.
The selected date is highlighted with a different color.
Note:
l You can select multiple override dates.
l In the case of a fixed date pattern, to clear an override schedule, click on the day
that you want to clear the override for and select Clear Selection. The Clear
Selection option is not applicable in the case of a recurring pattern.
l If the fixed and the recurring pattern is on the same day, the fixed pattern gets
preference. However, if you clear the fixed override schedule, the recurring
pattern is displayed.
l When creating overrides, you cannot select the previous month and year. You
also cannot create fixed overrides for the days before the current day because
the option to change the level is disabled.
l When editing overrides, you can clear existing fixed overrides for the days before
the current day. However, you cannot set any new overrides because the option
to change the level is disabled.
25. In the Parallelism field, specify the maximum number of concurrent operations for the
action. The default value is 100.
26. From the On Failure list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the current action if there is a failure with one of the jobs, but continue with
subsequent actions in the workflow, select Abort Action.
l To abort the entire workflow if there is a failure with one of the jobs in the action, select
Abort Workflow.
27. In the Retries field, specify the number of times that NetWorker should retry a failed
backup action, before NetWorker considers the action as failed. When the Retries value is 0,
NetWorker does not retry a failed backup action. The default value is 1. The number of
retries can be set to a maximum of 24.
28. In the Retry Delay field, specify a delay in seconds to wait before retrying a failed backup
action. When the Retry Delay value is 0, NetWorker retries the failed backup action
immediately. The default value is 1. Retry delay can be set to a maximum of 3600 seconds.
Note: The Retries and the Retry Delay options are enabled only if you select theManual
option under Select vProxy in the VMware-specific Configuration page.
29. In the Soft Limit field, select the amount of time after the action starts to stop the initiation
of new activities. The default value of 0 (zero) indicates no amount of time.
30. In the Hard Limit field, select the amount of time after the action starts to begin
terminating activities. The default value of 0 (zero) indicates no amount of time.
31. Click NEXT.
The Action Configuration Summary appears.
32. Review the settings that you have configured, and then click FINISH.
After you finish
(Optional) Create a clone action to automatically clone the save sets after the backup. A clone
action is the only supported action after a backup action in a workflow.
7. To ensure that the action runs when the policy or workflow that contains the action is
started, select Enabled. To prevent the action from running when the policy or workflow
that contains the action is started, clear this option. By default, this option is selected.
8. If the action is part of a sequence of actions in a workflow path, from the Driven By list,
select the action that should precede this action.
9. Click NEXT.
10. Select the Delete source save sets after clone completes option to instruct NetWorker to
delete the data from the source volume after cloning to the destination volume completes.
This is equivalent to staging the save sets.
11. Under Devices and Volumes, define the volumes and devices to which NetWorker sends
the cloned data:
a. From the Source Storage Node list, select the source storage node for a clone action,
that is, the storage node from which clone data is read.
b. From the Destination Storage Node list, select the storage node with the devices on
which to store the cloned save sets.
c. From the Destination Pool list, select the target media pool for the cloned save sets.
12. Specify the NetWorker Retention Period value.
After the retention period expires, the save set is removed from the client file index and
marked as recyclable in the media database during an expiration server maintenance task.
13. If you want to have the same retention period as that of the backup action, select Keep
Retention Same as Backup.
Note: If you select this option, you cannot configure the NetWorker retention period.
14. Select Apply Lock under DD Retention Lock to enable retention lock for the virtual
machines included in this clone action.
15. Use the Lock Period spin boxes to specify the duration the virtual machines will remain on
the Data Domain device before the retention lock expires.
16. Click NEXT.
17. (Applicable only for a second clone action) In the Filter Savesets section, you can do the
following:
a. To define the criteria that NetWorker uses to create the list of eligible save sets to clone,
select Define Filters. The eligible save sets must match the requirements that are
defined in each filter. NetWorker provides the following filter options:
l Time —In the Time section, specify the time range in which NetWorker searches for
eligible save sets to clone in the media database. Use the spin boxes to specify the
start time and the end time. The Time filter list includes the following options to
define how NetWorker determines save set eligibility, based on the time criteria:
n Accept—The clone save set list includes save sets that are saved within the time
range and meet all the other defined filter criteria.
n Reject—The clone save set list does not include save sets that are saved within
the time range and meet all the other defined filter criteria.
l Backup Levels —In the Backup Levels section, specify the backup levels that you
want to include or exclude, when NetWorker searches for eligible save sets to clone in
the media database. The Levels filter list includes the following options, which define
how NetWorker determines save set eligibility, based on the backup level filter
criteria:
n Accept—The clone save set list includes eligible save sets with the selected
backup levels.
n Reject—The clone save set list does not include eligible save sets with the
selected backup levels.
l Save Sets —In the Save Sets section, specify whether to include or exclude
ProtectPoint and Snapshot save sets, when NetWorker searches for eligible save sets
to clone in the media database. The Save Set filter list includes the following options,
which define how NetWorker determines save set eligibility, based on the save set
filter criteria:
n Accept—The clone save set list includes eligible ProtectPoint save sets or
Snapshot save sets, when you enable the ProtectPoint checkbox or Snapshot
checkbox.
n Reject—The clone save set list does not include eligible ProtectPoint save sets
and Snapshot save sets when you enable the ProtectPoint checkbox or Snapshot
checkbox.
l Clients —In the Client section, specify a list of clients to include or exclude, when
NetWorker searches for eligible save sets to clone in the media database. The Client
filter list includes the following options, which define how NetWorker determines save
set eligibility, based on the client filter criteria:
n Accept—The clone save set list includes eligible save sets for the selected clients.
n Reject—The clone save set list does not include eligible save sets for the selected
clients.
18. If you do not want to define a filter criteria, select Do Not Filter, and click NEXT.
Note: The Filter Savesets feature is available only in the case of a second clone action.
To perform the same type of backup on each day, click , and select one of the
following:
l Make All Execute
c. (Optional) Select Override Options to configure overrides for the task that is scheduled
on a specific day.
Note: If you select this option, you must configure the overrides using either fixed
dates or recurring dates.
d. Click NEXT.
20. Under Schedule Overrides, do the following:
a. In the Recurring Pattern attribute, if the status is Not Available, click ADD. Otherwise,
click VIEW/EDIT to specify recurring patterns. Then, select the backup level, and define
the override schedule to occur on a specific day, week, month, quarter, or year.
The selected date is highlighted with a different color and an asterisk (*).
b. To specify a fixed date pattern, select the month and year, and then click on each day to
specify the backup level.
The selected date is highlighted with a different color.
Note:
l You can select multiple override dates.
l In the case of a fixed date pattern, to clear an override schedule, click on the day
that you want to clear the override for and select Clear Selection. The Clear
Selection option is not applicable in the case of a recurring pattern.
l If the fixed and the recurring pattern is on the same day, the fixed pattern gets
preference. However, if you clear the fixed override schedule, the recurring
pattern is displayed.
l When creating overrides, you cannot select the previous month and year. You
also cannot create fixed overrides for the days before the current day because
the option to change the level is disabled.
l When editing overrides, you can clear existing fixed overrides for the days before
the current day. However, you cannot set any new overrides because the option
to change the level is disabled.
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
mail -s subject recipient
l For NetWorker Virtual Edition (NVE), to send an email notification, type the following
command:
/usr/sbin/sendmail -v recipient_email "subject_text"
l On Windows, to send a notification email, type the following command:
smtpmail -s subject -h mailserver recipient1@mailserver
recipient2@mailserver...
where:
n -s subject—Includes a standard email header with the message and specifies the
subject text for that header. Without this option, the smtpmail program assumes that
the message contains a correctly formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP
email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
a. Click NEXT.
b. Enter a list of comma separated save set IDs, and click ADD.
Note: You can also use the search function to filter the save set IDs from the
Selected Saveset ID List.
c. Click FINISH.
a. Use the Maximum number of Clones spin boxes to specify the number of clones that
can be created for the save set.
b. Click NEXT.
c. (Optional) Specify one or more of the basic save set criteria.
Time Specify the start date and time range for the
save sets.
To specify the current date and time as the end
date for the range, select Up To Now.
To specify a time period, select Up to.
d. Click the + icon to add a filter, and click the - icon to remove a filter.
e. Click NEXT.
f. (Optional) Select the save set resource filter.
g. Click FINISH.
Note: If you want to delete a group, select the group that you want to delete, and click
Delete.
b. Specify the object type properties that the rule uses to determine a match. It can be the
object's name, path, or tag. The available properties depend on the object type.
l Virtual Machine - name, vSphere tag
l ESXi Host/Cluster - path, vSphere tag
l Virtual App - name, vSphere tag
l Virtual Machine Folder - name, path, vSphere tag
l Datacenter - name, path, vSphere tag
l Resource Pool - path, vSphere tag
c. Select an operator to further define how a match is made based on the selected object
type property. The operator value can be one of the following:
l equals
l not equals
l contains
l not contains
l starts with
l does not start with
l ends with
l does not end with
l regular expression
d. Click the Browse icon to select the vCenter server and vSphere tag and click OK to exit
the dialog.
Note: This option is available only if you select the vSphere tag property type in the
definition.
e. Click the + icon to add a rule definition, and click the - icon to remove a rule definition.
8. Click Create.
The Rule is successfully created.
9. Repeat steps 1 through 7 for any additional rules that you want to create.
Note: You can associate a rule to a group, if dynamic selection is enabled when creating
groups. The section Create a VMware group using the NetWorker Management Web UI
provides more information on creating groups.
Note:
l You cannot change the name of a rule.
l If you want to delete a rule, select the rule that you want to delete, and click Delete.
However, a rule cannot be deleted, if it is associated with a group.
l Create a policy.
l Create a workflow.
l Create a VMware protection group.
l (Optional) Create dynamic associations to apply rules.
l Create one or more action(s).
Gold policy
The Gold policy provides an example of a data protection policy for an environment that contains
virtual machines and requires backup data redundancy.
Silver policy
The Silver policy provides an example of a data protection policy for an environment that contains
machines where file systems or applications are running and requires backup data redundancy.
Bronze policy
The Bronze policy provides an example of a data protection policy for an environment that
contains machines where file systems or applications are running.
Note: This name cannot contain spaces or special characters such as + or %. After you
create a policy, the Name attribute is read-only.
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and specifies the
subject text for that header. Without this option, the smtpmail program assumes
that the message contains a correctly formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP
email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
7. In the Restricted Data Zones tab, leave the Restricted Data Zone field blank. NetWorker
VMware Protection with the vProxy appliance does not currently support the protection of
virtual machines within a Restricted Data Zone.
8. Click OK.
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
where:
n -s subject—Includes a standard email header with the message and specifies the
subject text for that header. Without this option, the smtpmail program assumes
that the message contains a correctly formatted email header and nothing is added.
n -h mailserver—Specifies the hostname of the mail server to use to relay the SMTP
email message.
n recipient1@mailserver—Is the email address of the recipient of the notification.
Multiple email recipients are separated by a space.
8. In the Running section, perform the following steps to specify when and how often the
workflow runs:
a. To ensure that the actions that are contained in the workflow run when the policy or
workflow starts, in the Enabled box, leave the option selected. To prevent the actions in
the workflow from running when the policy or workflow that contains the action starts,
clear this option.
b. To start the workflow at the time that is specified in the Start time attribute, on the
days that are defined in the action resource, in the AutoStart Enabled box, leave the
option selected. To prevent the workflow from starting at the time that is specified in the
Start time attribute, clear this option.
c. To specify the time to start the actions in the workflow, in the Start Time attribute, use
the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the workflow over a 24-
hour period, use the Interval attribute spin boxes. If you are performing transaction log
backup as part of application-consistent protection, you must specify a value for this
attribute in order for incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you select a value
that is less than 24 hours, the Interval End attribute appears. To specify the last start
time in a defined interval period, use the spin boxes.
e. To specify the duration of time in which NetWorker can manually or automatically restart
a failed or canceled workflow, in the Restart Window attribute, use the spin boxes.
If the restart window has elapsed, NetWorker considers the restart as a new run of the
workflow. NetWorker calculates the restart window from the start of the last incomplete
workflow. The default value is 24 hours.
For example, if the Start Time is 7:00 PM, the Interval is 1 hour, and the Interval End is
11:00 PM., then the workflow automatically starts every hour beginning at 7:00 PM. and
the last start time is 11:00 PM.
nsrlog -f policy_notifications.log
l On Linux, to send an email notification, type the following command:
10. In the Running section, perform the following steps to specify when and how often the
workflow runs:
a. To ensure that the actions that are contained in the workflow run when the policy or
workflow starts, in the Enabled box, leave the option selected. To prevent the actions in
the workflow from running when the policy or workflow that contains the action starts,
clear this option.
b. To start the workflow at the time that is specified in the Start time attribute, on the
days that are defined in the action resource, in the AutoStart Enabled box, leave the
option selected. To prevent the workflow from starting at the time that is specified in the
Start time attribute, clear this option.
c. To specify the time to start the actions in the workflow, in the Start Time attribute, use
the spin boxes.
The default value is 9:00 PM.
d. To specify how frequently to run the actions that are defined in the workflow over a 24-
hour period, use the Interval attribute spin boxes. If you are performing transaction log
backup as part of application-consistent protection, you must specify a value for this
attribute in order for incremental transaction log backup of SQL databases to occur.
The default Interval attribute value is 24 hours, or once a day. When you select a value
that is less than 24 hours, the Interval End attribute appears. To specify the last start
time in a defined interval period, use the spin boxes.
e. To specify the duration of time in which NetWorker can manually or automatically restart
a failed or canceled workflow, in the Restart Window attribute, use the spin boxes.
If the restart window has elapsed, NetWorker considers the restart as a new run of the
workflow. NetWorker calculates the restart window from the start of the last incomplete
workflow. The default value is 24 hours.
For example, if the Start Time is 7:00 PM, the Interval is 1 hour, and the Interval End is
11:00 PM., then the workflow automatically starts every hour beginning at 7:00 PM. and
the last start time is 11:00 PM.
11. In the Groups group box, specify the protection group to which the workflow applies.
To use a group, select a protection group from the Groups list. To create a protection
group, click the + button that is located to the right of the Groups list.
12. The Actions table displays a list of actions in the workflow. To edit or delete an action in the
workflow, select the action and click Edit or Delete. To create one or more actions for the
workflow, click Add.
The Actions table organizes the information in sortable columns. Right-click in the table to
customize the attributes that appear.
9. (Optional) Select the Dynamic Association checkbox if you plan to apply rules that will
determine which virtual machines and containers are dynamically included in the group
based upon the rule criteria. The section Enabling a VMware group with Dynamic
Association and applying rules in NMC provides more information on enabling a policy/group
with Dynamic Association and applying rules.
10. From the vCenter drop-down, select the vCenter server that contains the VMware objects
that you want to protect, and then select the objects (Datacenter, ESX host, virtual
machine, resource pool, vApp, or disk) to include in this group. Any objects selected here
will be considered static objects, which means that the items will be included in the group
until unselected, even when Dynamic Association is enabled.
Note: If the vCenter list is empty, cancel the task and, using the NMC Protection
window, right-click VMware View in the left pane, and select Refresh.
11. (Optional) If the group as Dynamic Association enabled, from the Rule drop-down, select a
pre-defined rule that you want to apply for any VMware objects that will be dynamically
included in the group based upon the rule criteria, or click + to open the Create Rule
window and create a new rule. The section Enabling a VMware group with Dynamic
Association and applying rules in NMC provides more information on associating a VMware
group with rules.
12. Click Preview All Virtual Machines to view a list of the static and dynamic virtual machines
and objects that have been added to the group. In this window, you can also unselect a
virtual machine or VMDK to exclude the item from the backup. When an object is
unselected, an entry for the object appears in the Excluded VM list.
13. Click OK to exit the Preview Virtual Machines window, and then click OK to finish creating
or editing the group.
A VMware group with Dynamic Association enabled can include both static and dynamic objects:
l Virtual machines and containers from the vCenter that are manually selected when you create
or edit the group in NMC are known as static objects, because their inclusion in the group does
not change unless you unselect an item.
l Virtual machines and containers that are only included in the group according to the rules
assigned when you create or edit the group in NMC are known as dynamic objects, because
their inclusion in the group can change over time based on whether the items continue to
match the rule criteria.
When creating or editing the group, you can preview both static and dynamic contents to ensure
that the protection policy will include all the virtual machines and containers that you want protect
in the backup. Additionally, you can specify a virtual machine exclusion list for the VMware
protection group to exclude particular virtual machines or VMDKs from being backed up as part of
the group.
When a VMware protection group is associated with one or more rules, the rules are executed
against the vCenter inventory when the policy backup is started in order to filter the group
contents according to the rule criteria.
Creating and viewing tags in the vSphere Web Client
In order to support the dynamic selection of VMware objects based on the user-defined rules
created in NMC, vSphere tags in the vSphere Web Client allow you to attach metadata to the
objects in the vSphere inventory to make these objects easier to sort and search. Tags are
supported in vSphere versions 6.5 and later.
When you create a tag in the vSphere Web Client, the tag can be assigned to a category in order
to group related tags together. When defining a category, you can also specify the object types
the tags will be applied to, and whether more than one tag in the category can be applied to an
object. Within a single rule, there is a maximum limit of 50 rule definitions applicable to tags and
categories, as shown in the following example where Category is the category name and Bronze is
the tag name:
l Category:Category1,Tag:Bronze1
l Category:Category2,Tag:Bronze2
l Category:Category3,Tag:Bronze3
l and so on up to Category:Category50,Tag:Bronze50
In the above example, if the number of characters associated with category name or tag name are
more than 9 or 7 characters respectively, then the maximum limit for rule definitions in a single rule
will be further reduced from 50. Exceeding the maximum limit for rule definitions will result in no
virtual machines being backed up as part of this group, since there will be no members associated
with the group. As a best practice, it is recommended to keep the number of rule definitions within
a single rule to 10 or less and, in cases where there are a large number of rule definitions within a
single rule, it is also recommended to keep the number of characters in category/tag names to 10
or less.
The vSphere Web Client displays any tags that have been created for the vCenter under Tags &
Custom Attributes in the left pane. When you click Tags & Custom Attributes, select the Tags
tab. A table lists the available tags. Click on a tag link in the table to view the objects associated
with this particular tag.
Note: Once virtual machines are associated with tags, the association will not be reflected in
the NMC NetWorker Administration window's VMware View until the timeout period has
completed. The default timeout for NetWorker to fetch the latest inventory from vCenter is 15
minutes.
Rules in the NMC NetWorker Administration window
Rules are used to automatically map VMware objects (virtual machines and containers) to a group
by using one or more filtering mechanisms, according to the following supported rule criteria:
l Type: The VMware object type. Available selections include VM, VApp, VM Folder, Datacenter,
Host/Cluster, or Resource Pool.
l Properties: The object type properties that the rule uses to determine a match. These
properties include the object's name, path or a tag that you've created, and available
properties depend on the object type, as specified below.
Host/Cluster - Path, tag
VMfolder - Name, path, tag
Datacenter - Name, path, tag
ResourcePool - Path, tag
VirtualMachine - Name, tag
vApp - Name, tag
l Operator: Uses the object type properties to further define how a match is made. Available
selections include Equals, DoesNotEqual, StartsWith, DoesNotStartWith, Contains,
DoesNotContain, EndsWith, DoesNotEndWith, or Regular expression.
For example, for an object type VirtualMachine with the Name property selected, you can select
"equals" to create a rule where the virtual machine will only be included in the group when the
entire name is specified, or "contains" to include the virtual machine in the group whenever a
specific text string appears in the virtual machine name.
Additionally, if you create multiple rules, you can select All from the Match type drop-down if the
item has to meet all of the rules criteria in order to be included in the group, or select Any from the
drop-down to include the item if the item meets any of the criteria.
Note: Rule definitions for NetWorker vProxy policies with dynamic association enabled can
contain regular expressions. The appendix Regular expressions for NetWorker vProxy dynamic
policies rule definitionsdescribes the acceptable rules, syntax, and grammar to use when
writing such regular expressions.
3. In the General tab, type a name for the rule, and select the Datastore Type from the drop-
down. The default Datastore Type is VMware.
4. In the Rule Definition pane, click Add.
5. In the Rule Definition pane:
a. For the Type column's drop-down, select the object type, for example, VirtualMachine.
b. For the Property column's drop-down, select from one of the available options, for
example, Tag.
c. For the Operator column's drop-down, select from one of the available options, for
example, Equals.
d. Click Browse to display a list of all the categories and tags that have been created on
that vCenter server. Select the tag you want to apply to the rule and click OK to exit the
dialog.
Note: Tags are only supported in vSphere versions 6.5 and later.
6. Repeat steps 2 through 5 for any additional rules you want to create.
Note: If adding multiple rules, in order to specify whether to apply more than one rule to
the group, select either All or Any from the Match Type drop-down.
7. When finished adding rules, return to the Protection window and right-click the desired
group in the left pane, and then select Properties from the drop-down. The Edit Group
window displays.
8. If not already selected, select the Dynamic Association checkbox, and then select any
virtual machine(s) in this workflow that you want to include in the group regardless of the
rules applied. These objects are known as static objects.
9. Select the desired rule from the Rule drop-down that you want to apply to the other virtual
machines in the workflow to determine which objects will be dynamically included.
10. Click Preview All Virtual Machines to view a list of the static and dynamic virtual machines
and objects that have been added to the group. In this window, you can also unselect a
virtual machine or VMDK to exclude the item from the backup. When an object is
unselected, an entry for the object appears in the Excluded VM list.
11. Save the changes in the Edit Group window, and close the window.
Results
When you select the specific VMware group in the Protection window, the vCenter Objects
Selected field displays the list of virtual machines that are statically selected. Similarly, Protected
VMs in VMware View only displays the virtual machines that are statically protected.
13. From the Destination Storage Node box, select the storage node that contains the devices
where you want to store the backup data.
Note: When you deploy the vCenter server in the Cloud, a parameter displays in the
backup action logs that indicates HypervisorMode: VMC. When not deployed in the
Cloud, the parameter indicates HypervisorMode: vSphere.
14. From the Retention spin boxes, specify the amount of time to retain the backup data.
After the retention period expires, the save set is removed from the client file index and
marked as recyclable in the media database during an expiration server maintenance task.
15. Select the Apply DD Retention Lock checkbox to enable retention lock for the virtual
machines included in this backup action. Note that the device used for backing up these
virtual machines must also have DD Retention lock enabled in the NMC Device Properties
window, or DD Retention Lock must be enabled during device creation.
16. In the DD Retention Lock Time box, specify the duration the virtual machines will remain on
the Data Domain device before the retention lock expires. During this time, these virtual
machine backups cannot be overwritten, modified, or deleted for the duration of the
retention period, although the backups can be mounted and unmounted. The retention time
period set here must fall within the minimum and maximum values set for the Data Domain
Mtree, and should be lower than or equal to the NetWorker Retention Period.
17. In the vProxy section, select one of the following options:
l Auto vProxy Selection—Select this option to allow NetWorker to choose the vProxy
host for backups.
l Manual vProxy Selection—Specify this option to define the vProxy host that
NetWorker users for backups. Provide the name of the vProxy host in the vProxy Name
field.
18. From the Destination Pool box, select the media pool in which to store the backup data.
Only pools configured with a DDBoost device appear in the drop-down.
19. In the Application Consistency section, select the Quiesce Application checkbox to enable
application-consistent protection as part of the policy backup action, which includes
protection of the Microsoft SQL Server. You can then select from the Basic and Advanced
options.
l Select the Basic option to create a backup copy for applications during virtual machine
quiescing. No additional processing is performed.
l Select the Advanced option to create an SQL server application-consistent backup
during virtual machine quiescing, and optionally create a transaction log backup for all
SQL Server instances.
When you select the option, the following fields display:
l Transaction Log Backup—Select this checkbox if you want to perform a transaction log
backup of SQL databases in the virtual machine as part of the policy backup action. Note
that if you enable transaction log backup, you must also set a value for the Interval
attribute in the Workflow properties for this action, as specified in the section "Creating
a workflow in a new policy."
Note: During SQL Server configuration, the NT AUTHORITY\SYSTEM login must be
granted SQL login and SQL sysadmin role rights in order to perform transaction log
backups.
l Quiesce Timeout—Specify the amount of time, in minutes, to wait for the quiesce
operation on the virtual machine to time out before failing. If not selected, the backup
action will proceed even if quiescing was not performed, unless a validation problem
occurs. If an application-consistent backup cannot complete due to a problem with
validation, the backup action will fail even if this checkbox is not selected.
26. From the Send Notifications list box, select whether to send notifications for the action:
l To use the notification configuration that is defined in the Policy resource to send the
notification, select Set at policy level.
l To send a notification on completion of the action, select On Completion.
l To send a notification only if the action fails to complete, select On Failure.
15. In the Parallelism field, specify the maximum number of concurrent operations for the
action. This value should not exceed 25.
16. From the Failure Impact list, specify what to do when a job fails:
l To continue the workflow when there are job failures, select Continue.
l To abort the entire workflow if there is a failure with one of the jobs in the action, select
Abort workflow.
Note: If any of the actions fail in the workflow, the workflow status does not appear as
interrupted or cancelled. NetWorker reports the workflow status as failed.
17. From the Send Notifications list box, select whether to send notifications for the action:
l To use the notification configuration that is defined in the Policy resource to send the
notification, select Set at policy level.
l To send a notification on completion of the action, select On Completion.
l To send a notification only if the action fails to complete, select On Failure.
18. From the Soft Limit list, select the amount of time after the action starts to stop the
initiation of new activities. The default value of 0 (zero) indicates no amount of time.
19. From the Hard Limit list, select the amount of time after the action starts to begin
terminating activities. The default value of 0 (zero) indicates no amount of time.
20. Optional, in Start Time specify the time to start the action.
Use the spin boxes to set the hour and minute values, and select one of the following
options from the drop-down list:
l Disabled—Do not enforce an action start time. The action will start at the time defined
by the workflow.
l Absolute—Start the action at the time specified by the values in the spin boxes.
l Relative—Start the action after the period of time defined in the spin boxes has elapsed
after the start of the workflow.
21. (Optional) Configure overrides for the task that is scheduled on a specific day.
To specify the month, use the navigation buttons and the month list box. To specify the
year, use the spin boxes. You can set an override in the following ways:
l Select the day in the calendar, which changes the action task for the specific day.
l Use the action task list to select the task, and then perform one of the following steps:
n To define an override that occurs on a specific day of the week, every week, select
Specified day, and then use the lists. Click Add Rules based override.
n To define an override that occurs on the last day of the calendar month, select Last
day of the month. Click Add Rules based override.
Note:
n You can edit or add the rules in the Override field.
n To remove an override, delete the entry from the Override field.
n If a schedule is associated to an action, then override option is disabled.
Protection checkbox and then selecting an Application Protection Type, as outlined in the steps
for Create a VMware backup action.
SQL Server application-consistent protection enables the following backup operations:
l SQL Server backup—Select this option in the Policy Action wizard in NMC to perform image-
level (FULL) backup with application-consistent processing. This backup will request VMware
Tools to perform a FULL quiesce type for applications running in the virtual machine in order to
provide a full backup of the Microsoft SQL Server instances within the virtual machine. Upon
completion of the virtual machine image snapshot, the Microsoft VM App Agent is called to
catalog this backup, writing the catalog to the Data Domain system.
l Transaction log backup—Select this option in the Policy Action wizard in NMC to perform
transaction log backups of SQL Server databases for all SQL Server Instances in the virtual
machine. Note that if you perform transaction log backup, you must also set the Interval
attribute in the policy's Workflow Properties window in NMC. The transaction log backup of
SQL databases is separate from the virtual machine image-level backup, as no virtual machine
image-level backup occurs during the transaction log backup. Transaction log backup files will
be saved to the backup folder for the current save set on the Data Domain system. Databases
that do not support transaction log backup are filtered out.
The process for creating a policy with SQL Server application-consistent protection of virtual
machines in NMC is very similar to creating a policy with the VMware backup action, with the
following exceptions:
l You must provision a new policy and workflow exclusively for SQL clients that require SQL
Server application-consistent protection.
l You must provision a new policy and workflow exclusively for SQL clients that have different
security accounts, for example, system administrator username and/or password.
l It is recommended that the virtual machines included in the group for the dedicated workflows
are not contained within multiple workflows.
Creating a workflow with an SQL Server application-consistent backup action will perform a full
image-level backup. Ad-hoc (on demand) runs of this workflow will also create full backups, even
when started at off-schedule times. If you also select transaction log backup in the Policy Action
wizard, the transaction log backup will occur as part of incremental backups after the initial full
backup, at the interval set in the workflow properties.
3. Click Yes.
The Media window displays the save sets contained within the policy. If the save sets are
additionally part of an application-consistent policy, a green check mark appears in the VM App
Consistent column.
Figure 15 VMware protection policy save sets in Media window
In the Host Name field, type the IP address of the host, and provide the vCenter Server username
and password credentials. Additionally, if the vCenter server is deployed in the Cloud, select the
Deployed in Cloud checkbox, and then click OK.
Note: When you select Deployed in Cloud, a parameter displays in the backup action logs that
indicates HypervisorMode: VMC. When the checkbox is not selected, the parameter
indicates HypervisorMode: vSphere.
When you add the vCenter server to VMware View, the following actions occur:
l A visual (map) or tabular representation of the vCenter environment appears in the VMware
View window.
l A client resource is created for the vCenter server with the vProxy backup type.
Using VMware View, you can also assign the policies you created in "VMware data protection
policies in NMC." to the vCenter objects.
Note: Upon refresh of VMware View in NMC in a large VMware vCenter environment, the
background process nsrvim consumes a high amount of memory on the NetWorker server. For
example, nsrvim can consume up to 7 GB RAM in a site with 200 ESXi hosts and more than
4000 virtual machines in a single vCenter. This memory is used to load vCenter inventory data
into local structures. If this occurs, depending on the scale of the VMware environment,
allocate more RAM to the NetWorker server to reduce the impact of this memory
consumption. As a best practice allocate at least 2GB of RAM per 1000 VMs on a given
vCenter.
The following sections describe the options that are available in VMware View.
To refine items displayed in the right details pane, select containers in the Virtualization node
hierarchy in the left pane. For example, if an individual Cluster is selected in the Virtualization
node, only child elements associated with that Cluster display.
Figure 18 Cluster with child elements in VMware View
To filter the visible items to show only protected VMs, unprotected VMs, or overprotected VMs,
click the links located above the right pane, as shown in the following figure.
Note: When you enable a VMware group with Dynamic Association, the protected VMs
reflect those virtual machines that are statically protected, and does not include virtual
machines that get dynamically added to the group after rules are applied.
Figure 19 Filtering results in VMware View
The filtering function works the same in Table view as in Map view. Links provided above the
details pane allow you to display only overprotected virtual machines, unprotected virtual
machines, or all virtual machines in the environment. The NetWorker Administration Guide provides
general information on using tables in the Administration window.
Note: In Table view, the Host field contains an undefined value for virtual machines or
containers that are part of a cluster. The Map view provides a link to the cluster.
Procedure
1. Login to the vSphere Client as an administrator, or as a non-administrator Active Directory
user that you created using the steps in the section Accessing the HTML-5 or flash-based
vCenter plug-in as a non-administrator Active Directory user.
2. In the vSphere Client, select Menu > Dell EMC NetWorker, or select Dell EMC
NetWorker in the left pane.
Figure 22 Accessing Dell EMC NetWorker in the vSphere Client
A prompt displays in the right pane with fields required to connect to the NetWorker server.
3. For the NetWorker server, type the following information:
a. In the Username field, type the NetWorker administrator username.
b. In the Password field, type the NetWorker administrator password.
c. In the NetWorker Server field, type the IP address of the NetWorker server.
d. In the Port field, type 9090.
Figure 23 NetWorker connection information in the vSphere Client
Note: The vCenter plug-in (HTML5 or flash-based) requires the NetWorker server and
NetWorker Authentication service to be installed on the same machine.
Start a vProxy policy in the vSphere Client Dell EMC NetWorker interface
To start a vProxy backup policy by using the Dell EMC NetWorker interface in the vSphere
Client, perform the following steps.
Procedure
1. In the vSphere Client, if not already selected, click Dell EMC NetWorker in the left pane.
When a connection to the NetWorker server is established, links to Basic Tasks appear in
the right pane.
2.
From the Basic Tasks pane, click Assign Backup Policy, or click the Protection icon
in the vertical navigation bar.
The vCenter server hosts associated with the NetWorker server display. When you select
one of these entries, a list of available vProxy policies that were created in NMC displays in
the right pane.
3. Click the arrow to the left of a policy to expand and view the policy and workflow details.
You can click the Items link under the Workflow to display the virtual machines protected by
this workflow.
4. If you do not need to add or remove any virtual machines from the workflow, click the three
dots next to the policy and select Backup all sources or Backup only out of date sources
from the drop-down.
Figure 26 Policy backup options
Results
A dialog displays indicating that the policy was successfully started. To close the dialog, click OK.
You can then click the blue arrows in the lower right corner of the window to monitor the progress
of the policy in the Recent Tasks pane.
Figure 27 Recent Tasks pane
Add virtual machines to a vProxy policy in the vSphere Client Dell EMC
NetWorker interface
Perform the following steps to edit a vProxy policy to add virtual machines to a workflow by using
the Dell EMC NetWorker interface in the vSphere Client.
Procedure
1. In the vSphere Client, if not already selected, click Dell EMC NetWorker in the left pane.
When a connection to the NetWorker server is established, links to Basic Tasks appear in
the right pane.
2. Click Assign Backup Policy.
A list of available vProxy policies that were created in NMC displays in the right pane.
Figure 28 Policies pane with available vProxy policies
Note: The Backup tab in the vSphere Web Client's VM Backup and Recovery user
interface displays the last start time based on the start time of the backup for the virtual
machines in the policy. Therefore, if the same virtual machine is contained within
multiple policies, then the last start time displayed will be identical between the two
policies.
3. Click the arrow to the left of a policy to expand and view the policy and workflow details.
You can click the Items link under the Workflow to display the virtual machines protected by
this workflow.
4. To add virtual machines to the workflow, click the three dots next to the policy and select
Edit from the drop-down.
The Editing backup policy dialog displays with available backup sources.
5. Select any virtual machines or VMDKs in the inventory you want to protect with this
workflow, and then click Finish.
Figure 30 Backup sources in the Editing backup policy dialog
Note: If you add a virtual machine that has already been backed up by an existing
workflow to a new workflow within the VM Backup and Recovery plug-in in the vSphere
Web Client, the Last Start Time of the new workflow gets updated automatically in the
Backup tab, even if the workflow has not yet been started.
Results
Any virtual machines or VMDKs added to the workflow now appear when you click the Items link
under the workflow in the Policies pane.
version 19.2 can still use this plug-in to run virtual machine backups from the vProxy workflows
created in NMC, and add virtual machines to those vProxy workflows.
VM Backup and Recovery appears in the left navigation pane of the vSphere Web Client when
you install the flash-based vCenter plug-in. The section Installing the vCenter plug-in provides
instructions.
Note: Backup and recovery operations in the vSphere Web Client VM Backup and Recovery
interface are not supported for SQL Server advanced application-consistent protection
policies. Perform these operations from the NMC NetWorker Administration window or the
Dell EMC Data Protection Restore Client.
4. Click Connect.
Results
When a connection to the NetWorker server is established, the Getting Started pane appears.
3. Highlight the policy and workflow you want to run and click Backup now in the top-right
corner.
Results
You can monitor the progress of the backup in the Running tab of the Recent Tasks pane.
Note: If you cancel a workflow from the vSphere Web Client and then want to restart the
backup, ensure that you restart the workflow from the vSphere Web Client. If a workflow
that was started from the vSphere Web Client is restarted from the NMC NetWorker
Administration window, the backup fails.
Adding virtual machines to a vProxy policy workflow in the vSphere Web Client
Perform the following steps to add virtual machines to a vProxy workflow created in NMC by using
the vSphere Web Client.
Procedure
1. In the vSphere Web Client, click VM Backup and Recovery in the left pane. When a
connection to the NetWorker server is established, the Getting Started pane appears.
2. Click the Backup tab to open the Backup pane.
Any vProxy policies created in NMC display.
Note: The Backup tab in the vSphere Web Client's VM Backup and Recovery user
interface displays the last start time based on the start time of the backup for the virtual
machines in the policy. Therefore, if the same virtual machine is contained within
multiple policies, then the last start time displayed will be identical between the two
policies.
3. Highlight the policy whose workflow you want to add virtual machines to and click Edit in
the top-right corner.
The Editing backup policy window displays with available backup sources.
Figure 33 Backup sources in the Editing backup policy window
4. Select any virtual machines or VMDKs in the inventory you want to protect with this
workflow and click Finish.
Note: If you add a virtual machine that has already been backed up by an existing
workflow to a new workflow within the VM Backup and Recovery plug-in in the vSphere
Web Client, the Last Start Time of the new workflow gets updated automatically in the
Backup tab, even if the workflow has not yet been started.
Results
Any virtual machines or VMDKs added to the workflow appear under Sources in the bottom of the
Backup pane.
In cases where a boot order other than the default was implemented before the image-level
backup was performed, the original boot order is not restored. In this instance, you must select
the correct boot device after the restore completes. Alternatively, you can enter the non-
default boot order to the VMX file so that the restored virtual machine starts without any
reconfiguration. This limitation does not affect virtual machines that use the default boot
order.
l In vSphere versions 6.5 and later, click Edit under Custom Attributes.
4. Locate the EMC vProxy Disable CBT field, or create a string for EMC vProxy Disable CBT.
The string must match the field name exactly and is case-sensitive.
5. Set the value to true to disable CBT on the virtual machine, or to false (or leave the field
blank) to enable CBT on the virtual machine. Setting or resetting the field for one virtual
machine does not affect the other virtual machines in the vCenter.
6. Refresh VMware View in the NMC NetWorker Administration window.
Fixing CBT if corrupted on virtual machine
If CBT becomes corrupted on the virtual machine, warnings similar to the following appear in the
backup logs:
If these messages appear, you can use PowerCLI commands to disable and then enable CBT
without powering off the virtual machines as described in the VMware knowledgebase article at
https://kb.vmware.com/selfservice/search.do?
cmd=displayKC&docType=kc&docTypeID=DT_KB_1_1&externalId=1031873, or perform the
following steps to clean up CBT:
1. Power down the virtual machine.
2. Remove CBT flags.
3. Delete CTK files from the datastore.
4. Power ON the virtual machine.
set the Interval attribute in the backup policies workflow properties to specify the frequency of
backups. Backups are written directly to Data Domain under the SDSF backup folder that was
created by the NetWorker save set session. Transaction log backup is only performed for
databases in the proper state, otherwise databases are skipped. The section Create a VMware
backup action provides more information.
l Restore of SQL Server instance or individual SQL Server databases—The Dell EMC Data
Protection Restore Client includes an App mode that allows you to restore an entire SQL
Server instance to the original virtual machine and original instance, and restore individual SQL
Server databases to the original database on the original virtual machine, to multiple instances
on the same virtual machine, or to an alternate location (different virtual machines/SQL
instances on the same or a different vCenter), as well as the ability to roll-forward transaction
log backups. The section Restoring SQL Server application-consistent backups provides more
information.
During advanced application-consistent backup for both SQL Server FULL backup and transaction
log backup, vProxy installs or upgrades the vProxy Agent and MSVMAPPAGENT software
packages. On a new virtual machine without these software packages installed, the vProxy Agent
uses the VM Administrator Credentials from the backup action to install the vProxy Agent, using
the vCenter VIX API to copy packages into the guest virtual machine and run the install. Once the
vProxy Agent is installed in the virtual machine, vProxy communicates with the vProxy Agent to
install the MSVMAPPAGENT package.
On a system with vProxy and MSVMAPPAGENT already installed, vProxy performs a version
check of the MSVMAPPAGENT by running the Msvmagent_discovery.exe program to report
the installed program version and, if necessary, perform an upgrade if the vProxy software
repository contains a later version.
Note: Ensure that you manually uninstall in-guest agents (VM app agent for Microsoft
Applications) from an alternate virtual machine that is not protected by a SQL application-
consistent backup workflow. Also, if you are restoring to an alternate virtual machine that is
not protected by a SQL application-consistent workflow, note that the agents will not be
automatically uninstalled once the restore is complete. If you want to remove these agents,
you must manually uninstall the agents.
The following table provides a list of the MSVMAPPAGENT binaries that are called by the vProxy,
and the operations these binaries perform.
Table 11 MSVMAPPAGENT binaries called by vProxy
Msvmagentcatsnap.exe Catalogs the SQL VSS Full backup Called by vProxy once the virtual
that was performed by VMware machine image snapshot has
Tools as an App Agent VSS Full completed.
backup of SQL Server instances.
Catalog is written to Data Domain.
Msvmagent_appbackup.exe Performs transaction log backup. Called by vProxy for transaction log
backup workflows.
The Msvmagent_appbackup.exe
program will back up all SQL
instances in the virtual machine.
Msvmagent_appbackup.exe
performs transaction log backup
only, and does not create a virtual
machine image backup.
Msvmagent_snapshotrestore.e Performs restore of SQL VSS Full Called by vProxy during restore of
xe backup. SQL Database FULL backup.
Prior to the restore, the virtual
machine image backup is mounted on
the target virtual machine. The
Msvmagent_snapshotrestore.e
xe copies the VSS manifest
documents from the backup, and
uses those documents to perform a
VSS-aware restore of the SQL
database. The SQL database files are
copied from the mounted backup
VMDK to the original location of the
database, and during the VSS post
restore, the SQL VSS Writer
completes recovery of the backup. If
transaction logs are to be restored,
or if the NORECOVERY option has
been specified, the database will be
left in a NORECOVERY state. The
msvmagent_snapshotrestore.exe
command also supports SQL
Alternate restore and instructs SQL
the SQL instance to be restored and
to change database name and file
locations as selected by the
customer.
Note: The MSVMAPPAGENT does not require installation of the NetWorker client.
The following table provides a list of special characters known to be supported in SQL database
names for English and non-English locales.
Table 12 Supported characters in SQL database names
Special character FULL and transaction log FULL and transaction log
backup restore
another product is performing in-guest backups, MSVMAPPAGENT may skip databases for
transaction log backups.
l If using the VM Backup and Recovery user interface in the vSphere Web Client for vSphere
versions earlier than 6.5, backup and recovery operations are not supported for SQL Server
advanced application-consistent protection policies. For SQL backups, perform these
operations from the NMC NetWorker Administration window or the Dell EMC NetWorker
user interface in the vSphere Client. For SQL recoveries, perform these operations from the
Dell EMC Data Protection Restore Client.
Additionally, the following items are not supported due to VMware restrictions and feature
limitations:
l Changing pools between backup actions, for example, between a SQL full and transaction log
backup.
l Application-consistent quiescing for virtual machines with IDE disks.
l Dynamic disks on the virtual machine.
l Read-only volumes mounted on the SQL virtual machine.
l VMware encrypted virtual machines.
l VMware Fault Tolerant virtual machines.
l RDM storage.
The vProxy appliance performs validation of the environment for these VMware restrictions. If
validation fails, the VMware policy with SQL Server application-consistent data protection will not
run.
Backup operations
The following troubleshooting items provide some direction on how to identify and resolve
common issues with vProxy backups.
SQL Server application-consistent backups fail with error "Unable to find VSS metadata files in
directory"
SQL Server application-consistent virtual machine backups might fail with the following error when
the disk.enableUUDI variable for the virtual machine is set to False.
Unable to find VSS metadata files in directory C:\Program Files\DPSAPPS
\MSVMAPPAGENT\tmp\VSSMetadata.xxxx.
To resolve this issue, ensure that the disk.enableUUDI variable for the virtual machines included in
an SQL Server application-consistent backup is set to True.
Failed to lock Virtual Machine for backup: Another EMC vProxy operation 'Backup' is active on VM
This error message appears when a backup fails for a virtual machine, when previous backups of
the virtual machine was abruptly ended and the VM annotation string was not cleared.
To resolve this issue, clear the annotation string value for the virtual machine.
1. Connect to the vCenter server and navigate Home > Inventory > Hosts and Clusters.
2. Select the virtual machine, and then select the Summary tab.
3. Clear the value that appears in the EMC Proxy Session field.
“The following items could not be located and were not selected {client name}.”
This error can occur when the backed up VM(s) cannot be located during Edit of a backup job.
This is a known issue.
Windows 2008 R2 VMs may fail to backup with “disk.EnableUUID” configured to “true.”
Windows 2008 R2 backups may fail if the VM is configured with the disk.EnableUUID parameter
set to true. To correct this problem, manually update the vmx configuration parameter
disk.EnableUUID to false by using the vSphere Web Client:
1. Shut down the VM by right clicking the VM and selecting Shut Down Guest OS.
2. Right click the VM and select Edit Settings.
3. Click VM Options.
4. Expand the Advanced section and click Edit Configuration.
5. Locate the name disk.EnableUUId and set the value to false.
6. Click OK on the next two pages.
7. Right click the VM and select Power On.
After you update the configuration parameter, the backups of the Windows 2008 R2 VM should
succeed.
When VMs are moved in or out of different cluster groups, associated backup sources may be lost
When you move hosts into clusters with the option to retain the resource pools and vApps, the
containers get recreated, not copied. As a result, the container is no longer the same container
even though the name is the same. To resolve this issue, validate or recreate any backup jobs that
protect containers after moving hosts in or out of a cluster.
Backups fail if certain characters are used in the virtual machine name, datastore, folder, or
datacenter names
When you use spaces or special characters in the virtual machine name, datastore, folder, or
datacenter names, the .vmx file is not included in the backup. The vProxy appliance does not back
up objects that include the following special characters, in the format of character/escape
sequence:
l & %26
l + %2B
l / %2F
l = %3D
l ? %3F
l % %25
l \ %5C
l ~ %7E
l ] %5D
To resolve this issue, increase the values in the max target sessions and target sessions
attributes for the clone device. The NetWorker Administration Guide describes how to modify the
properties of a device.
Lock placed on virtual machine during backup and recovery operations continues for 24 hours if
vProxy appliance fails
During vProxy backup and recovery operations, a lock is placed on the virtual machine. If a vProxy
appliance failure occurs during one of these sessions, the lock gets extended to a period of 24
hours, during which full backups and transaction log backups will fail with the following error until
the lock is manually released:
Cannot lock VM 'W2K8R2-SQL-2014' (vm-522): Another EMC vProxy operation
'Backup' is active on VM vm-522.
Workaround
To manually release the lock on the virtual machine:
1. Open the vSphere Web Client.
2. Select the virtual machine and select Summary.
3. Select Custom attribute and click Edit.
4. Remove the attribute EMC vProxy Session.
Case Description
Database has When a database has been restored, this database will be skipped during
been restored transaction log backup because there is no Backup Promotion.
System System databases are automatically skipped for transaction log backup.
Database
Database State Database is not in a state that allows backup. For example, the database is in
the NORECOVERY state.
Recovery Database is in SIMPLE recovery model, which does not support transaction
Model log backup
Other Backup Most recent backup for the database was performed by a different backup
Product product.
New Database Database was created after most recent full backup.
Backup Failure Database was in state to allow backup, backup was attempted, but backup
failed.
All skipped databases will be backed up as part of the next full backup. Also, a skipped database
will not result in msvmagent_appbackup.exe failure. The only instance in which
msvmagent_appbackup.exe would potentially fail is if all databases failed to back up.
The msvmagent_appbackup.exe program generates a history report of the databases, if the
database backup status was success/skipped/failed, and a reason if they were skipped or failed if
applicable. This history report is visible in the action logs for the vProxy, which are available as part
of the appbackup logs.
Note: For SQL virtual machine application-consistent data protection, the SQL and operating
system versions follow the NMM support matrix available at http://
compatibilityguide.emc.com:8080/CompGuideApp/.
Increase the vCenter query timeout before starting a VMware backup action
Before starting a VMware backup action, NetWorker queries the vCenter server to determine if
any changes have occurred in the items selected for backup. You can increase the timeout value
by setting the NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT environment variable.
The amount of time for the query to complete depends on several factors, including the network
response time, the size of the vCenter, and the number of resources free on the NetWorker
server. The default timeout of the query is 30 minutes, after which the backup fails with the
following error:
nsrvproxy_save NSR warning Dispatcher: Request timed out
Perform the following steps to set the NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT
environment variable to a higher timeout value. Note that the timeout value is in seconds. In this
example, a value of 2700 (or 45 minutes) is used.
1. Set up the environment variable:
l On Linux, add the following lines to the /nsr/nsrrc file:
NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT=2700
export NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT
l On Windows, add a new variable called NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT
under Environment variables > System variables, and specify a value of 2700.
2. On the NetWorker server, connect to nsradmin:
nsradmin -p nsrexec
3. Select/Print the 'NSRLA' resource:
p type: nsrla
4. Append to the attribute:
append environment variable names: NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT
5. Select/Print the 'NSRLA' resource again to verify your changes:
p type: nsrla
The last attribute should display as environment variable names:
NSR_HYPERVISOR_QUERY_REQUEST_TIMEOUT.
On the NetWorker server, the location of log files for individual backups differ on Windows and
LINUX:
l Linux—/nsr/logs/policy/policy_name
l Windows—C:\Program Files\EMC NetWorker\logs\policy\policy_name
where policy_name is the name of the policy resource associated with the backup action.
Additional logging with the VMBackup broker
Debug logging of the vmbackup broker of nsrd is disabled by default. To turn on additional
logging, you can touch an empty file at <nsr>/tmp/vmbackup_logging. Enabling of additional
logging can be performed while other operations are in progress, and a NetWorker restart is not
required. To turn off additional logging, you can remove the same file.
Operating Procedure
system
Linux a. Update the bashrc file and /opt/nsr/vproxy/bin/
nsrvisdservice.sh script with the following:
set LOG_AGGREGATION_ENABLED=true
On Windows,
3. Add a vProxy.
Note:
l You can use both a single “-” or double “--” when using the flags for
nsrvproxy_log_mgmt command.
l Repeat the step to add multiple vProxies.
For example,
Note: If you want to delete multiple vProxies, then repeat this step.
For example,
Operating Procedure
system
Linux a. Update the bashrc file and /opt/nsr/vproxy/bin/
nsrvisdservice.sh script with the following:
Windows a. You can disable the log aggregation by deleting the vProxy and changing
the log aggregation environment variable to “false”.
b. Update the EMC NetWorker\nsr\vproxy\bin\nsrvisdservice
batch file with the following command:
set LOG_AGGREGATION_ENABLED=false
For example,
For example,
Hostname/IP:10.x.x.4
ProxyStatus:Active
Log Aggregation Location:/root/
Log Aggregation Interval:10
Last Log Collection Time:2019-10-17T01:58:08-04:00
MSVMAPPAGENT logs
You can access logs related to MSVMAPPAGENT from the following locations:
l Discovery log: C:\Program Files\DPSAPPS\MSVMAPPAGENT\logs
\msvmagent_discovery.log
l FULL backup: C:\Program Files\DPSAPPS\MSVMAPPAGENT\logs\msvmcatsnap.log
l Transaction log backup: C:\Program Files\DPSAPPS\MSVMAPPAGENT\logs
\msvmagent_appbackup.log
l Restore of FULL backup: C:\Program Files\DPSAPPS\MSVMAPPAGENT\logs
\msvmagent_snapshotrestore.log
l Restore of transaction log backup: C:\Program Files\DPSAPPS\MSVMAPPAGENT\logs
\msvmagent_apprestore.log
vProxy logs
You can access these vProxy logs from the following locations:
l FULL and transaction log backups: /opt/emc/vproxy/runtime/logs/vbackupd/
BackupVmSessions-sessionnumber.log
l InspectBackup logs: /opt/emc/vproxy/runtime/logs/vsessionsd/inspectBackup-
sessionnumber.log
l Mount session logs: /opt/emc/vproxy/runtime/logs/vflrd/mount-
sessionnumber.log
l Browse session logs: /opt/emc/vproxy/runtime/logs/vflrd/browse-
sessionnumber.log
l Recover App sessions logs: /opt/emc/vproxy/runtime/logs/vflrd/application-
sessionnumber.log. Note that a few minutes after completion, these logs are moved
to /opt/emc/vproxy/runtime/logs/recycle/.
b. In the Management user field, specify the username for a Data Domain user that has
admin access. For example, sysadmin. The Management user should have Data Domain
administrator privileges.
c. In the Management password field, specify the password of the management user.
d. In the Management port field, specify the management port. By default, the port is
3009.
Note: The NetWorker Data Domain Boost Integration Guide provides information about the
Cloud unit field and use of the Cloud tier device.
5. If required, in the Configuration pane, update the export path. It is recommended that you
leave this field blank, which sets the export path to the default path. The short name of the
NetWorker server is the default path.
If you do type a path in this field, ensure that the path has NFS permissions. When you log in
to the Data Domain resource, browse to the NFS section and add the Mtree device path
(the path to the NetWorker backup device) as a valid NFS path.
6. To save the changes, click OK.
l config-user-search-path
l config-user-id-attr
l config-group-search-path
l config-group-name-attr
l config-group-object-class
l config-group-member-attr
l config-active-directory
e. If you plan to use the NetWorker Management Console to register the AD user to
NetWorker, also described in step two below, make note of the following values as you
will require these values for the registration:
l Domain
l Port number
l Provider Server name
l User DN
l Group Object Class
l Group Search Path
l Group Name Attribute
l Group Member Attribute
l User Object Class
l User Search Path
l User ID Attribute
2. Register the AD domain user to NetWorker either using the command line or the NetWorker
Management Console user interface.
If using the command line:
For example, to create a tenant user ADuser with the alias FLR, run authc_config -u
administrator -e add-tenant -D tenant-name=ADuser -D tenant-alias FLR -p
password
b. Obtain the tenant ID by running the authc_config command using the find-tenant
parameter. For example:
authc_config -u administrator -e find-tenant -D tenantname=ADuser -p
password
-D config-user-dn-password=password -D config-user-objectclass=
inetOrgPerson -D config-user-search-path=OU=user -D config-userid-
attr=cn -D config-group-search-path=OU=user -D config-group-nameattr= cn
-D config-group-object-class=group -D config-group-memberattr= member -D
config-active-directory=y -p password
7. Log in to the Dell EMC Data Protection Restore Client as the AD user, in the format
<tenant>\<domain>\<userid>. For example, default\rideblr.com\ADuser.
Results
You can now perform file-level restore as an Active Directory user.
1. Launch the NMC NetWorker Administration window, and go to Server > User Groups > Edit
Security Administrators.
2. Add the AD user and group in the External Roles field. For example, for a user named ADuser
with the domain rideblr.com, type CN=Aduser,OU=user,OU=proxy,DC=rideblr,DC=com for
the user and CN=vmware,OU=proxy,DC=rideblr,DC=com for the group.
NetWorker Management Console additional privileges
If you require access to the NetWorker Management Console as the same AD user:
1. In the NetWorker Management Console, click the Setup tab.
2. On the Setup window, expand Users and Roles in the left navigation pane, and then select
NMC Roles. The roles display in the right pane.
3. For the Console User NMC Roles, add the AD user and group in the External Roles field. For
example, for a user named ADuser with the domain rideblr.com, type
CN=Aduser,OU=user,OU=proxy,DC=rideblr,DC=com.
4. Navigate to the NMC Enterprise window, right-click the server and select Launch
Application to open the NMC NetWorker Administration window.
5. Click the Server tab to open the Server window, and then click User Groups in the left pane
to display the users in the right pane.
6. Add the AD user in the External Roles field under Application Administrators. For example,
for a user named ADuser with the domain rideblr.com, type
CN=Aduser,OU=user,OU=proxy,DC=rideblr,DC=com.
After selecting the Virtual Machine Recovery type, you can perform recovery of individual virtual
machines, or (for revert and virtual machine recovery options) recovery from multiple virtual
machines.
Procedure
1. In the Select the Recovery Type page, select Virtual Machine Recovery, and then select a
vCenter server to recover from using the Source vCenter server drop-down. Click Next.
2. In the Select the Virtual Machine to Recover page, enter the name of the source virtual
machine(s) to recover from, or perform a search for the virtual machine. Additionally, you
can use the tabs on this page to choose a single virtual machine or multiple virtual machines
from a selected backup, or browse the source vCenter to determine the required virtual
machine source. When you locate and choose the desired virtual machine(s), click Next.
3. In the Select the Target Backups page, select the virtual machine backup(s) you want to
restore from the Available Backups pane. This pane lists both primary backups and, if
available, clone copies. If you selected recovery from multiple virtual machines, you can
switch between virtual machines to browse each machine's available backups by using the
Virtual Machine Name drop-down. Click Next.
4. In the Select the Virtual Machine Recovery method page, select from one of the available
recovery options:
l Revert (or rollback) a virtual machine
l Instant Recovery of a virtual machine (direct restore from a Data Domain device)
l Virtual Machine recovery (recovery to a new virtual machine)
l Virtual Disk recovery (recover VMDKs to an existing virtual machine)
l Emergency recovery (recovery to an ESX host)
l File Level recovery (recover files from VMDKs to a file system, or as a download).
Figure 39 Select the Virtual Machine Recovery method
Results
Subsequent wizard options change based on the recovery option selected, as described in the
following sections.
Note: The entire VMDK will be rolled back unless you have CBT enabled, in which case
only the changed blocks will be moved.
a. Specify a name for the recovery and check the summary at the bottom of the page to
ensure all the details are correct.
b. Click Run Recovery.
Results
The Check the Recovery Results page will display the duration of the recovery, and a log file
entry when the reversion is complete.
b. Ensure that you select the Power on virtual machine and Reconnect to network
options.
c. Click Next.
Procedure
1. In the Select the Virtual Machine Recovery Method page:
a. Select Virtual Machine Recovery.
b. Click Next.
2. In the Configure the Virtual Machine Recovery page, select the location where you want
to restore the virtual machine in the vCenter environment
a. In the Destination pane, select the option to recover the new virtual machine to the
original location, or browse to select a new location on the same vCenter server or a
different vCenter server.
b. In the Recovery Options pane, choose a vProxy for the virtual machine recovery from
the Select vProxy drop-down, specify the name of the new virtual machine, and then
optionally select the virtual machine file datastore and folder where you want to recover
the files. You can recover the virtual machine to a Blue folder by using the VM Folder
drop-down, as shown in the following figure. The folder can be the default folder, or a
new folder.
Figure 43 Configure the virtual machine recovery
If you have a single disks, or multiple disks with multiple datastores, you can perform the
following:
l Choose to recover a collection of all the available hard drives.
l Select a different datastore than the original datastore.
l Select a different datatore for each disk you want to recover.
l Specify the datastore where the virtual machine configuration files reside.
Optionally, select the Power on virtual machine and Reconnect to network options to
power on and reconnect after the recovery, and then click Next.
Emergency Recovery
The next virtual machine recovery option available in the NMC Recovery wizard is an Emergency
Recovery. An Emergency Recovery is required when you need to restore the virtual machine to an
ESXi host.
Before you begin
Emergency Recovery requires a vProxy set up on the ESXi host prior to running the recovery.
Additionally, ensure that you disconnect the ESXi host from the vCenter server.
The Proxy Selection and Recovery Data panes get populated with the ESXi server details.
3. In the Proxy Selection pane, if a proxy is not discovered, add a new proxy which is deployed
in vCenter but not added to NetWorker.
4. For the disks in the Recovery Data pane:
a. Select a datastore.
b. Optionally, select the Power on virtual machine and Reconnect to network options.
c. Click Next.
5. In the Select Alternate Recovery Sources page:
a. Select the original disk backup, or a clone copy if one is available.
b. If recovering from a clone that is not on a Data Domain device, or recovering from a Data
Domain Cloud Tier device, specify the staging pool.
Note: If selecting a clone from Select Alternate Recovery Sources, additionally review
the section "Selecting alternate recovery sources".
When the Mount Results pane shows that the mount has succeeded, click Next.
Note: This user should have privileges to install the FLR Agent, which is required to
perform file level recovery. For Linux virtual machines, this requires the root user
account or an equivalent sudo local user account, as described in the section "FLR
Agent installation on Linux platforms" of the NetWorker VMware Integration Guide.
Results
The Check the Recovery Results page displays the duration of the recovery, and a log file entry
when the file level recovery is complete.
2. Click Close to display the Save Progress dialog, and then specify a name for the recover
and click Save to save your progress.
3. In the NMC Administration window, click Devices to display the Devices window.
4. In the left navigation pane, select Devices. The list of devices displays in the right pane.
5. For each volume you do not want to recover from that you made note of in step 1, locate the
corresponding device, and make note of that device name.
6. For each device you identify as corresponding with those volumes, right-click the device and
select Unmount from the drop-down, and then also select Disable from the drop-down.
Note: Ensure that no backups are currently running to these devices prior to
unmounting.
7. In the NMC Administration window, click Recover to display the Recover window, and
locate the saved recovery
8. Right-click the saved recovery and select Open Recover.
The Recovery wizard re-opens on the Select Alternative Recovery Sources page.
9. In the Recovery Source pane of the Select Alternative Recovery Sources page, select
either Recover the virtual machine from a clone on a Data Domain device, or Recover
the virtual machine from a clone on a non-Data Domain device. Click Next.
Note: If you want to recover from a clone on a non-Data Domain device, manually
change the staging pool to a different pool, and ensure that your selected pool does not
already contain copies for this backup. If the primary source is present and you select a
clone to recover from using the same staging pool that contains the existing copy, the
recovery may become unresponsive.
10. In the Perform the Recovery page, specify a name for the recovery and check the
summary at the bottom of the page to ensure all the details are correct. Click Run
Recovery.
The Check the Recovery Results page will display the duration of the recovery, and a log
file entry when the recovery is complete.
11. In the NMC Administration window, click Devices to return to the Devices window, and in
the left navigation pane, select Devices to display the list of devices in the right pane.
12. For each device that you unmounted and disabled in step 6, right-click the device and select
Enable from the drop-down, and then select Mount from the drop-down.
a. From the Proxy drop-down, select Automatic to use the default vProxy appliance, or
choose another vProxy.
b. Select Power On to power on the virtual machine after the recovery completes.
Note: If the virtual machine is currently powered on, a dialog displays requesting
confirmation to power off the virtual machine. Additionally, if a change has occurred
in the virtual machine configuration since the backup, a warning message will display
on the Summary page.
c. Select Revert VM configuration to restore the virtual machine with the same
configuration details used at the time of backup. Additionally, select the Delete existing
disk on config mismatch option if you want to continue with the removal of the existing
disk if the configuration details do not match. If you do not select Revert VM
configuration, the recovery will revert only the virtual machine data without changing
the virtual machine configuration.
d. If required, set a Debug level if you want to enable debug logs. The default level is 0.
e. Click Next.
The Disk Selection page displays
4. In the Disk Selection page, choose one or more of the available hard disks, and then click
Next.
Note: The entire VMDK will be rolled back unless you have CBT enabled, in which case
only the changed blocks will be moved.
e. Select Reconnect NIC to reconnect the network interface card after the recovery
completes.
f. If required, set a Debug level if you want to enable debug logs. The default level is 0.
g. Click Next.
The Destination Location page displays.
4. In the Destination Location page, select the location where you want to recover the virtual
machine. If the target location contains a specific folder that you need to select, select the
desired folder from the VM Folder drop-down. Click Next.
The Disk Selection page displays.
5. In the Disk Selection page:
a. Use the VM Configuration Files drop-down to select the datastore where the virtual
machine configuration files will reside.
b. Select Use same datastore for all disks to use the same datastore that you selected for
the configuration files. This option is enabled by default. Clear this option to select one or
more of the available hard disks, and select a Destination Datastore for each selected
disk. The default Destination Datastore selected is the original datastore, however, you
can select a different datastore for each disk you want to recover.
6. Click Next.
The Summary page displays.
7. In the Summary page, review the recovery details and then click Finish.
Results
The wizard exits and a message displays along the top of the VMware Recovery window to
indicate that a recovery request was submitted. Select Monitoring in the left pane to view the
duration and status of the recovery operation.
d. If required, set a Debug level if you want to enable debug logs. The default level is 0.
e. Click Next.
The Virtual Machine Selection page displays.
4. In the Virtual Machine Selection page, select the location of the virtual machine in the
vCenter server where you want to recover the virtual disk(s), and then click Next.
Note: This location can be the original virtual machine, or another existing virtual
machine.
Emergency Recovery
Select Emergency when you need to restore the virtual machine to an ESXi host.
Before you begin
Emergency recovery requires a vProxy set up on the ESXi host prior to running the recovery.
Additionally, ensure that you disconnect the ESXi host from the vCenter server.
About this task
Note: During an Emergency Recovery, the vProxy gets associated with the ESXi host and is
unavailable for other operations on the vCenter server. Wait until the recovery completes
before initiating any other operations on the vProxy.
To complete the Recovery wizard with the Emergency Recovery method, perform the following:
Procedure
1. In the VMware Recovery window's Backups and Clones pane, select from one of the
available primary or cloned backups, and then select the Recovery drop-down.
2. From the Image Level drop-down, select Emergency.
The Recover wizard launches.
3. In the Configuration page:
a. From the ESX Server drop-down, select the IP of the ESX server in the vCenter
environment where you want to restore the virtual machine backup.
b. Specify the root Username and Password for the ESX Server.
c. In the Virtual Machine Name field, specify the name of the new virtual machine.
d. Select Power On to power on the virtual machine after the recovery completes.
Note: If the virtual machine is currently powered on, a dialog displays requesting
confirmation to power off the virtual machine. Additionally, if a change has occurred
in the virtual machine configuration since the backup, a warning message displays.
e. Select Reconnect NIC to reconnect the network interface card after the recovery
completes.
f. If required, set a Debug level if you want to enable debug logs. The default level is 0.
g. Click Next.
The VMware Proxy Configuration page displays.
4. In the VMware Proxy Configuration page:
a. For Proxy Selection Type, if the desired proxy has been discovered, select an existing
vProxy for the recovery. Alternatively, you can use a new vProxy that is deployed in the
vCenter but not yet added in NetWorker by selecting Register a new VMware Proxy.
b. From the Select Proxy drop-down, select one of the registered vProxies.
c. Click Next.
The Disk Selection page displays.
5. In the Disk Selection page:
a. Use the VM Configuration Files drop-down to select the datastore where the virtual
machine configuration files will reside.
b. Select Use same datastore for all disks to use the same datastore that you selected for
the configuration files. This option is enabled by default. Clear this option to select one or
more of the available hard disks, and select a Destination Datastore for each selected
disk. The default Destination Datastore selected is the original datastore, however, you
can select a different datastore for each disk you want to recover.
6. Click Next.
The Summary page displays.
7. In the Summary page, review the recovery details and then click Finish.
Results
The wizard exits and a message displays along the top of the VMware Recovery window to
indicate that a recovery request was submitted. Select Monitoring in the left pane to view the
duration and status of the recovery operation.
Note: The progress bar may not update correctly when you perform an Emergency Recovery
directly to the ESXi host.
Data Domain resource (instant recovery and User mode file-level restore only) provides detailed
steps.
Also, if recovering to a virtual machine on a secondary vCenter, ensure that a vProxy appliance has
been deployed on the secondary vCenter server and configured with the NetWorker server.
About this task
Note:
l File level recovery in the NetWorker Management Web UI for a Windows virtual machine
can only be performed by an administrator of the target virtual machine. Note, however,
that a user who is a member of the Administrators group can perform the recovery when
the Run with Elevated Privileges option is enabled in the Mount Configuration page of
the Recover wizard.
l Dell EMC Data Protection Restore client requires NetWorker server and NetWorker
Authentication service to be installed on the same machine.
Procedure
1. In the VMware Recovery window's Backups and Clones pane, select from one of the
available primary or cloned backups, and then select the Recovery drop-down.
2. Select File Level.
The Recover wizard launches.
3. In the Configuration page:
a. From the Destination vCenter drop-down, select a different destination vCenter server
if required, or leave the default selection of the same vCenter server.
b. From the Proxy drop-down, select Automatic to use the default vProxy appliance, or
choose another vProxy.
c. Select Overwrite to overwrite files in the destination location that have the same name
as files being recovered.
d. Select Terminate mount session to release the disk mount after the recovery
completes.
e. If required, set a Debug level if you want to enable debug logs. The default level is 0.
f. Click Next.
The Destination Virtual Machine page displays.
4. In the Destination Virtual Machine page, the location of the original virtual machine backup
displays by default in blue. If you do not want to recover to the original location, go to the
desired virtual machine in the vCenter server where you want to recover the objects, and
click Next.
The Mount Configuration page displays.
5. In the Mount Configuration page:
a. Type the user credentials to access the virtual machine that you want to recover objects
to initiate the disk mount. This user should have privileges to install the FLR Agent,
which is required to perform file level recovery. For Linux virtual machines, you require
the root user account or an equivalent sudo local user account, as described in the
section "FLR Agent installation on Linux platforms" of FLR Agent requirements.
b. Optionally, select Keep FLR agent after installation if you do not want to remove the
FLR Agent from the virtual machine upon recovery completion.
c. Select Run with Elevated Privileges to allow a user who is a member of the
Administrators group to perform the recovery.
Note: This feature is not supported for vProxy versions earlier than NetWorker 18.2,
even though the option is not grayed out.
d. Click Mount.
The disk mount initializes , and a progress bar displays.
Note: You cannot browse the contents of the virtual machine backup until the mounting
of the destination virtual machine completes successfully.
6. When the mount completes successfully, click Next.
The Source Data page displays.
7. In the Source Data page, select individual folders to browse the contents of the backup,
and select the objects that you want to recover. You can select all objects in a folder by
clicking the checkbox to the left of the Name field in the Contents pane.
When any objects in a folder are selected, that folder is selected in blue in the Folders pane.
After selecting the objects that you want to recover, click Next.
4. Click the filter icon in the lower left corner of the Backups and Clones pane, and select
VBA Backups and click OK.
A column appears in the table that allows you to identify which backups are legacy VBA
backups.
5. Select one of the available primary or cloned backups that indicate VBA, and then click the
Recovery drop-down.
6. From the drop-down, select Image Level, and then select the Revert or New Virtual
Machine recovery type. These are the only supported types for recoveries of VBA backups.
The Recover wizard launches.
7. Complete the Recover wizard according to the type you selected.
Note: When you select the staging pool for recovery, ensure that at least one volume
does not contain a copy of the selected save set. Alternatively, if a save set is already
recovered, then you can select the recovered save set for further recoveries of the
same virtual machine.
Results
When the recovery is initiated, the Networker performs resurrection on a staging pool to convert
the VBA backups to a vProxy-readable format, and then restores the virtual machine. The staging
pool should reside on a Data Domain system.
vProxy file-level restore and SQL restore in the Dell EMC Data
Protection Restore Client
You can also use the Dell EMC Data Protection Restore Client to perform granular recovery
from a primary or cloned vProxy backup on a Data Domain device. The Dell EMC Data Protection
Restore Client allows you to restore specific files and folders from virtual machines in User and
Admin modes, and also restore individual SQL databases from SQL server application-aware
backups. The Dell EMC Data Protection Restore Client is part of the NetWorker client
installation.
Note: Before you start a file-level restore, review the prerequisites in the section File-level
restore prerequisites, as well as File-level restore and SQL restore limitations to ensure that
you can perform file-level restores in your configuration.
This message provides an option to deploy the FLR Agent by providing the appropriate credentials.
Review the user requirements in the following sections for Linux and Windows platforms to
determine which users are supported.
FLR Agent installation on Linux platforms
The FLR Agent installation on Linux virtual machines requires that you use the root account, or be
a user in the operating system's local sudousers list. If credentials for any other user are provided
for the target virtual machine, the FLR Agent installation fails, even if this user has privileges
similar to a root user.
To allow a non-root user/group to perform the FLR Agent installation, provide sudo access to the
following files at a minimum:
l rpm command (SLES, RHEL, CentOS) and dpkg command (Debian/Ubuntu)
l /opt/emc/vproxyra/bin/postinstall.sh
l /opt/emc/vproxyra/bin/preremove.sh
Note the following additional requirements:
l Using the local sudouser for the FLR Agent installation requires NetWorker 18.2 and later and
vProxy 3.0.1-1 or later. Any earlier versions will require you to use the root account for the FLR
Agent installation
l The sudo user/group must be configured for no password prompt
l The sudo user/group must be provided with the no requiretty option.
l To browse files for a file-level restore when you have user elevation enabled, you must have
appropriate authority in the guest virtual machine operating system, for example, being allowed
to run vflrbrowse via sudo without prompting for a password.
l To perform a file-level restore when you have user elevation enabled, you must have
appropriate authority, for example, being allowed to run vflrcopy via sudo without prompting
for a password.
Once you complete the FLR Agent installation on the target virtual machine using the root user
account or a sudouser with the minimum file access requirements, you can perform file-level
restore operations as a non-root user on supported Linux platforms. File-level restore on Linux is
only supported on Red Hat Enterprise Linux versions 6 and 7, and SuSE Linux Enterprise Server
versions 11 and 12.
FLR Agent installation on Windows
FLR Agent installation on Windows virtual machines requires that you use administrative
privileges. If the provided credentials for the target virtual machine do not have administrative
privileges, theFLR Agent installation fails. Once you complete the FLR Agent installation on the
target virtual machine using administrative privileges, you can perform file-level restore using a
non-administrator user.
File-level restore and SQL database/instance level restore only supported from primary or clone
backup on a Data Domain device
NetWorker only supports file-level restore and SQL database/instance level restore operations
from a primary or cloned backup when the save set is on a Data Domain device.
If a cloned backup does not exist on the Data Domain device, you must manually clone a save set
from the tape device to Data Domain before launching the Dell EMC Data Protection Restore
Client.
If backups reside on a non-Data Domain Device such as Cloud Boost, tape, Cloud Tier, or AFTD,
the backups do not display in the Dell EMC Data Protection Restore Client. In this case, use
NMC to identify and clone the save sets back to the Data Domain device.
Procedure
1. Log in to the system console as a non-root user.
2. Run the sudo passwd root command.
Enter the new password twice to set a password for the root account.
3. Run the sudo passwd -u root command to unlock the root account.
4. Specify the root user credentials in the Dell EMC Data Protection Restore Client and
proceed to complete the file-level restore operation at least once.
While performing the file-level restore operation for the first time, remember to select Keep
FLR agent.
5. After performing the above steps at least once, you can revert the root account to the
locked state and use non-root account for future file-level restore requests. Non-root user
can lock the root account with the sudo passwd -l root command.
NetWorker privileges required by File-level restore and SQL database/instance level restore users
A new user group, VMware FLR Users, requires NetWorker privileges for User and Admin logins to
perform file-level restore and SQL database/instance level restore operations in the Dell EMC
Data Protection Restore Client.
Specify the following privileges for the VMware FLR Users group by using the NMC NetWorker
Administration window or nsradmin.
User Admin
l msiexec.exe
l diskpart.exe
l cmd.exe
On Linux:
l blkid
l udevadm
l readlink
l rpm
l bash
Note: On Linux LVM, LVM2 rpm version 2.02.117 or later is required. Also, additional binaries
required on Linux LVM include dmsetup, lvm, and vgimportclone.
Create a user in the NetWorker authentication service (User mode file-level restore only)
When performing file-level restore in User Mode, you must create a user in the Networker
Management Console (NMC) using the Manage Authentication Service Users option, and make
note of the password as you will require this information when logging in to the Dell EMC Data
Protection Restore Client.
Before you begin
For file-level restores on Linux virtual machines, the root account or an equivalent sudo local user
account credentials is required for the target virtual machine in order to install the FLR Agent. The
section "FLR Agent installation on Linux platforms" of FLR Agent requirements provides more
details.
For file-level restores on Windows virtual machines, if the provided credentials for the target
virtual machine do not have administrative privileges, theFLR Agent installation fails. To perform a
file-level restore using a non-administrator user, ensure that the FLR Agent is already installed on
the target machine using administrative privileges.
Procedure
1. In the NMC NetWorker Administration window, click Server to open the Server window.
2. In the left navigation pane, highlight User Groups, and then right-click and select Manage
Authentication Service Users.
6. Right click VMware FLR Users and select Properties. In the User field, create an entry for
the user created in step 4 (for example, user1), in the format user=user1,host=NW server
FQDN.
Results
You can now use this new user to log into the Dell EMC Data Protection Restore Client.
Platform-specific limitations
Review the following limitations specific to Linux and Windows operating systems.
l You can only restore files and/or folders from a Windows backup to a Windows machine, or
from a Linux backup to a Linux machine.
l When you enable Admin Approval Mode (AAM) on the operating system for a virtual machine
(for example, by setting Registry/FilterAdministratorToken to 1), the administrator
user cannot perform a file-level restore to the end user's profile, and an error displays
indicating "Unable to browse destination." For any user account control (UAC) interactions,
the administrator must wait for the mount operation to complete, and then access the backup
folders that are located at C:\Program Files (x86)\EMC\vProxy FLR Agent\flr
\mountpoints by logging into the guest virtual machine using Windows Explorer or a
command prompt.
l The FLR Agent installation on Linux virtual machines requires you to use the root account, or
be a local sudouser with the minimum required file access, as described in the section FLR
Agent requirements. Note that using the sudouser for the FLR Agent installation requires
NetWorker 18.2 or later and vProxy 3.0.1-1 or later. Any earlier versions require you to use the
root account for the FLR Agent installation. Once the FLR Agent installation is completed by a
root user, you can perform file-level restore operations as a nonroot user.
l Mounting a Linux virtual machine for file-level restore requires a local Linux account with
permissions to the file system files.
l When you perform file-level restore on Ubuntu/Debian platforms, you must enable the root
account in the operating system. By default, the root account will be in locked state.
l For file-level restores on Windows 2012 R2 virtual machines, the volumes listed under the
virtual machine display as "unknown." File-restore operations are not impacted by this issue.
l File-level restore of virtual machines with Windows dynamic disks is supported with the
following limitations:
n The restore can only be performed when recovering to a virtual machine different from the
original. Also, this virtual machine cannot be a clone of the original.
n The restore can only be performed by virtual machine administrator users.
n If Windows virtual machines were created by cloning or deploying the same template, then
all these Windows virtual machines may end up using the same GUID on their dynamic
volumes.
l File-level restore of Windows 8, Windows Server 2012 and Windows Server 2016 virtual
machines is not supported on the following file systems:
n Deduplicated NTFS
n Resilient File System (ReFS)
n EFI bootloader
Restore operations and performance limitations
Review the following limitations related to file-level restore operations and performance
considerations.
l When a file-level restore or SQL restore operation is in progress on a virtual machine, no other
backup or recovery operation can be performed on this virtual machine. Wait until the file-level
restore session completes before starting any other operation on the virtual machine.
l When the backup chain for an SQL instance restore contains 30 or more transaction log
backups, a message indicating the required permissions to complete this action does not
display in the Dell EMC Data Protection Restore Client. Check the flr-server log for an
error message similar to the following to determine what additional privileges are required:
Using the Dell EMC Data Protection Restore Client for file-level restore and SQL
restore
The Dell EMC Data Protection Restore Client, which you access through a web browser, allows
you to select specific virtual machine backups as file systems, and then browse the file system to
locate the directories and files you want to restore. The browser also allows you to restore
individual SQL databases and instances.
The login page of the Dell EMC Data Protection Restore Client features two tabs—an FLR tab
for virtual machine file and folder restore, and an App tab for SQL database and instance restore.
Additionally, the Dell EMC Data Protection Restore Client operates in one of two user modes:
l User—For file-level restore, a user account that can restore folders or files to the original
virtual machine, as described in the section Restoring specific folders or files to the original
virtual machine in User mode.
For SQL restore, a user account that can restore individual SQL databases and instances to the
original machine from the virtual machine you are logged into. This user can be an
Authentication Service user, as described in the section Restore of SQL Server application-
consistent backups.
l Admin—For file-level restore, a NetWorker administrator account or Authentication Service
user that can restore folders or files from a different virtual machine to any available
destination client, as described in the section Restoring specific folders or files from different
virtual machines in Admin mode.
For SQL restore, a NetWorker administrator account or Authentication Service user that can
restore individual SQL databases and instances to the original machine from any virtual
machine you have access to that contains an SQL Server application-consistent backup, or
restore to a different virtual machine, as described in the section Restore of SQL Server
application-consistent backups.
Note: When a file-level restore operation is in progress on a virtual machine, no other backup
or recovery operation can be performed on this virtual machine. Wait until the file-level restore
session completes before starting any other operation on the virtual machine.
Restoring specific folders or files to the original virtual machine in User mode
To restore specific folders and files to the original virtual machine on Windows and Linux virtual
machines, select the User tab in the Dell EMC Data Protection Restore Client login page. In this
mode, you connect to the Dell EMC Data Protection Restore Client from a virtual machine that
has been backed up by the vProxy Appliance.
Before you begin
For the Data Domain resource, ensure that you provide the management credentials and, if
required, enter the export path appropriately. The section Entering management credentials for
the Data Domain resource (instant recovery and User mode file-level restore only)provides
detailed steps.
Additionally, you must create a user in the NetWorker Authentication Service by using the
NetWorker Management Console (NMC), as described in the section Create a user in the
NetWorker authentication service (User mode file-level restore only).
Procedure
1. Open a browser from the virtual machine that the restored files will be recovered to, and
enter a URL that points to the NetWorker server host and indicates file-level restore. For
example:
https://NetWorker server:9090/flr
Note: For User recoveries, you must connect to the NetWorker server from a web
browser on the virtual machine that will receive file-level restore data.
The Dell EMC Data Protection Restore Client login window appears.
2. Select the User tab and the FLR tab, and then log in to the Dell EMC Data Protection
Restore Client with the user credentials of the virtual machine to which you are logged in.
This user account should also belong to the NetWorker user group "VMware FLR Users" in
order to be authorized to perform file-level restore. The section NetWorker privileges
required by File-level restore users provides more information.
When you log in, the Select Backups page displays with a list of backups for the local virtual
machine.
3. On the Select Backups page, use the drop-down list to view the available backups. You can
set the backup filter to view backups on a specific day or within a specific date range.
Highlight a backup and double-click or drag and drop to move the backup to the Selected
Items pane. Click Next.
Figure 53 Select backups to restore from
Note: When you click Next, if a folder hierarchy does not appear, the Dell EMC Data
Protection Restore Client may not support the file system in use on the virtual
machine. The section File-level restore limitations provides more information.
4. On the Restore Options page, navigate to the file system drive where you want to restore
the items and select an existing folder, or specify a new folder name in the restore
destination, and then click Next.
Note: Additionally, you can select the Overwrite existing files and folders option if you
want to replace the existing files with the recovered files.
5. On the Select items to restore page, browse and select the files and folders available for
recovery. Note that you can sort items by Name, File size, or Date, and you can also search
for a specific file or folder name. To mark an item for recovery, double-click the item, or
drag and drop the item into the Selected Items pane.
Figure 55 Select items to restore
When you click the icon, the Restore Detail pane slides into view on the right side of
the window, displaying the ongoing restore operations. Clicking the entry displays the
progress of the restore and a recovery logs download option.
Figure 56 Restore Monitoring
Restoring specific folders or files from different virtual machines in Admin mode
To restore specific folders or files from a different virtual machine, select the Admin tab in the
Dell EMC Data Protection Restore Client login page. Once connected, you can browse, select,
and restore files and folders from any virtual machine that you backed up with the vProxy
Appliance. You can then restore items to the virtual machine on which you are currently logged in,
or to any available destination virtual machine.
Procedure
1. Open a browser and specify a URL that points to the NetWorker server and indicates FLR,
as in the following example:
https://NetWorker server:9090/flr
The Dell EMC Data Protection Restore Client login window appears.
2. Click the Admin tab and the FLR tab, and then log in to the Dell EMC Data Protection
Restore Client with the NetWorker Authentication Service User credentials.
Note: When using Admin mode, ensure that the user you specify for the NetWorker
server login has the correct privileges to use this option.
When you log in, the Select Backups page appears with a list of all the virtual machines that
were backed up by using the vProxy Appliance. The available backups appear under each
virtual machine, as shown in the following.
Note: After migrating from the VMware Backup appliance to the vProxy appliance, new
vProxy backups of virtual machines that were previously backed up with the VMware
Backup appliance will not be visible in the Dell EMC Data Protection Restore Client in
Admin mode. You must log in using User mode to view and recover these backups.
3. On the Select Backups page, use the arrows to the right of the entry to view the available
backups. You can set the backup filter to view backups on a specific day or within a specific
date range. Highlight a backup and double-click or drag and drop to move the backup to the
Selected Items pane. Click Next.
4. On the Restore Options page, select a destination virtual machine.
A login dialog box similar to the following figure appears for the restore destination.
Figure 58 Select restore location
5. Log in to the destination virtual machine to initiate the mounting of the backup.
6. After you successfully log in, select the restore location. If desired, specify a new folder
name in this location. Click Next.
Note: Additionally, you can select the Overwrite existing files and folders option if you
want to replace the existing files with the recovered files.
7. On the Select items to restore page, browse and select the files and folders available for
recovery. Note that you can sort items by Name, File size, or Date, and you can also search
for a specific file or folder name. To mark an item for recovery, double-click the item, or
drag and drop the item into the Selected Items pane.
Figure 59 Select items to restore
Within this window, you can also discover and select the total number of items available for
recovery by scrolling to the far right of the directory structure and right-clicking the icon
located on the vertical scroll bar, as shown in the following figure.
Figure 60 Total items available for recovery
11. Once the polling feature is enabled, you can monitor the status of the restore by clicking the
When you click the icon, the Restore Detail pane slides into view on the right side of
the window, displaying the ongoing restore operations. Clicking the entry displays the
progress of the restore and a recovery logs download option.
Figure 61 Restore Monitoring
The Dell EMC Data Protection Restore Client will discover and display the SQL instance on the
target virtual machine once the mount completes. If the target virtual machine does not have any
running SQL Instances, an error will be displayed. You may select the SQL instance from this
where you want to restore the database. The ability to select a different SQL Instance is only
possible for individual database restore, and when performing SQL Instance restore you are
restricted to selecting the original SQL Instance.
NetWorker automates the complete restore of SQL databases, restoring the database FULL and
any transaction log backups as a single operation according to the following sequence:
l The primary FULL database backup is identified, mounted on the original virtual machine, and
the SQL database files from the FULL backup are restored to the original database.
l If a transaction log backup was selected, the series of transaction logs that occurred after the
FULL backup to the selected transaction log are restored in sequence.
NetWorker automates the complete restore of SQL instances according to the following sequence:
l The master database is restored first, then msdn, then model. During this restore, the SQL
instance restarts in single-user mode as required by the Microsoft SQL Server to restore the
master database. When the restore completes, the SQL services restart in multi-user mode.
l Each remaining database is restored individually, and includes the backup versions present in
the currently selected backup.
The Dell EMC Data Protection Restore Client provides the ability to monitor the restore
operations while in progress by enabling the Polling feature, which is disabled by default. Once
enabled, when you click the icon, the Restore Detail pane slides into view on the right side of
the window, displaying the ongoing restore operations. Clicking the entry displays the progress of
the restore and a recovery logs download option.
The Dell EMC Data Protection Restore Client login window appears.
2. Select the User or Admin tab, and then select the App tab.
Note: For User mode recoveries, you must connect to the NetWorker server from a web
browser on the virtual machine that the SQL database or instance will be restored to.
4. On the Select App Backups page, use the arrows to the right of the entry to browse and
select from the available SQL Server application-consistent backups, including all SQL
instances, databases, and backup versions.
To select a backup version, expand the SQL instance and database to display the backup
versions pane, and then click the backup version item once or drag and drop the item to
move the backup to the Selected Items pane. You may be required to scroll right to view
the backup versions.
To select a SQL database or instance, drag and drop the entry to move the item to the
Selected Items pane. Note that you cannot drag and drop the SQL database or instance
when the entry has been expanded to view its children. If you expanded the entry, reselect
the virtual machine, and then select the SQL database or instance to enable drag-and-drop.
Note: The backup filter is set to the last seven days by default. You can expand the date
range further back if desired.
When the mount completes, all SQL instances running on the selected virtual machine
display in this window.
Note: If the SQL Server is not installed, or there are no SQL instances running, an error
displays. If this occurs, log out of the Dell EMC Data Protection Restore Client to
cancel the mount.
6. Select the SQL instance where you want to restore the database, and then click Next.
The Restore Options page displays.
7. On the Restore Options page, set the Diagnostic logging level, if required. The default
level is 0.
8. Select Leave the DB in recovery state if you want to activate the SQL Server
NORECOVERY database restore option, which places the database in a recovering state
upon completion of the restore and is useful for special situations such as restoring
transaction log backups taken by third-party applications. Note that this option is not
available for SQL instance restore. This option also overwrites the database and then leaves
the database in restoring state.
9. In the Target Database Name field, you can type a new name if you want to change the
name of the database, or leave the current name. By default, this field displays the name of
the database at the time of backup.
Note: If you change the database name, the new name must comply with the Microsoft
SQL Server rules for database naming. Also, if you change the name and another
database with the same name already exists on the target virtual machine and SQL
instance, a warning displays that this database will be overwritten if you proceed.
10. For the restore location, select from one of the following options under Restore files to:
l Original Location—Select this option to restore the database files to the original, or
current, location. This option is only available if the original virtual machine and SQL
instance were selected as the restore target. By default, the files are restored to the
database location as it was at the time of backup. Note, however, that if the database
file locations were changed after the backup, the files will be restored to the changed
location.
l Default data path—Select this option to restore the database files to the default data
path for the target SQL Server instance. Each SQL Server instance has a configuration
variable for the default database data path and log file path. When you select this option,
all SQL data files will be restored to the default data path, and all log files will be restored
to the default log path.
l Folder —Allows you to specify the folders where you want to restore the database and
log files. With this option, you can specify two folder locations on the target virtual
machine; one folder to store all the data files for the database, and another folder to
store all the log files for the database. Click Browse to navigate the file system on the
target virtual machine and select the desired folders. By default, both folder locations are
populated with the SQL default data paths for the target SQL Server instance. Note that
you can only select an existing folder and cannot create a new folder using the Dell EMC
Data Protection Restore Client.
11. Select Restore Stop At Time if you want to restore transaction logs from the backup
version that occurred before the specified restore date and time. This option is only
available when you select a specific transaction log backup.
12. Click Restore.
Note: A restore of individual SQL Server databases or instances in the Dell EMC Data
Protection Restore Client will overwrite the existing database.
13. In the Restore Confirmation dialog, click Yes to continue the restore and overwrite the
existing database, or No to exit the restore.
If you changed the name of the database and another database with the same name already
exists on the target virtual machine and SQL instance, an additional warning displays that
this database will be overwritten if you proceed. If you changed the name of the database
and the name does not match any available databases on the target virtual machine and SQL
instance, an additional warning displays indicating that a new database will be created.
14. To enable the polling feature so that you can monitor the status of the restore, click the
hourglass icon located in the upper right-hand corner of the window and set to ON. By
default, the polling feature is set to OFF due to the memory consumption that occurs when
the server is queried every few seconds for the restore status.
15. Once the polling feature is enabled, you can monitor the status of the restore by clicking the
When you click the icon, the Restore Detail pane slides into view on the right side of
the window, displaying the ongoing restore operations. Clicking the entry displays the
progress of the restore and a recovery logs download option. For SQL database restore, a
single line displays. For SQL instance restore, one line per database displays. In both cases,
the Target field indicates the database associated with the progress line.
A prompt displays in the right pane with fields required to connect to the NetWorker server.
3. For the NetWorker server, type the following information:
a. In the Username field, type the NetWorker administrator username.
b. In the Password field, type the NetWorker administrator password.
c. In the NetWorker Server field, type the IP address of the NetWorker server.
d. In the Port field, type 9090.
Figure 67 NetWorker connection information in the vSphere Client
Note: The vCenter plug-in (HTML5 or flash-based) requires the NetWorker server and
NetWorker Authentication service to be installed on the same machine.
Note: If this list does not contain a virtual machine that was recently backed up, refresh
the window.
3. From the Client pane, click the radio button next to the virtual machine that you want to
recover.
A list of available restore points for that virtual machine displays in the right pane. You can
also specify a date range to view only the virtual machine backups that were performed
within that range.
4. Within the Restore pane, click the radio button next to the desired restore point.
5. In the top-right of the Restore pane, click the Action icon and select Restore from the
drop-down.
Figure 70 Select Restore from the Action drop-down
Note: If this list does not contain a virtual machine that was recently backed up, refresh
the window.
3. From the Client pane, click the radio button next to the virtual machine that you want to
recover.
A list of available restore points for that virtual machine display in the right pane. You can
also specify a date range to view only the virtual machine backups that were performed
within that range.
4. Within the Restore pane, click the radio button next to the desired restore point.
5. In the top-right of the Restore pane, click the Action icon and select Restore from the
drop-down.
Figure 73 Select Restore from the Action drop-down
Note: If this list does not contain a virtual machine that was recently backed up, refresh
the window.
3. From the Client pane, click the radio button next to the virtual machine that you want to
recover.
A list of available restore points for that virtual machine displays in the right pane. You can
also specify a date range to view only the virtual machine backups that were performed
within that range.
4. Within the Restore pane, click the radio button next to the desired restore point.
The Content pane displays the virtual disks available for recovery.
5. Select the checkbox next to the disk(s) in the Content pane that you want to recover.
When selected, the disk will appear in the Restore Selection pane.
6. Click the Action icon and select Restore from the drop-down.
Results
You can monitor the progress of the recovery in the Recent Tasks pane. Once the recovery
completes successfully, power ON the virtual machine to validate the recovery.
Note: If this list does not contain a virtual machine that was recently backed up, refresh
the window.
3. From the Client pane, click the radio button next to the virtual machine that you want to
recover.
A list of available restore points for that virtual machine display in the right pane. You can
also specify a date range to view only the virtual machine backups that were performed
within that range.
4. Within the Restore pane, click the radio button next to the desired restore point.
5. Click the Action icon and select Restore from the drop-down.
Figure 79 Select Restore from the Action drop-down
7. Click Next.
The Advanced Config page displays.
8. Specify a name for the new virtual machine, and then click Next.
The Location page displays.
9. Expand the vCenter server tree and select a destination for recovery within the vCenter
server, and then click Next.
The Host/Cluster page displays.
10. Select a host within the destination datacenter, and then click Next.
The Resource Pool page displays.
11. Select a resource pool, and then click Next.
12. In the Summary page, review the information and then click Finish to start the recovery.
Results
You can monitor the progress of the recovery in the Recent Tasks pane. Once the instant restore
completes, use storage vMotion to save the virtual machine, and then cancel the vSphere
NetWorker Recovery task to delete the datastore. Power ON the virtual machine to validate the
recovery.
4. Click Connect.
Results
When a connection to the NetWorker server is established, the Getting Started pane appears.
If you do not see the virtual machine backup listed, refresh the window.
Note: The Restore tab of the vSphere Web Client's VM Backup and Recovery user
interface does not display any information in the Availability column for the vProxy
backups.
4. Browse the list of virtual machines and select the virtual machine backup you want to
recover. You can expand the virtual machine backup to view a list of restore points from
which to select.
5. Select one of the restore points by clicking the checkbox next to the backup time, and then
click Restore.
The Restore Backup wizard launches.
6. In the Set Restore Options page of the Restore Backup wizard, leave the default Restore
to original location selected and click Next.
Figure 84 Restore to original location
Results
You can monitor the progress of the recovery in the Running tab of the Recent Tasks pane. Once
the recovery completes successfully, power ON the virtual machine to validate the recovery.
4. Browse the list of virtual machines and select the virtual machine backup you want to
recover. You can expand the virtual machine backup to view a list of restore points from
which to select.
5. Select one of the restore points by clicking the checkbox next to the backup time, and then
click Restore.
The Restore Backup wizard launches.
6. In the Set Restore Options page of the Restore Backup wizard, uncheck the default
Restore to original location.
7. Specify a name for the new virtual machine, and select a destination for recovery in the
vCenter server. You are not required to select the Choose button and can ignore the text
New or Existing.
Figure 85 Restore options for the new virtual machine recovery
8. Specify a datastore for the virtual machine, and then click Next.
9. In the Ready to Complete page, click Finish to start the recovery.
Results
You can monitor the progress of the recovery in the Running tab of the Recent Tasks pane. Once
the recovery completes successfully, power ON the virtual machine to validate the recovery.
4. Browse the list of virtual machines and select the virtual machine backup that contains the
VMDK you want to recover. You can expand the virtual machine backup to view a list of
restore points from which to select.
5. Double-click one of the restore points to view the list of available VMDKs for the virtual
machine.
6. Select the VMDK you want to restore by selecting the checkbox next to the VMDK, and
then click Restore.
The Restore Backup wizard launches.
Figure 86 Select VMDK backup to restore
7. In the Select Backup page, verify that the correct VMDK is selected and click Next.
8. In the Set Restore Options page, uncheck the default Restore to original location and
then click Next.
9. Click Choose to browse the existing virtual machine where the VMDK needs to be restored
in the vCenter.
Figure 87 Set Restore Options for VMDK recovery
10. Specify a datastore for the VMDK, and then click Next.
11. In the Ready to Complete page, click Finish to start the recovery.
Results
You can monitor the progress of the recovery in the Running tab of the Recent Tasks pane.
Note: When you start a VMDK recovery, the virtual machine will be powered off automatically
without issuing a warning message.
Results
You can monitor the progress of the recovery in the Running tab of the Recent Tasks pane. Once
the instant access recovery completes, use storage vMotion to save the virtual machine, and
cancel the vSphere NetWorker Recovery task to delete the datastore. Power ON the virtual
machine to validate the recovery.
l 1—Errors only
l 2—Warnings and Errors
l 3—Important information messages, errors
and warnings
l 4 —All messages, including debug
messages.
3. Restart the recovery engine: systemctl
restart vrecoverd.service
s. Under Pool, perform one of the following tasks to select the pool:
l Select Create and use a new pool, and type the pool number in the text box.
l Select Use an existing pool, and select the pool from the drop-down list box.
Note: NetWorker 19.2 releases do not feature a new version of the VADP proxy. For VADP,
NetWorker 19.2 only supports recoveries that were configured in a previous release. The
NetWorker Online Compatibility Guide available on the Dell EMC Online Support site at
https://support.emc.com/products/1095_NetWorker provides the most up-to-date
compatibility information.
This chapter contains the following topics:
Transport modes
The VADP proxy host supports advanced transport modes for image-level recovery. You can set
the configured network transport mode to the following values during recovery:
l SAN (Storage Area Network)—Selecting this mode completely offloads the CPU, memory or
I/O load on the virtual infrastructure. The I/O is fully offloaded to the storage layer where the
data is read directly from the SAN or iSCSI LUN.
SAN mode requires a physical proxy with SAN access, and the VMs need to be hosted on
either Fibre Channel or iSCSI-based storage. The corresponding VMFS volumes must be visible
in the Microsoft Windows Disk Management snap-in of the VADP proxy host.
l Hotadd—In this mode, the I/O happens internally through the ESX I/O stack using SCSI hot-
add technology. This provides better I/O rates than NBD/NBDSSL. However, selecting this
mode places CPU, memory and I/O load on the ESX hosting the VADP proxy.
Hotadd mode requires a virtual proxy, and the ESX hosting the virtual proxy should have
access to all the datastores where the VMs are hosted So, if the datastores are SAN/
iSCSI/NFS and if the ESX server where the VADP proxy resides is separate from the ESX
server where the VMs are hosted, then:
n In the case of SAN LUNs the ESX hosting the proxy and the ESX hosting the VMs should
be part of the same fabric zones.
n In the case of iSCSI LUNs the ESX hosting the proxy and the ESX hosting the VMs should
be configured for the same iSCSI-based storage targets.
n In the case of NFS datastores, the ESX hosting the proxy and the ESX hosting the VMs
should be configured for the same NFS mount points.
l NBD (Network Block Device): in this mode, the CPU, memory and I/O load gets directly placed
on the ESX hosting the production VMs, because the data has to move through the same ESX
and reach the proxy over the network. NBD mode can be used either for physical or virtual
proxy, and also supports all storage types.
l NBDSSL (Network Block Device with SSL): NBDSSL transport mode is the same as NBD
except that the data transferred over the network is encrypted. Data transfer in NBDSSL
mode can therefore be slower and use more CPU due to the additional load on the VADP host
from SLL encryption/decryption.
You can set multiple transport modes to be used by the VADP proxy host using the pipe symbol “|”
(for example, san|nbd|nbdssl).
By default, the transport mode field in the NetWorker User program is blank. Specify one
transport mode to use for recovery.
More information on configuring transport modes is provided in Configuring the VADP proxy host
and Hypervisor resource. The transport modes are outlined in the table Table 17 on page 217.
Creating a NetWorker client for the VADP Proxy host by using the Client
properties windows
About this task
Procedure
1. In the NMC NetWorker Administration Protection window, right-click Clients, and select
New.
The Create Client dialog box displays.
2. Select the General tab.
3. In the Name attribute field, type the name of the proxy.
4. Select the Apps and Modules tab, shown in the following figure.
Figure 90 Apps and Modules tab in NMC
VADP_HYPERVISOR=any.vc
VADP_HYPERVISOR=another.vc
VADP_BACKUPROOT=G:\mnt
VADP_TRANSPORT_MODE=Hotadd
6. Click OK.
Assigning the VADP User role to the user specified in the NetWorker Hypervisor
resource
About this task
Note: Refer the appropriate VMware Basic System Administration or Datacenter
Administration Guide documentation for steps to assign a role to user.
VMware documentation can be found at http://www.vmware.com/support/pubs/
Procedure
1. Log in to the vCenter Server with Administrator privileges using vSphere Client.
2. Select the vCenter server in the left pane.
3. Click the Permissions tab in the right pane.
4. Right-click inside the right pane and select Add Permission.
5. Add the NetWorker Hypervisor user and assign the VADP User role.
6. Ensure Propagate to Child Objects is enabled and click OK.
Setting Privileges
Setting Privileges
l Rename
l Reset guest information
l Settings
l Swapfile placement
l Upgrade virtual machine compatibility
Procedure
1. Launch the NetWorker User program on the NetWorker server or VADP proxy.
2. Browse the file system for the VM client and select file to recover, as outlined in the
NetWorker Administration Guide’s Recovery chapter.
3. Set the destination directory to the CIFS share of the VM client.
4. Recover the files onto the CIFS share.
5. At the VM client, move the files from the CIFS share to the appropriate directory.
datastores are also supported. A different datastore can be specified for each disk and a
configuration datastore can be specified to restore the configuration files.
l During the recovery of a full VM (FULLVM save set), the recovered VM will start in forceful
powered off state because of a VADP snapshot limitation.
l For non-Windows VMs: If using traditional NetWorker client-based backups along with VADP
image based backups for the same VM client, ensure that the browse policy for the client-
based backups does not exceed the frequency of VADP image based backups. This practice is
recommended because the indices of client-based backups may have to be removed prior to
image-level recovery.
For example, a Linux client has a schedule of daily level FULL client-based backups along with
monthly VADP image based backups. In this case, it is recommended to set the browse policy
of the client-based backups to a maximum of 1 month.
l If the image level backup of the VM being recovered was performed with the Encryption
directive, the current Datazone pass phrase by default is automatically used to recover the VM
image. If the current Datazone pass phrase was created after a password-protected backup
was performed, you must provide the password that was in effect when the VM image was
originally backed up.
5. In the VADP Restore dialog box, type the following information depending on the type of
recovery and then click the Start button.
Restore to VMware vCenter (VC):
l Transport Mode - Specify the transport mode for recovery (SAN, Hotadd or NBD).
l Data Store — Specify the name of the datastore for each disk on the VM.
Results
The following figure depicts a VADP Restore dialog box that is set up for a VMware vCenter
restore.
Figure 92 VMware vCenter restore
l datacenter name is the data center name where the VM is restored to.
l resource pool name is the resource pool that the restored VM is connected to.
l ESX hostname is the VMware ESX server machine name where the VMware VM needs
to be restored.
l datastores is the list of datastores that need to be associated with the configuration and
the disks of the VM that is being restored. They are name / value pairs separated with
hash (#) symbols. For example:
VADP:datastore=”config=stor1#disk1=stor2#disk2=stor3”
The following command depicts a command to recover the FULLVM with a ssid of
413546679. The recovery is directed to the ESX server named esxDemo1.emc.com.
Default values are used for the datacenter, resource pool, and datastores.
recover.exe -S 413546679 -o
VADP:host=esxDemo1.emc.com;
VADP:transmode=Hotadd
Recover VMs that have a mix of VADP image-level and traditional guest based backups
If your VMs have a mix of both VADP image level backups and traditional guest based (also known
as client based) backups, you may have to use the following recovery procedure.
Example
The following VM (host name mars) has a mix of both VADP and traditional guest based backups.
This example shows how to recover a traditional backup save set on the VM by first locating the
time of the backup save set using the mminfo command and then by using that time with the
recover command. The host name of the NetWorker server in this example is jupiter.
Notice that in the previous example output from the mminfo command, the first two lines listed are
for traditional backup and the last two lines are for a VADP backup, which is denoted with the save
set name, FULLVM. The NetWorker Command Reference Guide provides more information about
using the recover command to mark (select) files and to perform the recovery.
DISKPART
SAN POLICY=OnlineALL
Note: After the recovery is successful, SAN POLICY can be changed back to the
default value (SAN POLICY=offline or SAN POLICY=offlineshared).
Note: Recovery directly to a standalone ESX/ESXi host is not supported. The ESX/ESXi
must be connected to either VirtualCenter or vCenter.
l VADP does not support IPv6. Instructions for disabling IPv6 and using IPv4 are provided in the
section Network and Firewall port requirements on page 229.
l It is recommended to keep the vCenter and VADP proxy as separate machines to avoid
contention of CPU and memory resources.
l The vSphere Client does not need to be installed on the NetWorker server.
l Ensure the path specified in VixDisklib and VixMountAPI config files are enclosed in double
quotes as below:
l If the Virtual Center or vCenter server uses a port other than the default port of 443, specify
the port in the endpoint attribute of NSRhypervisor field. Configuring the VADP proxy host and
Hypervisor resource on page 216 provides more information.
l VADP does not support IPv6. If vCenter is installed in a Windows 2008 system with IPv6
enabled (IPv6 is enabled by default) and the same system is also used as the VADP proxy,
VADP backups will hang.
Ensure that IPv6 is disabled on the following:
n vCenter
n ESX/ESXi
n VADP-Proxy
Note: ESX/ESXi refers to the actual host system and not the VMs to be backed up.
Disable IPv6 using Network Connections in the Control Panel, then add an IPv4 entry like
the following to the hosts file on the system where vCenter is installed:
After this entry has been added, run the following command in the VADP proxy host to
verify that the IPv4 address is being resolved:
C:\Users\Administrator>ping <vCenter hostname>
VMDirectPath restrictions
The following restrictions apply during the configuration of VMDirectPath:
l The ESX host must be rebooted after VMDirectPath is enabled.
l The VM must be powered down when VMDirectPath is enabled in order to add the PCI/PCIe
device directly to the VM.
l Using Fibre Channel tape drives in a VM is not supported without VMDirectPath in production
environments due to the lack of SCSI isolation. Tape drives can be configured and used
without VMDirectPath, but the support is limited to non-production environments.
The VMware knowledge base article http://kb.vmware.com/kb/1010789 provides information on
configuring VMDirectPath.
The following features are not available for a VM configured with VMDirectPath, as the VMkernel
is configured without the respective device under its control when passed to a VM:
l vMotion
l Storage vMotion
l Fault Tolerance
l Device hot add (CPU and memory)
l Suspend and resume
l VADP Hotadd transport mode (when used as virtual proxy)
Note: If using VMDirectPath in a NetWorker VADP virtual proxy host, then the transport
modes are limited to either NBD or NBDSSL. This is due to a VMware limitation.
The following technical note provides additional information on VMDirectPath:
http://www.vmware.com/pdf/vsp_4_vmdirectpath_host.pdf
– When using multiple proxies to backup via NBD/NBDSSL, then the client parallelism on
each VADP proxy should be calibrated such that the total concurrent disk connections
per cluster does not exceed 20.
Note: In the following examples, the backup group parallelism would take effect only
if the VADP proxy host client parallelism is set to an equal or higher number.
One proxy in the environment, all VMs on the same ESX (no cluster)
In the following example, there is a single proxy in the environment and 11 VMs need to be backed
up via NBD/NBDSSL. All 11 VMs are hosted on the same ESX, which is not part of a cluster, and
both of these jobs have to be run at the same time:
l 8 VMs from ESX contains 2 disks disk.
l 3 VMs from same ESX contains 3 disks each.
Use one of the following best practices:
l Set the client parallelism of the proxy to 8.
l Create a single backup group containing all 11 VMs from the given ESX and set the group
parallelism to 8.
Either of the above would ensure that at any given time, the maximum number of disks being
backed up from that ESX will not exceed 20.
Two proxies in the environment, all VMs on the same ESX on DRS-disabled cluster
In the following example, there are two proxies in the environment to back up 11 VMs via NBD/
NBDSSL. All 11 VMs are hosted on the same ESX, which is part of a DRS-disabled cluster, and both
of these jobs have to be run at the same time:
l Proxy1 has been assigned to backup 8 VMs, each VM contains 2 disks.
l Proxy2 has been assigned to backup 3 VMs, each VM contains 3 disks.
Use one of the following best practices:
l Set the client parallelism of Proxy1 and Proxy2 to 5 and 2 respectively.
l Create a single backup group containing all 11 VMs from the given ESX and set the group
parallelism to 8.
Either of the above would ensure that at any given time, the maximum number of disks being
backed up from that ESX will not exceed 20.
Two proxies in the environment, all VMs hosted on DRS-enabled cluster
In the following example, there are two proxies in the environment to back up 11 VMs via NBD/
NBDSSL. All 11 VMs are hosted on one DRS-enabled cluster:
l Proxy1 has been assigned to backup 8 VMs, each VM contains 2 disks.
l Proxy2 has been assigned to backup 3 VMs, each VM contains 3 disks.
Both these jobs have to be run at the same time.
Use one of the following best practices:
l Set the client parallelism of Proxy1 and Proxy2 to 5 and 2 respectively.
l Create a single backup group containing all 11 VMs from the given cluster and set the group
parallelism to 8.
Either of the above would ensure that at any given time, the maximum number of disks being
backed up from that cluster will not exceed 20.
This appendix describes how to protect the vCenter server Appliance (VCSA) and the Platform
Services Controllers (PSC). It is intended for virtual administrators who utilize the distributed
model of the vCenter server and require protection of the complete vCenter server infrastructure.
l It is recommended to schedule the backup of the vCenter server when the load on the vCenter
server is low, such as during off-hours, to minimize the impact of vCenter virtual machine
snapshot creation and snapshot commit processing overhead.
l Ensure that there are no underlying storage problems that might result in long stun times.
l Keep the vCenter virtual machine and all of its component virtual machines in one single
isolated protection policy. The protection policy should not be shared with any other virtual
machines. This is to ensure that the backup times of all vCenter Server component virtual
machines are as close to each other as possible.
l Ensure that the backup start time of the vCenter Server does not overlap with any operations
for other protected virtual machines being managed by this vCenter so that there is no impact
on other protected virtual machines during snapshot creation and snapshot commit of the
vCenter virtual machine.
l If the vCenter Server and Platform Services Controller instances fail at the same time, you
must first restore the Platform Services Controller and then the vCenter Server instances.
1. Create a policy, and then add the vCenter virtual machine (VC VM) group to the policy.
2. Select the full virtual machine and not individual disks.
3. Run the scheduled or on-demand (ad-hoc) policy.
Recovery
Depending on the type of failure, you can perform the virtual machine recovery by using one of the
following methods.
l Restore to original (Revert a virtual machine) — This method is valid only when the vCenter
Server Appliance (VCSA) is intact and running, but corrupted.
l Recover as a new virtual machine to a managed ESXi server (Virtual Machine Recovery) —
Use this method if you have completely lost your VCSA. Note that this vCenter must be
registered with NetWorker.
l Emergency recovery to an ESXi server — Emergency recovery will be the main use case, and
so the following steps describe how to perform the restore using the Emergency Recovery
option.
Procedure
1. In the NMC NetWorker Administration Recover window, select Recover > New from the
main menu.
The Recover Configuration wizard opens on the Select the Recovery Type page. Virtual
Machine Recovery is the second option displayed in the Recovery Type pane.
2. In the Select the Recovery Type page, select Virtual Machine Recovery, and then select a
vCenter server to recover from using the Source vCenter server drop-down. Click Next.
3. In the Select the Virtual Machine to Recover page, enter the name of the source virtual
machine(s) to recover from, or perform a search for the virtual machine. Additionally, you
can use the tabs on this page to choose a single virtual machine or multiple virtual machines
from a selected backup, or browse the source vCenter to determine the required virtual
machine source. After selecting the desired virtual machine(s), click Next.
4. In the Select the Target Backups page, select the virtual machine backup(s) you want to
restore from the Available Backups pane. This pane lists both primary backups and, if
available, clone copies. If you selected recovery from multiple virtual machines, you can
switch between virtual machines to browse each machine's available backups by using the
Virtual Machine Name drop-down. Click Next.
5. In the Select the Virtual Machine Recovery method page, select Emergency recovery,
and then click Next.
6. In the Configure the Emergency Recovery page, specify the target ESXi server in the
vCenter environment, and then click Connect. The Proxy Selection and Recovery Data
panes get populated with the ESXi server details
7. In the Proxy Selection pane, if a proxy is not discovered, add a new proxy which is deployed
in vCenter but not added to NetWorker.
8. For the disks in the Recovery Data pane, select a datastore, and then optionally, select the
Power on virtual machine and Reconnect to network options. Click Next.
9. In the Select Alternate Recovery Sources page, select the original disk backup or select a
clone copy if one is available. If recovering from a clone that is not on a Data Domain device,
or recovering from a Data Domain Cloud Tier device, specify the staging pool. Click Next.
10. In the Perform the Recovery page, specify a name for the recovery and check the
summary at the bottom of the page to ensure all the details are correct, and then click Run
Recovery.
11. After the recovery operation, wait until the virtual machine restarts, and then log into the
vCenter Server Appliance shell as root
12. Verify that all PSC and vCenter services are running.
l For an appliance, run the service-control --status --all command in the appliance
shell.
l For a vCenter installed on Windows, from the Windows Start menu, select Control
Panel > Administrative Tools > Services.
After you finish
During an Emergency Recovery, the vProxy gets associated with the ESXi host and is unavailable
for other operations on the vCenter server. Wait until the recovery completes before initiating any
other operations on the vProxy.
Recovery
Depending on the failure, you can perform virtual machine recovery by using one of the following
methods:
l Restore to original — This method is valid only when the VCSA is intact and running, but
corrupted.
l Recover as a new virtual machine to a managed ESXi server: Use this method of you have
completely lost your VCSA. Note that this vCenter must be registered with NetWorker.
l Emergency recovery to an ESXi server. For Emergency recovery, perform the steps specified
in the section Restore an embedded PSC with Emergency Recovery.
Note: In the event of a complete environment failure, PSC should be restored first, followed by
the vCenter server restore.
The following scenarios provide specific instructions based on the number of vCenter server
appliances and external PSCs in the environment and the extent of the failure.
vCenter server appliance(s) with one external PSC where PSC fails
Procedure
1. Perform an image-level recovery of the PSC by using one of the methods indicated above,
and then power ON the virtual machine.
2. Verify that all PSC services are running.
l For a PSC deployed as an appliance, run the service-control --status --all
command in the appliance shell.
l For a PSC installed on Windows, from the Windows Start menu, select Control Panel >
Administrative Tools > Services.
3. Log into the vCenter server appliance shell as root.
4. Verify that no vCenter services are running, or stop any vCenter services that are running
by typing service-control --stop.
5. Run the vc-restore script to restore the vCenter virtual machines.
l For a vCenter server appliance, type vcenter-restore -u
psc_administrator_username -p psc_administrator_password
l For a vCenter Server installed on Windows, go to C:\Program Files\VMware
\vCenter Server\, and then run vcenter-restore -u
psc_administrator_username -p psc_administrator_password
vCenter server appliance with multiple PSCs where one PSC is lost, one remains
Procedure
1. Repoint the vCenter instance (insert link) to one of the functional PSC in the same SSO
domain.
Note: Log in to all vCenter servers one by one to determine which vCenter log in fails.
This will be the vCenter that requires the repoint steps.
Procedure
1. Restore the most recent PSC backup and wait for the vCenter services to start
2. Log in to the vCenter server appliance's shell as root.
3. Verify that no vCenter services are running, or stop vCenter services.
4. Run the vc-restore script to restore the VCSA (refer above for detailed steps).
Note: If the login test to any vCenter server appliance fails, then the restored PSC is not
the PSC that the vCenter server appliance is pointing to, in which case you may be
required to perform a repoint, as described above.
5. Deploy the new PSC and join to an active node in the same SSO domain and site.
6. Repoint vCenter connections as required
Additional considerations
Review the following additional considerations when backing up and restoring the vCenter server
and PSC.
l Backing up the vCenter server will not save the Distributed switch (vDS) configuration as it is
stored on the hosts. As a best practice, back up the vDS configuration by using a script that
can be used after restoring the virtual center.
l After restoring the PSC, verify that replication has been performed as designed by using the
following commands to display the current replication status of a PSC and any of the
replication partners of the PSC:
n For VCSA, go to /usr/lib/vmware-vmdir/bin and type ./vdcrepadmin -f
showpartnerstatus -h localhost -u administrator -w Administrator_Password
n For Windows, open a command prompt and type cd "%VMWARE_CIS_HOME%"\vmdird\
l For the vCenter server or PSC, do not select advanced quiesce-based backup options.
Selecting these options will result in application quiescing on virtual machines, which impacts
the overall environment due to stunning.
The VMware vCenter server documentation, available at https://docs.vmware.com/en/VMware-
vSphere/index.html, provides more information about the vCenter server and PSC.
Command reference
Use the following command to start or stop services in the vCenter server/PSC, or obtain the
status:
service-control -status/start/stop -all
You can use other Replication topology commands, as in the following example.
/usr/lib/vmware-vmdir/bin/vdcrepadmin -f showpartners -h
localhost -u PSC_Administrator -w password
Note: You can replace localhost with another PSC FQDN to obtain all of the
partnerships in the current vSphere domain.
3. Review the Rollback tab and confirm that the latest validated checkpoint is less than 24
hours old.
Note: It is important that the checkpoint is validated, if the latest validated checkpoint is
older than 24 hours, you should open a S1 service request with NetWorker support
immediately.
4. Log into the VBA via SSH as user admin and take a manual checkpoint by running the
command mccli checkpoint create --override_maintenance_scheduler
5. Use the mccli command to verify that you have successfully created a checkpoint by
running: mccli checkpoint show
6. Use the mccli command to validate the checkpoint: mccli checkpoint validate --
cptag=cp.20130206170045 -- override_maintenance_scheduler
Note: Validation takes some time to complete. You should continue to check the status
by running mccli checkpoint show.
The VBA may take 10-15 minutes to correctly shutdown. If there are issues during the
reboot, a service request should be opened with NetWorker support.
Prerequisites
Domain Name System (DNS) resolution is critical for NetWorker deployment and configuration. All
infrastructure components should be resolvable through a fully qualified domain name (FQDN).
This is especially important for the NetWorker Server, NetWorker vProxy, Data Domain appliance,
and CloudBoost appliance. Resolvable means that components are accessible through both
forward (A) and reverse (PTR) look-ups.
Review the following prerequisites prior to configuring NetWorker in a VMware Cloud on AWS.
Also, ensure that you plan your firewall according to these prerequisites.
VMware Cloud on AWS web portal console
In the VMware Cloud on AWS web portal console, note the following requirements:
l If using NSX-T, configure the DNS to resolve to the internal IP address of the vCenter server.
Navigate to SDDC Management > Settings > vCenter FQDN and select the Private vCenter
IP address so that you can directly access the management network over the built-in firewall.
Additionally, ensure that you open TCP port 443 of the vCenter server in both the
management gateway and the compute gateway.
l By default, there is no external access to the vCenter Server system in your SDDC (Software
Defined Data Center). You can open access to your vCenter Server system by configuring a
firewall rule. Set the firewall rule in the compute gateway of VMware Cloud on AWS to enable
communication to the vCenter public IP address from the desired logical network of your
SDDC. The NetWorker server will not allow you to add the vCenter Server if this firewall rule is
not configured in the SDDC.
l The default compute gateway firewall rules prevent all virtual machine traffic from reaching
the internet. To allow your NetWorker Server virtual machine to connect to the internet, you
need to create a compute gateway firewall rule to allow outbound traffic on the logical network
that your NetWorker Server virtual machine is connected to.
l Configure DNS to allow machines in your SDDC to resolve fully-qualified domain names
(FQDNs) to IP addresses belonging to the internet. The NetWorker Server will not allow you to
add the vCenter Server using the server's public FQDN or IP address if the DNS server is not
configured in your SDDC.
l It is recommended that you deploy the Data Domain system as a virtual appliance in the
Amazon VPC (Virtual Private Cloud) of your choice. During the SDDC creation, ensure that
you connect your SDDC to an AWS account, and select a VPC and subnet within that account.
l The Data Domain system running in your Amazon VPC must be connected to your VMware
SDDC by using the VMware Cloud Elastic Network Interfaces (ENIs), allowing your SDDC and
services in the AWS VPC and subnet in your AWS account to communicate without requiring
the routing of traffic through the internet gateway. The same ENI channel is recommended for
access to Data Domain systems (for the vProxy solution) and access to cloud object storage
(for the CloudBoost solution). Detailed steps on configuring ENI are provided by VMware at
https://vmc.vmware.com/console/aws-link.
l Ensure that you configure the inbound and outbound firewall rules of your compute gateway
for Data Domain connectivity if DDVE is running in your Amazon VPC.
Amazon AWS web portal
In the AWS web portal, note the following requirements:
l Configure the inbound and outbound firewall rules of your Amazon VPC security group to
provide connectivity between the VMware SDDC compute gateway and Data Domain
connectivity if Data Domain is running in your Amazon VPC.
l If cloning from one Data Domain system to another, ensure that you configure the inbound rule
for the security group in AWS to allow all traffic from the respective private IPs of Data
Domain Virtual Editions running in your Amazon VPC.
l If you have more than one Data Domain running in AWS to perform cloning, then ensure that
both Data Domain systems can ping each other using the FQDNs.
vCenter server inventory
In the vCenter Server inventory of your SDDC, note the following requirements:
l An internal DNS name lookup server must be running inside the vCenter inventory. This will be
referenced by all the workloads running in the VMware SDDC.
l The internal DNS server must have Forwarders enabled to access the internet. This is required
in order to resolve the vCenter Server's public FQDN
9. On the License agreements window, review and accept the EULA, and then click Next.
10. On the Select storage window, select the disk format and the destination datastore where
the virtual appliance files will be stored, and then click Next.
It is recommended that you select Thick Provision Lazy Zeroed to ensure that amount of
storage space allocated to the virtual appliance is available.
11. On the Select networks window, select the Destination Network. Provide the IP address
in the text box and click Next.
12. On the Customize template window, expand Networking properties, and then specify the
following attributes:
a. In the Network IP address field, specify the IP address for the vProxy appliance.
b. In the Default gateway field, specify the IP address of the gateway host.
c. In the Network Netmask/Prefix field, specify the netmask for an IPv4 Network IP
address.
d. In the DNS field, specify the IP address of the DNS servers, separated by commas.
e. In the FQDN field, specify the fully qualified domain name of the vProxy appliance.
13. Expand Timezone settings, and then perform the following tasks:
a. in the Timezone setting field, select the time zone.
b. SSH into the vProxy appliance using root credentials and run the following
command: /usr/bin/timedatectl set-timezone new-timezone.
Note: To set a time zone outside of the list supported by the vProxy appliance, you need
to change the time zone manually.
14. Expand Password settings, and then perform the following tasks:
a. In the Root password field, specify a new password for the root account.
b. In the Admin password field, specify a new password for the admin account.
Note: The passwords for the root and admin account should be between 8 and 20
characters in length. Specifying a new password is mandatory when deploying the
vProxy using vCenter, otherwise the vProxy appliance fails to power on. Ensure that
you change the default passwords of both the root and admin account during
deployment.
l When deploying or configuring the NetWorker Server or vProxy, ensure that you specify the
DNS server IP that points to the internal DNS server running in the vCenter inventory.
l Ensure that both forward and reverse lookup entries in the internal DNS server are in place for
all of the required components, such as the NetWorker Server, NetWorker vProxy appliance,
Data Domain Virtual Edition (DDVE), and CloudBoost appliance.
l When adding the vCenter Server to NMC's VMware View, ensure that you select the
Deployed in Cloud checkbox. Note that this setting is required for any vCenter Servers
running in VMware Cloud on AWS, If you do not select this option, then some NetWorker
operations will fail in the VMware Cloud on AWS.
Figure 96 Add a vCenter Server to VMware View with Deployed in Cloud enabled
l Add the vCenter Server to the NetWorker Server using either the public FQDN of the vCenter
Server or the public IP address of the vCenter Server. It is recommended to use the FQDN.
l When adding the vCenter Server to the NetWorker Server, specify the login credentials for the
cloudadmin user
l When configuring the vProxy in the NetWorker Server, set the Maximum NBD sessions for
the vProxy to zero. VMware Cloud on AWS does not support NBD transport mode.
Limitations
Before configuring NetWorker VMware Protection in VMware Cloud on Amazon Web Services
(AWS), review the following limitations.
VMware Cloud on AWS with SDDC version 1.8
The vProxy restores as new VM using NetWorker Management Console and NetWorker
HTML5 Admin Console fail with errors stating that the vProxy is unable to register the VM
onto the destination. This issue is not seen if you are using VMware Cloud on AWS version 1.7
or earlier.
The restore log displays:
To fix the issue, you should manually add vcenter permission to the desired "VMs and
Templates" folder that the restored VM has to be stored. The target VM folder should be
associated with permissions as follows "user=cloudadmingroup" and "role=cloudadmin",
and enable "propogate to children". After the permission is added manually, NetWorker
NMC and NWUI will display the desired folder. If correct folder is chosen in the UI, then the
restore as new VM will be successful.
When restoring as new VM, the reconnect NIC option may not work correctly
Edit settings of the restored new VM and change the network to "VM Network" and then
click Apply. Reopen the edit setting configuration pane of the VM, and change the network to
the correct desired NSX-T network logical switch and then click Connect.
Composites
xy x followed by y
x|y x or y (prefer x)
Repetitions
x{n} exactly n x
x{n}? exactly n x
Note: The counting forms x{n,m}, x{n,}, and x{n} reject forms that create a minimum or
maximum repetition count above 1000. Unlimited repetitions are not subject to this restriction.
Grouping
Flags
\A at beginning of text
\z at end of text
Escape sequences
\a bell ( ≡ \007 )
\n newline ( ≡ \012 )
Escape sequences
x single character
[\d] digits ( ≡ \d )
\d digits ( ≡ [0-9] )
\s whitespace ( ≡ [\t\n\f\r ] )
C other
Cc control
Cf format
Co private use
Cs surrogate
L letter
Ll lowercase letter
Lm modifier letter
Lo other letter
Lt titlecase letter
Lu uppercase letter
M mark
Mc spacing mark
Me enclosing mark
Mn non-spacing mark
N number
Nd decimal number
Nl letter number
No other number
P punctuation
Pc connector punctuation
Pd dash punctuation
Pe close punctuation
Pf final punctuation
Pi initial punctuation
Po other punctuation
Ps open punctuation
S symbol
Sc currency symbol
Sk modifier symbol
Sm math symbol
So other symbol
Z separator
Zl line separator
Zp paragraph separator
Zs space separator
\D not \d VIM
\W not \w VIM
NetWorker 19.1 and later does not support the VMware Backup appliance (VBA) solution. If you
have VBA backups from previous Networker releases, you can recover those backups from the
NetWorker Management Web UI by using the vProxy, however, the recovery types available in
this UI are limited to a Revert or New Virtual Machine restore. For other recovery types, such as
VMDK-level, you can continue to use the vSphere Web Client EMC Backup and Recovery user
interface.
Network address translation (NAT) is not supported for VMware Backup Appliance configuration.
When configuring a network for the VMware Backup Appliance and the vCenter server, do not
modify the network address information by using NAT or other configuration methods such as
firewall, IDS, or TSNR. When these unsupported methods are deployed as part of the virtual
network, some VMware Backup Appliance functionality might not work as designed.
This appendix includes the following topics:
2. In EMC Backup and Recovery, on the Restore tab, use the Restore points from drop-
down to select the appliance from which you want to restore.
EMC Backup and Recovery displays the virtual machines that are available to restore.
3. Click the virtual machine that you want to restore to expand its backups.
Use the Filter drop-down to display a specific VM and related items. You can also click a
backup to display the VMDK level and select a single VMDK for restore, if you only want to
restore that disk.
Results
When the recovery starts, a recovery session also displays in NMC. Any activities that occur on
the vCenter side are visible on the NMC side.
l The free space on the Data Domain system must be equal to or greater than the total disk size
of the VM being restored, as the restore does not take into account the actual space required
after deduplication occurs. If there is insufficient disk space, an error appears indicating
"Insufficient disk space on datastore," and creation of the target VM fails.
l You cannot use the Instant Access button when you select more than one different Data
Domain system backup for multiple VMs.
l You can perform only one Instant Access restore at a time. Ensure that you vMotion the VM
to a different datastore and that you unmount the datastore before performing another instant
access restore for the Data Domain system.
l You cannot recover multiple save sets concurrently using Instant Access restore.
Procedure
1. In the EMC Backup and Recovery user interface, select the Restore tab.
EMC Backup and Recovery displays the virtual machines that are available to restore.
2. Click a virtual machine to expand the list of available backups, from which to restore.
Note: You cannot browse and select backup data at the disk level.
3. Select the backup that you want to restore, and click Instant Access.
The Instant Access wizard opens to the Select Backup page.
Figure 99 Select a backup
4. Verify that the list of backups is correct, remove any backups that you want to exclude from
the restore, and click Next.
The Set Instant Access Options page displays.
5. Specify a new name and destination for the restore, and click Next.
The Ready to complete page displays.
Figure 101 Ready to complete
This glossary contains terms related to disk storage subsystems. Many of these terms are used in
this manual.
Backup proxy The system designated as the off-host backup system. This is a host with NetWorker
client package installed and the VADP software.
changed block tracking A VMkernel feature that keeps track of the storage blocks of virtual machines as they
change over time. The VMkernel keeps track of block changes on virtual machines,
which enhances the backup process for applications that have been developed to take
advantage of VMware’s vStorage APIs.
checkpoint A system-wide backup, taken only after 24 hours (and at the time of the checkpoint
after that first 24 hours have elapsed), that is initiated within the vSphere Web Client
and captures a point in time snapshot of the EMC Backup and Recovery appliance for
disaster recovery purposes.
client Host on a network, such as a computer, workstation, or application server whose data
can be backed up and restored with the backup server software.
client file index Database maintained by the NetWorker server that tracks every database object, file,
or file system backed up. The NetWorker server maintains a single index file for each
client computer. The tracking information is purged from the index after the browse
time of each backup expires.
EMC Backup and The EMC Backup and Recovery appliance (or VMware Backup Appliance) is an
Recovery Appliance appliance that, when deployed, enables VMware backup and clone policy creation in
NMC, and enables the EMC Backup and Recovery plug-in in the vSphere Web Client to
assign VMs to those policies.
EMC Data Protection A browser that allows for file-level restores, where specific folders and files are
Restore Client restored to the original virtual machine on Windows and Linux virtual machines.
file-level restore (FLR) Allows local administrators of protected virtual machines to browse and mount
backups for the local machine. From these mounted backups, the administrator can
then restore individual files. FLR is accomplished using the EMC Data Protection
Restore Client. See “Using File Level Restore” on page 63 for additional information on
FLR.
hotadd A transport mode where the backup related I/O happens internally through the ESX
I/O stack using SCSI hot-add technology. This provides better backup I/O rates than
NBD/NBDSSL.
inactivity timeout Time in minutes to wait before a client is considered to be unavailable for backup.
JAR (Java Archive) A file that contains compressed components needed for a Java applet or application.
managed application Program that can be monitored or administered, or both from the Console server.
media database Database that contains indexed entries of storage volume location and the life cycle
status of all data and volumes managed by the NetWorker server.
metadata VSS-defined information that is passed from the writer to the requestor. Metadata
includes the writer name, a list of VSS components to back up, a list of components to
exclude from the backup, and the methods to use for recovery. See writer and See
VSS component.
NBD A transport mode over LAN that is typically slower than hotadd mode. In NBD mode,
the CPU, memory and I/O load gets directly placed on the ESX hosting the production
VMs, since the backup data has to move through the same ESX and reach the proxy
over the network. NBD mode can be used either for physical or virtual proxy, and also
supports all storage types.
NBDSSL A transport mode that is the same as NBD except that the data transferred over the
network is encrypted. Data transfer in NBDSSL mode can therefore be slower and use
more CPU due to the additional load on the VADP host from SLL encryption/
decryption.
NetWorker administrator NetWorker server user who may add, change, or delete NetWorker server users.
NetWorker Management Software program that is used to manage NetWorker servers and clients. The NMC
Console (NMC) server also provides reporting and monitoring capabilities for all NetWorker processes.
NetWorker server Computer on a network that runs the NetWorker server software, contains the online
indexes, and provides backup and restore services to the clients and storage nodes on
the same network.
online indexes Databases located on the NetWorker server that contain all the information pertaining
to the client backups (client file index) and backup volumes (media index).
Open VM Tools Open VM Tools (open-vm-tools) is the open source implementation of VMware Tools
for Linux guest operating systems.
recover To restore data files from backup storage to a client and apply transaction (redo) logs
to the data to make it consistent with a given point-in-time.
SAN (storage area A transport mode that, when used, completely offloads the backup related CPU,
network) memory or I/O load on the virtual infrastructure. The backup I/O is fully offloaded to
the storage layer where the data is read directly from the SAN or iSCSI LUN. SAN
mode requires a physical proxy.
save NetWorker command that backs up client files to backup media volumes and makes
data entries in the online index.
save set 1. Group of tiles or a file system copied to storage media by a backup or snapshot
rollover operation.
2. NetWorker media database record for a specific backup or rollover.
single step backup and See image level backup and recovery.
recovery
storage node Computer that manages physically attached storage devices or libraries, whose backup
operations are administered from the controlling NetWorker server. Typically a
“remote” storage node that resides on a host other than the NetWorker server.
update enabler Code that updates software from a previous release. It expires after a fixed period of
time.
VADP An acronym for vStorage APIs for Data Protection. VADP enables backup software to
perform centralized virtual machine backups without the disruption and overhead of
running backup tasks from inside each virtual machineVADP supersedes the VCB
framework for VMware backups.
vCenter An infrastructure management tool that provides a central point for configuring,
provisioning, and managing virtualized IT environments, and is part of the VMware
Virtual Infrastructure package.
Virtual machine Software that creates a virtualized environment between the computer platform and
its operating system, so that the end user can install and operate software on an
abstract machine.
VMDK Virtual Machine Disk (VMDK) is a file or set of files that appears as a physical disk drive
to a guest operating system. These files can be on the host machine or on a remote file
system. These files are commonly called VMDK files because of the .vmdk extension
that VMware adds to these files.
VMware Backup The VMware Backup Appliance (or EMC Backup and Recovery appliance) is an
Appliance appliance that, when deployed, enables VMware backup and clone policy creation in
NMC, and enables the EMC Backup and Recovery plug-in in the vSphere Web Client to
assign VMs to those policies.
VMware Tools Installed inside each virtual machine, VMware Tools enhance virtual machine
performance and add additional backup-related functionality.
VSS (Volume Shadow Microsoft technology that creates a point-in-time snapshot of a disk volume.
Copy Service) NetWorker software backs up data from the snapshot. This allows applications to
continue to write data during the backup operation, and ensures that open files are not
omitted.
writer Database, system service, or application code that works with VSS to provide
metadata about what to back up and how to handle VSS components and applications
during backup and restore. See VSS (Volume Shadow Copy Service).