
Dell EMC Avamar for VMware User Guide 18.1 Dell Inc. June 2020 Rev. 06 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2001 - 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. Contents Figures.......................................................................................................................................... 7 Tables............................................................................................................................................8 Preface..........................................................................................................................................9 Chapter 1: Introduction.................................................................................................................. 13 Data protection overview....................................................................................................................................................13 Image backup..................................................................................................................................................................13 Guest backup..................................................................................................................................................................15 Considerations................................................................................................................................................................ 16 Changed block tracking....................................................................................................................................................... 17 Image backup virtual machine quiescing........................................................................................................................... 17 Image backup and recovery support in Amazon Web Services (AWS)........................................................................18 Chapter 2: Configuration and Setup................................................................................................ 19 Best practices.......................................................................................................................................................................19 (Optional) Configuring support for multiple vCenters.....................................................................................................19 Installing Avamar Administrator software........................................................................................................................ 20 Configuring vCenter-to-Avamar authentication............................................................................................................. 20 Adding vCenter authentication certificates to the MCS keystore.......................................................................... 21 Disabling MCS certificate authentication....................................................................................................................21 Creating a dedicated vCenter user account....................................................................................................................22 Adding a vCenter client...................................................................................................................................................... 24 Auto-discovery of virtual machines...................................................................................................................................25 Configuring domain mapping rules for VM auto-discovery......................................................................................25 Creating a rule................................................................................................................................................................25 Deploying proxies.................................................................................................................................................................26 Proxy Deployment Manager.........................................................................................................................................27 Deploying proxies with Proxy Deployment Manager................................................................................................ 28 Upgrading proxies................................................................................................................................................................29 Upgrading Avamar proxies from release 7.2 or newer..............................................................................................30 Upgrading Avamar proxies from releases prior to release 7.2................................................................................. 30 Maintaining proxies..............................................................................................................................................................33 Reregistering a proxy with an Avamar server............................................................................................................33 Changing the proxy guest operating system admin password................................................................................34 Changing the proxy guest operating system root password...................................................................................34 Additional Avamar server configuration............................................................................................................................34 Configuring automatic proxy selection....................................................................................................................... 34 Configuring the MCS to support both guest and image backup............................................................................ 35 Chapter 3: Administration..............................................................................................................36 Clients and containers.........................................................................................................................................................36 Contents 3 Dynamic versus static containers................................................................................................................................36 Dynamic container behavior.........................................................................................................................................36 How independent and container protection interact................................................................................................ 37 Icons which represents VMware entity type and state............................................................................................37 Adding clients and containers............................................................................................................................................ 38 Editing clients and containers............................................................................................................................................ 39 Viewing protected virtual machines..................................................................................................................................40 Viewing a replicated virtual machine name...................................................................................................................... 40 Monitoring the vCenter connection..................................................................................................................................40 Manually synchronizing Avamar Administrator with a vCenter......................................................................................41 Renaming a vCenter client..................................................................................................................................................41 VMware Image Dataset...................................................................................................................................................... 42 Adding guest backup throttling parameters to a dataset.............................................................................................. 42 Groups...................................................................................................................................................................................42 Default Proxy Group......................................................................................................................................................42 Default Virtual Machine Group.....................................................................................................................................42 Virtual machine and proxy relationships within groups.............................................................................................42 Changing proxy datastore and group assignments.........................................................................................................43
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages107 Page
-
File Size-