EMC Avamar for Vmware User Guide

EMC Avamar for Vmware User Guide

Dell EMC Avamar for VMware User Guide 18.1 Dell Inc. June 2020 Rev. 06 Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2001 - 2020 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners. Contents Figures.......................................................................................................................................... 7 Tables............................................................................................................................................8 Preface..........................................................................................................................................9 Chapter 1: Introduction.................................................................................................................. 13 Data protection overview....................................................................................................................................................13 Image backup..................................................................................................................................................................13 Guest backup..................................................................................................................................................................15 Considerations................................................................................................................................................................ 16 Changed block tracking....................................................................................................................................................... 17 Image backup virtual machine quiescing........................................................................................................................... 17 Image backup and recovery support in Amazon Web Services (AWS)........................................................................18 Chapter 2: Configuration and Setup................................................................................................ 19 Best practices.......................................................................................................................................................................19 (Optional) Configuring support for multiple vCenters.....................................................................................................19 Installing Avamar Administrator software........................................................................................................................ 20 Configuring vCenter-to-Avamar authentication............................................................................................................. 20 Adding vCenter authentication certificates to the MCS keystore.......................................................................... 21 Disabling MCS certificate authentication....................................................................................................................21 Creating a dedicated vCenter user account....................................................................................................................22 Adding a vCenter client...................................................................................................................................................... 24 Auto-discovery of virtual machines...................................................................................................................................25 Configuring domain mapping rules for VM auto-discovery......................................................................................25 Creating a rule................................................................................................................................................................25 Deploying proxies.................................................................................................................................................................26 Proxy Deployment Manager.........................................................................................................................................27 Deploying proxies with Proxy Deployment Manager................................................................................................ 28 Upgrading proxies................................................................................................................................................................29 Upgrading Avamar proxies from release 7.2 or newer..............................................................................................30 Upgrading Avamar proxies from releases prior to release 7.2................................................................................. 30 Maintaining proxies..............................................................................................................................................................33 Reregistering a proxy with an Avamar server............................................................................................................33 Changing the proxy guest operating system admin password................................................................................34 Changing the proxy guest operating system root password...................................................................................34 Additional Avamar server configuration............................................................................................................................34 Configuring automatic proxy selection....................................................................................................................... 34 Configuring the MCS to support both guest and image backup............................................................................ 35 Chapter 3: Administration..............................................................................................................36 Clients and containers.........................................................................................................................................................36 Contents 3 Dynamic versus static containers................................................................................................................................36 Dynamic container behavior.........................................................................................................................................36 How independent and container protection interact................................................................................................ 37 Icons which represents VMware entity type and state............................................................................................37 Adding clients and containers............................................................................................................................................ 38 Editing clients and containers............................................................................................................................................ 39 Viewing protected virtual machines..................................................................................................................................40 Viewing a replicated virtual machine name...................................................................................................................... 40 Monitoring the vCenter connection..................................................................................................................................40 Manually synchronizing Avamar Administrator with a vCenter......................................................................................41 Renaming a vCenter client..................................................................................................................................................41 VMware Image Dataset...................................................................................................................................................... 42 Adding guest backup throttling parameters to a dataset.............................................................................................. 42 Groups...................................................................................................................................................................................42 Default Proxy Group......................................................................................................................................................42 Default Virtual Machine Group.....................................................................................................................................42 Virtual machine and proxy relationships within groups.............................................................................................42 Changing proxy datastore and group assignments.........................................................................................................43

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    107 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us