Dell DL1000 Appliance Deployment Guide
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.
Contents 1 Introducing your Dell DL1000............................................................................ 5 Dell DL1000 core technologies............................................................................................................ 5 Live Recovery................................................................................................................................... 5 Universal Recovery.........................................................................................
3 Configuring your Dell DL1000......................................................................... 26 Configuration overview...................................................................................................................... 26 Resetting the operating system to default settings........................................................................... 26 Configuring browsers to remotely access the DL1000 Core Console............................................
Introducing your Dell DL1000 1 Your Dell DL1000 combines backup and replication into a unified data protection product. It provides reliable application data recovery from your backups to protect virtual machines and physical machines. Your appliance is capable of handling up to terabytes of data with built-in global deduplication, compression, encryption, and replication to specific private or public cloud infrastructure.
True Global Deduplication True Global Deduplication eliminates redundant or duplicate data by performing incremental block-level backups of the machines. The typical disk layout of a server consists of the operating system, application, and data. In most environments, the administrators often use a common version of the server and desktop operating system across multiple systems for effective deployment and management.
Dell DL1000 Smart Agent The Smart Agent is installed on the core-protected machine. The Smart Agent tracks the changed blocks on the disk volume and then snaps an image of the changed blocks at a predefined interval of protection. The incremental block-level snapshots’ forever approach prevents repeated copying of the same data from the protected machine to the Core. After the agent is configured, it uses smart technology to track the changed blocks on the protected disk volumes.
Replication begins with seeding: the initial transfer of deduplicated base images and incremental snapshots of the protected machines, which can add up to hundreds or thousands of gigabytes of data. Initial replication can be seeded to the target core using external media. This is typically useful for large sets of data or sites with slow links. The data in the seeding archive is compressed, encrypted and deduplicated.
site or a managed service provider for off-site recovery. A basic local deployment consists of a backup server called the Core and one or more protected machines known as the agents. The off-site component is enabled using replication that provides full recovery capabilities in the disaster recovery site. The DL1000 Core uses base images and incremental snapshots to compile recovery points of protected agents.
Figure 3. DL1000 Multi—Core Deployment Architecture Other information you may need NOTE: For all Dell OpenManage documents, go to Dell.com/openmanagemanuals. NOTE: Always check for updates on Dell.com/support/home and read the updates first because they often supersede information in other documents. NOTE: For any documentation related to Dell OpenManage Server Administrator, see Dell.com/ openmanage/manuals.
Installing your Dell DL1000 2 Introduction The DL Backup to Disk Appliance allows: • Faster backups, as well as quicker recovery scenarios over conventional tape devices and backup methodologies • Optional deduplication capability • Continuous data protection for data center and remote office servers • Quick and easy deployment experience that reduces the time required to begin protecting critical data Available configurations The DL appliance comes in the following configurations: Table 1.
To install the DL1000 follow these steps: 1. Obtain the permanent license key. From the Core Console, you can manage your DL1000 licenses directly, change the license key, and contact the license server. You can also access the Rapid Recovery License Portal from the Licensing page in the Core Console. NOTE: The appliance is configured and shipped with a 30 day temporary software license. 2. Review installation prerequisites. 3. Setting up the hardware. 4.
Setting up the hardware The appliance ships with a single DL1000 system. Before setting up the appliance hardware, see the Getting Started Guide for your system that shipped with the appliance. Unpack and set up the DL1000 Appliance hardware. NOTE: The software is pre-installed on the appliance. Any media included with the system must be used only in the event of a system recovery. To set up the DL1000 hardware: 1. Rack and cable the DL1000 system. 2. Turn on the DL1000 system.
Cabling the appliance Locate the Dell DL1000 Appliance Getting Started Guide that is shipped with the appliance and follow the instructions to attach the keyboard, mouse, monitor, power, and network cables to the DL1000 system. Connecting the Cable Management Arm (Optional) If the appliance includes a Cable Management Arm (CMA), locate the CMA Installation Instructions that shipped with the CMA kit and follow the instructions to install the CMA.
AppAssure Appliance Configuration Wizard CAUTION: Make sure you complete all the steps of AppAssure Appliance Configuration Wizard before performing any other task or change any settings on the Appliance. Do not make any changes through the Control Panel, use Microsoft Windows Update, update AppAssure software or install licenses, until the wizard is complete. The Windows update service is disabled temporarily during the configuration process.
• To assign the DNS server manually, select Use the following DNS server address and enter the following details: – Preferred DNS sever 8. – Alternate DNS server Click Next. The Configure hostname and domain setting page is displayed. For information on NIC teaming, see Teaming Network Adapters. Configuring host name and domain settings You must assign a host name for the appliance. It is recommended that you change the host name before starting backups.
NOTE: Deselect Configure SNMP on this appliance if you do not want to set up SNMP details and alerts on the appliance and skip to step 6. 2. In Communities, enter one or more SNMP community names. Use commas to separate multiple community names. 3. In Accept SNMP packets from these hosts, enter the names of hosts with which the appliance can communicate. Separate the host names with commas, or leave it blank to allow communication with all hosts. 4.
• Access and Management • Configuring Windows backup • Storage provisioning • Configuring Retention policy and update options NOTE: After you complete the Appliance configuration, you can either skip the wizard or continue performing Machine protection, Replication, Virtual Machine Exports/Standby. If you choose to skip the wizard, the Core Console launches automatically and you can perform machine protection, replication, and virtual machine Exports at the later stages.
The Registration page is displayed. Registration and Host settings Register your appliance with the appropriate license key to avail the features accordingly. It is recommended that you change the host name before starting backups. By default, the host name is the system name that the operating system assigns. NOTE: If you want to change the host name, it is recommended that you change the host name at this stage.
• • To enable system SNMP alerts, select Enable system SNMP alerts. 1. In SNMP Community, enter one or more SNMP community names. Use commas to separate multiple community names. 2. In SNMP Trap destinations, enter trap destinations and click Add. To enable software SNMP alerts, select Enable software SNMP alerts option. 1. In SNMP Community, enter one or more SNMP community names. Use commas to separate multiple community names. 2. In SNMP Trap destinations, enter trap destinations and click Add.
3. Option Description Monthly Backs your configuration settings every month beginning every Sunday at 12:01 AM Click Next. The Storage Provisioning page is displayed. Storage provisioning Your appliance allows you to provision its internal storage to create Virtual disks (VDs) to host repositories and Virtual Standby, archives or other purposes. 1. On the Storage Provisioning page, select the following configuration options for your storage.
Table 2. Schedule options for default retention policy Text Box Description Keep all recovery points for n [retention time period] Enter a number to represent the retention period and then select the time period. The default is 3 days. Specifies the retention period for the recovery points. You can choose from: Days, Weeks, Months, or Years …and then keep one recovery point per hour for n [retention time period] Provides a more granular level of retention.
The appliance settings are applied. Rapid Appliance Self Recovery Rapid Appliance Self Recovery (RASR) is a bare metal restore process where the operating system drives are rebuilt to the default factory image. Creating the RASR USB key To create a RASR USB key: 1. Navigate to the Appliance tab. 2. Using the left pane navigation, select Appliance → Backup. Create RASR USB Drive window is displayed. NOTE: Insert a 16 GB or larger USB key before attempting to create the RASR key. 3.
8. Click Next. The Prerequisites check screen is displayed. NOTE: Ensure all the hardware and other prerequisites are checked before performing the RASR. 9. Click Next. The Recovery Mode Selection screen is displayed with three options: • System Recovery • Windows Recovery Wizard • Factory Reset 10. Select the Factory Reset option. This option will recover the operating system disk from the factory image. 11. Click Next.
2. To start the RUU process, run launchRUU.exe file in the RUU package. NOTE: Your system may reboot during the RUU update process.
Configuring your Dell DL1000 3 Configuration overview After completing the DL Appliance Configuration Wizard, perform the following procedures to ensure that your backup appliance and the servers that the appliance is backing up are correctly configured. Configuration includes tasks such as configuring browsers to remotely access the DL1000 Core Console, managing licenses, and setting up alerts and notifications.
NOTE: Ensure that the Internet Explorer Enhanced Security Configuration is turned on when you access the Core Web Console either locally or remotely. To turn on the Internet Explorer Enhanced Security Configuration, open Server Manager → Local Server → IE Enhanced Security Configuration option is displayed, ensure that it is On. Configuring browser settings in Internet Explorer and Chrome To configure browser settings in Internet Explorer and Chrome: 1.
Updating trusted sites in Internet Explorer To update the trusted sites in Internet Explorer: 1. Open Internet Explorer. 2. If the File, Edit View, and other menus are not displayed, press . 3. Click the Tools menu, and select Internet Options. 4. In the Internet Options window, click the Security tab. 5. Click Trusted Sites and then click Sites. 6. In Add this website to the zone, enter https://[Display Name], using the new name you provided for the Display Name. 7. Click Add. 8.
NOTE: You must also configure notification group settings, including enabling the Notify by email option, before email alert messages are sent. For more information on specifying events to receive email alerts, see Configuring Notification Groups For System Events in the Dell DL1000 Appliance User's Guide at Dell.com/support/home. To configure an email server and email notification template: 1. From the Core, select the Configuration tab. 2. From the Manage option, click Events. 3.
To change the number of concurrent streams: 1. Select the Configuration tab and then click Settings. 2. Select change in Transfer Queue. 3. Change Maximum Concurrent Transfers to a number between 10 and 15 for optimal performance, but if the performance seems unsatisfactory, try tuning it manually.
Preparing to protect your servers 4 Overview To protect your data using DL 1000, you need to add the workstations and servers for protection in the Core Console; for example, your Exchange server, SQL Server, your Linux server, and so on. In the Core Console, you can identify the machine on which an Agent is installed and specify which volumes, for example, a Microsoft Windows Storage Space, to protect.
The Protect Machine Wizard appears. 2. On the Welcome page, select the appropriate installation options: • • 3. If you do not need to define a repository or establish encryption, select Typical. If you need to create a repository, or define a different repository for backups for the selected machine, or if you want to establish encryption using the wizard, select Advanced (show optional steps).
3. If .NET components are missing or need to be upgraded, accept the prompts to download and install the framework. 4. In the language field, select the appropriate language and then click OK. 5. Choose from one of the following: • If this is the first time the Rapid Recovery Agent software is being installed on this machine, the installer prepares the installation, and then the Rapid Recovery Agent Installation Wizard appears. Proceed to Step 6.
When the installation is complete, the Completed page appears. Skip to Step 12. . 12. On the Completed page, if you see a message indicating that the system must be restarted before the installation takes effect, perform one of the following steps: • To restart now, select Yes, I want to restart my computer now. • To restart later, clear the Yes, I want to restart my computer now option. 13. On the Completed page, click Finish. The installer wizard closes, and the Agent installation is complete.
Deploying to machines on an Active Directory domain Use this procedure to simultaneously deploy the Rapid Recovery Agent software to one or more machines on an Active Directory domain. Before you begin this procedure, have the domain information and logon credentials for the Active Directory server on hand. 1. On the Rapid Recovery Core Console, click the Protect drop-down menu, and then click Deploy Agent Software. The Deploy Agent Software Wizard opens. 2. 3.
NOTE: All virtual machines must have VMware Tools installed; otherwise, Rapid Recovery cannot detect the host name of the virtual machine to which to deploy. In lieu of the host name, Rapid Recovery uses the virtual machine name, which may cause issues if the host name is different from the virtual machine name. 1. On the Rapid Recovery Core Console, click the Protect drop-down menu, and then click Deploy Agent Software. The Deploy Agent Software Wizard opens. 2.
About installing the Agent software on Linux machines When installing the Agent software on Linux machines that you want to protect, use the following guidance. After installation is complete, configure the Agent as described in the topic “Configuring the Rapid Recovery Agent on a Linux machine” in the Dell Data Protection | Rapid Recovery 6.0 Installation and Upgrade Guide. CAUTION: After configuring the newly installed Agent software on a Linux machine, restart the machine.
Mono (an open source, Ecma standard-compliant, .NET Framework-compatible tool set used for porting the Agent software to Linux platforms). For each package manager, you can run the appropriate command at the command line to determine if it is configured to download Rapid Recovery packages. These commands are listed in the following table. Table 7.
For more information about preparing for and installing the Agent software for a Linux machine that is not connected to the Internet, see the topic: • Installing the Agent software on offline Linux machines Before you begin installation of Agent software, see the topics: Downloading the Linux distribution, About security, Location of Linux Agent files, Agent dependencies, Linux scripting information in the Dell Data Protection | Rapid Recovery 6.0 Installation and Upgrade Guide.
• For SUSE Linux Enterprise Server: – The nbd-dkms requires: dkms, gcc, make, kernel-syms – The rapidrecovery-agent requires: dkms, kernel-syms, gcc, make, libblkid1, pam, pcre – The rapidrecovery-mono requires: glibc >= 2.11 Installing the Rapid Recovery Agent software on Debian or Ubuntu The Rapid Recovery Agent .deb file is an archive containing repository information specific to the apt package manager.
Installing the Rapid Recovery Agent software on SUSE Linux Enterprise Server The Rapid Recovery Agent .rpm file is an archive containing repository information for SUSE Linux Enterprise Server (SLES) . This distribution uses the zypper package manager. Complete the following steps to install the Rapid Recovery Agent on SLES. NOTE: This procedure applies to a Linux machine that is connected to the internet.
chmod +x appassure-installer__rhel_amd64_5.x.x.xxxxx.sh and then press . NOTE: For 32-bit environments, the installer is named appassureinstaller__ rhel_i386_5.x.x.xxxxx.sh. The file becomes executable. 3. To extract and install the Agent, type the following command: /appassure-installer_rhel_amd64_5.x.x.xxxxx.sh and then press . The Linux agent begins its extraction and installation process.
For example, if using a removable USB drive that is mounted to location /media/USB-drive-1, type the following command and then press Enter: cp -R ~/rapidrecovery.packages /media/USB-drive-1 All the necessary files are copied to the removable medium. 5. Take the removable medium to the offline Linux machine and mount the drive. 6. Copy the data from the mounted device to your home directory or other desired location.
The configuration utility offers several configuration options, and provides hints in the numbered steps of the instructions when it detects your specific configuration information. Complete the steps below to configure the Rapid Recovery Agent software on any Linux machine. Some configuration options differ based on the Linux distribution you are installing. 1. Open a terminal session with root access. 2.
To enter all kernel modules, enter all and press Enter. 8. After configuring the newly installed Agent software, restart the machine. Restarting ensures that the proper kernel driver version is used to protect your machine. After completing this process, the local repository has been configured on this Linux machine. The Agent software is installed and the kernel module is loaded. Your next step is to protect the machine on the Rapid Recovery Core.
Table 8. Machine connection settings Text Box Description Host The host name or IP address of the machine that you want to protect. Port The port number on which the Rapid Recovery Core communicates with the Agent on the machine. The default port number is 8006. User name The user name used to connect to this machine; for example, Administrator (or, if the machine is in a domain, [domain name]\Administrator). Password The password used to connect to this machine.
The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) will transfer to the repository on the Rapid Recovery Core following the schedule you defined, unless you specified to initially pause protection. • If you selected a Typical configuration for the Protect Machine Wizard and specified custom protection, then click Next to set up a custom protection schedule.
Text Box Description close brackets, ampersand or hash. This information appears in the Description field when viewing encryption keys from the Core Console. Description Enter a comment for the encryption key. This information appears in the Description field when viewing encryption keys from the Core Console. Passphrase Enter the passphrase used to control access. Best practice is to avoid special characters listed above. Record the passphrase in a secure location.
5. Ensure the Core and ports display Yes in the Enabled column. 6. If the rule is not enabled, right-click on Core and select Enable Rule. 7. Click Outbound Rules and verify the same for Core. Checking DNS resolution If the machine you are trying to back up uses DNS, verify that DNS forward and reverse lookups are correct. To ensure that the reverse lookups are correct: 1. On the appliance, go to C:\Windows\system32\drivers\etc hosts. 2. Enter the IP address of each client that backs up to DL1000.
4. Click Next. 5. Enter a name for the team and click Next. 6. Select the Team Type and click Next. 7. Select an adapter you want to be part of the team, and click Add. 8. Repeat these steps for all other adapters that are a part of the team. 9. When all adapters are selected for the team, click Next. 10. Select a standby NIC if you want a NIC that can be used as the default, if the team fails. 11. Select whether to configure LiveLink, and then click Next. 12.
Getting help 5 Finding documentation and software updates Direct links to Rapid Recovery and DL1000 Appliance documentation and software updates are available from the Core Console. Documentation To access the link for documentation: 1. On the Core Console, click the Appliance tab. 2. From the left pane, navigate Appliance → Documentation link. Software updates To access the link for software updates: 1. On the Core Console, click the Appliance tab. 2.