Dell DL1000 Appliance Deployment Guide
Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. Copyright © 2014 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.
Contents 1 Introducing Your Dell DL1000........................................................................... 6 Dell DL1000 Core Technologies.......................................................................................................... 6 Live Recovery...................................................................................................................................6 Universal Recovery.............................................................................................
Accessing the DL1000 Core Console................................................................................................ 20 Updating Trusted Sites in Internet Explorer................................................................................. 20 Managing Licenses ............................................................................................................................. 21 Changing A License Key .................................................................................
Setting Up Your Environment....................................................................................................... 41 Steps For Configuring Replication................................................................................................42 Using Virtual Standby.......................................................................................................................... 43 Performing A One-Time Hyper-V Export ..............................................................
Introducing Your Dell DL1000 1 Your Dell DL1000 combines backup and replication into a unified data protection product. It provides reliable application data recovery from your backups to protect virtual machines and physical machines. Your Dell DL1000 is capable of handling up to petabytes of data with built-in global deduplication, compression, encryption, and replication to specific private or public cloud infrastructure.
True Global Deduplication True Global Deduplication eliminates redundant or duplicate data by performing incremental block-level backups of the machines. The typical disk layout of a server consists of the operating system, application, and data. In most environments, the administrators often use a common version of the server and desktop operating system across multiple systems for effective deployment and management.
the agent. The Core then stores the snapshot backups in the repository, which resides on the appliance. Cores are paired for replication. The repository resides on internal storage within the Core. The Core is managed by accessing the following URL from a JavaScript enabled web browser: https://CORENAME:8006/apprecovery/admin. Dell DL1000 Smart Agent The Smart Agent is installed on the machine that is protected by the Core.
Replication begins with seeding — the initial transfer of deduplicated base images and incremental snapshots of the protected agents can add up to hundreds or thousands of gigabytes of data. Initial replication can be seeded to the target core using external media. This is useful for large sets of data or sites with slow links. The data in the seeding archive is compressed, encrypted and deduplicated.
site or a managed service provider for off-site recovery. A basic local deployment consists of a backup server called the Core and one or more protected machines known as the agents. The off-site component is enabled using replication that provides full recovery capabilities in the disaster recovery site. The DL1000 Core uses base images and incremental snapshots to compile recovery points of protected agents.
Figure 3. DL1000 Multi—Core Deployment Architecture Other Information You May Need NOTE: For all Dell OpenManage documents, go to dell.com/openmanagemanuals. NOTE: Always check for updates on dell.com/support/manuals and read the updates first because they often supersede information in other documents. NOTE: For any documentation related to Dell OpenManage Server Administrator, see dell.com/ openmanage/manuals.
Interoperability Guide 12 Provides information on supported software and hardware for the DL1000 appliance as well as usage considerations, recommendations, and rules.
Installing Your Dell DL1000 2 Introduction The DL Backup to Disk Appliance allows: • Faster backups, as well as quicker recovery scenarios over conventional tape devices and backup methodologies • Optional deduplication capability • Continuous data protection for data center and remote office servers • Quick and easy deployment experience that reduces the time required to begin protecting critical data The DL Backup to Disk Appliance is offered in three capacity configurations: • 2 TB with no VMs
5. Installing the Core Management Console.
• Ensure that the system is installed under the recommended temperature conditions as stated in the Technical Specification – Environmental Section of Dell DL1000 Appliance Getting Started Guide. CAUTION: Failure to follow these guidelines may result in damage to the system or physical injury. Figure 4.
Initial Software Setup When you turn on the appliance for the first time, and change the system password, the AppAssure Appliance Configuration wizard runs automatically. 1. After you turn the system on, the Microsoft EULA is displayed on the Settings page. WARNING: The Dell DL1000 is currently designed to work in English as the system default language. Always select English from the Windows language option and do not use nonEnglish language packs.
Configuring Your Dell DL1000 3 Configuration Overview Configuration includes tasks such as configuring the repository for storing backup snapshots, defining encryption key for securing protected data, and setting up alerts and notifications. After you complete the configuration of the Core, you can then protect agents and perform recovery. Configuring the Core involves the following operations: • Configuring the browsers for remote access.
7. Click OK, and then select the Advanced tab. 8. Scroll to Multimedia and select Play animations in webpages. 9. Scroll to Security, check Enable Integrated Windows Authentication, and then click OK. To modify Firefox browser settings: 1. In the Firefox address bar, type about:config, and then click I’ll be careful, I promise if prompted. 2. Search for the term ntlm. The search should return at least three results. 3. 4. Double-click network.automatic-ntlm-auth.
7. To assign the DNS server details, do one of the following: • To assign the DNS server address automatically, select Obtain DNS server address automatically. • To assign the DNS server manually, select Use the following DNS server address and enter the following details: – Preferred DNS sever 8. – Alternate DNS server Click Next. The Configure hostname and domain setting page is displayed. For information on NIC teaming, see Teaming Network Adapters.
To configure SNMP alerts for the appliance: 1. On the Configure SNMP Settings page, select Configure SNMP on this appliance. NOTE: Deselect Configure SNMP on this appliance if you do not want to set up SNMP details and alerts on the appliance and skip to step 6. 2. In Communities, enter one or more SNMP community names. Use commas to separate multiple community names. 3. In Accept SNMP packets from these hosts, enter the names of hosts with which the appliance can communicate.
8. In Add this website to the zone, enter about:blank. 9. Click Add. 10. Click Close and then OK. Managing Licenses You can manage your DL1000 licenses directly from the Core Console. From the console, you can change the license key and contact the license server. You can also access the Dell AppAssure License Portal from the Licensing page in the Core Console.
To encrypt agent snapshot data: 1. From the Core, click Configuration → Manage → Security. 2. Click Actions, and then click Add Encryption Key. The Create Encryption Key page id displayed. 3. Complete the following information: Field Description Name Enter a name for the encryption key. Comment Enter a comment for the encryption key. It is used to provide extra details about the encryption key. Passphrase Enter a passphrase. It is used to control access.
4. Select Enable Email Notifications, and then enter details for the email server described as follows: Text Box Description SMTP Server Enter the name of the email server to be used by the email notification template. The naming convention includes the host name, domain, and suffix; for example, smtp.gmail.com. Port Enter a port number. It is used to identify the port for the email server; for example, the port 587 for Gmail. The default is 25.
Preparing To Protect Your Servers 4 Overview To protect your data using DL1000, you need to add the workstations and servers for protection in the Core Console; for example, your Exchange server, SQL Server, your Linux server, and so on. In the Core Console, you can identify the machine on which an Agent is installed and specify which volumes, for example, a Microsoft Windows Storage Space, to protect.
3. Open a command line interface on the appliance. 4. Run the command ping . 5. Depending on the result, do one of the following: • If the client does not reply to the ping, verify the server’s connectivity and network settings. • If the client replies, check that the firewall settings allow the DL1000 components to run.
7. Click Install. 8. Click Finish. Creating The NIC Team NOTE: It is recommended to not use the native teaming interface in Windows 2012 Server. The teaming algorithm is optimized for outbound, not inbound, traffic. It offers poor performance with a backup workload, even with more network ports in the team. To create NIC teaming: 1. Go to Start → Search → Broadcom Advanced Control Suite. NOTE: When using Broadcom Advanced Control Suite, only select the Broadcom network cards. 2.
well if all clients are running the same operating system. However, if there are different versions of operating systems, you may find it easier to install the agents on the machines. You can also deploy the Agent software to the agent machine during the process of protecting a machine. This option is available for machines that do not already have the Agent software installed.
To deploy agents during the process of adding an agent for protection: 1. Navigate to Protect Machine → Connect, after entering the appropriate connection settings in the dialog box. 2. Click Connect. The Deploy Agent dialog box is displayed. 3. Click Yes to deploy the Agent software remotely to the machine. The Deploy Agent dialog box is displayed. 4. Enter login and protection settings as follows: • Host name — Specifies the host name or IP address of the machine that you want to protect.
Installing Microsoft Windows Agents At The Client To install the agents: 1. Verify that the client has the Microsoft .NET 4 framework installed: a. On the client, start the Windows Server Manager. b. Click Configuration → Services. c. Ensure that Microsoft .NET Framework appears in the list of services. If it is not installed, you can get a copy from microsoft.com. 2. Install the agent: a. On the AppAssure appliance, share the directory C:\install\AppAssure to the client(s) you plan to back up. b.
3. Click Run in the Installer dialog box. NOTE: For information about adding agents by using the Core machine, see Deploying An Agent (Push Install) in the Dell DL1000 Appliance User's Guide at dell.com/support/manuals. Installing Agents On Linux Machines Download the distribution specific 32-bit or 64-bit installer on every Linux server that you want to protect by using the Core. You can download the installers from the License Portal at https://licenseportal.com.
Component Location/Path wrappers for aamount and agent • /usr/bin/aamount • /usr/bin/aagent autorun scripts for aavdisk and agent • /etc/init.d/appassure-agent • /etc/init.d/appassure-vdisk Agent Dependencies The following dependencies are required and are installed as part of the Agent installer package: For Ubuntu Dependency The appassure-vss dkms, gcc, make, linux-headers-‘uname-r‘ requires The appassureaavdisk requires libc6 (>=2.
Installing The Agent On Ubuntu NOTE: Before performing these steps, ensure that you have downloaded the Ubuntu-specific installer package to the /home/system directory. To install the agent on Ubuntu: 1. Open a terminal session with root access. 2. To make the Agent installer executable, type the following command: chmod +x appassure-installer_ubuntu_amd64_5.x.x.xxxxx.sh and then press . The file becomes executable.
After the installer completes, the Agent will be running on your machine. For more information on protecting this machine with the Core, see the topic 'Protecting Workstations and Servers' in the Dell DL1000 Appliance User’s Guide at dell.com/support/manuals. Installing The Agent On SUSE Linux Enterprise Server NOTE: Before performing these steps, ensure that you have downloaded the SUSE Linux Enterprise Server (SLES) installer package to the /home/system directory.
Common Use Cases 5 This section provides the most common use cases for the DL1000 and provides a high-level overview of the information and procedures required for each scenario. Where required, references to additional information is provided. Protecting Machines The AppAssure backup and replication technology provides advanced protection of VMs or servers while enabling flexible application and data recovery.
• Download from the AppAssure License Portal — If you have registered your software in the Dell Software License Portal, you can log into the License Portal and download the software to the agent machine. • Deploy the Agent Software when protecting a machine — You can deploy the Agent software to the machine you want to protect using the Protect a Machine Wizard.
Protecting A Machine This topic describes how to start protecting the data on a machine that you specify. NOTE: The machine must have the AppAssure 5 Agent software installed in order to be protected. You can choose to install the Agent software prior to this procedure, or you can deploy the software to the agent as you define protection in the Connection dialog box.
8. Select the appropriate protection schedule: • To use the default protection schedule, in the Schedule Settings option, select Default protection (hourly snapshots of all volumes). With a default protection schedule, the Core will take snapshots of the agent machine once every 3 hours. Snapshots of the agent machine can be taken once every hour (minimum).
15. Enter the information as described in the following table to add an encryption key for the Core. Text Box Description Name Enter a name for the encryption key. Description Enter a description to provide additional details for the encryption key. Passphrase Enter the passphrase used to control access. Confirm Passphrase Re-enter the passphrase you just entered. 16. Click Finish to save and apply your settings.
To restore volumes from a recovery point: 1. In the Core Console, click the Restore tab. The Restore Machine Wizard is displayed. 2. From the Protected Machines page, select the protected machine for which you want to restore data, and then click Next. NOTE: The protected machine must have the Agent software installed and must have recovery points from which you will perform the restore operation. The Recovery Points page is displayed. 3.
8. If the volumes you want to restore contain SQL or Microsoft Exchange databases, on the Dismount Databases page, you are prompted to dismount them. Optionally, if you want to remount these databases after the restore is complete, select Automatically remount all databases after the recovery point is restored. Click Finish. 9. Click OK to confirm the status message that the restore process has started. 10. To monitor the progress of your restore action, on the Core Console, click Events.
To perform a BMR for a Windows machine: 1. Create a boot CD. 2. Burn the image to disk. 3. Boot the target server from the boot CD. 4. Connect to the recovery disk. 5. Map the volumes. 6. Initiate the recovery. 7. Monitor the progress. Replicating Recovery Points Replication is the process of copying recovery points and transmitting them to a secondary location for the purpose of disaster recovery. The process requires a paired source-target relationship between two cores.
the recovery points created by the snapshots. Due to the amount of data transmitted from core to core, multiple parallel streams may be required to perform at wire speeds up to the speed of a 1GB Ethernet connection. NOTE: Bandwidth specified by the ISP is the total available bandwidth. The outgoing bandwidth is shared by all devices on the network. Make sure that there is enough free bandwidth for replication to accommodate the change rate.
• Set the replication priority for an agent— For more information on prioritizing the replication of agents, see topic 'Setting Replication Priority for an Agent' in the Dell DL1000 Appliance User’s Guide. • Set a replication schedule for an agent— For more information on setting a replication schedule, see topic 'Scheduling Replication' in the Dell DL1000 Appliance User’s Guide.
Defining One-Time Settings For Performing A Hyper-V Export To define one-time settings for performing a Hyper-V export: 1. From the Hyper-V dialog box, click Use local machine to perform the Hyper-V export to a local machine with the Hyper-V role assigned. 2. Click the Remote host option to indicate that the Hyper-V server is located on a remote machine.
Performing A Continuous (Virtual Standby) Hyper-V Export To perform a continuous (virtual standby) Hyper-V export: 1. In the Core Console, on the Virtual Standby tab, click Add to launch the Export Wizard. On the Protected Machines page of the Export Wizard. 2. Select the machine you want to export and then click Next. 3. On the Summary tab, click Export → Virtual Standby. 4.
12. On the Summary page, click Finish to complete the wizard and to start the export. NOTE: You can monitor the status and progress of the export by viewing the Virtual Standby or Events tab Managing Recovery Points Periodic backup snapshots of all the protected servers accumulate on the Core over time. The retention policies are used to retain backup snapshots for longer periods of time and to help with management of these backup snapshots.
4. Enter the custom schedule for retaining the recovery points as described in the following table. Text Box Description Keep all Recovery Points for n [retention time period] Enter a number that represents the retention period and then select the time period. The default is 3. Specifies the retention period for the recovery points. You can choose from: ...
Text Box Description ...and then keep one Recovery Point per month for n [retention time period] Provides a more refined level of retention. It is used as a building block to further define how long recovery points are maintained. Enter a number that represents the retention period and then select the time period. The default is 2. You can choose from: ...
and noncompliance data. The archive feature in AppAssure is used to support the extended retention for compliance and noncompliance data. It is also used to seed replication data to a remote replica core. Creating An Archive To create an archive: 1. In the Core Console, click Tools → Archive → Create. The Add Archive Wizard dialog box appears. 2.
3. Enter the details for the archive as described in the following table based on the location type you selected in Step 3. Option Text Box Description Local Output location Enter the location for the output. It is used to define the location path where you want the archive to reside; for example, d:\work\archive. Network Output location Enter the location for the output. It is used to define the location path where you want the archive to reside; for example, \\servername \sharename.
7. On the Options page, enter the information described in the following table. Text Box Description Maximum Size Large archives of data can be divided into multiple segments. Select the maximum amount of space you want to reserve for creating the archive by doing one of the following: • • Select Entire Target to reserve all available space in the path provided on the destination provided in Step 4.
9. On the Date Range page, enter the Start Date and Expiration Date of the recovery points to be archived. • To enter a time, click on the time shown (default, 8:00 AM) to reveal the slide bars for selecting hours and minutes. • To enter a date, click the text box to reveal the calendar, and then click on the preferred day. 10. Click Finish. Archiving To A Cloud You can archive your data to a cloud by uploading it to a variety of cloud providers directly from the Core Console.
9. Click Yes. The operating system disk starts restoring back to factory reset. 10. Click Finish. Creating The RASR USB Key NOTE: After the initial setup of the software, the AppAssure Appliance Configuration Wizard starts automatically. The Appliance tab status icon is yellow. To create a RASR USB key: 1. Navigate to the Appliance tab. 2. Using the left pane navigation, select Appliance → Backup. Create RASR USB Drive windows is displayed.
Getting Help 6 Finding Documentation And Software Updates Direct links to AppAssure and DL1000 Appliance documentation and software updates are available from the Core Console. Documentation To access the link for documentation: 1. On the Core Console, click the Appliance tab. 2. From the left pane, navigate Appliance → Documentation link. Software Updates To access the link for software updates: 1. On the Core Console, click the Appliance tab. 2.