Dell DL1300 Appliance Deployment Guide
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.
Contents 1 Introducing your Dell DL1300............................................................................ 6 Dell DL1300 core technologies............................................................................................................ 6 Live Recovery...................................................................................................................................6 Universal Recovery..........................................................................................
3 Configuring your Dell DL1300......................................................................... 26 Configuration overview...................................................................................................................... 26 Configuring browsers to remotely access the DL1300 Core Console.............................................26 Configuring browser settings in Internet Explorer and Chrome.................................................
Configuring protection jobs..........................................................................................................55 Protecting a machine ...................................................................................................................56 Recovering data.................................................................................................................................. 58 Recovering directories or files.........................................................
Introducing your Dell DL1300 1 Your Dell DL1300 combines backup and replication into a unified data protection product. It provides reliable application data recovery from your backups to protect virtual machines and physical machines. Your appliance is capable of handling up to terabytes of data with built-in global deduplication, compression, encryption, and replication to specific private or public cloud infrastructure.
True Global Deduplication True Global Deduplication eliminates redundant or duplicate data by performing incremental block-level backups of the machines. The typical disk layout of a server consists of the operating system, application, and data. In most environments, the administrators often use a common version of the server and desktop operating system across multiple systems for effective deployment and management.
Dell DL1300 Smart Agent The Smart Agent is installed on the core-protected machine. The Smart Agent tracks the changed blocks on the disk volume and then snaps an image of the changed blocks at a predefined interval of protection. The incremental block-level snapshots’ forever approach prevents repeated copying of the same data from the protected machine to the Core. After the agent is configured, it uses smart technology to track the changed blocks on the protected disk volumes.
Replication begins with seeding: the initial transfer of deduplicated base images and incremental snapshots of the protected machines, which can add up to hundreds or thousands of gigabytes of data. Initial replication can be seeded to the target core using external media. This is typically useful for large sets of data or sites with slow links. The data in the seeding archive is compressed, encrypted and deduplicated.
site or a managed service provider for off-site recovery. A basic local deployment consists of a backup server called the Core and one or more protected machines known as the agents. The off-site component is enabled using replication that provides full recovery capabilities in the disaster recovery site. The DL1300 Core uses base images and incremental snapshots to compile recovery points of protected agents.
Figure 3. DL1300 Multi—Core Deployment Architecture Other information you may need NOTE: For all Dell OpenManage documents, go to Dell.com/openmanagemanuals. NOTE: Always check for updates on Dell.com/support/home and read the updates first because they often supersede information in other documents. NOTE: For any documentation related to Dell OpenManage Server Administrator, see Dell.com/ openmanage/manuals.
Installing your Dell DL1300 2 Introduction The DL Backup to Disk Appliance allows: • Faster backups, as well as quicker recovery scenarios over conventional tape devices and backup methodologies • Optional deduplication capability • Continuous data protection for data center and remote office servers • Quick and easy deployment experience that reduces the time required to begin protecting critical data Available configurations The DL appliance comes in the following configurations: Table 1.
NOTE: The appliance is configured and shipped with a 30 day temporary software license. 2. Review installation prerequisites. 3. Setting up the hardware. 4. Setting up the initial software (AppAssure Appliance Configuration Wizard). 5. Installing the Core Management Console.
• Do not place anything on top of the system. The top panel may deflect under the weight and cause damage to the system. • Ensure adequate space around the system for proper ventilation. • Ensure that the system is installed under the recommended temperature conditions as stated in the Technical Specification – Environmental Section of Dell DL1300 Appliance Owner’s Manual at Dell.com/support/home. CAUTION: Failure to follow these guidelines may result in damage to the system or physical injury.
3. Click OK on the message that prompts you to change the administrator password. 4. Enter and confirm the new password. A message prompts you confirming that the password is changed. 5. Click OK. After entering the password, Press Ctrl+Alt+Delete to Sign in screen is displayed. 6. Log on using the changed administrator password. The Select the language for Appliance screen is displayed. 7. Select the language for your appliance from the list of supported languages. The EULA screen is displayed.
4. Click Next. The Configure selected network interface page is displayed. 5. Select the appropriate internet protocol for the selected interface. You can choose IPv4 or IPv6. The network details are displayed depending on the internet protocol you select. 6. To assign the internet protocol details, do one of the following: • To assign the selected internet protocol details automatically, select Obtain an IPV4 address automatically.
4. Click Next. NOTE: Changing the host name or the domain requires restarting the machine. After restarting, the AppAssure Appliance Configuration wizard is launched automatically. If the appliance is connected to a domain, after restarting the machine, you must log in as a domain user with administrative privileges on the appliance. The Configure SNMP Settings page is displayed.
• Alerts and Monitoring • Access and Management • Configuring Windows backup • Storage provisioning • Configuring Retention policy and update options NOTE: After you complete the Appliance configuration, you can either skip the wizard or continue performing Machine protection, Replication, Virtual Machine Exports/Standby. If you choose to skip the wizard, the Core Console launches automatically and you can perform machine protection, replication, and virtual machine Exports at the later stages.
8. Click Next. The Registration page is displayed. Registration and Host settings Register your appliance with the appropriate license key to avail the features accordingly. It is recommended that you change the host name before starting backups. By default, the host name is the system name that the operating system assigns. NOTE: If you want to change the host name, it is recommended that you change the host name at this stage.
1. You have the following options to enable alerts: • • To enable system SNMP alerts, select Enable system SNMP alerts. 1. In SNMP Community, enter one or more SNMP community names. Use commas to separate multiple community names. 2. In SNMP Trap destinations, enter trap destinations and click Add. To enable software SNMP alerts, select Enable software SNMP alerts option. 1. In SNMP Community, enter one or more SNMP community names. Use commas to separate multiple community names. 2.
3. Option Description Weekly Backs your configuration settings every week beginning every Sunday at 12:01 AM Monthly Backs your configuration settings every month beginning every Sunday at 12:01 AM Click Next. The Storage Provisioning page is displayed. Storage provisioning Your appliance allows you to provision its internal storage to create Virtual disks (VDs) to host repositories and Virtual Standby, archives or other purposes. 1.
NOTE: If the retention policy license restriction is default, the retention policy cannot be configured to set the retention time period greater than six months. If you try to do so, you see an error message. 1. The following options let you define the length of time the backup snapshots of protected machines are stored and modify the rollup process of merging and deleting old backups. The Retention Policy page displays the following options: Table 2.
If an update exists, it is downloaded and installed upon completion of the wizard. 4. To enable Rapid Recovery Core updates, select Enable Rapid Recovery Core updates and then select one of the options below: • 5. Notify about updates, but don not install them automatically • Automatically install updates Click Finish The appliance settings are applied.
After the prerequisites are checked, Create the RASR USB Drive window displays the minimum size required to create the USB drive and List of Possible target paths. 4. Select the target and click Create. A warning dialog box is displayed. 5. Click Yes. The RASR USB Drive key is created. NOTE: Make sure to use the Windows Eject Drive function to prepare the USB key for removal. Otherwise, the content in the USB key may be damaged and the USB key doesn’t work as expected. 6.
The operating system disk starts restoring back to factory reset. 13. The RASR Completed page is displayed on completion of the recovery process. Click Finish. 14. Boot the system after restore. 15. NOTE: Continue further only if you see the AppAssure Appliance Configuration Wizard, otherwise go to Step 17. Wait for AppAssure Appliance Configuration Wizard to load, you need to close it. Close the wizard using the Windows Task Manager. 16. Run launchRUU.exe file in the RUU package.
Configuring your Dell DL1300 3 Configuration overview Configuration includes tasks such as configuring browsers to remotely access the DL1300 Core Console, managing licenses, and setting up alerts and notifications. After you complete the configuration of the Core, you can then protect agents and perform recovery. NOTE: While using the DL1300 Backup To Disk Appliance, it is recommended that you use the Appliance tab to configure the Core.
Configuring browser settings in Firefox To modify browser settings in Firefox: 1. In the Firefox address bar, type about:config, and then click I’ll be careful, I promise if prompted. 2. Search for the term ntlm. The search should return at least three results. 3. 4. Double-click network.automatic-ntlm-auth.trusted-uris and enter the following setting as appropriate for your machine: • For local machines, enter the host name.
trial period expires, the Rapid Recovery Core stops taking snapshots until you obtain and register a valid non-trial license. NOTE: For information about entering license key or file information (for example, to update or change a trial license to a valid long-term license), see Updating or changing a license. Licenses are validated using license files or license keys. License files are text files that end with the .lic file extension.
• Protected by this Core. Indicates the number of machines from the license pool that are protected by this core. • Total protected in group. Indicates the total number of machines protected within the same license group as this Core. License Server. These settings apply to standard (phone home) licenses. These settings are not applicable for appliances and other non-phone-home licenses: • License server address. Displays an active URL for the license server associated with this Core.
5. To enter a license key or upload a license file, do one of the following: a. If you want to manually enter the license key, in the Change License dialog box, type the key carefully, and then click Continue. The dialog box closes, and the license file you selected is authenticated, and that license is associated with your Core. b. If you want to upload a license file, in the Change License dialog box, click Choose File.
In the File Upload dialog box, navigate through the file system and locate the new license file you want to use. For example, locate Software-YourCompany.lic. c. Click the license file, and then click Open. The File Upload dialog box closes. The selected license file appears in the Change License dialog box. d. In the Change License dialog box, click Continue. The dialog box closes, and the license file you selected is authenticated, and that license is associated with your Core. 5.
Field Description Passphrase Enter a passphrase. It is used to control access. Confirm Passphrase Re-enter the passphrase. It is used to confirm the passphrase entry. NOTE: It is recommended that you record the encryption passphrase, as losing the passphrase makes the data inaccessible. For more information, see Managing Security chapter in the Dell DL1300 Appliance User’s Guide.
Text Box Description From Enter a return email address. It is used to specify the return email address for the email notification template; for example, noreply@localhost.com. Email Subject Enter a subject for the email template. It is used to define the subject of the email notification template; for example, - . Email Enter information for the body of the template that describes the event, when it occurred, and the severity. 5.
Preparing to protect your servers 4 Overview To protect your data using DL 1300, you need to add the workstations and servers for protection in the Core Console; for example, your Exchange server, SQL Server, your Linux server, and so on. In the Core Console, you can identify the machine on which an Agent is installed and specify which volumes, for example, a Microsoft Windows Storage Space, to protect.
The Protect Machine Wizard appears. 2. On the Welcome page, select the appropriate installation options: • • 3. If you do not need to define a repository or establish encryption, select Typical. If you need to create a repository, or define a different repository for backups for the selected machine, or if you want to establish encryption using the wizard, select Advanced (show optional steps).
3. If .NET components are missing or need to be upgraded, accept the prompts to download and install the framework. 4. In the language field, select the appropriate language and then click OK. 5. Choose from one of the following: • If this is the first time the Rapid Recovery Agent software is being installed on this machine, the installer prepares the installation, and then the Rapid Recovery Agent Installation Wizard appears. Proceed to Step 6.
When the installation is complete, the Completed page appears. Skip to Step 12. . 12. On the Completed page, if you see a message indicating that the system must be restarted before the installation takes effect, perform one of the following steps: • To restart now, select Yes, I want to restart my computer now. • To restart later, clear the Yes, I want to restart my computer now option. 13. On the Completed page, click Finish. The installer wizard closes, and the Agent installation is complete.
Deploying to machines on an Active Directory domain Use this procedure to simultaneously deploy the Rapid Recovery Agent software to one or more machines on an Active Directory domain. Before you begin this procedure, have the domain information and logon credentials for the Active Directory server on hand. 1. On the Rapid Recovery Core Console, click the Protect drop-down menu, and then click Deploy Agent Software. The Deploy Agent Software Wizard opens. 2. 3.
NOTE: All virtual machines must have VMware Tools installed; otherwise, Rapid Recovery cannot detect the host name of the virtual machine to which to deploy. In lieu of the host name, Rapid Recovery uses the virtual machine name, which may cause issues if the host name is different from the virtual machine name. 1. On the Rapid Recovery Core Console, click the Protect drop-down menu, and then click Deploy Agent Software. The Deploy Agent Software Wizard opens. 2.
About installing the Agent software on Linux machines When installing the Agent software on Linux machines that you want to protect, use the following guidance. After installation is complete, configure the Agent as described in the topic “Configuring the Rapid Recovery Agent on a Linux machine” in the Dell Data Protection | Rapid Recovery 6.0 Installation and Upgrade Guide. CAUTION: After configuring the newly installed Agent software on a Linux machine, restart the machine.
Mono (an open source, Ecma standard-compliant, .NET Framework-compatible tool set used for porting the Agent software to Linux platforms). For each package manager, you can run the appropriate command at the command line to determine if it is configured to download Rapid Recovery packages. These commands are listed in the following table. Table 7.
For more information about preparing for and installing the Agent software for a Linux machine that is not connected to the Internet, see the topic: • Installing the Agent software on offline Linux machines Before you begin installation of Agent software, see the topics: Downloading the Linux distribution, About security, Location of Linux Agent files, Agent dependencies, Linux scripting information in the Dell Data Protection | Rapid Recovery 6.0 Installation and Upgrade Guide.
• For SUSE Linux Enterprise Server: – The nbd-dkms requires: dkms, gcc, make, kernel-syms – The rapidrecovery-agent requires: dkms, kernel-syms, gcc, make, libblkid1, pam, pcre – The rapidrecovery-mono requires: glibc >= 2.11 Installing the Rapid Recovery Agent software on Debian or Ubuntu The Rapid Recovery Agent .deb file is an archive containing repository information specific to the apt package manager.
Installing the Rapid Recovery Agent software on SUSE Linux Enterprise Server The Rapid Recovery Agent .rpm file is an archive containing repository information for SUSE Linux Enterprise Server (SLES) . This distribution uses the zypper package manager. Complete the following steps to install the Rapid Recovery Agent on SLES. NOTE: This procedure applies to a Linux machine that is connected to the internet.
chmod +x appassure-installer__rhel_amd64_5.x.x.xxxxx.sh and then press . NOTE: For 32-bit environments, the installer is named appassureinstaller__ rhel_i386_5.x.x.xxxxx.sh. The file becomes executable. 3. To extract and install the Agent, type the following command: /appassure-installer_rhel_amd64_5.x.x.xxxxx.sh and then press . The Linux agent begins its extraction and installation process.
For example, if using a removable USB drive that is mounted to location /media/USB-drive-1, type the following command and then press Enter: cp -R ~/rapidrecovery.packages /media/USB-drive-1 All the necessary files are copied to the removable medium. 5. Take the removable medium to the offline Linux machine and mount the drive. 6. Copy the data from the mounted device to your home directory or other desired location.
The configuration utility offers several configuration options, and provides hints in the numbered steps of the instructions when it detects your specific configuration information. Complete the steps below to configure the Rapid Recovery Agent software on any Linux machine. Some configuration options differ based on the Linux distribution you are installing. 1. Open a terminal session with root access. 2.
To enter all kernel modules, enter all and press Enter. 8. After configuring the newly installed Agent software, restart the machine. Restarting ensures that the proper kernel driver version is used to protect your machine. After completing this process, the local repository has been configured on this Linux machine. The Agent software is installed and the kernel module is loaded. Your next step is to protect the machine on the Rapid Recovery Core.
Table 8. Machine connection settings Text Box Description Host The host name or IP address of the machine that you want to protect. Port The port number on which the Rapid Recovery Core communicates with the Agent on the machine. The default port number is 8006. User name The user name used to connect to this machine; for example, Administrator (or, if the machine is in a domain, [domain name]\Administrator). Password The password used to connect to this machine.
The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) will transfer to the repository on the Rapid Recovery Core following the schedule you defined, unless you specified to initially pause protection. • If you selected a Typical configuration for the Protect Machine Wizard and specified custom protection, then click Next to set up a custom protection schedule.
Text Box Description close brackets, ampersand or hash. This information appears in the Description field when viewing encryption keys from the Core Console. Description Enter a comment for the encryption key. This information appears in the Description field when viewing encryption keys from the Core Console. Passphrase Enter the passphrase used to control access. Best practice is to avoid special characters listed above. Record the passphrase in a secure location.
5. Ensure the Core and ports display Yes in the Enabled column. 6. If the rule is not enabled, right-click on Core and select Enable Rule. 7. Click Outbound Rules and verify the same for Core. Checking DNS resolution If the machine you are trying to back up uses DNS, verify that DNS forward and reverse lookups are correct. To ensure that the reverse lookups are correct: 1. On the appliance, go to C:\Windows\system32\drivers\etc hosts. 2. Enter the IP address of each client that backs up to DL1300.
4. Click Next. 5. Enter a name for the team and click Next. 6. Select the Team Type and click Next. 7. Select an adapter you want to be part of the team, and click Add. 8. Repeat these steps for all other adapters that are a part of the team. 9. When all adapters are selected for the team, click Next. 10. Select a standby NIC if you want a NIC that can be used as the default, if the team fails. 11. Select whether to configure LiveLink, and then click Next. 12.
Common use cases 5 This section provides the most common use cases for the DL1300 and provides a high-level overview of the information and procedures required for each scenario. Where required, references to additional information is provided. Protecting machines The AppAssure backup and replication technology provides advanced protection of VMs or servers while enabling flexible application and data recovery.
• Download from the AppAssure Core — Log into the Core Console and download the software to the agent machine. Select Downloads from the Tools tab, and then download the web installer for the Agent component. • Download from the AppAssure License Portal — If you have registered your software in the Dell Software License Portal, you can log into the License Portal and download the software to the agent machine.
NOTE: These procedures are a summary. For more detailed information, refer to the Dell DL1300 Appliance User’s Guide at Dell.com/support/home. Protecting a machine This topic describes how to start protecting the data on a machine that you specify. NOTE: The machine must have the AppAssure Agent software installed in order to be protected. You can choose to install the Agent software prior to this procedure, or you can deploy the software to the agent as you define protection in the Connection dialog box.
• To use the default protection schedule, in the Schedule Settings option, select Default protection (3 hour snapshots of all volumes). With a default protection schedule, the Core will take snapshots of the agent machine once every 3 hours. Snapshots of the agent machine can be taken once every hour (minimum). To change the protection settings at any time after you close the wizard, including choosing which volumes to protect, go to the Summary tab for the specific agent machine. • 9.
Text Box Description Confirm Passphrase Re-enter the passphrase you just entered. 16. Click Finish to save and apply your settings. The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) will transfer to the repository on the AppAssure Core following the schedule you defined, unless you specified to initially pause protection. Recovering data With the DL1300, data is protected on both Windows and Linux machines.
NOTE: The protected machine must have the Agent software installed and must have recovery points from which you will perform the restore operation. The Recovery Points page is displayed. 3. From the list of recovery points, search for the snapshot you want to restore to the agent machine. NOTE: If required, use the navigation buttons at the bottom of the page to display additional recovery points.
Bare Metal Recovery AppAssure provides the ability to perform a bare metal restore (BMR) for your Windows or Linux machines. BMR is a process that restores the full software configuration for a specific system. It uses the term “bare metal” because the restore operation recovers not only the data from the server, but also reformats the hard drive and reinstalls the operating system and all software applications.
5. Map the volumes. 6. Initiate the recovery. 7. Monitor the progress. Replicating recovery points Replication is the process of copying recovery points and transmitting them to a secondary location for the purpose of disaster recovery. The process requires a paired source-target relationship between two cores. The source core copies the recovery points of the protected agents and then asynchronously and continuously transmits them to a target core at a remote disaster recovery site.
NOTE: Bandwidth specified by the ISP is the total available bandwidth. The outgoing bandwidth is shared by all devices on the network. Make sure that there is enough free bandwidth for replication to accommodate the change rate. • Number of Agents— It is important to consider the number of agents protected per source core and how many you plan to replicate to the target. DL1300 lets you perform replication on a per-protected server basis, so you can choose to replicate certain servers.
• Set the replication priority for an agent— For more information on prioritizing the replication of agents, see topic 'Setting Replication Priority for an Agent' in the Dell DL1300 Appliance User’s Guide at Dell.com/support/home. • Set a replication schedule for an agent— For more information on setting a replication schedule, see topic 'Scheduling Replication' in the Dell DL1300 Appliance User’s Guide at Dell.com/support/home.
Text Box Description Host Name Enter an IP address or host name for the Hyper-V server. It represents the IP address or host name of the remote Hyper-V server. Port Enter a port number for the machine. It represents the port through which the Core communicates with this machine. User Name Enter the user name for the user with administrative privileges for the workstation with the Hyper-V server. It is used to specify the logon credentials for the virtual machine.
5. 6. 7. Click the Remote host option to indicate that the Hyper-V server is located on a remote machine. If you selected the Remote host option, enter the parameters for the remote host described as follows: Text Box Description Host Name Enter an IP address or host name for the Hyper-V server. It represents the IP address or host name of the remote Hyper-V server. Port Enter a port number for the machine. It represents the port through which the Core communicates with this machine.
these backup snapshots. The retention policy is enforced by a nightly rollup process that helps in aging and deleting old backups. Archiving data Retention policies enforce the periods for which backups are stored on short-term (fast and expensive) media. Sometimes certain business and technical requirements mandate extended retention of these backups, but use of fast storage is cost prohibitive. Therefore, this requirement creates a need for longterm (slow and cheap) storage.
Option Text Box Description NOTE: To select a cloud account, you must first add it to the Core Console. See topic 'Adding A Cloud Account' in Dell DL1300 Appliance User’s Guide. Container Select a container associated with your account from the drop-down menu. Folder Name Enter a name for the folder in which the archived data is to be saved. The default name is AppAssure-5-Archive-[DATE CREATED]-[TIME CREATED] 4. Click Next. 5.
Text Box Description Comment Enter any additional information that is necessary to capture for the archive. The comment will be displayed if you import the archive later. Use compatible format Select this option to archive your data in a format that is compatible with previous versions of cores. NOTE: The new format offers better performance; however it is not compatible with older cores. 8. Click Next. 9.
Getting help 6 Finding documentation and software updates Direct links to AppAssure and DL1300 Appliance documentation and software updates are available from the Core Console. Documentation To access the link for documentation: 1. On the Core Console, click the Appliance tab. 2. From the left pane, navigate Appliance → Documentation link. Software updates To access the link for software updates: 1. On the Core Console, click the Appliance tab. 2.