Dell DL4000 Appliance Deployment Guide August 2020 Rev.
Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws.
Contents Chapter 1: Setting up DL4000 Appliance....................................................................................... 5 Introduction...........................................................................................................................................................................5 Available configurations.....................................................................................................................................................
Configuring an email server and email notification template .................................................................................23 Adjusting the number of streams.................................................................................................................................. 24 Chapter 4: Preparing to protect your servers.............................................................................. 25 Installing agents on clients.................................................
1 Setting up DL4000 Appliance Topics: • • • • • Introduction Available configurations Installation prerequisites Setting up the hardware DL4000 disk configurations Introduction The Dell DL4000 appliance is the latest generation of backup-to-disk appliance powered by Rapid Recovery software.
Table 2. DL4000 Standard Edition Capacity Configurations (continued) Capacity Hardware Configuration 40TB DL4000 with Internal Storage and 1 x MD1200 with 12 x 4TB Drives Table 3.
Setting up the hardware The appliance ships with a single DL4000 system. Before setting up the appliance hardware, see the Dell DL4000 Appliance Getting Started With Your System document that shipped with the appliance. Unpack and set up the DL Appliance hardware. NOTE: The software is pre-installed on the appliance. Any media included with the system must be used only in the event of a system recovery. To set up the DL Appliance hardware: 1. Rack and cable the DL4000 system and storage enclosure(s). 2.
Figure 2. Connecting the SAS cable from the DL4000 system to the Powervault MD1200 storage enclosure Connecting the Cable Management Arm (Optional) If the appliance includes a Cable Management Arm (CMA), locate the CMA Installation Instructions that shipped with the CMA kit and follow the instructions to install the CMA. Turning on the appliance After cabling the appliance, turn on the MD1200 storage enclosure, and then turn on the DL4000 system.
2 Initial software setup When you turn on the appliance for the first time, and change the system password, the AppAssure Appliance Configuration Wizard runs automatically. 1. After you turn on the system, choose your operating system language from the Windows language options. The Microsoft EULA (End User License Agreement) is displayed on the Settings page. 2. To accept the EULA, click I accept button. A screen to change the administrator password is displayed. 3.
The network interfaces page displays the available connected network interfaces. 2. Select the network interfaces that you want to configure. NOTE: The AppAssure Appliance Configuration wizard configures network interfaces as individual ports (nonteamed). To improve ingest performance, you can create a larger ingest channel by teaming NICs. However, this must be done after the initial configuration of the appliance. 3. If required, connect additional network interfaces and click Refresh.
Configuring SNMP settings Simple Network Management Protocol (SNMP) is a commonly used network management protocol that allows SNMPcompatible management functions such as device discovery, monitoring, and event generation. SNMP provides network management of the TCP/IP protocol. To configure SNMP alerts for the appliance: 1. On the Configure SNMP Settings page, select Configure SNMP on this appliance on the Configure SNMP Settings page.
DL Appliance Configuration Wizard NOTE: You see the DL Appliance Configuration Wizard only when you upgrade your appliance using the latest RUU. CAUTION: Make sure you complete all the steps of DL Appliance Configuration Wizard before performing any other task or change any settings on the Appliance. Do not make any changes through the Control Panel, use Microsoft Windows Update, update Rapid Recovery software or install licenses, until the wizard is complete.
For information on NIC teaming, see Teaming network adapters on page 40. 8. Click Next. The Registration page is displayed. Registration and Host settings Register your appliance with the appropriate license key to avail the features accordingly. It is recommended that you change the host name before starting backups. By default, the host name is the system name that the operating system assigns. NOTE: If you want to change the host name, it is recommended that you change the host name at this stage.
b. In SNMP Trap destinations, enter trap destinations and click Add. 2. To set software alerts through email, select Notify via email option and enter the valid email address. 3. Click Next. The Access and Management page is displayed. Access and Management To access and manage your appliance, you must configure Access and Management settings. To configure the access and management settings of your appliance: 1.
● If you had applied purchased license while registering your appliance, the size of the repository corresponds to the model. For example: In DL 4000 5 TB Appliance, repository of size 5 TB is created. You have an option to expand the repository from the Provisioning page, by applying the expansion license, for more information see Rapid Recovery 6.0 on DL Appliance User’s Guide. ● If you had applied the purchased expansion license, the size of the repository corresponds to the applied license.
Table 4. Schedule options for default retention policy (continued) Text Box Description Enter a number to represent the retention period and then select the time period. The default is 2 months. You can choose from: Months or Years …and then keep one recovery Enter a number to represent the retention period and then select the time period. point per year for n You can choose from: Years [retention time period] 2. Click Next. The Update Options page is displayed. 3.
Executing RASR NOTE: Dell recommends you to create a RASR USB key after you have set up the appliance. To create RASR USB key, see Creating the RASR USB Key section. NOTE: Ensure that you have the latest RUU available and reachable on your appliance. . NOTE: To perform system recovery using RASR, see Recovering a Dell DL Backup and Recovery Appliance using Rapid Appliance Self Recovery (RASR) at https://www.dell.com/support.. To perform a factory reset: 1. Insert the RASR USB key created. 2.
RUU consists of updated versions of the Windows Server Roles and Features, .Net 4.5.2, LSI Provider, DL Applications, OpenManage Server Administrator and Rapid Recovery Core Software. In addition, the Recovery and Update Utility also updates the Rapid Appliance Self Recovery (RASR) content. NOTE: If you are currently using any of the AppAssure Core versions, Rapid Recovery Core version 6.0.2.144 or earlier, RUU forces an update to the most recent version available in the Payload.
Table 5. Provisioning storage (continued) Text Box Description By default, this text box consists of the word Repository and a number, which corresponds to the number of repositories for this Core. For example, if this is the second repository, the default name is Repository 2. Change the name as needed. Repository names must contain between 1 and 40 alphanumeric characters, including spaces. Do not use prohibited characters or prohibited phrases .
7. Configure the DL4000 fibre channel storage as a backup repository.
3 Post installation tasks After completing the DL Appliance Configuration Wizard perform the following procedures to ensure that your backup appliance and the servers that the appliance is backing up are correctly configured. NOTE: The appliance is configured with a 30–day temporary Rapid Recovery software license. For details on changing a license key in the Rapid Recovery software, see the Dell Data Protection | Rapid Recovery License Portal User Guide.
NOTE: Google Chrome uses Microsoft Internet Explorer settings, change Chrome browser settings using Internet Explorer. NOTE: Ensure that the Internet Explorer Enhanced Security Configuration is turned on when you access the Core Web Console either locally or remotely. To turn on the Internet Explorer Enhanced Security Configuration: 1. Open Server Manager. 2. Select Local Server IE Enhanced Security Configuration displayed on the right. Ensure that it is On.
Encrypting agent snapshot data The Core can encrypt agent snapshot data within the repository. Instead of encrypting the entire repository, it allows you to specify an encryption key during the protection of an agent in a repository which allows the keys to be reused for different agents. To encrypt agent snapshot data: 1. From the AppAssure Core, click Configuration → Manage → Security. 2. Click Actions, and then click Add Encryption Key. The Create Encryption Key page is displayed. 3.
Text Box Description From Enter a return email address. It is used to specify the return email address for the email notification template; for example, noreply@localhost.com. Email Subject Enter a subject for the email template. It is used to define the subject of the email notification template; for example, - . Email Enter information for the body of the template that describes the event, when it occurred, and the severity. 5. Click Send Test Email and review the results.
4 Preparing to protect your servers Overview To protect your data using DL 4000, you need to add the workstations and servers for protection in the Core Console; for example, your Exchange server, SQL Server, your Linux server, and so on. In the Core Console, you can identify the machine on which an Agent is installed and specify which volumes, for example, a Microsoft Windows Storage Space, to protect.
3. When you are satisfied with your choices on the Welcome page, then click Next. The Connection page appears. 4. On the Connection page, enter the information about the machine to which you want to connect as described in the following table, and then click Next. Table 6. Machine connection settings Text Box Description Host The host name or IP address of the machine that you want to protect. Port The port number on which the Rapid Recovery Core communicates with the Agent on the machine.
7. On the License Agreement page, click I accept the terms in the license agreement, and then click Next. The Prerequisites page appears. 8. The Rapid Recovery Agent Installer verifies the existence of the prerequisite files. ● If the prerequisite files exist, a message appears indicating that all prerequisites are installed on the machine.
Installing Microsoft Windows agents at the client To install the agents: 1. Verify that the client has the Microsoft .NET 4 framework installed: a. On the client, start the Windows Server Manager. b. Click Configuration > Services. c. Ensure that Microsoft .NET Framework appears in the list of services. If it is not installed, you can get a copy from microsoft.com. 2. Install the agent: a. On your appliance, share the directory C:\Program Files\AppRecovery to the client(s) you plan to back up. b.
● Host location. ● Logon credentials for each machine you want to protect. NOTE: All virtual machines must have VMware Tools installed; otherwise, Rapid Recovery cannot detect the host name of the virtual machine to which to deploy. In lieu of the host name, Rapid Recovery uses the virtual machine name, which may cause issues if the host name is different from the virtual machine name. 1. On the Rapid Recovery Core Console, click the Protect drop-down menu, and then click Deploy Agent Software.
The method for installing and removing the Agent software on Linux machines has changed. As of release 6.0.1, the following factors apply: ● One set of instructions applies to installations of Agent on a Linux machine with current access to the Internet. This is referred to as online installation. Instead of using shell scripts, package managers are used to install or remove the Rapid Recovery software from a repository referenced on the local Linux machine.
Thus, the installation process when upgrading from AppAssure to Rapid Recovery involves: ● Removing the AppAssure Agent software (not required for first-time installations) ● Determine the relevant package manager for your Linux distribution ● Follow the procedure for installing Rapid Recovery Agent on the Linux machine, including configuring the software repository (steps 1 through 4 of the installation procedure) ● Run the configuration utility to set port, configure users, add firewall exclusions, instal
Agent dependencies The following dependencies are required and are installed as part of the Agent installer package: ● For Debian and Ubuntu: ○ The rapidrecovery-agent requires: dkms, gcc, make, linux-headers-‘uname-r‘ libc6 (>=2.7-18), libblkid1, libpam0g, libpcre3 ○ The rapidrecovery-mono requires: libc6 (>=2.
For example, if the installer file is named rapidrecovery-repo-6.0.2.999.deb in the directory /home/rapidrecovery/, type the following command, and then press Enter: dpkg -i rapidrecovery-repo-6.0.2.999.deb Any missing packages or files required by the Agent will be downloaded from the remote repository and installed automatically as part of the script. NOTE: For more information on dependencies for installing on a Linux machine, see Agent dependencies on page 32. 5.
6. Instruct the package manager to install the Rapid Recovery Agent software. Type the following command, and then press Enter: apt-get install rapidrecovery-agent 7. The package manager prepares to install all dependent files. If prompted to confirm installation of unsigned files, enter y and then press Enter. The Rapid Recovery Agent files are installed.
3. Type the index of the installation package you want and press Enter. For example, to obtain an installation package for Red Hat Enterprise Linux 7, enter 3 and press Enter. The appropriate installer is extracted into the ~/rapidrecovery.packages/ directory. NOTE: The tilde ~/ characters represent your home directory. 4. Copy the packages for Rapid Recovery Agent to removable media. The specific location of your removable media can differ based on Linux distribution.
Configuring the Rapid Recovery Agent on a Linux machine Run the Rapid Recovery Configuration utility after installing Rapid Recovery Agent software on a Linux machine. This compiles and installs the kernel module on the Linux machine you want to protect in your Core. The configuration utility offers several configuration options, and provides hints in the numbered steps of the instructions when it detects your specific configuration information.
For example, to enter kernel modules for 3.16.0-23 and 3.16.0-34, enter 1 4 and press Enter. To enter all kernel modules, enter all and press Enter. 8. After configuring the newly installed Agent software, restart the machine. Restarting ensures that the proper kernel driver version is used to protect your machine. After completing this process, the local repository has been configured on this Linux machine. The Agent software is installed and the kernel module is loaded.
NOTE: The Agent software must be installed on the machine you want to protect, and that machine must be restarted, before it can back up to the Core. To have the installer reboot the protected machine, select the option After installation, restart the machine automatically (recommended) before clicking Next. 5.
and that you protect the passphrase you define. Store the passphrase in a secure location as it is critical for data recovery. Without a passphrase, data recovery is not possible. 13. On the Encryption page, select one of the following options: ● If you want to encrypt this protected machine using an encryption key that is already defined on this Rapid Recovery Core, select Encrypt data using an existing Encryption key, and then select the appropriate key from the drop-down menu. Proceed to the next step.
Checking the firewall settings If the client is connected properly to the network, but cannot be seen by the Core Console, check the firewall to ensure that necessary inbound and outbound communications are allowed. To check the firewall settings on the Rapid Recovery Core and any clients that it backs up: 1. On the appliance, click Start > Control Panel. 2. In the Control Panel, click System and Security, under Windows Firewall click Check firewall status. 3. Click Advanced Settings. 4.
Creating the NIC team NOTE: It is recommended not to use the native teaming interface in Windows 2012 Server . The teaming algorithm is optimized for outbound, not inbound, traffic. It offers poor performance with a backup workload, even with more network ports in the team. To create NIC teaming: 1. Go to Start > Search > Broadcom Advanced Control Suite. NOTE: When using Broadcom Advanced Control Suite, only select the Broadcom network cards. 2.
5 Getting help Topics: • • • • Finding documentation and software updates Finding software updates Contacting Dell Documentation feedback Finding documentation and software updates In the Rapid Recovery Core console there are direct links to Rapid Recovery, Appliance documentation, and software updates. To access the links, click the Appliance tab, and then click Overall Status. Links to the software updates and documentation are located under the Documentation section.