HP Data Protector A.06.11 Support for VMware vStorage

37
Configuring the integration
Configure the integration as follows:
Configure users as described in Configuring VMware users.
Provide Data Protector with login information to VMware management clients as described in
Configuring VMware management clients.
For each virtual machine, specify details on how to perform various backup methods as
described in Configuring virtual machines.
Prerequisites
Ensure that you have a correctly installed and configured the VMware environment.
For supported versions, platforms, devices, and other information, see the latest support matrices
at http://www.hp.com/support/manuals.
Ensure that you have correctly installed Data Protector. On how to install Data Protector in
various architectures, see the HP Data Protector installation and licensing guide.
Ensure that you have at least one backup host, with the Data Protector Virtual
Environment Integration component installed, in your environment.
Before you begin
Configure devices and media for use with Data Protector.
Configuring VMware users
1. Identify an operating system user that should be used by Data Protector to connect to the
backup host.
2. Add this to the Data Protector admin or operator user group. For details on adding users,
see the online Help index: ”adding users”.
Configuring a backup host
The backup host is a Data Protector client with the Virtual Environment Integration
component installed. No special configuration is required after installation.
For details on how to configure the backup host for SAN and Hotadd transportation modes, see
Transportation modes.
Configuring VMware management clients
To connect to a VMware management client, Data Protector requires the following information:
Port
Username
Password
Web root
This information was already provided when you imported the VMware management client into
the Data Protector cell. The credentials were saved to the cell_info file on the Cell Manager.
When the Data Protector uses the credentials from the file, we call it Standard security. Note
that you can update the values using the following procedures.