PPD M 1911 Admin Guide
PPD M 1911 Admin Guide
11
Administration and User Guide
October 2022
Rev. 02
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2016 - 2022 Dell Inc. or its subsidiaries. All rights reserved. Dell Technologies, Dell, and other trademarks are trademarks of Dell Inc. or its
subsidiaries. Other trademarks may be trademarks of their respective owners.
Contents
Preface.........................................................................................................................................................................................8
Contents 3
Chapter 3: Managing Storage...................................................................................................... 40
Protection storage............................................................................................................................................................ 40
PowerProtect DD Management Center automatic discovery..........................................................................40
High Availability PowerProtect DD support...........................................................................................................41
Smart Scale system pools.......................................................................................................................................... 41
Add protection storage.............................................................................................................................................. 42
Edit protection storage.............................................................................................................................................. 43
Storage units...................................................................................................................................................................... 44
Storage unit limitations.............................................................................................................................................. 45
Storage unit considerations for PowerProtect DD............................................................................................. 45
Create a storage unit..................................................................................................................................................46
Edit a storage unit....................................................................................................................................................... 47
Change a storage unit password............................................................................................................................. 48
View the storage unit password.............................................................................................................................. 49
Differences in storage system and storage unit space reporting..........................................................................49
Monitoring storage capacity thresholds...................................................................................................................... 50
4 Contents
Manual backups of protected assets............................................................................................................................72
Manual backups of a single protected asset.........................................................................................................72
Manual replication of protected assets........................................................................................................................73
Manual Cloud Tiering of protected assets.................................................................................................................. 74
Editing a protection policy...............................................................................................................................................74
Modify a policy name and description, objectives, or options.......................................................................... 74
Changing storage targets.......................................................................................................................................... 75
Replication to shared protection storage.............................................................................................................. 76
Add or remove assets in a protection policy......................................................................................................... 77
Viewing a summary of protection policies................................................................................................................... 78
View assets assigned to a protection policy......................................................................................................... 78
View the status of the last-run job of a protection policy.................................................................................78
Extended retention........................................................................................................................................................... 79
Edit the retention period for backup copies................................................................................................................81
Delete backup copies........................................................................................................................................................ 81
Retry a failed backup copy deletion........................................................................................................................82
Export data for deleted backup copies.................................................................................................................. 83
Remove backup copies from the PowerProtect Data Manager database.................................................... 83
Removing expired backup copies.................................................................................................................................. 84
Removing assets from PowerProtect Data Manager...............................................................................................84
Remove assets and associated protection copies.............................................................................................. 85
Run an asset-protection report..................................................................................................................................... 85
Disable a protection policy.............................................................................................................................................. 86
Protection jobs running for a disabled policy........................................................................................................86
Enable a disabled protection policy......................................................................................................................... 87
Customize the default behavior of disabled policies...........................................................................................87
Delete a protection policy................................................................................................................................................87
Add a service-level agreement.......................................................................................................................................88
Run a compliance report................................................................................................................................................. 90
Protecting client assets after a client hostname change.........................................................................................91
ifGroup configuration and PowerProtect Data Manager policies.......................................................................... 91
Contents 5
Identifying a remote system....................................................................................................................................108
Add a remote system for quick recovery.............................................................................................................108
Edit a remote system................................................................................................................................................109
Quick recovery remote view................................................................................................................................... 109
Overview of PowerProtect Data Manager Cloud Disaster Recovery................................................................. 110
6 Contents
PowerProtect Data Manager reporting..................................................................................................................... 149
Provide feedback on PowerProtect Data Manager reporting.............................................................................. 149
Port requirements........................................................................................................................................................... 150
Server requirements....................................................................................................................................................... 150
Known issues with the reporting engine and Report Browser........................................................................... 151
Configure and deploy the reporting engine................................................................................................................151
Updating the reporting engine from version 19.10.................................................................................................. 152
Report Browser................................................................................................................................................................ 152
Backup Jobs Summary............................................................................................................................................. 156
Restore Jobs Summary.............................................................................................................................................157
Replication Jobs Summary.......................................................................................................................................157
Filter and customize reports................................................................................................................................... 158
Deleting the reporting engine....................................................................................................................................... 159
Managing disaster recovery of the reporting engine..............................................................................................159
Chapter 11: Configuring and Managing the PowerProtect Agent Service ................................... 160
About the PowerProtect agent service..................................................................................................................... 160
Start, stop, or obtain the status of the PowerProtect agent service................................................................. 161
Register the PowerProtect agent service to a different server address........................................................... 161
Recovering the PowerProtect agent service from a disaster.............................................................................. 162
Restore the PowerProtect Data Manager agent service datastore............................................................. 162
Troubleshooting agent registration ............................................................................................................................163
Contents 7
Preface
As part of an effort to improve product lines, periodic revisions of software and hardware are released. Therefore, all versions of
the software or hardware currently in use might not support some functions that are described in this document. The product
release notes provide the most up-to-date information on product features.
If a product does not function correctly or does not function as described in this document, contact Customer Support.
NOTE: This document was accurate at publication time. To ensure that you are using the latest version of this document,
go to the Customer Support website.
Product naming
Data Domain (DD) is now PowerProtect DD. References to Data Domain or Data Domain systems in this documentation, in the
user interface, and elsewhere in the product include PowerProtect DD systems and older Data Domain systems. In many cases
the user interface has not yet been updated to reflect this change.
Language use
This document might contain language that is not consistent with Dell Technologies current guidelines. Dell Technologies plans
to update the document over subsequent future releases to revise the language accordingly.
This document might contain language from third-party content that is not under Dell Technologies control and is not consistent
with the current guidelines for Dell Technologies own content. When such third-party content is updated by the relevant third
parties, this document will be revised accordingly.
Website links
The website links used in this document were valid at publication time. If you find a broken link, provide feedback on the
document, and a Dell Technologies employee will update the document as necessary.
Purpose
The Dell PowerProtect Data Manager Administration and User Guide describes how to configure, use, and administer
PowerProtect Data Manager software.
Audience
This document is intended for the host system administrator who is involved in managing, protecting, and reusing data across
the enterprise by deploying PowerProtect Data Manager software.
Revision history
The following table presents the revision history of this document.
8 Preface
Table 1. Revision history (continued)
Revision Date Description
01 June 21, 2022 Initial release of this document for PowerProtect Data
Manager version 19.11.
Compatibility information
Software compatibility information for the PowerProtect Data Manager software is provided by the E-Lab Navigator.
Related documentation
The following publications are available at Customer Support and provide additional information:
Preface 9
Table 2. Related documentation (continued)
Title Content
PowerProtect Data Manager Network Attached Storage User Describes how to configure and use the software to protect
Guide and recover the data on network-attached storage (NAS)
shares and appliances.
PowerProtect Data Manager Virtual Machine User Guide Describes how to configure and use the software to back
up and restore virtual machines and virtual-machine disks
(VMDKs) in a vCenter Server environment.
VMware Cloud Foundation Disaster Recovery With Provides a detailed description of how to perform an end-to-
PowerProtect Data Manager end disaster recovery of a VMware Cloud Foundation (VCF)
environment.
PowerProtect Data Manager Public REST API documentation Contains the Dell Technologies APIs and includes tutorials to
guide you in their use.
vRealize Automation Data Protection Extension for Data Describes how to install, configure, and use the vRealize Data
Protection Systems Installation and Administration Guide Protection Extension.
Typographical conventions
The following type style conventions are used in this document:
You can use the following resources to find more information about this product, obtain support, and provide feedback.
10 Preface
Where to get support
The Customer Support website provides access to product licensing, documentation, advisories, downloads, and how-to and
troubleshooting information. The information can enable you to resolve a product issue before you contact Customer Support.
To access a product-specific page:
1. Go to the Customer Support website.
2. In the search box, type a product name, and then from the list that appears, select the product.
Knowledgebase
The Knowledgebase contains applicable solutions that you can search for either by solution number (for example, KB000xxxxxx)
or by keyword.
To search the Knowledgebase:
1. Go to the Customer Support website.
2. On the Support tab, click Knowledge Base.
3. In the search box, type either the solution number or keywords. Optionally, you can limit the search to specific products by
typing a product name in the search box, and then selecting the product from the list that appears.
Live chat
To participate in a live interactive chat with a support agent:
1. Go to the Customer Support website.
2. On the Support tab, click Contact Support.
3. On the Contact Information page, click the relevant support, and then proceed.
Service requests
To obtain in-depth help from a support agent, submit a service request. To submit a service request:
1. Go to the Customer Support website.
2. On the Support tab, click Service Requests.
NOTE: To create a service request, you must have a valid support agreement. For details about either an account or
obtaining a valid support agreement, contact a sales representative. To find the details of a service request, in the
Service Request Number field, type the service request number, and then click the right arrow.
Online communities
For peer contacts, conversations, and content on product support and solutions, go to the Community Network. Interactively
engage with customers, partners, and certified professionals online.
Preface 11
1
Getting Started
Topics:
• Introducing the PowerProtect Data Manager software
• Supported Internet Protocol versions
• Unsupported file-system modifications
• References
• Terminology
• Access the PowerProtect Data Manager UI
• Export data
• Customer feedback
• Security configuration
PowerProtect Data Manager integrates multiple data-protection products within the Data Protection portfolio to enable data
protection as a service, providing the following benefits:
Table 5. Benefits
Enables data-protection teams to create data paths with provisioning, automation, and scheduling to embed protection
engines into their data-protection infrastructure for high-performance backup and recovery
Enables backup administrators of large-scale environments to schedule backups for the following asset types from a central
location on the PowerProtect Data Manager server:
● VMware virtual machines
● File systems
● VMAX storage groups
● Kubernetes clusters
● Microsoft Exchange Server and Microsoft SQL Server databases
● Oracle databases
● SAP HANA databases
● Network-attached storage (NAS) shares
Provides an agent-based approach to automatically discover and protect databases on an application server
Enables self-service and centralized protection by:
● Monitoring service-level objectives (SLOs)
● Identifying violations of recovery-point objectives (RPOs)
12 Getting Started
Table 5. Benefits (continued)
Supports deploying an external VM Direct appliance that moves data with a VM Direct Engine that is optimized for performing
high-capacity backup streams
Comes with a basic embedded VM Direct Engine that has the following functions and capabilities:
● It is automatically used as a fallback proxy for performing backup and restore operations when an external VM Direct
Engine fails, is disabled, or is unavailable
● It has a limited capacity for performing backup streams
● It can work with virtual-machine crash-consistent protection policies that use the Transparent Snapshot Data Mover
(TSDM) protection mechanism
● It enables the Search Service used by PowerProtect Search
Supports PowerProtect Search, which enables backup administrators to quickly search for and restore VM and NAS file copies
Supports the vRealize Automation DP extension, which enables the automatic provisioning of virtual machines and on-demand
backups and restores
Integrates with Cloud Disaster Recovery (Cloud DR), including workflows for Cloud DR deployment, protection, and recovery
operations in the AWS and Azure clouds
Integrates with PowerProtect Cloud Snapshot Manager to view PowerProtect Cloud Snapshot Manager jobs, alerts, and
reports from a consolidated PowerProtect Data Manager dashboard
Integrates with PowerProtect Cyber Recovery to protect the integrity of a PowerProtect Data Manager environment from
cyber threats
Provides a RESTful API interface that allows PowerProtect Data Manager to be monitored, configured, and orchestrated:
● Existing automation frameworks can be integrated
● New scripts can be quickly written
● Easy-to-follow tutorials are provided
References
Some procedures in this document reference other publications for further details.
For a list of PowerProtect Data Manager publications, see "Related documentation" in the preface.
For information about DD Virtual Edition, see the following publications at Customer Support:
Getting Started 13
Table 6. Related PowerProtect DD Virtual Edition documentation (continued)
PowerProtect DD Virtual Edition in Google Cloud Platform Installation and Administration Guide
PowerProtect DD Virtual Edition on Premise Installation and Administration Guide
PowerProtect DD Virtual Edition in Azure Installation and Administration Guide
PowerProtect DD Virtual Edition in Amazon Web Services Installation and Administration Guide
Terminology
Familiarize yourself with the terminology for the PowerProtect Data Manager user interface and documentation.
The following table provides more information about names and terms that you should know to use PowerProtect Data
Manager:
14 Getting Started
Table 7. Term list (continued)
Term Description
Service-level objective (SLO) A definable rule that sets the criteria for recovery-point objectives (RPOs), encryption, and
the location of backups according to company requirements.
Steps
1. From a host that has network access to the virtual appliance, use Google Chrome to connect to the appliance:
https://<appliance_hostname>
NOTE: You can specify the hostname or the IP address of the appliance.
NOTE:
If the user interface is left unattended for more than 30 minutes and times out, the login page might display with the
error 503: Unknown Error. If this occurs, dismiss the error and log in again with your username and password.
If you log in with an expired password, reset the password immediately. Clicking Cancel, closing the browser, or
navigating away from the page before changing your password disables your credentials for subsequent logins. To
re-enable your credentials, the PowerProtect Data Manager Security Configuration Guide contains instructions to reset
your password using the REST API.
When the identity provider validates the credentials, the authentication service issues a user token. The PowerProtect Data
Manager UI uses the token information to authorize activities.
Unless you have changed the system configuration, the default identity provider is the local identity provider.
The PowerProtect Data Manager Security Configuration Guide provides more information about the available user roles and
their associated permissions. The associated roles for an account determine what parts of the UI a user can see and use, and
what operations a user can perform.
If this is your first time accessing the PowerProtect Data Manager UI, an unsigned certificate warning might appear in the
web browser.
The security certificate that encrypts communication between the PowerProtect Data Manager UI and the web browser is
self-signed. A self-signed certificate is signed by the web server that hosts the secure web page. There is nothing wrong
with this certificate. This certificate is sufficient to establish an encrypted channel between the web browser and the server.
However, it is not signed by a trusted authority.
The Get Started window appears with configuration options that are required upon first deployment. To skip this window
and go right to the Dashboard, click Launch.
From the Dashboard window:
● The left pane provides links to the available menu items. Expand a menu item for more options.
● The icons in the PowerProtect Data Manager banner provide additional options.
Getting Started 15
Get Started window
The Get Started window provides configuration options that are required when the PowerProtect Data Manager system is first
deployed. This window continues to display by default each time you log in until you click Launch.
You can access the Get Started window at any time, or view any getting started options that have yet to be configured, by
Dashboard
The Dashboard is visible when you log in to the PowerProtect Data Manager UI, and can be accessed from the left navigation
pane. This window provides a high-level view of the overall state of the PowerProtect Data Manager system through six
widgets. The following table describes each widget.
16 Getting Started
Table 9. PowerProtect Data Manager Dashboard
Dashboard widget Description
Jobs | Protection, Jobs | This widget provides a color-coded status of backup, restore, and system jobs that are in
Restore and Jobs | System progress or have been performed in PowerProtect Data Manager over a specified period. Jobs
| Protection displays by default, showing jobs performed over the last 24 hours.
Click the three vertical dots at the top of the widget to:
● Select Protection, Restore, or System to switch the jobs view in the widget.
● Choose the time period for the jobs that you want to view (last 24 hours, last 3 days,
last 7 days, or all). Once a time period is selected, the widget updates to display only jobs
performed within that time period.
Click a color in the chart to view details about jobs with a specific status, or click the links next
to each status. This will open the Jobs > Protection Jobs or Jobs > System Jobs window,
which is filtered to display the jobs that match the selected status and time period. From this
window, you can manage jobs, view more details, and search jobs.
Assets | Count and Assets | Details in this widget include the number of protected assets, unprotected assets, and
Size excluded assets for each asset source that has been added and enabled in PowerProtect
Data Manager. You can also view the total number of assets for each asset source, and the
total size of these assets. Assets | Count displays by default, and the asset types are sorted
based on the percentage of the total asset count that are unprotected, or the total size of the
unprotected assets for the asset source, depending on the view.
Click the three vertical dots at the top of the widget to:
● Select Count or Size to switch the assets view in the widget.
● Select one or more asset sources from the list. You can display asset statistics for a single
asset source, multiple asset sources, or all asset sources.
Hover over a color to view the exact number of protected, unprotected, and excluded assets
and the total size of these assets. Click a color to open the Infrastructure > Assets window,
which is filtered to display the assets that match the selected status.
Health This widget provides a score for the overall PowerProtect Data Manager system health (Good,
Fair, or Poor). Health details and status are provided for the following categories:
● Components: Identifies the state of hardware and software services, such as Running or
Failed.
● Configuration: Identifies whether any aspects of the PowerProtect Data Manager
configuration are incomplete, such as System Support configuration.
● Capacity: Identifies the provisioned and currently allocated size of the associated storage
system.
● Performance: Identifies key performance indicators, such as memory use.
● Data Protection: Identifies key protection indicators, such as service-level agreements not
being met and disaster-recovery backup copies not being present.
Click View All to view more details about the system health issues for all categories.
Compliance This widget provides compliance verification statistics for protection policies that are linked to
a Service Level Agreement (SLA). The widget also identifies the number of assets within these
policies that are compliant and non-compliant.
Click the three vertical dots at the top of the widget to select one or more asset sources from
the list. You can display compliance statistics for a single asset source, multiple asset sources,
or all asset sources. By default, the total count and number of protection policies for compliant
and non-compliant assets displays for all asset sources.
Click View All to open the Protection > SLA Compliance window, where you can view more
details about the specific policies and assets that are non-compliant.
Capacity | Active Tier and This widget displays the capacity status of the DD protection storage systems that are
Capacity | Cloud Tier associated with this instance of PowerProtect Data Manager for the active tier and cloud
tier. Based on the available capacity on each DD system, a color coded bar graph displays the
number of systems that are Good (>20% available), Fair (<20% available), or Poor (<10%).
Getting Started 17
Table 9. PowerProtect Data Manager Dashboard (continued)
Dashboard widget Description
Click the three vertical dots at the top of the widget to:
● Select Active Tier or Cloud Tier to switch between a view of protection storage systems
for the active tier and cloud tier in the widget. By default, the widget displays Capacity |
Active Tier.
● Select a DD system from the list. The widget updates to display capacity statistics for the
selected DD system. You can only display capacity statistics for one system at a time.
Click View All to open the Infrastructure > Storage window, where you can view more
details about specific protection storage systems.
Space Optimization This widget provides information about how efficient the active tier storage capacity is on
individual DD systems associated with this instance of PowerProtect Data Manager. Efficiency
is determined based on the size of pre-compression data compared with the size of post-
compression data on the system.
Click the three vertical dots at the top of the widget to select a DD system from the list. The
widget updates to display space optimization statistics for the selected DD system.
Dashboard
Click Health to view a score for the overall PowerProtect Data Manager system health (Good,
Fair, or Poor).
Health
18 Getting Started
Table 10. PowerProtect Data Manager tools (continued)
Menu item Description
● Add PowerProtect Cloud Snapshot Manager tenants as asset sources for jobs, alerts, and
reports.
Click Protection to:
● Add protection policies to back up assets.
● Manage service-level agreements (SLAs).
Protection
● Add, edit, and delete protection rules for asset inclusion in policies.
● Add, edit, and delete file exclusion templates for File System protection policies.
Click Restore to:
● View asset copy location details and initiate a Restore operation.
Restore ● Manage Instant Access Sessions.
● Use the File Search feature to find and restore virtual machine file copies.
Click Alerts to:
● View and acknowledge alerts and events.
Alerts ● Filter alerts by critical, warning, and informational status, and specify the time range.
● View and examine Audit logs.
● Export audit logs to CSV files.
● Set audit log boundaries.
● Configure alert notifications.
There is also a banner UI option, represented by the icon, which provides links that enable
you to view all unacknowledged alerts.
Click Reports to access the PowerProtect Data Manager Report Browser and Reporting
Engine.
Reports
Click Jobs to manage jobs, view by protection or system, filter, and view details.
Jobs
Banner UI options
The following table describes the icons in the PowerProtect Data Manager UI banner.
The number next to this icon indicates the critical unacknowledged alerts over the last 24
hours.
Click to expand for more information about unacknowledged alerts, including:
Getting Started 19
Table 11. Banner UI options (continued)
Option Description
● The total number of alerts (all statuses — critical, warning, or informational) that have yet
to be acknowledged, or just the unacknowledged alerts from the last 24 hours (marked
with the New tag).
● The number of critical alerts that have yet to be acknowledged, or just the unacknowledged
critical alerts from the last 24 hours (marked with the New tag).
Within this menu, click any of these links to open the Alerts window, where you can view
specific details about these unacknowledged alerts.
Click to restore assets from replicated copies through quick recovery. This icon only appears
when this system receives replicated metadata from a source system.
Click to configure and manage PowerProtect Data Manager system network, time zone, and
NTP settings, DR backups, security, licenses, updates, authentication, agent downloads, and
support, and to access the Get Started window.
Click to log out, and log in as a different user, or change the current user password.
Click to obtain more information about PowerProtect Data Manager, access Customer
Support, send feedback, or view the REST API documentation.
Click to launch CloudIQ, APEX Backup Services, and Cloud Snapshot Manager.
Export data
PowerProtect Data Manager enables you to export and save table data in CSV format.
Prerequisites
In the PowerProtect Data Manager UI, browse to a window that includes the Export All functionality.
SLA Compliance
Protection Rules
You can also export records for assets that are applied to a protection rule.
Click the link in the Assigned Assets Count column for the protection rule.
Restore Assets
Alerts System
20 Getting Started
Table 12. Supported windows (continued)
Menu item Window
Administration Access Control > Users/Groups
Access Control > Resource Groups
You can also export records for assets that are assigned to a resource group.
Click next to the resource group, and then click View Assets in the right
pane.
Audit Logs
Jobs Protection Jobs
System Jobs
Steps
1. (Optional) Filter and sort the information that appears in the table.
2. In the window, click Export All to export the data to a CSV file.
If you apply any filters in the table, the exported records include only the records that satisfy the filter conditions.
NOTE: In this release, filters applied to the table in the Protection Policy window are not applied to the exported CSV
file. Exported protection records include all data that is shown in the table. Download the Excel file to sort and filter the
protection results.
Exported fields
The following tables list the fields that are exported using the Export All functionality. The fields are exported in CSV format.
Application Agents Host Name, IP, Registration Status, OS, Agent Type, Current
Version, Update Status, Port, Application Version, Created
Date, Registered Date
Protection Policies Name, Category, Asset Type, Asset Count, Protected Asset
Size, Last Run Status, Violations, State
Users User/Group Name, Type, First Name, Last Name, Email Address,
Roles and Resources, Added Date
Getting Started 21
The following table lists the fields that are unique to each asset type.
Microsoft SQL Server Name, Protection Engine Flow, Host Type, Host/Cluster/Group
Name, Application Server ID, Application Server Name
Microsoft Exchange Server Name, Host/Cluster/Group Name, Host Type, Application Server
Name, Application Server ID
File System Name, OS Type, File System Type, Host Name, Host Operating
System
Customer feedback
Use the customer feedback feature in the PowerProtect Data Manager UI to report your satisfaction with PowerProtect
Data Manager, provide feedback, and send requests for enhancements. Customer feedback is used to improve the customer
experience.
Steps
1. Log in to the PowerProtect Data Manager UI.
22 Getting Started
Figure 2. Customer feedback survey
NOTE: In environments with limited external connectivity, such as dark sites, an error appears in the web browser and
the customer feedback survey is not displayed.
3. (Optional) Complete the fields in the customer feedback survey, and when finished, click Send My Comment.
You have the option to rate your satisfaction with PowerProtect Data Manager and make a recommendation for how to
improve the customer experience. You also have the option to provide an email address so that can follow up with you
regarding your feedback.
NOTE: Customer contact information is not be used for marketing purposes.
Security configuration
A separate guide provides some server configuration tasks which are intended specifically for security administrators, whose
role may be separate from the host system administrator.
The PowerProtect Data Manager Security Configuration Guide provides detailed instructions for all security-related tasks,
including but not limited to:
● Port requirements
● Configuring identity providers
● Managing local and external user accounts
● Changing and resetting passwords
● Assigning users and groups to roles and associated privileges
● Managing credentials for local and remote components
● Creating resource groups to define scopes of authority
● Managing security certificates, where applicable
Getting Started 23
Role-based security
PowerProtect Data Manager provides predefined user roles that control access to areas of the user interface and to protected
operations. Some of the functionality in this guide is reserved for particular roles and may not be accessible from every user
account.
By using the predefined roles, you can limit access to PowerProtect Data Manager and to backup data by applying the principle
of least privilege.
The PowerProtect Data Manager Security Configuration Guide provides more information about user roles, including the
associated privileges and the tasks that each role can perform.
24 Getting Started
2
System Maintenance
Topics:
• Deploying and maintaining the health of PowerProtect Data Manager
• Deploying and updating PowerProtect Data Manager
• Licensing PowerProtect Data Manager
• Specifying the PowerProtect Data Manager host
• Memory optimization
• Restricted mode
• System support
• Restarting PowerProtect Data Manager
• System maintenance troubleshooting
Update paths
CAUTION: If recommended guidelines are not followed, the update of PowerProtect Data Manager or one of its
components can fail.
When deploying or updating PowerProtect Data Manager, see the PowerProtect Data Manager Deployment Guide. It contains
detailed instructions and guidelines that must be followed in certain environments and configurations.
Updating from PowerProtect Data Manager versions 19.7 through 19.10 to version 19.11 is supported.
Security advisories
CAUTION: If the latest Dell security advisories (DSAs) are not followed, PowerProtect Data Manager can be
exposed to security vulnerabilities.
To review the latest DSAs, search for PowerProtect Data Manager at the Dell Technologies Security Advisories and
Notices website.
System Maintenance 25
License types
There are several different types of licenses, and they can provide licensing for different periods of time.
The available license types are described in the following table.
Front-end protected capacity by The primary model of licensing, which is based on the capacity that you want to
terabyte (FETB) protect. For example, you can purchase a 100-TB license, which enables you to
protect up to 100 TB of data.
Socket-based Licensed per CPU socket on virtual machine hosts that are being backed up or
replicated.
Add a license
You can add a license file to PowerProtect Data Manager and view license details, such as capacity usage and software ID
number.
Prerequisites
To obtain the XML license file from the license management website, you must have the License Authorization Code (LAC),
which is emailed from . If you have not received the LAC, contact your Customer Support representative.
Steps
1. From the PowerProtect Data Manager user interface, click , and then select License.
2. On the License window, perform one of the following actions:
● Copy and paste the text from the license file into the text box.
● Click Upload File, browse to the location of the license file and select the file, and then click Open.
The license file content appears in the License window.
3. Click Save.
Results
A message appears in the License window to confirm that the license is successfully added.
26 System Maintenance
Specifying the PowerProtect Data Manager host
When you specify a vCenter server as the PowerProtect Data Manager host, it allows the vCenter server to perform operations
unique to PowerProtect Data Manager.
The PowerProtect Data Manager host performs several operations, including the following:
● Virtual-machine configuration and other system activities.
● Taking a PowerProtect Data Manager snapshot, if required during a software update.
● Allowing memory that is assigned to PowerProtect Data Manager to be automatically increased as necessary when
performing a software update.
● Enabling Cloud Disaster Recovery (Cloud DR) in order to increase required PowerProtect Data Manager CPU and memory.
A vCenter host is a prerequisite for Cloud DR, as specified in the Cloud Disaster Recovery tab of the Infrastructure >
Asset Sources window in the PowerProtect Data Manager user interface.
Steps
1. From the PowerProtect Data Manager user interface, click , and then select Hosting vCenter.
The Hosting vCenter window appears.
2. Choose from one of the following options:
● Enter FQDN/IP—Select this option to manually enter the fully qualified domain name or IP of the vCenter server, the
port number, and to select the vCenter Host Credentials. The Host Credentials list is populated with vCenter servers
that have already been added and discovered in PowerProtect Data Manager. If the host vCenter credentials do not
appear in the list, select Add Credentials to enter this information.
● Select FQDN/IP from asset sources—Select this option to obtain the host vCenter server information automatically
from a vCenter asset source that has already been added and discovered in PowerProtect Data Manager.
3. Click Save.
Results
If the host vCenter server is added as an asset source in PowerProtect Data Manager, a icon displays next to this vCenter
server in the Infrastructure > Asset Sources window.
Setting vCenter 6.0 and later required privileges PowerCLI equivalent required privileges
Global ● Manage custom attributes ● Global.ManageCustomFields
● Set custom attributes ● Global.SetCustomField
Virtual Machine Snapshot Management ● Create snapshot ● VirtualMachine.State.CreateSnapshot
● Revert to snapshot ● VirtualMachine.State.RevertToSnapshot
● Remove snapshot ● VirtualMachine.State.RemoveSnapshot
● Rename snapshot ● VirtualMachine.State.RenameSnapshot
NOTE: A complete list of the privileges required for a dedicated vCenter user account is provided in the PowerProtect Data
Manager Virtual Machine User Guide.
System Maintenance 27
Memory optimization
You can use adjust the amount of memory that is assigned to the PowerProtect Data Manager virtual machine in order to
optimize server performance.
The following table indicates the default amount of memory assigned to the PowerProtect Data Manager virtual machine in a
standard environment. The default values are the minimum recommended values.
NOTE: For help with optimizing memory, contact your Customer Support representative.
Steps
1. Log in to the vSphere Web Client.
2. Right-click the appliance and select Edit Settings.
The Edit Settings window appears with the Virtual Hardware button selected.
3. In the Memory field, specify the new memory value.
Ensure that the value you specify does not exceed 32 GB of memory and that it is a multiple of 4 GB.
4. Click OK.
28 System Maintenance
Restricted mode
You can enable restricted mode to prevent scheduled writes to storage. You might want to enable restricted mode to limit
access to storage during a storage upgrade.
Enabling restricted mode during a storage upgrade provides the following benefits:
● Storage writes can be eliminated in a controlled manner. Once writes have stopped, storage can be upgraded.
● Storage writes can be tested after storage has been upgraded. Once testing is complete, storage can be returned to full
production.
Restricted mode prevents the following scheduled operations:
● Backups and replication
● Backup-copy deletion
● Server disaster-recovery backups
Restricted mode allows the following operations:
● Any jobs in progress or queued to run
● Manual backups and restores
● Discovery jobs
To enable restricted mode from the PowerProtect Data Manager user interface, click , select System Settings >
Restricted Mode, and then click Enable Restricted Mode.
System support
You can use the PowerProtect Data Manager user interface to manage and modify support settings that are typically configured
during deployment. Typically configured support settings include the mail server setup and Secure Remote Services registration.
Migrating to SupportAssist
SupportAssist provides automated support capabilities for PowerProtect Data Manager systems. SupportAssist replaces Secure
Remote Services (SRS) and SupportAssist Enterprise (SAE) in this release of PowerProtect Data Manager
If you have configured the SRS or SAE gateway previously, you must update the SRS or SAE gateway to Secure Connect
Gateway (SCG) version 5.0 or higher.
System Maintenance 29
The PowerProtect Data Manager system automatically migrates SCG to SupportAssist when you update PowerProtect Data
Manager.
If you do not have the SRS or SAE gateway configured, you can configure SupportAssist directly.
Use the following procedures to configure SupportAssist.
Steps
1. Go to the Customer Support website and log in to your account.
2. In the search box, type PowerProtect Data Manager and click Search.
3. Click Generate Access Key in the Quick links pane.
4. Enter the product ID (serial number) in the search box.
5. In the Create PIN field, enter a 4-digit PIN.
Record the PIN for later use.
6. Click Generate Access Key.
The access key is sent to the email address for your account.
NOTE: It might take up to 5 minutes to receive the access key in your email.
Prerequisites
● Apply a valid PowerProtect Data Manager license.
● If you are connecting through the gateway server, the SCG gateway version must be 5.0 or later.
● Apply a valid access key and PIN.
● HTTPS port 443 of esrs3-core.emc.com and esrs3-coredr.emc.com is not blocked by the network firewall.
Steps
1. From the PowerProtect Data Manager UI, click , select Support, and then click SupportAssist.
The Support window opens to the SupportAssist page.
2. On the Connection tab, click Connect Now.
3. Select one of the following options:
● Connect Directly
Select this option to connect PowerProtect Data Manager directly, and then enter the SupportAssist Access Key and
PIN.
NOTE: Remote Support functionality is currently not supported for PowerProtect Data Manager systems using a
direct connection
● Connect via Gateway
Select this option to connect PowerProtect Data Manager through a gateway server, and then enter the gateway server
IP address and port number.
30 System Maintenance
5. Click Enable Connect.
Results
PowerProtect Data Manager is connected to support services.
Steps
1. From the PowerProtect Data Manager UI, click , select Support, and then click SupportAssist.
The Support window opens to the SupportAssist page.
2. Select the Contacts tab.
3. To add a primary contact, complete the following steps:
a. Enter the following information:
● First Name
● Last Name
● Email
● Phone
b. Select the Preferred Language from the list.
c. Click Save.
4. To add a secondary contact, click + Add Secondary Contact and enter the required information.
Add AutoSupport
When AutoSupport is enabled, automated support information, telemetry reports, alert summaries, and CloudIQ reports are sent.
Steps
1. From the PowerProtect Data Manager UI, click , select Support, and then click AutoSupport.
The AutoSupport window appears.
2. Change the Enable AutoSupport option to Disabled or Enabled, and click Save.
When you enable AutoSupport, select whether to receive the AutoSupport communications through SupportAssist or email
server.
When you enable AutoSupport, the Telemetry Software Terms page displays. Review and scroll down to the bottom of
the page to accept the terms, and then click Save to save your changes.
When you disable AutoSupport, PowerProtect Data Manager stops sending error and telemetry data to SupportAssist or the
SMTP server. PowerProtect Data Manager continues to send information for updates and other information.
NOTE: To disable SupportAssist, clear the SupportAssist option in the AutoSupport window.
System Maintenance 31
Change SupportAssist connection settings
Use the following procedure to change SupportAssist connection settings.
Steps
1. From the PowerProtect Data Manager UI, click , select Support, and then click SupportAssist.
The Support window opens to the SupportAssist page.
2. Select one of the following connection options:
● Connect Directly
● Connect via Gateway
To add a new gateway connection, complete the following steps:
a. Enter the gateway IP address and port number.
b. Click Test.
Wait until the connection test is complete. If the connection is successful, a green check mark is displayed next to the
gateway IP address and port number.
3. Enter the SupportAssist Access Key and PIN.
NOTE: If you are not connecting with a new access key, skip this step.
4. Click Reconnect.
Steps
1. From the PowerProtect Data Manager UI, click , select Support, and then click SupportAssist.
The Support window opens to the SupportAssist page.
2. To enable SupportAssist, move the Connect to SupportAssist slider to the right. To disable SupportAssist, move the
Connect to SupportAssist slider to the left.
The operation might take up to 5 minutes to complete.
Troubleshooting SupportAssist
Review the following information that is related to troubleshooting SupportAssist.
32 System Maintenance
Test gateway connection failed
If you are using a gateway that is not Secure Connect Gateway (SCG), the connection to the gateway might fail. As a result,
the SCG gateway configuration is not transferred to SupportAssist after you update PowerProtect Data Manager.
When updating PowerProtect Data Manager, the precheck dialog box displays a warning indicating that the SCG gateway
version 5.0 or higher is required. Make sure that you update the Secure Remote Services (SRS) or SupportAssist Enterprise
(SAE) gateway to a version compatible with the SCG version.
If you are using a SCG or SAE gateway, the update fails with the following error:
SYS0034
Unable to upgrade from Secure Remote Services to SupportAssist.
Details
The upgrade to SupportAssist is unsuccessful for one or more of the following reasons:
1) The SupportAssist service cannot start. 2) The gateway is not accessible. 3) An issue
occurs during Gen3 key upgrade.
Recommended Action
In the PowerProtect Data Manager UI: 1) To open the Support dialog, click Settings and
select Support. 2) In the left pane, select SupportAssist to set up SupportAssist.
If this issue occurs, perform the following:
1. Check that you are using the SCG gateway and that the version is 5.0 or higher.
2. Set up SupportAssist. In the PowerProtect Data Manager UI, click , select Support, and then click SupportAssist.
Telemetry Collector
Telemetry Collector gathers information related to this system, including configuration, usage characteristics, performance, and
deployment location information. Telemetry Collector manages remote access and the exchange of system data with Dell Inc. or
its subsidiaries. The information that is gathered by Telemetry Collector is confidential and this data cannot be shared.
When you enable SupportAssist, you also enable Telemetry Collector, which allows Customer Support engineers to collect data
that is related to troubleshooting device and PowerProtect Data Manager software issues. Telemetry Collector does not collect
any personal information.
Telemetry Collector populates three reports—a telemetry report, an alert summary report, and a CloudIQ report. Telemetry
Collector collects details about the following objects:
● Alerts
● Assets
● Asset sources
● Audit logs
● Cloud Data Recovery
● Cloud Disaster Recovery metrics
● Compliance details
● Compliance in the last 24 hours
● Data targets
● DD inventory
● Host information
● Integrated storage
● Licensing
● PowerProtect Data Manager operational inventory
● Protection details
System Maintenance 33
● Protection policies
● Quick-recovery synchronization information
● Service-level agreements
● Storage systems
● Time spent on generating reports
● Traffic metrics
● Update summaries
● Usage
CloudIQ reporting
When you enable AutoSupport, you also enable reporting. CloudIQ is a no-cost SaaS/cloud-based management application that
proactively monitors and measures the overall health of systems through intelligent, comprehensive, and predictive analytics.
The data reported to CloudIQ includes configuration data, historical metrics and health score data.
Ensure that the following requirements are met:
● Add a valid license in System Settings > License.
● Set up SupportAssist in System Settings > Support > SupportAssist.
● Enable AutoSupport and select SupportAssist.
When AutoSupport is enabled, CloudIQ reports are sent automatically. To log in to CloudIQ, click , and then click CloudIQ.
You can also go to https://cloudiq.dell.com. For more information on CloudIQ, refer to the CloudIQ Online Support site.
Steps
1. From the PowerProtect Data Manager user interface, click , select Support, and then click Email Setup.
2. Populate the following fields:
a. Mail Server
The SMTP mail server.
b. Email from:
The email address at which you would like to receive PowerProtect Data Manager AutoSupport email.
c. [Optional] Recipient for Test Email:
The email address to which you would like to send PowerProtect Data Manager test email.
d. [Optional] Port:
The default port is 25. PowerProtect Data Manager supports using non-default ports.
If the email setup is deleted, you must manually choose any non-default port that is not in use anywhere else.
e. User Name:
The user name associated with thePowerProtect Data Manager SMTP email server.
f. Password:
The password associated with the PowerProtect Data Manager SMTP email server.
3. Click Send Test Email.
PowerProtect Data Manager sends a test email.
4. Click Save.
34 System Maintenance
Add AutoSupport
When AutoSupport is enabled, automated support information, telemetry reports, alert summaries, and CloudIQ reports are sent.
Steps
1. From the PowerProtect Data Manager UI, click , select Support, and then click AutoSupport.
The AutoSupport window appears.
2. Change the Enable AutoSupport option to Disabled or Enabled, and click Save.
When you enable AutoSupport, select whether to receive the AutoSupport communications through SupportAssist or email
server.
When you enable AutoSupport, the Telemetry Software Terms page displays. Review and scroll down to the bottom of
the page to accept the terms, and then click Save to save your changes.
When you disable AutoSupport, PowerProtect Data Manager stops sending error and telemetry data to SupportAssist or the
SMTP server. PowerProtect Data Manager continues to send information for updates and other information.
NOTE: To disable SupportAssist, clear the SupportAssist option in the AutoSupport window.
Steps
1. From the PowerProtect Data Manager user interface, click , and then click Logs.
2. Click Add to add a log bundle.
The Add Log Bundle window appears.
3. Select the systems for the log bundle (Data Manager, VM Direct Engines, or, if Cloud DR is deployed, CDRS), set the log
bundle duration, and click Save.
The Jobs window displays the progress of the log bundle creation. Also, a green banner in the UI indicates that the log
bundle has successfully been created. If you want to dismiss the banner, click X.
4. To delete the log bundle, select the box to the left of log bundle and click Delete.
The Log Capacity indicates how much space (in GB) remains on the disk for logs and the percentage of the disk in use for
log storage.
5. To download the log bundle, click the bundle name in the Bundle Name column.
System Maintenance 35
Audit logging and monitoring system activity
The Linux audit daemon (auditd) tracks and logs security-relevant events on the PowerProtect Data Manager system.
Users with the Administrator role can use auditd to monitor the following events:
● File access
● System calls
● Login and logout activity of users
Audit logging enables you to discover access violations, changed or deleted files, failed authentication, and so on.
Steps
1. Log in to the PowerProtect Data Manager UI with an account that has one of the indicated roles.
2. Go to Alerts > Audit Logs.
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Alerts.
You can also click the icon in the top banner, and then click the links to view unacknowledged alerts of all statuses
(critical, warning, and informational), or only the unacknowledged critical alerts.
NOTE: Clicking the New tag displays only the unacknowledged alerts that have been generated within the last 24 hours.
The number that appears next to the is the total number of unacknowledged critical alerts over the last 24 hours.
36 System Maintenance
5. To view more details about a specific entry, click next to the entry in the table.
6. For the following steps, log in to the PowerProtect Data Manager UI with an account that has the Administrator, Backup
Administrator, or Restore Administrator role.
7. To acknowledge one or more alerts, select the alerts and then click Acknowledge.
8. To add or edit a note for the alert, click Add/Edit Note, and when finished, click Save.
9. To export a report of alert information to a .csv file which you can download for Excel, click Export All.
NOTE: If you apply any filters in the table, exported alerts include only those alerts that satisfy the filter conditions.
Steps
1. Go to Administration > Audit Logs.
The list of audit logs appears, which displays the following information:
● Changed at
● Audit Type
● Description
● Changed By
● Object Changed
● Previous Values
● New Values
2. To set the retention period (in days) for the audit log, select Set Boundaries and update the retention period.
Only the Administrator role can perform this step.
3. To add a note for the audit log, click >, enter a note in the Note field, and click Save.
4. Click Export All.
To view the status of system components, click , select Support, and then click System Health.
The following table provides a summary of the status of each system component:
System Maintenance 37
Table 17. Component status (continued)
Status Description
Shut down This state appears when the service has stopped.
No response This state appears when the service that is associated with the component is running, but the service is
not responding.
Security certificates
A default deployment of PowerProtect Data Manager creates self-signed security certificates that secure communication with
other components. As you configure the server and add assets, PowerProtect Data Manager stores additional certificates for
each component.
The Administrator and Security Administrator roles can review the Administration > Certificates page in the UI. This page
contains three tabs that list the installed security certificates. Each tab provides information about certificate uses, expiry dates,
issuers, and so forth.
The certificates on the Internal tab secure access to components that are part of the PowerProtect Data Manager server,
such as the UI and REST API. The certificates on the Application Agents tab secure access to the agents, which are under
the control of PowerProtect Data Manager but exist outside the server. The certificates on the External Servers tab secure
access to components or systems that are beyond the control of the server, but where you have approved the communication.
The PowerProtect Data Manager Security Configuration Guide contains more information about cryptography and security
certificates. This guide provides instructions for how to manage the installed certificates, including important prerequisites,
operational considerations, associated tasks, and troubleshooting. For example, you can replace the default self-signed security
certificates for PowerProtect Data Manager with certificates from an approved certificate authority. This guide also contains
instructions for establishing certificate-based trust with external components and systems.
38 System Maintenance
Restarting PowerProtect Data Manager
When a PowerProtect Data Manager restart is required, Dell Technologies recommends that you avoid directly powering off the
virtual machine unless it is necessary.
To ensure that PowerProtect Data Manager is able to properly restart, use the reboot or shutdown command. For example,
on Linux, run the command shutdown -r or shutdown -h now.
System Maintenance 39
3
Managing Storage
Topics:
• Protection storage
• Storage units
• Differences in storage system and storage unit space reporting
• Monitoring storage capacity thresholds
Protection storage
Protection storage is the set of configured storage systems where PowerProtect Data Manager stores backup copies,
replicated copies, and other important information. Protection storage can include any of the following:
● A DD system, including High Availability PowerProtect DD mode
● An instance of PowerProtect DD Management Center (DDMC) that manages multiple DD systems
● A DDMC Smart Scale system pool
NOTE: Data Domain is now PowerProtect DD. References to Data Domain or DD systems in this documentation, in the UI,
and elsewhere in the product include PowerProtect DD systems and older Data Domain systems. In many cases the UI has
not yet been updated to reflect this change.
The most up-to-date software compatibility information for PowerProtect Data Manager is provided by the E-Lab Navigator.
Observe the following information before you configure protection storage:
● Adding and configuring protection storage requires the Administrator role.
● You cannot add protection storage that runs incompatible versions of DDOS.
● You can only add the same protection storage system once, whether you specify the hostname, FQDN, or IP address.
● You cannot add a PowerProtect DD Management Center instance which has no managed DD systems.
● The first time that you add protection storage, PowerProtect Data Manager automatically configures and enables server DR.
The first protection storage system is the default target. System recovery for server DR provides more information.
Protection storage is further divided into logical groupings that are called storage units, which hold related data and apply more
detailed configuration options.
Click to open the Details pane and see more information about an existing protection storage system.
NOTE: Adding a PowerProtect DD Management Center instance is not required for the Storage Direct agent.
40 Managing Storage
High Availability PowerProtect DD support
PowerProtect Data Manager supports DD systems with High Availability (HA) enabled. The Active-Standby configuration
provides redundancy in the event of a system failure. HA keeps the active and standby systems synchronized, so that if the
active node were to fail, the standby node can take over services and continue where the failing node left off.
When an active High Availability PowerProtect DD system fails over to its standby High Availability PowerProtect DD system, all
in progress PowerProtect Data Manager operations including backup, restore, replication, and Cloud Tier continue unaffected.
To add a High Availability PowerProtect DD configuration as a storage target in PowerProtect Data Manager, select
Infrastucture > Storage in the PowerProtect Data Manager UI. Add protection storage provides more information.
Virtual machine application-aware protection are only be supported with DDOS version 7.0 or later for HA. The most up-to-date
software compatibility information for PowerProtect Data Manager is provided by the E-Lab Navigator.
For details on DD systems with HA enabled, see the DDOS Administration Guide.
Adding a DDMC instance with system pools also discovers the individual systems within the system pool. PowerProtect
Data Manager includes these systems in lists of available storage targets, such as for protection policy creation. As with
a non-Smart Scale DDMC instance, the Infrastructure > Storage page groups and identifies these systems through the
Managed By column in the list of protection storage systems.
Some roles do not allow you to view the Infrastructure > Storage page to identify the relationships between systems
and system pools. If your role does not allow you to view this information, coordinate storage target assignments with your
system administrator.
Protection policies that target a system pool can replicate to another system pool or to a stand-alone protection storage
system. Conversely, policies that target a stand-alone protection storage system can replicate to another protection storage
system or to a system pool.
Adding the values for Available and Free yields the total amount of unused space within the system pool.
Managing Storage 41
Mobile DD Boost users
Smart Scale mobile DD Boost users own mobile storage units on system pools. This concept extends the association between
DD Boost users and ordinary storage units to the system pool scope.
Mobile DD Boost users provide a unique user ID within a DDMC data center and control access to the associated mobile storage
units. These users are centrally managed and unique across data centers.
Mobile DD Boost users send their requests to the DDMC instance which manages the entire system pool. DDMC, in turn,
forwards the request to the correct system within the system pool.
As with other storage units, PowerProtect Data Manager associates a mobile DD Boost user with each mobile storage unit under
the control of PowerProtect Data Manager.
Storage units provides more information about mobile storage units.
Prerequisites
NOTE:
When adding a High Availability PowerProtect DD system, observe the following points:
● Do not add the individual active and standby DD systems to PowerProtect Data Manager.
● In the Address field, use the hostname that corresponds to the floating IP address of the High Availability PowerProtect
DD system.
● The High Availability PowerProtect DD system is verified with the root certificate.
Steps
1. From the left navigation pane, select Infrastructure > Storage.
The Storage window appears.
2. In the Protection Storage tab, click Add.
42 Managing Storage
3. In the Add Storage dialog box, select a storage system (PowerProtect DD System or PowerProtect DD Management
Center).
For a system pool, select DDMC.
4. To add a High Availability PowerProtect DD system, select the checkbox.
5. Specify the storage system attributes:
a. In the Name field, specify a storage name.
b. In the Address field, specify the hostname, fully qualified domain name (FQDN), or the IP address.
c. In the Port field, specify the port for SSL communication. Default is 3009.
6. Under Host Credentials click Add, if you have already configured protection storage credentials that are common across
storage systems, select an existing password. Alternatively, you can add new credentials, and then click Save.
7. If a trusted certificate does not exist on the storage system, a dialog box appears requesting certificate approval. Click
Verify to review the certificate, and then click Accept.
8. Click Save to exit the Add Storage dialog and initiate the discovery of the storage system.
A dialog box appears to indicate that the request to add storage has been initiated.
9. In the Storage window, click Discover to refresh the window with any newly discovered storage systems.
When a discovery completes successfully, the Status column updates to OK.
10. To modify a storage system location, complete the following steps:
A storage system location is a label that is applied to a storage system. If you want to store your copies in a specific location,
the label helps you select the correct storage system during policy creation.
a. In the Storage window, select the storage system from the table.
b. Click More Actions > Set Location.
The Set Location window appears.
c. Click Add in the Location list.
The Add Location window appears.
d. In the Name field, type a location name for the asset, and click Save.
Results
PowerProtect Data Manager displays the available protection storage systems. For each protection storage system, the
Managed By column contains one of the following:
Steps
1. From the left navigation pane, select Infrastructure > Storage.
The Storage window appears.
2. In the Protection Storage tab, select a protection storage system and then click the link in the Managed By column.
Edit Storage dialog box appears.
3. In the Edit Storage dialog box, specify the storage system attributes:
a. In the Name field, specify a new storage name.
b. In the Port field, specify the port for SSL communication. Default is 3009.
c. Under Host Credentials, select a new set of credentials or click Add.
4. If a trusted certificate does not exist for the protection storage system, a dialog box appears requesting certificate approval.
Click Verify to review the certificate, and then click Accept.
5. Click Save to exit the Edit Storage dialog box.
Managing Storage 43
Storage units
PowerProtect Data Manager can create, configure, and reuse storage units on a protection storage system. These storage units
are the targets for protection and replication policies.
The term "storage unit under the control of PowerProtect Data Manager" describes a storage unit that was created through
one of the methods that are discussed here.
Review the applicable limitations before you create or change a storage unit, or change the protection or replication target for
a policy. The PowerProtect DD Virtual Edition Installation and Administration Guide for the appropriate platform provides more
information about storage units (MTrees).
Click to open the Details pane and see more information about an existing storage unit, including configuration values.
Security
All protection policies and applications that share a storage unit can access any data in that storage unit. Reuse a storage unit
only for policies and applications that belong to the same organizational unit or which share a trusted relationship. Policies and
applications for different organizational units should use different storage units.
Any other external applications that also use the storage unit should protect and restrict access to the DD Boost credentials.
These credentials provide access to the PowerProtect Data Manager data.
44 Managing Storage
Automatic storage unit maintenance
For automatically-created storage units, automatic maintenance removes the storage unit when both the following conditions
are true:
● No protection policies target the storage unit for backups or replication.
● The storage unit contains no backups.
Automatic maintenance removes these empty, unused storage units even if retention lock is enabled.
For directly-created storage units, automatic maintenance does not remove the storage unit even when these conditions are
true. In this case, contact the protection storage system administrator to remove the storage units.
Table 21. Supported storage units for PowerProtect DD Operating System (DDOS) versions
PowerProtect DD DDOS version Maximum number Supported configurable concurrently active
system of storage units storage units
supported
DD9800 6.0 and later 256 256
DD9500 5.7 and later 256 256
DD6800, DD9300 6.0 and later 128 128
DD6300 6.0 and later 100 32
Managing Storage 45
Table 21. Supported storage units for PowerProtect DD Operating System (DDOS) versions (continued)
PowerProtect DD DDOS version Maximum number Supported configurable concurrently active
system of storage units storage units
supported
DD990, DD4200, DD4500, 5.7 and later 128 128
DD7200
All other DD systems 5.7 and later 100 Up to 32, based on the model
DD9500 5.6 100 64
DD990, DD890 5.3 and later 100 Up to 32, based on the model
DD7200, DD4500, 5.4 and later 100 Up to 32, based on the model
DD4200
All other DD systems 5.2 and later 100 Up to 14, based on the model
Prerequisites
Add at least one protection storage system for PowerProtect Data Manager.
Steps
1. From the left navigation pane, select Infrastructure > Storage.
The Storage window appears.
2. On the Protection Storage tab, select a storage system, and then select More Actions > Manage Storage Units.
The Storage Units page opens and displays a list of the storage units under the control of PowerProtect Data Manager.
3. Select Add.
The Create Storage Unit or Create Mobile Storage Unit dialog box opens.
4. Type a name for the new storage unit.
5. For mobile storage units in system pools, select a Network Group.
Network groups are configured in DDMC to provide access to the system pool over different physical or virtual networks.
A network group contains information about the IP addresses for the pool members and the IP address that clients use for
access to the system pool.
6. Set the capacity and stream quotas that restrict the storage unit resource consumption.
There are two kinds of quota limits—hard limits and soft limits. You can set either a soft or hard limit or both a soft and hard
limit. Both values must be integers, and the soft value must be less than the hard value.
NOTE: When you set a soft limit and the limit is reached, an alert is generated but data can still be written. When you
set a hard limit and the limit is reached, data cannot be written. All data protection operations fail until data is deleted
46 Managing Storage
from the storage unit. The PowerProtect DD Virtual Edition Installation and Administration Guide for the appropriate
platform provides more information about quota configuration.
a. Capacity Quota—Controls the total size of precompression data that is written to the protection storage.
b. Stream Quota—The number of concurrent streams allowed during data protection operations. Setting a Stream Quota
limit can help ensure that performance is not impacted negatively when a data protection operation consumes too many
resources.
7. Select Save.
Results
PowerProtect Data Manager creates the storage unit on the selected protection storage system.
Steps
1. From the left navigation pane, select Infrastructure > Storage.
The Storage window appears.
2. On the Protection Storage tab, select a storage system, and then select More Actions > Manage Storage Units.
The Storage Units page opens and displays a list of the storage units under the control of PowerProtect Data Manager.
3. To view the details or usage for a storage unit, select for that storage unit.
The Details pane opens and displays the name, type, capacity, quota information, and a list of protection policies that
currently target the storage unit.
The storage unit may contain copies from protection policies that no longer target the storage unit.
4. Select a storage unit from the list, and then select Edit.
The Edit Storage Unit or Edit Mobile Storage Unit dialog box opens.
5. For mobile storage units in system pools, select a Network Group.
Network groups are configured in DDMC to provide access to the system pool over different physical or virtual networks.
A network group contains information about the IP addresses for the pool members and the IP address that clients use for
access to the system pool.
6. Set the capacity and stream quotas that restrict the storage unit resource consumption.
There are two kinds of quota limits—hard limits and soft limits. You can set either a soft or hard limit or both a soft and hard
limit. Both values must be integers, and the soft value must be less than the hard value.
NOTE: When you set a soft limit and the limit is reached, an alert is generated but data can still be written. When you
set a hard limit and the limit is reached, data cannot be written. All data protection operations fail until data is deleted
from the storage unit. The PowerProtect DD Virtual Edition Installation and Administration Guide for the appropriate
platform provides more information about quota configuration.
a. Capacity Quota—Controls the total size of precompression data that is written to the protection storage.
b. Stream Quota—The number of concurrent streams allowed during data protection operations. Setting a Stream Quota
limit can help ensure that performance is not impacted negatively when a data protection operation consumes too many
resources.
7. Select Save.
Results
PowerProtect Data Manager updates the storage unit settings.
Managing Storage 47
Change a storage unit password
It is recommended that you change passwords periodically for security purposes. Change the password for an existing storage
unit through the PowerProtect Data Manager UI. The change synchronizes automatically with the protection storage system.
Prerequisites
Before changing a password, verify that recent backup operations have successfully completed by checking the backup status
history in the Jobs window. You can also perform a new backup of the applicable protection policies.
The default password policy for storage units is:
● Must be between 16 and 20 characters in length
● At least one numeric character (0-9)
● At least one uppercase character (A-Z)
● At least one lowercase character (a-z)
● At least one of the following special characters: \~!@#$%^&*()+={}|:";<>?[]-_.,^'/
● A maximum of three consecutive identical characters
You can modify the password policy for storage units. Modify the password policy for storage units provides more information.
Steps
1. From the left navigation pane, select Infrastructure > Storage.
The Storage window appears.
2. On the Protection Storage tab, select a protection storage system, and then select Manage Storage Units.
The Storage Units page opens and displays a list of the storage units under the control of PowerProtect Data Manager.
3. Select one or more storage units from the list for which you would like to change the password, and then click Update
Password.
You can only update the password for storage units that are under the control of PowerProtect Data Manager. For other
storage units, the Update Password button is disabled.
The Update Password for Storage Unit(s) dialog box opens.
4. To automatically create a password for the storage unit:
a. Select Automatically generate a new password.
b. Click Save.
If you selected multiple storage units, PowerProtect Data Manager creates a unique password for each storage unit.
The storage unit password updates and synchronizes automatically with the protection storage system.
5. To create your own password:
a. Select Enter a new password.
b. In the Password field, type a new password for the storage unit according to the password policy.
c. Click Save.
If you selected multiple storage units, PowerProtect Data Manager uses the same password for each storage unit.
The storage unit password updates and synchronizes automatically with the protection storage system.
6. Go to the Jobs window to monitor the progress of the password change operation.
7. Perform another backup of the protection policy and verify that the backup completes successfully.
Steps
1. Connect to the PowerProtect Data Manager console as an admin user.
2. Locate the password policy file at /usr/local/brs/lib/cbs/config/
powerprotect_dd_password_policy.properties.
3. Modify the password policy.
NOTE: Ensure that the modified password policy complies with the DD password policy.
48 Managing Storage
4. Restart the cbs service:
cbs restart
5. Verify that the cbs service started successfully.
Results
The modified password policy takes effect when the cbs service successfully starts.
Prerequisites
This task requires the name of the PowerProtect DD MTree where the storage unit resides.
Steps
1. Connect to the PowerProtect Data Manager console as an admin user.
2. Navigate to the /usr/local/brs/puppet/scripts directory.
3. Obtain the storage unit password by typing the following command:
python get_dd_mtree_credential.py MTree-name
For example:
Managing Storage 49
For example, because PowerProtect Data Manager displays the DD storage unit logical capacity, the value that is reported when
you select More Actions > Manage Storage Units in the PowerProtect Data Manager UI Infrastructure > Storage window
might be greater than the amount reported in DDVE, which displays the physical capacity.
To determine the physical storage unit capacity, use DDVE instead.
50 Managing Storage
4
Using the PowerProtect Search Engine
Topics:
• Introducing the PowerProtect Search Engine
• Set up and manage indexing
• Search Engine node deletion
• Edit the network configuration for a Search Engine node
• Perform a search
• Troubleshooting Search Engine issues
Limitations
● PowerProtect Search Engine is an optional feature that can be enabled, set up, and configured for virtual machine backups
and protection policies. When you enable this feature, a backup of the Search Engine is taken as part of the server backup
process. As of this release, you cannot disable these backups. Therefore, when Search is enabled, you must add the Search
Engine node on the DD system that contains the ServerBackup MTree to the Allow list. If you use NFS for server DR, add
the Search Engine node IP address or hostname to the client list for the NFS export.
● After an update to PowerProtect Data Manager, with the Search Engine already configured, and the first time that you use
the Networks page to add a virtual network to an environment, PowerProtect Data Manager does not automatically add
the virtual network to the Search Engine. Instead, manually edit each node to add the virtual network. This action makes
the Search Engine aware of virtual networks. Any subsequent new virtual networks are automatically added to the Search
Engine.
Prerequisites
Ensure that:
● A vCenter datastore has been configured. The PowerProtect Data Manager Virtual Machine User Guide provides detailed
steps for adding a vCenter server as an asset source.
● PowerProtect Data Manager has discovered the networks for the vCenter server.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Search Engine, and then click Add Node.
2. In the Add Search Engine Node wizard, provide the required parameters.
● Hostname, IP Address, Gateway, DNS, and Netmask—Note that only IPv4 addresses are supported.
● vCenter—If you have added multiple vCenter server instances, select the vCenter server on which to deploy the Search
Engine node.
NOTE: Ensure that you do not select the internal vCenter server.
● ESX Host/Cluster—Select on which cluster or ESXi host you want to deploy the Search Engine node.
● Network—Displays all the networks that are available under the selected ESXi Host/Cluster. For virtual networks
(VLANs), this network carries management traffic.
● Data Store—Displays all datastores that are accessible to the selected ESXi Host/Cluster.
3. Click Next.
The Networks Configuration page displays.
4. On the Networks Configuration page:
The Networks Configuration page configures the virtual network (VLAN) to use for Data for Management Components
traffic. To continue without virtual network configuration, leave the Preferred Network Portgroup selection blank and
then click Next.
a. From the Preferred Network Portgroup list, select a Virtual Guest Tagging (VGT) group.
VST (Virtual Switch Tagging) groups are not supported.
The list displays all virtual networks within the trunk range. If you select a portgroup that contains multiple networks,
PowerProtect Data Manager automatically selects all networks. Individual networks cannot be selected.
A Search Engine node requires an IP address from the static IP pool for each selected virtual network. If there are not
enough IP addresses in a pool, the wizard prompts you to supply additional addresses for that network.
Ensure that the selected virtual networks support a traffic type that is compatible with Search Engine nodes.
b. If required, type an available static IP address or IP address range in the Additional IP Addresses column for the
indicated virtual network.
For convenience when working with multiple virtual networks, you can also use one of the Auto Expand options:
● Expand Last IP—The wizard increments the host portion of the last IP address in the static IP pool. Click Apply.
● Same Last Digit—The wizard adds the network portion of the IP address to the specified value. Type the host
portion of the IP address and then click Apply.
The wizard updates the value in the Additional IP addresses column for each network. Verify the proposed IP
addresses.
c. Click Next.
5. On the Summary page, review the information and then click Finish.
The new Search Engine node is deployed, and details are displayed in the lower panel.
6. (Optional) Repeat the previous steps to deploy additional Search Engine nodes to the cluster.
NOTE: Ensure that the previous Search Engine node successfully deploys before you add another.
7. In the Configure Search Engine dialog box, enable or disable indexing, accept or change the expiration period, and then
click OK.
NOTE:
Next steps
NOTE:
When you edit or retry an operation that failed and there are additional IP addresses in the address pool, PowerProtect Data
Manager marks the last failed IP address as abandoned. PowerProtect Data Manager does not try to reuse any IP addresses
that are marked as abandoned. The UI does not display this condition.
KB article 000181120 provides more information about how to use the REST API to detect when an IP address is marked as
abandoned. The article also provides steps to correct this condition so that the IP address can be used again.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Search Engine.
2. Select the node from the list that you want to delete and click More Actions > Delete Node.
In the Delete Search Engine Node window, choose one of the following options:
CAUTION: When you delete a node and its data, the Search Engine deletes the node without redistributing
the data to the remaining nodes in the cluster. If the index data is deleted, the cluster becomes inactive.
3. Go to the Jobs > System Jobs window to monitor the progress of the node deletion operation.
Results
The node is deleted from the cluster.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Search Engine.
2. Select the failed node that you want to either redeploy or delete from the cluster.
3. Do one of the following:
● To redeploy the failed node, click More Actions > Redeploy Node.
The Redeploy Search Engine Node wizard opens. The Search Engine populates the fields with the information that you
supplied when you added the node. Verify that the information is correct.
● To delete the failed node, click More Actions > Delete Node.
Results
You can view the details for the operation in the Jobs > System Jobs window.
Next steps
Optionally, if you want to update the DNS and/or gateway during the Search Engine node redeployment, you can use one of the
following commands:
● To update both the gateway and DNS, run ./infranodemgmt redeploy -node_id Search Node ID
-updateDns DNS IPv4 address -updateGateway Gateway IPv4 address
● To update the gateway only, run ./infranodemgmt redeploy -node_id Search Node ID -updateGateway
Gateway IPv4 address
● To update DNS only, run ./infranodemgmt redeploy -node_id Search Node ID -updateDns DNS IPv4
address
Prerequisites
Before you remove a network, disable indexing. Set up and manage indexing provides instructions.
Virtual networks with a warning symbol ( ) beside the network name require attention and review. For example, if you
changed the network configuration, the configured traffic types may not support Search Engine nodes. Clear any interfaces
which no longer apply to the Search Engine node.
4. If required, type an available static IP address or IP address range in the Additional IP Addresses column for the indicated
virtual network.
For convenience when working with multiple virtual networks, you can also use one of the Auto Expand options:
● Expand Last IP—The wizard increments the host portion of the last IP address in the static IP pool. Click Apply.
● Same Last Digit—The wizard adds the network portion of the IP address to the specified value. Type the host portion
of the IP address and then click Apply.
The wizard updates the value in the Additional IP addresses column for each network. Verify the proposed IP addresses.
5. Click Next.
6. On the Summary page, review the information and then click Finish.
Next steps
If you disabled indexing, re-enable indexing. Set up and manage indexing provides instructions.
Perform a search
When the Search Engine is deployed and configured, you can use the File Search functionality in the PowerProtect Data
Manager UI to search across all indexed data to locate protected files and folders within backup copies. When asset types are
set up for index searching, the File Search button appears in the Restore menu for assets.
Before performing a search, ensure that:
● A Search Engine node is set up.
● Search indexing is enabled.
● Examine the REST engine logs in the Search Engine node (/opt/emc/search/logs/rest-engine/*.log), and look
for certificate verification errors.
● Run a search either through the UI or through the API <PowerProtect Data Manager>/api/v2/file-instances
and look for a certification verification error.
Examine the certificate files on each Search Engine node to investigate further. If necessary, regenerate the certificate files.
Verify certificates
Use this procedure to verify that certificates are valid and uncorrupted:
1. Verify that the rootca.pem file is the same in all the relevant nodes (Search Engine node, PowerProtect Data Manager,
and VM Direct node).
NOTE: The rootca.pem file name is different on each node:
● PowerProtect Data Manager—/etc/ssl/certificates/rootca/rootca.pem
● Search Engine node—/var/lib/dellemc/vmboot/trust/thumbprint
● VM Direct—/var/lib/dellemc/vmboot/trust/thumbprint
2. Run the following OpenSSL command to find out whether the root certificate file is corrupt or invalid: openssl verify
<rootca.pem>
Response:
/var/lib/dellemc/vmboot/trust/thumbprint: C = US,
O = DELL Corporation,
CN = PPDM Root CA ID-4c9de850-24ab-42ec-a9a7-6080849d0d24
OK
To shorten the expiration time to remove indexes sooner, complete the following steps:
1. From the PowerProtect Data Manager UI, select Infrastructure > Search Engine.
2. Select the cluster, and then click Configure Cluster.
3. In the Configure Search Cluster dialog box, modify the Search Index Expiration and click Save. A recommended formula
to determine the expiration time is: Delete Index when Today = Backup-Date + Expiration Days + 1 day.
That is, one day after the backup expires.
NOTE: This setting applies to all indexes in all protection policies in the Search Engine.
{
Command: "APP_SNAPSHOT",
Title: "Initiate Index/Search Cluster Snapshot Process",
AsyncCmd: false,
Properties: {
"Name": {
Description: "Used to uniquely identify a particular snapshot",
Type: STRING
},
"Action": {
Description: "Action to perform, 'Create', 'Delete', 'Restore' or
'Cancel' a Snapshot",
Type: STRING
},
For example:
{
"Command": "APP_SNAPSHOT",
"Title": "",
"AsyncCmd": false,
"Properties": {
"Action": {
"Description": "",
"Required": false,
"Type": "string",
"IsArray": false,
"Value": "Create",
"Default": null
},
"Name": {
"Description": "",
"Required": false,
"Type": "string",
"IsArray": false,
"Value": "DataManager_Catalog_Cluster_snapshot_2019-10-16-12-57-16",
"Default": null
},
"NFSHost": {
"Value": "10.25.87.88"
},
"NFSExport": {
"Value": "/mnt/shared"
},
"NFSDirPath": {
"Value": ""
}
}
}
3. You can delete indexes by protection policy or by asset. If the JSON command is stored at /home/admin/remove-
plc.json, run the command, ./searchmgmt -I /home/admin/remove-plc.json.
● Use the following format to delete indexes by protection policy:
{
"Command": "APP_REMOVE_ITEMS",
"AsyncCmd": false,
"Properties": {
"Action": {
"Description": "Action to perform,
'AssetDelete', 'PLCDelete'",
"Required": true,
"Value": "PLCDelete",
}
"PLCID": {
"Description": "PLC ID of item(s) to delete.",
"Required": true,
"Value": "7676d753-b57e-a572-6daf-33689933456d",
}
}
}
{
"Command": "APP_REMOVE_ITEMS",
"AsyncCmd": false,
"Properties": {
"Action": {
"Description": "Action to perform,
'AssetDelete', 'PLCDelete'",
"Required": true,
"Value": "AssetDelete",
},
"AssetID": {
"Description": "Optional, Asset ID of item(s)
to delete.",
"Required": false,
"Value": "503dd753-b57e-a572-6daf-44680033755f",
},
"PLCID": {
"Description": "PLC ID of item(s) to delete.",
"Required": true,
"Value": "7676d753-b57e-a572-6daf-33689933456d",
}
}
}
NOTE:
● The time to complete the execution of these procedures depends on the number of backup copy asset indexes being
deleted.
● This procedure does not impact regular operation of the cluster.
Kubernetes cluster
After the Kubernetes cluster asset source is added and registered in the PowerProtect Data Manager UI, PowerProtect Data
Manager enables protection of PVCs and namespace data on the Kubernetes or Tanzu Kubernetes cluster.
60 Managing Assets
NAS agent
After the NAS asset source is added and registered in the PowerProtect Data Manager UI, PowerProtect Data Manager enables
protection of NAS assets.
Managing Assets 61
● Discovery of a vCenter Server asset source excludes the following:
○ Virtual machines with a status of Inaccessible, Invalid, or Orphaned.
○ The virtual machine template
○ The shadow or standby virtual machine created by RecoverPoint for Virtual Machines, also referred to as the vRPA copy.
Prior to performing the vCenter discovery, verify the status of any virtual machines that you want to discover.
Steps
1. From the PowerProtect Data Manager user interface, select Infrastructure > Asset Sources, and then click + to reveal
the New Asset Source tab.
62 Managing Assets
2. In the pane for the asset source that you want to add, click Enable Source.
The Asset Sources window updates to display a tab for the new asset source.
Results
You can now add or approve the asset source for use in PowerProtect Data Manager. For a vCenter server, Kubernetes cluster,
SMIS Server, or PowerProtect Cloud Snapshot Manager tenant, select the appropriate tab in this window and click Add. For an
application host, select Infrastructure > Application Agents and click Add or Approve as required.
NOTE: Although you can add a Cloud Snapshot Manager tenant to PowerProtect Data Manager in order to view its health,
alerts, and the status of its protection, recovery, and system jobs, you cannot manage the protection of its assets from
PowerProtect Data Manager. To manage the protection of its assets, use Cloud Snapshot Manager. For more information,
see the PowerProtect Cloud Snapshot Manager Online Help.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Asset Sources, and then select the tab of the asset
source that you want to disable.
If no host registration is detected, a red Disable button appears.
2. Click Disable.
Results
PowerProtect Data Manager removes the tab for this asset source.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Asset Sources, and then select the tab for the type of
asset source that you want to delete.
2. Select the asset source name in the asset source list, and then click Delete.
3. At the warning prompt that appears, click Continue.
The asset source is deleted from the list.
Results
PowerProtect Data Manager removes the specified asset source in the Asset Sources window.
For all asset sources except the vCenter Server, any associated assets that are protected by the protection policy are removed
from the protection policy and their status is changed to deleted. These assets are removed automatically as part of daily
PowerProtect Data Manager cleanup after all associated backup copies have been deleted. These assets can also be removed
Managing Assets 63
manually. The PowerProtect Data Manager Administration and User Guide provides details on how to remove assets from
PowerProtect Data Manager.
The copies of assets from the asset source are retained (not deleted). You can delete the copies from the copies page, if
required.
Prerequisites
● Ensure that the asset source is enabled. Enable an asset source provides instructions.
● Log in as a user with the Administrator role. Only the Administrator role can manage asset sources.
● The PowerProtect Data Manager server has Internet access and is able to reach https://ssgosge.emc.com.
NOTE: If this access is removed during normal operation, any existing Cloud Snapshot Manager information will continue
to be displayed in the Dashboard window, but there will be no updates until Internet access is restored.
● This procedure requires the entry of values specific to Cloud Snapshot Manager. For more information, see the
PowerProtect Cloud Snapshot Manager Online Help.
Steps
1. From the left navigation pane, select Infrastructure > Asset Sources.
The Asset Sources window appears.
2. Select the Cloud Snapshot Manager tab.
3. Click Add.
The Add Cloud Snapshot Manager Account Details dialog displays.
4. In the Name field, enter a descriptive name for the Cloud Snapshot Manager tenant.
5. In the Tenant ID field, enter the Cloud Snapshot Manager tenant ID.
6. Click the drop-down control next to Cloud Snapshot Manager Credentials, and then click Add Credentials.
a. In the Name field, enter the name of the Cloud Snapshot Manager tenant credentials.
b. In the Client ID field, enter the ID of the Cloud Snapshot Manager tenant.
c. In the Client Secret field, enter the secret of the Cloud Snapshot Manager tenant.
d. Click Save.
7. Click Save.
64 Managing Assets
6
Managing Protection Policies
Topics:
• Protection policies
• Before you create a protection policy
• Overview of PowerProtect Data Manager Cloud Tier
• Manual backups of protected assets
• Manual replication of protected assets
• Manual Cloud Tiering of protected assets
• Editing a protection policy
• Viewing a summary of protection policies
• Extended retention
• Edit the retention period for backup copies
• Delete backup copies
• Removing expired backup copies
• Removing assets from PowerProtect Data Manager
• Run an asset-protection report
• Disable a protection policy
• Delete a protection policy
• Add a service-level agreement
• Run a compliance report
• Protecting client assets after a client hostname change
• ifGroup configuration and PowerProtect Data Manager policies
Protection policies
Protection policies define sets of objectives that apply to specific periods of time. These objectives drive configuration, active
protection, and copy-data-management operations that satisfy the business requirements for the specified data. Each policy
type has its own set of user objectives.
Only the Administrator role can create or edit protection policies.
You can create protection policies for the following asset types:
● VMware virtual machines
● Microsoft Exchange Server databases
● Microsoft SQL Server databases
● Oracle databases
● SAP HANA databases
● File systems
● Kubernetes clusters
● Storage groups
● Network-attached storage (NAS)
For each policy type, refer to the individual user guides.
In the Protection Policies window, you can export protection policy data by using the Export All functionality.
NOTE: In some situations, a full backup might be performed even though a synthetic-full backup was scheduled. Possible
reasons for a full backup include the following:
● There is no existing full backup.
● The size of a volume has changed.
Replication triggers
PowerProtect Data Manager orchestrates protection policy replication objectives independently of the primary backup or
retention. When you add a replication objective to a policy, select one of the available triggers.
The default replication trigger is a schedule window that you define by setting a recurrence period plus start and end times.
Replication occurs during the defined window. For example, every day between 8 p.m. and 12 a.m.
You can also trigger replication immediately after the completion of the associated primary backup or retention, whether
scheduled or manual. At the start of the primary backup, PowerProtect Data Manager generates an associated replication
job that remains queued until the end of the protection job. If the backup fails or completes with exception, the associated
replication job is skipped. Restarting the protection job queues the associated replication job again.
NOTE:
Replication after backup completion is only supported for centralized protection policies. This feature is not yet available for
self-service protection policies or for replication objectives that are based on extended retention.
Older application agents may not support replication after backup completion. Update the applicable application agents to
the current version before configuring this trigger.
Using a schedule can help you manage network traffic by replicating during off-peak hours. However, for larger backup sets,
the primary backup or retention may not finish before the start of the replication schedule, which creates a replication backlog.
Replication after backup completion prevents a replication backlog from forming.
To prevent data loss, the replication after backup completion trigger replicates new backups from the primary objective and any
outstanding backups that have not yet replicated.
Prerequisites
Ensure that a protection storage system is set up for Cloud Tiering.
Steps
1. Log in to the PowerProtect Data Manager user interface as a user with the Administrator role.
7. Click Cloud Tier next to Primary Backup or Extend Retention or, if adding a Cloud objective for a replication objective
that you have added, click Cloud Tier under Replicate.
An entry for Cloud Tier is created to the right of the primary backup or extended retention objective, or below the
replication objective.
8. Under the entry for Cloud Tier, click Add.
The Add Cloud Tier Backup dialog appears, with summary information for the parent node. This information indicates
whether you are adding this Cloud Tier objective for the primary backup objective, the extended retention objective, or the
replication objective.
9. In the Add Cloud Tier Backup dialog box, set the following parameters and then click Save:
● Select the appropriate storage unit from the Cloud Target list.
● For Tier After, set a time of 14 days or more.
The protection policy is now enabled with Cloud Tiering.
10. Click Next to proceed with the remaining pages of the Add Policy wizard, verify the information, and then click Finish.
A new job is created, which you can view under the Jobs tab after the job completes.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets.
2. Select an asset and click View Copies.
3. Click an asset copy icon.
Cloud Tier backups are listed by cloud storage in the Location column.
4. To change how long copies remain in cloud storage, complete the following steps:
a. Select a Cloud Tier backup and click Edit Retention.
b. Choose one of the following options:
● To select a calendar date as the expiration date for backups, select Retention Date.
● To define a fixed retention period in days, weeks, months, or years after the backup is performed, select Retention
Value. For example, you could specify that backups expire after 6 months.
c. When satisfied with the changes, click Save.
The asset is displayed in the list with the changes. The Retention column displays both the original and new retention
period, and indicates whether the retention period has been extended or shortened.
5. To delete the copy in cloud storage, select a Cloud Tier backup and click Delete. To delete the copy records from
the PowerProtect Data Manager database while the copy remains in the protection storage, select Remove from
PowerProtect.
Delete backup copies and Remove backup copies from the PowerProtect Data Manager database provides more information.
6. Select a Cloud Tier backup and click Recall from Cloud to return the cloud backup to your local protection storage for
recovery or backup.
NOTE: If you use Amazon's network to copy data from AWS storage, Amazon charges you for the data transfer.
7. To extend the date to retier the copy back to the cloud, select Edit Recall Retention.
8. To manually move a copy back to cloud storage, select Retier.
Prerequisites
NOTE: When a backup is recalled from Cloud Tier to the active tier, the copy is removed from Cloud Tier.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets.
2. On the Assets window, select the tab that contains the asset you want to recall from Cloud Tier, and then click View
Copies.
3. Click DD, and then select from one of the available copies that appear in the table.
4. Click Recall.
The Recall from Cloud dialog box appears.
5. In the Retain until box, specify how long you want to keep the copy on the active tier, and then click OK.
6. Go to the Jobs window to monitor the recall operation.
When the copy has been moved successfully, the Location changes from Cloud to Local.
7. Select Restore > Assets, and then select the tab that contains the recalled asset.
8. Select the recalled asset, and then click Restore.
NOTE: If you are unsure whether the asset has been recalled, click View Copies and select DD to view the available
backup copies. If the asset backup is a recalled copy, the Status column indicates Local Recalled.
9. Select the recalled copy to re-tier the copy to the active tier.
Steps
1. From the left navigation pane, select Protection > Protection Policies.
The Protection Policies window appears.
2. Select the protection policy that contains the assets that you want to back up, and click Protect Now.
The Protect Now wizard appears.
3. On the Assets Selection page, select whether you want to back up all assets or choose individual assets that are defined in
the protection policy, and then click Next.
If you selected the option to choose individual assets for manual backup instead of all assets, the Assets page appears with
the individual assets available for selection.
a. Select the assets that you want to include in the manual backup, and then click Next to display the Configuration page.
If you selected to back up all assets, the Configuration page appears.
4. On the Configuration page, select Back up now, and then select from the available backup types.
5. Edit the retention period if you want to change the default settings, and then click Next.
The default settings are inherited from the primary backup objective of the parent protection policy.
6. On the Summary page, review the settings and then click Protect Now.
A notification appears indicating whether the request was processed successfully.
Steps
1. From the left navigation pane, select Infrastructure > Assets.
The Assets window appears.
2. Select the tab for the asset type you want to back up.
A list of assets appears.
3. Select an asset from the table that has an associated protection policy.
4. Click Protect Now.
A notification appears indicating whether the request was processed successfully.
Prerequisites
The protection policy purpose must not be Exclusion, and the policy must already be configured with a replication objective.
You can only manually replicate the replication objectives for the primary backup.
NOTE: VMAX storage groups only support MTree replication, which is performed and scheduled from the DD system.
Therefore, manual replication for assets in a VMAX storage group is not supported.
Steps
1. From the PowerProtect Data Manager UI, select Protection > Protection Policies.
2. Select the protection policy that contains the assets that you want to replicate, and click Protect Now.
The Protect Now wizard opens to the Assets Selection page.
3. Select whether you want to replicate All Assets or a Custom selection of assets.
● If you selected All Assets, click Next.
● If you selected Custom, a list appears from which you can select individual assets. You can see these assets in tree view
or list view.
a. Select the assets that you want manually replicate, and then click Next.
The Configuration page appears.
4. Select Replicate Now.
5. Select a destination storage target from the Storage Name and Storage Unit drop-down lists.
The selection of storage system and storage unit from these drop-down lists corresponds to the associated replication
objective for the primary backup. In some cases, a protection storage system may have more than one storage unit for this
policy.
The wizard loads the default settings from the protection policy.
6. If you want to change the default settings:
● You can configure different retention periods for all applicable backup types, or configure the same retention period for
all backup types.
● The default retention period settings are inherited from the settings in the corresponding replication objective of the
protection policy.
● For VMDM, File System, Microsoft Exchange Server, and NAS assets, the retention period for full and synthetic full
backups should be the same value.
a. Select or clear Set the same retention time for all replicated copies.
b. Edit the retention period for all applicable backup types.
c. Resolve any conflicts or errors, as indicated by the and symbols.
7. Select whether you want to replicate All Copies or a Custom subset of backups.
If you selected Custom, additional options appear:
a. To replicate recent backups by time, select the first option and then type the number of days.
b. To replicate a specific number of recent backups, select the second option and then type the number of backups.
c. (Optional) To remove all nonmatching backups from the replication backlog for this objective, select Do not replicate
copies outside the selection and mark them as skipped.
PowerProtect Data Manager excludes any skipped backups from future replication activities by this objective. This
decision is permanent and the wizard prompts for confirmation.
8. (Optional) Click Select Replication and then repeat the previous steps to configure manual replication for additional
replication policy objectives.
9. Click Next.
10. On the Summary page, review the settings and then click Protect Now.
A notification appears indicating whether the request was processed successfully.
NOTE: Manual Cloud Tiering of a copy set requires the related protection policy to have a Cloud Tier objective.
Prerequisites
If applicable, complete all of the virtual network configuration tasks before you assign any virtual networks to the protection
policy.
Steps
1. From the left navigation pane, select Protection > Protection Policies.
The Protection Policies window appears.
2. Select the protection policy that you want to modify, and click Edit.
The Edit Policy window opens on the Summary page. From this page, you can click edit next to any available row to
change specific policy details.
3. In the Name or Description rows, click Edit.
The Type page displays.
NOTE: You cannot change the type or purpose of an existing policy.
4. In the Objectives row, click Edit.
The Objectives page displays. From this page, you can change the backup schedule, modify the settings for the network
interface, and enable or disable the retention lock.
You can also change the storage targets by selecting a new Storage Name in the Primary Backup and Replicate rows.
For more information about changing storage targets, see the section Changing storage targets.
5. In the Options row, click Edit.
The Options page displays. From this page, you can change the backup optimization mode (for example, from Performance
to Capacity), select whether to include or exclude swap files from the backup, and select whether to quiesce the guest file
system during the backup.
NOTE: For virtual machine protection policies, two types of protection mechanisms are used—Transparent Snapshot
Data Mover (TSDM), and VMware vStorage API for Data Protection (VADP). Updates to the policy options can result
in changes to the protection mechanism used to move virtual machine data. When the protection mechanism changes, a
new, full backup is performed, which might take awhile to complete.
6. After making your changes, click Next to save the changes and return to the Summary page.
7. On the Summary page, click Finish.
An informational dialog displays.
8. Click OK to exit the dialog, or click Go to Jobs to open the Jobs window to monitor the backup of the new protection
policy.
Impacts
Changing the primary objective storage target for some asset types may cause skipped backups until the next scheduled full
backup:
● VMware virtual machine application-aware
● SAP HANA
● Oracle RMAN
Protection storage
Managing Storage provides more information about working with protection storage, including configuring additional protection
storage systems and changing quota settings.
When reviewing the list of selected and available protection storage systems, consider the following:
● It is not recommended that policy objectives share protection storage systems because this configuration does not
increase data availability. However, some environments may require replicas with different retention periods, where multiple
objectives share a protection storage system.
● Only protection storage that has been licensed and configured for use by the current protection policy appears in the
drop-down list.
● Changing protection storage systems for Storage Group protection policies is not supported.
Storage units
Storage units provides more information about working with storage units, including applicable limitations and maintenance
considerations.
If you select New, PowerProtect Data Manager creates a storage unit for this protection policy. The new storage unit name
is based on the protection policy name plus an identifier. Storage units provides more instructions for changing the quota
configuration.
You can also select an existing storage unit under the control of PowerProtect Data Manager. The drop-down list displays the
available storage units on the selected protection storage system. If the storage unit name is truncated due to space limitations,
hover over the list entry to see the full storage unit name and quota information.
Changing storage units for Storage Group protection policies is not supported.
NOTE:
The UI also issues a warning where the selected storage unit is the source for any MTree replication workflow. This
workflow may belong to another application. Verify the storage targets before you continue. These notifications require
DDOS 7.7 or later.
Steps
1. From the left navigation pane, select Protection > Protection Policies.
The Protection Policies window appears.
2. Select the protection policy that you want to modify, and click Edit.
The Edit Policy window opens on the Summary page.
3. In the Assets row, click Edit.
The Assets page appears.
NOTE: For virtual machine protection policies, the view that you selected when creating the policy is retained in
this page, and cannot be changed. For example, if you set up this policy with View Asset Table selected, all assets
protected by this policy will display in a table on this page, and the option to select View by Host will be disabled. Both
views provide additional information about the virtual machines, such as any currently associated tags, protection rules,
and whether the virtual machine is already assigned to another policy, to help you identify which assets you want to add
or remove from this policy.
4. To remove containers or assets from the protection policy, select the object and click Remove.
The Assets page updates with the changes.
5. To add a container or asset to the protection policy:
a. Click + Add.
The Add Unprotected Assets dialog displays any objects that are unprotected.
b. Select the individual unprotected assets that you want to add to the policy, or select a container level within the
hierarchy to add all assets within that level, and then click Add.
The Assets page updates with the changes.
6. Optionally, if you want to exclude non-production VMDKs such as network shares or test disks from a protection policy:
a. Select the virtual machine asset from the list, and then click Manage Exclusions in the Disk Excluded column.
The Exclude Disks dialog box appears. By default, the slider next to each VMDK is set to Included.
b. For each disk that you want to exclude, move the slider to the right. The status updates to Excluded.
c. Click Save. The Assets page updates to indicate the number of disks for that particular asset that will be excluded from
the protection policy.
7. Click Next to save the changes and go to the Summary page.
8. In the Summary page, click Finish
An informational dialog box appears.
9. Click OK to exit the dialog box, or click Go to Jobs to open the Jobs window to monitor the backup of the new protection
policy.
Steps
1. From the left navigation pane, select Protection > Protection Policies.
The Protection Policies window opens.
2. Click the name link of the protection policy to view its details.
The details window for the selected protection policy opens and displays information about the policy.
3. Click the asset count link next to Assets.
The Assets window appears and displays the assets that are assigned to the protection policy.
4. To export asset records for the protection policy, in the Assets window, click Export All.
Steps
1. From the left navigation pane, select Protection > Protection Policies.
The Protection Policies window opens.
2. Review the information displayed in the Last Run Status column for the protection policy.
3. Optionally, click the last-run status link of the protection policy to view the Protection Jobs window for more information
about the job .
NOTE: The Protection Jobs window displays only the most recently run protection jobs. To view the most recently run
system jobs, select Jobs > System Jobs from the left navigation pane to view the System Jobs window.
Preferred alternatives
When you define an extended retention objective for a protection policy, you define a set of matching criteria that select
preferred backups to retain. If the matching criteria do not identify a matching backup, PowerProtect Data Manager
automatically retains the preferred alternative backup according to one of the following methods:
● Look-back—Retain the last available full backup that was taken before the matching criteria.
● Look-forward—Retain the next available full backup that was taken after the matching criteria.
For example, consider a situation where you configured a protection policy to retain the daily backup for the last day of the
month to extended retention. However, a network issue caused that backup to fail. In this case, look-back matching retains the
backup that was taken the previous day, while look-forward matching retains the backup that was taken the following day.
By default, PowerProtect Data Manager uses look-back matching to select the preferred alternative backup. A grace period
defines how far PowerProtect Data Manager can look in the configured direction for an alternative backup. If PowerProtect
Data Manager cannot find an alternative backup within the grace period, extended retention fails.
You can use the REST API to change the matching method or the grace period for look-forward matching. The PowerProtect
Data Manager Public REST API documentation provides instructions. If there are no available backups for the defined matching
period, you can change the matching method to a different backup.
For look-forward matching, the next available backup can be an ad-hoc backup or the next scheduled backup.
Centralized protection
For an hourly primary backup schedule that starts on Sunday at 8:00 p.m. and ends on Monday at 6:00 p.m. with a weekly
extended retention objective that is set to repeat every Sunday, PowerProtect Data Manager selects the first available backup
starting after 8:00 p.m. on Sunday for long-term retention.
The following diagram illustrates the behavior of backups with extended retention for a configured protection policy. In this
example, full daily backups starting at 10:00 p.m. and ending at 6:00 a.m. are kept for 1 week. Full weekly backups are set to
repeat every Sunday and are kept for 1 month.
Self-service protection
For self-service backups, PowerProtect Data Manager uses a default backup window of 24 hours. For a backup schedule that
starts on Sunday at 12:00 p.m and ends on Monday at 12:00 p.m. with a weekly extended retention objective that is set to
repeat every Sunday, PowerProtect Data Manager selects the first available backup that is taken between 12:00 p.m. on Sunday
and 12:00 p.m. on Monday for long-term retention.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets.
2. On the Assets window, select the tab for the asset type for which you want to edit retention. If a policy has been assigned,
the table lists the assets that have been discovered, along with the associated protection policy.
NOTE: For virtual machine assets, you can click the link in the Disk Excluded column next to a virtual machine asset to
view VMDKs that have been excluded from the protection policy. You cannot, however, edit disk inclusion or exclusion
from this window. To change the disks that are excluded for a protected asset, select the policy from the Protection
Policies window and click Edit.
3. Select a protected asset from the table, and then click View Copies. The Copy Locations pane identifies where the
backups are stored.
4. In the left pane, click the storage icon to the right of the icon for the asset, for example, DD. The table in the right pane lists
the backup copies.
5. Select one or more backup copies from the table and click Edit Retention.
6. Choose one of the following options:
● To select a calendar date as the expiration date for backups, select Retention Date.
● To define a fixed retention period in days, weeks, months, or years after the backup is performed, select Retention
Value. For example, you could specify that backups expire after 6 months.
NOTE: When you edit the retention period for copies that are retention locked, you can only extend the retention
period.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets.
2. From the Assets window, select the tab for the asset type for which you want to delete copies. If a policy has been
assigned, the table lists the assets that have been discovered, along with the associated protection policy.
3. Select a protected asset from the table, and then click View Copies. The Copy Locations pane identifies where the
backups are stored.
4. In the left pane, click the storage icon to the right of the icon for the asset, for example, DD. The table in the right pane lists
the backup copies.
An informational dialog box opens to confirm the copies are being deleted. To monitor the progress of the operation, click Go
to Jobs. To view the list of backup copies and their status, click OK.
NOTE: If the data deletion is successful but the catalog deletion is unsuccessful, then the overall deletion job status
appears as Completed with Exceptions.
When the job completes, the task summary provides details of each deleted backup copy, including the time that each copy
was created, the backup level, and the retention time. The time of copy creation and the retention time are shown in UTC.
An audit log is also generated and provides details of each deleted backup copy, including the time that each copy was
created, the backup level, and the retention time. The time of copy creation and the retention time are shown in UTC. Go to
Alerts > Audit Logs to view the audit log.
8. Verify that the copies are deleted successfully from protection storage. If the deletion is successful, the deleted copies no
longer appear in the table.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets.
2. From the Assets window, select the tab for the asset type for which you want to delete copies. If a policy has been
assigned, the table lists the assets that have been discovered, along with the associated protection policy.
3. Select a protected asset from the table, and then click View Copies. The Copy Locations pane identifies where the
backups are stored.
4. In the left pane, click the storage icon to the right of the icon for the asset, for example, DD. The table in the right pane lists
the backup copies.
5. Select one or more backup copies with the Deletion Failed status from the table, and then click Delete.
You can also filter and sort the list of backup copies by status in the Copy Status column.
The system displays a warning to confirm that you want to delete the selected backup copies.
6. Click OK.
An informational dialog box opens to confirm that the copies are being deleted. To monitor the progress of the operation,
click Go to Jobs. To view the list of backup copies and their status, click OK.
7. Verify that the copies are successfully deleted from protection storage. If the deletion is successful, the deleted copies no
longer appear in the table.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets.
2. From the Assets window, select the tab for the asset type for which you want to export results of deleted backup copies. If
a policy has been assigned, the table lists the assets that have been discovered, along with the associated protection policy.
3. Select one or more protected assets from the table, and then select More Actions > Export Deleted Copies.
If you do not select an asset, PowerProtect Data Manager exports the data for deleted backup copies for all assets for the
specific asset type.
4. Specify the following fields for the export:
a. Time Range
The default is Last 24 Hours.
b. Copy Status
In order to export data for deleted backup copies, the backup copies must be in one of the following states:
● Deleted—The copy is deleted successfully from protection storage, and, if applicable, the agent catalog is deleted
successfully from the agent host.
● Deleting—Copy deletion is in progress.
● Deletion Failed—Copy deletion from protection storage is unsuccessful.
● Deletion Failed (Agent Catalog)—The copy is deleted successfully from protection storage, but is not deleted
from the agent host.
NOTE: This state is not applicable to virtual machine and Kubernetes backup copies.
NOTE: You cannot export data for backup copies that are in an Available state.
5. Click Download.
If applicable, the navigation window appears for you to select the location to save the .csv file.
6. Save the .csv file in the desired location and click Save.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets.
2. From the Assets window, select the tab for the asset type for which you want to delete copies. If a policy has been
assigned, the table lists the assets that have been discovered, along with the associated protection policy.
3. Select a protected asset from the table, and then click View Copies. The Copy Locations pane identifies where the
backups are stored.
4. In the left pane, click the storage icon to the right of the icon for the asset, for example, DD. The table in the right pane lists
the backup copies.
5. Select one or more backup copies with the Deletion Failed status from the table, and then click Remove from
PowerProtect.
The system displays a warning to confirm that you want to delete the selected backup copies.
6. Click OK.
The manual removal of assets allows for the following increased control over the process:
● The asset can be removed on demand.
● The status of the asset can be Not Detected.
● All protection copies of the asset, including replicated and cloud tiered copies, can be manually removed, followed by the
manual removal of the asset.
● All protection copies of the asset can be automatically removed, if this option is selected during manual asset removal from
PowerProtect Data Manager,
Prerequisites
● The asset has a status of Deleted or Not Detected.
● The asset has no protection copies. If copies still exist in the storage system for the asset, you can delete these copies
before following the steps in this procedure or select an option to automatically delete the copies when the asset is
removed. For information on deleting backup copies, see Delete backup copies.
Steps
1. Select Infrastructure > Assets.
2. Select the tab that corresponds to the type of assets that you want to remove. For example, for vCenter virtual machine
assets, click Virtual Machine.
Assets that are associated with protection copies of this type are listed. By default, only assets with Available or Not
Detected status display. You can also search for assets by name.
3. Select one or more assets from the list. and then click More Actions > Remove Asset.
The Remove Assets dialog displays.
4. Select from one of the following options:
NOTE: All of these options might not display for the selected assets. The available options depend upon the protection
copy status of the selected assets.
● Remove assets and associated protection copies—removes these assets from PowerProtect Data Manager, and
automatically removes any protection copies for these assets from storage.
● Only remove assets with no associated protection copies—these assets will not be deleted if PowerProtect Data
Manager detects that protection copies for these assets still exist in the storage system.
● Mark "Not Detected" assets as "Deleted" but keep associated protection copies—mark assets with Not
Detected status as Deleted in the PowerProtect Data Manager UI, but retain protection copies for these assets in the
storage system. You can view assets marked as Deleted from the Infrastructure > Assets pane.
5. Click OK to confirm the asset removal.
Steps
1. From the PowerProtect Data Manager UI, select Protection > Protection Policies.
2. Select the protection policy for which you would like to export the protection records.
If you do not select a protection policy, PowerProtect Data Manager exports the protection records for all the protection
policies.
3. Click Run Asset Protection Report.
The Export Asset Protection window appears.
4. Specify the following fields for the export:
a. The Time Range.
The default is Last 24 hours.
This refers to the last complete midnight-to-midnight 24-hour period; that is, yesterday. So, any events that have
occurred since the most recent midnight are not in the CSV export. For example, if you run the CSV export at 9am, any
events that have occurred in the last 9 hours are not in the CSV export. This is to prevent the overlapping of or partial
exporting when queried mid-day on a regular or irregular basis.
b. The Job Status.
c. Click Download.
If applicable, the navigation window appears for you to select the location to save the CSV file.
Steps
1. From the left navigation pane, select Protection > Protection Policies.
The Protection Policies window opens.
2. Select one or more policies in Enabled state. You can also select the checkbox at the top of the table to select all policies on
the current page.
3. Click Disable.
Results
The policy status changes to Disabled. In Disabled state:
● In progress primary backup jobs that are associated with this policy continue to run until complete. If primary backups are
scheduled to run during the time that the policy is disabled, those backups do not run, even when you enable the policy
again. When you re-enable the policy, future scheduled backups resume.
● All other protection jobs for the policy continue to run according to schedule, unless no primary backup copy exists for the
policy. In this case, protection jobs are skipped.
● Manual backups of primary objectives can still be performed.
Steps
1. From the PowerProtect Data Manager UI, select Protection > Protection Policies.
2. Select one or more policies in Disabled state. You can also select the checkbox at the top of the table to select all policies
on the current page.
3. Click Enable.
Results
The status changes to Enabled. Primary backups for the reenabled policies resume according to the protection policy schedule.
Prerequisites
If the policy you want to delete protects assets, you must associate those assets with a different protection policy before you
can delete the policy.
Results
After you delete a policy, clean-up of unnecessary components within protection storage occurs automatically according to
schedule. Clean-up includes storage units under the control of PowerProtect Data Manager and the corresponding DD Boost
users, according to the rules for storage units.
NOTE: When you create an SLA for Cloud Tier, you can include only full backups in the SLA.
In the SLA Compliance window, you can export compliance data by using the Export All functionality.
Steps
1. From the PowerProtect Data Manager UI, select Protection > SLA Compliance.
The SLA Compliance window appears.
2. Click Add or, if the assets that you want to apply the SLA to are listed, select these assets and then click Add.
The Add Service Level Agreement wizard appears.
3. Select the type of SLA that you want to add, and then click Next.
● Policy. If you choose this type, go to step 4.
● Backup. If you choose this type, go to step 5.
● Extended Retention. If you choose this type, go to step 6.
● Replication. If you choose this type, go to step 7.
● Cloud Tier. If you choose this type, go to step 8.
You can select only one type of Service Level Agreement.
4. If you selected Policy, specify the following fields regarding the purpose of the new Policy SLA:
a. The SLA Name.
b. If applicable, select Minimum Copies, and specify the number of Backup, Replication, and Cloud Tier copies.
c. If applicable, select Maximum Copies, and specify the number of Backup, Replication, and Cloud Tier copies.
d. If applicable, select Available Location and select the applicable locations. To add a location, click Add Location.
Options include the following:
● In—Include locations of all copies in the SLO locations. Selecting this option does not require every SLO location to
have a copy.
● Must In—Include locations of all copies in the SLO locations. Selecting this option requires every SLO location to
have at least one copy.
● Exclude—Locations of all copies must be non-SLO locations.
e. If applicable, select Allowed in Cloud through Cloud Tier/Cloud DR.
f. Click Finish, and then go to step 9.
5. If you selected Backup, specify the following fields regarding the purpose of the new Backup SLA:
a. The SLA Name.
b. If applicable, select Recovery Point Objective required (RPO), and then set the duration. The purpose of an RPO is
business continuity planning, and indicates the maximum targeted period in which data (transactions) might be lost from
an IT service due to a major incident.
NOTE: You can select only Recovery Point Objective required to configure as an independent objective in the
SLA, or select both Recovery Point Objective required and Compliance Window for copy type. If you select
both, the RPO setting must be one of the following:
c. If applicable, select Compliance Window for copy type, and then select a schedule level from the list, for example,
All, Full, Cumulative, and set the duration. Duration indicates the amount of time necessary to create the backup
copy. Ensure that the Start Time and End Time of backup copy creation falls within the Compliance Window duration
specified.
This window specifies the time during which you expect the specified activity to take place. Any specified activity that
occurs outside of this Start Time and End Time triggers an alert.
d. If applicable, select the Verify expired copies are deleted option.
Verify expired copies are deleted is a compliance check to see if PowerProtect Data Manager is deleting expired
copies. This option is disabled by default.
e. If applicable, select Retention Time Objective, and specify the number of Days, Months, Weeks, or Years.
NOTE: For compliance validation to pass, the value set for the Retention Time Objective must match the lowest
retention value set for the backup levels of this policy's target objectives. For example, if you set the synthetic full
backup Retain For to 30 days but set the full backup Retain For to 60 days, the Retention Time Objective must be
set to the lower value, in this case, 30 days.
f. If applicable, select the Verify Retention Lock is enabled for all copies option. This option is disabled by default.
g. Click Finish, and go to step 9.
The SLA Compliance window appears with the new SLA.
6. If you selected Extended Retention, specify the following fields regarding the purpose of the new Extended Retention SLA:
a. The SLA Name.
b. If applicable, select Recovery Point Objective required (RPO), and then set the duration. The purpose of an RPO is
business continuity planning, and indicates the maximum targeted period in which data (transactions) might be lost from
an IT service due to a major incident.
NOTE: By default, the RPO provides a grace period of 1 day for SLA compliance verification. For example, with
a weekly extended retention schedule, PowerProtect Data Manager provides 8 days for the RPO to pass the SLA
Compliance verification.
e. If applicable, select the Verify Retention Lock is enabled for all copies option. This option is disabled by default.
f. Click Finish, and go to step 9.
The SLA Compliance window appears with the newly added SLA.
8. If you selected Cloud Tier type SLA, specify the following fields regarding the purpose of the new Cloud Tier SLA:
a. The SLA Name.
b. If applicable, select the Verify expired copies are deleted option.
d. If applicable, select the Verify Retention Lock is enabled for all copies option. This option is disabled by default.
e. Click Finish.
9. If the SLA has not already been applied to a protection policy:
a. Go to Protection > Protection Policies.
b. Select the policy, and then click Edit.
10. In the Objectives row of the Summary window, click Edit.
11. Do one of the following, and then click Next:
● Select the added Policy SLA from the Set Policy Level SLA list.
● Create and add the SLA policy from the Set Policy Level SLA list.
The Summary window appears.
12. Click Finish.
An informational message appears to confirm that PowerProtect Data Manager has saved the protection policy.
13. Click Go to Jobs to open the Jobs window to monitor the backup and compliance results, or click OK to exit.
NOTE: Compliance checks occur automatically every day at 2 a.m. Coordinated Universal Time (UTC). If any objectives
are out of compliance, an alert is generated at 2 a.m. UTC. The Validate job in the System Jobs window indicates the
results of the daily compliance check.
For a backup SLA with a required RPO setting that is less than 24 hours, PowerProtect Data Manager performs real-time
compliance checks. If you selected Compliance Window for copy type and set the backup level to All, the real-time
compliance check occurs every 15 minutes only within the compliance window. If the backup level is not All, or if a
compliance window is not specified, the real-time compliance check occurs every 15 minutes without stop.
NOTE: If the backup SLA has a required RPO setting of 24 hours or greater, compliance checks occur daily at 2 a.m.
UTC. Real-time compliance checks do not occur for backup SLAs with an RPO setting of 24 hours or greater.
Real-time compliance-check behavior
If the interval of time between the most recent backup of the asset and the compliance check is greater than the RPO
requirement, then an alert indicates the RPO of the asset is out of compliance. This alert is generated once within an RPO
period. If the same backup copy is missed when the next compliance check occurs, no further alerts are generated.
If the interval of time between the most recent backup of the asset and the compliance check is less than the RPO
requirement, the RPO of the asset is in compliance.
If multiple assets in a policy are out of compliance at the same time when a compliance check occurs, a single alert is
generated and includes information for all assets that are out of compliance in the policy. In the Alerts window, the asset
count next to the alert summary indicates the number of assets that are out of compliance in the policy.
14. In the Jobs window, click next to an entry to view details on the SLA Compliance result.
Steps
1. From the PowerProtect Data Manager UI, select Protection > SLA Compliance.
The SLA Compliance window appears. The PowerProtect Data Manager SLA Compliance window displays the following
information:
● SLA Name
● Stage Type
● Policies At Risk
● Objectives Out of Compliance
System recovery
System recovery creates point-in-time snapshots of the PowerProtect Data Manager server in protection storage. During a DR
activity, recover the server from protection storage and then restore protected assets.
System recovery for server DR provides more information.
Quick recovery
Quick recovery makes a remote PowerProtect Data Manager replication destination aware of replicated backups and enables
the recovery view. During a DR activity, you can restore assets from these replicated backups at the destination without first
restoring the source server.
Quick recovery for server DR provides more information.
a. Optionally, you can configure a second server and leave this server unconfigured to decrease the RTO for system
recovery. However, the RTO for system recovery cannot match the RTO for quick recovery or Cloud DR.
b. Configuration of server DR replication.
NFS
To store backups over NFS, you must configure and assign a private storage unit for the PowerProtect Data Manager system.
Then, prepare the DD recovery target by creating an NFS export. With the DD system address and the NFS export path, you
can configure PowerProtect Data Manager to perform server DR backups.
NFS storage is deprecated in favor of DD Boost.
Automatic server DR
New installations of PowerProtect Data Manager automatically configure and enable server DR with minimal input. This process
ensures that the server is protected as soon as you add protection storage.
Automatic server DR detects when you first add a protection storage system. The automatic configuration mechanism uses
the recommended DD Boost storage type and default settings to create a managed storage unit for server DR. This process
generates server DR jobs that you can track through the Jobs page.
Automatic configuration selects the first protection storage system that you add to PowerProtect Data Manager. However, you
can configure server DR to change the target to another protection storage system or enable replication. Manually configure
server DR backups provides instructions. Manual configuration of the backup target is not recommended unless you must target
a different protection storage system.
If automatic server DR fails, Manually configure server DR backups provides an alternate method to configure server DR. The
job details provide information that you can use to troubleshoot the configuration process.
NOTE: NFS is the legacy storage type for PowerProtect Data Manager server DR.
Steps
1. Use a web browser to log in to DD System Manager as the system administrator user.
2. On the Summary tab in the Protocols pane, select NFS Exports > Create Export.
Prerequisites
If you plan to use NFS for protection storage, prepare the target DD system as described in Prepare the DD system recovery
target (NFS).
If you plan to use DD Boost for protection storage, add the DD system as protection storage. Protection storage provides
instructions. If you plan to replicate server DR backups, the replication target must be a different protection storage system.
Steps
1. Log in to the PowerProtect Data Manager user interface as a user with the Administrator role.
Next steps
Verify that the system jobs succeed.
Steps
1. If PowerProtect Data Manager is deployed to vSphere, record the port groups:
a. Log in to the vSphere client.
b. Right-click the appliance name and select Edit Settings.
c. Record the port group settings that are assigned to PowerProtect Data Manager.
This information is useful when restoring to the same VMware environment.
2. Record the PowerProtect Data Manager FQDN.
3. Log in to the PowerProtect Data Manager user interface as a user with the Administrator role.
4. Record the PowerProtect Data Manager version and build numbers.
Customer Support can provide this information, which is not mandatory.
Results
Steps
1. Log in to the PowerProtect Data Manager user interface as a user with the Administrator role.
4. To delete a backup:
a. Select a backup from the list.
b. Click for that row.
The system displays a warning to confirm you want to delete the backup. Click Yes to proceed.
5. Click Cancel.
Prerequisites
● Only the Administrator role can carry out the restore.
● Ensure that all the information listed in Record settings for server DR is available.
NOTE: If the recovery system is on a different FQDN, see Troubleshoot recovery of PowerProtect Data Manager.
If a Search Engine is present in the recovery backup when you restore the PowerProtect Data Manager system, the Search
Engine is automatically restored.
Steps
1. Deploy a new PowerProtect Data Manager virtual appliance.
The PowerProtect Data Manager Deployment Guide for the appropriate platform provides instructions.
2. From a host that has network access to the virtual appliance, use Google Chrome to connect to the appliance:
https://<appliance_hostname>
NOTE: You can specify the hostname or the IP address of the appliance.
Results
When recovery is complete, the PowerProtect Data Manager login page appears.
The time zone of the PowerProtect Data Manager instance is set to that of the backup.
If restoring from a replica, the replication target protection storage system is configured as the new server DR backup target.
All preloaded accounts are reset to default passwords, as described in the PowerProtect Data Manager Security Configuration
Guide. The preloaded UI administrator account is an exception and retains its password. Change the passwords for all preloaded
accounts as soon as possible.
Recovery mode
If you select After restore, keep the product in recovery mode so that scheduled workflows are not triggered during
deployment, PowerProtect Data Manager enables recovery mode.
With recovery mode active, when you log in to PowerProtect Data Manager:
● A red banner appears at the top of the PowerProtect Data Manager UI. The banner indicates that the PowerProtect Data
Manager system is operational but scheduled workflows are disabled.
● All jobs defined by your protection policies that modify the backup storage (for example, backup creation, backup deletion,
and PowerProtect Data Manager Server DR jobs) are not triggered.
● All operations that write to the backup storage are disabled.
To return PowerProtect Data Manager to full operational mode and enable scheduled workflows, click Return to full
operational mode.
Prerequisites
Obtain the name of the Search cluster backup from System Settings > Disaster Recovery > Manage Backups.
Steps
1. Log in to the PowerProtect Data Manager user interface as a user with the Administrator role.
Use the same credentials that you used before PowerProtect Data Manager was restored.
2. Locate the backup manifest file:
a. Connect to the PowerProtect Data Manager console as an admin user.
b. Browse the directory path /data01/server_backups/<PowerProtect Data Manager
Hostname>_<NodeID>.
c. Run grep -Rnwa -e '<Name>' --include=*.manifest
3. Open the backup manifest file.
4. Locate the Components section, which contains Search Cluster.
The values for the following fields that are listed in the Search Cluster section are needed for the POST call in the next
step.
● Name=id
● BackupPath, which contains <NFSHost>:/data/col1/<NFSExportFolder>/<NFSDirPath>/
SearchCluster
For example:
"Components": [
{ "name": "SearchCluster",
{{ "id": "c25290d9-a88c-4a15-9e7c-656f186209ae", }}
{{ "version": "v2", }}
{{ "backupPath": "10.25.12.74:/data/col1/serverdr_backup/vm-
qa-0091_6ce36793-3379-45d2-84bd-d8bde69e52d4/SearchCluster", }}
{{ "backupStatus": "SUCCESSFUL", }}
{{ "backupsEnabled": true }}
{
{ }
where:
○ NFSHost = "10.25.12.74"
○ NFSExport = "/data/col1/serverdr_backup"
○ NFSDirPath = "vm-qa-0091_6ce36793-3379-45d2-84bd-d8bde69e52d4/SearchCluster"
○ Name = "c25290d9-a88c-4a15-9e7c-656f186209ae"
5. Use the REST API to run the following POST call:
"ddDirectoryPath" : "<NFSDirPath>",
"ddHost" : "<NFSHost>",
"ddNfsExportName" : "<NFSExport>"
6. To monitor the status of the restore process, in the PowerProtect Data Manager UI, select Jobs > System Jobs and look
for a job with the description, Restoring backup Search Node.
Steps
1. Disable Server DR backups.
2. Log in to the PowerProtect Data Manager server by using SSH.
3. Run the following command:
sudo umount /data01/server_backups
4. For each Search Engine node, perform the following substeps:
a. Log in to the Search Engine node by using SSH.
b. Run the following command:
sudo umount /mnt/PPDM_Snapshots
5. Remove the DD system from PowerProtect Data Manager:
a. From the PowerProtect Data Manager UI, select Infrastructure > Storage.
b. Select the DD system to remove.
c. Click Delete.
6. Change the IP address or hostname of the DD system.
7. Add the DD back to PowerProtect Data Manager.
8. Enable server DR backups.
Steps
1. Disable Server DR backups.
2. Log in to the PowerProtect Data Manager server by using SSH.
3. Run the following command:
ps aux | grep /data01/server_backups | grep boostfs
Make a note of the process ID next to the boostfs entry in the command output.
4. Run the following command, replacing <processID> with the process ID obtained in step 3:
sudo kill -9 <processID>
5. Run the following command:
sudo umount /data01/server_backups
6. For each Search Engine node, perform the following substeps:
a. Log in to the Search Engine node by using SSH.
b. Run the following command:
sudo umount /mnt/PPDM_Snapshots
7. Remove the DD system from PowerProtect Data Manager:
a. From the PowerProtect Data Manager UI, select Infrastructure > Storage.
b. Select the DD system to remove.
c. Click Delete.
8. Add the DD back to PowerProtect Data Manager.
9. Enable server DR backups.
DD storage unit mount command failed with error: 'Cannot mount full path: Access
is denied'
This error message appears when an NFS export does not exist on the DD system for the full path to the server DR storage
unit. This error message also appears when the redeployed virtual appliance was not added as a client for access to the NFS
export.
To resolve this issue, ensure that you have configured an NFS export for the full path of the DD Boost storage unit and that the
appliance is an Export client.
DD storage unit mount command failed with error: 'Cannot resolve FQDN: The name
or service not known'
This error message appears when PowerProtect Data Manager cannot contact the DD system by using the specified FQDN. To
resolve this issue, ensure that you can resolve the FQDN and IP address of the DD system.
Steps
1. On the DD system where the backup is located, delete the replication pair and mount it for PowerProtect Data Manager.
2. When recovery is complete, on PowerProtect Data Manager, regenerate the certificates using the following command.
sudo -H -u admin /usr/local/brs/puppet/scripts/generate_certificates.sh -c
3. Restart the system and select the URL of the primary PowerProtect Data Manager system.
The https://PowerProtect Data Manager IP/#/progress page appears and recovery resumes.
4. Log in to the primary PowerProtect Data Manager.
The PowerProtect Data Manager VM vCenter console shows an error, which you can ignore.
5. Open the primary PowerProtect Data Manager using the original IP address and log in.
Results
Recovery is complete.
Steps
1. Log in to the PowerProtect Data Manager user interface as a user with the Administrator role.
Next steps
After completing the maintenance procedure, re-enable server DR backups. Manually configure server DR backups provides
instructions.
PowerProtect Data Manager supports quick recovery for alternate topologies. You can configure quick recovery for one-to-
many and many-to-one replication. For example, the following figure shows a source PowerProtect Data Manager replicating to
a standby DD system with its own PowerProtect Data Manager, all in the same data center. If the source system fails, the quick
recovery feature ensures that you can still restore from those replicated copies before you restore the source.
The following topics explain the prerequisites, how to configure PowerProtect Data Manager to support quick recovery, and
how to use the recovery view to restore assets.
Steps
10. Click , select Disaster Recovery, and then click Remote Systems.
The Remote Systems tab opens.
Next steps
On the remote system, enable the same asset sources that are enabled on this system. Enable an asset source provides more
information. Enabling an asset source on the remote system makes replicated backups of that type visible and accessible.
On the remote system, open the recovery view and verify that backups are visible and accessible. It is recommended that you
perform a test restore.
Metadata synchronizes between source and destination systems every three hours. If backups are not visible, allow sufficient
time for the first synchronization before troubleshooting.
Steps
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Alerts, and then select the Alert Notifications tab.
The Alert Notifications window appears with a table that displays the details for existing notifications.
2. Click Add.
The Add Alert Notification dialog appears.
NOTE: The Add button is disabled until you set up the email server. To add an alert notification, set up the email server
in System Settings > Support > Email Setup. Set up the email server provides more information.
3. In the Name field, type name of the individual or group who will receive the notification email.
4. In the Email field:
a. Specify the email address or alias to receive notifications. This field is required in order to create an alert notification.
Separate multiple entries with a comma.
b. Click Test Email to ensure that a valid SMTP configuration exists.
5. From the Category list, select the notification category.
6. From the Severity list, select the notification severity.
7. In the Duration field, specify how often the notification email will be sent out. For example, you can set the duration to 60
minutes in order to send out a notification email every 60 minutes. If you set the duration to 0, PowerProtect Data Manager
does not send out an email notification.
8. In the Subject field, optionally type the subject that you would like to attach to the notification email.
9. Click Save to save your changes and exit the dialog.
Results
The Alert Notifications window updates with the new alert notification. At any time, you can Edit, Delete, or Disable the
notification by selecting the entry in the table and using the buttons in this window.
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Alerts.
You can also click the icon in the top banner, and then click the links to view unacknowledged alerts of all statuses
(critical, warning, and informational), or only the unacknowledged critical alerts.
NOTE: Clicking the New tag displays only the unacknowledged alerts that have been generated within the last 24 hours.
The number that appears next to the is the total number of unacknowledged critical alerts over the last 24 hours.
NOTE: If you apply any filters in the table, exported alerts include only those alerts that satisfy the filter conditions.
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Administration > Audit Logs.
The Audit Logs window displays audit information in a table.
2. (Optional) Sort and filter audit information:
3. To view more details about a specific entry, click next to the entry in the table.
● Review the information for the audit log.
NOTE: If you apply any filters in the table, exported audit logs include only those logs that satisfy the filter conditions.
5. To change the retention period for audit logs, click Set Boundaries, select the number of days from the Days of Retention
menu, and then click Save.
Protection jobs
To view protection jobs and job groups, from the PowerProtect Data Manager UI left navigation pane, select Jobs >
Protection Jobs.
The Protection Jobs window opens to display a list of protection jobs and job groups.
Protection jobs include:
● Cloud Tier
● Cloud Protect
● Consolidated Cloud Snapshot Manager jobs
NOTE: This job type does not apply to SAP HANA databases.
● Export Reuse
● Protect
● Replicate
● Restore
You can monitor and view detailed information for both centralized and self-service backup and restores of database application
assets.
NOTE: The Cancel and Retry options are not available for self-service jobs that are created by database application
agents.
For application assets, the Protect, Restore, and Replicate job types can be monitored at the host or individual asset level.
For all other asset types, the Protect and Replicate job types can be monitored at the host or individual asset level.
Job information
The main Protection Jobs and System Jobs windows lists basic job information.
The following information is available in the Protection Jobs and System Jobs windows.
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Jobs > Protection Jobs.
2. Click the job ID next to the job name.
The Job ID Summary window opens and lists all jobs as entries in the table.
You can filter, group, and sort the information that appears in the window. Filter, group, and sort jobs provides more
information.
The policy name, job type, and asset type appear at the top of the Job ID Summary window.
The overall job group metrics and details also appear, as shown in the following figure.
The Job Metrics section displays the number of assets, the total size of the data transferred, and the overall duration of
the job group. The total duration of jobs within the job group is shorter than the duration indicated in the job metrics. When
Details Click in the Details column to view job statistics and summary information.
Asset Name of the job for the asset.
Status Indicates the current state of the job. A job can be in one of the following states:
● Success
● Completed with Exceptions
● Failed
● Canceled
● Unknown
● Skipped
● Running
● Queued
● Canceling
Size Size of job for the asset.
Data Transferred Total data that is transferred to storage.
Reduction % Total reduction percentage of storage capacity for the job.
Start Time Date and time that the job is scheduled to begin.
End Time Date and time that this job completed.
Error Code If the job did not successfully complete, a numeric error code appears. To view a detailed
explanation, double-click the error code.
Host/Cluster/Group Name The hostname, cluster, or group name that is associated with the asset.
Duration Overall duration of the job. This column only appears for Protect and Replicate job types
for application assets.
Asset Size Total size of the asset in bytes.
3. To view job details and summary information, click in the Details column next to the job, or expand the entry for the job
group by clicking .
For grouped assets, the Job ID Summary window lists the individual jobs for each asset within the job group.
The right pane appears and displays the following information about the job or task:
● Step Log—Displays a list of steps that have been completed for the job or task, and indicates the amount of time that
was required to complete each step.
● Details—Displays statistics and summary information, such as the start time and end time, asset size, duration, and so
forth.
● Error—Displays error details for failed jobs.
● Canceled—Displays details for canceled jobs.
● Skipped—Displays details for skipped jobs.
● Unknown—Displays details for jobs with an unknown status.
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Jobs > System Jobs.
2. Click the job ID next to the job name.
The Job ID Summary window opens to display a list of all system jobs or tasks.
You can filter, group, and sort the information that appears in the window. Filter, group, and sort jobs provides more
information.
For jobs and tasks, a table appears at the bottom of the window. The success or failure of individual tasks is indicated in the
Status column. If a failed job or task requires action, a status of Critical appears.
You can view job status and summary information for scheduled discovery of application assets and application systems.
If a discovery job fails, PowerProtect Data Manager displays error details and steps to resolve the issue. An alert is also
generated in the Alerts window.
When you hover over a job or task, the Job ID Summary displays a message for the job to indicate its progress. Depending
on the job and if any issues are detected, one of the following statuses is shown:
● No reported issues—No issues affecting the job.
● Timeout issues—Timeout issues might be affecting the job.
● Connectivity issues—Network connectivity issues might be affecting the job.
● Stats stall issues—Progress for this job is stalled.
The Job ID Summary window provides summary data for specific jobs and tasks in a table view. The following table
describes the columns that might appear in the window. Not all columns will appear in the Job ID Summary window of
every asset type.
Details Click in the Details column to view job or task statistics and summary information.
Task Name Name of the task.
3. To view job or task details and summary information, click in the Details column next to the individual job or task.
The right pane appears and displays the following information about the job or task:
● Step Log—Displays a list of steps that have been completed for the job or task and indicates the amount of time that
was required to complete each step.
● Details—Displays statistics and summary information, such as the start time and end time, asset size, duration, and so
forth.
● Error—Displays error details for failed jobs.
● Canceled—Displays details for canceled jobs.
● Skipped—Displays details for skipped jobs.
● Unknown—Displays details for jobs with an unknown status.
Group jobs
The Group by feature in the Job ID Summary window provides options to group assets within a protection job.
The following asset types support the Group by feature:
● Microsoft SQL Server databases
● Microsoft Exchange Server databases
● Oracle databases
● File Systems
● SAP HANA databases
● Kubernetes clusters
● Network-attached storage (NAS) shares
● VMware Virtual Machines
To group assets in a protection job, in the Job ID Summary window for the job, select an option from the Group By drop-down
list. To display all assets, select Group by > None. For example, to group virtual machine assets by ESX host, click Group by >
ESX Host.
The following table lists the available Group by options:
NOTE: Currently, the Group by filter is only available for the Protect job types.
You can filter and sort the information that appears in table columns. Click in the column heading to filter the information in
a table column, or click a table column heading to sort that column.
To see a complete list of filtering and sorting columns, click . Depending on the type of job, the available filtering and sorting
columns might differ.
The following filtering and sorting options are available for jobs and tasks:
Filter jobs by Asset, Status, Error Code, Start Time, or Sort jobs by Asset, Status, Error Code, Size, Data
End Time. Transferred, Reduction %, Start Time, End Time, or
For application assets, you can also filter jobs by Host/ Duration.
Cluster/Group Name. For application assets, you can also sort jobs by Host/
Cluster/Group Name.
NOTE: For application assets, these options are only
available when you select Group by > None. NOTE: For application assets, these options are only
available when you select Group by > None.
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Jobs > Protection Jobs or Jobs > System Jobs.
The Protection Jobs or Systems Jobs window appears, displaying all completed and running jobs.
2. To restart a failed job or job group, select the failed job or job group from the list, and then click Restart.
3. To restart a failed job or task from the Job ID Summary window:
Results
After the job or task has been restarted, the status indicates Running or Queued.
NOTE: When you restart a protection job that is part of a completed job group, the duration indicated in the Job Metrics
includes the time that elapsed between when the job group completed and when the job was restarted, in addition to the
time it takes for the retried job to run.
Prerequisites
In PowerProtect Data Manager, some services that are required for auto retry, such as the workflow service, have been moved
into a docker container. In order to enable auto retry, ensure that the workflow service is running in a docker.
Steps
1. Log in to the PowerProtect Data Manager server by using SSH.
2. Copy the entrypoint.sh file from the workflow container by typing the following:
docker cp workflow:/workflow/bin/entrypoint.sh .
3. Configure auto retry by adding a line to entrypoint.sh:
a. Type vi entrypoint.sh
b. Before the last line in the output, -jar /${APP_NAME}/lib/workflow-manager.jar), add the following:
-Denable.auto.retry.scheduler=true \
NOTE: Auto retry is disabled by default. After adding this line, if you want to disable this setting at any point, change
the entry to -Denable.auto.retry.scheduler=false \
4. Optionally, add the following application properties to the file to specify a maximum number of auto retries and a time
interval at which subsequent auto retry attempts will occur:
-Dfailed.job.retry.max.count=2 \
-Dfailed.job.retry.interval=PT30M \
NOTE: The values specified above are the recommended default values. Auto retries will only occur during the activity
window. If you perform a manual retry in the PowerProtect Data Manager UI, this retry will not count towards the auto
retry max count.
For the interval duration, the value must be specified in ISO-8601 format.
5. Save the entrypoint.sh file to the workflow container by typing the following:
docker cp entrypoint.sh workflow:/workflow/bin/
6. Restart the workflow service by using one of the following methods:
● Type docker container restart workflow
NOTE: For the configuration to be applied successfully using this method, you can only restart the container. If you
restart your workflow service or your PowerProtect Data Manager operating system, the configuration will be lost.
● Type the following to save the docker image and restart the workflow service. For example:
docker commit workflow dpd/ppdm/ppdmc-workflow:PowerProtect Data Manager version
Results
Upon configuration, the workflow service is scheduled to run every 30 minutes to determine if any jobs or tasks have failed. If a
restart occurred, the status will indicate Running or Queued. To view whether a failed job or task has been restarted, go to the
Jobs window in the PowerProtect Data Manager UI and select Running or Queued.
You can enable or disable the misfire feature by configuring the entrypoint.sh file.
Steps
1. Log in to the PowerProtect Data Manager server by using SSH.
2. Copy the entrypoint.sh file from the scheduler container by typing the following:
docker cp scheduler:/scheduler/bin/entrypoint.sh .
3. Configure the misfire conditions in the entrypoint.sh file:
NOTE: Before the last line in the output, -jar /${APP_NAME}/lib/scheduler-core.jar), add the lines for
each misfire condition.
a. To enable misfire and trigger each job once, add the following properties and corresponding values:
-Dspring.quartz.properties.misfire.cron.strategy=WITH_MISFIRE_HANDLING_INSTRUCTION_FIR
E_AND_PROCEED \
-Dspring.quartz.properties.misfire.calendar.strategy=WITH_MISFIRE_HANDLING_INSTRUCTION
_FIRE_AND_PROCEED \
b. To enable misfire and trigger each job as many times as misfire happens, add the following properties and corresponding
values:
-Dspring.quartz.properties.misfire.cron.strategy=WITH_MISFIRE_HANDLING_INSTRUCTION_IGN
ORE_MISFIRES \
-Dspring.quartz.properties.misfire.calendar.strategy=WITH_MISFIRE_HANDLING_INSTRUCTION
_IGNORE_MISFIRES \
4. Save the entrypoint.sh file to the scheduler container by typing the following:
docker cp entrypoint.sh scheduler:/scheduler/bin/
5. Restart the scheduler service by using one of the following methods:
● Type docker container restart scheduler
NOTE: For the configuration to be applied successfully using this method, you can only restart the container. If you
restart your scheduler service or your PowerProtect Data Manager operating system, the configuration will be lost.
● Type the following to save the docker image and restart the scheduler service:
docker commit scheduler dpd/ppdm/ppdmc-scheduler:PowerProtect Data Manager version
scheduler restart
where PowerProtect Data Manager version is the PowerProtect Data Manager version that is deployed on your system.
You can use this method to permanently apply the configuration change after restoring the docker image.
NOTE: Ensure that the PowerProtect Data Manager version specified in the commit command matches the
PowerProtect Data Manager version that is deployed on your system.
The Protection Jobs or System Jobs window displays the status of the canceled job or job group. If the cancellation is
successful, then the status eventually changes to Canceled. If the cancellation is not successful, then the status might
indicate either Success or Critical.
3. To cancel an individual job or task from the Job ID Summary window:
a. Click the job ID next to the name of the job or job group.
The Job ID Summary window opens to display a list of all jobs or tasks.
b. Select a job or task that is in-progress, and then click Cancel.
NOTE: If a job or task is almost complete, the cancellation might fail. If the cancellation fails, a message displays
indicating that the task cannot be canceled.
c. Click Close.
The Job ID Summary window displays the status of the canceled job or task. If the cancellation is successful, then the
status eventually changes to Canceled. If the cancellation is not successful, then the status might indicate either Success
or Critical.
Exporting logs
The PowerProtect Data Manager UI enables you to export and download a detailed log of a job, asset, or task to perform
analysis or troubleshooting.
You can export and download a log for a job, asset, or task with any status. After you export a log, you can download it by
clicking .
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Jobs > Protection Jobs or Jobs > System Jobs.
The Protection Jobs or Systems Jobs window appears, displaying all jobs.
indicates the log export operation is in progress, and is shown next to the asset or task in the Download Log column.
Hover over the icon to display the progress. When the log export is complete, you can download the log.
3. Click next to the ID for the job to download the exported log.
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Jobs > Protection Jobs or Jobs > System Jobs.
The Protection Jobs or Systems Jobs window appears, displaying all jobs.
2. Click the job ID next to the name of the job.
The Job ID Summary window opens.
3. Select the asset or task from the list, and then click Export Log.
indicates the log export operation is in progress, and is shown next to the asset or task in the Download Log column.
Hover over the icon to display the progress. When the log export is complete, you can download the log.
For in-progress jobs, the details pane displays the "Error" tab and indicates
"Failed"
When you open the Details pane for in-progress jobs, the Error tab appears and incorrectly indicates Failed in the error details.
Workaround
Ignore the Error tab for in-progress jobs.
System settings
You can use the PowerProtect Data Manager UI to modify system settings that are typically configured during PowerProtect
Data Manager deployment.
Steps
1. From the PowerProtect Data Manager UI, click , and then click Default Network.
2. Update the following fields as necessary:
● Hostname
● Primary DNS
● Secondary DNS
3. In the Configuration Details pane, click Edit, and then update the following fields for the IP address as necessary:
● IP Address
● Subnet Mask
● Gateway
4. Click Save.
"PPDMServer": {
"Description": "PowerProtect Data Manager server name",
"Required": true,
"Type": "string",
"IsArray": false,
"Value": "<hostname>",
"Default": null
},
d. Look for the PPDMUrl section, and edit the value of Value, replacing <ip_address> with the new IP address:
"PPDMUrl": {
"Description": "PowerProtect Data Manager server URL with port, for backup
synchronization, (<URL>:9200)",
"Required": true,
"Type": "string",
"IsArray": false,
"Value": "https://<ip_address>:8443",
"Default": null
},
a. Connect to the PowerProtect Data Manager console and change to the root user.
b. Run the command service elasticsearch status. If the service is running, wait 5 minutes and run the command
again. If the service is still running, run the command service elasticsearch stop.
c. From the vSphere Client user interface, select the PowerProtect Data Manager appliance, click ACTIONS > Power, and
then select Restart Guest OS.
NOTE: Use the vSphere Client to restart the PowerProtect Data Manager appliance instead of the normal
procedure.
d. After the appliance has restarted, connect to the PowerProtect Data Manager console and change to the root user.
e. Run the following commands:
sudo rm /opt/emc/boostfs/lockbox/*.bak
sudo mv /opt/emc/boostfs/lockbox/boostfs.lockbox.FCD /opt/emc/boostfs/lockbox/
boostfs.lockbox.FCD.bak
sudo mv /opt/emc/boostfs/lockbox/boostfs.lockbox /opt/emc/boostfs/lockbox/
boostfs.lockbox.bak
sudo umount -l /data01/server_backups
f. From the PowerProtect Data Manager user interface, click System Settings > Disaster Recovery and select Manage
Backups.
NOTE: Viewing the Manage Backups pane triggers a necessary server process, and no further action is required.
Steps
1. From the PowerProtect Data Manager UI, click , select System, and then click Timezone.
2. From the Timezone list, select the applicable time zone.
3. Click Save.
Steps
1. From the PowerProtect Data Manager UI, click , and then select Security.
The Security dialog box appears.
2. Click the Replication Encryption switch so it is enabled, and then click Save.
Next steps
The Infrastructure > Storage window of the PowerProtect Data Manager UI displays the status of the in-flight encryption
setting for all attached storage systems.
NOTE: For systems with DDOS version 6.2 and earlier installed, the status might display as Unknown. DDOS version 6.3
and later supports authentication mode. DDOS versions earlier than version 6.3 support only anonymous authentication
mode. PowerProtect Data Manager supports only anonymous and two-way authentication modes. Ensure that both source
and destination system servers use the same authentication mode.
You can take additional steps on your PowerProtect Data Manager server to enable in-flight encryption on connected DD
systems by using DD System Manager, as described in the DDOS Administration Guide.
Enabling encryption imposes additional overhead. Backup and restore performance for any client could be affected by 5-20%
with encryption enabled.
You can enable or disable backup and restore encryption in the PowerProtect Data Manager UI.
PowerProtect Data Manager supports backup and restore encryption for all supported DD Boost and DDOS versions. The most
up-to-date software compatibility information for PowerProtect Data Manager is provided by the E-Lab Navigator.
NOTE: You do not need to enable in-flight encryption on connected DD systems. If DD encryption settings exist, the higher
setting takes precedence.
Prerequisites
Review the information in Backup and restore encryption to learn more about backup and restore encryption.
The encryption settings determine if the data transfer is encrypted while in-flight during backup and restore operations.
● For Microsoft SQL Server, Microsoft Exchange Server, File System, SAP HANA, and Oracle workloads, backup and restore
encryption is only supported for Application Direct hosts.
● When a new host is added to PowerProtect Data Manager, host configuration is run to push the encryption settings to the
host.
● Only hosts that have the same version of PowerProtect Data Manager application agents installed support the host
configuration.
Steps
1. From the PowerProtect Data Manager UI, click , and then select Security.
The Security dialog box appears.
2. Click the Backup/Restore Encryption switch so it is enabled, and then click Save.
Next steps
The Jobs > System Job window of the PowerProtect Data Manager UI creates a job to enable protection encryption. This job
pushes encryption settings to the hosts to be used for self-service operations. Within the system job, a host configuration job is
created for each host. If an error occurs, you can retry the system job or individual host configuration job.
NOTE: For centralized backup and restore operations, PowerProtect Data Manager sends the encryption settings to the
application agents on the Application Direct hosts and network-attached storage (NAS).
You can disable encryption for backup and restore content by clicking the Backup/Restore Encryption switch. PowerProtect
Data Manager creates a system job in the Jobs > System Job window to disable protection encryption.
Additional considerations
Review the following additional considerations for backup and restore encryption.
To validate whether encryption is being used, you can check the status of existing connections on the DD system by running the
ddboost show connections command in the DD Boost CLI:
● The value in the Encrypted column is set to Yes if a connection has been established with encryption.
● If a client establishes a connection with encryption, and establishes another connection without encryption, the value in the
Encrypted column is set to Mixed. This might occur for one of the following reasons:
○ Encryption settings that are defined on a per-client basis remain in place for a while after the client has disconnected. If
the client previously established a connection without encryption and then later established a connection with encryption,
the value shows as Mixed.
○ Encryption settings are not specified for the DD Boost connections that are created on the application agent. Refer to
the individual user guides for more information.
● If encryption settings exist on the DD and are also enabled in PowerProtect Data Manager, the higher encryption setting
takes precedence. As a result, the Encrypted column will always show Mixed or Yes.
Prerequisites
To use TLS for the syslog connection:
● Import the syslog server security certificate into PowerProtect Data Manager. The PowerProtect Data Manager Security
Configuration Guide provides instructions.
● By default, PowerProtect Data Manager uses anon authentication. If your syslog server uses another form of
authentication, contact Customer Support.
Steps
1. From the PowerProtect Data Manager UI, click , select Logs, and then click Syslog.
The Logs window opens to the Syslog page.
To enable syslog forwarding:
2. Move the Syslog Forwarding slider to the right to enable syslog forwarding.
3. Provide the following information:
● IP Address / FQDN—IP address or fully qualified domain name of the syslog server.
● Port—Port number for PowerProtect Data Manager and syslog server communications.
● Protocol—Protocol to use for communications (TLS, UDP, or TCP).
● Components—Syslog message components.
● Severity Level—Specify the scope of the messages to forward to the syslog server.
To change the syslog server:
4. From the PowerProtect Data Manager UI, click , select Logs, and then click Syslog.
The Logs window opens to the Syslog page.
5. Change the following syslog configuration details:
● IP Address / FQDN—IP address or fully qualified domain name of the syslog server.
● Port—Port number for PowerProtect Data Manager and syslog server communications.
● Protocol—Protocol to use for communications (TLS, UDP, or TCP).
To change which events are forwarded:
6. From the PowerProtect Data Manager UI, click , select Logs, and then click Syslog.
The Logs window opens to the Syslog page.
7. Change the Components and Severity Level.
To disable syslog forwarding:
8. From the PowerProtect Data Manager UI, click , select Logs, and then click Syslog.
The Logs window opens to the Syslog page.
9. Move the Syslog Forwarding slider to the left to disable syslog forwarding.
To apply the changes:
10. Click Save.
Next steps
Once the syslog configuration is complete, check the connection status. Go to System Settings > Logs > Syslog and verify
that the syslog server connection status indicates Connected. If the syslog server is not connected, the status indicates Not
Connected.
Steps
1. Perform the following steps from the vSphere Web Client:
a. Right-click the VM Direct appliance and select Shut Down Guest OS.
b. After the power off completes, right-click the appliance and select Edit Settings.
The Edit Settings window appears with the Virtual Hardware button selected.
c. Increase the provisioned size of Hard disk 2 to the desired size, and then click OK.
NOTE: You cannot decrease the provisioned size of the disk.
For example, to resize the disk to 700 GB, type: resize 1 752GB
iv. Type quit.
3. Reboot the VM Direct appliance by typing systemctl reboot.
4. Log in to the console as the root user.
NOTE: If you use ssh protocol to connect to the VM Direct appliance, log in with the admin account, and then use the
su command to change to the root account.
Steps
1. Perform the following steps from the vSphere Web Client:
a. Right-click the VM Direct appliance and select Shut Down Guest OS.
b. After the power off completes, right-click the appliance and select Edit Settings.
The Edit Settings window appears with the Virtual Hardware button selected.
c. Increase the provisioned size of Hard disk 1 to the desired size, and then click OK.
Steps
1. Use a web browser to log in to the DD System Manager as the system administrator.
2. In the Summary tab, Protocols pane, select NFS export > create export.
The Create NFS Exports window appears.
3. In the Create NFS Exports window:
a. In the Export Name field, specify the name of the DD MTree.
b. If you have not yet created the DD MTree, follow the prompts to create the MTree and click Close.
c. In the Directory path field, specify the full directory path for DD MTree that you created. Ensure that you use the same
name for the directory.
d. Click OK.
A message appears to indicate that the NFS export configuration save is in progress and then complete.
e. Click Close.
You can also configure virtual networks to separate management traffic from backup traffic. This configuration can also
separate traffic that originates from different networks. In that case, you can use the same virtual network for management and
backup traffic, or separate virtual networks for each.
To use virtual networks with PowerProtect Data Manager, you must configure the DD and network infrastructure before you
configure the PowerProtect Data Manager or assign networks to assets.
Configuration follows a multistep workflow:
1. Configure the virtual network on the DD.
2. Add the DD as storage and name the network interface.
3. Add the virtual network to the PowerProtect Data Manager.
4. Register the assets with the PowerProtect Data Manager.
5. Create a protection policy (or edit an existing policy) and assign the preferred virtual network.
Replication traffic flows between protection storage systems. Where required, configure virtual networks for replication traffic
directly on the protection storage systems.
The Data for Management Components type carries traffic which relates to management operations but which can contain
customer information. Where required, you can separate this traffic from either the Management network, the Data network, or
both.
For example, some environments may support different speeds for each network: a 1 Gbps network for management and a 10
Gbps network for data. Other environments may have policies or rules that govern whether customer data can flow across
the Management network. Separating the Data for Management Components traffic enables you to optimize flow for security,
speed, and other priorities.
While the table indicates compatible traffic types, protection engines can operate without virtual networks.
Separating the Data for Management Components traffic from the Management traffic requires you to name the virtual
networks for protection storage. Name virtual networks for protection storage provides instructions. If you do not name the
virtual networks for protection storage, this traffic defaults to the Management network.
Even though protection engines require connections for Data traffic, the private protection engines maintain separation
between the virtual networks for each department.
Several of the diagrams for supported virtual network topologies include parallel virtual networks.
Single network
This topology assigns all traffic types to the same network. There is no separation between Management and Data or between
agents which belong to different logical organizations.
Full separation
This topology implements complete separation between all traffic types for maximum throughput and security. Customer data
does not flow across the Management network.
Thick lines indicate paths that transfer comparatively more data, such as files and update packages. Thin lines indicate paths
that transfer comparatively less data, such as HTTPS API traffic only.
Supported scenarios
PowerProtect Data Manager supports virtual networks for the following use cases:
● Virtual machine backups
● Kubernetes backups
● Database backups
● Microsoft Exchange Server backups
● File system backups
● Replication
● Disaster recovery
● Cloud DR
● Storage Data Management
● Search Engine
NOTE: The first time that you use the Networks page to add a virtual network to an environment with existing Search
Engine nodes, PowerProtect Data Manager does not automatically add the virtual network to the Search Engine. Instead,
manually edit each Search Engine node to add the virtual network. This action makes the Search Engine aware of virtual
networks. Any subsequent new virtual networks are automatically added to the Search Engine.
When you review the list of virtual networks, rows that require attention are indicated with a beside the name. View the
network details for more information.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Storage.
The Storage window appears.
4. Click Save.
The PowerProtect Data Manager stores the network names.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Networks.
The Networks window appears.
2. Click Add.
The Add Network wizard opens.
3. For Purpose, select one or more traffic types.
Virtual network traffic types provides more information.
4. In the Network Name field, type the name of the new virtual network.
Dell Technologies recommends that you keep the network names consistent for each VLAN.
5. In the VLAN ID field, type the numeric value 1 through 4094 that corresponds to the VLAN which this virtual network
represents.
6. Provide the applicable Subnet Mask and MTU (maximum transmission unit) values for the virtual network.
Allowable MTU values range from 1500 to 9000.
7. For the Static IP Pools field, provide the indicated number of reserved IP addresses for PowerProtect Data Manager to use
for communication on this virtual network.
To add values to the pool, type an IP address or range, and then click Save. To remove values from the pool, select a value
from the pool, and then click Delete.
You can type each IP address separately, or you can provide an IP address range in the form 10.1.1.4-10.1.1.10.
8. Verify that the static IP address pool contains enough addresses to add the virtual network.
9. Click Next.
The Add Network wizard moves to the Routes page.
10. If applicable, click Add to define any required routes.
The Add Routes page opens. Complete the following substeps:
a. Select a route type:
● If you select Subnet, define the subnet in CIDR format. For example, 10.0.0.0/24.
● If you select Host, type the IP address.
b. Type the IP address of the default gateway through which PowerProtect Data Manager should reach the subnet or host.
c. Click Add.
The Add Routes page closes. The Routes list displays the new route.
d. Review the route information.
If any parameters are incorrect, select the checkbox for that route and then click Delete.
e. Repeat these substeps for any additional required routes.
11. Click Next.
Next steps
PowerProtect Data Manager may take a short time to configure the virtual network.
If the virtual network status changes to Failed, then a corresponding system alert contains more information about the cause
of the failure. Troubleshoot the failure and then complete one of the following actions:
● If the failure was caused by a configuration issue, click Edit to update the network configuration.
● If the failure was transient or had an external cause, and the configuration is correct, click Retry to use the same settings.
NOTE:
When you edit or retry a virtual network operation that failed and there are additional IP addresses in the address pool,
PowerProtect Data Manager marks the last failed IP address as abandoned. PowerProtect Data Manager does not try to
reuse any IP addresses that are marked as abandoned. The UI does not display this condition.
KB article 000181120 provides more information about how to use the REST API to detect when an IP address is marked as
abandoned. The article also provides steps to correct this condition so that the IP address can be used again.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Networks.
The Networks window appears.
2. Locate the row that corresponds to the appropriate virtual network.
The columns for each row indicate the associated VLAN ID and network status. Rows that require attention are indicated
with a beside the name.
3. Click for that row.
The Details pane opens to the right.
This pane contains information about the virtual network configuration, such as the static IP address pool details, assigned
traffic types, and configured routes. This pane also lists any components that are configured with an interface on this
network, their types, and their assigned IP addresses.
4. Click X to close the details pane.
Instead, the UI marks conflicts with a warning symbol ( ). Administrators should review any warnings and edit the indicated
components to manually remove the incompatible network interfaces. For example:
● Search Engine node interfaces to virtual networks that carry Data traffic, but not Data for Management Components traffic.
● Protection engine interfaces to virtual networks that carry Data for Management Components traffic.
● PowerProtect Data Manager interfaces to virtual networks that carry Data traffic, but not Data for Management
Components traffic.
Under these circumstances, PowerProtect Data Manager continues to operate normally. However, resolving the conflict returns
the IP address to the address pool.
Prerequisites
If an IP address from the static IP pool is already in use, you cannot remove the address from the pool.
Before you change the traffic types for a network, disable indexing. Set up and manage indexing provides instructions.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Networks.
The Networks window appears.
2. Locate the row that corresponds to the appropriate virtual network, and then click the radio button to select that row.
The PowerProtect Data Manager enables the Edit and Delete buttons.
3. Click Edit.
The Edit Network wizard opens to the Summary page.
4. Click Edit for the Configuration or Routes sections.
The Edit Network wizard moves to the Configuration or Routes page.
5. Modify the appropriate network parameters, and then click Next.
If you modify the virtual network in a way that requires more IP addresses, you cannot continue until you add more
addresses to the static IP address pool.
The Edit Network wizard moves to the Summary page.
6. Verify the network configuration information, and then click Finish.
The Edit Network wizard closes. The Networks page reflects the updated information, where applicable.
You may need to view the details for the virtual network to verify some changes.
Next steps
If you disabled indexing, re-enable indexing. Set up and manage indexing provides instructions.
Prerequisites
● Unassign the virtual network from any applicable assets.
● Disable indexing. Set up and manage indexing provides instructions.
● Disable every VM Direct Engine that is configured to use the virtual network.
● Disable every Search cluster that uses the virtual network.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Networks.
The Networks window appears.
2. Locate the row that corresponds to the appropriate virtual network, and then click the radio button to select that row.
PowerProtect Data Manager enables the Edit and Delete buttons.
3. Click Delete.
4. Verify the network information, and then click OK to acknowledge the deletion warning.
The PowerProtect Data Manager removes the virtual network from the list on the Networks page.
You can configure the PowerProtect Data Manager to choose a preferred virtual network for all assets on a protection
policy.
● By asset
You can assign virtual networks to individual assets. This method is optional and overrides any virtual network assignment
from a protection policy. Assets which are not individually assigned automatically use the preferred virtual network.
You can use this method to specify a virtual network for any asset. However, this method is especially suited to configuring
assets which are exceptions to the rule. You can also split assets on the same application host across multiple virtual
networks. For example, when an asset has its own network interface or belongs to another department.
Dell Technologies recommends that you assign assets to virtual networks by protection policy, where possible.
Before you assign an asset, perform the following actions:
● Test connectivity from the asset host to the PowerProtect Data Manager by pinging the PowerProtect Data Manager IP
address on that virtual network.
● Register the asset source with the PowerProtect Data Manager.
● Approve the asset source.
Steps
1. From the PowerProtect Data Manager UI, select Protection > Protection Policies.
The Protection Policies window appears.
2. Locate an existing protection policy for which you want to configure a virtual network.
3. Select the radio button for the protection policy, and then click Edit.
The Edit Policy wizard opens to the Summary page.
4. In the Objectives block, click Edit.
The Edit Policy wizard moves to the Objectives page.
5. Select the checkbox for the appropriate schedule.
6. In the Network Interface field, select the correct virtual network from the list.
Each list entry indicates the interface name, interface speed, and virtual network name.
If the network was not named, a combination of the interface name and VLAN ID replaces the virtual network name. For
example, ethV1.850. An interface without a virtual network name behaves as if a virtual network was not configured.
7. Click Next.
The Edit Policy wizard moves to the Summary page.
8. Verify the policy information, and then click Finish.
Ensure that the selected assets are part of the virtual network.
The Edit Policy wizard closes.
9. Click OK to acknowledge the update, or click Go to Jobs to monitor the update.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets.
The Assets window appears.
2. Locate the appropriate assets from the list on any tab.
Use the checkbox to select each asset. You can select more than one asset at a time.
3. Click More Actions > Assign Network.
The Associated Assets window opens.
4. To use the virtual network for all assets on the same application host, click Include.
Otherwise, to use the virtual network for only the selected assets, click Do Not Include. Consider whether you require a
separate protection policy for assets on different networks.
The Assign Network window opens.
5. Select a virtual network from the Network Label list, and then click Save.
Results
The PowerProtect Data Manager applies the network selection to the selected assets. The Network column in the list of assets
for each tab now indicates the selected virtual network.
Prerequisites
After disaster recovery of the PowerProtect Data Manager system is complete, perform the following steps on the restored
PowerProtect Data Manager system.
Steps
1. Verify that all PowerProtect Data Manager services are running in System Settings > Support > System Health.
2. Restart the logmgr service by running the command logmgr restart, and then wait for a few seconds for the service
to restart.
Next steps
If your syslog server uses a custom port, open the corresponding port on the restored PowerProtect Data Manager system. The
PowerProtect Data Manager Security Configuration Guide provides more information.
NOTE: PowerProtect Data Manager reporting is not supported with PowerProtect Data Manager in cloud environments.
Configure the reporting engine to set up reporting capabilities for PowerProtect Data Manager. After the reporting engine is
configured, you can run reports from Reports > Report Browser.
NOTE: If you are using another reporting tool such as CloudIQ, you can choose not to configure PowerProtect Data
Manager reporting.
Steps
1. Log in to the PowerProtect Data Manager UI.
2. From the Report Browser window, click in the bottom of the window.
NOTE: The feedback button is only visible if the reporting engine is configured.
The customer feedback survey for the reporting feature opens in a new window, as shown in the following figure:
NOTE: In environments with limited external connectivity, such as dark sites, an error appears in the web browser and
the customer feedback survey is not displayed.
3. (Optional) Complete the customer feedback survey, and when finished, click Submit.
You have the option to rate your satisfaction with the PowerProtect Data Manager reporting feature and provide details
about your rating.
Port requirements
The following table summarizes the port requirements for PowerProtect Data Manager and the reporting engine. The
PowerProtect Data Manager Security Configuration Guide provides more information about ports for PowerProtect Data
Manager. Read this table in conjunction with the port usage topic for PowerProtect Data Manager.
Server requirements
Observe the following requirements for the reporting engine.
● SUSE Linux Enterprise Server (SLES) version 12 SP5
● 8 vCPUs, 16 GB RAM
● Disk 01: 48 GB to install the operating system and Reporting Application Server
● Disk 02: 512 GB to store the reporting data
● Disk 03: 8 GB to store log information
Table 39. Known issues with the reporting engine and Report Browser
Issue
In the Backup Jobs Summary report, the search functionality for the Jobs Distribution table only supports an "equals" filter
type.
The reporting engine status indicates the configuration is successful for failed deployments.
In the Backup Jobs Summary report, the Start Time column in the Jobs Distribution table cannot be sorted.
The Jobs Distribution table for reports displays a long entry for the Job ID whereas the Jobs page displays a short entry for
the Job ID.
When a report is exported to a CSV file, the timestamp in the Last Copy column is displayed in an unreadable format.
Workaround
To convert the timestamp to a regular date and time format, copy the value into an Excel cell, and then complete the following
steps:
1. Assuming the timestamp is in cell A2, use the following formula to generate the GMT Excel time value:
=(A2/86400)+DATE(1970,1,1)
2. Format the cell to use one of the following date formats, or create a custom date format.
● dd-mmm-yy
● dd-mmm-yyyy
The reported sizes of backups and data transfers are incorrect. To determine the correct sizes of backups and data transfers,
perform the following steps:
1. If not already displayed in megabytes, convert the value displayed into megabytes.
2. Divide the value by (1024*1024).
3. If desired, this corrected value in megabytes can be converted to a different unit.
Jobs reports display only the first 10,000 backup jobs retrieved from a data-collection request.
Prerequisites
● You must deploy the reporting engine on a separate virtual machine.
● The vCenter server must be added as an asset source from Infrastructure > Asset Sources.
● The virtual machine requires 500 GB to function properly.
● Configure your firewall so that the reporting engine IP address is only accessible using the PowerProtect Data Manager IP
address.
Results
PowerProtect Data Manager starts the configuration process. Go to Reporting Engine to check the status. You can also go to
the System Jobs window to monitor the progress of the configuration job.
When the process is complete, a notification appears in the Reporting Engine window to indicate that the configuration is
successful. You can now access reports from Reports > Report Browser.
Report Browser
Use the Report Browser to view detailed reports for the data protection activities in your environment. When you open the
Report Browser, the reports are displayed in the window.
Go to Reports > Report Browser to access the reports.
Each report displays as a card. When you click a report, the report displays as one tab in the Reports Browser view.
The following figure provides an example Backup Jobs Summary report. The Backup Jobs Summary, Restore Jobs
Summary, and Replication Jobs Summary reports display the same widget types.
NOTE: Report data is not live and is as up-to-date as the last successful data collection request. Therefore, reports should
be used for historical purposes only.
● To view live jobs data, go to Jobs > Protection Jobs.
● To view live asset data, go to Infrastructure > Assets.
● For a high-level view of the overall state of the PowerProtect Data Manager system, go to Dashboard.
You can also filter and sort the information that appears in table columns. Click in the column heading to filter the
information in a table column, or click a table column heading to sort that column.
To see a complete list of filtering and sorting columns, click at the bottom left of the window.
Filter and customize reports provides more information.
Asset Types Displays the total number of successful and failed backup jobs, based on asset type.
Job Success and Fail Rate Displays the number of successful and failed backup jobs over a period of time.
Data Transfer Rate Displays the rate of data transfer over a period of time.
3 Strike Summary Displays the total number of assets that have not been backed up for one or more days
consecutively:
● One Strike—Count of the number of assets that have one protection job failure.
● Two Strikes—Count of the number of assets that have two consecutive protection job
failures.
● Three Strikes—Count of the number of assets that have three consecutive protection job
failures.
NOTE: Assets on the strike summary are reported once in the strike category for which it has
the most strikes. Assets are not double counted in the specific categories for fewer strikes
even if that might match the criteria.
Top 10 Offenders Displays the assets with the highest count of consecutive primary backup failures, indicating the
number of failures along with the time of the last successful backup.
Jobs Distribution Displays details and status of all jobs, including:
● Backup Job ID
● Asset Name
● Asset Type
● Host
● Start Time
● Job Status
● Policy Name
● Data Transferred
Asset Types Displays the total number of successful and failed restore jobs, based on asset type.
Job Success and Fail Rate Displays the number of successful and failed restore jobs over a period of time.
Data Transfer Rate Displays the rate of data transfer over a period of time.
3 Strike Summary Displays the total number of assets that have not been backed up for one or more days
consecutively:
● One Strike—Count of the number of assets that have one restore job failure.
● Two Strikes—Count of the number of assets that have two consecutive restore job failures.
● Three Strikes—Count of the number of assets that have three consecutive restore job
failures.
NOTE: Assets on the strike summary are reported once in the strike category for which it has
the most strikes. Assets are not double counted in the specific categories for fewer strikes
even if that might match the criteria.
Top Offenders Displays the assets with the highest count of consecutive primary backup failures, indicating the
number of failures along with the time of the last successful restore.
Jobs Distribution Displays details and status of all jobs, including:
● Backup Job ID
● Asset Name
● Asset Type
● Host
● Start Time
● Job Status
● Policy Name
● Data Transferred
Job Success and Fail Rate Displays the number of successful and failed replication jobs over a period of time.
Data Transfer Rate Displays the rate of data transfer over a period of time.
3 Strike Summary Displays the total number of assets that have not been backed up for one or more days
consecutively:
● One Strike—Count of the number of assets that have one replication job failure.
● Two Strikes—Count of the number of assets that have two consecutive replication job
failures.
● Three Strikes—Count of the number of assets that have three consecutive replication job
failures.
NOTE: Assets on the strike summary are reported once in the strike category for which it has
the most strikes. Assets are not double counted in the specific categories for fewer strikes
even if that might match the criteria.
Top 10 Offenders Displays the assets with the highest count of consecutive primary backup failures, indicating the
number of failures along with the time of the last successful backup.
Jobs Distribution Displays details and status of all jobs, including:
● Backup Job ID
● Asset Name
● Asset Type
● Host
● Start Time
● Job Status
● Policy Name
● Data Transferred
Table 46. Filtering and customizing the Backup Jobs Summary, Restore Jobs Summary, and Replication
Jobs Summary reports
Options Steps
(Optional) Filter based on 1. Click Edit at the top of the report.
asset type, asset scope,
The filters and layout pane opens to the Filters tab.
job status, and duration.
2. Select one or more asset types from the list.
3. Select whether to include all assets or custom assets:
● Select All to include all assets.
● Select Custom to choose specific assets. If you select Custom, click the Select assets
link and select one or more assets from the list. When complete, click Next, and then click
OK.
4. Select one or more job statuses that you want to filter on. Status types include:
● Successful
● Partially Successful
# register.sh --start
# register.sh --stop
# register.sh --status
# register.sh --status
On Windows, you can start, stop, or obtain the status of the PowerProtect agent service from the Services Manager, similar to
other Windows services. The name of the service in Services Manager is PowerProtect Agent Service.
NOTE: The register.sh script stops the currently running agent service.
# register.sh
● The following command includes the new IP address on the command line:
# register.sh --ppdmServer=10.0.0.1
On Windows, you can change the PowerProtect Data Manager server address by launching the agent installer and selecting the
change option. Change the PowerProtect Data Manager service address from the Configuration Install Options page.
NOTE: Ensure that the agent service is powered off. Do not start the agent service until disaster recovery is complete.
During a network connectivity test, the agent is unable to reach the PowerProtect Data
Manager server by using ping.
1. If the ping command is blocked in the environment, the agent registration can
still complete successfully.
Review the agent service logs at INSTALL_DIR\DPSAPPS\AgentService\logs to verify that
the registration is successful. If the registration is successful, the status of the
agent host indicates Registered in the PowerProtect Data Manager UI.
2. If the ping command is not blocked in the environment, the agent registration
might not complete successfully because a network connection cannot be started. If this
occurs, complete the following steps to troubleshoot the issue:
On Linux or AIX, if the agent fails to establish a connection with the PowerProtect Data Manager server, agent registration
might fail with the following error message:
During a network connectivity test, the agent is unable to reach the PowerProtect Data
Manager server by using ping and curl.
1. If the ping command is blocked in the environment and curl is not installed, the
agent registration can still complete successfully.
Review the agent service logs at /opt/dpsapps/agentsvc/logs to verify that the
registration is successful. If the registration is successful, the status of the agent
host indicates Registered in the PowerProtect Data Manager UI.
2. If the ping command is not blocked in the environment, the agent registration
might not complete successfully because a network connection cannot be started. If this
occurs, complete the following steps to troubleshoot the issue:
If agent registration fails with these error messages, complete the following operation:
1. Use any network packet tracing tool to trace the packets from the agent system to PowerProtect Data Manager.
2. Start the packet tracing between the source IP of the agent system and the destination IP of PowerProtect Data Manager.
3. Start the network traffic between the agent system and PowerProtect Data Manager.
Wait 10 to 15 seconds.
4. Analyze the captured packets.
5. Look for SYN and SYN_ACK packets to see if a 3-way handshake is being performed.
Determine whether the source agent or the destination PowerProtect Data Manager is blocking the connection.
If network traffic is blocked, contact your network security team to resolve the port communication issue.