Ppdm1915 Admin
Ppdm1915 Admin
15
Administrator Guide
November 2023
Rev. 01
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid
the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2016 - 2023 Dell Inc. or its subsidiaries. All rights reserved. Dell Technologies, Dell, and other trademarks are trademarks of Dell Inc. or its
subsidiaries. Other trademarks may be trademarks of their respective owners.
Contents
Preface......................................................................................................................................... 8
Contents 3
Security certificates....................................................................................................................................................48
Restarting PowerProtect Data Manager.....................................................................................................................48
System maintenance troubleshooting.......................................................................................................................... 48
Messages Catalog............................................................................................................................................................. 48
4 Contents
Add a Cloud Snapshot Manager tenant................................................................................................................. 79
Contents 5
Restore Cloud Tier backups to protection storage.................................................................................................. 112
Recall and restore from Cloud Tier.........................................................................................................................112
6 Contents
Synchronizing the time between PowerProtect Data Manager and other systems.................................152
Modify the user-interface time zone, system time zone, and NTP server..................................................152
Encryption in-flight....................................................................................................................................................153
Server monitoring with syslog................................................................................................................................ 156
Additional system settings....................................................................................................................................... 157
Modifying the PowerProtect Data Manager virtual machine disk settings....................................................... 157
Modify the data disk size......................................................................................................................................... 157
Modify the system disk size....................................................................................................................................159
Configure the DD system.............................................................................................................................................. 159
Virtual networks (VLANs)............................................................................................................................................. 160
Virtual network traffic types....................................................................................................................................161
Virtual network topologies.......................................................................................................................................163
Supported scenarios................................................................................................................................................. 166
Virtual network prerequisites.................................................................................................................................. 167
Configuring virtual networks................................................................................................................................... 167
Virtual network asset assignment...........................................................................................................................171
Syslog server disaster recovery .................................................................................................................................. 172
Troubleshooting the syslog connection......................................................................................................................173
No messages are transmitted to the syslog server........................................................................................... 173
Contents 7
Preface
As part of an effort to improve product lines, periodic revisions of software and hardware are released. Therefore, all versions
of the software or hardware currently in use might not support some functions that are described in this guide. The product
release notes provide the most up-to-date information about product features.
If a product does not function correctly or does not function as described in this guide, contact Customer Support.
NOTE: This guide was accurate at publication time. To ensure that you are using the latest version of this guide, go to the
Customer Support website.
Product naming
Data Domain (DD) is now PowerProtect DD. References to Data Domain or Data Domain systems in this guide, in the user
interface, and elsewhere in the product include PowerProtect DD systems and older Data Domain systems.
Isilon is now PowerScale. References to Isilon, Isilon products, or Isilon appliances in this guide, in the user interface, and
elsewhere in the product include PowerScale products and appliances.
In many cases the user interface has not yet been updated to reflect these changes.
Language use
This guide might contain language that is not consistent with Dell Technologies current guidelines. Dell Technologies plans to
update the guide over subsequent future releases to revise the language accordingly.
This guide might contain language from third-party content that is not under Dell Technologies control and is not consistent
with the current guidelines for Dell Technologies own content. When such third-party content is updated by the relevant third
parties, this guide is revised accordingly.
Acronyms
The acronyms that are used in this guide might not be familiar to everyone. Although most acronyms are defined on their first
use, a definition is not always provided with later uses of the acronym. For a list of all acronyms and their definitions, see the
glossary at the end of the guide.
Website links
The website links used in this guide were valid at publication time. If you find a broken link, provide feedback on the guide, and a
Dell Technologies employee will update the link in the next release as necessary.
Purpose
This guide describes how to configure, use and administer the Dell PowerProtect Data Manager software. This guide also
includes disaster recovery procedures. Procedures specific to asset protection are provided in the individual user guides.
Audience
This guide is intended for the host system administrator who is involved in managing, protecting, and reusing data across the
enterprise by deploying PowerProtect Data Manager software.
8 Preface
Revision history
The following table presents the revision history of this guide.
Compatibility information
Software compatibility information for the PowerProtect Data Manager software is provided by the E-Lab Navigator.
Related documentation
The following publications are available at Customer Support and provide additional information:
Preface 9
Table 2. Related documentation (continued)
Title Content
PowerProtect Data Manager Microsoft Exchange Server User This guide describes how to configure and use the Dell
Guide PowerProtect Data Manager software to back up and restore
the data in a Microsoft Exchange Server environment.
PowerProtect Data Manager Microsoft SQL Server User This guide describes how to configure and use the Dell
Guide PowerProtect Data Manager software to back up and restore
the data in a Microsoft SQL Server environment.
PowerProtect Data Manager Oracle RMAN User Guide This guide describes how to configure and use the Dell
PowerProtect Data Manager software to back up and restore
the data in an Oracle Server environment.
PowerProtect Data Manager SAP HANA User Guide This guide describes how to configure and use the Dell
PowerProtect Data Manager software to back up and restore
the data in an SAP HANA Server environment.
PowerProtect Data Manager Network-Attached Storage This guide describes how to configure and use the Dell
User Guide PowerProtect Data Manager software to protect and recover
the data on network-attached storage (NAS) shares and
appliances.
PowerProtect Data Manager Virtual Machine User Guide This guide describes how to configure and use the Dell
PowerProtect Data Manager software to back up and restore
virtual machines and virtual machine disks (VMDKs) in a
vCenter Server environment with VMware vSphere Storage
APIs – Data Protection (VADP) or the Transparent Snapshots
Data Mover (TSDM).
PowerProtect Data Manager Storage Array User Guide This guide describes how to configure and use the Dell
PowerProtect Data Manager software to protect and restore
data on PowerStore storage arrays.
VMware Cloud Foundation Disaster Recovery With This guide provides a detailed description of how to
PowerProtect Data Manager perform an end-to-end disaster recovery of a VMware Cloud
Foundation (VCF) environment.
PowerProtect Data Manager Public REST API documentation This documentation contains the Dell Dell Technologies APIs
and includes tutorials to guide you in their use.
vRealize Automation Data Protection Extension for Data This guide describes how to install, configure, and use the
Protection Systems Installation and Administration Guide vRealize Data Protection Extension.
Typographical conventions
The following type style conventions are used in this guide:
10 Preface
Table 3. Style conventions (continued)
Formatting Description
Monospace bold Used for user input.
[] Square brackets enclose optional values.
| Vertical line indicates alternate selections. The vertical line means or for the alternate
selections.
{} Braces enclose content that the user must specify, such as x, y, or z.
... Ellipses indicate non-essential information that is omitted from the example.
You can use the following resources to find more information about this product, obtain support, and provide feedback.
Support Library
The Support Library contains a knowledge base of applicable solutions that you can search for either by solution number (for
example, KB000xxxxxx) or by keyword.
To search the Support Library:
1. Go to the Customer Support website.
2. From the Support Library pane, click Find Articles.
3. In the Support Library search field, type either the solution number or keywords. Optionally, you can limit the search to
specific products by typing a product name in the search box, and then selecting the product from the list that appears.
Preface 11
Service requests
To obtain in-depth help from a support agent, submit a service request. To submit a service request:
NOTE: You must have a valid support agreement. For details about either an account or obtaining a valid support
agreement, contact a sales representative.
1. Go to the Customer Support website.
2. From the Service Requests pane, click View Service Requests.
3. Click the Create New Service Request button to create a new service request.
To review an open service request:
1. Go to the Dell Customer Support website.
2. On the Support tab, click Service Requests & Dispatch Status, and sign into your account.
3. On the Service Requests page, click View All Service Requests.
Dell Community
For peer contacts, conversations, and content on product support and solutions, go to the Dell Community. Interactively engage
with customers, partners, and certified professionals online.
12 Preface
1
Getting Started
Topics:
• Introducing the PowerProtect Data Manager software
• Supported Internet Protocol versions
• Unsupported file-system modifications
• References
• Terminology
• Access the PowerProtect Data Manager UI
• Export data
• Customer feedback
• Security configuration
Key features Software-defined data protection with integrated deduplication, replication, and reuse
Data backup and recovery self-service operations from native applications that are combined with central
IT governance
Multicloud optimization with integrated Cloud Tiering
SaaS-based monitoring and reporting
Modern services-based architecture for ease of deployment, scaling, and updating
PowerProtect Data Manager integrates multiple data-protection products within the Data Protection portfolio to enable data
protection as a service, providing the following benefits:
Benefits Enables data-protection teams to create data paths with provisioning, automation, and scheduling to
embed protection engines into their data-protection infrastructure for high-performance backup and
recovery
Enables backup administrators of large-scale environments to schedule backups for the following asset
types from a central location on the PowerProtect Data Manager server:
● VMware virtual machines
● File systems
● Kubernetes clusters
● Microsoft Exchange Server and Microsoft SQL Server databases
● Oracle databases
● SAP HANA databases
● Network-attached storage (NAS) shares
● PowerStore block volumes
Provides an agent-based approach to automatically discover and protect databases on an application
server
Enables self-service and centralized protection by:
● Monitoring service-level objectives (SLOs)
● Identifying violations of recovery-point objectives (RPOs)
Getting Started 13
Supports deploying an external VM Direct Engine that is optimized to move data with high-capacity
backup streams
Comes with a basic embedded VM Direct Engine that has the following functions and capabilities:
● It is automatically used as a fallback proxy for performing backup and restore operations when an
external VM Direct Engine fails, is disabled, or is unavailable
● It has a limited capacity for performing backup streams
● It can work with virtual-machine crash-consistent protection policies that use the Transparent
Snapshot Data Mover (TSDM) protection mechanism
● It enables the Search Service used by PowerProtect Search
Supports PowerProtect Search, which enables backup administrators to quickly search for and restore
VM and NAS file copies
Supports the vRealize Automation DP extension, which enables the automatic provisioning of virtual
machines and on-demand backups and restores
Integrates with Cloud Disaster Recovery (Cloud DR), including workflows for Cloud DR deployment,
protection, and recovery operations in the AWS and Azure clouds
Integrates with PowerProtect Cloud Snapshot Manager to view PowerProtect Cloud Snapshot Manager
jobs, alerts, and reports from a consolidated PowerProtect Data Manager dashboard
Integrates with PowerProtect Cyber Recovery to protect the integrity of a PowerProtect Data Manager
environment from cyber threats
Provides a RESTful API interface that allows PowerProtect Data Manager to be monitored, configured,
and orchestrated:
● Existing automation frameworks can be integrated
● New scripts can be quickly written
● Easy-to-follow tutorials are provided
Application agents integrated NOTE: If both IPv4 and IPv6 are configured and the PowerProtect Data Manager FQDN
with PowerProtect Data is used, the agent uses IPv6 for network communication.
Manager:
● File System IPv4, IPv6, or both
● Microsoft Exchange Server IPv4 only or both IPv4 and IPv6
● Microsoft SQL Server IPv4, IPv6, or both
(Application Direct)
● Microsoft SQL Server (VM IPv4 only or IPv6 only
Direct) NOTE: Only the Microsoft SQL Server agent supports VM Direct.
14 Getting Started
Table 4. Supported configurations (continued)
Component Internet Protocol
● Oracle RMAN IPv4, IPv6, or both
● SAP HANA IPv4, IPv6, or both
Stand-alone application agents IPv4 only
Network-attached storage IPv4, IPv6, or both
(NAS)
Storage arrays (PowerStore) IPv4 only
Kubernetes IPv4 only
PowerProtect Data Manager IPv4 or IPv6
management
PowerProtect DD IPv4 or IPv6
communication
Report Browser IPv4 only
NOTE: If PowerProtect Data Manager is configured to use both IPv4 and IPv6,
configuring an NTP server and setting a time zone is required for accurate date and time
information in reports.
Disaster recovery
Recovering a PowerProtect Data Manager server might result in a conflict with protection-policy configurations. For instance, if
the recovered server is configured to use only IPv4, a protection policy that is configured to use IPv6 cannot run.
Getting Started 15
Name resolution
Name resolution and reverse IP lookup must be configured to ensure the following:
● Fully qualified domain names of PowerProtect Data Manager, its components, and DD components resolve to a valid IPv4 or
IPv6 address.
● If both IPv4 and IPv6 addresses are used for DD, both addresses resolve to the same FQDN.
● All IPv4 and IPv6 addresses are valid and reachable.
● The FQDNs of application-agent hosts that use FQDN as their preferred host address resolve to a valid IPv4 or IPv6
address.
● Each application-agent host that uses FQDN as its preferred host address resolves the FQDN of PowerProtect Data
Manager to an IP address of the same protocol that it uses. For example, if a host uses IPv4, it resolves the FQDN of
PowerProtect Data Manager to an IPv4 address.
Server updates
IPv6 is only supported with new deployments of PowerProtect Data Manager 19.12 or later. Using IPv6 after updating from
PowerProtect Data Manager 19.11 or earlier is unsupported.
If you add IPv6 to an IPv4-only system, indexing from any existing Search Engine cluster becomes unavailable. After adding
IPv6, you must delete all IPv4 Search Engine nodes to remove the Search Engine cluster, and then add new IPv6 nodes to a new
cluster.
Unlike other PowerProtect Data Manager components, if IPv6 is used with a Search Engine, the FQDN of all Search Engine
nodes and related DD systems must always resolve to an IPv6 address and never to an IPv4 address.
16 Getting Started
Unsupported file-system modifications
Files and directories on PowerProtect Data Manager and PowerProtect DD systems should only be modified according to
documentation and guidance.
Performing any of the following file-system operations that have not been documented in a product guide or communicated by
Customer Support is unsupported:
● Adding, removing, editing, or otherwise modifying a file or directory
● Manually mounting a DD file system with anything other than read-only permissions
● Altering a file-system procedure
● Replacing a command in the step of a file-system procedure with a different command
References
Some procedures in this document reference other publications for further details.
For a list of PowerProtect Data Manager publications, see "Related documentation" in the preface.
For information about DD Virtual Edition, see the following publications at Customer Support:
Terminology
Familiarize yourself with the terminology for the PowerProtect Data Manager user interface and documentation.
The following terminology list provides more information about names and terms that you should know to use PowerProtect
Data Manager:
Application Application agents are installed on application or database host servers to manage protection using
Agent PowerProtect Data Manager. These agents are commonly known as DD Boost Enterprise Agents
(DDBEAs) for databases and applications.
Application- A virtual machine protection policy that includes additional application-aware data protection for
aware Microsoft SQL Servers. An application-aware virtual machine protection policy provides the ability to
quiesce the application during virtual machine image backup to perform a full backup of Microsoft SQL
Server databases. You can also schedule Microsoft SQL Server log backups for the virtual machines in the
policy.
Asset Assets are objects in PowerProtect Data Manager for which you want to manage protection, including
virtual machines, databases, and file systems.
Asset source Assets that PowerProtect Data Manager protects reside within asset sources, which include vCenter
servers, application or database hosts, and file servers.
Cloud Tier Cloud Tier storage can be added to a protection storage system to expand the deduplication storage
storage capacity onto less expensive object storage in public or private object storage clouds, including secure
Elastic Cloud Storage appliances.
Copy A PowerProtect Data Manager copy is a point-in-time backup copy of an asset.
Copy map The PowerProtect Data Manager Copy Map is a visual representation of backup copy locations on your
protection storage and is available for all protected assets that have copies.
Getting Started 17
Discovery An internal process that scans asset sources to find new assets to protect, and scans infrastructure
components to monitor their health and status.
Instant Access PowerProtect Data Manager virtual machine backup copies can be accessed, mounted, and booted
directly from the protection storage targets as running virtual machines. This operation is called Instant
Access. Copies can also be moved to a production VMware datastore using vMotion. PowerProtect
Data Manager Virtual machine application-aware backup copies can be mounted directly from protection
storage as running Microsoft SQL Server databases, which includes the ability to roll forward log backups.
These Microsoft SQL Server database disks can also be moved to a production VMware datastore using
vMotion.
PowerProtect An agent that is included in PowerProtect Data Manager and installed on each application agent host
Data Manager server so that you can monitor and manage the application agent through PowerProtect Data Manager.
agent
Protection policy Used to configure and manage the entire life cycle of backup data, which includes backup types, assets,
backup start and stop times, backup devices, and backup retention.
Service-level An optional policy that you can layer on top of a protection policy. An SLA performs additional checks
agreement (SLA) on protection activities to ensure that protection goals meet the standards of an organization. SLAs are
made up of one or more service-level objectives.
Service-level A definable rule that sets the criteria for recovery-point objectives (RPOs), encryption, and the location
objective (SLO) of backups according to company requirements.
Steps
1. From a host that has network access to the PowerProtect Data Manager instance, use the latest version of Google Chrome
or Microsoft Edge to connect to the instance:
https://<instance_hostname>
NOTE: You can specify the hostname or the IP address of the instance.
If you log in with an expired password, reset the password immediately. Clicking Cancel, closing the browser, or
navigating away from the page before changing your password disables your credentials for subsequent logins. If you log
in and receive a prompt to change your password because of outdated login credentials, provide your current password,
a new password, and confirmation of the new password to continue.
When the identity provider validates the credentials, the authentication service issues a user token. The PowerProtect Data
Manager UI uses the token information to authorize activities.
Unless you have changed the system configuration, the default identity provider is the local identity provider.
The PowerProtect Data Manager Security Configuration Guide provides more information about the available user roles and
their associated permissions. The associated roles for an account determine what parts of the UI a user can see and use, and
what operations a user can perform.
18 Getting Started
If this is your first time accessing the PowerProtect Data Manager UI, an unsigned certificate warning might appear in the
web browser.
The security certificate that encrypts communication between the PowerProtect Data Manager UI and the web browser is
self-signed. A self-signed certificate is signed by the web server that hosts the secure web page. There is nothing wrong
with this certificate. This certificate is sufficient to establish an encrypted channel between the web browser and the server.
However, it is not signed by a trusted authority.
The Get Started window appears with configuration options that are required on first deployment. To skip this window and
go right to the Dashboard, click Launch.
From the Dashboard window:
● The left pane provides links to the available menu items. Expand a menu item for more options.
● The icons in the PowerProtect Data Manager banner provide additional options.
NOTE: Note that after 30 minutes of inactivity, this interface might fail to respond or you might see one of the
following errors:
● 401: Authentication Required
● 503: Unknown Error
To resolve any of these issues, refresh your browser and log in. If you logged in before, you need to log in again.
Getting Started 19
Table 7. PowerProtect Data Manager tools
Menu item Description
Click Dashboard to view the overall state of the PowerProtect Data Manager system.
Dashboard
Click Health to view a score for the overall PowerProtect Data Manager system health (Good,
Fair, or Poor).
Health
There is also a banner UI option, represented by , which provides links that enable you to
view all unacknowledged alerts.
20 Getting Started
Table 7. PowerProtect Data Manager tools (continued)
Menu item Description
Click Administration to:
● Configure users and roles.
● Set password credentials and manage key chains.
Administration
● View and replace certificates.
● Add external identity providers.
● View and manage resource groups.
Click Reports to access the PowerProtect Data Manager Report Browser and Reporting
Engine.
Reports
Click Jobs to manage jobs, view by protection or system, filter, and view details.
Jobs
Banner UI options
The following table describes the icons in the PowerProtect Data Manager UI banner.
Click to enter search criteria to find assets, jobs, logs, and alerts.
The number next to this icon indicates the critical unacknowledged alerts over the last 24
hours.
● The total number of alerts (all statuses — critical, warning, or informational) that have yet
to be acknowledged, or just the unacknowledged alerts from the last 24 hours (marked
with the New tag).
● The number of critical alerts that have yet to be acknowledged, or just the unacknowledged
critical alerts from the last 24 hours (marked with the New tag).
Within this menu, click any of these links to open the Alerts window, where you can view
specific details about these unacknowledged alerts.
Click to restore assets from replicated copies through quick recovery. This icon only appears
when the system receives replicated metadata from a source system.
Click to configure and manage PowerProtect Data Manager system network, time zone, and
NTP settings, DR backups, security, licenses, updates, authentication, agent downloads, and
support, and to access the Get Started window.
Click to obtain more information about PowerProtect Data Manager, access Customer
Support, or view the REST API documentation.
Click to log out, and log in as a different user, or change the current user password.
Click to launch CloudIQ, APEX Backup Services, Cloud Snapshot Manager, or vProtect.
Getting Started 21
UI tools and options
Learn about the widgets, windows, and banner options available in the PowerProtect Data Manager UI.
Dashboard
The Dashboard is visible when you log in to the PowerProtect Data Manager UI, and can be accessed from the left navigation
pane. This window provides a high-level view of the overall state of the PowerProtect Data Manager system through widgets.
The following table describes each widget.
Assets | Count Details in this widget include the number of protected assets, unprotected assets, and
excluded assets for each asset source that has been added and enabled in PowerProtect
Assets | Size
Data Manager. You can also view the total number of assets for each asset source, and the
total size of these assets. Assets | Count displays by default, and the asset types are sorted
based on the percentage of the total asset count that is unprotected, or the total size of the
unprotected assets for the asset source, depending on the view.
Click the three vertical dots at the top of the widget to:
● Select Count or Size to switch the assets view in the widget.
● Select one or more asset sources from the list. You can display asset statistics for a single
asset source, multiple asset sources, or all asset sources.
Hover over a color to view the exact number of protected, unprotected, and excluded assets
and the total size of these assets. Click a color to open the Infrastructure > Assets window,
which is filtered to display the assets that match the selected status.
Health This widget provides a score for the overall PowerProtect Data Manager system health (Good,
Fair, or Poor). Health details and status are provided for the following categories:
● Components: Identifies the state of hardware and software services, such as Running or
Failed.
● Configuration: Identifies whether any aspects of the PowerProtect Data Manager
configuration are incomplete, such as System Support configuration.
● Capacity: Identifies the provisioned and currently allocated size of the associated storage
system.
● Performance: Identifies key performance indicators, such as memory use.
● Data Protection: Identifies key protection indicators, such as service-level agreements not
being met and disaster-recovery backup copies not being present.
Click View All to view more details about the system health issues for all categories.
Compliance This widget provides compliance verification statistics for protection policies that are linked to
a Service Level Agreement (SLA). The widget also identifies the number of assets within these
policies that are compliant and noncompliant.
22 Getting Started
Table 9. PowerProtect Data Manager Dashboard (continued)
Dashboard widget Description
Click the three vertical dots at the top of the widget to select one or more asset sources from
the list. You can display compliance statistics for a single asset source, multiple asset sources,
or all asset sources. By default, the total count and number of protection policies for compliant
and noncompliant assets displays for all asset sources.
Click View All to open the Protection > SLA Compliance window, where you can view more
details about the specific policies and assets that are noncompliant.
Capacity | Active Tier and This widget displays the license capacity status of the for the active tier and cloud tier. The
Capacity | Cloud Tier bar graph displays the used license capacity and available license capacity of the appliance.
Click the three vertical dots at the top of the widget to select and view Active Tier or Cloud
Tier information. By default, the widget displays Capacity | Active Tier.
Click View All to open the Infrastructure > Storage window, where you can view more
details about specific protection storage systems.
Space Optimization This widget provides information about how efficient the active tier storage capacity is on the
PowerProtect Data Manager. Efficiency is determined based on the size of precompression
data that is compared with the size of postcompression data on the system.
Click the three vertical dots at the top of the widget to select a system from the list. The
widget updates to display space optimization statistics for the selected system.
Dashboard
Click Health to view a score for the overall PowerProtect Data Manager system health (Good,
Fair, or Poor).
Health
Getting Started 23
Table 10. PowerProtect Data Manager tools (continued)
Menu item Description
● Manage registration of Oracle RMAN agent, Microsoft application agent, SAP HANA agent,
and File System agent.
● View and manage activities that are related to storage such as file system, cloud tier, cloud
units, disks, usage, replication targets, and Dell Cloud Disaster Recovery.
● Create and manage a Search Cluster.
● Add PowerProtect Cloud Snapshot Manager tenants as asset sources for jobs, alerts, and
reports.
Click Protection to:
● Add protection policies to back up assets.
● Manage service-level agreements (SLAs).
Protection
● Add, edit, and delete protection rules for asset inclusion in policies.
● Add, edit, and delete file exclusion templates for File System protection policies.
Click Restore to:
● View asset copy location details and initiate a Restore operation.
Restore ● Manage Instant Access Sessions.
● Use the File Search feature to find and restore virtual machine file copies.
Click Alerts to:
● View and acknowledge alerts and events.
Alerts ● Filter alerts by critical, warning, and informational status, and specify the time range.
● View and examine Audit logs.
● Export audit logs to CSV files.
● Set audit log boundaries.
● Configure alert notifications.
There is also a banner UI option, represented by the icon, which provides links that enable
you to view all unacknowledged alerts.
Click Reports to access the PowerProtect Data Manager Report Browser and Reporting
Engine.
Reports
Click Jobs to manage jobs, view by protection or system, filter, and view details.
Jobs
Banner UI options
The following table describes the icons in the PowerProtect Data Manager UI banner.
The number next to this icon indicates the critical unacknowledged alerts over the last 24
hours.
24 Getting Started
Table 11. Banner UI options (continued)
Option Description
Click to restore assets from replicated copies through quick recovery. This icon only appears
when this system receives replicated metadata from a source system.
Click to configure and manage PowerProtect Data Manager default network, time zone, and
NTP settings, DR backups, security, licenses, agent downloads, and support.
Click to log out or change the current user password.
Click to obtain more information about PowerProtect Data Manager or access Customer
Support.
Click to launch Cloud Snapshot Manager.
Dashboard
The Dashboard is visible when you log in to the PowerProtect Data Manager UI, and can be accessed from the left navigation
pane.
The Dashboard window provides a high-level view of the overall state of the PowerProtect Data Manager system through six
widgets. The following table describes each widget.
Getting Started 25
Table 12. PowerProtect Data Manager Dashboard (continued)
Dashboard widget Description
Jobs | Asset Level ● Select Protection, Restore, System or Asset Level to switch the jobs view in the
widget.
● Choose the time period for the jobs that you want to view (last 24 hours, last 3 days,
last 7 days, or all). Once a time period is selected, the widget updates to display only jobs
performed within that time period.
Click a color in the chart to view details about jobs with a specific status, or click the links next
to each status. This will open the appropriate Jobs window, which is filtered to display the jobs
that match the selected status and time period. From this window, you can manage jobs, view
more details, and search jobs.
Assets | Count and Assets | Details in this widget include the number of protected assets, unprotected assets, and
Size excluded assets for each asset source that has been added and enabled in PowerProtect
Data Manager. You can also view the total number of assets for each asset source, and the
total size of these assets. Assets | Count displays by default, and the asset types are sorted
based on the percentage of the total asset count that are unprotected, or the total size of the
unprotected assets for the asset source, depending on the view.
Click the three vertical dots at the top of the widget to:
Health This widget provides a score for the overall PowerProtect Data Manager system health (Good,
Fair, or Poor). Health details and status are provided for the following categories:
● Components: Identifies the state of hardware and software services, such as Running or
Failed.
● Configuration: Identifies whether any aspects of the PowerProtect Data Manager
configuration are incomplete, such as System Support configuration.
● Capacity: Identifies the provisioned and currently allocated size of the associated storage
system.
● Performance: Identifies key performance indicators, such as memory use.
● Data Protection: Identifies key protection indicators, such as service-level agreements not
being met and disaster-recovery backup copies not being present.
Click View All to view more details about the system health issues for all categories.
Compliance This widget provides compliance verification statistics for protection policies that are linked to
a Service Level Agreement (SLA). The widget also identifies the number of assets within these
policies that are compliant and non-compliant.
Click the three vertical dots at the top of the widget to select one or more asset sources from
the list. You can display compliance statistics for a single asset source, multiple asset sources,
or all asset sources. By default, the total count and number of protection policies for compliant
and non-compliant assets displays for all asset sources.
Click View All to open the Protection > SLA Compliance window, where you can view more
details about the specific policies and assets that are non-compliant.
Capacity | Active Tier and This widget displays the capacity status of the DD protection storage systems that are
Capacity | Cloud Tier associated with this instance of PowerProtect Data Manager for the active tier and cloud
tier. Based on the available capacity on each DD system, a color coded bar graph displays the
number of systems that are Good (>20% available), Fair (<20% available), or Poor (<10%).
Click the three vertical dots at the top of the widget to:
26 Getting Started
Table 12. PowerProtect Data Manager Dashboard (continued)
Dashboard widget Description
● Select Active Tier or Cloud Tier to switch between a view of protection storage systems
for the active tier and cloud tier in the widget. By default, the widget displays Capacity |
Active Tier.
● Select a DD system from the list. The widget updates to display capacity statistics for the
selected DD system. You can only display capacity statistics for one system at a time.
Click View All to open the Infrastructure > Storage window, where you can view more
details about specific protection storage systems.
Space Optimization This widget provides information about how efficient the active tier storage capacity is on
individual DD systems associated with this instance of PowerProtect Data Manager. Efficiency
is determined based on the size of pre-compression data compared with the size of post-
compression data on the system.
Click the three vertical dots at the top of the widget to select a DD system from the list. The
widget updates to display space optimization statistics for the selected DD system.
Export data
PowerProtect Data Manager enables you to export and save table data in CSV format.
Prerequisites
In the PowerProtect Data Manager UI, browse to a window that includes the Export All functionality.
You can also export records for assets that are assigned to a protection
policy. Select a protection policy to view its details, and then click the asset
count link next to Assets.
SLA Compliance
Protection Rules
You can also export records for assets that are applied to a protection rule.
Click the link in the Assigned Assets Count column for the protection rule.
Restore Assets
Alerts System
Administration Access Control > Users/Groups
You can also export records for assets that are assigned to a resource group.
Click next to the resource group, and then click View Assets in the right
pane.
Getting Started 27
Table 13. Supported windows (continued)
Menu item Window
Audit Logs
Jobs Protection Jobs
System Jobs
System Settings Messages Catalog
Steps
1. (Optional) Filter and sort the information that appears in the table.
2. In the window, click Export All to export the data to a .csv file.
NOTE: Filters applied to the table in the Protection Policy window are not applied to the exported .csv file. Exported
protection records include all data that is shown in the table. Download the Excel file to sort and filter the protection
results.
Exported fields
The following tables list the fields that are exported using the Export All functionality. The fields are exported in CSV format.
Application Agents Host Name, IP, Registration Status, OS, Agent Type, Current
Version, Update Status, Port, Application Version, Created
Date, Registered Date, Throttling Status, CPU Throttling
Protection Policies Name, Category, Asset Type, Asset Count, Protected Asset
Size, Last Run Status, Violations, State
Users User/Group Name, Type, First Name, Last Name, Email Address,
Roles and Resources, Added Date
28 Getting Started
Table 15. Exported fields for asset types
Resource (asset type) Exported fields
VMware Virtual Machines Name, Tags, Operating System, Apps, Disk Excluded, vCenter,
Protection Mechanism, ESX Host Name, VM BIOS Uuid, Resource
Pool, VM Folder, Data Center
Microsoft SQL Server Name, Protection Engine Flow, Host Type, Host/Cluster/Group
Name, Application Server ID, Application Server Name
Microsoft Exchange Server Name, Host/Cluster/Group Name, Host Type, Application Server
Name, Application Server ID
File System Name, OS Type, File System Type, Host Name, Host Operating
System
Customer feedback
Use the customer feedback feature in the PowerProtect Data Manager UI to report your satisfaction with PowerProtect
Data Manager, provide feedback, and send requests for enhancements. Customer feedback is used to improve the customer
experience.
Steps
1. Log in to the PowerProtect Data Manager UI.
3. (Optional) Complete the fields in the customer feedback survey, and when finished, click Submit.
You have the option to rate your satisfaction with PowerProtect Data Manager and make a recommendation for how to
improve the customer experience. You also have the option to provide an email address so that can follow up with you
regarding your feedback.
NOTE: Customer contact information is not used for marketing purposes.
Getting Started 29
Security configuration
A separate guide provides some server configuration tasks which are intended specifically for PowerProtect Data Manager
security administrators, whose role may be separate from the PowerProtect Data Manager host system administrator.
The PowerProtect Data Manager Security Configuration Guide provides detailed instructions for all security-related tasks,
including but not limited to:
● Port requirements for and between the following components:
○ PowerProtect Data Manager
○ Configured DD systems
○ VM Direct Engines (embedded and external)
○ Application-agent hosts
○ Web and REST API clients
○ Callhome (SupportAssist)
○ ESXi
○ vCenter
● Configuring identity providers
● Managing local and external user accounts
● Changing and resetting passwords
● Assigning users and groups to roles and associated privileges
● Managing credentials for local and remote components
● Creating resource groups to define scopes of authority
● Managing security certificates, where applicable
Role-based security
PowerProtect Data Manager provides predefined user roles that control access to areas of the user interface and to protected
operations. Some PowerProtect Data Manager functionality is reserved for particular roles and may not be accessible from
every user account.
By using the predefined roles, you can limit access to PowerProtect Data Manager and to backup data by applying the principle
of least privilege.
The PowerProtect Data Manager Security Configuration Guide provides more information about user roles, including the
associated privileges and the tasks that each role can perform.
30 Getting Started
2
System Maintenance
Topics:
• Deploying and maintaining the health of PowerProtect Data Manager
• Deploying and updating PowerProtect Data Manager
• Licensing PowerProtect Data Manager
• Specifying the PowerProtect Data Manager host
• Memory optimization
• Restricted mode
• System support
• Restarting PowerProtect Data Manager
• System maintenance troubleshooting
• Messages Catalog
Update paths
CAUTION: If recommended guidelines are not followed, the update of PowerProtect Data Manager or one of its
components can fail.
When deploying or updating PowerProtect Data Manager, see the PowerProtect Data Manager Deployment Guide. It contains
detailed instructions and guidelines that must be followed in certain environments and configurations.
Updating from PowerProtect Data Manager versions 19.11 through 19.14 to version 19.15 is supported.
Security advisories
CAUTION: If the latest Dell security advisories (DSAs) are not followed, PowerProtect Data Manager can be
exposed to security vulnerabilities.
To review the latest DSAs, search for PowerProtect Data Manager at the Dell Technologies Security Advisories and
Notices website.
System Maintenance 31
Licensing PowerProtect Data Manager
PowerProtect Data Manager can be licensed in several different ways. This section describes the different types of available
licenses and how to install a license.
For more information about licensing, see the PowerProtect Data Manager Deployment Guide.
License types
There are several different types of licenses, and they can provide licensing for different periods of time.
The available license types are described in the following table.
Front-end protected capacity by The primary model of licensing, which is based on the capacity that you want to
terabyte (FETB) protect. For example, you can purchase a 100-TB license, which enables you to
protect up to 100 TB of data.
Socket-based This license is based on the number of asset hosts that you want to protect, and
it applies to every type of protection job. A license is required for each CPU socket
on every physical asset-source host where protected assets exist. If a virtual asset
is protected, count the number of CPU sockets on the physical host of the virtual
machine. In cluster environments that protect NAS, storage array, file system,
database, or virtual machine assets, you must count the number of CPU sockets of
each active host in the cluster.
Add a license
You can add a license file to PowerProtect Data Manager and view license details, such as capacity usage and software ID
number.
Prerequisites
To obtain the XML license file from the license management website, you must have the License Authorization Code (LAC),
which is emailed from . If you have not received the LAC, contact your Customer Support representative.
32 System Maintenance
Steps
1. From the PowerProtect Data Manager user interface, click , and then select License.
2. On the License window, perform one of the following actions:
● Copy and paste the text from the license file into the text box.
● Click Upload File, browse to the location of the license file and select the file, and then click Open.
The license file content appears in the License window.
3. Click Apply.
Results
A message appears in the License window to confirm that the license is successfully added.
Steps
1. From the PowerProtect Data Manager user interface, click , and then select Hosting vCenter.
The Hosting vCenter window appears.
2. Choose from one of the following options:
● Enter FQDN/IP—Select this option to manually enter the fully qualified domain name or IP of the vCenter server, the
port number, and to select the vCenter Host Credentials. The Host Credentials list is populated with vCenter servers
that have already been added and discovered in PowerProtect Data Manager. If the host vCenter credentials do not
appear in the list, select Add Credentials to enter this information.
● Select FQDN/IP from asset sources—Select this option to obtain the host vCenter server information automatically
from a vCenter asset source that has already been added and discovered in PowerProtect Data Manager.
3. Click Save.
Results
If the host vCenter server is added as an asset source in PowerProtect Data Manager, is displayed next to this vCenter
server in the Infrastructure > Asset Sources window.
System Maintenance 33
Minimum privileges required for the vCenter server PowerProtect
Data Manager host
The user account associated with the vCenter server that is specified as the PowerProtect Data Manager host must have the
following minimum privileges. These privileges are required for functions related to software installation and updates, virtual
machine snapshots and rollback, and configuring virtual machine memory.
Setting vCenter 6.7 and later required privileges PowerCLI equivalent required privileges
Global ● Manage custom attributes ● Global.ManageCustomFields
● Set custom attributes ● Global.SetCustomField
Network ● Assign network ● Network.AssignNetwork
Permissions ● Modify permission ● Authorization.ModifyPermissions
Sessions ● Impersonate user ● Sessions.ImpersonateUser
● Message ● Sessions.Message
● Validate session ● Sessions.ValidateSession
● View and stop sessions ● Sessions.ViewandStopSessions
Virtual Machine ● Change Configuration > Add or remove device ● VirtualMachine.Config.AddorRemoveDevice
● Change Configuration > Change CPU count ● VirtualMachine.Config.CpuCount
● Change Configuration > Change Memory ● VirtualMachine.Config.Memory
● Change Configuration > Change Settings ● VirtualMachine.Config.Settings
Virtual Machine ● Snapshot Management > Create snapshot ● VirtualMachine.State.CreateSnapshot
● Snapshot Management > Revert to snapshot ● VirtualMachine.State.RevertToSnapshot
● Snapshot Management > Remove snapshot ● VirtualMachine.State.RemoveSnapshot
● Snapshot Management > Rename snapshot ● VirtualMachine.State.RenameSnapshot
NOTE: A complete list of the privileges required for a dedicated vCenter user account is provided in the PowerProtect Data
Manager Virtual Machine User Guide.
Memory optimization
You can use adjust the amount of memory that is assigned to the PowerProtect Data Manager virtual machine in order to
optimize server performance.
The following table indicates the default amount of memory assigned to the PowerProtect Data Manager virtual machine in a
standard environment. The default values are the minimum recommended values.
34 System Maintenance
● It is recommended to configure swap memory on a solid-state drive (SSD). During deployment of the PowerProtect Data
Manager server, use the SSD data store to avoid the high latency disk impact from swap and metadata operations.
NOTE: For help with optimizing memory, contact your Customer Support representative.
Steps
1. Log in to the vSphere Web Client.
2. Right-click the virtual machine and select Edit Settings.
The Edit Settings window appears with the Virtual Hardware button selected.
3. In the Memory field, specify the new memory value.
Ensure that the value you specify does is a multiple of 4 GB.
4. Click OK.
Restricted mode
You can enable restricted mode to prevent scheduled writes to storage. You might want to enable restricted mode to limit
access to storage during a storage upgrade.
Enabling restricted mode during a storage upgrade provides the following benefits:
● Storage writes can be eliminated in a controlled manner. Once writes have stopped, storage can be upgraded.
● Storage writes can be tested after storage has been upgraded. Once testing is complete, storage can be returned to full
production.
Restricted mode prevents the following scheduled operations:
● Backups and replication
● Backup-copy deletion
● Server disaster-recovery backups
Restricted mode allows the following operations:
● Any jobs in progress or queued to run
● Manual backups and restores
● Discovery jobs
To enable restricted mode from the PowerProtect Data Manager user interface, click , select Support > Restricted Mode,
and then click Enable Restricted Mode.
System support
You can use the PowerProtect Data Manager user interface to manage and modify support settings that are typically configured
during deployment. Typically configured support settings include the mail server setup and Secure Remote Services registration.
System Maintenance 35
Configuring SupportAssist for PowerProtect Data Manager
SupportAssist is a support tool that communicates with PowerProtect Data Manager to monitor your environment, automatically
detect current and potential issues, and collect and store diagnostic data. SupportAssist securely sends the data that is required
for troubleshooting an issue to Customer Support for diagnostic purposes and customer support.
SupportAssist is at heart of the connectivity platform as a unified communication point between PowerProtect Data Manager
and Customer Support.
SupportAssist provides the following features and benefits:
● Proactive monitoring and issue prevention
● Facilitates update package downloads
● Automatic health checks
● Communicates telemetry data
● Real-time troubleshooting
● Customer support
Configure SupportAssist to receive automated support capabilities for your PowerProtect Data Manager system.
SupportAssist cannot be configured when PowerProtect Data Manager uses a trial license.
Steps
1. Go to the Customer Support website and log in to your account.
2. In the search box, type PowerProtect Data Manager and click Search.
3. Click Generate Access Key in the Quick links pane.
4. Enter the product ID (serial number) in the search box.
5. In the Create PIN field, enter a 4-digit PIN.
Record the PIN for later use.
6. Click Generate Access Key.
The access key is sent to the email address for your account.
NOTE: It might take up to 5 minutes to receive the access key in your email.
Prerequisites
● Apply a valid PowerProtect Data Manager license.
● If you are connecting through the gateway server, the SCG gateway version must be 5.10 or later.
● Apply a valid access key and PIN.
● HTTPS port 443 of esrs3-core.emc.com and esrs3-coredr.emc.com is not blocked by the network firewall.
Steps
1. From the PowerProtect Data Manager UI, click , select Support, and then click SupportAssist.
The Support window opens to the SupportAssist page.
36 System Maintenance
2. On the Connection tab, click Connect Now.
3. Select one of the following options:
● Connect Directly
Select this option to connect PowerProtect Data Manager directly.
● Connect via Gateway
Select this option to connect PowerProtect Data Manager through a gateway server, and then enter the gateway server
IP address and port number.
Results
PowerProtect Data Manager is connected to support services.
Steps
1. From the PowerProtect Data Manager UI, click , select Support, and then click SupportAssist.
The Support window opens to the SupportAssist page.
2. Select the Contacts tab.
3. To add a primary contact, complete the following steps:
a. Enter the following information:
● First Name
● Last Name
● Email
● Phone
b. Select the Preferred Language from the list.
c. Click Save.
4. To add a secondary contact, click + Add Secondary Contact and enter the required information.
Steps
1. From the PowerProtect Data Manager UI, click , select Support, and then click SupportAssist.
The Support window opens to the SupportAssist page.
2. Select one of the following connection options:
● Connect Directly
● Connect via Gateway
To add a new gateway connection, complete the following steps:
a. Enter the gateway IP address and port number.
b. Click Test.
Wait until the connection test is complete. If the connection is successful, a green check mark is displayed next to the
gateway IP address and port number.
3. Enter the SupportAssist Access Key and PIN.
System Maintenance 37
NOTE: If you are not connecting with a new access key, skip this step.
4. Click Reconnect.
Steps
1. From the PowerProtect Data Manager UI, click , select Support, and then click SupportAssist.
The Support window opens to the SupportAssist page.
2. To enable SupportAssist, move the Connect to SupportAssist slider to the right. To disable SupportAssist, move the
Connect to SupportAssist slider to the left.
The operation might take up to 5 minutes to complete.
Troubleshooting SupportAssist
Review the following information that is related to troubleshooting SupportAssist.
Telemetry Collector
Telemetry Collector gathers information related to this system, including configuration, usage characteristics, performance, and
deployment location information. Telemetry Collector manages remote access and the exchange of system data with Dell Inc. or
its subsidiaries. The information that is gathered by Telemetry Collector is confidential and this data cannot be shared.
When you enable SupportAssist, you also enable Telemetry Collector, which allows Customer Support engineers to collect data
that is related to troubleshooting device and PowerProtect Data Manager software issues. Telemetry Collector does not collect
any personal information.
Telemetry Collector populates three reports—a telemetry report, an alert summary report, and a CloudIQ report. Telemetry
Collector collects details about the following objects:
● Alerts
● Assets
● Asset sources
● Audit logs
38 System Maintenance
● Cloud Data Recovery
● Cloud Disaster Recovery metrics
● Compliance details
● Compliance in the last 24 hours
● Data targets
● DD inventory
● Host information
● Integrated storage
● Licensing
● PowerProtect Data Manager operational inventory
● Protection details
● Protection policies
● Quick-recovery synchronization information
● Service-level agreements
● Storage systems
● Time spent on generating reports
● Traffic metrics
● Update summaries
● Usage
AutoSupport
AutoSupport gathers information related to this system, including configuration, usage characteristics, performance, and
deployment location information. AutoSupport manages remote access and the exchange of system data with Dell Inc. or
its subsidiaries. The information that is gathered by AutoSupport is confidential and this data cannot be shared.
Enable AutoSupport, which allows Customer Support engineers to collect data that is related to troubleshooting device and
PowerProtect Data Manager software issues. AutoSupport does not collect any personal information. For information about
enabling AutoSupport, see Add AutoSupport.
AutoSupport populates two reports—a telemetry report and an alert summary report. AutoSupport collects details about the
following objects:
● Alerts
● Asset sources
● AutoSupport
● Cloud Data Recovery
● Cloud Disaster Recovery metrics
● Compliance in the last 24 hours
● DD inventory
● Hardware topology
● Host information
● Integrated storage
● PowerProtect Data Manager operational inventory
● Protection policies
● Quick-recovery synchronization information
● Storage systems
● System mode
● Time spent on generating reports
● Traffic metrics
● Update summaries
● Usage
CloudIQ reporting
When you enable AutoSupport and choose SupportAssist, you also enable reporting. CloudIQ is a no-cost SaaS/cloud-
based management application that proactively monitors and measures the overall health of systems through intelligent,
System Maintenance 39
comprehensive, and predictive analytics. The data reported to CloudIQ includes configuration data, historical metrics and health
score data.
Ensure that the following requirements are met:
● Add a valid license in System Settings > License.
● Set up SupportAssist in System Settings > Support > SupportAssist.
● Enable AutoSupport and select SupportAssist.
When AutoSupport is enabled, CloudIQ reports are sent automatically. To log in to CloudIQ, click , and then click CloudIQ.
You can also go to https://cloudiq.dell.com. For more information on CloudIQ, refer to the CloudIQ Online Support site.
Steps
1. From the PowerProtect Data Manager user interface, click , select Support, and then click Email Setup.
2. Populate the following fields:
a. Mail Server
The SMTP mail server.
b. Email from:
The email address at which you would like to receive PowerProtect Data Manager AutoSupport email.
c. [Optional] Recipient for Test Email:
The email address to which you would like to send PowerProtect Data Manager test email.
d. [Optional] Port:
The default port is 25. PowerProtect Data Manager supports using non-default ports.
If the email setup is deleted, you must manually choose any non-default port that is not in use anywhere else.
e. User Name:
The user name associated with the PowerProtect Data Manager SMTP email server. This field is optional.
f. Password:
The password associated with the PowerProtect Data Manager SMTP email server. This field is optional.
3. Click Send Test Email.
PowerProtect Data Manager sends a test email.
4. Click Save.
Add AutoSupport
When AutoSupport is enabled, automated support information, telemetry reports, alert summaries, and CloudIQ reports are sent.
Steps
1. From the PowerProtect Data Manager UI, click , select Support, and then click AutoSupport.
The AutoSupport window appears.
2. Change the Enable AutoSupport option to Disabled or Enabled, and click Save.
When you enable AutoSupport, select whether to receive the AutoSupport communications through SupportAssist or email
server.
40 System Maintenance
When you enable AutoSupport, the Telemetry Software Terms page displays. Review and scroll down to the bottom of
the page to accept the terms, and then click Save to save your changes.
When you disable AutoSupport, PowerProtect Data Manager stops sending error and telemetry data to SupportAssist or the
SMTP server. PowerProtect Data Manager continues to send information for updates and other information.
NOTE: To disable SupportAssist, clear the SupportAssist option in the AutoSupport window.
Steps
1. From the PowerProtect Data Manager user interface, click , and then click Logs.
2. Click Add to add a log bundle.
The Add Log Bundle window appears.
3. Select the systems for the log bundle (Data Manager, VM Direct Engines, or, if Cloud DR is deployed, CDRS), set the log
bundle duration, and click Save.
The Jobs window displays the progress of the log bundle creation. Also, a green banner in the UI indicates that the log
bundle has successfully been created. If you want to dismiss the banner, click X.
4. To delete the log bundle, select the box to the left of log bundle and click Delete.
The Log Capacity indicates how much space (in GB) remains on the disk for logs and the percentage of the disk in use for
log storage.
5. To download the log bundle, click the bundle name in the Bundle Name column.
System Maintenance 41
● User login and logout
● Creating, deleting, or updating a user
● Assigning or unassigning a role to a user
To view audit events in the UI, perform the following steps.
Steps
1. Log in to the PowerProtect Data Manager UI with an account that has one of the indicated roles.
2. Go to Administration > Audit Logs.
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Alerts.
You can also click on the top banner, and then click the links to view unacknowledged alerts of all statuses (critical,
warning, and informational), or only the unacknowledged critical alerts.
NOTE: Clicking the New tag displays only the unacknowledged alerts that have been generated within the last 24 hours.
The number that appears next to is the total number of unacknowledged critical alerts over the last 24 hours.
NOTE: If you apply any filters in the table, exported alerts include only those alerts that satisfy the filter conditions.
Steps
1. Go to Administration > Audit Logs.
42 System Maintenance
The list of audit logs appears, which displays the following information:
● Changed At
● Audit Type
● Description
● Changed By
● Object Changed
● Previous Values
● New Values
● Storage
2. To set the retention period (in days) for the audit log, select Set Boundaries and update the retention period.
Only the Administrator role can perform this step.
3. To add a note for the audit log, click >, enter a note in the Notes field, and click Save.
4. Click Export All.
To view the status of system services, click , select Support, and then click System Services Status.
The following table provides a summary of the status of each system service and component:
Initializing This status appears when a service is starting. When the service successfully starts, the status changes to
Running.
Maintenance This status appears when an associated service is in maintenance. In the Maintenance status,
components have limited functionality. Infrastructure services do not have a Maintenance status. When
other services or components have a Maintenance status, the status of PowerProtect Data Manager is
also Maintenance.
Quiesce This status appears when the service or service associated with a component is stopping.
Shut down This status appears when a service has stopped.
No response This status appears when the service that is associated with a component is running, but the service is not
responding.
System Maintenance 43
● Components identifies the state of hardware and software services, such as Running or Failed.
● Configuration identifies whether any aspects of the PowerProtect Data Manager configuration are incomplete, such as
System Support configuration.
● Capacity identifies the provisioned and currently allocated size of the associated storage system.
● Performance identifies key performance indicators, such as memory use.
● Data Protection identifies key protection indicators, such as service-level agreements not being met and disaster-recovery
backup copies not being present.
Each category starts with a score of 100. If there is an outstanding health check issue in one of these categories, its score is
reduced by the deduction value assigned to the issue. If there is more than one outstanding issue in the category, its score is
only reduced by the deduction value of the most severe issue.
44 System Maintenance
Table 20. Health check descriptions (continued)
Category Health Check Maximum Deduction Description
Search cluster Search cluster is disabled: -5 Deduction occurs when the Search cluster is
configuration disabled or the parent vCenter Servers are
Search node parent vCenter
removed.
Servers are removed: -5
The health score returns to normal once the
Search cluster is properly configured.
Reporting cluster When reporting node Deduction occurs when the Reporting node
configuration parent vCenter Servers are parent vCenter Servers are removed.
removed: -5
Once the reporting cluster error is fixed, the
health score returns to normal.
Components PowerProtect Business services: 30 Deduction occurs when one or more of the
Data Manager PowerProtect Data Manager services is not
core infrastructure Core services: 30
running or is disabled.
services status Infrastructure services: 60
The health score returns to normal when all
Management services: 40 services are up and running.
Protection services: 20
System Maintenance 45
Table 20. Health check descriptions (continued)
Category Health Check Maximum Deduction Description
ES Shards Health -50 (replica shards Deduction occurs when the Replica or
Check unassigned) Primary shards are unassigned.
-70 (primary shards Once the ES Shards errors are fixed, the
unassigned) health score returns to normal.
Data Protection Service Level -50 Deduction occurs when SLA compliance is
Agreement (SLA) defined but has not been met, for example,
compliance asset compliance ratio is defined as: Out
Of Compliance Asset Count/In Compliance
Asset Count + Out Of Compliance Asset
Count
● Low ratio: Compliance ratio <= 1/3
● High ratio: 1/3< Compliance ratio <=2/3
● Critical ratio: Compliance ratio > 2/3
46 System Maintenance
Table 20. Health check descriptions (continued)
Category Health Check Maximum Deduction Description
The health score returns to normal when the
SLA compliance has been met, for example,
complianceRatio= 0.
The following health checks provide grace periods, allowing you a period of time after deployment to configure your system
without a significant reduction in the overall health score. An informational alert notification appears up to 24 hours before the
score deduction occurs.
System Maintenance 47
Security certificates
A default deployment of PowerProtect Data Manager creates self-signed security certificates that secure communication with
other components. As you configure the server and add assets, PowerProtect Data Manager stores additional certificates for
each component.
The Administrator and Security Administrator roles can review the Administration > Certificates page in the UI. This page
contains three tabs that list the installed security certificates. Each tab provides information about certificate uses, expiry dates,
issuers, and so forth.
The certificates on the Internal tab secure access to components that are part of the PowerProtect Data Manager server,
such as the UI and REST API. The certificates on the Application Agents tab secure access to the agents, which are under
the control of PowerProtect Data Manager but exist outside the server. The certificates on the External Servers tab secure
access to components or systems that are beyond the control of the server, but where you have approved the communication.
The PowerProtect Data Manager Security Configuration Guide contains more information about cryptography and security
certificates. This guide provides instructions for how to manage the installed certificates, including important prerequisites,
operational considerations, associated tasks, and troubleshooting. This guide also contains instructions for establishing
certificate-based trust with external components and systems.
Messages Catalog
The Messages Catalog in the PowerProtect Data Manager UI provides a list of all informational, warning, and critical messages
that PowerProtect Data Manager generates. The message details and recommended action can be used to troubleshoot issues,
and the message ID is provided for reference when contacting Dell Customer Support.
From the PowerProtect Data Manager UI, click and select Messages Catalog to view the entire catalog. You can sort the
information by each column, or filter the list to view messages that match a specific criteria:
● The Message ID, Message, Details and Recommended Action columns allow you to search for text and display only
results matching the search text.
● The Category and Severity columns allow you to select from one or more available options to display only messages that
match your selections.
To export all messages or a filtered list of messages as a .csv file, click Export.
48 System Maintenance
3
Managing Storage
Topics:
• Protection storage
• Storage units
• Differences between storage-system and storage-unit space reporting
• Monitoring storage capacity thresholds
Protection storage
Protection storage is the set of configured storage systems where PowerProtect Data Manager stores backup copies,
replicated copies, and other important information. Protection storage can include any of the following:
● A DD system, including High Availability PowerProtect DD mode
● An instance of PowerProtect DD Management Center (DDMC) that manages multiple DD systems
● A DDMC Smart Scale system pool
NOTE: Data Domain (DD) is now PowerProtect DD. References to Data Domain or Data Domain systems in this guide, in
the user interface, and elsewhere in the product include PowerProtect DD systems and older Data Domain systems.
The most up-to-date software compatibility information for PowerProtect Data Manager is provided by the E-Lab Navigator.
Observe the following information before you configure protection storage:
● Adding and configuring protection storage requires the Administrator role.
● You cannot add protection storage that runs incompatible versions of DDOS.
● You can only add the same protection storage system once, whether you specify the hostname, FQDN, or IP address.
● You cannot add a PowerProtect DD Management Center instance which has no managed DD systems.
● The first time that you add protection storage, PowerProtect Data Manager automatically configures and enables server DR.
The first protection storage system is the default target. System recovery for server DR provides more information.
● Adding protection storage by hostname or FQDN provides maximum flexibility for future IP address changes. PowerProtect
Data Manager uses DNS to resolve hostnames and FQDNs when you select these entries for the Management network
interfaces. Should you later change the DNS mapping, PowerProtect Data Manager resolves the new address and directs
Management communication there. Communication with the Data network is by IP address.
Protection storage is further divided into logical groupings that are called storage units, which hold related data and apply more
detailed configuration options.
Click to open the Details pane and see more information about an existing protection storage system.
Managing Storage 49
High Availability PowerProtect DD support
PowerProtect Data Manager supports DD systems with High Availability (HA) enabled. The Active-Standby configuration
provides redundancy in the event of a system failure. HA keeps the active and standby systems synchronized, so that if the
active node were to fail, the standby node can take over services and continue where the failing node left off.
When an active High Availability PowerProtect DD system fails over to its standby High Availability PowerProtect DD system, all
in progress PowerProtect Data Manager operations including backup, restore, replication, and Cloud Tier continue unaffected.
To add a High Availability PowerProtect DD configuration as a storage target in PowerProtect Data Manager, select
Infrastucture > Storage in the PowerProtect Data Manager UI. Add protection storage provides more information.
Virtual machine application-aware protection are only be supported with DDOS version 7.0 or later for HA. The most up-to-date
software compatibility information for PowerProtect Data Manager is provided by the E-Lab Navigator.
For details on DD systems with HA enabled, see the DDOS Administration Guide.
Adding a DDMC instance with system pools also discovers the individual systems within the system pool. PowerProtect
Data Manager includes these systems in lists of available storage targets, such as for protection policy creation. As with
a non-Smart Scale DDMC instance, the Infrastructure > Storage page groups and identifies these systems through the
Managed By column in the list of protection storage systems.
Some roles do not allow you to view the Infrastructure > Storage page to identify the relationships between systems
and system pools. If your role does not allow you to view this information, coordinate storage target assignments with your
system administrator.
Protection policies that target a system pool can replicate to another system pool or to a stand-alone protection storage
system. Conversely, policies that target a stand-alone protection storage system can replicate to another protection storage
system or to a system pool.
Adding the values for Available and Free yields the total amount of unused space within the system pool.
50 Managing Storage
Mobile DD Boost users
Smart Scale mobile DD Boost users own mobile storage units on system pools. This concept extends the association between
DD Boost users and ordinary storage units to the system pool scope.
Mobile DD Boost users provide a unique user ID within a DDMC data center and control access to the associated mobile storage
units. These users are centrally managed and unique across data centers.
Mobile DD Boost users send their requests to the DDMC instance which manages the entire system pool. DDMC, in turn,
forwards the request to the correct system within the system pool.
As with other storage units, PowerProtect Data Manager associates a mobile DD Boost user with each mobile storage unit under
the control of PowerProtect Data Manager.
Storage units provides more information about mobile storage units.
Managing Storage 51
Migration
Perform the following actions:
1. Review the PowerProtect DD documentation for migration instructions.
2. Start the migration and complete all steps leading up to the commit stage.
3. Before you commit the migration, stop the related PowerProtect Data Manager operations for the selected storage units.
Stop PowerProtect Data Manager operations before mobile storage unit migration provides instructions.
4. Commit the migration and wait for migration to complete.
5. Restore full PowerProtect Data Manager operation. Restore PowerProtect Data Manager operations after mobile storage
unit migration provides information.
6. Optionally, verify operation. Verify operation after mobile storage unit migration provides information.
Stop PowerProtect Data Manager operations before mobile storage unit migration
To quiesce PowerProtect Data Manager before you commit the migration, complete the following actions:
Steps
1. Disable any protection policies that use the selected storage units. Disable a protection policy provides instructions.
2. If the affected protection policies have replication objectives, perform manual replication to eliminate any replication backlog.
Manual replication of protected assets provides instructions.
Scheduled replication activities continue after you disable a protection policy.
3. Allow all running protection and restore activities for the affected protection policies to complete.
4. Disable server disaster recovery (DR). Disable server DR backups provides instructions.
5. Delete any Instant Access sessions which were started from the selected storage units. The PowerProtect Data Manager
Virtual Machine User Guide provides instructions.
6. Disable compliance verification. The PowerProtect Data Manager Security Configuration Guide provides instructions.
Next steps
Refrain from the following activities until the migration completes and you resume normal operations:
● Performing manual backups of assets for the affected protection policies.
● Changing retention periods on the affected protection policies.
Restore PowerProtect Data Manager operations after mobile storage unit migration
To unquiesce PowerProtect Data Manager after migration, complete the following actions:
Steps
1. Enable compliance verification. The PowerProtect Data Manager Security Configuration Guide provides instructions.
2. Enable server DR. Manually configure server DR backups provides instructions.
3. Enable any protection policies that use the selected storage units. Enable a disabled protection policy provides instructions.
Steps
1. Perform a manual backup for each affected protection policy. Manual backups of protected assets provides instructions.
2. If the affected protection policies have replication objectives, perform manual replication. Manual replication of protected
assets provides instructions.
3. Browse the existing and new backups of assets for the affected protection policies.
4. Verify that you can restore from the new backups and their replicas, including Instant Access restores.
5. Verify that you can delete existing backups and replicas. Delete backup copies provides instructions.
52 Managing Storage
Add protection storage
Add and configure a storage system to use as a target for protection policies. Only the Administrator role can add protection
storage.
Prerequisites
NOTE:
When adding a High Availability PowerProtect DD system, observe the following points:
● Do not add the individual active and standby DD systems to PowerProtect Data Manager.
● In the Address field, use the hostname that corresponds to the floating IP address of the High Availability PowerProtect
DD system.
● The High Availability PowerProtect DD system is verified with the root certificate.
NOTE: If the credentials of the target system change, ensure that you update the credentials on the source
appliance that represents the target system. You can also update the credentials from the PowerProtect Data
Manager UI Administration > Credentials window by selecting the credential resource that is used to connect to
the target system and updating this resource with the correct values. To avoid account lockout, it is recommended
to use a user that has an administrator role but is not the default admin user. In the event that the target
system account associated with these credentials is locked out, then a new credential may need to be added to the
replication target for access.
Steps
1. From the left navigation pane, select Infrastructure > Storage.
The Storage window appears.
2. In the Protection Storage tab, click Add.
3. In the Add Storage dialog box, select a storage system (PowerProtect DD System or PowerProtect DD Management
Center).
For a system pool, select DDMC.
4. To add a High Availability PowerProtect DD system, select the check box.
5. Specify the storage system attributes:
a. In the Name field, specify a storage name.
b. In the Address field, specify the hostname, fully qualified domain name (FQDN), or the IP address.
c. In the Port field, specify the port for SSL communication. Default is 3009.
6. Under Host Credentials click Add, if you have already configured protection storage credentials that are common across
storage systems, select an existing password. Alternatively, you can add new credentials, and then click Save.
7. If a trusted certificate does not exist on the storage system, a dialog box appears requesting certificate approval. Click
Verify to review the certificate, and then click Accept.
8. Click Save to exit the Add Storage dialog and initiate the discovery of the storage system.
A dialog box appears to indicate that the request to add storage has been initiated.
9. In the Storage window, click Discover to refresh the window with any newly discovered storage systems.
When a discovery completes successfully, the Status column updates to OK. If DDMC is selected, all protection storage
systems managed by the host will be listed after discovery.
10. To modify a storage system location, complete the following steps:
A storage system location is a label that is applied to a storage system. If you want to store your copies in a specific location,
the label helps you select the correct storage system during policy creation.
a. In the Storage window, select the storage system from the table.
b. Click More Actions > Set Location.
The Set Location window appears.
c. Click Add in the Location list.
The Add Location window appears.
d. In the Name field, type a location name for the asset, and click Save.
Managing Storage 53
Results
PowerProtect Data Manager displays the available protection storage systems. For each protection storage system, the
Managed By column contains one of the following:
Prerequisites
Review the prerequisites for server DR and Search Engine nodes. Change the IP address or hostname of a DD system provides
more information. Review the limitations for each enabled asset source, as some asset sources may not support changing the
address for a protection storage system.
Ensure that backup, restore, and FLR jobs are not running.
Steps
1. From the left navigation pane, select Infrastructure > Storage.
The Storage window appears.
2. In the Protection Storage tab, select a protection storage system and then click the link in the Managed By column.
The Edit Storage dialog box appears.
3. In the Edit Storage dialog box, specify the storage system attributes:
a. In the Name field, specify a new storage name.
b. In the Address field, specify the new fully qualified domain name (FQDN) or the IP address.
c. In the Port field, specify the port for SSL communication. Default is 3009.
d. Under Host Credentials, select a new set of credentials or click Add.
4. If a trusted certificate does not exist for the protection storage system, a dialog box appears requesting certificate approval.
Click Verify to review the certificate, and then click Accept.
5. Click Save to exit the Edit Storage dialog box.
6. For Microsoft SQL Server or Oracle protection policies that use this protection storage system, update the lockbox:
a. From the left navigation pane, select Protection > Protection Policies.
The Protection Policies window appears.
b. Select the Microsoft SQL Server and Oracle protection policies that target this protection storage system, and then click
Set Lockbox.
54 Managing Storage
The replacement of a DD protection storage system that is used with PowerProtect Data Manager can involve either of the
following use cases:
● You perform a DD controller upgrade or head swap that replaces the protection storage system without requiring the
migration of data.
● You perform collection replication or DD Cloud migration to migrate data from the original DD system to a new replacement
system with the same or higher capacity.
CAUTION: The replacement DD system must have all the storage units, DD Boost users, and data that existed on
the original DD system.
After you replace the DD system, ensure that you meet the following requirements before using the PowerProtect Data
Manager UI to update the storage settings:
● All the protection policies that use the DD storage system are disabled.
● All the running protection jobs are completed.
● All the required data has been manually migrated as needed from the original DD system to the replacement DD system.
Use one of the following procedures to update the protection storage settings in PowerProtect Data Manager after replacing
the DD storage system.
NOTE: When data IP addresses have changed, update the network interface information for the replacement DD system.
A system job is created for updating the storage settings for the replacement DD system. You can monitor the system job in the
System Jobs window.
NOTE: You must wait until the replacement system job completes before you perform any PowerProtect Data Manager
operations that use the DD system being replaced.
Managing Storage 55
After the system job completes, the replacement DD attributes appear on the Protection Storage tab of the Infrastructure >
Storage window. The protection policies that use the DD system are automatically updated with the replacement DD settings.
Steps
1. Wait for all backup copies that use the DD system to expire. The expiration time can be reduced by editing the retention
value of the backup copies from the Assets > View Copies window.
2. For each protection policy that uses the DD system, either edit the protection policy and replace the DD system or remove
the protection policy altogether.
3. Remove the DD system from PowerProtect Data Manager.
4. Remove the DD system from the external environment.
Results
The protection storage system is removed.
If a protection storage system is removed and you have not followed steps 1 and 2, you might start to see error messages similar
to the following:
Unable to delete copies for … from protection storage … in storage unit … because of
connection issues on the storage system.
Unable to delete copies for asset … on storage unit …
You might also see repeated system jobs with a status of Failed and a description of Schedule Deleting Expired
Copies.
If these error messages are seen, you can try the following steps 1 and 2 to correct the situation. However, if PowerProtect
Data Manager remains unstable, contact Customer Support.
Storage units
PowerProtect Data Manager can create, configure, and reuse storage units on a protection storage system.
A storage unit under the control of PowerProtect Data Manager is a logical storage-array target that is used to group and
manage protection and retention policies that have the same data-access requirements. Using storage units enables precise
control of the administration of security settings, data-stream limits, capacity quotas, and application-specific data-compression
algorithms. A storage unit is created through one of the methods discussed here.
Review the applicable limitations before you create or change a storage unit, or change the protection or replication target for a
policy. For more information about storage units, see the PowerProtect DD Virtual Edition Installation and Administration Guide
for the appropriate platform.
56 Managing Storage
Mobile storage units
For Smart Scale, mobile storage units extend the concept of a storage unit to the scope of an entire system pool. A mobile
storage unit has the potential to move from one pool member to another. Thus:
● When you browse the storage units in a system pool, PowerProtect Data Manager displays only mobile storage units.
● When you browse the storage units on a DD system, PowerProtect Data Manager displays only regular (non-mobile) storage
units.
● You must work with mobile storage units at the system pool level.
Aside from scope differences, PowerProtect Data Manager treats mobile storage units and regular storage units as equivalent.
Click to open the Details pane and see more information about an existing storage unit, including configuration values.
Security
All protection policies and applications that share a storage unit can access any data in that storage unit. Reuse a storage unit
only for policies and applications that belong to the same organizational unit or which share a trusted relationship. Policies and
applications for different organizational units should use different storage units.
Any other external applications that also use the storage unit should protect and restrict access to the DD Boost credentials.
These credentials provide access to the PowerProtect Data Manager data.
Managing Storage 57
Updating from previous releases
Any protection policy can use storage units that were automatically created for policies in a previous release of PowerProtect
Data Manager. Policies that were created in a previous release continue to function as before.
Previous releases of the Oracle agent do not support storage units with multiple protection policies. The PowerProtect Data
Manager Oracle RMAN User Guide provides more information.
Retention locking
Retention locking prevents the deletion or alteration of data on a protection storage system for a user-defined period of up to
70 years. PowerProtect Data Manager supports both governance mode and compliance mode retention locking for backups and
replicas.
The PowerProtect DD documentation provides more information about each retention lock mode, including the differences
between modes. Retention locking requires enablement and licensing on the protection storage system before use with
PowerProtect Data Manager.
Retention locking is a two-stage process:
1. Create a storage unit on which you set the appropriate retention lock mode. Setting the retention lock mode enables but
does not activate retention locking.
2. Configure primary backup objectives that both target this storage unit and activate retention locking. Toggling on the
retention lock setting for a primary backup objective activates retention locking in accordance with the configured retention
lock mode of the selected storage unit.
For more information about configuring a primary backup objective, see the appropriate publication.
58 Managing Storage
Table 24. Protection-policy asset types (continued)
Asset type Publication
Kubernetes cluster PowerProtect Data Manager Kubernetes User Guide
namespaces and PVCs
Microsoft Exchange Server PowerProtect Data Manager Microsoft Exchange Server User Guide
databases
Microsoft SQL Server PowerProtect Data Manager Microsoft SQL Server User Guide
databases
Network Attached Storage PowerProtect Data Manager Network-Attached Storage User Guide
(NAS) share and appliance
data
Oracle RMAN databases PowerProtect Data Manager Oracle RMAN User Guide
SAP HANA databases PowerProtect Data Manager SAP HANA User Guide
Virtual machines PowerProtect Data Manager Virtual Machine User Guide
When you set the retention lock mode on a storage unit, you can never disable or change it. To use a different retention lock
mode with a primary backup, target a different storage unit. The original retention lock mode persists for existing backups or
replicas that were created before the change.
The choice of retention lock mode can impact which protection policies and primary backup objectives share a storage unit.
Consider the retention lock settings when you design your storage unit architecture.
Compliance mode
Observe the following details before you configure or activate compliance mode retention locking:
● Compliance mode requires DDOS 7.10 or later. Earlier versions support only governance mode.
● Compliance mode requires the security officer credentials for the associated protection storage system. PowerProtect Data
Manager does not store the security officer credentials.
● Setting a compliance mode retention lock on an asset storage unit automatically sets a compliance mode retention lock on
the associated server DR storage unit.
● The option to create a storage unit through the selection drop-down list during protection policy configuration does not
support compliance mode, only governance mode. To use compliance mode, create and configure a storage unit before you
configure an associated protection policy.
● Deleting a storage unit with compliance mode enabled requires the security officer credentials for the associated protection
storage system.
Prerequisites
Add at least one protection storage system for PowerProtect Data Manager.
Managing Storage 59
Steps
1. From the left navigation pane, select Infrastructure > Storage.
The Storage window appears.
2. On the Protection Storage tab, select a storage system, and then select More Actions > Manage Storage Units.
The Storage Units page opens and displays a list of the storage units under the control of PowerProtect Data Manager.
3. Select Add.
The Create Storage Unit or Create Mobile Storage Unit dialog box opens.
4. Type a name for the new storage unit.
5. For mobile storage units in system pools, select a Network Group.
Network groups are configured in DDMC to provide access to the system pool over different physical or virtual networks.
A network group contains information about the IP addresses for the pool members and the IP address that clients use for
access to the system pool.
6. Set the capacity and stream quotas that restrict the storage unit resource consumption.
There are two kinds of quota limits—hard limits and soft limits. You can set either a soft or hard limit or both a soft and hard
limit. Both values must be integers, and the soft value must be less than the hard value.
NOTE: When you set a soft limit and the limit is reached, an alert is generated, but data can still be written. When you
set a hard limit and the limit is reached, data cannot be written. All data protection operations fail until data is deleted
from the storage unit. The PowerProtect DD Virtual Edition Installation and Administration Guide for the appropriate
platform provides more information about quota configuration.
a. Capacity Quota—Controls the total size of precompression data that is written to the protection storage.
b. Stream Quota—The number of concurrent streams allowed during data protection operations. Setting a Stream Quota
limit can help ensure that that performance is not impacted negatively when a data protection operation consumes too
many resources.
7. Set a Retention Lock Mode from the available modes: None, Compliance, or Governance.
NOTE: If you set a retention lock mode, it can never be disabled or changed.
This field displays only the licensed and available options for the selected protection storage system. If working with a server
DR storage unit, the only available retention lock mode is Compliance.
If you select Compliance, provide the username and password for the security officer who is associated with the
protection storage system.
NOTE: Setting a compliance mode retention lock on an asset storage unit automatically sets a compliance mode
retention lock on the associated server DR storage unit.
8. Select Save.
Results
PowerProtect Data Manager creates the storage unit on the selected protection storage system.
Steps
1. From the left navigation pane, select Infrastructure > Storage.
The Storage window appears.
2. On the Protection Storage tab, select a storage system, and then select More Actions > Manage Storage Units.
The Storage Units page opens and displays a list of the storage units under the control of PowerProtect Data Manager.
60 Managing Storage
3. To view the details or usage for a storage unit, select for that storage unit.
The Details pane opens and displays the name, type, capacity, quota information, and a list of protection policies that
currently target the storage unit.
The storage unit may contain copies from protection policies that no longer target the storage unit.
4. Select a storage unit from the list, and then select Edit.
The Edit Storage Unit or Edit Mobile Storage Unit dialog box opens.
5. For mobile storage units in system pools, select a Network Group.
Network groups are configured in DDMC to provide access to the system pool over different physical or virtual networks.
A network group contains information about the IP addresses for the pool members and the IP address that clients use for
access to the system pool.
6. Set the capacity and stream quotas that restrict the storage unit resource consumption.
There are two kinds of quota limits—hard limits and soft limits. You can set either a soft or hard limit or both a soft and hard
limit. Both values must be integers, and the soft value must be less than the hard value.
NOTE: When you set a soft limit and the limit is reached, an alert is generated, but data can still be written. When you
set a hard limit and the limit is reached, data cannot be written. All data protection operations fail until data is deleted
from the storage unit. The PowerProtect DD Virtual Edition Installation and Administration Guide for the appropriate
platform provides more information about quota configuration.
a. Capacity Quota—Controls the total size of precompression data that is written to the protection storage.
b. Stream Quota—The number of concurrent streams allowed during data protection operations. Setting a Stream Quota
limit can help ensure that that performance is not impacted negatively when a data protection operation consumes too
many resources.
7. Toggle the status of retention lock to Enabled. This status can only be toggled if PowerProtect Data Manager has been
updated from a previous release where the compliance mode retention lock was enabled on an asset storage unit, but not on
the server DR storage unit.
NOTE: Retention locking can only be enabled if a retention lock mode is set.
8. If not already set, select a retention lock mode from the available modes: Compliance or Governance.
If editing a server DR storage unit, the only available retention lock mode is Compliance.
NOTE: If you set a retention lock mode, it can never be disabled or changed.
If you select Compliance, provide the username and password for the security officer who is associated with the
protection storage system.
NOTE: Setting a compliance mode retention lock on an asset storage unit automatically sets a compliance mode
retention lock on the associated server DR storage unit.
If you have updated from a PowerProtect Data Manager system that did not have the compliance mode retention lock set
on the server DR storage unit, set it here.
9. Select Save.
Results
PowerProtect Data Manager updates the storage unit settings.
Prerequisites
Before you can delete a storage unit, the storage unit must be empty and not targeted by any protection policies. The storage
unit must be under the control of PowerProtect Data Manager and created by this instance of PowerProtect Data Manager.
Managing Storage 61
If compliance mode retention locking is enabled, provide the username and password for the security officer who is associated
with the protection storage system.
Steps
1. From the left navigation pane, select Infrastructure > Storage.
The Storage window appears.
2. On the Protection Storage tab, select a storage system, and then select More Actions > Manage Storage Units.
The Storage Units page opens and displays a list of the storage units under the control of PowerProtect Data Manager.
3. Select a storage unit from the list, and then select Delete.
The Enter Security Officer Credential dialog box opens.
4. Provide the username and password for the security officer and then click OK.
Results
PowerProtect Data Manager removes the storage unit.
Prerequisites
Ensure that retention locking is enabled on the storage unit.
Steps
1. From the left navigation pane, select Infrastructure > Storage.
The Storage window appears.
2. From the Protection Storage tab, select a storage system, and then select More Actions > Manage Storage Units.
3. Select a storage unit from the list, and then select More Actions > Enable Indefinite Retention Hold.
4. If required, provide the username and password for the security officer who is associated with the protection storage
system, and then click Enable.
Security officer credentials are required when enabling IRH on a storage unit with compliance mode retention locking.
Steps
1. From the left navigation pane, select Infrastructure > Storage.
The Storage window appears.
2. From the Protection Storage tab, select a storage system, and then select More Actions > Manage Storage Units.
3. Select a storage unit from the list, and then select More Actions > Disable Indefinite Retention Hold.
4. If required, provide the username and password for the security officer who is associated with the protection storage
system, and then click Disable.
Security officer credentials are required when disabling IRH on a storage unit with compliance mode retention locking.
62 Managing Storage
● Changing a storage unit password through the UI
● Changing the storage unit password policy
Managing Storage 63
4
Using the PowerProtect Search Engine
Topics:
• PowerProtect Search Engine
• Set up and manage indexing
• Search Engine node deletion
• Edit the network configuration for a Search Engine node
• Perform a search
• Troubleshooting Search Engine issues
Limitations
● PowerProtect Search Engine is an optional feature that can be enabled, set up, and configured for virtual machine backups
and protection policies. When you enable this feature, a backup of the Search Engine is taken as part of the server backup
process. As of this release, you cannot disable these backups. Therefore, when Search is enabled, you must add the Search
Engine node on the DD system that contains the ServerBackup MTree to the Allow list. If you use NFS for server DR, add
the Search Engine node IP address or hostname to the client list for the NFS export.
● After an update to PowerProtect Data Manager, with the Search Engine already configured, and the first time that you use
the Networks page to add a virtual network to an environment, PowerProtect Data Manager does not automatically add
the virtual network to the Search Engine. Instead, manually edit each node to add the virtual network. This action makes
the Search Engine aware of virtual networks. Any subsequent new virtual networks are automatically added to the Search
Engine.
● If an operational Search Engine node fails, the node cannot be recovered, and the Search Engine cluster has a status of
Failed, then the cluster must be removed and a new cluster created.
● The maximum number of partitions that can be indexed during a backup operation is 15. If a virtual machine has more than 15
partitions, indexing occurs outside of any backup operation.
● Indexing does not support volumes using the XFS file system on virtual disks that are thin provisioned.
Prerequisites
Ensure that:
● A vCenter datastore has been configured. The PowerProtect Data Manager Virtual Machine User Guide provides detailed
steps for adding a vCenter server as an asset source.
● PowerProtect Data Manager has discovered the networks for the vCenter server.
● The following requirements for the PowerProtect Search Engine are met:
NOTE: Each Search Engine node must meet the system requirements.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Search Engine, and then click Add Node.
2. In the Add Search Engine Node wizard, provide the required parameters.
● Hostname, IP Address, Gateway, DNS, and Netmask.
● vCenter—If you have added multiple vCenter server instances, select the vCenter server on which to deploy the Search
Engine node.
NOTE: Ensure that you do not select the internal vCenter server.
● ESX Host/Cluster—Select on which cluster or ESXi host you want to deploy the Search Engine node.
● Network—Displays all the networks that are available under the selected ESXi Host/Cluster. For virtual networks
(VLANs), this network carries management traffic.
● Data Store—Displays all datastores that are accessible to the selected ESXi Host/Cluster.
3. Click Next.
The Networks Configuration page displays.
4. On the Networks Configuration page:
The Networks Configuration page configures the virtual network (VLAN) to use for Data for Management Components
traffic. To continue without virtual network configuration, leave the Preferred Network Portgroup selection blank and
then click Next.
a. From the Preferred Network Portgroup list, select a Virtual Guest Tagging (VGT) group.
VST (Virtual Switch Tagging) groups are not supported.
The list displays all virtual networks within the trunk range. If you select a portgroup that contains multiple networks,
PowerProtect Data Manager automatically selects all networks. Individual networks cannot be selected.
A Search Engine node requires an IP address from the static IP pool for each selected virtual network. If there are not
enough IP addresses in a pool, the wizard prompts you to supply additional addresses for that network.
Ensure that the selected virtual networks support a traffic type that is compatible with Search Engine nodes.
b. If required, type an available static IP address or IP address range in the Additional IP Addresses column for the
indicated virtual network.
For convenience when working with multiple virtual networks, you can also use one of the Auto Expand options:
● Expand Last IP—The wizard increments the host portion of the last IP address in the static IP pool. Click Apply.
● Same Last Digit—The wizard adds the network portion of the IP address to the specified value. Type the host
portion of the IP address and then click Apply.
The wizard updates the value in the Additional IP addresses column for each network. Verify the proposed IP
addresses.
7. In the Configure Search Engine dialog box, enable or disable indexing, accept or change the expiration period, and then
click OK.
NOTE:
● When the index cluster reaches 70 percent, an alert is generated. When it reaches 90 percent, an alert is generated
and indexing is suspended. Specify a global index expiry interval to periodically clean up indexes, which frees up
space.
● To turn off or modify indexing, select Infrastructure > Search Engine, select the cluster, and click Configure
Cluster. From the Configure Search Cluster dialog box, you can enable/disable the service or change the number
of expiration days.
● Indexes expire according to the global setting or when the associated copies expire, whichever occurs first.
● To stop indexing assets that have been added to a protected protection policy, disable the indexing option during
protection policy configuration.
● You can add up to a maximum of 5 Search Engine nodes.
Next steps
NOTE:
When you edit or retry an operation that failed and there are additional IP addresses in the address pool, PowerProtect Data
Manager marks the last failed IP address as abandoned. PowerProtect Data Manager does not try to reuse any IP addresses
that are marked as abandoned. The UI does not display this condition.
KB article 000181120 provides more information about how to use the REST API to detect when an IP address is marked as
abandoned. The article also provides steps to correct this condition so that the IP address can be used again.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Search Engine.
2. Select the node from the list that you want to delete, and then select More Actions > Delete Node.
3. In the Delete Search Engine Node window, click Delete Node.
CAUTION: Do not select Delete node without moving the index data. If you select this option, the Search
Engine cluster becomes inactive and cannot be recovered.
4. Go to the Jobs > System Jobs window to monitor the progress of the node deletion.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Search Engine.
2. Select the node that failed to deploy.
3. Do one of the following:
● To redeploy the node, select More Actions > Redeploy Node.
The Redeploy Search Engine Node wizard opens. The Search Engine populates the fields with the information that you
supplied when you added the node. Verify that the information is correct.
● To delete the node, select More Actions > Delete Node.
4. Go to the Jobs > System Jobs window to monitor the progress of the node redeployment or deletion.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Search Engine.
2. Perform the following steps for each of the nodes:
a. Select the node from the list.
b. Select More Actions > Delete Node.
c. Click Delete Node.
NOTE: If no operational nodes have failed, the option Delete nodes without moving the index data is available.
Selecting this option results in the cluster becoming irrecoverably inactive.
d. Go to the Jobs > System Jobs window to monitor the progress of the node deletion operation.
Results
All Search Engine nodes are deleted and the Search Engine cluster is removed.
Prerequisites
Before you remove a network, disable indexing. Set up and manage indexing provides instructions.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Search Engine and then select the applicable Search
Engine node.
2. Select More Actions > Edit Networks.
The Edit Search Engine Node wizard opens to the Network Configuration page.
3. If applicable, from the Preferred Network Portgroup list, select a VGT network to carry Data for Management
Components traffic.
The list displays all virtual networks within the trunk range. If you select a portgroup that contains multiple networks,
PowerProtect Data Manager automatically selects all networks. Individual networks cannot be selected.
A Search Engine node requires an IP address from the static IP pool for each selected virtual network. If there are not
enough IP addresses in a pool, the wizard prompts you to supply additional addresses for that network.
Virtual networks with a warning symbol ( ) beside the network name require attention and review. For example, if you
changed the network configuration, the configured traffic types may not support Search Engine nodes. Clear any interfaces
which no longer apply to the Search Engine node.
4. If required, type an available static IP address or IP address range in the Additional IP Addresses column for the indicated
virtual network.
For convenience when working with multiple virtual networks, you can also use one of the Auto Expand options:
● Expand Last IP—The wizard increments the host portion of the last IP address in the static IP pool. Click Apply.
● Same Last Digit—The wizard adds the network portion of the IP address to the specified value. Type the host portion
of the IP address and then click Apply.
The wizard updates the value in the Additional IP addresses column for each network. Verify the proposed IP addresses.
5. Click Next.
6. On the Summary page, review the information and then click Finish.
Next steps
If you disabled indexing, re-enable indexing. Set up and manage indexing provides instructions.
Perform a search
When the Search Engine is deployed and configured, you can use the File Search functionality in the PowerProtect Data
Manager UI to search across all indexed data to locate protected files and folders within backup copies. When asset types are
set up for index searching, the File Search button appears in the Restore menu for assets.
Before performing a search, ensure that:
● A Search Engine node is set up.
● Search indexing is enabled.
Certificate issues
Issues with indexing backups and/or performing search queries might result when certificates that were deployed on the Search
Engine node were corrupted.
Perform one of the following tests to determine certificate issues:
● Use the log bundle download utility in PowerProtect Data Manager to examine the Backup VM logs in VM Direct, and look
for a log entry like the following:
● Examine the REST engine logs in the Search Engine node (/opt/emc/search/logs/rest-engine/*.log), and look
for certificate verification errors.
● Run a search either through the UI or through the API <PowerProtect Data Manager>/api/v2/file-instances
and look for a certification verification error.
Examine the certificate files on each Search Engine node to investigate further. If necessary, regenerate the certificate files.
Verify certificates
Use this procedure to verify that certificates are valid and uncorrupted:
1. Verify that the rootca.pem file is the same in all the relevant nodes (Search Engine node, PowerProtect Data Manager,
and VM Direct node).
NOTE: The rootca.pem file name is different on each node:
● PowerProtect Data Manager—/etc/ssl/certificates/rootca/rootca.pem
● Search Engine node—/var/lib/dellemc/vmboot/trust/thumbprint
● VM Direct—/var/lib/dellemc/vmboot/trust/thumbprint
2. Run the following OpenSSL command to find out whether the root certificate file is corrupt or invalid: openssl verify
<rootca.pem>
Response:
/var/lib/dellemc/vmboot/trust/thumbprint: C = US,
O = DELL Corporation,
CN = PPDM Root CA ID-4c9de850-24ab-42ec-a9a7-6080849d0d24
OK
To shorten the expiration time to remove indexes sooner, complete the following steps:
1. From the PowerProtect Data Manager UI, select Infrastructure > Search Engine.
2. Select the cluster, and then click Configure Cluster.
3. In the Configure Search Cluster dialog box, modify the Search Index Expiration and click Save. A recommended formula
to determine the expiration time is: Delete Index when Today = Backup-Date + Expiration Days + 1 day.
That is, one day after the backup expires.
NOTE: This setting applies to all indexes in all protection policies in the Search Engine.
{
Command: "APP_SNAPSHOT",
Title: "Initiate Index/Search Cluster Snapshot Process",
AsyncCmd: false,
Properties: {
"Name": {
Description: "Used to uniquely identify a particular snapshot",
Type: STRING
},
"Action": {
Description: "Action to perform, 'Create', 'Delete', 'Restore' or
'Cancel' a Snapshot",
Type: STRING
},
"NFSHost": {
Description: "NFS Host serving snapshot backup area.",
Type: STRING
},
"NFSExport": {
Description: "NFS Export path to mount too.",
Type: STRING
},
"NFSDirPath": {
Description: "NFS directory path to write too.",
Type: STRING
}
}
}
For example:
{
"Command": "APP_SNAPSHOT",
"Title": "",
"AsyncCmd": false,
"Properties": {
"Action": {
"Description": "",
"Required": false,
"Type": "string",
"IsArray": false,
"Value": "Create",
"Default": null
},
"Name": {
"Description": "",
"Required": false,
"Type": "string",
"IsArray": false,
"Value": "DataManager_Catalog_Cluster_snapshot_2019-10-16-12-57-16",
"Default": null
},
"NFSHost": {
"Value": "10.25.87.88"
},
"NFSExport": {
"Value": "/mnt/shared"
},
"NFSDirPath": {
"Value": ""
}
}
}
3. You can delete indexes by protection policy or by asset. If the JSON command is stored at /home/admin/remove-
plc.json, run the command, ./searchmgmt -I /home/admin/remove-plc.json.
{
"Command": "APP_REMOVE_ITEMS",
"AsyncCmd": false,
"Properties": {
"Action": {
"Description": "Action to perform,
'AssetDelete', 'PLCDelete'",
"Required": true,
"Value": "PLCDelete",
}
"PLCID": {
"Description": "PLC ID of item(s) to delete.",
"Required": true,
"Value": "7676d753-b57e-a572-6daf-33689933456d",
}
}
}
{
"Command": "APP_REMOVE_ITEMS",
"AsyncCmd": false,
"Properties": {
"Action": {
"Description": "Action to perform,
'AssetDelete', 'PLCDelete'",
"Required": true,
"Value": "AssetDelete",
},
"AssetID": {
"Description": "Optional, Asset ID of item(s)
to delete.",
"Required": false,
"Value": "503dd753-b57e-a572-6daf-44680033755f",
},
"PLCID": {
"Description": "PLC ID of item(s) to delete.",
"Required": true,
"Value": "7676d753-b57e-a572-6daf-33689933456d",
}
}
}
NOTE:
● The time to complete the execution of these procedures depends on the number of backup copy asset indexes being
deleted.
● This procedure does not impact regular operation of the cluster.
74 Managing Assets
About other asset sources
In addition to vCenter server asset sources, PowerProtect Data Manager provides the option to enable other asset sources to
protect additional asset types.
The PowerProtect Data Manager Administrator Guide does not provide instructions for Kubernetes clusters or agent asset-
source management. Refer to the PowerProtect Data Manager online help or individual Kubernetes and agent user guides for
more information.
NOTE: When following an agent user guide to install an agent, ensure that the drive or partition of the installation directory
has sufficient free space.
The following other asset sources are supported:
Kubernetes cluster
After the Kubernetes cluster asset source is added and registered in the PowerProtect Data Manager UI, PowerProtect Data
Manager enables protection of PVCs and namespace data on the Kubernetes or Tanzu Kubernetes cluster.
NAS agent
After the NAS asset source is added and registered in the PowerProtect Data Manager UI, PowerProtect Data Manager enables
protection of NAS assets.
Managing Assets 75
Storage Arrays
For integration with Dell PowerStore, PowerProtect Data Manager provides centralized backup and restore operations to
protect data on storage arrays. After the storage array asset source is added and discovered in the PowerProtect Data Manager
UI, PowerProtect Data Manager enables protection of block volume assets.
76 Managing Assets
Full discovery of application asset sources
If some application assets are not discovered, you can perform an immediate full discovery of application asset sources by using
the on-demand discovery feature in the PowerProtect Data Manager UI.
Full discovery is available for the following application asset sources:
● Microsoft SQL Server
● Microsoft Exchange Server
● Oracle
● SAP HANA
● File System
To initiate a full discovery of application asset sources, complete the following steps:
1. Select Infrastructure > Asset Sources.
2. Select an application asset source and click Discover.
3. Select the Initiate a full discovery option, and then click Yes.
Steps
1. From the PowerProtect Data Manager user interface, select Infrastructure > Asset Sources, and then click + to reveal
the New Asset Source tab.
2. In the pane for the asset source that you want to add, click Enable Source.
The Asset Sources window updates to display a tab for the new asset source.
Results
You can now add or approve the asset source for use in PowerProtect Data Manager. For a vCenter server, Kubernetes cluster,
or PowerProtect Cloud Snapshot Manager tenant, select the appropriate tab in this window and click Add. For an application
host, select Infrastructure > Application Agents and click Add or Approve as required.
NOTE: Although you can add a Cloud Snapshot Manager tenant to PowerProtect Data Manager in order to view its health,
alerts, and the status of its protection, recovery, and system jobs, you cannot manage the protection of its assets from
PowerProtect Data Manager. To manage the protection of its assets, use Cloud Snapshot Manager. For more information,
see the PowerProtect Cloud Snapshot Manager Online Help.
Managing Assets 77
Disable an asset source
If you enabled an asset source that you no longer require, and the host has not been registered in PowerProtect Data Manager,
perform the following steps to disable the asset source.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Asset Sources, and then select the tab of the asset
source that you want to disable.
If no host registration is detected, a red Disable button appears.
2. Click Disable.
Results
PowerProtect Data Manager removes the tab for this asset source.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Asset Sources, and then select the tab for the type of
asset source that you want to delete.
2. Select the asset source name in the asset source list, and then click Delete.
3. At the warning prompt that appears, click Continue.
The asset source is deleted from the list.
Results
PowerProtect Data Manager removes the specified asset source in the Asset Sources window.
For all asset sources except the vCenter Server, any associated assets that are protected by the protection policy are removed
from the protection policy and their status is changed to deleted. These assets are removed automatically as part of daily
PowerProtect Data Manager cleanup after all associated backup copies have been deleted. These assets can also be removed
manually. The PowerProtect Data Manager Administrator Guide provides details on how to remove assets from PowerProtect
Data Manager.
The copies of assets from the asset source are retained (not deleted). You can delete the copies from the copies page, if
required.
78 Managing Assets
Add a Cloud Snapshot Manager tenant
Perform the following steps to add a Cloud Snapshot Manager tenant as an asset source in the PowerProtect Data Manager UI.
Prerequisites
● Ensure that the asset source is enabled.
Enable an asset source provides instructions.
● Log in as a user with the Administrator role. Only the Administrator role can manage asset sources.
● The PowerProtect Data Manager server has Internet access and is able to reach https://ssgosge.emc.com.
NOTE: If this access is removed during normal operation, any existing Cloud Snapshot Manager information will continue
to be displayed in the Dashboard window, but there will be no updates until Internet access is restored.
● This procedure requires the entry of values specific to Cloud Snapshot Manager. For more information, see the
PowerProtect Cloud Snapshot Manager Online Help.
Steps
1. From the left navigation pane, select Infrastructure > Asset Sources.
The Asset Sources window appears.
2. Select the Cloud Snapshot Manager tab.
3. Click Add.
The Add Cloud Snapshot Manager Account Details dialog displays.
4. In the Name field, enter a descriptive name for the Cloud Snapshot Manager tenant.
5. In the Tenant ID field, enter the Cloud Snapshot Manager tenant ID.
6. Click the drop-down control next to Cloud Snapshot Manager Credentials, and then click Add Credentials.
a. In the Name field, enter the name of the Cloud Snapshot Manager tenant credentials.
b. In the Client ID field, enter the ID of the Cloud Snapshot Manager tenant.
c. In the Client Secret field, enter the secret of the Cloud Snapshot Manager tenant.
d. Click Save.
7. Click Save.
Results
PowerProtect Data Manager can view jobs, alerts, and reports related to protected Cloud Snapshot Manager resources.
Managing Assets 79
6
Managing Protection Policies
Topics:
• Protection policies
• Before you create a protection policy
• Replication triggers
• Creating or editing a protection policy
• Viewing a summary of protection policies
• Run an asset-protection report
• Add a service-level agreement
• Run a compliance report
• Disable a protection policy
• Delete a protection policy
• Overview of PowerProtect Data Manager Cloud Tier
• Extended retention for protection policies created in PowerProtect Data Manager 19.11 or earlier
• Manual backups of protected assets
• Manual replication of protected assets
• Manual Cloud Tiering of protected assets
• Delete backup copies
• Removing expired backup copies
• Removing assets from PowerProtect Data Manager
• Protecting client assets after a client hostname change
• ifGroup configuration and PowerProtect Data Manager policies
• Troubleshooting failed replication jobs
Protection policies
Protection policies define sets of objectives that apply to specific periods of time. These objectives drive configuration, active
protection, and copy-data-management operations that satisfy the business requirements for the specified data. Each policy
type has its own set of user objectives.
Only the Administrator role can create or edit protection policies.
In the Protection Policies window, you can export protection policy data by using the Export All functionality.
PowerProtect Data
Manager 19.12.
Synthetic Full Only the data that has An incremental backup Daily
changed since the last is performed, followed
synthetic-full or full backup by a merge operation
is backup up. An operation that produces a full
to merge these changes with backup in storage.
the last synthetic-full or full
backup produces a full backup
in storage. Only the changed
files are copied over the
network, but the result is still
a full backup in storage.
Oracle centralized Full All the data is backed up. Full Daily
(Application Direct)
Incremental Only the data that has Differential 12 hours
Cumulative changed since the last level 0
full backup is backed up.
Incremental Only the data that Incremental 6 hours
Differential has changed since the
last incremental differential
backup or the last full
backup if there are no
other incremental differential
backups is backed up.
Log The archived logs are backed - 30 minutes
up.
Oracle centralized Full All the data is backed up. Full Daily
(Oracle Incremental
Merge) Synthetic Full Only the data that has A differential backup is 12 hours
changed since the last performed, followed by
synthetic-full or full backup a merge operation that
is backup up. An operation produces a full backup
to merge these changes with in storage.
the last synthetic-full or full
backup produces a full backup
in storage. Only the changed
files are copied over the
network, but the result is still
a full backup in storage.
Log The archived logs are backed - 30 minutes
up.
Block Volume Synthetic Full Backs up only the blocks An incremental backup 6 hours
that have changed since is performed, followed
the last synthetic-full or full by a merge operation
backup, and then performs that produces a full
an operation to merge backup in storage.
those changes with the last
synthetic-full or full backup in
order to produce a full backup
in storage. Only the changed
blocks are copied over the
network, but the result is still
a full backup in storage.
NOTE: In some situations, a full backup might be performed even though a synthetic-full backup was scheduled. Possible
reasons for a full backup include the following:
● There is no existing full backup.
● The size of a volume has changed.
● There has been a file path change.
● The asset host has been rebooted.
The backup frequency of log, differential, incremental-cumulative, incremental-differential, and incremental backups cannot be
greater than the backup frequency of either full or synthetic-full backups. If you attempt to add or edit a protection policy that
uses an invalid backup frequency, PowerProtect Data Manager prevents you from saving the protection policy. You can increase
the backup frequency of a protection poicy by scheduling more full or synthetic-full backups with different retention times to
meet your requirements.
Replication triggers
PowerProtect Data Manager orchestrates protection policy replication objectives independently of the primary backup. When
you add a replication objective to a policy, select one of the available triggers.
The default replication trigger is a schedule window that you define by setting a recurrence period plus start and end times.
Replication occurs during the defined window. For example, every day between 8 p.m. and 12 a.m.
You can also trigger replication immediately after the completion of the associated primary backup, whether scheduled or
manual. At the start of the primary backup, PowerProtect Data Manager generates an associated replication job that remains
queued until the end of the protection job. If the backup fails or completes with exception, the associated replication job is
skipped. Restarting the protection job queues the associated replication job again.
When you create a replication objective, you can specify either scheduled replication or replication after backup completion,
which is applicable to both centralized and self-service protection policies.
NOTE: For replication after backup completion, it is recommended that you update the application agents to the latest
version.
Depending on the type of backup, the following versions are required to ensure that replication occurs immediately after the
backups complete:
● For self-service primary backups, update all application agents to PowerProtect Data Manager version 19.12 or later.
● For centralized primary backups, update all application agents to PowerProtect Data Manager version 19.11 or later.
If you want to replicate only specific backups, perform a manual replication of these backups in advance.
Using a schedule can help you manage network traffic by replicating during off-peak hours. However, for larger backup sets, the
primary backup may not finish before the start of the replication schedule, which creates a replication backlog. Replication after
backup completion prevents a replication backlog from forming.
To prevent data loss, the replication after backup completion trigger replicates new backups from the primary objective and any
outstanding backups that have not yet replicated.
The backup of this asset completed successfully but the copy metadata information has
not yet been discovered by PowerProtect Data Manager. If the 'Replicate immediately upon
backup completion' option is enabled for this protection policy, the replication job
for the copy might appear in 'Unknown' or 'Cancel' state. Once the copy metadata is
discovered by PowerProtect Data Manager, the copy will be replicated.
Review the backup copy details in the View Copies pane of the PowerProtect Data Manager
UI Infrastructure > Assets window to determine when the discovery is complete.
If you see this message, the replication backup is not immediately available.
To correct this issue, either wait for the next automatic discovery or initiate a discovery.
Prerequisites
If applicable, complete all of the virtual network configuration tasks before you assign any virtual networks to the protection
policy.
Steps
1. From the left navigation pane, select Protection > Protection Policies.
The Protection Policies window appears.
2. Select the protection policy that you want to modify, and click Edit.
The Edit Policy window opens on the Summary page. From this page, you can click edit next to any available row to
change specific policy details.
3. In the Name or Description rows, click Edit.
The Type page displays.
NOTE: You cannot change the type or purpose of an existing policy.
4. In the Objectives row, click Edit.
The Objectives page displays. From this page, you can change the backup schedule, modify the settings for the network
interface, and enable or disable the retention lock.
You can also change the storage targets by selecting a new Storage Name in the Primary Backup and Replicate rows.
For more information about changing storage targets, see the section Changing storage targets.
5. In the Options row, click Edit.
The Options page displays. From this page, you can change the backup optimization mode (for example, from Performance
to Capacity), select whether to include or exclude swap files from the backup, and select whether to quiesce the guest file
system during the backup.
NOTE: For virtual machine protection policies, two types of protection mechanisms are used—Transparent Snapshot
Data Mover (TSDM), and VMware vStorage API for Data Protection (VADP). Updates to the policy options can result
in changes to the protection mechanism used to move virtual machine data. When the protection mechanism changes, a
new, full backup is performed, which might take awhile to complete.
6. After making your changes, click Next to save the changes and return to the Summary page.
7. On the Summary page, click Finish.
An informational dialog displays.
8. Click OK to exit the dialog, or click Go to Jobs to open the Jobs window to monitor the backup of the new protection
policy.
Impacts
Changing the primary objective storage target for some asset types may cause skipped backups until the next scheduled full
backup:
● VMware virtual machine application-aware
● SAP HANA
● Oracle RMAN
Perform a manual full backup for these policies. Manual backups of protected assets provides instructions.
The following asset types do not require additional action:
● VMware virtual machine crash-consistent
● Kubernetes
● Network Attached Storage (NAS)
● Block volumes
● Microsoft Exchange Server
● Microsoft SQL Server
● File systems
For these asset types, the next backup automatically becomes a full backup.
Replication objectives do not require additional action.
Protection storage
Managing Storage provides more information about working with protection storage, including configuring additional protection
storage systems and changing quota settings.
When reviewing the list of selected and available protection storage systems, consider the following:
● It is not recommended that policy objectives share protection storage systems because this configuration does not
increase data availability. However, some environments may require replicas with different retention periods, where multiple
objectives share a protection storage system.
● Only protection storage that has been licensed and configured for use by the current protection policy appears in the
drop-down list.
● Changing protection storage systems for Storage Group protection policies is not supported.
Because PowerProtect Data Manager is unaware of external workflows, the UI issues a warning when you configure a
policy with multiple objectives that share the same protection storage system. This configuration is uncommon, so verify the
storage targets and the use case before you continue.
The UI also issues a warning where the selected storage unit is the source for any MTree replication workflow. This
workflow may belong to another application. Verify the storage targets before you continue. These notifications require
DDOS 7.7 or later.
Steps
1. From the left navigation pane, select Protection > Protection Policies.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets.
Use the icons to switch between a tree view of the vCenter server hierarchy, or a list view of all virtual machine
assets discovered within the vCenter server.
NOTE: For virtual machine assets, you can click the link in the Disk Excluded column next to a virtual machine asset to
view VMDKs that have been excluded from the protection policy. You cannot, however, edit disk inclusion or exclusion
from this window. To change the disks that are excluded for a protected asset, select the policy from the Protection
Policies window and click Edit.
3. Select a protected asset from the table, and then click View Copies. The Copy Locations pane identifies where the
backups are stored.
4. Click next to the asset type icon. The table in the right pane lists the backup copies.
5. Select one or more backup copies from the table and click Edit Retention.
NOTE: If the deletion of an asset backup copy fails, the Copy Status is changed from Available to another state, and
as a result the Edit Retention button is disabled. The Edit Retention button is enabled only when the Copy Status is
Available.
Steps
1. From the left navigation pane, select Protection > Protection Policies.
The Protection Policies window opens.
2. Review the information displayed in the Last Run Status column for the protection policy.
3. Optionally, click the last-run status link of the protection policy to view the Protection Jobs window for more information
about the job .
NOTE: The Protection Jobs window displays only the most recently run protection jobs. To view the most recently run
system jobs, select Jobs > System Jobs from the left navigation pane to view the System Jobs window.
Steps
1. From the PowerProtect Data Manager UI, select Protection > Protection Policies.
2. Select the protection policy for which you would like to export the protection records.
If you do not select a protection policy, PowerProtect Data Manager exports the protection records for all the protection
policies.
3. Click Run Asset Protection Report.
The Export Asset Protection window appears.
4. Specify the following fields for the export:
a. The Time Range.
The default is Last 24 hours.
This refers to the last complete midnight-to-midnight 24-hour period; that is, yesterday. So, any events that have
occurred since the most recent midnight are not in the CSV export. For example, if you run the CSV export at 9am, any
events that have occurred in the last 9 hours are not in the CSV export. This is to prevent the overlapping of or partial
exporting when queried mid-day on a regular or irregular basis.
b. The Job Status.
c. Click Download.
If applicable, the navigation window appears for you to select the location to save the .csv file.
5. If applicable, save the .csv file in the desired location and then click Save.
NOTE: When you create an SLA for Cloud Tier, you can include only full backups in the SLA.
NOTE: The Extended Retention objective was removed in PowerProtect Data Manager 19.12. Protection policies that
were created in earlier releases with the Extended Retention SLA are unsupported in releases 19.15 and later. The Dell
Knowledge Base article KB204454 provides more information about migrating these policies.
In the SLA Compliance window, you can export compliance data by using the Export All functionality.
Steps
1. From the PowerProtect Data Manager UI, select Protection > SLA Compliance.
The SLA Compliance window appears.
2. Click Add or, if the assets that you want to apply the SLA to are listed, select these assets and then click Add.
The Add Service Level Agreement wizard appears.
3. Select the type of SLA that you want to add, and then click Next.
● Policy. If you choose this type, go to step 4.
● Backup. If you choose this type, go to step 5.
● Replication. If you choose this type, go to step 6.
● Cloud Tier. If you choose this type, go to step 7.
You can select only one type of Service Level Agreement.
4. If you select Policy, specify the following fields regarding the purpose of the new Policy SLA:
a. The SLA Name.
b. If applicable, select Minimum Copies, and then specify the number of Backup, Replication, and Cloud Tier copies.
c. If applicable, select Maximum Copies, and then specify the number of Backup, Replication, and Cloud Tier copies.
d. If applicable, select Available Location and then select the applicable locations. To add a location, click Add Location.
Options include the following:
● In—Include locations of all copies in the SLO locations. Selecting this option does not require every SLO location to
have a copy.
● Must In—Include locations of all copies in the SLO locations. Selecting this option requires every SLO location to
have at least one copy.
● Exclude—Locations of all copies must be non-SLO locations.
NOTE: Policy files backed up on a storage unit with indefinite retention hold (IRH) enabled cannot be deleted or
modified, even after retention lock expiry. It is recommended that you do not select the Maximum Copies option,
because it conflicts with IRH. Otherwise, the SLA does not complete successfully when the number of copies
exceeds the specified number.
c. If applicable, select Compliance Window for copy type, and then select a schedule level from the list, for example,
All, Full, Cumulative, and then set the duration. Duration indicates the amount of time necessary to create the backup
copy. Ensure that the Start Time and End Time of backup copy creation falls within the Compliance Window duration
specified.
This window specifies the time during which you expect the specified activity to take place. Any specified activity that
occurs outside of this Start Time and End Time triggers an alert.
d. If applicable, select Verify expired copies are deleted.
Verify expired copies are deleted is a compliance check to see if PowerProtect Data Manager is deleting expired
copies. This option is disabled by default.
NOTE: Data that is backed up on a storage unit with IRH enabled cannot be deleted or modified, even after
retention lock expiry. It is recommended that you do not select Verify expired copies are deleted, because it
conflicts with IRH. Otherwise, the SLA does not complete successfully.
e. If applicable, select Retention Time Objective, and then specify the number of Days, Months, Weeks, or Years.
NOTE: The value of Retention Time Objective must match the lowest retention value of the backup levels of the
target objectives of this policy. For example, if the synthetic full backup Retain For is 30 days but the full backup
Retain For is 60 days, set the Retention Time Objective to 30 days.
d. If applicable, select Retention Time Objective, and then specify the number of Days, Months, Weeks, or Years.
NOTE: Set the value of Retention Time Objective to match the lowest retention value of the backup levels of the
target objectives of this policy.
13. In the Jobs window, click next to an entry to view details on the SLA Compliance result.
Steps
1. From the PowerProtect Data Manager UI, select Protection > SLA Compliance.
The SLA Compliance window appears. The PowerProtect Data Manager SLA Compliance window displays the following
information:
● SLA Name
● Stage Type
● Policies At Risk
● Objectives Out of Compliance
● Impacted Assets
2. Select the SLA for which you would like to export the compliance records.
3. Click Run Compliance Report.
The Run Compliance Report window appears.
4. Specify the following fields for the export:
Steps
1. From the left navigation pane, select Protection > Protection Policies.
The Protection Policies window opens.
2. Select one or more policies in Enabled state. You can also select the checkbox at the top of the table to select all policies on
the current page.
3. Click Disable.
Results
The policy status changes to Disabled. In Disabled state:
● In progress primary backup jobs that are associated with this policy continue to run until complete. If primary backups are
scheduled to run during the time that the policy is disabled, those backups do not run, even when you enable the policy
again. When you re-enable the policy, future scheduled backups resume.
● All other protection jobs for the policy continue to run according to schedule, unless no primary backup copy exists for the
policy. In this case, protection jobs are skipped.
● Manual backups of primary objectives can still be performed.
Steps
1. From the PowerProtect Data Manager UI, select Protection > Protection Policies.
2. Select one or more policies in Disabled state. You can also select the checkbox at the top of the table to select all policies
on the current page.
3. Click Enable.
Results
The status changes to Enabled. Primary backups for the reenabled policies resume according to the protection policy schedule.
Prerequisites
If the policy you want to delete protects assets, you must associate those assets with a different protection policy before you
can delete the policy.
Steps
1. From the PowerProtect Data Manager UI, select Protection > Protection Policies.
2. Select the policy that you want to delete, and then click Delete.
Results
After you delete a policy, clean-up of unnecessary components within protection storage occurs automatically according to
schedule. Clean-up includes storage units under the control of PowerProtect Data Manager and the corresponding DD Boost
users, according to the rules for storage units.
Prerequisites
● Ensure that a protection storage system is set up for Cloud Tiering, with the system passphrase set.
● Cloud storage units must be pre-configured on the protection storage system before they are configured for Cloud Tier in
the PowerProtect Data Manager UI.
● A data movement schedule must be configured and running on the cloud storage unit.
● The Cloud Tier objective can be added to the Primary Backup and Replicate objectives. The Primary Backup and
Replicate objectives should be using the protection storage system that is set up for Cloud Tiering
Steps
1. Log in to the PowerProtect Data Manager user interface as a user with the Administrator role.
2. From the PowerProtect Data Manager UI, select Protection > Protection Policies, and then click Add.
The Add Policy wizard appears.
3. On the Type page, enter a name and description, select the type of system to back up, and click Next.
The following protection policy types support Cloud Tiering:
7. Click Cloud Tier next to Primary Backup or, if adding a Cloud objective for a replication objective that you have added,
click Cloud Tier under Replicate.
An entry for Cloud Tier is created to the right of the primary backup objective, or below the replication objective.
8. Under the entry for Cloud Tier, click Add.
The Add Cloud Tier Backup dialog appears, with summary information for the parent node. This information indicates
whether you are adding this Cloud Tier objective for the primary backup objective or the replication objective.
9. In the Add Cloud Tier Backup dialog box, set the following parameters and then click Save:
● Select one or more of the upstream full backups.
● Select the appropriate Cloud Unit from the Cloud Target list.
● For Tier After, set a time of 14 days or more.
The protection policy is now enabled with Cloud Tiering.
NOTE: If the retention period of a copy is less than the time specified in the Tier After field, and you do not edit the
Retain for value of this schedule or its copy to a value greater than the Tier After field before the retention period of
the copy expires, the copy will not be cloud tiered.
10. Click Next to proceed with the remaining pages of the Add Policy wizard, verify the information, and then click Finish.
A new job is created, which you can view under the Jobs tab after the job completes.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets.
2. Select an asset and click View Copies.
3. Click an asset copy icon.
Cloud Tier backups are listed by cloud storage in the Location column.
4. To change how long copies remain in cloud storage, complete the following steps:
a. Select a Cloud Tier backup and click Edit Retention.
b. Choose one of the following options:
● To select a calendar date as the expiration date for backups, select Retention Date.
● To define a fixed retention period in days, weeks, months, or years after the backup is performed, select Retention
Value. For example, you could specify that backups expire after 6 months.
● To override the retention lock for the backup copy, select Disable Retention Lock Governance. Overriding the
retention lock allows you to reduce the retention period or to delete the backup copy before its expiration date.
c. When satisfied with the changes, click Save.
The asset is displayed in the list with the changes. The Retention column displays both the original and new retention
period, and indicates whether the retention period has been extended or shortened.
5. To delete the copy in cloud storage, select a Cloud Tier backup and click Delete. To delete the copy records from
the PowerProtect Data Manager database while the copy remains in the protection storage, select Remove from
PowerProtect.
Delete backup copies and Remove Exchange, File System, Kubernetes, Block Volume, and SQL backup copies from the
PowerProtect Data Manager database provides more information.
6. Select a Cloud Tier backup and click Recall from Cloud to return the cloud backup to your local protection storage for
recovery or backup.
NOTE: If you use Amazon's network to copy data from AWS storage, Amazon charges you for the data transfer.
7. To extend the date to retier the copy back to the cloud, select Edit Recall Retention.
8. To manually move a copy back to cloud storage, select Retier.
Prerequisites
NOTE: When a backup is recalled from Cloud Tier to the active tier, the copy is removed from Cloud Tier.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets.
2. On the Assets window, select the tab that contains the asset you want to recall from Cloud Tier, and then click View
Copies.
3. Click DD, and then select from one of the available copies that appear in the table.
4. Click Recall.
The Recall from Cloud dialog box appears.
5. In the Retain until box, specify how long you want to keep the copy on the active tier, and then click OK.
6. Go to the Jobs window to monitor the recall operation.
When the copy has been moved successfully, the Location changes from Cloud to Local.
7. Select Restore > Assets, and then select the tab that contains the recalled asset.
8. Select the recalled asset, and then click Restore.
NOTE: If you are unsure whether the asset has been recalled, click View Copies and select DD to view the available
backup copies. If the asset backup is a recalled copy, the Status column indicates Local Recalled.
9. Select the recalled copy to re-tier the copy to the active tier.
Steps
1. From the left navigation pane, select Protection > Protection Policies.
The Protection Policies window appears.
2. Select the protection policy that contains the assets that you want to back up, and click Protect Now.
The Protect Now wizard appears.
3. On the Assets Selection page, select whether you want to back up all assets or choose individual assets that are defined in
the protection policy, and then click Next.
If you selected the option to choose individual assets for manual backup instead of all assets, the Assets page appears with
the individual assets available for selection.
a. Select the assets that you want to include in the manual backup, and then click Next to display the Configuration page.
If you selected to back up all assets, the Configuration page appears.
4. On the Configuration page, select Back up now, and then select from the available backup types.
5. Edit the retention period if you want to change the default settings, and then click Next.
The default settings are inherited from the primary backup objective of the parent protection policy.
6. You can select Troubleshooting mode to enable debug logging, and then select the level of logging to use:
● Info—Includes information such as status changes. This is the default log level for scheduled backups and restores.
● Debug—Additional information that helps with problem diagnosis.
● Trace—The most detailed amount of information for complex problem diagnosis.
7. On the Summary page, review the settings and then click Protect Now.
A notification appears indicating whether the request was processed successfully.
Steps
1. From the left navigation pane, select Infrastructure > Assets.
The Assets window appears.
2. Select the tab for the asset type you want to back up.
A list of assets appears.
3. Select an asset from the table that has an associated protection policy.
4. Click Back Up Now.
A notification appears indicating whether the request was processed successfully.
Prerequisites
The protection policy purpose must not be Exclusion, and the policy must already be configured with a replication objective.
You can only manually replicate the replication objectives for the primary backup.
Steps
1. From the PowerProtect Data Manager UI, select Protection > Protection Policies.
2. Select the protection policy that contains the assets that you want to replicate, and click Protect Now.
The Protect Now wizard opens to the Assets Selection page.
3. Select whether you want to replicate All Assets or a Custom selection of assets.
● If you selected All Assets, click Next.
● If you selected Custom, a list appears from which you can select individual assets. You can see these assets in tree view
or list view.
a. Select the assets that you want manually replicate, and then click Next.
The Configuration page appears.
4. Select Replicate Now.
5. Select a destination storage target from the Storage Name and Storage Unit drop-down lists.
The selection of storage system and storage unit from these drop-down lists corresponds to the associated replication
objective for the primary backup. In some cases, a protection storage system may have more than one storage unit for this
policy.
The wizard loads the default settings from the protection policy.
6. If you want to change the default settings:
● You can configure different retention periods for all applicable backup types, or configure the same retention period for
all backup types.
8. (Optional) Click Select Replication and then repeat the previous steps to configure manual replication for additional
replication policy objectives.
9. Click Next.
10. On the Summary page, review the settings and then click Protect Now.
A notification appears indicating whether the request was processed successfully.
NOTE: Manual Cloud Tiering of a copy set requires the related protection policy to have a Cloud Tier objective.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets.
2. From the Assets window, select the tab for the asset type for which you want to delete copies. If a policy has been
assigned, the table lists the assets that have been discovered, along with the associated protection policy.
3. Select a protected asset from the table, and then click View Copies. The Copy Locations pane identifies where the
backups are stored.
4. Click next to the asset type icon. The table in the right pane lists the backup copies.
5. Select one or more copies from the table that you want to delete from the DD system, and then click Delete.
A preview window opens and displays the selected backup copies.
NOTE: For assets with backup copies that are chained together such as Microsoft SQL Server databases, Oracle
databases, SAP HANA databases, and application-aware virtual machines, the preview window lists all the backup copies
that depend on the specified backup copy. If you delete a backup copy, PowerProtect Data Manager deletes the
specified backup copy and all backup copies that depend on the specified backup copy.
6. For all asset types, you can choose to keep the latest backup copies or delete them. By default, PowerProtect Data Manager
keeps the latest backup copies. To delete the latest backup copies, clear the checkbox next to Include latest copies.
7. To delete the backup copies, in the preview window, click Delete.
NOTE: The delete operation may take a few minutes and cannot be undone.
An informational dialog box opens to confirm that the copies are being deleted. To monitor the progress of the operation,
click Go to Jobs. To view the list of backup copies and their status, click OK.
NOTE: If the data deletion is successful but the catalog deletion is unsuccessful, then the overall deletion job status
appears as Completed with Exceptions.
When the job completes, the task summary provides details of each deleted backup copy, including the time that each copy
was created, the backup level, and the retention time. The time of copy creation and the retention time are shown in UTC.
An audit log is also generated and provides details of each deleted backup copy, including the time that each copy was
created, the backup level, and the retention time. The time of copy creation and the retention time are shown in the time
zone used by the web browser. Go to Alerts > Audit Logs to view the audit log.
8. Verify that the copies are deleted successfully from protection storage. If the deletion is successful, the deleted copies no
longer appear in the table.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets.
2. From the Assets window, select the tab for the asset type for which you want to delete copies. If a policy has been
assigned, the table lists the assets that have been discovered, along with the associated protection policy.
3. Select a protected asset from the table, and then click View Copies. The Copy Locations pane identifies where the
backups are stored.
4. In the left pane, click to the right of the icon for the asset. The table in the right pane lists the backup copies.
5. Select one or more backup copies with the Deletion Failed status from the table, and then click Delete.
You can also filter and sort the list of backup copies by status in the Copy Status column.
The system displays a warning to confirm that you want to delete the selected backup copies.
6. Click OK.
An informational dialog box opens to confirm that the copies are being deleted. To monitor the progress of the operation,
click Go to Jobs. To view the list of backup copies and their status, click OK.
Export data for deleted Oracle and SAP HANA backup copies
This option enables you to export results of deleted backup copies to a .csv file so that you can download an Excel file of the
data.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets.
2. From the Assets window, select the tab for the asset type for which you want to export results of deleted backup copies. If
a policy has been assigned, the table lists the assets that have been discovered, along with the associated protection policy.
3. Select one or more protected assets from the table, and then select More Actions > Export Deleted Copies.
If you do not select an asset, PowerProtect Data Manager exports the data for deleted backup copies for all assets for the
specific asset type.
4. Specify the following fields for the export:
a. Time Range
The default is Last 24 Hours.
b. Copy Status
In order to export data for deleted backup copies, the backup copies must be in one of the following states:
● Deleted—The copy is deleted successfully from protection storage, and, if applicable, the agent catalog is deleted
successfully from the agent host.
● Deleting—Copy deletion is in progress.
● Deletion Failed—Copy deletion from protection storage is unsuccessful.
● Deletion Failed (Agent Catalog)—The copy is deleted successfully from protection storage, but is not deleted
from the agent host.
NOTE: This state is not applicable to virtual machine and Kubernetes backup copies.
NOTE: You cannot export data for backup copies that are in an Available state.
5. Click Download.
If applicable, the navigation window appears for you to select the location to save the .csv file.
6. Save the .csv file in the desired location and click Save.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets.
2. From the Assets window, select the tab for the asset type for which you want to delete copies. If a policy has been
assigned, the table lists the assets that have been discovered, along with the associated protection policy.
3. Select a protected asset from the table, and then click View Copies. The Copy Locations pane identifies where the
backups are stored.
4. In the left pane, click to the right of the icon for the asset. The table in the right pane lists the backup copies.
The manual removal of assets allows for the following increased control over the process:
● The asset can be removed on demand.
● The status of the asset can be Not Detected.
● All protection copies of the asset, including replicated and cloud tiered copies, can be manually removed, followed by the
manual removal of the asset.
● All protection copies of the asset can be automatically removed, if this option is selected during manual asset removal from
PowerProtect Data Manager,
Prerequisites
● The asset has a status of Deleted or Not Detected.
● The asset has no protection copies. If copies still exist in the storage system for the asset, you can delete these copies
before following the steps in this procedure or select an option to automatically delete the copies when the asset is
removed. For information on deleting backup copies, see Delete backup copies.
Steps
1. Select Infrastructure > Assets.
2. Select the tab that corresponds to the type of assets that you want to remove. For example, for vCenter virtual machine
assets, click Virtual Machine.
Assets that are associated with protection copies of this type are listed. By default, only assets with Available or Not
Detected status display. You can also search for assets by name.
3. Select one or more assets from the list. and then click More Actions > Remove Asset.
The Remove Assets dialog displays.
4. Select from one of the following options:
NOTE: All of these options might not display for the selected assets. The available options depend on the protection
copy status of the selected assets.
● Remove assets and associated protection copies—removes these assets from PowerProtect Data Manager, and
automatically removes any protection copies for these assets from storage.
● Only remove assets with no associated protection copies—these assets will not be deleted if PowerProtect Data
Manager detects that protection copies for these assets still exist in the storage system.
● Mark "Not Detected" assets as "Deleted" but keep associated protection copies—mark assets with Not
Detected status as Deleted in the PowerProtect Data Manager UI, but retain protection copies for these assets in the
storage system. You can view assets marked as Deleted from the Infrastructure > Assets pane.
5. Click OK to confirm the asset removal.
The backup copies cannot be replicated because the username and password for the source
storage system are not valid or cannot be detected.
This failure might happen intermittently, while most backup and replication jobs complete without failure and DD systems are
successfully discovered.
To resolve this issue, perform the following steps:
1. Collect a DD support bundle and search /ddvar/log/messages for Failed password or Invalid user.
NOTE: For instructions on collecting the support bundle, see the DDOS Administration Guide.
2. If the search text is found, you see entries similar to the following:
Oct 15 16:36:26 <DD hostname> sshd[25116]: Failed password for sysadmin from <IP
address> port 55351
Oct 11 11:18:00 <DD hostname> sshd[31750]: Invalid user <username> from <IP address>
port 64425
3. Locate the asset-source host using <IP address> and correct the credentials that it is using to connect to the DD
system.
NOTE: In this example, <DD_System> is replaced by the hostname of the replication DD system.
"fingerprint":"473303EFF3EFE6D6AAC2D76F1FB94561B12A321F","host":"<DD_System>","id":"ZG
1vYmstcGRiMDAwMS1wLmQuaW50LmluZnJhLjdhbmRpLmNvLmpwOjMwMDk6aG9zdA==","issuerName":"CN=<
DD_System>, OU=Root CA, O=Valued Datadomain Customer, L=Santa Clara, ST=CA,
C=US","notValidAfter":"Sun Dec 07 15:28:39 JST 2025","notValidBefore":"Mon Dec 09
00:28:39 JST 2019","port":"3009","state":"UNKNOWN","subjectName":"CN=<DD_System>,
O=Valued DataDomain customer, OU=Host Certificate, ST=CA, C=US","type":"HOST"
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets or Restore > Assets.
2. Select the tab that corresponds to the type of assets that you want to view. For example, for vCenter virtual machine
assets, click Virtual Machine.
Assets that are associated with protection copies of this type are listed. By default, only assets with Available or Not
Detected status display. You can also search for assets by name.
For virtual machines, you can also click the File Search button to search on specific criteria.
NOTE: In the Restore > Assets window, only tabs for asset types supported for restore within PowerProtect Data
Manager display. Supported asset types include the following:
● Virtual Machine
● File System
● Kubernetes
● Network Attached Storage (NAS)
● Oracle
● SQL
● Block Volumes
When you click a child node, the right pane displays the following information:
If indexing has not been configured for a backup copy, or if global expiration has been configured and indexed disks or
files have been deleted before the backup copy expiration date, the File Indexing column displays N/A.
Prerequisites
Ensure that:
● The PowerProtect Data Manager version that is deployed on your system and the backups you are using for the restore
match.
● The network configuration is the same on the newly deployed PowerProtect Data Manager system as on the failed instance
that you are restoring.
Steps
1. Deploy the PowerProtect Data Manager OVA and power it on.
2. Select Restore Backup.
To delay jobs defined by your protection policies until otherwise specified, select After restore, keep the product in
recovery mode so that scheduled workflows are not triggered. When selected, after restore the system enters
recovery maintenance mode. During recovery maintenance mode:
● All jobs defined by your protection policies that modify the backup storage (for example, backup creation, backup
deletion, and PowerProtect Data Manager Server DR jobs) are not triggered.
● All operations that write to the backup storage are disabled.
To enable automatically scheduled operations and user operations that write to the backup storage, click Return to full
Operational mode in the alert.
3. Specify the following storage information:
a. DD system IP where the recovery backups are stored.
b. DD NSF Export Path where the recovery backups are stored.
c. Click Connect.
4. Select the PowerProtect Data Manager instance that you would like to restore, and then click OK.
5. Select the backup file that you would like to use for recovery, and then click Recover.
6. Specify the lockbox passphrase associated with the backup, and start the recovery.
This step initiates the recovery and display the progress status. The recovery process can take approximately eight minutes
before the URI is redirected to the PowerProtect Data Manager login.
Results
The PowerProtect Data Manager server is recovered.
Next steps
After a successful recovery:
● The time zone of the PowerProtect Data Manager instance is set to the same as that of the backup.
● All preloaded accounts are reset to default passwords, as described in the PowerProtect Data Manager Security
Configuration Guide. The preloaded UI administrator account is an exception and retains its password. Change the
passwords for all preloaded accounts as soon as possible.
Prerequisites
NOTE: When a backup is recalled from Cloud Tier to the active tier, the copy is removed from Cloud Tier.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets.
2. On the Assets window, select the tab that contains the asset you want to recall from Cloud Tier, and then click View
Copies.
3. Click DD, and then select from one of the available copies that appear in the table.
4. Click Recall.
The Recall from Cloud dialog box appears.
5. In the Retain until box, specify how long you want to keep the copy on the active tier, and then click OK.
9. Select the recalled copy to re-tier the copy to the active tier.
System recovery
System recovery creates point-in-time snapshots of the PowerProtect Data Manager server in protection storage. During a DR
activity, recover the server from protection storage and then restore protected assets.
System recovery for server DR provides more information.
Quick recovery
Quick recovery makes a remote PowerProtect Data Manager replication destination aware of replicated backups and enables
the recovery view. During a DR activity, you can restore assets from these replicated backups at the destination without first
restoring the source server.
Quick recovery for server DR provides more information.
a. Optionally, you can configure a second server and leave this server unconfigured to decrease the RTO for system
recovery. However, the RTO for system recovery cannot match the RTO for quick recovery or Cloud DR.
b. Configuration of server DR replication.
Automatic server DR
New deployments of PowerProtect Data Manager automatically configure and enable server DR with minimal input. This process
ensures that the server is protected as soon as you add protection storage.
Automatic server DR detects when you first add a protection storage system. The automatic configuration mechanism uses
the recommended DD Boost storage type and default settings to create a managed storage unit for server DR. This process
generates server DR jobs that you can track through the Jobs page.
Automatic configuration selects the first protection storage system that you add to PowerProtect Data Manager. However, you
can configure server DR to change the target to another protection storage system or enable replication. Manually configure
server DR backups provides instructions. Manual configuration of the backup target is not recommended unless you must target
a different protection storage system.
If automatic server DR fails, Manually configure server DR backups provides an alternate method to configure server DR. The
job details provide information that you can use to troubleshoot the configuration process.
Prerequisites
Add the DD system as protection storage. Protection storage provides instructions. If you plan to replicate server DR backups,
the replication target must be a different protection storage system.
NOTE: If PowerProtect Data Manager was updated from version 19.14 or earlier where NFS was configured, NFS can
continue to be used as a backup protocol. Otherwise, only DD Boost is available and it is used by default.
Steps
1. Log in to the PowerProtect Data Manager user interface as a user with the Administrator role.
Results
For DD Boost, PowerProtect Data Manager creates system jobs to prepare the new storage unit and to configure the server DR
protection policy.
For both storage types, PowerProtect Data Manager creates a system job for the first server DR backup.
If you configured replication, PowerProtect Data Manager creates a DD Boost user and storage unit on the destination. Server
DR backups begin replicating according to the protection schedule.
Next steps
Verify that the system jobs succeed.
Steps
1. If PowerProtect Data Manager is deployed to vSphere, record the port groups:
a. Log in to the vSphere client.
b. Right-click the name of the virtual appliance and select Edit Settings.
c. Record the port group settings that are assigned to PowerProtect Data Manager.
This information is useful when restoring to the same VMware environment.
2. Record the PowerProtect Data Manager FQDN.
3. Log in to the PowerProtect Data Manager user interface as a user with the Administrator role.
Results
The backup appears as an entry in the table. To view details for the backup, click .
If the Search Engine is deployed,PowerProtect Data Manager also backs up the Search Engine. The backup details
provide the status of the Search Engine backup.
To monitor the status of the backup, select Jobs > Protection and look for a job with the name Protect the server
datastore.
4. To delete a backup:
a. Select a backup from the list.
b. Click for that row.
The system displays a warning to confirm you want to delete the backup. Click Yes to proceed.
5. Click Cancel.
Prerequisites
● The version of the PowerProtect Data Manager backup is the same as the version of the PowerProtect Data Manager in
production.
● .Only the Administrator role can carry out the recovery.
● Ensure that all the information listed in Record settings for server DR is available.
● Ensure that the FQDN of the PowerProtect Data Manager is the same as the host name.
● To restore data from NFS, PowerProtect Data Manager has been updated from version 19.14 or earlier where NFS was
configured.
● To restore data from DD Boost, ensure that you have the current password for the PowerProtect Data Manager UI
predefined administrator account. If you do not know this password, contact Customer Support.
● To restore data from a server DR replica, ensure that you have the IP address or FQDN for the replication target, the
PowerProtect Data Manager hostname, and the current password for the PowerProtect Data Manager UI predefined
administrator account.
● If the Search Engine or reporting engine nodes from the previous PowerProtect Data Manager deployment are still hosted
on the vCenter server, delete the Search Engine and reporting engine nodes from the vCenter server before you recover the
PowerProtect Data Manager system. The recovery process redeploys the Search Engine and reporting engine nodes as part
of the recovery operation.
● The recovery process does not automatically redeploy protection engines. After recovery, redeploy the protection engines.
NOTE: If the recovery system has a different FQDN, see Troubleshoot recovery of PowerProtect Data Manager.
If a Search Engine is present in the recovery backup when you recover the PowerProtect Data Manager system, the Search
Engine is automatically recovered.
b. Under Select File, enter the DD System and NFS Export Path where the backup is located, and then click Connect.
A list of the available recovery backups appears.
6. To restore data from DD Boost:
a. For Protocol, select DDBoost.
b. Type the hostname or IP address for the protection storage system that stores server DR backups.
c. If the hostname is not already populated, type the hostname for the original PowerProtect Data Manager system.
d. To restore from a server DR replica, append /R to the hostname.
For example, system1.example.com/R.
e. Type the password for the predefined administrator account (admin) of the original PowerProtect Data Manager.
f. Click Connect.
A list of the available recovery backups appears. If restoring data from a replica, the list of backups includes those on the
replica.
7. Select the backup from which to recover the system, and then click Recover.
The recovery starts. Recovery can take a few minutes.
NOTE: There is no busy indicator during the recovery process. The current recovery state can be monitored from the
text displayed in the recovery window.
Results
When recovery is complete:
● The PowerProtect Data Manager login page appears.
● The time zone of the PowerProtect Data Manager instance is set to that of the backup.
● If restoring from a replica, the replication target protection storage system is configured as the new server DR backup
target.
● All preloaded accounts are reset to default passwords, as described in the PowerProtect Data Manager Security
Configuration Guide. The preloaded UI administrator account is an exception and retains its password. Change the
passwords for all preloaded accounts as soon as possible.
● Backup copies that were created after the Server DR recovery backup used in the recovery process are discovered after the
server is recovered. However, any backup copies that had replication or cloud tier copies before the recovery operation are
replicated or cloud tiered during the next manual or scheduled job.
● If a VMware Virtual Machine, Block Volume, or NAS protection policy is configured, a copy discovery operation
is automatically performed. Copy discovery ensures that any backups taken between the times of recovery start and
completion are reconciled on the recovered server. Depending on the amount of data backed up in this time period, copy
discovery can take minutes or hours. Each type of configured protection policy that triggers the copy discovery operation is
logged as a Post Restore Copy Discovery job group in the System Jobs window.
Prerequisites
Obtain the name of the Search cluster backup from System Settings > Disaster Recovery > Manage Backups.
Steps
1. Log in to the PowerProtect Data Manager user interface as a user with the Administrator role.
Use the same credentials that you used before PowerProtect Data Manager was restored.
2. Connect to the PowerProtect Data Manager console as an admin user.
3. Change directories to /data01/server_backups/<PowerProtect Data Manager Hostname>_<NodeID> to
locate the backup manifest file.
Normally, there is only a single subdirectory in /data01/server_backups, so change to that subdirectory. However, if
there is more than one subdirectory and you don't know which <NodeID> is the correct one, perform the following substeps:
a. From /data01/server_backups, run the following commands, changing the username and password as required:
{
"id": "ca8cbb13-6f3d-4ac5-87e5-de47a634379f",
In summary:
● remove all lines with the // DELETE LINE comment entry displayed here
● add recover: true
● change Components to components
● remove all listed component blocks except for Search Cluster
● remove the trailing comma from "backupsEnabled": true,
The result of these changes should look similar to the following:
{
"id": "ca8cbb13-6f3d-4ac5-87e5-de47a634379f",
"creationTime": "2022-08-25T19:38:54.622275+0000",
"elapsedSeconds": 11,
"sequenceNumber": 2,
"sizeInBytes": 29759075,
"recover" : true,
"components": [
{
"name": "SearchCluster",
"id": "ca7cbb13-6f3d-4ac5-87e5-de47a634379f",
"lastActivityId": "198a93b1-7382-474b-89c8-c7b6b0ab4987",
"version": "v2",
7. Copy the value of the text inside the quotation marks that follow "id":.
This value replaces the variable <backupID> used in step 11. In this example, <backupID> is ca8cbb13-6f3d-4ac5-87e5-
de47a634379f.
8. Remove all carriage returns from the temporary file, so that all the text is on a single line.
9. Copy all of the text from the temporary file.
This value replaces the variable <manifestText> used in step 11.
10. Run the following command, changing the username and password credentials as required:
NOTE: Even if you ran this command in step 3.a, run it again. The validity of the value of TOKEN is time sensitive.
Next steps
Delete the temporary file created in step 4.
Steps
1. Disable Server DR backups.
2. Log in to the PowerProtect Data Manager server by using SSH.
3. Run the following command:
sudo umount /data01/server_backups
4. For each Search Engine node, perform the following substeps:
a. Log in to the Search Engine node by using SSH.
b. Run the following command:
sudo umount /mnt/PPDM_Snapshots
5. Remove the DD system from PowerProtect Data Manager:
a. From the PowerProtect Data Manager UI, select Infrastructure > Storage.
Steps
1. Disable Server DR backups.
2. Log in to the PowerProtect Data Manager server by using SSH.
3. Run the following command:
ps aux | grep /data01/server_backups | grep boostfs
Make a note of the process ID next to the boostfs entry in the command output.
4. Run the following command, replacing <processID> with the process ID obtained in step 3:
sudo kill -9 <processID>
5. Run the following command:
sudo umount /data01/server_backups
6. For each Search Engine node, perform the following substeps:
a. Log in to the Search Engine node by using SSH.
b. Run the following command:
sudo umount /mnt/PPDM_Snapshots
7. Remove the DD system from PowerProtect Data Manager:
a. From the PowerProtect Data Manager UI, select Infrastructure > Storage.
b. Select the DD system to remove.
c. Click Delete.
8. Add the DD system back to PowerProtect Data Manager.
9. Enable server DR backups.
DD storage unit mount command failed with error: 'Cannot mount full path: Access
is denied'
This error message appears when an NFS export does not exist on the DD system for the full path to the server DR storage
unit. This error message also appears when the redeployed virtual appliance was not added as a client for access to the NFS
export.
To resolve this issue, ensure that you have configured an NFS export for the full path of the DD Boost storage unit and that the
virtual appliance is an Export client.
Steps
1. On the DD system where the backup is located, delete the replication pair and mount it for PowerProtect Data Manager.
2. When recovery is complete, on PowerProtect Data Manager, regenerate the certificates using the following command.
sudo -H -u admin /usr/local/brs/puppet/scripts/generate_certificates.sh -c
3. Restart the system and select the URL of the primary PowerProtect Data Manager system.
The https://PowerProtect Data Manager IP/#/progress page appears and recovery resumes.
4. Log in to the primary PowerProtect Data Manager.
The PowerProtect Data Manager VM vCenter console shows an error, which you can ignore.
5. Open the primary PowerProtect Data Manager using the original IP address and log in.
Results
Recovery is complete.
Steps
1. Log in to the PowerProtect Data Manager user interface as a user with the Administrator role.
Next steps
After completing the maintenance procedure, re-enable server DR backups. The manual configuration procedure provides
instructions.
Quick Recovery does not support restoring user data at the file or folder level.
Quick recovery sends metadata from the local system to the remote system, following the flow of backup copies. This
metadata enables recovery view on the remote system. You can recover your workloads at the remote site before you have the
opportunity to restore the local PowerProtect Data Manager system.
For example, the following figures show two sites that are named A and B, with independent PowerProtect Data Manager
and DD systems for protection storage. Each site contains unique assets. Figure Separate datacenters, before disaster shows
the initial configuration with both sites replicating copies to each other. Figure Separate datacenters, after disaster shows
the result, with site A down. The site A assets have been restored with quick recovery into the site B environment from the
replicated copies.
PowerProtect Data Manager supports quick recovery for alternate topologies. You can configure quick recovery for one-to-
many and many-to-one replication. For example, the following figure shows a local system PowerProtect Data Manager
replicating to a standby remote DD system with its own PowerProtect Data Manager, all in the same data center. If the
local system fails, the quick recovery feature ensures that you can still restore from those replicated copies before you restore
the source.
The following topics explain the prerequisites, how to configure PowerProtect Data Manager to support quick recovery, and
how to use the recovery view to restore assets.
Steps
Next steps
On the remote system:
● Wait for synchronization to complete by looking for the availability of the virtual machine.
● Enable the same asset sources that are enabled on the local system. For more information, see Enable an asset source.
Enabling an asset source on the remote system makes replicated backups of that type visible and accessible.
● Open the recovery view and verify that backups are visible and accessible. It is recommended that you perform a test
restore.
Steps
On the remote system, log in as a user with the Administrator role. The remote server displays on the banner.
Click and select Remote Systems. PowerProtect Data Manager displays a drop-down that contains the name of the local
system and any connected systems. Each entry has the identifying suffix (Local) or (Remote).
Select the local system from which you have replicated backups. PowerProtect Data Manager opens the remote view and
presents a subset of the regular UI navigation tools:
● Restore
○ Assets— Shows replicated copies.
○ Running Sessions— Allows you to manage and monitor Instant Access sessions.
● Alerts— Shows alert information in a table, including audit logs.
● Jobs— Shows the status of any running restore jobs.
This error indicates that the password on the remote PowerProtect Data Manager system has changed.
To resolve this issue, change the credentials that are used for the remote PowerProtect Data Manager system.
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Alerts, and then select the Alert Notifications tab.
The Alert Notifications window appears with a table that displays the details for existing notifications.
2. Click Add.
The Add Alert Notification dialog appears.
NOTE: The Add button is disabled until you set up the email server. To add an alert notification, set up the email server
in System Settings > Support > Email Setup. Set up the email server provides more information.
3. In the Name field, type name of the individual or group who will receive the notification email.
4. In the Email field:
a. Specify the email address or alias to receive notifications. This field is required in order to create an alert notification.
Separate multiple entries with a comma.
b. Click Test Email to ensure that a valid SMTP configuration exists.
5. From the Category list, select one of the following notification categories:
● All
● Agent
● Application Host Configuration
● Cloud Tier
● Compliance
● Discover
● Export Application Log
● License
● NAS Server Disaster Recovery
● Protection
● Protection Copy
● Protection Infrastructure
● Protection Policy
● Protection Rule
● Protection Source
Results
The Alert Notifications window updates with the new alert notification. At any time, you can Edit, Delete, or Disable the
notification by selecting the entry in the table and using the buttons in this window.
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Alerts.
You can also click on the top banner, and then click the links to view unacknowledged alerts of all statuses (critical,
warning, and informational), or only the unacknowledged critical alerts.
NOTE: Clicking the New tag displays only the unacknowledged alerts that have been generated within the last 24 hours.
The number that appears next to is the total number of unacknowledged critical alerts over the last 24 hours.
NOTE: If you apply any filters in the table, exported alerts include only those alerts that satisfy the filter conditions.
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Administration > Audit Logs.
The Audit Logs window displays audit information in a table.
2. (Optional) Sort and filter audit information:
3. To view more details about a specific entry, click next to the entry in the table.
● Review the information for the audit log.
● Audit logs display time values in the time zone used by the web browser.
● Optionally, add a note for this audit log in the Notes field.
4. To export an audit log report to a .csv file which you can download as an Excel file, click Export All.
NOTE: If you apply any filters in the table, exported audit logs include only those logs that satisfy the filter conditions.
5. To change the retention period for audit logs, click Set Boundaries, select the number of days from the Days of Retention
menu, and then click Save.
Protection jobs
To view protection jobs and job groups, from the PowerProtect Data Manager UI left navigation pane, select Jobs >
Protection Jobs.
The Protection Jobs window opens to display a list of protection jobs and job groups.
Protection jobs include:
● Cloud Tier
● Cloud Protect
● Consolidated Cloud Snapshot Manager jobs
NOTE: This job type does not apply to SAP HANA databases.
● Export Reuse
● Indexing
● Protect
● Replicate
● Restore
You can monitor and view detailed information for both centralized and self-service backup and restores of database application
assets.
NOTE: The Cancel and Retry options are not available for self-service jobs that are created by database application
agents.
For application assets, the Protect, Restore, and Replicate job types can be monitored at the host or individual asset level.
For all other asset types, the Protect and Replicate job types can be monitored at the host or individual asset level.
Asset jobs
The Asset Jobs window allows you to view all jobs for a specific asset or application agent host, and to view the history of
protection activities at the asset/agent host level.
To view information about assets for which jobs have been run, from the PowerProtect Data Manager UI left navigation pane,
select Jobs > Asset Jobs.
The Asset Jobs window opens to display a list of assets. For application agent assets, you can also view the associated host.
You can filter by asset/host name or by job type.
Examples of asset job types include:
● Application Host Configuration
● Cloud Copy Recover
● Cloud Disaster Recovery
● Cloud Protect
● Cloud Tier
● Config
● Delete
● Disaster Recovery
● Export Reuse
● Indexing
● Manage
● Notify
● Protect
● Push Update
● Replicate
System jobs
To view system jobs and job groups, from the PowerProtect Data Manager UI left navigation pane, select Jobs > System Jobs.
The System Jobs window opens to display a list of system jobs and job groups.
System jobs include:
● Config
● Console
● Delete
● Disaster Recovery
● Cloud Disaster Recovery
● Cloud Copy Recovery
● Discovery
● Manage
● Notify
● System
● Validate
System jobs can be monitored at the job group or job level.
Job information
The main Protection Jobs and System Jobs windows lists basic job information.
The following information is available in the Protection Jobs and System Jobs windows.
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Jobs > Protection Jobs.
2. Click the job ID next to the job name.
The Job ID Summary window opens and lists all jobs as entries in the table.
You can filter, group, and sort the information that appears in the window. Filter, group, and sort jobs provides more
information.
The policy name, job type, and asset type appear at the top of the Job ID Summary window.
The overall job group metrics and details also appear, as shown in the following figure.
Details Click in the Details column to view job statistics and summary information.
Asset Name of the job for the asset.
Status Indicates the current state of the job. A job can be in one of the following states:
● Success
● Completed with Exceptions
● Failed
● Canceled
● Unknown
● Skipped
● Running
● Queued
● Canceling
Size Size of job for the asset.
Data Transferred Total data that is transferred to storage.
Reduction % Total reduction percentage of storage capacity for the job.
Start Time Date and time that the job is scheduled to begin.
End Time Date and time that this job completed.
Error Code If the job did not successfully complete, a numeric error code appears. To view a detailed
explanation, double-click the error code.
Host/Cluster/Group Name The hostname, cluster, or group name that is associated with the asset.
3. To view job details and summary information, click in the Details column next to the job, or expand the entry for the job
group by clicking .
For grouped assets, the Job ID Summary window lists the individual jobs for each asset within the job group.
The right pane appears and displays the following information about the job or task:
● Step Log—Displays a list of steps that have been completed or are in progress for the job or task, and indicates the
amount of time that was required to complete each step. If a job step is still active, the Step Log also provides a more
detailed description about what aspect of the step is being performed.
● Details—Displays statistics and summary information, such as the start time and end time, asset size, duration, and
additional details.
● Error—Displays error details for failed jobs.
● Canceled—Displays details for canceled jobs.
● Skipped—Displays details for skipped jobs.
● Unknown—Displays details for jobs with an unknown status.
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Jobs > Asset Jobs.
By default, the table displays a list of assets for which jobs have been run in the last 24 hours.
The following table describes the asset job details that might appear, depending on which columns have been customized.
A pane displays to the right of the window, as shown in the following figure. At any time, click at the top of the pane to
hide or show the details. This pane displays the following tabs:
● Step Log—Displays a list of steps that have been completed or are in progress for the asset job, and indicates the
amount of time that was required to complete each step. If a job step is still active, the Step Log also provides a more
detailed description about what aspect of the step is being performed.
NOTE: The Step Log and description only displays for jobs related to backup, restore, and disaster recovery
operations.
● Details—Displays statistics and summary information, such as the start time and end time, asset size, duration, and
additional details.
● Error—Displays any errors that occurred if the asset job failed or completed with exceptions
4. If the job failed, was canceled, or completed with exceptions, and is eligible for restarting, select the radio button next to the
asset and click Restart.
5. To export the step log for an asset job, select the radio button next to the asset job and click Export Log, or click Export
All to create a .csv file for all asset jobs.
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Jobs > System Jobs.
2. Click the job ID next to the job name.
The Job ID Summary window opens to display a list of all system jobs or tasks.
You can filter, group, and sort the information that appears in the window. Filter, group, and sort jobs provides more
information.
For jobs and tasks, a table appears at the bottom of the window. The success or failure of individual tasks is indicated in the
Status column. If a failed job or task requires action, a status of Critical appears.
You can view job status and summary information for scheduled discovery of application assets and application systems.
If a discovery job fails, PowerProtect Data Manager displays error details and steps to resolve the issue. An alert is also
generated in the Alerts window.
When you hover over a job or task, the Job ID Summary displays a message for the job to indicate its progress. Depending
on the job and if any issues are detected, one of the following statuses is shown:
● No reported issues—No issues affecting the job.
● Timeout issues—Timeout issues might be affecting the job.
● Connectivity issues—Network connectivity issues might be affecting the job.
● Stats stall issues—Progress for this job is stalled.
The Job ID Summary window provides summary data for specific jobs and tasks in a table view. The following table
describes the columns that might appear in the window. Not all columns will appear in the Job ID Summary window of
every asset type.
Details Click in the Details column to view job or task statistics and summary information.
Task Name Name of the task.
Status Indicates the current state of the job or task. A job or task can be in one of the following
states:
● Success
● Completed with Exceptions
● Failed
● Canceled
● Unknown
● Skipped
● Running
● Queued
● Canceling
Asset Name of the asset.
Start Time Date and time that the job or task is scheduled to begin.
Duration Overall duration of the job or task.
Data Transferred Total data that is transferred to storage.
3. To view job or task details and summary information, click in the Details column next to the individual job or task.
The right pane appears and displays the following information about the job or task:
● Step Log—Displays a list of steps that have been completed or are in progress for the job or task, and indicates the
amount of time that was required to complete each step. If a job step is still active, the Step Log also provides a more
detailed description about what aspect of the step is being performed.
NOTE: The Step Log and description only displays for jobs related to backup, restore, and disaster recovery
operations.
● Details—Displays statistics and summary information, such as the start time and end time, asset size, duration, and
additional details.
● Error—Displays error details for failed jobs.
● Canceled—Displays details for canceled jobs.
● Skipped—Displays details for skipped jobs.
● Unknown—Displays details for jobs with an unknown status.
Group jobs
In the Protection Jobs and System Jobs windows, select a job to display its Job ID Summary window. The Group by
feature in the Job ID Summary window provides options to group assets within a protection job.
The following asset types support the Group by feature:
● Microsoft SQL Server databases
● Microsoft Exchange Server databases
● Oracle databases
● File Systems
● SAP HANA databases
● Kubernetes clusters
● Network-attached storage (NAS) shares
● VMware Virtual Machines
To group assets in a protection job, in the Job ID Summary window for the job, select an option from the Group By drop-down
list. To display all assets, select Group by > None. For example, to group virtual machine assets by ESX host, click Group by >
ESX Host.
The following table lists the available Group by options:
NOTE: Currently, the Group by filter is only available for the Protect job types.
Search filter
Use the Search field to filter jobs based on a search string. When you type a keyword in the Search field, the PowerProtect
Data Manager UI filters the results as you type. To clear the search filter, remove all keywords from the Search field.
You can filter and sort the information that appears in table columns. Click in the column heading to filter the information in
a table column, or click a table column heading to sort that column.
To see a complete list of filtering and sorting columns, click . Depending on the type of job, the available filtering and sorting
columns might differ.
The following filtering and sorting options are available for jobs and tasks:
Filter jobs by Asset, Status, Error Code, Start Time, or Sort jobs by Asset, Status, Error Code, Size, Data
End Time. Transferred, Reduction %, Start Time, End Time, or
For application assets, you can also filter jobs by Host/ Duration.
Cluster/Group Name. For application assets, you can also sort jobs by Host/
Cluster/Group Name.
NOTE: For application assets, these options are only
available when you select Group by > None. NOTE: For application assets, these options are only
available when you select Group by > None.
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Jobs > Protection Jobs, Jobs > Asset Jobs, or
Jobs > System Jobs.
The window displays all completed and running jobs.
2. To restart a failed job or job group, select the failed job or job group from the list, and then click Restart. If the job is
ineligible for restart, the button will be grayed out.
3. To restart a failed system or protection job or task from the Job ID Summary window:
a. Click the job ID next to the name of the job or job group.
The Job ID Summary window opens to display a list of all jobs or tasks.
b. Select the job or task from the list, and then click Restart.
Results
After the job or task has been restarted, the status indicates Running or Queued.
NOTE: When you restart a protection job that is part of a completed job group, the duration indicated in the Job Metrics
includes the time that elapsed between when the job group completed and when the job was restarted, in addition to the
time it takes for the retried job to run.
Prerequisites
In PowerProtect Data Manager, some services that are required for auto retry, such as the workflow service, have been moved
into a docker container. In order to enable auto retry, ensure that the workflow service is running in a docker.
Steps
1. Log in to the PowerProtect Data Manager server by using SSH.
2. Copy the entrypoint.sh file from the workflow container by typing the following:
docker cp workflow:/workflow/bin/entrypoint.sh .
3. Configure auto retry by adding a line to entrypoint.sh:
a. Type vi entrypoint.sh
b. Before the last line in the output, add the following:
-Denable.auto.retry.scheduler=true \
4. Optionally, add the following application properties to the file to specify a maximum number of auto retries and a time
interval at which subsequent auto retry attempts will occur:
-Dfailed.job.retry.max.count=2 \
-Dfailed.job.retry.interval=PT30M \
NOTE: The values specified above are the recommended default values. Auto retries will only occur during the activity
window. If you perform a manual retry in the PowerProtect Data Manager UI, this retry will not count towards the auto
retry max count.
For the interval duration, the value must be specified in ISO-8601 format.
5. Save the entrypoint.sh file to the workflow container by typing the following:
docker cp entrypoint.sh workflow:/workflow/bin/
6. Restart the workflow service by using one of the following methods:
● Type docker container restart workflow
NOTE: For the configuration to be applied successfully using this method, you can only restart the container. If you
restart your workflow service or your PowerProtect Data Manager operating system, the configuration will be lost.
● Type the following to save the docker image and restart the workflow service. For example:
docker commit workflow dpd/ppdm/ppdmc-workflow:PowerProtect Data Manager version
workflow restart
where PowerProtect Data Manager version is the PowerProtect Data Manager version that is deployed on your system.
You can use this method to permanently apply the configuration change after restoring the docker image.
Results
After configuration, the workflow service is scheduled to run every 30 minutes to determine if any jobs or tasks have failed. If
a restart occurs, the status indicates Running or Queued. To view whether a failed job or task has restarted, go to the Jobs
window in the PowerProtect Data Manager UI and select Running or Queued.
You can enable or disable the misfire feature by configuring the entrypoint.sh file.
Steps
1. Log in to the PowerProtect Data Manager server by using SSH.
2. Copy the entrypoint.sh file from the scheduler container by typing the following:
docker cp scheduler:/scheduler/bin/entrypoint.sh .
3. Configure the misfire conditions in the entrypoint.sh file:
a. To enable misfire and trigger each job once, add the following properties and corresponding values:
-Dspring.quartz.properties.misfire.cron.strategy=WITH_MISFIRE_HANDLING_INSTRUCTION_FIR
E_AND_PROCEED \
-Dspring.quartz.properties.misfire.calendar.strategy=WITH_MISFIRE_HANDLING_INSTRUCTION
_FIRE_AND_PROCEED \
b. To enable misfire and trigger each job as many times as misfire happens, add the following properties and corresponding
values:
-Dspring.quartz.properties.misfire.cron.strategy=WITH_MISFIRE_HANDLING_INSTRUCTION_IGN
ORE_MISFIRES \
-Dspring.quartz.properties.misfire.calendar.strategy=WITH_MISFIRE_HANDLING_INSTRUCTION
_IGNORE_MISFIRES \
4. Save the entrypoint.sh file to the scheduler container by typing the following:
docker cp entrypoint.sh scheduler:/scheduler/bin/
5. Restart the scheduler service by using one of the following methods:
● Type docker container restart scheduler
NOTE: For the configuration to be applied successfully using this method, you can only restart the container. If you
restart your scheduler service or your PowerProtect Data Manager operating system, the configuration will be lost.
● Type the following to save the docker image and restart the scheduler service:
docker commit scheduler dpd/ppdm/ppdmc-scheduler:PowerProtect Data Manager version
scheduler restart
where PowerProtect Data Manager version is the PowerProtect Data Manager version that is deployed on your system.
You can use this method to permanently apply the configuration change after restoring the docker image.
NOTE: Ensure that the PowerProtect Data Manager version specified in the commit command matches the
PowerProtect Data Manager version that is deployed on your system.
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Jobs > Protection Jobs, Jobs > Asset Jobs, or
Jobs > System Jobs.
The relevant Jobs window appears, displaying all completed and running jobs.
2. To cancel a job or job group, select a job or job group that is in-progress, and then click Cancel.
NOTE: If a job is almost complete, the cancellation might fail. If the cancellation fails, a message displays indicating that
the job cannot be canceled.
The window displays the status of the canceled job or job group. If the cancellation is successful, then the status eventually
changes to Canceled. If the cancellation is not successful, then the status might indicate either Success or Critical.
3. For protection and system jobs, to cancel an individual job or task from the Job ID Summary window:
a. Click the job ID next to the name of the job or job group.
The Job ID Summary window opens to display a list of all jobs or tasks.
b. Select a job or task that is in-progress, and then click Cancel.
NOTE: If a job or task is almost complete, the cancellation might fail. If the cancellation fails, a message displays
indicating that the task cannot be canceled.
c. Click Close.
The Job ID Summary window displays the status of the canceled job or task. If the cancellation is successful, then the
status eventually changes to Canceled. If the cancellation is not successful, then the status might indicate either Success
or Critical.
Exporting logs
The PowerProtect Data Manager UI enables you to export and download a detailed log of a job, asset, or task to perform
analysis or troubleshooting.
You can export and download a log for a job, asset, or task with any status. After you export a log, you can download it by
clicking .
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Jobs > Protection Jobs, Jobs > Asset Jobs, or
Jobs > System Jobs.
The relevant Jobs window appears, displaying all jobs.
2. Select a job from the list, and then click Export Log.
Hover over next to the asset or task in the Download Log column to display the progress. When the log export is
complete, you can download the log.
3. Click next to the ID for the job to download the exported log.
Steps
1. From the PowerProtect Data Manager UI left navigation pane, select Jobs > Asset Jobs.
The Asset Jobs window appears.
2. Select the row of the asset, and then click Export Log.
Hover over next to the asset or task in the Download Log column to display the progress. When the log export is
complete, you can download the log.
For in-progress jobs, the details pane displays the "Error" tab and indicates
"Failed"
When you open the Details pane for in-progress jobs, the Error tab appears and incorrectly indicates Failed in the error details.
Workaround
Ignore the Error tab for in-progress jobs.
The history of viewable backup jobs is limited to the 10,000 most recent
If viewing a history of backup jobs and trying to move to a page in the interface that would show the 10,000th or earlier backup
job, the following error is seen:
Workaround
To view earlier backup jobs, use a filter that includes the earlier backup jobs but limits the number of entries to less than 10,000.
System settings
You can use the PowerProtect Data Manager UI to modify system settings that are typically configured during PowerProtect
Data Manager deployment.
Steps
1. From the PowerProtect Data Manager UI, click , and then click Default Network.
2. Update the following fields as necessary:
● Hostname
● Primary DNS
● Secondary DNS
3. In the Configuration Details pane, click Edit, and then update the following fields for the IP address as necessary:
● IP Address
● Subnet Mask
● Gateway
4. Click Save.
Steps
1. Use ssh to log in to PowerProtect Data Manager.
2. Run the following commands:
cd /usr/local/brs/puppet/scripts
./search_domains.sh
Modify the user-interface time zone, system time zone, and NTP
server
Use this procedure to modify the time zones and NTP server.
1. From the PowerProtect Data Manager UI, click , and then click Time Zone.
2. From the User Interface Time Zone list, select the applicable user-interface time zone. If a specific time zone is set
instead of using that of the web browser, that time zone overrides the time zone used by the web browser when displaying
information in the user interface.
3. From the Server Time Zone list, select the applicable time zone used by PowerProtect Data Manager. This time zone is
used in component communication.
4. (Optional) To modify the NTP server:
a. Click .
b. In NTP Servers, provide the hostname or IP address of an NTP server.
5. Click Save.
Encryption in-flight
Using Transport Layer Security (TLS), you can encrypt backup or restore data that is in transit for centralized and self-service
operations with DD Boost encryption. Encryption in-flight is available for agent host assets, Kubernetes cluster assets, Network-
attached storage (NAS) assets, PowerStore block volume assets, and VMware virtual machine assets only.
By default, PowerProtect Data Manager supports an encryption strength of HIGH and uses DD Boost anonymous authentication
mode. The DD Boost encryption software uses the ADH-AES256-SHA cipher suite. The DD Boost for OpenStorage
Administration Guide provides more information about the cipher suite for high encryption.
Encryption in-flight is enabled for new installations. You can enable or disable encryption in-flight in the PowerProtect Data
Manager UI. Enabling encryption in-flight is strongly recommended for all installations.
The following table lists the workloads and operations that support encryption in-flight:
NOTE: Refer to the agent user guides for more information about the supported centralized and self-service operations.
Enabling encryption in-flight imposes additional overhead. Backup and restore performance for any client could be affected by
5-20%.
PowerProtect Data Manager supports encryption in-flight for all supported DD Boost and DDOS versions. The most up-to-date
software compatibility information for PowerProtect Data Manager is provided by the E-Lab Navigator.
NOTE: You do not need to enable in-flight encryption on connected DD systems. If DD encryption settings exist, the higher
setting takes precedence.
Prerequisites
Review the information in Encryption in-flight to learn more about encryption in-flight.
The encryption settings determine if data transfers are encrypted during backup and restore operations.
● For File System, Microsoft Exchange Server, Oracle, SAP HANA, and Network Attached Storage (NAS) workloads, backup
and restore encryption is only supported for Application Direct hosts. For Microsoft SQL Server, backup and restore
encryption is supported for Application Direct and VM Direct hosts.
● When you add a new host to PowerProtect Data Manager, host configuration pushes the backup and restore encryption
settings to the host.
● Only hosts that have the same version of PowerProtect Data Manager application agents installed support the host
configuration.
Steps
1. From the PowerProtect Data Manager UI, click , and then select Security.
The Security dialog box appears.
2. Click the Backup/Restore Encryption switch so it is enabled, and then click Save.
Next steps
The Jobs > System Job window of the PowerProtect Data Manager UI creates a job to enable protection encryption. This
job pushes encryption in-flight settings to the hosts to be used for self-service operations. Within the system job, a host
configuration job is created for each host. If an error occurs, you can retry the system job or individual host configuration job.
NOTE: For centralized backup and restore operations, PowerProtect Data Manager sends the encryption in-flight settings
to the application agents on the Application Direct hosts and network-attached storage (NAS).
You can disable backup and restore encryption by clicking the Backup/Restore Encryption switch. PowerProtect Data
Manager creates a system job in the Jobs > System Job window to disable backup and restore encryption.
NOTE: For one-way and two-way authentication, the certificates must already be configured in the system. If the
certificates are not present, an error is logged.
Steps
1. From the PowerProtect Data Manager UI, click , and then select Security.
The Security dialog box appears.
2. Click the Replication Encryption switch so it is enabled, and then click Save.
Next steps
The Infrastructure > Storage window of the PowerProtect Data Manager UI displays the replication encryption setting for all
protection storage systems.
NOTE: For protection storage systems with DDOS version 6.2 and earlier installed, the status might display as Unknown.
DDOS version 6.3 and later support authentication mode. DDOS versions earlier than version 6.3 support only anonymous
authentication mode. PowerProtect Data Manager supports only anonymous and two-way authentication modes. Ensure
that both source and destination use the same authentication mode.
You can take additional steps on your PowerProtect Data Manager server to enable in-flight encryption on connected DD
systems by using DD System Manager, as described in the DDOS Administration Guide.
Additional considerations
Review the following additional considerations for encryption in-flight.
To validate that encryption is in use, you can check the status of existing connections on the DD system by running the
ddboost show connections command in the DD Boost CLI:
If a connection was established with encryption, the value in the Encrypted column is Yes.
If a client establishes a connection with encryption, and establishes another connection without encryption, the value in the
Encrypted column is Mixed. This circumstance might occur for one of the following reasons:
● Encryption settings that are defined on a per-client basis remain in place for a while after the client has disconnected. If the
client previously established a connection without encryption and then later established a connection with encryption, the
value shows as Mixed.
● Encryption settings are not specified for the DD Boost connections that are created on the application agent. The individual
agent user guides provide more information.
If encryption settings exist on the DD and are also enabled in PowerProtect Data Manager, the higher setting takes precedence.
As a result, the Encrypted column always shows Mixed or Yes.
Prerequisites
To use TLS for the syslog connection:
● Import the syslog server security certificate into PowerProtect Data Manager. The PowerProtect Data Manager Security
Configuration Guide provides instructions.
● By default, PowerProtect Data Manager uses anon authentication. If your syslog server uses another form of
authentication, contact Customer Support.
Steps
1. From the PowerProtect Data Manager UI, click , select Logs, and then click Syslog.
The Logs window opens to the Syslog page.
To enable syslog forwarding:
2. Move the Syslog Forwarding slider to the right to enable syslog forwarding.
3. Provide the following information:
● IP Address / FQDN—IP address or fully qualified domain name of the syslog server.
● Port—Port number for PowerProtect Data Manager and syslog server communications.
● Protocol—Protocol to use for communications (TLS, UDP, or TCP).
● Components—Syslog message components.
● Severity Level—Specify the scope of the messages to forward to the syslog server.
To change the syslog server:
4. From the PowerProtect Data Manager UI, click , select Logs, and then click Syslog.
The Logs window opens to the Syslog page.
5. Change the following syslog configuration details:
● IP Address / FQDN—IP address or fully qualified domain name of the syslog server.
● Port—Port number for PowerProtect Data Manager and syslog server communications.
6. From the PowerProtect Data Manager UI, click , select Logs, and then click Syslog.
The Logs window opens to the Syslog page.
7. Change the Components and Severity Level.
To disable syslog forwarding:
8. From the PowerProtect Data Manager UI, click , select Logs, and then click Syslog.
The Logs window opens to the Syslog page.
9. Move the Syslog Forwarding slider to the left to disable syslog forwarding.
To apply the changes:
10. Click Save.
Next steps
Once the syslog configuration is complete, check the connection status. Go to System Settings > Logs > Syslog and verify
that the syslog server connection status indicates Connected. If the syslog server is not connected, the status indicates Not
Connected.
Prerequisites
● The data disk has a single partition.
● The log partition is on the system disk
Steps
1. Perform the following steps from the vSphere Web Client:
a. Right-click the virtual machine and select Shut Down Guest OS.
b. After the power off completes, right-click the virtual machine and select Edit Settings.
The Edit Settings window appears with the Virtual Hardware button selected.
c. Increase the provisioned size of Hard disk 2 to the desired size, and then click OK.
NOTE: You cannot decrease the provisioned size of the disk.
For example, to resize the disk to 700 GB, type: resize 1 752GB
iv. Type quit.
3. Restart the system by typing systemctl reboot.
4. Log in to the system console as the root user.
NOTE: If you use ssh protocol to connect to the system, log in with the admin account, and then use the su command
to change to the root account.
Prerequisites
The log partition is the last partition.
Steps
1. Perform the following steps from the vSphere Web Client:
a. Right-click the virtual machine and select Shut Down Guest OS.
b. After the power off completes, right-click the virtual machine and select Edit Settings.
The Edit Settings window appears with the Virtual Hardware button selected.
c. Increase the provisioned size of Hard disk 1 to the desired size, and then click OK.
NOTE: You cannot decrease the provisioned size of the disk.
3. Start the partition utility, by typing parted, and then perform the following tasks.
a. Type select /dev/sdx.
b. Type print. If you are prompted to fix issues, type fix at each prompt. The output displays the new disk size in the
Size field and the current size in the table.
c. Type quit.
4. Restart the system by typing systemctl reboot.
5. Log in to the system console as the root user.
NOTE: If you use ssh protocol to connect to the system, log in with the admin account, and then use the su command
to change to the root account.
Steps
1. Use a web browser to log in to the DD System Manager as the system administrator.
2. In the Summary tab, Protocols pane, select NFS export > create export.
The Create NFS Exports window appears.
3. In the Create NFS Exports window:
a. In the Export Name field, specify the name of the DD MTree.
b. If you have not yet created the DD MTree, follow the prompts to create the MTree and click Close.
c. In the Directory path field, specify the full directory path for DD MTree that you created. Ensure that you use the same
name for the directory.
d. Click OK.
A message appears to indicate that the NFS export configuration save is in progress and then complete.
e. Click Close.
You can also configure virtual networks to separate management traffic from backup traffic. This configuration can also
separate traffic that originates from different networks. In that case, you can use the same virtual network for management and
backup traffic, or separate virtual networks for each.
The Data for Management Components type carries traffic which relates to management operations but which can contain
customer information. Where required, you can separate this traffic from either the Management network, the Data network, or
both.
For example, some environments may support different speeds for each network: a 1 Gbps network for management and a 10
Gbps network for data. Other environments may have policies or rules that govern whether customer data can flow across
the Management network. Separating the Data for Management Components traffic enables you to optimize flow for security,
speed, and other priorities.
While the table indicates compatible traffic types, protection engines can operate without virtual networks.
Even though protection engines require connections for Data traffic, the private protection engines maintain separation
between the virtual networks for each department.
Several of the diagrams for supported virtual network topologies include parallel virtual networks.
Single network
This topology assigns all traffic types to the same network. There is no separation between Management and Data or between
agents which belong to different logical organizations.
Full separation
This topology implements complete separation between all traffic types for maximum throughput and security. Customer data
does not flow across the Management network.
Thick lines indicate paths that transfer comparatively more data, such as files and update packages. Thin lines indicate paths
that transfer comparatively less data, such as HTTPS API traffic only.
Supported scenarios
PowerProtect Data Manager supports virtual networks for the following use cases:
● Virtual machine backups
● Kubernetes backups
● Database backups
● Microsoft Exchange Server backups
● File system backups
● Replication
● Disaster recovery
● Cloud DR
● Search Engine
NOTE: The first time that you use the Networks page to add a virtual network to an environment with existing Search
Engine nodes, PowerProtect Data Manager does not automatically add the virtual network to the Search Engine. Instead,
manually edit each Search Engine node to add the virtual network. This action makes the Search Engine aware of virtual
networks. Any subsequent new virtual networks are automatically added to the Search Engine.
When you review the list of virtual networks, rows that require attention are indicated with a beside the name. View the
network details for more information.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Networks.
The Networks window appears.
2. Click Add.
The Add Network wizard opens.
3. For Purpose, select one or more traffic types.
Next steps
PowerProtect Data Manager may take a short time to configure the virtual network.
If the virtual network status changes to Failed, then a corresponding system alert contains more information about the cause
of the failure. Troubleshoot the failure and then complete one of the following actions:
● If the failure was caused by a configuration issue, click Edit to update the network configuration.
● If the failure was transient or had an external cause, and the configuration is correct, click Retry to use the same settings.
NOTE:
When you edit or retry a virtual network operation that failed and there are additional IP addresses in the address pool,
PowerProtect Data Manager marks the last failed IP address as abandoned. PowerProtect Data Manager does not try to
reuse any IP addresses that are marked as abandoned. The UI does not display this condition.
KB article 000181120 provides more information about how to use the REST API to detect when an IP address is marked as
abandoned. The article also provides steps to correct this condition so that the IP address can be used again.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Networks.
The Networks window appears.
2. Locate the row that corresponds to the appropriate virtual network.
The columns for each row indicate the associated VLAN ID and network status. Rows that require attention are indicated
with a beside the name.
3. Click for that row.
The Details pane opens to the right.
This pane contains information about the virtual network configuration, such as the static IP address pool details, assigned
traffic types, and configured routes. This pane also lists any components that are configured with an interface on this
network, their types, and their assigned IP addresses.
4. Click X to close the details pane.
Instead, the UI marks conflicts with a warning symbol ( ). Administrators should review any warnings and edit the indicated
components to manually remove the incompatible network interfaces. For example:
● Search Engine node interfaces to virtual networks that carry Data traffic, but not Data for Management Components traffic.
● Protection engine interfaces to virtual networks that carry Data for Management Components traffic.
● PowerProtect Data Manager interfaces to virtual networks that carry Data traffic, but not Data for Management
Components traffic.
Under these circumstances, PowerProtect Data Manager continues to operate normally. However, resolving the conflict returns
the IP address to the address pool.
Prerequisites
If an IP address from the static IP pool is already in use, you cannot remove the address from the pool.
Before you change the traffic types for a network, disable indexing. Set up and manage indexing provides instructions.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Networks.
The Networks window appears.
2. Locate the row that corresponds to the appropriate virtual network, and then click the radio button to select that row.
Next steps
If you disabled indexing, re-enable indexing. Set up and manage indexing provides instructions.
Prerequisites
● Unassign the virtual network from any applicable assets.
● Disable indexing. Set up and manage indexing provides instructions.
● Disable every VM Direct Engine that is configured to use the virtual network.
● Disable every Search cluster that uses the virtual network.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Networks.
The Networks window appears.
2. Locate the row that corresponds to the appropriate virtual network, and then click the radio button to select that row.
PowerProtect Data Manager enables the Edit and Delete buttons.
3. Click Delete.
4. Verify the network information, and then click OK to acknowledge the deletion warning.
The PowerProtect Data Manager removes the virtual network from the list on the Networks page.
Next steps
Re-enable indexing, VM Direct Engines, and Search clusters.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Storage.
The Storage window appears.
2. On the Protection Storage tab, select the storage system, and then select More Actions > Change Network Settings.
The Change Network Settings window opens and displays a list of known network interfaces, assigned IP addresses, link
speeds, and network purposes.
3. Identify the interfaces for each new virtual network, and then select or type names for the virtual networks in the
corresponding fields.
Each interface indicates an IP address, link speed, and network purposes.
4. If you typed a name for a virtual network in step 3, select one or more network purposes for the virtual network.
5. Click Save.
The PowerProtect Data Manager stores the network names.
You can configure the PowerProtect Data Manager to choose a preferred virtual network for all assets on a protection
policy.
● By asset
You can assign virtual networks to individual assets. This method is optional and overrides any virtual network assignment
from a protection policy. Assets which are not individually assigned automatically use the preferred virtual network.
You can use this method to specify a virtual network for any asset. However, this method is especially suited to configuring
assets which are exceptions to the rule. You can also split assets on the same application host across multiple virtual
networks. For example, when an asset has its own network interface or belongs to another department.
It is recommended that you assign assets to virtual networks by protection policy, where possible.
Before you assign an asset, perform the following actions:
● Test connectivity from the asset host to the PowerProtect Data Manager by pinging the PowerProtect Data Manager IP
address on that virtual network.
● Register the asset source with the PowerProtect Data Manager.
● Approve the asset source.
Steps
1. From the PowerProtect Data Manager UI, select Protection > Protection Policies.
The Protection Policies window appears.
2. Locate an existing protection policy for which you want to configure a virtual network.
3. Select the radio button for the protection policy, and then click Edit.
The Edit Policy wizard opens to the Summary page.
4. In the Objectives block, click Edit.
The Edit Policy wizard moves to the Objectives page.
7. Click Next.
The Edit Policy wizard moves to the Summary page.
8. Verify the policy information, and then click Finish.
Ensure that the selected assets are part of the virtual network.
The Edit Policy wizard closes.
9. Click OK to acknowledge the update, or click Go to Jobs to monitor the update.
Steps
1. From the PowerProtect Data Manager UI, select Infrastructure > Assets.
The Assets window appears.
2. Locate the appropriate assets from the list on any tab.
Use the checkbox to select each asset. You can select more than one asset at a time.
3. Click More Actions > Assign Network.
The Associated Assets window opens.
4. To use the virtual network for all assets on the same application host, click Include.
Otherwise, to use the virtual network for only the selected assets, click Do Not Include. Consider whether you require a
separate protection policy for assets on different networks.
The Assign Network window opens.
5. Select a virtual network from the Network Label list, and then click Save.
Results
The PowerProtect Data Manager applies the network selection to the selected assets. The Network column in the list of assets
for each tab now indicates the selected virtual network.
Prerequisites
After disaster recovery of the PowerProtect Data Manager system is complete, perform the following steps on the restored
PowerProtect Data Manager system.
Next steps
If your syslog server uses a custom port, open the corresponding port on the restored PowerProtect Data Manager system. The
PowerProtect Data Manager Security Configuration Guide provides more information.
NOTE: PowerProtect Data Manager reporting is not supported with PowerProtect Data Manager in cloud environments.
Configure the reporting engine to set up reporting capabilities for PowerProtect Data Manager. After the reporting engine is
configured, you can run reports from Reports > Report Browser.
NOTE: If you are using another reporting tool such as CloudIQ, you can choose not to configure PowerProtect Data
Manager reporting.
Port requirements
For reporting-engine port requirements, see the PowerProtect Data Manager Security Configuration Guide.
Server requirements
Observe the following requirements for the reporting engine.
● SUSE Linux Enterprise Server (SLES) version 15 SP4
● 8 vCPUs, 16 GB RAM
● Disk 01: 48 GB to install the operating system and Reporting Application Server
● Disk 02: 512 GB to store the report data
● Disk 03: 8 GB to store log information
NOTE: The reporting engine only supports IPv4 communication.
Table 44. Known issues with the reporting engine and Report Browser
Issue
The entries in the Asset Name column of the Jobs Summary report prefix the name of the asset with the hostname of the
asset host.
The entries in the Host column of the Jobs Summary report show the hostname of the PowerProtect Data Manager server
instead of the hostname of the asset host.
You might receive error messages similar to the following when trying to configure the Report Browser or generate a report:
The Report Browser is not integrated with Cloud Snapshot Manager. Since the Report Browser does not display Cloud
Snapshot Manager jobs, it might display a lower total job count than the total job count displayed in the Protection Jobs
window.
The Report Browser displays an entry for each retried job that originally had a Failed status. This display of multiple entries
does not match the behavior of the Protection Jobs window, which only displays a single entry for the failed job. This
discrepancy can result in the Report Browser displaying a higher total job count than the total job count displayed in the
Protection Jobs window.
If the total amount of data transferred for a job is less than 1 MB, the job entry shows 0 bytes in the Data Transferred
column.
The reporting engine is listed as an unidentified entry in the Application Agents pane.
CAUTION: Do not remove this entry. If you do, see Configure and deploy the reporting engine.
The selection of SMIS assets from a custom filter is ignored. Even if these assets are selected, they are not displayed on the
report that uses the filter.
In the Jobs Summary - Table View report, the search functionality only supports an "equals" filter type.
Prerequisites
● You must deploy the reporting engine on a separate virtual machine.
● The vCenter server must be added as an asset source from Infrastructure > Asset Sources.
● The virtual machine requires 500 GB to function properly.
Steps
1. From the PowerProtect Data Manager UI, select Reports > Reporting Engine.
2. Click Configure.
The Configure Reporting Engine dialog box opens.
3. In the Configure Reporting Engine dialog box, complete the required fields:
● vCenter server to deploy—Specify the vCenter server on which to deploy the reporting engine.
If you specified the hosting vCenter server, PowerProtect Data Manager populates the fields with the required
information.
● ESX host or cluster—Select on which cluster or ESXi host you want to configure the reporting engine.
● Host FQDN—Specify the fully qualified domain name (FQDN).
● IP address, Gateway, Netmask, and Primary DNS—Note that only IPv4 addresses are supported.
● Network—Displays all the networks that are available under the selected ESXi host or cluster.
For virtual networks (VLANs), this network carries Management traffic.
● Data Store—Displays all datastores that are accessible to the selected ESXi host or cluster. Select the datastore.
4. Click Deploy.
Results
PowerProtect Data Manager starts the configuration process. Go to Reporting Engine to check the status. You can also go to
the System Jobs window to monitor the progress of the configuration job.
When the process is complete, a notification appears in the Reporting Engine window to indicate that the configuration is
successful. You can now access reports from Reports > Report Browser.
Report templates
Report templates are used to generate reports. When a template is selected, a particular report type is used. This report type is
further modified by applying filters. Report templates and reports belong to either a job-activity category or an asset-protection
category.
Reports
Learn about the reports that are available in the Report Browser.
The following figure provides an example Jobs Status Summary report.
Generate a report
To generate a report, perform the following actions:
1. To generate a report based on a built-in report template:
a. Go to Reports > Report Browser
b. Click Generate Report under the template that the report should be based on.
NOTE: If you do not see the built-in report templates, click
2. To generate a report based on a custom report template:
a. Go to Reports > Report Templates.
b. Click the name of the template that the report should be based on.
3. To change the name of the report, click to the right of the name, edit the name, and then click .
4. To change the description of the report, click to the right of the description, edit the description, and then click .
5. Select the filters to apply to the report and click Apply.
NOTE: To reset the filters to their default value, click Reset.
Edit a report
To edit a report:
● From the Report Browser pane, select the tab of the report.
● Click and select Edit.
● To change the name of the report, click to the right of the name, edit the name, and then click .
● To change the description of the report, click to the right of the description, edit the description, and then click .
● Update the filters to apply to the report and click Apply.
NOTE: To reset the filters to their default value, click Reset.
NOTE: Report data is not live and is only as up-to-date as the last successful data collection request. Therefore, reports
should be used for historical purposes only.
● To view live jobs data, go to Jobs > Protection Jobs.
● To view live asset data, go to Infrastructure > Assets.
● For a high-level view of the overall state of the PowerProtect Data Manager system, go to Dashboard.
NOTE: SMTP must be configured before performing these actions. For more information, see Set up the email server.
1. From the Report Browser pane, select the tab of the report.
Prerequisites
Obtain the name of the reporting engine backup from System Settings > Disaster Recovery > Manage Backups.
Steps
1. Log in to the PowerProtect Data Manager user interface as a user with the Administrator role.
Use the same credentials that you used before PowerProtect Data Manager was restored.
2. Connect to the PowerProtect Data Manager console as an admin user.
3. Change directories to /data01/server_backups/<PowerProtect Data Manager Hostname>_<NodeID> to
locate the backup manifest file.
Normally, there is only a single subdirectory in /data01/server_backups, so change to that subdirectory. However, if
there is more than one subdirectory and you don't know which <NodeID> is the correct one, perform the following substeps:
a. From /data01/server_backups, run the following commands, changing the username and password as required:
{
"id": "ca8cbb13-6f3d-4ac5-87e5-de47a634379f",
"jobId": "990b4ea7-c0e4-4069-8dd5-7d0e084370fc", // DELETE LINE
"creationTime": "34e1c9dd-1b54-48b4-8283-151331d193ff",
"lastUpdated": "2022-08-25T19:40:18.165497Z",// DELETE LINE
"elapsedSeconds": 115,
"sequenceNumber": 89
"state": "Successful",// DELETE LINE
"version": "19.12.0-1-SNAPSHOT", // DELETE LINE
"hostname": "ldpdb141.hop.lab.emc.com", // DELETE LINE
"name": "mercijTestDr", // DELETE LINE
"nodeId": "a8d2df8e-5c3e-4160-87d4-32b9bfe6c283", // DELETE LINE
"sizeInBytes": 18244130,
"consistency": "CRASH_CONSISTENT", // DELETE LINE
"checksum": "bbd97a04f296a8ed116e4a9272982d8e8411f3d0cf50dea131d5c2cd4ce224f8", //
DELETE LINE
"backupConsistencyType": "FULL", // DELETE LINE
"esSnapshotState": "UNKNOWN", // DELETE LINE
"backupTriggerSource": "USER", // DELETE LINE
"configType": "standalone", // DELETE LINE
"deployedPlatform": "vmware", // DELETE LINE
"replicationTargets": [], // DELETE LINE
"repositoryFileSystem": "BOOST_FILE_SYSTEM", // DELETE LINE
"ddHostname": "ldpdg251.hop.lab.emc.com", // DELETE LINE and add line
"recover":true,
"Components": [ // change Components to components with lower case c
{ // DELETE WHOLE PPDM COMPONENT LEAVING ONLY REPORTING
"name": "PPDM",
"id": "ca7cbb13-6f3d-4ac5-87e5-de47a634379f",
"lastActivityId": "2bdbe7a8-7c57-446d-b072-ad8081e2953d",
"version": "v2",
"backupPath": "ldpdg251.hop.lab.emc.com:SysDR_ldpdb141/
ldpdb141_a8d2df8e-5c3e-4160-87d4-32b9bfe6c283/PPDM",
"backupStatus": "SUCCESSFUL",
"backupsEnabled": true,
"errorResults": []
}, // STOP DELETING HERE
{
"name": "REPORTING",
"id": "34e1c9dd-1b54-48b4-8283-151331d193ff",
"lastActivityId": "ed2dc805-c1f7-42fd-b9af-71897fc1da01",
"version": "v2",
"backupPath": "192.168.100.109:SysDR_DPDII2201IDPA10/
ppdm_64d2f00a-1ce0-47b5-9c60-914ea7d0e1e8/REPORTING",
"backupStatus": "SUCCESSFUL",
"backupsEnabled": true, // DELETE TRAILING COMMA
"errorResults": [] // DELETE LINE
}
], // DELETE TRAILING COMMA
"componentVersions": [],// DELETE LINE
"expirationTime": "2023-06-11T09:41:20.383633Z",// DELETE LINE
"protectionCopySetId": "07e7af37-1a80-5436-b320-9e537fba1317"// DELETE LINE
}
In summary:
● remove all lines with the // DELETE LINE comment entry displayed here
● add recover: true
● change Components to components
● remove all listed component blocks except for REPORTING
● remove the trailing comma from "backupsEnabled": true,
{
"id":"ca8cbb13-6f3d-4ac5-87e5-de47a634379f",
"creationTime":"2022-10-12T15:01:13.476401+0000",
"elapsedSeconds":115,
"sequenceNumber":89,
"sizeInBytes":18244130,
"recover":true,
"components":[
{
"name":"REPORTING",
"id":"ca8cbb13-6f3d-4ac5-87e5-de47a634379f",
"lastActivityId":"ed2dc805-c1f7-42fd-b9af-71897fc1da01",
"version":"v2",
"backupPath":"192.168.100.109:SysDR_DPDII2201IDPA10/
ppdm_64d2f00a-1ce0-47b5-9c60-914ea7d0e1e8/REPORTING",
"backupStatus":"SUCCESSFUL",
"backupsEnabled":true
}
]
}
7. Copy the value of the text inside the quotation marks that follow "id":.
This value replaces the variable <backupID> used in step 11. In this example, <backupID> is ca8cbb13-6f3d-4ac5-87e5-
de47a634379f.
8. Remove all carriage returns from the temporary file, so that all the text is on a single line.
9. Copy all of the text from the temporary file.
This value replaces the variable <manifestText> used in step 11.
10. Run the following command, changing the username and password credentials as required:
NOTE: Even if you ran this command in step 3.a, run it again. The validity of the value of TOKEN is time sensitive.
Next steps
Delete the temporary file created in step 4.
A
AAG: Always On availability group
B
BBB: block-based backup
C
CA: certificate authority
D
DAG: database availability group
Glossary 185
DBID: database identifier
deploy
At Dell Technologies, virtual machines are deployed to virtual environments, while software components and hardware devices
are installed. Both PowerProtect Data Manager and DDVE are virtual machines that are deployed. If you are searching this
software guide for instances of install and not finding anything appropriate, search for deploy instead.
E
EBS: Elastic Block Store
F
FC: Fibre Channel
186 Glossary
G
GB: gigabyte
In the PowerProtect Data Manager user interface, this is 10 9 bytes.
H
HA: High Availability
I
IAM: identity and access management
K
KB: kilobyte
In the PowerProtect Data Manager user interface, this is 10 3 bytes.
L
LAC: License Authorization Code
M
MB: megabyte
In the PowerProtect Data Manager user interface, this is 10 6 bytes.
Glossary 187
MFR: managed file replication
ms: millisecond
N
NAS: network-attached storage
O
OS: operating system
P
PCS: Protection Copy Set
R
RAC: Real Application Cluster
188 Glossary
ReFS: Resilient File System
RSA: Rivest-Shamir-Adleman
S
S3: Simple Storage Services
T
TB: terabyte
In the PowerProtect Data Manager user interface, this is 10 12 bytes.
Glossary 189
TLS: Transport Layer Security
T-SQL: Transact-SQL
U
UAC: user account control
update
At Dell Technologies, software is updated and hardware is upgraded. If you are searching this software guide for instances of
upgrade and not finding any, search for update instead.
V
VADP: VMware vSphere Storage APIs - Data Protection
190 Glossary
vRSLCM: vRealize Suite Lifecycle Manager
W
WAN: wide area network
Glossary 191