EVault for Data Protection Manager Course 361 Protecting Linux and UNIX with EVault
Table of Contents Objectives... 3 Scenario... 3 Estimated Time to Complete This Lab... 3 Requirements for This Lab... 3 Computers Used in This Lab... 3 Exercise 1 Installing EVault Linux Agent on Linux Server... 4 Exercise 2 Configure Linux Agent for Protection on EDPM Appliance... 6 Exercise 3 Performing an Ad Hoc Backup... 10 Exercise 4 Recovering Data with EVault... 11 Exercise 5 For this Lab Only Check that the Data has been Recovered... 12 Conclusion... 12 2 EVault for Data Protection Manager - 2010 i365, A Seagate Company
Objectives In this lab, you ll learn how to protect a Linux machine using EDPM. This portion is going to being using the EVault Agent as opposed to the Microsoft DPM Agent. The same installation process is used to install the VMWare ESX Agent. Scenario Estimated Time to Complete This Lab The first thing we ll do is install the Agent. From there, we ll use the EVault Console on the EDPM appliance to configure it. Next we ll run a backup and then restore the data to an alternate location. 60 Minutes Requirements for This Lab Linux Server is on the same subnet as the EDPM appliance. The Linux Server must have inbound TCP ports open on 8086 and 8087 For backups to occur data is transmitted from the Agent to the EDPM appliance on TCP port 2546. Computers Used in This Lab EDPM DC01 BAV1 LINUX01 3 EVault for Data Protection Manager - 2010 i365, A Seagate Company
Exercise 1 Installing EVault Linux Agent on Linux Server In the next steps, we ll be installing the Linux Agent onto our Linux server. This will involve mounting a folder that s currently shared on our EDPM server, copying the installer, unpacking it, and installing the Agent. Tasks 1. Initial Login LINUX01 2. Mounting the Linux Share 3. Copy Linux Agent Locally and Unpack It Detailed Steps a. Once the environments states Available within Surgient, click the drop-down next to Linux_Server and choose VNC. b. If the browser prompts you to download any ActiveX controls, please go ahead and do so. c. You ll see a prompt for a VNC Password type evault. d. You should now see the desktop. If you just see a black screen, move your mouse around some. e. In this example, we do have a graphical desktop (GNOME). However, I ll have you conduct the exercises via command-line as not all Linux environments are configured with a graphical desktop. f. To open a new command-line terminal, right-click anywhere on the Desktop and choose Open Terminal. a. In the next steps, you will need to know the IP address of your EDPM server and the local Administrator credentials. Our EDPM server is on 192.168.0.100. It has local login credentials of administrator/password. b. To mount our share, it will be in the following syntax. Note the Linux/UNIX is case sensitive: mount o username=<local_administrator>,password=<administrator_password> //<EDPMs_IP_Address>/<Sharename> <Local_Mount_Directory> c. Notice that there is no space between, and password. d. The command will type is the following: mount o username=administrator,password=password //192.168.0.100/EVaultAgents /mnt e. This should complete without any errors. If there are errors, you ve typed in something incorrectly. a. Navigate to the directory that we ve mounted. cd /mnt b. Verify that you ve correctly mounted the directory. ls la c. This will display the contents of the directory, and several subdirectories. For instance, Unix, Novell, etc. d. We ll navigate to the to the Linux Agent directory. cd Unix/Linux e. Now, we ll copy the Linux Agent installer locally to our Linux server. cp Agent-Linux.tar.gz /root f. Navigate to the directory that we ve copied the installer cd /root g. The installer file is a compressed file. It s been tarballed and gzipped. The file must be unpacked. tar xfz Agent-Linux.tar.gz h. Verify that the installer has been unpacked. 4 EVault for Data Protection Manager - 2010 i365, A Seagate Company
4. Install Linux Agent ls la You should see that a new directory has been created called Agent- WCC-Linux-6.00.2415. i. Navigate to the newly created directory. cd Agent-WCC-Linux-6.00.2415 a. In the next steps, we ll go ahead and install and register our Linux Agent to the EDPM appliance. b. In the directory that was created Agent-WCC-Linux.6.00.2415, there is an install script and this is what we ll run../install.sh c. The Agent will install by default into /usr/local/buagent. Click Enter. d. The installer will indicate that the directory doesn t exist. Click Enter to create it. e. The default language is English (US). Click Enter to accept this. f. The installer will prompt Do you wish to register to a Web-based Agent Console Server? Click Enter. g. When prompted What is the Web-based Agent Console address?, we ll need to enter the address of our EDPM appliance. 192.168.0.100 h. When prompted What is the Web-based Agent Console connection port?, it defaults to Port 8086. Just click Enter to accept the defaults. For access to the Web-based Agent Console, both TCP ports 8086 and 8087 must be available. If there are firewalls in place in between the Agent and the EDPM appliance, these ports need to be opened for inbound connections to the Agent machine. In other words, the Linux Agent listens on these ports. i. When prompted What is your Web-based Agent Console username?, the EDPM appliance comes with a default user. Type user and click Enter. j. When prompted for What is your Web-based Agent Console password?, we need to enter the same password we configured when initially configuring the EVault Console (See Course 101: Initial Setup: The Onboarding Wizard). Type I365password and click Enter. k. The Agent should now be installed and ready to configure on the EDPM appliance. 5 EVault for Data Protection Manager - 2010 i365, A Seagate Company
Exercise 2 Configure Linux Agent for Protection on EDPM Appliance In the next steps, we ll be configuring our Agent for backup and also schedule it. This is completed on the EDPM appliance through the EVault Console. Tasks 1. Switch Machines EDPM 2. Open EVault Console 3. Configure Agent Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose EDPM_Server to connect to the EDPM server. b. If it prompts you for a login, please make sure to use the following: Username: TrainingLab\Administrator Password: I365password a. Open Internet Explorer from either the Start Menu or Quick Launch bar. b. In the Address Bar, type the following http://localhost/evaultconsole/login.aspx c. This should launch the EVault Console landing page. a. Within the EVault Conosle site, we should see our Linux01 server highlighted in the middle pane. EDPM has detected that it has not yet been configured yet. b. Click Configure This Agent. c. On the Configure Agent screen, you ll see Description. This field is optional and it allows you to describe your Agent, IE Backup of Boss Computer. We ll leave this field empty in this example. d. Click Advanced Agent Settings. On the Retention Types tab, we see the default retentions that can be used. Retentions dictate how far back in time you can restore your data. We ll leave the default for now, but please reference the course titled Understanding EVault Retentions for more information about retention customization. Default Retentions allow you protect and restore from the following if scheduled: Daily Restore from the last 7 days Weekly Restore from the last 5 Saturdays Monthly Restore from the last 12 first of the months going back 1 year. Retentions are customizable to meet your compliance / business On the Open File tab, you will have no options for the Linux Agent as there is no need for an open file handler. On the Notification tab, we will setup email notifications. In this lab, we ll use some fictitious information, but on your production machines, you ll want to make sure that you fill this out correctly. i. Click Send e-mail on failure 6 EVault for Data Protection Manager - 2010 i365, A Seagate Company
ii. Click Send e-mail on error. Errors can be triggered if the Agent has problems processing a file. iii. For the E-Mail From address, enter i365@acme.com iv. For the Outgoing mail server, enter mail.acme.com. v. For the Specify address(es) of recipients, enter BackupAdmins@acme.com. vi. If your email server required an authenticated account, you will fill that out in the SMTP Credentials if required. In this lab, we ll leave it Blank. On the Performance tab, you have options to change the following. However, we ll use the defaults: i. Execution Priority Allows you to change the CPU priority of your backup jobs. ii. Bandwidth Allows you to potentially throttle bandwidth of backups during production hours. At the bottom of the Agent Settings window, click OK to accept the changes we ve made. e. Back on the Configure Agent window and the Agent Configuration section, click Next >. f. On the Source Selection section: For the Protection Set Name, type Data. For the Description, leave this blank. For the Source Type, we ll use Local System. The EVault Agent supports backups via NFS mounts if you had this type of environment Click Next >. g. On the Selection section: You re now browsing the file system of our Linux01 server, you see files and folders under Volume and what you selected for protection under Recovery Set. With Linux, you can choose to backup everything under /. However, if you restored / to different hardware, it will be unlikely that the new Linux system will boot cleanly. Linux is not very graceful at detecting new hardware. In this scenario, most Linux administrator would restore individual files and directories. It s a Best Practice to exclude the EVault Agent directory if the backup selection included a parent directory to the Agent. The Agent resides in /usr/local/buagent. Make sure to exclude this if you re including a parent directory. In this example, we ll backup something small. (/etc) Expand / and click the box next to etc. Select Include i. Recursively Backups all subdirectories and files. Leave this 7 EVault for Data Protection Manager - 2010 i365, A Seagate Company
Checked. ii. Only folders matching this filter Allows for folder or file wildcard selections. iii. Only files matching this filter Allows for filtering of files based on extension. iv. Click OK. Click Next >. h. On the Options section: This is where you can choose to protect your data by password protecting it. If you ve set a password, upon recovery, you will be prompted for this password. Any encryption change after the initial backup will result in a reseed of data. This means you will be storing double the amount of data than you should be on the EDPM appliance. Encryption changes include: Changing encryption types Changing encryption passwords Changing encryption types Change from no encryption to use encryption or vice versa Please make sure to keep your encryption password in a safe place. If you lose your encryption password, i365 will not be able to recover it for you. This means you will not be able to restore your data without the correct password. In this example, for the Encryption type, please select AES 128 bit. For the password, we ll set the Password and Confirm Password to test. For the password, we ll type something that reminds us of test. Type quiz. Click Next >. i. On the Schedule section: This is where we can define a schedule such that our backups will run on automatic basis. Please refer to the course titled Scheduling Backups with EVault for more detailed information. In this example, we ll schedule the following: i. Daily M F 8PM ii. Weekly Sat 8PM iii. Monthly 1 st 8PM Per Best Practices, we ll schedule the Longest retention first so that it is at the Top. Longest retention in this case being Monthly. You can always reorder them in this list if you had done it wrong. For the Monthly, click Add 8 EVault for Data Protection Manager - 2010 i365, A Seagate Company
i. For the Schedule View drop-down, choose Days of Month. ii. In the calendar, choose 1 which indicates the first of the month. iii. In the At field, type 8:00. iv. In the Retention Scheme drop-down, choose Monthly. v. Advanced Schedule Options allows us to change the compression level and backup time window. We ll use the defaults here though. vi. Click OK. For the Weekly, click Add i. Select Sat. ii. For the At field, type 8:00. iii. In the Retention Scheme drop-down, choose Weekly. iv. Click OK. For the Daily, click Add i. Select each Mon, Tue, Wed, Thu, Fri. ii. For the At field, type 8:00 iii. In the Retention Scheme drop-down, leave the default with Daily. iv. Click OK. You ve now completed creating the schedule. Click Next >. j. A new pop window, Register Agent, will appear. This will attempt to register the Agent to the EDPM Appliance. Click OK. k. On the Destination section, you should see an entry for Appliance and your EDPM appliance s network address. Click Finish. Note: There is something wrong with the Surgient lab configuration. The previous step will time out after about 5 minutes. Click Cancel and Repeat Steps A-K. This is not normal. You would not normally have to repeat these steps, and this is unique to the Surgient platform. l. Your Linux Agent is now configured for backup and will run automatically based on its schedule that you had defined. 9 EVault for Data Protection Manager - 2010 i365, A Seagate Company
Exercise 3 Performing an Ad Hoc Backup In this section, you ll learn how to run a manual (ad hoc) backup. Normally you d wait for your schedule backup to run. Running an Ad Hoc backup in the middle of the day can impact network and system performance of a production Agent machine. Tasks 1. Continued work on same machine Detailed Steps a. For this exercise, we ll continue work on the EDPM appliance. b. You should still have the EVault Console open. If not, you call always access it via a browser on that machine. Address is http://localhost/evaultagents/login.aspx. EDPM 2. Backup Job via Protect Now a. In the EVault Console, your Linux01 Agent should be highlighted in the middle of the screen. b. Down at the bottom pane, we see the Protection Set Data that we created earlier. Make sure to highlight this Protection Set. c. To run an Ad Hoc backup, click Protect Now. d. On the Protect Now screen a. Our Destination is Appliance. b. Our Retention Scheme is Daily. c. Advanced Protection Options allows you to change the backup window for your Ad Hoc backup. d. Click Start. e. Your backup should initiate. f. A new window, Process Details, should appear. Wait until the backup s Status says Completed and click Close. In production, you don t have to leave the Process Details window open. You can click Close at any time, and the backup will continue in the background. There is a Monitoring tab that you can always check for any active backups. g. Note that when the backup completes, you will see a message that states that the Recovery pointed created with errors. If we were to look at the logs, you would see that the Agent is having problems connecting to the base Vault (the Cloud). With version 1 of EDPM, your EDPM appliance will not replicate to the Cloud, and this is an expected error. 10 EVault for Data Protection Manager - 2010 i365, A Seagate Company
Exercise 4 Recovering Data with EVault In the next steps, we ll use the EVault to recover the sample data that we had previously protected. In this example, we ll restore the data to a new directory. Tasks 1. Continued work on same machine Detailed Steps a. For this exercise, we ll continue work on the EDPM appliance. b. You should still have the EVault Console open. If not, you call always access it via a browser on that machine. Address is http://localhost/evaultagents/login.aspx. EDPM 2. Recover Data via Recover Now a. In the EVault Console, your Linux01 Agent should be highlighted in the middle of the screen. b. Down at the bottom pane, we see the Protection Set Data that we created earlier. Make sure to highlight this Protection Set. c. To run recover data from this protection set, click Recover Now. d. On the Recovery screen a. For Select a recovery point, we ll leave the default. The Agent will automatically select the most resent recovery point. Otherwise, you could pick and choose the specific date/time you wished to recover from. b. For Select a recovery device section i. Recover from this device, choose Vault (Appliance). ii. Encryption password and Confirm password, type test. This is what we had configured the job with. c. Click Next >. e. On the Data Selection screen a. Under Volume, we re looking at the Recovery Point and the data that was backed up. b. Expand the Recovery Point and expand /. c. Check off the etc folder and select Include d. On the Include Options screen, leave the defaults and choose OK. e. Choose Next > f. On the Options screen a. For Destination, choose Recover to an alternate location and type /restore. /restore does not exist and the Agent will automatically create it. You could restore to the original location, but for this lab we re restoring to an alternate path. b. Preserve folder structure Will nest the original path under whatever path you ve chosen to restore to. Otherwise, any files selected will get recovered to the root of the directory you had chosen. c. File Overwrite Leave the defaults. You can change these options if there are files in the destination directory already, and this option allows you how recovery will rename or overwrite files. g. Click Recover Now. 11 EVault for Data Protection Manager - 2010 i365, A Seagate Company
h. This will spawn a new window, Process Details. Wait for the Status to say Restore Completed and click Close. Exercise 5 For this Lab Only Check that the Data has been Recovered We ll switch back to the Linux01 server and check that the data has indeed been restored. Tasks 1. Switch Machines LINUX01 Detailed Steps a. Using the Server drop-down at the top of the Surgient window, choose Linux_Server to connect back to the Linux01 server. b. You ll see a prompt for a VNC Password type evault. c. The Terminal window should still be open. Type cd /restore d. To see the contents of that directory, type ls la e. You should see the etc subdirectory. f. Type cd etc and then ls la. g. You should now see the contents of the directory that we ve restored. Conclusion Hopefully you have a better understanding of how to protect Linux and UNIX using EVault. Please feel free to do further testing in your training lab. For further information regarding EVault, you can always access the EVault Knowledge Base and various user guides at http://csp.evault.com. For further information about DPM, you can always access their Technet site at http://technet.microsoft.com/enus/library/ff399192.aspx. If this link is broken, goto http://technet.microsoft.com, navigate to Library, System Center, and choose System Center Data Protection Manager 2010. You can always send comments and suggestions for this training module to training@i365.com or for support related issues you can contact us at support@i365.com. 12 EVault for Data Protection Manager - 2010 i365, A Seagate Company