Dell EMC Avamar Administration Guide

Dell EMC Avamar

Version 7.5.1

Administration Guide

302-004-297 REV 04 January 2020

Copyright ? 2001-2018 Dell Inc. or its subsidiaries. All rights reserved.

Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.

THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS-IS." DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.

Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property of their respective owners. Published in the USA.

Dell EMC Hopkinton, Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381

2

Dell EMC Avamar Administration Guide

CONTENTS

Figures

13

Tables

15

Preface Chapter 1 Chapter 2

Chapter 3

19

Introduction

23

Avamar system overview.................................................................................. 24

Avamar server...................................................................................... 24

Avamar clients......................................................................................27

User interfaces.................................................................................... 29

Data Domain system support............................................................... 30

Data deduplication............................................................................................. 31

Security and networking................................................................................... 32

Encryption........................................................................................... 32

IPv4 and IPv6 support..........................................................................32

TSL 1.2 encryption protocol required................................................... 33

SSH MAC algorithms........................................................................... 33

Avamar Administrator

35

Overview of Avamar Administrator................................................................... 36

Installing Avamar Administrator........................................................................ 36

Installing Avamar Administrator on Microsoft Windows....................... 36

Installing Avamar Administrator on Linux..............................................37

Upgrading Avamar Administrator...................................................................... 38

Uninstalling Avamar Administrator.................................................................... 38

Editing Avamar Administrator client preferences.............................................. 39

Setting a session time-out for Avamar Administrator........................................39

Starting Avamar Administrator......................................................................... 40

Avamar Administrator dashboard.......................................................................41

launcher link..........................................................................................41

System Information panel.................................................................... 42

Activities panel.....................................................................................45

Capacity panel..................................................................................... 46

Critical Events panel............................................................................ 46

Avamar Administrator user interface elements..................................................47

Status bar............................................................................................ 47

Navigation tree features...................................................................... 50

Mouse shortcuts...................................................................................51

Client Management

53

Overview of Avamar clients.............................................................................. 54

Client domains.................................................................................................. 54

Creating a domain................................................................................ 55

Editing domain information.................................................................. 55

Dell EMC Avamar Administration Guide

3

Contents

Deleting a domain................................................................................ 56 Client registration............................................................................................. 56

Client-side registration.........................................................................57 Registering a client in Avamar Administrator........................................57 Batch client registration.......................................................................57 Activating a client............................................................................................. 60 Re-activating a client........................................................................... 60 Client paging..................................................................................................... 61 Pageable clients....................................................................................61 Non-pageable clients............................................................................ 61 Editing client paging settings............................................................... 62 Editing client information.................................................................................. 63 Viewing client properties...................................................................................63 Enabling and disabling a client...........................................................................64 Moving a client to a new domain....................................................................... 65 Retiring a client.................................................................................................65 Deleting a client................................................................................................ 66

Chapter 4

User Management and Authentication

67

Overview of Avamar user accounts...................................................................68

User authentication.......................................................................................... 68

How Avamar authenticates users and assigns roles............................. 69

Avamar internal authentication......................................................................... 69

Directory service authentication....................................................................... 70

LDAP directory service authentication..................................................71

OpenLDAP directory service authentication.........................................78

Adding an NIS directory service........................................................... 83

Error messages during directory service configuration........................ 84

Adding an LDAP map........................................................................... 85

Editing the role for an LDAP map......................................................... 86

Deleting an LDAP map......................................................................... 86

Editing the time-out value for directory service processes...................87

Enabling backward compatibility with Enterprise Authentication...................... 88

Roles.................................................................................................................88

Administrator roles...............................................................................89

Operator roles......................................................................................89

User roles............................................................................................. 91

Adding a user to a client or domain.................................................................... 91

Editing user information....................................................................................93

Deleting a user.................................................................................................. 93

Chapter 5

Backup

95

Performing on-demand backups....................................................................... 96

Performing an on-demand backup of a client....................................... 96

Performing an on-demand group backup............................................. 97

Scheduling backups.......................................................................................... 97

Datasets...............................................................................................98

Schedules........................................................................................... 103

Rules.................................................................................................. 109

Retention policies................................................................................ 111

Groups................................................................................................ 116

Enabling scheduled backups............................................................... 125

Monitoring backups......................................................................................... 125

Canceling backups...........................................................................................125

4

Dell EMC Avamar Administration Guide

Chapter 6

Contents

Managing completed backups......................................................................... 126 Finding a completed backup to manage.............................................. 126 Validating a backup............................................................................. 127 Changing the expiration date for a backup..........................................127 Changing the retention type for a backup...........................................128 Viewing backup statistics....................................................................129 Deleting a backup............................................................................... 130

Application consistent SQL virtual machine image backup

131

About advanced policies.................................................................................. 132

Prerequisites................................................................................................... 132

Add an advanced policy................................................................................... 132

Configure a source..............................................................................133

Configure the group policy..................................................................133

Configure members............................................................................ 134

Configure a proxy for the image backup............................................. 135

Remove an advanced policy.............................................................................135

Edit an advanced policy................................................................................... 135

View advanced policy details........................................................................... 136

View logs......................................................................................................... 136

Restore requirements...................................................................................... 136

Software requirements for restore..................................................... 137

Tail-log backup and point-in-time restore requirements......................137

Requirements to restore secondary database files..............................138

Requirements to restore the Report Server database.........................139

SQL Server write permission requirements.........................................139

Finding a backup..............................................................................................139

Finding a backup by date.................................................................... 139

Finding a backup by content............................................................... 142

Determine the restore size for an SQL server database...................................145

Determine the space required to restore the system database........... 145

Determine the space required to restore a single SQL server database....

145

Determine the space required to restore multiple SQL server databases

........................................................................................................... 146

Restoring to the original location..................................................................... 146

Restoring to a new database in the original instance....................................... 148

Restoring to a different instance..................................................................... 149

Restoring to a file.............................................................................................151

Restoring to a file with the SQL Server plug-in...................................152

Restoring to a file with the Windows File System plug-in................... 153

Restoring a database with SQL Server tools.......................................155

Restoring system databases............................................................................159

Restoring system databases automatically to the original location..... 160

Restoring system databases manually to the original location............. 161

Restoring system databases to a different instance........................... 163

Restoring to an AlwaysOn availability group.................................................... 165

Restoring to the original availability group.......................................... 166

Restoring to a new database in the original availability group..............167

Restoring to a different availability group........................................... 167

Restoring to a SQL Server instance without availability groups.......... 168

Restoring to operating system files.................................................... 168

Restoring a database with an intact log file..................................................... 168

Setting restore options....................................................................................169

General restore options...................................................................... 170

Dell EMC Avamar Administration Guide

5

................
................

In order to avoid copyright disputes, this page is only a partial summary.

Google Online Preview   Download