App Manager

Embed Size (px)

Citation preview

  • 8/12/2019 App Manager

    1/56

    Pagei

    Protecting and Restoring Copy Datawith the Application Manager

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    Protecting and Restoring Copy Data with the Appl ication Managercontains:

    Chapter 1, Introduction

    Chapter 2, Discovering and Creating Applications, Groups, and Virtual Machines

    Chapter 3, Protecting Applications

    Chapter 4, Reviewing Policies

    Chapter 5, Restoring Protected Applications

    Chapter 6, Protecting Applications with Dedup- Async Replication

  • 8/12/2019 App Manager

    2/56

    ii

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Copyright, Trademarks, and other Legal Matter 2013 Actifio, Inc. All rights reserved.

    Actifio is a registered trademark of Actifio, Inc. AnyIT, Dedup Async, Manage Data Simply, Virtual Data

    Pipeline, VDP, Protection and Availability Storage Platform, and PAS are trademarks of Actifio, Inc. All

    other brands, product names, goods and/or services mentioned herein are trademarks or property of their

    respective owners.

    Actifio believes the information in this publication is accurate as of its publication date. Actifio reserves the right

    to make changes to information published in this document, including without limitation specifications and

    product descriptions, at any time and without notice. This document supersedes and replaces all information

    supplied prior to the publication hereof.

    THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS. ACTIFIO, INC. MAKES NO

    REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS

    PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR

    FITNESS FOR A PARTICULAR PURPOSE.

    This software and the associated documentation are proprietary and confidential to Actifio. Use, copying, and

    distribution of any Actifio software described in this publication requires an applicable software license. Any

    unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal

    liability.

    Actifio strives to produce quality documentation and welcomes your feedback. Please send comments and

    suggestions to [email protected].

    Contact Actifio Support

    As an Actifio customer, you can get support for all Actifio products through the Support Portal at

    http://support.actifio.com/

  • 8/12/2019 App Manager

    3/56

    iii

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    Table of ContentsCopyright, Trademarks, and other Legal Matter .............................................................................................. ii

    Chapter 1 - Int roduction .......................................................................................................... 1About the Application Manager...........................................................................................................................2Discovering Applications and VMs......................................................................................................................4Protecting Applications .......................................................................................................................................5Restoring Applications ........................................................................................................................................6

    About In-Band and Out-Of-Band Application Protection.....................................................................................6

    Chapter 2 - Discovering and Creating Applications, Groups, and Virtual Machines ........ 7Discovering Applications.....................................................................................................................................8Discovering Virtual Machines..............................................................................................................................9Creating Generic Applications ..........................................................................................................................10

    Creating a Group .............................................................................................................................................. 11Creating a Consistency Group..........................................................................................................................12Deleting an Application/VM/Group/Host ...........................................................................................................13

    Chapter 3 - Protecting Appl ications ..................................................................................... 15Protecting an Application ..................................................................................................................................16Configuring Advanced Protection Settings .......................................................................................................17

    Advanced Settings for Out-of-Band File Systems .........................................................................................18Advanced Settings for Oracle Databases......................................................................................................19Advanced Settings for CIFS Share................................................................................................................21

    Suspending Protection......................................................................................................................................23Running an On-Demand Backup ......................................................................................................................24

    Chapter 4 - Reviewing Polic ies ............................................................................................. 25Viewing the Policies Applied to an Application..................................................................................................26Setting Policy Advanced Options......................................................................................................................27

    Chapter 5 - Restor ing Protected Appl ications .................................................................... 29Mounting a Backup Image ................................................................................................................................30Cloning a Backup Image...................................................................................................................................33Restoring a Backup Image................................................................................................................................36Restoring Selected Files/Directories.................................................................................................................37Forcing the Expiry of a Backup Image ..............................................................................................................39Verifying a Deduplicated Backup Image ...........................................................................................................40

    Chapter 6 - Protecting Appl ications with Dedup- Async Replication ............................... 41About Dedup-Asynchronous Replication ..........................................................................................................41

    States of a Protected Application...................................................................................................................42Configuring Dedup-Async Replication ..............................................................................................................43

    Selecting the Storage Pool ............................................................................................................................44Testing Failover..............................................................................................................................................45Deleting a Test-Failover Image......................................................................................................................46Failing Over an Application............................................................................................................................47

    Synchronizing Application Data Before Failing Back.....................................................................................48Failing Back to the Local PAS Cluster ...........................................................................................................49Restoring a Synchronized Image......................................................................................................................50

    Index ........................................................................................................................................ 51

  • 8/12/2019 App Manager

    4/56

    iv

    Protecting andRestoringCopyDatawiththeAppl ication Manager

  • 8/12/2019 App Manager

    5/56

    1

    Chapter

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    1

    IntroductionApplications are data resources. Use the Application Manager to protect them, and to restore them.

    The Application Manager is a very powerful service of Actifio PAS 5.1. This introduction provides an overview

    of what it does, and then each section links to a chapter with further information:

    About the Application Manageron page 2

    Discovering Applications and VMsonpage 4

    Protecting Applicationson page 5

    Restoring Applicationson page 6

    About In-Band and Out-Of-Band Application Protectionon page 6

    The Application Manager

  • 8/12/2019 App Manager

    6/56

    Introduction

    2

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    About the Application ManagerUse the Application Manager to protect and recover your data resources.

    Parts of the Appli cation Manager

    Like other Actifio PAS 5.1 services, the Application Manager includes a tab bar at the top of the page and a

    service menu at the bottom of the left sidebar. It also has a 4-button list filter at the top of the navigation pane.

    Use this to filter the list of resources that appears in the navigation pane.

    The Application Manager Navigation Pane List Filter

    The Application Manager employs a number of icons to help you see the status of a resource at a glance.

    These are shown in Getting Started with Actifi o PAS 5.1.

    The Application Manager service menu commands are listed inApplication Manager Service Menu Itemson

    page 3.

    http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-
  • 8/12/2019 App Manager

    7/56

    Appl ication Manager Serv ice Menu Items

    Menu Item Task

    Show Jobs Displays jobs associated with the application in context by switching your view to

    System Monitor and applying appropriate filters.

    Discover APP(s)... Find an application on a host that runs the Actifio Connector. The Actifio Connector

    enables Actifio PAS to find file systems, Oracle databases, and Microsoft Exchange,

    Microsoft Share Point, and Microsoft SQL Server applications.

    Discover VM(s)... Find the virtual machines managed by ESX hosts/ ESX clusters that are in turn

    managed by vCenter servers.

    New Application... Add an application from a host where the Actifio Connector is not installed and to name

    a mounted image as a new application.

    New Consistency Grp Create a group of applications. Create this group when you want to protect theconsistency of data among member applications. All member applications of a

    consistency group should reside on the same host. You cannot include one consistency

    group as a member of another consistency group.

    New Group Create a group of applications. Create this group when you want to protect several

    applications with a single policy. Member applications residing on various hosts can be

    grouped together. You cannot include a group as a member of another group.

    Manage VDisk(s) Manage virtual disks.

    Modify Expiration Changes the expiration date for backups for a selected application within a date range.

    Expire All Backups... Expires all the backups for the selected application, file system, group, or a consistencygroup.

    Mark Ignored Ignores an application during discovery and when computing the dashboard statistics.

    Unmark Ignored Lets you reverse the choice you have made using the Mark Ignored option.

    Delete Delete an application, file system, group, or a consistency group.

    Cleanup Dedup Async Cleans up the artifacts from running Dedup-Async related operations.

    3

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    Introduction

  • 8/12/2019 App Manager

    8/56

    Introduction

    4

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Discovering Applications and VMsThe first step to protecting your data is to have Actifio PAS discover it. When you discover applications, Actifio

    PAS identifies the various data resources on the host and presents them in the Actifio Desktop. Then you can

    protect them, and eventually recover them if needed.

    Actifio PAS discovers VMs by querying vCenter using VMware APIs. For automated discovery of other

    applications, you use the Actifio Connectors. The Actifio Connectors are software components that connect the

    Actifio Desktop to Windows, Unix, and AIX hosts. Procedures for installing the Actifio Connectors are in the

    Actifio PAS Documentation Library, reachable from the life-ring icon in the lower right corner of the Actifio

    Desktop.

    If an application is on a host that cannot be reached by an Actifio Connector, you can create the application

    manually with the New Application feature on the service menu.

    Application discovery and creation are detailed in Discovering and Creating Applications, Groups, and Virtual

    Machineson page 7.

    The Discovery Options on the Application Manager Service Menu

  • 8/12/2019 App Manager

    9/56

    5

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    Introduction

    Protecting ApplicationsWhen you protect an application with Actifio PAS, you apply a policy template and a resource profile as

    detailed in Chapter 3, Protecting Applications.

    The Protection Options on the App lication Manager Protect Tab

    Before you can protect applications, you must:

    Discover them, as detailed in Chapter 2, Discovering and Creating Applications, Groups, and Virtual

    Machines.

    Have a policy template and a resource profile in a Service Level Agreement (SLA). You develop SLAs

    with the SLA Architect, detailed in Planning and Developing Service Level Agreementsin the Actifio

    Documentation Library.

  • 8/12/2019 App Manager

    10/56

    Introduction

    6

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Restoring ApplicationsWhen you restore an application with Actifio PAS, you follow the procedures described in Chapter 5, Restoring

    Protected Applications. Actifio PAS allows simple, fast access to point-in-time images of your application data.

    The Restore Options on the Application Manager Restore Tab

    About In-Band and Out-Of-Band Applicat ion ProtectionApplications can be in-band or out-of-band. Even a discovered application on a VM can be in-band if the

    application is entirely resident on physical mode RDMs exported by Actifio PAS. A discovered application on a

    VM is not in-band if its data stores are in band. The type of backup performed depends on the collection of

    volumes that the application resolves to at the backup time. If any one of the volumes is out-of-band type, the

    whole backup is performed out-of-band. If all the volumes are in-band, an in-band backup is performed. When

    an in-band backup is performed, all volumes are snapshotted at the same time.

    When you set up an in-band VDisk, you:

    1. Create a virtual disk.

    2. Map the virtual disk to the ESX host/cluster.

    3. Use vCenter to create a data-store on the virtual disk.

    4. Use vCenter to create virtual machines on the data-store.

  • 8/12/2019 App Manager

    11/56

    7

    Chapter

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    2

    Discovering and Creating Applications,

    Groups, and Virtual MachinesThis chapter details:

    Discovering Applicationson page 8

    Discovering Virtual Machineson page 9

    Creating Generic Applicationson page 10

    Creating a Groupon page 11

    Creating a Consistency Groupon page 12

    Deleting an Application/VM/Group/Hoston page 13

    The Discovery Options on the Application Manager Service Menu

  • 8/12/2019 App Manager

    12/56

    Discoveringand CreatingApplications,Groups,and VirtualMachines

    8

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Discovering ApplicationsYou can discover applications on physical hosts and on VMs. You must have the 'Host Manage' or 'Application

    Manage' rights to discover applications.

    Discovered applications are those that are identified by the Actifio Connector on a host. This includes:

    File systems on Microsoft Windows and Linux, including local drives and mapped NFS/CIFS shares

    Microsoft SQL Server, Microsoft Exchange Server and Microsoft Share Point Server on Windows Oracle database on Windows, Linux, and AIX

    vCenter hosts

    Note: Only CIFS shares that are mapped with the Reconnect at logon option on the host will

    be discovered.

    Note: For Oracle databases, make sure that the oratab, tnsnames.ora, and listener.ora files

    contain entries for the database that you want to discover.

    To discover an application:1. Open theAppl ication Manager.

    2. From the service menu, select Discover App(s).A list of all hosts appears:

    Discovering Applications on a Host

    3. Select the host that includes the application you would like to protect.

    4. Click Discover. The navigation pane lists all the applications attached to the selected host, including

    applications residing on out-of-band storage, as soon as they are discovered.

  • 8/12/2019 App Manager

    13/56

    9

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    Discoveringand CreatingApplications,Groups,and VirtualMachines

    Discovering Virtual MachinesThe prerequisites to discover a virtual machine on an ESX server/host are:

    Have the 'Host Manage' right to find a virtual machine.

    Add a vCenter and an ESX server/cluster as hosts separately as described inAdding a Host section.

    When the ESX host has virtual machines already created, add a vCenter or ESX server/cluster as hosts

    separately as described in Configur ing Actif io PAS with the Domain Managerin the Actifio DocumentationLibrary. You can discover and protect the virtual machines associated with a vCenter via an ESX host or

    cluster. These VMs are protected using VMware snapshots to get a point-in-time image (application consistent

    under the right conditions). The data stores that the VMDKs live on may be in-band or out-of-band.

    To discover a VM:

    1. Open the Application Manager.

    2. Click Discover VM(s)...from the service menu. The Discover VM(s) window appears.

    Discovering VMs on a Host

    3. In the Discover VM(s) window, select the vCenter you added as a host earlier. Click the vCenter. The

    Discover VMs window discovers and displays the ESX host/clusters managed by the vCenter.

    4. Click an ESX server/cluster. If there is an agent on the vCenter server, then the ESX server and its

    virtual machines are listed. If not, then only the VMs are listed.

    5. Select the virtual machines that you would like to protect.

    6. Double-click Discover. The virtual machine is added to the list of virtual machines atAppl icationManager>Appl ications by Type > VM.

  • 8/12/2019 App Manager

    14/56

    Discoveringand CreatingApplications,Groups,and VirtualMachines

    10

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Actifio PAS handles multiple VMs with same name using an unique identifier (UUID) and a friendly path.

    These details can be viewed by hovering over the VM in the left pane or in the details section. The

    friendly path comprises of the VCenter name, Data Center name, and path to folders of the VM as shown

    below:

    Differentiating mul tiple VMs with UUID

    After discovering the virtual machines, all the ESXs that can be seen from that vCenter and the

    discovered VMs are added as hosts under the Hosts page.

    Note: Only one password can entered for VM discovery. If the vCenter host has CIFS and/or NFS share drives

    that require passwords that are different from the vCenter password, they will not be discovered.

  • 8/12/2019 App Manager

    15/56

    11

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    Discoveringand CreatingApplications,Groups,and VirtualMachines

    Creating Generic ApplicationsA generic application is a collection of in-band virtual disks. Generic applications are snapshotted using

    consistency groups, and you get all VDisks frozen at the same point in time.

    Every generic application has an associated host where you can run pre- and post-scripts. To run scripts, you

    must provide the user credentials for the host, and the host has a connector that has been discovered.

    To create an application on a host that does not run the Actifio Connector or to name an application on a hostas required:

    1. Open theAppl ication Manager.

    2. From the service menu, select New Application....The Add an Application window opens:

    3. Enter the name of the application in Enter a Name.

    4. Click the appropriate application type such as VM, Oracle, SQL Server, or File System. Alternatively,

    enter the application type.

    5. Select the host on which the application is running from Select Host.

    6. Click the host to view the virtual disks attached to it.

    7. Click the virtual disk you would like to assign to the application. Repeat this step to attach all the virtual

    disks that are associated with the application.

    8. Click theAddbutton.

  • 8/12/2019 App Manager

    16/56

    Discoveringand CreatingApplications,Groups,and VirtualMachines

    12

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Creating a GroupA group is used for ease of management to apply a common policy to all the groups applications. Mount, clone

    and restore operations are performed on the backup images of each application in the group individually.

    To create a group of applications to manage the group using a common policy:

    1. Open the Application Manager.

    2. From the service menu, select New Group...The Group properties window opens:

    Creating a Group

    3. Enter a name in Group Name.

    4. Select an application by clicking the +sign displayed against the application. Alternatively, you can add

    all applications to the group by clickingAdd A ll .

    5. Click Save.

  • 8/12/2019 App Manager

    17/56

    13

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    Discoveringand CreatingApplications,Groups,and VirtualMachines

    Creating a Consistency GroupYou can create a consistency group to back up application data of all member applications together to preserve

    consistency of data across the member applications. In addition, you apply a common policy to the members of

    a consistency group. Consistency groups are applications that are a collection of discovered applications from

    the same host.

    When creating a snapshot of these applications, Actifio PAS resolves all of the applications into a collection of

    volumes. If all of these volumes are in-band virtual disks, then the consistency group is snapshotted at the

    same moment in time. If any one of the volumes is not in-band, then the consistency group is backed up as

    out-of-band application, and the constituent applications are self-consistent, but not at the same-point in time.

    To create a consistency group:

    1. Open the Application Manager.

    2. From the service menu, select New Consistency Grp.

    Creating a Consis tency Group

    3. Select an application by clicking the +sign displayed against the application. Alternatively, you can add

    all applications to the group by clickingAdd A ll .

    4. Click Save.

    Note:Adding generic applications, virtual machines and Oracle Applicat ions within a

    consistency group is not allowed.

  • 8/12/2019 App Manager

    18/56

    Discoveringand CreatingApplications,Groups,and VirtualMachines

    14

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Deleting an Application/VM/Group/HostYou can delete:

    Applications, VMs, groups, and consistency groups that are discovered but not protected.

    Protected applications, VMs, and groups after unprotecting them (disassociating the SLA).

    Hosts, after un-mapping the VDisks associated with them.

    Note: You cannot delete local applications, VMs, groups, or hosts. Remote objects that appear in the

    Application Manager under the Remote category should be deleted from the remote PAS cluster.

    To delete an application, VM, group, or host:

    1. Open the Application Manager.

    2. Click the App, VM, Group, or Host filter tab from the top of the navigation pane.

    The Application Manager Navigation Pane List Filter

    3. Select the Application/VM/Group/Host to delete.

    4. From the service menu, click Delete.

    5. Click Yesin the confirmation dialog.

    The application appears as an orphan in the navigation pane under Orphan. You can delete a resource

    profile or a policy template only when the resource profile or policy template is not used to protect an

    application. You can see an application in the orphan section only if there are any images corresponding

    to that application.

    Note: Deleting an application or the protection cleans up the dedup-async related images (if dedup-async is

    configured for that application). If any stale images are left out on the PAS (usually due to a remote cluster

    unavailability), in the left bottom menu list, you will see an operation called Cleanup dedup-async. See

    Deleting Failover, Test-Failover, and Syncback Imageson page 46.

  • 8/12/2019 App Manager

    19/56

    15

    Chapter

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    3

    Protecting Applications

    This section explains how to protect and un-protect applications by applying the policy templates and resource

    profiles that you developed in the SLA Architect:

    Protecting an Applicationon page 16

    Configuring Advanced Protection Settingson page 17

    Suspending Protectiononpage 23

    Running an On-Demand Backupon page 24

    Protecting an Application

    Before you can protect applications, you must: Discover them, as detailed in Chapter 2, Discovering and Creating Applications, Groups, and Virtual

    Machines.

    Have a policy template and a resource profile in a Service Level Agreement (SLA). You develop SLAs

    with the SLA Architect, detailed in Planning and Developing Service Level Agreementsin the Actifio

    Documentation Library.

  • 8/12/2019 App Manager

    20/56

    Protecting Applications

    16

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Protecting an ApplicationYou protect an application by binding a resource profile and a template to it to make an SLA.

    To protect an application:

    1. Open theAppl ication Managerto the Protect tab.

    2. Select an application, virtual machine, or group you want to protect from the navigation pane.

    Protecting an Application

    3. Select an SLA template from Templatedrop-down list. This is the template that defines the snapshot/

    deduplication/ replication of the application data.

    4. Select a resource profile from Profiledrop-down list. This defines the resources used to store the data of

    the application as snapshot/deduplicated/replicated images.

    5. Click Protect.

  • 8/12/2019 App Manager

    21/56

    17

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    Protecting Applications

    Configur ing Advanced Protection SettingsAfter protecting an application, or a file system, you can configure certain advanced protection settings.

    To configure advanced protection settings:

    1. Open the Application Manager to the Protect tab.

    2. SelectApps , VMs, Groups, or Hoststo filter the list in the navigation pane as required.

    3. Select the application from the navigation pane.

    4. ClickAdvanced Sett ings . The Advanced Settings page appears. Advanced settings are detailed in the

    following pages for:

    Advanced Settings for Out-of-Band File Systemson page 18

    Advanced Settings for Oracle Databaseson page 19

    Advanced Settings for CIFS Shareon page 21

    5. Make the desired changes and then click Save.

    6. Click Saveto update the changes.

    Note: The available settings vary based on type of application selected.

  • 8/12/2019 App Manager

    22/56

    Protecting Applications

    18

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Advanced Settings for Out-of-Band File SystemsTo configure advanced protection settings for out-of-band file systems:

    1. Open the Application Manager to the Protect tab.

    2. ClickApp> Local> File Systems.

    3. Select the protected file system from the navigation pane.

    4. Click the blueAdvanced Sett ings link in the upper right corner. The Advanced Settings page appears:

    5. Select Take application consistent backupfrom the Application Consistent drop-down list.

    6. Provide the start paths in the Start Pathfield. Start-path specifies the point in the file system where

    backup starts. If the start-path field is left blank, backup starts at the root directory of the file system to be

    backed-up. For example, a value of / usr / l ocal will back up the / usr / l ocal directory whenprotecting applications on a Linux host. Click Add to define additional start paths.

    7. Provide the prune paths in the Prune Path(s)field. Use Add link to add a path. Prune-path specifies a

    point in the file system where directory traversal will stop. When protecting a Linux application, a value of

    /usr/local/lib will ensure that nothing below / usr / l ocal / l i bis copied, but all other directories and filesin /usr/local are copied. If this field is left blank, every subdirectory of the start paths is backed up. Click

    Add to define additional prune paths

    8. Enter the file name patterns to be excluded from backup in the Exclude Pattern(s)field. You can

    exclude certain file types from the backup. Using this option, only the most crucial data is backed-up

    leaving aside the non-critical files. Guidelines for exclude patterns:

    Using this option, only files are excluded, directories are not excluded.

    A pattern can include wild-card characters, for example, an asterisk (*) or a question mark (?). To

    exclude all the files that contains .sys as extension, enter *.sys in the Exclude Pattern(s) field.

    On Windows, files named pagefile.sys and hiberfil.sys that appear in the root directory of a driveare automatically ignored.

    9. Enter the staging disk size, in gigabytes, in the File system Staging Disk Size (GB)field. By default, the

    Actifio Connector uses the size of the protected file system as the size of the staging disk. This setting

    allows the administrator to override this value, for example to allow for growth of the file system.

    10. Choose Do not Unmap if required. This maps temporary staging disks to the host to be used during

    data movement. LUNs are mapped during the first job, all subsequent jobs reuse the mapped LUN.

    11. Click Savetoupdate the changes.

  • 8/12/2019 App Manager

    23/56

    19

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    Protecting Applications

    Advanced Settings for Oracle Databases

    Note: In order to protect an Oracle database, you must have database login details with sysdba privileges.

    During the protection process, you must enter the credentials, enter the user name and password and then

    click Protect to proceed. If the password contains any special characters, then it must be entered in double

    quotes. Using @ in a password is not supported.

    To configure advanced protection settings:

    1. Open the Application Manager to the Protect tab.

    2. ClickApp> Local> Oracle.

    3. Select the protected database from the navigation pane.

    4. Click the blueAdvanced Sett ings link in the upper right corner. The Advanced Settings page appears:

    5. Enter the number of RMAN channels in the Number of Channels field. You can set the maximum

    number of channels up to 8. The default value is 1.

    6. Enter the staging disk size in the Staging Disk Size (GB) field. By default, the Actifio Connector

    calculates the max size of the database as configured. The Staging Disk Size option allows you to

    allocate a staging disk to hold backup and to allow future growth of the database.

    For example: adding more table space, data files while the backup still maintains incremental behavior.

    This staging disk is thin provisioned. Another use case of this staging disk size, after user restored the

    whole database from PAS backup and when open the database with reset log; you must take a level '0'

    backup again. In the current release this is not done automatically by the Actifio Connector. To force a

    new level '0', you must change the staging disk size and then save. Next backup will perform a new level

    '0'. The unit is in GB.

    7. Enter the RMAN log path in the RMAN Log Locationfield. This is the custom location (full path along

    with RMAN filename) where RMAN writes the logs while taking the backup.

    For Linux, the default log location is / act / l og/ si d_r man. l og.If you change the path, the value must be in the form / act / l og/ t est / cust om_r man. l og

  • 8/12/2019 App Manager

    24/56

    Protecting Applications

    20

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    For Windows, the default log location is c: \ act _t mp\ l og\ si d_r man. l og.If you change the path, be sure there are no spaces in the path.

    8. Choose to validate each backup before restoring it. RMAN provides restore validate for the backups,

    when this option is provided (true), the Actifio Connector invokes RMAN restore validate command for

    each backup.

    9. Enter the Oracle catalog database name if one is used in the Catalog DBNamefield. This field is used

    only when you are using a catalog database for RMAN repository. By default, a control file is used.

    10. Enter the Oracle catalog database user name in the Catalog Userfield. This field is used only when you

    are using a catalog database for RMAN repository. By default, a control file is used.

    11. Enter the Oracle catalog database login password in the Catalog Passwordfield. This field is used only

    when you are using a catalog database for RMAN repository. By default, a control file is used.

    12. By default, Oracle backup skips inaccessible and offline tablespace/datafiles. If you do not want to skip

    these, then select an option from RMAN Backup Not Skip drop-down field.

    13. Enter the oracle database service name in Oracle Servicenamefield. This is optional for a standalone

    instance but required for a RAC setup.

    14. Enter the IP addresses of cluster nodes in the cluster nodesfield for fail-over choice in this format:1: 172. 16. 16. 21: svc_orarac2_act : F [ f ai l over r ank] : [ f ai l over nodei p] : [ ser vi cename on f ai l over node] : [ r ol e of member node] r ol e of member nodeby default should be F(failover).It can also be M(maintenance). When a cluster member role is specified as M, then PAS uses it as the

    primary backup node instead of using the original RAC node. A maintenance node in RAC is normally

    responsible for backup and other maintenance tasks of the RAC setup.

    15. Choose Do not Unmap option if required. When this option is selected, temporary staging disks

    mapped to the host and used during data movement remain mapped to the host. LUNs are mapped

    during the first job and all the subsequent jobs reuse the mapped LUN. By default, this option is option is

    selected.

    16. Select whether you want to truncate the logs after every backup. When this option is selected, application

    related logs are truncated till the recent or current backup.

    17. Click Saveto update the changes.

    Disabling OS Authentication for Oracle

    Windows OS authentication allows Oracle to delegate control of user authentication for the database to the

    operating system. Due to this, any test credentials for Oracle database accepts any invalid user name/

    password and always shows the test result successful. To avoid this, you must disable the OS authentication

    for Oracle.

    To disable OS authentication for Oracle:

    1. Log on to the Windows machine through which the Oracle Database was discovered.

    2. Open Computer Management.

    3. Under System Tools, expand Local Userand Groups.

    4. Select Groupsunder Local User and Groups, select ora_dba on the right panel.

    5. Click on More Actionsunder ora_dba on the second right panel.

    6. Click on Properties.

    7. SelectAdminist ratorunder Membersand click Remove.

    8. ClickApplyand then OKto close dialog box.

  • 8/12/2019 App Manager

    25/56

    21

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    Protecting Applications

    Advanced Settings for CIFS ShareTo configure advanced protection settings for CIFS Share:

    1. Open the Application Manager to the Protect tab.

    2. ClickApp> Local> CIFS.

    3. Select the protected CIFS share from the navigation pane.

    4. Click the blueAdvanced Sett ings link in the upper right corner. The Advanced Settings page appears:

    5. Provide the start path names in the Start Path field. Start-path specifies the point in the CIFS share

    where backup starts. If the start-path field is left blank, backup starts at the root directory of the filesystem to be backed-up. For example, a value of \ \ SERVERNAME\ SHARENEAME\ abc will back up theabc directory on the CIFS Share when protecting applications on a Windows host. Click Add to define

    additional start paths.

    6. Provide the prune paths in the Prune Path(s)field. Prune-path specifies a point in the file system where

    directory traversal will stop. When protecting a Windows application, a value of

    \ \ SERVERNAME\ SHARENEAME\ abcwill ensure that nothing below\ \ SERVERNAME\ SHARENEAME\ abc is copied, but all other directories and files in \\

  • 8/12/2019 App Manager

    26/56

    Protecting Applications

    22

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    9. Enter the CIFS share password in File system Passwordfield.

    10. Enter the staging disk size, in gigabytes, in the File system Staging Disk Size (GB)field. By default, the

    Actifio Connector uses the size of the protected file system as the size of the staging disk. This setting

    allows the administrator to override this value if necessary, for example to allow for growth f the file

    system.

    11. Choose Do not Unmap option if required. When this option is selected, temporary staging disks

    mapped to the host and used during data movement for backup remain mapped to the host. LUNs are

    mapped during the first job and all the subsequent jobs reuse the mapped LUN. By default, this option is

    selected.

    12. Click Saveto update the changes.

  • 8/12/2019 App Manager

    27/56

    23

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    Protecting Applications

    Suspending ProtectionTo temporarily pause the protection applied to an application:

    1. Open the Application Manager to the Protect tab.

    2. ClickApps , VMs, Groups, or Hostsas required.

    3. Select the application from the navigation pane.

    4. Select Noin SLA Options> Run Schedule.

    5. Click Yesin the confirmation dialog.

  • 8/12/2019 App Manager

    28/56

    Protecting Applications

    24

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Running an On-Demand BackupTo run an on-demand backup:

    1. Open the Application Manager to the Protect tab.

    2. Select the application that you want to backup from the navigation pane.

    Note: You cannot run an on-demand backup for an individual member of a consistency group.

    3. Click the arrow that shows the policies configured to manage the backup.

    4. Click Run Nowon the desired policy.

    Running an On-demand Backup Job

    5. Click Yesin the confirmation dialog. A backup image will be created with retention as per the policy used.

    Note: The Run Now option fails with an error message if a job corresponding to the policy is already running.

  • 8/12/2019 App Manager

    29/56

    25

    Chapter

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    4

    Reviewing Policies

    Use the Policies tab to view the details of the SLA policies assigned to protected applications. If a host, VM, or

    application is not protected, then the policies tab does not appear.

    This section includes:

    Viewing the Policies Applied to an Applicationon page 26

    Setting Policy Advanced Optionsonpage 27

    The Application Manager Policies Tab

  • 8/12/2019 App Manager

    30/56

    ReviewingPolicies

    26

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Viewing the Policies Applied to an ApplicationTo view the policies applied to an application:

    1. Open the Application Manager to the Policies tab.

    2. Select an application from the navigation pane. A list of policies applied to the application is displayed.

    You can run an ad hocbackup from this page, as described in Running an On-Demand Backupon page 24.

  • 8/12/2019 App Manager

    31/56

    27

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    ReviewingPolicies

    Setting Policy Advanced OptionsSome SLAs allow you to change advanced settings at the application level. You can change these settings for

    a particular application:

    Application Consistent

    Take application consistent backup

    Take crash consistent backup

    Take crash consistent backup on last try

    Do Not Unmap

    out of band staging disks not unmapped after backup

    out of band staging disks unmapped after backup

    Truncate Log After Backup

    Truncate log after backup

    Do not truncate log after backup

    The option to enable advanced settings is in the SLA. For a detailed explanation of these options, refer to

    Planning and Developing Service Level Agreements in your Actifio Documentation Library.

    Settings Advanced Policy Options

  • 8/12/2019 App Manager

    32/56

    ReviewingPolicies

    28

    Protecting andRestoringCopyDatawiththeAppl ication Manager

  • 8/12/2019 App Manager

    33/56

    29

    Chapter

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    5

    Restoring Protected Applications

    This section contains:

    Mounting a Backup Imageon page 30

    Cloning a Backup Imageon page 33

    Restoring a Backup Imageon page 36

    Restoring Selected Files/Directorieson page 37

    Forcing the Expiry of a Backup Imageon page 39

    Verifying a Deduplicated Backup Imageon page 40

    The Restore Options on the Application Manager Restore Tab

  • 8/12/2019 App Manager

    34/56

    RestoringProtectedApplications

    30

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Mounting a Backup ImageMounting a backup image results in creating a virtual copy of the selected image and presenting it to the

    selected host. This virtual copy is fully read/writable, but does not consume any additional storage at the time

    of creation. Further changes to it will require incremental additional storage.

    After mounting the image, you can either use it directly or restore individual files or directories from the

    mounted image as described in Restoring Selected Files/Directorieson page 37.

    Actifio PAS lets you mount one or more backup images from:

    A VM to the same VM, to another VM, or to any other host. The mounted image is displayed as a new

    drive on the mounted VM or host.

    An Application to the same host, to another host, or to a VM.

    Actifio PAS mounts images transparently to a host/virtual machine and does not require additional zoning (if

    that was done originally) or shutdown/restart of the host/VM.

    Multiple backup images can be mounted to the same host or VM. Any mounted image can be unmounted

    individually.

    Before mounting an image, ensure that the WWPN/iSCSI port of the host where the backup images will be

    mounted is accessible to the PAS. This mount operation is applicable for all applications and VMs.

    To mount a backup image to a host:

    1. Open the Application Manager to the Restore tab.

    2. Select the application or VM from the navigation pane.

    3. Select the time period for backups using the calendar icons to filter the list of backups as needed.

    4. Select the backup image type by clicking on the corresponding Snapshot, Dedup, Remote, or LiveClone

    buttons. You can use the Shift key to select multiple types.

    5. Select the backup image to mount from the list on the right. The selected image icon turns green and

    detailed information about it is displayed in the image box at the center of the display.

  • 8/12/2019 App Manager

    35/56

    31

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    RestoringProtectedApplications

    6. Click the pull-down menu from the bottom right of the image information display and select Mount. The

    Mount Job window is displayed:

    Selecting a Physical Host (left) and a Virtual Machine (right) as Host

    7. If required, change the default storage pool from the Select default storage pool drop-down list.

    8. Select a host (physical or virtual) from Select Host(s) drop-down list.

    If the backup image is of a physical host, skip to Step 9.If the backup image is of a VM, select a Hostto Mount:

    Existing Hostoption: Select the host that you want to mount from the Choose from existing hosts

    drop-down list. The selected host must be a SAN host or a Virtual Machine on ESX Server that is

    connected to Actifio PAS. Select a single or multiple volumes to mount from Select volumes to mount. By

    default, all the volumes are selected. If you mount to an existing VM, the VM disks will show up as a new

    file system drive on the VM.

    New VMoption: Enter a name for the new VM that you want to mount, specify a vCenter server, an ESX

    host, and a datastore in Select vCenter Server, ESX Host, and Datastorerespectively. Actifio PAS

    must write some configuration data to the selected datastore to point to the mounted volumes, but nostorage will be consumed by the backup image virtual copy.

    Mounting a VM: Using Exist ing Host opt ion (left) and Using New VM option (right)

  • 8/12/2019 App Manager

    36/56

    RestoringProtectedApplications

    32

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Select a single or multiple volumes to mount. By default all the volumes are selected. The first volume

    cannot be deselected.

    Note:Acti fio Desktop assumes that the f irst volume of the VM is the boot volume. If the selected

    first volume is not the boot volume, contact Actifio support for further assistance or refer to the

    CLI Reference Guideto perform this task using the CLI.

    If you select a virtual machine, select vRDM or pRDM as mount mode, by default vRDM mode is

    selected. For file level restore operations, use the pRDM mode.

    9. Select a single volume or multiple volumes from Select volumes to mount. By default, all the volumes are

    selected. For an individual file system there may be only one volume, for VMs, consistency groups, and

    generic applications there might be more volumes.

    10. Click Submit . A job is submitted to mount the image to the selected host.

    Note:A mounted image can be used directly from the mounted host or you can restore selected the files or

    directories from it. See Restoring Selected Files/Directorieson page 37.

    If the Actifio Connector is installed on the host on which you have mounted the image, then the backup image

    is mounted to:

    C: \ Wi ndows\ act \ J obname_j obi d on Windows or / mnt / act / J obname_j obi don Linux.

    If the Actifio Connector is not installed, you need to manually mount the new disk that is visible on the host.

    Note: The original backup image is never modified, even if the mounted virtual copy is modified or mounted

    and deleted.

  • 8/12/2019 App Manager

    37/56

    33

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    RestoringProtectedApplications

    Cloning a Backup ImageYou can create two types of backup images: clones and LiveClones.

    Clone Images

    When Actifio PAS clones a backup image, it creates a full copy of the image that consumes as much storage

    as the original application data. This is different from a Mount operation, which uses a virtual copy that does

    not take additional storage.

    Actifio PAS copies the contents of a VDisk to another VDisk that can be mapped to any SAN host. The cloning

    operation is applicable for all the file systems and applications.

    LiveClone Images

    A LiveClone is an independent clone of a backup image that consumes full storage resources and can be

    mounted to a host. It can be refreshed incrementally from another backup image, allowing very fast and

    efficient data refreshes for ETL and test & development purposes. A LiveClone can also be mounted for direct

    modification to support operations such as data masking.

    LiveClones provide a crucial building block in managing copy data lifecycle as they combine the performance

    and independence of a full clone with the efficiency and speed of incremental refreshes of data.

    Cloning an Image

    To clone an image to a host:

    1. Open the Application Manager to the Restore tab.

    2. Select the application with the backup image to be cloned. The Backup images are listed:

    3. Select the time period for backups using the calendar icons to filter the list of backups as needed.

    4. Select the backup image type by clicking on the corresponding Snapshot, Dedup, Remote, or LiveClone

    buttons. You can use the Shift key to select multiple types.

    Cloning a Backup Image

    5. Select the backup image to clone from the list on the right. The selected image icon turns green and

    detailed information about it is displayed in the image box at the center of the display.

  • 8/12/2019 App Manager

    38/56

    RestoringProtectedApplications

    34

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Cloning a Physical Machine

    6. From the pull-down menu at the bottom of the backup details, select Clone. The Clone window appears.

    Note: To clone a VM, skip to Cloning a VM, below. To create a LiveClone, go to Creating a LiveClone, below.

    Clone Job Window for a Physical Host

    7. Select a host from Select Host drop-down list.

    8. Select single volume or multiple volumes from Select volumes to clone.

    9. Select the diskpool. The default diskpool is act_per_pool (the performance pool).

    10. Click Submit . You can see the cloned image under the Restore tab of this application. The disk

    corresponding to this image is shown as a mapped VDisk under Domain Manager> System>Hosts.

    Cloning a VM

    6. From the pull-down menu at the bottom of the backup details, select Clone. The Clone window appears.

    Note: to clone a physical machine, go to Cloning a Physical Machine, above. To create a LiveClone, go to

    Creating a LiveClone, below.

    Clone Job Window for a VM

  • 8/12/2019 App Manager

    39/56

    35

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    RestoringProtectedApplications

    7. Enter a name for the new VM that you want to clone in VM Namefield.

    8. Select a vCenter from Select vCenter Serverdrop-down list where you want to create a VM.

    9. Select an ESX host from ESX Host box where you want to create a VM.

    10. Select a datastore from Datastorebox that has the required storage available.

    11. Select single or multiple volumes to clone. The first volume cannot be deselected.

    Note:Acti fio PAS assumes that the first volume of the VM is the boot volume. If the first volume

    is not the boot volume, Contact Actifio Supportfor assistance or perform this task using the CLI.

    12. Click Submit . You can see the cloned image under the Restore tab of this application. The disk

    corresponding to this image is shown as a mapped VDisk under Domain Manager> System>Hosts.

    Creating a LiveClone

    6. From the pull-down menu at the bottom of the backup details, select LiveClone. The LiveClone Job

    window is displayed.

    Note: To clone a physical machine, go to Cloning a Physical Machine, above. To clone a VM, go

    to Cloning a VM, above.

    Clone Job Window for a Liveclone

    7. Enter a unique name for the new LiveClone in the Labelfield.

    8. Select a diskpool from Pooldrop-down list where you want to create the LiveClone. The default diskpool

    is act_per_pool (the performance pool).

    9. Click Submit . Creation of a LiveClone can take some time depending on the size of the backup image.

    The disk corresponding to this image appears under Domain Manager> System >Hosts.

    Note:Actifio PAS maintains thin/thick provisioning of the original VMs while cloning/restoring a VM snapshot.

    For VM snapshot images created prior to Actifio PAS 5.1.2, cloned and restored VMs will be thin provisioned.

  • 8/12/2019 App Manager

    40/56

    RestoringProtectedApplications

    36

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Restoring a Backup ImageRestoring replaces the original production application data with the backup image. This will result in the loss of

    all current application data as the application will be restored to its status at the point-in-time when the backup

    image was created. This operation cannot be undone.

    Actifio PAS lets you restore a backup image from a VM host to the same VM host or from a non-VM host to the

    same non-VM host.

    Note: When you restore a backup image, the SLA options (Run Schedule, Expire Data) of the protected

    application are turned off.

    Note: For Oracle databases, protected out-of-band restore function is not supported. Use the Clone and Mount

    methods instead.

    To restore a backup image:

    1. Open the Application Manager to the Restore tab.

    2. Select the application or VM to restore.

    3. Select the time period for backups using the calendar icons to filter the list of backups as needed.

    4. Select the backup image type by clicking on the corresponding Snapshot, Dedup, Remote or LiveClone

    buttons. You can use the Shift key to select multiple types.

    5. Select the backup image to restore from the list on the right. The selected image icon turns green and

    detailed information about it is displayed in the image box at the center of the display.

    6. From the pull-down menu, select Restore. The Restore Job window is displayed.

    7. Select a single volume or multiple volumes to restore. By default all the volumes are selected.

    8. Click Submit . A warning dialog appears. Read the warning message carefully and then Enter DATA

    LOSSin the provided field to confirm.

    9. Click Start Restore. The image is restored. For VMs, Actifio PAS removes the relevant VMDKs from the

    VM being restored and creates new VMDKs populated with data copied from the backup image.

    Note: The Restore operation cannot be performed from a remote cluster. However, you can use a remote-

    dedup image for a restore operation on the source cluster itself.

  • 8/12/2019 App Manager

    41/56

    37

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    RestoringProtectedApplications

    Note:Actifio PAS maintains thin/thick provisioning of the original VMs while cloning/restoring a VM snapshot.

    For VM snapshot images created prior to Actifio PAS 5.1.2, cloned and restored VMs will be thin provisioned.

    Restoring Selected Files/Director iesYou can download a subset of files or directories from a backup image mounted to the host. This feature is

    supported only on Windows-based file systems. The restoration includes zipping the files and downloading the

    zipped file on the client running Actifio Desktop.

    Prerequisites to perform this function:

    The Actifio Connector is installed and running on the mounted host.

    The Application Discovery function is executed at least once on the mounted host.

    To restore selected files or directories:

    1. Open the Application Manager to the Restore tab.

    2. Select the desired Application or VM from the navigation pane. If you are selecting a VM, ensure that the

    Actifio Connector is installed on the Virtual Machine and applications on the VM are discovered.

    3. Mount the image as detailed in Mounting a Backup Imageon page 30.

    4. The Restore image is populated. The Active Images pane lists the images mounted on the host.

    5. Select a mounted image from the list.

    6. Click the image information action pull-down menu at the bottom right.

  • 8/12/2019 App Manager

    42/56

    RestoringProtectedApplications

    38

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    7. Click Restore File(s). A tree view of the directories and files of the image is displayed.

    8. Select the files and/or directories to restore by double-clicking the folder or file. You can select the files in

    a directory by opening the directory by clicking the arrow mark displayed against the folder. You can see

    the selected files or folders under Items to Restore. You may use the delete option to de-select files or

    folders.

    9. Click Submit . The Save As window appears.

    10. Select a destination folder on the client running Actifio Desktop.

    11. Enter a name for the zip file.

    12. Click Save. The Actifio Connector zips the selected files and directories and starts the download.

    Note: To prevent unauthorized access to sensitive information, Actifio recommends you

    download the required files to a secure local disk or a NAS mount then share the files with the

    required operators.

  • 8/12/2019 App Manager

    43/56

    39

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    RestoringProtectedApplications

    Forcing the Expiry of a Backup ImageYou can force the expiry of a backup image earlier than its scheduled time in order to gain storage space.

    Expiring deduped backup images may not free any storage if data blocks are shared with other backup images

    of the same or different applications. In any case, no storage will actually become available until a full Dedup

    Garbage Collection sweep is performed. Garbage Collection is managed under the Domain Manager Dedup

    tab. It is detailed in Configur ing Ac tifio PAS 5.1 for Your Data Environment .

    To force the expiry of an image:

    1. Open the Application Manager to the Restore tab.

    2. Select the backup image type by clicking on the corresponding Snapshot, Dedup, Syncback, Remote, or

    LiveClone button.You can use the "Shift" key to select multiple items.

    3. Select the required image. The color of the box representing the image turns green on selection and the

    image details are displayed on a tab.

    4. Click the image information action pull-down menu at the bottom right.

    5. Select Expire. The image is deleted.

    Expiring a Backup Image

    Note: You can only expire all the images of an application, or change expiration dates of selected images.

  • 8/12/2019 App Manager

    44/56

    RestoringProtectedApplications

    40

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Verifying a Deduplicated Backup Image

    Note: Before verifying a backup image, configure a deduplication schedule.

    You may want to verify whether a deduplicated backup image passes a data integrity check to ensure it can be

    used in a live system.

    To verify a deduplicated backup image:1. Open the Application Manager to the Restore tab.

    2. Select the deduplicated images available by clicking Dedup.

    3. Click the image to be verified. The box representing the image turns green on selection.

    4. From the pull-down menu in the bottom right, click Verify. The verification job pop-up appears.

    5. Click Submit . A warning message appears.

    6. Click Yesin the confirmation dialog. You can view the current jobs in the System Monitor service to track

    verification progress.

    Note: You can schedule this process through the SLA Architect. See Planning and Developing Service

    Level Agreementsfor details.

  • 8/12/2019 App Manager

    45/56

    41

    Chapter

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    6

    Protecting Applications with

    Dedup- Async ReplicationDedup-Async Replication (DAR) is a very powerful tool.

    This chapter includes:

    About Dedup-Asynchronous Replicationon page 41

    Configuring Dedup-Async Replicationon page 43

    Restoring a Synchronized Imageon page 50

    About Dedup-Asynchronous ReplicationDedup Async Replication (DAR) provides disaster recovery protection for applications and virtual machines by

    moving protected data from local PAS to remote PAS and making it available for immediate access from the

    remote site. Data movement is done over IP networks after global de-duplication and compression using

    proprietary patent-pending technology, thereby significantly driving down bandwidth requirements and costs.

    This allows wider protection of applications where traditional solutions are cost prohibitive.

    Dedup-Async replication makes replication effortless by:

    Using the existing IP network to replicate data.

    Replicating repeatedly at intervals determined by policy so that network bandwidth is conserved while

    meeting the configured Recovery Point Objective.

    De-duplicating data before replicating so that bandwidth consumption is much lower than the change rate

    of the application.

    Creating a remote re-hydrated image that the application can instantly and transparently fail-over to.

    Making disk management transparent. (Optionally) Replicating VMs to a datastore on the remote site.

    Making it simple to fail-over the application to a host on the remote site.

    Making the synchronization of data back from the remote PAS cluster to the local PAS cluster, simple and

    non- interruptive to the application's I/O activities.

    Cleaning up all remote images created after the application fails back to the local PAS cluster.

    Note: For more information on DAR, seeActi fio PAS Dedup-Async Repl ication in the Actifio Documentation

    Library.

  • 8/12/2019 App Manager

    46/56

    Protecting ApplicationswithDedup AsyncReplication

    42

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    States of a Protected ApplicationThe four states of an application protected using a dedup-async policy are:

    Unprotected: An application is

    unprotectedwhen no SLA is associated

    with it.

    Protection Initialization: An SLA is

    associated with an application but the first

    protection job is yet to complete.

    Protected: An application becomes

    protectedwhen the first replication job

    completes successfully, or when the

    application is failed back. This state

    indicates that there is at least one

    replicated image to fail over to.

    An application remains inthis state as

    long as the SLA associated with it is notremoved or the application is failed over.

    When you remove the SLA, the

    application becomes unprotected.

    If the application fails over to a remote

    site, its state changes to failed over.

    Note that testing the failover capability

    does not alter the state of the application.

    Failed Over: In the failed overstate, the application, which is also configured on the remote site, accesses the

    remote image directly. Consequently, replication to the remote site is paused. When the application is ready to

    operate from the local site, you can synchronize the data back to the local site optionally. The Syncback process

    can be carried out multiple times.

    After synchronizing the data:

    1. Shut down the application on the remote site

    2. Perform one last Syncback operation to make sure all changes were captured

    3. Restore the local application form the syncback image

    4. Fail-back the application to the local site.

    The application state changes to the protected state and the replication to the remote site is resumed. If you

    remove the SLA, the application state changes to the unprotected state.

    Authent ication and Data Encryption

    The authentication process between PAS clusters is performed using the 1024-bit certificates, and thereplicated data is encrypted using the AES-256 encryption standard.

  • 8/12/2019 App Manager

    47/56

    43

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    Protecting ApplicationswithDedup AsyncReplication

    Configuring Dedup-Async ReplicationDedup-Async Replication (DAR) enables you to create a highly available image of an application's data over

    an IP network and to protect numerous applications with relatively little bandwidth. DAR creates a deduped

    backup image on a remote cluster. This image is replaced by a new image as the policy is set off periodically

    based on the configured frequency. As a result, there is always only one image of 'dedup async replicated' type

    on the remote cluster. This image can be readily used to execute a failover or a failover test. Later you can fail

    back the application to the local cluster.

    To configure dedup-async replication of data from a local cluster to a remote cluster, you need:

    A local cluster joined with a remote cluster in the sharing or non-sharing mode.

    A policy for dedup-async replication is configured as described in Planning and Developing Service

    Level Agreementsin the Actifio Documentation Library.

    A resource profile configured to include the remote cluster as described in Creating a Resource Profile.

    An SLA defined as described in Protecting an Application.

    When all the above are configured, dedup-async replication of data is started as per the schedule defined in

    the policy template resulting in the creation of an image of the application data on the remote cluster.

    When multiple deduplication policies are defined for an application, only one of the local, remote, or DAR jobs

    runs at a time. The other policy schedules are queued and are run subsequently based on priority.Dedup-async replication entails:

    Selecting the Storage Poolon page 44

    Testing Failoveron page 45

    Deleting a Test-Failover Imageon page 46

    Deleting Failover, Test-Failover, and Syncback Imageson page 46

    Failing Over an Applicationon page 47

    Synchronizing Application Data Before Failing Backon page 48

    Failing Back to the Local PAS Clusteron page 49

    Suspending DAR

    To disable the SLA schedule to suspend the SLA configured for an application:

    1. Open the Application Manager.

    2. Select the application from the navigation pane.

    3. Click Nofrom SLA Options>> Run Schedule.

    Note: This suspends all protection for this application.

  • 8/12/2019 App Manager

    48/56

    Protecting ApplicationswithDedup AsyncReplication

    44

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Selecting the Storage PoolYou can select a storage pool to create the backup image as part of dedup-async replication. Each cluster can

    configure a separate storage pool that will be used for applications replicated from each of its joined peers.

    1. Log into the Actifio Desktop on the remotecluster.

    2. Open the Domain Manager.

    3. Select System> Configuration> Cluster Settings> Cluster Managerfrom the navigation pane. A listof joined clusters is displayed.

    4. Click the Storagetab for the local(source) cluster that you want to configure.

    5. Select the storage pool from Destination performance pool. These are the storage pools defined on

    the remote PAS cluster. When you select a pool, the DAR images for applications from the local (source)

    PAS cluster are stored here.

    6. Click SaveSettingsbutton to update the changes.

  • 8/12/2019 App Manager

    49/56

    45

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    ProtectingApplicationswithDedup AsyncReplication

    Testing FailoverAfter configuring dedup-async replication, you may want to test the failover of an application to determine the

    readiness of the remote cluster in the event of a mishap. When you test failover, a virtual copy of the most

    recently replicated image of the application is created and presented to the host that you select. You can log on

    to the host and verify that the replicated image is consistent. After you have tested the image, delete the test

    failover image to free up any resources it occupies.

    To test the failover operation, specify a host to which you will mount the failover image. Note that you cannot

    failover a virtual machine application to the same virtual machine.You can test failover from the remote PAS

    cluster. When you test failover, a failover job is started. When the job completes with the job status 'successful',

    the test-failover operation is successful. You can mount, log on to the host, and view the failover image to

    ensure the consistency of data and your complete DR procedure.

    You can have only one image test-failed-over to one host at one time. For example, when a failover image is

    available on the remote PAS cluster and the PAS cluster is managing two hosts, A and B, you can host the

    image on either A or B but not both. When the image is already mounted on the host A, you can unmount the

    image from A and then mount it on B.

    Before performing a test failover, ensure that the WWPN/iSCSI port of the target host where the backup image

    is to be mounted is accessible to the remote PAS cluster.

    To test failover, access the remote PAS cluster using Actifio Desktop and:

    1. Open the Application Manager to the Restoretab.

    2. Select the application from the navigation pane, from the Remote list. The last successful backup job is

    displayed.

    3. From the image information action pull-down menu, click Test Failover.4. Select the target host to fail over the image.

    5. Click Submit . The latest DAR image of the application is used to create a virtual copy and presents it to

    the host you have selected. Since it is a virtual copy of the image, the host can use it without affecting the

    actual DAR image. Later you can delete the image as described in Deleting a Test-Failover Image

    section.

  • 8/12/2019 App Manager

    50/56

    Protecting ApplicationswithDedup AsyncReplication

    46

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Deleting a Test-Failover ImageTo delete a test-failover image from the remote PAS cluster:

    1. Open the Application Manager to the Restoretab.

    2. Select the application from the navigation pane, from the Remote list.

    3. Select the test-failover image from the Active Images pane at the bottom.

    4. From the image information action pull-down menu, click Delete.

    Deleting Failover, Test-Failover, and Syncback Images

    Normally, all failover, test-failover, and Syncback images of an application are deleted when the fail-back

    operation is executed. In rare cases, some images created as part of dedup-async replication of an application

    may not be deleted.

    To delete the failover, test-failover, and Syncback images of an application from the local and remote PAS

    clusters:

    1. Open the Application Manager.

    2. Select the application from the navigation pane.

    3. Right-click the application.

    4. Select the Cleanup Dedup Async option.

    Note: If any of the images remain, the Cleanup dedup async option appears on right-clicking the

    application. Use this option to delete the images. Alternatively, use the CLI cl eanup dedupasync - al l command to delete all images of the application.

  • 8/12/2019 App Manager

    51/56

    47

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    Protecting ApplicationswithDedup AsyncReplication

    Failing Over an Appl icationYou can failover the applications protected with a DAR policy from the local PAS cluster to a host connected to

    the remote PAS cluster. Note that you should initiate the failover from the remote PAS cluster and you can

    failover a VM only to a new VM.

    When you start the failover task, dedup-async replication of the application data to the remote cluster is

    stopped. If a dedup-async replication job is in progress, it is stopped when the application fails over. Snapshot,

    local deduplication, and remote deduplication policies for the application, if any, continue to run on the local

    cluster.

    Before performing a failover task, ensure that the WWPN/iSCSI port of the host where the backup image is to

    be mounted is accessible to the remote PAS cluster.

    To failover an application:

    1. Click Desktop> New Desktopto connect to the remote PAS cluster by launching another session of

    Actifio Desktop.

    2. Open theAppl ication Manageron the remote PAS cluster.

    3. Select the shadow application from Remote in the navigation pane:

    4. Click Dedup Async. By default, the latest image is selected for failover.

    5. From the service menu, select Failover. The Failover Job window is displayed.

    6. Select a host and the diskpool to failover to. When failing over a virtual machine to a new VM, enter the

    VM's name, and select the appropriate values from the vCenter Name, ESX host, Datastore, and

    Diskpool drop-down boxes.

    7. Click Submit . A warning message is displayed.

    8. Enter 'FAILOVER' in the text box.

    9. Click Start Failover. A failover job is initiated. This job stops any dedup-async replication job in progress

    for this application, and presents the latest replicated image to the selected host. You can now log on to

    the host, bring up the application, and direct all the external clients to use this copy of the application.

    When you are ready to bring back the data generated at the remote site to the local site, start the

    Syncback operation.

  • 8/12/2019 App Manager

    52/56

    Protecting ApplicationswithDedup AsyncReplication

    48

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Synchronizing Application Data Before Failing BackAfter an application from the local PAS cluster fails over to a remote PAS cluster, you can failback the

    application to the local PAS cluster. Prior to failing back, you might want to bring back the latest data generated

    at the remote site to the local site. There is no limit to the number of times synchronization is carried out. Each

    synchronization results in creating a new Syncback image on the local PAS cluster.

    The Syncback task should be executed on the remote cluster.

    1. Open the Application Manager.

    2. Select the application from the navigation pane.

    3. Click Syncback.

    4. Click Submit.

    You may want to repeat this task before failing back an application since the data on the remote PAS

    cluster may change even as the data is being brought back to the local PAS cluster. Perform a Syncback

    one last time after you shut down your application on the remote site and before failing back to avoid any

    loss of changes.

    Though the newly generated data from the remote application is brought back to the local PAS cluster, it

    is not automatically applied to the original image of the application. Instead, it is made available on the

    local PAS cluster as a Syncback image.

    Note: Before you failback, make sure you Restore your local application using the latest

    Syncback image.

    You can view the synchronized image on the local cluster at Application Manager > Restore > Syncback.

    A synchronized image is yellow. You can mount, clone, or restore a synchronized image.

  • 8/12/2019 App Manager

    53/56

    49

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    Protecting ApplicationswithDedup AsyncReplication

    Failing Back to the Local PAS ClusterYou can fail-back an application to a cluster on which the application was originally running before the

    application failed over to the remote PAS cluster. You should execute this task on the local cluster.

    Before failing back an application, it is recommended that the synchronization task is carried out at least once,

    as described in Synchronizing Application Data Before Failing Backon page 48and that the Syncback image

    is used to restore the application as described in Restoring a Synchronized Imageon page 50.

    However, you can fail-back without synchronization. Synchronization creates a Syncback image on the local

    PAS cluster. You can mount, restore, or clone the Syncback image as described in Cloning a Backup Imageon

    page 33. Synchronization should be followed by executing the fail-back.

    Fail-back deletes the Syncback images brought back from the remote PAS cluster and the failover image that

    may still be mounted on the remote PAS cluster. Fail-back also deletes the test failover images that might be

    around on the remote PAS cluster. After these steps are complete, it marks the application as being in the

    protected state, and resumes DAR of the application data from the local cluster to the remote cluster.

    When you restore a Syncback image, the original image on the host that failed over is replaced with the

    Syncback image. However, you can mount or clone a Syncback image to any host configured using Actifio

    Desktop.

    To fail-back an application from the remote cluster to the local cluster:1. Log into the Actifio Desktop on the localcluster and open the Application Manager.

    2. Select the failed over application from the navigation pane.

    3. Click Failback . A warning dialog appears.

    4. Type FAILBACK in the provided field. On successful fail-back, DAR to the remote cluster is resumed.

  • 8/12/2019 App Manager

    54/56

    Protecting ApplicationswithDedup AsyncReplication

    50

    Protecting andRestoringCopyDatawiththeAppl ication Manager

    Restoring a Synchronized ImageAfter synchronizing back an application's data, you typically need to restore the application data from the

    synchronized image. The restoration replaces the application's image in use prior to failover with the latest

    image that includes changes from the remote site.

    1. Open the Application Manager to the Restore tab.

    2. Select the application from the navigation pane.3. When restoring a non-VM application, shutdown the application and unmount the file system. When

    restoring a VM application, power off the virtual machine.

    4. Select the latest Syncback image. It is yellow in color.

    5. From the image information action pull-down menu, select Restore. A warning message appears.

    6. Enter DATA LOSS.

    7. Click Start Restore. A restore job is started immediately.

    8. You can verify that the restore operation is successful by viewing the job status in System Monitor.

    9. After the restore operation is completed successfully, for a non-VM application, mount the file system,

    and restart the application. When restoring a VM application, power on the virtual machine.

  • 8/12/2019 App Manager

    55/56

    51

    ProtectingandRestoringCopyDatawiththeAppl ication Manager

    IndexAActifio Connector is not installed3ad hoc backup24

    AES-256 encryption42application

    advanced protection17protecting16

    Application Consistent backups18Application Manager

    about2Service Menu3

    applicationsdeleting13discovering8

    Bbackup image

    expiring39restoring36

    verifying data integrity of deduplicated im-age40

    bandwidth, conserving via dedup-async repli-cation41

    Ccertificates42CIFS Share21consistency group

    creating12

    deleting13

    contact information, Actifio Supportiicopyrightiicustomer supportii

    DDAR, see dedup-async replicationdedup-async replication

    about41configuring43state diagram42suspending43testing failover45

    Delete service menu item3deleting failover, test-failover, and Syncbackimages46disabling OS authentication for Oracle20

    Discover App(s) service menu item3Discover VM(s) service menu item3discovering

    applications8VMs9

    EESX server9exclude certain file types from backup18exclude patterns18, 21

    Expire All Backups service menu item3expiring backup images39

    FFail-back, in dedup-async replication49

    Ggeneric application

    creating10defined10

    groupcreating11deleting13

    Hhiberfil.sys, excluding from a backup21hosts, deleting13

  • 8/12/2019 App Manager

    56/56

    Iin-band and out-of-band protection, about6

    Llegal matterii

    LiveCloneabout33creating35

    logs, truncating20

    MManage VDisk(s) service menu item3Mark Ignored service menu item3Modify Expiration service menu item3multiple start paths18, 21

    NNew Application service menu item3New Consistency Grp service menu item3New Group service menu item3

    Oon-demand backups24Oracle database8, 19orphans13

    OS authentication and Oracle20out-of-band file systems18out-of-band protection, vs in-band6

    Ppagefile.sys, excluding from a backup21pausing protection23physical host,cloning34policies applied to an application, to view26policy templates15protecting several applications with a single

    policy3protection, suspending23prune paths18, 21

    Rresource profiles15restoring a backup image36restoring application data from a synchronizedimage50

    restoring selected files or directories37RMAN channels19

    Sselected files or directories, restoring37Show Jobs service menu item3SLA Architect15staging disk18, 22stale images13start paths18, 21Support Portal, Actifioii

    suspending protection23

    Ttechnical supportiitrademarksiitruncating logs after backup20

    VvCenter9verifying a backup image40

    virtual machine, see VMVM

    cloning34deleting13discovering9

    Wwarrantyiiwild-card characters in exclusion patterns21