8/12/2019 App Manager
1/56
Pagei
Protecting and Restoring Copy Datawith the Application Manager
ProtectingandRestoringCopyDatawiththeAppl ication Manager
Protecting and Restoring Copy Data with the Appl ication Managercontains:
Chapter 1, Introduction
Chapter 2, Discovering and Creating Applications, Groups, and Virtual Machines
Chapter 3, Protecting Applications
Chapter 4, Reviewing Policies
Chapter 5, Restoring Protected Applications
Chapter 6, Protecting Applications with Dedup- Async Replication
8/12/2019 App Manager
2/56
ii
Protecting andRestoringCopyDatawiththeAppl ication Manager
Copyright, Trademarks, and other Legal Matter 2013 Actifio, Inc. All rights reserved.
Actifio is a registered trademark of Actifio, Inc. AnyIT, Dedup Async, Manage Data Simply, Virtual Data
Pipeline, VDP, Protection and Availability Storage Platform, and PAS are trademarks of Actifio, Inc. All
other brands, product names, goods and/or services mentioned herein are trademarks or property of their
respective owners.
Actifio believes the information in this publication is accurate as of its publication date. Actifio reserves the right
to make changes to information published in this document, including without limitation specifications and
product descriptions, at any time and without notice. This document supersedes and replaces all information
supplied prior to the publication hereof.
THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS. ACTIFIO, INC. MAKES NO
REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS
PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR
FITNESS FOR A PARTICULAR PURPOSE.
This software and the associated documentation are proprietary and confidential to Actifio. Use, copying, and
distribution of any Actifio software described in this publication requires an applicable software license. Any
unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal
liability.
Actifio strives to produce quality documentation and welcomes your feedback. Please send comments and
suggestions to [email protected].
Contact Actifio Support
As an Actifio customer, you can get support for all Actifio products through the Support Portal at
http://support.actifio.com/
8/12/2019 App Manager
3/56
iii
ProtectingandRestoringCopyDatawiththeAppl ication Manager
Table of ContentsCopyright, Trademarks, and other Legal Matter .............................................................................................. ii
Chapter 1 - Int roduction .......................................................................................................... 1About the Application Manager...........................................................................................................................2Discovering Applications and VMs......................................................................................................................4Protecting Applications .......................................................................................................................................5Restoring Applications ........................................................................................................................................6
About In-Band and Out-Of-Band Application Protection.....................................................................................6
Chapter 2 - Discovering and Creating Applications, Groups, and Virtual Machines ........ 7Discovering Applications.....................................................................................................................................8Discovering Virtual Machines..............................................................................................................................9Creating Generic Applications ..........................................................................................................................10
Creating a Group .............................................................................................................................................. 11Creating a Consistency Group..........................................................................................................................12Deleting an Application/VM/Group/Host ...........................................................................................................13
Chapter 3 - Protecting Appl ications ..................................................................................... 15Protecting an Application ..................................................................................................................................16Configuring Advanced Protection Settings .......................................................................................................17
Advanced Settings for Out-of-Band File Systems .........................................................................................18Advanced Settings for Oracle Databases......................................................................................................19Advanced Settings for CIFS Share................................................................................................................21
Suspending Protection......................................................................................................................................23Running an On-Demand Backup ......................................................................................................................24
Chapter 4 - Reviewing Polic ies ............................................................................................. 25Viewing the Policies Applied to an Application..................................................................................................26Setting Policy Advanced Options......................................................................................................................27
Chapter 5 - Restor ing Protected Appl ications .................................................................... 29Mounting a Backup Image ................................................................................................................................30Cloning a Backup Image...................................................................................................................................33Restoring a Backup Image................................................................................................................................36Restoring Selected Files/Directories.................................................................................................................37Forcing the Expiry of a Backup Image ..............................................................................................................39Verifying a Deduplicated Backup Image ...........................................................................................................40
Chapter 6 - Protecting Appl ications with Dedup- Async Replication ............................... 41About Dedup-Asynchronous Replication ..........................................................................................................41
States of a Protected Application...................................................................................................................42Configuring Dedup-Async Replication ..............................................................................................................43
Selecting the Storage Pool ............................................................................................................................44Testing Failover..............................................................................................................................................45Deleting a Test-Failover Image......................................................................................................................46Failing Over an Application............................................................................................................................47
Synchronizing Application Data Before Failing Back.....................................................................................48Failing Back to the Local PAS Cluster ...........................................................................................................49Restoring a Synchronized Image......................................................................................................................50
Index ........................................................................................................................................ 51
8/12/2019 App Manager
4/56
iv
Protecting andRestoringCopyDatawiththeAppl ication Manager
8/12/2019 App Manager
5/56
1
Chapter
ProtectingandRestoringCopyDatawiththeAppl ication Manager
1
IntroductionApplications are data resources. Use the Application Manager to protect them, and to restore them.
The Application Manager is a very powerful service of Actifio PAS 5.1. This introduction provides an overview
of what it does, and then each section links to a chapter with further information:
About the Application Manageron page 2
Discovering Applications and VMsonpage 4
Protecting Applicationson page 5
Restoring Applicationson page 6
About In-Band and Out-Of-Band Application Protectionon page 6
The Application Manager
8/12/2019 App Manager
6/56
Introduction
2
Protecting andRestoringCopyDatawiththeAppl ication Manager
About the Application ManagerUse the Application Manager to protect and recover your data resources.
Parts of the Appli cation Manager
Like other Actifio PAS 5.1 services, the Application Manager includes a tab bar at the top of the page and a
service menu at the bottom of the left sidebar. It also has a 4-button list filter at the top of the navigation pane.
Use this to filter the list of resources that appears in the navigation pane.
The Application Manager Navigation Pane List Filter
The Application Manager employs a number of icons to help you see the status of a resource at a glance.
These are shown in Getting Started with Actifi o PAS 5.1.
The Application Manager service menu commands are listed inApplication Manager Service Menu Itemson
page 3.
http://-/?-http://-/?-http://-/?-http://-/?-http://-/?-8/12/2019 App Manager
7/56
Appl ication Manager Serv ice Menu Items
Menu Item Task
Show Jobs Displays jobs associated with the application in context by switching your view to
System Monitor and applying appropriate filters.
Discover APP(s)... Find an application on a host that runs the Actifio Connector. The Actifio Connector
enables Actifio PAS to find file systems, Oracle databases, and Microsoft Exchange,
Microsoft Share Point, and Microsoft SQL Server applications.
Discover VM(s)... Find the virtual machines managed by ESX hosts/ ESX clusters that are in turn
managed by vCenter servers.
New Application... Add an application from a host where the Actifio Connector is not installed and to name
a mounted image as a new application.
New Consistency Grp Create a group of applications. Create this group when you want to protect theconsistency of data among member applications. All member applications of a
consistency group should reside on the same host. You cannot include one consistency
group as a member of another consistency group.
New Group Create a group of applications. Create this group when you want to protect several
applications with a single policy. Member applications residing on various hosts can be
grouped together. You cannot include a group as a member of another group.
Manage VDisk(s) Manage virtual disks.
Modify Expiration Changes the expiration date for backups for a selected application within a date range.
Expire All Backups... Expires all the backups for the selected application, file system, group, or a consistencygroup.
Mark Ignored Ignores an application during discovery and when computing the dashboard statistics.
Unmark Ignored Lets you reverse the choice you have made using the Mark Ignored option.
Delete Delete an application, file system, group, or a consistency group.
Cleanup Dedup Async Cleans up the artifacts from running Dedup-Async related operations.
3
ProtectingandRestoringCopyDatawiththeAppl ication Manager
Introduction
8/12/2019 App Manager
8/56
Introduction
4
Protecting andRestoringCopyDatawiththeAppl ication Manager
Discovering Applications and VMsThe first step to protecting your data is to have Actifio PAS discover it. When you discover applications, Actifio
PAS identifies the various data resources on the host and presents them in the Actifio Desktop. Then you can
protect them, and eventually recover them if needed.
Actifio PAS discovers VMs by querying vCenter using VMware APIs. For automated discovery of other
applications, you use the Actifio Connectors. The Actifio Connectors are software components that connect the
Actifio Desktop to Windows, Unix, and AIX hosts. Procedures for installing the Actifio Connectors are in the
Actifio PAS Documentation Library, reachable from the life-ring icon in the lower right corner of the Actifio
Desktop.
If an application is on a host that cannot be reached by an Actifio Connector, you can create the application
manually with the New Application feature on the service menu.
Application discovery and creation are detailed in Discovering and Creating Applications, Groups, and Virtual
Machineson page 7.
The Discovery Options on the Application Manager Service Menu
8/12/2019 App Manager
9/56
5
ProtectingandRestoringCopyDatawiththeAppl ication Manager
Introduction
Protecting ApplicationsWhen you protect an application with Actifio PAS, you apply a policy template and a resource profile as
detailed in Chapter 3, Protecting Applications.
The Protection Options on the App lication Manager Protect Tab
Before you can protect applications, you must:
Discover them, as detailed in Chapter 2, Discovering and Creating Applications, Groups, and Virtual
Machines.
Have a policy template and a resource profile in a Service Level Agreement (SLA). You develop SLAs
with the SLA Architect, detailed in Planning and Developing Service Level Agreementsin the Actifio
Documentation Library.
8/12/2019 App Manager
10/56
Introduction
6
Protecting andRestoringCopyDatawiththeAppl ication Manager
Restoring ApplicationsWhen you restore an application with Actifio PAS, you follow the procedures described in Chapter 5, Restoring
Protected Applications. Actifio PAS allows simple, fast access to point-in-time images of your application data.
The Restore Options on the Application Manager Restore Tab
About In-Band and Out-Of-Band Applicat ion ProtectionApplications can be in-band or out-of-band. Even a discovered application on a VM can be in-band if the
application is entirely resident on physical mode RDMs exported by Actifio PAS. A discovered application on a
VM is not in-band if its data stores are in band. The type of backup performed depends on the collection of
volumes that the application resolves to at the backup time. If any one of the volumes is out-of-band type, the
whole backup is performed out-of-band. If all the volumes are in-band, an in-band backup is performed. When
an in-band backup is performed, all volumes are snapshotted at the same time.
When you set up an in-band VDisk, you:
1. Create a virtual disk.
2. Map the virtual disk to the ESX host/cluster.
3. Use vCenter to create a data-store on the virtual disk.
4. Use vCenter to create virtual machines on the data-store.
8/12/2019 App Manager
11/56
7
Chapter
ProtectingandRestoringCopyDatawiththeAppl ication Manager
2
Discovering and Creating Applications,
Groups, and Virtual MachinesThis chapter details:
Discovering Applicationson page 8
Discovering Virtual Machineson page 9
Creating Generic Applicationson page 10
Creating a Groupon page 11
Creating a Consistency Groupon page 12
Deleting an Application/VM/Group/Hoston page 13
The Discovery Options on the Application Manager Service Menu
8/12/2019 App Manager
12/56
Discoveringand CreatingApplications,Groups,and VirtualMachines
8
Protecting andRestoringCopyDatawiththeAppl ication Manager
Discovering ApplicationsYou can discover applications on physical hosts and on VMs. You must have the 'Host Manage' or 'Application
Manage' rights to discover applications.
Discovered applications are those that are identified by the Actifio Connector on a host. This includes:
File systems on Microsoft Windows and Linux, including local drives and mapped NFS/CIFS shares
Microsoft SQL Server, Microsoft Exchange Server and Microsoft Share Point Server on Windows Oracle database on Windows, Linux, and AIX
vCenter hosts
Note: Only CIFS shares that are mapped with the Reconnect at logon option on the host will
be discovered.
Note: For Oracle databases, make sure that the oratab, tnsnames.ora, and listener.ora files
contain entries for the database that you want to discover.
To discover an application:1. Open theAppl ication Manager.
2. From the service menu, select Discover App(s).A list of all hosts appears:
Discovering Applications on a Host
3. Select the host that includes the application you would like to protect.
4. Click Discover. The navigation pane lists all the applications attached to the selected host, including
applications residing on out-of-band storage, as soon as they are discovered.
8/12/2019 App Manager
13/56
9
ProtectingandRestoringCopyDatawiththeAppl ication Manager
Discoveringand CreatingApplications,Groups,and VirtualMachines
Discovering Virtual MachinesThe prerequisites to discover a virtual machine on an ESX server/host are:
Have the 'Host Manage' right to find a virtual machine.
Add a vCenter and an ESX server/cluster as hosts separately as described inAdding a Host section.
When the ESX host has virtual machines already created, add a vCenter or ESX server/cluster as hosts
separately as described in Configur ing Actif io PAS with the Domain Managerin the Actifio DocumentationLibrary. You can discover and protect the virtual machines associated with a vCenter via an ESX host or
cluster. These VMs are protected using VMware snapshots to get a point-in-time image (application consistent
under the right conditions). The data stores that the VMDKs live on may be in-band or out-of-band.
To discover a VM:
1. Open the Application Manager.
2. Click Discover VM(s)...from the service menu. The Discover VM(s) window appears.
Discovering VMs on a Host
3. In the Discover VM(s) window, select the vCenter you added as a host earlier. Click the vCenter. The
Discover VMs window discovers and displays the ESX host/clusters managed by the vCenter.
4. Click an ESX server/cluster. If there is an agent on the vCenter server, then the ESX server and its
virtual machines are listed. If not, then only the VMs are listed.
5. Select the virtual machines that you would like to protect.
6. Double-click Discover. The virtual machine is added to the list of virtual machines atAppl icationManager>Appl ications by Type > VM.
8/12/2019 App Manager
14/56
Discoveringand CreatingApplications,Groups,and VirtualMachines
10
Protecting andRestoringCopyDatawiththeAppl ication Manager
Actifio PAS handles multiple VMs with same name using an unique identifier (UUID) and a friendly path.
These details can be viewed by hovering over the VM in the left pane or in the details section. The
friendly path comprises of the VCenter name, Data Center name, and path to folders of the VM as shown
below:
Differentiating mul tiple VMs with UUID
After discovering the virtual machines, all the ESXs that can be seen from that vCenter and the
discovered VMs are added as hosts under the Hosts page.
Note: Only one password can entered for VM discovery. If the vCenter host has CIFS and/or NFS share drives
that require passwords that are different from the vCenter password, they will not be discovered.
8/12/2019 App Manager
15/56
11
ProtectingandRestoringCopyDatawiththeAppl ication Manager
Discoveringand CreatingApplications,Groups,and VirtualMachines
Creating Generic ApplicationsA generic application is a collection of in-band virtual disks. Generic applications are snapshotted using
consistency groups, and you get all VDisks frozen at the same point in time.
Every generic application has an associated host where you can run pre- and post-scripts. To run scripts, you
must provide the user credentials for the host, and the host has a connector that has been discovered.
To create an application on a host that does not run the Actifio Connector or to name an application on a hostas required:
1. Open theAppl ication Manager.
2. From the service menu, select New Application....The Add an Application window opens:
3. Enter the name of the application in Enter a Name.
4. Click the appropriate application type such as VM, Oracle, SQL Server, or File System. Alternatively,
enter the application type.
5. Select the host on which the application is running from Select Host.
6. Click the host to view the virtual disks attached to it.
7. Click the virtual disk you would like to assign to the application. Repeat this step to attach all the virtual
disks that are associated with the application.
8. Click theAddbutton.
8/12/2019 App Manager
16/56
Discoveringand CreatingApplications,Groups,and VirtualMachines
12
Protecting andRestoringCopyDatawiththeAppl ication Manager
Creating a GroupA group is used for ease of management to apply a common policy to all the groups applications. Mount, clone
and restore operations are performed on the backup images of each application in the group individually.
To create a group of applications to manage the group using a common policy:
1. Open the Application Manager.
2. From the service menu, select New Group...The Group properties window opens:
Creating a Group
3. Enter a name in Group Name.
4. Select an application by clicking the +sign displayed against the application. Alternatively, you can add
all applications to the group by clickingAdd A ll .
5. Click Save.
8/12/2019 App Manager
17/56
13
ProtectingandRestoringCopyDatawiththeAppl ication Manager
Discoveringand CreatingApplications,Groups,and VirtualMachines
Creating a Consistency GroupYou can create a consistency group to back up application data of all member applications together to preserve
consistency of data across the member applications. In addition, you apply a common policy to the members of
a consistency group. Consistency groups are applications that are a collection of discovered applications from
the same host.
When creating a snapshot of these applications, Actifio PAS resolves all of the applications into a collection of
volumes. If all of these volumes are in-band virtual disks, then the consistency group is snapshotted at the
same moment in time. If any one of the volumes is not in-band, then the consistency group is backed up as
out-of-band application, and the constituent applications are self-consistent, but not at the same-point in time.
To create a consistency group:
1. Open the Application Manager.
2. From the service menu, select New Consistency Grp.
Creating a Consis tency Group
3. Select an application by clicking the +sign displayed against the application. Alternatively, you can add
all applications to the group by clickingAdd A ll .
4. Click Save.
Note:Adding generic applications, virtual machines and Oracle Applicat ions within a
consistency group is not allowed.
8/12/2019 App Manager
18/56
Discoveringand CreatingApplications,Groups,and VirtualMachines
14
Protecting andRestoringCopyDatawiththeAppl ication Manager
Deleting an Application/VM/Group/HostYou can delete:
Applications, VMs, groups, and consistency groups that are discovered but not protected.
Protected applications, VMs, and groups after unprotecting them (disassociating the SLA).
Hosts, after un-mapping the VDisks associated with them.
Note: You cannot delete local applications, VMs, groups, or hosts. Remote objects that appear in the
Application Manager under the Remote category should be deleted from the remote PAS cluster.
To delete an application, VM, group, or host:
1. Open the Application Manager.
2. Click the App, VM, Group, or Host filter tab from the top of the navigation pane.
The Application Manager Navigation Pane List Filter
3. Select the Application/VM/Group/Host to delete.
4. From the service menu, click Delete.
5. Click Yesin the confirmation dialog.
The application appears as an orphan in the navigation pane under Orphan. You can delete a resource
profile or a policy template only when the resource profile or policy template is not used to protect an
application. You can see an application in the orphan section only if there are any images corresponding
to that application.
Note: Deleting an application or the protection cleans up the dedup-async related images (if dedup-async is
configured for that application). If any stale images are left out on the PAS (usually due to a remote cluster
unavailability), in the left bottom menu list, you will see an operation called Cleanup dedup-async. See
Deleting Failover, Test-Failover, and Syncback Imageson page 46.
8/12/2019 App Manager
19/56
15
Chapter
ProtectingandRestoringCopyDatawiththeAppl ication Manager
3
Protecting Applications
This section explains how to protect and un-protect applications by applying the policy templates and resource
profiles that you developed in the SLA Architect:
Protecting an Applicationon page 16
Configuring Advanced Protection Settingson page 17
Suspending Protectiononpage 23
Running an On-Demand Backupon page 24
Protecting an Application
Before you can protect applications, you must: Discover them, as detailed in Chapter 2, Discovering and Creating Applications, Groups, and Virtual
Machines.
Have a policy template and a resource profile in a Service Level Agreement (SLA). You develop SLAs
with the SLA Architect, detailed in Planning and Developing Service Level Agreementsin the Actifio
Documentation Library.
8/12/2019 App Manager
20/56
Protecting Applications
16
Protecting andRestoringCopyDatawiththeAppl ication Manager
Protecting an ApplicationYou protect an application by binding a resource profile and a template to it to make an SLA.
To protect an application:
1. Open theAppl ication Managerto the Protect tab.
2. Select an application, virtual machine, or group you want to protect from the navigation pane.
Protecting an Application
3. Select an SLA template from Templatedrop-down list. This is the template that defines the snapshot/
deduplication/ replication of the application data.
4. Select a resource profile from Profiledrop-down list. This defines the resources used to store the data of
the application as snapshot/deduplicated/replicated images.
5. Click Protect.
8/12/2019 App Manager
21/56
17
ProtectingandRestoringCopyDatawiththeAppl ication Manager
Protecting Applications
Configur ing Advanced Protection SettingsAfter protecting an application, or a file system, you can configure certain advanced protection settings.
To configure advanced protection settings:
1. Open the Application Manager to the Protect tab.
2. SelectApps , VMs, Groups, or Hoststo filter the list in the navigation pane as required.
3. Select the application from the navigation pane.
4. ClickAdvanced Sett ings . The Advanced Settings page appears. Advanced settings are detailed in the
following pages for:
Advanced Settings for Out-of-Band File Systemson page 18
Advanced Settings for Oracle Databaseson page 19
Advanced Settings for CIFS Shareon page 21
5. Make the desired changes and then click Save.
6. Click Saveto update the changes.
Note: The available settings vary based on type of application selected.
8/12/2019 App Manager
22/56
Protecting Applications
18
Protecting andRestoringCopyDatawiththeAppl ication Manager
Advanced Settings for Out-of-Band File SystemsTo configure advanced protection settings for out-of-band file systems:
1. Open the Application Manager to the Protect tab.
2. ClickApp> Local> File Systems.
3. Select the protected file system from the navigation pane.
4. Click the blueAdvanced Sett ings link in the upper right corner. The Advanced Settings page appears:
5. Select Take application consistent backupfrom the Application Consistent drop-down list.
6. Provide the start paths in the Start Pathfield. Start-path specifies the point in the file system where
backup starts. If the start-path field is left blank, backup starts at the root directory of the file system to be
backed-up. For example, a value of / usr / l ocal will back up the / usr / l ocal directory whenprotecting applications on a Linux host. Click Add to define additional start paths.
7. Provide the prune paths in the Prune Path(s)field. Use Add link to add a path. Prune-path specifies a
point in the file system where directory traversal will stop. When protecting a Linux application, a value of
/usr/local/lib will ensure that nothing below / usr / l ocal / l i bis copied, but all other directories and filesin /usr/local are copied. If this field is left blank, every subdirectory of the start paths is backed up. Click
Add to define additional prune paths
8. Enter the file name patterns to be excluded from backup in the Exclude Pattern(s)field. You can
exclude certain file types from the backup. Using this option, only the most crucial data is backed-up
leaving aside the non-critical files. Guidelines for exclude patterns:
Using this option, only files are excluded, directories are not excluded.
A pattern can include wild-card characters, for example, an asterisk (*) or a question mark (?). To
exclude all the files that contains .sys as extension, enter *.sys in the Exclude Pattern(s) field.
On Windows, files named pagefile.sys and hiberfil.sys that appear in the root directory of a driveare automatically ignored.
9. Enter the staging disk size, in gigabytes, in the File system Staging Disk Size (GB)field. By default, the
Actifio Connector uses the size of the protected file system as the size of the staging disk. This setting
allows the administrator to override this value, for example to allow for growth of the file system.
10. Choose Do not Unmap if required. This maps temporary staging disks to the host to be used during
data movement. LUNs are mapped during the first job, all subsequent jobs reuse the mapped LUN.
11. Click Savetoupdate the changes.
8/12/2019 App Manager
23/56
19
ProtectingandRestoringCopyDatawiththeAppl ication Manager
Protecting Applications
Advanced Settings for Oracle Databases
Note: In order to protect an Oracle database, you must have database login details with sysdba privileges.
During the protection process, you must enter the credentials, enter the user name and password and then
click Protect to proceed. If the password contains any special characters, then it must be entered in double
quotes. Using @ in a password is not supported.
To configure advanced protection settings:
1. Open the Application Manager to the Protect tab.
2. ClickApp> Local> Oracle.
3. Select the protected database from the navigation pane.
4. Click the blueAdvanced Sett ings link in the upper right corner. The Advanced Settings page appears:
5. Enter the number of RMAN channels in the Number of Channels field. You can set the maximum
number of channels up to 8. The default value is 1.
6. Enter the staging disk size in the Staging Disk Size (GB) field. By default, the Actifio Connector
calculates the max size of the database as configured. The Staging Disk Size option allows you to
allocate a staging disk to hold backup and to allow future growth of the database.
For example: adding more table space, data files while the backup still maintains incremental behavior.
This staging disk is thin provisioned. Another use case of this staging disk size, after user restored the
whole database from PAS backup and when open the database with reset log; you must take a level '0'
backup again. In the current release this is not done automatically by the Actifio Connector. To force a
new level '0', you must change the staging disk size and then save. Next backup will perform a new level
'0'. The unit is in GB.
7. Enter the RMAN log path in the RMAN Log Locationfield. This is the custom location (full path along
with RMAN filename) where RMAN writes the logs while taking the backup.
For Linux, the default log location is / act / l og/ si d_r man. l og.If you change the path, the value must be in the form / act / l og/ t est / cust om_r man. l og
8/12/2019 App Manager
24/56
Protecting Applications
20
Protecting andRestoringCopyDatawiththeAppl ication Manager
For Windows, the default log location is c: \ act _t mp\ l og\ si d_r man. l og.If you change the path, be sure there are no spaces in the path.
8. Choose to validate each backup before restoring it. RMAN provides restore validate for the backups,
when this option is provided (true), the Actifio Connector invokes RMAN restore validate command for
each backup.
9. Enter the Oracle catalog database name if one is used in the Catalog DBNamefield. This field is used
only when you are using a catalog database for RMAN repository. By default, a control file is used.
10. Enter the Oracle catalog database user name in the Catalog Userfield. This field is used only when you
are using a catalog database for RMAN repository. By default, a control file is used.
11. Enter the Oracle catalog database login password in the Catalog Passwordfield. This field is used only
when you are using a catalog database for RMAN repository. By default, a control file is used.
12. By default, Oracle backup skips inaccessible and offline tablespace/datafiles. If you do not want to skip
these, then select an option from RMAN Backup Not Skip drop-down field.
13. Enter the oracle database service name in Oracle Servicenamefield. This is optional for a standalone
instance but required for a RAC setup.
14. Enter the IP addresses of cluster nodes in the cluster nodesfield for fail-over choice in this format:1: 172. 16. 16. 21: svc_orarac2_act : F [ f ai l over r ank] : [ f ai l over nodei p] : [ ser vi cename on f ai l over node] : [ r ol e of member node] r ol e of member nodeby default should be F(failover).It can also be M(maintenance). When a cluster member role is specified as M, then PAS uses it as the
primary backup node instead of using the original RAC node. A maintenance node in RAC is normally
responsible for backup and other maintenance tasks of the RAC setup.
15. Choose Do not Unmap option if required. When this option is selected, temporary staging disks
mapped to the host and used during data movement remain mapped to the host. LUNs are mapped
during the first job and all the subsequent jobs reuse the mapped LUN. By default, this option is option is
selected.
16. Select whether you want to truncate the logs after every backup. When this option is selected, application
related logs are truncated till the recent or current backup.
17. Click Saveto update the changes.
Disabling OS Authentication for Oracle
Windows OS authentication allows Oracle to delegate control of user authentication for the database to the
operating system. Due to this, any test credentials for Oracle database accepts any invalid user name/
password and always shows the test result successful. To avoid this, you must disable the OS authentication
for Oracle.
To disable OS authentication for Oracle:
1. Log on to the Windows machine through which the Oracle Database was discovered.
2. Open Computer Management.
3. Under System Tools, expand Local Userand Groups.
4. Select Groupsunder Local User and Groups, select ora_dba on the right panel.
5. Click on More Actionsunder ora_dba on the second right panel.
6. Click on Properties.
7. SelectAdminist ratorunder Membersand click Remove.
8. ClickApplyand then OKto close dialog box.
8/12/2019 App Manager
25/56
21
ProtectingandRestoringCopyDatawiththeAppl ication Manager
Protecting Applications
Advanced Settings for CIFS ShareTo configure advanced protection settings for CIFS Share:
1. Open the Application Manager to the Protect tab.
2. ClickApp> Local> CIFS.
3. Select the protected CIFS share from the navigation pane.
4. Click the blueAdvanced Sett ings link in the upper right corner. The Advanced Settings page appears:
5. Provide the start path names in the Start Path field. Start-path specifies the point in the CIFS share
where backup starts. If the start-path field is left blank, backup starts at the root directory of the filesystem to be backed-up. For example, a value of \ \ SERVERNAME\ SHARENEAME\ abc will back up theabc directory on the CIFS Share when protecting applications on a Windows host. Click Add to define
additional start paths.
6. Provide the prune paths in the Prune Path(s)field. Prune-path specifies a point in the file system where
directory traversal will stop. When protecting a Windows application, a value of
\ \ SERVERNAME\ SHARENEAME\ abcwill ensure that nothing below\ \ SERVERNAME\ SHARENEAME\ abc is copied, but all other directories and files in \\
8/12/2019 App Manager
26/56
Protecting Applications
22
Protecting andRestoringCopyDatawiththeAppl ication Manager
9. Enter the CIFS share password in File system Passwordfield.
10. Enter the staging disk size, in gigabytes, in the File system Staging Disk Size (GB)field. By default, the
Actifio Connector uses the size of the protected file system as the size of the staging disk. This setting
allows the administrator to override this value if necessary, for example to allow for growth f the file
system.
11. Choose Do not Unmap option if required. When this option is selected, temporary staging disks
mapped to the host and used during data movement for backup remain mapped to the host. LUNs are
mapped during the first job and all the subsequent jobs reuse the mapped LUN. By default, this option is
selected.
12. Click Saveto update the changes.
8/12/2019 App Manager
27/56
23
ProtectingandRestoringCopyDatawiththeAppl ication Manager
Protecting Applications
Suspending ProtectionTo temporarily pause the protection applied to an application:
1. Open the Application Manager to the Protect tab.
2. ClickApps , VMs, Groups, or Hostsas required.
3. Select the application from the navigation pane.
4. Select Noin SLA Options> Run Schedule.
5. Click Yesin the confirmation dialog.
8/12/2019 App Manager
28/56
Protecting Applications
24
Protecting andRestoringCopyDatawiththeAppl ication Manager
Running an On-Demand BackupTo run an on-demand backup:
1. Open the Application Manager to the Protect tab.
2. Select the application that you want to backup from the navigation pane.
Note: You cannot run an on-demand backup for an individual member of a consistency group.
3. Click the arrow that shows the policies configured to manage the backup.
4. Click Run Nowon the desired policy.
Running an On-demand Backup Job
5. Click Yesin the confirmation dialog. A backup image will be created with retention as per the policy used.
Note: The Run Now option fails with an error message if a job corresponding to the policy is already running.
8/12/2019 App Manager
29/56
25
Chapter
ProtectingandRestoringCopyDatawiththeAppl ication Manager
4
Reviewing Policies
Use the Policies tab to view the details of the SLA policies assigned to protected applications. If a host, VM, or
application is not protected, then the policies tab does not appear.
This section includes:
Viewing the Policies Applied to an Applicationon page 26
Setting Policy Advanced Optionsonpage 27
The Application Manager Policies Tab
8/12/2019 App Manager
30/56
ReviewingPolicies
26
Protecting andRestoringCopyDatawiththeAppl ication Manager
Viewing the Policies Applied to an ApplicationTo view the policies applied to an application:
1. Open the Application Manager to the Policies tab.
2. Select an application from the navigation pane. A list of policies applied to the application is displayed.
You can run an ad hocbackup from this page, as described in Running an On-Demand Backupon page 24.
8/12/2019 App Manager
31/56
27
ProtectingandRestoringCopyDatawiththeAppl ication Manager
ReviewingPolicies
Setting Policy Advanced OptionsSome SLAs allow you to change advanced settings at the application level. You can change these settings for
a particular application:
Application Consistent
Take application consistent backup
Take crash consistent backup
Take crash consistent backup on last try
Do Not Unmap
out of band staging disks not unmapped after backup
out of band staging disks unmapped after backup
Truncate Log After Backup
Truncate log after backup
Do not truncate log after backup
The option to enable advanced settings is in the SLA. For a detailed explanation of these options, refer to
Planning and Developing Service Level Agreements in your Actifio Documentation Library.
Settings Advanced Policy Options
8/12/2019 App Manager
32/56
ReviewingPolicies
28
Protecting andRestoringCopyDatawiththeAppl ication Manager
8/12/2019 App Manager
33/56
29
Chapter
ProtectingandRestoringCopyDatawiththeAppl ication Manager
5
Restoring Protected Applications
This section contains:
Mounting a Backup Imageon page 30
Cloning a Backup Imageon page 33
Restoring a Backup Imageon page 36
Restoring Selected Files/Directorieson page 37
Forcing the Expiry of a Backup Imageon page 39
Verifying a Deduplicated Backup Imageon page 40
The Restore Options on the Application Manager Restore Tab
8/12/2019 App Manager
34/56
RestoringProtectedApplications
30
Protecting andRestoringCopyDatawiththeAppl ication Manager
Mounting a Backup ImageMounting a backup image results in creating a virtual copy of the selected image and presenting it to the
selected host. This virtual copy is fully read/writable, but does not consume any additional storage at the time
of creation. Further changes to it will require incremental additional storage.
After mounting the image, you can either use it directly or restore individual files or directories from the
mounted image as described in Restoring Selected Files/Directorieson page 37.
Actifio PAS lets you mount one or more backup images from:
A VM to the same VM, to another VM, or to any other host. The mounted image is displayed as a new
drive on the mounted VM or host.
An Application to the same host, to another host, or to a VM.
Actifio PAS mounts images transparently to a host/virtual machine and does not require additional zoning (if
that was done originally) or shutdown/restart of the host/VM.
Multiple backup images can be mounted to the same host or VM. Any mounted image can be unmounted
individually.
Before mounting an image, ensure that the WWPN/iSCSI port of the host where the backup images will be
mounted is accessible to the PAS. This mount operation is applicable for all applications and VMs.
To mount a backup image to a host:
1. Open the Application Manager to the Restore tab.
2. Select the application or VM from the navigation pane.
3. Select the time period for backups using the calendar icons to filter the list of backups as needed.
4. Select the backup image type by clicking on the corresponding Snapshot, Dedup, Remote, or LiveClone
buttons. You can use the Shift key to select multiple types.
5. Select the backup image to mount from the list on the right. The selected image icon turns green and
detailed information about it is displayed in the image box at the center of the display.
8/12/2019 App Manager
35/56
31
ProtectingandRestoringCopyDatawiththeAppl ication Manager
RestoringProtectedApplications
6. Click the pull-down menu from the bottom right of the image information display and select Mount. The
Mount Job window is displayed:
Selecting a Physical Host (left) and a Virtual Machine (right) as Host
7. If required, change the default storage pool from the Select default storage pool drop-down list.
8. Select a host (physical or virtual) from Select Host(s) drop-down list.
If the backup image is of a physical host, skip to Step 9.If the backup image is of a VM, select a Hostto Mount:
Existing Hostoption: Select the host that you want to mount from the Choose from existing hosts
drop-down list. The selected host must be a SAN host or a Virtual Machine on ESX Server that is
connected to Actifio PAS. Select a single or multiple volumes to mount from Select volumes to mount. By
default, all the volumes are selected. If you mount to an existing VM, the VM disks will show up as a new
file system drive on the VM.
New VMoption: Enter a name for the new VM that you want to mount, specify a vCenter server, an ESX
host, and a datastore in Select vCenter Server, ESX Host, and Datastorerespectively. Actifio PAS
must write some configuration data to the selected datastore to point to the mounted volumes, but nostorage will be consumed by the backup image virtual copy.
Mounting a VM: Using Exist ing Host opt ion (left) and Using New VM option (right)
8/12/2019 App Manager
36/56
RestoringProtectedApplications
32
Protecting andRestoringCopyDatawiththeAppl ication Manager
Select a single or multiple volumes to mount. By default all the volumes are selected. The first volume
cannot be deselected.
Note:Acti fio Desktop assumes that the f irst volume of the VM is the boot volume. If the selected
first volume is not the boot volume, contact Actifio support for further assistance or refer to the
CLI Reference Guideto perform this task using the CLI.
If you select a virtual machine, select vRDM or pRDM as mount mode, by default vRDM mode is
selected. For file level restore operations, use the pRDM mode.
9. Select a single volume or multiple volumes from Select volumes to mount. By default, all the volumes are
selected. For an individual file system there may be only one volume, for VMs, consistency groups, and
generic applications there might be more volumes.
10. Click Submit . A job is submitted to mount the image to the selected host.
Note:A mounted image can be used directly from the mounted host or you can restore selected the files or
directories from it. See Restoring Selected Files/Directorieson page 37.
If the Actifio Connector is installed on the host on which you have mounted the image, then the backup image
is mounted to:
C: \ Wi ndows\ act \ J obname_j obi d on Windows or / mnt / act / J obname_j obi don Linux.
If the Actifio Connector is not installed, you need to manually mount the new disk that is visible on the host.
Note: The original backup image is never modified, even if the mounted virtual copy is modified or mounted
and deleted.
8/12/2019 App Manager
37/56
33
ProtectingandRestoringCopyDatawiththeAppl ication Manager
RestoringProtectedApplications
Cloning a Backup ImageYou can create two types of backup images: clones and LiveClones.
Clone Images
When Actifio PAS clones a backup image, it creates a full copy of the image that consumes as much storage
as the original application data. This is different from a Mount operation, which uses a virtual copy that does
not take additional storage.
Actifio PAS copies the contents of a VDisk to another VDisk that can be mapped to any SAN host. The cloning
operation is applicable for all the file systems and applications.
LiveClone Images
A LiveClone is an independent clone of a backup image that consumes full storage resources and can be
mounted to a host. It can be refreshed incrementally from another backup image, allowing very fast and
efficient data refreshes for ETL and test & development purposes. A LiveClone can also be mounted for direct
modification to support operations such as data masking.
LiveClones provide a crucial building block in managing copy data lifecycle as they combine the performance
and independence of a full clone with the efficiency and speed of incremental refreshes of data.
Cloning an Image
To clone an image to a host:
1. Open the Application Manager to the Restore tab.
2. Select the application with the backup image to be cloned. The Backup images are listed:
3. Select the time period for backups using the calendar icons to filter the list of backups as needed.
4. Select the backup image type by clicking on the corresponding Snapshot, Dedup, Remote, or LiveClone
buttons. You can use the Shift key to select multiple types.
Cloning a Backup Image
5. Select the backup image to clone from the list on the right. The selected image icon turns green and
detailed information about it is displayed in the image box at the center of the display.
8/12/2019 App Manager
38/56
RestoringProtectedApplications
34
Protecting andRestoringCopyDatawiththeAppl ication Manager
Cloning a Physical Machine
6. From the pull-down menu at the bottom of the backup details, select Clone. The Clone window appears.
Note: To clone a VM, skip to Cloning a VM, below. To create a LiveClone, go to Creating a LiveClone, below.
Clone Job Window for a Physical Host
7. Select a host from Select Host drop-down list.
8. Select single volume or multiple volumes from Select volumes to clone.
9. Select the diskpool. The default diskpool is act_per_pool (the performance pool).
10. Click Submit . You can see the cloned image under the Restore tab of this application. The disk
corresponding to this image is shown as a mapped VDisk under Domain Manager> System>Hosts.
Cloning a VM
6. From the pull-down menu at the bottom of the backup details, select Clone. The Clone window appears.
Note: to clone a physical machine, go to Cloning a Physical Machine, above. To create a LiveClone, go to
Creating a LiveClone, below.
Clone Job Window for a VM
8/12/2019 App Manager
39/56
35
ProtectingandRestoringCopyDatawiththeAppl ication Manager
RestoringProtectedApplications
7. Enter a name for the new VM that you want to clone in VM Namefield.
8. Select a vCenter from Select vCenter Serverdrop-down list where you want to create a VM.
9. Select an ESX host from ESX Host box where you want to create a VM.
10. Select a datastore from Datastorebox that has the required storage available.
11. Select single or multiple volumes to clone. The first volume cannot be deselected.
Note:Acti fio PAS assumes that the first volume of the VM is the boot volume. If the first volume
is not the boot volume, Contact Actifio Supportfor assistance or perform this task using the CLI.
12. Click Submit . You can see the cloned image under the Restore tab of this application. The disk
corresponding to this image is shown as a mapped VDisk under Domain Manager> System>Hosts.
Creating a LiveClone
6. From the pull-down menu at the bottom of the backup details, select LiveClone. The LiveClone Job
window is displayed.
Note: To clone a physical machine, go to Cloning a Physical Machine, above. To clone a VM, go
to Cloning a VM, above.
Clone Job Window for a Liveclone
7. Enter a unique name for the new LiveClone in the Labelfield.
8. Select a diskpool from Pooldrop-down list where you want to create the LiveClone. The default diskpool
is act_per_pool (the performance pool).
9. Click Submit . Creation of a LiveClone can take some time depending on the size of the backup image.
The disk corresponding to this image appears under Domain Manager> System >Hosts.
Note:Actifio PAS maintains thin/thick provisioning of the original VMs while cloning/restoring a VM snapshot.
For VM snapshot images created prior to Actifio PAS 5.1.2, cloned and restored VMs will be thin provisioned.
8/12/2019 App Manager
40/56
RestoringProtectedApplications
36
Protecting andRestoringCopyDatawiththeAppl ication Manager
Restoring a Backup ImageRestoring replaces the original production application data with the backup image. This will result in the loss of
all current application data as the application will be restored to its status at the point-in-time when the backup
image was created. This operation cannot be undone.
Actifio PAS lets you restore a backup image from a VM host to the same VM host or from a non-VM host to the
same non-VM host.
Note: When you restore a backup image, the SLA options (Run Schedule, Expire Data) of the protected
application are turned off.
Note: For Oracle databases, protected out-of-band restore function is not supported. Use the Clone and Mount
methods instead.
To restore a backup image:
1. Open the Application Manager to the Restore tab.
2. Select the application or VM to restore.
3. Select the time period for backups using the calendar icons to filter the list of backups as needed.
4. Select the backup image type by clicking on the corresponding Snapshot, Dedup, Remote or LiveClone
buttons. You can use the Shift key to select multiple types.
5. Select the backup image to restore from the list on the right. The selected image icon turns green and
detailed information about it is displayed in the image box at the center of the display.
6. From the pull-down menu, select Restore. The Restore Job window is displayed.
7. Select a single volume or multiple volumes to restore. By default all the volumes are selected.
8. Click Submit . A warning dialog appears. Read the warning message carefully and then Enter DATA
LOSSin the provided field to confirm.
9. Click Start Restore. The image is restored. For VMs, Actifio PAS removes the relevant VMDKs from the
VM being restored and creates new VMDKs populated with data copied from the backup image.
Note: The Restore operation cannot be performed from a remote cluster. However, you can use a remote-
dedup image for a restore operation on the source cluster itself.
8/12/2019 App Manager
41/56
37
ProtectingandRestoringCopyDatawiththeAppl ication Manager
RestoringProtectedApplications
Note:Actifio PAS maintains thin/thick provisioning of the original VMs while cloning/restoring a VM snapshot.
For VM snapshot images created prior to Actifio PAS 5.1.2, cloned and restored VMs will be thin provisioned.
Restoring Selected Files/Director iesYou can download a subset of files or directories from a backup image mounted to the host. This feature is
supported only on Windows-based file systems. The restoration includes zipping the files and downloading the
zipped file on the client running Actifio Desktop.
Prerequisites to perform this function:
The Actifio Connector is installed and running on the mounted host.
The Application Discovery function is executed at least once on the mounted host.
To restore selected files or directories:
1. Open the Application Manager to the Restore tab.
2. Select the desired Application or VM from the navigation pane. If you are selecting a VM, ensure that the
Actifio Connector is installed on the Virtual Machine and applications on the VM are discovered.
3. Mount the image as detailed in Mounting a Backup Imageon page 30.
4. The Restore image is populated. The Active Images pane lists the images mounted on the host.
5. Select a mounted image from the list.
6. Click the image information action pull-down menu at the bottom right.
8/12/2019 App Manager
42/56
RestoringProtectedApplications
38
Protecting andRestoringCopyDatawiththeAppl ication Manager
7. Click Restore File(s). A tree view of the directories and files of the image is displayed.
8. Select the files and/or directories to restore by double-clicking the folder or file. You can select the files in
a directory by opening the directory by clicking the arrow mark displayed against the folder. You can see
the selected files or folders under Items to Restore. You may use the delete option to de-select files or
folders.
9. Click Submit . The Save As window appears.
10. Select a destination folder on the client running Actifio Desktop.
11. Enter a name for the zip file.
12. Click Save. The Actifio Connector zips the selected files and directories and starts the download.
Note: To prevent unauthorized access to sensitive information, Actifio recommends you
download the required files to a secure local disk or a NAS mount then share the files with the
required operators.
8/12/2019 App Manager
43/56
39
ProtectingandRestoringCopyDatawiththeAppl ication Manager
RestoringProtectedApplications
Forcing the Expiry of a Backup ImageYou can force the expiry of a backup image earlier than its scheduled time in order to gain storage space.
Expiring deduped backup images may not free any storage if data blocks are shared with other backup images
of the same or different applications. In any case, no storage will actually become available until a full Dedup
Garbage Collection sweep is performed. Garbage Collection is managed under the Domain Manager Dedup
tab. It is detailed in Configur ing Ac tifio PAS 5.1 for Your Data Environment .
To force the expiry of an image:
1. Open the Application Manager to the Restore tab.
2. Select the backup image type by clicking on the corresponding Snapshot, Dedup, Syncback, Remote, or
LiveClone button.You can use the "Shift" key to select multiple items.
3. Select the required image. The color of the box representing the image turns green on selection and the
image details are displayed on a tab.
4. Click the image information action pull-down menu at the bottom right.
5. Select Expire. The image is deleted.
Expiring a Backup Image
Note: You can only expire all the images of an application, or change expiration dates of selected images.
8/12/2019 App Manager
44/56
RestoringProtectedApplications
40
Protecting andRestoringCopyDatawiththeAppl ication Manager
Verifying a Deduplicated Backup Image
Note: Before verifying a backup image, configure a deduplication schedule.
You may want to verify whether a deduplicated backup image passes a data integrity check to ensure it can be
used in a live system.
To verify a deduplicated backup image:1. Open the Application Manager to the Restore tab.
2. Select the deduplicated images available by clicking Dedup.
3. Click the image to be verified. The box representing the image turns green on selection.
4. From the pull-down menu in the bottom right, click Verify. The verification job pop-up appears.
5. Click Submit . A warning message appears.
6. Click Yesin the confirmation dialog. You can view the current jobs in the System Monitor service to track
verification progress.
Note: You can schedule this process through the SLA Architect. See Planning and Developing Service
Level Agreementsfor details.
8/12/2019 App Manager
45/56
41
Chapter
ProtectingandRestoringCopyDatawiththeAppl ication Manager
6
Protecting Applications with
Dedup- Async ReplicationDedup-Async Replication (DAR) is a very powerful tool.
This chapter includes:
About Dedup-Asynchronous Replicationon page 41
Configuring Dedup-Async Replicationon page 43
Restoring a Synchronized Imageon page 50
About Dedup-Asynchronous ReplicationDedup Async Replication (DAR) provides disaster recovery protection for applications and virtual machines by
moving protected data from local PAS to remote PAS and making it available for immediate access from the
remote site. Data movement is done over IP networks after global de-duplication and compression using
proprietary patent-pending technology, thereby significantly driving down bandwidth requirements and costs.
This allows wider protection of applications where traditional solutions are cost prohibitive.
Dedup-Async replication makes replication effortless by:
Using the existing IP network to replicate data.
Replicating repeatedly at intervals determined by policy so that network bandwidth is conserved while
meeting the configured Recovery Point Objective.
De-duplicating data before replicating so that bandwidth consumption is much lower than the change rate
of the application.
Creating a remote re-hydrated image that the application can instantly and transparently fail-over to.
Making disk management transparent. (Optionally) Replicating VMs to a datastore on the remote site.
Making it simple to fail-over the application to a host on the remote site.
Making the synchronization of data back from the remote PAS cluster to the local PAS cluster, simple and
non- interruptive to the application's I/O activities.
Cleaning up all remote images created after the application fails back to the local PAS cluster.
Note: For more information on DAR, seeActi fio PAS Dedup-Async Repl ication in the Actifio Documentation
Library.
8/12/2019 App Manager
46/56
Protecting ApplicationswithDedup AsyncReplication
42
Protecting andRestoringCopyDatawiththeAppl ication Manager
States of a Protected ApplicationThe four states of an application protected using a dedup-async policy are:
Unprotected: An application is
unprotectedwhen no SLA is associated
with it.
Protection Initialization: An SLA is
associated with an application but the first
protection job is yet to complete.
Protected: An application becomes
protectedwhen the first replication job
completes successfully, or when the
application is failed back. This state
indicates that there is at least one
replicated image to fail over to.
An application remains inthis state as
long as the SLA associated with it is notremoved or the application is failed over.
When you remove the SLA, the
application becomes unprotected.
If the application fails over to a remote
site, its state changes to failed over.
Note that testing the failover capability
does not alter the state of the application.
Failed Over: In the failed overstate, the application, which is also configured on the remote site, accesses the
remote image directly. Consequently, replication to the remote site is paused. When the application is ready to
operate from the local site, you can synchronize the data back to the local site optionally. The Syncback process
can be carried out multiple times.
After synchronizing the data:
1. Shut down the application on the remote site
2. Perform one last Syncback operation to make sure all changes were captured
3. Restore the local application form the syncback image
4. Fail-back the application to the local site.
The application state changes to the protected state and the replication to the remote site is resumed. If you
remove the SLA, the application state changes to the unprotected state.
Authent ication and Data Encryption
The authentication process between PAS clusters is performed using the 1024-bit certificates, and thereplicated data is encrypted using the AES-256 encryption standard.
8/12/2019 App Manager
47/56
43
ProtectingandRestoringCopyDatawiththeAppl ication Manager
Protecting ApplicationswithDedup AsyncReplication
Configuring Dedup-Async ReplicationDedup-Async Replication (DAR) enables you to create a highly available image of an application's data over
an IP network and to protect numerous applications with relatively little bandwidth. DAR creates a deduped
backup image on a remote cluster. This image is replaced by a new image as the policy is set off periodically
based on the configured frequency. As a result, there is always only one image of 'dedup async replicated' type
on the remote cluster. This image can be readily used to execute a failover or a failover test. Later you can fail
back the application to the local cluster.
To configure dedup-async replication of data from a local cluster to a remote cluster, you need:
A local cluster joined with a remote cluster in the sharing or non-sharing mode.
A policy for dedup-async replication is configured as described in Planning and Developing Service
Level Agreementsin the Actifio Documentation Library.
A resource profile configured to include the remote cluster as described in Creating a Resource Profile.
An SLA defined as described in Protecting an Application.
When all the above are configured, dedup-async replication of data is started as per the schedule defined in
the policy template resulting in the creation of an image of the application data on the remote cluster.
When multiple deduplication policies are defined for an application, only one of the local, remote, or DAR jobs
runs at a time. The other policy schedules are queued and are run subsequently based on priority.Dedup-async replication entails:
Selecting the Storage Poolon page 44
Testing Failoveron page 45
Deleting a Test-Failover Imageon page 46
Deleting Failover, Test-Failover, and Syncback Imageson page 46
Failing Over an Applicationon page 47
Synchronizing Application Data Before Failing Backon page 48
Failing Back to the Local PAS Clusteron page 49
Suspending DAR
To disable the SLA schedule to suspend the SLA configured for an application:
1. Open the Application Manager.
2. Select the application from the navigation pane.
3. Click Nofrom SLA Options>> Run Schedule.
Note: This suspends all protection for this application.
8/12/2019 App Manager
48/56
Protecting ApplicationswithDedup AsyncReplication
44
Protecting andRestoringCopyDatawiththeAppl ication Manager
Selecting the Storage PoolYou can select a storage pool to create the backup image as part of dedup-async replication. Each cluster can
configure a separate storage pool that will be used for applications replicated from each of its joined peers.
1. Log into the Actifio Desktop on the remotecluster.
2. Open the Domain Manager.
3. Select System> Configuration> Cluster Settings> Cluster Managerfrom the navigation pane. A listof joined clusters is displayed.
4. Click the Storagetab for the local(source) cluster that you want to configure.
5. Select the storage pool from Destination performance pool. These are the storage pools defined on
the remote PAS cluster. When you select a pool, the DAR images for applications from the local (source)
PAS cluster are stored here.
6. Click SaveSettingsbutton to update the changes.
8/12/2019 App Manager
49/56
45
ProtectingandRestoringCopyDatawiththeAppl ication Manager
ProtectingApplicationswithDedup AsyncReplication
Testing FailoverAfter configuring dedup-async replication, you may want to test the failover of an application to determine the
readiness of the remote cluster in the event of a mishap. When you test failover, a virtual copy of the most
recently replicated image of the application is created and presented to the host that you select. You can log on
to the host and verify that the replicated image is consistent. After you have tested the image, delete the test
failover image to free up any resources it occupies.
To test the failover operation, specify a host to which you will mount the failover image. Note that you cannot
failover a virtual machine application to the same virtual machine.You can test failover from the remote PAS
cluster. When you test failover, a failover job is started. When the job completes with the job status 'successful',
the test-failover operation is successful. You can mount, log on to the host, and view the failover image to
ensure the consistency of data and your complete DR procedure.
You can have only one image test-failed-over to one host at one time. For example, when a failover image is
available on the remote PAS cluster and the PAS cluster is managing two hosts, A and B, you can host the
image on either A or B but not both. When the image is already mounted on the host A, you can unmount the
image from A and then mount it on B.
Before performing a test failover, ensure that the WWPN/iSCSI port of the target host where the backup image
is to be mounted is accessible to the remote PAS cluster.
To test failover, access the remote PAS cluster using Actifio Desktop and:
1. Open the Application Manager to the Restoretab.
2. Select the application from the navigation pane, from the Remote list. The last successful backup job is
displayed.
3. From the image information action pull-down menu, click Test Failover.4. Select the target host to fail over the image.
5. Click Submit . The latest DAR image of the application is used to create a virtual copy and presents it to
the host you have selected. Since it is a virtual copy of the image, the host can use it without affecting the
actual DAR image. Later you can delete the image as described in Deleting a Test-Failover Image
section.
8/12/2019 App Manager
50/56
Protecting ApplicationswithDedup AsyncReplication
46
Protecting andRestoringCopyDatawiththeAppl ication Manager
Deleting a Test-Failover ImageTo delete a test-failover image from the remote PAS cluster:
1. Open the Application Manager to the Restoretab.
2. Select the application from the navigation pane, from the Remote list.
3. Select the test-failover image from the Active Images pane at the bottom.
4. From the image information action pull-down menu, click Delete.
Deleting Failover, Test-Failover, and Syncback Images
Normally, all failover, test-failover, and Syncback images of an application are deleted when the fail-back
operation is executed. In rare cases, some images created as part of dedup-async replication of an application
may not be deleted.
To delete the failover, test-failover, and Syncback images of an application from the local and remote PAS
clusters:
1. Open the Application Manager.
2. Select the application from the navigation pane.
3. Right-click the application.
4. Select the Cleanup Dedup Async option.
Note: If any of the images remain, the Cleanup dedup async option appears on right-clicking the
application. Use this option to delete the images. Alternatively, use the CLI cl eanup dedupasync - al l command to delete all images of the application.
8/12/2019 App Manager
51/56
47
ProtectingandRestoringCopyDatawiththeAppl ication Manager
Protecting ApplicationswithDedup AsyncReplication
Failing Over an Appl icationYou can failover the applications protected with a DAR policy from the local PAS cluster to a host connected to
the remote PAS cluster. Note that you should initiate the failover from the remote PAS cluster and you can
failover a VM only to a new VM.
When you start the failover task, dedup-async replication of the application data to the remote cluster is
stopped. If a dedup-async replication job is in progress, it is stopped when the application fails over. Snapshot,
local deduplication, and remote deduplication policies for the application, if any, continue to run on the local
cluster.
Before performing a failover task, ensure that the WWPN/iSCSI port of the host where the backup image is to
be mounted is accessible to the remote PAS cluster.
To failover an application:
1. Click Desktop> New Desktopto connect to the remote PAS cluster by launching another session of
Actifio Desktop.
2. Open theAppl ication Manageron the remote PAS cluster.
3. Select the shadow application from Remote in the navigation pane:
4. Click Dedup Async. By default, the latest image is selected for failover.
5. From the service menu, select Failover. The Failover Job window is displayed.
6. Select a host and the diskpool to failover to. When failing over a virtual machine to a new VM, enter the
VM's name, and select the appropriate values from the vCenter Name, ESX host, Datastore, and
Diskpool drop-down boxes.
7. Click Submit . A warning message is displayed.
8. Enter 'FAILOVER' in the text box.
9. Click Start Failover. A failover job is initiated. This job stops any dedup-async replication job in progress
for this application, and presents the latest replicated image to the selected host. You can now log on to
the host, bring up the application, and direct all the external clients to use this copy of the application.
When you are ready to bring back the data generated at the remote site to the local site, start the
Syncback operation.
8/12/2019 App Manager
52/56
Protecting ApplicationswithDedup AsyncReplication
48
Protecting andRestoringCopyDatawiththeAppl ication Manager
Synchronizing Application Data Before Failing BackAfter an application from the local PAS cluster fails over to a remote PAS cluster, you can failback the
application to the local PAS cluster. Prior to failing back, you might want to bring back the latest data generated
at the remote site to the local site. There is no limit to the number of times synchronization is carried out. Each
synchronization results in creating a new Syncback image on the local PAS cluster.
The Syncback task should be executed on the remote cluster.
1. Open the Application Manager.
2. Select the application from the navigation pane.
3. Click Syncback.
4. Click Submit.
You may want to repeat this task before failing back an application since the data on the remote PAS
cluster may change even as the data is being brought back to the local PAS cluster. Perform a Syncback
one last time after you shut down your application on the remote site and before failing back to avoid any
loss of changes.
Though the newly generated data from the remote application is brought back to the local PAS cluster, it
is not automatically applied to the original image of the application. Instead, it is made available on the
local PAS cluster as a Syncback image.
Note: Before you failback, make sure you Restore your local application using the latest
Syncback image.
You can view the synchronized image on the local cluster at Application Manager > Restore > Syncback.
A synchronized image is yellow. You can mount, clone, or restore a synchronized image.
8/12/2019 App Manager
53/56
49
ProtectingandRestoringCopyDatawiththeAppl ication Manager
Protecting ApplicationswithDedup AsyncReplication
Failing Back to the Local PAS ClusterYou can fail-back an application to a cluster on which the application was originally running before the
application failed over to the remote PAS cluster. You should execute this task on the local cluster.
Before failing back an application, it is recommended that the synchronization task is carried out at least once,
as described in Synchronizing Application Data Before Failing Backon page 48and that the Syncback image
is used to restore the application as described in Restoring a Synchronized Imageon page 50.
However, you can fail-back without synchronization. Synchronization creates a Syncback image on the local
PAS cluster. You can mount, restore, or clone the Syncback image as described in Cloning a Backup Imageon
page 33. Synchronization should be followed by executing the fail-back.
Fail-back deletes the Syncback images brought back from the remote PAS cluster and the failover image that
may still be mounted on the remote PAS cluster. Fail-back also deletes the test failover images that might be
around on the remote PAS cluster. After these steps are complete, it marks the application as being in the
protected state, and resumes DAR of the application data from the local cluster to the remote cluster.
When you restore a Syncback image, the original image on the host that failed over is replaced with the
Syncback image. However, you can mount or clone a Syncback image to any host configured using Actifio
Desktop.
To fail-back an application from the remote cluster to the local cluster:1. Log into the Actifio Desktop on the localcluster and open the Application Manager.
2. Select the failed over application from the navigation pane.
3. Click Failback . A warning dialog appears.
4. Type FAILBACK in the provided field. On successful fail-back, DAR to the remote cluster is resumed.
8/12/2019 App Manager
54/56
Protecting ApplicationswithDedup AsyncReplication
50
Protecting andRestoringCopyDatawiththeAppl ication Manager
Restoring a Synchronized ImageAfter synchronizing back an application's data, you typically need to restore the application data from the
synchronized image. The restoration replaces the application's image in use prior to failover with the latest
image that includes changes from the remote site.
1. Open the Application Manager to the Restore tab.
2. Select the application from the navigation pane.3. When restoring a non-VM application, shutdown the application and unmount the file system. When
restoring a VM application, power off the virtual machine.
4. Select the latest Syncback image. It is yellow in color.
5. From the image information action pull-down menu, select Restore. A warning message appears.
6. Enter DATA LOSS.
7. Click Start Restore. A restore job is started immediately.
8. You can verify that the restore operation is successful by viewing the job status in System Monitor.
9. After the restore operation is completed successfully, for a non-VM application, mount the file system,
and restart the application. When restoring a VM application, power on the virtual machine.
8/12/2019 App Manager
55/56
51
ProtectingandRestoringCopyDatawiththeAppl ication Manager
IndexAActifio Connector is not installed3ad hoc backup24
AES-256 encryption42application
advanced protection17protecting16
Application Consistent backups18Application Manager
about2Service Menu3
applicationsdeleting13discovering8
Bbackup image
expiring39restoring36
verifying data integrity of deduplicated im-age40
bandwidth, conserving via dedup-async repli-cation41
Ccertificates42CIFS Share21consistency group
creating12
deleting13
contact information, Actifio Supportiicopyrightiicustomer supportii
DDAR, see dedup-async replicationdedup-async replication
about41configuring43state diagram42suspending43testing failover45
Delete service menu item3deleting failover, test-failover, and Syncbackimages46disabling OS authentication for Oracle20
Discover App(s) service menu item3Discover VM(s) service menu item3discovering
applications8VMs9
EESX server9exclude certain file types from backup18exclude patterns18, 21
Expire All Backups service menu item3expiring backup images39
FFail-back, in dedup-async replication49
Ggeneric application
creating10defined10
groupcreating11deleting13
Hhiberfil.sys, excluding from a backup21hosts, deleting13
8/12/2019 App Manager
56/56
Iin-band and out-of-band protection, about6
Llegal matterii
LiveCloneabout33creating35
logs, truncating20
MManage VDisk(s) service menu item3Mark Ignored service menu item3Modify Expiration service menu item3multiple start paths18, 21
NNew Application service menu item3New Consistency Grp service menu item3New Group service menu item3
Oon-demand backups24Oracle database8, 19orphans13
OS authentication and Oracle20out-of-band file systems18out-of-band protection, vs in-band6
Ppagefile.sys, excluding from a backup21pausing protection23physical host,cloning34policies applied to an application, to view26policy templates15protecting several applications with a single
policy3protection, suspending23prune paths18, 21
Rresource profiles15restoring a backup image36restoring application data from a synchronizedimage50
restoring selected files or directories37RMAN channels19
Sselected files or directories, restoring37Show Jobs service menu item3SLA Architect15staging disk18, 22stale images13start paths18, 21Support Portal, Actifioii
suspending protection23
Ttechnical supportiitrademarksiitruncating logs after backup20
VvCenter9verifying a backup image40
virtual machine, see VMVM
cloning34deleting13discovering9
Wwarrantyiiwild-card characters in exclusion patterns21