Académique Documents
Professionnel Documents
Culture Documents
Deployment Guide
Version 5.3.6
A CAUTION indicates potential damage to hardware or loss of data if instructions are not followed.
Contents
Chapter 1:
Chapter 2:
Introduction to AppAssure 5
About AppAssure 5 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
AppAssure 5 Core Technologies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Live Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Recovery Assure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
Universal Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
True Global Deduplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
.
.
.
.
.
.
.
.
.
.
.8
.8
.9
.9
.9
.
.
.
.
.
.
.
.
.
.
.
.
11
13
14
14
15
15
Contents
Chapter 3:
Installing AppAssure 5
. . . . . 41
. . . . . 41
. . . . . 43
. . . . 44
. . . . . 45
. . . . 46
. . . . 46
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
..
..
..
..
..
..
..
..
.
.
.
.
..
..
..
..
.
.
.
.
.
.
.
.
. . . . 53
. . . . 54
. . . . 54
. . . . 55
Index
Contents
Description
AppAssure 5 Central
Modified topic. It describes the requirements for installing
Management Console Installation the AppAssure 5 Central Management Console. Support
Requirements on page 30
for Windows 8.1 and Windows Server 2012 R2 was added
to the topic.
AppAssure 5 Agent Installation
Requirements on page 30
Wh a t s N e w i n A p p A s s u r e 5
Topic
Description
Installing the AppAssure 5 Central Modified topic. It describes how to install the AppAssure 5
Management Console on
Central Management Console. Support for Windows 8.1
page 48
and Windows Server 2012 R2 was added to the topic. In
addition, the note about the ASP.Net role requirement was
modified to reflect that this is now included automatically
with the AppAssure installer
Additional Changes
This version of the AppAssure 5 Deployment Guide also includes the following
general changes:
Editorial changes
Wh a t s N e w i n A p p As s u r e 5
Introduction to AppAssure 5
This chapter provides an introduction and overview of AppAssure 5. It describes the
features, functionality, and architecture, and consists of the following topics:
About AppAssure 5
AppAssure 5 sets a new standard for unified data protection by combining backup,
replication, and recovery in a single solution that is engineered to be the fastest and
most reliable backup for protecting virtual machines (VM), physical machines, and
cloud environments.
AppAssure 5 combines backup and replication into one integrated and unified data
protection product that also provides application awareness to ensure reliable
application data recovery from your backups. AppAssure 5 is built on the new,
patent-pending True Scale architecture which delivers the fastest backup
performance with very aggressive, near-zero recovery time objectives (RTO) and
recovery point objectives (RPO).
AppAssure 5 combines several unique, innovative, and breakthrough technologies:
Live Recovery
Recovery Assure
Universal Recovery
I n t r o d u c t i on t o Ap p A s s u r e 5
These technologies are engineered with secure integration for cloud disaster
recovery and deliver fast and reliable recovery. With its scalable object store,
AppAssure 5 is uniquely capable of handling up to petabytes of data very rapidly with
built-in global deduplication, compression, encryption, and replication to any
private or public cloud infrastructure. Server applications and data can be recovered
in minutes for data retention and compliance purposes.
Today's legacy backup tools and first generation VM backup tools are inefficient and
ineffective. The outdated backup tools lack the ability to handle large-scale data and
do not offer the level of performance and reliability needed for protecting businesscritical applications. Combine this with complex and mixed IT environments and it
presents an administrative challenge for IT professionals and vulnerability of system
data.
AppAssure 5 addresses this complexity and inefficiency through our core
technology and support of multi-hypervisor environments including those running
on VMware vSphere and Microsoft Hyper-V, which comprise both private and public
clouds. AppAssure 5 offers these technological advances while dramatically
reducing IT management and storage costs.
Live Recovery
Live Recovery is instant recovery technology for VMs or servers. It gives you nearcontinuous access to data volumes on virtual or physical servers. You can recover
an entire volume with near-zero RTO and an RPO of minutes.
AppAssure 5 backup and replication technology records concurrent snapshots of
multiple VMs or servers, providing near instantaneous data and system protection.
You can resume the use of the server directly from the backup file without waiting
for a full restore to production storage. Users remain productive and IT departments
reduce recovery windows to meet today's increasingly stringent RTO and RPO
service-level agreements.
Recovery Assure
Recovery Assure lets you perform automated recovery testing and verification of
backups. It includes, but is not limited to, file systems; Microsoft Exchange 2007,
2010, and 2013; and, the different versions of Microsoft SQL Server 2005, 2008, 2008
R2, and 2012. Recovery Assure provides recoverability of applications and backups in
virtual and physical environments, and features a comprehensive integrity checking
algorithm based on 256-bit SHA keys that check the correctness of each disk block
in the backup during archiving, replication, and data seeding operations. This
ensures that data corruption is identified early and prevents corrupted data blocks
from being maintained or transferred during the backup process.
Universal Recovery
Universal Recovery technology gives you unlimited machine restoration flexibility.
You can restore your backups from physical to virtual, virtual to virtual, virtual to
physical, or physical to physical, and carry out bare metal restores to dissimilar
hardware; for example, P2V, V2V, V2P, P2P, P2C, V2C, C2P, C2V.
It also accelerates cross-platform moves among virtual machines; for instance,
moving from VMware to Hyper-V or Hyper-V to VMware. It builds in applicationlevel, item-level, and object-level recovery: individual files, folders, email, calendar
items, databases, and applications. With AppAssure 5, you can also recover or export
physical to cloud, or virtual to cloud.
The AppAssure Volume Manager and scalable object store serve as the foundation
of the AppAssure 5 True Scale architecture. The scalable object store stores blocklevel snapshots that are captured from virtual and physical servers. The volume
manager manages the numerous object stores by providing a common repository
or just-in-time storage for only what is needed. The object store concurrently
supports everything with asynchronous I/O that delivers high throughput with
minimal latency and maximizes system utilization. The repository resides on
different storage technologies such as Storage Area Network (SAN), Direct Attached
Storage (DAS), or Network Attached Storage (NAS).
The role of the AppAssure Volume Manager is similar to the role of the volume
manager in an operating system, as it takes various storage deviceswhich can be of
different sizes and typesand combines them into logical volumes, using striped or
sequential allocation policies. The object store saves, retrieves, maintains, and then
replicates objects that are derived from application-aware snapshots. The volume
manager delivers scalable I/O performance in tandem with global data
deduplication, encryption, and retention management.
10
I n t r o d u c t i on t o Ap p A s s u r e 5
I n t r od u c t i o n t o Ap p A s s u r e 5
11
12
I n t r o d u c t i on t o Ap p A s s u r e 5
You can also deploy multiple AppAssure Cores as shown in the following diagram.
Multiple cores are managed by a Web-based, central console.
I n t r od u c t i o n t o Ap p A s s u r e 5
13
The AppAssure 5 Smart Agent is application-aware because it not only detects the
type of application that is installed but the location of the data as well. It
automatically groups data volumes with dependency, such as databases, and then
logs them together for effective protection and rapid recovery. Once the agent is
configured, it uses smart technology to keep track of changed blocks on the
protected disk volumes. When a snapshot is ready, it is rapidly transferred to the
AppAssure 5 Core using intelligent, multi-threaded, socket-based connections. To
preserve CPU bandwidth and memory on the protected machines, the smart agent
does not encrypt or deduplicate the data at the source, and agent machines are
paired with a core for protection.
AppAssure 5 Core
The AppAssure 5 Core is the central component of the AppAssure 5 deployment
architecture. The Core stores and manages all of the machine backups and provides
core services for backup, recovery, and retention as well as replication, archival, and
management. The Core is a self-contained network-addressable computer that runs
a 64-bit variant of the Microsoft Windows operating system. AppAssure 5 performs
target-based, inline compression, encryption, and data deduplication of the data
received from an agent.
The Core then stores the snapshot backups in a repository, which can reside on
different storage technologies such as Storage Area Network (SAN), Direct Attached
Storage (DAS), or Network Attached Storage (NAS). The repository can also reside on
internal storage within the Core. The Core is managed by accessing the following
URL from a Web browser: https://CORENAME:8006/apprecovery/admin. Internally,
all core services are accessible through REST APIs. The core services can be accessed
from within the Core or directly over the Internet from any application that can send
an HTTP/HTTPS request and receive an HTTP/HTTPS response. All API operations
are performed over SSL and are mutually authenticated using X.509 v3 certificates.
For replication, a core is paired with another core.
Snapshot Process
The AppAssure protection process commences when a base image is transferred
from an agent machine to the Core, followed by incremental snapshots forever. The
AppAssure 5 Agent for Windows uses Microsoft Volume Shadow copy Service (VSS)
to freeze and quiesce application data to disk to capture a file-system-consistent and
an application-consistent backup. When a snapshot is created, the VSS writer on the
target server prevents content from being written to the disk. During the process of
halting of writing content to disk, all disk I/O operations are queued and resume only
after the snapshot is complete, while the operations already in flight will be
completed and all open files will be closed. The process of creating a shadow copy
does not significantly impact the performance of the production system.
14
I n t r o d u c t i on t o Ap p A s s u r e 5
AppAssure uses Microsoft VSS because it has built-in support for all Windows
internal technologies such as NTFS, Registry, Active Directory, and so on, to flush
data to disk before the snapshot. Additionally, other enterprise applications, such as
Microsoft Exchange and SQL, use VSS Writer plug-ins to get notified when a
snapshot is being prepared and when they have to flush their used database pages
to disk to bring the database to a consistent transactional state. It is important to
note that VSS is used to quiesce system and application data to disk; it is not used to
create the snapshot. The captured data is rapidly transferred to and stored on the
AppAssure 5 Core. Using VSS for backup does not render the application server in
backup mode for an extended period of time because the length of time to perform
the snapshot is seconds and not hours. Another benefit of using VSS for backups is
that it lets the agent take a snapshot of large quantities of data at one time since the
snapshot works at the volume level.
Recovery
Recovery can be performed in the local site or the replicated remote site. Once the
deployment is in steady state with local protection and optional replication, the
AppAssure 5 Core lets you perform recovery using Recovery Assure, Universal
Recovery, or Live Recovery.
I n t r od u c t i o n t o Ap p A s s u r e 5
15
Repository on page 16
Encryption on page 18
Replication on page 19
Repository
The AppAssure repository uses deduplication volume manager (DVM) to implement
a volume manager that provides support for multiple volumes, each of which could
reside on different storage technologies such as Storage Area Network (SAN), Direct
Attached Storage (DAS), Network Attached Storage (NAS), or cloud storage. Each
volume consists of a scalable object store with deduplication. The scalable object
store behaves as a records-based file system, where the unit of storage allocation is
a fixed-sized data block called a record. This architecture lets you configure blocksized support for compression and deduplication. Rollup operations are reduced to
metadata operations from disk intensive operations because the rollup no longer
moves data but only moves the records.
The DVM can combine a set of object stores into a volume and they can be expanded
by creating additional file systems. The object store files are pre-allocated and can
be added on demand as storage requirements change. It is possible to create up to
255 independent repositories on a single AppAssure 5 Core and to further increase
the size of a repository by adding new file extents. An extended repository may
contain up to 4,096 extents that span across different storage technologies. The
maximum size of a repository is 32 Exabytes. Multiple repositories can exist on a
single core.
16
I n t r o d u c t i on t o Ap p A s s u r e 5
I n t r od u c t i o n t o Ap p A s s u r e 5
17
AppAssure 5 performs target-based inline data deduplication. This means that the
snapshot data is transmitted to the Core before it is deduplicated. Inline data
deduplication simply means the data is deduplicated before it is committed to disk.
This is very different from at-source or post-process deduplication, where the data
is deduplicated at the source before it is transmitted to the target for storage, and in
post-process the data is sent raw to the target where it is analyzed and deduplicated
after the data has been committed to disk. At-source deduplication consumes
precious system resources on the machine whereas the post-process data
deduplication approach needs all the requisite data on disk (a greater initial capacity
overhead) before commencing the deduplication process. On the other hand, inline
data deduplication does not require additional disk capacity and CPU cycles on the
source or on the Core for the deduplication process. Lastly, conventional backup
applications perform repetitive full backups every week, while AppAssure performs
incremental block-level backups of the machines forever. This incremental forever
approach in tandem with data deduplication helps to drastically reduce the total
quantity of data committed to the disk with a reduction ratio of as much as 80:1.
Encryption
AppAssure 5 provides integrated encryption to protect backups and data-at-rest
from unauthorized access and use, ensuring data privacy. AppAssure 5 provides
strong encryption. By doing so, backups of protected computers are inaccessible.
Only the user with the encryption key can access and decrypt the data. There is no
limit to the number of encryption keys that can be created and stored on a system.
DVM uses AES 256-bit encryption in the Cipher Block Chaining (CBC) mode with
256-bit keys. Encryption is performed inline on snapshot data, at line speeds without
impacting performance. This is because DVM implementation is multi-threaded and
uses hardware acceleration specific to the processor on which it is deployed.
Encryption is multi-tenant ready. The deduplication has been specifically limited to
records that have been encrypted with the same key; two identical records that have
been encrypted with different keys will not be deduplicated against each other. This
design decision ensures that deduplication cannot be used to leak data between
different encryption domains. This is a benefit for managed service providers, as
replicated backups for multiple tenants (customers) can be stored on a single core
without any tenant being able to see or access other tenant data. Each active tenant
encryption key creates an encryption domain within the repository where only the
owner of the keys can see, access, or use the data. In a multi-tenant scenario, data
is partitioned and deduplicated within the encryption domains.
In replication scenarios, AppAssure 5 uses SSL 3.0 to secure the connections
between the two cores in a replication topology to prevent eavesdropping and
tampering.
18
I n t r o d u c t i on t o Ap p A s s u r e 5
Replication
Replication is the process of copying recovery points and transmitting them to a
secondary location for the purpose of disaster recovery. The process requires a
paired source-target relationship between two cores. Replication is managed on a
per-protected-machine basis; meaning, backup snapshots of a protected machine
are replicated to the target replica core. When replication is set up, the source core
asynchronously and continuously transmits the incremental snapshot data to the
target core. You can configure this outbound replication to your companys own
data center or remote disaster recovery site (that is, a self-managed target core) or
to a managed service provider (MSP) providing off-site backup and disaster recovery
services. When you replicate to an MSP, you can use built-in workflows that let you
request connections and receive automatic feedback notifications.
I n t r od u c t i o n t o Ap p A s s u r e 5
19
Replication begins with seeding: the initial transfer of deduplicated base images and
incremental snapshots of the protected agents, which can add up to hundreds or
thousands of gigabytes of data. Initial replication can be seeded to the target core
using external media. This is typically useful for large sets of data or sites with slow
links. The data in the seeding archive is compressed, encrypted and deduplicated. If
the total size of the archive is larger than the space available on the removable
media, the archive can span across multiple devices based on the available space on
the media. During the seeding process, the incremental recovery points replicate to
the target site. After the target core consumes the seeding archive, the newly
replicated incremental recovery points automatically synchronize.
Recovery-as-a-Service (RaaS)
Managed service providers (MSPs) can fully leverage AppAssure 5 as a platform for
delivering recovery as a service (RaaS). RaaS facilitates complete recovery-in-thecloud by replicating customers' physical and virtual servers along with their data to
the service provider's cloud as virtual machines to support recovery testing or actual
recovery operations. Customers wanting to perform recovery-in-the-cloud can
configure replication on their protected machines on the local cores to an
AppAssure service provider. In the event of a disaster, the MSPs can instantly spin-up
virtual machines for the customer.
MSPs can deploy multi-tenant AppAssure 5-based RaaS infrastructure that can host
multiple and discrete organizations or business units (the tenants) that ordinarily do
not share security or data on a single server or a group of servers. The data of each
tenant is isolated and secure from other tenants and the service provider.
20
I n t r o d u c t i on t o Ap p A s s u r e 5
Retention policies enforce the periods of time in which backups are stored on shortterm (fast and expensive) media. Sometimes certain business and technical
requirements mandate extended retention of these backups, but use of fast storage
is cost prohibitive. Therefore, this requirement creates a need for long-term (slow
and cheap) storage. Businesses often use long-term storage for archiving both
compliance and non-compliance data. The archive feature supports extended
retentions for compliance and non-compliance data, as well as being used for
seeding replication data to a target core.
I n t r od u c t i o n t o Ap p A s s u r e 5
21
Web Console
AppAssure 5 features a Web-based central console that manages distributed
AppAssure 5 cores from one central location. MSPs and enterprise customers with
multiple distributed cores can deploy this console to get a unified view for
centralized management. The AppAssure 5 Central Management Console lets you
organize the managed cores in hierarchical organizational units. These
organizational units can represent business units, locations, or customers for MSPs
with role-based access. Using the central console, you can also run reports across all
of your managed cores.
22
I n t r o d u c t i on t o Ap p A s s u r e 5
White Labeling
AppAssure 5 can be re-branded and white-labeled for select enterprise and OEM
partners under the Platinum service provider program. The Platinum service
provider program lets partners brand AppAssure 5 with their custom name, logo, and
color themes and deliver the product or service with their own branding and lookand-feel to their customers.
As an AppAssure partner, you can tailor the software to meet your business
requirements. To further explore how you can brand AppAssure 5 to suit your
business needs, contact AppAssure Sales at sales@appassure.com for more
information.
I n t r od u c t i o n t o Ap p A s s u r e 5
23
24
I n t r o d u c t i on t o Ap p A s s u r e 5
Installing AppAssure 5
This chapter describes how to install the components you will need to use
AppAssure 5. It includes the following topics:
25
AppAssure 5 Agent - The agent services and software that enable protection of
your data. You install agent software on the Windows and Linux machines in your
environment (for example, on an Exchange server, SQL Server, Linux server, and
so on). The agent tracks changed data blocks on the disk volume of the machine
and creates snapshot images of the data to send to the Core. You manage an
agent using the Core Console of the associated Core.
26
Step 2: Review and ensure the system requirements have been met for the
servers and machines on which you will be installing AppAssure 5 components.
For more information, see Requirements for Installation on page 27.
Step 3: Install the AppAssure 5 Core software on the Windows machine(s) you
will use as Core(s). For more information, see Installing the AppAssure 5 Core on
page 32.
Step 4: Configure the AppAssure 5 Core(s) you have just installed using the
AppAssure 5 Core setup wizard. For more information, see Using the AppAssure
5 Core Setup Wizard on page 34.
Step 6: If you will have multiple AppAssure 5 Cores in your environment, you
must install and configure the AppAssure 5 Central Management Console, which
allows you to manage multiple cores in your environment. For more information
about installing the Central Management Console, see Installing the AppAssure 5
Central Management Console on page 48. For more information about
configuring the Central Management Console, see Configuring the AppAssure 5
Central Management Console on page 49.
NOTE: After you have installed all necessary components, you can start to protect
your agent machines and servers and associated data; for example, your Exchange
server, SQL Server, Linux server, and so on. For more information about protecting
agent machines, see the AppAssure 5 User Guide.
27
28
Windows Server 2008 Core edition (Standard, Enterprise, Datacenter, Web, x86
and x64)
Windows Server 2008 R2 and 2012 Core edition (Standard, Enterprise, Datacenter,
Web)
The system requirements for installing the AppAssure 5 Core are described in the
following table.
Requirement
Details
Operating System
Microsoft
Windows 7
Microsoft
Microsoft
Microsoft
Windows 8
Microsoft
Windows 8.1
Microsoft
Windows 8 Pro
Microsoft
Windows 8 Enterprise
Windows
Windows
Windows
Windows
Windows
NOTE: AppAssure 5 Core does not support Windows Server 2008 Core
edition, 2008 R2 Core edition, or 2012 Core edition. In addition, it does
not support Hyper-V Server 2008, 2008 R2, or 2012.
Architecture
64-bit only
Memory
Processor
Quad-core or higher.
Storage
29
Details
Operating System
Microsoft
Windows 7
Microsoft
Microsoft
Microsoft
Windows 8
Microsoft
Windows 8.1
Microsoft
Windows 8 Pro
Microsoft
Windows 8 Enterprise
Windows
Windows
Windows
Windows
Windows
NOTE: AppAssure 5 Core does not support Windows Server 2008 Core
edition, 2008 R2 Core edition, or 2012 Core edition. In addition, it does
not support Hyper-V Server 2008, 2008 R2, or 2012.
Architecture
64-bit only
For Linux environments, AppAssure 5 only supports the following file systems: ext3, ext4, and xfs.
30
The requirements for installing AppAssure 5 Agent are described in the following
table.
Requirement
Details
Operating System
Microsoft
Windows XP SP3
Microsoft
Windows Vista
Microsoft
Windows 7
Microsoft
Windows 2003
Microsoft
Microsoft
Microsoft
Windows 8
Microsoft
Windows 8.1
Microsoft
Windows 8 Pro
Microsoft
Windows 8 Enterprise
Windows
Windows
Windows
Windows
Windows
Windows
Windows
Red
CentOS
Ubuntu
SUSE
32-bit or 64-bit
Memory
4 GB or higher
License Requirements
Before you can install AppAssure 5 components, you must register at the AppAssure
5 License Portal, create an account, and obtain a license key. This license key is
required to download the AppAssure 5 Core and AppAssure 5 Agent software and to
configure and protect machines.
Install ing AppAssure 5
31
For more information about the AppAssure 5 License Portal, obtaining a license key,
and registering for an account, see the documentation, Managing AppAssure 5
Licenses, on the AppAssure 5 Technical Documentation page at: http://
docs.appassure.com/display/AA50D/AppAssure+5+Technical+Documentation.
Click Save, and then select the location in which to save the file to run the installer
at a later time.
The file will download to your system. Navigate to the location where you saved
the installer file and run it. You must run the installer with local administrator
privileges.
32
The installer will install the required Windows runtime libraries. The Prerequisites
page includes a progress bar to let you view the progress of the prerequisites
installation.
NOTE: If the prerequisites are already installed on the machine, you will receive a
message to indicate that the files exist.
6. Once the prerequisites are installed, click Next.
7. On the Installation Options page, review and modify installation options, and
Review the destination folder for the installation. If you want to change the
location, click Change, and then select a new location.
Enter a port number to use for communication between the agent and the
AppAssure 5 Core. The default value is 8006. If you change the port number, be
sure to make note of it in the event that you need to adjust configuration settings
at a later time.
8. Click Next.
The Progress page appears and includes a status bar that lets you monitor the
progress of the installation.
When the installation is complete, the Completed page appears.
33
Complete the steps in this procedure to use the AppAssure 5 Core Setup Wizard.
NOTE: The Setup Core button will only appear on the Home tab the first time the
Core is installed and no repositories are configured for the Core. Once the Core is
installed, any setup or configuration must be performed manually.
The Core Setup Wizard Welcome page appears.
3. In the Display Name text box, edit the name for the Core machine, if necessary.
This is the name that will display in the AppAssure 5 Core Console.
4. Click Next.
Description
Repository Name
Comments
6. In the Storage Locations area, click Add Storage Location to define the specific
34
7. Specify how to add the file. You can choose to add the file on a local disk or a
Select Add file on local disk to specify a local machine and then enter the
information as described in the following table.
Text Box
Description
Metadata Path
Data Path
Or, select Add file on CIFS share to specify a network share location, and then
enter the information as described in the following table.
Text Box
Description
UNC Path
User Name
Password
35
8. In the Details area, click Show/Hide Details and enter the details for the storage
Description
Size
Set the size or capacity for the storage location. The default is 250
MB. You can choose from the following:
MB
GB
TB
NOTE: The size that you specify cannot exceed the size of the
volume.
If the storage location is a New Technology File System (NTFS)
volume using Windows XP or Windows 7, the file size limit is 16
TB.
If the storage location is a NTFS volume using Windows 8, 8.1 or
Windows Server 2012, 2012 R2, the file size limit is 256 TB.
NOTE: For AppAssure 5 to validate the operating system, Windows
Management Instrumentation (WMI) must be installed on the
intended storage location.
Write Caching Policy
9. Click Save.
The Repositories page displays to include the newly added storage location.
10. Optionally, repeat Step 6 through Step 9 to add additional storage locations for the
repository.
NOTE: Core repositories can size up to 4096 extents, with each extent measuring up
to 16 TB, and are scalable to 32 exabytes.
36
for alerts.
Text Box
Description
SMTP Server
a timeout occurs
if there is a problem sending email notifications.
TLS.
User name
Enter the user name for the email server; for example,
administrator.
Password
Email Subject
From
Enter the email address that will serve as the originating email
address for the email template; for example,
noreply@localhost.com.
Once you have finished entering the information, click Send Test
Email to test your email settings.
Enter information for the body of the template that describes the
event, when it occurred, and the severity.
NOTE: You must also configure notification group settings, including enabling the
Notify by email option, before email alert messages will be sent. For more
information about specifying events to receive email alerts, see the topic Configuring
Notification Groups in the AppAssure 5 User Guide.
14. Click Next.
37
15. Optionally, enter the information as described in the following table to add an
Description
Name
Description
Passphrase
Confirm Passphrase
AppAssure 5 uses AES 256-bit encryption in the Cipher Block Chaining (CBC) mode with 256-bit
keys. While using encryption is optional, Dell highly recommends that you establish an encryption
key, and that you protect the passphrase you define. Store the passphrase in a secure location as
it is critical for data recovery. Without a passphrase, data recovery is not possible.
NOTE: For more information about encryption, see the topic Managing Security in
the AppAssure 5 User Guide.
16. Click Next.
to each machine you want to protect, click Download installer and then click
Save File.
For more information about installing Agent software, see Installing Agents on
Windows Machines on page 38 or Installing Agents on Linux Machines on page 41
as appropriate.
NOTE: You can also use the Bulk Deploy feature to deploy the Agent software to
multiple machines simultaneously. For more information, see the topic Protecting
Multiple Machines in the AppAssure 5 User Guide.
18. Click Finish.
The AppAssure 5 Core Setup wizard closes, and the Core is configured with the initial
settings you selected.
You must install the Agent software and protect the machine before your information
is backed up to the Core. For more information on protecting an agent machine, see
the section Protecting a Machine in the AppAssure 5 User Guide.
You must install the AppAssure 5 Agent Installer on each server in your environment
that will be protected by the AppAssure 5 Core. You can download the installer from
the AppAssure 5 License Portal at https://licenseportal.com or from the Core. For
more information about the License Portal, see the documentation, Managing
AppAssure 5 Licenses, on the AppAssure 5 Technical Documentation page at: http:/
/docs.appassure.com/display/AA50D/AppAssure+5+Technical+Documentation. For
more information about installing the Core, see Installing the AppAssure 5 Core on
page 32,
You can also deploy the Agent software to the agent machine during the process of
protecting a machine from the Core Console. This option is only relevant for
machines that do not have the Agent software installed. For more information on
deploying the Agent software when protecting an agent, see the topic Deploying the
Agent Software When Protecting an Agent on page 94 in the AppAssure 5 User Guide.
If you click Save, select the location in which to save the file.
The file will download to your system. Then, navigate to the location where
you saved it, and double-click the file.
prerequisite files. Select one of the following options based on the verification
results:
If the prerequisite files exist, a message will display to indicate that all prerequisites
are installed on the machine. Click Next.
If the prerequisites do not exist, the AppAssure 5 Agent Installer will identify which
files are needed and will display the results accordingly; for example, Microsoft
System CLR Types for SQL Server 2008 R2 (x64). Click Install Prerequisites.
Install ing AppAssure 5
39
If you need to designate a different path, click Change, select a new path, and
click OK.
Clear the option if you prefer not to have this type of information sent.
9. If necessary, modify the port number in the Port Number text box. The port
The Progress page appears and includes a status bar that lets you monitor the
progress of the installation.
When the installation is complete, the Completed page appears.
11. Select one of the following options, and then click Finish:
You must restart your system before using the AppAssure 5 Agent instance.
12. Once you have restarted the machine, you should start the Agent service.
40
Agent installer file and enter the installer file name to begin the installation:
Agent-X64-5.x.x.xxxxx.exe
The installation program installs the Agent and displays progress in the console.
Upon completion, new installations trigger an automatic restart of the machine,
whereas Agent upgrades may not require a machine restart.
Installing the Agent on Red Hat Enterprise Linux and CentOS on page 44
41
About Security
The security around protecting a machine is based on the Pluggable Authentication
Module (PAM) in Linux. Once a user is authenticated through libpam, the user is only
authorized to protect the machine if the user is in one of the following groups: sudo,
admin, appassure, or wheel. For information on protecting a machine, see the
section, Protecting a Machine in the AppAssure 5 User Guide.
Firewall Configuration
The Linux Agent installation overwrites any firewall rules that were not applied
through UFW, Yast2, or system-config-firewall. If you manually added firewall rules,
then you must manually add AppAssure ports after the installation. A backup of
existing rules will be written to:
/var/lib/appassure/backup.fwl
You need to add firewall exceptions to all servers running the AppAssure agent for
TCP ports 8006 and 8009 for the AppAssure 5 Core to access agents.
mono:
/opt/appassure/mono
agent:
/opt/appassure/aagent
aamount:
/opt/appassure/amount
42
Agent Dependencies
The following dependencies are required and are installed as part of the Agent
installer package:
For Ubuntu:
43
command:
chmod +x appassure-installer_ubuntu_amd64_5.x.x.xxxxx.sh
The Linux Agent begins the extraction and installation process. Any missing
packages or files required by the Agent will be downloaded and installed
automatically as part of the script.
NOTE: For information on the files required by the Agent, see Agent Dependencies
on page 43.
After the installer completes, the Agent will be running on your machine. For more
information on protecting this machine with the Core, see the chapter Protecting
Workstations and Servers in the AppAssure 5 User Guide.
command:
chmod +x appassure-installer__rhel_amd64_5.x.x.xxxxx.sh
4. To extract and install the AppAssure 5 Agent, type the following command:
./appassure-installer_rhel_amd64_5.x.x.xxxxx.sh
5. Press <Enter>.
The Linux Agent begins the extraction and installation process. Any missing
packages or files required by the Agent will be downloaded and installed
automatically as part of the script.
NOTE: For information on the files required by the Agent, see Agent Dependencies
on page 43.
After the installer completes, the Agent will be running on your machine. For more
information on protecting this machine with the Core, see the chapter Protecting
Workstations and Servers in the AppAssure 5 User Guide.
command:
chmod +x appassure-installer_sles_amd64_5.x.x.xxxxx.sh
The Linux Agent begins the extraction and installation process. Any missing
packages or files required by the Agent will be downloaded and installed
automatically as part of the script.
For information on the files required by the Agent, see Agent Dependencies on
page 43.
45
6. When prompted to install the new packages, type y, and then press <Enter>.
agent service
aavdisk
To stop the...
agent service
aavdisk
agent service
aavdisk
Note that if a script is not executable, the transfer job will fail.
PreTransferScript.sh
46
PostTransferScript.sh
For more information about scripting in AppAssure 5 as well as a complete list of supported scripts
on the Core, refer to Appendix A: Scripting in the AppAssure 5 User Guide.
Names
TransferPrescriptParameter_ShadowCopyType=$TransferPrescriptParameter_Shad
owCopyType
TransferPrescriptParameter_TransferConfiguration=$TransferPrescriptParameter_T
ransferConfiguration
TransferPrescriptParameter_StorageConfiguration=$TransferPrescriptParameter_St
orageConfiguration
TransferPrescriptParameter_Key=$TransferPrescriptParameter_Key
TransferPrescriptParameter_ForceBaseImage=$TransferPrescriptParameter_ForceB
aseImage
TransferPrescriptParameter_IsLogTruncation=$TransferPrescriptParameter_IsLogT
runcation
TransferPrescriptParameter_LatestEpochSeenByCore=$TransferPrescriptParameter
_LatestEpochSeenByCore
The following parameters are supported on Linux for post transfer scripts.
TransferPostscriptParameter_VolumeNames=$TransferPostscriptParameter_Volum
eNames
TransferPostscriptParameter_ShadowCopyType=TransferPostscriptParameter_Sha
dowCopyType
TransferPostscriptParameter_TransferConfiguration=$TransferPostscriptParameter
_TransferConfiguration
TransferPostscriptParameter_StorageConfiguration=$TransferPostscriptParameter_
StorageConfiguration
TransferPostscriptParameter_Key=$TransferPostscriptParameter_Key
TransferPostscriptParameter_ForceBaseImage=$TransferPostscriptParameter_Forc
eBaseImage
TransferPostscriptParameter_IsLogTruncation=$TransferPostscriptParameter_IsLo
gTruncation
TransferPostscriptParameter_LatestEpochSeenByCore=$TransferPostscriptParamet
er_LatestEpochSeenByCore
47
If you click Save, select the location in which to save the file.
The file will download to your system. Navigate to the location where you saved
the installer file, and then double-click the file. You must run the installer with
local administrator privileges.
If you want to designate a different path, click Change, select the new location,
and then click OK.
The Progress page appears and includes a status bar that lets you monitor the
progress of the installation.
When the installation is complete, the Completed page appears.
6. Click Finish.
48
The Welcome page appears. On the Welcome page, you can identify the Core groups
that you will manage in the console.
49
2. Select the parent group and the display name as described in the following table.
Text Box
Description
Parent Group
Select the parent group of the Cores for the new Core group you want to
add.
Display Name
3. Click Save.
following table.
Text Box
Description
Parent Group
Select the parent group of the Cores for the new Core group settings you
want to add.
Display Name
3. Click Save.
50
4. In the Name text box, enter the name of the individual to whom you want to
If the name entered is valid, a message to indicate that the account is verified will
display.
NOTE: You can validate individuals and groups.
6. Click Is Group to specify that the group name was previously entered in the
Text Box
Description
Parent Group
Select the parent group of the Cores for the new Core you want to add.
Display Name
Host Name
Port
Enter a port number for the connection. The default value is 8006.
User Name
Enter a user name to access the Core service for the newly added Core.
NOTE: This is a required text box.
Password
Enter a password to access the Core service for the newly added Core.
NOTE: This is a required text box.
If the test is successful, a message will display to indicate that the connection was
successful.
4. Click Save.
51
table.
Text Box
Description
Parent Group
Select the parent group of the Cores for the new Core settings
you want to add.
Display Name
User Name
Password
Select the option that specifies the connection. You can choose
to:
Use
Use
Port (8006), or
Custom
Port
If you choose to specify the port, enter the port number in the
Custom Port text box.
If the test is successful, a message will display to indicate that the connection was
successful.
4. Click Save.
52
instance, open the Control Panel, click Programs, and then click Uninstall a
Program.
2. In the Programs and Features window, double-click the installed AppAssure 5
The AppAssure 5 Agent installation wizard will appear to display the Repair/Remove
page.
3. Click Remove, and then click Next.
Uninstalling the Agent on Red Hat Enterprise Linux and CentOS on page 54
53
example:
/home/appassure/.
3. Enter the following command:
./appassure-installer_ubuntu_amd64_5.x.x.xxxxx.sh -u
To find the specific release and build number for your AppAssure Agent files, run the rpm -qa
|grep appassure command in your terminal session. For 32-bit RHEL and CentOS systems, the
file extension in the steps below will change from x86_64 to i386.
example, /home/appassure/.
54
After completing this process, the Agent is removed from the system and will no
longer be protected by the Core.
example, /home/appassure/.
3. Enter the following command:
./appassure-installer_sles_amd64_5.x.x.xxxxx.sh -u
After completing this process, the Agent is removed from the system and will no
longer be protected by the Core.
The AppAssure 5 Core installation wizard will appear to display the Repair/Remove
page.
3. Click Remove, and then click Next.
55
4. To remove your repository, as well as all recovery points and change logs, click
Uninstall configuration settings and data including all backup images and
change logs, and then click Next.
If you select this option, you will delete all data in the repository, including the repository folder
and all subfolders. This option is appropriate for typical installations where the repository is
installed on an otherwise empty volume. If you have other data on the directory where your
repository is located, do not select this option.
The Progress page appears. You can view the progress of the uninstall on the
Progress page.
When the uninstall is complete, the Completed page box appears.
5. Click Finish.
Console, open the Control Panel, click Programs, and then click Uninstall a
Program.
2. In the Programs and Features window, double-click the installed AppAssure 5
56
Index
Symbols
.NET Framework
- 33, - 39, - 48
A
agents
about security on Linux machines - 42
before installing on Linux machines - 41
dependencies for Linux machines - 43
downloading the Linux installer - 41
firewall configuration for Linux machines - 42
installing - 38
installing on Linux machines - 41
installing on Windows Server 2012 Core - 40
location of Linux agent files - 42
running scripts on Linux machines - 46
uninstalling Linux - 53
uninstalling Windows - 52
AppAssure 5
core technologies - 8
deployment architecture - 11
installation components - 25
installation requirements, other - 31
installing - 27
license portal - 22
overview of - 7
product features - 16
roadmap for installation - 26
Whats New - 5
AppAssure 5 Agent
installation requirements - 30
wizard, uninstall - 53
AppAssure 5 Central Console
wizard, installation - 48
AppAssure 5 Central Management Console
core group access, configuring - 50
core group settings, configuring - 50
core group, adding - 49
core settings, configuring - 52
core, adding - 51
installation requirements - 30
installing - 48
set up - 49
AppAssure 5 Core
installation requirements - 28
installing - 32
uninstalling - 55, - 56
B
basic volumes - 28
bytes per sector - 36
C
CentOS
installing agent - 44
uninstalling - 54
cloud
about - 22
core installation options
selecting - 33
core technologies
AppAssure Live Recovery - 8
AppAssure Recovery Assure - 9
AppAssure True Deduplication - 9, - 17
AppAssure True Scale Architecture - 9
AppAssure Universal Recovery - 9
D
data path - 35
deployment architecture
AppAssure 5 Core - 14
recovery - 15
replication, disaster recovery site - 15
replication, service provider - 15
snapshot process - 14
deployment architecture, AppAssure 5 Smart
Agent - 13
dynamic volumes - 28
E
encryption keys
creating - 37
F
file size
specifying - 36
Index
I
installation
about the AppAssure 5 components - 25
AppAssure Agent, requirement - 31
requirements - 27
roadmap for installing - 26
installation options
selecting - 40
installation, dynamic and basic volumes support 28
installation, UEFI and ReFS support - 28
installing agents on Linux machines - 41
about security - 42
agent dependencies - 43
before you begin - 41
downloading the installer - 41
firewall configuration - 42
location of Linux agent files - 42
L
libpam - 42
license agreement
accepting - 33, - 39, - 48
Linux
about security for agents - 42
agent files, locating - 42
agent, dependencies - 43
before installing agents - 41
downloading the agent installer - 41
firewall configuration for installing agents - 42
installing agents - 41
installing the agent on Red Hat Enterprise and
CentOS - 44
installing the agent on SUSE Linux Enterprise
Server - 45
installing the agent on Ubuntu - 43
starting and stopping the Linux agent daemon 46
supported scripts for pre and post transfer and
export - 46
Linux Agent Daemon
starting - 46
starting and stopping - 46
M
metadata path - 35
P
Pluggable Authentication Module (PAM) - 42
prerequisites
installing - 39
product features
Index
R
Recovery-as-a-Service (RaaS)
about - 20
Red Hat Enterprise
installing agent - 44
Red Hat Enterprise Linux
uninstalling - 54
ReFS - 28
S
scripts
pre and post transfer and export for Linux agent
46
storage location
adding - 34
SUSE Linux Enterprise Server
installing agent - 45
uninstalling - 55
System - 31
U
Ubuntu
installing agent - 43
uninstalling - 54
UEFI - 28
UNC path - 35
V
virtualization
about - 22
W
white labeling
about - 23
Windows Server 2012 Core
installing agents - 40
wizard
agent installation, using - 38
write caching policy - 36
Index
Index