HYCU UserGuide 4.3.1
HYCU UserGuide 4.3.1
Version: 4.3.1
Product release date: November 2021
Document release date: November 2021
Legal notices
Copyright notice
© 2021 HYCU. All rights reserved.
Trademarks
HYCU logos, names, trademarks and/or service marks and combinations thereof are the
property of HYCU or its affiliates. Other product names are the property of their respective
trademark or service mark holders and are hereby acknowledged.
Acropolis and Nutanix are trademarks of Nutanix, Inc. in the United States and/or other
jurisdictions.
Azure®, Microsoft®, Microsoft Edge™, and Windows® are either registered trademarks or
trademarks of Microsoft Corporation in the United States and/or other countries.
GCP™, Google Cloud Platform™, and Google Cloud Storage™ are trademarks of Google
LLC.
Linux® is the registered trademark of Linus Torvalds in the U.S. and other countries.
Red Hat Enterprise Linux is a registered trademark of Red Hat, Inc. or its subsidiaries in the
United States and other countries.
VMware ESXi™, VMware Tools™, VMware vCenter Server®, VMware vSphere®, VMware
vSphere® Data Protection™, and VMware vSphere® Web Client are registered trademarks
or trademarks of VMware, Inc. and its subsidiaries in the United States and other
jurisdictions.
Disclaimer
The details and descriptions contained in this document are believed to have been accurate
and up to date at the time the document was written. The information contained in this
document is subject to change without notice.
HYCU provides this material "as is" and makes no warranty of any kind, expressed or
implied, including, but not limited to, the implied warranties of merchantability and fitness
for a particular purpose. HYCU shall not be liable for errors and omissions contained
herein. In no event shall HYCU be liable for any direct, indirect, consequential, punitive,
special or incidental damages, including, without limitation, damages for loss and profits,
2
loss of anticipated savings, business interruption, or loss of information arising out of the
use or inability to use this document, or any action taken based on the information
contained herein, even if it has been advised of the possibility of such damages, whether
based on warranty, contract, or any other legal theory.
The only warranties for HYCU products and services are set forth in the express warranty
statements accompanying such products and services. Nothing herein should be
construed as constituting an additional warranty.
Notice
This document is provided in connection with HYCU products. HYCU may have copyright,
patents, patent applications, trademark, or other intellectual property rights covering the
subject matter of this document.
Except as expressly provided in any written license agreement from HYCU, the furnishing of
this document does not give you any license to these patents, trademarks, copyrights, or
other intellectual property on HYCU products. Use of underlying HYCU product(s) is
governed by their respective Software License and Support Terms.
Important: Please read Software License and Support Terms before using the
accompanying software product(s).
HYCU
www.hycu.com
3
Contents
1 About HYCU 12
HYCU key features and benefits 13
Deployment tasks 22
Logging on to HYCU 28
Setting up targets 37
4
Defining your backup strategy 57
Restore options 87
5
Restoring SQL Server databases 131
6
Viewing reports 173
7
Expiring backups 195
11 Administering 214
Configuring Active Directory authentication 215
Creating a HYCU instance by using the HYCU web user interface 223
8
Viewing HYCU instance information 224
Licensing 225
9
Setting up LDAPS authentication 263
Setting up HYCU to use multiple networks on a Nutanix AHV or ESXi cluster 268
Increasing the size of the HYCU disks in a Nutanix AHV cluster 270
Increasing the size of the HYCU disks in a Nutanix ESXi cluster or vSphere
environment 270
10
Registering HYCU with Nutanix Prism 283
11
Chapter 1
About HYCU
HYCU Data Protection for Enterprise Clouds (HYCU) is a high performing backup and
recovery solution for Nutanix, VMware, and physical machine environments. It is the first
data protection solution that is fully integrated with Nutanix, making data protection easy to
deploy and simple to use.
12
1 About HYCU
13
1 About HYCU
Objects to which you can assign a policy and for which you
therefore provide data protection—virtual and physical
Entities machines, applications, and file shares. Data is always
protected at a granular level, allowing you to restore either the
whole entities or their parts (disks and application items).
14
1 About HYCU
The following diagram shows the data protection environment and its most important
components:
HYCU enables you to protect virtual and physical machines, applications running on them,
file shares on Nutanix Files servers, Nutanix volume groups, and virtual machine templates.
After you establish your data protection environment (that is, add sources, set up targets,
and, optionally, create policies), you can enable data protection. After the first backup is
successfully completed, you can restore the data if it becomes damaged or corrupted.
Because HYCU is application-aware, when you set credentials for virtual and physical
machines, it discovers if any applications are installed and running on them. In addition, it
also detects details about the discovered applications such as their versions, the hosts
where individual components for the discovered application are installed, and the role of
each host.
After you deploy HYCU and establish your data protection environment, depending on
what kind of data you want to protect, see one of the following sections:
l “Protecting virtual machines” on page 70
l “Protecting applications” on page 113
l “Protecting file shares” on page 141
l “Protecting volume groups” on page 148
15
Chapter 2
Deployment modes
Deployment tasks
Task Instructions
1. Size the backup infrastructure “Sizing resources for your HYCU backup
for HYCU. infrastructure” on the next page
16
2 Deploying the HYCU virtual appliance
Task Instructions
After you successfully deploy the HYCU virtual appliance, you can access HYCU by using a
supported web browser. For details on how to log on to HYCU, see “Logging on to HYCU”
on page 28.
System requirements
Size of environment
Storage CPU cores Memory
17
2 Deploying the HYCU virtual appliance
System requirements
Size of environment
Storage CPU cores Memory
n Note HYCU web user interface is designed to work with a screen resolution of
at least 1280 × 720 pixels.
Firewalls installed on the source endpoints see the traffic as outbound, whereas firewalls
installed on the destination endpoints see the traffic as inbound. If firewalls are installed
elsewhere, they must be adjusted to allow connections in both directions.
System where
Use of the HYCU HYCU backup
HYCU interface 8443 TCP
interface controller
is accessed
HYCU backup
TCP
Use of a DNS server controller, DNS server 53
UDP
HYCU instance
HYCU backup
Use of an NTP server controller, NTP server 123 UDP
HYCU instance
18
2 Deploying the HYCU virtual appliance
HYCU backup
Discovery of VMs VMs 22a
controller
running Linux and TCP
applications on them HYCU backup
VMs 8443
controller
445b
HYCU instance Nutanix Files server 2049c
9440
Backup and restore of
HYCU backup TCP
file shares HYCU instance
controller
8443
HYCU backup
HYCU instance
controller
HYCU backup
Backup of data to an TCP
controller, NFS v4 server 2049
NFS v4 target UDP
HYCU instance
111
HYCU backup
Backup of data to an 2049 TCP
controller, NFS v3 server
NFS v3 target mountd UDP
HYCU instance
portd
HYCU backup
Backup of data to an
controller, SMB server 445 TCP
SMB target
HYCU instance
HYCU backup
Backup of data to a
controller, Cloud server 443e TCP
cloud target
HYCU instance
19
2 Deploying the HYCU virtual appliance
2049
controller, mountd
QStar NFS target
HYCU instance portd
18082f
HYCU backup
Archive of data to a 445
controller, QStar server TCP
QStar SMB target 18082f
HYCU instance
Restore of
applications or files to
a Windows VM if the HYCU backup
VMs 445 TCP
flr.fast.disable controller
configuration setting
is set to true
Restore of
HYCU backup
applications or files to VMs 22 TCP
controller
a Linux VM
NFS4: 2049
Restore of files to an HYCU backup System with an NFS NFS3: 111,
TCP
NFS share controller share mountd
portd
System where
Restore of files to the the HYCU HYCU backup
8443 TCP
local machine interface is controller
accessed
20
2 Deploying the HYCU virtual appliance
Telemetry host:
callhome.hycu.comk
Sharing telemetry data HYCU backup Data host: protege- 443 TCP
with HYCU controller production-
bucket.s3.eu-central-
1.amazonaws.coml
a An SSH server must be installed and configured to use the TCP port 22 for the SSH communication.
b Only if HYCU accesses file shares by using the SMB protocol.
c Only if HYCU accesses file shares by using the NFS protocol.
d For details on the port number, see NFS server documentation.
e Cloud targets may utilize multiple IP addresses. For details on IP ranges used by public clouds, see
configuration in HYCU.
h Only if an iSCSI Data Services IP address is specified for the Target Portal option in the iSCSI target
configuration in HYCU.
i HYCU uses the Nutanix REST API v3.
j HYCU accesses Nutanix Volumes.
21
2 Deploying the HYCU virtual appliance
k The host name is an alias and resolves to an IP address reported by the DNS server. Keep in mind
that the IP address is not static and might change over time.
l The host name is an alias and resolves to an IP address from an IP address set that is generated from
Prerequisite
The backup infrastructure is sized according to the requirements described in “Sizing
resources for your HYCU backup infrastructure” on page 17.
Consideration
The instructions for deploying HYCU to a Nutanix AHV cluster apply also to a Nutanix Mine
cluster.
Deployment tasks
When deploying HYCU to a Nutanix AHV cluster, you must perform the following tasks:
Task Instructions
3. Configure HYCU on the created virtual “Configuring HYCU on the virtual machine”
machine. on page 24
22
2 Deploying the HYCU virtual appliance
Procedure
1. Log on to the Nutanix Prism web console.
If you enter the HYCU image name in a different format, you will not be able to
use this image for an upgrade.
Procedure
1. In the menu bar in the Nutanix Prism web console, click Home, and then select VM.
2. Click Create VM at the upper right of the screen.
3. In the Create VM dialog box, provide the following information:
a. In the General Configuration section, do the following:
i. Enter a virtual machine name and, optionally, its description.
ii. Set the time zone as required.
iii. Leave the Use this VM as an agent VM check box clear.
23
2 Deploying the HYCU virtual appliance
b. In the Compute Details section, enter the number of virtual CPUs and cores per
virtual CPU, and the amount of memory to allocate to this virtual machine.
c. In the Disks section, click Add New Disk, and then, in the Add Disk dialog box,
specify a system disk:
i. From the Type drop-down menu, select DISK.
ii. From the Operation drop-down menu, select Clone from Image Service.
iii. From the Bus Type drop-down menu, select SCSI.
iv. From the Image drop-down menu, select the image you uploaded.
v. In the Size (GiB) field, leave the default size of the system disk (10 GiB).
n Note You can later increase the size of the system disk if needed. For
details, see “Increasing the size of the HYCU disks in a Nutanix AHV cluster”
on page 270.
n Note You can later increase the size of the data disk if needed. For
details, see “Increasing the size of the HYCU disks in a Nutanix AHV cluster”
on page 270.
Procedure
1. From the list of virtual machines in the Nutanix Prism web console, select the one you
created, and then click Power on.
2. When the virtual machine is turned on, click Launch Console.
3. In the HYCU Mode Selection dialog box that opens, select one of the following
24
2 Deploying the HYCU virtual appliance
deployment modes:
l HYCU Backup Controller
l HYCU Instance
l HYCU Manager
For details on deployment modes, see “Deployment modes” on page 16.
4. Tab to OK and press Enter.
5. In the Network Configuration dialog box that opens, do the following:
a. Enter the values for the following:
l Optional. Host name for the virtual machine
The default host name is generated automatically during the HYCU virtual
appliance deployment. If you want to use a custom host name, keep in mind
the following:
l Only if you selected the HYCU backup controller or HYCU Manager mode. The
host name should begin with a letter and may contain only letters,
numbers, and hyphens (-).
l Only if you selected the HYCU instance mode. For host name naming
conventions, see “Managing HYCU instances” on page 223.
l IPv4 address (for example, 10.1.100.1)
l Subnet mask (for example, 255.0.0.0)
l Default gateway (for example, 10.1.1.1)
l Optional. DNS server (for example, 10.1.1.5)
l Optional. Search domain (for example, domain.com)
n Note The domain name should begin with a letter and contain one or
more periods. It may also contain only letters, numbers, and hyphens (-).
i Important If the HYCU backup controller host name cannot be resolved from
the HYCU instance (for example, in environments that do not use DNS servers),
make sure to use the IP address:
https://<IPAddress>:<Port>
25
2 Deploying the HYCU virtual appliance
You can start using HYCU immediately with a prebuilt Instant-on license. This license
expires automatically after 45 days and cannot be reused. Therefore, make sure to obtain a
permanent license within this 45-day period. For instructions, see “Licensing” on page 225.
i Important You can use either the vSphere Web Client or the vSphere Client as
the interface for performing the procedure described in this section, unless stated
otherwise. As an example, you are guided through the steps that you must perform if
you are using the vSphere Web Client.
Prerequisites
l The backup infrastructure is sized according to the requirements described in “Sizing
resources for your HYCU backup infrastructure” on page 17.
l For deploying HYCU in the HYCU Instance mode: If your VMware vSphere version is 6.7
Update 3g or later, you can use the vSphere Web Client or the vSphere Client for
deployment. Otherwise, the vSphere Web Client must be used.
Procedure
1. Log on to the vSphere Web Client.
2. Right-click your vCenter Server, and then select Deploy OVF Template.... The Deploy
OVF Template dialog box opens.
3. In the Select template section, specify the location of the OVF package:
Local file i Important When you are browsing your file system, make
sure to select both the .ovf file and the .vmdk file related to the
OVF package.
Click Next.
4. In the Select name and location section, enter a name for the HYCU virtual machine and
specify a location where you want to deploy it, and then click Next.
5. In the Select a resource section, select where to run the deployed package, and then
click Next.
6. In the Review details section, verify the package details, and then click Next.
26
2 Deploying the HYCU virtual appliance
n Note The domain name should begin with a letter and contain one or
more periods. It may also contain only letters, numbers, and hyphens (-).
27
2 Deploying the HYCU virtual appliance
n Note Creating the virtual machine may take a few moments. The Power On
option is enabled only after the virtual machine is created.
12. From the list of virtual machines, right-click the newly created virtual machine, and then
select Power > Power On to turn it on.
You can start using HYCU immediately with a prebuilt Instant-on license. This license
expires automatically after 45 days and cannot be reused. Therefore, make sure to obtain a
permanent license within this 45-day period. For instructions, see “Licensing” on page 225.
Logging on to HYCU
After you successfully deploy the HYCU virtual appliance, you can access HYCU by using a
supported web browser. For a list of supported web browsers, see the HYCU Compatibility
Matrix.
Procedure
1. In a supported browser, enter the following URL:
https://<ServerName>:8443
In this instance, <ServerName> is the fully qualified domain name of the HYCU server.
For example:
https://hycu.example.com:8443
2. On the logon page, depending on how you want to log on to HYCU, do one of the
following:
l By using dedicated logon credentials for HYCU. Enter your logon name and password.
You can use the default user name (admin) and password (admin) for initial access
to HYCU. For security purposes, it is highly recommended that you change the
default password.
l By using an identity provider. Click the preferred identity provider, and then, if
required, enter your credentials.
For details on how to integrate HYCU with identity providers, see “Integrating HYCU
with identity providers” on page 220.
3. Only if two-factor authentication is enabled for your account. Enter the appropriate two-
factor credentials:
l For using time-based one-time passwords (OTP): Enter the six-digit authentication code
generated by your authentication application (for example, Google Authenticator or
a compatible application).
When you log on for the first time after two-factor authentication was enabled for
your account, the OTP backup code is displayed. Scan the QR code with the chosen
authentication application or enter the OTP backup code in the application
28
2 Deploying the HYCU virtual appliance
manually and then enter the authentication code generated by your authentication
application in the Authentication code field.
l For using FIDO authenticators: A security dialog box is displayed, requesting you to
authenticate (for example, by inserting a key). Follow the instructions to
authenticate your account.
When you log on for the first time after two-factor authentication was enabled for
your account, a security dialog box is displayed, prompting you to set up an
authenticator (for example a security key or a fingerprint reader). The procedure
depends on the selected authenticator and operating system. Follow the
instructions to set up the authenticator. For details, see “Managing FIDO
authenticators” on page 265.
n Note Keep in mind that the level of access depends on your user permissions. For
details, see “Managing users” on page 201.
After you log on to the HYCU web user interface, you can configure your environment to
use also the HYCU command-line interface (hyCLI). For more information, see “Using the
command-line interface” on page 273.
Consideration
The HYCU REST API Explorer and the HYCU command-line user interface (hyCLI) are
available only in English.
Procedures
l If you are an infrastructure or a self-service group administrator, you can set the
preferred language for a user. For instructions, see “Creating a user” on page 205.
l If you are the currently logged-on user, you can set your preferred language by using
the Update Profile option. For instructions, see “Updating your user profile” on
page 212.
l You can set the preferred language for notifications that are sent when events occur.
For instructions, see “Configuring event notifications” on page 167.
You can also change the user interface language by adding a LANG attribute to the URL that
you use to access the HYCU web user interface or the HYCU Manager console. For example:
https://hycu.example.com:8443/#!/login?lang=JA
29
Chapter 3
Establishing a data
protection environment
After you deploy the HYCU virtual appliance and log on to HYCU, you must establish a data
protection environment in which data will be effectively protected. Establishing the data
protection environment involves adding sources, setting up targets, and if your
environment requires custom policies, creating them.
The following flowchart explains the tasks you need to perform to establish your data
protection environment:
30
3 Establishing a data protection environment
The tasks that are required to establish a data protection environment can be performed
only by an infrastructure group administrator and are as follows:
l “Adding sources” below
l “Setting up targets” on page 37
You can enable data protection by using predefined policies that come with HYCU. If you do
not want to use any of them, make sure that you create your own policies. For details, see
“Creating a policy” on page 59.
After the data protection environment is established, data protection can be accomplished
in several ways to fulfill the needs of particular business.
n Note Before you start protecting your data protection environment, make sure
that the HYCU backup controller is protected. This way, you can quickly recover and
resume your data protection activities in case of a disaster. For more information, see
“Preparing for disaster recovery” on page 73.
Adding sources
An environment for which HYCU provides data protection consists of one or more sources
that you add to HYCU depending on what kind of data you want to protect—virtual
machines or applications running on virtual machines on Nutanix clusters or in vSphere
environments, file shares on Nutanix Files servers, volume groups on Nutanix clusters, or
physical machines and applications running on physical machines. For instructions on how
to add a specific source, see one of the following sections:
l “Adding a Nutanix cluster” below
l “Adding a vCenter Server” on page 33
l “Adding a Nutanix Files server” on page 34
l “Adding a physical machine” on page 37
Prerequisites
l For Nutanix ESXi clusters: Your cluster is registered to the vCenter Server through the
Prism web console. For details on how to do this, see Nutanix documentation.
31
3 Establishing a data protection environment
l Only if you plan to set up automatic policy assignment. The Nutanix AHV cluster that hosts
virtual machines to which you want to automatically assign policies is registered with
Prism Central. For details on how to do this, see Nutanix documentation. For details on
automatic policy assignment, see “Setting up automatic policy assignment” on page 68.
Considerations
l For Nutanix ESXi clusters:
o Make sure to use the Nutanix Prism web console to manage virtual machines.
o Make sure to configure your Windows virtual machines to not go into sleep mode
after a certain amount of time. Otherwise, the network settings are not recognized,
and consequently such virtual machines cannot be protected by HYCU.
l For backing up virtual machines and volume groups from their replicas in remote
office/branch office (ROBO) environments, you must add both the central site Nutanix
cluster and the branch office site cluster.
Recommendation
For better performance, it is recommended that an iSCSI Data Service IP address is
specified on the Nutanix cluster that you plan to add to HYCU. This automatically enables
the Nutanix load balancing feature during data protection operations, which eliminates
heavy I/O load on the Nutanix cluster and storage containers. For details on how to specify
an iSCSI Data Service IP address, see Nutanix documentation.
Procedure
1. In the Sources dialog box, click the Hypervisor tab, and then click New.
2. Enter the name of the Nutanix cluster in the following URL format:
https://<ServerName>:<Port>
3. Enter the user name and password of a user with cluster administrative rights.
4. Only if client authentication is enabled on the Nutanix cluster that you are adding to HYCU.
Use the Enable Certificate Authentication switch, and then browse and upload the
trusted CA certificate, the client certificate, and the client private key. Keep in mind the
following:
l The supported certificate file formats are PKCS#1 and PKCS#8.
l The private key must not be encrypted.
By enabling certificate authentication, you allow HYCU to connect to the Nutanix cluster.
5. Click Next, and then, depending on the type of Nutanix cluster you are adding, do the
32
3 Establishing a data protection environment
following:
Type of Nutanix
Instructions
cluster
6. In the Summary dialog box, verify that the validation was successful, and then click
Save.
You can also edit any of the existing Nutanix clusters (click Edit and make the required
modifications) or delete the ones that you do not need anymore (click Delete). When
deleting a Nutanix cluster, consider the following:
l You can choose to delete or keep snapshots created by HYCU by using the Delete
snapshots switch.
l You can delete any Nutanix cluster, provided it does not have any dependencies.
Therefore, deleting a Nutanix cluster that is specified as the central site cluster in your
policy is not possible until all its dependencies are removed.
Prerequisite
A user with specific privileges for vCenter Servers is specified. For details on which privileges
must be assigned to a vSphere user, see “Assigning privileges to a vSphere user” on
33
3 Establishing a data protection environment
page 271.
Limitation
Adding vCloud Director or a stand-alone ESXi host is not supported.
Procedure
1. In the Sources dialog box, click the Hypervisor tab, and then click New.
2. Enter the name of the vCenter Server in the following URL format:
https://<vCenterServerFQDN>:<Port>
i Important Make sure you configure the HYCU DNS settings in a way that
allows HYCU to resolve this FQDN and, consequently, connect to the vCenter Server
and ESXi hosts on which the virtual machines that you want to include in the backup
are running.
3. Enter the user name and password of a user with specific privileges for vCenter Servers.
4. Click Save.
You can also edit any of the existing vCenter Servers (click Edit and make the required
modifications) or delete the ones that you do not need anymore (click Delete).
For protecting file shares, a HYCU instance is introduced in the data protection
environment. The HYCU instance is a virtual machine that HYCU uses for performing
Nutanix Files data protection operations, taking the load off the HYCU backup controller.
You can have one or more HYCU instances in your data protection environment,
depending on your business needs. For details on HYCU instances, see “HYCU instances” on
page 36.
Prerequisite
HYCU can access a Nutanix Files server. For details, see “Enabling HYCU to access a Nutanix
Files server” on the next page.
34
3 Establishing a data protection environment
Procedure
1. In the Sources dialog box, click the File Servers tab, and then click New.
2. Enter the name of the Nutanix Files server in the following format:
https://<NutanixFilesServerHostname>:<Port>
i Important Make sure the name of the Nutanix Files server is unique.
3. Specify the user name and password of a user with Nutanix Files server administrative
rights for REST API access.
For instructions on how to create this type of user, see “Enabling HYCU to access a
Nutanix Files server” below.
4. Use the Use SMB protocol for accessing shares switch if you plan to protect SMB file
shares, and then, in the SMB Backup Credentials section, enter the user name and
password of a server or backup administrator with access to all SMB file shares within
the Nutanix Files server.
5. Use the Use NFSv4 protocol for accessing shares switch if you plan to protect NFS
file shares.
6. Click Save.
You can later do the following:
l Edit any of the existing Nutanix Files servers. To do so, select the Nutanix Files server,
click Edit , make the required modifications, and then click Save.
l Delete the Nutanix Files servers that you do not need anymore as follows:
a. Select the Nutanix Files server, click Delete, and then do the following:
o If you want to delete also the corresponding HYCU instances, use the Remove
unused HYCU instances switch.
o If you want to delete snapshots created by HYCU, use the Delete snapshots
switch.
b. Click Yes.
35
3 Establishing a data protection environment
ssh @<NutanixClusterHostname>
2. Run the ncli fs list command to list the UUID for the file server.
3. Create a new user:
HYCU instances
Before you can start protecting file shares, your HYCU backup controller should have at
least one connected HYCU instance that will perform data protection operations.
You can have one or more HYCU instances on your Nutanix cluster. Having more than one
HYCU instance is especially useful in environments with a large number of file shares in
which HYCU instances can share the load among themselves when performing data
protection operations. When distributing the load among multiple HYCU instances, HYCU
automatically prioritizes the HYCU instances that are running on the same Nutanix cluster
as the Nutanix Files server and the HYCU backup controller. However, by changing the
afs.instance.afs.cluster.priority or afs.instance.bc.cluster.priority
configuration setting, you can adjust the load distribution process to your needs. For details
on how to customize the HYCU configuration settings, see “Customizing HYCU
configuration settings” on page 303.
Considerations
l You can create a HYCU instance before or after adding a Nutanix Files server to HYCU.
l The created HYCU instance connects automatically to the corresponding HYCU backup
controller.
l Each HYCU instance is by default created with 16 GiB of RAM, 1 CPU, 8 CPU cores, and
the data disk size of 64 GiB. However, this can be overridden by setting the
afs.instance.memory.mb, afs.instance.cpu, afs.instance.cores.per.cpu, and
afs.instance.datadisk.size.gb configuration settings to the desired values. For
details on how to customize the HYCU configuration settings, see “Customizing HYCU
configuration settings” on page 303.
l If you change the host name or IP address of the HYCU backup controller, you must
also change it on all connected HYCU instances. On each connected HYCU instance,
36
3 Establishing a data protection environment
If you later decide to remove any HYCU instance from your data protection environment,
you can do it as described in “Deleting a HYCU instance” on page 225.
Procedure
1. In the Sources dialog box, click the Physical Machines tab, and then click New.
2. Enter the name of the physical machine.
3. Enter the host name or IP address of the physical machine.
4. Click Save.
You can also edit any of the existing physical machines (click Edit and make the required
modifications) or delete the ones that you do not need anymore (click Delete).
n Note If you delete a physical machine from HYCU and then add it again (with the
same name and IP address), keep in mind that this physical machine will be treated as a
new one and therefore no old restore points will be available.
Setting up targets
Targets are locations where protected data is stored. HYCU allows you to store your data to
the following types of targets: NFS, SMB, Nutanix, Nutanix Objects, iSCSI, AWS
S3/Compatible, Azure, Google Cloud, and tape.
n Note A Nutanix Files share can be used as an NFS or SMB target. If you plan to use
the Nutanix Files share only as a target and not as a source, there is no need to add the
Nutanix Files server to HYCU.
The approach to set up targets is common for different target types. However, there are
specific prerequisites and steps that are required for each target type. Depending on which
target you want to set up, see one of the following sections:
l “Setting up an NFS target” on the next page
l “Setting up an SMB target” on page 40
l “Setting up a Nutanix target” on page 42
l “Setting up a Nutanix Objects target” on page 44
l “Setting up an iSCSI target” on page 46
37
3 Establishing a data protection environment
Limitations
l Target compression is not supported for file shares.
l For protecting physical machine data:
o You can store only Linux physical machine backups to this type of target.
o Target encryption and compression are not supported.
Recommendation
It is highly recommended that public access is disabled for a target on which backup data is
stored. HYCU automatically detects if public access is enabled for the target and issues a
warning message to notify you to adjust the security settings to restrict access to data.
Procedure
1. In the Targets panel, click Add. The Add Target dialog box opens.
b. Optional. In the Size field, enter the maximum storage space that should be
reserved for the backup files (in MiB, GiB, or TiB). If your target is not dedicated
38
3 Establishing a data protection environment
When this field is left empty, HYCU retrieves the available amount of storage space
from the target itself.
If the backup throughput allows, you can specify that more backup jobs run
concurrently to reduce the duration of backups and the amount of queued backup
jobs.
d. Use the Use for archiving switch if you want this target to be reserved for data
archives.
i Important The target that you use for archiving data cannot be used for
backing up data or storing copies of backup data.
e. Use the Enable Compression switch if you want HYCU to compress backup data
before storing it on this target. Compression can be used for backup data, copies of
backup data, and data archives.
39
3 Establishing a data protection environment
file and keep this file safe. For instructions, see “Exporting an encryption
key” on page 220.
4. Click Save.
The target is added to the list of targets. For details on managing targets, see “Managing
targets” on page 186.
Limitations
l Target compression is not supported for file shares.
l For protecting physical machine data:
o You can store only Windows physical machine backups to this type of target.
o Target encryption and compression are not supported.
Recommendation
It is highly recommended that public access is disabled for a target on which backup data is
stored. HYCU automatically detects if public access is enabled for the target and issues a
warning message to notify you to adjust the security settings to restrict access to data.
Procedure
1. In the Targets panel, click Add. The Add Target dialog box opens.
b. Optional. In the Size field, enter the maximum storage space that should be
reserved for the backup files (in MiB, GiB, or TiB). If your target is not dedicated
40
3 Establishing a data protection environment
When this field is left empty, HYCU retrieves the available amount of storage space
from the target itself.
If the backup throughput allows, you can specify that more backup jobs run
concurrently to reduce the duration of backups and the amount of queued backup
jobs.
d. Use the Use for archiving switch if you want this target to be reserved for data
archives.
i Important The target that you use for archiving data cannot be used for
backing up data or storing copies of backup data.
e. Use the Enable Compression switch if you want HYCU to compress backup data
before storing it on this target. Compression can be used for backup data, copies of
backup data, and data archives.
41
3 Establishing a data protection environment
applications, file shares, and volume groups, export the encryption key to a
file and keep this file safe. For instructions, see “Exporting an encryption
key” on page 220.
4. Click Save.
The target is added to the list of targets. For details on managing targets, see “Managing
targets” on page 186.
Limitations
l A Nutanix target cannot be used for storing file share data.
l Storing physical machine backups to this type of target is not supported.
Considerations
l The storage container on a Nutanix cluster that HYCU creates automatically and uses as
a Nutanix target must be dedicated exclusively to storing backup data. Because the
names of such storage containers start with the HYCU- prefix, make sure not to create
your own storage containers with the same prefix. Keep in mind that these storage
containers are not available as destinations when restoring data, cloning data, and
creating HYCU instances.
l Only if you plan to employ Nutanix Mine with HYCU. While adding a Nutanix target, you can
also decide to add the related Nutanix cluster as a source to HYCU, if not already added.
l For Nutanix Mine with HYCU: In the Nutanix Mine with HYCU dashboard, the Nutanix
targets are listed as Mine Storage.
Recommendation
For better performance, it is recommended that an iSCSI Data Service IP address is
specified on the Nutanix cluster on which a Nutanix target will be created. This
automatically enables the Nutanix load balancing feature during data protection
operations, which eliminates heavy I/O load on the Nutanix cluster and storage containers.
For details on how to specify an iSCSI Data Service IP address, see Nutanix documentation.
42
3 Establishing a data protection environment
Procedure
1. In the Targets panel, click Add. The Add Target dialog box opens.
b. Optional. In the Size field, enter the maximum storage space that should be
reserved for the backup files (in MiB, GiB, or TiB).
If you leave this field empty, HYCU retrieves the available amount of storage space
from the target itself.
If the backup throughput allows, you can specify that more backup jobs run
concurrently to reduce the duration of backups and the amount of queued backup
jobs.
d. Use the Use for archiving switch if you want this target to be reserved for data
archives.
i Important The target that you use for archiving data cannot be used for
backing up data or storing copies of backup data.
e. Use the Enable Compression switch if you want HYCU to compress backup data
before storing it on this target. Compression can be used for backup data, copies of
backup data, and data archives.
c. Enter the user name and password of a user with cluster administration rights.
d. Use one or more of the following switches if you want to enable the respective
Nutanix options on the storage container to increase your Nutanix cluster’s
effective storage capacity:
43
3 Establishing a data protection environment
l Deduplication
l Erasure coding
l Hardware compression
For more information on these options, see Nutanix documentation.
e. Enable the Metered target switch to ensure that reading data from the target for
which extra charges may apply is the most cost-effective.
f. Use the Target encryption switch if you want the data stored on this target to be
encrypted.
4. Click Save.
The target is added to the list of targets. For details on managing targets, see “Managing
targets” on page 186.
ssh hycu@<HYCUBackupControllerIPAddress>
44
3 Establishing a data protection environment
Limitations
l Storing backup data to targets on which expiration for HYCU objects and versions is
enabled in a lifecycle policy is not supported.
l Target compression is not supported for file shares.
l Storing physical machine backups to this type of target is not supported.
Consideration
Only if you plan to specify a bucket you have created yourself. If you plan to apply the WORM
policy on the bucket, make sure that object versioning is enabled. For details, see Nutanix
documentation.
Procedure
1. In the Targets panel, click Add. The Add Target dialog box opens.
b. In the Size field, enter the maximum storage space that should be reserved for the
backup files (in MiB, GiB, or TiB).
If the backup throughput allows, you can specify that more backup jobs run
concurrently to reduce the duration of backups and the amount of queued backup
jobs.
d. Use the Use for archiving switch if you want this target to be reserved for data
archives.
i Important The target that you use for archiving data cannot be used for
backing up data or storing copies of backup data.
e. Use the Enable Compression switch if you want HYCU to compress backup data
before storing it on this target. Compression can be used for backup data, copies of
backup data, and data archives.
45
3 Establishing a data protection environment
Required
Notes
information
Access key ID The access key ID and the secret access key are used to
Secret access key authenticate S3 REST API service calls.
c. Use the Path style access switch if you want HYCU to use a path-style URL
(https://<ServiceEndpointURL>/<BucketName>) to access the bucket. HYCU by
default uses a virtual-hosted–style URL
(https://<BucketName>.<ServiceEndpointURL>).
d. Enable the Metered target switch to ensure that reading data from the target for
which extra charges may apply is the most cost-effective.
e. Use the Target encryption switch if you want the data stored on this target to be
encrypted.
4. Click Save.
The target is added to the list of targets. For details on managing targets, see “Managing
targets” on page 186.
Limitations
l An iSCSI target cannot be used for storing file share data.
l Storing physical machine backups to this type of target is not supported.
46
3 Establishing a data protection environment
Considerations
l If you have more than one volume created on the selected iSCSI target, HYCU uses the
disks from all the volumes that it can access for storing data.
l Nutanix volume groups used as iSCSI targets automatically discard unused blocks. For
other types of iSCSI targets, this option can be added manually. For details, contact
HYCU Customer Support.
Procedure
1. In the Targets panel, click Add. The Add Target dialog box opens.
b. Optional. In the Size field, enter the maximum storage space that should be
reserved for the backup files (in MiB, GiB, or TiB).
If you leave this field empty, HYCU retrieves the available amount of storage space
from the target itself.
If the backup throughput allows, you can specify that more backup jobs run
concurrently to reduce the duration of backups and the amount of queued backup
jobs.
d. Use the Use for archiving switch if you want this target to be reserved for data
archives.
i Important The target that you use for archiving data cannot be used for
backing up data or storing copies of backup data.
e. Use the Enable Compression switch if you want HYCU to compress backup data
before storing it on this target. Compression can be used for backup data, copies of
backup data, and data archives.
47
3 Establishing a data protection environment
n Note If data from sources other than HYCU resides on the storage device,
such a target cannot be set for HYCU backups.
c. Enable the Metered target switch to ensure that reading data from the target for
which extra charges may apply is the most cost-effective.
d. Use the Target encryption switch if you want the data stored on this target to be
encrypted.
4. If the iSCSI server requires CHAP authentication, in the CHAP section, do the following:
a. Use the switch to turn the CHAP authentication option on, and then provide a user
name and the target secret (the security key) for the user's account to access the
iSCSI server.
b. Use the Perform mutual authentication switch if you want the iSCSI target to be
authenticated by HYCU. In this case, the HYCU iSCSI Initiator secret must be
specified on the iSCSI server. For details about setting the iSCSI Initiator secret, see
“Setting the iSCSI Initiator secret” on page 225.
5. Click Save.
The target is added to the list of targets. For details on managing targets, see “Managing
targets” on page 186.
i Important Using Object Lock (WORM) is supported for AWS S3 and Cloudian
S3-compatible targets. In this case, make sure that versioning is set to Enabled when
creating an S3 bucket for HYCU. For details, see AWS or Cloudian documentation.
l The following minimum required AWS S3 permissions are specified: s3:GetObject,
s3:GetObjectRetention, s3:DeleteObject, s3:PutObject, s3:ListBucket,
s3:GetBucketAcl, s3:ListBucketMultipartUploads, s3:GetBucketLocation,
s3:GetBucketObjectLockConfiguration, s3:DeleteObjectVersion,
s3:ListBucketVersions, and s3:GetBucketVersioning.
l For S3-compatible targets: If you want to provide secure HTTPS access, make sure the
required CA-signed certificate is imported as follows:
48
3 Establishing a data protection environment
ssh hycu@<HYCUBackupControllerIPAddress>
l For setting up a Tencent Cloud target: Make sure the service endpoint URL does not
contain the bucket name. For example, if the Tencent Cloud access domain is
https://testbucket-1234567890.cos.ap-chengdu.myqcloud.com, in the HYCU
Service endpoint field, enter the URL without the bucket name:
https://cos.ap-chengdu.myqcloud.com
Limitations
l HYCU does not support the AWS S3 targets that use the Glacier storage class.
l HYCU currently supports only AWS S3 Signature Version 4.
l Storing backup data to targets on which expiration for HYCU objects and versions is
enabled in a lifecycle policy is not supported.
l Target compression is not supported for file shares.
l Storing physical machine backups to this type of target is not supported.
Recommendation
It is highly recommended that public access is disabled for a target on which backup data is
stored. HYCU automatically detects if public access is enabled for the target and issues a
warning message to notify you to adjust the security settings to restrict access to data.
Procedure
1. In the Targets panel, click Add. The Add Target dialog box opens.
b. In the Size field, enter the maximum storage space that should be reserved for the
49
3 Establishing a data protection environment
If the backup throughput allows, you can specify that more backup jobs run
concurrently to reduce the duration of backups and the amount of queued backup
jobs.
d. Use the Use for archiving switch if you want this target to be reserved for data
archives.
i Important The target that you use for archiving data cannot be used for
backing up data or storing copies of backup data.
e. Use the Enable Compression switch if you want HYCU to compress backup data
before storing it on this target. Compression can be used for backup data, copies of
backup data, and data archives.
4. Click Save.
50
3 Establishing a data protection environment
The target is added to the list of targets. For details on managing targets, see “Managing
targets” on page 186.
Limitations
l Backing up data to an Azure target that has WORM enabled is not supported.
l Target compression is not supported for file shares.
l Storing physical machine backups to this type of target is not supported.
Considerations
l Your data on the Azure target can be stored in the hot, cool, and archive storage tiers.
When restoring data archives, HYCU performs data rehydration during which the tier of
the Blob object storage is changed from the archive storage tier to the hot storage tier.
Keep in mind that this can take a few hours to complete. HYCU moves data back to the
archive storage tier afterward. For details, see “Data rehydration settings” on page 307.
l HYCU automatically moves each data archive that has a retention period set to at least
180 days from the Azure cool or hot storage tier to the archive storage tier during the
next archive synchronization. By moving data archives to the archive storage tier, HYCU
ensures your data is stored most cost-efficiently because the archive storage tier is
optimized for storing data that is not accessed frequently and is stored for at least 180
days.
Recommendation
It is highly recommended that public access is disabled for a target on which backup data is
stored. HYCU automatically detects if public access is enabled for the target and issues a
warning message to notify you to adjust the security settings to restrict access to data.
Procedure
1. In the Targets panel, click Add. The Add Target dialog box opens.
b. In the Size field, enter the maximum storage space that should be reserved for the
backup files (in MiB, GiB, or TiB).
51
3 Establishing a data protection environment
backups.
If the backup throughput allows, you can specify that more backup jobs run
concurrently to reduce the duration of backups and the amount of queued backup
jobs.
d. Use the Use for archiving switch if you want this target to be reserved for data
archives.
i Important The target that you use for archiving data cannot be used for
backing up data or storing copies of backup data.
e. Use the Enable Compression switch if you want HYCU to compress backup data
before storing it on this target. Compression can be used for backup data, copies of
backup data, and data archives.
c. Enable the Metered target switch to ensure that reading data from the target for
which extra charges may apply is the most cost-effective.
d. Use the Target encryption switch if you want the data stored on this target to be
encrypted.
4. Click Save.
52
3 Establishing a data protection environment
The target is added to the list of targets. For details on managing targets, see “Managing
targets” on page 186.
Limitations
l Backing up data to a Google Cloud target that has WORM enabled is not supported.
l Target compression is not supported for file shares.
l Storing physical machine backups to this type of target is not supported.
Considerations
l To ensure your data is stored most cost-efficiently, HYCU stores data in the Google
Cloud storage class that is optimal for the retention period set in your policy. Therefore,
data can be stored in a different storage class than the one set as the bucket's default
storage class. However, if the bucket's default storage class is set to standard, backup
data and copies of backup data are always stored in the standard storage class.
l Each data archive that has a retention period set to at least 365 days is automatically
moved to the Google Cloud archive storage class during the next archive
synchronization.
Recommendation
It is highly recommended that public access is disabled for a target on which backup data is
stored. HYCU automatically detects if public access is enabled for the target and issues a
warning message to notify you to adjust the security settings to restrict access to data.
Procedure
1. In the Targets panel, click Add. The Add Target dialog box opens.
53
3 Establishing a data protection environment
b. In the Size field, enter the maximum storage space that should be reserved for the
backup files (in MiB, GiB, or TiB).
If the backup throughput allows, you can specify that more backup jobs run
concurrently to reduce the duration of backups and the amount of queued backup
jobs.
d. Use the Use for archiving switch if you want this target to be reserved for data
archives.
i Important The target that you use for archiving data cannot be used for
backing up data or storing copies of backup data.
e. Use the Enable Compression switch if you want HYCU to compress backup data
before storing it on this target. Compression can be used for backup data, copies of
backup data, and data archives.
c. From the Cloud account drop-down menu, select the Google Cloud service account
you added to HYCU.
d. Enable the Metered target switch to ensure that reading data from the target for
which extra charges may apply is the most cost-effective.
e. Use the Target encryption switch if you want the data stored on this target to be
encrypted.
4. Click Save.
54
3 Establishing a data protection environment
The target is added to the list of targets. For details on managing targets, see “Managing
targets” on page 186.
Prerequisites
l The licensed capacity is sufficient for storing archive data.
l The QStar cache is large enough.
l There is enough free space for storing archive data on QStar.
For details, see QStar documentation.
Limitation
Target compression is not supported—archive data cannot be compressed before it is
stored on the target.
Considerations
l Make sure to use a tape target only for storing archive data.
l Each Integral Volume set is treated as a separate target in HYCU.
Procedure
1. In the Targets panel, click Add. The Add Target dialog box opens.
b. Optional. In the Size field, enter the maximum space that should be reserved for
archive data (in MiB, GiB, or TiB).
c. In the Concurrent backups field, specify the maximum number of concurrent
archive jobs. You can specify several archive jobs to run concurrently to reduce the
duration of archiving data and the amount of queued archive jobs.
i Important You must ensure that the QStar cache is large enough to
support concurrent archive operations. Keep in mind that specifying several
archive jobs to run concurrently may also increase system requirements for the
HYCU backup controller.
55
3 Establishing a data protection environment
a. Provide user credentials that HYCU will use to access the shared
folder and make web service calls.
b. Enter the name of the Integral Volume set where you want to
archive data.
c. Provide the web service information. If the default port is used
and HTTPS access to the QStar server is configured, enter the
host name of the QStar server. Otherwise, specify the URL that
will be used to access the QStar server in the following format:
https://<QStarServer>:<Port>
56
3 Establishing a data protection environment
4. Click Save.
After you create a tape target, it is added to the list of targets and represented by the
icon.
When defining your backup strategy, take into account the specific needs of your
environment and consider the following:
l Recovery Point Objective (RPO)
RPO is the maximum period of time for which data loss is considered acceptable (in
months, weeks, days, hours, or minutes). For example, setting the RPO to 24 hours
means that your business can tolerate losing only data from the last 24 hours.
l Recovery Time Objective (RTO)
RTO is the maximum amount of time (in months, weeks, days, hours, or minutes) that
can be spent on restoring data after a disaster occurs.
Decide which of the following approaches best suits the needs of your environment:
57
3 Establishing a data protection environment
Type of predefined
Description
policy
If you want to exclude entities from being backed up, you can use the Exclude policy.
58
3 Establishing a data protection environment
Backup from replica Keep in mind that the replication retention for the respective
snapshot on the Nutanix cluster is automatically adjusted to
the RPO set in the HYCU policy. This allows HYCU to use the
Changed Block Tracking (CBT) feature to get a list of changed
data since the last snapshot and perform an incremental
backup.
Creating a policy
You can create a custom policy that will meet all the needs of your data protection
environment.
Prerequisites
l If you plan to specify time windows for backup and backup copy jobs, make sure you
have created them. By specifying time windows, you define time frames when your
59
3 Establishing a data protection environment
backup and backup copy jobs are allowed to start. For details on time windows, see
“Creating a time window” on page 63.
l If you plan to enable the Archiving policy option, make sure you have created a data
archive. For details on how to do this, see “Creating a data archive” on page 66.
l If you plan to back up virtual machines and volume groups from their replicas in ROBO
environments:
o A protection domain that includes the virtual machines and volume groups that
you want to protect must be created and the specified schedule interval must be
less than or equal to the RPO set in the HYCU policy. For details on protecting virtual
machines and volume groups through the Nutanix Prism web console, see Nutanix
documentation.
o Both the central site Nutanix cluster and the branch office site cluster must be
added to HYCU. For details, see “Adding a Nutanix cluster” on page 31.
l If you plan to enable the Auto-assignment policy option, make sure you are familiar
with the information in “Setting up automatic policy assignment” on page 68.
Procedure
1. In the Policies panel, click New. The New Policy dialog box appears.
2. Enter a name and, optionally, a description of your policy.
3. Add any of the following policy options to the list of the enabled options by clicking it:
l Backup (mandatory)
l Copy
l Archiving
l Fast restore
l Backup from replica
l Auto-assignment
i Important The Backup from replica and Fast restore options are not
available for vSphere virtual machines and applications.
n Note Only if you use Object Lock on AWS S3 or Nutanix Objects targets. It is
60
3 Establishing a data protection environment
d. Under Start new backup chain, select when you want a new backup chain to be
started:
l Backup threshold
A new backup chain is started when the percentage of data changes since the
last full backup exceeds the value you specify for this option. The default value
is 25.
l Backup chain length
A new backup chain is started when the number of the full and subsequent
incremental backups in a backup chain exceeds the value you specify for this
option. The default value is 7.
n Note If you select both options, the new backup chain is started when
either of the specified values has been exceeded.
e. From the Targets drop-down menu, select one or more targets that you want to
use for storing protected data.
If you want your target to be selected automatically, make sure the Automatically
selected option is selected. In this case, the HYCU advanced scheduler
automatically selects only the targets that can guarantee compliance with the RPO
and RTO policy settings. Targets that have their estimated backup time lower than
the RPO and estimated recovery time lower than the RTO are added to the pool of
targets. Based on each entity size, as well as target backup and restore throughput
and queue, the HYCU advanced scheduler calculates the backup and recovery end
time and selects the target where the backup will complete the fastest.
n Note The target for incremental backups can be any target in the selected
pool of targets. To have a single target for all backups in a backup chain, make
sure to select a single target per policy.
f. Only if you want to specify a backup window. Enable the Use backup window switch,
and then from the Backup window drop-down menu, select a backup window for
backup jobs. If no backup window is available and you want to create one, see
“Creating a backup window” on page 63.
5. Depending on which policy options you have enabled, do the following:
Enabled
Procedure
option
a. Set a retention period (in months, weeks, or days) for the copy
61
3 Establishing a data protection environment
Enabled
Procedure
option
of backup data.
b. From the Targets drop-down menu, select one or more targets
that you want to use for storing the copy of backup data.
If you want your target to be selected automatically, make sure
the Automatically selected option is selected. The copy target
will be different from the target for data safety reasons.
c. Only if you want to specify a copy window. Enable the Use copy
window switch, and then from the Copy window drop-down
menu, select a copy window for backup copy jobs. If no copy
window is available and you want to create one, see “Creating a
copy window” on page 65.
To archive data, in the Archiving section, from the Data archive drop-
Archiving down menu, select a data archive. If no data archive is available and
you want to create one, see “Creating a data archive” on page 66.
Available only for Nutanix clusters. To keep more than one snapshot
on the Nutanix cluster, which allows a fast restore, in the Fast
restore section, set a retention period (in months, weeks, days,
hours, or minutes) for snapshots. For example, if you set the RPO to
Fast restore two days and the snapshot retention period to four days, you will
have two snapshots available on the Nutanix cluster.
62
3 Establishing a data protection environment
Enabled
Procedure
option
6. Click Save.
The custom policy is created and added to the list of policies. For details on managing
policies, see “Managing policies” on page 190.
You can use time windows with both predefined policies and custom policies.
i Important When defining a time window, make sure that the RPO specified in
the affected policy can be achieved within this time window. If the RPO is shorter than
any time frame during which backup or backup copy jobs are not allowed to start, this
will result in your entity not being compliant with backup requirements.
Depending on whether you want to create a backup window or a copy window, see one of
the following sections:
l “Creating a backup window” below
l “Creating a copy window” on page 65
Procedure
1. In the Time Window dialog box, click New. The Select Window dialog box appears.
2. Select Backup Window, and then click Next.
3. Enter a name for your backup window and, optionally, its description.
4. From the Time zone drop-down menu, specify the time zone for your backup window.
You can click one of the displayed time zones (your local time zone or your HYCU
backup controller time zone) or select one from the drop-down menu.
63
3 Establishing a data protection environment
n Note During the Full/Incremental time frame, backups of any backup type are
started, whereas during the Incremental Only time frame, only incremental backups
are started. However, if for some reason (for example, due to the Copy policy option
being enabled, a snapshot missing, a disk being added to the virtual machine, and
so on) an incremental backup cannot be started, a full backup is started instead,
also during the Incremental Only time frame.
6. Select the week days and hours during which you want backups of the selected backup
type to start running. To specify time frames for backups of a different backup type,
select another backup type, and then repeat this step.
t Tip You can click and drag to quickly select a time frame that includes the days
and hours you want to add.
The selected time frames are displayed in the Time Frames field. If you want to delete
any of the selected time frames, click x next to it.
7. Click Save.
You can later edit any of the existing backup windows (click Edit and make the required
modifications) or delete the ones that you do not need anymore (click Delete).
64
3 Establishing a data protection environment
Example
You have selected the Bronze policy and specified the time frames for backups of any type
to start on Saturday and Sunday and for incremental only backups to start 6 PM to 6 AM
on week days.
In this case, the backup jobs will be started every 24 hours (full backups will be started
only during the weekends) at any point of time within the specified backup windows.
Procedure
1. In the Time Window dialog box, click New. The Select Window dialog box appears.
2. Select Copy Window, and then click Next.
3. Enter a name for your copy window and, optionally, its description.
4. From the Time zone drop-down menu, specify the time zone for your copy window.
You can click one of the displayed time zones (your local time zone or your HYCU
backup controller time zone) or select one from the drop-down menu.
5. Select the week days and hours during which you want backup copy jobs to start
running.
t Tip You can click and drag to quickly select a time frame that includes the days
and hours you want to add.
The selected time frames are displayed in the Time Frames field. If you want to delete
any of the selected time frames, pause on the time frame, and then click x that
appears next to it.
6. Click Save.
65
3 Establishing a data protection environment
You can later edit any of the existing copy windows (click Edit and make the required
modifications) or delete the ones that you do not need anymore (click Delete).
Example
You have selected the Bronze policy and specified the time frames that allow backup copy
jobs to be started from Monday to Friday from 6 PM to 6 AM, and from Saturday to
Sunday all day long.
In this case, the backup copy jobs will be started every 24 hours at any point of time within
the specified time frames.
Prerequisites
l The archive target is reserved only for data archives (no backup data is stored on the
archive target).
66
3 Establishing a data protection environment
l For archiving data to the Azure archive storage tier: Data archives are stored in Azure with
the Blob Storage or General Purpose v2 (GPv2) accounts.
Limitations
l For archiving data to the Azure archive storage tier: General Purpose v1 (GPv1) accounts do
not support moving data archives to the archive storage tier.
l For archiving data to the Azure archive storage tier and the Google Cloud archive storage class:
Data archives created with any of the previous versions of HYCU are not moved to the
archive storage tier.
Procedure
1. In the Policies panel, click Archiving.
2. In the Archiving dialog box that appears, click New.
3. In the New dialog box that appears, enter a name for your data archive and, optionally,
a description.
4. Add any of the desired archiving options to the list of the enabled options by clicking it.
The following options are available:
5. Specify the hour and the minute when the archive job should begin running.
i Important All scheduled archive jobs are started based on the HYCU backup
controller time zone and are not affected by the time windows specified for the
same policy.
6. Provide information about when to archive data, the retention period to be used, and
one or more archive targets.
n Note Make sure that the retention period is longer than the RPO to prevent the
archive from expiring before a new backup is performed.
7. Click Save.
You can later edit any of the existing data archives (click Edit and make the required
modifications) or delete the ones that you do not need anymore (click Delete). Keep in
mind that you cannot modify an archive target if an archiving job is in progress on that
target.
67
3 Establishing a data protection environment
l Specify a data archive when creating a new policy. For details, see “Creating a policy” on
page 59.
l Assign a data archive to the existing policy. To do so, select the policy, click Edit, and
then make the required modifications.
l Archive data manually. For details, see “Archiving data manually” on page 198.
After you assign categories, or tags or custom attributes to virtual machines and specify the
matching metadata, and the comparison of these values shows that the specified values
match, the corresponding policies are automatically assigned to the virtual machines
during the next virtual machine synchronization.
n Note HYCU performs the automatic synchronization of virtual machines every five
minutes. However, you can at any time update the list of virtual machines also manually
by clicking Synchronize in the Virtual Machines panel.
Considerations
l If you want a predefined policy to be automatically assigned to a virtual machine, when
specifying the values for the category, or the tag or the custom attribute and the
metadata, you can use the name of the policy (Gold, Silver, Bronze, or Exclude). Keep in
mind that if you use the Exclude value, the virtual machine will be excluded from the
backup.
l Assigning policies automatically does not affect virtual machines that already have a
policy assigned.
l If the default policy is set, it will be assigned to all newly discovered virtual machines
even if they have categories, or tags or custom attributes applied, which means that the
default policy takes precedence over automatic policy assignment. For details on setting
the default policy, see “Setting a default policy” on the next page.
l If the comparison of tags or custom attributes and metadata values returns multiple
match results, the policy with the lowest RPO is assigned to the virtual machine.
l For Nutanix ESXi clusters and vSphere environments: After you restore a virtual machine for
which you have set up automatic policy assignment, the tag or custom attribute value is
kept on the restored virtual machine only if the original tag or custom attribute still
exists in VMware vSphere.
Procedure
Depending on your data protection environment, you can set up automatic policy
assignment as follows:
68
3 Establishing a data protection environment
Data protection
Instructions
environment
Consideration
Setting a default policy for volume groups is disabled by default. However, you can at any
time enable it by setting the enable.default.policy.volume.group configuration setting
to true. For details on how to customize HYCU configuration settings, see “Customizing
HYCU configuration settings” on page 303.
Procedure
1. In the Policies panel, select the policy that you want to set as default, and then click
Set Default.
2. In the Set Default Policy dialog box that appears, do one of the following:
l Click Yes if you want to assign the default policy to all entities that do not have an
assigned policy (that is, existing and newly discovered ones).
l Click No if you want to assign the default policy only to newly discovered entities.
If you later decide not to use this policy as the default one, click Clear Default.
69
Chapter 4
Nutanix cluster virtual machine backup. You can view such volume groups and
their details in the Volume Groups panel together with all existing
volume groups residing on Nutanix clusters that have been added
to HYCU. For instructions on how to enable data protection for
volume groups independent of virtual machine protection, see
“Protecting volume groups” on page 148.
vSphere Virtual machine templates (virtual machines that are used as templates
environment to create other virtual machines)
The preparation steps and instructions for protecting virtual machines (including the HYCU
backup controller) and physical machines may differ.
For details on how to protect virtual machine data efficiently, see the following sections:
l “Planning virtual machine protection” below
l “Backing up virtual machines” on page 84
l “Restoring virtual machines” on page 86
l “Restoring individual files” on page 107
70
4 Protecting virtual machines
Limitations
l Only the backup of local fixed disks and Nutanix volume groups is supported. When
backing up a virtual machine with remote volumes (for example, iSCSI, disk arrays,
mapped network disks), such volumes are not included in the snapshot and are
consequently not backed up.
l For Linux virtual machines: Restoring files is possible only from file systems that are
permanently mounted. Therefore, make sure the required file systems are specified in
the /etc/fstab file before the backup is performed.
l For Nutanix clusters: Protecting the following types of virtual machines is not supported:
Nutanix Controller VMs, Prism Central VMs, Nutanix Files file server VMs, and Nutanix
Objects nodes. Therefore, such virtual machines are not shown in the Virtual Machines
panel. If you want to protect these types of virtual machines, contact your Nutanix Sales
representative.
71
4 Protecting virtual machines
Considerations
l In large or medium size data protection environments with virtual machines of larger
size (2–4 TiB), keep in mind, that the first backup of such virtual machines takes more
time and resources. Consider protecting these virtual machines in such a way that they
are not backed up simultaneously. You can assign a policy to a large virtual machine,
wait until it gets protected, and then continue with protecting other virtual machines.
l For vSphere environments: If something unexpected occurs during the backup of a virtual
machine template (for example, a network problem), the virtual machine template that
is converted to a virtual machine as part of the backup process will remain converted.
In this case, make sure to convert the virtual machine back to the virtual machine
template. For details on how to do this, see VMware documentation.
l For Nutanix clusters: Archiving is performed from a snapshot if the snapshot is available
on the original location (the cluster on which the original virtual machine is running or
the central site Nutanix cluster if you are using the Backup from replica option).
Otherwise, archiving is performed from the target.
l For Nutanix ESXi clusters: If the snapshot that HYCU used to perform a full backup is
missing on a Nutanix cluster (for example, because the HYCU protection domain was
deleted from Prism), the next virtual machine backup will be a full backup.
l For protection domains configured with NearSync: Although snapshots in a protection
domain are created in a 1–15 minute interval, HYCU uses only the snapshots that are
created on an hourly basis for backing up and restoring from snapshots. This applies to
the following environments:
o Nutanix ESXi clusters
o Nutanix clusters when using the Backup from replica option
l For Nutanix ESXi clusters: If a storage container of the Nutanix ESXi cluster is presented as
an NFS datastore to the VMware infrastructure, a full backup of a virtual disk on such a
storage container performed using a corresponding vSphere source will copy the entire
allocated disk, not only the used blocks.
l If you want the virtual machine details section in the Nutanix Prism web console and
vSphere (Web) Client to contain the information on which HYCU policy is assigned to a
virtual machine, in the HYCU config.properties file, set the
hycu.policy.description configuration setting to true. For details on how to
customize the HYCU configuration settings, see “Customizing HYCU configuration
settings” on page 303.
l For ROBO environments: The number of snapshots in the protection domain may be
72
4 Protecting virtual machines
higher than configured if HYCU uses these snapshots for backing up virtual machines
and volume groups.
Recommendations
l For ROBO environments: If a volume group is attached to several virtual machines that
you plan to back up and you want this volume group to be backed up as well, it is
recommended that it is attached only to the virtual machines inside the same Nutanix
protection domain. Therefore, having the same volume group attached to the virtual
machines inside the same Nutanix protection domain and at the same time to other
virtual machines is not recommended.
l For virtual machines in a ROBO environment: To ensure that applications on such virtual
machines are up and running after restoring the virtual machines, it is recommended
that application-consistent snapshots are created for them. For details on how to do
this, see Nutanix documentation.
l Only if you plan to restore a virtual machine to an environment with a different hypervisor.
Follow these recommendations:
o For restoring a virtual machine from a Nutanix ESXi cluster or from a vSphere
environment to a Nutanix AHV cluster: Follow these recommendations before backing
up your virtual machine to ensure that the virtual machine will start after the restore
(otherwise, you will need to perform additional manual steps as described in
“Restoring a virtual machine from a Nutanix ESXi cluster or a vSphere environment
to a Nutanix AHV cluster” on page 310):
n For Windows virtual machines: The Nutanix VirtIO package is installed on the
virtual machine.
n For Linux virtual machines on Nutanix ESXi clusters: NGT is installed on your virtual
machine.
n For Linux virtual machines in vSphere environments: The VirtIO drivers are added to
the guest OS kernel.
o For restoring a Linux virtual machine from a Nutanix AHV cluster to a vSphere
environment: Install Nutanix Guest Tools (NGT) on the virtual machine to ensure that
it starts properly after the restore.
73
4 Protecting virtual machines
HYCU backup controller. You can use, for example, Nutanix protection domains or
VMware vSphere Data Protection. For more information, see Nutanix or VMware
documentation.
Make sure to take a note of the configuration parameters of the target on which you plan to
store the HYCU backup controller backups. You can also take a note of the configuration
parameters of any target on which you plan to store the backups of virtual machines,
applications, file shares, and volume groups if you decide to recover them without
recovering the HYCU backup controller. You will need to provide the correct configuration
data when importing the target for disaster recovery.
l URL
Nutanix l User name
l Password
l Service endpoint
l Bucket name
Nutanix Objects l Access key ID
l Secret access key
l Path style access
l Target portal
l Target name
l User (if CHAP authentication is enabled)
iSCSI
l Target secret (if CHAP authentication is enabled)
l Perform mutual authentication (if CHAP authentication is
enabled)
l Service endpoint
l Bucket name
AWS S3/Compatible l Access key ID
l Secret access key
l Path style access
74
4 Protecting virtual machines
l Bucket name
Google Cloud
l Google Cloud service account
l User name
l Password (if used)
QStar NFS l Integral volume set name
l Web service endpoint
l Shared folder (if used)
Consideration
The RPO in the policy that is assigned to the HYCU backup controller should always be
lower than any RPO already set for other protected entities in the data protection
environment.
Prerequisites
l Access to the file system data is enabled. For instructions, see “Enabling access to data”
on page 78.
l Sufficient disk space is available for the index created by HYCU for data protection
purposes at the following location:
o Linux: /var/opt/hycu/hycuraw
o Windows: %programdata%\HYCU\hycuraw
l For Windows physical machines:
o The VSS service is enabled and running, and the VSS writer status is stable.
o WinRM is enabled and configured by using the winrm quickconfig command.
o For cloning a Windows physical machine to a Nutanix AHV cluster: Make sure the
Nutanix VirtIO package is installed on the physical machine before you back it up.
For detailed information about installing Nutanix VirtIO, see Nutanix
documentation.
75
4 Protecting virtual machines
o For cloning a Linux physical machine: The following drivers must be added to the
guest OS kernel:
n For cloning to a Nutanix AHV cluster: Nutanix VirtIO drivers (virtio_pci, virtio_blk,
virtio_scsi, virtio_net)
To add the drivers, run the following command as the root user:
n For cloning to a Nutanix ESXi cluster or a vSphere environment: VMware driver vmw_
pvscsi
To add the driver, run the following command as the root user:
Limitation
Protecting physical machines that use Virtual Data Optimizer (VDO) is not supported.
Consideration
For Linux physical machines: By default, HYCU uses LVM snapshots for data protection.
However, if you cannot provide the required space for LVM snapshot storage in each
volume, you can configure HYCU to use device mapper (DM) snapshots as an alternative.
For details, see “Enabling DM snapshots” on page 84.
76
4 Protecting virtual machines
Prerequisites
l For migration of virtual machines and applications to cloud: Configure your environment to
provide a successful cloud readiness check during the virtual and physical machine
backup:
o Access to the virtual machines through ssh or remote desktop connection is
enabled and a firewall is configured to allow a remote desktop or ssh connection
using a public network.
o For migration of Linux virtual machines:
n DHCP is enabled on the virtual machines that you want to migrate to cloud.
n Privileged access to the Linux system as root or by using the sudo command
without a password is required.
n The following Linux utilities are available: sudo, iptables, ip, and lsinitrd.
n The use of persistent network device names based on MAC addresses is
disabled. For details on how to do this, see your Linux distribution
documentation.
n The following drivers must be included in initramfs:
n Migration to Google Cloud: virtio drivers (virtio_net and virtio_scsi)
To add the drivers, on the virtual machine, run the following command as
the root user:
o For migration to Google Cloud: The Nutanix VirtIO package is installed on the virtual
machines that you plan to migrate.
You can view the cloud readiness check status in the backup job report.
l For migration of Linux virtual machines to and from cloud: In the /etc/fstab system
configuration file of the virtual machine, UUIDs (for example, UUID=8ff089c0-8e71-
4320-a8e9-dbab8f18a7e5) must be used instead of device names for file system device
identification.
l For migration of virtual machines from Azure to a Nutanix AHV cluster: The Nutanix VirtIO
package is installed on the virtual machines.
l For disaster recovery to cloud: Configure your environment to provide the Migration/DR-
ready status for the virtual machines. A virtual machine has the Migration/DR-ready
status if the following is true:
77
4 Protecting virtual machines
o All backups in the current backup chain are stored on one of the cloud targets
(Google Cloud or Azure).
o A successful cloud readiness check is performed during the virtual machine
backup.
You can check the Migration/DR-ready status of a virtual machine in the Virtual
Machines panel.
Limitations
l For migration of virtual machines from Google Cloud: You can migrate virtual machines
that use UEFI firmware only to a Nutanix AHV cluster or a vSphere environment.
Migrating such virtual machines to a Nutanix ESXi cluster is not supported.
l Migrating physical machines that use UEFI firmware to cloud is not supported.
Recommendation
For migration of virtual machines and applications to cloud:
l For Windows virtual machines: It is recommended to enable EMS console redirection for
troubleshooting purposes. Having it enabled allows you to gather more information in
the case a virtual machine does not boot after being migrated to cloud.
l For Linux virtual machines: It is recommended to enable serial console redirection for
troubleshooting purposes. Having it enabled allows you to configure the virtual
machine network in the case this is required after migration to cloud. A virtual machine
with serial console redirection enabled has the successful cloud readiness check status
even if the network is not working.
Considerations
l Your data is migrated to cloud as follows:
o If you are migrating data from a Nutanix cluster, the data is migrated from the
snapshot if the snapshot is available. Otherwise, it is migrated from the target.
o If you are migrating data from a vSphere environment, the data is always migrated
from the target.
l For Windows virtual machines: If the virtual machine has more than one disk, additional
disks are put offline during the migration by default. You can put the disks back online
manually after the migration or you can change the default setting before performing a
backup by running the following command in PowerShell:
78
4 Protecting virtual machines
Prerequisites
l A firewall must be configured to allow inbound network traffic through the required
TCP port.
l Only if the WinRM protocol over HTTPS will be used. HYCU must be configured to use
HTTPS for WinRM connections to virtual machines. For instructions, see “Enabling
HTTPS for WinRM connections” on page 260.
Limitation
Only if you use the SSH protocol with public key authentication. If keys are generated with
PuttyKeyGen or ssh-keygen using the legacy PEM format, only DSA and RSA keys are
supported.
Considerations
l For Windows virtual machines: When specifying a user name, make sure to use one of the
following formats:
o If the virtual machine is added to an Active Directory domain:
<Domain>\<Username> or <Username>@<Domain>
o If the virtual machine is not added to an Active Directory domain: <Username>,
.\<Username>, or <Hostname>\<Username> (in this case, <Hostname> is the value of
the COMPUTERNAME variable).
l For virtual machines that you plan to back up from their replicas in ROBO environments:
Make sure that the most recent replica reflects the state of the virtual machine.
Procedure
1. In the Virtual Machines panel, select the virtual machine to which you want to enable
access.
2. Click Credentials. The Credential Groups dialog box opens.
3. Click New.
79
4 Protecting virtual machines
Select this option if you want to use the SSH protocol, and then
do the following:
Select this option if you want to use the WinRM protocol, and
then do the following:
80
4 Protecting virtual machines
6. Click Save.
7. Click Assign.
The name of the assigned credential group appears in the Credential group column of the
Virtual Machines panel. HYCU performs virtual machine and application discovery after you
assign the credentials to the virtual machines and the Discovery status in the Virtual
Machines and Applications panels is updated accordingly.
t Tip If several virtual machines share the same user name and password, you can
use multiple selection to assign the same credential group to them.
To unassign a credential group from a virtual machine, in the Virtual Machines panel, select
the virtual machine, click Credentials, and then click Unassign.
You can also edit any of the existing credential groups (select a credential group, click
Edit, and then make the required modifications) or delete the ones that you do not
need anymore (select a credential group, and then click Delete).
You can set the backup configuration options on the selected virtual machine for the
following purposes:
81
4 Protecting virtual machines
Prerequisites
l Access to the virtual machine file system is enabled. For instructions, see “Enabling
access to data” on page 78.
l A script is available in the accessible folder and has one of the following extensions:
o Windows: bat, ps1, cmd
o Linux: sh
l For Linux: You have permissions to run a script on the virtual machine with the assigned
credentials.
Procedure
1. In the Virtual Machines panel, select the virtual machine on which you want to specify
pre/post scripts, and then select Configuration. The Configuration dialog box opens.
2. In the Pre/post scripts tab, use the switches of your choice to specify the pre/post-
snapshot and pre/post-backup scripts, and then enter the script path names. Enable
one or more switches:
l Run pre-backup script
l Run pre-snapshot script
l Run post-snapshot script
l Run post-backup script
n Note In the script path name field, a sample path name is displayed. Make sure
to enter the valid script path name.
3. Click Save.
82
4 Protecting virtual machines
Prerequisite
You are an owner of the virtual machine whose disks you want to exclude from or include
in the backup. For instructions on how to set ownership of a virtual machine, see “Setting
ownership of virtual machines” on page 209.
Limitations
l Only if you plan to restore individual files. If you exclude all virtual machine disks from the
backup and leave only the volume groups attached to the virtual machine, you will not
be able to restore individual files.
l For SQL Server: Excluding or including disks in the backup is not supported if the
Optimized SQL Server HADR protection option is enabled.
l For Exchange Server: Excluding or including disks in the backup is not supported if the
Optimized Exchange Server DAG protection option is enabled.
Considerations
l The next backup after changing the virtual machine backup scope will be a full backup.
l Excluding disks with protected applications may affect application protection.
l If any disks are excluded from the backup (manually or automatically), the virtual
machine will be restored or migrated to cloud without such disks or with blank disks if
you select the option to create excluded disks as blank. The corresponding restore
point labels are marked with a red circle. For details, see “Viewing entity details” on
page 176.
l For vSphere virtual machines: If independent and/or RDM disks are attached to the virtual
machine, they are excluded from the backup automatically. Keep in mind that the
option to create excluded disks as blank when restoring data or migrating data to cloud
is available only for independent disks and not for RDM disks.
l For physical machines with dynamic disks: Dynamic disks are automatically excluded from
the backup.
Procedure
1. In the Virtual Machines panel, select the virtual machine whose disks and volume
groups you want to exclude from or include in the backup, and then select
Configuration. The Configuration dialog box opens.
2. In the Exclude/Include tab, depending on whether you want to exclude or include disks
and volume groups in the backup, do one of the following:
83
4 Protecting virtual machines
b. Click Save.
You can later make changes to the selection of the excluded or included disks.
Enabling DM snapshots
By default, HYCU uses LVM snapshots for Linux physical machine data protection. However,
you can also configure a Linux physical machine to be backed up by using DM snapshots.
Considerations
l Although you can configure HYCU to use DM snapshots for data protection, DM
volumes are not supported. For details on supported volumes, see the HYCU
Compatibility Matrix.
l For snapshot storage, you can specify a directory that is hosted on any volume that is
excluded from the backup, or on an NFS share.
l Only if you plan to use an NFS share for snapshot storage. Make sure the connection to the
NFS server has low latency and high throughput (10 GiBps or higher) to avoid system
performance issues.
Procedure
1. In the Virtual Machines panel, select the virtual machine that you want to back up by
using DM snapshots, and then select Configuration. The Configuration dialog box
opens.
2. In the Snapshots tab, use the Enable DM snapshots switch, and then specify the path
to the directory that you want to use for snapshot storage (for example,
/mnt/nfs/snapshotdir).
3. Click Save.
n Note The procedure for backing up virtual machine templates is the same as for
84
4 Protecting virtual machines
virtual machines. Therefore, you can follow the same instructions as for backing up
virtual machines.
Prerequisite
Only if you plan to protect physical machines or volume groups that are attached to a virtual
machine by using iSCSI. Credentials are assigned to physical machines that you want to
protect or to virtual machines whose volume groups you want to protect. For instructions,
see “Enabling access to data” on page 78.
Procedure
1. In the Virtual Machines panel, select the virtual machines that you want to back up.
t Tip You can update the list of virtual machines by clicking Synchronize. To
narrow down the list of displayed virtual machines, you can use the filtering options
described in “Filtering data” on page 179.
n Note When you assign the policy to the selected virtual machines, the same
policy is also assigned to the applications running on them if these applications
already have an assigned policy. In this case, the policy assigned to the virtual
85
4 Protecting virtual machines
machines takes precedence over the policy assigned to the applications and is
automatically assigned to the applications.
The backup is scheduled according to the values that you defined for your policy. If
required, you can also perform a manual backup at any time. For details, see “Performing a
manual backup” on page 192.
n Note For vSphere environments: The procedure for restoring virtual machine
templates is the same as for virtual machines. Therefore, you can follow the same
instructions as for restoring virtual machines.
Prerequisites
l For restoring data from tape: If the tape target is being actively used for archiving data, its
mode should be set to Read Only. For details on how to edit a target, see “Managing
targets” on page 186.
l For vSphere environments: You have the required restore privileges assigned. For details,
see “Assigning privileges to a vSphere user” on page 271.
l If you are restoring a virtual machine to the same source and you want the existing ISO
image to be attached to the restored virtual machine, make sure the ISO image that was
attached to the virtual machine at backup time still exists on the source at virtual
machine restore time and its name and location are the same.
l For physical machines: At least one Nutanix cluster or vCenter Server is added to HYCU to
provide a storage container for storing the restore data. For details on how to add a
Nutanix cluster to HYCU, see “Adding a Nutanix cluster” on page 31. For details on how
to add a vCenter Server to HYCU, see “Adding a vCenter Server” on page 33.
Limitation
If you are restoring a virtual machine from one source to another, the ISO image that was
attached to the virtual machine at backup time will not be attached to the restored virtual
machine.
Consideration
You cannot perform a restore of a virtual machine whose retention period specified in the
policy has been exceeded (such restore points are grayed out in the HYCU web user
interface). However, if required, this can be overridden by setting the
restore.enabled.if.retention.is.up configuration setting in the HYCU
86
4 Protecting virtual machines
config.properties file to true. For details on how to customize the HYCU configuration
settings, see “Customizing HYCU configuration settings” on page 303.
Restore options
You can select among the following restore options:
Enables you to restore virtual disks. Select this option if you want
to replace the original virtual disks with the restored ones. For
n Note By using the Clone VM option, you can also restore a virtual machine to an
87
4 Protecting virtual machines
Limitations
l For Nutanix AHV clusters: You can restore virtual machines for which UEFI boot mode is
enabled only to a Nutanix AHV cluster that supports UEFI boot configuration.
l Restoring physical machines by using the Restore VM option is not supported.
Considerations
l A restore is performed from the snapshot only if the snapshot is available on the
original location (the source where the original virtual machine was running).
Otherwise, a restore is performed from the target.
l Only if volume groups are attached to the virtual machine that you are restoring. You can
choose to restore the volume groups together with the virtual machine if they were
attached to it at backup time. In this case, the original volume groups are deleted and
the restored ones are automatically attached to the restored virtual machine as well as
all other virtual machines to which they were attached at backup time.
l The restored virtual machine retains the original MAC address.
l Only if you plan to restore vSphere virtual machine data to the original storage container. If
the storage container is mounted to several hosts and the original host is powered off
or in maintenance mode at restore time, data will be restored to the same storage
container on a different host.
Procedure
1. In the Virtual Machines panel, click the virtual machine that you want to restore. The
Detail view appears at the bottom of the screen.
n Note The Detail view appears only if you click a virtual machine. Selecting the
check box before the name of the virtual machine will not open the Detail view.
88
4 Protecting virtual machines
b. Use the Use original VM configuration switch if you want the restored virtual
machine to have the same configuration settings as the original virtual machine.
If you want to change any of the configuration settings, disable the Use original
VM configuration switch, and then do the following:
l In the vCPU(s) field, enter the number of virtual CPUs for the restored virtual
machine. The maximum number of virtual CPUs is 1024.
l In the Cores per vCPU field, enter the number of cores per virtual CPU for the
restored virtual machine. The maximum number of cores per virtual CPU is 64.
n Note The total number of cores of the restored virtual machine will be
the number of virtual CPUs multiplied by the number of cores per virtual
CPU.
l In the Memory field, set the amount of memory (in GiB or MiB) for the restored
virtual machine. The value that you specify must be a whole number and
cannot be greater than 4096 GiB.
c. Use the Power virtual machine on switch if you want to turn the restored virtual
machine on after the restore. The original virtual machine will be deleted
automatically.
d. From the Restore from drop-down menu, select which tier you want to use for the
restore. Your restore point can contain one or more tiers among which you can
select:
l Automatic: Ensures the fastest restore to the latest state.
l Backup
l Copy
l Archive
l Snapshot
e. Only if virtual disks have been excluded from the backup (manually or automatically): Use
the Create excluded disks as blank switch if you want blank disks of the same
89
4 Protecting virtual machines
size and configuration as the excluded ones to be created and attached to the
restored virtual machine.
f. For volume groups attached to the virtual machine: Use the Restore volume groups
switch if you want to restore also the volume groups that are attached to the virtual
machine.
6. In the Network section, review the list of network adapters that were added to the
virtual machine at backup time (including the networks to which the virtual machine
was connected). If any of the original networks is no longer available, N/A is shown.
Depending on whether the original networks are available, proceed as follows:
l If the original networks are available, you can leave the default values and restore
the virtual machine with the original network settings, or you can modify the
network settings.
l If the original networks are not available, you must modify the network settings.
n Note You can restore the virtual machine without a network adapter. Make
sure to configure the network settings on the virtual machine afterward.
7. Click Restore.
90
4 Protecting virtual machines
n Note For Nutanix ESXi clusters: Because the minimum RAM required for restoring a
virtual machine is 256 MiB, any virtual machine with less RAM is automatically set to 256
MiB during the restore.
Prerequisites
l For virtual machines that you plan to clone to a new location: A Nutanix cluster or a vCenter
Server for a vSphere environment to which you plan to clone the virtual machine is
added to HYCU. For details on how to do this, see “Adding a Nutanix cluster” on page 31
or “Adding a vCenter Server” on page 33.
l For Linux physical machines: In the /etc/fstab system configuration file of the physical
machine, UUIDs (for example, UUID=8ff089c0-8e71-4320-a8e9-dbab8f18a7e5) must
be used instead of device names for file system device identification.
Limitations
l For vSphere environments: Attaching the ISO image to the restored virtual machine is not
supported.
l Cloning physical machines that use UEFI firmware is not supported.
Considerations
l A restore is performed from the snapshot only if the snapshot is available on the
original location (the source where the original virtual machine was running).
Otherwise, a restore is performed from the target.
l Only if volume groups are attached to the virtual machine that you are cloning. You can
choose to restore the volume groups together with the virtual machine if they were
attached to it at backup time. In this case, the original volume groups are kept
alongside of the restored ones. If the volume groups are also attached to other virtual
machines, the following applies (depending on how they are attached to the virtual
machines):
o Directly: Volume groups are automatically attached only to the cloned virtual
machine.
o By using iSCSI: Volume groups are automatically attached to all virtual machines to
which they were attached at backup time.
l For restoring a virtual machine running on a Nutanix AHV cluster to a Nutanix ESXi cluster: If
virtual machine disks are attached to the PCI bus, the bus type will be automatically
changed to SCSI after the restore. Because of this configuration change, the restore
finishes with a warning.
l For Linux virtual machines running on a Nutanix ESXi cluster: If after restoring a virtual
91
4 Protecting virtual machines
machine that was created through the vSphere (Web) Client, the virtual machine does
not boot, follow the steps described in “Restoring a virtual machine from a vSphere
environment to a Nutanix ESXi cluster” on page 313.
l After you restore a virtual machine, it might happen that the order of virtual disks differs
from the one on the original virtual machine if you performed the restore:
o From a Nutanix AHV cluster to a Nutanix ESXi cluster or a vSphere environment
o From a Nutanix ESXi to another Nutanix ESXi cluster
o From a vSphere environment to a Nutanix ESXi cluster
In this case, make the necessary adjustments, including the selection of the correct
boot disk.
l Only if you plan to restore vSphere virtual machine data to the original storage container. If
the storage container is mounted to several hosts and the original host is powered off
or in maintenance mode at restore time, data will be restored to the same storage
container on a different host.
Recommendation
For Linux virtual machines: It is recommended that the use of persistent network device
names based on MAC addresses is disabled. Otherwise, you will have to configure the
network manually. For details on how to disable the use of persistent network device
names, see your Linux distribution documentation.
Procedure
1. In the Virtual Machines panel, click the virtual machine that you want to restore. The
Detail view appears at the bottom of the screen.
n Note The Detail view appears only if you click a virtual machine. Selecting the
check box before the name of the virtual machine will not open the Detail view.
92
4 Protecting virtual machines
b. In the New VM name field, specify a new name for the virtual machine.
c. Use the Use original VM configuration switch if you want the restored virtual
machine to have the same configuration settings as the original virtual machine.
If you want to change any of the configuration settings, disable the Use original
VM configuration switch, and then do the following:
l In the vCPU(s) field, enter the number of virtual CPUs for the restored virtual
machine. The maximum number of virtual CPUs is 1024.
l In the Cores per vCPU field, enter the number of cores per virtual CPU for the
restored virtual machine. The maximum number of cores per virtual CPU is 64.
n Note The total number of cores of the restored virtual machine will be
the number of virtual CPUs multiplied by the number of cores per virtual
CPU.
l In the Memory field, set the amount of memory (in GiB or MiB) for the restored
virtual machine. The value that you specify must be a whole number and
cannot be greater than 4096 GiB.
d. Use the Power virtual machine on switch if you want to turn the restored virtual
machine on after the restore. If you turn the restored virtual machine on, the
original virtual machine will be turned off automatically.
e. From the Restore from drop-down menu, select which tier you want to use for the
restore. Your restore point can contain one or more tiers among which you can
select:
l Automatic: Ensures the fastest restore to the latest state.
l Backup
l Copy
93
4 Protecting virtual machines
l Archive
l Snapshot
f. Only if virtual disks have been excluded from the backup (manually or automatically): Use
the Create excluded disks as blank switch if you want blank disks of the same
size and configuration as the excluded ones to be created and attached to the
restored virtual machine.
g. For volume groups attached to the virtual machine: Use the Clone volume groups
switch if you want to restore also the volume groups that are attached to the virtual
machine.
6. In the Network section, do the following:
a. Review the list of network adapters that were added to the virtual machine at
backup time (including the networks to which the virtual machine was connected).
If any of the original networks is no longer available, N/A is shown.
Depending on whether the original networks are available, proceed as follows:
l If the original networks are available, you can leave the default values and clone
the virtual machine with the original network settings, or you can modify the
network settings.
l If the original networks are not available, you must modify the network settings.
94
4 Protecting virtual machines
Original
Instructions
networks are...
n Note You can clone the virtual machine without a network adapter. Make
sure to configure the network settings on the virtual machine afterward.
b. Only if you are restoring the virtual machine to a different Nutanix cluster or vSphere
environment. Use the Keep original MAC address switch if you want the restored
virtual machine to keep the original MAC address. Keep in mind that this is
applicable only if at least one network adapter has a MAC address assigned.
7. Click Restore.
95
4 Protecting virtual machines
configuration after the restore. For details on how to do this, see “Updating the
boot configuration of Linux physical machines” below.
n Only if you cloned the physical machine to a Nutanix ESXi cluster. Make sure to
change the storage controller on the cloned virtual machine to VMware
Paravirtual SCSI. For details, see VMware documentation.
Procedure
1. In the /etc/default/grub system configuration file, do the following:
a. Edit the GRUB_CMDLINE_LINUX option and remove the following kernel parameters
(if present):
l rd.lvm. (except rd.lvm=0)
l rd.md. (except rd.md=0)
l rd.dm. (except rd.dm=0)
l rd.luks.
b. Set the resume device on the cloned physical machine to match the resume device
UUID on the original physical machine. For example, if the resume device on the
original physical machine is resume=/dev/mapper/cl-swap, the resume device on
the cloned physical machine should be resume=UUID=4044243b-612b-42bc-ba22-
4736c4eadde6.
2. Optional. If you want to speed up the boot process by skipping mounting non-existent
volumes, do the following:
In the /etc/fstab system configuration file, comment all the lines for volumes for
which a warning was triggered at backup time.
Example
The following is an example of the warning message:
In this example, comment the line that contains the /test_mount mountpoint in the
/etc/fstab system configuration file.
grub2-mkconfig -o /boot/grub2/grub.cfg
4. Install the GRUB boot loader on the boot disk by running the following command:
grub2-install /dev/sdc
t Tip The boot disk is the one that contains the boot partition. To identify the
boot partition, run the following command:
96
4 Protecting virtual machines
n Note You can also set up a validation policy and schedule the backup validation
according to the values that you define in your validation policy. For details on how to
do this, see “Setting up a validation policy” on page 192.
Prerequisites
l If you are cloning the virtual machine to a vSphere environment, the latest version of
VMware Tools must be installed on the virtual machine.
l Only if you plan to specify the Advanced validation type.
o Credentials must be assigned to the virtual machine. For prerequisites, limitations,
considerations, and instructions, see “Enabling access to application data” on
page 113.
o A network card must be added to the virtual machine.
Limitation
Performing the backup validation for the HYCU backup controller is not supported.
Considerations
l Network conflicts may occur during the backup validation if the virtual machine is
configured with a static IP address, resulting in unreliable backup validation data.
l Only if you plan to specify the Advanced validation type when performing the backup
validation for a Windows virtual machine. Checking for disk errors may fail in some cases,
which does not mean that your virtual machine is corrupted. However, it is highly
recommended that you check the status of such a virtual machine manually.
l After you perform the backup validation, consider the following:
o You can view the backup validation status of a virtual machine in the Validation
column in the Virtual Machines panel (represented by an icon). By pausing on the
icon, you can also see which validation policy is assigned to the virtual machine, if
you have set it up. For details on setting up a validation policy, see “Setting up a
validation policy” on page 192.
o The Exclude policy is automatically assigned to the cloned virtual machine.
97
4 Protecting virtual machines
Procedure
1. In the Virtual Machines panel, click the virtual machine for which you want to perform
the backup validation. The Detail view appears at the bottom of the screen.
n Note The Detail view appears only if you click a virtual machine. Selecting the
check box before the name of the virtual machine will not open the Detail view.
n Note If you select Automatic, the tier for the backup validation is by default
selected in the following priority order: Backup > Copy > Archive > Snapshot. This
means that HYCU will always use the first available tier in the specified order for the
backup validation. However, you can at any time change this default behavior by
customizing the backup.validation.restore.source.priority.order
configuration setting in the HYCU config.properties file and adjusting the tier
order to your data protection needs. For details on how to customize HYCU
configuration settings, see “Customizing HYCU configuration settings” on page 303.
7. In the New VM name field, specify a name for the cloned virtual machine.
8. Use the Use original VM configuration switch if you want the cloned virtual machine
to have the same configuration settings as the original virtual machine.
If you want to change any of the configuration settings, disable the Use original VM
configuration switch, and then do the following:
l In the vCPU(s) field, enter the number of virtual CPUs for the cloned virtual
machine. The maximum number of virtual CPUs is 1024.
l In the Cores per vCPU field, enter the number of cores per virtual CPU for the
cloned virtual machine. The maximum number of cores per virtual CPU is 64.
n Note The total number of cores of the cloned virtual machine will be the
number of virtual CPUs multiplied by the number of cores per virtual CPU.
98
4 Protecting virtual machines
l In the Memory field, set the amount of memory (in GiB or MiB) for the cloned virtual
machine. The value that you specify must be a whole number and cannot be
greater than 4096 GiB.
9. From the Keep VM after validation drop-down menu, depending on whether you want
to keep the virtual machine after the backup validation is performed, select one of the
following options:
Option Description
On validation The virtual machine will be kept after the backup validation is
error performed only if a validation error occurs during the validation.
10. From the Validation type drop-down menu, select one of the following types:
Validation
Description
type
11. Only if you selected the Advanced validation type. Do the following:
a. Enable the Run custom script switch if you want the custom script to be run on the
virtual machine as part of the backup validation process, and then make sure that
the proper path to the script is specified.
n Note The script returns an exit code of 0 for success and any other value
for failure.
b. In the Network section, review the list of network adapters that were added to the
virtual machine at backup time (including the networks to which the virtual
99
4 Protecting virtual machines
machine was connected). If any of the original networks is no longer available, N/A
is shown.
Depending on whether the original networks are available, proceed as follows:
l If the original networks are available, you can leave the default values and clone
the virtual machine with the original network settings, or you can modify the
network settings.
l If the original networks are not available, you must modify the network settings.
Limitation
Restoring physical machine disks by using the Restore vDisks option is not supported.
100
4 Protecting virtual machines
Considerations
l If any virtual disks were excluded from the backup, you cannot select them for the
restore. The corresponding restore point labels are marked with a red circle. For details,
see “Viewing entity details” on page 176.
l The original virtual disks are deleted and the restored ones are automatically attached
to all virtual machines to which they were attached at backup time.
l Only if restoring volume groups attached to the virtual machine. The virtual machines to
which the volume groups are attached must be turned off.
Procedure
1. In the Virtual Machines panel, click the virtual machine whose virtual disks you want to
restore.
2. In the Detail view that appears at the bottom of the screen, select the desired restore
point.
n Note The Detail view appears only if you click a virtual machine. Selecting the
check box before the name of the virtual machine will not open the Detail view.
i Important Only if restoring volume groups attached to the virtual machine. You
cannot select individual disks, but only the whole volume group.
6. From the Storage container drop-down menu, select where you want to restore the
virtual disks.
7. From the Restore from drop-down menu, select which tier you want to use for the
restore. Your restore point can contain one or more tiers among which you can select:
l Automatic: This type of restore ensures the fastest restore to the latest state.
l Backup
l Copy
l Archive
l Snapshot (Nutanix clusters only)
8. Click Restore.
101
4 Protecting virtual machines
Limitation
Restoring vSphere virtual machine disks by using the Clone vDisks option is not supported.
Considerations
l If any virtual disks are excluded from backup, you cannot select them for restore. The
corresponding restore point labels are marked with a red circle. For details, see
“Viewing entity details” on page 176.
l Only if restoring volume groups attached to the virtual machine. The original volume groups
are kept alongside of the restored ones and the following applies regarding their
attachment:
o If you are restoring the volume groups to the original virtual machine, they are
attached to all the virtual machines to which they were attached at backup time.
o If you are restoring the volume groups to a virtual machine other than original
running on a Nutanix AHV cluster, they are attached only to the selected virtual
machine. If you are restoring the volume groups to a virtual machine other than
original running on a Nutanix ESXi cluster, you must attach them manually after the
restore.
The name format of the cloned volume groups is as follows:
<OriginalVGName>-<Timestamp>
Procedure
1. In the Virtual Machines panel, click the virtual machine whose virtual disks you want to
restore.
2. In the Detail view that appears at the bottom of the screen, select the desired restore
point.
n Note The Detail view appears only if you click a virtual machine. Selecting the
102
4 Protecting virtual machines
check box before the name of the virtual machine will not open the Detail view.
i Important Only if restoring volume groups attached to the virtual machine. You
cannot select individual disks, but only the whole volume group.
6. From the VM drop-down menu, select the virtual machine to which you want to attach
the restored virtual disks. The restored virtual disks can be attached to the original
virtual machine (the default selection) or any other virtual machine. Consider the
following:
l If you are attaching the virtual disks to the original virtual machine, make sure it is
turned on.
l You cannot attach the restored disks to a physical machine.
7. From the Storage container drop-down menu, select where you want to restore the
virtual disks.
n Note For virtual machines: You can select only among the storage containers
that are created on the Nutanix cluster on which the selected virtual machine
resides.
8. From the Restore from drop-down menu, select which tier you want to use for the
restore. Your restore point can contain one or more tiers among which you can select:
l Automatic: This type of restore ensures the fastest restore to the latest state.
l Backup
l Copy
l Archive
l Snapshot (Nutanix clusters only)
9. Click Restore.
Prerequisite
For restoring virtual disks to an SMB share: The SMB server is configured to stop creating
sparse files (the strict allocate parameter is set to yes in the smb.conf file).
103
4 Protecting virtual machines
Considerations
l A restore is performed from the snapshot only if the snapshot is available on the
original location (the source where the original virtual machine was running).
Otherwise, a restore is performed from the target.
l If any virtual disks were excluded from the backup, you cannot select them for the
restore. The corresponding restore point labels are marked with a red circle. For details,
see “Viewing entity details” on page 176.
Procedure
1. In the Virtual Machines panel, click the virtual machine whose virtual disks you want to
restore.
2. In the Detail view that appears at the bottom of the screen, select the desired restore
point.
n Note The Detail view appears only if you click a virtual machine. Selecting the
check box before the name of the virtual machine will not open the Detail view.
i Important During the restore of virtual disks, you cannot perform additional
restores or expire backups for this virtual machine.
5. From the list of virtual disks that are available for a restore, select the ones that you
want to restore, and then click Next.
6. From the Type drop-down menu, select where you want to restore the virtual disks,
and then provide the required information:
l SMB
a. Optional. Enter the domain and user credentials.
b. Enter the SMB server name or IP address and the path to the SMB shared folder
from the root of the server (for example, /backups/HYCU).
l NFS
Enter the NFS server name or IP address and the path to the NFS shared folder
from the root of the server (for example, /backups/HYCU).
7. From the Restore from drop-down menu, select which tier you want to use for the
restore. Your restore point can contain one or more tiers among which you can select:
l Automatic: This type of restore ensures the fastest restore to the latest state.
l Backup
l Copy
104
4 Protecting virtual machines
l Archive
l Snapshot (Nutanix clusters only)
8. Click Restore.
/<SharedPath>/<VMName>/<Timestamp>/<Filename>
In this instance, <SharedPath> is the path to the shared folder, <VMName> is the virtual
machine name, <Timestamp> is the time of the restore, and <Filename>is the virtual
machine disk UUID.
What kind of files are created by the restore depends on the environment in which the
virtual machine whose virtual disks you restored was backed up. Depending on the type of
hypervisor in your environment, the following files are created for each selected disk:
Hypervisor Files
Nutanix ESXi A raw image of the disk, including unallocated space as zeroes
l <DiskName>-flat.vmdk
A raw image of the disk
vSphere l <DiskName>.vmdk
A VMDK descriptor file, referencing <DiskName>-
flat.vmdk
Prerequisites
l The physical machine to which you want to restore data must have the same number
of disks as the original machine and the disk size must be equal to or greater than the
original size.
l You have downloaded a Linux live CD (for example, Ubuntu) and booted it on the
physical machine where you want to restore your data.
Considerations
l Make sure you run all the commands as root.
l You can safely ignore the following error message:
105
4 Protecting virtual machines
The backup GPT table is corrupt, but the primary appears OK, so that will
be used.
Procedure
1. Identify your destination disk.
Because HYCU performs the backup at the disk level, you must identify the path of each
disk to which you will restore data. To list all the disks on your system, run the following
command:
fdisk -l
cd /<SharedPath>/<VMName>/<Timestamp>
ls
fdisk –l <ExportedDiskName>
For example:
fdisk –l PhysicalDisk0
The information about the exported disk (for example, disk size and a list of partitions)
is displayed. Use this information to identify a suitable destination disk for restoring the
data. For example, the size of exported disk PhysicalDisk0 matches the size of disk
/dev/sda. Therefore, disk PhysicalDisk0 can be restored to disk /dev/sda.
106
4 Protecting virtual machines
For example:
Individual files can be restored from a target or a snapshot. A restore is always performed
from the snapshot if the snapshot is available for the selected restore point (this speeds up
the restore process). Otherwise, the restore is performed from the target (this saves space
in your environment). If you want to restore individual files from a snapshot and no
snapshot is available for the selected virtual machine restore point, HYCU enables you to
manually recreate it. For details on how to do this, see “Recreating snapshots” on page 199.
You can use the pre-restore and post-restore scripts to perform necessary actions before
and after the restore of individual files is performed. For details on how to specify the
scripts, follow the procedure described in this section. For details on exit codes and
exported environment variables, see “Using the pre and post scripts” on page 274.
Prerequisites
107
4 Protecting virtual machines
l If the tape target is being actively used for archiving data, its mode
Only if restoring
should be set to Read Only. For details on how to edit a target, see
data from tape
“Managing targets” on page 186.
108
4 Protecting virtual machines
Limitations
l Restoring individual files on dual-boot systems is not supported.
l On Linux, you can restore symbolic links and soft links only to the original location.
l Restoring files from the same snapshot simultaneously by two different users is not
possible.
l For restoring files to a different virtual machine: You can restore files only to a virtual
machine that belongs to the same operating system family as the original one.
l For restoring files to a local machine: You can download only a data archive whose size is
less than or equal to 2 GiB.
l You cannot restore individual files if you excluded all virtual machine disks from the
backup and left only the attached volume groups.
l For Windows virtual machines running on a Nutanix cluster that have Storage Replica enabled:
Restoring individual files to a virtual machine is supported only if the restore is
performed from the target.
Considerations
l You cannot perform a restore of a virtual machine whose retention period specified in
the policy has been exceeded (such restore points are grayed out in the HYCU web user
interface). However, if required, this can be overridden by setting the
restore.enabled.if.retention.is.up configuration setting in the HYCU
config.properties file to true. For details on how to customize the HYCU
configuration settings, see “Customizing HYCU configuration settings” on page 303.
l For restoring files to a virtual machine: To be able to restore some types of files (for
example, system files), the account you specify to access a virtual machine must be a
member of the virtual machine's local Administrators group on Windows or have root
permissions on Linux.
l If any virtual disks are excluded from backup, you cannot select them for restore. The
corresponding restore point labels are marked with a red circle. For details, see
“Viewing entity details” on page 176.
l For using the Backup from replica option: When restoring to the central or remote site (the
original location), the restore is always performed from the snapshot on the central site.
l For pre/post-restore scripts: You can specify pre/post-restore scripts only when restoring
files to a virtual machine.
Recommendation
Only if restoring a large number of files. Instead of restoring individual files, it is highly
recommended to restore disks hosting these files by using the Clone vDisks option. For
instructions, see “Cloning virtual disks” on page 102.
109
4 Protecting virtual machines
Procedure
1. In the Virtual Machines panel, click the virtual machine that contains the files that you
want to restore to open the Detail view.
n Note The Detail view appears only if you click a virtual machine. Selecting the
check box before the name of the virtual machine will not open the Detail view.
2. In the Detail view that appears at the bottom of the screen, select the desired restore
point.
3. Click Restore Files. The Restore Files dialog box opens.
4. From the Restore from drop-down menu, select which tier you want to use for the
restore. Your restore point can contain one or more tiers among which you can select:
l Automatic: Ensures the fastest restore to the latest state.
l Backup
l Copy
l Archive
l Snapshot
5. Click Next.
6. From the list of available files, select the ones that you want to restore, and then click
Next.
t Tip If there are too many files to be displayed on one page, you can move
between the pages by clicking and .
You can also search for a file or a folder by entering its name and then pressing
Enter in the Search field.
7. Depending on where you want to restore the selected files (to the same or a different
virtual machine, an external SMB or NFS share, or the local machine), select the
preferred restore option, click Next, and then follow the instructions:
C:\<Path>
110
4 Protecting virtual machines
c. Click Save.
d. Click Restore.
a. Select NFS or SMB for the share type, and then specify the
path to a shared folder in the following format:
\\server\<Path>
111
4 Protecting virtual machines
112
Chapter 5
Protecting applications
HYCU enables you to protect your application data with fast and reliable backup and
restore operations. After you enable HYCU to access an application running on a virtual
machine, complete the required preparatory steps, and back up the application, you can
choose to restore either the whole application or only specific application items.
When the application discovery job completes, the discovered applications are listed in the
Applications panel. HYCU supports different types of applications on virtual and physical
machines. For a list of supported applications, see the HYCU Compatibility Matrix.
Depending on the Discovery status of the applications that you want to protect, do one of
the following:
HYCU can access the discovered applications that you want to protect with the
virtual machine credentials and you can start protecting such applications. For
instructions, see “Backing up applications” on page 121.
n Note Access to Active Directory and SAP HANA is always granted with
113
5 Protecting applications
The virtual machine credentials do not have proper permissions and HYCU
cannot access applications. To enable HYCU to access applications, do one of
the following:
l If you want to use virtual machine credentials, reassign credentials to virtual
machines so that they have proper permissions. For instructions on how to
assign credentials to a virtual machine, see “Enabling access to data” on
page 78.
l If you want to use application-specific credentials, follow the procedure
described in this section.
Prerequisites
VMware Tools and NGT are installed on the client virtual machine.
Nutanix ESXi For detailed information about installing VMware Tools, see VMware
clusters documentation. For detailed information about installing NGT, see
Nutanix documentation.
Application-specific prerequisites
l The OS user must have sudo privileges and the NOPASSWD option
Oracle
set.
114
5 Protecting applications
Consideration
For an Oracle application: When an operating system is used to authenticate Oracle database
users, the Oracle database can be accessed with the OS user credentials, which allows you
to skip the procedure of providing access to application data. To enable such
authentication mode, contact the Oracle database administrator.
Procedure
1. In the Applications panel, select the applications that you want to protect.
2. Click Configuration. The Configuration dialog box opens.
3. Depending on the credentials that you want to use, do one of the following:
l If you want to use virtual machine credentials, click Save.
l If you want to use the application-specific credentials, do the following:
a. Disable the Use VM credentials with access to the application switch.
b. Enter credentials for a user account with required permissions and access to
the applications. Make sure the following requirements are met:
o For applications running on Windows virtual machines: The specified account
must be a member of the virtual machine's local Administrators group.
o For SQL Server: The specified account must have the sysadmin role on the
SQL Server application instance. The SQL Server account that connects by
using SQL Server Authentication is not supported.
o For Exchange Server: The specified account must be a member of the
Organization Management role group and have the default permissions
enabled.
c. Click Save.
A new process of application discovery is started with the modified credentials for all virtual
machines that have these credentials assigned. After this is done, the status of your
applications should be and you can continue with protecting application data as
described in “Backing up applications” on page 121.
You can later unassign the credentials from a virtual machine by clicking Unassign or delete
the virtual machine credentials that you do not need anymore by clicking Delete.
i Important You can unassign or delete credentials from a virtual machine only if
the discovered applications running on it do not have assigned policies or available
restore points. Therefore, before unassigning or deleting credentials, make sure to
unassign policies or mark restore points as expired.
115
5 Protecting applications
Prerequisites
l For vSphere environments: VMware Tools of the latest version is installed on virtual
machines on which the applications you want to protect are running.
l For Linux virtual machines with the installed NGT: The following scripts are available on the
system, are owned by root, and have permissions set to 0700: /usr/local/sbin/pre_
freeze and /usr/local/sbin/post_thaw.
l For HYCU Protégé: Make sure all the prerequisites for migrating virtual machines and
applications to cloud listed in “HYCU Protégé specifics” on page 76 are fulfilled.
l For physical machines:
o For Windows:
n The VSS service is enabled and running, and the VSS writer status is stable.
n WinRM is enabled and configured by using the winrm quickconfig command.
o For Linux: Access to the physical machine through SSH is enabled.
l For archiving data to a QStar tape target: 1 GiB of additional free memory is available on
the HYCU backup controller for each concurrent archive job.
Application-specific prerequisites
Application
Prerequisites
type
116
5 Protecting applications
Application
Prerequisites
type
117
5 Protecting applications
Application
Prerequisites
type
l For multiple volume groups: All data volumes and log volumes
belong to the same volume group.
For distributed (multi-host) environments:
l All virtual machines where SAP HANA resides are discovered by
HYCU.
l Policies are assigned to all virtual machines on which the
application instance is running.
Limitations
l Backing up multiple application types running on a virtual machine is not supported.
l Backing up multiple instances of the same application type running on a virtual
machine is supported only for SQL Server and Oracle.
l Backing up applications running on virtual machines in ROBO environments is not
supported.
l For Nutanix ESXi clusters: If you enabled the Backup from replica policy option, backing
up virtual machines that have disks on different containers is not supported.
Application-specific limitations
Application
Limitations
type
118
5 Protecting applications
Application
Limitations
type
Considerations
l For Nutanix ESXi clusters: If a full backup snapshot is missing on a Nutanix cluster (for
example, because the HYCU protection domain is deleted from Prism), the next backup
will be a full backup.
l For protection domains configured with NearSync: Although snapshots in a protection
domain are created in a 1–15 minute interval, HYCU uses only the snapshots that are
created on an hourly basis for backing up and restoring from snapshots. This applies to
the following environments:
o Nutanix ESXi clusters
o Nutanix clusters when using the Backup from replica option
l For SQL Server:
o Only if you have upgraded your SQL Server to a newer version. HYCU recognizes the
upgraded application as a new application and at the same time changes the status
of the old one to PROTECTED_DELETED. Therefore, to ensure data protection for
the upgraded application, do the following:
1. Assign credentials to the upgraded application to enable HYCU to access it. For
details, see “Enabling access to application data” on page 113.
2. Assign a policy to the upgraded application to protect it. For details, see
“Backing up applications” on page 121.
o Backing up transaction logs of an SQL Server database with the AUTO CLOSE option
set to TRUE may fail, if the database has the RECOVERING status.
Recommendation
For SQL Server and Oracle: It is recommended to use a dedicated disk of a sufficient size for
storing temporary files generated during a backup. Otherwise, this data will be stored on
the biggest disk or an operating system disk volume which may affect the restore
performance.
119
5 Protecting applications
Application-specific options
HYCU enables you to set several application-specific options before you start backing up
your applications. By doing so, you make sure the actions specified by these options are
performed automatically as part of the application backup.
120
5 Protecting applications
instance.
o The secondary replica with the highest backup priority
should not share disks with the secondary replicas with
lower backup priority or the local databases of the
SQL Server instance.
Backing up applications
An application-aware backup allows a consistent backup of discovered applications.
121
5 Protecting applications
Consideration
For Nutanix clusters: If during virtual machine synchronization, a virtual machine cannot be
found on a Nutanix cluster, the status of this virtual machine or any discovered applications
running on it is set to PENDING_REMOVAL. Such a virtual machine and its applications are
grayed out in HYCU and you cannot perform any data protection actions for them. If during
the time interval of two automatic virtual machine synchronization processes, the virtual
machine is found on the Nutanix cluster, its status is changed to PROTECTED_DELETED.
Otherwise, the virtual machine is removed from HYCU.
Procedure
1. In the Applications panel, select applications that you want to back up.
t Tip To narrow down the list of all displayed applications, you can use the
filtering options described in “Filtering data” on page 179.
n Note When you assign the policy to the selected applications, the same policy
is also assigned to the virtual machines on which they are running. If these virtual
machines already have an assigned policy, the policy assigned to the applications
takes precedence over the policy assigned to the virtual machines and is
automatically assigned to the virtual machines.
The backup is scheduled according to the values that you defined for your policy. If
required, you can also perform a manual backup of any application at any time. For details,
see “Performing a manual backup” on page 192.
n Note For Active Directory: HYCU does not perform an authoritative restore.
Prerequisites
l For vSphere environments: You have the required restore privileges assigned. For details,
see “Assigning privileges to a vSphere user” on page 271.
l For applications with status PROTECTED_DELETED whose backups are stored on the imported
targets: Discover these applications, for details, see “Enabling access to application data”
on page 113.
122
5 Protecting applications
l For physical machines: At least one Nutanix cluster or vCenter Server is added to HYCU to
provide a storage container for storing the restore data. For details on how to add a
Nutanix cluster to HYCU, see “Adding a Nutanix cluster” on page 31. For details on how
to add a vCenter Server to HYCU, see “Adding a vCenter Server” on page 33.
l For restoring data from tape: If the tape target is being actively used for archiving data, its
mode should be set to Read Only. For details on how to edit a target, see “Managing
targets” on page 186.
Considerations
l You cannot perform a restore of an application whose retention period specified in the
policy has been exceeded (such restore points are grayed out in the HYCU web user
interface). However, if required, this can be overridden by setting the
restore.enabled.if.retention.is.up configuration setting in the HYCU
config.properties file to true. For details on how to customize the HYCU
configuration settings, see “Customizing HYCU configuration settings” on page 303.
l For SQL Server: If you disabled the Back up and truncate SQL transaction logs option,
you should apply transaction logs manually after restoring data to recover the
SQL Server database.
l For Oracle: If you disabled the Back up and truncate Oracle archive logs option, you
should apply archive logs manually after restoring data to recover the Oracle database.
l For SQL Server failover cluster and SAP HANA multi-host environments: Make sure to select
the virtual machine with the latest backup of attached volume groups. To identify the
appropriate virtual machine, you can use the Jobs panel. For details, see “Managing
HYCU jobs” on page 165.
Restore options
You can select between the following restore options:
Enables you to restore a virtual machine by creating its clone. Select this
option if you want to keep the original virtual machine on which your
Clone VM
application is running. For instructions, see “Cloning a virtual machine”
on page 127.
123
5 Protecting applications
C Caution When you are restoring the application to the original location, the
restored data overrides the data in the original location. To avoid data loss, make sure
that you back up the potentially unprotected data—the data that appeared between the
last successful backup and the restore. To start a manual backup, see “Performing a
manual backup” on page 192.
Limitation
Restoring SQL Server, Exchange Server, and Oracle applications running on physical
machines by using the Restore VM option is not supported.
Considerations
l A restore is performed from the snapshot only if the snapshot is available on the
original location (the source where the original virtual machine was running).
Otherwise, a restore is performed from the target.
l Only if volume groups are attached to the virtual machine that you are restoring. You can
choose to restore the volume groups together with the virtual machine if they were
attached to it at backup time. In this case, the original volume groups are deleted and
the restored ones are automatically attached to the restored virtual machine as well as
all other virtual machines to which they were attached at backup time.
l The restored virtual machine retains the original MAC address.
l Only if you plan to restore vSphere virtual machine data to the original storage container. If
the storage container is mounted to several hosts and the original host is powered off
or in maintenance mode at restore time, data will be restored to the same storage
container on a different host.
Procedure
1. In the Applications panel, click the application that you want to restore to open the
Detail view.
n Note The Detail view appears only if you click an application. Selecting the
check box before the name of the application will not open the Detail view.
2. In the Detail view that appears at the bottom of the screen, select the desired restore
point, and then click Restore.
i Important If the backup status for the selected restore point shows that the
124
5 Protecting applications
backup is crash consistent, you cannot use this restore point for restoring the
application.
b. Use the Use original VM configuration switch if you want the restored virtual
machine to have the same configuration settings as the original virtual machine.
If you want to change any of the configuration settings, disable the Use original
VM configuration switch, and then do the following:
l In the vCPU(s) field, enter the number of virtual CPUs for the restored virtual
machine. The maximum number of virtual CPUs is 1024.
l In the Cores per vCPU field, enter the number of cores per virtual CPU for the
restored virtual machine. The maximum number of cores per virtual CPU is 64.
n Note The total number of cores of the restored virtual machine will be
the number of virtual CPUs multiplied by the number of cores per virtual
CPU.
l In the Memory field, set the amount of memory (in GiB or MiB) for the restored
virtual machine. The value that you specify must be a whole number and
cannot be greater than 4096 GiB.
c. Use the Power virtual machine on switch if you want to turn the restored virtual
machine on after the restore. The original virtual machine will be deleted
automatically.
d. From the Restore from drop-down menu, select which tier you want to use for the
restore. Your restore point can contain one or more tiers among which you can
select:
l Automatic: Ensures the fastest restore to the latest state.
l Backup
l Copy
125
5 Protecting applications
l Archive
l Snapshot
e. Only if virtual disks have been excluded from the backup (manually or automatically): Use
the Create excluded disks as blank switch if you want blank disks of the same
size and configuration as the excluded ones to be created and attached to the
restored virtual machine.
f. For volume groups attached to the virtual machine: Use the Restore volume groups
switch if you want to restore also the volume groups that are attached to the virtual
machine.
6. In the Network section, review the list of network adapters that were added to the
virtual machine at backup time (including the networks to which the virtual machine
was connected). If any of the original networks is no longer available, N/A is shown.
Depending on whether the original networks are available, proceed as follows:
l If the original networks are available, you can leave the default values and restore
the virtual machine with the original network settings, or you can modify the
network settings.
l If the original networks are not available, you must modify the network settings.
126
5 Protecting applications
n Note You can restore the virtual machine without a network adapter. Make
sure to configure the network settings on the virtual machine afterward.
7. Click Restore.
n Note For Nutanix ESXi clusters: Because the minimum RAM required for restoring a
virtual machine is 256 MiB, any virtual machine with less RAM is automatically set to 256
MiB during the restore.
During the restore, the original application instance is offline and not accessible.
Prerequisite
l For virtual machines that you plan to clone to a new location: A Nutanix cluster or a vCenter
Server for a vSphere environment to which you plan to clone the virtual machine is
added to HYCU. For details on how to do this, see “Adding a Nutanix cluster” on page 31
or “Adding a vCenter Server” on page 33.
l For Linux physical machines: In the /etc/fstab system configuration file of the physical
machine, UUIDs (for example, UUID=8ff089c0-8e71-4320-a8e9-dbab8f18a7e5) must
be used instead of device names for file system device identification.
Considerations
l A restore is performed from the snapshot only if the snapshot is available on the
original location (the source where the original virtual machine was running).
Otherwise, a restore is performed from the target.
l Only if volume groups are attached to the virtual machine that you are cloning. You can
choose to restore the volume groups together with the virtual machine if they were
attached to it at backup time. In this case, the original volume groups are kept
alongside of the restored ones. If the volume groups are also attached to other virtual
machines, the following applies (depending on how they are attached to the virtual
machines):
o Directly: Volume groups are automatically attached only to the cloned virtual
machine.
o By using iSCSI: Volume groups are automatically attached to all virtual machines to
which they were attached at backup time.
l For restoring a virtual machine running on a Nutanix AHV cluster to a Nutanix ESXi cluster: If
127
5 Protecting applications
virtual machine disks are attached to the PCI bus, the bus type will be automatically
changed to SCSI after the restore. Because of this configuration change, the restore
finishes with a warning.
l For Linux virtual machines running on a Nutanix ESXi cluster: If after restoring a virtual
machine that was created through the vSphere (Web) Client, the virtual machine does
not boot, follow the steps described in “Restoring a virtual machine from a vSphere
environment to a Nutanix ESXi cluster” on page 313.
l After you restore a virtual machine, it might happen that the order of virtual disks differs
from the one on the original virtual machine if you performed the restore:
o From a Nutanix AHV cluster to a Nutanix ESXi cluster or a vSphere environment
o From a Nutanix ESXi to another Nutanix ESXi cluster
o From a vSphere environment to a Nutanix ESXi cluster
In this case, make the necessary adjustments, including the selection of the correct
boot disk.
l Only if you plan to restore vSphere virtual machine data to the original storage container. If
the storage container is mounted to several hosts and the original host is powered off
or in maintenance mode at restore time, data will be restored to the same storage
container on a different host.
Recommendation
For Linux virtual machines: It is recommended that the use of persistent network device
names based on MAC addresses is disabled. Otherwise, you will have to configure the
network manually. For details on how to disable the use of persistent network device
names, see your Linux distribution documentation.
Procedure
1. In the Applications panel, click the application that you want to restore to open the
Detail view.
n Note The Detail view appears only if you click an application. Selecting the
check box before the name of the application will not open the Detail view.
2. In the Detail view that appears at the bottom of the screen, select the desired restore
point, and then click Restore.
i Important If the backup status for the selected restore point shows that the
backup is crash consistent, you cannot use this restore point for restoring the
application.
128
5 Protecting applications
b. In the New VM name field, specify a new name for the virtual machine.
c. Use the Use original VM configuration switch if you want the restored virtual
machine to have the same configuration settings as the original virtual machine.
If you want to change any of the configuration settings, disable the Use original
VM configuration switch, and then do the following:
l In the vCPU(s) field, enter the number of virtual CPUs for the restored virtual
machine. The maximum number of virtual CPUs is 1024.
l In the Cores per vCPU field, enter the number of cores per virtual CPU for the
restored virtual machine. The maximum number of cores per virtual CPU is 64.
n Note The total number of cores of the restored virtual machine will be
the number of virtual CPUs multiplied by the number of cores per virtual
CPU.
l In the Memory field, set the amount of memory (in GiB or MiB) for the restored
virtual machine. The value that you specify must be a whole number and
cannot be greater than 4096 GiB.
d. Use the Power virtual machine on switch if you want to turn the restored virtual
machine on after the restore. If you turn the restored virtual machine on, the
original virtual machine will be turned off automatically.
129
5 Protecting applications
on the virtual machine and you are prompted to answer whether the virtual
machine has been moved or copied, make sure to answer I Copied It.
e. From the Restore from drop-down menu, select which tier you want to use for the
restore. Your restore point can contain one or more tiers among which you can
select:
l Automatic: Ensures the fastest restore to the latest state.
l Backup
l Copy
l Archive
l Snapshot
f. Only if virtual disks have been excluded from the backup (manually or automatically): Use
the Create excluded disks as blank switch if you want blank disks of the same
size and configuration as the excluded ones to be created and attached to the
restored virtual machine.
g. For volume groups attached to the virtual machine: Use the Clone volume groups
switch if you want to restore also the volume groups that are attached to the virtual
machine.
6. In the Network section, do the following:
a. Review the list of network adapters that were added to the virtual machine at
backup time (including the networks to which the virtual machine was connected).
If any of the original networks is no longer available, N/A is shown.
Depending on whether the original networks are available, proceed as follows:
l If the original networks are available, you can leave the default values and clone
the virtual machine with the original network settings, or you can modify the
network settings.
l If the original networks are not available, you must modify the network settings.
130
5 Protecting applications
Original
Instructions
networks are...
n Note You can clone the virtual machine without a network adapter. Make
sure to configure the network settings on the virtual machine afterward.
b. Only if you are restoring the virtual machine to a different Nutanix cluster or vSphere
environment. Use the Keep original MAC address switch if you want the restored
virtual machine to keep the original MAC address. Keep in mind that this is
applicable only if at least one network adapter has a MAC address assigned.
7. Click Restore.
During the restore, the original application instance is offline and not accessible.
There are some considerations that you should be aware of after cloning a virtual machine.
For details, see “After cloning a virtual machine” on page 95.
Prerequisites
l For point-in-time restore: The database recovery model is set to full or bulk-logged.
l For restoring data from tape: If the tape target is being actively used for archiving data, its
mode should be set to Read Only. For details on how to edit a target, see “Managing
targets” on page 186.
l For restoring the whole SQL Server failover cluster instance: The SQL Server service is
stopped by using the Failover Cluster Manager. For details on how to do this, see
SQL Server documentation.
l For improved restore performance, the startup type of the Microsoft iSCSI Initiator
Service is not set to Disabled.
131
5 Protecting applications
l For physical machines: At least one Nutanix cluster or vCenter Server is added to HYCU to
provide a storage container for storing the restore data. For details on how to add a
Nutanix cluster to HYCU, see “Adding a Nutanix cluster” on page 31. For details on how
to add a vCenter Server to HYCU, see “Adding a vCenter Server” on page 33.
Limitations
l The restore of discovered applications is available for the NTFS, FAT, and FAT32 file
systems.
l Restoring SQL Server databases to another SQL Server application instance is
supported only if you are restoring to the same or later version of the application.
l Databases that are part of an Always On Availability Group can be restored only to a
primary node (from a secondary or primary node). However, keep in mind that in the
case of an Always On Basic Availability Group, the databases can be restored only from
a primary node.
Considerations
l If you are restoring the databases to a different SQL Server instance, they will be
renamed and copied to the default SQL Server location of the selected target.
l If a virtual machine is deleted from the source, but it still has at least one valid restore
point available, it is considered protected. In this case, the status of the virtual machine
or any discovered applications running on it is PROTECTED_DELETED. When restoring
application items of such an application, keep in mind that you cannot restore them to
the original application instance.
l You cannot perform a restore of an application whose retention period specified in the
policy has been exceeded (such restore points are grayed out in the HYCU web user
interface). However, if required, this can be overridden by setting the
restore.enabled.if.retention.is.up configuration setting in the HYCU
config.properties file to true. For details on how to customize the HYCU
configuration settings, see “Customizing HYCU configuration settings” on page 303.
l For SQL Server failover clusters:
o The restore needs to be redirected to the active SQL Server failover cluster instance.
o The Overwrite existing databases option can be enabled for a redirected restore
only if the database location also exists on the target virtual machine.
l For restoring an SQL Server database to a different SQL Server instance: The Overwrite
existing databases option should be enabled only when restoring to an SQL Server
instance which is on a different server and has identical database paths.
132
5 Protecting applications
Procedure
1. In the Applications panel, click the application whose databases you want to restore to
open the Detail view. The Detail view appears only if you click an application. Selecting
the check box before the name of the application will not open the Detail view.
n Note With the SQL Server Always On Availability Group, you can expand the
application item to view the discovered Availability Groups.
2. In the Detail view that appears at the bottom of the screen, select the desired restore
point.
i Important If the backup status for the selected restore point shows that the
backup is crash consistent, you cannot use this restore point for restoring the
databases.
n Note If the Back up and truncate SQL transaction logs option was disabled
during the backup, you are prompted that database recovery must be performed
after the restore.
6. For SQL Server Always On Availability Group: From the Destination Availability Group
drop-down menu, select one of the available Availability Groups to restore the
databases to this group or leave the field empty to restore the databases to the
SQL Server.
7. From the Destination storage container drop-down menu, select where you want to
restore the databases.
8. From the Restore from drop-down menu, select which tier you want to use for the
restore. Your restore point can contain one or more tiers among which you can select:
l Automatic: Ensures the fastest restore to the latest state.
l Backup
l Copy
l Archive
l Snapshot
9. Select the Whole instance check box if you want to restore the whole application
instance or, from the list of databases that are available for a restore, select the ones
that you want to restore.
10. Optional. Specify a point in time to which you want to restore data. The databases will
be restored to the state they were in at the specified time.
133
5 Protecting applications
the appropriate state by applying the transaction log files from the next backup.
i Important If you are restoring the whole instance, you can only overwrite
existing databases. In this case, the Overwrite existing databases option is enabled
by default and you cannot disable it.
n Note After you join the restored databases to the Always On Availability Group,
it is recommended to perform a new backup of your Always On Availability Group.
16. Only if restoring the whole SQL Server failover cluster instance. Start the SQL Server service
and all other related services by using the Failover Cluster Manager. For details on how
to do this, see SQL Server documentation.
Prerequisites
l For restoring public folders: The public folder exists in the public folder mailbox. If it does
not exist, recreate it manually with the same name it had at backup time.
134
5 Protecting applications
l For restoring data from tape: If the tape target is being actively used for archiving data, its
mode should be set to Read Only. For details on how to edit a target, see “Managing
targets” on page 186.
l For improved restore performance, the startup type of the Microsoft iSCSI Initiator
Service is not set to Disabled.
l For physical machines: At least one Nutanix cluster or vCenter Server is added to HYCU to
provide a storage container for storing the restore data. For details on how to add a
Nutanix cluster to HYCU, see “Adding a Nutanix cluster” on page 31. For details on how
to add a vCenter Server to HYCU, see “Adding a vCenter Server” on page 33.
Limitations
l The restore of discovered applications is available for the NTFS, FAT, and FAT32 file
systems.
l Restoring data to the hycu subfolder (the Restore to subfolder option) is currently not
supported for public folders.
Consideration
You cannot perform a restore of an application whose retention period specified in the
policy has been exceeded (such restore points are grayed out in the HYCU web user
interface). However, if required, this can be overridden by setting the
restore.enabled.if.retention.is.up configuration setting in the HYCU
config.properties file to true. For details on how to customize the HYCU configuration
settings, see “Customizing HYCU configuration settings” on page 303.
Procedure
1. In the Applications panel, click the application whose application items you want to
restore to open the Detail view.
n Note The Detail view appears only if you click an application. Selecting the
check box before the name of the application will not open the Detail view.
2. In the Detail view that appears at the bottom of the screen, select the desired restore
point.
i Important If the backup status for the selected restore point shows that the
backup is crash consistent, you cannot use this restore point for restoring
application items.
135
5 Protecting applications
l Restore databases
a. From the Destination server drop-down menu, select the server for restoring
the data. When specifying a destination server, keep in mind that you can select
it only if your mailbox server is a member of a DAG and you want to restore
data to another mailbox server inside the DAG. Otherwise, you can restore only
to the original mailbox server.
b. From the Destination storage container drop-down menu, select the storage
container for restoring the data.
c. From the Restore from drop-down menu, select which tier you want to use for
the restore. Your restore point can contain one or more tiers among which you
can select:
l Automatic: Ensures the fastest restore to the latest state.
l Backup
l Copy
l Archive
l Snapshot
d. Select the All databases check box if you want to restore all databases or, from
the list of databases that are available for a restore, select the ones that you
want to restore.
e. Use the Enable restore to recovery database switch if you want to enable
restoring data to a recovery database. If enabled, provide a recovery database
path. The default one is C:\ProgramData\Hycu.
l Restore mailboxes and/or public folders
a. From the Recovery database server drop-down menu, select the mailbox server
for restoring the data. You can select among the mailbox servers that are part
of your Exchange Server organization.
b. From the Storage container drop-down menu, select the storage container for
restoring the data.
c. From the Restore from drop-down menu, select which tier you want to use for
the restore. Your restore point can contain one or more tiers among which you
can select:
l Automatic: Ensures the fastest restore to the latest state.
l Backup
l Copy
l Archive
l Snapshot
d. From the list of mailboxes and/or public folders that are available for a restore,
136
5 Protecting applications
e. Enable the Use non-default domain controller switch if you want to use a
domain controller other than the default one, and then, in the Domain
controller field, enter the FQDN or IP address of the preferred domain
controller.
f. Click Next.
g. Select where you want to restore data:
o Original mailbox
o Alternate mailbox, and then enter an alternate mailbox name.
h. Select the mode for restoring data:
o Restore in place
Enables you to restore data to the original location.
o Restore to subfolder (not supported for public folders)
Enables you to restore data to the hycu subfolder that is created
automatically.
i. For restoring data to the original location: Use the Conflict resolution switch if
you want to resolve any potential data conflict by keeping the most recent
version of the items in conflict. Otherwise, HYCU will overwrite the existing items
with the ones from the backup.
j. Enter a temporary recovery database path. The default one is
C:\ProgramData\Hycu.
5. Click Restore.
Prerequisites
l On the original virtual machine, references in the /etc/fstab system configuration file
entries use universally unique identifiers (for example, UUID=8ff089c0-8e71-4320-
137
5 Protecting applications
a8e9-dbab8f18a7e5) rather than device names (for example, /dev/sda1) unless they
refer to logical volumes (for example, /dev/mapper/ol-root).
l The bashrc and .bash_profile scripts do not write to standard output (STDOUT) or
standard error (STDERR) for the user whose credentials are used for application
discovery.
l For restoring data from tape: If the tape target is being actively used for archiving data, its
mode should be set to Read Only. For details on how to edit a target, see “Managing
targets” on page 186.
l For physical machines: At least one Nutanix cluster or vCenter Server is added to HYCU to
provide a storage container for storing the restore data. For details on how to add a
Nutanix cluster to HYCU, see “Adding a Nutanix cluster” on page 31. For details on how
to add a vCenter Server to HYCU, see “Adding a vCenter Server” on page 33.
Limitation
Tablespaces can be restored only from the latest restore point in the backup chain and
cannot be restored to a point in time.
Considerations
l When performing a database instance or tablespace restore, you can perform a
complete or point-in-time restore:
o Complete restore
HYCU performs a complete restore of the whole database instance or tablespaces
from the latest backup in the backup chain.
When performing the complete restore, the control file and archive log files are not
restored, and only the existing archive log files are applied. If the control file or the
existing archive log files are lost, a complete restore is not possible and a point-in-
time restore must be performed.
o Point-in-time restore
To perform a point-in-time restore, you must select a backup that was performed
before the specified point in time so that the database instance can be brought to
the point in time by applying the archive log files from the next backup.
When performing the point-in-time restore, the control file, database files, and
required archive log files are restored.
l You cannot perform a restore of an application whose retention period specified in the
policy has been exceeded (such restore points are grayed out in the HYCU web user
138
5 Protecting applications
Procedure
1. In the Applications panel, click the application whose database you want to restore to
open the Detail view.
n Note The Detail view appears only if you click an application. Selecting the
check box before the name of the application will not open the Detail view.
2. In the Detail view that appears at the bottom of the screen, select the desired restore
point.
i Important If the backup status for the selected restore point shows that the
backup is crash consistent, you cannot use this restore point for restoring the
database instance.
n Note If the Back up and truncate Oracle archive logs option was disabled
during the backup, you are prompted that database recovery must be performed
after the restore.
7. Select the Whole instance check box if you want to restore the whole database
instance or, from the list of tablespaces that are available for a restore, select the ones
that you want to restore.
8. Only if restoring the whole database instance. Optionally, specify a point in time to which
you want to restore data. The database instance will be restored to the state it was in at
the specified time.
9. Click Restore.
139
5 Protecting applications
10. Only if the Back up and truncate Oracle archive logs option was disabled during the backup.
Recover the Oracle databases by applying the archive logs manually.
140
Chapter 6
For details on how to protect file share data efficiently, see the following sections:
l “Backing up file shares” below
l “Restoring file share data” on page 143
Prerequisite
For archiving data to a QStar tape target: 1 GiB of additional free memory is available on the
HYCU backup controller for each concurrent archive job.
Limitations
l The iSCSI and Nutanix targets cannot be used for storing file share data.
l Backing up from a replica is not supported for Nutanix Files. Therefore, if a policy that
you plan to assign to file shares has the Backup from replica option enabled, this
option will be ignored.
l Backing up file shares to cloud targets is supported if the file system item names
contain only characters in the Unicode Basic Multilingual Plane (BMP).
l For NFS file shares: Backing up files whose file names contain non-UTF-8 multilingual
characters (for example, those created by Windows clients) is not supported. Therefore,
such files will be skipped during the backup.
l For Nutanix Files version 3.8.1 or later: If you use Smart disaster recovery (DR) for Nutanix
Files protection, HYCU enables you to protect replicated file share data. After you add a
recovery file server as a source to HYCU, you can back up the corresponding file shares
by assigning policies to them, and later also restore them. Keep in mind that you cannot
restore data to replicated file shares. For details on how to configure Smart DR, see
Nutanix documentation.
141
6 Protecting file shares
Considerations
l You can change the number of incremental file share backups after which a full reindex
is performed by customizing the afs.reindex.interval.count configuration setting,
which allows you to speed up the process of searching for the relevant files when you
are restoring them. For details on how to do this, see “Customizing HYCU configuration
settings” on page 303.
l If up to 100 file backups fail during the backup of a file share, the backup status of the
file share is Completed with errors. You can customize this value by editing the
afs.partial.success.threshold.count configuration setting. For details on how to
do this, see “Customizing HYCU configuration settings” on page 303.
l When backing up a file share, HYCU also backs up any nested shares that are inside the
selected file share. Keep in mind that backing up nested shares individually is not
supported.
l For Nutanix Files 3.8.0: Backing up connected shares is supported. Keep in mind that
connected shares must be backed up individually because the backup of a parent
share does not include the contents of child shares.
l For Nutanix Files version 4.0.0 or later: Backing up shares with tiered files is supported.
However, consider the following:
o The backup operators or the HYCU instance IP addresses must not be set up as
zero users or clients because this could cause backup data corruption on tiered
files.
o Additional fees may apply for backup and restore operations due to data egress.
Recommendation
Using an NFS target for protecting Nutanix Files data requires you to enable public access
to the target. For security purposes, it is recommended that you avoid such a configuration.
Procedure
1. In the Shares panel, select the file shares that you want to back up.
t Tip You can update the list of file shares by clicking Synchronize. To narrow
down the list of displayed file shares, you can use the filtering options described in
“Filtering data” on page 179.
2. Only if you want to exclude particular file share folders from the backup. Click
Configuration, and then, in the Configuration dialog box that opens, do the
following:
a. In the Exclude folder path field, enter the full path (from the root of the file share) to
the file share folder that you want to exclude from the backup (for example,
142
6 Protecting file shares
/backup), and then click Add. Repeat this step to add additional file share
folders.
n Note The paths to all the file share folders that you excluded from the
backup are added to the Exclude folder paths list. If you want to remove any of
them from the exclude list, click Remove.
b. Click Save.
3. Click Policies. The Policies dialog box appears.
4. From the list of available policies, select the desired policy.
5. Click Assign to assign the policy to the selected file shares.
After you assign the policy, the backup is scheduled according to the values that you
defined for your policy. If required, you can also perform a manual backup at any time. For
details, see “Performing a manual backup” on page 192.
t Tip If you have more than one HYCU instance in your data protection environment,
you can see which HYCU instance performed a backup by clicking the desired backup
job in the Jobs panel and checking the HYCU instance IP address in the Detail view.
File share data can be restored from a target or a snapshot. Restoring data from the
snapshot is possible only if the afs.restore.snapshot.enabled configuration setting is set
to true (the default value is false). In this case, the restore is always performed from the
snapshot if the snapshot is available. Otherwise, the restore is performed from the target.
For details on how to customize HYCU configuration settings, see “Customizing HYCU
configuration settings” on page 303.
Prerequisites
l For restoring data to a different Nutanix Files share: The Nutanix Files server with the file
share to which you want to restore data is added to HYCU. For details on how to do
this, see “Adding a Nutanix Files server” on page 34.
l For restoring data from tape: If the tape target is being actively used for archiving data, its
mode should be set to Read Only. For details on how to edit a target, see “Managing
targets” on page 186.
Limitations
l The restore of alternate data streams (ADS) is supported only if you are restoring data
from one Nutanix Files SMB share to another Nutanix Files SMB share.
l Only if restoring file shares that contain alternate data streams (ADS) in top-level directories to
distributed file shares. Restoring ADS to top-level directories of distributed file shares is
143
6 Protecting file shares
Considerations
l Only if restoring a large number of files from the file share backup. The HYCU instance may
require more RAM than is available by default. In this case, increase the default value by
using the afs.instance.memory.mb configuration setting. For details on how to
customize the HYCU configuration settings, see “Customizing HYCU configuration
settings” on page 303.
l Only if restoring files to a local machine. The restored files are downloaded as a .zip file.
To avoid any potential issues with unzipping the restored files and to make sure that
the files or folders with newlines in their names are properly restored, always use 7-Zip
when extracting the files.
l If the number of files that could not be restored during the file share restore is less than
or equal to 100 (the default value), the status of the file share restore is Warning. You
can edit this default value by customizing the
afs.restore.partial.success.threshold.count configuration setting. For details on
how to do this, see “Customizing HYCU configuration settings” on page 303.
Recommendation
For optimal restore performance, it is recommended that you restore data to a Nutanix
Files share instead of an external file share whenever possible.
Procedure
1. In the Shares panel, click the file share that contains the files that you want to restore to
open the Detail view.
n Note The Detail view appears only if you click a file share. Selecting the check
144
6 Protecting file shares
box before the name of the file share will not open the Detail view.
2. In the Detail view that appears at the bottom of the screen, select the desired restore
point.
3. Click Restore Files. The Restore Files dialog box opens.
4. From the Restore from drop-down menu, select which tier you want to use for the
restore. Your restore point can contain one or more tiers among which you can select:
l Automatic: Ensures the fastest restore to the latest state.
l Backup
l Copy
l Archive
l Snapshot
5. Click Next.
6. In the Folder section, select the uppermost check box (the one in front of the icon) if
you want to restore the whole file share. Otherwise, from the list of available folders
and files, select the ones that you want to restore. Click Next.
t Tip If there are too many files to be displayed on one page, you can move
between the pages by clicking and . You can also use to set the number of
files to be displayed per page.
7. Depending on where you want to restore the selected files (to the original or a different
Nutanix Files share, an external SMB or NFS share, or the local machine), select the
preferred restore option, click Next, and then follow the instructions:
145
6 Protecting file shares
admin.
d. Only if restoring files from one SMB share to another SMB share.
Enable the Restore ACL switch if you want to restore the
original access control list for the files.
e. Click Restore.
From the Share type drop-down menu, select where you want
to restore the files, and then provide the required information:
l NFS
a. Enter the path to the NFS shared folder in the following
format:
\\server\<Path>
146
6 Protecting file shares
e. Click Restore.
147
Chapter 7
i Important If the volume groups are attached to one or more virtual machines at
backup time, they are backed up automatically during the virtual machine backup. For
details, see “Protecting virtual machines” on page 70.
For details on how to protect volume groups efficiently, see the following sections:
l “Backing up volume groups” below
l “Restoring volume groups” on the next page
Prerequisite
A Nutanix cluster on which the volume group that you want to protect resides has been
added to HYCU. For instructions, see “Adding a Nutanix cluster” on page 31.
Consideration
The volume groups that HYCU creates automatically and uses for data protection purposes
are not shown in the Volume Groups panel. The names of these volume groups start with
the NTNX-, hycu-vg-, and HYCU- prefixes, therefore make sure not to create your own
volume groups with the same prefixes.
Procedure
1. In the Volume Groups panel, select the volume groups that you want to back up.
t Tip You can update the list of volume groups by clicking Synchronize. To
narrow down the list of displayed volume groups, you can use the filtering options
148
7 Protecting volume groups
Restore options
You can select among the following restore options:
149
7 Protecting volume groups
Consideration
Only if the volume group is attached to one or more virtual machines. The virtual machines to
which the volume group is attached must be turned off.
Procedure
1. In the Volume Groups panel, click the volume group that you want to restore. The
Detail view appears at the bottom of the screen.
n Note The Detail view appears only if you click a volume group. Selecting the
check box before the name of the volume group will not open the Detail view.
7. Only if the volume group you are restoring is attached to one or more virtual machines.
Enable the Attach volume group switch if you want the volume group to be attached
to the virtual machines after the restore.
8. Click Restore.
Procedure
1. In the Volume Groups panel, click the volume group that you want to restore. The
Detail view appears at the bottom of the screen.
n Note The Detail view appears only if you click a volume group. Selecting the
check box before the name of the volume group will not open the Detail view.
150
7 Protecting volume groups
5. From the Storage container drop-down menu, select where you want to restore the
volume group. By default, the original storage container is selected.
6. In the New volume group name field, specify a new name for the volume group.
7. From the Restore from drop-down menu, select which tier you want to use for the
restore. Your restore point can contain one or more tiers among which you can select:
l Automatic: Ensures the fastest restore to the latest state.
l Backup
l Copy
l Archive
l Snapshot
8. Only if the volume group you are restoring is attached to one or more virtual machines.
Enable the Attach volume group switch if you want the volume group to be attached
to the virtual machines after the restore.
9. Click Restore.
Procedure
1. In the Volume Groups panel, click the volume group whose virtual disks you want to
restore. The Detail view appears at the bottom of the screen.
n Note The Detail view appears only if you click a volume group. Selecting the
check box before the name of the volume group will not open the Detail view.
Type Instructions
151
7 Protecting volume groups
Type Instructions
b. Enter the path to the NFS shared folder from the root of the
server (for example, /backups/HYCU).
7. From the Restore from drop-down menu, select which tier you want to use for the
restore. Your restore point can contain one or more tiers among which you can select:
l Automatic: Ensures the fastest restore to the latest state.
l Backup
l Copy
l Archive
l Snapshot
8. Click Restore.
152
Chapter 8
Consideration
For Migration/DR-ready virtual machines and applications: You can recover your HYCU backup
controller and protected data to cloud by using HYCU Protégé. For more information, see
“HYCU Protégé” on page 287.
Procedures
1. Prepare for disaster recovery. For instructions, see “Preparing for disaster recovery”
below.
2. Perform disaster recovery. For instructions, see “Performing disaster recovery” on
page 157.
3. Only if HYCU is used for file share protection: Reestablish connections of HYCU instances to
the restored HYCU backup controller or recreate HYCU instances. For instructions, see
“Recreating HYCU instances” on page 160.
153
8 Recovering your data protection environment
iSCSI storage device is dedicated to a single HYCU backup controller and no other
appliances than HYCU.
l Only if the backup of the original HYCU backup controller or virtual machines, applications, file
shares, and volume groups you want to recover is stored on a Google Cloud target. A Google
Cloud service account is created and added to HYCU. For instructions on how to add a
cloud account to HYCU, see “Adding a Google Cloud service account” on page 217.
l Only if the backup of the original HYCU backup controller or other entities you want to recover
is stored on a target with enabled target encryption. You exported the encryption target key
from the original HYCU backup controller and the file containing the encryption key is
available.
Procedure
Task Instructions
154
8 Recovering your data protection environment
C Caution Make sure that a clone of the HYCU backup controller is not activated
while the original HYCU backup controller is still active. Otherwise, data loss may
occur.
4. Log on to the HYCU web user interface of the temporary HYCU backup controller.
5. Only if the backup of the original HYCU backup controller or backups of the entities you want
to restore is stored on a target with enabled target encryption. Import the encryption key
that you have exported from the original HYCU backup controller. For instructions, see
“Configuring target encryption” on page 220.
Importing targets
Prerequisites
l The activities on the temporary HYCU backup controller and the original HYCU backup
controller (if it still exists) are suspended and no jobs are running when you start
importing the targets. For instructions, see “Setting power options” on page 234.
l The temporary HYCU backup controller has either no targets or only imported targets.
l All targets you plan to import are deactivated and iSCSI and Nutanix targets are also
unmounted on any other powered on HYCU backup controller until the import job is
finished.
Limitations
l Backing up data to imported targets is not supported.
l Importing Azure and Google Cloud targets that have WORM enabled is not supported.
Considerations
l The targets you import should contain the complete backup chains of the entities you
want to recover.
l Make sure not to make any changes to HYCU until the import job is finished.
Procedure
1. Log on to the HYCU web user interface of the temporary HYCU backup controller.
2. In the Targets panel, click Import. The Import Target dialog box opens.
3. From the Type drop-down menu, select the type of target.
155
8 Recovering your data protection environment
4. Specify the values so that they match the original target configuration, and then click
Next.
5. In the Import Backup Catalog dialog box, select the name of the HYCU backup
controller whose backup you want to import, and then click Next.
6. In the Multiple Targets dialog box, one or more targets that store backup data of the
selected HYCU backup controller and other entities is displayed. If any additional targets
are found, select them one by one and specify the values so that they match the original
target configuration. For each target, click Validate to check the configuration.
7. After you validated all the targets required for your restore, click Import.
n Note It is recommended to import all the targets from the list to ensure that
complete backup chains are available for the restore. If you do not import some
targets and backup chains are not complete, you can import missing targets later by
repeating the import procedure.
l For recovering virtual machines, applications, file shares, and volume groups, consider
the following:
o The self-service groups existing in the original data protection environment are
recreated on the temporary HYCU backup controller. The recreated self-service
groups do not contain any users. To restore virtual machines, applications, file
shares, and volume groups, you need to create users and add them to the
recreated user groups that have ownership over the virtual machines, file shares,
and volume groups you want to restore. For instructions, see “Setting up a user
environment” on page 204.
o The virtual machines whose backups are stored on the imported targets are listed
in the Virtual Machines panel, and their status is PROTECTED_DELETED. To restore
virtual machines other than the HYCU backup controller, see “Restoring virtual
machines” on page 86.
o Applications whose backups are stored on the imported targets are listed in the
Applications panel, and their status is PROTECTED_DELETED. To restore applications,
see “Restoring whole applications” on page 122.
o File shares whose backups are stored on the imported targets are listed in the
Shares panel, and their status is PROTECTED_DELETED. To restore file shares, see
“Restoring file share data” on page 143.
156
8 Recovering your data protection environment
o Volume groups whose backups are stored on the imported targets are listed in the
Volume Groups panel, and their status is PROTECTED_DELETED. To restore volume
groups, see “Restoring volume groups” on page 149.
157
8 Recovering your data protection environment
Prerequisites
l The temporary HYCU backup controller has network access to the cluster of the original
HYCU backup controller.
l Depending on the cluster that you plan to restore the HYCU backup controller to, a
corresponding source is added to HYCU.
Procedure
1. Log on to the HYCU web user interface of the temporary HYCU backup controller.
2. In the Virtual Machines panel, select the HYCU backup controller.
3. In the Detail view that appears at the bottom of the screen, select the latest restore
point.
n Note The Detail view appears only if you click a virtual machine. Selecting the
check box before the name of the virtual machine will not open the Detail view.
13. For Nutanix ESXi clusters: If the original HYCU backup controller does not exist, configure
settings for the new network adapter that was assigned to the HYCU backup controller.
For instructions, see “Configuring your network” on page 231.
i Important Make sure to enter the original IP address of the HYCU backup
controller. After editing the connection, delete the old network adapter.
158
8 Recovering your data protection environment
Prerequisites
l The temporary HYCU backup controller has network access to the cluster you plan to
restore the original HYCU backup controller to.
l Depending on the cluster that you plan to restore the HYCU backup controller to, a
corresponding source is added to HYCU.
Procedure
1. Only if the original HYCU backup controller still exists. Suspend the activities of the original
HYCU backup controller.
C Caution Make sure that a clone of the HYCU backup controller is not activated
while the original HYCU backup controller is still active. Skipping this step may result
in data loss.
To suspend the activities of the original HYCU backup controller, follow these steps:
a. Only if the HYCU backup controller is turned off. Turn the HYCU backup controller
(virtual machine) on.
b. Log on to the HYCU web user interface.
c. Suspend the activities of the HYCU backup controller. For instructions, see “Setting
power options” on page 234.
d. Wait for the running jobs to complete. You can check this by filtering the Jobs list by
the Executing job status. For instructions, see “Filtering data” on page 179.
2. Only if the original HYCU backup controller still exists. Do one of the following:
l Remove the HYCU backup controller from the source.
From the Nutanix Prism web console or the vSphere (Web) Client, remove the
HYCU backup controller from the source. For instructions, see Nutanix or VMware
documentation.
l Ensure that the activities of the HYCU backup controller are not resumed once its
clone is deployed.
3. Log on to the HYCU web user interface of the temporary HYCU backup controller.
4. In the Virtual Machines panel, select the original HYCU backup controller.
5. In the Detail view that appears at the bottom of the screen, select the latest restore
point.
n Note The Detail view appears only if you click a virtual machine. Selecting the
159
8 Recovering your data protection environment
check box before the name of the virtual machine will not open the Detail view.
n Note Make sure to enter the original IP address of the HYCU backup controller.
Prerequisite
A restore of the HYCU backup controller is complete and the HYCU backup controller is
turned on.
160
8 Recovering your data protection environment
Procedure
1. Log on to the HYCU web user interface.
2. Click Administration, and then select Instances.
3. For each HYCU instance, depending on its state, do one of the following:
l HYCU instance still exists on the source:
a. Only if the HYCU instance is turned on. From the Nutanix Prism web console, turn
the HYCU instance off.
b. From the Nutanix Prism web console, turn the HYCU instance on. It will
establish a connection to the HYCU backup controller and will be reconfigured
automatically.
l HYCU instance is corrupted or no longer exists:
a. Only if you want to keep the name of the HYCU instance. In the Instances dialog
box, take a note of the VM name, Hostname, Source, and IP address option
values for the HYCU instance.
b. Only if the original HYCU instance still exists and is corrupted. From the Nutanix
Prism web console, remove the corresponding virtual machine from the
source.
c. Only if you want to use a new name for the HYCU instance. Delete the
HYCU instance through the HYCU web user interface. For instructions, see
“Managing HYCU instances” on page 223.
d. Create a new HYCU instance. It is not required that you create it on the same
source as the original HYCU instance. For instructions, see “Adding a Nutanix
Files server” on page 34.
If—due to changes in your data protection environment—you realize that you do not need
any of the HYCU instances anymore, you can remove them. For instructions, see “Deleting a
HYCU instance” on page 225.
161
Chapter 9
Export data that you can view in a table in any of the “Exporting the contents of the
panels to a JSON or CSV file. panel” on page 185
162
9 Performing daily tasks
Set up a validation policy and schedule the backup “Setting up a validation policy” on
validation. page 192
“Recreating snapshots” on
Recreate a snapshot.
page 199
In case of recognized problems in the Nutanix environment that can degrade the efficiency
and reliability of data protection (for example, when storage, vCPU, or memory utilization is
exceeded), you can make adjustments to better meet your data protection goals. For
details, see “Adjusting the HYCU virtual machine resources” on page 199.
i Important Your user role defines which widgets you are allowed to see and
access.
The following table describes what kind of information you can find within each widget:
163
9 Performing daily tasks
Backups Shows the backup job success rate for the last seven days.
Shows the percentage of policies that are compliant and the exact
number of compliant and non-compliant policies. A policy is
Policies considered compliant if all entities to which this policy is assigned
are compliant with the policy settings. For detailed information
about policies, see “Defining your backup strategy” on page 57.
164
9 Performing daily tasks
t Tip By pausing on the progress bar of a particular task (for example, Backup
data), additional information about the task is available, such as how much data has
already been backed up and when the progress time has been last updated.
l For virtual machines with attached volume groups: Check the backup and restore process
statuses of the volume groups attached to the virtual machines. To do so, click the
arrow next to the backup or restore job of a virtual machine with attached volume
groups, and a list of attached volume group processes and their statuses will be
expanded. Keep in mind that volume group processes will not appear all at once, but
one after another, as the job progresses.
l Generate a report about a specific job by selecting it, and then clicking View Report.
To copy the report to the clipboard, in the Job Report dialog box that opens, click Copy
to clipboard.
l Cancel a currently running or queued job by selecting it, and then clicking Abort
Job.
l Enable purging of jobs. For details, see “Enabling the purge of events and jobs” on
page 169.
Consideration
If a backup, backup copy, or archive job fails, HYCU automatically schedules job retries.
Consider the following:
l If the backup job fails, the time interval between two successive retries is doubled with
each retry until the RPO value is reached (for example, by default, the first retry occurs
after 15 minutes, the second one after 30 minutes, the third one after 1 hour, and so
on). When the RPO value is reached, the time interval for retrying the backup job
becomes the same as the one specified for the RPO.
l If the backup copy job fails, HYCU retries the failed job two times with the time interval
of 15 minutes (by default). If these retries fail, the retry job is suspended for 24 hours.
l If the archive job fails, HYCU retries the failed job once after 15 minutes (by default). If
this retry fails, the retry job is suspended for 12 hours.
165
9 Performing daily tasks
Job
Description
information
Event
Description
information
To open the Detail view where you can find the event summary and more details about the
event, click the desired event.
t Tip To minimize the Detail view, click Minimize or press Spacebar. To return it
166
9 Performing daily tasks
Depending on which notification channel you want to use, see one of the following
sections:
l “Setting up email notifications” below
l “Setting up webhook notifications” on the next page
Procedure
1. In the Notifications dialog box, click the Email tab, and then click New.
2. In the Subject field, enter a subject for the email notification.
3. From the Category drop-down menu, select one or more categories to which the
events belong (for example, Policies, Backup, Credentials, System, and so on). To
include all categories, click Select All.
4. From the Status drop-down menu, select the status of the events (Success, Warning,
Failed). To include all statuses, click Select All.
5. From the Language drop-down menu, select the preferred language for email
notifications.
6. In the Email address field, enter one or more email addresses to which you want the
notifications to be sent. If you are entering more than one email address, make sure to
press the Spacebar after entering each one.
7. Click Save.
Your changes take effect immediately and email notifications are sent to any email address
that you specified in the notification settings.
167
9 Performing daily tasks
You can later edit settings for existing email notifications (click Edit and make the
required modifications) or delete the ones that you do not need anymore (click Delete).
https://<Host>
https://<Host>/<Path>
For details on the format of the data that HYCU sends to the specified URL, see
“Webhook data format” on the next page.
7. Only if the receiving endpoint requires sender's identification. From the Authentication type
drop-down menu, select one of the following authentication types:
l Basic authentication, and then enter the user name and password associated
with your webhook endpoint.
l Authentication by secret, and then enter the secret to connect to your webhook
endpoint.
8. Click Next.
9. Optional. Customize the request body that is sent by HYCU. You can click the
appropriate fields in the HYCU fields list to easily insert event variables into the body.
i Important Make sure the format you define in the body is supported by the
platform to which webhook notifications will be sent.
For details on the format of the webhook request body, see “Webhook data format” on
the next page.
10. Click Save.
Your changes take effect immediately and webhook notifications are sent to the URL that
you specified in the notification settings.
168
9 Performing daily tasks
You can later edit settings for existing webhook notifications (click Edit and make the
required modifications) or delete the ones that you do not need anymore (click Delete).
content-type = application/json
x-hycu-signature = base64(hmac(body, secret, 'sha256'))
n Note The x-hycu-signature request header is sent only if the webhook secret is
specified.
HTTP request body
{
"severity": "<severity-value>",
"created": "<created-value>",
"details": "<details-value>",
"category": "<category-value>",
"message": "<message-value>",
"user": "<user-value>",
"taskId": "<taskId-value>"
}
Your webhook URL should return a response with HTTP status code 204.
Prerequisite
You must be an infrastructure group administrator.
169
9 Performing daily tasks
Consideration
Jobs related to backups, copies of backups, and archives will be deleted only if the
corresponding restore points no longer exist or are expired.
Depending on whether you want to purge events or jobs, access one of the following
panels:
l
Accessing the Events panel
To access the Events panel, in the navigation pane, click Events.
l
Accessing the Jobs panel
To access the Jobs panel, in the navigation pane, click Jobs.
Procedure
1. In the Events or Jobs panel, click Purge Configuration.
2. Depending on your context, use the Enable purging of events or Enable purging of
jobs switch.
3. Specify the number of years, months, weeks, or days to retain the data. Events or jobs
that are older than the specified value will be purged. The maximum value is 99 years.
4. Click Save to start purging the HYCU database based on the specified value.
i Important This action cannot be undone. When your event or job data is
deleted, you cannot retrieve it.
After you enable purging of events and/or jobs, you can at any later time edit the purge
configuration or disable purging.
Report data can be presented as a table or as a chart. The following report chart types are
used to visualize the reports: a bar chart, a heatmap, a line chart, an area chart, or a scatter
chart.
Consideration
Keep in mind that your user group and user role determine what kind of report data you
can view and what report actions you can perform.
After you get familiar with the reports as described in “Getting started with reporting” on the
next page, you can continue as follows:
170
9 Performing daily tasks
n Note When scheduling the reports, you can also choose to send them by
email.
l Export and import reports. For details, see “Exporting and importing reports” on
page 175.
For a list of predefined reports, see “Predefined reports” below. For instructions on how to
create reports, see “Creating reports” on the next page.
Predefined reports
The predefined reports represented by the icon enable you to obtain reports on the key
aspects of your data protection environment such as data transfer, job status, the number
of backups, and the amount of protected data. These reports cannot be edited or deleted.
Entity compliance List of virtual and physical machines, applications, and shares that
status are compliant and non-compliant with backup requirements.
Hourly activities per List of assigned policies with the corresponding number of jobs
policy that were running during each of the last 24 hours.
Hourly activities per List of targets with the corresponding number of jobs that were
target* running during each of the last 24 hours.
171
9 Performing daily tasks
Protected data
Daily amount of protected data per target.
timeline per target*
Protected VM size List of protected virtual and physical machines and distribution of
per target * the corresponding protected data between targets.
Creating reports
If none of the predefined reports meets your reporting requirements, you can create a new
report and tailor it to your needs.
Prerequisite
You have the Administrator user role assigned.
Depending on whether you want to create a new report from scratch or edit an existing
report and save it as a new report, do the following:
Create a new report from 5. Specify the time range for the report. You can select one
scratch. of the predefined time ranges, or select Custom, and then
use the calendar to select a start date and an end date of
the time range.
6. Distribute the report tags for the collected data that you
want to include in your report between x-axis and y-axis
to determine how the collected data will be presented in
the report.
7. Click Save.
172
9 Performing daily tasks
Edit an existing report then click Edit. The Report Configuration dialog box
report. 2. Enter a new name for the report, and then make the
required modifications.
3. Click Save as.
You can later edit any of the created reports (click Edit and make the required
modifications) or delete the ones that you do not need anymore (click Delete). You
cannot edit or delete the predefined reports represented by the icon.
Viewing reports
You can view the reports on the current state of your data protection environment or the
saved reports that were generated either manually or automatically.
In the dialog box that opens, besides viewing the report data, you can also do the following:
l Switch between the reports.
l Download the report in the PDF, PNG, or CSV format. To do so, click Download, and
then select one of the available formats.
l For users with the Administrator user role assigned: If you view a report on the current state
of the data protection environment, you can save this version of the report by clicking
Generate. The saved report is added to the list of report versions.
173
9 Performing daily tasks
Generating reports
When you generate a report, you are actually saving a copy of the current version of the
selected report (a report version) for future reference.
Prerequisite
You have the Administrator user role assigned.
Procedure
1. In the Reports panel, from the list of reports, select the one that you want to generate.
n Note If none of the available reports meets your reporting requirements, you
can create a new report. For details, see “Creating reports” on page 172.
2. In the Detail view that appears at the bottom of the screen, click Generate. The
Generate Report Version dialog box opens.
3. Optional. Enter a description for the report.
4. Click Generate.
t Tip You can save a version of the selected report also by clicking Preview
followed by Generate.
The generated report is added to the list of report versions in the Detail view that appears at
the bottom of the screen when you select a corresponding report.
Scheduling reports
You can use scheduling to generate reports automatically at a particular time each day,
week, or month. You can view these reports in the web browser or schedule them to be
delivered by email.
Prerequisites
l You have the Administrator user role assigned.
l For sending reports by email: An SMTP server is configured. For details, see “Configuring
an SMTP server” on page 234.
Procedure
1. In the Reports panel, from the list of reports, select the one that you want to be
generated on a regular basis, and then click Scheduler. The Report Scheduler dialog
box opens.
174
9 Performing daily tasks
n Note If none of the available reports meets your reporting requirements, you
can create a new report. For details, see “Creating reports” on page 172.
2. In the Schedule date field, specify the date and the time of day when you want the
report generation to begin.
3. From the Interval drop-down menu, select how often you want the reports to be
generated (daily, weekly, or monthly).
4. Use the Send switch if you want to schedule the automatic delivery of the reports to
email recipients, and then do the following:
a. From the Report format drop-down menu, select a file format for your report (PDF,
PNG, or CSV).
b. In the Email address field, enter one or more email recipients that should receive
the reports. If you are entering more than one email address, make sure to press
the Spacebar after entering each one.
5. Click Save.
t Tip The reports that are generated automatically are marked by in the
Scheduled column of the Reports panel.
You can later do the following:
l Edit scheduling options of any of the scheduled reports. To do so, select the report,
click Scheduler, make the required modification, and then click Schedule.
l Unschedule any of the reports if you do not want them to be generated automatically
anymore. To do so, select the report, click Scheduler, and then click Unschedule.
i Important Your permissions determine what kind of reports you can view and
edit, and therefore also define a different level of access to the reports, which you
should consider before copying reports from one HYCU deployment to another.
Exporting reports
Procedure
1. In the Reports panel, from the list of all reports, select the one that you want to export,
and then click Export.
2. Click OK.
The selected report will be exported to a JSON file and saved to the download location on
your system.
175
9 Performing daily tasks
Importing reports
Procedure
1. In the Reports panel, click Import. The Import Report dialog box opens.
2. Browse your file system for a report that you want to import.
3. Enter a name for the report and, optionally, its description.
4. Click Import.
A new report will be added to the list of the reports.
You can view the following information about each restore point:
l Date and time when the restore point was created.
l Tiers:
o Backup: Available by default unless a backup is expired.
176
9 Performing daily tasks
Backup status For details, see “Viewing the backup status of entities” below.
Restore status t Tip If you double-click a progress bar, you are directed to the
Jobs panel where you can check details about the related job.
t Tip If there are too many items to be displayed on one page, you can move
between the pages by clicking and . You can also use to set the number of
items to be displayed per page.
Limitation
For virtual machines with attached volume groups: The Completed with errors backup status is
available only for virtual machines that have volume groups attached directly.
177
9 Performing daily tasks
Restore a
Backup status of the Restore VM Restore an Restore a
VM, a VG, or
entity files? application? file share?
vDisks?
Completed successfully h h h h
Completed with
h h ha h
warnings
Failed x x x x
Expired x x x x
Skippedf h h x N/A
a You cannot specify a point in time to which you want to restore data. This backup status
may occur because disk mapping failed or a virtual machine does not have an NIC, or, in
case of applications, at least one database log backup failed (whereas all other databases
are in a consistent state).
b Because not all virtual machine disk files were backed up successfully, the virtual machine
can be partially restored. It may not be possible to turn it on if one of the system disks was
not backed up.
c Because not all virtual machine disk files were backed up successfully, the individual files
can be partially restored (only the files that are displayed in the Restore Files dialog box).
d An application can be partially restored (only the databases that are displayed in the
The files whose backup was unsuccessful are listed in the Job Report in their corresponding
subtasks.
f Applicable only for backups of passive nodes of failover clusters with shared storage.
178
9 Performing daily tasks
Filtering data
HYCU provides you with two types of filters that you can apply—the main filter and the
detail filter. After you apply any of the filters, only data that matches the filter criteria is
displayed and you can easily find what you need.
n Note This type of filter is available in the Applications, Virtual Machines, Volume
Groups, Shares, Policies, Targets, Jobs, Events, and Self-Service panels.
Procedure
1. In the selected panel, click Main Filter. The Main view side panel opens.
2. Select your filter criteria.
3. Click Apply Filters.
See one of the following sections for the details about the available filtering options:
l “Filtering options in the Applications panel” on the next page
l “Filtering options in the Virtual Machines panel” on page 181
l “Filtering options in the Volume Groups panel” on page 182
l “Filtering options in the Shares panel” on page 183
l “Filtering options in the Policies panel” on page 184
l “Filtering options in the Targets panel” on page 184
l “Filtering options in the Jobs panel” on page 184
l “Filtering options in the Events panel” on page 185
l “Filtering options in the Self-Service panel” on page 185
n Note This type of filter is available in the Applications, Virtual Machines, Volume
Groups, and Shares panels.
Procedure
1. From the list of all items in the selected panel, select the item that you want to filter by
restore and backup data.
179
9 Performing daily tasks
2. In the Detail view that appears at the bottom of the screen, click Detail Filter. The
Detail view side panel opens.
3. Select your filter criteria.
4. Click Apply Filters.
See one of the following sections for the details about the available filtering options:
l “Filtering options in the Applications panel” below
l “Filtering options in the Virtual Machines panel” on the next page
l “Filtering options in the Volume Groups panel” on page 182
l “Filtering options in the Shares panel” on page 183
t Tip If there are too many filtered items to be displayed on one page, you can move
between the pages by clicking and . You can also use to set the number of
filtered items to be displayed per page.
Search Enter a search term. You can filter by the name of the application.
From the drop-down menu, select the sources that host the virtual
Sources machines on which the applications are running or the physical
machines on which the applications are running.
From the drop-down menu, select the owners that are assigned to
Owners the virtual or physical machines on which the applications are
running.
Application types From the drop-down menu, select the application types.
Compliance Select one or more check boxes to filter by the compliance status.
Protection Select one or more check boxes to filter by the protection status.
180
9 Performing daily tasks
discovery status:
l Success: One or more applications are discovered.
l Failure: No applications were discovered.
l Warning: Application discovery failed because the virtual or
physical machine is offline or not reachable.
In the Detail view side panel, select one or more filtering options:
Restore point date Select the time to filter by when the restore points were created.
Backup status Select one or more check boxes to filter by the backup status.
Compliance Select one or more check boxes to filter by the compliance status.
From the drop-down menu, select the sources that host the virtual
Sources
machines or the physical machines.
From the drop-down menu, select the credentials for the virtual or
Credential groups
physical machines.
181
9 Performing daily tasks
From the drop-down menu, select the owners that are assigned to
Owners
the virtual or physical machines.
Compliance Select one or more check boxes to filter by the compliance status.
Protection Select one or more check boxes to filter by the protection status.
Disaster recovery
Select the check box to filter by the migration/DR readiness status.
readiness
In the Detail view side panel, select one or more filtering options:
Restore point date Select the time to filter by when the restore points were created.
Backup status Select one or more check boxes to filter by the backup status.
Compliance Select one or more check boxes to filter by the compliance status.
From the drop-down menu, select the sources that host the
Sources
volume groups.
182
9 Performing daily tasks
From the drop-down menu, select the owners that are assigned to
Owners
the volume groups.
Compliance Select one or more check boxes to filter by the compliance status.
Protection Select one or more check boxes to filter by the protection status.
In the Detail view side panel, select one or more filtering options:
Restore point date Select the time to filter by when the restore points were created.
Backup status Select one or more check boxes to filter by the backup status.
Compliance Select one or more check boxes to filter by the compliance status.
Search Enter a search term. You can filter by the file share name.
From the drop-down menu, select the file servers that host the file
File servers
shares.
From the drop-down menu, select the protocol of the file shares
Protocol
(SMB or NFS).
From the drop-down menu, select the owners that are assigned to
Owners
the file shares.
183
9 Performing daily tasks
Compliance Select one or more check boxes to filter by the compliance status.
In the Detail view side panel, select one or more filtering options:
Restore point date Select the time to filter by when the restore points were created.
Backup status Select one or more check boxes to filter by the backup status.
Compliance Select one or more check boxes to filter by the compliance status.
Search Enter a search term. You can filter by the name of the policy.
Compliance Select one or more check boxes to filter by the compliance status.
Search Enter a search term. You can filter by the name of the target.
Target type Select one or more check boxes to filter by the target type.
Health Select one or more check boxes to filter by the health of the target.
Enter a search term. You can filter by the job name or the job
Search
UUID.
Status Select one or more check boxes to filter by the status of the job.
184
9 Performing daily tasks
Specify a time range to limit your search for jobs. You can select
one of the predefined time ranges (Last 1 hour, Last 24 hours, or
Time range
Last week), or use the calendar to select a start date and hour and
an end date and hour of the time range for jobs to be displayed.
Enter a text string to filter the list to include only the messages with
Message
the specified string.
Enter a text string to filter the list to include only the categories with
Category
the specified string.
Status Select one or more check boxes to filter by the status of the event.
Specify a time range to limit your search for events. You can select
one of the predefined time ranges (Last 1 hour, Last 24 hours, or
Time range
Last week), or use the calendar to select a start date and hour and
an end date and hour of the time range for events to be displayed.
Consideration
If you want to export only specific data, click Main Filter, select your filter criteria based
on what kind of data you want to export to a file, and then click Apply Filters.
185
9 Performing daily tasks
Procedure
1. Navigate to the panel whose data you want to export.
2. Click Export, and then, from the drop-down menu, select one of the following
options:
Option Description
Export to JSON
Exports the current table page to a JSON file.
(Current)
Export to CSV
Exports the current table page to a CSV file.
(Current)
Managing targets
If you have the proper permissions, you can view target information, edit target properties,
activate or deactivate a target, or delete a target if you do not want to use it for storing
protected data anymore.
Target
Description
information
186
9 Performing daily tasks
Target
Description
information
Percentage of the specified target size that is already used for storing
Utilization
protected data.
To open the Detail view where you can find the target summary and more details about the
target, click the desired target.
187
9 Performing daily tasks
t Tip To minimize the Detail view, click Minimize or press Spacebar. To return it
to its original size, click Maximize or press Spacebar.
Editing a target
C Caution Making any changes to the target location may result in data loss.
Therefore, before specifying a new target location, make sure you have already moved
the existing backup data to this new location on the same or a different server.
Considerations
l If you change the target settings in the policy assigned to the HYCU backup controller,
make sure to update the note of the target's configuration.
l For QStar tape targets: If the status of the Integral Volume set is offline, the
corresponding tape target is automatically deactivated in HYCU. When the Integral
Volume set is remounted in QStar, make sure to activate the target. For details on how
to do this, see “Activating or deactivating a target” on the next page.
Procedure
1. In the Targets panel, select the target that you want to edit, and then click Edit. The
Edit Target dialog box appears.
2. Edit the selected target as required. For detailed information about target properties,
see “Setting up targets” on page 37.
i Important If you want to change the NFS or SMB server name, IP address, or
path to the shared folder, or the portal IP address of an iSCSI target, see “Detaching
storage and modifying target data” below.
3. Click Save.
Procedure
1. Deactivate the target and detach the storage from the HYCU backup controller as
described in “Activating or deactivating a target” on the next page.
2. Make the required modifications first on the server where the target is located, and
then also in the HYCU web user interface as described in “Editing a target” above.
3. Activate the target as described in “Activating or deactivating a target” on the next page.
188
9 Performing daily tasks
3. For NFS, SMB, and iSCSI targets: If you are deactivating the target to change the NFS or
SMB server name, IP address, or path to the shared folder, or the portal IP address of
an iSCSI target, enable the Detach storage switch. For details on detaching storage
from the HYCU backup controller, see “Detaching storage and modifying target data” on
the previous page.
4. For target deactivation: Click Yes to confirm that you want to deactivate the selected
target.
If you deactivate a target, this target will not be used for backup and restore operations
anymore.
Prerequisites
l The size of the target has been increased on the iSCSI server.
l No backup or restore job is in progress on the selected target.
l No other maintenance task is already running on the selected target (such as editing
the target and updating the iSCSI Initiator secret or resetting mutual CHAP
authentication sessions for the targets with CHAP authentication enabled).
l No other size increase of the selected target has already been started.
Procedure
1. In the Targets panel, select the target whose size you want to increase, and then click
Extend.
2. Click Yes to confirm that you want to increase the size of the selected target.
You will receive a message that indicates whether increasing the size of the iSCSI target
completed successfully.
Deleting a target
You can delete a target if it does not contain protected data. After deleting a target, no
backup or restore actions including this target are possible anymore.
189
9 Performing daily tasks
Procedure
1. In the Targets panel, select the target that you want to delete, and then click Delete.
n Note If the target that you want to delete is used for archiving, make sure that
no data archive with the specified archive target is used by any policy.
2. Click Yes to confirm that you want to delete the selected target.
Managing policies
If you have the proper permissions, you can view policy information, edit policy properties,
or delete a policy if you do not want to use it for protecting data anymore.
Consideration
The values for the backup RPO, RTO, and retention period that are defined in a policy are
rounded to days, weeks, months, or years for display, but are stored and used internally as
defined. For example, 30 days are rounded to one month in the HYCU web user interface.
Policy
Description
information
Total number of virtual and physical machines that have the particular
VM Count
policy assigned to them.
App Count Total number of applications that have the particular policy assigned to
190
9 Performing daily tasks
Policy
Description
information
them.
Description of the policy (how often backup and restore jobs are
Description
performed).
To open the Detail view where you can find the policy summary and more details about the
policy, click the desired policy.
t Tip To minimize the Detail view, click Minimize or press Spacebar. To return it
to its original size, click Maximize or press Spacebar.
Editing a policy
Consideration
If you edit a policy in such a way that you enable the Copy option, the next backup of the
virtual machines and volume groups to which this policy is assigned will be a full backup.
Procedure
1. In the Policies panel, select the policy that you want to edit, and then click Edit. The
Edit Policy dialog box appears.
2. Edit the selected policy as required. For detailed information about policy properties,
see “Creating a policy” on page 59.
i Important For vSphere environments: You cannot edit the policy that is
assigned to the vSphere virtual machines or applications in such a way that you
enable the Backup from replica or Fast restore option. These options are not
available for vSphere virtual machines or applications.
3. Click Save.
Deleting a policy
Considerations
l A policy that is assigned to one or more entities for which backups are scheduled
cannot be deleted. If you want to delete such a policy, you must first abort the
scheduled backups. For details on how to abort queued jobs, see “Managing HYCU
jobs” on page 165.
l If you delete a policy that is assigned to one or more entities, keep in mind that no
further backups will be performed for these entities.
191
9 Performing daily tasks
Procedure
1. In the Policies panel, select the policy that you want to delete, and then click Delete.
2. Click Yes to confirm that you want to delete the selected policy.
Prerequisite
Only if backing up a volume group manually. Make sure a policy is assigned directly to the
volume group. If the policy is assigned only to the virtual machine to which the volume
group is attached, performing a manual backup for the selected volume group is not
possible.
Consideration
You can prevent your manual backups from interfering with the scheduled backups
determined by the RPO specified in the policy. To do so, set the
exclude.manually.run.backups.regarding.rpo configuration setting to true. This is
especially important if you define backup windows because performing a manual backup
can prevent the backup scheduled in the backup window from starting, which can result in
data not being protected until the next backup window or the next manual backup. For
details on how to customize HYCU configuration settings, see “Customizing HYCU
configuration settings” on page 303.
Procedure
1. In the Virtual Machines, Applications, Shares, or Volume Groups panel, select which
entities you want to back up.
2. Click Backup to perform the backup of the selected entities.
3. Use the Force full backup switch if you want to perform a full backup. Otherwise,
HYCU will perform a full or incremental backup based on the settings defined in your
policy.
4. Click Yes to confirm that you want to start the manual backup.
t Tip In the navigation pane, click Jobs to check the overall progress of the
backup.
192
9 Performing daily tasks
validation policy. For details on how to validate the virtual machine backup by creating a
virtual machine clone, see “Validating the virtual machine backup” on page 97.
Prerequisites
l If you plan to select a vSphere storage container for the virtual machine copy, the latest
version of VMware Tools must be installed on the virtual machine.
l Only if you plan to specify the Advanced validation type.
o Credentials must be assigned to the virtual machine. For prerequisites, limitations,
considerations, and instructions, see “Enabling access to application data” on
page 113.
o A network card must be added to the virtual machine.
Limitation
Performing the backup validation for the HYCU backup controller is not supported.
Considerations
l Network conflicts may occur during the backup validation if the virtual machine is
configured with a static IP address, resulting in unreliable backup validation data.
l Only if you plan to specify the Advanced validation type when performing the backup
validation for a Windows virtual machine. Checking for disk errors may fail in some cases,
which does not mean that your virtual machine is corrupted. However, it is highly
recommended that you check the status of such a virtual machine manually.
l After the backup validation is performed, consider the following:
o You can view the backup validation status of a virtual machine in the Validation
column in the Virtual Machines panel (represented by an icon). By pausing on the
icon, you can also see which validation policy is assigned to the virtual machine.
o The Exclude policy is automatically assigned to the cloned virtual machine.
Procedure
1. In the Virtual Machines panel, select one or more virtual machines for which you want
the backup validation to be performed.
t Tip You can update the list of virtual machines by clicking Synchronize. To
narrow down the list of displayed virtual machines, you can use the filtering options
described in “Filtering data” on page 179.
193
9 Performing daily tasks
3. Click New.
4. Enter a name for your validation policy and, optionally, its description.
5. Add any of the preferred backup validation options to the list of the enabled options by
clicking it:
Option Description
6. Specify the hour and the minute when the backup validation job should start.
7. Provide information on when the backup validation should be performed.
8. From the Storage container drop-down menu, select where you want to clone the
virtual machine for which you are performing the backup validation.
9. From the Restore from drop-down menu, select which tier you want to use for the
backup validation. Your restore point can contain one or more tiers among which you
can select:
l Automatic
l Backup
l Copy
l Archive
n Note If you select Automatic, the tier for the backup validation is by default
selected in the following priority order: Backup > Copy > Archive. This means that
HYCU will always use the first available tier in the specified order for the backup
validation. However, you can at any time change this default behavior by
customizing the backup.validation.restore.source.priority.order
configuration setting in the HYCU config.properties file and adjusting the tier
order to your data protection needs. For details on how to customize HYCU
configuration settings, see “Customizing HYCU configuration settings” on page 303.
10. From the Keep VM after validation drop-down menu, depending on whether you want
to keep the virtual machine after the backup validation is performed, select one of the
following options:
Option Description
194
9 Performing daily tasks
Option Description
On validation The virtual machine will be kept after the backup validation is
error performed only if a validation error occurs during the validation.
11. From the Validation type drop-down menu, select one of the following types:
Validation
Description
type
12. Only if you selected the Advanced validation type. Do the following:
a. Enable the Run custom script switch if you want the custom script to be run on the
virtual machine as part of the backup validation process, and then make sure that
the proper path to the script is specified.
n Note The script returns an exit code of 0 for success and any other value
for failure.
b. From the Network drop-down menu, select the network for the virtual machine.
13. Click Save.
14. Click Assign.
You can later edit any of the existing validation policies (click Edit and make the required
modifications) or delete the ones that you do not need anymore (click Delete).
Expiring backups
HYCU expires backups automatically according to the retention period that is set for the
backup data in the policy. However, if there is a restore point (a backup) that you do not
195
9 Performing daily tasks
want to use for restoring data anymore, you can at any time expire it manually.
A restore point represents data that was backed up at a specified point in time. Your restore
point can contain one or more tiers—Backup, Copy, Snapshot, and Archive—that can be
marked as expired also individually.
t Tip You can check the backup, copy, snapshot, and/or archive expiration time in
the Detail view of the Virtual Machines, Applications, Shares panel, or Volume Groups
panel. For details, see “Viewing entity details” on page 176.
Considerations
l If the most recent restore point is marked as expired, the next backup will be a full
backup.
l When a restore point is marked as expired, any subsequent incremental backups
within the same backup chain will also be marked as expired unless the status of the
selected restore point is Failed. In this case, only the selected restore point is expired
and not the whole backup chain.
l The Backup and Copy tiers are always expired together.
Considerations
l Changing the retention period in the policy does not affect existing backups.
l HYCU automatically expires the last backup chain of an unprotected entity (the one
from which a policy was unassigned or whose policy was deleted), whereas the last
backup chain of a protected entity is never expired automatically.
196
9 Performing daily tasks
Considerations
l An expire action cannot be undone.
l If you mark Backup and Copy for expiration, the associated snapshot is also expired, if
there is one.
l Only if expiring the backup for a volume group that has been backed up both as part of the
virtual machine backup and by assigning a policy directly to it. Before expiring the backup,
make sure that the backup data is not being used by any virtual machine to which the
volume group might be attached.
Depending on the entity for which you want to expire old backups, access one of the
following panels:
l
Accessing the Virtual Machines panel
To access the Virtual Machines panel, in the navigation pane, click Virtual
Machines.
l
Accessing the Applications panel
To access the Applications panel, in the navigation pane, click Applications.
l
Accessing the Shares panel
To access the Shares panel, in the navigation pane, click Shares.
l
Accessing the Volume Groups panel
To access the Volume Groups panel, in the navigation pane, click Volume Groups.
Procedure
1. In the Virtual Machines, Applications, Shares, or Volume Groups panel, select the entity
for which you want to expire old backups.
2. In the Detail view that appears at the bottom of the screen, select the restore point that
you want to mark as expired.
3. Click Expire. The Expire dialog box appears.
4. Select the tiers that you want to mark as expired:
l Backup and Copy
l Snapshot
l Archive
The tiers that are available for expiration are based on the options that you set in your
policy. By selecting all the tiers, you mark the whole restore point as expired.
5. Click Yes to confirm that you want the selected tiers to be marked as expired.
n Note If you mark the whole restore point as expired, the backup status is
shown as Expired (). This indicates that the restore point cannot be used for
restoring data anymore.
The HYCU cleaning process removes the expired backups from the target.
197
9 Performing daily tasks
Prerequisites
l You have the Administrator, Backup and Restore Operator, or Backup Operator user
role assigned.
l The Archiving option is specified in the assigned policy and a data archive is created.
Consideration
Retention time for archives is calculated from the date and time when the restore point for
the entity whose data you are archiving was created.
Depending on the type of data that you want to archive, access one of the following panels:
l
Accessing the Applications panel
To access the Applications panel, in the navigation pane, click Applications.
l
Accessing the Virtual Machines panel
To access the Virtual Machines panel, in the navigation pane, click Virtual
Machines.
l
Accessing the Shares panel
To access the Shares panel, in the navigation pane, click Shares.
l
Accessing the Volume Groups panel
To access the Volume Groups panel, in the navigation pane, click Volume Groups.
Procedure
1. In the Applications, Virtual Machines, Shares, or Volume Groups panel, click the entity
whose data you want to archive.
2. In the Detail view that appears at the bottom of the screen, select the desired restore
point.
n Note The Detail view appears only if you click an entity. Selecting the check box
before the name of the entity will not open the Detail view.
198
9 Performing daily tasks
Recreating snapshots
If you plan to restore individual files from a snapshot (and not directly from a target) and no
snapshot is available for the selected virtual machine restore point, you can recreate it
manually.
Procedure
1. In the Virtual Machines panel, select the virtual machine whose snapshot you want to
recreate.
2. In the Detail view that appears at the bottom of the screen, select the desired restore
point.
n Note The Detail view appears only if you click a virtual machine. Selecting the
check box before the name of the virtual machine will not open the Detail view.
5. From the Restore from drop-down menu, select which tier you want to use for
recreating the snapshot. Your restore point can contain one or more tiers among which
you can select:
l Automatic: Ensures the fastest snapshot creation.
l Backup
l Copy
l Archive
6. Click Recreate.
199
9 Performing daily tasks
i Important Wait a moment for the virtual machine to shut down completely.
5. Click Update, and then, in the Update VM dialog box, modify the configuration as
required, and click Save.
6. Click Power on to turn on the virtual machine.
200
Chapter 10
Managing users
The HYCU user management system provides security mechanisms to help prevent
unauthorized users from accessing protected data. Only users that are given specific rights
have access to the data protection environment. These users can be authenticated either by
HYCU (HYCU users) or through an Active Directory server (AD users and AD groups).
Each user that logs on to HYCU must belong to one of the HYCU groups—an infrastructure
group or a self-service group—and have a user role assigned.
For details on HYCU groups and user roles, see “HYCU groups” below and “User roles” on
the next page.
n Note User management concepts and procedures apply to both virtual and
physical machines.
HYCU groups
For a consolidated user management experience, HYCU provides two types of groups to
which users can belong.
Group Description
201
10 Managing users
You can manage users only if you have an Administrator role assigned. However, keep in
mind that the scope of user management actions that you can perform differs depending
whether you belong to the infrastructure or self-service group. As an infrastructure group
administrator, you can manage users and groups throughout the whole data protection
environment, whereas as a self-service administrator, you can manage only the group you
belong to. The following diagram shows which user-related actions you can perform:
Figure 10–1: User management actions performed by the infrastructure and self-service
group administrators
Depending on the HYCU group to which you belong and the assigned user role, you can
perform only specific actions in the data protection environment. For details on user roles,
see “User roles” below.
User roles
Each user in a group has an assigned role that determines the scope of actions the user can
perform in the data protection environment. This means that access to data and
information within the data protection environment is limited based on the role that the
user has assigned. If a user is a member of multiple groups, this user can have different
roles assigned in different groups, depending on the business needs, and can switch
between these groups while being logged on to HYCU.
Depending on the group to which a user belongs, the user can perform the following
actions:
202
10 Managing users
203
10 Managing users
While setting up a user environment, you can tailor it to the user's needs by performing one
or more of the following tasks:
204
10 Managing users
Creating a user
Prerequisites
l For using Active Directory for authentication: Active Directory authentication is configured.
For details on how to do this, see “Configuring Active Directory authentication” on
page 215.
l For using two-factor authentication: An appropriate authenticator must be set up.
Depending on the authentication method:
o A time-based one-time password (OTP) authentication application, such as Google
Authenticator on your mobile phone.
o A FIDO-compatible authenticator, such as a hardware key, fingerprint reader, or
similar.
l For integrating HYCU with identity providers: In an identity provider environment, HYCU
must be assigned as an application to users for whom you want to enable signing in to
HYCU by using the identity provider. For detailed instructions on how to integrate HYCU
with identity providers, see “Integrating HYCU with identity providers” on page 220.
Limitation
You cannot add the Active Directory primary group (usually the Domain Users group) as an
AD group.
Procedure
1. In the Self-Service panel, click Manage Users, and then click New. The Manage
Users dialog box opens.
2. Enter a user name if you are adding a HYCU user or an AD user, or a common name if
you are adding an AD group.
205
10 Managing users
i Important When entering a name, make sure it complies with the SAM
account name limitations—name length may not exceed 20 characters and contain
any of the following characters: "/ \ [ ] : ; | = , + * ? < >. In addition, HYCU does not
allow the at sign (@) in the name.
If your environment requires it, these limitations can be overridden by editing the
ad.username.filter.regex configuration setting. However, this is not supported
and could cause authentication issues. For details on how to customize HYCU
configuration settings, see “Customizing HYCU configuration settings” on page 303.
3. From the Language drop-down menu, select the preferred language for the user.
4. From the Authentication type drop-down menu, select one of the following
authentication types:
Authentication
Instructions
type
HYCU address.
5. Only if you are adding a HYCU user, an AD user, or an AD Group. Use the Enable two-factor
authentication switch if you want to enable two-factor authentication for the user, and
then select one of the following two-factor authentication methods:
206
10 Managing users
7. Click Save, and then click Close. The user is added to the list of all users.
You can later do the following:
l Edit any of the existing HYCU or identity provider users by clicking Edit and making
the required modifications. Keep in mind that the built-in user, AD users, and
AD groups cannot be edited.
l Enable or disable specific users from logging on to HYCU. For details, see “Activating or
deactivating a user” on page 211.
l Delete any of the existing users by clicking Delete. Keep in mind that the built-in user
cannot be deleted.
Considerations
l You can add a user to multiple groups in which the user can have different user roles
assigned. For details on user roles, see “User roles” on page 202.
l If an AD user has multiple user roles assigned based on membership in several
AD groups, the user acquires the role with the highest privilege level. User roles are
prioritized in the following order: Administrator > Backup and Restore Operator >
Restore Operator > Backup Operator > Viewer. However, keep in mind that a role
assigned to an AD user independently of an AD group always takes precedence over a
role within an AD group.
207
10 Managing users
Procedure
1. In the Self-Service panel, in the Detail view, select the group to which you want to add a
user.
2. Click Add to Group. The Add User to Group dialog box opens.
n Note You can add the user to the infrastructure group that is created by
default or a self-service group that you must create yourself.
i Important For AD user and AD group: Enter a user name in one of the following
formats: user@domain or domain\name.
4. From the User role drop-down menu, select a role that you want to assign to the user
(Administrator, Backup and Restore Operator, Restore Operator, Backup
Operator, or Viewer).
5. Click Add User.
Depending on the needs of a specific data protection environment, you can at any time
remove a user from a group by selecting the user that you want to remove and clicking
Remove from Group.
208
10 Managing users
Setting ownership
By setting ownership of virtual machines, file shares, and volume groups, you enable
specific groups to protect only the assigned virtual machines, file shares, and volume
groups. Depending on the entity to which you want to assign an owner, see one of the
following sections:
l “Setting ownership of virtual machines” below
l “Setting ownership of file shares” below
l “Setting ownership of volume groups” on the next page
Consideration
When changing ownership of virtual machines, you can choose whether you want data
protected by a specific owner to be kept or deleted. If you choose to keep data protected by
the specific owner, such virtual machines will be kept in HYCU with the PROTECTED_
DELETED status. Restoring these virtual machines by using the Restore VM option is
possible only if they are deleted from the source before the restore is performed.
Procedure
1. In the Virtual Machines panel, select the virtual machines to which you want to assign
an owner, and then click Owner.
2. From the list of groups, select which group you want to assign as the owner of the
selected virtual machines, and then click Assign.
Depending on the needs of a specific data protection environment, you can at any time
remove the owner from the virtual machines by selecting such virtual machines, and then
clicking Owner followed by Unassign.
Consideration
When changing ownership of file shares, you can choose whether you want data protected
by specific owners to be kept or deleted. If you choose to keep data protected by the
specific owner, such file shares will be kept in HYCU with the PROTECTED_DELETED status.
209
10 Managing users
Procedure
1. In the Shares panel, select file shares to which you want to assign an owner, and then
click Owner.
2. From the list of groups, select which group you want to assign as an owner of the
selected file shares, and then click Assign.
i Important If any backup or restore job for a file share is already in progress,
or a scheduled backup task is in the queue, you cannot assign a new group to this
file share.
Depending on the needs of a specific data protection environment, you can at any time
remove an owner from the file shares by selecting the file shares from which you want to
remove the owner, and then clicking Owner followed by Unassign.
Consideration
When changing ownership of volume groups, you can choose whether you want data
protected by specific owners to be kept or deleted. If you choose to keep data protected by
the specific owner, such volume groups will be kept in HYCU with the PROTECTED_DELETED
status.
Procedure
1. In the Volume Groups panel, select volume groups to which you want to assign an
owner, and then click Owner.
2. From the list of groups, select which group you want to assign as an owner of the
selected volume groups, and then click Assign.
Depending on the needs of a specific data protection environment, you can at any time
remove an owner from the volume groups by selecting the volume groups from which you
want to remove the owner, and then clicking Owner followed by Unassign.
210
10 Managing users
activating or deactivating a self-service group, you enable or disable all users belonging to
the specific self-service group from logging on to HYCU as members of that group.
Procedure
1. In the Self-Service panel, click Manage Users.
2. From the list of all users, select the one whose status you want to change.
3. Depending on the status of the user, do one of the following:
l If the status of the selected user is Inactive and you want to activate it, click
Activate.
l If the status of the selected user is Active and you want to deactivate it, click
Deactivate.
Procedure
1. In the Self-Service panel, from the list of self-service groups, select the one whose status
you want to change.
2. Depending on the status of the self-service group, do one of the following:
l If the status of the selected self-service group is Inactive and you want to activate it,
click Activate.
l If the status of the selected self-service group is Active and you want to deactivate it,
click Deactivate.
n Note If a user is a member of several self-service groups and at least one of these
groups has the Active status, the user is automatically switched to it. If there is more
than one group with the Active status to which the user belongs, the user is
automatically switched to the one that was created first.
Procedure
1. Click the group under which you are currently logged on to HYCU at the upper right of
the screen.
211
10 Managing users
Figure 10–2: Example of a self-service group, HYCU_group, under which a user, HYCU_
group_member, is logged on to HYCU
2. From the list of all groups to which you belong, select the one to which you want to
switch.
t Tip The group under which you are currently logged on to HYCU has next to
it.
3. Click Switch.
You are automatically switched to the group you selected.
Consideration
As a user with the Administrator role assigned, you can edit other users' information
through the Self-Service panel. For details, see “Creating a user” on page 205.
Procedure
1. In the Name field, specify a new name.
2. In the Email field, enter the email address that you want to be associated with your user
profile.
3. From the Language drop-down menu, select the preferred language.
4. Optional. Enable two-factor authentication by selecting Enable two-factor
authentication. Select the two-factor authentication method:
l Time-based one-time password
This option enables the use of a time-based one-time password (OTP) generated by
an OTP application.
l FIDO
This option enables the use of an authenticator complying with FIDO protocols
(FIDO authenticator).
5. Click Save.
6. Only if you enabled two-factor authentication. Perform the initial two-factor authentication
212
10 Managing users
setup:
l For time-based one-time password: The Configure Two-Factor Authentication dialog
box is displayed. Do the following:
a. Scan the QR code with an appropriate OTP application (for example Google
Authenticator on a mobile phone) or alternatively enter the OTP Backup Code
in the application manually.
b. In the Authentication Code field, enter the generated six digit code, and then
click Confirm to finish the setup process.
l For FIDO: The FIDO Authenticators dialog box is displayed. Do the following:
a. Follow the wizard to register the authenticator (for example a security key or
Windows Hello with a fingerprint reader). The process depends on the type of
authenticator you select and the operating system version.
b. Enter a name for the authenticator, and then click Register.
213
Chapter 11
Administering
After you deploy HYCU, you can perform various administration tasks through the
Administration menu to customize HYCU for your data protection environment.
I want to... Procedure
214
11 Administering
If for whatever reason you decide that you no longer want to use HYCU for protecting your
data, you can easily remove it from your system. For details, see “Removing HYCU” on
page 254.
Prerequisite
For using LDAPS for user authentication: LDAPS authentication is set up. For details, see
“Setting up LDAPS authentication” on page 263.
Procedure
1. In the Active Directory dialog box, click New. The New dialog box appears.
2. In the Name field, specify a name for the Active Directory.
3. In the Domain field, enter the FQDN or domain alias name of the Active Directory. If you
plan to use AD groups, it is mandatory to enter the FQDN.
Example
If you enter mycompany.com as the FQDN and mc as the alias domain name, the user
will be able to log on to HYCU with <Username>@mycompany.com or mc\<Username>.
You can enter more than one FQDN or domain alias name. In this case, press the
Spacebar after entering each one.
4. In the Provider URL field, enter the URL of the corresponding LDAP server in one of the
following formats:
l ldap://<LDAPServerHostnameorIPAddress>:<Port>
When using the LDAP protocol, the default port is 389. Entering the port is optional
if the default value is used.
l Only if LDAPS authentication is set up. ldaps://<LDAPServerHostname>:<Port>
i Important Make sure that the LDAP server hostname matches the DNS
215
11 Administering
entry specified in the Subject Alternative Name (SAN) extension of the LDAP
server's certificate. Otherwise, connection to the LDAP server will fail.
When using the LDAPS protocol, the default port is 636. Entering the port is
optional if the default value is used.
You can enter more than one URL. In this case, press the Spacebar after entering each
one.
5. Only if you plan to enable certificate authentication. Enable the Use service account
option, and then enter the user name and password of the service account that HYCU
will use to log on to the Active Directory and authorize users.
6. Click Save.
You can also edit any of the existing Active Directories (click Edit and make the required
modifications) or delete the ones that you do not need anymore (click Delete).
Prerequisites
l At least one Active Directory with a configured service account is added to HYCU.
l A CA-signed certificate is imported to HYCU. For details on how to do this, see
“Importing a custom certificate” on page 236.
Procedure
1. In the Active Directory dialog box, use the Enable certificate authentication switch if
you want to enable certificate authentication.
2. From the CA certificate drop-down menu, select the CA-signed certificate for verifying
the client certificate.
216
11 Administering
l Migrating data protected with HYCU Data Protection as a Service for Google Cloud
(HYCU for Google Cloud) or HYCU Data Protection as a Service for Azure (HYCU for
Azure) from cloud to the on-premises environment.
l Performing disaster recovery of data to cloud in the event of a disaster.
l Monitoring the HYCU for Google Cloud and HYCU for Azure data protection
environments in HYCU Manager.
Consideration
Migrating virtual machines across different infrastructures, performing disaster recovery of
data to cloud, and monitoring cloud data protection environments are supported only if
you own a HYCU Protégé license and have an active subscription for HYCU for Google
Cloud or HYCU for Azure.
Depending on whether your data is protected with HYCU for Google Cloud or HYCU for
Azure, add one or more cloud accounts to HYCU:
i Important You must always add a dedicated service account that you have
created yourself to HYCU.
Store data to a Google Cloud An account that has access to the buckets where you
target. want to store your backup data.
Perform disaster recovery of An account that is imported to HYCU for Google Cloud
217
11 Administering
Prerequisites
l The service account is configured in Google Cloud.
l The following APIs are enabled on the Google Cloud project on which the service
account was created:
o Cloud Resource Manager API
o Compute Engine API
o Cloud Storage API
o Identity and Access Management API
Procedure
1. In the Cloud Accounts dialog box, click New. The Select Cloud dialog box appears.
2. Select Add Google Cloud service account, and then click Next. The Google Cloud
Authentication dialog box appears.
3. Browse for the JSON file with the service account information. In the Service account
authentication field, the file name is displayed.
4. In the Name field, you can change the account service name.
5. Click Upload.
After you are notified about a successful service account upload, its name appears in
the Cloud Accounts dialog.
6. Click Close.
218
11 Administering
You can later edit any of the existing cloud accounts (click Edit and make the required
modifications) or delete the ones that you do not need anymore (click Delete). Keep in
mind that you cannot delete a cloud account in the following cases:
l A Google Cloud target uses this account.
l A protection set that is monitored in HYCU Manager uses this account.
i Important You must always add a dedicated service principal that you have
created yourself to HYCU and not use the default one that HYCU for Azure automatically
creates for you when you start using the service.
The role that must be assigned to the service principal depends on what data protection
tasks you want to perform:
Procedure
1. In the Cloud Accounts dialog box, click New. The Select Cloud dialog box appears.
2. Select Add Azure service principal, and then click Next. The Azure Authentication
dialog box appears.
3. In the Name field, enter the name for your service principal.
219
11 Administering
220
11 Administering
When integrating HYCU with an identity provider, you must complete the following tasks:
Task Instructions
Consideration
To increase the security of user accounts further, you can also configure multi-factor
authentication within the third-party identity providers. For instructions on how to do this,
see the respective identity provider documentation.
Procedure
1. In the Identity Providers dialog box, click New. A new dialog box opens.
2. In the General section, do the following:
a. Enter a name for the identity provider.
b. From the Type drop-down menu, select one of the following types of identity
providers:
l Google
l Microsoft
221
11 Administering
l Okta
l OpenID Connect IdP
c. In the Client ID field, enter the application ID that is generated by the identity
provider.
d. In the Secret ID, enter the application secret that is associated with the client ID and
generated by the identity provider.
3. In the Endpoints section, depending on the type of the selected identity provider, do
the following:
Identity
Instructions
provider type
In the Redirect URI field, enter the URL to which the user will be
redirected after authentication. The format is as follows:
https://<ServerName>:8443
For example:
https://hycu.example.com:8443
In the Issuer field, enter the URL of the issuer of the identity
Okta
provider.
a. In the Issuer field, enter the URL of the issuer of the identity
provider.
b. In the Authorization endpoint field, enter the authorization
endpoint of the identity provider.
c. In the Token endpoint field, enter the token endpoint of the
OpenID identity provider.
Connect IdP d. In the JWKS endpoint field, enter the JSON web key set endpoint
of the identity provider.
e. Optional. In the UserInfo endpoint field, enter the UserInfo
endpoint of the identity provider.
4. Click Save.
You can later do the following:
222
11 Administering
l Edit information about any of the existing identity providers by clicking Edit and
making the required modifications.
n Note The Redirect URI field shows to which URL the user will be redirected
after authentication (for example, https://hycu.example.com:8443). The
prepopulated host name is the host name of the HYCU backup controller to which
you are authenticating user access.
Prerequisites
l For creating a HYCU instance on a Nutanix AHV cluster: The HYCU virtual appliance image is
present on the Nutanix cluster in the following format:
hycu-<Version>-<Revision>
223
11 Administering
Procedure
1. In the Instances dialog box, click New. The New dialog box opens.
2. In the General section, enter a name for the HYCU instance.
3. In the Network configuration section, do the following:
a. Enter a host name for the HYCU instance.
i Important Make sure that you enter a unique host name for each HYCU
instance that you create and follow these rules:
l The host name contains only letters, numbers, hyphens (-), and periods.
The maximum number of characters is 253 and at least one of the
characters is a letter.
l The maximum number of characters in each host name segment is 63. A
host name segment cannot begin or end with a hyphen.
l The top-level domain cannot begin or end with a number.
b. Use the DHCP switch if you want a dynamic IP address to be assigned to the HYCU
instance. Otherwise, specify the IP address, the netmask, and the gateway.
4. In the Deployment section, do the following:
a. From the Destination drop-down menu, select a Nutanix cluster on which your
HYCU instance will reside.
b. From the Network drop-down menu, select a VLAN.
c. From the Datastore drop-down menu, select a datastore.
t Tip If you select Select automatically, HYCU will select the datastore with
the most available space.
5. Click Save.
224
11 Administering
i Important The selected HYCU instance will be deleted from both HYCU and
the Nutanix cluster.
2. In the Remove Instance dialog box, click Yes to confirm that you want to delete the
selected HYCU instance.
If you want to configure mutual CHAP authentication between the iSCSI Initiator and the
iSCSI target, you must specify the iSCSI Initiator secret (the security key). For details on how
to enable mutual authentication, see “Setting up targets” on page 37.
Licensing
After you deploy the HYCU virtual appliance, you can start using HYCU immediately with a
prebuilt Instant-on license. This license expires automatically after 45 days and cannot be
reused. Therefore, make sure to obtain a permanent license within this 45-day period.
The HYCU license is linked to the HYCU backup controller and you can decide on the license
type or a combination of license types that best suits your environment. The following
license types are available:
l Standard licenses
o Socket-based licenses
Licenses are based on the number of CPU sockets on all sources (Nutanix clusters,
vCenter Servers, Nutanix Files, and physical machines) that you plan to protect by
using HYCU.
o VM-based licenses
225
11 Administering
Licenses are based on the number of virtual machines on all sources and physical
machines that you plan to protect by using HYCU.
l File server licenses
You can use these licenses independently or in combination with standard licenses.
o Socket-based licenses
Licenses are based on the number of CPU sockets on all Nutanix clusters where the
Nutanix Files servers that you plan to protect by using HYCU reside.
o Capacity-based licenses
Licenses are based on the capacity of file server shares, which is calculated
automatically as an overall size (in terabytes) of all protected file server shares.
l HYCU Protégé license
You can use this license in combination with other licenses to be able to migrate virtual
machines across different infrastructures, perform disaster recovery of data to cloud,
and monitor HYCU for Google Cloud and HYCU for Azure data protection
environments.
Considerations
l When verifying that your license is valid, HYCU takes into account only the sources
containing the entities with the PROTECTED or PROTECTED_DELETED status.
l The protection of the HYCU backup controller does not require any license.
l For Nutanix Community Edition (CE) environment: No HYCU licenses are required.
Procedure
1. Buy a needed number of HYCU licenses. To discuss the options, contact your Sales
representative.
2. Create a license request. For details, see “Creating a license request” below.
3. Request and obtain licenses from the web licensing portal. For details, see “Requesting
and retrieving licenses” on the next page.
4. Activate the licenses to start using HYCU. For details, see “Activating licenses” on
page 228.
226
11 Administering
Prerequisites
l You bought the required number of HYCU licenses and have an entitlement order
number.
l You added sources that you want to protect to the data protection environment. For
instructions, see “Adding sources” on page 31.
Procedure
1. In the Licensing dialog box, click Download Request.
2. Save the license request file to a temporary location.
Example
license.req file:
CN myCompany
PID nutanixbackup
ND C0F90A56-3FCC-4437-A49C-EFBA9B
NRP 3
QTY 127
AFS 3
AFSCAP 4
VER V1N
HSUD FA8A5061C61F6BA5CE5A9B2C007EE
NEXT NODE
Procedure
1. Connect to the web licensing portal at:
https://licensing.hycu.com/
2. If you already have a licensing portal account, click Sign in, enter your user name and
password, and then click Login. Otherwise, create an account and then sign in with a
newly created user account.
3. Click the Activate perpetual licenses link, and then enter the entitlement order
number. Click Next.
4. Perform the following:
a. Browse for the license request file, and then click Request License.
b. In the Activate perpetual licenses page, specify the license types and the number of
licenses you want to activate. By default, the number of licenses from the license
request file is provided. You can specify a different value that may not exceed the
number of purchased licenses. Click Activate Licenses.
227
11 Administering
Within a few minutes, you should receive an email with a license file license.dat
attached.
Example
license.dat file:
CN myCompany
PID nutanixbackup
ND C0F90A56-3FCC-4437-A49C-EFBA9BD8FC0F
NRP 3
AFSCAP 5
EXP 02.08.2021
VER V1N
LK D29CB215357FED55304012B02143CA9437ED5D8FC556
NEXT NODE
Activating licenses
After you submit your license request for the HYCU licenses to the web licensing portal, you
get an email with a product license file attached.
Procedure
1. In the Licensing dialog box, click Upload License.
2. Browse for the license file that you received by email, and then click Upload.
After the licenses are activated, the information related to licensing is updated.
n Note You can always add new licenses for your grown environment. Contact your
HYCU Sales representative.
You can check the following information related to licensing:
l License type
l Backup controller ID
l Status
l Actual and licensed number of sockets
l Licensed number of sockets for Nutanix Files
l Actual and licensed file server capacity
l Actual and licensed number of protected virtual and physical machines
Setting up logging
You can set up logging to log information at various levels to help you analyze and
troubleshoot the entire HYCU operation and diagnose issues with backup and restore
performance.
228
11 Administering
Prerequisite
For sending log files to HYCU Customer Support: Sharing telemetry data with HYCU is enabled.
For instructions, see “Sharing telemetry data with HYCU” on page 237.
l Only if Sharing telemetry data with HYCU is enabled. Send the existing log file to HYCU
Customer Support by clicking Send logs.
You send log files with the level that was specified at the time they were recorded. If
logging is not set up, the log files are uploaded with the default settings. The changed
logging level is applied only to the log files that are recorded after you save new logging
settings.
229
11 Administering
2. Use the Keep settings after upgrade switch if you want the custom logging
settings to remain the same after you upgrade HYCU. As you usually set logging for
troubleshooting purposes and do not need the same logging level for regular use
of the product, by default, this switch is turned off.
3. Click Save.
n Note Keep in mind that the changed logging level is applied only to the log
files that are recorded after you save new logging settings.
230
11 Administering
You can later modify the settings by specifying new values and then clicking Save, or set the
default values by clicking Default.
i Important After you make any changes to the HYCU network settings, you will be
logged out automatically and your session will restart.
Limitation
Multiple network adapters on the same network are not supported.
Consideration
The network that you specified during the HYCU deployment is set to main and is
represented by theicon. If you later connect your HYCU backup controller to more than
one network by using the Nutanix Prism web console or the vSphere (Web) Client, you can
use another network as the main network. To do so, make sure that a listening port and an
SSL certificate are specified for the desired network, select this network, and then click
Set Main.
Procedure
1. In the Networks dialog box, the host name of your HYCU backup controller and the
networks to which it is connected are displayed. Select the network for which you want
to change settings, and then click Edit.
2. Change the IP address, the gateway, the domain name, the netmask, and the DNS
server as required.
3. Only if your HYCU backup controller is connected to more than one network. Use the
Enable listening on this port switch if you want to use this network to access the
HYCU web user interface.
n Note For the network that you specified during the HYCU deployment, this
231
11 Administering
4. Only if the Enable listening on this port switch is enabled. Do the following:
a. In the Listening port field, enter the port that you want to use to access the HYCU
web user interface (by default, 8443).
b. From the SSL certificates drop-down menu, select the SSL certificate that you want
to use for this network. If the appropriate certificate is not on the list, you can
import or generate a needed certificate by clicking Manage. For instructions on
how to generate and import SSL certificates, see “Configuring SSL certificates” on
page 235.
n Note If the Enable listening on this port switch is disabled, you can also specify
the SSL certificate that you want to use for this network.
5. Click Save.
Limitation
You can limit network bandwidth only for traffic that is outbound from HYCU.
Considerations
l Network bandwidth throttling is not available in HYCU Manager.
l If the IP address of the storage container to which you plan to restore data is defined in
a site for which you want to limit bandwidth, restore performance may be affected.
l Cloud, iSCSI, or SMB targets may utilize multiple IP addresses. Make sure to enter all the
utilized IP addresses when defining a site. For details on IP ranges used by public
clouds, see respective cloud documentation.
l Throttling network bandwidth for AWS IP addresses also affects telemetry data sharing.
Sending log files may take longer.
l Only if HYCU is used for file share protection. If you enable network bandwidth throttling,
the limit you set applies also to HYCU instances.
Recommendation
It is not recommended to throttle network bandwidth for NFS targets.
232
11 Administering
Procedure
1. In the Networks dialog box, click the Throttling tab, and then click New. The New
dialog box appears.
2. Enter a name for the site for which you want to limit bandwidth and, optionally, its
description.
3. In the Bandwidth limit field, specify the maximum speed (in KiBps, MiBps, or GiBps) that
can be used to transfer data from HYCU to the site.
4. In the IP address/range list field, enter the IP addresses or IP ranges of the sites for
which you want to limit bandwidth. You can enter the IP addresses or IP ranges in the
following form:
l Single IPv4 address: 192.0.2.1
l IPv4 subnet with CIDR prefix: 192.0.2.0/24
l IPv4 range: 192.0.2.3-192.0.2.100
5. Optional. From the Throttling window drop-down menu, select the throttling window
that you want to be used for limiting bandwidth. You can also create a new throttling
window or edit existing ones by clicking Manage. For details on how to create a
throttling window, see “Creating a throttling window” below.
i Important If you define multiple sites with the same IP addresses, make sure
the throttling windows you assign to these sites do not overlap.
6. Click Save.
You can later edit any of the existing sites (click Edit and make the required
modifications) or delete the ones that you do not need anymore (click Delete).
Procedure
1. In the Networks dialog box, click the Throttling tab, and then click Windows. The
Throttling Window dialog box appears.
2. Click New. The New dialog box appears.
3. Enter a name for the throttling window.
4. From the Time zone drop-down menu, specify the time zone for the throttling window.
You can click one of the displayed time zones (your local time zone or your HYCU
backup controller time zone) or select one from the drop-down menu.
5. Select the week days and hours during which you want network bandwidth to be
limited.
233
11 Administering
t Tip You can click and drag to quickly select a time frame that includes the days
and hours you want to add.
6. Click Save.
You can later edit any of the existing throttling windows (click Edit and make the
required modifications) or delete the ones that you do not need anymore (click Delete).
All currently running jobs are allowed to complete normally. All jobs
that are in the queue will start when the HYCU backup controller is
resumed. While activities are paused, you cannot start any new jobs.
Pauses the cleanup of targets and, if enabled, the purge of events and
Suspend
jobs.
Cleanup
The snapshot cleanup is not affected.
Prerequisite
For using the STARTTLS or SSL/TLS security mode to secure email traffic: A valid SSL certificate is
imported to HYCU. For details on how to do this, see “Securing SMTP connections” on
page 266.
234
11 Administering
Procedure
1. In the SMTP Server Settings dialog box, provide the following information:
From email address Email address from which email notifications will be sent.
2. Click Save.
You can now configure HYCU to send email notifications. For details on how to do this, see
“Setting up email notifications” on page 167.
In the SSL Certificates dialog box that opens, you can view the information about your SSL
certificate, such as the certificate name, the certificate common name, the certificate expiry
date, and the certificate key size.
Consideration
After you create or import an SSL certificate, make sure to update also the HYCU network
settings by specifying this certificate. For details on how to do this, see “Configuring your
network” on page 231.
Recommendation
It is recommended to replace the self-signed certificate that is generated automatically
during HYCU deployment with a CA-signed certificate.
235
11 Administering
Procedures
Depending on whether you want to create a self-signed certificate or import a custom
certificate to HYCU, see one of the following sections:
l “Creating a self-signed certificate” below
l “Importing a custom certificate” below
3. Click Generate.
The self-signed certificate is added to the list of SSL certificates. Keep in mind that each SSL
certificate that is generated through HYCU is valid for three years and that you must
maintain the validity of the certificate.
Consideration
If the certificate uses a wildcard for the Common Name (CN), make sure that the Certificate
Subject Alt Name field includes all possible host names or FQDNs, and their corresponding
IP addresses. Otherwise, the certificate may be recognized as invalid by your web browser
or hyCLI.
236
11 Administering
Procedure
1. In the SSL Certificates dialog box, click Import. The Import dialog box appears.
2. Depending on whether you want to import an SSL key pair or a CA-signed certificate,
click one of the following tabs and follow the instructions:
Tab Instructions
3. Click Import.
You can also change the name of any self-signed or custom certificate (click Edit and
make the required modification) or delete the ones that you do not need anymore (click
Delete).
Sharing diagnostic data through telemetry enables proactive, contextualized support for
HYCU as follows:
1. Collects detailed data on your data protection environment that includes the syslog
files, HYCU internal data base (PostgreSQL) logs, system activity information (sar), HYCU
license information, and other detailed information on your specific infrastructure, and
237
11 Administering
i Important HYCU does not collect any sensitive information from your data
protection environment.
2. Analyzes collected data, generates internal reports, and identifies eventual problems or
unfavorable trends considerably reducing issue resolution time.
3. Provides you with feedback on your HYCU environment that addresses eventual issues
and instructs you on how to adjust your environment and to improve infrastructure
and performance.
n Note You need to enable telemetry data sharing for each HYCU backup controller
that you want to include in the advanced troubleshooting.
Prerequisite
You have a valid HYCU Customer Support user account.
Procedure
In the Telemetry dialog box, use the Share telemetry data with HYCU Inc. switch to allow
HYCU to collect your telemetry data, and then click Save.
HYCU starts collecting data and sends it to HYCU Customer Support. Later, the telemetry
diagnostic data is sent to HYCU Customer Support once a day. You can view the collection
job status in the Jobs panel.
If you later decide that you no longer want to share your telemetry data with HYCU, disable
the Share telemetry data with HYCU Inc. option for each configured HYCU backup
controller.
n Note When the Share telemetry data with HYCU Inc. option is enabled, you can
send the log files to HYCU Customer Support. For more information, see “Setting up
logging” on page 228.
Upgrading HYCU
You can upgrade HYCU when a new software release version is available.
Prerequisites
l The source where the HYCU backup controller resides is added to HYCU.
l The HYCU backup controller activities are suspended. For instructions on how to
achieve this, see “Setting power options” on page 234.
l Jobs that you do not want to be aborted are finished (the upgrade process aborts all
currently running jobs).
238
11 Administering
l The HYCU data disk is larger than the HYCU system disk. For instructions on how to
increase disk size, see “Increasing the size of the HYCU virtual disks” on page 269.
Considerations
l For Nutanix clusters: If the HYCU backup controller is part of a Nutanix protection
domain (the recommended approach), make sure that the new version of the HYCU
backup controller virtual machine is included in this protection domain after the
upgrade. The old HYCU backup controller (virtual machine) will remain on the Nutanix
cluster and will be renamed to <HYCUBackupControllerName>_version_
<OldHYCUVersion>. You can safely delete it and remove it from Nutanix protection
domain after a successful upgrade.
l Any users that have been logged on to the HYCU web user interface of the HYCU virtual
machine that is being upgraded should perform a hard reload of the web user
interface page in their web browser after the process completes.
l Upgrading removes any previously added hotfix packages from the hotfix directory on
the HYCU virtual machine.
l For Nutanix ESXi clusters: If your Nutanix AOS version is 5.11.3 or later and you are
upgrading HYCU from version 4.0.3, keep in mind that the first backup of data after the
upgrade will be full.
l For S3-compatible targets: After upgrading HYCU, if you want to provide secure HTTPS
access, make sure the required CA-signed certificate is imported as follows:
1. Open a remote session to the HYCU backup controller virtual machine:
ssh hycu@<HYCUBackupControllerIPAddress>
Procedures
l “Upgrading HYCU on a Nutanix AHV cluster” on the next page
l “Upgrading HYCU on a Nutanix ESXi cluster” on page 242
l “Upgrading HYCU in a vSphere environment” on page 246
239
11 Administering
Consideration
If you are using HYCU for file share protection, the HYCU instances residing on a Nutanix
AHV cluster are upgraded automatically during the HYCU upgrade process if the following is
true:
l The Nutanix cluster where the HYCU instances reside is added to HYCU.
l The HYCU virtual appliance image is present on the same Nutanix cluster in the
following format:
hycu-<Version>-<Revision>
Procedure
1. Log on to the Nutanix Prism web console, and then upload the HYCU virtual appliance
image that you want to use for an upgrade to your Nutanix AHV cluster as follows:
If you enter the HYCU image name in a different format, you will not be able
to use this image for an upgrade.
240
11 Administering
n Note You can also check whether any newer version is available on the
HYCU Customer Support portal by clicking the Check for new version link.
d. Click Software Upgrade, and then click Yes to confirm that you want to upgrade
HYCU.
3. Only if HYCU is used for file share protection. If the Nutanix cluster where the HYCU
instances reside is not added to HYCU or the appropriate HYCU virtual appliance image
is not present on the same Nutanix cluster, upgrade the HYCU instances as follows:
a. Remove the existing HYCU instances. For details on how to do this, see “Deleting a
HYCU instance” on page 225.
b. Create new HYCU instances with the latest HYCU version. For details on how to do
this, see “Creating a HYCU instance by using the HYCU web user interface” on
page 223.
You will be logged out of HYCU and you can track the upgrade progress in the Nutanix
Prism web console as follows:
l The old HYCU backup controller virtual machine will remain on the Nutanix AHV cluster
and will be renamed to <HYCUBackupControllerName>_version_<OldHYCUVersion>.
l The new upgraded HYCU backup controller virtual machine will replace the old one.
l The upgraded HYCU backup controller virtual machine will be powered on
automatically.
After the upgrade process completes, you can log on to the HYCU web user interface.
i Important Before you log on to the HYCU web user interface again, make sure to
perform a hard reload of its webpage in your web browser.
After you make sure HYCU was upgraded successfully, you can safely delete the old HYCU
backup controller virtual machine from the Nutanix AHV cluster.
241
11 Administering
By importing the HYCU OVF “Upgrading HYCU by importing the HYCU OVF
package to a content library. package to a content library” below
By deploying the HYCU OVF “Upgrading HYCU by deploying the HYCU OVF
package to a vCenter Server package to a vCenter Server inventory” on the next
inventory. page
If HYCU is used for file share protection, the HYCU instances that are connected to your
HYCU backup controller must also be upgraded. For details, see “Upgrading HYCU
instances” on page 245.
Prerequisites
l A snapshot of the HYCU backup controller is created by using the Nutanix protection
domain. For details, see Nutanix documentation.
l Any HYCU snapshots created by using VMware vSphere are removed.
Consideration
After you upgrade HYCU or HYCU instances, on some Nutanix ESXi clusters you might get
an error message that there is a MAC address conflict. You can safely ignore this message.
Procedure
1. Log on to the vSphere Web Client, and then do as follows:
a. Navigate to the content library to which you want to import the HYCU OVF package.
b. Right-click your content library, and then select Import Item. The Import Library
Item dialog box opens.
c. In the Source section, specify the location of the OVF package:
242
11 Administering
Local file i Important When you are browsing your file system,
make sure to select both the .ovf file and the .vmdk file
related to the OVF package.
Click OK.
d. In the Destination section, enter a name and description for the item, and then click
OK.
i Important Make sure the item name you enter matches the HYCU OVF
package name. For example, hycu-4.3.1-3634.
2. Log on to the HYCU web user interface, and then do as follows:
a. Click Administration, and then select Software Upgrade.
b. Check the current version of HYCU and all available versions, and then, from the list
of the available versions, select the one to which you want to upgrade HYCU.
t Tip The icon next to each version shows the location of the HYCU upgrade
image, (a content library) or (a vCenter Server inventory).
c. Only if database optimization has not been run yet. Click Database Optimization, and
then click Yes to confirm that you want to run the database optimization job.
d. Click Upgrade, and then click Yes to confirm that you want to upgrade HYCU.
You will be logged out of HYCU and you can track the upgrade progress in the Nutanix
Prism web console as follows:
l The old HYCU backup controller virtual machine will remain on the Nutanix ESXi cluster
and will be renamed to <HYCUBackupControllerName>_version_<OldHYCUVersion>.
l The new upgraded HYCU backup controller virtual machine will replace the old one.
l The upgraded HYCU backup controller virtual machine will be powered on
automatically.
After the upgrade process completes, you can log on to the HYCU web user interface.
i Important Before you log on to the HYCU web user interface again, make sure to
perform a hard reload of its webpage in your web browser.
After you make sure HYCU was upgraded successfully, you can safely delete the old HYCU
backup controller virtual machine from the Nutanix ESXi cluster.
243
11 Administering
you are guided through the steps that you must perform if you are using the vSphere
Web Client.
Procedure
1. Log on to the vSphere Web Client, and then do as follows:
a. Right-click your vCenter Server, and then select Deploy OVF Template.... The
Deploy OVF Template dialog box opens.
b. In the Select template section, specify the location of the OVF package:
Local file i Important When you are browsing your file system,
make sure to select both the .ovf file and the .vmdk file
related to the OVF package.
Click Next.
c. In the Select name and location section, enter a name for the HYCU backup
controller virtual machine and specify a location where you want to deploy it, and
then click Next.
i Important Make sure the virtual machine name you enter matches the
HYCU OVF package name. For example, hycu-4.3.1-3634.
d. In the Select a resource section, select where to run the deployed package, and
then click Next.
e. In the Review details section, verify the package details, and then click Next.
f. In the Select storage section, select where to store the files for the deployed
package, and then click Next.
g. In the Select networks section, select a destination network, and then click Next.
h. In the Customize template section, enter the values for the following:
l Optional. Host name for the virtual machine
244
11 Administering
n Note The domain name should begin with a letter and contain one or
more periods. It may also contain only letters, numbers, and hyphens (-).
Click Next.
i. In the Ready to complete section, review data, and then click Finish.
2. Log on to the HYCU web user interface, and then do as follows:
a. Click Administration, and then select Software Upgrade.
b. Check the current version of HYCU and all available versions, and then, from the list
of the available versions, select the one to which you want to upgrade HYCU.
t Tip The icon next to each version shows the location of the HYCU upgrade
image, (a content library) or (a vCenter Server inventory).
c. Only if database optimization has not been run yet. Click Database Optimization, and
then click Yes to confirm that you want to run the database optimization job.
d. Click Upgrade, and then click Yes to confirm that you want to upgrade HYCU.
You will be logged out of HYCU and you can track the upgrade progress in the Nutanix
Prism web console as follows:
l The old HYCU backup controller virtual machine will remain on the Nutanix ESXi cluster
and will be renamed to <HYCUBackupControllerName>_version_<OldHYCUVersion>.
l The new upgraded HYCU backup controller virtual machine will replace the old one.
l The upgraded HYCU backup controller virtual machine will be powered on
automatically.
After the upgrade process completes, you can log on to the HYCU web user interface.
i Important Before you log on to the HYCU web user interface again, make sure to
perform a hard reload of its webpage in your web browser.
After you make sure HYCU was upgraded successfully, you can safely delete the old HYCU
backup controller virtual machine from the Nutanix ESXi cluster.
hycu-<Version>-<Revision>
245
11 Administering
2. Create new HYCU instances with the latest HYCU version. For details on how to do this,
see “Creating a HYCU instance by using the HYCU web user interface” on page 223.
n Note If you made any changes to the default user credentials, after the HYCU
instance upgrade, you can use only the default operating system user credentials:
User name: hycu
Password: hycu/4u
Later you can make modifications to meet the needs of your environment.
By importing the HYCU OVF “Upgrading HYCU by importing the HYCU OVF
package to a content library. package to a content library” on the next page
Prerequisites
l As a vSphere user, you have the required upgrade privileges. For details on upgrade
privileges, see “Assigning privileges to a vSphere user” on page 271.
l For importing the HYCU OVF package to a content library: A content library is created in the
vSphere (Web) Client.
Considerations
l For upgrading HYCU if the HYCU backup controller is connected to a distributed switch: After
the upgrade, the port configured on the upgraded HYCU backup controller is different
from the distributed switch port configured on the old HYCU backup controller. If you
need your upgraded HYCU backup controller to use the same port as before, delete the
port on the old HYCU backup controller, and then modify the port number in the new
HYCU backup controller settings. For details on how to do this, see VMware
documentation.
l After you upgrade HYCU, in some vSphere environments you might get an error
message that there is a MAC address conflict. You can safely ignore this message.
l It is not recommended that the HYCU backup controller is deployed on a VMware
Virtual SAN (vSAN) datastore. However, if this is your case, before upgrading HYCU,
contact HYCU Customer Support.
246
11 Administering
Procedure
1. Log on to the vSphere Web Client, and then do as follows:
a. Navigate to the content library to which you want to import the HYCU OVF package.
b. Right-click your content library, and then select Import Item. The Import Library
Item dialog box opens.
c. In the Source section, specify the location of the OVF package:
Local file i Important When you are browsing your file system,
make sure to select both the .ovf file and the .vmdk file
related to the OVF package.
Click OK.
d. In the Destination section, enter a name and description for the item, and then click
OK.
i Important Make sure the item name you enter matches the HYCU OVF
package name. For example, hycu-4.3.1-3634.
2. Log on to the HYCU web user interface, and then do as follows:
a. Click Administration, and then select Software Upgrade.
b. In the Software Upgrade dialog box, check the current version of HYCU and all
available versions.
c. From the list of the available versions, select the one to which you want to upgrade
HYCU.
t Tip The icon next to each version shows the location of the HYCU upgrade
image, (a content library) or (a vCenter Server inventory).
d. Only if database optimization has not been run yet. Click Database Optimization, and
then click Yes to confirm that you want to run the database optimization job.
e. Click Upgrade, and then click Yes to confirm that you want to upgrade HYCU.
247
11 Administering
You will be logged out of HYCU and you can track the upgrade progress in the vSphere
(Web) Client as follows:
l The old HYCU backup controller virtual machine will remain in the vSphere
environment and will be renamed to <HYCUBackupControllerName>_version_
<OldHYCUVersion>.
l The new upgraded HYCU backup controller virtual machine will replace the old one.
l The upgraded HYCU backup controller virtual machine will be powered on
automatically.
After the upgrade process completes, you can log on to the HYCU web user interface.
i Important Before you log on to the HYCU web user interface again, make sure to
perform a hard reload of its webpage in your web browser.
After you make sure HYCU was upgraded successfully, you can safely delete the old HYCU
backup controller virtual machine from the vSphere environment.
Procedure
1. Log on to the vSphere Web Client, and then do as follows:
a. Right-click your vCenter Server, and then select Deploy OVF Template.... The
Deploy OVF Template dialog box opens.
b. In the Select template section, specify the location of the OVF package:
Local file i Important When you are browsing your file system,
make sure to select both the .ovf file and the .vmdk file
related to the OVF package.
Click Next.
c. In the Select name and location section, enter a name for the HYCU backup
controller virtual machine and specify a location where you want to deploy it, and
then click Next.
i Important Make sure the virtual machine name you enter matches the
248
11 Administering
d. In the Select a resource section, select where to run the deployed package, and
then click Next.
e. In the Review details section, verify the package details, and then click Next.
f. In the Select storage section, select where to store the files for the deployed
package, and then click Next.
g. In the Select networks section, select a destination network, and then click Next.
h. In the Customize template section, enter the values for the following:
l Optional. Host name for the virtual machine
n Note The domain name should begin with a letter and contain one or
more periods. It may also contain only letters, numbers, and hyphens (-).
Click Next.
i. In the Ready to complete section, review data, and then click Finish.
2. Log on to the HYCU web user interface, and then do as follows:
a. Click Administration, and then select Software Upgrade.
b. In the Software Upgrade dialog box, check the current version of HYCU and all
available versions.
c. From the list of the available versions, select the one to which you want to upgrade
HYCU.
t Tip The icon next to each version shows the location of the HYCU upgrade
image, (a content library) or (a vCenter Server inventory).
d. Only if database optimization has not been run yet. Click Database Optimization, and
then click Yes to confirm that you want to run the database optimization job.
e. Click Upgrade, and then click Yes to confirm that you want to upgrade HYCU.
249
11 Administering
You will be logged out of HYCU and you can track the upgrade progress in the vSphere
(Web) Client as follows:
l The old HYCU backup controller virtual machine will remain in the vSphere
environment and will be renamed to <HYCUBackupControllerName>_version_
<OldHYCUVersion>.
l The new upgraded HYCU backup controller virtual machine will replace the old one.
l The upgraded HYCU backup controller virtual machine will be powered on
automatically.
After the upgrade process completes, you can log on to the HYCU web user interface.
i Important Before you log on to the HYCU web user interface again, make sure to
perform a hard reload of its webpage in your web browser.
After you make sure HYCU was upgraded successfully, you can safely delete the old HYCU
backup controller virtual machine from the vSphere environment.
Prerequisites
l For applying a hotfix to a HYCU backup controller: The HYCU backup controller activities
are suspended. For instructions on how to do this, see “Setting power options” on
page 234.
l Jobs that you do not want to be aborted are finished (the hotfix application process
aborts all currently running jobs). You can check this by filtering the Jobs list by the
Executing job status. For instructions, see “Filtering data” on page 179.
l For applying a hotfix to a HYCU instance: The same hotfix is applied to the corresponding
HYCU backup controller.
l For applying a hotfix by using the shell script: You know credentials of an operating system
user account that has administrative user rights on the HYCU virtual machine where
you plan to apply the hotfix.
250
11 Administering
Considerations
l The hotfix that you apply to the HYCU backup controller is not automatically applied to
HYCU instances or HYCU Managers, if there are any in your data protection
environment.
l For applying a hotfix to a HYCU backup controller or a HYCU Manager: Any users that have
been logged on to the HYCU web user interface of the HYCU virtual machine where the
hotfix is being applied should perform a hard reload of the web user interface page in
their web browser after the process completes.
Recommendation
Before applying a hotfix to a HYCU backup controller, back up the HYCU backup controller.
For instructions, see “Backing up virtual machines” on page 84.
Procedure
1. Log on to the HYCU web user interface.
2. Click Administration, and then select Software Upgrade.
3. In the Software Upgrade dialog box, click the Hotfixes tab.
4. In the Hotfix Label column, check if the package of the desired hotfix is already added
to the HYCU backup controller or the HYCU Manager, and then do one of the following:
251
11 Administering
t Tip Click Info to review the list of issues that the hotfix resolves.
Procedure
1. Log on to the HYCU web user interface.
2. Click Administration, and then select Instances.
3. In the Instances dialog box, select the desired HYCU instance, and then click
Hotfixes.
4. In the Hotfix Label column, check if the package of the desired hotfix is already added
to the HYCU instance, and then do one of the following:
l If the hotfix label is not present, follow these steps:
a. Click Add.
b. In the Add Hotfix dialog box, click Browse. browse for the hotfix package (in
the ZIP format), select it, and then click Open.
c. Click Add Hotfix.
252
11 Administering
t Tip Click Info to review the list of issues that the hotfix resolves.
cd /opt/grizzly/bin/
4. Run the following command to retrieve the list of hotfix packages that are already
added to the HYCU virtual machine:
5. If the label of the desired hotfix is not present on the list, follow these steps:
a. Extract the contents of the hotfix package (in the ZIP format). The package contains
the main hotfix file, installation instructions, and digital fingerprints.
b. Use the /usr/bin/cksum and /usr/bin/md5sum commands to verify that the digital
fingerprint of the main hotfix file matches the one that you were given by HYCU
Customer Support.
c. Copy the main hotfix file in the archived TAR (.tar.gz) format to the following
directory on the HYCU virtual machine:
/hycudata/opt/grizzly/hotfixes
253
11 Administering
t Tip Run the following command to review the list of issues that the hotfix
resolves:
6. Run the following command to apply the hotfix to the HYCU virtual machine:
Removing HYCU
When you remove HYCU from your environment, you also need to perform additional
cleanup tasks.
254
11 Administering
i Important By running this command, you will also remove all Nutanix
Files snapshots whose names start with hycu- (case insensitive).
i Important By running these commands, you will also remove all third-
party snapshots created by using Nutanix REST API v3 whose names start with
the IP address.
i Important By running this command, you will also remove all volume
255
11 Administering
groups created by using Nutanix REST API v3 whose names start with HYCU-
(case insensitive).
4. Remove data from targets. To do so, on each target, delete the bkpctrl folder.
5. Log on to the Nutanix Prism web console or the vSphere (Web) Client, and then delete
the HYCU backup controller virtual machine. For details on how to delete a virtual
machine, see Nutanix or VMware documentation.
256
Chapter 12
257
12 Tuning your data protection environment
i Important Using SSH to perform any tasks other than restarting the HYCU
application server or the entire appliance is not recommended.
After you deploy the HYCU virtual appliance, you can use the following default credentials to
access the HYCU backup controller virtual machine by using SSH:
Password: hycu/4u
ssh hycu@<HYCUBackupControllerIPAddress>
passwd
When requested, enter the default password again, and then enter and verify your new
password.
258
12 Tuning your data protection environment
Limitation
The supported SSH key types are RSA, ECDSA, and Ed25519.
Procedure
1. In the SSH Authentication dialog box, click Add Public Key.
2. Enter a name for the SSH public key, and the SSH public key.
3. Click Save.
The SSH public key is added to the table. For each added key, the name, creation date, and
key fingerprint are displayed.
You can also delete any of the existing SSH public keys by selecting the key and then clicking
Delete.
If after configuring SSH public key authentication you want to disable SSH password
authentication, you can do so by disabling the Allow password authentication switch,
and then clicking Save.
ssh hycu@<HYCUBackupControllerIPAddress>
259
12 Tuning your data protection environment
ssh hycu@<HYCUBackupControllerIPAddress>
i Important If you plan to restart the PostgreSQL server, make sure the HYCU
application server is stopped before and started after restarting the PostgreSQL server.
Prerequisite
The winrm.https.enabled configuration setting is set to true. For details, see “Customizing
HYCU configuration settings” on page 303.
Procedure
For each virtual machine for which you want to enable HTTPS for WinRM connections, do
the following:
1. Set up a virtual machine for WinRM over HTTPS by using PowerShell:
a. Create a new self-signed certificate:
b. Only if an HTTPS WinRM listener already exists. Remove the existing HTTPS WinRM
listener:
260
12 Tuning your data protection environment
d. Create an HTTPS WinRM listener that uses the self-signed certificate from step 1:
e. Add a new firewall rule to allow incoming connections on TCP port 5986, if it has
not already been added:
2. Open a remote session to the HYCU backup controller, and then do the following:
a. Run the add_certificate.sh script:
In this instance, <Hostname> is the host name of the virtual machine for which you
want to establish an HTTPS connection.
b. Enter the password to access the trust store. The default password is hycu/4u.
After you run the add_certificate.sh script, it connects to the virtual machine,
imports the self-signed certificate, and adds it to the trust store. You get the information
about the certificate that you must check and confirm. If the certificate is valid and
matches the information of the certificate on the virtual machine, type y followed by
Enter. Otherwise, type n followed by Enter to reject the certificate.
Depending on the nature of your business, you can either enable or disable FIPS mode for
HYCU. To check whether FIPS mode is enabled (disabled by default), open a remote
session to the HYCU backup controller, and then as the root user or by using sudo, run the
following command:
/opt/grizzly/bin/enable_fips.sh --status
Limitations
When FIPS mode is enabled, the following limitations apply:
261
12 Tuning your data protection environment
Considerations
l Only if HYCU is used for file share protection. You must enable FIPS mode for each HYCU
instance separately (independent of the HYCU backup controller).
l After you upgrade HYCU, FIPS mode will be disabled. If required, make sure to re-
enable it.
/opt/grizzly/bin/enable_fips.sh
reboot
/opt/grizzly/bin/enable_fips.sh -d
reboot
262
12 Tuning your data protection environment
To import the LDAPS server certificate to HYCU, open a remote session to the HYCU backup
controller, and then do the following:
1. Run the add_certificate.sh script:
In this instance, <Hostname> is the LDAPS server host name and <Port> is the
LDAPS port (usually 636).
2. Enter the keystore password. The default password is hycu/4u.
After you run the add_certificate.sh script, it connects to the LDAPS server, imports
the certificate, and adds it to the keystore.
You get the information about the certificate that you must check and confirm. If the
certificate is valid and matches the information of the certificate on the LDAPS server,
type y followed by Enter. Otherwise, type n followed by Enter to reject the certificate.
When enabling two-factor authentication for HYCU, the following tasks must be completed:
Task Instructions
263
12 Tuning your data protection environment
Task Instructions
o Make sure that DNS is correctly
configured and the hostname is
correctly resolved.
Consideration
As a user with the Administrator role assigned, you can edit other users' information
through the Self-Service panel. For details, see “Creating a user” on page 205.
i Important For security reasons, the API key is never again displayed so make
sure you write the key down and keep it safe.
264
12 Tuning your data protection environment
Your API key can be used to access your data, therefore, treat it like a password.
Click Finish.
Procedure
1. In the FIDO Authenticators dialog box, click New.
2. The Security Setup wizard opens.
Follow the wizard instructions to create the authenticator. The process depends on the
type of authenticator you select and the operating system version.
3. In the Name field, enter a name for the authenticator.
4. Click Register.
265
12 Tuning your data protection environment
In this instance, <Hostname> is the SMTP server host name and <Port> is the port for
authenticated SMTP connections (587 or 25).
2. Enter the keystore password. The default password is hycu/4u.
After you run the add_certificate_starttls.sh script, it connects to the SMTP server,
imports the certificate, and adds it to the keystore.
You get the information about the certificate that you must check and confirm. If the
certificate is valid and matches the information of the certificate on the SMTP server,
type y followed by Enter. Otherwise, type n followed by Enter to reject the certificate.
266
12 Tuning your data protection environment
In this instance, <Hostname> is the SMTP server host name and <Port> is the port for
authenticated SMTP connections (465).
2. Enter the keystore password. The default password is hycu/4u.
After you run the add_certificate.sh script, it connects to the SMTP server, imports
the certificate, and adds it to the keystore.
You get the information about the certificate that you must check and confirm. If the
certificate is valid and matches the information of the certificate on the SMTP server,
type y followed by Enter. Otherwise, type n followed by Enter to reject the certificate.
n Note For Nutanix clusters: While the bulk of data traffic during a backup takes place
over the additional network, part of it is still done through the management network.
This is because HYCU uses the Nutanix data services IP address to consume data
through Nutanix Volumes, which must be in the same subnet as the management
network of the CVMs.
For details on this limitation, see Nutanix documentation.
267
12 Tuning your data protection environment
l For Nutanix ESXi clusters: When upgrading HYCU, network settings on all additional
network adapters will be set to the default values. Make sure to reconfigure the HYCU
instance after the upgrade.
Depending on the environment in which you want to set up HYCU to use multiple
networks, perform one of the following procedures:
l “Setting up HYCU to use multiple networks on a Nutanix AHV or ESXi cluster” below
l “Setting up HYCU to use multiple networks in a vSphere environment” on the next page
ssh hycu@<HYCUBackupControllerIPAddress>
268
12 Tuning your data protection environment
Procedure
1. Log on to the vSphere Web Client, and then add an additional network adapter:
a. Click the VMs tab, and then navigate to your HYCU backup controller.
b. Right-click the HYCU backup controller, and then select Edit Settings.
c. From the New device drop-down menu, select Network, and then click Add.
d. From the New Network drop-down menu, select the required network.
e. Click OK.
For details, see VMware documentation.
2. Configure the network manually:
a. Open a remote session to the HYCU backup controller virtual machine:
ssh hycu@<HYCUBackupControllerIPAddress>
269
12 Tuning your data protection environment
i Important Wait a moment for the virtual machine to shut down completely.
i Important Wait a moment for the virtual machine to shut down completely.
4. Right-click the HYCU backup controller, and then select Edit Settings.
5. On the Virtual Hardware tab, increase the size of one or both HYCU disks by entering
270
12 Tuning your data protection environment
new values in the Hard disk 1 and/or Hard disk 2 fields, and then click OK.
6. Right-click the HYCU backup controller, and then select Power > Power On to turn it
on.
For details on how to manage a virtual machine in a Nutanix AHV or ESXi cluster, see
Nutanix documentation. For details on how to manage a virtual machine in a vSphere
environment, see VMware documentation.
i Important You can use either the vSphere Web Client or the vSphere Client as
the interface for performing the procedure described in this section. As an example,
you are guided through the steps that you must perform if you are using the vSphere
Web Client.
Procedure
1. Log on to the vSphere Web Client as an administrator.
2. On the Home page, click Roles.
3. Right-click the Roles tab information panel, and then click Add.
l Disable methods
Global Not applicable Not applicable
l Enable methods
l Create virtual
machine
Host > Local l Delete virtual
Not applicable Not applicable
operations machine
l Reconfigure virtual
machine
l Assign network
Network Not applicable l Assign network
l Configure
271
12 Tuning your data protection environment
l Assign virtual
Resource Not applicable machine to Not applicable
resource pool
l Add virtual
vApp Not applicable l Import
machine
l Answer question
Virtual Machine
l Power On l Power Off l Power On
> Interaction
l Power On
l Create new
l Create from
Virtual Machine l Register
Not applicable existing
> Inventory l Remove
l Remove
l Unregister
l Allow read-only
disk access
l Allow virtual
machine
download
Virtual Machine l Clone virtual
l For backing up a l Allow disk access
> Provisioning machine
template: Mark as
template
l For backing up a
template: Mark as
virtual machine
Virtual Machine
l Create snapshot
> Snapshot Not applicable Not applicable
l Remove snapshot
management
l Assign or l Assign or
vSphere
Unassign vSphere Unassign vSphere Not applicable
Tagging
Tag Tag
272
12 Tuning your data protection environment
n Note hyCLI log files are located at .Hycu/log in the user's home directory. You can
change logging settings for hyCLI in the logging.properties files located in the
directory containing the extracted files.
For detailed information about hyCLI, see the README.txt file that you can find in the
directory containing the extracted files.
For more information on the hyCLI structure, commands, and usage, run the hycli help
command.
273
12 Tuning your data protection environment
a If the name contains the space character or any of the following characters: " ' , ; & % € ( ) < > { } | ^ `
For details on how to specify pre and post scripts, see the following sections:
l “Specifying pre/post-backup and pre/post-snapshot scripts” on page 82
l “Restoring individual files” on page 107
274
Chapter 13
For details on how to protect data with HYCU Protégé for Office 365, see the HYCU Protégé
for Office 365 Quick Start Guide.
After you deploy the HYCU virtual appliance in the HYCU Manager mode, you can access
HYCU Manager and take advantage of this intuitive visualization approach to quickly identify
and address potential issues.
Within each widget in the HYCU Manager console, you can find information related to your
data protection environments. However, keep in mind that not all widgets might be
applicable to your data protection scenario.
275
13 Monitoring data protection environments
Number of all targets and the number of free and used targets in your
Targets
data protection environments.
i Important By clicking a value in any of the widgets, you are directed to the HYCU
Controllers panel where you can view a list of the HYCU controllers sorted by the value
you clicked. For example, if you click the number of compliant policies, the HYCU
controllers are sorted by the policy compliance percentage in descending order.
276
13 Monitoring data protection environments
Consideration
Only if you are monitoring the HYCU for Google Cloud data protection environments. The list of
your HYCU controllers includes both the projects and the protection sets in which these
projects are included.
Procedure
1. In the HYCU Controllers panel, click Add. The New Controller dialog box opens.
2. Depending on which data protection environment you want to monitor, select one of
the following options:
Option Instructions
277
13 Monitoring data protection environments
group administrator.
e. Click Save.
c. Click Add.
You can later edit any of the existing on-premises or Office 365 controllers (click Edit and
make the required modifications) or remove the HYCU controllers that you do not want to
monitor anymore from HYCU Manager (click Delete). If you use HYCU Manager to
monitor also the HYCU for Azure or HYCU for Google Cloud data protection environments,
keep in mind that you cannot edit such controllers.
t Tip You can update data related to the data protection environments by clicking
Synchronize.
HYCU controller
Description
information
278
13 Monitoring data protection environments
HYCU controller
Description
information
You can export data that you view in the HYCU Controllers panel to a file in JSON or CSV
format. For details on how to do this, see “Exporting the contents of the panel” on page 185.
279
13 Monitoring data protection environments
Viewing events
You can use the Events panel to view all events that occurred on your HYCU Manager and
check details about the selected event, list events that match the specified filter, configure
HYCU to send notifications when events occur, and export the contents of the panel to a file
in JSON or CSV format.
n Note The procedures for administering HYCU deployed in the HYCU Manager
mode are the same as for HYCU deployed in the HYCU Backup Controller mode.
Therefore, in most cases, you can follow the same instructions.
Keep in mind that a varied set of administration tasks is available depending on the
selected deployment mode.
280
13 Monitoring data protection environments
Managing users
You can use the Manage Users dialog box to give the specified users access to HYCU
Manager. Managing users includes creating, editing, deleting, and activating or deactivating
users.
Procedure
1. In the User Management dialog box, click New. The New dialog box opens.
2. Enter a user name if you are adding a HYCU Manager user or an AD user, or a common
name if you are adding an AD group.
i Important When entering a name, make sure it complies with the SAM
account name limitations—name length may not exceed 20 characters and contain
any of the following characters: "/ \ [ ] : ; | = , + * ? < >. In addition, HYCU does not
allow the at sign (@) in the name.
If your environment requires it, these limitations can be overridden by editing the
ad.username.filter.regex configuration setting. However, this is not supported
281
13 Monitoring data protection environments
and could cause authentication issues. For details on how to customize HYCU
configuration settings, see “Customizing HYCU configuration settings” on page 303.
3. From the Authentication type drop-down menu, select one of the following
authentication types:
l HYCU
Enter a display name, the user password and, optionally, email address.
l AD user
From the Active Directory drop-down menu, select the Active Directory the AD user
belongs to.
l AD group
From the Active Directory drop-down menu, select the Active Directory the AD
group belongs to.
4. Click Save. The user is added to the list of users.
i Important For creating a user by using hyCLI: As opposed to creating a new user
through the HYCU Manager console where this is done automatically, if using hyCLI,
you must also add the created user to the infrastructure group and assign this user the
Administrator role.
You can later do the following:
l Edit any of the existing users by clicking Edit and making the required modifications.
Keep in mind that the built-in user, AD users, and AD groups cannot be edited.
l Delete any of the existing users by clicking Delete. Keep in mind that the built-in user
cannot be deleted.
l Enable or disable specific users from logging on to the HYCU Manager console:
o If the status of the selected user is Inactive and you want to activate it, click
Activate.
o If the status of the selected user is Active and you want to deactivate it, click
Deactivate.
282
Chapter 14
The Nutanix Mine with HYCU solution allows you to use a single pane of glass to manage
both production and backup infrastructures. You can optimize your data protection
environment by introducing Nutanix Mine storage as a target, which will increase your
Nutanix Mine cluster’s effective storage capacity, and improve backup and restore
performance.
Task Instructions
283
14 Employing Nutanix Mine with HYCU
Consideration
l All instructions that apply to the Nutanix AHV cluster, also apply to the Nutanix Mine
cluster.
l If you receive a warning message indicating that there have been changes on the
Nutanix Mine cluster, you must register HYCU with Nutanix Prism again. You receive
such a message in the following cases:
o The IP address/host name or port of the HYCU backup controller was changed.
o AOS of the Nutanix Mine cluster was upgraded to a new version.
o A new Controller VM was added to the Nutanix Mine cluster.
Procedure
1. In the Sources dialog box, on the Hypervisor tab, from the list of all sources, select the
Nutanix Mine cluster.
2. Click Register with Prism.
3. Click Yes to confirm that you want to proceed.
i Important Registering HYCU with Nutanix Prism may take some time. The
Nutanix Prism web console will not be available during this time.
You can at any time unregister HYCU from Nutanix Prism. To do so, select the respective
Nutanix Mine cluster, and then click Unregister from Prism.
Procedure
1. Log on to the Nutanix Prism web console.
2. From the drop-down menu on the left, select HYCU. The Nutanix Mine with HYCU
dashboard appears.
3. Click Launch HYCU. The HYCU user web interface opens in another tab, allowing you
to manage your data protection environment.
284
14 Employing Nutanix Mine with HYCU
The following table describes what kind of information you can find within each widget:
Dashboard
Description
widget
List of all targets in the data protection environment, not including the
Target Summary
Nutanix, Nutanix Objects, and S3-compatible targets, and the
285
14 Employing Nutanix Mine with HYCU
Dashboard
Description
widget
information on how much space is used and available for storing data.
For details on targets, see “Setting up targets” on page 37.
t Tip You can rearrange the dashboard widgets by dragging and dropping them so
that you have the most important data you want to view at the top of your dashboard.
286
Chapter 15
HYCU Protégé
The HYCU Protégé solution ensures business continuity of your data protection
environment across different infrastructures. Besides storing backup data to Google Cloud
or Azure targets, you can ensure data resilience by migrating virtual machines across the
on-premises and cloud infrastructures (Google Cloud or Azure). In the event of a disaster in
your on-premises environment, HYCU Protégé provides disaster recovery of data to cloud.
Migrate protected data across the on- “Migrating virtual machines across different
premises and Google Cloud environments. environments” on the next page
Prerequisites
l You have an active subscription for HYCU for Google Cloud. For instructions, see HYCU
for Google Cloud documentation.
l A Google Cloud service account is added to HYCU. For instructions, see “Adding a
Google Cloud service account” on page 217.
l You own a HYCU Protégé license. For instructions, see “Licensing” on page 225.
287
15 HYCU Protégé
n Note The instructions for protecting virtual machine data apply also to physical
machines except where specifically stated otherwise.
Prerequisite
The virtual machines that you want to migrate and the virtual machines with the
applications that you want to migrate are protected and have a successful cloud readiness
check during the backup. For more information, see “HYCU Protégé specifics” on page 76.
Limitations
l For Nutanix clusters: You cannot migrate volume groups.
l For vSphere environments: You cannot migrate virtual machine templates.
Depending on whether you want to migrate virtual machine or application data to cloud,
access one of the following panels:
l
Accessing the Virtual Machines panel
To access the Virtual Machines panel, in the navigation pane, click Virtual
Machines.
l
Accessing the Applications panel
To access the Applications panel, in the navigation pane, click Applications.
Procedure
1. In the Virtual Machines or Applications panel, select the entity that you want to migrate.
2. In the Detail view that appears at the bottom of the screen, select the virtual machine or
application restore point that you want to use for the migration.
n Note The Detail view appears only if you click an entity. Selecting the check box
before the name of the entity will not open the Detail view.
288
15 HYCU Protégé
4. Select SpinUp VM to Google Cloud, and then click Next. The SpinUp VM to Google
Cloud dialog box appears.
5. From the Cloud account drop-down menu, select the Google Cloud service account to
which the project where you want to migrate the virtual machine is linked.
6. From the Project, Target region, and Target zone drop-down menus, select the
required values, and then click Next. The VM Settings dialog box opens.
7. From the SpinUp from drop-down menu, select which tier you want to use for the
migration. Your restore point can contain one or more tiers among which you can
select:
l Automatic: Ensures the fastest migration of data to cloud.
l Backup
l Copy
l Archive
l Snapshot
8. In the New VM name field, enter a name for the migrated virtual machine instance.
i Important Make sure the migrated virtual machine instance name is unique.
9. In the vCPU cores field, enter the number of virtual CPUs for the migrated virtual
machine multiplied by the number of cores per virtual CPU. The maximum number of
vCPU cores that you can specify is 1024.
10. In the Memory field, set the amount of memory (in GiB) for the migrated virtual
machine instance. The value that you specify must be a whole number and cannot be
higher than 4096. The default value is the amount of memory in GiB of the original
virtual machine.
11. From the Virtual machine type drop-down menu, select the machine type for the
migrated virtual machine instance.
n Note The list contains machine types that match the specified number of
virtual CPUs and amount of memory. If no such match exists, you can select the
custom machine type. For more information about machine types, see Google
Cloud documentation.
12. Under Network interfaces, the default network interface is displayed and you can check
to which network it is assigned (based on the selected project and region). Depending
on your data protection needs, you can leave the default network interface or do one of
the following:
l Add a new network interface:
a. Click Add Network Interface. The Network dialog box appears.
b. From the Target networks drop-down menu, select a network to which you
want to add the migrated virtual machine instance. You can choose among the
networks configured in the selected project and other networks that your cloud
account has access to.
289
15 HYCU Protégé
c. Select the external address type for the network interface and, if required, the
name of the desired external IP address resource. For details, see HYCU for
Google Cloud documentation.
d. Select the internal address type for the network interface and, if required,
depending on the address type, do one of the following:
o In the Internal address field, enter the desired IP address.
o From the Internal address drop-down menu, select the name of the
desired internal IP address resource.
For details, see HYCU for Google Cloud documentation.
e. Click Save.
l Select another network for the existing network interface by selecting it, clicking
Edit and making the required modifications.
l Delete the existing network interface by selecting it, and then clicking Delete.
13. Only if the virtual machine operating system has not been discovered yet. Select the virtual
machine operating system:
l Linux
l Windows
14. Only if virtual disks have been excluded from the backup (manually or automatically): Use the
Create excluded disks as blank switch if you want blank disks of the same size and
configuration as the excluded ones to be created and attached to the migrated virtual
machine.
15. Click SpinUp.
The Migration to cloud job starts. When it finishes successfully, you can check the migrated
virtual machine instance in the Instances panel in HYCU for Google Cloud. For details, see
HYCU for Google Cloud documentation.
290
15 HYCU Protégé
Procedure
1. In the Virtual Machines panel, click SpinUp VM from Cloud. The SpinUp VM from
Cloud dialog box appears.
2. Select SpinUp VM from Google Cloud, and then click Next. The SpinUp VM from
Google Cloud dialog box opens.
3. From the Cloud account drop-down menu, select the Google Cloud service account to
which the project containing the virtual machine instance that you want to migrate is
linked.
4. From the Project drop-down menu, select the Google Cloud project to which the virtual
machine instance that you want to migrate belongs.
5. From the Virtual machine drop-down menu, select the virtual machine instance that
you want to migrate.
6. From the Checkpoint drop-down menu, select the checkpoint from which you want to
migrate virtual machine instance data.
7. Click Next. The VM Settings dialog box opens.
8. From the Storage container drop-down menu, select where you want to migrate the
virtual machine instance.
9. In the New VM name field, enter a name for the migrated virtual machine.
10. Only if the virtual machine that you are migrating was created in the on-premises
environment, migrated to cloud, and now you are migrating it back to the on-premises
environment. If you want the virtual machine to have the same virtual machine settings
as it had in the on-premises environment, enable the Keep original on-premises
settings option, and then continue with step 13.
Otherwise, leave the Keep original on-premises settings option disabled and continue
with the next step.
11. Specify the following values for the migrated virtual machine:
l The number of virtual CPUs. The maximum number that you can specify is 1024.
l The number of cores per virtual CPU. The maximum number that you can specify is
64.
l The amount of memory (in GiB). The value that you specify must be a whole
number and cannot be higher than 4096.
n Note The default values are the ones that the virtual machine had in the
environment in which it was created, either in the on-premises or cloud one.
12. Under Network adapters, depending on your data protection needs, do one of the
following:
291
15 HYCU Protégé
292
15 HYCU Protégé
Prerequisites
l You have a Google Account with the following permissions:
o To access Google Cloud Storage buckets in the Google Cloud project where you
want to deploy your new HYCU backup controller.
o To deploy Google Compute Engine VM instances to the Google Cloud project where
you want to deploy your new HYCU backup controller.
o To set up a firewall rule in the Google Cloud network where you plan to deploy your
new HYCU backup controller.
l You have the HYCU virtual appliance image for the Google Cloud service suite. To obtain
the image and further instructions, contact HYCU Customer Support.
l The virtual machines that you want to migrate and the virtual machines on which
applications that you want to migrate are running are protected and have the
Migration/DR-ready status. For more information, see “HYCU Protégé specifics” on
page 76.
Consideration
When the HYCU backup controller is deployed in Google Cloud, changing network settings
is prevented in HYCU.
Procedure
1. Open a web browser, go to the Google Cloud Console webpage, and sign in to Google.
2. Select the Google Cloud project where you want to deploy the HYCU backup controller.
3. In the Compute Engine browser, in the Images context, create a new Google Compute
Engine image from the HYCU virtual appliance image. For instructions, see Google
Cloud documentation.
4. Based on this image, create a VM instance with an additional disk of 32 GB in size. A
HYCU backup controller is deployed. For instructions, see Google Cloud
documentation.
5. In the VPC network pane, in the Firewall rules context, create a new firewall rule to
allow ingress network traffic through the TCP port 8443 from the entire subnetwork
which the HYCU backup controller belongs to. For instructions, see Google Cloud
documentation.
6. Log on to HYCU by specifying the following URL:
https://<IPAddress>:8443
293
15 HYCU Protégé
In this instance, <IPAddress> is the external IP address of the newly deployed HYCU
backup controller.
7. Add a Google Cloud service account with permissions to access the Google Cloud
Storage buckets where backup data of the protected virtual machines is stored. For
instructions, see “Adding a Google Cloud service account” on page 217.
8. Import the Google Cloud target with your backup data:
a. In the Targets panel, click Import. The Import Target dialog box appears.
b. In the Bucket Name field, enter the name as it was specified in the original target
configuration.
c. From the Cloud Account drop-down list, select an imported Google Cloud service
account, and then click Next.
d. Click the target name to confirm your selection, and then click Next.
e. In the Multiple Targets dialog box, one or more targets that store backup data are
displayed. If any additional targets are found, select them one by one and specify
the values so that they match the original target configuration. For each target, click
Validate to check the configuration.
f. After you validated all the targets required for your restore, click Import.
9. Migrate your virtual machines or applications to cloud. For instructions, see “Migrating
data to cloud” on page 288.
Migrate protected data across the on- “Migrating virtual machines across different
premises and Azure environments. environments” on the next page
Prerequisites
l You have an active subscription for HYCU for Azure. For details, see HYCU for Azure
documentation.
294
15 HYCU Protégé
l An Azure service principal is added to HYCU. For instructions, see “Adding an Azure
service principal” on page 219.
l You own a HYCU Protégé license. For details, see “Licensing” on page 225.
l You have created a dedicated storage account in Azure. This storage account must be
in the same region and resource group as the virtual machine that you plan to migrate,
and its type must be either Standard general-purpose v2 or Premium block blobs.
n Note The instructions for protecting virtual machine data apply also to physical
machines except where specifically stated otherwise.
Prerequisite
The virtual machines that you want to migrate and the virtual machines with the
applications that you want to migrate are protected and have a successful cloud readiness
check during the backup. For more information, see “HYCU Protégé specifics” on page 76.
Limitations
l For Nutanix clusters: You cannot migrate volume groups.
l For vSphere environments: You cannot migrate virtual machine templates.
Considerations
l After you migrate data to cloud, an Azure temporary disk is automatically assigned to
the migrated virtual machine. This disk is not a managed disk and it is used only for
short-term data storage.
l For virtual machines with secure boot enabled: Because Azure does not currently support
the secure boot feature for virtual machines, after you migrate such a virtual machine to
Azure, secure boot cannot be enabled for it.
Depending on whether you want to migrate virtual machine or application data to cloud,
access one of the following panels:
295
15 HYCU Protégé
l
Accessing the Virtual Machines panel
To access the Virtual Machines panel, in the navigation pane, click Virtual
Machines.
l
Accessing the Applications panel
To access the Applications panel, in the navigation pane, click Applications.
Procedure
1. In the Virtual Machines or Applications panel, select the entity that you want to migrate.
2. In the Detail view that appears at the bottom of the screen, select the virtual machine or
application restore point that you want to use for the migration.
n Note The Detail view appears only if you click an entity. Selecting the check box
before the name of the entity will not open the Detail view.
12. In the New VM name field, enter a name for the migrated virtual machine.
13. In the vCPU cores field, enter the number of virtual CPUs to be assigned to the migrated
virtual machine multiplied by the number of cores per virtual CPU. The maximum
number that you can specify is 1024.
296
15 HYCU Protégé
14. In the Memory field, enter the amount of memory (in GiB) to be assigned to the
migrated virtual machine. The value that you specify must be a whole number and
cannot be higher than 4096.
15. From the Virtual machine type drop-down menu, select the virtual machine type.
i Important The list of available virtual machine types is based on the number
of virtual CPU cores and the amount of memory that you specified. If no virtual
machine type exactly corresponds to the specified values, the closest matches are
shown.
16. Under Network interfaces, the default network interface is displayed and you can check
to which network and subnet it is assigned (based on the selected resource group and
region). Depending on your data protection needs, you can leave the default network
interface or do one of the following:
l Add a new network interface:
a. Click Add Network Interface. The Network dialog box appears.
b. From the Network drop-down menu, select the virtual network for the network
interface.
c. From the Subnet drop-down menu, select a subnet within the selected virtual
network to which the network interface will be assigned.
d. Click Add.
l Select another subnet for the existing network interface by selecting it, clicking
Edit, and then making the required modification.
l Delete the existing network interface by selecting it, and then clicking Delete.
17. Only if the virtual machine operating system has not been discovered yet. Select the virtual
machine operating system:
l Linux
l Windows
18. Only if virtual disks have been excluded from the backup (manually or automatically): Use the
Create excluded disks as blank switch if you want blank disks of the same size and
configuration as the excluded ones to be created and attached to the migrated virtual
machine.
19. Click SpinUp.
The Migration to cloud job starts. When it finishes successfully, you can view the migrated
virtual machine in the Virtual Machines panel in HYCU for Azure. For details, see HYCU for
Azure documentation.
297
15 HYCU Protégé
Limitation
For Nutanix clusters: You can migrate Azure Generation 2 virtual machines only to clusters
that support UEFI virtual machines.
Consideration
After you migrate data from cloud, the migrated virtual machine does not contain the
temporary disk that was automatically assigned to it in Azure.
Procedure
1. In the Virtual Machines panel, click SpinUp VM from Cloud. The SpinUp VM from
Cloud dialog box appears.
2. Select SpinUp VM from Azure, and then click Next. The SpinUp VM from Azure dialog
box appears.
3. From the Service principal drop-down menu, select the service principal that has access
to the required resources.
4. From the Subscription drop-down menu, select the HYCU for Azure subscription to
which the virtual machine that you want to migrate belongs.
5. From the Resource group drop-down menu, select the resource group to which the
virtual machine that you want to migrate belongs.
6. From the Virtual machine drop-down menu, select the virtual machine that you want to
migrate.
7. From the Checkpoint drop-down menu, select the checkpoint from which you want to
migrate virtual machine data.
8. From the Storage account drop-down menu, select the storage account that is
dedicated exclusively to migration operations.
9. Click Next. The VM Settings dialog box appears.
298
15 HYCU Protégé
10. From the Storage container drop-down menu, select where you want to migrate the
virtual machine.
11. In the New VM name field, enter a name for the migrated virtual machine.
12. Only if the virtual machine that you are migrating was created in the on-premises
environment, migrated to cloud, and now you are migrating it back to the on-premises
environment. If you want the virtual machine to have the same virtual machine settings
as it had in the on-premises environment, enable the Keep original on-premises
settings option, and then continue with step 15.
Otherwise, leave the Keep original on-premises settings option disabled and continue
with the next step.
13. Specify the following values for the migrated virtual machine:
l The number of virtual CPUs. The maximum number that you can specify is 1024.
l The number of cores to be assigned to each virtual CPU. The maximum number
that you can specify is 64.
l The amount of memory (in GiB). The value that you specify must be a whole
number and cannot be higher than 4096.
n Note The default values are the ones that the virtual machine had in the
environment in which it was created, either in the on-premises or cloud one.
14. Under Network adapters, depending on your data protection needs, do one of the
following:
l Add one or more network adapters:
a. Click Add Network Adapter. The Network dialog box appears.
b. From the Network drop-down menu, select the virtual network for the network
adapter.
c. Click Add.
l Edit any of the existing network adapters to connect the virtual machine to a
different network. To do so, select a network adapter, click Edit, and make the
required modification.
l Delete any of the existing network adapters by selecting it, and then clicking
Delete. If you delete all the existing network adapters, your virtual machine will
be migrated without network connectivity.
15. Use the Power virtual machine on switch if you want to turn the migrated virtual
machine on after the migration.
16. Click SpinUp.
The Migration from cloud job starts. When it finishes successfully, you can view the
migrated virtual machine in the Virtual Machines panel.
299
15 HYCU Protégé
Prerequisites
l The virtual machines that you want to migrate and the virtual machines with the
applications that you want to migrate are protected and have the Migration/DR-ready
status. For more information, see “HYCU Protégé specifics” on page 76.
l Only if you plan to deploy the HYCU backup controller by using the HYCU virtual appliance
image. You have the HYCU virtual appliance image for Azure. To obtain the image and
further instructions, contact HYCU Customer Support.
Consideration
When the HYCU backup controller is deployed in Azure, changing network settings is
prevented in HYCU.
Procedure
1. Deploy a HYCU backup controller in one of the following ways:
l By using the HYCU for Azure web user interface (recommended):
For details on how to do this, see HYCU for Azure documentation.
l By using the HYCU virtual appliance image:
300
15 HYCU Protégé
a. In Azure, create a managed image from the HYCU virtual appliance image.
b. Create a virtual machine from the managed image. Make sure the virtual
machine is configured with a public IP address and an additional disk of 32 GiB
in size.
For details on how to do this, see Azure documentation.
2. In Azure, create a new firewall rule to allow ingress network traffic on TCP port 8443
from the entire subnetwork to which the HYCU backup controller belongs. For details,
see Azure documentation.
3. Log on to the HYCU web user interface by specifying the following URL:
https://<IPAddress>:8443
In this instance, <IPAddress> is the external IP address of the newly deployed HYCU
backup controller.
4. Import the Azure target on which your backup data is stored to HYCU:
a. In the Targets panel, click Import. The Import Target dialog box appears.
b. From the Type drop-down menu, select AZURE, AZURE Government, or AZURE
China.
c. In the Storage account name field, enter the Azure storage account name as it was
specified in the original target configuration.
d. In the Secret access key field, enter the secret access key for your Azure account.
e. In the Storage container name, enter the name of the storage container that is
associated with the target and where the backup data is stored.
f. Click Next. The Import Backup Catalog dialog box appears.
g. Select the HYCU backup controller whose backup data you want to import, and
then click Next.
h. In the Multiple Targets dialog box, do one of the following:
l If backup data is stored on one target:
Click Import.
l If backup data is stored on more than one target:
i. Select each target one by one and specify the values so that they match the
original target configuration.
301
15 HYCU Protégé
302
Appendix A
Customizing HYCU
configuration settings
You can find all HYCU configuration settings in the config.properties.template file in the
/opt/grizzly folder on your HYCU backup controller. This file contains a list of all available
configuration settings and their default values. If you want to adjust any of these
configuration settings to meet your specific data protection environment needs and
provide optimal performance, create a new config.properties file in the same folder, and
then specify the desired configuration settings and their new values.
n Note When you upgrade HYCU, the config.properties file will be kept. However,
you may want to check the updated config.properties.template file for new
configuration settings that you can use with the new HYCU version.
Depending on which configuration settings you want to customize, see one of the following
sections:
l “Snapshot settings” on the next page
l “Utilization threshold settings” on page 305
l “Display settings” on page 305
l “SQL Server application settings” on page 305
l “Settings for aborting jobs” on page 306
l “HTTPS for WinRM configuration settings”
l “Nutanix Files settings” on page 306
l “Data rehydration settings” on page 307
l “HYCU backup controller restore settings” on page 308
l “User management settings” on page 308
Procedure
1. Open a remote session to the HYCU backup controller virtual machine:
ssh hycu@<HYCUBackupControllerIPAddress>
303
A Customizing HYCU configuration settings
For detailed information about accessing the HYCU backup controller virtual machine
by using SSH, see “Accessing the HYCU backup controller virtual machine by using SSH”
on page 258.
2. Access and open the config.properties file by using one of the following text editors:
l Vim:
sudo vi /opt/grizzly/config.properties
l Nano:
Annotation Description
The changes are applied when a new operation that does not create a
Operation job is executed (for example, when using the HYCU web user interface,
REST API, SSH, or WinRM).
The changes are applied when the HYCU application server (the Grizzly
Service
server) is restarted.
Snapshot settings
You can use the following settings to configure the snapshot retention threshold at which
an event is triggered:
Setting Description
304
A Customizing HYCU configuration settings
Setting Description
Setting Description
For detailed information about the health status of the target, see “Viewing target
information” on page 186.
Display settings
You can use the following setting to customize the maximum number of displayed items:
Setting Description
Setting Description
305
A Customizing HYCU configuration settings
Setting Description
Setting Description
Time interval (in minutes) at which all jobs that have the
Executing status are retrieved and stopped if they have
jobs.abort.interval.minutes
been in this status longer than specified in the
jobs.abort.deadline.minutes setting. The default value is 15.
Setting Description
Setting Description
306
A Customizing HYCU configuration settings
Setting Description
Setting Description
307
A Customizing HYCU configuration settings
Setting Description
Setting Description
Setting Description
308
Appendix B
Restoring to an environment
with a different hypervisor
This appendix describes prerequisites, limitations, considerations, and/or additional steps
that you should perform to successfully restore a virtual machine to an environment that is
based on a different hypervisor.
VM source VM target
Restore option Additional information
environment environment
Prerequisite
For Linux virtual machines that you plan to restore to an environment with a different hypervisor:
In the /etc/fstab system configuration file of the virtual machine, UUIDs (for example,
UUID=8ff089c0-8e71-4320-a8e9-dbab8f18a7e5) must be used instead of device names
for file system device identification.
309
B Restoring to an environment with a different hypervisor
Considerations
l If during a restore of the selected virtual machine you receive a warning message
indicating that there is a guest operating system mismatch detected (between the guest
operating system that is running on the virtual machine and the one specified during
the configuration of the virtual machine) or a memory size mismatch detected while
creating a new virtual machine, make sure to modify the virtual machine configuration
after the restore by specifying the appropriate guest operating system or memory. By
doing so, you make sure that the restored virtual machine has the same configuration
as it had before the restore. For details on how to do this, see Nutanix or VMware
documentation.
For details on how to restore a virtual machine, see “Restoring virtual machines” on
page 86.
l For virtual machines with attached volume groups: You must reattach the volume groups
to the virtual machine after the restore. For details on how to do this, see Nutanix and
guest operating system documentation.
Consideration
Only if restoring a virtual machine with more than one disk from a vSphere environment to a
Nutanix AHV cluster. After the restore, additional disks will be offline. Make sure to bring
them back online.
Recommendations
To avoid having to perform manual steps after restoring a virtual machine on a Nutanix
ESXi cluster or in a vSphere environment to a Nutanix AHV cluster, you should follow these
recommendations before backing it up:
l For Windows virtual machines: The Nutanix VirtIO package is installed on the virtual
machine.
l For Linux virtual machines on Nutanix ESXi clusters: NGT is installed on your virtual
machine.
l For Linux virtual machines in vSphere environments: The VirtIO drivers are added to the
guest OS kernel.
How to determine the availability of the VirtIO drivers and add them if necessary
310
B Restoring to an environment with a different hypervisor
To check if the VirtIO drivers are available in the installed kernel, as the root user, run the
following command:
The following output confirms that the VirtIO drivers are available:
CONFIG_VIRTIO_BLK=m
CONFIG_SCSI_VIRTIO=m
CONFIG_VIRTIO_NET=m
CONFIG_VIRTIO_CONSOLE=m
CONFIG_HW_RANDOM_VIRTIO=m
CONFIG_DRM_VIRTIO_GPU=m
CONFIG_VIRTIO=m
# Virtio drivers
CONFIG_VIRTIO_PCI=m
CONFIG_VIRTIO_PCI_LEGACY=y
CONFIG_VIRTIO_BALLOON=m
CONFIG_VIRTIO_INPUT=m
# CONFIG_VIRTIO_MMIO is not set
To check if the VirtIO drivers are added to the kernel, as the root user, run the following
commands:
An output similar to the following one appears if the VirtIO drivers are added to the
kernel:
97084 blocks
If the output is blank, the VirtIO drivers are not added to the kernel. To add the VirtIO
drivers to the kernel, as the root user, run the following command:
To check if the VirtIO drivers are added to the kernel, as the root user, run the following
commands:
usr/lib/modules/`uname -r`/kernel/drivers/scsi/virtio_scsi.ko
usr/lib/modules/`uname -r`/.x86_64/kernel/drivers/block/virtio_blk.ko
usr/lib/modules/`uname -r`/kernel/drivers/char/virtio_console.ko
usr/lib/modules/`uname -r`/kernel/drivers/net/virtio_net.ko
usr/lib/modules/`uname -r`/kernel/drivers/virtio
311
B Restoring to an environment with a different hypervisor
usr/lib/modules/`uname -r`/kernel/drivers/virtio/virtio.ko
usr/lib/modules/`uname -r`/kernel/drivers/virtio/virtio_pci.ko
usr/lib/modules/`uname -r`/kernel/drivers/virtio/virtio_ring.ko
97084 blocks
If you have not followed the above recommendations, your virtual machine will not boot
after the restore, and you must perform the following additional steps:
1. Make sure that the restored virtual machine is turned off.
2. As the administrator or the root user, log on to the Nutanix AHV cluster by using SSH.
3. List the virtual machine details:
4. Take a note of the current bus and index values in the disk_list section.
5. Clone the existing disk to a new disk on the compatible bus:
In this instance, <VMName> is the name of the restored virtual machine, <BusType> is
scsi, ide, or sata, <CurrentBus> is the bus value from the disk_list section, and
<CurrentIndex> is the index value from the disk_list section.
If the original virtual machine has the SATA or SCSI disks, clone them to the SATA disks.
For example:
If the original virtual machine has the IDE disks, clone them to the IDE disks. For
example:
After you perform the previous procedure for all the disks, follow these steps:
1. Log on to the Nutanix Prism web console.
2. In the menu bar, click Home, and then select VM.
3. Click the Table tab to display the VM Table view.
4. From the list of virtual machines, select the restored virtual machine, and click Update.
5. Delete the source disks, and then select the boot disk and click Save.
6. Click Power on to turn on the restored virtual machine.
7. Install the Nutanix Guest Tools software bundle of the latest version on the virtual
312
B Restoring to an environment with a different hypervisor
machine.
8. Recommended for virtual machines that had the SCSI disks. Clone the controller back to the
SCSI controller.
For details on how to update a virtual machine on a Nutanix cluster, see Nutanix
documentation.
n Note You can use either the vSphere Web Client or the vSphere Client as the
interface for performing the steps. As an example, you are guided through the steps
that you must perform if you are using the vSphere Web Client.
Steps
l If the type of controller on the restored virtual machine is not the same as it was on the
original virtual machine, do the following:
1. Log on to the vSphere Web Client.
2. Click the VMs tab, and then right-click the restored virtual machine and select Edit
Settings.
3. On the Virtual Hardware tab, modify the controller settings so that they match the
ones on the original virtual machine.
l If the virtual machine uses UEFI firmware, edit the settings of the restored virtual
machine as follows:
1. Log on to the vSphere Web Client.
2. Click the VMs tab, and then right-click the restored virtual machine and select Edit
Settings.
3. For Linux virtual machines: On the Virtual Hardware tab, change the controller to
VMware Paravirtual.
4. Click the VM Options tab, and then, under Boot Options, change the firmware to
EFI.
5. Only if you need to select the boot file manually. Access the EFI Boot Manager menu,
and then do the following:
a. Select the Enter setup option.
b. Enter the boot maintenance manager by selecting Boot option maintenance
menu.
c. Use the Boot from a File option to browse for a boot file.
313
B Restoring to an environment with a different hypervisor
d. Find a device whose name contains the GPT string that represents the boot
partition, and then press Enter to open it.
e. Navigate to the EFI boot file that you can find at the following location:
o Windows: \EFI\Microsoft\Boot\bootmgrfw.efi
o Linux: /EFI/<OSName>/grubx64.efi
f. Press Enter to resume booting.
Procedure
1. Restore the virtual machine to a new location by creating its clone. For instructions, see
“Cloning a virtual machine” on page 91
2. Only if the original virtual machine resided on a Nutanix AHV cluster. Modify the virtual
machine configuration by specifying the appropriate guest operating system.
3. Only if the restored virtual machine has more than one disk. Check the hard drive boot
order of the restored virtual machine. If it differs from the one on the original virtual
machine, change the boot order in BIOS.
314
Provide feedback
For any suggestions and comments regarding this product or its documentation, send us
an e-mail to:
315
www.hycu.com