Loading...

System Requirements for Virtual Server Agent with Microsoft Azure

Azure Version

Commvault software is supported for virtual machines deployed in Azure Classic or Azure Resource Manager (ARM).

For virtual machines deployed in Azure Classic, data recovery to Premium storage accounts is not supported. This restriction applies for Live Sync, VM conversion, and VM restore jobs. 

Deprecated: The Azure Classic Deployment Model feature is deprecated in this version of the software. Existing Azure Classic configurations will continue to work as defined. However, new configurations will not be supported.

Use the Azure Resource Manager Deployment Model for new configurations, and to redeploy existing Azure Classic resources.

Virtual Server Agent Proxy Requirements

A physical machine or an Azure virtual machine with the Virtual Server Agent (VSA) installed can act as a VSA proxy to perform backups and restores.

A VSA proxy must meet the following requirements:

  • The VSA proxy machine must run one of the following operating systems:
    • Windows:

      Configure one of the following versions with the required software:

      • Windows Server 2016
      • Windows Server 2012 R2 and later
    • Linux:

      Use one of the following methods:

      • Best Method: Deploy an Azure Marketplace virtual machine image to function as a Virtual Server Agent proxy for Azure. For more information, see Deploying an Azure VM from the Marketplace.
      • Alternative Method: Configure one of the following versions with the required software:

        CentOS Linux 7.4

        Red Hat Enterprise Linux (RHEL) 7.4

  • Minimum of 100 GB disk space.
  • Minimum of 4 GB RAM, beyond the requirements of the operating system and any other running applications.

    If the CommServe software, MediaAgent, and VSA are all installed on the same Azure VM, provide a minimum of 10 GB RAM.

  • Minimum of 4 CPU cores.
  • A VSA proxy for Azure Classic must have an Azure management certificate installed.
  • If the Azure subscription includes multiple regions, deploy at least one VSA proxy per region.
  • A VSA proxy for Azure must be accessible from Commvault resources outside of Azure. If the VSA proxy in Azure is not accessible using a private IP address from Commvault resources outside of Azure, a public IP address will be required. Note that if a VPN or ExpressRoute is available between on-premise resources and Azure, and if the VSA proxy is accessible using a private IP address from the Commserve and MediaAgent, then a public IP address is not required.

For best results:

  • Deploy the VSA proxy and MediaAgent on virtual machines in the Azure cloud.
  • Deploy the VSA proxy on an Azure VM that is optimized for I/O intensive workloads to support faster backups. See Sizes for virtual machines in Azure for more information.
  • Enable Azure accelerated networking on the VSA proxy/MediaAgent machines in Azure. This step must be completed at the time of deploying the virtual machine.
  • Enable service endpoints for Microsoft Storage on the Azure virtual network subnet where the proxy and MediaAgent are connected. This will ensure that all network traffic from the proxy machine to the Azure storage account is securely flowing through the Microsoft Azure backbone network.
  • Enable Changed Block Tracking for Azure. Changed Block Tracking (CBT) for Azure provides better backup performance than traditional cyclic redundancy check (CRC) backups. Changed Block Tracking is supported for unmanaged disks only.

Guest Operating Systems

Virtual machines being backed up can have any of the guest operating systems that are supported by the Azure platform.

Azure Endpoints

To support backups and restores that are not available through the Azure global endpoint, create the AzureRegion additional setting on the VSA proxy and specify the additional endpoints as values.

For instructions on adding additional settings from the CommCell Console, see Add or Modify an Additional Setting.

Property

Value

Name

AzureRegion

Category

VirtualServer

Type

String

Value

China, usgov, Germany

Note: This additional setting can be configured for these regions only: China, usgov, and Germany.

Firewall Requirements

Tunnel ports (for example, 8400 and 8403) must be opened in the security group for the instance to enable installation of the Virtual Server Agent to Azure virtual machines and communication with the CommServe system.

If you deploy a CommServe host in an environment with firewalls, create a persistent route from the CommServe host to the VSA proxy, as documented in Setting Up Network Gateway Connections Using a Predefined Network Topology. Specify the RESTRICTED setting for connections from the CommServe host to the VSA proxy (step 3 under If you chose not to use predefined network topologies) and the BLOCKED setting in the CommServe node settings for the proxy (step 9).

If a firewall proxy is installed, configure Internet options for the firewall proxy machine. On the HTTP Proxy tab of the Internet Options dialog box, enter the user name and password for the firewall proxy machine, using only the user name and not including the domain name with the user name.

All requests from VSA proxy machines connect through port 443 of the Azure endpoints. Therefore:

  • If a firewall is configured on the proxy machine, then port 443 must remain open.
  • If the proxy machine is an instance in the cloud, then port 443 must be opened at the network security group level for the VSA proxy instance.

To access Azure backup and restore services for the Azure regions, incorporate the following URLs in your firewall or proxy settings.

Azure

Azure China

Azure Germany

Azure US Gov

https://management.azure.com/

https://login.microsoftonline.com/

https://*.blob.core.windows.net

https://vault.azure.net

https://graph.windows.net/

http://169.254.169.254/metadata/identity/oauth2/token

https://management.chinacloudapi.cn/

https://login.chinacloudapi.cn/

https://*.blob.core.chinacloudapi.cn

https://vault.azure.cn

https://graph.chinacloudapi.cn/

http://169.254.169.254/metadata/identity/oauth2/token

https://management.microsoftazure.de/

https://login.microsoftonline.de/

https://*.blob.core.cloudapi.de

https://vault.microsoftazure.de

https://graph.cloudapi.de/

http://169.254.169.254/metadata/identity/oauth2/token

https://management.usgovcloudapi.net/

https://login.microsoftonline.us/

https://*.blob.core.usgovcloudapi.net

https://vault.usgovcloudapi.net

https://graph.windows.net/

http://169.254.169.254/metadata/identity/oauth2/token

Configuring a Firewall to Install the Virtual Server Agent on a Cloud VM or Instance

To deploy the Virtual Server Agent (VSA) or MediaAgent on a cloud VM or instance when other components (such as the CommServe host) are on premises, configure a Commvault firewall connection between the on premises components and the cloud VM or instance.

Hardware Specifications

For information about hardware requirements for the Virtual Server Agent, see Hardware Specifications for Virtual Server Agent.

DISCLAIMER

Third-party maintenance (minor) releases or service packs that are supported by the Commvault software may not be listed in our System Requirements. When possible, Commvault provides information on any known issues related to these minor releases or service packs. In some cases, these minor releases or service packs affect how the Commvault software works. Commvault software may experience changes in functionality as the result of the third-party minor release or service pack. These changes are beyond the control of Commvault. Platforms that are supported in the current version of Commvault software may not be supported in earlier versions of the software. Contact your software provider to ensure that third-party minor releases or service packs are compatible with the Commvault software.

Additional considerations regarding minimum requirements and End-of-Life policies from third-party vendors also apply.

Last modified: 11/18/2019 7:56:59 PM