Deploying a VMware Access Node for Linux

You can add a VMware Linux access node (VSA proxy) to a hypervisor. The Linux access node can be used for Live Browse or Live File Recovery operations.

Note

  • As needed, Commvault updates the OVA template to include operating system updates and enhancements. To ensure that the access node contains all features and critical security vulnerability fixes, you must decommission the existing client and deploy the latest Access Node and MediaAgent (FREL) OVA template. You must also upgrade the CommServe server and Virtual Server Agent to the most recent Commvault service pack or install available HotFixes for the installed service pack.

  • You must decommission the existing client only if it was deployed in maintenance release of the respective Commvault service pack, prior to August 2024.

  • Starting 11.32.63 maintenance release, the template has the automatic OS updates feature enabled by default, which automatically installs all critical security vulnerability fixes without the need of decommissioning the client.

Before You Begin

For offline CommCell environments, to deploy a new VMware FREL or Linux access node, you must download the VMware image file (.OVA) and save it to a location on the access node. For instructions, see Configuring Deployment of the VMware Image in an Offline CommCell Environment.

Procedure

  1. From the navigation pane, go to Protect > Virtualization.

    The Virtual machines page appears.

  2. On the Hypervisors tab, click the hypervisor.

    The hypervisor page appears.

  3. On the Configuration tab, in the Access Node tile, click Edit.

    The Edit access node window appears.

  4. Under Access nodes, click Deploy new Linux access node.

    The Deploy Linux Access Node wizard launches and displays the VM name and location page.

  5. Enter a name for the virtual machine (for example, VM_LinuxAccessNode), select a location, and then click Next.

    The Resource page appears.

  6. Select the destination compute resource for this operation, and then click Next.

    The Storage and network page appears.

  7. Configure the following:

    • Destination network: From the list, select the network on the destination site.

    • Virtual disk format: From the list, select the appropriate format for the virtual disk:

      • Thick provision eager zeroed

      • Thick provision lazy zeroed

      • Thin provision

    • Storage for the configuration and disk files: From the list, select the datastore.

    Click Next.

    The Customize template page appears.

  8. Configure the client:

  9. Client name: Short name for the virtual machine (for example, VM_LinuxFileRecoveryEnabler).

    • Client hostname: Host name or IP address for the client.

    • New password for "root": Password for the root user of the virtual machine.

    • Group name: Select the client computer group; the File Recovery Enabler is assigned to that group if the group exists (or after it is created).

    When you configure the client, the firewall settings are automatically inherited from the associated client group.

  10. Configure the IP:

    The following fields need to be entered when the File Recovery Enabler is being deployed using a static IP address, or with DHCP if there is a possibility that the DHCP server in your environment provides incorrect or incomplete DNS information. The fields below override any DNS configuration that is obtained from the DHCP servers.

    • Use DHCP: Select this option or enter values for the Static IP Address, Netmask, and Gateway.

    • DNS Search Suffix: Identifiers for domains to be supported.

    • Nameserver 1: IP address for the primary name server.

    • Nameserver 2: IP address for the secondary name server.

  11. Configure the CommServe route:

    • CommServe or gateway hostname: Verify the gateway hostname or the IP address. Make changes, if required.
  12. Click Next.

    The Preview page appears.

  13. Review the summary, and click Finish.

For more information about client firewall settings, see Network Topologies.

Loading...