Loading...

Virtualization

Common Virtual Server Agent Framework

Virtualization Documentation for the Command Center Reorganized by Hypervisor

Documentation pages for the Virtualization solution in the Command Center are reorganized. The new organization groups pages by the virtualization platform (hypervisor), so that users can find all of the information that is specific to their environment under one section.

For more information, see Virtualization.

Amazon Web Services

Install Virtual Server Agent, File System Agent, or MediaAgent on an AWS 64-Bit Arm Linux Instance

You can deploy an AWS Linux instance that uses a 64-bit Arm processor, and then install any of the following packages:

  • Virtual Server Agent (VSA)
  • Linux File System Agent
  • MediaAgent

AWS instances that use the 64-bit Arm processor provide a lower-cost option for data protection infrastructure.

For more information, see the following topics:

Protect EC2 Instances That Run in AWS Outposts

You can use Commvault to protect EC2 instances running in AWS Outposts.

Outposts is an on-premises deployment of AWS services, infrastructure, and operations that provides hybrid cloud capabilities.

To protect EC2 instances that run on AWS Outposts, add the instances as content for a VM group (VSA subclient) for an Amazon hypervisor (virtualization client).

Support for AWS Outposts was certified in Feature Release 19, and is available from Service Pack 17 and more recent service packs and feature releases. You can protect EC2 instances running in AWS Outposts from an Amazon hypervisor that is configured in the Command Center or from an Amazon virtualization client that is configured in the CommCell Console.

For more information, see AWS Outposts.

Use a Restricted IAM Role for AWS

To restrict access to AWS resources for Commvault operations, you can create a policy that restricts access to resources that are created and used by Commvault.

You can associate the policy with an Amazon hypervisor (Commvault virtualization client) using one of the following methods:

  • Create an IAM role that uses the policy, and attach the role to an Amazon instance that is configured as a VSA proxy for the hypervisor. With this method, choose the IAM Role option for authentication when you configure the hypervisor in Commvault, and specify access nodes (VSA proxies) that have the IAM role attached.
  • Attach the restricted policy to users or user groups. With this method, choose the Access and Secret Key option for authentication when you configure the hypervisor in Commvault, and then enter the access key and secret key associated with a user who has the restricted policy attached.

You can use this restricted role for operations that are performed from the Command Center or from the CommCell Console.

For more information, see Creating a Role with Restricted Access.

VMware

Define a Recovery Target That End Users Can Select for Out-of-Place Restores of VMware VMs

In the Command Center, an admin user can define a recovery target for VMware VMs.

When the recovery target is associated with a user or user group that has limited access to the VMware or Commvault infrastructure, the end user can select the recovery target when restoring a full VM out of place.

For more information, see the following topics:

Install Virtual Server Agent, File System Agent, or MediaAgent on an AWS 64-Bit Arm Linux Instance

You can deploy an AWS Linux instance that uses a 64-bit Arm processor, and then install any of the following packages:

  • Virtual Server Agent (VSA)
  • Linux File System Agent
  • MediaAgent

AWS instances that use the 64-bit Arm processor provide a lower-cost option for data protection infrastructure.

For more information, see the following topics:

Validate Backups of Applications Running on VMware Virtual Machines

You can validate streaming backups of VMware guest virtual machines, including VMs that run applications. Validation performs a live mount operation for the VM, and can also run a script to verify that the VM and application are usable.

You can use validation to verify that backups are available in the event that you need to restore application data from a backup, or to replicate VMs and applications for use in the event of a disaster.

You can configure validation for a VM group in the Command Center.

For more information, see Backup Validation.

Virtual Machine Conversion (Cross-Hypervisor Restores)

Convert Virtual Machines from Azure to Azure Stack

When restoring a virtual machine from a backup for Azure Resource Manager, you can convert the VM to Azure Stack.

This feature can be used to migrate workloads to Azure Stack, and is available in the Command Center.

For more information, see Converting to Azure Stack.

Convert Virtual Machines from VMware to Alibaba Cloud ECS

When restoring a virtual machine from a backup for VMware, you can convert the VM to Alibaba Cloud ECS.

This feature can be used to migrate workloads to Alibaba Cloud ECS, and is available in the Command Center.

For more information, see Converting to Alibaba Cloud ECS from VMware.

Last modified: 6/1/2020 7:34:26 PM