HPE Recovery Manager Central 6.3.x Online User Guide Abstract The guide is intended for administrators who are responsible for primary storage data protection activities using HPE Recovery Manager Central. The guide provides information on how to configure and use HPE Recovery Manager Central. Part Number: NA Published: March 2021 Edition: 01 © Copyright 2019, 2021 Hewlett Packard Enterprise Development LP Notices The information contained herein is subject to change without notice. The only warranties for Hewlett Packard Enterprise products and services are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Hewlett Packard Enterprise shall not be liable for technical or editorial errors or omissions contained herein. Confidential computer software. Valid license from Hewlett Packard Enterprise required for possession, use, or copying. Consistent with FAR 12.211 and 12.212, Commercial Computer Software, Computer Software Documentation, and Technical Data for Commercial Items are licensed to the U.S. Government under vendor's standard commercial license. Links to third-party websites take you outside the Hewlett Packard Enterprise website. Hewlett Packard Enterprise has no control over and is not responsible for information outside the Hewlett Packard Enterprise website. Acknowledgments Intel®, Itanium®, Optane™, Pentium®, Xeon®, Intel Inside®, and the Intel Inside logo are trademarks of Intel Corporation in the U.S. and other countries. Microsoft® and Windows® are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Adobe® and Acrobat® are trademarks of Adobe Systems Incorporated. Java® and Oracle® are registered trademarks of Oracle and/or its affiliates. UNIX® is a registered trademark of The Open Group. VMware®, VMware® vCenter Server®, and VMware vSphere® Web Client are registered trademarks or trademarks of VMware, Inc. in the United States and/or other jurisdictions. SAP HANA® is the trademark or registered trademark of SAP SE in Germany and in several other countries. Revision history Publication date Edition Summary of changes March 2021 01 Minor edits for RMC 6.3.6 release. Contents Getting started with Recovery Manager Central...............................................................8 Recovery Manager Central................................................................................................................................................................................................... 8 Multitier data protection........................................................................................................................................................................................................ 8 Launching RMC GUI...............................................................................................................................................................................................................10 About the RMC GUI................................................................................................................................................................................................................11 Configuration and General Settings.................................................................................. 13 Settings......................................................................................................................................................................................................................................... 13 General Settings..................................................................................................................................................................................................... 13 About upgrading RMC using the GUI........................................................................................................................................................ 13 Upgrading RMC using the GUI.......................................................................................................................................................................13 Editing Time and Locale....................................................................................................................................................................................13 Shutting down or restarting RMC appliance..........................................................................................................................................13 Editing the network settings...........................................................................................................................................................................14 Managing the RMC application services.................................................................................................................................................. 14 Editing appliance preference.......................................................................................................................................................................... 14 Catalog Protection................................................................................................................................................................................................ 20 Storage devices........................................................................................................................................................................................................................ 26 Copy Repositories, Catalyst Stores, and Storage Pools.................................................................................................................. 26 Adding a storage device....................................................................................................................................................................................26 Creating a Copy Repository from an existing Catalyst Store or Storage Pool.................................................................. 28 Creating a Catalyst Store as Copy Repository .................................................................................................................................... 28 Editing a Copy Repository on HPE 3PAR, HPE Primera or HPE Nimble Storage........................................................... 29 Removing a Copy Repository......................................................................................................................................................................... 29 Editing a storage device.................................................................................................................................................................................... 29 Deleting a storage device................................................................................................................................................................................. 29 Refreshing a storage device............................................................................................................................................................................ 30 Users and groups.................................................................................................................................................................................................................... 30 Adding a user...........................................................................................................................................................................................................30 Changing the user password...........................................................................................................................................................................31 Deleting a user.........................................................................................................................................................................................................31 Directory server...................................................................................................................................................................................................... 31 Assigning a user role............................................................................................................................................................................................33 Unassigning a user role......................................................................................................................................................................................33 Remote appliances................................................................................................................................................................................................................. 34 Registering a remote appliance.....................................................................................................................................................................34 Editing a remote appliance.............................................................................................................................................................................. 34 Hypervisor servers................................................................................................................................................................................................................. 34 Adding a hypervisor server..............................................................................................................................................................................34 Editing a hypervisor server..............................................................................................................................................................................35 Refreshing a hypervisor server......................................................................................................................................................................35 Removing a hypervisor server....................................................................................................................................................................... 35 Configuring Volume Sets and Application Plug-ins....................................................... 36 Volume Sets - Crash Consistent Protection.............................................................................................................................................................36 Adding a Volume Set...........................................................................................................................................................................................36 3 Editing a Volume Set........................................................................................................................................................................................... 36 Deleting a Volume Set........................................................................................................................................................................................ 37 Attaching a Volume Set..................................................................................................................................................................................... 37 Detaching a Volume Set.................................................................................................................................................................................... 37 Refreshing a Volume Set................................................................................................................................................................................... 37 RMC-E............................................................................................................................................................................................................................................ 38 Exchange Server screen details.....................................................................................................................................................................38 Microsoft Exchange Databases..................................................................................................................................................................... 41 RMC-O............................................................................................................................................................................................................................................44 About Oracle servers...........................................................................................................................................................................................44 About Oracle databases.....................................................................................................................................................................................47 RMC-S............................................................................................................................................................................................................................................ 51 RMC-S overview......................................................................................................................................................................................................51 Prerequisites for working with RMC-S...................................................................................................................................................... 51 MS SQL servers.......................................................................................................................................................................................................51 MS SQL instances.................................................................................................................................................................................................. 52 MS SQL databases................................................................................................................................................................................................ 54 RMC-SH.........................................................................................................................................................................................................................................55 RMC-SH overview..................................................................................................................................................................................................55 SAP HANA host......................................................................................................................................................................................................55 SAP HANA database........................................................................................................................................................................................... 58 Copy Policies.......................................................................................................................... 66 Duplicating a Copy Policy...................................................................................................................................................................................................67 Editing a Copy Policy............................................................................................................................................................................................................ 67 Adding a Copy Policy............................................................................................................................................................................................................68 Snapshot details..................................................................................................................................................................................................... 68 Remote snapshot details...................................................................................................................................................................................69 Express Protect details.......................................................................................................................................................................................70 Catalyst Copy details...........................................................................................................................................................................................71 Cloud Copy details................................................................................................................................................................................................ 71 Transaction log details....................................................................................................................................................................................... 72 Peer Copy details...................................................................................................................................................................................................73 Removing a Copy Policy......................................................................................................................................................................................................73 Protecting Applications and Volumes...............................................................................75 Volumes........................................................................................................................................................................................................................................ 75 Adding protection for a Volume Set...........................................................................................................................................................75 Editing a Volume Set protection...................................................................................................................................................................75 Removing a Volume Set protection............................................................................................................................................................ 75 Protecting Volume Sets..................................................................................................................................................................................... 76 RMC-E............................................................................................................................................................................................................................................ 77 Adding a Protection............................................................................................................................................................................................. 77 Editing a Protection..............................................................................................................................................................................................78 Removing a Protection....................................................................................................................................................................................... 79 Protecting a database.........................................................................................................................................................................................79 RMC-O............................................................................................................................................................................................................................................84 Adding Protection for an Oracle database............................................................................................................................................. 84 Editing protection for an Oracle database..............................................................................................................................................85 Removing a Protection....................................................................................................................................................................................... 85 Protecting an Oracle database...................................................................................................................................................................... 86 RMC-S............................................................................................................................................................................................................................................ 91 Adding protection for an MS SQL instance............................................................................................................................................91 4 Removing protection for an MS SQL instance or database..........................................................................................................91 Editing protection for an MS SQL instance or database................................................................................................................ 91 Protect Once — MS SQL server instances..............................................................................................................................................92 Adding protection for an MS SQL database.......................................................................................................................................... 97 Protect Once — MS SQL server databases............................................................................................................................................ 98 Transaction Log......................................................................................................................................................................................................98 RMC-SH......................................................................................................................................................................................................................................100 Adding Protection for a SAP HANA database.................................................................................................................................. 100 Editing protection for a SAP HANA database...................................................................................................................................101 Removing protection........................................................................................................................................................................................ 102 Protecting an SAP database........................................................................................................................................................................ 102 Viewing and Managing Copies......................................................................................... 107 Volumes..................................................................................................................................................................................................................................... 111 Editing a Copy...................................................................................................................................................................................................... 112 Attaching a Copy................................................................................................................................................................................................ 112 Detaching a Copy................................................................................................................................................................................................113 Deleting a Copy....................................................................................................................................................................................................113 Refreshing a snapshot or a Peer Copy snapshot............................................................................................................................. 113 Verifying an Express Protect.......................................................................................................................................................................114 Canceling an Express Protect......................................................................................................................................................................114 Resuming an Express Protect..................................................................................................................................................................... 114 Canceling a Catalyst Copy.............................................................................................................................................................................115 Syncing a Peer Copy snapshot................................................................................................................................................................... 115 Splitting the association between source Volume Sets and Target Volume Sets........................................................115 Canceling the Peer Copy syncing operation.......................................................................................................................................116 Resuming the Peer Copy syncing operation.......................................................................................................................................116 RMC-E......................................................................................................................................................................................................................................... 116 Validating a snapshot.......................................................................................................................................................................................116 Editing a snapshot............................................................................................................................................................................................. 117 Mounting a snapshot........................................................................................................................................................................................117 Unmounting a snapshot................................................................................................................................................................................. 118 Removing a snapshot.......................................................................................................................................................................................118 Mounting a backup............................................................................................................................................................................................119 Editing a backup..................................................................................................................................................................................................119 Removing a backup........................................................................................................................................................................................... 120 RMC-O.........................................................................................................................................................................................................................................120 Verifying an Express Protect.......................................................................................................................................................................120 Editing a backup..................................................................................................................................................................................................120 Unmounting a Snapshot.................................................................................................................................................................................121 Removing a clone................................................................................................................................................................................................122 Downloading Metadata...................................................................................................................................................................................122 Verifying a snapshot.........................................................................................................................................................................................122 Editing a snapshot............................................................................................................................................................................................. 123 Editing an Express Protect............................................................................................................................................................................124 RMC-S......................................................................................................................................................................................................................................... 124 Editing MS SQL copies.....................................................................................................................................................................................124 Deleting MS SQL copies..................................................................................................................................................................................125 Resuming an Express Protect..................................................................................................................................................................... 125 Canceling MS SQL copies...............................................................................................................................................................................125 Verifying a database-level snapshot.......................................................................................................................................................126 RMC-SH......................................................................................................................................................................................................................................126 Editing a backup..................................................................................................................................................................................................126 Editing a snapshot............................................................................................................................................................................................. 127 5 Recovering and Cloning Copies........................................................................................128 Volumes..................................................................................................................................................................................................................................... 128 Cloning or restoring a Volume Set............................................................................................................................................................128 RMC-E......................................................................................................................................................................................................................................... 129 Restoring an Exchange database..............................................................................................................................................................129 Restoring a Cloud Copy.................................................................................................................................................................................. 129 Restoring a backup............................................................................................................................................................................................130 Restoring a snapshot........................................................................................................................................................................................131 RMC-O.........................................................................................................................................................................................................................................133 Cloning an Oracle database..........................................................................................................................................................................133 Remounting a cloned snapshot..................................................................................................................................................................135 Removing a cloned database.......................................................................................................................................................................135 Restoring copies..................................................................................................................................................................................................136 Restoring a snapshot from clone ............................................................................................................................................................. 138 RMC-S......................................................................................................................................................................................................................................... 141 Restoring an MS SQL instance....................................................................................................................................................................141 Cloning using an MS SQL instance...........................................................................................................................................................142 Restoring an MS SQL database..................................................................................................................................................................144 Supported restore scenarios of VMFS and RDM disks using RMC when the Guest OS has VMWare snapshots................................................................................................................................................................................................................ 146 Cloning an MS SQL database...................................................................................................................................................................... 146 MS SQL clones......................................................................................................................................................................................................148 RMC-SH......................................................................................................................................................................................................................................150 Attaching a Clone............................................................................................................................................................................................... 150 Detaching a Clone.............................................................................................................................................................................................. 150 Cloning a HANA database.............................................................................................................................................................................150 Restoring copies..................................................................................................................................................................................................151 Monitoring........................................................................................................................... 153 Schedules.................................................................................................................................................................................................................................. 153 Suspending a schedule....................................................................................................................................................................................154 Resuming a schedule........................................................................................................................................................................................154 Editing a schedule.............................................................................................................................................................................................. 154 Dashboard................................................................................................................................................................................................................................ 154 Activities....................................................................................................................................................................................................................................155 RMC Support........................................................................................................................157 Diagnostic check...................................................................................................................................................................................................................157 Generating a support ticket........................................................................................................................................................................................... 157 Websites............................................................................................................................... 159 Support and other resources............................................................................................160 Accessing Hewlett Packard Enterprise Support................................................................................................................................................160 Accessing updates...............................................................................................................................................................................................................160 Remote support.....................................................................................................................................................................................................................161 Warranty information.........................................................................................................................................................................................................161 Regulatory information.....................................................................................................................................................................................................161 Documentation feedback.................................................................................................................................................................................................162 6 Understanding the registry for RMC-S........................................................................... 163 RMC-S error codes.............................................................................................................. 164 Event Messages...................................................................................................................166 7 Getting started with Recovery Manager Central Recovery Manager Central HPE Recovery Manager Central (RMC) software integrates HPE 3PAR, HPE Primera and HPE Nimble Storage arrays with HPE StoreOnce backup systems to provide converged data protection. RMC facilitates policy-driven copy data management for your business critical applications at speeds required for all-flash storage. RMC leverages snapshot performance with storageintegrated backups to deliver flash speed application protection and copy data management with less cost and complexity than legacy solutions. The software is also built for cloud, that allows you to leverage public cloud for cost-effective long-term retention of your backups. Key features • Centralized policies to automate copy data management and data protection. • Create and automate application-consistent snapshots to protect your applications from data loss or corruption risks. • Support for multiple applications including VMware vSphere, Microsoft SQL Server, Microsoft Exchange, Oracle, and SAP HANA databases. Integration with any other application can be scripted using RMC REST APIs. • The Express Protect backups are much faster than traditional backups. Data is moved directly from primary storage to protection storage without any intermediate server restrictions. These application-integrated, snapshot-based backups are for additional protection against threats. • The Express Restore feature ensures that only the changed blocks are efficiently read back from protection storage to deliver much faster restores than traditional backup restores. The feature allows rapid recovery from any of the point-intime copies — backups or copies on public cloud. • Create space-efficient virtual clones from any of the point-in-time copies to be used for secondary use cases such as testing or development, analytics, and reporting. • Detailed reporting, activity tracking, and email notifications. • Peer Copy feature that facilitates asynchronous periodic replication between two or more HPE 3PAR, HPE Primera, and HPE Nimble Storage systems. • Simple and intuitive GUI designed for storage generalists and database administrators without requiring storage specialist expertise. • Cloud Volumes Backup is Backup-as-a-service that allows you to seamlessly backup on-premise data to HPE Cloud using RMC. Multitier data protection With an increase in data access and usage, there is a significant increase in the liability to handle data. The bigger challenge lies in securing and protecting data so that it can be effectively used and retrieved without any data loss. As a database administrator, you can use HPE Recovery Manager Central to create, schedule, and manage snapshots. Using Express Protect, you can create a second-tier of data protection with backup of database volumes from HPE 3PAR, HPE Primera array to HPE StoreOnce. Snapshot Snapshot is a point-in-time copy of the base volume. RMC integrates with various applications to take application-consistent snapshots at any given point-in-time. RMC can take application-consistent snapshots of VMware vSphere VMs, Microsoft SQL Server, Microsoft Exchange, Oracle, and SAP HANA databases residing on 3PAR volumes. Only Microsoft SQL Server is supported with HPE Nimble Storage at present. RMC can also take crash-consistent snapshots for any application or file system data on both HPE 3PAR, HPE Primera and HPE Nimble Storage. Additionally, RMC REST APIs can be used with Getting started with Recovery Manager Central 8 scripted solutions combined with application quiescing scripts to create crash-consistent snapshots to ensure applicationconsistent snapshots for any application not mentioned above, across both HPE 3PAR, HPE Primera and HPE Nimble Storage. Remote Snapshot HPE 3PAR, HPE Primera Remote Copy feature helps you safeguard against disasters by keeping copies of data on a separate HPE 3PAR, HPE Primera storage system, which can be placed at a remote location. HPE 3PAR, HPE Primera Remote Copy Software provides RMC the capability to recover data from any protected site to a recovery site. Using the Remote Recovery Configuration feature, you can create and manage Synchronous, Periodic, or Synchronous Long-Distance Remote Recovery Sets at HPE 3PAR Remote Copy group level. If there is disaster or failure of a storage system, HPE 3PAR Remote Copy solution enables you to recover data at either sites. Express Protect Express Protect provides a second-tier of data protection with backup from HPE storage systems to HPE StoreOnce. Backups to HPE StoreOnce are block-level copies of volumes, de-duplicated to save space, and can be used to recover back to the original or a different HPE 3PAR, HPE Primera or HPE Nimble Storage, even if the original base volume is lost. Catalyst Copy Catalyst Copy is a copy of an Express Protect on another HPE StoreOnce system. You can also create a Copy for an existing Catalyst Copy. Cloud Copy Cloud Copy is a copy of an Express Protect on a Cloud Bank Store or Cloud Volume Backup. RMC also integrates with StoreOnce CloudBank Storage technology which allows you to automate and schedule creating a copy on the HPE Cloud or public cloud such as Amazon S3 or Microsoft Azure. Reads and writes to and from the object storage repository are designed with efficiency to ensure that you incur fewer charges from the cloud service provider by moving only as less data as is required without having to rehydrate the deduplicated data. With Cloud Volume Backup as a storage device type, you can protect the on-premise data to HPE cloud using RMC. The Catalyst Store managed by HPE StoreOnce is called as Backup Store, runs inside the HPE Cloud. The backup target, StoreOnce is called as Backup Pool. A secure tunnel is created after the backup store and backup target device are registered with RMC. For the systems registered with RMC, the data flows through the secure tunnel on the Ethernet to HPE Cloud. Clones Cloning enables you to create a HPE 3PAR, HPE Primera Read-Write snapshot or a Nimble Zero Copy Clone, which facilitates creating copies of your VM or database for test/dev or other secondary data use cases without occupying any additional storage space or affecting the performance of your production copy. Peer Copy Snapshots The Peer Copy feature in RMC facilitates asynchronous periodic replication between two or more homogeneous or heterogeneous storage systems. Peer Copy is a complementary technology to HPE 3PAR, HPE Primera Remote Copy replication for creating a copy of the data on a secondary storage system. This feature supports data replication across HPE 3PAR, HPE Primera, and HPE Nimble Storage systems. Peer Copy allows for one-to-many, many-to-one, and multihop topologies, managed from within the RMC GUI. You can replicate data between HPE 3PAR, HPE Primera and HPE Nimble Storage systems in the following scenarios: • Asynchronous replication of a single volume to multiple storage systems: Assume that a volume has to be replicated to four different storage systems. In this case, you have to create four different Volume Sets from four storage systems as the target and from a single storage system as the source. • Simultaneous volume replication from multiple storage systems to a single system: In this case, volumes from multiple HPE 3PAR, HPE Primera systems are replicated to a single HPE 3PAR, HPE Primera. • Multihop: Assume that a volume in HPE 3PAR, HPE Primera (A) has to be replicated to a volume in HPE 3PAR, HPE Primera (B). This same volume has to be replicated again to HPE 3PAR, HPE Primera (C). In this case, RMC creates two Getting started with Recovery Manager Central 9 different Volume Sets. One for replication between the systems A and B, and one for replication between the systems B and C. NOTE: â—¦ To maintain data consistency, ensure that the target volumes in a peer copy relationship are not used for any other purposes. â—¦ From RMC 6.2.0 onwards, peer copy target volume is write-reserved for RMC appliance using SCSI persistent reservation. This prohibits you to write directly on target volume while it is in peer copy relationship in RMC. The reservation is cleared as part of split operation and volumes that become writable to other hosts. MS SQL server transaction log backups Transaction Log backup operation is used to back up the database Transaction Logs that contain all the committed and uncommitted transactions. After a database failure, you can run the transaction log restore along with a full snapshot or backup restore to recover data to any point-in-time or point-of-failure. A full database backup must exist each time you initiate a manual or schedule a transaction-log backup. When you initiate a manual or scheduled transaction log backup using RMC-S, the database log is truncated. RMC-S supports transaction log backups for databases configured with full recovery model on MS SQL server. Launching RMC GUI Prerequisites For optimum performance of the GUI, set minimum screen resolution of: • Desktop monitors to 1280 × 1024 pixels • Laptop displays to 1280 × 800 pixels RMC GUI supports a minimum screen resolution of 1024 × 768 pixels. Procedure 1. Launch a web browser. 2. Specify the URL in the format https://IP_address. 3. Specify the following credentials: User name Admin Password Password that you specified while deploying RMC using the installation wizard. (For an Active Directory user) Directory server Select an already registered directory. If you have installed RMC by deploying the OVF template or using the Hyper-V PowerShell deployment script, then after your first login, you are prompted to change the password. The default password is admin. The HPE Recovery Manager Central Navigation Tutorial appears. Getting started with Recovery Manager Central 10 The Getting Started screen that appears after the first login prompts you to register RMC with HPE Infosight. The Product Tour window appears after the Getting Started screen. You can navigate to the Getting Started option from the main menu that has links to Product Tour and Register with HPE Infosight. About the RMC GUI To learn the names of common areas, icons, and controls on a UI screen, see the numbered descriptions that appear after the image. 1. HPE Recovery Manager Central Main Menu — The primary menu for navigating to resources. Click the drop-down to access the menu. Getting started with Recovery Manager Central 11 2. Master pane — Lists all resource instances that have been configured on the appliance. In some cases, a status icon indicates general health of the resource. 3. All Statuses — You can filter the view of resource instances based on their health status. 4. Search — Enables you to find resource-specific information such as specific instances of resource names. 5. Activity — Expands (or hides) a sidebar of recent user activity (from the current login session only). When you perform an action such as, add, edit, delete, or others, the activity notification is added to the Activity section. 6. Session — Tracks who is logged in to the appliance and the duration of each login session. Enables you to log out of the appliance. 7. Help — Expands (or hides) a sidebar access to context-sensitive help, browse help, and licensing information such as EULA. 8. HPE InfoSight — The link redirects to the HPE InfoSight home page. NOTE: After the RMC installation, if you have not configured or enabled HPE InfoSight, the Getting Started screen with the message "HPE InfoSight not configured" appears repeatedly. 9. Actions menu — Provides the actions that are available to run on the current resource. Actions include, but are not limited to: adding, deleting, removing, and editing a resource instance. 10. Details tab — Provides details related to a selected resource. Getting started with Recovery Manager Central 12 Configuration and General Settings Settings The Settings (HPE Recovery Manager Central > Settings) screen enables you to configure and manage various configurations of the appliance - network addressing, RMC upgrade, time and locale, service status, appliance preference, configurations, and catalog protection. General Settings The General panel in the Settings (HPE Recovery Manager Central > Settings) screen displays the version installed and configurations of the appliance. An Upgrade button is available for upgrading the software. About upgrading RMC using the GUI The master RPM file is required to upgrade RMC using the GUI. During the upgrade process, do not restart or perform any operations on the appliance. If RMC detects any active operations during the upgrade process, you are prompted to continue or cancel the process. Continuing the upgrade terminates the active operations. After the upgrade completes, the system reboots automatically. Upgrading RMC using the GUI Prerequisites Create a VMware Snapshot of the RMC appliance VM. If the upgrade fails, you can use this Snapshot to roll back to the previous state of the RMC appliance. Procedure 1. Download the HPE_RMC RPM file from My HPE Software Center. 2. Navigate to HPE Recovery Manager Central > Settings. 3. In the General panel, click Upgrade. 4. Drag and drop the RPM image file or click Browse and then select the file. 5. Click Upgrade. Editing Time and Locale Procedure 1. Go to the Settings screen. 2. In the Time and Locale panel, click Edit. 3. Select a time zone. 4. Click OK. Shutting down or restarting RMC appliance If you shut down or restart an RMC appliance, all the users are disconnected. Also, all the running tasks are interrupted. After you shut down an RMC Appliance, you must power it on manually using vCenter or ESXi console. Configuration and General Settings 13 Prerequisites A user with administrator role privileges. Procedure 1. Navigate to HPE Recovery Manager Central > Settings. 2. From the Actions menu, click Shutdown or Restart. 3. At the prompt, click Shutdown or Restart. Editing the network settings Procedure 1. Go to the Settings screen. 2. In the Networking panel, click Edit. 3. Edit any of the following network settings: • Host Name • Default Gateway • DNS Server 4. Click OK. Managing the RMC application services Using the Service Status option, you can start or stop the service of a specific application plug-in. Procedure 1. Go to the Settings screen. 2. In the Service Status panel, click Edit. 3. Do one of the following: • To stop a specific application service, click the stop • To restart a stopped application service, click the play icon. icon. 4. Click Close. Editing appliance preference The Edit Appliance Preferences screen enables you to configure various appliance preferences - activity retention, notifications, registration with HPE InfoSight, and web SSL certificates. Editing activity retention period Configuration and General Settings 14 Procedure 1. In the Edit Appliance Preferences screen, click Activity Retention. 2. Use the slider and set the retention period in the range 1 to 1,000 days. The default value is 30. 3. Click OK. Configuring appliance for email notification for alerts The email notification feature notifies specified recipients about the various operations that you perform on the resources. You can enable or disable this email notification feature, or you can enable or disable individual filter notifications, as required. Procedure 1. Click HPE Recovery Manager Central > Settings. 2. In the Appliance Preferences panel, click Edit. 3. In the Edit Appliance Preferences screen, click Notification. 4. Click + Notification. 5. Specify the following details: Name A name for the notification policy. SMTP Server and Port Name or IP address of the SMTP server. Select the port number used for SMTP traffic. Sender Email Address Email address for the sender. SSL Select to use SSL. Emails are SSL/TLS encrypted. Password Password corresponding to the email address of the sender. Test Email Configuration You can verify the configuration by sending test messages. Set as Global Notification Select to apply the notification policy to all the volumes and applications. Enable Notifications Select to receive the notifications over email. Receiver Email Address Semicolon-separated list of recipient email addresses. 6. Select your notification preferences. Select Select All to receive all notifications - error and generic information of all the operations performed. Configuration and General Settings 15 You can also choose to receive error or generic notifications for only selected operations. 7. Click Add. Editing an email notification configuration Procedure 1. Click HPE Recovery Manager Central > Settings. 2. In the Appliance Preferences panel, click Edit. 3. In the Edit Appliance Preferences screen, click Notification. 4. Select the notification that you want to edit. 5. Click the edit icon . 6. Edit the required details, and then click OK. Deleting an email notification configuration Procedure 1. Click HPE Recovery Manager Central > Settings. 2. In the Appliance Preferences panel, click Edit. 3. In the Edit Appliance Preferences screen, click Notification. 4. Select the notification that you want to delete. 5. Click the delete icon. 6. At the prompt, click OK. Registering RMC with HPE InfoSight By selecting support level as "Passive" you select to send basic RMC configuration information and performance data to HPE InfoSight, which ensures HPE support personnel have the essential information about your environment handy if you ever have to call for support. By collecting and correlating data from across the installed base, all customers benefit as it enables HPE to improve future RMC products and updates, and make them smarter and more reliable. All the information collected from RMC appliance is sent to the Enterprise server https://midway.ext.hpe.com NOTE: For security reasons, if the device is unable to connect to the internet, then No support option is available for customers to use. Procedure 1. Navigate to HPE Recovery Manager Central > Getting Started screen and then click HPE Infosight. 2. In the General Setting section, perform the following: Configuration and General Settings 16 a. Select the Support Level as either Passive or No Support. b. Specify if you require HPE support as either Yes or No. c. (Optional) Specify the Infosight Access Token. 3. In the Proxy section, perform the following: a. Select or clear the Proxy server option. b. Select the Protocol as either HTTPS or SOCKS. c. Enter the IP Address or Hostname and the Port number. d. Select or clear the Proxy server authentication. 4. In the Customer Information section, specify your contact details. 5. Select or clear Advanced. Specify the Enterprise Server if you select Advanced option. 6. Click Save, Continue. Web SSL Certificate for RMC The HTTP connection between RMC GUI and server or workstation is secured over SSL. A Secure connection is created using HTTP SSL certificates, that prove the identity of a server or an application. You can generate certificates from the RMC GUI or request certificates for RMC from a trusted certification authority (CA). To get certificates from a CA, you have to go through the Certificate Signing process. Using the Web SSL Certificate screen (Edit Appliance Preference > Web SSL Certificate), you can perform the following tasks: • View SSL certificate summary • Create certificate • Generate Certificate Signing Request (CSR) • Upload certificate Viewing SSL certificate summary Select Existing Certificate Summary from the drop-down list. The Existing Certificate Summary section displays the following details: • Issued To • Valid From • Valid Till • Expiry Status • Fingerprint • Signature Algorithm Configuration and General Settings 17 Creating SSL certificate using RMC GUI Procedure 1. Select Create Certificate from the drop-down list. 2. Specify the details required to create a certificate. 3. Select Apply Now. 4. Click Create. 5. (If you did not select Apply now) Reboot RMC. Configuration and General Settings 18 Generating Certificate Signing Request (CSR) Procedure 1. Select Generate Certificate Signing Request (CSR) from the drop-down list. 2. Specify the details required to generate a CSR. 3. Click Generate CSR. 4. Do either of the following: • Click Copy to Clipboard. • Click Save To File. After generating, you must get the CSR signed by a trusted CA. Configuration and General Settings 19 Uploading the SSL certificate Procedure 1. Select Upload Certificate from the drop-down list. 2. Do either of the following: a. Click Browse and then select the file to upload. b. Drag and drop the file. NOTE: The file that you are uploading must be in either .crt or .tar format. 3. Select Apply now. 4. Click Upload. NOTE: If you are uploading a .tar file that consists of .crt and .key files, RMC verifies whether the public modulus property of the files matches each other. If you are uploading only a .crt file, RMC verifies whether the public modulus property matches with the existing key on the appliance. Only on successful verification, RMC allows installation of the certificates. Catalog Protection Catalog Protection is necessary in a disaster recovery situation where the RMC virtual appliance is unavailable. If RMC is permanently unavailable, you can deploy a new RMC and restore the backed-up catalogs. As a best practice, you can schedule daily Catalog Protections. RMC export At the time of export configuration to HPE StoreOnce catalyst store, even if you do not specify the user credentials, RMC manages the export operation. This is because for every HPE StoreOnce appliance registered, RMC creates a catalyst client to interact with a target store on HPE StoreOnce. RMC import For imports, you have to explicitly create catalyst clients on HPE StoreOnce and link the clients to the store containing the RMC catalog objects. This procedure is a requisite for HPE StoreOnce GEN4 systems as these systems have public access disabled by default. This procedure is required for both importing from a default or any other store on that storage device. Also, you can reuse the existing clients for those stores with the necessary permissions. RMC imports can be performed on the same appliance or on a new appliance. However, Hewlett Packard recommends imports on a new RMC appliance. The Catalog Protection (HPE Recovery Manager Central > Settings) screen provides the following options: • Add Catalog Protection • Import Catalog Catalog Protection features • The RMC configuration can be protected by backing up the configuration data on to a shared location or HPE StoreOnce. This operation can be scheduled. • RMC permits configuring protection against NAS share base location. • Data can be written on all shared file protocols, such as NFS and CIFS. Configuration and General Settings 20 • In a NAS share, all remote shares or directories must have read and write permissions and be mountable on Linux client. • NFS-based mounts do not require credentials. In CIFS, the credentials are optional and must be verified if they are required for share access. • You can schedule Catalog Protection for hourly, daily, weekly, monthly on Network Share and HPE StoreOnce Catalyst Store. Catalog Protection guidelines • Catalog imports are supported only between the same versions of RMC. • After RMC locally mounts NAS shares, data is written to the remote shares. Be sure that the remote share or catalyst server is reachable. • Hewlett Packard Enterprise recommends that the network location on NAS or HPE StoreOnce Catalyst Store is reachable within 30 seconds. • You can mount remote CIFS shares in multiple mount security mode options, except for Kerberos base security modes. • On deletion of a configuration, the physical data on the remote shares or stores is not removed or deleted. Only the catalog configuration and associated schedule configuration from RMC are deleted. • Mounting and authenticating NAS shares: • â—¦ User credentials do not affect the protocols. The primary requirement for mounting NAS or NFS shares is that they must be reachable/mountable. The NFS-based protection is primarily focused on NFS shares that do not need credentials. Hence, the login credentials field does not appear in NFS shares. NFSv2 and NFSv3 permissions are oriented towards client systems and not to users. â—¦ The NAS or CIFS shares may or may not have user credentials and users associated may or may not be part of a domain. Configuring protection for an already protected RMC on the same target (Catalyst store or NAS) is not permitted. Adding a Catalog Protection Procedure 1. Click HPE Recovery Manager Central > Settings. 2. In the Catalog Protection panel, click + Catalog Protection. 3. Select the type of Catalog Protection - StoreOnce Catalyst or Network Attached Storage. 4. (For the StoreOnce Catalyst type of Catalog Protection) Specify the following details: Name A name for the Catalog Protection. Backup System Select a Backup System. Use/Create default Catalyst Store Select to create a default Catalyst Store (RMC creates a default store if a store does not exist already). Service Set Select a service set. Configuration and General Settings 21 Catalyst Store Select a Catalyst Store. Username and Password Login credentials of the selected HPE StoreOnce backup system. Backup System Transport Protocol Select a protocol — Coeth or CoFC. Number of Catalog copies A value in the range of 1-240. RMC Catalog Alias (Optional) User defined name. The number of characters in the alias must be less than 30. Except for an underscore, no other special characters are allowed. If not specified, RMC hostname is considered as alias. 5. (For the Network Attached Storage type of Catalog Protection) Specify the following details: Name A name for the Catalog Protection. Share Protocol CIFS or NFS. IP Address or Host Name IP address or hostname of the system that hosts the NAS share. Share Location Directory path to the share. Except for underscore and hyphen, no other special characters are allowed in the path. For example, /ShareDirectory/SubDirectory/Sub Username and Password NAS share credentials. If required, specify the domain name in the format DomainName/Username. Number of Catalog copies A value in the range of 1-240. RMC Catalog Alias (Optional) The number of characters in the alias must be less than 30. Except for an underscore, no other special characters are allowed. If not specified, RMC hostname is considered as alias. 6. Specify the Schedule details: To create a one-time Catalog Protection, select Now. To create a Schedule, select Schedule and specify the required details. NOTE: You can create a maximum of two schedules for Catalog Protection. However, there is no limit if you are using the one-time option. 7. Click Add. Importing a Catalog If Catalog Protection is not configured, you will see Import Catalog option. You can use Import Catalog option to restore RMC from an existing catalog. For example, if you have a new appliance set up and you already have protected catalogs available, you can use this option to import an existing catalog from the remote target. Configuration and General Settings 22 Prerequisites • Ensure that you have deployed an RMC appliance. • Ensure that you register the HPE StoreOnce where Catalog Protection is stored with RMC. Procedure 1. Click HPE Recovery Manager Central > Settings. 2. In the Catalog Protection panel, click + Import Catalog. 3. Select the type of Catalog Protection - StoreOnce Catalyst or Network Attached Storage. 4. (For the StoreOnce Catalyst type of Catalog Protection) Specify the following details: Backup System Select a Backup System. Service Set Select a service set. Catalyst Store Select a Catalyst Store. Username and Password Login credentials of the selected HPE StoreOnce. Backup System Transport Protocol Select either Coeth or CoFC as the transport protocol. 5. (For the Network Attached Storage type of Catalog Protection) Specify the following details: Share Protocol CIFS or NFS. IP Address or Host Name IP address or hostname of the system that hosts the NAS share. Share Location Directory path to the share. Except for underscore and hyphen, no other special characters are allowed in the path. For example, /ShareDirectory/SubDirectory/Sub Username and Password NAS share credentials. If required, specify the domain name in the format DomainName/Username. 6. Click Get Protected Catalogs. 7. Click Import. NOTE: After the Catalog import process has completed, a set of Catalog Protection tasks are displayed in the Activity page. The tasks are marked with the status terminated though both import and restart of services have completed successfully. You can ignore this task status. Configuration and General Settings 23 Editing a Catalog Protection Procedure 1. Click HPE Recovery Manager Central > Settings. 2. In the Catalog Protection panel, click + Catalog Protection. 3. Select the Catalog Protection that you want to edit. 4. Navigate to Action > Modify. 5. Edit the required details and then click OK. Removing a Catalog Protection Procedure 1. Click HPE Recovery Manager Central > Settings. 2. In the Catalog Protection panel, click Edit. 3. Select the Catalog Protection that you want to delete. 4. From the Actions menu, click Remove. 5. At the prompt, click OK. 6. Click Close. Refreshing a Catalog Protection You can choose Refresh to refresh the data, else the appliance performs an auto refresh. Procedure 1. Click HPE Recovery Manager Central > Settings. 2. In the Catalog Protection panel, click Edit. 3. Select the Catalog Protection that you want to refresh. 4. From the Actions menu, click Refresh. 5. Click Close. Catalog restore guidelines The following guidelines are recommended after catalog import process is completed: • Hewlett Packard Enterprise recommends rebooting the RMC appliance. • Verify the imported data. • After import of data, you must fix some issues with data references. For example, data references include Backup System details, Storage System details, Schedules in general, credentials. Data references depend on the age of the catalog used for restore or in site recovery or network topology changes. Configuration and General Settings 24 • Some imported data must be fixed if there is a change in the IP address. Ensure that the network configuration is accurate post restore. For example, by logging in to the RMC VM console as netconf. • If necessary, verify, modify, or reconfigure the Catalog Protection schedules. NOTE: After the Catalog import process has completed, a set of Catalog Protection tasks are displayed in the Activity page. The tasks are marked with the status terminated though both import and restart of services have completed successfully. You can ignore this task status. Catalog Protection system firewall The RMC appliance has an HPE firewall running. Usually, CIFS servers are active on port 445 and NFS servers active on some predefined or default ports. Considering HPE StoreOnce NFS, HPE StoreOnce CIFS, and Windows CIFS server-based shares, HPE firewall permits outbound communication. Port configurations for NFS at the server side are done in /etc/sysconfig/nfs. The NFS server by default binds itself to dynamically picked ports. Generally, users can also configure NFS to run on dedicated ports. For more information, see the table Port list classification. The appliance firewall permits outbound traffic for the ports 111, 445, 662, 875, 892, 2049, 12206, 12204, 12205, 12202, 12203, 2020, 32803, and 32769. Port list classification Name Port HPE StoreOnce NFS server-specific ports 12206,12204,12205,12202,12203 In the preceding ports the NFS ports are mapped as: Default NFS server ports • LOCKD_TCPPORT=12206 • LOCKD_UDPPORT=12206 • MOUNTD_PORT=12204 • RQUOTAD_PORT=12205 • STATD_PORT=12202 • STATD_OUTGOING_PORT=12203 662, 875, 892,2020, 32803, 32769 The following are sample port configurations: CIFS specific • LOCKD_TCPPORT=32803 • LOCKD_UDPPORT=32769 • MOUNTD_PORT=892 • RQUOTAD_PORT=875 • STATD_PORT=662 STATD_OUTGOING_PORT=2020 445 Configuration and General Settings 25 Storage devices The HPE storage devices must be registered with RMC for protecting your applications and creating Copies. Use the Storage Devices (HPE Recovery Manager Central > Storage Devices) screen to manage the storage devices. The supported storage devices are HPE 3PAR, HPE Primera, HPE Nimble Storage, HPE StoreOnce, and Cloud Volumes Backup. The Array panel displays information related to the storage device and the available device licenses required by RMC. The iSCSI Configurations panel lists the iSCSI port details and also says whether a port is enabled for RMC protection jobs. On the HPE StoreOnce device, the CoEth Configurations panel lists the IP addresses that are enabled for Catalyst over Ethernet backups. The Recent RMC Copies chart displays the number of copies created on the device by RMC in the past week. Copy Repositories, Catalyst Stores, and Storage Pools While you register storage devices, you can select the required Catalyst Stores or Storage Pools to be used as Copy Repositories. Copy Repositories are the Catalyst Stores on HPE StoreOnce that are used for Express Protect backups, Catalyst Copies, and Cloud Copies from an RMC appliance. You can create catalyst stores using RMC and add it as Copy Repositories. Copy repositories are also the storage pools that are used for Peer copy. Adding a storage device Procedure 1. Click HPE Recovery Manager Central > Storage Devices. 2. Click + Storage Device. 3. In the Add Storage Device screen, specify the following details: Type 3PAR, Primera, Nimble, StoreOnce, or Cloud Volumes Backup. IP Address or Host Name Management IP address or hostname of the storage device. (For HPE StoreOnce) WAN enabled Select if you are using a remote HPE StoreOnce over Wide Area Network. Username and Password Specify credentials with Admin privileges. 4. Click Next. 5. Select one or more stores or storage pools. 6. Click Add. More information Adding Cloud Volumes Backup as a storage device Adding Cloud Volumes Backup as a storage device Prerequisites RMC requires ports 9386, 9387, and 9388 to be available to manage Cloud Volumes Backup. For other prerequisites, see https://docs.cloudvolumes.hpe.com/help/kts1584136344568/#prerequisites Configuration and General Settings 26 Procedure 1. Click HPE Recovery Manager Central > Storage Devices. 2. Click + Storage Device. 3. In the Add Storage Device screen, select Cloud Volumes Backup. 4. Specify the login credentials. 5. Select Enable Proxy, specify the Proxy details, and then click Next. 6. Select a region from the preconfigured list and then click Next. 7. Specify the Store credentials. 8. Click Add. More information Adding Cloud Volumes Backup as a storage device Updating Store credentials for a CVB Use the Update Store option to change or update the credentials for a Store on CVB. Procedure 1. Click HPE Recovery Manager Central > Storage Devices. 2. Click a CVB storage device. 3. From the Actions menu, click Update Store. 4. Specify the Username and Password. 5. Click Update. Refreshing certificates for CVB Use the Refresh Certificate option and specify the CVB credentials for fetching certificates from https:// cloudvolumes.hpe.com Procedure 1. Click HPE Recovery Manager Central > Storage Devices. 2. Click a CVB storage device. 3. From the Actions menu, click Refresh Certificate. 4. Specify the CVB credentials. 5. Click OK. Configuration and General Settings 27 Creating a Copy Repository from an existing Catalyst Store or Storage Pool Procedure 1. Click HPE Recovery Manager Central > Storage Devices. 2. Click a Storage System. 3. Depending on the Storage System you selected, in the Copy Repository tab, select one or more Stores or Storage Pools and then click + Copy Repository. 4. At the prompt, click OK. Creating a Catalyst Store as Copy Repository Procedure 1. Click HPE Recovery Manager Central > Storage Devices. 2. Click the HPE StoreOnce system on which you want to create a Catalyst Store. 3. From the Actions menu, click Create Catalyst Store. 4. Specify the following details: Store Name A name for the Catalyst Store. Description A meaningful description. Service Set ID The Service Set on which the Store resides. Explicit section is required only for multinode HPE StoreOnce systems, such as 6500 and B6200. 5. Specify the following advanced information: Data Job Log Retention Period (Days) The retention period for information about data jobs. This information is displayed on the Data Jobs tab, which provides a log of all data job activities. The default value is 90 days. Inbound Copy Job Log Retention Period (Days) The retention period for information about inbound copy jobs. This information is displayed on the Inbound Copy Jobs tab, which provides a log of all data job activities. The default value is 90 days. Outbound Copy Job Log Retention Period (Days) The retention period for information about outbound copy jobs. This information is displayed on the Outbound Copy Jobs tab, which provides a log of all data job activity. The default value is 90 days. Physical Data Size Quota(GB) Set the physical quota when you are looking to partition the physical capacity of the appliance between the various users. As a result, the users who get a better de-duplication ratio are able to store more data. Logical Data Size Quota(GB) Allows you to set the logical quota when you are providing a service to back up a particular amount of user data. For example, you can set the quota when you internally charge customers per TB of user data protected. 6. Click Add. Configuration and General Settings 28 Editing a Copy Repository on HPE 3PAR, HPE Primera or HPE Nimble Storage Procedure 1. Click HPE Recovery Manager Central > Storage Devices. 2. Click the HPE 3PAR, HPE Primera or HPE Nimble Storage system on which you want to edit the Copy Repository. 3. Click the Copy Repository that you want to edit. 4. Click the edit icon. 5. Select a Copy CPG. Common provisioning groups (CPGs) are pools of storage space in which volumes can be created. The CPG specifies properties such as RAID type and physical drive device type. 6. Click OK. Removing a Copy Repository Prerequisites Remove all the dependent Volumes and associations with the Copy Repository that you want to delete. Procedure 1. Click HPE Recovery Manager Central > Storage Devices. 2. Click the HPE StoreOnce system on which you want to remove the Copy Repository. 3. Click the Copy Repository that you want to remove. 4. Click the remove icon. 5. At the prompt, click OK. Editing a storage device Procedure 1. Click HPE Recovery Manager Central > Storage Devices. 2. In the Storage Devices screen, click the storage device that you want to edit. 3. From the Actions menu, click Edit. 4. Edit the required fields. 5. Select the iSCSI ports that you want to enable for Express Protects. 6. Click OK. Deleting a storage device If the protection jobs (Copy Policies) are configured on the storage device, you cannot delete the device. Configuration and General Settings 29 Procedure 1. Click HPE Recovery Manager Central > Storage Devices. 2. In the Storage Devices screen, click the storage device that you want to delete. 3. From the Actions menu, click Delete. 4. To delete all the associated Copy Repositories, select Remove associated copy repositories. 5. (Do this step for HPE StoreOnce) To delete all the associated catalog configurations, select Remove associated catalog configurations. 6. Click OK. Refreshing a storage device Refresh is used to update health status and license information of the Storage Systems. Hewlett Packard Enterprise recommends you to refresh Storage Systems after a firmware upgrade. Procedure 1. Click HPE Recovery Manager Central > Storage Devices. 2. From the Actions menu, click Refresh. 3. At the prompt, click OK. Users and groups Use the Users and Groups screen to manage user accounts. As an administrator, you can add and remove users and change passwords. You can also select the type of role to apply to the user. Adding a user Procedure 1. Click HPE Recovery Manager Central > Users and Groups. 2. In the Users and Groups screen, click + User. 3. Specify the required user details. 4. Select the user role. admin Can monitor and manage the RMC resources. _member_ Can only view the RMC resources. 5. Click Add. Configuration and General Settings 30 Changing the user password Procedure 1. Click HPE Recovery Manager Central > Users and Groups. 2. In the Users and Groups screen, select the user for whom you want to change the password. 3. From the Actions menu, click Change Password. 4. Specify the existing password. 5. Specify and confirm the new password. 6. Click OK. Deleting a user Procedure 1. Click HPE Recovery Manager Central > Users and Groups. 2. In the Users and Groups screen, select the user that you want to delete. 3. From the Actions menu, click Delete. 4. At the prompt, click OK. Directory server Authenticating Active Directory users eliminates the need of adding local users in RMC. • As an RMC admin, you can add, edit, and delete a directory server and assign roles to groups. • As an Active Directory user, you can perform tasks depending on the role assigned to the user group. To register the Active Directory server with RMC, your first login has to be as an RMC Admin. After the directory server is added to RMC, you have to assign role to user groups. Adding a directory server Prerequisites Verify that LDAP over SSL is enabled on the Active Directory server. Procedure 1. Click HPE Recovery Manager Central > Users and Groups. 2. Click the Directory Servers tab. 3. Click + Directory Server. 4. Specify the following details: IP Address / FQDN The fully qualified domain name or IP address of the Active Directory server. Configuration and General Settings 31 Port Number The LDAP over SSL port on which the Active Directory server is listening. By default, LDAP over SSL is on port 636. User DN The distinguished name of the base location of user accounts on Active Directory server. For example, dc=mydomain, dc=com Group DN The distinguished name of the base location of groups on Active Directory server. For example, dc=mydomain, dc=com Username and Password Name and password of the service account user. 5. (Optional) Specify the following advanced information: User Object Class Object class attribute (data type) of the user object. The default is user. User Name Attribute Attribute of the account object that contains the name of the user. The default is cn. User Id Attribute Attribute of the account object that contains the ID of the user. The default is cn. User Enabled Attribute Attribute of the account object that contains the option to determine whether the user is enabled or not. The default is UserAccountControl. Group Name Attribute Attribute of the account object that contains the name of the group. The default is name. Group Id Attribute Attribute of the account object that contains the ID of the group. The default is cn. Group Member Attribute Attribute of the account object that contains the username of the user. The default is memberOf . Group Object Class Object class attribute (data type) of the group object. The default is group. 6. Click OK. Proceed and assign role to a user group. Editing a directory server Procedure 1. Click HPE Recovery Manager Central > Users and Groups. 2. Click HPE Recovery Manager Central > Schedules. 3. Click the Directory Servers tab. 4. Select the directory server that you want to edit. 5. From the Actions menu, click Edit. Configuration and General Settings 32 6. Edit the required fields. 7. Click OK. Deleting a directory server Prerequisites Ensure that all the Active Directory role assignments are removed. Procedure 1. Click HPE Recovery Manager Central > Users and Groups. 2. Click HPE Recovery Manager Central > Schedules. 3. Click the Directory Servers tab. 4. In the Directory Servers screen, click Directory Server. 5. Select the directory server that you want to delete. 6. From the Actions menu, click Delete. 7. At the prompt, click OK. Assigning a user role Procedure 1. Click HPE Recovery Manager Central > Users and Groups. 2. In the Users and Groups screen, click + Group. 3. Specify the following details: Directories A directory server that is already added to RMC. Groups A group in the directory server. Assign Roles Click Select and then select the role that you want to assign to the group. Click Add. • Admin — The administrator has all the privileges for monitoring and managing the RMC appliance. • Members — Members have only view privileges and cannot perform any other tasks. 4. Click OK. Unassigning a user role If a group is not assigned any role, the group is not displayed in RMC. Configuration and General Settings 33 Procedure 1. Click HPE Recovery Manager Central > Users and Groups. 2. In the Users and Groups screen, select a group for which you want to unassign role. 3. From the Actions menu, click Delete. 4. At the prompt, click OK. Remote appliances Registering a remote RMC appliance is an optional step for performing any Remote Copy operations. To register a remote appliance, use the Remote Appliances (HPE Recovery Manager Central > Remote Appliances) screen. Self-registration of RMC as a remote appliance is no longer supported. Registering a remote appliance Procedure 1. In the Remote Appliances screen, click + Register Appliance. 2. Specify IP address or Host Name of the remote appliance. 3. Specify Username and Password of the remote appliance. 4. Click Add. Editing a remote appliance Procedure 1. In the Remote Appliances screen, click the appliance that you want to edit. 2. Modify the Username and Password. 3. Click OK. Hypervisor servers To protect MS SQL databases configured on RDM/VMFS disks with RMC-S, RMC-SH and RMC-O, you must add hypervisor server to RMC. The hypervisor must be registered with admin privileges. The supported hypervisors are vCenter Server and ESXi Server. Use the following sections to configure and manage hypervisors. Adding a hypervisor server Procedure 1. In the Hypervisor Servers screen, click + Hypervisor Server. 2. Select the Server Type as either ESXi Server or vCenter Server. 3. Specify the following details: Configuration and General Settings 34 • IP Address or Host Name • Username • Password • Description 4. Click OK. Editing a hypervisor server Procedure 1. In the Hypervisor Servers screen, click the Hypervisor Server that you want to edit. 2. From the Actions menu, click Edit. 3. Edit the required fields. 4. Click OK. Refreshing a hypervisor server Procedure 1. In the Hypervisor Servers screen, click the Hypervisor Server that you want to refresh. 2. From the Actions menu, click Refresh. 3. Click OK. Removing a hypervisor server Prerequisites Ensure that there is no MS SQL server instance running on the hypervisor that you want to delete. Procedure 1. In the Hypervisor Servers screen, click the Hypervisor Server that you want to delete. 2. From the Actions menu, click Remove. 3. Click OK. Configuration and General Settings 35 Configuring Volume Sets and Application Plug-ins Volume Sets - Crash Consistent Protection Adding a Volume Set Procedure 1. Click HPE Recovery Manager Central > Volumes. 2. In the Volumes screen, click + Volume Set. 3. Specify the Volume Set details: Name A name for the Volume Set. Description Specify a meaningful description for the Volume Set. Notification Select Notification and then click Select to search and assign a notification. 4. Select the Storage System on which you want to provision the Volume Set. 5. Click Select Volumes and then select the volumes that you want to add to the Volume Set. Editing a Volume Set After editing a Volume Set, always ensure to perform a refresh. Procedure 1. Click HPE Recovery Manager Central > Volumes. 2. In the Volumes screen, select the Volume Set that you want to edit. 3. From the Actions menu, click Edit. 4. In the General section, edit the required fields. 5. Click Select Volumes, select the Volumes that you want to add to the Volume Set, and then click Add. To add multiple volumes, select the volumes and then click Add +. 6. Click Remove Selection and select the volumes to be removed from the Volume Set, and then click Remove. To remove multiple volumes, select the volumes and then click Remove +. NOTE: You cannot add or delete volumes simultaneously. Configuring Volume Sets and Application Plug-ins 36 Deleting a Volume Set Procedure 1. Click HPE Recovery Manager Central > Volumes. 2. In the Volumes page, click the Volume Set that you want to delete. 3. From the Actions menu, click Delete. 4. At the prompt, click OK. NOTE: Deleting a volume set does not delete anything on the storage system. Attaching a Volume Set Procedure 1. Click HPE Recovery Manager Central > Volumes. 2. In the Volumes screen, select the Volume Set that you want to attach to the host. 3. From the Actions menu, click Attach. 4. Select a host. 5. Select the volumes that you want to attach. 6. Click OK. Detaching a Volume Set The action detaches the volumes in Volume Set from the host. The detach option is available only when the Volume Set is attached to at least one host. You cannot detach Peer Copy target volumes using RMC. NOTE: Do not detach a Volume Set unless you are performing a restore operation. Procedure 1. Click HPE Recovery Manager Central > Volumes. 2. In the Volumes screen, select the Volume Set that you want to detach to the host. 3. From the Actions menu, click Detach. 4. Select a host. 5. Select the volumes that you want to detach. 6. Click OK. Refreshing a Volume Set The refresh option displays the latest details of the volume set from the storage system and updates the RMC catalog. The refresh time depends on the number of snapshots in the Volume Set. Configuring Volume Sets and Application Plug-ins 37 Procedure 1. Click HPE Recovery Manager Central > Volumes. 2. In the Volumes screen, click the Volume Set for which you want to see the latest details. 3. From the Actions menu, click Refresh. 4. At the prompt, click OK. RMC-E Exchange Server screen details The master pane of the Exchange Server screen displays the IP/FQDN and host name of a registered Microsoft Exchange server. The details pane displays the details, server capability, and associated databases related to the server selected on the master pane and the details of the database configured on the server. You can also use the Actions menu to Edit, Unregister, Refresh, a selected server and Refresh All Servers. Overview pf RMC-E Details Hostname Hostname of the server. Domain Domain name of the server. Status Reason Status of the server. Username Login username of the server. Operating System Version Version of the Windows Server operating system. Microsoft Exchange Version Version of the Microsoft Exchange application. Windows Agent Version Version of the Windows agent. Status Status of the Exchange server. Updated Time Timestamp of the last update to the Exchange server. Description Description of the server. Configuring Volume Sets and Application Plug-ins 38 Server Capability Service Service type of the server. Version Version of the corresponding service. Status Availability status of the server. Associated Databases Name Name of the registered database. Size Size of the registered database. Active On Server Server name on which the database is active and running. Servers with Copies Server names on which the database is replicated. Registering a Microsoft Exchange Server Prerequisites • Ensure that the registered user belongs to the Exchange Organization Administrators Active Directory group and have administrative rights for every Exchange production server managed by RMC-E. • Ensure that you use View-Only Organization Management or Recipient Management user role when there are security restrictions. However, the View-Only Organization Management and Recipient Management user roles cannot perform any Restore operation to the Base or Parent volume and Mailbox Recovery operations. Procedure 1. Click the main menu and then click Exchange Databases > Servers. 2. On the master pane of the Servers screen, click +Servers. 3. Provide the following details: • IP Address of Host Name - The IP address or the fully qualified domain name of the server. • Port - [Optional] The port number of the server. NOTE: By default, RMC-E operates on port 50002. If port 50002 is already in use, you can change the port during the server registration. • Username - The username for server login. • Password - The password for login username. • Description- [Optional] Short description about the server. 4. Click Add. Configuring Volume Sets and Application Plug-ins 39 TIP: When you are registering multiple servers with the same Username, Password and Port, use the Add + button and enter only the IP Address of the next server. Editing a Microsoft Exchange Server Procedure 1. Click the main menu and then click Exchange Databases > Servers. 2. On the master pane of the Servers screen, select a server. 3. From the Actions menu, select Edit. 4. On the master pane of the Servers screen, select a server. 5. Click Actions > Edit. 6. Perform the following actions: a. Edit the IP Address or Host Name. b. Edit the Port number. NOTE: By default, RMC-E operates on port 50002. If port 50002 is already in use, you can change the port during the server registration. c. Modify the Username and Password. d. Edit the Description. 7. Click OK. Refreshing a selected Microsoft Exchange Server Procedure 1. Click the main menu and then click Exchange Databases > Servers. 2. On the master pane of the Servers screen, select a server. 3. From the Actions menu, select Refresh. Refresh dialog appears. 4. To perform a refresh on all the registered databases associated with the selected server, click Refresh. Unregistering a Microsoft Exchange Server Prerequisites • Ensure that you have at least one registered Microsoft Exchange Server. • Ensure that there are no snapshots or backups associated with the database. Configuring Volume Sets and Application Plug-ins 40 Procedure 1. Click the main menu and then click Exchange Databases > Servers. 2. On the master pane of the Servers screen, select a server. 3. From the Actions menu, select Unregister. 4. Click Ok. Refreshing all Microsoft Exchange Servers Procedure 1. Click the main menu and then click Exchange Databases > Servers. 2. On the master pane of the Servers screen, select a server. 3. From the Actions menu, select Refresh. 4. Click Actions > Refresh All Servers . Refresh All Servers dialog appears. 5. To perform a refresh on all the registered databases, click Refresh. Microsoft Exchange Databases Databases are automatically added when you register a windows server in RMC-E. During the server registration process, RMC-E automatically retrieves the list of all Microsoft Exchange Databases hosted on the Windows Server. These databases are the ones that are deployed on the HPE 3PAR, HPE Primera, and HPE Nimble Storage volumes. The databases that are retrieved are automatically added. Details Microsoft Exchange GUID GUID of the Microsoft Exchange server. Size (MB) Size of the database. Database File Path Location of the database file. Log Folder Path Location of the log folder. Database Availability Group Name Group name of the databases. Status Current status of the database. Last Updated Last updated status. Notification Associated notification policy. Configuring Volume Sets and Application Plug-ins 41 Database Instance on Server Hostname Name of the host where database is hosted. IP/FQDN IP address or fully qualified domain name of the server. Active Copy Availability of an active copy of the database. Status Status of the database instance on the server. Database Content Index State Status of the database content index. Database Status Mount status of the database. Last Updated Time stamp of the last update to the database instance. Exchange Information Sub Status Sub status of the Exchange server database. Volumes DB and logs Volume set that contains the database and logs. Copies View Job Status Select one time frame from the menu to display the relevant resources. Copies Copy Type Lists Snapshot, Express Protect, and Catalyst Copy along with the statuses. Catalyst Copy The number of catalyst copies in different states. You can click on the underlined numeric value to Protect, Delete, Mount, Restore or Edit a selected Catalyst Copy. Snapshot The number of snapshots in different states. You can click on the underlined numeric value to Protect, Delete, Mount, Validate, Restore, or Edit a selected Snapshot. Express Protect The number of express protects in different states. You can click on the underlined numeric value to Protect, Delete, Mount, Restore, or Edit a selected Express Protect. Configuring Volume Sets and Application Plug-ins 42 Remote Snapshots The number of remote snapshots in different states. You can click on the underlined number value to Protect, Delete, Mount, Validate, Restore, or Edit a selected Remote Snapshot. Cloud Copy The number of cloud copies in different states. You can click on the underlined value to Protect, Delete, Mount, Restore, or Edit a selected Cloud Copy. Restore The interface to perform restore operation. Scheduled Jobs Copy Policy The selected copy policy. Copy Type The type of copy based on the copy policy. Execution Frequency The set time for the corresponding Copy Type. Target Device The complete name and destination path of the target device. Last Execution The time stamp of the most recent execution. Last Successful Execution The time stamp of the most recent successful execution. Next Execution The date and time stamp of the next scheduled execution. Editing a database Prerequisites Procedure 1. Click the main menu and then click Exchange Databases. 2. Select a database from the master pane and click Actions > Edit. 3. Select Edit from the Actions menu. 4. In the Edit dialog, the default notification policy associated with the database appears. 5. Select Notification option to click Select to search and select a notification policy for the database. 6. Click OK. Refreshing an MS Exchange database Refresh operation occurs on databases that are created on each Exchange server. Refresh operation also discovers new databases and automatically adds them. And to refreshing all exchange servers that host a copy of the selected database, Database Refresh operation also refreshes all the associated snapshots and backups. If associated snapshots or backups are Configuring Volume Sets and Application Plug-ins 43 deleted on their respective HPE 3PAR, HPE Primera, HPE Nimble Storage or HPE StoreOnce devices, then they are automatically deleted in RMC-E. Procedure 1. Click the main menu and then click Exchange Databases. 2. On the master pane of the Databases screen, select a database. 3. Select Refresh from the Actions menu. Refresh dialog appears. 4. To refresh the existing databases and discover new databases, click Refresh. TIP: Refresh the database multiple times to obtain the correct database state. Unregistering a database Prerequisites • Ensure that you have at least one configured Exchange database. • Ensure that you delete all the associated snapshots and backups before you delete the database instance. Procedure 1. Click the main menu and then click Exchange Databases. 2. On the master pane of the Databases screen, select a database. 3. Select Unregister from the Actions menu. Unregister dialog appears. 4. Select a Server instance that you intend to unregister from the database. 5. To unregister the existing databases and discover new databases, click OK. RMC-O About Oracle servers The Oracle Servers Overview screen displays the registered servers and enables you to register Oracle servers to the RMC appliance. Oracle servers screen details The master pane of the Oracle Servers screen displays the IP address/host name of a registered Oracle server. The details pane displays the general details related to the server selected on the master pane and the details of the database configured on the server. You can also use the Actions menu to Edit, Refresh, and Unregister a server. Overview Details Configuring Volume Sets and Application Plug-ins 44 Host Name Host name of the server. IP Address IP address of the server. Operating System Operating system installed on the server. Kernel Version Kernel version of the operating system. Hardware Architecture Architecture of the processor. Updated Time Server modification time stamp. User Name Name of the Oracle Server that you provide during server registration. Description Description that you might have added while registering the server. Associated databases NOTE: This section is populated if there is a database associated with the registered server. Name Name of the associated database. Role Displays the role of HPE 3PAR, HPE Primera. Type Type of database. Version Oracle version number of the database. Description Description of the database. Registering a server Prerequisites • Ensure that you have root user privileges or you are a registered Oracle user for the server you intend to register and that root has SSH access. • Ensure that you have RMC-O client installed on the server that you intend to register. • You can register a server that is running SLES 11 and SLES 12, RHEL, and OEL versions 6.6 onwards (U1 and U2). Configuring Volume Sets and Application Plug-ins 45 • Only the 64–bit (x86_64) platform is supported for server registration. The 32–bit (i386, i686, and so on) platforms are not supported. • You cannot use virtual entities of RAC like SCAN, VIPs for registration. Procedure 1. Click the main menu and then click Oracle Databases > Servers. 2. On the master pane of the Servers screen, click + Servers. 3. Provide the following details: a. IP Address or Host Name — IP address or host name of the server to be configured for backup in RMC-O. NOTE: If you intend to use the hostname for registration purpose, configure the DNS appropriately. b. Username — User name of the server. The user can either be be the root user or a valid Oracle user. c. Password — User password. d. Description — Description or additional comments about the server. 4. Click Add. Editing a server Procedure 1. Click the main menu and then click Oracle Databases > Servers. 2. On the master pane of the Servers screen, select a server. 3. Select Edit from the Actions menu. 4. Perform the following actions: • Edit the IP Address or Host Name. • Edit the username or description. • Re-enter the password. NOTE: Remember to update the password whenever the root or the Oracle password on the server changes. 5. Click OK. Refreshing a server Procedure 1. Click the main menu and then click Oracle Databases > Servers. 2. On the master pane of the Servers screen, select a server. Configuring Volume Sets and Application Plug-ins 46 3. Select Refresh from the Actions menu. 4. Click Ok. Unregistering a server Procedure 1. Click the main menu and then click Oracle Databases > Servers. 2. On the master pane of the Servers screen, select a server. 3. Select Unregister from the Actions menu. 4. Click Ok in the Unregister dialog. About Oracle databases You can register your application database that you want to protect. You can select a server, RMC displays the list of databases configured for the server. From the list of databases, you can select a database. The Oracle Databases screen displays the registered databases. You can use Actions option from this screen to Edit, Refresh, Unregister, Clone/Restore, Add Protection, and Protect Once. About database configuration This section describes the storage configuration that the database must fulfill to take snapshots and perform backup operations. All the datafiles and archive logs must reside on the same HPE 3PAR, HPE Primera, or HPE Nimble Storage. However, the datafiles and archive logs cannot coexist on the same volumes. CONTROLFILE, SPFILE and redo logs cannot be present on datafile volumes or archive log volumes. The same condition is applicable for ASM diskgroups. Oracle database details The master pane of the screen displays the name and type of database. The details pane displays the details pertaining to the database selected in the master pane. • Copies • Details Copies Job Status Select one time frame from the menu to display the relevant resources. Overall Copies Refresh Refreshes the list of available copies on a click. Copy Type Lists Snapshot, Express Protect, Remote Snapshot, Catalyst Copy, Cloud Copy, and Clone along with the statuses. Snapshot The number of Snapshots in different states. You can click the underlined numeric value to Protect, Delete, Edit, Verify, or Restore Metadata for a selected Snapshot. Configuring Volume Sets and Application Plug-ins 47 Express Protect The number of express protects in different states. You can click the underlined numeric value to Protect, Delete, Edit, Verify, or Restore Metadata for a selected Express Protect. Remote Snapshot The number of Remote Snapshots in different states. You can click the underlined numeric value to Protect, Delete, Edit, Verify, or Restore Metadata for a selected Remote Snapshot. Catalyst Copy The number of Catalyst Copies in different states. You can click the underlined numeric value to Protect, Delete, Edit, Verify, or Restore Metadata for a selected Catalyst Copy. Clone The number of Clones in different states. The options depend the source type and Clone status. You can click the underlined numeric value to Attach, Detach, Mount, Unmount, Remount, Restore, Remove. Cloud Copy The number of Cloud Copies in different states. You can click the underlined numeric value to Edit, Protect, Delete, or Restore Metadata for a selected cloud copy. Scheduled Jobs Copy Policy The selected copy policy. Copy Type The type of copy based on the copy policy. Execution Frequency The set time for the corresponding Copy Type. Target Device The complete name and destination path of the target device. Last Execution The time stamp of the most recent execution. Last Successful Execution The time stamp of the most recent successful execution. Next Execution The date and time stamp of the next scheduled execution. Details Database Oracle Home The path of the Oracle home directory. Role The role of the database. Oracle Version The installed version number of Oracle software. Configuring Volume Sets and Application Plug-ins 48 Notification Policy The name of the assigned notification policy for the database. Description The description of the database. Database Instances Name The name of the available database instance. ASM ID The ASM ID of the database. Oracle Server The IP address of the associated Oracle Server. Volume Archlog The link to the associated Archlog volume. Datafile The link to the associated datafile volume. Register Oracle database Registering an Oracle database Prerequisites • To update Real Application Cluster (RAC) cluster nodes, ensure that the following prerequisites are met: â—¦ The appropriate cluster node is registered using the Oracle Servers screen. â—¦ DNS is configured correctly so that it communicates with other cluster nodes from the RMC appliance using the hostname. If DNS is not configured and the Auto Update all RAC cluster nodes is selected, RMC-O updates all nodes with the hostname in error state. The user can update by editing the ip-address to the host. Procedure 1. Click the main menu and then click Oracle Databases > + Database. 2. In Register Database screen, perform the following: a. To search and select a registered Oracle database, click Select. b. To search and select an Oracle SID for the selected Oracle server, click Select. The Oracle Home and Database Username fields are populated based on the selected SID. c. Select Auto-update all RAC cluster nodes to auto update the RAC nodes. This option is enabled if SID is entered. Configuring Volume Sets and Application Plug-ins 49 d. Provide a detailed description about the Oracle database in the Description field. e. Select Notification to Select and associate a suitable notification with the Oracle database. 3. Click OK. Edit database Procedure 1. Click the main menu and then click Oracle Database. 2. On the master pane of the Databases screen, select a database. 3. Select Edit from the Actions menu. Edit window appears. 4. Edit the database description and select or clear Notification to associate or disassociate a notification policy. 5. Click OK. Refresh database Refresh database operation for a database analyzes all the snapshots and Express Protect backups residing in RMC-O catalog. Any snapshots and Express Protect backups that have expired are removed from the RMC-O catalog after a refresh operation. Refresh database operation is a time consuming activity as it depends on the number of snapshots or Express Protect backups that are present in a database. Procedure 1. Click the main menu and then click Oracle Databases. 2. On the master pane of the Databases screen, select a database. 3. Select Refresh from the Actions menu. 4. To refresh the snapshots and express protects on the selected database, click Ok in the Refresh dialog. Unregister database Procedure 1. Click the main menu and then click Oracle Databases. 2. On the master pane of the Databases screen, select a database. 3. Select Unregister from the Actions menu. Unregister window appears. 4. Click Ok. Configuring Volume Sets and Application Plug-ins 50 RMC-S RMC-S overview Using RMC-S, you can create, schedule, and manage application-consistent snapshots of MS SQL databases. The snapshots can be created on direct volume (LUN directly presented to Host using FC/iSCSI), VMFS, or RDM disk presentations on HPE 3PAR, HPE Primera or HPE Nimble Storage. Additionally, the RMC Express Protect feature enables automatic backup of SQL data volumes from primary storage device to HPE StoreOnce, independent of backup server software. The Express Protect backups are self-contained volumes that can be restored back to the original or different storage device. NOTE: RMC-S does not support non-English languages for domain, instance, database, and pathname. Prerequisites for working with RMC-S • Ensure that the HPE Nimble Storage volumes have the following ACL settings: â—¦ For restore operations, enable volumes only option. â—¦ For snapshot operations, enable volumes and snapshots only option. • The user login account of MS SQL Server is enabled with Sysadmin server role. Also ensure that the MS SQL databases are in a healthy state. • For creating snapshots of MS SQL databases configured on RDM/VMFS disks, ensure that the corresponding hypervisor server is registered with RMC and the RMC-V service is up and running. NOTE: RMC-S does not support non-English languages for domain, instance, database, and pathname. MS SQL servers Registering an MS SQL server Procedure 1. Click HPE Recovery Manager Central > Microsoft SQL. 2. Click the Servers tab and then click + Servers. 3. In the Register Server screen, specify the following details: IP Address or Host Name IPv4 address, FQDN or host name of the server. NOTE: • When registering Windows Cluster IP with RMC, other than the Cluster virtual IP address, you are also allowed to use Local Host IP address. However, Hewlett Packard Enterprise recommends you to use the Cluster virtual IP address for cluster registration. • Firewall setting is enabled for RMC-S service port on the host (default port number is 50001). Port The port number is set to 50001 by default. If you have changed the port number during the RMC-S agent installation, then update the port number. Configuring Volume Sets and Application Plug-ins 51 Username and Password Name and password of the server. Description Extra details related to the server. 4. Click Add. Editing an MS SQL server Procedure 1. In the Microsoft SQL Servers screen, click the server that you want to edit. 2. From the Actions menu, click Edit. 3. Edit the required fields. 4. Click OK. Refreshing an MS SQL server Procedure 1. In the Microsoft SQL Servers page, click the server for which you want to see the latest details. 2. From the Actions menu, click Refresh. 3. Select Analyze to synchronize the RMC-S catalog on the server with RMC and storage devices. 4. Click OK. Unregistering an MS SQL server Prerequisites Unregister all the instances associated with the MS SQL server. Procedure 1. In the Microsoft SQL Servers page, click the server that you want to unregister. 2. From the Actions menu, click Unregister. 3. At the prompt, click OK. NOTE: You cannot unregister an MS SQL server if protection is configured for the same server. Also, you need to disassociate all the configured and existing protections that exist for the instance and databases. MS SQL instances The Microsoft SQL Instances page displays details of instances, databases, copies, and volumes. The + Instances tab is available for adding new instances. Use the Copies tab to view the job status, copy details, and the scheduled jobs. The Details tab provides links to instance, database, and volume details. Configuring Volume Sets and Application Plug-ins 52 Details The Details screen lists all the details related to an instance. The details include version, notification policy of the instance. The database and volume details are also listed. Registering an MS SQL instance Procedure 1. Click HPE Recovery Manager Central > Microsoft SQL. 2. Click Instances and then click + Instances. 3. In the Register Instance screen, specify the following details: Name IP address or the host name of the server. Use the Select button to choose a server. Notification Select to receive notifications for the operations performed on this instance. Use the Select button to choose a notification. 4. Specify the following advanced information: Add Instances To add MS SQL instances manually, specify the name in the format <appHostName>/<appInstanceName>. For example, //host1/instance1. If the instance name is not applicable, then specify the name in the format //<appHostName>. For example, // host1. If you have selected the SQL Server Authentication mode, then specify the name in the format // <appHostName>/<appInstanceName>/<username>/<password>. For multiple instances, specify a comma-separated list of names. 5. Click OK. NOTE: Adding SQL instance automatically discovers all the databases and allows to protect MSSQL database using RMCS. Editing an MS SQL instance After editing an instance, always make sure to perform a refresh, with the Analyze option enabled. Procedure 1. Click HPE Recovery Manager Central > Microsoft SQL. 2. Click the Instances tab. 3. In the Microsoft SQL Instances screen, select the instance that you want to edit. 4. From the Actions menu, click Edit. 5. Edit the required fields. 6. Click OK. Configuring Volume Sets and Application Plug-ins 53 Refreshing an MS SQL instance or database Procedure 1. (For refreshing an instance) In the Microsoft SQL Instances page, click the instance for which you want to see the latest details. 2. (For refreshing a database) In the Microsoft SQL Databases page, click the database for which you want to see the latest details. 3. From the Actions menu, click Refresh. 4. Select Analyze to synchronize the RMC-S catalog on the instance or database with RMC and storage devices. Also if you have edited the Volume Set details, select the Analyze option. 5. Click OK. Unregistering an MS SQL instance Procedure 1. In the Microsoft SQL Instances page, click the instance that you want to unregister. 2. From the Actions menu, click Unregister. 3. At the prompt, click OK. NOTE: You cannot unregister an MS SQL instance if there are protection jobs or available copies associated with the instance. MS SQL databases The Microsoft SQL Databases page displays details of databases, copies, and volumes. Use the Copies tab to view the job status, copy details, and the scheduled jobs. The Details tab provides links to database and volume details. Details The Details screen lists all the details related to a database. The details include owner, version, network name of the database. The volume details are also listed. Refreshing an MS SQL instance or database Procedure 1. (For refreshing an instance) In the Microsoft SQL Instances page, click the instance for which you want to see the latest details. 2. (For refreshing a database) In the Microsoft SQL Databases page, click the database for which you want to see the latest details. 3. From the Actions menu, click Refresh. 4. Select Analyze to synchronize the RMC-S catalog on the instance or database with RMC and storage devices. Configuring Volume Sets and Application Plug-ins 54 Also if you have edited the Volume Set details, select the Analyze option. 5. Click OK. Unregistering an MS SQL database Procedure 1. In the Microsoft SQL Databases page, click the database that you want to unregister. 2. From the Actions menu, click Unregister. 3. Select Force to unregister the database after deleting all the associated protected Copies and Clones. 4. Click OK. RMC-SH RMC-SH overview An SAP HANA database runs in a host. A host is the operating system that provides all the resources and services (CPU, memory, network, and operating system). An SAP HANA host contains a name server, index server, compile server, and so on. The storage for an installation can be on a remote location or even shared. For multiple-host systems, a shared storage or storage that is accessible from all hosts is required. The master pane of the HANA Hosts screen displays a list of registered HANA hosts. The details pane displays the information about the HANA hosts selected on the master pane The information about the Details and Associated Databases is displayed in the overview page. SAP HANA host Details IP Address The IP address of the registered host. Operating system The version of the installed Linux operating system on the registered host. Kernel Version The Kernel version of the installed Linux operating system. Hardware Architecture The type of the hardware used in the host. Updated Time The time when a selected HANA host was updated. RMC Client Version The version of the RMC HANA client. RMC Client Location The directory location of the RMC HANA client. Configuring Volume Sets and Application Plug-ins 55 Description The description about the selected host. Associated Databases Name The name of the associated database. Role The role of the selected host. Distributed System Version Description The type of HANA system. The version of the associated database. The description of the associated database. Registering a HANA host Prerequisites • Ensure that the user has root privileges. • Ensure that you register the master server in a multihost system as the other hosts are automatically discovered when registering a HANA database. This prerequisite is applicable for HANA 2.0 version. For HANA 1.0 version, any active worker host can be used for database registration. • Ensure that the Public Key content is available in .ssh/authorized_keys file of the host user when the Authentication Type selected is Secure Key. Procedure 1. Click the main menu and then click SAP HANA > Hosts. 2. On the master pane of the Hosts screen, click + Hosts NOTE: For the first time host registration in RMC-SH, the Actions menu is not available. 3. In the Register Host screen, provide the following details: • IP Address or Host Name - The IP address or the name of the HANA host. The hosts and RMC must be configured in the same domain. • [Optional] Alias Name - An alias name for the HANA host. • Username - The username to access the HANA database host that has root privileges. • Specify the Authentication Type as either Password or Secure Key. Configuring Volume Sets and Application Plug-ins 56 â—¦ For Authentication Type as Password, specify a password. â—¦ For Authentication Type as Secure Key, verify that the Public Key content is correct. • RMC Client Location - The shared location where the SAP HANA client is available. By default, the path is set to / hana/shared and cannot be blank. • [Optional] Description - A short description about the database host. 4. Click Add. NOTE: • Refrain from using different login credentials for the same host configured at a remote appliance to manage HANA database configured with Remote Copy. • SAP HANA host registration is dependent on the version of the installed OS version and not on the installed SAP HANA database. • RMC-SH client installation does not check if SAP HANA database is installed on it. It only performs a check of the OS version. • RMC resolves conflicts when you intend to perform a host registration by hostname or FQDN. Managing Secure keys Pair Procedure 1. Click the main menu and then click SAP HANA > Hosts. Manage Secure keys Pair dialog appears with the Public Key field populated. 2. Click Copy Key to Clipboard or Regenerate as per your requirement. 3. Click Close to exit the Manage Secure Keys Pair dialog. Refreshing a Server Procedure 1. Click the main menu and then click SAP HANA > Hosts. 2. From the master pane, select a host that you intend to refresh and click Actions > Refresh. 3. Click Refresh in the Refresh Host dialog. Editing a HANA host Procedure 1. Click the main menu and then click SAP HANA > Hosts. 2. From the master pane, select a host that you intend to edit and click Actions > Edit. 3. Perform one or more of the following actions from the Edit dialog: Configuring Volume Sets and Application Plug-ins 57 a. IP Address or Host Name - Edit the IP address or the name of the registered HANA host. b. [Optional] Alias - Edit the alias name of the registered HANA host. c. Username - Edit the username authorized to access the HANA host. d. Password - Edit the password for the username (If you have selected the Authentication Type as Password). e. RMC Client Location - Edit the shared location where the SAP HANA client is available. f. [Optional] Description - Edit the description about the database HANA host. 4. To update the HANA host, click Ok. Unregistering HANA host Procedure 1. Click the main menu and then click SAP HANA > Hosts. 2. From the master pane, select a host that you intend to unregister and click Actions > Unregister. 3. Click Ok in the Unregister dialog. SAP HANA database Registering a HANA database Prerequisites • Ensure that you register a HANA host. • Ensure that you have enabled the flag Disk.enableUUID before you perform a database registration for a HANA database hosted on a VM and that the RMC VMware service is running to manage the database hosted on the VM. • Ensure that you register the hypervisor (vCenter or ESXi) hosting the VM on which the HANA database is hosted. Procedure 1. Click main menu and then SAP HANA > Databases. 2. Click Database on the master pane. 3. On the Register Database screen, perform the following: • SAP HANA Host - Click Select to search and select an SAP HANA host. • SID - Click Select to search and select a SID for the database. • Instance Number - The instance number of the HANA database. • Database User Name - Provide a user name for the database. • Database Password - Specify the password for the database user. • Auto-register all distributed system hosts - Select to register the system hosts for multiple-host systems. This option is available only for HANA scale-out systems. Configuring Volume Sets and Application Plug-ins 58 • Description - Provide a description about the HANA database. • Notification Policy - Select Notification to enable Select option. To search and specify a notification policy for the database, click Select. 4. Click OK. NOTE: • SYSTEM user or nonrestricted users with roles Catalog Read, Backup Admin, Backup Operator are allowed. • Hewlett Packard Enterprise recommends having catalog read, backup admin, and backup operator privileges for a nonrestricted HANA database user to perform RMC-SH operations. • Database registration is allowed for a nonrestricted user. • For multihost HANA systems: â—¦ Auto-Registration works only if RMC can resolve the host names participating in multihost systems. â—¦ Registration of database from a standby node is not possible. â—¦ For a multihost MDC database, registration is possible only with the master node. Hewlett Packard Enterprise recommends abiding by the default isolation level of the MDC database. • In system replication scenario, registration is possible only from the primary site. • Auto registration of hosts is possible when the credentials of all the participating hosts match. HANA databases screen details HANA database is also known as a system. A system is one or more instances with the same number. If a system has more than one instance, they are distributed over several hosts as multiple-host system. SID is a unique system ID that identifies a system. SID is common across multiple-hosts in a multihost HANA setup. A HANA system can be configured as a single-host or multiple-host system. A single-host system is the most simple system installation type. It is possible to run a HANA system entirely on one host and scale up the system as required. A multiple-host system contains more than one host, which, can be configured as active hosts or standby hosts. NOTE: Data for HANA database must come from a single dedicated datastore for a database hosted on a VM. The master pane of the HANA Databases screen displays the list of the registered HANA databases. The master pane also lists whether the HANA database is a Distributed System and the Copy Policy associated with the database. The details pane displays the information about the HANA databases selected on the master pane. • In the Details page, the information about the Database Details, Volume, Associated Host, System Replication, and Cluster Details is displayed. • In the Copies page, the information about Clone, Catalyst Copy, Remote Copy, Snapshots and Express Protects is displayed. The number of Catalyst Copies, Snapshots, and Express Protects is also listed. You can click the numbers listed for each of these elements and Protect or remove one or more Catalyst Copy or Snapshots or Express Protects. Also, you can view the scheduled jobs listed based on the selected Copy Policy. • In the Log Protection page, information about log backup settings and log backup catalog is displayed. Configuring Volume Sets and Application Plug-ins 59 Copies Job Status Select one time frame from the menu to display the relevant resources. Overall Copies Refresh Refreshes the list of available copies on a click. Copy Type Lists Snapshot, Express Protect, Remote Snapshot, and Catalyst Copy along with the statuses. Snapshot The number of snapshots in different states. You can click the underlined numeric value to Protect, Delete, or Edit for a selected Snapshot. Express Protect The number of express protects in different states. You can click the underlined numeric value to Protect, Delete, Edit, or Verify for a selected Express Protect. Remote Snapshot The number of remote snapshots in different states. You can click the underlined numeric value to Protect, Delete, or Edit for a selected Remote Snapshot. Catalyst Copy The number of Catalyst Copies in different states. You can click the underlined numeric value to Protect, Delete, Edit, or Verify for a selected Catalyst Copy. Clone The number of clones in different states. You can click the underlined numeric value to Attach, Detach, or Remove. Cloud Copy The number of cloud copies in different states. You can click the underlined numeric value to Edit a selected cloud copy. Scheduled Jobs Copy Policy The selected copy policy. Copy Type The type of copy based on the copy policy. Execution Frequency The set time for the corresponding Copy Type. Target Device The complete name and destination path of the target device. Last Execution The time stamp of the most recent execution. Last Successful Execution The time stamp of the most recent successful execution. Configuring Volume Sets and Application Plug-ins 60 Next Execution The date and time stamp of the next scheduled execution. Details Database Instance Number The instance of the system. Role The role of the database. Whether the database is a primary or secondary. SAP HANA version SAP HANA version of the database. Notification Notification (if any) from the database. Description The description about the database. Volume Data The database data volume. You can click the name listed to navigate to the volume set user interface and perform various actions. Associated Hosts Host/IP Name of the HANA host. Host Active Specifies the availability of the HANA host. Host Status Specifies the health status of the HANA host. Name Server Role (Configured) Specifies the configured role of a name server. MASTER defines if a name server is a master candidate and its priority. Up to three Master candidates can have this role. SLAVE role is assigned to all non master name server. Name Server Role (Actual) Specifies the current role of a name server. MASTER defines the actual master candidate. SLAVE defines all other name servers. STANDBY defines the passive index servers. NONE defines the host that is not used as a worker or standby for index servers. Index Server Role (Configured) Specifies the group where the host is configured. Groups are user-defined strings that are declared at the time of installation or is configured later. Index Server Role (Actual) Specifies the group where the host runs in real time. During a failover, the original group of the failed host is taken along. Failover Group (Configured) Configuring Volume Sets and Application Plug-ins 61 Failover Group (Actual) Host Roles (Configured) Specifies the roles of a host. Host Roles (Actual) Specifies the current roles of a host. Registration Link Specfies a link when a host is not registered in RMC. System Replication Primary Host Displays the name of the primary host. Primary Site Displays the location of the primary host. Secondary Host Displays the name of the secondary host. Secondary Site Displays the name of the secondary host. Tenants Database Name Name of the database. Description Description of the tenant database. Active Status Current status of the tenant database. Active Status Details Details of the active status of the tenant database. OS User Operating system user details. OS Group Operating system group details. Cluster Details Name Displays the name of the cluster. Serviceguard Version Displays Serviceguard software version. Coordinator Displays the name of server that is the primary host. Configuring Volume Sets and Application Plug-ins 62 State Displays the state of the cluster. Status Displays the current availability status of the cluster. Node Details Displays the Name, State, and the availability status of the node. Package Details Displays the Name, owner, type, style, autorun, state, and availability status of the cluster package. Log Protection Log Backup settings Destination Type The type of log file destination. Destination The directory where the backup of log files are present. Enable Automatic Backup Specifies whether the automatic backup option is enabled or disabled. Backup Interval Specifies the backup interval. Log Backup Catalog Max Row The menu to set the number of log backups to be listed. Tenant/DB The backup catalog view for System DB for MDC Database (In case of HANA 2.0) or a Database (In case of HANA 1.0). Status The status of the backup. Backup ID The unique identifier of the backup. Backup Type The type of backup. Destination The directory where the backup of log files are present. Started The time stamp when the backup started. Finished The time stamp when the backup completed. Size The size of the log backup. Configuring Volume Sets and Application Plug-ins 63 Restoring a HANA database Procedure 1. Click the main menu and then click SAP HANA. 2. On the master pane of the Databases screen, select a database. 3. Select Clone/Restore from the Actions menu or from the Copies tab. Clone/Restore window appears. 4. Select Restore from the Clone/Restore page. a. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. b. Select a copy from the list of available copies for the selected date in the Restore section and click Next. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Copies for restore list. 5. Based on the selected copy type, click Ok in the Restore dialog. Editing a HANA database Procedure 1. Click main menu and then click SAP HANA. 2. From the master pane of the Databases screen, select a database, click Actions > Edit. 3. Perform the following in the Edit dialog: • Click Select to search and select an SID. • Edit the existing Database Username value. • Provide a password for the database in the Database Password field. • Select Auto-register all distributed system hosts for SAP HANA scale-out systems. • Provide a Description for the registered database. • Select or clear Notification Policy option based on requirement. Select Notification to enable Select option. To search and specify a notification policy for the database, click Select. 4. To update the HANA database with the changes, click OK. Refreshing or analyzing a HANA database Database refresh operation detects database changes and updates RMC. Refresh operation does not work when the database is in an error state. Analyze operation checks all the snapshots and Express Protects created on the database. Perform an analyze operation in the following conditions: • Change in HPE 3PAR, HPE Primera or HPE Nimble Storage system volume properties. • Expiration or deletion of snapshots in HPE 3PAR, HPE Primera or HPE Nimble Storage systems. • Expiration or deletion of Express Protects. Configuring Volume Sets and Application Plug-ins 64 Procedure 1. Click main menu and then click SAP HANA. 2. From the master pane of the Databases screen, select a database, click Actions > Refresh. 3. Select either Database Refresh or Copies Refresh (Analyze) according to the operation that you intend to perform. 4. Click Ok. Unregistering a HANA database Procedure 1. Click main menu and then click SAP HANA. 2. From the master pane of theDatabases screen, select a database, click Actions > Unregister. 3. Click Ok in the Unregister dialog. The selected database is no longer managed. Configuring Volume Sets and Application Plug-ins 65 Copy Policies A Copy Policy defines what type of a Copy to create, where the Copy resides (Copy Repository), when to create a Copy (frequency) and how to manage the life cycle of a Copy (expiry and retention). A Copy Policy, a centralized template is a collection of protection rules. You can apply a Policy to multiple application resources or volumes. Copy Policy is a resource that contains different Copy Types and is used to protect a database using the different Copy Types. RMC factory ships the following standard Copy Policies that you can readily use for multi-tiered protection: • Platinum — Contains Snapshot, Express Protect, and Cloud Copy. • Gold — Contains Snapshot, Express Protect, and Catalyst Copy. • Silver — Contains Snapshot and an Express Protect. • Peer Copy — Contains Snapshot and a Peer Copy. • (Only for MS SQL application) SQL T-Log Backup Policy — Contains Snapshot and a Transaction Log backup. • Bronze — Contains only a Snapshot. Based on the copy policy you have assigned for a database, the Add Protection page lists the resources contained in it. You can define Copy Policies in the following three methods: • Use a standard RMC shipped Copy Policy. • Customize — Duplicate and edit a standard policy. • Create a Copy Policy. Oracle Application • Platinum - Snapshot, Express Protect, and Cloud Copy. • Gold - Snapshot, Express Protect, and Catalyst Copy. • Silver - Snapshot and Express Protect. • Bronze - Snapshot. SAP HANA Application • Platinum - Snapshot, Express Protect, and Cloud Copy. • Gold - Snapshot, Express Protect, and Catalyst Copy. • Silver - Snapshot and Express Protect. • Bronze - Snapshot. Exchange Application • Platinum - Snapshot, Express Protect, and Cloud Copy. • Gold - Snapshot, Express Protect, and Catalyst Copy. Copy Policies 66 • Silver - Snapshot and Express Protect. • Bronze - Snapshot. MS SQL Application • Platinum — Snapshot, Express Protect, and Cloud Copy. • Gold — Snapshot, Express Protect, and Catalyst Copy. • Silver — Snapshot and Express Protect. • SQL T-Log Backup Policy — Snapshot and Transaction Log backup. • Bronze — Snapshot. Duplicating a Copy Policy Procedure 1. Click HPE Recovery Manager Central > Copy Policies. 2. In the Copy Policies screen, click the Copy Policy that you want to duplicate. 3. Click Duplicate. 4. Edit the required information. 5. Click Save. Editing a Copy Policy Editing a Copy Policy affects new Copies of the existing assignments. Does not affect the existing Copies. Procedure 1. Click HPE Recovery Manager Central > Copy Policies. 2. In the Copy Policies screen, click the Copy Policy that you want to edit. 3. From the Actions menu, click Edit. 4. Edit the required fields. 5. Click Save. NOTE: After a policy is assigned to any resource, certain attribute modification is restricted. Copy Policies 67 Adding a Copy Policy Procedure 1. Click HPE Recovery Manager Central > Copy Policies. 2. In the Copy Policies screen, click + Copy Policy. 3. Select Application Type. 4. In case you had deleted a standard Copy Policy, click Yes to import the Policy. 5. If required, edit the default policy name. 6. Specify a meaningful description for the policy. 7. In the Protection Rules panel, click a copy type. 8. Click + Schedule and then specify the required details for the copy type that you selected in step 6. • Snapshot details • Remote snapshot details • Express Protect details • Catalyst Copy details • Peer Copy details • Cloud Copy details • Transaction log details 9. Click Create. Snapshot details (For RMC-O) File Types Select Online, Data Files or Archive Logs as the file type. For more information on the File Types, see the HPE Recovery Manager Central Concepts Guide. Schedule The following frequencies are available: • Minutes • Hourly • Daily • Weekly • Monthly Every For the Weekly frequency, select the days on which you want to run the schedule. For the Monthly frequency, specify the date on which you want to run the schedule. Copy Policies 68 Auto Delete After (Optional) Expiration time for the Copy. A Copy expires after the expiration time. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Prevent Deletion Until (Optional) Retention time for the Copy. You cannot delete a Copy until the retention time expires. The minimum time must be one hour. (For RMC-O) Truncate Log (For online Snapshot type) Select or clear Truncate Log for the snapshot type. For more information about truncate logs, see the HPE Recovery Manager Central Concepts Guide. Remote snapshot details (For RMC-O) File Types Select Online, Data Files or Archive Logs as the file type. For more information on the File Types, see the HPE Recovery Manager Central Concepts Guide. Schedule The following frequencies are available: • Minutes • Hourly • Daily • Weekly • Monthly Every For the Weekly frequency, select the days on which you want to run the schedule. For the Monthly frequency, specify the date on which you want to run the schedule. Auto Delete After (Optional) Expiration time for the Copy. A Copy expires after the expiration time. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Prevent Deletion Until (Optional) Retention time for the Copy. You cannot delete a Copy until the retention time expires. The minimum time must be one hour. (For RMC-O) Truncate Log (For online Snapshot type) Select or clear Truncate Log for the snapshot type. For more information about truncate logs, see the HPE Recovery Manager Central Concepts Guide. Use Synchronous Long Distance (SLD) configuration Select to create snapshot in SLD configuration. Select a replication mode: Copy Policies 69 • Sync — Data replication that writes data to the primary and secondary sites simultaneously over a network, such that data remains current between sites. • Periodic — Data replication in which the primary and secondary volumes are resynchronized at set times. For example, when scheduled or when resynchronization is manually initiated. Express Protect details (For RMC-O) File Types Select Online, Data Files or Archive Logs as the file type. For more information on the File Types, see the HPE Recovery Manager Central Concepts Guide. Schedule The following frequencies are available: • Minutes • Hourly • Daily • Weekly • Monthly Every For the Weekly frequency, select the days on which you want to run the schedule. For the Monthly frequency, specify the date on which you want to run the schedule. Auto Delete After (Optional) Expiration time for the Copy. A Copy expires after the expiration time. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Prevent Deletion Until (Optional) Retention time for the Copy. You cannot delete a Copy until the retention time expires. The minimum time must be one hour. Verify Copy Select to validate data integrity of Express Protect with the related Snapshot. Source Select the source — snapshot, remote snapshot, or Peer Copy snapshot. Copy Repository Click Select and then select a target system. (Only for HPE StoreOnce GEN4 systems) Data Mover Type Select the data transfer type - RMC Appliance or StoreOnce Appliance. By default, StoreOnce Appliance is selected. Storage System Transport Select the protocol type to access the storage Pools managed by the Storage System. Select the Auto option to allow RMC to select a protocol. Copy Policies 70 StoreOnce Backup Transport Select the protocol type for data transfer from RMC to HPE StoreOnce. Select the Auto option to allow RMC to choose a protocol. Number of Streams Select the stream count based on your HPE StoreOnce configuration. The supported multistreaming fragments are Auto, 1, 2, 4, 8, 16, and 32. Select the Auto option to allow RMC to select the stream count. Catalyst Copy details (For RMC-O) File Types Select Online, Data Files or Archive Logs as the file type. For more information on the File Types, see the HPE Recovery Manager Central Concepts Guide. Schedule The following frequencies are available: • Minutes • Hourly • Daily • Weekly • Monthly Every For the Weekly frequency, select the days on which you want to run the schedule. For the Monthly frequency, specify the date on which you want to run the schedule. Auto Delete After (Optional) Expiration time for the Copy. A Copy expires after the expiration time. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Prevent Deletion Until (Optional) Retention time for the Copy. You cannot delete a Copy until the retention time expires. The minimum time must be one hour. Source Select the source — Express Protect. Copy Repository Click Select and then select a target. StoreOnce Replication Transport Select the transport protocol — FC or Ethernet. Cloud Copy details (For RMC-O) File Types Select Online, Data Files or Archive Logs as the file type. For more information on the File Types, see the HPE Recovery Manager Central Concepts Guide. Copy Policies 71 Schedule The following frequencies are available: • Minutes • Hourly • Daily • Weekly • Monthly Every For the Weekly frequency, select the days on which you want to run the schedule. For the Monthly frequency, specify the date on which you want to run the schedule. Auto Delete After (Optional) Expiration time for the Copy. A Copy expires after the expiration time. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Prevent Deletion Until (Optional) Retention time for the Copy. You cannot delete a Copy until the retention time expires. The minimum time must be one hour. Source Select the source — Snapshot or Express Protect. For Cloud Volumes Backup Copies, the source is always a Snapshot. Copy Repository Click Select and then select a target. StoreOnce Replication Transport Select the transport protocol or use the Select during protection option to choose a protocol during the Policy assignment. Transaction log details NOTE: The Transaction log details field is visible only for RMC-S. The expiry and retention values for a Transaction Log policy are inherited from the associated Snapshots or Backup Copies. Schedule The following frequencies are available: • Minutes • Hourly • Daily • Weekly • Monthly Every For the Weekly frequency, select the days on which you want to run the schedule. For the Monthly frequency, specify the date on which you want to run the schedule. Copy Policies 72 Peer Copy details Peer Copy Snapshot rule is available only for the application type Volumes. Schedule The following frequencies are available: • Minutes • Hourly • Daily • Weekly • Monthly Every For the Weekly frequency, select the days on which you want to run the schedule. For the Monthly frequency, specify the date on which you want to run the schedule. Auto Delete After (Optional) Expiration time for the Copy. A Copy expires after the expiration time. The minimum time must be one hour. The maximum time can be 87,600 hours or 3650 days. Prevent Deletion Until (Optional) Retention time for the Copy. You cannot delete a Copy until the retention time expires. The minimum time must be one hour. Source Select the source — Snapshot, Remote Snapshot, or Peer Copy Snapshot. Copy Repository Click Select and then select a Copy Repository. Select the Auto option to allow RMC select a Copy Repository. Ensure that you select a Copy Repository from the target storage system. Source Transport Select the protocol for connectivity between the source storage system and RMC. Select the Auto option to allow RMC to select a protocol. Target Transport Select the protocol for connectivity between the target storage system (HPE 3PAR, HPE Primera or HPE Nimble Storage) and RMC. Select the Auto option to allow RMC to select a protocol. Number of Streams The number of selectable streams depends on the RMC geometry. Select the Auto option to allow RMC to select the stream count. Removing a Copy Policy Prerequisites Ensure that you do not have the policy assigned to any resource that you intend to remove. Copy Policies 73 Procedure 1. Click HPE Recovery Manager Central > Copy Policies. 2. In the Copy Policies screen, click the Copy Policy that you want to remove. 3. From the Actions menu, click Remove. 4. At the prompt, click OK. Copy Policies 74 Protecting Applications and Volumes Volumes Adding protection for a Volume Set Procedure 1. Click HPE Recovery Manager Central > Volumes. 2. In the Volumes page, click the Volume Set for which you want to add a protection. 3. From the Actions menu, click Add Protection. 4. Click Select and then select a Copy Policy. 5. To modify Policy rules, select View options that can be modified for current protection and do the required changes. 6. Specify time and date for the schedule. To set the current time as the start time, click Now. 7. Click OK. Editing a Volume Set protection Procedure 1. Click HPE Recovery Manager Central > Volumes. 2. In the Volumes page, click the Volume Set for which you want to edit the protection. 3. From the Actions menu, click Edit Protection. 4. To modify Policy rules for a Copy type, select View options that can be modified for current protection and then modify the required fields. 5. Modify time and date for the schedule. To set the current time as the start time, click Now. 6. Click OK. Removing a Volume Set protection Procedure 1. Click HPE Recovery Manager Central > Volumes. 2. In the Volumes page, click the Volume Set for which you want to remove a protection. 3. From the Actions menu, click Remove Protection. 4. At the prompt, click OK. Protecting Applications and Volumes 75 Protecting Volume Sets Procedure 1. Click HPE Recovery Manager Central > Volumes. 2. In the Volumes screen, click the Volume Set for which you want to add a protection. 3. From the Actions menu, click Protect Once. 4. Select a Protection Type from the following list: • Use Existing Copy Policy • Snapshot • Express Protect • Catalyst Copy • Cloud Copy • Remote Snapshot • Peer Copy Snapshot • Transaction Log 5. Specify time and date for the schedule. To set the current time as the start time, click Now. 6. Click OK. Using Peer Copy Specify the following details for Peer Copy snapshot: Name Specify a name for the snapshot. Auto Delete After (Optional) Expiration time for the snapshot. A snapshot expires after the expiration time. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Prevent Deletion Until (Optional) Retention time for the snapshot. You cannot delete a snapshot until the retention time expires. The minimum time must be one hour. For Peer Copy with the source as Snapshot and Target as Auto (default option), specify the following details: Select Copy Repository Click Select to change the Copy Repository location that is auto-selected by RMC. Source Transport Select the protocol for connectivity between the source storage system and RMC. Select the Auto option to allow RMC to select a protocol. Protecting Applications and Volumes 76 Target Transport Select the protocol for connectivity between the target storage system (HPE 3PAR, HPE Primera or HPE Nimble Storage) and RMC. Select the Auto option to allow RMC to select a protocol. Number of Streams The number of selectable streams depends on the RMC geometry. Select the Auto option to allow RMC to select the stream count. Name (Optional) Specify a name for the Peer Copy snapshot. Auto Delete After (Optional) Expiration time for the Copy. A Copy expires after the expiration time. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Prevent Deletion Until (Optional) Retention time for the Copy. You cannot delete a Copy until the retention time expires. The minimum time must be one hour. Start Date and Time To set a scheduler for the Peer Copy snapshot, select start date and time or select Now to create a Copy instantly. RMC-E Adding a Protection A platinum policy contains option to move backups to Cloud Bank storage, a snapshot, Express Protect, and Catalyst Copy. A gold policy contains a snapshot, Express Protect, and Catalyst Copy. A silver policy contains a snapshot and an Express Protect. Whereas, a bronze policy contains only a snapshot. Based on the copy policy you have assigned for a database, the Edit Protection page lists the resources contained in it. Procedure 1. Click main menu and then Exchange Databases > Actions > Add Protection. Add Protection window appears. 2. Select a database and view options that can be edited for a selected database. For a Data Availability Group (DAG) database with multiple copies, you can select active or passive node when the Snapshot source is Specified server. Alternatively, the Auto option can be selected which, when selected, snapshots the active database in the DAG group. > For Snapshot source as Specified server, you can select active or passive node. NOTE: Auto option is not available for a protect that contains a remote snapshot. 3. Click Select to search and specify a Copy Policy for the selected database. 4. Click Snapshot and select View options that can be modified for current protection to see the advanced options for Snapshot that can be modified. a. Select Verify Snapshot and click Select to search and specify a Validation Server. b. Select or clear Validate Log Only as required. Protecting Applications and Volumes 77 5. Click Express Protect option to view and modify the required fields. To modify options for the current Express Protect, select View options that can be modified for current protection. a. Click Select to select and assign a copy repository from the list of storage devices. b. Select the optional settings like Storage System Transport (Auto, FC, or ISCSI), StoreOnce Replication Transport (Auto, FC, or Ethernet), and Backup Type (Auto or Full Backup) options as per requirement. c. Specify the Number of Streams as either Auto or a number from the numeric list. 6. Click Catalyst Copy or Cloud Copy (based on the Copy Policy type) to view the details modify the required fields. To modify options for the current Catalyst Copy, select View options that can be modified for current protection to see the advanced options for Catalyst Copy that can be modified. a. Click Select to search and select a target from a list of storage devices and stores. 7. To set up or modify the scheduler for the selected Protection job, select Effective From and set the required date and time. 8. Click Ok. Editing a Protection A platinum policy contains a Cloud Bank storage, a snapshot, Express Protect, and Catalyst Copy. A gold policy contains a snapshot, Express Protect, and Catalyst Copy. A silver policy contains a snapshot and an Express Protect. Whereas, a bronze policy contains only a snapshot. Based on the copy policy you have assigned for a database, the Edit Protection page lists the resources contained in it. Procedure 1. Click main menu and then Exchange Databases > Databases > Actions > Edit Protection. Edit Protection dialog appears. 2. To search and select a copy policy, click Copy Policy . 3. Click Snapshot and select View options that can be modified for current protection to see the advanced options for Snapshot that can be modified. a. Provide a name for the Snapshot. b. Specify the number of hours, days, weeks, or months to auto delete the snapshot. c. Specify the number of hours, days, or weeks until the snapshot deletion needs to be prevented. 4. Click Express Protect option in the details pane. 5. To modify options for the current protection, select View options that can be modified for current protection. a. Select a target storage device from the list of storage devices and stores. b. Modify the advance settings like Storage System Transport, StoreOnce Replication Transport, and Backup Type options as per requirement. c. Specify the Number of Streams as either Auto or select from the numeric list. d. Specify the Express Protect name. e. Set the Verify Backup option to On or Off. Protecting Applications and Volumes 78 f. Specify the number of hours, days, weeks, or months to auto delete the snapshot. g. Specify the number of hours, days, or weeks until the snapshot deletion needs to be prevented. 6. Click Catalyst Copy and select View options that can be modified for current protection to see the advanced options for Catalyst Copy that can be modified. a. Click Select to search and select a target from a list of storage devices and stores. 7. Click Cloud Copy and select View options that can be modified for current protection to see the advanced options for Catalyst Copy that can be modified. a. Click Select to search and select a Copy Repository path for the cloud bank. b. Select the StoreOnce Replication Transport option from FC or Ethernet. c. Specify the Coeth IP if you select Ethernet in the StoreOnce Replication Transport option. 8. To set up or modify the scheduler for the selected Protection job, select Effective From and set the required date and time. 9. Click Ok. Removing a Protection Procedure 1. Click main menu and then Exchange Databases. 2. Select a database in the master pane, and click Actions > Remove Protection. Remove Protection dialog appears. 3. Click Ok . Protecting a database Protect Once option allows you to protect your database by applying an existing Copy policy or creating a new copy policy that contains a combination of a Snapshot, an Express Protect, and Catalyst Copy. Procedure 1. Click main menu and then Exchange Databases. 2. Select a database and click Actions > Protect Once. 3. Select a Protection Type from the following list: • Use Existing Copy Policy • Snapshot • Express Protect • Catalyst Copy Protecting Applications and Volumes 79 • Cloud Copy • Remote Snapshot 4. Click Ok. Using Existing Copy Policy Use Existing Copy Policy option is used when you intend to use an existing Copy Policy to protect your database. Procedure 1. Click main menu and then Exchange Databases. 2. Select a database and click Actions > Protect Once. 3. Select Use Existing Copy Policy from the Protection Type menu. 4. Click Select to search and select an existing Copy Policy. The Copy Policy contents appear 5. To set up or modify the scheduler for the selected Protection job, select Effective From and set the required date and time. 6. Click Ok. NOTE: If the copy policy contains more than one set of frequency settings (Truncate, Verify, Auto Delete After, Prevent Deletion Until), and these settings are NOT overridden in the Protect Once dialog, then the one-off protection job uses the settings from the first set of defined frequency parameters. Using a Snapshot Procedure 1. Click main menu and then Exchange Databases. 2. Select a database and click Actions > Protect Once. 3. Select Snapshot from the Protection Type menu. 4. [Optional] Enter a name for the Snapshot. 5. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. 6. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 7. Select or clear Truncate Log. 8. Select Verify Snapshot and click Select to search and specify a Validation Server. 9. Select or clear Validate Log Only. 10. To set up the scheduler for the snapshot, select Start Date and Time to set the required data and time or select Now to run once. 11. Click Ok. Protecting Applications and Volumes 80 Using an Express Protect Procedure 1. Click main menu and then Exchange Databases. 2. Select a database from the master pane and click Actions > Protect Once. 3. Select Express Protect from the Protection Type menu. Snapshots a. [Optional] Enter a name for the Snapshot. b. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. c. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. d. Select or clear Truncate Log. e. Select Verify Snapshot and click Select to search and specify a Validation Server. f. Select or clear Validate Log Only. 4. For Express Protect with the source as Snapshot and Target as Auto (default option), perform the following: a. Select a target storage device from the list of storage devices and stores. b. Select the Storage System Transport as either Auto, FC, or iSCSI. c. Select the StoreOnce Replication Transport as either Auto, FC, or Ethernet. d. Select the Backup Type options as per requirement. e. Specify the Number of Streams as either Auto or select from the numeric list. f. [Optional] Specify the Express Protect name. g. Set the Verify Copy option to On or Off. h. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the Express Protect. i. [Optional] Specify the number of Hours, Days, or Weeks until the Express Protect deletion has to be prevented. 5. To set up the scheduler, select Start Date and Time to set the required data and time or select Now to run once. 6. Click Ok. Using a Catalyst Copy Procedure 1. Click main menu and then Exchange Databases. 2. Select a database from the master pane and click Actions > Protect Once. 3. Select Catalyst Copy from the Protection Type menu. Snapshots Protecting Applications and Volumes 81 a. [Optional] Enter a name for the Snapshot. b. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. c. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. d. Select or clear Truncate Log. e. Select Verify Snapshot and click Select to search and specify a Validation Server. f. Select or clear Validate Log Only. 4. For Express Protect with the source as Snapshot and Target as Auto (default option), perform the following: a. Select the Storage System Transport as either Auto, FC, or iSCSI. b. Select the StoreOnce Replication Transport as either Auto, FC, or Ethernet. c. Select the Backup Type options as per requirement. d. Specify the Number of Streams as either Auto or select from the numeric list. e. [Optional] Specify the Express Protect name. f. Set the Verify Copy option to On or Off. g. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the Express Protect. h. [Optional] Specify the number of Hours, Days, or Weeks until the Express Protect deletion has to be prevented. 5. For Catalyst Copy with the source as Express Protect and Target as Auto (default option), perform the following: NOTE: Ensure that a minimum of two HPE StoreOnce systems are registered with RMC. a. Select a target storage device from the list of storage devices and stores. b. [Optional] Specify the Catalyst Copy name. c. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the Catalyst Copy. d. [Optional] Specify the number of Hours, Days, or Weeks until the Catalyst Copy deletion has to be prevented. 6. To set up the scheduler, select Start Date and Time to set the required data and time or select Now to run once. 7. Click Ok. Using a Cloud Copy Procedure 1. Click main menu and then Exchange Databases. 2. Select a database from the master pane and click Actions > Protect Once 3. Select Using Cloud Copy from the Protection Type menu. Snapshots Protecting Applications and Volumes 82 a. [Optional] Enter a name for the Snapshot. b. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. c. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. d. Select or clear Truncate Log. e. Select Verify Snapshot and click Select to search and specify a Validation Server. f. Select or clear Validate Log Only. 4. For Express Protect with the source as Snapshot and Target as Auto (default option), perform the following: a. Select the Storage System Transport as either Auto, FC, or iSCSI. b. Select the StoreOnce Replication Transport as either Auto, FC, or Ethernet. c. Select the Backup Type options as per requirement. d. Specify the Number of Streams as either Auto or select from the numeric list. e. [Optional] Specify the Express Protect name. f. Set the Verify Copy option to On or Off. g. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the Express Protect. h. [Optional] Specify the number of Hours, Days, or Weeks until the Express Protect deletion has to be prevented. 5. For Cloud Copy with the source as Express Protect and Target as Auto (default option), perform the following: a. Select a target storage device from the list of storage devices and stores. b. [Optional] Specify the Cloud Copy name. c. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the Cloud Copy. d. [Optional] Specify the number of Hours, Days, or Weeks until the Cloud Copy deletion has to be prevented. 6. To set up the scheduler, select Start Date and Time to set the required data and time or select Now to run once. 7. Click Ok. Using Remote Snapshots Procedure 1. Click main menu and then Exchange Databases. 2. Select a database from the master pane and click Actions > Protect Once. 3. Select Remote Snapshot from the Protection Type menu. a. [Optional] Select the Replication Mode as either Sync or Periodic. b. [Optional] Enter a name for the remote snapshot. c. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the remote snapshot. d. [Optional] Specify the number of Hours, Days, Weeks, or Months until the remote snapshot deletion has to be prevented. Protecting Applications and Volumes 83 e. Select or clear Truncate Log. f. Select Verify Snapshot and click Select to search and specify a Validation Server. g. Select or clear Validate Log Only. 4. To set up the scheduler, select Start Date and Time to set the required data and time or select Now to run once. 5. Click Ok. RMC-O Adding Protection for an Oracle database A platinum policy contains a Snapshot, Express Protect, and Cloud Copy. A gold policy contains a Snapshot, Express Protect, and Catalyst Copy. A silver policy contains a Snapshot and an Express Protect. A bronze policy contains only a Snapshot. Based on the copy policy you have assigned for a database, the Add Protection page lists the resources contained in it. Procedure 1. Click main menu and then Oracle Databases > Databases > Actions > Add Protection. 2. To search and select a copy policy, click Select. Select Copy Policy dialog appears. 3. Select a policy from the Select Copy Policy dialog and click Select. 4. Click Express Protect options. 5. To modify options for the current protection, select View options that can be modified for current protection. a. Select a Copy Repository from the list of storage devices and stores. b. Select the Storage System Transport and StoreOnce Backup Transport as either Auto, iSCSI, or FC. c. Select the Backup Type as either Auto or Full Backup. d. Specify the Number of Streams as either Auto or select from the numeric list. 6. Click Catalyst Copy and select View options that can be modified for current protection to see the advanced options for Catalyst Copy that can be modified. a. Select a target Copy Repository from the list of storage devices and stores. b. Select the StoreOnce Replication Transport as either FC or Ethernet. For Ethernet type StoreOnce Replication Transport, specify the Coeth IP. 7. Click Cloud Copy and select View options that can be modified for current protection to see the advanced options for Cloud Copy that can be modified. a. (For Cloud Volumes Backup) Select the Storage System Transport as either FC or iSCSI. b. Select the StoreOnce Replication Transport option. For Ethernet type, specify the Coeth IP. c. Specify the Number of Streams as either Auto or select from the numeric list. Protecting Applications and Volumes 84 8. To set up or modify the scheduler for the selected Protection job, select Effective From and set the required date and time. Select Now to set the current date and time. 9. Click Ok. Editing protection for an Oracle database A platinum policy contains Snapshot, Express Protect and Cloud Copy. A gold policy contains a Snapshot, Express Protect, and Catalyst Copy. A silver policy contains a Snapshot and an Express Protect. A bronze policy contains only a snapshot. Based on the copy policy you have assigned for a database, the Edit Protection page lists the resources contained in it. Procedure 1. Click main menu and then Oracle Databases > Databases > Actions > Edit Protection. Edit Protection dialog appears. 2. To search and select a Copy Policy, click Copy Policy . 3. Click Express Protect and select View options that can be modified for current protection to see the advanced options for Express Protect that can be modified. a. Modify the advance settings such as Storage System Transport, StoreOnce Backup Transport, and Backup Type options as per requirement. b. Specify the Number of Streams as either Auto or select from the numeric list. 4. Click Catalyst Copy and select View options that can be modified for current protection to see the advanced options for Catalyst Copy that can be modified. a. Modify the StoreOnce Replication Transport option. 5. Click Cloud Copy and select View options that can be modified for current protection to see the advanced options for Cloud Copy that can be modified. a. Select the StoreOnce Replication Transport option from FC or Ethernet. Specify the Coeth IP if you select Ethernet in the StoreOnce Replication Transport option. b. (For Cloud Volumes Backup) Select the Storage System Transport option from FC or iSCSI. c. Specify the Number of Streams as either Auto or select from the numeric list. 6. To set up or modify the scheduler for the selected Protection job, select Effective From and set the required date and time. Select Now to set the current date and time. 7. Click Ok. Removing a Protection Procedure 1. Click main menu and then Oracle Databases. 2. Select a database in the master pane, and click Actions > Remove Protection. Protecting Applications and Volumes 85 Remove Protection dialog appears. 3. Click Ok . Protecting an Oracle database Protect Once option allows you to protect your database by applying an existing Copy policy or use a custom copy policy. These policies can have a combination of a Snapshot, an Express Protect, Catalyst Copy, and Cloud Copy. Procedure 1. Click main menu and then Oracle Databases > Databases > Actions > Protect Once. 2. Select a Protection Type from the following list: • Use Existing Copy Policy • Snapshot • Express Protect • Catalyst Copy • Cloud Copy • Remote Snapshot 3. Click Ok. Using existing Copy Policy Use Existing Copy Policy option is used when you intend to use an existing Copy Policy to protect your database. Procedure 1. Click main menu and then Oracle Databases > Databases > Actions > Protect Once. 2. Select Use Existing Copy Policy from the Protection Type menu. 3. Click Select to search and select an existing Copy Policy. The Copy Policy contents appear 4. To set up or modify the scheduler for the selected Protection job, select Start Date and Time and set the required date and time. 5. Click Ok. Using Snapshot Procedure 1. Click main menu and then Oracle Databases > Databases > Actions > Protect Once. 2. Select Snapshot from the Protection Type menu. 3. Enter a name for the Snapshot. 4. Select the Snapshot Type from the menu. Protecting Applications and Volumes 86 5. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. 6. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 7. [Only for Snapshot Type - Online (Hot)] - Select between On or Off for Verify Snapshot? option. For Verify Snapshot set to On, perform the following: a. Click Select to search and specify a Backup Server. b. [Optional] Specify the Clone Database Home path. c. [Optional] Select or clear USE LARGE PAGES option to use or discard the value set in the production database for the parameter USE_LARGE_PAGES for the cloned database when taking backups. 8. [Only for Snapshot Type - Online (Hot)] - Select or clear Truncate Log. 9. To set up the scheduler for the snapshot, select Start Date and Time and set the required date and time. 10. Click Ok. Using Express Protect Procedure 1. Click main menu and then Oracle Databases > Databases > Actions > Protect Once. 2. Select Express Protect from the Protection Type menu. Snapshots a. Select the Snapshot Type from the menu. b. [Optional] Enter a Name for the Snapshot. c. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. d. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. e. [Only for Snapshot Type - Online (Hot)] - Select between On or Off for Verify Snapshot? option. For Verify Snapshot set to On, perform the following: I. Click Select to search and specify a Backup Server. II. [Optional] Specify the Clone Database Home path. III. [Optional] Select or clear USE LARGE PAGES option to use or discard the value set in the production database for the parameter USE_LARGE_PAGES for the cloned database when taking backups. IV. [Only for Snapshot Type - Online (Hot)] Select or clear Truncate Log as per requirement. 3. For Express Protect with the source as Snapshot and Target as Auto (default option), perform the following: a. Select a target Copy Repositories from the list of storage devices and stores. b. Select the Storage System Transport as either Auto, FC, or iSCSI. c. Select the StoreOnce Backup Transport as either Auto, FC, or Ethernet. d. Select the Backup Type options as per requirement. Protecting Applications and Volumes 87 e. Specify the Number of Streams as either Auto or select from the numeric list. f. Specify the Express Protect name. g. Set the Verify Backup option to On or Off. h. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. i. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 4. To set up the scheduler for the Express Protect, select Start Date and Time and set the required date and time. Select Now to set the current date and time. 5. Click Ok. Using Catalyst Copy Procedure 1. Click main menu and then Oracle Databases > Databases > Actions > Protect Once. 2. Select Catalyst Copy from the Protection Type menu. Snapshots a. Select the SnapShot type from the menu. b. Enter a name for the Snapshot. c. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. d. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. e. [Only for Snapshot Type - Online (Hot)] Select or clear Truncate Log as per requirement. 3. For Express Protect with the source as Snapshot and Target as Auto (default option), perform the following: a. Select a target Copy Repositories from the list of storage devices and stores. b. Select the Storage System Transport as either Auto, FC, or iSCSI. c. Select the StoreOnce Backup Transport as either Auto, FC, or Ethernet. d. Select the Backup Type options as per requirement. e. Specify the Number of Streams as either Auto or select from the numeric list. f. Specify the Express Protect name. g. Set the Verify Backup option to On or Off. h. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. i. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 4. For Catalyst Copy with the source as Express Protect and Target as Auto (default option), perform the following: NOTE: Ensure that a minimum of two HPE StoreOnce systems are registered with RMC. Protecting Applications and Volumes 88 a. Select a target Copy Repositories from the list of storage devices and stores. b. Select the StoreOnce Replication Transport as either Auto, FC, or Ethernet. c. Specify the Catalyst Copy name. d. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. e. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 5. To set up the scheduler for the Catalyst Copy, select Start Date and Time and set the required date and time. Select Now to set the current date and time. 6. Click Ok. Using Cloud Copy Procedure 1. Select Using Cloud Copy from the Protection Type menu. Select the Target as Cloud Bank Storage or Cloud Volume Backup. • Cloud Bank Storage — Specify the details for Snapshot, Express protect, and Cloud Copy. • Cloud Volumes Backup — Specify the details for Snapshot and Cloud Copy. Snapshots a. Select the SnapShot type from the menu. b. Enter a name for the Snapshot. c. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. d. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. e. [Only for Snapshot Type - Online (Hot)] Select or clear Truncate Log as per requirement. 2. For Express Protect with the source as Snapshot and Target as Auto (default option), perform the following: a. Select the target Copy Repositories from the list of storage devices and stores. b. Select the Storage System Transport as either Auto, FC, or iSCSI. c. Select the StoreOnce Backup Transport as either Auto, FC, or Ethernet. d. Select the Backup Type options as per requirement. e. Specify the Number of Streams as either Auto or select from the numeric list. f. Specify the Express Protect name. g. Set the Verify Copy option to On or Off. h. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. i. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 3. For Cloud Copy with the source as Express Protect and Target as Auto (default option), perform the following: Protecting Applications and Volumes 89 a. Select a target Copy Repositories from the list of storage devices and stores. b. Select the StoreOnce Replication Transport as either Auto, or Ethernet. Specify the Coeth IP if you select Ethernet in the StoreOnce Replication Transport. c. Specify the Cloud Copy name. d. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. e. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 4. For Cloud Volumes Backup with the source as Snapshot, perform the following: a. Click Snapshot and select View options that can be modified for current protection to set the time until the snapshot deletion has to be prevented. b. Select a target Copy Repositories from the list of storage devices and stores. c. Select the StoreOnce Backup Transport as either FC, or iSCSI. d. Specify the Number of Streams from the numeric list. 5. To set up the scheduler for the Cloud Copy, select Start Date and Time and set the required date and time. Select Now to set the current date and time. 6. Click Ok. Using Remote Snapshot Procedure 1. Click main menu and then Oracle Databases > Databases > Actions > Protect Once. 2. Select Remote Snapshot from the Protection Type menu. a. Select a Snapshot Type from Online (Hot), Archive Logs, and Datafile. b. Select the Replication Mode as either Sync or Periodic. c. Enter a name for the remote snapshot. d. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. e. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 3. [Only for Snapshot Type - Online (Hot)] - Select between On or Off for Verify Snapshot? option. For Verify Snapshot set to On, perform the following: a. Click Select to search and specify a Backup Server. b. [Optional] Specify the Clone Database Home path. c. [Optional] Select or clear USE LARGE PAGES option to use or discard the value set in the production database for the parameter USE_LARGE_PAGES for the cloned database when taking backups. 4. [Only for Snapshot Type - Online (Hot)] - Select or clear Truncate Log. Protecting Applications and Volumes 90 5. To set up the scheduler for the remote snapshot, select Start Date and Time and set the required date and time. 6. Click Ok. RMC-S Adding protection for an MS SQL instance Procedure 1. In the Microsoft SQL Instances page, click the instance for which you want to add a protection. 2. From the Actions menu, click Add Protection. The Add Protection screen appears with the list of databases that are considered for protection. 3. Use the icon to change your database selections and then click Reset to update the default database selections. 4. Click Select and then select a Copy Policy. 5. To modify Policy rules for a Copy type, select View options that can be modified for current protection and do the required changes. 6. Specify time and date for the schedule. To set the current time as the start time, click Now. 7. Click OK. Removing protection for an MS SQL instance or database Procedure 1. Click HPE Recovery Manager Central > Microsoft SQL. 2. (For removing an instance protection) In the Microsoft SQL Instances page, click the instance for which you want to remove a protection. 3. (For removing a database protection) In the Microsoft SQL Databases page, click the database for which you want to remove a protection. 4. From the Actions menu, click Remove Protection. 5. At the prompt, click OK. Editing protection for an MS SQL instance or database Procedure 1. Click HPE Recovery Manager Central > Microsoft SQL. 2. (For editing an instance protection) In the Microsoft SQL Instances page, click the instance for which you want to edit a protection. 3. (For editing a database protection) In the Microsoft SQL Databases page, click the database for which you want to edit a protection. Protecting Applications and Volumes 91 4. From the Actions menu, click Edit Protection. 5. Modify time and date for the schedule. To set the current time as the start time, click Now. 6. Click OK. Protect Once — MS SQL server instances Procedure 1. In the Microsoft SQL Instances page, click the instance for which you want to add a protection. 2. From the Actions menu, click Protect Once. The Protect Once screen appears with the list of databases that are considered for protection. 3. Use the icon to change your database selections and then click Reset to update the default database selections. 4. Select a Protection Type from the following list: • Use Existing Copy Policy • Snapshot • Express Protect • Catalyst Copy • Cloud Copy • Remote Snapshot NOTE: Hewlett Packard Enterprise recommends you to not use custom policy with Transaction Log backup rule at instance level protection. 5. Specify time and date for the schedule. To set the current time as the start time, click Now. 6. Click OK. Using an existing Copy Policy Select a Copy Policy from the list of existing Copy Policies and then click Select. Using Snapshot Prerequisites Before you create a database snapshot in a VMware environment, ensure that the datastores associated with VMs hosting the MS SQL server are in active state. Specify the following details: Name Specify a name for the snapshot. Protecting Applications and Volumes 92 Auto Delete After (Optional) Expiration time for the Copy. A Copy expires after the expiration time. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Prevent Deletion Until (Optional) Retention time for the Copy. You cannot delete a Copy until the retention time expires. The minimum time must be one hour. Verify Snapshot (Required only for database-level protection) The DBCC CHECKDB command is used to verify the integrity of live databases including protection features that protect the Snapshot to backup systems. You can verify the databases after mounting the Snapshot to a local or remote server by assigning a mount path. Using Express Protect Specify the following details for Snapshot: Name Specify a name for the snapshot. Auto Delete After (Optional) Expiration time for the Copy. A Copy expires after the expiration time. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Prevent Deletion Until (Optional) Retention time for the Copy. You cannot delete a Copy until the retention time expires. The minimum time must be one hour. For Express Protect with the source as Snapshot and Target as Auto (default option), specify the following details: Select Copy Repository Click Select to change the default Copy Repository location. Storage System Transport Select the protocol type to access the storage Pools managed by the Storage System. Select the Auto option to allow RMC to select a protocol. StoreOnce Backup Transport Select the protocol type for data transfer from RMC to HPE StoreOnce. Select the Auto option to allow RMC to select a protocol. Backup Type Select one of the following options: Auto: In the Storage Systems, incremental backup is attempted first. If the operation fails, optimized backup (only those blocks with data are copied) is attempted. If even the optimized backup operation fails, a full backup is performed. Optimized backups are faster than full backups. Full: Performs a full backup. Perform if auto backup fails. Number of Streams Select the stream count based on your HPE StoreOnce configuration. The supported multistreaming fragments are Auto, 1, 2, 4, 8, 16, and 32. Select the Auto option to allow RMC to select the stream count. Name Specify a name for the Express Protect. Protecting Applications and Volumes 93 Verify Copy If ON, RMC validates data integrity of Express Protect with the related Snapshot. Auto Delete After (Optional) Expiration time for the Copy. A Copy expires after the expiration time. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Prevent Deletion Until (Optional) Retention time for the Copy. You cannot delete a Copy until the retention time expires. The minimum time must be one hour. Using a Catalyst Copy Specify the following details for Snapshot: Name Specify a name for the snapshot. Auto Delete After (Optional) Expiration time for the Copy. A Copy expires after the expiration time. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Prevent Deletion Until (Optional) Retention time for the Copy. You cannot delete a Copy until the retention time expires. The minimum time must be one hour. For Express Protect with the source as Snapshot and Target as Auto (default option), specify the following details: Select Copy Repository Click Select to change the default Copy Repository location. Storage System Transport Select the protocol type to access the storage Pools managed by the Storage System. Select the Auto option to allow RMC to select a protocol. StoreOnce Backup Transport Select the protocol type for data transfer from RMC to HPE StoreOnce. Select the Auto option to allow RMC to select a protocol. Backup Type Select one of the following options: Auto: In the Storage Systems, incremental backup is attempted first. If the operation fails, optimized backup (only those blocks with data are copied) is attempted. If even the optimized backup operation fails, a full backup is performed. Optimized backups are faster than full backups. Full: Performs a full backup. Perform if auto backup fails. Number of Streams Select the stream count based on your HPE StoreOnce configuration. The supported multistreaming fragments are Auto, 1, 2, 4, 8, 16, and 32. Select the Auto option to allow RMC to select the stream count. Name Specify a name for the Express Protect. Verify Copy If ON, RMC validates data integrity of Express Protect with the related Snapshot. Protecting Applications and Volumes 94 Auto Delete After (Optional) Expiration time for the Copy. A Copy expires after the expiration time. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Prevent Deletion Until (Optional) Retention time for the Copy. You cannot delete a Copy until the retention time expires. The minimum time must be one hour. For Catalyst Copy with the source as Express Protect and Target as Auto (default option), specify the following details: NOTE: Ensure that a minimum of two HPE StoreOnce systems are registered with RMC. Select Copy Repository Click Select to change the default copy repository location. StoreOnce Replication Transport Select the protocol type for data transfer from RMC to HPE StoreOnce. Name Specify a name for the Catalyst Copy. Auto Delete After Expiration time for the Express Protect. The minimum time must be one hour. The maximum time can be 43,800 hours, 1,825 days, 260 weeks, or 60 months. Prevent Deletion Until Retention time for the Express Protect. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Using a Cloud Copy Select one of the following options: • Cloud Bank Storage — Specify the details for Snapshot, Express protect, and Cloud Copy. • Cloud Volumes Backup — Specify the details for Snapshot and Cloud Copy. Snapshot details Name Specify a name for the snapshot. Auto Delete After (Optional) Expiration time for the Copy. A Copy expires after the expiration time. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Prevent Deletion Until (Optional) Retention time for the Copy. You cannot delete a Copy until the retention time expires. The minimum time must be one hour. Express Protect details For Express Protect with the source as Snapshot and Target as Auto (default option), specify the following details: Protecting Applications and Volumes 95 Select Copy Repository Click Select to change the default Copy Repository location. Storage System Transport Select the protocol type to access the storage Pools managed by the Storage System. Select the Auto option to allow RMC to select a protocol. StoreOnce Backup Transport Select the protocol type for data transfer from RMC to HPE StoreOnce. Select the Auto option to allow RMC to select a protocol. Backup Type Select one of the following options: Auto: In the Storage Systems, incremental backup is attempted first. If the operation fails, optimized backup (only those blocks with data are copied) is attempted. If even the optimized backup operation fails, a full backup is performed. Optimized backups are faster than full backups. Full: Performs a full backup. Perform if auto backup fails. Number of Streams Select the stream count based on your HPE StoreOnce configuration. The supported multistreaming fragments are Auto, 1, 2, 4, 8, 16, and 32. Select the Auto option to allow RMC to select the stream count. Name Specify a name for the Express Protect. Verify Copy If ON, RMC validates data integrity of Express Protect with the related Snapshot. Auto Delete After (Optional) Expiration time for the Copy. A Copy expires after the expiration time. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Prevent Deletion Until (Optional) Retention time for the Copy. You cannot delete a Copy until the retention time expires. The minimum time must be one hour. Cloud Copy details For Cloud Copy with the source as Express Protect and Target as Auto (default option), specify the following details: Select Copy Repository Click Select to change the default Copy Repository location. StoreOnce Replication Transport Select the protocol type for data transfer from RMC to HPE StoreOnce. Name Specify a name for the Cloud Copy. Auto Delete After Expiration time for the Cloud Bank Store Copy. The minimum time must be one hour. The maximum time can be 43,800 hours, 1,825 days, 260 weeks, or 60 months. Protecting Applications and Volumes 96 Prevent Deletion Until Retention time for the Cloud Bank Store Copy. The minimum time must be one hour. The maximum time can be 43,800 hours, 1,825 days, 260 weeks, or 60 months. Using remote snapshot Specify the following details for remote snapshot: Replication Mode Select one of the following options: Sync: The local RMC-S server saves the time stamp record of the Snapshots of a source LUN and remote RMC-S server saves the same time stamp record of a remote Snapshot in their respective repositories. Periodic: The local RMC-S server does not retain any record of the snapshot time stamp for the source LUNs of the Remote Copy group in its repository. Start Remote Copy Group If selected, RMC automatically restarts a stopped Remote Copy group. Name A name for the remote snapshot. Auto Delete After (Optional) Expiration time for the Copy. A Copy expires after the expiration time. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Prevent Deletion Until (Optional) Retention time for the Copy. You cannot delete a Copy until the retention time expires. The minimum time must be one hour. After creating a remote snapshot at the database-level, you can verify it using the Copies Actions menu. Adding protection for an MS SQL database Procedure 1. In the Microsoft SQL Databases page, click the database for which you want to add a protection. 2. From the Actions menu, click Add Protection. 3. Click Select and then select a Copy Policy. 4. Specify time and date for the schedule. To set the current time as the start time, click Now. 5. Click OK. NOTE: You can stop a scheduled protection either by suspending the schedule or by removing the assigned Copy Policy from the protected database. Protecting Applications and Volumes 97 Protect Once — MS SQL server databases Procedure 1. In the Microsoft SQL Databases page, click the database for which you want to add a protection. 2. From the Actions menu, click Protect Once. The Protect Once screen appears. 3. Select a Protection Type from the following list: • Use Existing Copy Policy • Snapshot • Express Protect • Catalyst Copy • Cloud Copy • Remote Snapshot • Transaction Log 4. Specify time and date for the schedule. To set the current time as the start time, click Now. 5. Click OK. Using Transaction Log Specify the following details for Transaction Log: Translog Specification Shared folder path of the Transaction Log Folder. Transaction Log Configuring global Transaction Log repository The Transaction Log folder is not configured by default. Hewlett Packard Enterprise recommends you not to store any database or instance files in the Transaction Log folder as there might be issues during a restore. The restore of transaction log folder Snapshot or Express Protect overwrites the database or instance files. Procedure 1. Click HPE Recovery Manager Central > Microsoft SQL. 2. Click the Servers tab and then click + Configure Global Translog. 3. Select the Server on which you want to configure the repository. 4. Select the shared path of the Transaction Log folder. RMC-S supports shared folder with HPE 3PAR, HPE Primera and HPE Nimble Storage disks as local drive or path. The shared path can be RDM or VFMS disk that are on HPE 3PAR, HPE Primera or HPE Nimble Storage. The path validation test starts. If the test fails, select the correct the path. Protecting Applications and Volumes 98 NOTE: The following Windows shared folder paths are not supported: • Loopback path. For example, \\localhost\..\ or \\127.0.0.1\...\ • Hidden or administrative shares. For example, \\servername\x$ • Other UNC path formats. For example, \\?\x:\ • Mapped network drives. For example, file://<filename> not supported. After a successful validation test, the Configure button is enabled. 5. Click Configure. 6. At the prompt, enable Yes, continue with configure transaction log and then click OK. The following details are populated after successful configuration of transaction log repository. Recovery Set Name The configured transaction log volume Recovery Set name created by RMC. Storage System Serial number The serial number of the HPE storage system used to export volume to configure transaction log folder. Volume Name The name of the volume created for configuring transaction log. Volume WWN The WWN name of the configured transaction log volume. Protected by Copy Policy By default the transaction log repository is protected by RMC standard bronze policy. Under this policy, the snapshots are taken every 12 hours and are deleted after 7 days of snapshot creation. You can configure the policy as per your requirements. Configuring Transaction Log repository at server level Procedure 1. Click HPE Recovery Manager Central > Microsoft SQL. 2. Click the Servers tab. 3. From the Actions menu, click Configure Translog. 4. Do one of the following: • To use the already configured global transaction repository, select Use Global Transaction log Repository. • If you do not want to use the global transaction repository, select Configure Transaction log Repository. 5. Select the Server on which you want to configure the repository. 6. Select the share path of the transaction log folder. RMC-S supports shared folder with HPE 3PAR, HPE Primera and HPE Nimble Storage disks as local drive or path. The shared path can be RDM or VFMS disk that are on HPE 3PAR, HPE Primera or HPE Nimble Storage. The path validation test starts. If the test fails, select the correct the path. Protecting Applications and Volumes 99 NOTE: The following Windows shared folder paths are not supported: • Loopback path. For example, \\localhost\..\ or \\127.0.0.1\...\ • Hidden or administrative shares. For example, \\servername\x$ • Other UNC path formats. For example, \\?\x:\ • Mapped network drives. For example, file://<filename> not supported. After a successful validation test, the Configure button is enabled. 7. Click Configure. 8. At the prompt, enable Yes, continue with configure transaction log and then click OK. The following details are populated after successful configuration of transaction log repository. Recovery Set Name The configured transaction log volume Recovery Set name created by RMC. Storage System Serial number The serial number of the HPE storage system used to export volume to configure transaction log folder. Volume Name The name of the volume created for configuring transaction log. Volume WWN The WWN name of the configured transaction log volume. Protected by Copy Policy By default the transaction log repository is protected by RMC standard bronze policy. Under this policy, the snapshots are taken every 12 hours and are deleted after seven days of snapshot creation. You can configure the policy as per your requirements. Refreshing a transaction log shared folder Refreshing the transaction log folder updates any missing configuration. For example, a Volume Set missing in RMC is recreated. Procedure 1. On RMC-S CLI, use the same configured shared path with –f option. 2. Using the RMC GUI, refresh any server or do the following: a. Reconfigure the same configured shared path by appending with /. b. Click Validate and then click Configure. RMC-SH Adding Protection for a SAP HANA database A platinum policy contains a Cloud Bank storage, a snapshot, Express Protect, and Catalyst Copy. A gold policy contains a snapshot, Express Protect, and Catalyst Copy. A silver policy contains a snapshot and an Express Protect. Whereas, a bronze Protecting Applications and Volumes 100 policy contains only a snapshot. Based on the copy policy you have assigned for a database, the Add Protection page lists the resources contained in it. Procedure 1. Click main menu and then SAP HANA > Databases > Actions > Add Protection. 2. To search and select a copy policy, click Copy Policy . 3. Click Snapshot to view the set details of Frequency, Auto Delete After, and Prevent Deletion Until. 4. Click Express Protect option to view and modify the required fields. To modify options for the current Express Protect, select View options that can be modified for current protection. a. Select a Copy Repository from the list of storage devices and stores. b. Select the optional settings such as Storage System Transport (Auto, FC, or ISCSI), StoreOnce Backup Transport (Auto, FC, or Ethernet), and Backup Type (Auto or Full Backup) options as per requirement. c. Specify the Number of Streams as either Auto or a number from the numeric list. 5. Click Catalyst Copy to view the details modify the required fields. To modify options for the current Catalyst Copy, select View options that can be modified for current protection to see the advanced options for Catalyst Copy that can be modified. a. Select a target Copy Repository from the list of storage devices and stores. b. Select FC or Ethernet to specify the StoreOnce Replication Transport mechanism. For Ethernet type StoreOnce Replication Transport, specify the Coeth IP address. 6. Click Cloud Copy and select View options that can be modified for current protection to see the advanced options for Cloud Copy that can be modified. a. Select the Storage System Transport as either FC or iSCSI. b. Specify the Number of Streams as either Auto or select from the numeric list. 7. To set up or modify the scheduler for the selected Protection job, select Start Date & Time and set the required date and time. Select Now to set the current date and time. 8. Click Ok. Editing protection for a SAP HANA database A platinum policy contains a Cloud Bank storage, a snapshot, Express Protect, and Catalyst Copy. A gold policy contains a snapshot, Express Protect, and Catalyst Copy. A silver policy contains a snapshot and an Express Protect. Whereas, a bronze policy contains only a snapshot. Based on the copy policy you have assigned for a database, the Edit Protection page lists the resources contained in it. Procedure 1. Click main menu and then SAP HANA > Databases > Actions > Edit Protection. Edit Protection dialog appears. 2. To search and select a Copy Policy, click Copy Policy . 3. Click Express Protect option in the details pane. 4. To modify options for the current protection, select View options that can be modified for current protection. Protecting Applications and Volumes 101 a. Select a target storage device from the list of storage devices and stores. b. Modify the advance settings like Storage System Transport, StoreOnce Replication Transport, and Backup Type options as per requirement. c. Specify the Number of Streams as either Auto or select from the numeric list. d. Specify the Express Protect name. e. Set the Verify Backup option to On or Off. f. Specify the number of hours, days, weeks, or months to auto delete the snapshot. g. Specify the number of hours, days, or weeks until the snapshot deletion needs to be prevented. 5. Click Catalyst Copy and select View options that can be modified for current protection to see the advanced options for Catalyst Copy that can be modified. a. Click Select to search and select a target from a list of storage devices and stores. 6. Click Cloud Copy and select View options that can be modified for current protection to see the advanced options for Cloud Copy that can be modified. a. Select the Storage System Transport option from FC or iSCSI. b. Specify the Number of streams as either Auto or select from the numeric list. 7. To set up or modify the scheduler for the selected Protection job, select Effective From and set the required date and time. Select Now to set the current date and time. 8. Click Ok. Removing protection Prerequisites Ensure that you have a copy policy assigned to the database. Procedure 1. Click main menu and then SAP HANA > Databases > Actions > Remove Protection. 2. Click Ok. Protecting an SAP database Protect Once option allows you to protect your database by applying an existing Copy policy or creating a new copy policy that contains a combination of a Snapshot, an Express Protect, and Catalyst Copy. Procedure 1. Click main menu and then SAP HANA > Databases > Actions > Protect Once. 2. Select a Protection Type from the following list: Protecting Applications and Volumes 102 • Use Existing Copy Policy • Snapshot • Express Protect • Catalyst Copy • Cloud Copy • Remote Snapshot 3. Click Ok. Using existing Copy Policy Use Existing Copy Policy option is used when you intend to use an existing Copy Policy to protect your database. Procedure 1. Click main menu and then SAP HANA > Databases > Actions > Protect Once. 2. Select Use Existing Copy Policy from the Protection Type menu. 3. Click Select to search and select an existing Copy Policy. The Copy Policy contents appear 4. To set up or modify the scheduler for the selected Protection job, select Start Date and Time and set the required date and time. Select Now to run the scheduler once. 5. Click Ok. Using Snapshot Procedure 1. Click main menu and then SAP HANA > Databases > Actions > Protect Once. 2. Select Snapshot from the Protection Type menu. 3. Enter a name for the Snapshot. 4. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. 5. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 6. To set up the scheduler for the snapshot, select Start Date & Time and set the required date and time. Select Now to run the scheduler once. 7. Click Ok. Using Express Protect Procedure 1. Click main menu and then SAP HANA > Databases > Actions > Protect Once. 2. Select Express Protect from the Protection Type menu. Protecting Applications and Volumes 103 Snapshots a. Enter a name for the Snapshot. b. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. c. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 3. For Express Protect with the source as Snapshot and Target as Auto (default option), perform the following: a. Select a Copy Repository. b. Select the Backup Type options as per requirement. c. Specify the Number of Streams as either Auto or select from the numeric list. d. [Optional] Specify the Express Protect name. e. Set the Verify Copy option to On or Off. f. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. g. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 4. To set up the scheduler for the Express Protect, select Start Date & Time and set the required date and time. Select Now to set the current date and time. 5. Click Ok. Using Catalyst Copy Procedure 1. Click main menu and then SAP HANA > Databases > Actions > Protect Once. 2. Select Catalyst Copy from the Protection Type menu. Snapshots a. Enter a name for the Snapshot. b. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. c. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 3. For Express Protect with the source as Snapshot and Target as Auto (default option), perform the following: NOTE: Ensure that a minimum of two HPE StoreOnce systems are registered with RMC. a. Select a Copy Repository. b. Select the Storage System Transport as either Auto, FC, or iSCSI. c. Select the StoreOnce Backup Transport as either Auto, FC, or Ethernet. d. Select the Backup Type options as per requirement. e. Specify the Number of Streams as either Auto or select from the numeric list. Protecting Applications and Volumes 104 f. Specify the Express Protect name. g. Set the Verify Copy option to On or Off. h. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. i. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 4. For Catalyst Copy with the source as Express Protect and Target as Auto (default option), perform the following: a. Select a Copy Repository. b. Select the StoreOnce Replication Transport as eitherFC, or Ethernet. Specify the Coeth IP for Ethernet. c. [Optional] Specify the Catalyst Copy name. d. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. e. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 5. To set up the scheduler for the Catalyst Copy, select Start Date & Time and set the required date and time. Select Now to run the scheduler once. 6. Click Ok. Using Cloud Copy Procedure 1. Click main menu and then SAP HANA > Databases > Actions > Protect Once. 2. Select Cloud Copy from the Protection Type menu. Select the target as Cloud Bank Storage or Cloud Volume Backup. • Cloud Bank Storage — Specify the details for Snapshot, Express protect, and Cloud Copy. • Cloud Volumes Backup — Specify the details for Snapshot and Cloud Copy. Snapshots a. Enter a name for the Snapshot. b. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. c. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 3. For Express Protect with the source as Snapshot and Target as Auto (default option), perform the following: a. Select a Copy Repository from the list of storage devices and stores. b. Select the Storage System Transport as either Auto, FC, or iSCSI. c. Select the StoreOnce Backup Transport as either Auto, FC, or Ethernet. d. Select the Backup Type options as per requirement. e. Specify the Number of Streams as either Auto or select from the numeric list. f. [Optional] Specify the Express Protect name. Protecting Applications and Volumes 105 g. Set the Verify Copy option to On or Off. h. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. i. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 4. For Cloud Copy with the source as Express Protect and Target as Auto (default option), perform the following: a. Select a Copy Repository from the list of storage devices and stores. b. Select the StoreOnce Replication Transport as either Auto, or Ethernet. Specify the Coeth IP if you select Ethernet in the StoreOnce Replication Transport. c. [Optional] Specify the Catalyst Copy name. d. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. e. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 5. For Cloud Volumes Backup with the source as Snapshot, perform the following: a. Click Snapshot and select View options that can be modified for current protection to set the time until the snapshot deletion has to be prevented. b. Select a target Copy Repositories from the list of storage devices and stores. c. Select the Storage System Transport as either FC, or iSCSI. d. Specify the Number of Streams from the numeric list. e. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. f. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 6. To set up the scheduler for the Cloud Copy, select Start Date & Time and set the required date and time. Select Now to run the scheduler once. 7. Click Ok. Using Remote Snapshot Procedure 1. Click main menu and then SAP HANA > Databases > Actions > Protect Once. 2. Select Remote Snapshot from the Protection Type menu. a. Select the Replication Mode as either Sync or Periodic. b. [Optional] Enter a name for the remote snapshot. c. [Optional] Specify the number of Hours, Days, Weeks, or Months to auto delete the snapshot. d. [Optional] Specify the number of Hours, Days, or Weeks until the snapshot deletion has to be prevented. 3. To set up the scheduler for the remote snapshot, select Effective From and set the required date and time. 4. Click Ok. Protecting Applications and Volumes 106 Viewing and Managing Copies The Copies tab in the Application resource or volumes screen has the following sections: • Job Status • Copies • Scheduled Jobs The Job Status option allows you to view the jobs that have run in the last 24 hours, 7 days, or 30 days. Based on the selection of the time frame from the Job Status menu, the type, and the corresponding number of Copy Type jobs that have failed out of the total number of attempted jobs is listed. The number listed for the Copy Type Jobs that have failed are clickable. You can click the listed number and navigate to the activity page to troubleshoot the problem behind the failure in creation of these jobs. Copies section lists the various Copy Types that are currently associated with a selected database. This section is generated based on the Protection Type that you select to protect your database from the Protect Once option from the Actions menu. The Protection Types option for the database that is available are Use Existing Copy Policy, Snapshot, Express Protect, Catalyst Copy, Cloud Copy, Peer Copy Snapshot, and Remote Snapshot. Each Copy Type has three columns associated with it and gives a clear indication of the status of the Copy Type creation status. For Related Volume Sets, the status is classified based on the Peer Copy syncing status. The underlined numeric values for each of these columns are clickable and they navigate to the relevant copies dialog. This dialog allows you to perform a wide variety of actions for a selected Copy Type. The number displayed in the Error column in the Copies section corresponds to the number of failed jobs listed in the Job Status section for a particular Copy Type. Moreover, the Refresh option allows you to manually refresh the list of Copies section. The Scheduled Jobs section lists the Copy Policy that is associated with a selected database or volume. The Peer Copy Policy associated with the Volume is also displayed. In general, it displays all the details that are contained in the assigned Copy Policy. It lists the different Copy Types, the execution frequency, the target device, the date and time stamps for the last execution, the last successful execution, and the next scheduled execution. The Copy Policy displayed is clickable and navigates you to the Copy Policy page where you can edit the required resources that are defined. In case, there is no Copy Policy assigned to a database, Add Protection link is displayed in the Scheduled Jobs section that navigates you to the Add Protection page to assign a Copy Policy. The Copies section lists the various Copy Types that are currently associated with a selected database. The actions on the Copy Types can be performed from the corresponding Copy Type window. For example, when you select a snapshot and click the underlined value, a window listing all the available snapshots appears. The window allows you to perform the following actions based on the selected Copy Type: Copy Type Actions Snapshot Protect, Edit, Delete, Verify, or Download Metadata. Express Protect Protect, Delete, Mount, Restore, or Edit. Catalyst Copy Protect, Delete, Edit, or Verify. Remote Snapshots [For RMC-O, RMC-E, and RMC-S] Protect, Edit, Delete, Mount, or Validate. Peer Copy Snapshot Edit, Attach, Detach, Refresh, or Delete. Related Volume Set Sync, Split, Cancel Sync, Resume Sync. Transaction Log Protect, Delete, Restore, or Edit. Cloud Copy Protect, Edit, Delete, Mount, or Restore. Clone Attach, Detach, Edit, Protect, or Remove. Viewing and Managing Copies 107 Copy Type Details Snapshot Name The name of the snapshot created for the selected database. State The current state of the snapshot. Point in Time The time when snapshot was created. Snapshot Type The type of snapshot. Online and Offline in RMC-O. Verified The verification status of the snapshot. Action The menu option that enables you to perform various operations on the selected snapshot. Express Protect Name The name of the Express Protect created for the selected database. State The current state of the Express Protect. Point in Time The time when the Express Protect was created. Snapshot Type The type of snapshot. Store The Catalyst Store name on HPE StoreOnce. Action The menu option that enables you to perform various operations on the selected Express Protect. Table Continued Viewing and Managing Copies 108 Copy Type Details Catalyst Copy Name The name of the snapshot created for the selected database. State The current state of the snapshot. Point in Time The time when the snapshot was created. Snapshot Type The type of snapshot. Store The Catalyst Store name on HPE StoreOnce. Action The menu option that enables you to perform various operations on the selected snapshot. Peer Copy Snapshot Name The name of the Peer Copy Snapshot created for the selected volume. Status The current state of the Peer Copy Snapshot. Point in Time The time when the Peer Copy Snapshot is created. Attach Status Displays whether the Peer Copy Snapshot is attached to a host. Storage System The target storage system where the Peer Copy Snapshot resides. Action The menu option that enables you to perform various operations on the selected Peer Copy Snapshot. Table Continued Viewing and Managing Copies 109 Copy Type Details Related Volume Set Volume Set The Volume Set to which the Peer Copy is associated. The expanded view displays the association between source Volumes and the target Volumes. Copy Repository The Copy Repository where the target Volumes reside. Role Displays whether the Volume Set role is primary or secondary. Status Displays whether the Peer Copy association status is synced, syncing, to be synced or error. Last Sync Time The time when the Peer Copy was last synced. Action The menu option that enables you to perform various operations on the selected Related Volume Set. Table Continued Viewing and Managing Copies 110 Copy Type Details Cloud Copy Name The name of the Cloud Copy. Status The status of the Cloud Copy. Point in Time The time when the Cloud Copy was created. Store The Catalyst Store name on HPE StoreOnce. Type The type of Cloud Copy — Cloud Bank Storage or Cloud Volume Backup. Clone DB Name The name of the database to be cloned. Server The address of the server that is configured for the database. Point in Time The time when the clone was taken. Source Copy Name The name of the source copy. Source Copy Type The type of the source copy. Clone Type The type of clone. State The mount status of the clone. Action The menu option that enables you to perform various operations on the selected clone. Volumes A Volume Set is a group of base volumes on which your application is hosted. To manage the Volume Sets use the Volumes (HPE Recovery Manager Central > Volumes) screen. Viewing and Managing Copies 111 Editing a Copy Procedure 1. In the Volumes screen, select the Volume Set that you want to edit. 2. Click the Copies tab. 3. In the Copy Type section, click the number adjacent to the Copy type that you want to edit. 4. Select the Copy that you want to edit. 5. From the Actions menu, click Edit. 6. Edit the required fields and then click OK. Attaching a Copy Attaching associates an Express Protect directly from HPE StoreOnce to a Host. This action is not allowed for Cloud Copies. Procedure 1. In the Volumes screen, select the Volume Set that you want to attach. 2. Click the Copies tab. 3. In the Copy Type section, click the number adjacent to the Copy type that you want to attach. 4. Select the Copy that you want to attach. 5. From the Actions menu, click Attach. 6. Select a Host or specify the iSCSI initiator name and then click Attach. After attaching an Express Protect or Catalyst Copy, you have to manually discover the iSCSI device. The following procedure is an example of a Attaching a Copy to Linux Host. 1. On the Linux host, install iscsi-initiator-utils. 2. Discover the iSCSI targets of RMC appliance using the following commands: iscsiadm -m discovery -t sendtargets -p <RMC IP> <RMC IP>:3260,-1 iqn.1986-03.com.hp:storage.rvm.catalyst.2614a8b6-4e64-4bfa-bd7258567d717d42 3. Connect to the discovered iSCSI targets in the RMC appliance: iscsiadm -m node -T iqn.1986-03.com.hp:storage.rvm.catalyst.2614a8b6-4e64-4bfa-bd72-58567d717d42 --login Logging in to [iface: default, target: iqn.1986-03.com.hp:storage.rvm.catalyst.2614a8b6-4e64-4bfa-bd72-58567d717d42, portal: <RMC IP>,3260] (multiple) Login to [iface: default, target: iqn.1986-03.com.hp:storage.rvm.catalyst.2614a8b6-4e64-4bfa-bd72-58567d717d42, portal: <RMC IP>,3260] successful. 4. Find the iSCSI device name: grep "Attached SCSI" /var/log/messages Apr 13 14:15:10 gw1 kernel: sd 17:0:0:0: [sdi] Attached SCSI disk Viewing and Managing Copies 112 Accessing the iSCSI disk sdi by using the mount -t <filesystem_format> /dev/sdi <mountpoint> command, enables you to read the data on Express Protect. NOTE: After an RMC reboot, the Express Protects attached to a host are lost. If required, you have to reattach the Express Protects. Detaching a Copy The Detach option detaches a Copy from all the hosts. This option is available only when the Copy is attached to at least one host. Procedure 1. In the Volumes screen, select a Volume Set. 2. Click the Copies tab. 3. In the Copy Type section, click the number adjacent to the Copy type that you want to detach. 4. Select the Copy that you want to detach. 5. From the Actions menu, click Detach. 6. At the prompt, click Yes, Detach. Deleting a Copy Prerequisites Ensure that the Copy is not attached to any hosts. Procedure 1. In the Volumes screen, select a Volume Set. 2. Click the Copies tab. 3. In the Copy Type section, click the number adjacent to the Copy type that you want to delete. 4. Select the Copy that you want to delete. 5. Click Delete. 6. (For Snapshots) To delete all the dependent snapshots, click Delete the dependent snapshots. 7. At the prompt, click Yes, Delete. Refreshing a snapshot or a Peer Copy snapshot Refresh removes snapshots (from RMC) that have expired on HPE storage arrays. Refresh is also used to update the health status and details of the attached snapshots. Procedure 1. In the Volumes screen, select a Volume Set. 2. Click the Copies tab. 3. In the Copy Type section, click the number for available snapshots or Peer Copy snapshots. Viewing and Managing Copies 113 4. Select the snapshot that you want to refresh. 5. From the Actions menu, click Refresh. 6. At the prompt, click OK. Verifying an Express Protect Verifying an Express Protect validates data integrity of Express Protect with the related Snapshot. Procedure 1. In the Volumes screen, select a Volume Set. 2. Click the Copies tab. 3. In the Copy Type section, click the number for available Express Protects. 4. Select the Express Protect that you want to verify 5. From the Actions menu, click Verify. 6. At the prompt, click Verify. Canceling an Express Protect Cancels only the active Express Protect operations. Procedure 1. In the Volumes screen, select a Volume Set. 2. Click the Copies tab. 3. In the Copy Type section, based on the Express Protect status, click the adjacent number. 4. Select the Express Protect that you want to pause. 5. From the Actions menu, click Pause. 6. At the prompt, click OK. Resuming an Express Protect Resumes a paused or failed Express Protect backup. For example, an Express Protect operation can be resumed when there are individual failed backups. The resume operation backs up only the failed backups in the set. Procedure 1. In the Volumes screen, select a Volume Set. 2. Click the Copies tab. 3. In the Copy Type section, based on the Express Protect status, click the adjacent number. 4. Select the Express Protect that you want to resume. Viewing and Managing Copies 114 5. From the Actions menu, click Resume. 6. At the prompt, click OK. Canceling a Catalyst Copy Cancels an active Catalyst Copy operation. Procedure 1. In the Volumes screen, select a Volume Set. 2. Click the Copies tab. 3. In the Copy Type section, based on the Catalyst Copy status, click the adjacent number. 4. Select the Catalyst Copy that you want to cancel. 5. From the Actions menu, click Cancel. 6. At the prompt, click Yes, cancel. Syncing a Peer Copy snapshot Syncing creates a snapshot for the source Volume Set and then syncs the snapshot to the target Volume Set. Procedure 1. In the source Volumes screen, select a Volume Set. 2. Click the Copies tab. 3. In the Copy Type section, click the number adjacent to Related Volume Sets. 4. Select the Related Volume Set associated with the Peer Copy snapshot that you want to sync. 5. From the Actions menu, click Sync. 6. At the prompt, click OK. Splitting the association between source Volume Sets and Target Volume Sets The split operation removes the association between source Volume Sets and Target Volume Sets. You can perform this operation from either source Volume Sets or Target Volume Sets. Procedure 1. In the source or target Volumes screen, select a Volume Set. 2. Click the Copies tab. 3. In the Copy Type section, click the number adjacent to Related Volume Sets. 4. Select the Related Volume Set for which you want to split the association. 5. From the Actions menu, click Split. 6. At the prompt, click OK. Viewing and Managing Copies 115 Canceling the Peer Copy syncing operation Cancels an active Peer Copy syncing operation. Procedure 1. In the Volumes screen, select a Volume Set. 2. Click the Copies tab. 3. In the Copy Type section, click the number adjacent to Related Volume Sets. 4. Select the Related Volume Set for which you want to cancel the syncing process. 5. From the Actions menu, click Cancel. 6. At the prompt, click Yes, cancel. Resuming the Peer Copy syncing operation Resumes a canceled or failed Peer Copy syncing operation. Procedure 1. In the Volumes screen, select a Volume Set. 2. Click the Copies tab. 3. In the Copy Type section, click the number adjacent to Related Volume Sets. 4. Select the Related Volume Set for which you want to resume the syncing process. 5. From the Actions menu, click resume. 6. At the prompt, click Yes, cancel. RMC-E Validating a snapshot Prerequisites • Ensure that you have assigned a protection policy to your database. • Ensure that the snapshot is in an available state. Procedure 1. Click the main menu and then click Exchange Databases > + Database. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Snapshot. Snapshots window appears. The snapshots window lists all the snapshots with their name, the status, and the time when the snapshot was taken. 4. Select Action > Validate from the Snapshots window. 5. Perform the following as per your requirement in the Validate Snapshot dialog: Viewing and Managing Copies 116 a. Click Select to search and specify the Target Mount Server details. b. Select Validate Log Only to validate the mounted snapshot. 6. Click Ok. Editing a snapshot Prerequisites Ensure that the snapshot is in an available state. Procedure 1. Click the main menu and then click Exchange Databases > + Database. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Snapshot. Snapshots window appears. The snapshots window lists all the snapshots with their name, current status, and the time when the snapshot was taken. 4. Select Action > Edit from the Snapshots window. 5. Perform the following as per your requirement in the Edit Snapshot dialog: a. Modify the Snapshot Name field. b. Provide a short description of the snapshot. c. Modify the Auto Delete After and Prevent Deletion Until fields. NOTE: The set times cannot be reduced or removed. 6. Click Ok. Mounting a snapshot Prerequisites Ensure that the snapshot is in an available state. Procedure 1. Click the main menu and then click Exchange Databases > + Database. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Snapshot. Snapshots window appears. The snapshots window lists all the snapshots with their name, the current status, and the time when the snapshot was taken. 4. Select Action > Mount from the Snapshots window. 5. Perform the following as per your requirement in the Mount Snapshot dialog: Viewing and Managing Copies 117 a. Click Select to search and specify the Target Mount Server details. b. Click Clean Database to clean the database before performing a mailbox recovery. This operation may take a while to complete. 6. Click Ok. Unmounting a snapshot Prerequisites Ensure that the snapshot is mounted. Procedure 1. Click the main menu and then click Exchange Databases > + Database. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select a snapshot and click the numeric value in to unmount a snapshot. Snapshot Sets window appears. The snapshots window lists all the snapshots with their name, the current status, and the time when the snapshot was taken. 4. Select Action > Unmount from the Unmount Snapshot window. 5. Click Ok to unmount the snapshot. Removing a snapshot Prerequisites • Ensure that you have assigned a protection policy to your database. • Ensure that the snapshot is in an available state. Procedure 1. Click the main menu and then click Exchange Databases > + Database. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Snapshot. Snapshots window appears. The snapshots window lists all the snapshots with their name, the status, and the time when the snapshot was taken. 4. Select a snapshot and click Action > Remove from the Snapshots window. Remove dialog appears. 5. Click Ok. Viewing and Managing Copies 118 Mounting a backup Prerequisites • Ensure that the backup you intend to mount is in an available state. • Ensure that the HPE RMC Rest Server service is running on the target Exchange Server. Procedure 1. Click the main menu and then click Exchange Databases > + Database. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Express Protect. Express Protects window appears. The Express Protects window lists all the snapshots with their name, status, and the time when the Express Protects was taken. 4. Select a specific backup that you intend to mount from the corresponding window that lists the backup. 5. Select Action > Mount from the Express Protects window. 6. Perform the following as per your requirement in the Mount Backup dialog: a. Click Select to search and specify the Target Mount Server details. b. Click Clean Database to clean the database before performing a mailbox recovery. This operation may take a while to complete. 7. Click Ok. Editing a backup Prerequisites • Ensure that you have assigned a protection policy to your database. • Ensure that the backups1 are in an available state. Procedure 1. Click the main menu and then click Exchange Databases. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for the corresponding back up. The relative backup window appears. The backup window lists all the corresponding back ups with their name, status, and the time when the backups were taken. 4. Select a specific backup from the corresponding window that lists the backup. 5. Select Action > Edit from the backup window. 6. Perform the following as per your requirement in the Edit dialog: 1 Express Protect, Catalyst Copy, and Cloud Copy (wherever applicable) Viewing and Managing Copies 119 a. Modify the Name of the backup. b. Provide a short description of the backup. 7. Click Ok. Removing a backup Prerequisites Ensure that the backup is in an available state. Procedure 1. Click the main menu and then click Exchange Databases > + Database. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for the backup type. The backup window appears. The backup window lists all the corresponding backups with their name, status, and the time when the backups were taken. 4. Select Action > Remove from the window. 5. To remove the selected backup, click Ok in the Remove dialog. RMC-O Verifying an Express Protect Prerequisites Ensure that the Express Protect is in an available state. Procedure 1. Click the main menu and then click Oracle Databases. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Express Protect in available state. Express Protects window appears. The Express Protects window lists all the Express Protects with their current state, the time when the copy was taken, type, verification status and the store where the copy exists. 4. Select Action > Verify from the verify window. 5. Click Verify to perform a volume level verification. Editing a backup Prerequisites Ensure that the backups only2 are in an available state. 2 Express Protect, Catalyst Copy, Cloud Copy and Clone (wherever applicable) Viewing and Managing Copies 120 Procedure 1. Click the main menu and then click Oracle Databases. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for the corresponding back up. The relative backup window appears. The backup window lists all the corresponding back ups with their name, status, and the time when the backups were taken. 4. Select a specific backup from the corresponding window that lists the backup. 5. Select Action > Edit from the backup window. 6. Perform the following as per your requirement in the Edit dialog: a. Modify the Name of the backup. b. Provide a short description of the backup. c. Modify the Auto Delete After and Prevent Deletion Until options. 7. Click Ok. Unmounting a Snapshot Prerequisites • Ensure that you have assigned a protection policy to your database. • Ensure that the snapshot is in an available state. • Ensure that a snapshot is already mounted. Procedure 1. Click the main menu and then click Oracle Databases. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Clone. Clone window appears. The clone window lists all the clones with the database name, server IP address, the time when the clone was taken, source copy name and type, clone type, and its state. 4. Select a clone and then click Action > Unmount from the Clone window to unmount the mounted snapshots. 5. Select or clear Force Unmount option to forcefully remove the partially mounted snapshots or the cloned database that is not functioning properly. 6. Select or clear Retain Read Write Snapshot. 7. Click Ok. Viewing and Managing Copies 121 Removing a clone Prerequisites • Ensure that the snapshot is in an available state. • Ensure that a snapshot is already cloned to a server. Procedure 1. Click the main menu and then click Oracle Databases. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Clone. Clone window appears. The clone window lists all the clones with the database name, server IP address, the time when the clone was taken, source copy name and type, clone type, and its state. 4. To remove a clone database, select a clone and then click Action > Remove clone from the Clone window. 5. Select or clear Force Remove option to forcefully remove the cloned database that is not functioning properly. Downloading Metadata Prerequisites Ensure that the snapshot is in an available state. Procedure 1. Click the main menu and then click Oracle Databases. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, click the underlined value for Snapshot. Snapshots window appears. The snapshots window lists all the snapshots with their current State, the time when the snapshot was taken, type, and verification status. 4. Select Action > Download Metadata from the Snapshots window. 5. Perform the following as per your requirement in the Restore metadata dialog: a. Click Select to search and select the desired Oracle server. b. Modify the Meta Data File Path. c. Set the Restore as either Full or Oracle Files. 6. Click Ok. Verifying a snapshot Prerequisites Ensure that the snapshot is in an available state. Viewing and Managing Copies 122 Procedure 1. Click the main menu and then click Oracle Databases. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Snapshot. Snapshots window appears. The snapshots window lists all the snapshots with their current State, the time when the snapshot was taken, type, and verification status. 4. Select Action > Verify from the Snapshots window. 5. Perform the following as per your requirement in the Verify Snapshot dialog: a. Click Select to search and select a backup server. b. Modify the Clone Database Home path. 6. Click Ok. Editing a snapshot Prerequisites • Ensure that you have assigned a protection policy to your database. • Ensure that the snapshot is in an available state. Procedure 1. Click the main menu and then click Oracle Databases. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Snapshot. Snapshots window appears. The snapshots window lists all the snapshots with their current State, the time when the snapshot was taken, type, and verification status. 4. Select Action > Edit from the Snapshots window. 5. Perform the following as per your requirement in the Edit Snapshot dialog: a. Modify the Snapshot Name field. b. Provide a short description of the snapshot. c. Modify the Auto Delete After and Prevent Deletion Until fields. NOTE: The set times cannot be reduced or removed. 6. Click Ok. Viewing and Managing Copies 123 Editing an Express Protect Prerequisites • Ensure that you have assigned a protection policy to your database. • Ensure that the snapshot is in an available state. Procedure 1. Click the main menu and then click Oracle Databases > + Database. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Express Protect. Edit window appears. The Express Protects window lists all the snapshots with their current State, the time when the snapshot was taken, type, and verification status. 4. Select Action > Edit from the Express Protects window. 5. Perform the following as per your requirement in the Edit dialog: a. Modify the Name field. b. Provide a short description for the Express Protect. c. Modify the Auto Delete After and Prevent Deletion Until fields. NOTE: The set times cannot be reduced or removed. 6. Click Ok. RMC-S Editing MS SQL copies Procedure 1. Click HPE Recovery Manager Central > Microsoft SQL. 2. Click the Instances tab or the Databases tab. 3. Click the Copies tab. 4. In the Copy Type section, select and click the underlined value for the copy that you want to edit. 5. Select the copy that you want to edit. 6. From the Actions menu, click Edit. 7. Edit the required fields and then click OK. Viewing and Managing Copies 124 Deleting MS SQL copies Procedure 1. Click HPE Recovery Manager Central > Microsoft SQL. 2. Click the Instances tab or the Databases tab. 3. Click the Copies tab. 4. In the Copy Type section, select and click the underlined value for the copy that you want to delete. 5. Select the copy that you want to delete. 6. Click Delete. 7. At the prompt, click OK. Resuming an Express Protect Procedure 1. Click HPE Recovery Manager Central > Microsoft SQL. 2. Click the Instances tab or the Databases tab. NOTE: 3. Click the Copies tab. 4. In the Copy Type section, select the underlined number for canceled Copies. 5. Select the Express Protect that you want to resume. 6. From the Actions menu, click Resume. 7. At the prompt, click OK. Canceling MS SQL copies Procedure 1. Click HPE Recovery Manager Central > Microsoft SQL. 2. Click the Instances tab or the Databases tab. 3. Click the Copies tab. 4. In the Copy Type section, select the underlined number for active Copies. 5. Select the Express Protect that you want to cancel. 6. From the Actions menu, click Cancel. 7. At the prompt, click OK. Viewing and Managing Copies 125 Verifying a database-level snapshot Procedure 1. Click HPE Recovery Manager Central > Microsoft SQL. 2. Click the Databases tab. 3. Click the Copies tab. 4. In the Copy Type section, select and click the underlined value for the available snapshot. 5. Select the snapshot that you want to verify. 6. From the Actions menu, click Verify. 7. Specify the instance and mountpoint details 8. Click OK. RMC-SH Editing a backup Prerequisites • Ensure that you have assigned a protection policy to your database. • Ensure that the backups3 are in an available state. Procedure 1. Click the main menu and then click SAP HANA > + Database. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for the corresponding back up. The relative backup window appears. The backup window lists all the corresponding back ups with their name, status, and the time when the backups were taken. 4. Select a specific backup from the corresponding window that lists the backup. 5. Select Action > Edit from the backup window. 6. Perform the following as per your requirement in the Edit dialog: a. Modify the Name of the backup. b. Provide a short description of the backup. c. [Wherever applicable] Specify the Auto Delete After and Prevent Deletion Until time in Hours or Days. 7. Click Ok. 3 Express Protect, Remote Copy, Catalyst Copy, Cloud Copy and Clone (wherever applicable) Viewing and Managing Copies 126 Editing a snapshot Prerequisites • Ensure that you have assigned a protection policy to your database. • Ensure that the snapshot is in an available state. Procedure 1. Click the main menu and then click SAP HANA > + Database. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Snapshot. Snapshots window appears. The snapshots window lists all the snapshots with their current State, the time when the snapshot was taken, type, and verification status. 4. Select Action > Edit from the Snapshots window. 5. Perform the following as per your requirement in the Edit Snapshot dialog: a. Modify the Snapshot Name field. b. Provide a short description of the snapshot. c. Modify the Auto Delete After and Prevent Deletion Until fields. NOTE: The set times cannot be reduced or removed. 6. Click Ok. Viewing and Managing Copies 127 Recovering and Cloning Copies Volumes Cloning or restoring a Volume Set Use the Actions menu in Volumes screen (HPE Recovery Manager Central > Volumes). Prerequisites Before restoring the unrestricted HPE Nimble Storage volumes, detach the Volume Sets. Procedure 1. Click HPE Recovery Manager Central > Volumes. 2. In the Volumes screen, click the Volume Set that you want to clone or restore. 3. From the Actions menu, click Clone / Restore. 4. Select one of the following options and then click Next: • Virtual Clone from a new Snapshot — A new snapshot is created and is then cloned. • Virtual Clone from an existing Copy — An existing snapshot is cloned. • Physical Clone — Data is restored to a new volume. • Restore — Data is restored to the parent volume. The selected Snapshot or backup Copy overwrites the existing data. 5. Perform the corresponding steps based on your selection in the Clone/Restore screen. NOTE: If a snapshot has the expiry set and is used as candidate for creating clones, the created clone does not inherit the expiry set on the parent snapshot. The parent snapshot exists as long as the clone is present. 6. For Virtual Clone from a new Snapshot, specify a name for the Snapshot and then click Clone. 7. For Virtual Clone from an existing Copy: a. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. b. Select a copy from the list of available copies for the selected date in the Copies for clone. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Copies for clone list. c. Select the restore type: • Auto: RMC looks for a reference Snapshot. If the latest reference Snapshot is available, an express restore is performed. Else, a full restore is performed. • Full: Copies all the data from a backup Copy to a volume or a Snapshot. • Express: The express restore uses a reference Snapshot from a previous backup to determine the target and overwrites only the blocks that are different. d. Click Clone. 8. For Physical Clone: Recovering and Cloning Copies 128 a. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. b. Select a copy from the list of available copies for the selected date in the Copies for clone section. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Copies for clone list. c. For backup Copies, click Select and then select a Volume to which you want to restore data. d. Click Clone. 9. For Restore: a. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. b. Select a copy from the list of available copies for the selected date in the Copies for clone section and then click Next. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Copies for clone list. c. Select the Volumes from which you want to restore data and then click Restore. RMC-E Restoring an Exchange database Procedure 1. Click the main menu and then click Exchange Databases. 2. On the master pane of the Databases screen, select an Exchange database. 3. Select Restore from the Copies tab. Restore window appears. 4. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. List of available copies for the selected date appears. 5. Select a copy from the populated list in the Copies for restore. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Copies for clone list. The Current Time, Recent Copy, and Oldest Copy data change as per the copy selection from the available copies list. 6. Click Next to navigate to the Restore page. 7. The restore options depend on the copy type. For more details about the restore options available, see Restoring a snapshot, Restoring a backup, and Restoring a Cloud Copy. 8. Click Restore. Restoring a Cloud Copy Prerequisites • Ensure that you have assigned a platinum protection policy or a custom policy to your database. • Ensure that the cloud copy is in an available state. Recovering and Cloning Copies 129 Procedure 1. Click the main menu and then click Exchange Databases > + Database. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Cloud Copy. Cloud Copy window appears. The Cloud Copy window lists all the snapshots with their name, status, and the time when the backup was taken. 4. Select Action > Restore from the Cloud Copy window. 5. Perform the following as per your selection in the Cloud Copy dialog: a. Select a Destination from Parent Volume, Another volume, or New Snapshot Set. b. For Destination type of Another volume, select and specify the Storage System name. Click Select Volumes option to search and specify a volume. c. For Destination type of New Snapshot Set, select the Restore Type as either Full or Express. d. For Restore Type of Express, select the Reference Snapshot Set as either Auto or Manual. For Manual, click Select to search and specify the reference snapshot set. 6. Click Restore to restore. NOTE: • A volume type restore rolls back the parent volume with data present in the selected snapshot. • The database is automatically unmounted prior to a restore process and then remounted later. • A volume type restore to Another Volume rolls back the selected volume with data of the selected backup. • A volume type restore to a New Snapshot Set creates a snapshot set to the existing parent volume and restores the data in the newly created snapshot. Restoring a backup Prerequisites Ensure that the express protect is in an available state. Procedure 1. Click the main menu and then click Exchange Databases > + Database. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Express Protect. Express Protects window appears. The Express Protects window lists all the snapshots with their name, status, and the time when the Express Protects was taken. 4. Select Action > Restore from the Express Protects window. 5. Perform the following as per your selection in the Express Protects dialog: a. For Volume type restore, perform the following: Recovering and Cloning Copies 130 I. Select a Destination from Parent Volume, Another volume, or New Snapshot Set. II. For Destination type of Another volume, select and specify the Storage System name. Click Select Volumes option to search and specify a volume. III. For Destination type of New Snapshot Set, select the Restore Type as either Auto, Full or Express. IV. For Restore Type of Express, select the Reference Snapshot Set as either Auto or Manual. For Manual, click Select to search and specify the reference snapshot set. b. For Mailbox type restore, perform the following: c. Click Add Mailbox Restore to initiate mailbox restore process. d. In the Add Mailbox Restore dialog, provide the following details: I. Provide a Restore Name. II. Click Select to search and specify a mailbox that you intend to restore. III. Select the Restore Mode as either Maibox Folders or Mailbox. IV. If you select Maibox Folders in the Restore Mode option, click Select Folders to search and select a mailbox folder. V. Select Find to search the email address that is associated with the mailbox. VI. Click Ok to add the mailbox with the details specified for restore. 6. Click Yes, Restore to restore. NOTE: • A volume type restore rolls back the parent volume with data present in the selected snapshot. • The database is automatically unmounted prior to a restore process and then remounted later. • A volume type restore to Another Volume rolls back the selected volume with data of the selected backup. • A volume type restore to a New Snapshot Set creates a snapshot set to the existing parent volume and restores the data in the newly created snapshot. Restoring a snapshot Prerequisites • Ensure that the snapshot is in an available state. • Ensure that the snapshot is mounted (for a mailbox restore) Procedure 1. Click the main menu and then click Exchange Databases > + Database. 2. On the master pane of the Databases screen, select a database. Recovering and Cloning Copies 131 3. On the Copies tab, select a snapshot and click the underlined value for snapshots. Click the numeric value in restore a mailbox. to Snapshot Sets window appears. The snapshots window lists all the snapshots with their name, the current status, and the time when the snapshot was taken. 4. Select Action > Restore from the Restore Snapshot window. 5. Perform the following as per your selection in the Restore Snapshot dialog: a. For Volume type restore, perform the following: I. Click Select to search and specify a server that is used for restore. II. Select the Restore Mode as either Point in Time or Point of Failure. III. For Restore Mode as Point in Time, specify the Restore Level as either Full or DB only. IV. For Restore Mode as Point of Failure, specify the Log File Path as required. b. For Mailbox type restore, perform the following: c. Click Add Mailbox Restore to initiate mailbox restore process. d. In the Add Mailbox Restore dialog, provide the following details: I. Provide a Restore Name. II. Click Select to search and specify a mailbox that you intend to restore. III. Select the Restore Mode as either Maibox Folders or Mailbox. IV. If you select Maibox Folders in the Restore Mode option, click Select Folders to search and select a mailbox folder. V. Select Find to search the email address that is associated with the mailbox. VI. Click Ok to add the mailbox with the details specified for restore. 6. Click Yes, Restore to restore. NOTE: • A volume type restore rolls back the parent volume with data present in the selected snapshot. • The database is automatically unmounted prior to a restore process and then remounted later. • A volume type restore to Another Volume rolls back the selected volume with data of the selected backup. • A volume type restore to a New Snapshot Set creates a snapshot set to the existing parent volume and restores the data in the newly created snapshot. Recovering and Cloning Copies 132 RMC-O Cloning an Oracle database Prerequisites Ensure that you have an Oracle server configured. Procedure 1. Click the main menu and then click Oracle Databases. 2. On the master pane of the Databases screen, select a database. 3. Select Clone/Restore from the Actions menu or from the Copies tab. Clone/Restore window appears. 4. Select a type of clone from the following from the Clone/Restore page: • Virtual Clone from a new snapshot • Virtual Clone from existing snapshot or backup • Physical Clone • Instant Clone (ERT) 5. Perform the corresponding steps based on the selection on the Clone/Restore page. 6. Perform the following for Virtual Clone from a new snapshot option: a. To assign a backup server, click Select Servers to search and select a backup server. b. Specify the following in the Snapshot section: I. [Optional] Name of the snapshot. II. Type of the snapshot from Online (Hot), Archive Logs, or Datafile. III. [Optional] Specify the number of Hours or Days to auto delete the snapshot. IV. [Optional] Specify the number of Hours or Days until the snapshot deletion has to be prevented. V. Select or clear Truncate Log for online snapshot type. c. Specify the Mount Point location (optional) in the Mount section. d. Select one the following in the Clone section: I. Cloned Database ID. II. Path of the cloned database home location. III. Redo destination. IV. USE LARGE PAGES. e. Click Clone to proceed with database cloning or click Back to navigate to the Clone/Restore page. 7. Perform the following for Virtual Clone from existing snapshot or backup option: Recovering and Cloning Copies 133 a. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. b. Select a copy from the list of available copies for the selected date in the Copies for clone section and click Next. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Copies for clone list. I. For Copy Policy that contains a Snapshot or an Express Protect or a Catalyst Copy: • Click Volume Clone / Mount or Database Clone to specify the Clone Level as either Mount the snapshot or Clone the database. • Click Select Servers to search and specify an Oracle server. • Specify the Mount Point location (optional) in the Mount section. • Specify the following in the Clone section: â—¦ The cloned database ID. â—¦ The path of the cloned database home location. â—¦ Redo destination. â—¦ USE LARGE PAGES. NOTE: Express Restore is performed using this option where Express Protect is cloned. c. Click Clone to proceed with database cloning or click Back to navigate to the Clone/Restore page. 8. Perform the following for Physical Clone option: a. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. b. Select a copy from the list of available copies for the selected date in the Copies for clone section and click Next. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Copies for clone list. c. Perform the following in the Physical Clone section: I. Click Select to search and specify name for the storage system. II. Specify the Meta Data File Path location. d. Select a Storage System name from the list. e. Perform the following in the Volume(s) section: I. Click Select Data Volumes to search and specify a data volume for the storage system. II. Click Select Arch Volumes to search and specify an arch volume for the storage system. III. Click Clone. 9. Perform the following for Instant Clone (ERT) section: a. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. b. Select a copy from the list of available copies for the selected date in the Copies for clone section and click Next. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Copies for clone list. Recovering and Cloning Copies 134 c. To assign an Oracle server, click Select to search and select an Oracle server. d. Specify the Mount Point location (optional) in the Mount section. e. Specify a Cloned Database ID, Cloned Database Home directory path, and Redo Destination. f. Click USE LARGE PAGES. g. Click Clone. Remounting a cloned snapshot Prerequisites • Ensure that the snapshot is in an available state. • Ensure that a cloned snapshot exists that has previously been mounted and is currently unmounted due to a server reboot. Procedure 1. Click the main menu and then click Oracle Databases. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Clone. Clone window appears. The clone window lists all the clones with the database name, server IP address, the time when the clone was taken, source copy name and type, clone type, and its state. 4. Select Action > Remount from the Clone window. 5. Click Ok to remount the clone. Removing a cloned database Prerequisites • Ensure that the snapshot is in an available state. • Ensure that a clone is already attached. Procedure 1. Click the main menu and then click Oracle Databases. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Clone. Clone window appears. The clone window lists all the clones with the database name, server IP address, the time when the clone was taken, source copy name and type, clone type, and its state. 4. Select Action > Remove Cloned Database from the Clone window to remove the cloned database. 5. Select or clear Force Remove option to forcefully remove the cloned database. 6. Click Ok. Recovering and Cloning Copies 135 Restoring copies Prerequisites Perform the following steps before restoring a read/only snapshot: • Ensure that you stop all the Remote Copy Groups before initiating a snapshot restore operation. • Ensure that you dismount the database ASM disk groups from one or more cluster nodes. Also, ensure that you drop the disk groups from one of the cluster nodes servers if ASM is in use when you do not select the Automate Restore option. • (Not applicable for Automate Restore option) Ensure that you unmount all the database file systems from the database server if they are on file systems. For example, # umount /oradata • (Not applicable for Automate Restore option) Ensure to export the database volume groups from the database server if volume groups are in use. For example, for Linux logical volume groups: # lvchange -an /dev/rh6lvm-data/lvol0 # lvchange -an /dev/rh6lvm-data/lvol1 # vgexport rh6lvm-datavg • Ensure that you remove the volumes exported as physical Raw Device Mapping from Oracle server for databases with volumes exported as physical RDM. Procedure 1. Click the main menu and then click Oracle Databases. 2. On the master pane of the Databases screen, select a database. 3. Select Clone/Restore from the Actions menu or from the Copies tab. Clone/Restore window appears. 4. Select Restore from the Clone/Restore page. a. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. b. Select a copy from the list of available copies for the selected date in the Copies for clone section and click Next. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Copies for clone list. c. Based on the selected copy type, perform the following: I. For recovery from a snapshot: • Specify the Meta Data File Path and click Ok. • Select or clear Automate Restore Database. The Automate Database Recovery option is unavailable if you clear the Automate Restore Database option. For more information, see the HPE Recovery Manager Central Concepts Guide. • Select Yes or No for the Automate Database Recovery option. Perform the following if you select Yes for the Automate Database Recovery option: Recovering and Cloning Copies 136 II. â—¦ Select the Type as either Recover to this PIT or Recover to another PIT. â—¦ Select or clear Restore controlfile. â—¦ [Only for Recover to another PIT option] - Select the date range from the calender. You can also set the Hour, Minute, and Second and click Done. For a database that contains Express Protect, Catalyst Copy or Cloud Copy: NOTE: Perform the steps mentioned in the prerequisites, if Automate Restore Database is cleared. • Click Select to search and specify an application server. • Specify the Meta Data File Path. • Select or clear Automate Restore Database. The Automate Database Recovery option is unavailable if you clear the Automate Restore Database option. • Select Yes or No for the Automate Database Recovery option. Perform the following if you select Yes for the Automate Database Recovery option: â—¦ Select the Type as either Recover to this PIT or Recover to another PIT. â—¦ Select or clear Restore controlfile. â—¦ [Only for Recover to another PIT option] - Select the date range from the calender. You can also set the Hour, Minute, and Second and click Done. 5. Click Ok in the Restore dialog. Performing post restore operation The steps 1 to 6 in this procedure are applicable only for LVM and File System environments. However, the procedure is not applicable when you select the Automated restore option. Procedure 1. Add the volumes exported as physical Raw Device Mapping to Oracle server for databases with volumes exported as physical RDM. 2. Perform a rescan of the devices on the database server. You may use rescan-scsi-bus.sh from sg3_utils package or use appropriate iscsiadm commands, for iSCSI connections. 3. Post rescan operation, execute oracleasm scandisks if you use ASMLib. You may validate the ASM disks with the command oracleasm querydisk <diskname>. 4. From the database server, activate logical volumes and import volume groups: # # # # vgscan vgimport rh6lvm-datavg lvchange -ay /dev/rh6lvm-datavg/lvol0 lvchange -ay /dev/rh6lvm-datavg/lvol1 Recovering and Cloning Copies 137 5. From the database server, perform file system check, and then mount the database file systems if database files are on file systems. # fsck -y /dev/maper/mpathc # mount /dev/mapper/mpathc /oradata 6. From the database server, mount database ASM disk groups if ASM is in use. For example, SQL>alter diskgroup <diskgroup> mount; 7. Extract the CONTROLFILE from metadata file path specified in RMC-O Restore user interface dialog using the following commands: # cd <meta data file path> # tar -xvf <sid>.gz # gunzip controlfile.gz Change the ownership of the extracted CONTROLFILE to oracle user and oinstall group. 8. Connect to RMAN (rman target /) to restore the binary CONTROLFILE and run the recover database command as follows: RMAN> startup nomount; RMAN> restore controlfile from '<metadata file path>/controlfile'; RMAN> exit NOTE: Restoring CONTROLFILE is not mandatory if the new form of your database has not changed. 9. Connect to the SQL prompt to run the following set of commands: SQL> SQL> SQL> SQL> alter database mount; recover database using backup controlfile until cancel; alter database open resetlogs; exit UNTIL TIME or UNTIL SCN or UNTIL SEQUENCE clauses in the commands described in this procedure for point-in-time recovery. When prompted for archive logs, AUTO or CANCEL option can be used, based on your recovery needs. If there is any mismatch in the path of prompted archive logs, specify the paths to the actual archive logs explicitly in the prompt so that recovery succeeds. Once the recovery completes, a new form of your database is started. Restoring a snapshot from clone Prerequisites Perform the following steps for LVM, ASM, and file system setups before restoring a snapshot from a clone: • Ensure that you stop all the Remote copy groups before initiating a snapshot restore operation. • Ensure that you dismount the database ASM disk groups from one or more cluster nodes. Also, ensure that you drop the disk groups from one of the cluster nodes servers if ASM is in use when you do not select the Automate Restore option. • Ensure to export the database volume groups from the database server if volume groups are in use. For example, for Linux logical volume groups: # lvchange -an /dev/rh6lvm-data/lvol0 # lvchange -an /dev/rh6lvm-data/lvol1 # vgexport rh6lvm-datavg Recovering and Cloning Copies 138 • Ensure that you remove the volumes exported as physical Raw Device Mapping from Oracle server for databases with volumes exported as physical RDM. • Ensure that all the prerequisites listed are performed for the cloned database except for dropping the diskgroups for ASM. On the cloned database, all the diskgroups must be only dismounted and not dropped. Procedure 1. Click the main menu and then click Oracle Databases > + Database. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Clone. Clone window appears. The clone window lists all the clones with the database name, server IP address, the time when the clone was taken, source copy name and type, clone type, and its state. 4. Select a clone and then click Action > Restore from the Clone window to restore the snapshot for clone. 5. Specify the Meta Data File Path. 6. Select or clear Automate Restore Database. 7. NOTE: Perform the steps mentioned in the prerequisites, if Automate Restore Database is cleared. The Automate Database Recovery option is unavailable if you clear the Automate Restore Database option. 8. Select Yes or No for the Automate Database Recovery option. Perform the following if you select Yes for the Automate Database Recovery option: • Select the Type as either Recover to this PIT or Recover to another PIT. • Select or clear Restore controlfile. • [Only for Recover to another PIT option] - Select the date range from the calender. You can also set the Hour, Minute, and Second and click Done. 9. Click Ok. Performing post restore operation Procedure 1. Add the volumes exported as physical Raw Device Mapping to Oracle server for databases with volumes exported as physical RDM. 2. Perform a rescan of the devices on the database server. You may use rescan-scsi-bus.sh from sg3_utils package or use appropriate iscsiadm commands, for iSCSI connections. 3. Post rescan operation, execute oracleasm scandisks if you use ASMLib. You may validate the ASM disks with the command oracleasm querydisk <diskname>. 4. From the database server, activate logical volumes and import volume groups: # # # # vgscan vgimport rh6lvm-datavg lvchange -ay /dev/rh6lvm-datavg/lvol0 lvchange -ay /dev/rh6lvm-datavg/lvol1 Recovering and Cloning Copies 139 5. From the database server, perform file system check, and then mount the database file systems if database files are on file systems. # fsck -y /dev/maper/mpathc # mount /dev/mapper/mpathc /oradata 6. From the database server, mount database ASM disk groups if ASM is in use. For example, SQL>alter diskgroup <disk_group> mount; 7. Perform one of the following: • Extract the CONTROLFILE from metadata file path specified in RMC-O Restore user interface dialog using the following commands: # cd <meta data file path> # tar -xvf <sid>.gz # gunzip controlfile.gz Change the ownership of the extracted CONTROLFILE to oracle user and oinstall group. NOTE: For read/write snapshots in cloned status, use the control file copied from the backup server, as mentioned in the prerequisites of the Pre-Restore steps. • â—¦ If the read/write snapshot restored is a cloned database, copy the CONTROLFILE from the cloned database (backup server) manually to the database server before attempting a database recovery. For example, for database on file systems: SQL> show parameter control_files; NAME TYPE VALUE ------------------------------------ ----------- -----------------------------control_files string /rcdb/redo/RCDB/controlfile/controlfile1.ctl > scp /rcdb/redo/RCDB/controlfile/controlfile1.ctl root@production:/tmp • â—¦ If the read/write snapshot restored was cloned before (currently in available or mounted status), then create a clone database of this read/write snapshot, with ASCII control file and clear the Automatically Recover the Clone Database option and then copy the control file to the database server. â—¦ If the read/write snapshot restored is in mounted or available and not cloned to a database, use the snapshot metadata provided by RMC-O. If the read/write snapshot is restored from an Express Protect, extract the CONTROLFILE from metadata file path specified in RMC-O Restore user interface dialog using the following commands: # cd <meta data file path> # tar -xvf <sid>_rw.gz # gunzip controlfile.gz Change the ownership of the extracted CONTROLFILE to oracle user and oinstall group. 8. Connect to RMAN (rman target /) to restore the binary CONTROLFILE and run the recover database command as follows: RMAN> RMAN> RMAN> RMAN> startup nomount restore controlfile from '<metadata file path>/controlfile'; shutdown immediate exit Recovering and Cloning Copies 140 NOTE: Restoring CONTROLFILE is not mandatory if the new form of your database has not changed. 9. Connect to the SQL prompt to run the following set of commands: SQL> SQL> SQL> SQL> startup mount recover database using backup controlfile until cancel; alter database open resetlogs; exit UNTIL TIME or UNTIL SCN or UNTIL SEQUENCE clauses in the commands described in this procedure for point-in-time recovery. When prompted for archive logs, AUTO or CANCEL option can be used, based on your recovery needs. If there is any mismatch in the path of prompted archive logs, specify the paths to the actual archive logs explicitly in the prompt so that recovery succeeds. Once the recovery completes, a new form of your database is started. NOTE: If the read/write snapshot cloned database on the backup server is recovered, perform Post-Restore steps on the backup server. RMC-S Restoring an MS SQL instance Prerequisites To add databases to Availability Group, ensure that there is a datapath from the storage system to the host for all the Availability Groups. Procedure 1. Click HPE Recovery Manager Central > Microsoft SQL. 2. Click the Instances tab and then select the instance that you want to restore. 3. From the Actions menu, click Clone/Restore or in the Copies panel, click Clone/Restore. 4. Select the option Restore (Point in time) and then click Next. 5. Perform the following steps: a. Pick a date (color coded) from the calendar that contains the Copies summary for a selected month. b. Select a Copy from the list of available copies for the selected date in the Available Copies section and then click Next. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Available Copies list. c. Select the Copy that you want to restore and then click Next. d. Select the Restore Type: • To Parent Volume— Restores the original volumes of the database on the same array. The volume restore feature promotes the snapshot to the base volume and overwrites all data on the volume. The delta from snapshot to parent volume is copied in the source array. This type of recovery is useful in recovering from logical errors. Recovering and Cloning Copies 141 NOTE: If a Copy contains VMFS LUN, then you cannot restore data to the parent volume. • Using Instance File Copy— Restores a specific instance from Snapshot to either the parent MS SQL server or to an alternative MS SQL server. Unlike the volume restore feature, the file copy restore feature does not overwrite the entire volume. NOTE: This restore type is not allowed for a Cloud Copy. e. Select the Add to Availability Group option to add databases to Availability Group. Specify Backup Share and Availability Group. f. Select the No Recovery option to restore databases in restoring mode. For using the No Recovery option, the instance Snapshot can contain only user databases. System databases cannot be in no recovery mode. Cloning using an MS SQL instance Procedure 1. Click HPE Recovery Manager Central > Microsoft SQL. 2. Click the Instances tab and then select the instance. 3. From the Actions menu, click Clone/Restore or in the Copies panel, click Clone/Restore. 4. Select one of the following options and then click Next: • Virtual Clone from a new Snapshot — Creates a snapshot of the database in the current state. The Clone of the database is created from the newly created snapshot. NOTE: There is no corresponding HpRmCli command for creating Clone from a new Snapshot. • Virtual Clone from an existing Copy — Clones the existing Snapshot or backup Copy and then creates a Copy of selected databases in the instance. • Physical Clone — Restores data from an Express Protect or Catalyst Copy to a different set of volumes and then creates an instance of the database. • Instant Clone (ERT) — A Clone of an application resource or a volume set from an Express Protect or a Catalyst Copy is instantly created. Instant clone is directly available from an HPE StoreOnce appliance. 5. Perform the corresponding steps based on your selection in the Clone/Restore screen. 6. For Virtual Clone from a new Snapshot: a. If you do not want to mount the Clone, clear the Mount option. The default Clone Level setting mounts the volume clone. b. Click Select Servers, select a server, and then click Add. You can use the Remove Selection option to exclude the selected servers. NOTE: Creating virtual Clones from database or instance-level Snapshots with multiple instances and a single mount point is not supported for cluster instances. Recovering and Cloning Copies 142 c. Click Select Databases, select databases, and then click Add. You can use the Remove Selection option to exclude the selected databases. d. Specify the following details in the Snapshot section: Name Specify a name for the snapshot. Auto Delete After (Optional) Expiration time for the Copy. A Copy expires after the expiration time. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Prevent Deletion Until (Optional) Retention time for the Copy. You cannot delete a Copy until the retention time expires. The minimum time must be one hour. e. Specify a Mount Point for mounting the volume clone. The default mountpoint is C:\RMCSnapClones. For cluster configuration, specify a cluster-dependent disk. 7. For Virtual Clone from an existing Copy: a. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. b. Select a copy from the list of available copies for the selected date in the Copies for Clone and then click Next. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Copies for Clone list. c. If you do not want to mount the Clone or create Instance Clone, clear the Mount and Instance Clone options. The default Clone Level setting mounts the Snapshot Clone and creates a Clone with the Snapshot Clone. d. Click Select Servers, select a server, and then click Add. You can use the Remove Selection option to exclude the selected servers. e. Click Select Databases, select databases, and then click Add. You can use the Remove Selection option to exclude the selected databases. f. Specify a Mount Point for mounting the volume clone. The default mountpoint is C:\RMCSnapClones. For cluster configuration, specify a cluster-dependent disk. g. Specify the Target Database Name and then click Clone. 8. For Physical Clone: a. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. b. Select a copy from the list of available copies for the selected date in the Copies for Clone section and then click Next. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Copies for Clone list. c. Select a storage system. d. Click Select Data Volumes, select volumes, and then click Add. You can use the Remove Selection option to exclude the selected volumes. e. Click Clone. Recovering and Cloning Copies 143 NOTE: The number of volumes selected for the creation of physical clone depends on the number of volumes in the recovery set and also the size of the volumes must be greater or equal to the recovery set volume sizes. 9. (Supported only for Express Protect and Catalyst Copy) For Instant Clone (ERT): a. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. b. Select a copy from the list of available copies for the selected date in the Copies for Clone section and then click Next. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Copies for Clone list. c. If you do not want to create Instance Clone, clear the Instance Clone option. The default Clone Level setting creates instant Clone with the mounted backup Copy. d. Specify Database and Target Instance. e. Specify a Mount Point for mounting the volume clone. The default mountpoint is C:\RMCSnapClones. For cluster configuration, specify a cluster-dependent disk. f. Specify the Target Database Name and then click Clone. More information Restoring an MS SQL instance Restoring an MS SQL database Prerequisites To add databases to Availability Group, ensure that there is a datapath from the storage system to the host for all the Availability Groups. Procedure 1. Click HPE Recovery Manager Central > Microsoft SQL. 2. From the Actions menu, click Clone/Restore or in the Copies panel, click Clone/Restore. 3. Select one of the following options and then click Next: • Restore (Point in time) — Restores data to the parent volume. The selected snapshot or backup overwrites the existing data. Point-in-time recovery is useful for recovering from logical errors. • Restore (Point of failure) — Restores data to the parent volume. The selected snapshot or backup overwrites the existing data. Point-of-failure recovery is useful if you cannot afford to lose any data during a system failure. 4. Perform the corresponding steps based on your selection in the Clone/Restore screen. 5. For Restore (Point-in-time): a. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. b. Select a copy from the list of available copies for the selected date in the Available Copies section and then click Next. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Available Copies list. c. Select the Copy that you want to restore and then click Next. Recovering and Cloning Copies 144 d. Select the Restore Type: • To Parent Volume— Restores the original volumes of the database on the same array. The volume restore feature promotes the snapshot to the base volume and overwrites all data on the volume. The delta from snapshot to parent volume is copied in the source array. This type of recovery is useful in recovering from logical errors. NOTE: If a Copy contains VMFS LUN, then you cannot restore data to the parent volume. • Using Instance File Copy— Restores a specific instance from Snapshot to either the parent MS SQL server or to an alternative MS SQL server. Unlike the volume restore feature, the file copy restore feature does not overwrite the entire volume. NOTE: This restore type is not allowed for a Cloud Copy. e. In the Advanced Options, select the Add to Availability Group option to add databases to Availability Group. Specify Backup Share and Availability Group. f. Select the No Recovery option if you want to restore databases in restoring mode. You can replay transaction log backup to recover the databases. g. (If the selected Copy is a Transaction Log) Select one of the following options: • Transaction Log only— Restores Transaction Log only if the database is restored using the no recovery mode. Use the No Recovery option for parent Copy and then restore Transaction Log using the Transaction Log only option. • Replay Transaction Log upto— Replays Transaction Log up to the specified time. Specify Date and Time. 6. For Restore (Point-of-failure): a. By default, Restore (Point-of-failure) picks the most recent Copies available for restore. b. Select the Restore Type: • To Parent Volume— Restores the original volumes of the database. This type of recovery is useful in recovering from logical errors. • Using Database File Copy— Copies database files to the original location or to a specified location. NOTE: If a Copy contains VMFS LUN, then you cannot restore data to the parent volume. c. In the Advanced Options, select the No Recovery option if you want to restore databases in restoring mode. You can replay transaction log backup to recover the databases. 7. Click OK. Recovering and Cloning Copies 145 Supported restore scenarios of VMFS and RDM disks using RMC when the Guest OS has VMWare snapshots Disk Type Restore Type VMWare snapshot PRDM Parent volumes restore Not supported (If PRDM disk is a part of the VMWare snapshot) VRDM Parent volumes restore Not supported (If VRDM disk is a part of the VMWare snapshot) VMFS Parent volumes restore Not supported PRDM File copies restore Supported VRDM File copies restore Supported VMFS File copies restore Supported Cloning an MS SQL database Procedure 1. Click HPE Recovery Manager Central > Microsoft SQL. 2. Click the Databases tab and then select the database that you want to clone. 3. From the Actions menu, click Clone/Restore or in the Copies panel, click Clone/Restore. 4. Select one of the following options and then click Next: • Virtual Clone from a new Snapshot — Creates a snapshot of the database in the current state. The Clone of the database is created from the newly created snapshot. NOTE: There is no corresponding HpRmCli command for creating Clone from a new Snapshot. • Virtual Clone from an existing Copy — Clones the existing snapshot or backup and then creates a Copy of the database. • Physical Clone — Restores data from an Express Protect or Catalyst Copy to a different set of volumes and then creates an instance of the database. • Instant Clone (ERT) — A Clone of an application resource or a volume set from an Express Protect or a Catalyst Copy is instantly created. Instant clone is directly available from an HPE StoreOnce appliance. 5. Perform the corresponding steps based on your selection in the Clone/Restore screen. NOTE: Maintain cluster mount path separate for database clone from the volume where the instance or database resides. This approach is suggested because the disk goes to a maintenance mode when the clone operation is performed and attach operation fails to find files associated with the instance or database. 6. For Virtual Clone from a new Snapshot: a. If you do not want to mount the Clone or create a database Clone, clear the Mount and Database Clone options. Recovering and Cloning Copies 146 The default Clone Level setting mounts the Snapshot Clone and creates a database Clone with the Snapshot Clone. b. Click Select Instances, select instances, and then click Add. You can use the Remove Selection option to exclude the selected instances. NOTE: Creating virtual Clones from database or instance-level Snapshots with multiple instances and a single mount point is not supported for cluster instances. c. Specify the following details in the Snapshot section: Name Specify a name for the snapshot. Auto Delete After (Optional) Expiration time for the Copy. A Copy expires after the expiration time. The minimum time must be one hour. The maximum time can be 43,800 hours or 1,825 days. Prevent Deletion Until (Optional) Retention time for the Copy. You cannot delete a Copy until the retention time expires. The minimum time must be one hour. d. Specify a Mount Point for mounting the Clone. e. Specify a Target Database Name and then click Clone. 7. For Virtual Clone from an existing Copy: a. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. b. Select a Copy from the list of available copies for the selected date in the Copies for clone and then click Next. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Copies for clone list. c. If you do not want to mount the Clone or create a database Clone, clear the Mount and Database Clone options. The default Clone Level setting mounts the Snapshot Clone and creates a database Clone with the Snapshot Clone. d. Select a Target Instance. e. Specify a Mount Point for mounting the Clone. f. Specify a Target Database Name and then click Clone. 8. For Physical Clone: a. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. b. Select a copy from the list of available copies for the selected date in the Copies for clone section and then click Next. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Copies for clone list. c. Select a Storage System. d. Click Select Data Volumes, select Volumes, and then click Add. You can use the Remove Selection option to exclude the selected Volumes. e. Click Clone. Recovering and Cloning Copies 147 NOTE: Physical clone creation depends on the number of volumes in the Volume Set. Also ensure that the size of the volumes is greater or equal to the Volume Set volume sizes. 9. (Supported only for Express Protect and Catalyst Copy) For Instant Clone (ERT): a. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. b. Select a copy from the list of available copies for the selected date in the Copies for clone section and then click Next. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Copies for clone list. c. The default Clone Level setting creates instant Clone of the database with the mounted Copy. d. Select a target instance. e. Specify a Mount Point for mounting the clone. f. Specify a Target Database Name for clone. g. Click Clone. MS SQL clones Attaching an MS SQL Clone Prerequisites Ensure that the Clone is in created or mounted state. Procedure 1. Click the main menu and then click Microsoft SQL > Instances. 2. On the master pane of the Instances screen, select an instance. 3. On the Copies tab, select and click the underlined value for Clone. The Clone window appears. The window lists all the Clones with their name, instance/DB name, server name, source copy name and type, clone type, current state, and the time when the Clone was created. 4. Select a Clone and click Action > Attach. 5. Perform the following as per your requirement in the Attach Clone dialog: a. Click Select to search and specify a Server. b. Select the Target Instance and Database from the menu. The Clone Database field gets populated based on the selected Database. 6. Click OK. Detaching an MS SQL Clone Prerequisites Ensure that the clone is in the attached state. Recovering and Cloning Copies 148 Procedure 1. Click the main menu and then click Microsoft SQL > Instances. 2. On the master pane of the Instances screen, select an instance. 3. On the Copies tab, select and click the underlined value for Clone. The Clone window appears. The window lists all the Clones with their name, instance/DB name, server name, source copy name and type, clone type, current state, and the time when the Clone was created. 4. Select a Clone and click Action > Detach. Detach dialog appears. 5. Click OK. Mounting an MS SQL clone Prerequisites Ensure that the Clone is in created state. Procedure 1. Click the main menu and then click Microsoft SQL > Instances. 2. On the master pane of the Instances screen, select an instance. 3. On the Copies tab, select and click the underlined value for Clone. Clone window appears. The clone window lists all the Clones with their name, instance/DB name, server name, source copy name and type, clone type, current state, and the time when the Clone was created. 4. Select a clone and click Action > Mount. Mount dialog appears. 5. Click OK. Removing an MS SQL clone Prerequisites Ensure that the clone is in an available state. Procedure 1. Click the main menu and then click Microsoft SQL > Instances. 2. On the master pane of the Instances screen, select an instance. 3. On the Copies tab, select and click the underlined value for Clone. Clone window appears. The clone window lists all the clones with their name, instance/DB name, server name, source copy name and type, clone type, current state, and the time when the clone was taken. 4. Select a clone and click Action > Remove from the clone window. Remove dialog appears. 5. Click Ok. Recovering and Cloning Copies 149 RMC-SH Attaching a Clone Prerequisites Ensure that the clone is in an available state. Procedure 1. Click the main menu and then click SAP HANA > + Database. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Clone. Clone window appears. The clone window lists all the clones with their current State, the time when the clone was taken, source copy name and type, clone type, and current availability status. 4. Select Action > Attach from the Clone window. 5. Click Select Host to search and assign a host server in the Attach dialog. 6. Click Ok to attach the clone. Detaching a Clone Prerequisites Ensure that a clone is already attached. Procedure 1. Click the main menu and then click SAP HANA > + Database. 2. On the master pane of the Databases screen, select a database. 3. On the Copies tab, select and click the underlined value for Clone. Clone window appears. The clone window lists all the clones with their current State, the time when the clone was taken, source copy name and type, clone type, and current availability status. 4. Select Action > Detach from the Clone window. 5. Click Ok to detach the clone. Cloning a HANA database Procedure 1. Click the main menu and then click SAP HANA. 2. On the master pane of the Databases screen, select a database. 3. Select Clone/Restore from the Actions menu or from the Copies tab. Clone/Restore window appears. 4. Select a type of clone from the following and click Next: Recovering and Cloning Copies 150 • Virtual Clone from a new Snapshot • Virtual Clone from an existing Snapshot or Backup • Physical Clone 5. Perform the corresponding steps based on the selection on the Clone/Restore page. 6. Perform the following for Virtual Clone from a new Snapshot option: a. Click Next in the Clone/Restore screen. b. Specify a Name for the snapshot and click Clone. 7. Perform the following for Virtual Clone from an existing Snapshot or Backup option: a. Click Next in the Clone/Restore screen. b. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. c. Select a copy from the list of available copies for the selected date in the Copies for clone section and click Next. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Copies for clone list. I. When the selected copy is a snapshot, clone of the selected snapshot gets created. II. When the selected copy contains an Express Protect, select the restore type from Auto, Full, or Express. d. Click Clone to proceed with database cloning or click Back to navigate to the Clone/Restore page. 8. Perform the following for Physical Clone option: a. Click Next in the Clone/Restore screen. b. Pick a date (color coded) from the calendar that contains the copies summary for a selected month. c. Select a copy from the list of available copies for the selected date in the Copies for clone section and click Next. You can use the First, Previous, Next, and Last buttons to navigate among pages that contain the Copies for clone list. d. Perform the following in the Details related to Protect section: Select a Storage System name from the list. e. Perform the following in the Volume(s) section: I. Click Select Data Volumes to search and specify a data volume for the storage system. II. Click Remove Selection to remove the associated volume for the storage system. III. Click Clone. NOTE: You can create a physical clone only on one target array. Restoring copies Prerequisites Ensure that the data volumes are unmounted from the production host. Recovering and Cloning Copies 151 Procedure 1. Click the main menu and then click SAP HANA Databases. 2. On the master pane of the Databases screen, select a database. 3. Select Clone/Restore from the Actions menu in the Copies tab. Clone/Restore window appears. 4. Select Restore from the Clone/Restore page. a. Select a date (color coded) from the calendar that contains the copies summary for a selected month. b. Select a copy from the list of available copies for the selected date in the Copies tab for the clone section and click Next. You can use the First, Previous, Next, and Last buttons to navigate among the pages that contain the copies for clone list. 5. Click Ok in the Restore dialog. Recovering and Cloning Copies 152 Monitoring Schedules After the Copy Policies are assigned to resources, schedules are auto created by RMC. The Schedules (HPE Recovery Manager Central > Schedules) screen provides an overview of all the schedules that the appliance is running. The Job Density graph projects the workload of RMC over a time period — 24 hours, 7 days, or 30 days. The spikes in the graph denote the time when the workload on RMC is high and the troughs denote that the workload is low. Based on the pattern observed from the graph, Hewlett Packard Enterprise recommends you to plan your new jobs when the workload on RMC is low. The Recovery Objectives graph provides details about the Copy Policies that you have assigned for various resources, and how these resources are protected by Recovery Point Objectives (X-axis) and Recovery Time Objectives (Y-axis) combination. The RPOs represent the frequency of schedules and the RTOs represent the time taken to recover data. The Y-axis of the graph describes the tier of protection and hence, the time taken to recover your data. For example, a Cloud Copy takes the maximum time to recover. To view the schedules specific to an application plug-in, use the Application drop-down option. The following schedule details are listed: Application Type The application plug-in for which the schedule is set. Resource Name The application resource or Volume Set for which the schedule is set. Copy Policy The Copy policy assigned to the resource. Next Run Time The time when the schedule is set to run next. Recent Runs Displays the summary of the recent five runs that occurred for all the copy types in the schedule. The expanded schedule view lists the following details: Copy Type The Copy type for which the schedule is set. Frequency The time interval after which the next schedule is set to start. Target Device The location where the copies are created. Next Run Time The time when the schedule is set to run next for each Copy type. Recent Runs Displays the last five run statuses for each Copy type. Monitoring 153 Suspending a schedule Procedure 1. Click HPE Recovery Manager Central > Schedules. 2. In the Schedules screen, select a schedule that is in active state. 3. From the Actions menu, click Suspend. 4. At the prompt, click OK. Resuming a schedule Procedure 1. Click HPE Recovery Manager Central > Schedules. 2. In the Schedules screen, select a schedule that is in suspended state. 3. From the Actions menu, click Resume. 4. At the prompt, click OK. Editing a schedule You can edit the Start Date and Time and End Date fields. Procedure 1. Click HPE Recovery Manager Central > Schedules. 2. In the Schedules screen, select a schedule. 3. From the Actions menu, click Edit. 4. Edit the required fields. 5. Click OK. Dashboard After the Copy Policies are assigned to resources, and the schedules are created by RMC, you can use the Dashboard (HPE Recovery Manager Central > Dashboard) to monitor protection jobs. You can filter the dashboard charts based on the application plug-ins that you select. The dashboard provides a high-level information on the Scheduled (to be run later in the day), Completed, Running, and Failed jobs in the last 24 hours. The Dashboard reports are collated and cached periodically or when the data is available. The dashboard provides you the following charts: Copy Policy Execution The Copy Policy Execution chart provides success to failure ratio of the completed protection jobs in RMC. The graph maps every execution of the policy over the time period that you set. The graph is derived from the calculation of the expected number of runs, the actual number of runs, and also the number of runs that are skipped due to system issues. To download the copy policy execution data, click the download icon. A CSV file is downloaded and consists of data Monitoring 154 for a selected application plug-in. The details include policy name, number of expected runs, successful runs, missed runs, and failed runs. The details are listed for each resource and for each Copy type. Copies By Type Displays the number of copies that are available for each Copy type. Copies By Age Provides you an account of the cost of Copies. The graph displays the types of Copies and the age of these Copies. Using this chart, you can understand the effective way of storing copies in the right tier of storage, according to the age of the copy. Hewlett Packard Enterprise recommends you to store the Copy that you want to use for a longer term on a cheaper storage, such as cloud storage. Backup Efficiency Displays the effective savings that you get by using RMC over a time period — 24 hours, 7 days, or 30 days. The graph displays the savings with RMC optimized and incremental backup and snapshot of the delta backups taken over time based on the data changes. Copy Policy Protection Tiers Displays the number of resources and their levels of protection based on the current policy assignments. For example, if a resource is protected by a snapshot and an express protect backup, the protection level for that resource is 2. Activities The Activities screen lists details of all the system and user-initiated tasks. The job details include the following: View Standard view displays set of various tasks, in a non-hierarchal way and the Policy Execution view displays the various tasks involved during the copy policy execution, in a hierarchal way. Action Displays the name of the task that is performed. Use the expand icon ( ) to view the task progress and task output. Resource Displays the name of the resource for the activity. For example, Volume Set or application resource. Parent Resource Displays the name of the parent resource for the activity. State The current state of the task. Created At The date and time when the task is initiated. You can sort the resources in ascending or descending order by clicking the column name, then clicking the Sort icon that appears. Filters For filtering the activities, click the filter icon. The following options are available: Job status Each job has three statuses — Complete, Error, and Running. Warnings are available for a few jobs. Monitoring 155 Category Based on the Copy type, the tasks are listed. Initiator The application plug-in for which the job is initiated. Date Displays activities that occurred within a specified date range. Reset Click this button to reset all filter options to their default values. Monitoring 156 RMC Support Diagnostic check You can check the status of RMC subsystems using the Diagnostics screen. The diagnostics report can be used to troubleshoot connectivity issues. Procedure 1. Click HPE Recovery Manager Central > Diagnostics. 2. Click Start Diagnostics. The Diagnostic Check window displays the status of the following: • Storage Devices • HPE StoreOnce • Data path connection from Copy Repository information • Element recovery technology checks • Hardware • Services • RMC Catalyst Copy • VMware vCenter 3. To continue using the GUI while the diagnostics is in progress, click Run in background. 4. To download the diagnostics report, click Export. Generating a support ticket To troubleshoot issues with RMC and application plug-ins, generate a support ticket. Prerequisites Ensure that your browser security settings allow files to be transferred from RMC appliance to your host machine. Procedure 1. Click HPE Recovery Manager Central > Ticket. 2. Do one of the following: • To create only RMC logs, click Generate. • To create RMC logs and application-specific logs, select an application. 3. Based on the application you have selected, specify the required details and then click Generate. RMC Support 157 Microsoft SQL Select SQL servers. Oracle Select a database and then select Oracle servers. Microsoft Exchange Select a database and then select Exchange servers. SAP HANA Select an SID. After a ticket is generated, ticket_id is provided and the Download link is enabled. • 20181031 — The first part of the ticket displays the year, month, date (yyyymmdd). • Z162932 — The second part of the ticket displays the ticket identification number. 4. Click Close. To download the support ticket, click the icon or to delete the ticket, click the icon. Support ticket contents • Extract the ticket to a file. • ticket_id\logs\catalogue for viewing RMC-S application-related log files. • ticket_id\logs\var\log for viewing RMC-related log files. RMC Support 158 Websites Website Contact Hewlett Packard Enterprise Worldwide Subscription Service/Support Alerts My HPE Software Center Link www.hpe.com/assistance www.hpe.com/support/e-updates https://myenterpriselicense.hpe.com Documentation Hewlett Packard Enterprise Information Library RMC Documentation on Hewlett Packard Enterprise Information Library Hewlett Packard Enterprise Support Center Single Point of Connectivity Knowledge (SPOCK) Storage Compatibility Matrix Storage White Papers www.hpe.com/info/enterprise/docs www.hpe.com/storage/rmc/docs www.hpe.com/support/hpesc www.hpe.com/storage/spock/ www.hpe.com/storage/whitepapers Websites 159 Support and other resources Accessing Hewlett Packard Enterprise Support • For live assistance, go to the Contact Hewlett Packard Enterprise Worldwide website: https://www.hpe.com/info/assistance • To access documentation and support services, go to the Hewlett Packard Enterprise Support Center website: https://www.hpe.com/support/hpesc Information to collect • Technical support registration number (if applicable) • Product name, model or version, and serial number • Operating system name and version • Firmware version • Error messages • Product-specific reports and logs • Add-on products or components • Third-party products or components Accessing updates • Some software products provide a mechanism for accessing software updates through the product interface. Review your product documentation to identify the recommended software update method. • To download product updates: Hewlett Packard Enterprise Support Center https://www.hpe.com/support/hpesc Hewlett Packard Enterprise Support Center: Software downloads https://www.hpe.com/support/downloads My HPE Software Center https://www.hpe.com/software/hpesoftwarecenter • To subscribe to eNewsletters and alerts: https://www.hpe.com/support/e-updates • To view and update your entitlements, and to link your contracts and warranties with your profile, go to the Hewlett Packard Enterprise Support Center More Information on Access to Support Materials page: https://www.hpe.com/support/AccessToSupportMaterials Support and other resources 160 IMPORTANT: Access to some updates might require product entitlement when accessed through the Hewlett Packard Enterprise Support Center. You must have an HPE Passport set up with relevant entitlements. Remote support Remote support is available with supported devices as part of your warranty or contractual support agreement. It provides intelligent event diagnosis, and automatic, secure submission of hardware event notifications to Hewlett Packard Enterprise, which will initiate a fast and accurate resolution based on your product's service level. Hewlett Packard Enterprise strongly recommends that you register your device for remote support. If your product includes additional remote support details, use search to locate that information. Remote support and Proactive Care information HPE Get Connected https://www.hpe.com/services/getconnected HPE Proactive Care services https://www.hpe.com/services/proactivecare HPE Datacenter Care services https://www.hpe.com/services/datacentercare HPE Proactive Care service: Supported products list https://www.hpe.com/services/proactivecaresupportedproducts HPE Proactive Care advanced service: Supported products list https://www.hpe.com/services/proactivecareadvancedsupportedproducts Proactive Care customer information Proactive Care central https://www.hpe.com/services/proactivecarecentral Proactive Care service activation https://www.hpe.com/services/proactivecarecentralgetstarted Warranty information To view the warranty information for your product, see the links provided below: HPE ProLiant and IA-32 Servers and Options https://www.hpe.com/support/ProLiantServers-Warranties HPE Enterprise and Cloudline Servers https://www.hpe.com/support/EnterpriseServers-Warranties HPE Storage Products https://www.hpe.com/support/Storage-Warranties HPE Networking Products https://www.hpe.com/support/Networking-Warranties Regulatory information To view the regulatory information for your product, view the Safety and Compliance Information for Server, Storage, Power, Networking, and Rack Products, available at the Hewlett Packard Enterprise Support Center: https://www.hpe.com/support/Safety-Compliance-EnterpriseProducts Support and other resources 161 Additional regulatory information Hewlett Packard Enterprise is committed to providing our customers with information about the chemical substances in our products as needed to comply with legal requirements such as REACH (Regulation EC No 1907/2006 of the European Parliament and the Council). A chemical information report for this product can be found at: https://www.hpe.com/info/reach For Hewlett Packard Enterprise product environmental and safety information and compliance data, including RoHS and REACH, see: https://www.hpe.com/info/ecodata For Hewlett Packard Enterprise environmental information, including company programs, product recycling, and energy efficiency, see: https://www.hpe.com/info/environment Documentation feedback Hewlett Packard Enterprise is committed to providing documentation that meets your needs. To help us improve the documentation, send any errors, suggestions, or comments to Documentation Feedback (docsfeedback@hpe.com). When submitting your feedback, include the document title, part number, edition, and publication date located on the front cover of the document. For online help content, include the product name, product version, help edition, and publication date located on the legal notices page. Support and other resources 162 Understanding the registry for RMC-S After RMC-S is successfully installed, information is written into the registry database in: HKEY_LOCAL_MACHINE \SOFTWARE\HPE\RMC-S. CAUTION: Do not edit the registry key value unless asked by your local service provider for support purposes. Table 1: System Registry Values for RMC-S Name Value InstallPath HPE Nimble Storage, HPE 3PAR, HPE Primera RMC-S installation path. LogFilePath Tracing log files. TraceHistory Number of trace files to keep before deleting. TraceLevel Trace level for the log file. TraceLog Information used to generate the trace file name. PortNo Port used by RMC-S PortNo is set to 50001 by default. PromoteTimeout Time interval in seconds to monitor the status of volume restore operation. Version Current version of RMC-S. NOTE: • The DataFilePath field is created in the registry database only after you launch the RMC-S GUI for the first time. • An installation log file is created in the %Temp% folder for troubleshooting purposes. Understanding the registry for RMC-S 163 RMC-S error codes Each operation failure in RMC-S has a code that is assigned to it. The corresponding error codes will have the reason for the failure. Table 2: Error codes SQL Servers registration failure 1301 SQL Servers unregistration failure 1302 SQL Servers RMC credential Update failure 1303 Analyze failure 1304 Create snapshot failure 1305 Create transaction log backup failure 1306 Rescan SQL Server failure 1307 Remove snapshot failure 1308 Mount snapshot failure 1310 Unmount snapshot failure 1311 Edit snapshot policy failure 1312 Policy configuration failure 1313 Snapshot Backup failure 1314 Delete backup failure 1318 Rescan multiple servers failures 1319 Remote repository update failure 1321 Report failure 1322 Test mail failure 1322 Support ticket collection failure 1323 Restore failure 1325 Table Continued RMC-S error codes 164 RMC-S repository configuration failure 1326 Catalog Protection failure 1328 RMC-S error codes 165 Event Messages This appendix provides information on the event messages generated by RMC-S. Table 3: RMC-S Server Event Messages Event ID Event Message Description/Action 5312 RMS5312: ERROR: Some of the volumes are either non3PAR volumes or unsupported types of disk drives. Some target volumes are not HPE 3PAR, HPE Primera virtual volumes. All drives must be HPE 3PAR drives. RMS5313: ERROR: Could not find the Remote Copy group for the specified volume. The Remote Copy volume group is not configured for the specified SQL database or instance. 5313 Verify that all database and log destinations belong to an HPE 3PAR, HPE Primera Storage System. • Check the Remote Copy configuration and HPE 3PAR, HPE Primera Storage System setup. • Consult the HPE 3PAR InForm OS CLI Administrator' Manual or the HPE 3PAR, HPE Primera Management Console Help for details on setting up and checking Remote Copy functionality. 5319 RMS5319: ERROR: The snapshot was not found in the repository. The repository might be out of sync. To list the out-of-sync entries, run HpRmCli Sql analyze. 5321 RMS5321: ERROR: The specified mount directory does not exist. To use an alternative (non-default) mount point directory in the HpRmCli Sql mount command, you must first create the mount point directory. 5325 RMS5325: ERROR: The snapshot time stamp does not exist for the snapshotset ID. • Verify that the mount point directory exists. • Alternatively, do not specify a mount directory. If an alternative directory is not specified, RMC-S uses the default mount directory. When you created the snapshot, RMC-S could not store the snapshot time stamp in the repository for the specified snapshotset ID. Wait a few minutes and then retry the operation. 5326 RMS5326: ERROR: Volume Restore failed. A failure occurred when restoring data using the volume restore feature. The failure might leave the HPE 3PAR, HPE Primera Storage System in an inconsistent state. If the VLUNs are missing, ensure that they are recreated. 5327 RMS5327: ERROR: One or more of your volumes are on dynamic disks. Dynamic disks are not supported. Some of the database or log files are stored on volumes created on dynamic disks. Ensure that the database and log files reside on volumes created on basic disks. Table Continued Event Messages 166 Event ID Event Message Description/Action 5328 RMS5328: ERROR: One or more of your databases are on the system volume. You cannot create Virtual Copies of system volumes. Some of the database or log files are stored on the system volume. 5329 RMS5329: ERROR: The destination file exists. Specify a different restore location and try the operation again. Performing a restore from backup does not overwrite an existing copy of the same file. Verify that the specified restore folder is empty and try the operation again. 5332 RMS5332: ERROR: Could not find the SQL Writer. Either the Writer is not installed or is not running. SqlServerWriter was not found on the SQL Server. 5333 RMS5333: ERROR: Remote Copy groups are not configured. A Remote Copy group must be present to perform this operation. Ensure that the database and log files are on HPE 3PAR, HPE Primera virtual volumes. • Run the vssadmin list writers command and verify that SqlServerWriter is listed. • Ensure that the SQL Writer service is in the Running state. There are no Remote Copy volume groups configured on the HPE 3PAR, HPE Primera storage systems. Ensure that the Remote Copy volume group is configured before you create a remote snapshot. • Check the Remote Copy configuration and HPE 3PAR, HPE Primera Storage System setup. • Consult the HPE 3PAR InForm OS CLI Administrator'Manual or the HPE 3PAR, HPE Primera Management Console Help for details on setting up and checking Remote Copy functionality. 5335 RMS5335: ERROR: Mount point drive letter The specified mount point drive letter is already in use. Be sure to is already in use. specify an unused drive letter as a mount point when you enter the HpRmCli Sql mount command. 5336 RMS5336: ERROR: Mount point directory is The specified mount point is not a directory. Be sure to specify a not a valid directory. valid directory as a mount point when you enter the HpRmCli Sql mount command. 5337 RMS5337: ERROR: Mount point directory is The mount point directory specified already contains files. Be sure not empty. to specify a valid directory as a mount point when you enter the HpRmCli Sql mount command. 5354 RMS5354: ERROR: The SQL database was not found in the SQL Writer database list. SqlServerWriter could not find the specified database in its list of databases supported for backup. • Verify that the database is online and attached. • Ensure that the database is not a snapshot/mirrored database. • If you are performing an SQL instance level Snapshot, ensure that all the databases and SQL instance volumes are from the same HPE 3PAR, HPE Primera. Table Continued Event Messages 167 Event ID Event Message Description/Action 5356 RMS5356: ERROR: The expiration time is out of range (0h - 336h). The expiration time for a snapshot must be a value between 0 and 43,800 hours (or between 0 and 1825 days). Try again, using a value within the range allowed. 5367 RMS5367: ERROR: Unknown error encountered. See the logs for more information. An unexpected error occurred. RMS5379: ERROR: Failed to mount snapshot. Check the application and system event logs for the most recent error. RMC-S failed to mount the snapshot. RMS5380: ERROR: Failed to create snapshot. Check the application and system event logs on the SQL Server for the most recent error. RMC-S failed to create the snapshot. 5387 RMS5387: ERROR: Failed to set the disk in maintenance mode because the disk is offline. Could not set the disk in maintenance mode because the disk is offline. Ensure that the disk to be restored is online before you run the volume restore operation. 5388 RMS5388: ERROR: Failed to set the disk in maintenance mode. Could not set the disk in maintenance mode. 5379 5380 For more details, check the logs in the RMC-S installation folder and the event logs. Check the application and system event logs for the most recent error messages. Check the application and system event logs on the SQL Server for the most recent error messages. • Ensure that the disk is online and can be put in maintenance mode. • Troubleshoot using the cluster command: cluster res <resource-name> /maint:on Event Messages 168