Contents

Dell Data Protection Central 19.1 Data Protection Administration Guide PDF

1 of 114
1 of 114

Summary of Content for Dell Data Protection Central 19.1 Data Protection Administration Guide PDF

Dell EMC Data Protection Central Version 19.1

Administration Guide 302-005-565

REV 02

June 2019

Copyright 2017-2019 Dell Inc. or its subsidiaries. All rights reserved.

Dell believes the information in this publication is accurate as of its publication date. The information is subject to change without notice.

THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS-IS. DELL MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND

WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF

MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. USE, COPYING, AND DISTRIBUTION OF ANY DELL SOFTWARE DESCRIBED

IN THIS PUBLICATION REQUIRES AN APPLICABLE SOFTWARE LICENSE.

Dell Technologies, Dell, EMC, Dell EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be the property

of their respective owners. Published in the USA.

Dell EMC Hopkinton, Massachusetts 01748-9103 1-508-435-1000 In North America 1-866-464-7381 www.DellEMC.com

2 Dell EMC Data Protection Central Administration Guide

Preface 7

Overview 11 Data Protection Central overview............................................................... 12 Environment and system requirements ...................................................... 13 Monitoring systems ....................................................................................14 Managing Avamar systems .........................................................................15 Systems data refresh times ........................................................................15 Search and recover capabilities...................................................................16 Report capabilities...................................................................................... 16 User Interface............................................................................................. 16

Header........................................................................................... 16 View version information................................................................ 17 User menu...................................................................................... 17 Left menu.......................................................................................18 Pages............................................................................................. 18 Master and Detail panes................................................................. 19 Changing dashboards..................................................................... 19 Filtering..........................................................................................19 Sort information that is displayed in tables.....................................21 Dialog boxes................................................................................... 21 Notification bar.............................................................................. 21 Overflow button............................................................................. 21

Using Dashboards 23 Dashboards overview..................................................................................24 Dashboard widgets .................................................................................... 24

Activity Counts widget.................................................................. 24 Activity Trend widget.................................................................... 25 Assets Summary widget................................................................ 25 Assets Top Offenders widget ....................................................... 25 Alerts Summary widget................................................................. 26 Storage Capacity Top Utilization widget........................................26 Storage capacity summary widget ................................................26 Health summary widget................................................................. 27

Drill down pages......................................................................................... 27 Managing dashboards.................................................................................27

Add a dashboard............................................................................ 27 Editing a dashboard....................................................................... 28 Delete a dashboard........................................................................ 29

Editing widgets ..........................................................................................29 Change the widget type................................................................ 29 Edit the reporting time range.........................................................30 Edit the activity view..................................................................... 30 Edit the activity type ..................................................................... 31 Refresh the dashboard................................................................... 31 Filter systems or assets in a dashboard widget...............................31

Chapter 1

Chapter 2

CONTENTS

Dell EMC Data Protection Central Administration Guide 3

Monitoring System Health 33 Monitoring health status.............................................................................34

Reading the Health page................................................................34 Reading the detailed health summary pane....................................35 Data Protection Advisor and Search system health information.... 38

Managing alerts..........................................................................................38 Reading alerts ...............................................................................38 Dismissing alerts............................................................................40

Monitoring system capacity........................................................................ 41 Reading the system capacity table................................................. 41 Reading the detailed system capacity pane....................................41

Monitoring Activities 43 Activities overview..................................................................................... 44 Monitoring job activities ............................................................................ 44

Reading the Job Activities page.....................................................44 Reading the detailed job activity pane........................................... 45 Rerun an Avamar job activity......................................................... 47 View job activities for a specific system.........................................48

Monitoring asset activities..........................................................................48 Reading the Asset Activities page..................................................48 Reading the detailed asset activity pane........................................49 Rerun an Avamar asset activity..................................................... 50 View asset activities for a specific system..................................... 51 View activities for a specific asset..................................................51 View asset activities within a job.................................................... 51

Managing Systems 53 System management overview...................................................................54 Adding a system......................................................................................... 54

Add an Avamar system.................................................................. 54 Add a NetWorker system...............................................................55 Add a Data Domain System........................................................... 56 Add a Data Protection Advisor system...........................................57 Add a Search system..................................................................... 58

Edit a system..............................................................................................59 Delete a system..........................................................................................59 Managing system groups............................................................................59

Add a group................................................................................... 60 Edit a group...................................................................................60 Delete a group................................................................................61

Monitoring Assets 63 Assets overview......................................................................................... 64 Monitoring assets.......................................................................................64

Reading the Assets Inventory page................................................64 Reading the detailed asset pane.................................................... 64

View assets for a specific system............................................................... 66 Tag assets ................................................................................................. 66 Filter assets................................................................................................ 67

Managing Avamar Protection Policies 69 Overview of Avamar policies.......................................................................70

Chapter 3

Chapter 4

Chapter 5

Chapter 6

Chapter 7

Contents

4 Dell EMC Data Protection Central Administration Guide

Managing data protection policies for Avamar systems.............................. 70 View policies.................................................................................. 70 Adding an Avamar policy................................................................70 Editing an Avamar policy................................................................74 Delete a policy............................................................................... 77

Run a backup policy.................................................................................... 77

Launching System Management Applications 79 Launching Avamar Administrator................................................................80

Launch Avamar Administrator from the overflow button............... 80 Launching Avamar AUI............................................................................... 80

Launch Avamar UI from the overflow button................................. 80 Launch Avamar Restore from the overflow button.........................81 Launch Avamar Proxy Deployment from the overflow button........ 81 Launch Avamar Administrator from the Detail pane.......................82

Launching NetWorker Management Console..............................................82 Launch NetWorker Management Console from the overflow button ...................................................................................................... 82

Launching NetWorker Management Web UI...............................................83 Launch NetWorker Management Web UI from the overflow button.. 83 Launch NetWorker UI from the Detail pane................................... 83

Launching Data Domain System Manager.................................................. 84 Launch System Manager from the overflow button.......................84 Launch System Manager from the Detail pane.............................. 84

Launching Search.......................................................................................85 Launching Data Protection Advisor............................................................ 85

Running Reports 87 Reports overview....................................................................................... 88 Run a report............................................................................................... 88 View the last report.................................................................................... 89 Backup Report Card................................................................................... 89 Backup Client Summary............................................................................. 89 Strike Summary..........................................................................................90 Backup Data Backed Up Daily..................................................................... 91 Backup Number of Jobs Backed Up Daily....................................................91 Data Domain Utilization...............................................................................91 Data Domain Tier Utilization........................................................................91 Data Domain Daily Compression Statistics................................................. 92 Data Domain Filesystem Utilization ............................................................92 Data Domain DeDuplication Ratio............................................................... 92 Data Domain Active Streams...................................................................... 92

Auditing Data Protection Central Activities 93 Data Protection Central audit overview......................................................94 Activities audit information.........................................................................94

Server Administration 95 Backing up Data Protection Central........................................................... 96 Restoring a backup of Data Protection Central.......................................... 96 Change the Data Protection Central IP address......................................... 96 Upgrading Data Protection Central.............................................................97

Chapter 8

Chapter 9

Chapter 10

Chapter 11

Contents

Dell EMC Data Protection Central Administration Guide 5

Upgrade Data Protection Central to version 19.1 on standalone server or virtual machine............................................................... 97 Data Protection Central OS update............................................... 99 Migrating from Multiple Systems Management to Data Protection Central......................................................................................... 100

Troubleshooting 101 Directory structure and log information.................................................... 102 Troubleshooting LDAP.............................................................................. 102

Check the LDAP status in the log file........................................... 102 Diagnosing LDAP authentication failure........................................104 Restore access to Data Protection Central after LDAP misconfiguration ..........................................................................104 Remove LDAP from Data Protection Central............................... 105

Systems fail to activate.............................................................................105 Avamar systems fail to activate................................................................ 106 NetWorker systems fail to activate........................................................... 106 Edit NetWorker Virtual Edition firewall settings to enable Data Protection Central to read jobs...................................................................................107 Lockbox.................................................................................................... 108

Lockbox password requirements.................................................. 108 Reset the lockbox........................................................................ 108 Remove the lockbox.....................................................................108 Create the lockbox....................................................................... 109

Unlock a Data Protection Central user account........................................ 109 The SSO service fails to start on Data Protection Central......................... 110 Disabling SSO ............................................................................................111 Reregister SSO for a system...................................................................... 111 Resolve error notifications..........................................................................111 Convert IPv4 to IPv6-only or dual-stack network...................................... 112

113

Chapter 12

Glossary

Contents

6 Dell EMC Data Protection Central Administration Guide

Preface

As part of an effort to improve product lines, periodic revisions of software and hardware are released. Therefore, all versions of the software or hardware currently in use might not support some functions that are described in this document. The product release notes provide the most up-to-date information on product features.

If a product does not function correctly or does not function as described in this document, contact a technical support professional.

Note: This document was accurate at publication time. To ensure that you are using the latest version of this document, go to the Support website https:// www.dell.com/support.

Purpose

This document includes information about how to administer Data Protection Central.

Audience

This document is intended for Data Protection Central administrators.

Revision history

The following table presents the revision history of this document.

Table 1 Revision history

Revision Date Description

01 May 2019 Release of the Data Protection Central 19.1 Administration Guide.

02 June 2019 Correction in the procedure for creating the lockbox.

Related Documentation

For information about Data Protection Central compatibility, refer to the Data Protection Central Release Notes.

The Data Protection Central documentation set includes the following publications:

l Data Protection Central Getting Started Guide

l Data Protection Central Security Configuration Guide

l Data Protection Central Release Notes

l Data Protection Central Administration Guide

The documentation for the following products includes more information:

l Avamar

l Data Domain

l Search

l Data Protection Advisor

l NetWorker

Special notice conventions that are used in this document

The following conventions are used for special notices:

Dell EMC Data Protection Central Administration Guide 7

NOTICE Identifies content that warns of potential business or data loss.

Note: Contains information that is incidental, but not essential, to the topic.

Typographical conventions

The following type style conventions are used in this document:

Table 2 Style conventions

Bold Used for interface elements that a user specifically selects or clicks, for example, names of buttons, fields, tab names, and menu paths. Also used for the name of a dialog box, page, pane, screen area with title, table label, and window.

Italic Used for full titles of publications that are referenced in text.

Monospace Used for:

l System code

l System output, such as an error message or script

l Pathnames, file names, file name extensions, prompts, and syntax

l Commands and options

Monospace italic Used for variables.

Monospace bold Used for user input.

[ ] Square brackets enclose optional values.

| Vertical line indicates alternate selections. The vertical line means or for the alternate selections.

{ } Braces enclose content that the user must specify, such as x, y, or z.

... Ellipses indicate non-essential information that is omitted from the example.

You can use the following resources to find more information about this product, obtain support, and provide feedback.

Where to find product documentation

l https://www.dell.com/support

l https://community.emc.com

Where to get support

The Support website https://www.dell.com/support provides access to product licensing, documentation, advisories, downloads, and how-to and troubleshooting information. The information can enable you to resolve a product issue before you contact Support.

To access a product-specific page:

1. Go to https://www.dell.com/support.

2. In the search box, type a product name, and then from the list that appears, select the product.

Preface

8 Dell EMC Data Protection Central Administration Guide

Knowledgebase

The Knowledgebase contains applicable solutions that you can search for either by solution number (for example, KB000xxxxxx) or by keyword.

To search the Knowledgebase:

1. Go to https://www.dell.com/support.

2. On the Support tab, click Knowledge Base.

3. In the search box, type either the solution number or keywords. Optionally, you can limit the search to specific products by typing a product name in the search box, and then selecting the product from the list that appears.

Live chat

To participate in a live interactive chat with a support agent:

1. Go to https://www.dell.com/support.

2. On the Support tab, click Contact Support.

3. On the Contact Information page, click the relevant support, and then proceed.

Service requests

To obtain in-depth help from Licensing, submit a service request. To submit a service request:

1. Go to https://www.dell.com/support.

2. On the Support tab, click Service Requests.

Note: To create a service request, you must have a valid support agreement. For details about either an account or obtaining a valid support agreement, contact a sales representative. To get the details of a service request, in the Service Request Number field, type the service request number, and then click the right arrow.

To review an open service request:

1. Go to https://www.dell.com/support.

2. On the Support tab, click Service Requests.

3. On the Service Requests page, under Manage Your Service Requests, click View All Dell Service Requests.

Online communities

For peer contacts, conversations, and content on product support and solutions, go to the Community Network https://community.emc.com. Interactively engage with customers, partners, and certified professionals online.

How to provide feedback

Feedback helps to improve the accuracy, organization, and overall quality of publications. You can send feedback to DPAD.Doc.Feedback@emc.com.

Preface

Dell EMC Data Protection Central Administration Guide 9

Preface

10 Dell EMC Data Protection Central Administration Guide

CHAPTER 1

Overview

Learn about Data Protection Central.

This chapter contains the following sections:

l Data Protection Central overview.......................................................................12 l Environment and system requirements .............................................................. 13 l Monitoring systems ........................................................................................... 14 l Managing Avamar systems ................................................................................ 15 l Systems data refresh times ............................................................................... 15 l Search and recover capabilities.......................................................................... 16 l Report capabilities.............................................................................................. 16 l User Interface.....................................................................................................16

Dell EMC Data Protection Central Administration Guide 11

Data Protection Central overview Data Protection Central provides a solution for data protection administrators who manage multiple independent data protection applications and storage devices.

When you work with multiple data protection applications, operational monitoring and management can be a complex, time consuming effort.

Data Protection Central enables administrators to efficiently and effectively monitor and manage the software products within the Data Protection Suite family from a single user interface, simplifying the entire data protection experience.

Data Protection Central includes the following features:

Comprehensive dashboards

Data Protection Central has a comprehensive and customizable dashboard for at-a- glance monitoring of systems and activities. Data Protection Central supports up to 20 dashboards per user.

Avamar system monitoring and management

Data Protection Central supports a maximum combination of 200 NetWorker and Avamar systems.

When you add an Avamar system to Data Protection Central, you can perform the following tasks:

l Launch AUI or Avamar Administrator, using Single-Sign On (SSO) for supported versions.

l Monitor system health status and any alerts from the system.

l Monitor storage capacity usage.

l Monitor backup and replication activities at the Avamar job level.

l Monitor backup and replication activities at the Avamar asset level. Assets are virtual machines or clients that you add to the Avamar system.

l Rerun failed backup and replication activities at the job or asset level.

l Manage and run Avamar protection policies.

l View assets that are added to Avamar.

NetWorker system monitoring

Data Protection Central supports a maximum combination of 200 NetWorker and Avamar systems.

When you add a NetWorker system to Data Protection Central, you can perform the following tasks:

l Launch NetWorker Management Console or the NetWorker Management Web UI, using Single-Sign On (SSO) for supported versions.

l Monitor system health status and any alerts from the system.

l Monitor backup and replication activities at the NetWorker action level.

l Monitor backup activities at the NetWorker asset level.

l View assets that are added to NetWorker.

Data Domain system monitoring

Data Protection Central supports adding up to 80 Data Domain systems.

Overview

12 Dell EMC Data Protection Central Administration Guide

When you add a Data Domain system to Data Protection Central, you can perform the following tasks:

l Launch Data Domain System Manager, using Single-Sign On (SSO) for supported versions.

l Monitor system health status and any alerts from the system.

l Monitor storage capacity usage.

Search integration

Data Protection Central supports adding a single Search system.

When you integrate Search with Data Protection Central, you can launch Search Web User Interface, using Single-Sign On (SSO) for supported versions.

Data Protection Advisor integration

Data Protection Central supports adding a single Data Protection Advisor system.

When you integrate Data Protection Advisor with Data Protection Central, you can perform the following tasks:

l Launch DPA Web Console, using Single-Sign On (SSO) for supported versions.

l Run 11 of the most used Data Protection Advisor reports on Avamar, NetWorker, and Data Domain systems.

Environment and system requirements The following list includes information about environment and system requirements:

l To deploy the Data Protection Central OVA, you must use VMware vCenter with VMware ESX 5.5 or later. The Data Protection Central OVA does not deploy directly to the ESXi server.

l The Data Protection Central host must have a minimum of 4 CPUs, 8 GB of RAM, and 550 GB of disk space available.

l The FQDN, IP, Netmask, NTP, Gateway, DNS, and time zone must be configured. The FQDN must resolve to the IP address.

l The environment must use static network settings.

l Data Protection Central requires a minimum browser window size of 1366x768.

l Ensure that the DNS is set up correctly. The correct DNS setup ensures that systems can resolve the Data Protection Central hostname and FQDN name.

l Data Protection Central is compatible with VMware vSphere Fault Tolerance (FT), VMware vSphere High Availability (HA), and VMware vSphere vMotion.

l It is highly recommended that the ESXi server for the VMware environment where Data Protection Central is deployed is protected from unexpected power outages with an uninterrupted power supply device.

Note: If you must power off the Data Protection Central virtual machine, do not use the Power off the virtual machine feature in vCenter. Instead, shut down the machine gracefully with the Shut Down Guest OS menu option. Alternatively, log in to Data Protection Central using shell or SSH and type: shutdown -h now.

l Do not use the underscore symbol in a hostname. This is a standard requirement for hostname configurations. For example, mars_jupiter.planets is not a valid hostname. When you deploy Data Protection Central to a server with a hostname

Overview

Dell EMC Data Protection Central Administration Guide 13

that contains the underscore symbol (_), the deployment will succeed but Data Protection Central will be unusable due to communication issues.

l If you are using only IPv4 in your environment, do not disable the IPv6 configuration. Some Data Protection Central components use the IPv6 loopback address. If you disable IPv6, those components do not start.

The following table includes information about the minimum versions of products that are supported with Data Protection Central:

Table 3 Compatibility

Product Supported versions

NetWorker 9.2.1.4

18.1

18.2

19.1

Avamar 7.5.1-101_HF298709_27 hotfix

18.1

18.2

19.1

Data Domain 6.0

6.1

6.1.1

6.1.2

6.2

Data Protection Advisor 18.1

18.2

19.1

Search 18.1

18.2

19.1

Mozilla Firefox Latest version

Google Chrome Latest version

Monitoring systems Data Protection Central includes system monitoring features.

The systems monitoring features include:

l Job Activities: Monitor backup and replication activities at the job-level for Avamar and NetWorker systems.

l Asset Activities: Monitor backup and replication activities at the asset-level within jobs for Avamar and NetWorker systems.

Overview

14 Dell EMC Data Protection Central Administration Guide

l Health: Monitor the health status for Avamar, NetWorker, and Data Domain systems.

l Alerts: Monitor alerts originating from Avamar, NetWorker, and Data Domain systems.

l Capacity: Monitor capacity usage for Avamar and Data Domain systems.

Note: If a Data Domain system is configured in a monitored Avamar system, the Data Domain system is automatically added as a monitored system. However, you must add the Data Domain system credentials to Data Protection Central to enable the full system monitoring features.

Managing Avamar systems For Avamar systems, Data Protection Central includes policy management and client management capabilities.

Data Protection Central includes the following Policy Management capabilities:

l View, add, edit, and delete policies, retentions, schedules, and datasets.

l Add clients and proxies to policies.

l Perform a backup of a policy.

l Rerun a backup or replication activity.

Data Protection Central includes the capability for you to view existing clients that are associated with an Avamar system.

Systems data refresh times Every 90 seconds, Data Protection Central refreshes system monitoring information based on data that has been fetched from systems within that 90 seconds.

Refresh the page to see the updated information.

Certain types of system information have different data refresh times. The following table describes the frequency that Data Protection Central fetches information from systems being monitored.

Table 4 Systems monitoring data fetch times

Monitoring information type Approximate data fetch times

Data Domain system alert and health status Every 5 minutes

Data Domain system capacity Every 40 minutes

NetWorker system alerts, capacity, and health status

Every 5 minutes

NetWorker system activity Every 10 seconds

Avamar system alerts Real time

Avamar system health status Every 1 minute

Avamar system capacity, checkpoint, and garbage collection

Real time

Running job activities that stop responding Every 12 hours

Overview

Dell EMC Data Protection Central Administration Guide 15

Search and recover capabilities Data Protection Central integrates with Search to provide you with the ability to perform complex search and recover operations.

Data Protection Central launches Search in a new browser tab.

After launching Search, you can perform the following tasks:

l Perform a targeted full content index (FCI) search.

l Search for files by name, location, size, owner, file type, and date.

l Perform advanced search queries including symbols, wildcards, filters, and operators.

l From the Search Results page:

n View a preview of the content.

n Download content.

n Recover content.

n Review the size of files or directories.

For comprehensive information about Search, refer to the Search documentation set.

Note: To take full advantage of Data Protection Central capabilities, it is recommended that all systems that are configured in Search also be configured in Data Protection Central.

Report capabilities Data Protection Central provides the capability for you to run 11 of the most used Data Protection Advisor reports for Avamar, NetWorker, and Data Domain systems.

Data Protection Central reporting features require you to have Data Protection Advisor in the environment. For more information about Data Protection Advisor, refer to the Data Protection Advisor documentation set.

You can run, and then view these reports directly in the Data Protection Central user interface. You can also specify the reporting period for these reports within the Data Protection Central interface.

Note: To take full advantage of Data Protection Central capabilities, it is recommended that all systems that are configured in Data Protection Advisor also be configured in Data Protection Central.

User Interface Learn about the components of the Data Protection Central user interface.

Header The header includes the following components:

l Active Filter button: This button enables you to filter the information that appears on a page by one or more systems, groups, or tags. The Active Filter button appears only on pages where you can filter information.

Overview

16 Dell EMC Data Protection Central Administration Guide

l User menu: This menu enables you to change the password or log out of Data Protection Central.

l About button: This button enables you to view Data Protection Central version information.

Figure 1 Header

View version information About this task

Click the following button to see details about the Data Protection Central version:

Figure 2 About button

A dialog box appears and displays Data Protection Central version information.

User menu The User menu provides the capability for you to perform user tasks.

To perform the following user tasks, use the User menu:

l Change the password of the local Data Protection Central administrator user (administrator@dpc.local).

Note: If an external LDAP or AD user is logged in to the Data Protection Central environment, change password is not supported.

l Log out of the user interface.

Figure 3 User menu

Change password Data Protection Central provides the capability for you to change the local administrator user password.

About this task

The password must meet the following requirements:

l A minimum length of 9 characters.

l A maximum length of 15 characters.

Overview

Dell EMC Data Protection Central Administration Guide 17

l At least one lowercase character.

l At least one uppercase character.

l At least one number.

l At least one of the following special characters: ! @ # $ % ^ & * ( ) - _

Procedure

1. In the User menu, click the down-arrow.

2. Select Change Password.

The Change Password dialog box appears.

3. Type the current password.

4. Type the new password.

5. To confirm that the new password was typed correctly, type the new password again.

6. Click CHANGE PASSWORD.

Log out of Data Protection Central When you are not using Data Protection Central, it is recommended that you log out.

Procedure

1. In the User menu, click the down-arrow.

2. Select Log out.

The Confirm dialog box appears.

3. Click LOG OUT.

Left menu The left menu provides the capability for you to browse the user interface.

From the left menu, you can access the following Data Protection Central features:

l Dashboard

l Health

l Alerts

l Capacity

l Asset Activities

l Job Activities

l System Management

l Asset Inventory

l Reports

l Audit

l Search and Recovery

Pages Data Protection Central presents information in dashboards and detail pages.

Dashboard pages provide at a glance insight into operational behavior.

Overview

18 Dell EMC Data Protection Central Administration Guide

Detail pages display focused information and provide the capability for you to perform Data Protection Central tasks.

Master and Detail panes Most Data Protection Central pages are composed of a Master and Detail pane.

The Master pane appears on the left side of a page and displays information in a table format. The Detail pane appears on the right side of a page and displays additional information for a selected row in a table. The Detail pane may also include buttons that you can use to perform tasks that are specific to the selected row in the table.

Changing dashboards Click the Dashboard drop-down list to select a different dashboard.

Filtering Data Protection Central includes filtering capabilities. Filtering allows you to customize the information that appears.

The following filter types are available for you to use:

l Column filters: Appear in table headers.

l Domain Filter: Appears in the Policies, Retentions, Schedules, and Datasets pages for Avamar only.

l Active Filter: Appears in the user interface header.

l Asset Filter: Appears as a search bar on the Asset Inventory page.

l Widget Filter: Appears in widgets on the dashboard.

Column filters

Column filters can be used to filter the information that appears in table columns. Depending on the table column, You can specify one of the following options:

l All Available

l Last Hour

l Last 24 hours

l Last 7 days

l Custom (specific date-and-time range)

Domain Filter

The Domain Filter can be used to select the domains that you want to view in the Policies, Retentions, Schedules, and Datasets pages for Avamar only. When adding a policy, retention, schedule or dataset, the domain filter also determines which domain the policy, retention, schedule or dataset is added in.

Asset Filter

The Asset Filter can be used to filter assets listed on the Asset Inventory page. The Asset Filter search bar enables you to filter assets using a search phrase such as an asset tag, operating system, plugin, or asset name.

Overview

Dell EMC Data Protection Central Administration Guide 19

Active Filter

The Active Filter can be used to filter by system or system group (one or more). On the Asset Inventory and Asset Activities pages, you can use the Active Filter to filter by asset tags.

The Active Filter appears in on the following pages:

l Health

l Alerts

l Capacity

l Job Activities

l Asset Activities

l Asset Inventory

To filter certain items with the Active Filter, move one or more systems or system groups to the Filtered By pane.

When the Active Filter is enabled, a white filter icon appears enclosed in a circle in the header

Widget Filter

The Widget Filter can be used to refine the information that appears in a widget.

All types of widgets include a Widget Filter that enables you to filter the information reported in that widget by time range, system, system groups, or, for asset specific widgets, by asset tags.

Several widgets allow you to filter by time range. You can specify one of the following options:

l All Available

l Last Hour

l Last 24 hours

l Last 7 days

The Activities Trend widget enables you to view a historical 7-day trend of activities by using the Days Ago filter. For example, if you want to see the 7-day activity trend from 30 days ago, select Days Ago, and use the slider to select 30. To drill down to a data grid with more details, select a point in the graph.

The Activities Count and Activities Trend widgets allow you to choose to view activities information at the job or asset level. Also, these widgets allow you to pick whether to display backup activities, replication activities, or both.

When you use a dashboard widget to access a page, the information that is displayed is automatically filtered based on the widget filter settings.

Any active filters that are applied to a page, are listed in the filtered by section that appears at the top of the table.

Monitoring data is stored for 90 days. The All Available option is limited to data stored within the last 90 days.

Overview

20 Dell EMC Data Protection Central Administration Guide

Sort information that is displayed in tables Information that is displayed in tables can be sorted in ascending or descending order.

About this task

To sort information, click a column heading.

After you click the column heading, an arrow appears. An up-arrow indicates that the column data is sorted in ascending order. A down-arrow indicates that the column data is sorted in descending order.

Dialog boxes Dialog boxes can appear with information about a specific task. Dialog boxes can also appear for questions that require a decision.

Notification bar To inform you of completed events or to alert you of issues that may require attention, notifications may appear in a bar across the top of the Data Protection Central interface.

Figure 4 Example notification

Overflow button Overflow buttons can appear within the user interface. When you click an Overflow button, a menu of available operations appears.

Figure 5 Overflow button

Overview

Dell EMC Data Protection Central Administration Guide 21

Overview

22 Dell EMC Data Protection Central Administration Guide

CHAPTER 2

Using Dashboards

Learn about using Data Protection Central dashboards.

This chapter contains the following sections:

l Dashboards overview......................................................................................... 24 l Dashboard widgets ............................................................................................24 l Drill down pages................................................................................................. 27 l Managing dashboards........................................................................................ 27 l Editing widgets ................................................................................................. 29

Dell EMC Data Protection Central Administration Guide 23

Dashboards overview Data Protection Central dashboards provide at-a-glance insight into systems and activities.

Dashboard widgets include key performance indicators that display the following types of system information:

l Backup Activities

l Replication Activities

l Trends

l Assets

l Capacity

l Health

l Alerts

From dashboard widgets, you can drill down into specific areas of interest.

All dashboard widgets have customizable settings. The customizable settings vary based on each widget. Certain widgets allow you to change the view, activity type, and time range. All widgets include a widget filter that you can use to filter by systems and groups. The widget filter also can filter by asset tags when available for a widget .

You can customize the dashboard layout to your preference by changing the widget type. Individualized dashboard settings are stored for each user. You can add, edit, and delete custom dashboards. Each user can create and store up to 20 dashboards.

Dashboard widgets Data Protection Central dashboards are composed of widgets that include a key performance indicator (KPI) or multiple KPIs. KPIs provide the capability for you to measure the objectives and performance of the systems that are configured in Data Protection Central.

Activity Counts widget The Activity Counts widget lists the number of recent activities and their status.

By default, there are two Activity Counts widgets on the dashboard: the Assets | Backups & Replications widget and the Jobs | Backups & Replications widget.

The Activity Counts widget shows the following information:

l The total percentage of activities that completed successfully.

l A donut chart comparing the activity status counts.

l A list of the status counts:

n The number of activities that successfully completed.

n The number of activities that failed.

n The number of activities that completed with exceptions.

n The number of running activities.

n The number of pending activities.

Using Dashboards

24 Dell EMC Data Protection Central Administration Guide

You can use the overflow menu to customize the Activity Counts widget, including changing the view, activity type, and time period being reported. You can also filter by system, group, or asset tag (if the display includes assets).

Activity Trend widget The Activity Trend widget shows trends in activity status over a period of the past seven days.

The Activity Trend widget shows a line graph that measures the completion status of activities over the past week.

The default Activity Trend widget is the Asset | Backups & Replications Trend widget. You can customize the widget with options from the overflow menu. These options include changing the view, activity type, and time period being reported. You can also view a historical 7-day trend of activities by using the Days Ago filter. You can filter by system, group, or asset tag (if the display includes assets).

Click View All to visit the Asset Activities or Job Activities page, according to the view that the widget is set to.

You can use the overflow menu to customize the Activity Trends widget,

Assets Summary widget The Assets | Summary widget reports the completed asset activities for any protection type (backup or replication).

The Assets | Summary widget is divided into two panes:

l The left pane displays the total number of virtual machine assets, including the number of assets with recent successful backup and replication activities during the configured time range.

l The right pane displays the total number of other assets, including the number of assets with recent successful backup and replication activities during the configured time range.

For example, if a client's SQL server is backed up, and the file system is also backed up, the Backed Up number for that client is incremented by 2. However, if the client's SQL server is backed up, and the file system is not backed up, the Backed Up number for that client is incremented by 1.

Click View All to view all assets on the Asset Inventory page.

You can use the overflow menu to change the time range being reported. You can also filter by system, group, or asset tag (if the display includes assets).

Assets Top Offenders widget The Assets | Top Offenders widget lists the total number of assets with three or more consecutive backup or replication failures.

This widget lists the top three systems with the most consecutive failures. The widget lists the following information for each of these systems:

l The name of the system.

l The date of the most recent failed activity.

l The number of consecutive failures.

The Assets | Top Offenders widget lists the total number of assets with three or more consecutive backup or replication failures.

Click View All to visit the Asset Inventory page.

Using Dashboards

Dell EMC Data Protection Central Administration Guide 25

Click an asset in the list to view the Asset Activities page filtered by that asset.

You can use the overflow menu to change the time range being reported. You can also filter by system, group, or asset tag (if the display includes assets).

Alerts Summary widget The Alerts | Summary widget shows a summary of active alerts for systems configured in Data Protection Central.

The Alerts | Summary widget lists the following summary information:

l Number of error alerts

l Number of warn alerts

l Number of info alerts

The Alerts | Summary widget also lists the three most recent alerts.

Click View All to visit the Alerts page.

You can use the overflow menu to filter by system, group, or asset tag (if the display includes assets).

Storage Capacity Top Utilization widget The Storage Capacity | Top Utilization widget shows a summary of the Data Domain and Avamar systems that are using the most storage.

The Storage Capacity | Top Utilization widget lists the top three systems using the highest percentage of their capacity. The widget lists the following information for each of these systems:

l The system name.

l A bar representing the storage usage.

l The percentage of available storage used.

l The amount of storage used and the amount of storage available.

The Exceeded Threshold count shows the total number of systems exceeding 80% or more of their storage capacity.

Click View All to visit the Capacity page.

You can use the overflow menu to filter by system, group, or asset tag (if the display includes assets).

Storage capacity summary widget The Storage Capacity | Summary widget shows a summary of the storage capacity usage for Data Domain and Avamar systems configured in Data Protection Central.

The Storage Capacity | Summary widget lists the following information:

l Used: Amount of storage used.

l Available: Amount of storage available.

l Total: Total amount of storage, including both used and available.

The Storage Capacity | Summary widget also shows a capacity bar that represents the total storage usage.

Click View All to visit the Capacity page.

Using Dashboards

26 Dell EMC Data Protection Central Administration Guide

You can use the overflow menu to filter by system, group, or asset tag (if the display includes assets).

Health summary widget The Health | Summary widget shows a health status summary of systems configured in Data Protection Central.

The Health | Summary widget lists the following summary information:

l Number of systems that are not reporting

l Number of unhealthy systems

l Number of healthy systems

The Health | Summary widget also lists the three most unhealthy systems with a health bar that compares the number of healthy and unhealthy key performance indicators (KPIs).

Click View All to visit the Health page.

You can use the overflow menu to filter by system, group, or asset tag (if the display includes assets).

Drill down pages Drill down pages cover a specific area of interest, for example, alerts, capacity, health, and activities.

To access a specific drill down page, click a link inside the dashboard widget. For example, to view error alerts, click the value of the error alert type inside the Alerts Summary widget. The drill down page is filtered by the widget settings. Each drill down page Master pane displays information in a table. You can view additional information about a specific row in a table in the Detail pane that appears on the right side of the user interface. In the Detail pane, you may be able to perform additional actions.

Managing dashboards Each user can have up to 20 dashboards in Data Protection Central.

Add a dashboard Data Protection Central provides the capability for you to add a dashboard.

Procedure

1. In the Dashboard, click:

The Add Dashboard dialog box appears.

2. Type a name for the dashboard.

3. (Optional) To set this dashboard as the default dashboard, select Set as default dashboard.

4. Click ADD DASHBOARD.

Using Dashboards

Dell EMC Data Protection Central Administration Guide 27

Editing a dashboard Data Protection Central provides the capability for you to edit a dashboard.

To accomplish the following tasks, edit a dashboard:

l Rename a dashboard.

l Set a dashboard to be the default dashboard.

l Reset widgets to the default settings.

Rename a dashboard You can specify a new name for a dashboard.

Procedure

1. Select the dashboard that you want to rename.

2. Click .

The Edit Dashboard dialog box appears.

3. In the Dashboard Name field, type a new name.

4. Click SAVE.

Set a dashboard to be the default dashboard To set a dashboard to be the initial dashboard that is displayed when you log in to Data Protection Central, set the dashboard to be the default dashboard.

Procedure

1. Select the dashboard that you want to be the default dashboard.

2. Click .

The Edit Dashboard dialog box appears.

3. Select Set as default dashboard.

4. Click SAVE.

Reset dashboard widgets to default settings Resetting widgets eliminates any filtering selections and reverts the widget to the default setting.

Procedure

1. Select the dashboard that you want to edit.

2. Click .

The Edit Dashboard dialog box appears.

3. Select Reset widgets back to defaults.

4. Click SAVE.

The dashboard is reset to the default settings.

Using Dashboards

28 Dell EMC Data Protection Central Administration Guide

Delete a dashboard If a dashboard is no longer required, you can delete the dashboard.

About this task

Note: You cannot delete a dashboard that has been set as the default dashboard. However, you can set another dashboard to be the default dashboard, and then return to the former default dashboard and delete it.

Procedure

1. Open the dashboard that you want to delete, and then click:

A dialog box appears and displays the following message:

Are you sure you want to delete " " dashboard? 2. Click DELETE.

The dashboard is deleted and the default dashboard is displayed.

Editing widgets To customize the dashboard, you can edit and filter widgets to show the information you want.

Change the widget type Change widget types to customize or rearrange the dashboard.

Procedure

1. In the upper right corner of the widget, click the overflow button:

2. Select Widget Type.

A menu appears that displays all of the available widget type options.

3. Select one of the following widget types:

l Assets | Backups & Replications

l Assets | Backups & Replications Trend

l Alerts | Summary

l Assets | Top Offenders

l Assets | Summary

l Jobs | Backups & Replications

l Jobs | Backups & Replications Trend

l Health | Summary

l Storage Capacity | Summary

l Storage Capacity | Top Utilization

Using Dashboards

Dell EMC Data Protection Central Administration Guide 29

Results

The widget changes to the new type.

Edit the reporting time range About this task

Note: The reporting period data only reflects the data that exists in Data Protection Central. Any alerts or activities that occurred before the system was added to Data Protection Central do not appear.

Procedure

1. In the upper right corner of the widget, click the overflow button:

2. Select Time Range.

A menu appears that displays all of the available reporting period options.

3. Select one of the following reporting period options:

l All Available

l Last Hour

l Last 24 Hours

l Last 7 Days

Results

The widget updates with the new reporting period setting.

Edit the activity view Certain widgets enable you to change the activity view being reported to either jobs or assets.

About this task

You can change the activity view for the following widgets:

l Assets | Backups & Replications

l Jobs | Backups & Replications

l Assets | Backups & Replications Trend

Procedure

1. In the upper right corner of the widget, click the overflow button:

2. Select View.

A menu appears that displays all of the available activity level view options.

3. Select one of the following activity level options:

l Assets

l Jobs

Using Dashboards

30 Dell EMC Data Protection Central Administration Guide

Results

The widget updates with the new activity view setting.

Edit the activity type Certain widgets enable you to change the activity type being reported to either backups or replications.

About this task

You can change the activity type for the following widgets:

l Assets | Backups & Replications

l Jobs | Backups & Replications

l Assets | Backups & Replications Trend

Procedure

1. In the upper right corner of the widget, click the overflow button:

2. Select Activity Type.

A menu appears that displays all of the available activity type options.

3. Select one of the following activity type options:

l Backups

l Replications

l Backups & Replications

Results

The widget updates with the new activity type setting.

Refresh the dashboard About this task

To manually refresh the dashboard, click the button.

Filter systems or assets in a dashboard widget The default widget scope setting is to display information for all systems and assets. To reduce the scope to a system, system group, or asset tag level, perform the following procedure.

Procedure

1. In the upper right corner of the widget, click the overflow button:

2. Select Filter.

The Widget Filter dialog box appears.

3. To add systems, system groups, or asset tags to the filter, perform the following steps:

Using Dashboards

Dell EMC Data Protection Central Administration Guide 31

a. Select one or more options on the Available pane.

To narrow the amount of options listed in the Available pane, use the search bar.

b. Click:

The selections are added to the filter.

4. To remove selections from the filter, perform one of the following action sequences:

l To clear all selections from the filter, click:

l To remove certain selections from the filter, perform the following steps:

n Select one or more selections in the Filtered By pane.

n Click:

The selections are removed from the filter

5. Click APPLY.

The widget refreshes and displays only information for the selections.

Using Dashboards

32 Dell EMC Data Protection Central Administration Guide

CHAPTER 3

Monitoring System Health

Learn how to monitor system health in Data Protection Central.

This chapter contains the following sections:

l Monitoring health status.................................................................................... 34 l Managing alerts..................................................................................................38 l Monitoring system capacity................................................................................41

Dell EMC Data Protection Central Administration Guide 33

Monitoring health status To view the health status of systems that are configured in Data Protection Central, visit the Health page.

The Health page lists all of the systems in a table with basic health summary information.

To view additional details about the health of a system, select a system in the table. The additional information for the selected system appears in the Detail pane.

Reading the Health page The table on the Health page lists the following basic system health status information.

System Name

The name that was specified to identify the system when it was added to Data Protection Central.

Version

The system version.

Health

A status that indicates the health of the system in Data Protection Central. Criteria that determine system health status on page 34 provides the criteria used for each type of system. The status types that can be displayed are as follows:

l Good: If the criteria that are used to determine the health of a system are successful (healthy), the system health status is Good.

l Not Reporting: A system health status is updated to Not Reporting when Data Protection Central cannot communicate with the system.

l Unhealthy: If any of the criteria that are used to determine the health of a system are not successful, the system health status is updated to Unhealthy.

Criteria that determine system health status Data Protection Central tracks criteria to determine the health of each system.

Avamar health status criteria

If an Avamar system meets the following criteria the health status for the system is updated to Good:

l The communication between Data Protection Central and the Avamar system is active and the Avamar system is able to report information to Data Protection Central.

l The system is able to report activities information to Data Protection Central.

l The capacity of the storage system is less than or equal to 80%.

l The system has no errors or warning alerts.

l A successful garbage collection for the system has occurred in the last 24 hours.

l A successful checkpoint was taken in the last 24 hours.

l A successful HFS checkpoint validation has occurred in the last 24 hours.

Monitoring System Health

34 Dell EMC Data Protection Central Administration Guide

l The license for the system is valid.

l The SSO connection status is good.

l The system information configured on the System Management page is completed with all of the required connection details.

NetWorker health status criteria

If a NetWorker system meets the following criteria the health status for the system is updated to Good:

l The communication between Data Protection Central and the NetWorker system is active and the NetWorker system is able to report information to Data Protection Central.

l The system is able to report activities information to Data Protection Central.

l The system has no errors or warning alerts.

l The license for the system is valid.

l The SSO connection status is good.

l The system information configured on the System Management page is completed with all of the required connection details.

Data Domain health status criteria

If a Data Domain system meets the following criteria the health status for the system is updated to Good:

l The communication between Data Protection Central and the Data Domain system is active and the Data Domain system is able to report information to Data Protection Central.

l The capacity of the storage system is less than or equal to 80%.

l The system has no errors or warning alerts.

l The SSO connection status is good.

l The system information configured on the System Management page is completed with all of the required connection details.

Reading the detailed health summary pane To view more detailed health information for a system, select the system in the Health table. The Detail pane lists detailed health summary information for the system.

Avamar health information on the Detail pane Select a row in the Master pane to display additional information about the health of a system. The following information is listed in the Detail pane for Avamar system health.

Health Summary

A summary checklist of the components that are used to determine the health of the Avamar system in Data Protection Central. Above the checklist, the Last Update field lists the date and time of the most recent communication with the Avamar system. The components include:

l Reporting If the Reporting component shows an X, to reactivate reporting, click Reporting, and then click REACTIVATE.

l Capacity

Monitoring System Health

Dell EMC Data Protection Central Administration Guide 35

l Alerts

l Garbage Collection

l Checkpoint

l Checkpoint Validation

l License

l SSO

Note: The SSO health status reflects the Data Protection Central SSO connection status rather than the status of the remote system. Therefore, the SSO health may be reported as healthy when the monitored system is out of sync.

The Data Protection Central Security Configuration Guide provides information on which versions of Avamar are supported with SSO.

If the SSO component is broken, to reregister single sign on, click SSO and then click REREGISTER.

l Connection Information

A check mark represents success. An X represents failure.

Click a component for more information about the status.

Capacity

A summary of the storage availability and usage, including the following components:

l Used: The amount of storage that is used, shown in GB and as a percentage.

l Available: The amount of storage that is available in GB.

l Total Capacity: The total amount of used and available storage.

System Details

A summary of the following information:

l Last Garbage Collection: Reports whether garbage collection was successful in the last 24 hours.

l Last HFS Checkpoint: Reports whether there was an HFS checkpoint in the last 24 hours.

l Last HFS Checkpoint Validation: Reports whether HFS checkpoint validation occurred in the last 24 hours.

License Information

A summary of the licensing information, including the following components:

l License Status: Reports whether the license status is valid or invalid.

l License Expiration: Reports when the license expires.

NetWorker health information on the Detail pane Select a row in the Master pane to display additional information about the health of a system.

The following information is listed in the Detail pane for NetWorker system health.

Monitoring System Health

36 Dell EMC Data Protection Central Administration Guide

Health Summary

A summary checklist of the components that are used to determine the health of the NetWorker system in Data Protection Central. Above the checklist, the Last Update field lists the date and time of the most recent communication with the NetWorker system. The components include:

l Reporting

l Activities Reporting

l Alerts

l License

l SSO

Note: The SSO health status reflects the Data Protection Central SSO connection status rather than the status of the remote system. Therefore, the SSO health may be reported as healthy when the monitored system is out of sync.

The Data Protection Central Security Configuration Guide provides information on which versions of NetWorker are supported with SSO.

If the SSO component is broken, to reregister single sign on, click SSO and then click REREGISTER.

l Connection Information

Click on a component for more information about the status.

License Information

A summary of the licensing information, including the following components:

l License Status: Status on whether the license is valid or invalid

l License Details: Details on the license type

l License unit of measure: The size of the license

Data Domain health information on the Detail pane Select a row in the Master pane to display additional information about the health of a system.

The following information is listed in the Detail pane for Data Domain system health.

Health Summary

A summary checklist of the components that are used to determine the health of the system in Data Protection Central. Above the checklist, the Last Update field lists the date and time of the most recent communication with the Data Domain system. The components include:

l Reporting

l Capacity

l Alerts

l SSO

Note: The SSO health status reflects the Data Protection Central SSO connection status rather than the status of the remote system.

Monitoring System Health

Dell EMC Data Protection Central Administration Guide 37

Therefore, the SSO health may be reported as healthy when the monitored system is out of sync.

The Data Protection Central Security Configuration Guide provides information on which versions of Data Domain are supported with SSO.

The SSO status is displayed in the Data Protection Central health summary only if SSO is enabled. To support SSO from Data Protection Central to the Data Domain System Manager, you must enable SSO from the Data Domain System Manager (6.2.0.10 and later). For instructions to configure SSO authentication, enable SSO, and configure SSO user groups, refer to the Data Domain Operating System Version 6.2 Administration Guide (Rev 02 and later). By default, the user group is dpc_admin and the domain name is dpc.local (unless using LDAP).

If the SSO component is broken, to reregister single sign on, click SSO and then click REREGISTER.

l Connection Information

Capacity

A summary of the storage availability and usage, including the following components:

l Used: The amount of storage that is used, shown in GB and as a percentage.

l Available: The amount of storage that is available in GB.

l Total Capacity: The total amount of used and available storage.

Data Protection Advisor and Search system health information Data Protection Central does not collect health attribute information or generate a health status for Search and Data Protection Advisor systems.

As a result, Data Protection Central reports Search and Data Protection Advisor system health status as None.

The system version for Search and Data Protection Advisor is retrieved only when you add the systems to Data Protection Central. If you upgrade either software, Data Protection Central does not update the version number. As a workaround, to update the version number displayed in Data Protection Central, edit the Search or Data Protection Advisor system on the System Management page.

Managing alerts To view and manage alerts for Data Protection Central and all systems, visit the Alerts page.

To update the alerts table, click Refresh.

Note: Alerts that have been acknowledged in a system management console, such as Avamar Administrator or Data Domain Management Console, are removed from Data Protection Central.

Reading alerts Alerts are listed in a table on the Alerts page.

The following information is listed for each alert.

Monitoring System Health

38 Dell EMC Data Protection Central Administration Guide

System Name

The name that was specified when the system was added to Data Protection Central.

Level

The type of alert in Data Protection Central. The level types that can be displayed are as follows:

l Error

l Warn

l Informational

To learn how Data Protection Central maps alert levels from different systems, refer to Mapping system alert levels on page 39.

Category

The category of the alert.

Created Date

The date on which the alert was created.

Message

A description for the alert.

Mapping system alert levels Data Protection Central maps alerts from systems to three alert levels: Error, Warning, or Informational.

Mapping Avamar alert levels to Data Protection Central

The following table shows what level Avamar alerts are reported as in Data Protection Central.

Table 5 Avamar alert levels in Data Protection Central

Avamar alert level Data Protection Central alert level

Warning Warn

Error Error

Mapping NetWorker alert levels to Data Protection Central

The following table shows what level NetWorker alerts are reported as in Data Protection Central.

Table 6 NetWorker alert levels in Data Protection Central

NetWorker alert level Data Protection Central alert level

Alert Error

Emergency Error

Critical Error

Warning Warn

Monitoring System Health

Dell EMC Data Protection Central Administration Guide 39

Table 6 NetWorker alert levels in Data Protection Central (continued)

NetWorker alert level Data Protection Central alert level

Waiting Warn

All other alert types Informational

Mapping Data Domain alert levels to Data Protection Central

The following table shows what level Data Domain alerts are reported as in Data Protection Central.

Table 7 Data Domain alert levels in Data Protection Central

Data Domain alert level Data Protection Central alert level

Alert Error

Critical Error

Emergency Error

Error Error

Warning Warn

Debug Informational

Info Informational

Notice Informational

Dismissing alerts Dismiss health alerts to clear the alerts from Data Protection Central and change the system Alerts health component status to Good.

Dismissing alerts will only remove the alerts from being displayed in Data Protection Central and does not acknowledge or remove the alerts from the monitored systems. If the underlying issue still exists on the monitored system, the alert may reappear in Data Protection Central.

Note: Fixing the underlying issue and acknowledging the alerts on the monitored system removes the alert from Data Protection Central.

Dismiss alerts Procedure

1. In the Left menu, select Alerts.

2. Select the alerts that you want to dismiss:

l To dismiss individual alerts, click the box beside one or more alerts.

l To dismiss all alerts, click the box in the header row.

3. Click DISMISS.

Results

The selected alerts are removed from Data Protection Central. A Dismiss alerts action appears on the Audit page.

Monitoring System Health

40 Dell EMC Data Protection Central Administration Guide

Monitoring system capacity To view the capacity state of all Avamar and Data Domain systems that are configured in Data Protection Central, visit the Capacity page.

Capacity monitoring can keep you aware of unexpected data growth that may cause downstream failures.

Note: Capacity information is not available for NetWorker systems because NetWorker does not have integrated protection storage.

To view additional information about a system, select a system in the Capacity table. The additional information for the selected system appears in the Detail pane.

Reading the system capacity table The table on the Capacity page lists the following basic system capacity information.

System Name

A name that was manually specified to help identify the system.

Utilization

The percentage of the system storage that is used.

Usage

The amount of the storage that is used.

Available

The amount of storage that is available.

Total Capacity

The total amount of storage.

Reading the detailed system capacity pane To view more detailed capacity information for a system, select the system in the Capacity table. The Detail pane lists detailed capacity information for the system.

Avamar detailed capacity pane

When you select an Avamar system on the Capacity page, the Detail pane lists the following Avamar system capacity information.

Health Summary

Displays the last date and time the database was updated or displays Not Reporting if the system is not reporting. Note that capacity data might be outdated if the system is in the Not Reporting state.

Capacity

A summary of the capacity usage, including the following components:

l Used: The amount of the storage that is used and the percentage of storage used.

l Available: The amount of storage that is available.

l Total Capacity: The total amount of used and available storage.

Monitoring System Health

Dell EMC Data Protection Central Administration Guide 41

l Metadata Used: The percentage of the storage that is used for metadata.

Forecast

The forecasted number of days until the system storage becomes full.

Data Domain detailed capacity pane

When you select a Data Domain system on the Capacity page, the Detail pane lists the following Data Domain system capacity information.

Health Summary

Displays the last date and time the database was updated or displays Not Reporting if the system is not reporting. Note that capacity data might be outdated if the system is in the Not Reporting state.

Capacity

A summary of the capacity usage, including the following components:

l Usage: The amount of the storage that is used.

l Available: The amount of storage that is available.

l Total Capacity: The total amount of used and available storage.

MTrees

The status and usage of each MTree. The following components are reported for each MTree in the Data Domain system:

l The name of the MTree.

l Usage: The amount of storage that is used on the MTree.

l Status: The status of the MTree.

Monitoring System Health

42 Dell EMC Data Protection Central Administration Guide

CHAPTER 4

Monitoring Activities

This chapter contains the following sections:

l Activities overview............................................................................................. 44 l Monitoring job activities .................................................................................... 44 l Monitoring asset activities................................................................................. 48

Dell EMC Data Protection Central Administration Guide 43

Activities overview Data Protection Central Activities include system activities at the job and asset level.

System activity includes information about backup and replication activities for Avamar and NetWorker systems connected to Data Protection Central.

Note: NetWorker replication activities are not reported on the Asset Activities page because NetWorker does not perform replication at the level of individual assets.

Monitoring job activities To monitor backup and replication activities at the job level from all systems, visit the Job Activities page.

By default, the Master pane on the Job Activities page displays activities that started in the last 24 hours. Use the filter icon in the Started column to filter for jobs, as required. To view additional information about an activity, select the activity from the table on the Master pane. Additional details for the activity appears in the Detail pane.

For Avamar and NetWorker systems, you can view a list of clients that are associated with any activity.

For Avamar systems only, you can rerun backup and replication jobs.

NetWorker activity considerations

When any actions within a workflow have a status of Did not run, NetWorker Management Console reports the Completion status of the overall workflow as Succeeded.

However, Data Protection Central reports the status of the individual backup or replication actions that fail to run as Failed.

Reading the Job Activities page The table on the Job Activities page lists basic job information.

The following information is listed on the Job Activities page.

Activity Name

The name of the policy that the activity is associated with.

Note: If a backup or clone job is started using NetWorker commands through a command prompt and is not associated with a policy, then the activity name is reported as "manual" in Data Protection Central.

Type

The type of activity. The activity types that can be displayed are as follows:

l Backup

l Replication

Status

The status of the activity. The statuses that can be displayed are as follows:

l Completed

Monitoring Activities

44 Dell EMC Data Protection Central Administration Guide

l Failed

l Completed with exceptions

l Running

l Pending

System Name

The name that is defined in Data Protection Central.

Started

The date and time that the activity started. The values that can be displayed are as follows:

l All Available

l Last Hour

l Last 24 Hours

l Last 7 Days

l Custom (enables you to configure the date-and-time range)

Reading the detailed job activity pane To view more detailed information about a job, select the job in the Job Activities table. The Detail pane lists detailed information for the job activity.

Avamar activity information on the Detail pane Select a row in the Master pane to display additional information about an activity. The following information is listed in the Detail pane table for Avamar system activities.

Status

The activity status information. The following components are reported:

l Activity Name: The name of the activity.

l System Name: The name of the system.

l System Type: The type of system.

l Policy Type: The type of policy.

l Schedule: The type of schedule

Asset Activities

A summary of asset information. The following components are reported:

l Completed: The number of assets that completed.

l Failed: The number of assets that failed.

l With Exceptions: The number of assets that have exceptions.

l Running: The number of assets that are actively running.

l Pending: The number of assets that have a status of pending.

l Total: The total number of assets that are associated with the activity.

Monitoring Activities

Dell EMC Data Protection Central Administration Guide 45

Target

A summary of the target information for the activity. The following components are reported:

l Type: The storage target type for the activity. For backups, the target type is either Avamar or Data Domain.

For replication, the target type is Avamar replication.

l Hostname: The storage target hostname where the backup is stored. This column is reported for backup activities only.

l Total Size: The total size of all of the assets within the job.

Time

A summary of the time information for the activity. The following components are reported:

l Started: The date and time that the activity started.

l Ended: The date and time that the activity ended.

l Duration: The length of time the activity took to complete.

NetWorker activity information on the Detail pane Select an activity on the Activities page to display additional information about that activity.

The following information is listed in the Detail pane for NetWorker system activities.

Status

The status of the activity.

System Name

The name of the system.

System Type

The type of system.

Policy Type

The type of policy.

Activity Name

The name of the activity.

Workflow

The workflow the activity is part of.

Action

The type of action.

Savesets

A summary of saveset information for replication activities. Saveset information is not reported for backup activities. The following components are reported:

l Savesets Failed: The number of savesets that failed to be replicated.

l Savesets Active: The number of savesets that are active.

Monitoring Activities

46 Dell EMC Data Protection Central Administration Guide

l Savesets Completed: The number of savesets were successfully replicated.

l Savesets Pending: The number of savesets that have a status of pending replication.

l Number of Savesets: The number of savesets that are associated with the replication activity.

Assets

A summary of asset information for backup activities. Asset information is not reported for replication activities. The following components are reported:

l Completed: The number of assets that were successfully backed up.

l Failed: The number of assets that failed to be backed up.

l With Exceptions: The number of assets that have been backed up with exceptions.

l Running: The number of assets that are active.

l Pending: The number of assets that have a status of pending backup.

l Total: The number of assets that are associated with the backup activity.

Time

A summary of the time information for the activity. The following components are reported:

l Started: The date and time that the activity started.

l Ended: The date and time that the activity ended.

l Duration: The length of time the activity took to complete.

Rerun an Avamar job activity Data Protection Central provides the capability for you to rerun an Avamar activity from the Job Activities page.

About this task

You can rerun a failed activity from the top of the Detail pane by clicking Rerun Activity. To rerun any activity, including successful activities, perform the following procedure.

Procedure

1. In the Left menu, select Job Activities.

2. On the Master pane, select the row for the Avamar activity that you want to rerun.

3. Click the overflow menu:

4. Click Rerun Activity.

The activity runs and is added to a new row in the table.

Monitoring Activities

Dell EMC Data Protection Central Administration Guide 47

View job activities for a specific system Learn how to view job activities for a specific system.

Procedure

1. From the left menu, click System Management.

The System Management page appears.

2. In the row for the system, click the Overflow menu ( ).

3. Click View Job Activities.

Results

The Job Activities page appears, listing only the activities for the selected system.

Monitoring asset activities To monitor backup and replication activities at the asset level from all systems, visit the Asset Activities page.

By default, the Master pane on the Asset Activities page displays activities that started in the last 24 hours. Use the filter icon in the Started column to filter the activities, as required.

To view additional information about an activity, select the activity from the table on the Master pane. Additional details for the activity appears in the Detail pane.

Reading the Asset Activities page The table on the Asset Activities page lists basic job information.

The following information is listed on the Asset Activities page.

Asset Name

The name of the asset.

Type

The type of activity.

For Avamar, Data Protection Central reports backup and replication activities.

For NetWorker, Data Protection Central reports backup activities only.

Status

The status of the activity. The statuses that can be displayed are as follows:

l Pending

l Completed

l Failed

l Completed with exceptions

l Running

Protection Type

For Avamar, the type of plugin that the asset is associated with.

Monitoring Activities

48 Dell EMC Data Protection Central Administration Guide

For NetWorker, the Protection Type column lists the name of the NetWorker protection group.

Started

The date and time that the activity started.

Reading the detailed asset activity pane To view more detailed asset activity information, select the activity in the Asset Activities table. The Detail pane lists detailed information for the asset activity.

Avamar asset activity information on the Detail pane Select an activity on the Asset Activities page to view more details in the Detail pane.

The Detail pane lists the following information for Avamar asset activities:

Status

The status of the activity.

If the status is failed, to run the activity for the asset only, click RERUN ACTIVITY.

Status Message

The error message or code for the failure, if applicable.

This field appears only when the activity failed and an error message is available.

Activity Name

The name of the job activity that the asset activity is part of.

System Name

The name of the system that protects the asset.

System Type

The type of protection system.

Policy Type

The type of policy.

Time

A summary of the time information for the activity. The following components are reported:

l Started: The date and time that the activity started.

l Ended: The date and time that the activity ended.

Details

Additional details for the asset activity. The following components are reported:

l Backup Label: The Avamar backup label.

l Backup Number: The Avamar backup sequence number.

l Bytes Modified: The number of modified bytes in the activity.

l Bytes Processed: The number of bytes processed during the activity.

Monitoring Activities

Dell EMC Data Protection Central Administration Guide 49

l Bytes Modified Sent: The number of bytes modified that are sent to storage during the backup or replication activity.

l Expiration: The expiration date for the backup.

NetWorker asset activity information on the Detail pane

When you select a NetWorker activity on the Asset Activities page, the Detail pane lists the following information.

Note: When the NetWorker server data protection policy saves the NetWorker client file index. Data Protection Central reports a separate backup activity for each asset.

Status

The status of the activity.

Activity Name

The name of the job activity that the asset activity is part of.

System Name

The name of the system that protects the asset.

System Type

The type of protection system.

Time

A summary of the time information for the activity. The following components are reported:

l Started: The date and time that the activity started.

l Ended: The date and time that the activity ended.

Rerun an Avamar asset activity When an Avamar backup or replication activity fails for an asset, Data Protection Central provides the capability for you to rerun the activity at the asset level.

About this task

You can rerun a failed activity from the top of the Detail pane by clicking Rerun Activity. To rerun any activity, including successful activities, perform the following procedure.

Procedure

1. From the left menu, select Asset Activities.

2. On the Asset Activities page, select the row for the Avamar activity that you want to rerun.

3. Click , and then click Rerun Asset Activity.

The activity runs for the asset and is added to a new row in the table.

Monitoring Activities

50 Dell EMC Data Protection Central Administration Guide

View asset activities for a specific system Learn how to view asset activities for a specific system.

Procedure

1. From the left menu, click System Management.

The System Management page appears.

2. In the row for the system, click the Overflow menu ( ).

3. Click View Asset Activities.

Results

The Asset Activities page appears, listing only the activities for the selected system.

View activities for a specific asset Learn how to view activities for a specific asset.

Procedure

1. From the left menu, click Asset Inventory.

The Asset Inventory page appears.

2. Select the asset that you want to view activities for.

3. In the Detail pane, click VIEW ACTIVITIES.

Results

The Asset Activities page appears, listing only the activities for the selected asset.

View asset activities within a job Learn how to view activities within a job at the asset level.

Procedure

1. From the left menu, click Job Activities.

The Job Activities page appears.

2. Select the job that you want to view asset activities for.

3. In the Detail pane, beside Asset Activities, click VIEW.

Results

The Asset Activities page appears, listing only the asset activities within the job.

Monitoring Activities

Dell EMC Data Protection Central Administration Guide 51

Monitoring Activities

52 Dell EMC Data Protection Central Administration Guide

CHAPTER 5

Managing Systems

Learn about managing systems and groups in Data Protection Central.

This chapter contains the following sections:

l System management overview.......................................................................... 54 l Adding a system.................................................................................................54 l Edit a system..................................................................................................... 59 l Delete a system................................................................................................. 59 l Managing system groups................................................................................... 59

Dell EMC Data Protection Central Administration Guide 53

System management overview The System Management page provides the capability for you to add, edit, remove, and manage systems and groups in Data Protection Central.

The following list includes the system management capabilities that are available in Data Protection Central:

l Add, edit, and delete Avamar, NetWorker, Data Domain, Data Protection Advisor, and Search systems.

l Organize systems into groups, including the ability to add, edit, and delete groups.

l View system information.

l Launch the native management application for the system.

l For Avamar systems:

n View, add, edit, and delete policies, retentions, schedules, and datasets.

n Add clients and proxies to policies.

n Perform a backup of a policy.

l When an Avamar system is not reporting, you can reactivate messaging.

Adding a system Learn how to add a system to Data Protection Central.

Note: You can configure only one Search and Data Protection Advisor system with Data Protection Central at a time.

Add an Avamar system To use Data Protection Central to monitor and manage Avamar systems, add one or more Avamar systems.

Procedure

1. In the Left menu, select System Management.

2.

Click .

The Add System window appears.

3. On the Select System Type page, select Avamar, and then click Next.

4. On the Connection Information page, specify the following information:

l Name: Specify a name that helps identify the system.

l Hostname: Specify the fully qualified domain name (FQDN) of the Avamar system.

l Avamar Username: Specify the username of the Avamar system. For Avamar Administrator, the username is MCUser.

l Avamar Password: Specify the password for the Avamar system user interface.

l OS Root password: Specify the OS root password.

Managing Systems

54 Dell EMC Data Protection Central Administration Guide

5. (Optional) To specify optional fields, click Show optional fields, and then specify the following information, as required:

l Port: Specify the Avamar MCS port. The default value is 9443. To specify the default value, leave this field blank.

Note: When you add a system to Data Protection Central that uses a non-standard port, you must modify the Data Protection Central firewall to allow communication with that port. The Data Protection Central Security Configuration Guide provides instructions.

l Override MCGUI URL: Specify an alternate URL destination for the AVAMAR ADMINISTRATOR button. To override the AVAMAR ADMINISTRATOR link to direct to the AUI, type https:// /aui.

6. Click Next.

7. On the Certificate Verification page, to ensure that you are adding the correct system, verify that the certificate information being displayed matches the exact certificate on the Avamar system.

8. Once you have confirmed that the certificate information is correct, select Accept Certificate, and then click SAVE.

Data Protection Central does not validate the certificate and uses the certificate that you verify to connect with the system. If the remote system's certificate changes, Data Protection Central will refuse to connect with the system.

In this scenario, edit the system on the Data Protection Central System Management page to verify the new certificate details.

Add a NetWorker system To use Data Protection Central to monitor and manage NetWorker systems, add one or more NetWorker systems.

Procedure

1. In the Left menu, select System Management.

2.

Click

The Add System window appears.

3. On the Select System Type page, select NetWorker, and then click Next.

4. On the Connection Information page, specify the following information:

l Name: Specify a name that helps identify the system.

l Hostname: Specify the IP address or fully qualified domain name (FQDN) of the NetWorker server.

l Username: Specify the local NetWorker Authentication Service administrator username.

l Password: Specify the local NetWorker Authentication Service administrator password.

5. (Optional) To specify optional fields, click Show optional fields, and then specify the following information, as required:

Managing Systems

Dell EMC Data Protection Central Administration Guide 55

l Port: Specify the REST API port number. The default value is 9090. Note: When you add a system to Data Protection Central that uses a non-standard port, you must modify the Data Protection Central firewall to allow communication with that port. The Data Protection Central Security Configuration Guide provides instructions.

l NMC URL: Specify the NMC URL when NMC is installed on a server that is different from the NetWorker server. Type the URL in the following format: :// : /gconsole.jnlp

where:

n is either HTTP or HTTPS, depending on the connection type set up to access NMC.

n is the NMC server hostname or IP address.

n is the port number for the HTTP or HTTPS service. The default port number is 9000 for HTTP and 9090 for HTTPS.

l NWUI URL: Specify the URL when the NetWorker Management Web UI software is installed in a location that is different from the default location. Type the URL in the following format: https:// : /nwui

where:

n is the NetWorker Management Web UI server hostname or IP address.

n is the port number for the HTTPS service. The default port number is 9090.

6. Click Next.

7. On the Certificate Verification page, to ensure that you are adding the correct system, verify that the certificate information being displayed matches the certificate on the NetWorker system.

8. Once you have confirmed that the certificate information is correct, select Accept Certificate, and then click SAVE.

Data Protection Central does not validate the certificate and uses the certificate that you verify to connect with the system. If the remote system's certificate changes, Data Protection Central will refuse to connect with the system.

In this scenario, edit the system on the Data Protection Central System Management page to verify the new certificate details.

After you finish

If the NetWorker system is a NetWorker Virtual Edition system, perform the procedure described in Edit NetWorker Virtual Edition firewall settings to enable Data Protection Central to read jobs on page 107.

Add a Data Domain System Procedure

1. In the Left menu, select System Management.

2.

Click .

The Add System window appears.

Managing Systems

56 Dell EMC Data Protection Central Administration Guide

3. On the Select System Type page, select Data Domain, and then click Next.

4. On the Connection Information page, specify the following information:

l Name: Specify a name that helps identify the system.

l Hostname: Specify the Fully Qualified Domain Name (FQDN) of the Data Domain system.

l Username: Specify the Data Domain administrator username.

l Password: Specify the Data Domain administrator password.

5. Click Next.

6. On the Certificate Verification page, to ensure that you are adding the correct system, verify that the certificate information being displayed matches the certificate on the Data Domain system.

7. Once you have confirmed that the certificate information is correct, select Accept Certificate, and then click SAVE.

Data Protection Central does not validate the certificate and uses the certificate that you verify to connect with the system. If the remote system's certificate changes, Data Protection Central will refuse to connect with the system.

In this scenario, edit the system on the Data Protection Central System Management page to verify the new certificate details.

Add a Data Protection Advisor system To use the Data Protection Central reporting features, you must add a Data Protection Advisor system.

Procedure

1. In the Left menu, select System Management.

2.

Click .

The Add System dialog box appears.

3. On the Select System Type page, select Data Protection Advisor, and then click Next.

4. On the Connection Information page, specify the following information:

l Name: Specify a name that helps identify the system.

l Hostname: Specify the fully qualified domain name (FQDN) of the Data Protection Advisor system.

l Username: Specify the Data Protection Advisor Administrator username.

l Password: Specify the Data Protection Advisor Administrator password.

5. (Optional) To specify a non-default Data Protection Advisor port number, click Show optional fields, and then type the port number in the Port field.

Note: When you add a system to Data Protection Central that uses a non- standard port, you must modify the Data Protection Central firewall to allow communication with that port. The Data Protection Central Security Configuration Guide provides instructions.

Managing Systems

Dell EMC Data Protection Central Administration Guide 57

6. Click Next.

7. On the Certificate Verification page, to ensure that you are adding the correct system, verify that the certificate information being displayed matches the certificate on the Data Protection Advisor system.

8. Once you have confirmed that the certificate information is correct, select Accept Certificate, and then click SAVE.

Data Protection Central does not validate the certificate and uses the certificate that you verify to connect with the system. If the remote system's certificate changes, Data Protection Central will refuse to connect with the system.

In this scenario, edit the system on the Data Protection Central System Management page to verify the new certificate details.

Add a Search system To perform advanced search and recover operations, you must add a Search system.

Procedure

1. In the Left menu, select System Management.

2.

Click .

The Add System window appears.

3. On the Select System Type page, select Data Protection Search, and then click Next.

4. On the Connection Information page, specify the following information:

l Name: Specify a name that helps identify the Search system.

l Hostname: Specify the fully qualified domain name (FQDN) of the Search system.

l Username: Specify the Search Administrator username.

l Password: Specify the Search Administrator password.

5. (Optional) To specify optional fields, click Show optional fields, and then specify the following information, as required:

l Admin Rest API Port: Specify the Search REST API port. The default value is 448.

l Search UI Port: Specify the Search UI port. The default value is 443.

Note: When you add a system to Data Protection Central that uses a non- standard port, you must modify the Data Protection Central firewall to allow communication with that port. The Data Protection Central Security Configuration Guide provides instructions.

6. Click Next.

7. On the Certificate Verification page, to ensure that you are adding the correct system, verify that the certificate information being displayed matches the certificate on the Search system.

8. Once you have confirmed that the certificate information is correct, select Accept Certificate, and then click SAVE.

Data Protection Central does not validate the certificate and uses the certificate that you verify to connect with the system. If the remote system's

Managing Systems

58 Dell EMC Data Protection Central Administration Guide

certificate changes, Data Protection Central will refuse to connect with the system.

In this scenario, edit the system on the Data Protection Central System Management page to verify the new certificate details.

Edit a system After a system is added, you can edit the system details.

Procedure

1. In the Left menu, select System Management.

2. Select the system that you want to edit.

3.

Click .

The Edit System dialog box appears.

4. Edit the details for the selected system.

5. Click SAVE.

Delete a system If a system is no longer required, you can delete the system.

Procedure

1. In the Left menu, select System Management.

2. Select the system that you want to delete.

If required, you can select multiple systems.

3.

Click .

The Confirm Delete dialog box appears.

4. Click DELETE.

The system is removed.

After you delete a system, a deactivation activity message appears on the Audit page.

Managing system groups Data Protection Central includes capabilities to organize systems into groups.

You can use groups in Data Protection Central filters.

After a group is created, you can edit the group. When a group is no longer required, you can delete the group.

Managing Systems

Dell EMC Data Protection Central Administration Guide 59

Add a group To organize systems, you can use groups.

Procedure

1. In the Left menu, select System Management.

2. Click GROUPS.

The GROUPS page appears.

3.

Click

The Add Group dialog box appears.

4. In the Group Name field, type a name for the group.

5. To add systems to the group, perform the following steps:

a. Select one or more systems in the Available pane.

To narrow the amount of group or systems listed in the Available pane, use the search bar.

b. Click:

The systems are added to the group.

6. To remove systems from the group, perform one of the following action sequences:

l To clear all systems from the group, click:

l To remove certain systems from the group, perform the following steps:

n Select one or more systems in the Selected pane.

n Click:

The systems are removed from the group.

7. Click SAVE.

Edit a group If changes are required to a group, you can edit the group.

Procedure

1. In the Left menu, select System Management.

2. Click GROUPS.

The GROUPS page appears.

3. Select the group that you want to edit.

Managing Systems

60 Dell EMC Data Protection Central Administration Guide

4.

Click

The Edit Group window appears.

5. (Optional) Edit the Group Name.

6. To add systems to the group, perform the following steps:

a. Select one or more systems in the Available pane.

To narrow the amount of systems listed in the Available pane, use the search bar.

b. Click:

The systems are added to the group.

7. To remove systems from the group, perform one of the following action sequences:

l To clear all systems from the group, click:

l To remove certain systems from the group, perform the following steps:

n Select one or more systems in the Selected pane.

n Click:

The systems are removed from the group.

8. Click SAVE.

Delete a group If a group is no longer required, you can delete the group.

Procedure

1. In the Left menu, select System Management.

2. Click GROUPS.

The GROUPS page appears.

3. Select the group that you want to delete.

4.

Click

The Confirm Delete dialog box appears.

5. Click DELETE.

Managing Systems

Dell EMC Data Protection Central Administration Guide 61

Managing Systems

62 Dell EMC Data Protection Central Administration Guide

CHAPTER 6

Monitoring Assets

This chapter contains the following sections:

l Assets overview................................................................................................. 64 l Monitoring assets...............................................................................................64 l View assets for a specific system.......................................................................66 l Tag assets .........................................................................................................66 l Filter assets........................................................................................................67

Dell EMC Data Protection Central Administration Guide 63

Assets overview View and manage protected assets on the Asset Inventory page.

Assets are resources that are configured in an Avamar or NetWorker system. Data Protection Central discovers assets when you add an Avamar or NetWorker system.

The following list describes the different types of assets that Data Protection Central monitors:

l Hosts with a backup agent installed, including application, database, and file system agents.

l Hosts with Network Data Management Protocol (NDMP) data module installed. l Hosts that are located on a virtual machine protected by VM image backups.

Monitoring assets To view the discovered assets, visit the Asset Inventory page.

The Asset Inventory page lists all of the system assets in a table with basic summary information. To view additional details, select an asset in the table. The additional information for the selected asset appears in the Detail pane.

Reading the Assets Inventory page The table on the Asset Inventory page lists the following basic asset information.

Name

The name of the asset.

System Name

The name of the system that protects the asset.

Type

The type of asset. There are two asset types that Data Protection Central displays:

l Virtual Machine: An asset that is hosted on a virtual machine.

l Other: Any other type of asset, including filesystems, databases, and NDMP.

Last Backup

The timestamp of the most recent backup.

Recent Failures

The number of recent activities for the asset that failed. Once an activity successfully completes, this column is cleared.

Reading the detailed asset pane To view more detailed information for an asset, select the asset in the Asset Inventory table. The Detail pane lists detailed information for the asset.

Avamar detailed asset pane

When you select an Avamar asset on the Asset Inventory page, the Detail pane lists the following Avamar asset information.

Monitoring Assets

64 Dell EMC Data Protection Central Administration Guide

System Name

The name of system that protects the asset.

System Type

The type of system that protects the asset.

OS

The operating system that is installed on the asset.

Agent Version

The version of the agent on the asset. This field appears only for non-virtual machine type assets.

Domain

The domain that the asset is part of.

Recent Failures

The number of recent failures of backup or replication activities for the asset.

Under Recent Failures, the Last Failure component lists the date of the most recent failed activity.

The Recent Failures and Last Failure components are only listed when there are recent failures.

Tags

The tags that are applied to the asset.

Plugins

The plugins that are installed on the asset. The following information is reported:

l Last Backup: The date and time of the most recent backup.

l Protected By: The name of the policy that backs up the asset.

l Last Replication: The date and time of the most recent replication.

l Replicated By: The name of the policy that replicates the asset.

NetWorker detailed asset pane

When you select an NetWorker asset on the Asset Inventory page, the Detail pane lists the following NetWorker asset information.

System Name

The name of system that protects the asset.

System Type

The type of system that protects the asset.

Recent Failures

The number of recent failures of backup or replication activities for the asset.

Under Recent Failures, the Last Failure component lists the date of the most recent failed activity.

The Recent Failures and Last Failure components are only listed when there are recent failures.

Monitoring Assets

Dell EMC Data Protection Central Administration Guide 65

Tags

The tags that are applied to the asset.

Protection Groups

A list of the protection groups that the asset belongs to. The following information is reported:

l Last Backup: The date and time of the most recent backup.

l Protected By: The name of the policy that protects the asset.

l Save Sets: The save sets that are protected. To expand the list of save sets, click Save Sets.

View assets for a specific system Learn how to view asset activities for a specific system.

Procedure

1. From the left menu, click System Management.

The System Management page appears.

2. In the row for the system, click the Overflow menu ( ).

3. Click View Assets.

Results

The Asset Inventory page appears, listing only the assets for the selected system.

Tag assets Add asset tags to organize assets and enable custom filtering.

Procedure

1. From the left menu, click Asset Inventory.

The Asset Inventory page appears.

2. Select one or more assets that you want to tag.

To select all assets, click the checkbox in the table header.

The Detail pane lists the selected assets and the set of tags that are applied to the assets.

3. In the Detail pane, under Tags, type the tag name, and then press Enter.

The tag is added to all of the selected assets.

4. To delete a tag, click X.

Results

When you add an asset tag, the tag is added as an option to use in filtering information on certain pages and dashboard widgets.

Monitoring Assets

66 Dell EMC Data Protection Central Administration Guide

Filter assets Use the search bar on the Asset Inventory page to quickly filter assets.

Procedure

1. From the left menu, click Asset Inventory.

The Asset Inventory page appears.

2. In the search bar, type a search keyword.

Some types of keywords that you can use include a tag, asset name, system type, operating system, NetWorker group name, and Avamar plugin name.

The Assets Inventory page refreshes and lists only the assets that match the search keyword.

3. To clear the search filter, in the search bar, click x.

Monitoring Assets

Dell EMC Data Protection Central Administration Guide 67

Monitoring Assets

68 Dell EMC Data Protection Central Administration Guide

CHAPTER 7

Managing Avamar Protection Policies

This chapter contains the following sections:

l Overview of Avamar policies.............................................................................. 70 l Managing data protection policies for Avamar systems......................................70 l Run a backup policy............................................................................................77

Dell EMC Data Protection Central Administration Guide 69

Overview of Avamar policies Policies in Data Protection Central are rules for client backups that can be specified, named and then applied to one or more groups.

Data Protection Central policies include information about all policies, not just policies that were initiated or configured in Data Protection Central.

Policies include the following components:

l RetentionsRetentions in Data Protection Central are the policies that define the amount of time in which a set of data remains available for restore. Retention is a persistent and reusable policy that can be named and attached to multiple groups.

l SchedulesSchedules in Data Protection Central provide the ability to control the frequency and the start and end time of backups of clients in a group. A schedule is a persistent and reusable policy that can be named and attached to multiple groups.

l DatasetsDatasets in Data Protection Central are a policy that define a set of files, directories, and file systems for each supported platform that are included or excluded in backups across a group of clients. A dataset is a persistent and reusable policy that can be named and attached to multiple groups.

Managing data protection policies for Avamar systems For Avamar systems, Data Protection Central provides the capability for you to view, add, edit, and delete data protection policies.

You can also start an immediate backup using a policy.

View policies Data Protection Central provides the capability for you to view policies for an Avamar system.

Procedure

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab where a list of policies for the selected Avamar system are displayed.

Adding an Avamar policy Learn how to add an Avamar backup policy with Data Protection Central.

Add a backup policy Data Protection Central provides the capability for you to add a policy for an Avamar system.

Procedure

1. In the Left menu, select System Management.

Managing Avamar Protection Policies

70 Dell EMC Data Protection Central Administration Guide

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. (Optional) To change the domain where the policy will be created, select a different domain from the Domain drop-down list.

When you add a policy, the policy is created in the domain selected in the Domain drop-down list. By default, the root "/" directory is selected as the Domain.

5. Click ADD.

The Add Policy dialog box appears.

6. In the Information panel, specify information for the following fields, and then click NEXT:

l NameYou can specify any name that helps identify the policy.

l EnabledSpecify whether to enable the policy. The default is disabled.

l DatasetThe dataset that is to be associated with the policy.

l ScheduleThe schedule that is to be associated with the policy.

l RetentionThe retention that is to be associated with the policy.

In the Add Policy dialog box, the Domain field is read-only and maps to the domain specified on the System Management > Manage Policies page.

7. (Optional) In the Clients panel, select one or more clients to be associated with the policy.

To perform a search for clients and filter by the client domain and name, in the Search for clients... field, type search criteria.

8. Click NEXT.

9. (Optional) In the Proxies panel, select one or more proxies to be associated with the policy.

Note: The Auto Proxy Enabled checkbox is automatically selected. When this checkbox is selected, all proxies are automatically added to policies.

10. Click FINISH.

The page refreshes, a notification appears in the Notification bar that indicates the policy was successfully added, and in the list of policies, the new policy is displayed.

Add a retention Data Protection Central provides the capability for you to add a retention for an Avamar system.

Procedure

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

Managing Avamar Protection Policies

Dell EMC Data Protection Central Administration Guide 71

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. To open the RETENTIONS tab, click RETENTIONS.

5. (Optional) To change the domain where the retention will be created, select a different domain from the Domain drop-down list.

When you add a retention, the retention is created in the domain selected in the Domain drop-down list. By default, the root "/" directory is selected as the Domain.

6. Click ADD.

The Add Retention dialog box appears.

7. Specify the following information:

l NameYou can specify any name that helps identify the retention.

l Expiration Type

In the Add Retention dialog box, the Domain field is read-only and maps to the domain specified on the System Management > Manage Policies page.

If required, specify information for additional fields depending on the Expiration Type.

8. Click FINISH.

The page refreshes, a notification appears in the Notification bar that indicates the retention was successfully added, and in the list of retentions, the new retention is displayed.

Add a schedule Data Protection Central provides the capability for you to add a schedule for an Avamar system.

Procedure

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. To open the SCHEDULES tab, click SCHEDULES.

5. (Optional) To change the domain where the schedule will be created, select a different domain from the Domain drop-down list.

When you add a schedule, the schedule is created in the domain selected in the Domain drop-down list. By default, the root "/" directory is selected as the Domain.

6. Click ADD.

The Add Schedule dialog box appears.

7. Specify the following fields:

l NameYou can specify any name that helps identify the schedule.

Managing Avamar Protection Policies

72 Dell EMC Data Protection Central Administration Guide

l Type

In the Add Schedule dialog box, the Domain field is read-only and maps to the domain specified on the System Management > Manage Policies page.

The Timezone field is read-only. The default for this field is the local time zone of the user.

If required, specify information for additional fields depending on the selected Type.

8. If you did not specify On Demand for the Type field, specify a date for the following fields:

l Delay Until

l End After

9. Click FINISH.

The page refreshes, a notification appears in the Notification bar that indicates the schedule was successfully added, and in the list of schedules, the new schedule is displayed.

Add a dataset Data Protection Central provides the capability for you to add a dataset for an Avamar system.

Procedure

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. To open the DATASETS tab, click DATASETS.

5. (Optional) To change the domain where the dataset will be created, select a different domain from the Domain drop-down list.

When you add a dataset, the dataset is created in the domain selected in the Domain drop-down list. By default, the root "/" directory is selected as the Domain.

6. Click ADD.

The Add Dataset dialog box appears.

7. Specify a Name.

You can specify any name that helps identify the dataset.

In the Add Dataset dialog box, the Domain field is read-only and maps to the domain specified on the System Management > Manage Policies page.

8. Select a Plug-in type, and then select one of the following:

l All

l Select Files and/or Folders

Managing Avamar Protection Policies

Dell EMC Data Protection Central Administration Guide 73

For the selected Plug-in type, to add a specific file or folder, type the name of the file or folder, and then click ADD. After you click ADD, the specific file or folder is added to the Plug-in list.

9. From the Plug-in list, delete any plug-in entries that you do not want to be included.

The following is the default list of plug-in options:

l AIX File System

l FreeBSD File System

l HP-UX File System

l Linux File System

l Macintosh File System

l NetWare File System

l SCO OpenServer File System

l Solaris File System

l UnixWare File System

l Windows File System

To delete a Plug-in, in the Remove Plug-In column, click the X that is associated with the Plug-in that you want to delete.

10. Click FINISH.

The page refreshes, a notification appears in the Notification bar that indicates the dataset was successfully added, and in the list of datasets, the new dataset is displayed.

Editing an Avamar policy Learn how to edit an Avamar backup policy with Data Protection Central.

Edit a policy Data Protection Central provides the capability for you to edit a policy for an Avamar system.

About this task

Note: You cannot edit Avamar reserved items. For Avamar reserved items, the EDIT button is disabled.

Procedure

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. Select the policy that you want to edit, and then click EDIT.

The Edit Policy dialog box appears.

Managing Avamar Protection Policies

74 Dell EMC Data Protection Central Administration Guide

5. (Optional) In the Information panel, edit the fields.

6. Click NEXT.

7. (Optional) In the Clients panel, select, or clear the checkboxes for the available clients.

8. Click NEXT.

9. (Optional) In the Proxies panel, select, or clear the checkboxes for Auto Proxy Enabled and available proxies.

10. Click FINISH.

The page refreshes, a notification appears in the Notification bar that indicates the policy was successfully updated, and in the list of policies, the updated policy is displayed.

Edit a retention Data Protection Central provides the capability for you to edit a retention for an Avamar system.

About this task

Note: You cannot edit Avamar reserved items. For Avamar reserved items, the EDIT button is disabled.

Procedure

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. To open the RETENTIONS tab, click RETENTIONS.

5. From the list, select the retention that you want to edit.

6. Click EDIT.

The Edit Retention dialog box appears.

7. In the Edit Retention dialog box, edit the following:

l Name

l Expiration Type

l Retention Period

If required, edit information for additional fields depending on the Expiration Type.

8. Click FINISH.

The page refreshes, a notification appears in the Notification bar that indicates the retention was successfully updated, and in the list of retentions, the updated retention is displayed.

Managing Avamar Protection Policies

Dell EMC Data Protection Central Administration Guide 75

Edit a schedule Data Protection Central provides the capability for you to edit a schedule for an Avamar system.

About this task

Note: You cannot edit Avamar reserved items. For Avamar reserved items, the EDIT button is disabled.

Procedure

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. To open the SCHEDULES tab, click SCHEDULES.

5. From the list, select the schedule that you want to edit.

6. Click EDIT.

The Edit Schedule dialog box appears.

7. Edit the fields.

8. Click FINISH.

The page refreshes, a notification appears in the Notification bar that indicates the schedule was edited, and in the list of schedules, the updated schedule is displayed.

Edit a dataset Data Protection Central provides the capability for you to edit a dataset for an Avamar system.

About this task

Note: You cannot edit Avamar reserved items. For Avamar reserved items, the EDIT button is disabled.

Procedure

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. To open the DATASETS tab, click DATASETS.

5. From the list, select the dataset that you want to edit.

6. Click EDIT.

The Edit Dataset dialog box appears.

Managing Avamar Protection Policies

76 Dell EMC Data Protection Central Administration Guide

7. Edit the fields.

8. Click FINISH.

The page refreshes, a notification appears in the Notification bar that indicates the dataset was successfully updated, and in the list of datasets, the updated dataset is displayed.

Delete a policy Data Protection Central provides the capability for you to delete a policy for an Avamar system.

About this task

Note: You cannot delete Avamar reserved items. For Avamar reserved items, the DELETE button is disabled.

Procedure

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. Select the policy that you want to delete, and then click DELETE.

The Confirm Delete dialog box appears.

5. Click DELETE.

The page refreshes, a notification appears in the Notification bar that indicates the policy was successfully deleted, and the policy is no longer displayed in the list of policies.

Run a backup policy Data Protection Central provides the capability for you to run a backup policy.

About this task

If the policy is enabled and has clients, the BACKUP NOW button is enabled, otherwise the button is disabled.

Procedure

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click:

4. Click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

5. Select a policy, and then click BACKUP NOW.

Managing Avamar Protection Policies

Dell EMC Data Protection Central Administration Guide 77

A message appears in the Notification bar that indicates the backup has started for the selected policy.

You can track the backup progress on the Audit page or the Job Activities page.

Managing Avamar Protection Policies

78 Dell EMC Data Protection Central Administration Guide

CHAPTER 8

Launching System Management Applications

Data Protection Central allows you to launch native system management applications.

This chapter includes the following topics:

l Launching Avamar Administrator....................................................................... 80 l Launching Avamar AUI....................................................................................... 80 l Launching NetWorker Management Console..................................................... 82 l Launching NetWorker Management Web UI...................................................... 83 l Launching Data Domain System Manager.......................................................... 84 l Launching Search.............................................................................................. 85 l Launching Data Protection Advisor....................................................................85

Dell EMC Data Protection Central Administration Guide 79

Launching Avamar Administrator Data Protection Central provides the capability for you to launch Avamar Administrator.

For instructions about how to use Avamar Administrator, refer to the Avamar documentation.

Launch Avamar Administrator from the overflow button Before you begin

Data Protection Central must be open to the System Management page.

Procedure

1. Click the overflow button beside the Avamar system:

2. Click Avamar Administrator.

A prompt appears to download a .jnlp file for Avamar Administrator. Based on the browser settings, you can either open or save the file.

3. Execute the .jnlp file to launch Avamar Administrator.

Due to system security settings, there may be security prompts when you execute the .jnlp file. Accept the security prompts to continue launching Avamar Administrator.

Results

Avamar Administrator launches.

Launching Avamar AUI Data Protection Central provides the capability for you to launch Avamar UI. You can also choose to launch Avamar UI directly into the Avamar Restore or Avamar Proxy Deployment pages.

Note: To launch the AUI from Data Protection Central, the Avamar system must be version 7.5.1 or later.

For instructions about how to use Avamar AUI, refer to the Avamar documentation.

Launch Avamar UI from the overflow button Before you begin

You can launch the Avamar UI when Data Protection Central is open to one of the following pages:

l Alerts

l Capacity

l Asset Activities

l Job Activities

l System Management

Launching System Management Applications

80 Dell EMC Data Protection Central Administration Guide

Procedure

1. Click the overflow button beside the Avamar system:

2. Click Avamar UI.

Results

The Avamar UI launches.

Launch Avamar Restore from the overflow button Before you begin

You can launch the AUI Avamar Restore page when Data Protection Central is open to one of the following pages:

l Asset Activities

l Job Activities

l Asset Inventory

l System Management

Procedure

1. Click the overflow button beside the Avamar system:

2. Click Avamar Restore.

Results

The Avamar AUI launches to the Avamar Restore page.

Launch Avamar Proxy Deployment from the overflow button Before you begin

You can launch the AUI Avamar Proxy Deployment page when Data Protection Central is open to one of the following pages:

l Job Activities

l Asset Activities

l System Management

Procedure

1. Click the overflow button beside the Avamar system:

2. Click Avamar Proxy Deployment.

Results

The Avamar AUI launches to the Avamar Proxy Deployment page.

Launching System Management Applications

Dell EMC Data Protection Central Administration Guide 81

Launch Avamar Administrator from the Detail pane Before you begin

Data Protection Central must be open to one of the following pages:

l Health

l Capacity

l Job Activities

l Asset Activities

l Asset Inventory

Procedure

1. Select the Avamar system from the list of systems on the Master pane.

2. In the Detail pane, click AVAMAR UI.

Results

Avamar UI launches.

Launching NetWorker Management Console Data Protection Central provides the capability for you to launch NetWorker Management Console (NMC).

For instructions about how to use NMC, refer to the NetWorker documentation.

Launch NetWorker Management Console from the overflow button Before you begin

Data Protection Central must be open to the System Management page.

Procedure

1. Click the overflow button beside the NetWorker system:

2. Click NetWorker Management Console.

A prompt appears to download a .jnlp file for NMC. Based on the browser settings, you can either open or save the file.

3. Execute the .jnlp file to launch NMC.

Due to system security settings, there may be security prompts when you execute the .jnlp file. Accept the security prompts to continue launching NMC.

Results

NMC launches.

Launching System Management Applications

82 Dell EMC Data Protection Central Administration Guide

Launching NetWorker Management Web UI Data Protection Central provides the capability for you to launch NetWorker Management Web UI.

Note: To launch the NetWorker Management Web UI from Data Protection Central, the NetWorker system must be version 18.1 or later.

For instructions about how to install and use NetWorker Management Web UI, refer to the NetWorker documentation.

Launch NetWorker Management Web UI from the overflow button Before you begin

You can launch the NetWorker Management Web UI when Data Protection Central is open to one of the following pages:

l Job Activities

l Asset Activities

l Asset Inventory

l System Management

Procedure

1. Click the overflow button beside the NetWorker system:

2. To access the NetWorker Management Web UI:

a. VMware Recovery page, click NetWorker Restore.

b. Policies page, click NetWorker Manage Policies.

c. VMware Proxies page, click NetWorker Proxy Deployment.

Results

The NetWorker Management Web UI launches to the selected NetWorker page. Note: If your DPC environment includes multiple versions of NetWorker, you may notice different menu options for the overflow button. For example, a previous version of NetWorker provides a NetWorker UI menu option.

Launch NetWorker UI from the Detail pane Before you begin

Data Protection Central must be open to one of the following pages:

l Health

l Capacity

l Asset Activities

l Job Activities

l Asset Inventory

Launching System Management Applications

Dell EMC Data Protection Central Administration Guide 83

Procedure

1. Select the NetWorker system from the list of systems on the Master pane.

2. In the Detail pane, click NETWORKER UI.

Results

NetWorker UI launches.

Launching Data Domain System Manager Data Protection Central provides the capability for you to launch the Data Domain System Manager.

For instructions about how to log into and use Data Domain System Manager, refer to the Data Domain documentation.

Launch System Manager from the overflow button Before you begin

To support Single-Sign On (SSO) from Data Protection Central to the Data Domain System Manager (6.2.0.10 and later), you must enable SSO from the Data Domain System Manager and create group mapping. For instructions to configure SSO authentication, enable SSO, and configure SSO user groups, refer to the Data Domain Operating System Version 6.2 Administration Guide (Rev 02 and later). By default, the user group is dpc_admin and the domain name is dpc.local (unless using LDAP).

Data Protection Central must be open to one of the following pages:

l Health

l Alerts

l Capacity

l System Management

Procedure

1. Click the overflow button beside the Data Domain system:

2. Click System Manager.

Results

Data Domain System Manager launches.

Launch System Manager from the Detail pane Before you begin

Data Protection Central must be open to one of the following pages:

l Health

l Capacity

Procedure

1. Select the Data Domain system from the list of systems on the Master pane.

2. In the Detail pane, click SYSTEM MANAGER.

Launching System Management Applications

84 Dell EMC Data Protection Central Administration Guide

Results

Data Domain System Manager launches.

Launching Search Data Protection Central provides the capability for you to launch Search.

Procedure

1. In the Left menu, select System Management.

The System Management page appears.

2. In the row for the Search system, click the Overflow menu ( ).

3. Click DATA PROTECTION SEARCH.

Search launches in a new browser tab.

4. For further instructions about how to log in to Search, refer to the Search documentation.

Launching Data Protection Advisor Data Protection Central provides the capability for you to launch Data Protection Advisor.

Procedure

1. In the Left menu, select System Management.

The System Management page appears.

2. In the row for the Data Protection Advisor system, click the Overflow menu

( ).

3. Click DATA PROTECTION ADVISOR.

Data Protection Advisor launches in a new browser tab.

4. For further instructions about how to log in to Data Protection Advisor, refer to the Data Protection Advisor documentation.

Launching System Management Applications

Dell EMC Data Protection Central Administration Guide 85

Launching System Management Applications

86 Dell EMC Data Protection Central Administration Guide

CHAPTER 9

Running Reports

Learn about Data Protection Central reports.

This chapter contains the following sections:

l Reports overview............................................................................................... 88 l Run a report.......................................................................................................88 l View the last report............................................................................................89 l Backup Report Card...........................................................................................89 l Backup Client Summary..................................................................................... 89 l Strike Summary................................................................................................. 90 l Backup Data Backed Up Daily.............................................................................91 l Backup Number of Jobs Backed Up Daily........................................................... 91 l Data Domain Utilization...................................................................................... 91 l Data Domain Tier Utilization............................................................................... 91 l Data Domain Daily Compression Statistics......................................................... 92 l Data Domain Filesystem Utilization ................................................................... 92 l Data Domain DeDuplication Ratio.......................................................................92 l Data Domain Active Streams..............................................................................92

Dell EMC Data Protection Central Administration Guide 87

Reports overview Data Protection Central provides the capability for you to run 11 of the most used Data Protection Advisor reports for Avamar, NetWorker, and Data Domain systems.

Data Protection Central reporting features require you to have Data Protection Advisor system configured with Data Protection Central.

Add a Data Protection Advisor system on page 57 provides instructions for adding a Data Protection Advisor system to Data Protection Central.

For more information about Data Protection Advisor, refer to the Data Protection Advisor documentation set.

You can run, and then view these reports directly in the Data Protection Central user interface. You can also specify the reporting period for these reports within the Data Protection Central interface.

Note: To take full advantage of Data Protection Central capabilities, it is recommended that all systems that are configured in Data Protection Advisor also be configured in Data Protection Central.

Run a report In the Data Protection Central user interface, you can run 11 of the most used Data Protection Advisor reports for Avamar, NetWorker, and Data Domain systems.

Procedure

1. In the Left menu, select Reports.

2. (Optional) To filter the list of reports on system type, select one or more of the following options:

l Avamar

l Data Domain

l NetWorker

3. (Optional) To search for a specific report, type the report name in the search box.

4. (Optional) To specify a reporting period other than the default of last week for the report that you want to run, click LAST WEEK.

A menu appears and displays a list of the reporting periods that are available.

From the list, select a reporting period.

5. On the report that you want to run, click RUN REPORT.

While the report is generating, the RUN REPORT button displays PROCESSING.

When the report is available for viewing, a notification appears at the top of the user interface.

6. After the report generation is complete, to view the report, click VIEW LAST REPORT.

The report opens in a new window.

Running Reports

88 Dell EMC Data Protection Central Administration Guide

View the last report Data Protection Central provides the capability for you to view the last report that was run.

About this task

Data Protection Advisor retains reports for a period of 24 hours. The View Report link will not be visible if the last report was generated more than 24 hours ago.

Procedure

1. In the Left menu, select Reports.

2. (Optional) To filter the list of reports on system type, select one or more of the following options:

l Avamar

l Data Domain

l NetWorker

3. (Optional) To search for a specific report, type the report name in the search box.

4. On the report that you want to view, click VIEW LAST REPORT.

The report opens in a new window.

Backup Report Card The Backup Report Card reports information about each client that was backed up over the reporting period and the number of successful and unsuccessful jobs on a daily basis in a report card.

The Backup Report Card identifies clients that have repetitive failures, or more importantly, clients that have not been backed up at all. For each day in the specified reporting period, a cell displays the backup status of each client:

l If the cell for a client is completely green, all backups were successful for that client on that day.

l If the cell is completely red, all backups failed for that client on that day.

l If there is a mix of red and green, the proportion represents the percentage of backups that failed on that client on that day.

l If a cell is white, no backups occurred for that client on that day.

Backup Client Summary The Backup Client Summary report provides of summary of the backup client in a table report.

The report includes the following information:

l CompletedCount of the total number of clients on the backup server that has at least one job on it.

l SuccessfulIndicates that all jobs that were processed on the client during the reporting period were successful.

Running Reports

Dell EMC Data Protection Central Administration Guide 89

l PartialIndicates that some jobs were successful and that some jobs were unsuccessful during the reporting period. The statuses of jobs could be Successful, Failure, or Missed. The Backup Client Summary report lists a client as a Partial client when it has a mix of failed, successful, and missed jobs within the period.

l FailedCount of the total number of clients after deduplication with only failed jobs on them.

l MissedCount of the number of clients with all missed jobs on them.

l ActiveCount of the number of clients with active jobs running.

l Success RateSuccess rate of clients on the backup server over the reporting period.

Strike Summary The Strike Summary report returns the number of clients that have not been backed up for one or more days consecutively in a table report.

The report includes the following information:

l One StrikeCount of the number of clients that have at least one failure in the last 24 hours, which is the last day.

l Two StrikesCount of the number of clients that have at least one failure in the last 24 hour to 48 hour period and last 24 hour period, which is the last 2 days.

l Three StrikesCount of the number of clients that have at least one failure in the last 3 days.

The following list includes information about strikes and other elements of this report:

l Strikes are based on clients.

l If deduplication is enabled in Configure Report Settings in the Data Protection Advisor web console, the jobs on the client are deduplicated to discount earlier failures where a job later succeeded.

l A partial success where some jobs are successful and some fail for a client, counts as strike.

l If a client has a combination of missed/failed or missed/successful jobs, it is considered a partial client and is included in the strike count. Alternatively, a client with all missed jobs is included in the count.

l Full or incremental Backup level does not make a difference. Reports do not filter based on job level.

l If you run a report with a period of last day, the report only returns a one strike failed client count because you only ran it for the last day. If you run the report for last 2 days, if any exist, it returns the count for one and two strike failures. If you run it for last week or last 3 days, the report returns any failures in last 3 days.

l The report is hard-coded to return failure counts only for consecutive failed clients for the last 3 days, maximum. It does not matter if you configure the report to run with a period that is longer than 3 days. For example, if you specify the period of last month, the report does not report on any three strikes within the last month.

Running Reports

90 Dell EMC Data Protection Central Administration Guide

Backup Data Backed Up Daily The Backup Data Backed Up Daily report returns the total data by server that is backed up daily in a column chart.

The report includes the following information:

l Total SizeTotal amount of data backed up (in GB).

l ServerName of the server on which the backup occurred.

Backup Number of Jobs Backed Up Daily The Backup Number of Jobs Backed Up Daily report returns the total number of jobs that are backed up daily in a column chart.

Num Jobs represents the number of jobs that have completed.

Data Domain Utilization The Data Domain Utilization report returns information about Data Domain utilization in a table.

The report includes the following information:

l HostnameName of the host on which the file system is mounted.

l UtilizationAverage utilization for all hosts as a percentage.

l CapacityTotal capacity on the host in GB.

l Used CapacityAmount of space that is used on the file system in MB.

l Cleanable SpaceAmount of space that can be cleaned in MB.

l Free CapacityAmount of free space on the file system in MB.

l Last Day ChangeThe amount of space that is used in MB per Data Domain in the 24 hours.

l Dedup RatioThe de-duplication ratio that Data Domain is achieving.

Data Domain Tier Utilization The Data Domain Tier Utilization report returns information about Data Domain system tier capacity and utilization in a table report.

The report includes the following information:

l HostnameName of the Data Domain.

l TierName of the tier.

l UtilizationCapacity utilization on the tier as a percentage.

l CapacityTotal storage space in MB.

l Used CapacityPost compression size in MB.

l Available CapacityAvailable storage space in MB.

l Pre Compression SizePre compression size in MB.

Running Reports

Dell EMC Data Protection Central Administration Guide 91

l Cleanable SpaceAmount of cleanable space in MB.

Data Domain Daily Compression Statistics Returns Data Domain daily compression statistics in a line chart. Uses data from the Daily Compression Statistics data source.

l HostnameName or IP address of the Data Domain server.

l Total Compression FactorDifference between the Pre Compression Size and the Post Local Compression Size (in MB).

l Dedupe RatioDifference between the Deduplication Ratio and the Total Compression Factor, displayed as a percentage.

l Global Compression FactorSize after deduplication (in MB).

l Local Compression FactorSize after deduplication + local compression (in MB).

l ReductionDisplayed as a percentage.

Data Domain Filesystem Utilization The Data Domain Filesystem Utilization report returns Data Domain utilization trend values over time in a line chart.

Utilization represents Data Domain file system utilization value as a percentage.

Data Domain DeDuplication Ratio The Data Domain DeDuplication Ratio report returns the ratio for the size of data that is deduplicated against the original data size over time in a line chart.

The report includes the following information:

l HostnameName or IP address of Data Domain.

l Dedupe RatioDifference between the Deduplication Ratio and the Total Compression Factor as a percentage.

Data Domain Active Streams The Data Domain Active Streams report returns the Data Domain active streams in a line chart.

The report includes the following information:

l HostnameName or IP address of the Data Domain server.

l Active Read StreamsNumber of active read file streams.

l Active Write StreamsNumber of active write file streams.

l Re Opened Read StreamsRe-opened read file streams in the past 30 seconds.

l Re Opened Write StreamsRe-opened write file streams in the past 30 seconds.

Running Reports

92 Dell EMC Data Protection Central Administration Guide

CHAPTER 10

Auditing Data Protection Central Activities

This chapter includes the following sections:

l Data Protection Central audit overview............................................................. 94 l Activities audit information................................................................................ 94

Dell EMC Data Protection Central Administration Guide 93

Data Protection Central audit overview On the Audit page, you can view audit information about activities in Data Protection Central.

Audit information includes actions and tasks that Data Protection Central users have performed. The audit information can also be used to track the status of long running tasks.

Activities audit information The Audit page displays audit information about activities in Data Protection Central.

Basic audit information

The following list includes the basic types of audit information for activities that are displayed in the table on the Audit page.

Title

The title of the activity.

Status

The state of the activity.

Progress

The percentage of the activity that is complete.

Last Updated

The date and time the activity was last updated.

User

The user that initiated the activity.

Additional audit information

The following list includes additional details that are only displayed when you click the drop-down arrow for an activity.

Description

The description of the activity.

Comments

The comments for the activity, if applicable.

Sub Tasks

Sub tasks for the activity, if applicable. The following information is listed for each sub task:

l Title

l Status

l Progress

l Last Updated

Click the drop-down arrow for a sub task to display additional details.

Auditing Data Protection Central Activities

94 Dell EMC Data Protection Central Administration Guide

CHAPTER 11

Server Administration

Learn about Data Protection Central server administration.

This chapter contains the following sections:

l Backing up Data Protection Central................................................................... 96 l Restoring a backup of Data Protection Central..................................................96 l Change the Data Protection Central IP address.................................................96 l Upgrading Data Protection Central.................................................................... 97

Dell EMC Data Protection Central Administration Guide 95

Backing up Data Protection Central If Data Protection Central is deployed as virtual machine, a virtual machine backup application can be used to back up the Data Protection Central.

Data Protection Central can also be backed up using a file system based backup application.

When using a file system based backup application, ensure that no Data Protection Central administrator activities occur when performing the backup. Include the following directories in the file system backup:

l /data01

l /usr/local/dpc

l /var/log/dpc

l /var/lib/dpc

Restoring a backup of Data Protection Central To restore Data Protection Central from a file system backup, perform the following procedure:

1. Deploy the Data Protection Central OVA. The Data Protection Central Getting Started Guide provides information.

2. Stop the Data Protection Central services using the following command:

/usr/local/dpc/bin/dpc stop

3. Restore the Data Protection Central directories to the original locations.

4. To activate the changes, restart Data Protection Central using the following command:

/usr/local/dpc/bin/dpc start

Change the Data Protection Central IP address Data Protection Central supports changing the IP address of the Data Protection Central system.

Procedure

1. Launch a command prompt.

2. Log in as the root user.

3. Launch YaST, and then browse to System > Network Settings.

The YaST Network Settings dialog box appears with four tabs:

l Global Options

l Overview

l Hostname/DNS

l Routing

Server Administration

96 Dell EMC Data Protection Central Administration Guide

4. Click Overview.

The Overview tab contains information about installed network interfaces and configurations.

One Network card is listed.

5. Use the Tab key to select Edit, and then press Enter.

The Network Card Setup page appears.

6. On the Network Card Setup page, make the following changes:

l Change IP Address to the new IP address.

l Change Subnet Mask, if required.

l Ensure that the Statically Assigned IP Address is selected.

Note: Do not change the Hostname from the value that was set when Data Protection Central was deployed. Data Protection Central uses the hostname to generate certificates and changing the hostname will invalidate the certificates.

7. Use the Tab key to select Next, and then press Enter.

8. Use the Tab key to select OK, and then press Enter.

The IP address changes are applied.

9. Use the Tab key to select Quit, and then press Enter.

10. Run the following commands to restart the Data Protection Central services:

/usr/local/dpc/bin/dpc stop

/usr/local/dpc/bin/dpc start

Upgrading Data Protection Central Learn about upgrading from a previous release to Data Protection Central 19.1.

This chapter includes the following topics:

Upgrade Data Protection Central to version 19.1 on standalone server or virtual machine

Data Protection Central supports a direct upgrade from Data Protection Central 18.1 or 18.2 to 19.1.

Before you begin

NOTICE Before you upgrade Data Protection Central, it is highly recommended that you back up the Data Protection Central system. Backing up Data Protection Central on page 96 provides information on how to back up Data Protection Central.

NOTICE If the Data Protection Central system being upgraded is currently monitoring NetWorker Virtual Edition systems, the firewalls on those systems must be modified to use port 5671 (requires NetWorker 9.2.1.4 and later) instead

Server Administration

Dell EMC Data Protection Central Administration Guide 97

of port 5672 to communicate with the Data Protection Central system. For details, see the Edit NetWorker Virtual Edition firewall settings to enable Data Protection Central to read jobs on page 107.

Ensure that the system being upgraded meets the following requirements:

l Standalone server deployments require 1.5GHz processor.

l Virtual machine deployments require 4 CPUs with 1 core each.

l 8GB of RAM.

l 550 GB of disk space available.

l The environment is running SuSE Linux Enterprise Server 12 SP2. It is recommended that you disable AppArmor. If you must enable AppArmor, then the AppArmor profiles should not block the applications used by Data Protection Central.

l Java Platform Standard Edition Development Kit (JDK) version 8u181 or greater is installed, including the following packages:

n javapackages-tools-2.0.1-8.1.x86_64

n java-1_8_0-openjdk-headless-1.8.0.181-27.26.2.x86_64

n java-1_8_0-openjdk-1.8.0.181-27.26.2.x86_64

Note: Java may require additional packages to be installed.

l The Linux socat package is installed.

l The DNS is set up correctly. The correct DNS set up ensures that systems monitored by Data Protection Central can resolve the Data Protection Central hostname and Fully Qualified Domain Name (FQDN).

l The FQDN, IP, Netmask, Gateway, DNS, NTP, and time zone are configured.

l The environment is using static network settings.

About this task

Note: It is highly recommended that the VMware environment where Data Protection Central is deployed is backed up by UPS (Uninterrupted Power Supply). To shutdown DPC, do not use the "Power off the virtual machine" feature on vCenter. Instead, shutdown the Operating System gracefully in DPC using 'shutdown -h now' in the bash shell

Procedure

1. To access the Data Protection Central system, type the following command:

ssh -l

2. To switch to the root user, type the following command:

su -

3. Copy the Data Protection Central software update file to the Data Protection Central host.

Note: Depending on the method that you use to copy the update file, you may be required to disable the firewall to allow the file to be copied to the

Server Administration

98 Dell EMC Data Protection Central Administration Guide

Data Protection Central host. To disable the firewall, run the following command:

systemctl stop SuSEfirewall2

Once you have copied the file, to restart the firewall, run the following command:

systemctl start SuSEfirewall2

4. To initiate the upgrade to version 19.1, type the following command:

java -jar emc-dpc-19.1.0- .jar

NOTICE When you upgrade Data Protection Central, the upgrade trace log may contain No such file or directory warning messages.

For example:

warning: file /usr/local/dpc/lib/sso/pingfederate/server/ default/data/hypersonic: remove failed: No such file or directory

These messages are expected during the upgrade operation and do not require any action.

After you finish

After upgrading Data Protection Central, for OVA deployments only, you must upgrade the Data Protection Central operating system, which will install security updates and adjust firewall settings.

Note: During a Data Protection Central upgrade from version 18.1 to version 19.1, data is migrated from the old version to the new version. Depending on the amount of data, this migration could take up to several minutes. After the upgrade, when the Data Protection Central 19.1 system starts up, the database is re-indexed. This operation could also take several minutes, depending on the amount of data. You cannot log in to the Data Protection Central web user interface until the re-indexing operation is complete. This re-indexing does not occur when upgrading from version 18.2.

Data Protection Central OS update Periodically, security patches and fixes are released for the Data Protection Central OS.

About this task

These fixes must be installed on OVA deployments of Data Protection Central. When available, it is highly recommended that you install these security patches and fixes on the Data Protection Central server.

The Data Protection Central OS Update Release Notes provides information about the security patches and fixes included in the Data Protection Central OS update. The

Server Administration

Dell EMC Data Protection Central Administration Guide 99

Support KB article https://support.emc.com/kb/522157 provides instructions for installing the OS update.

Migrating from Multiple Systems Management to Data Protection Central About this task

Data Protection Central does not support a direct upgrade from Multiple Systems Management (MSM) due to significant architectural changes that give Data Protection Central better stability and scalability.

Procedure

1. Identify the Avamar systems being monitored with MSM that are supported with Data Protection Central.

Avamar versions 7.5.0-183_HF300003 hotfix and later are supported with Data Protection Central.

2. Using the MSM user interface, remove the Avamar systems identified in step 1 from MSM.

3. Deploy the Data Protection Central OVA.

The Data Protection Central Getting Started Guide provides instructions.

4. Log into the Data Protection Central OVA, and then use System Management to add the Avamar systems.

Each Avamar system remains in the NotReporting state for several minutes until adaptor activation is complete.

Results

Once the adaptor activation is complete, the migrated Avamar systems begin logging activities to Data Protection Central and are no longer monitored by MSM.

Note: Historical Avamar monitoring data is not transferred to Data Protection Central.

Data Protection Central will attempt to automatically add any Data Domain systems configured with monitored Avamar systems. If required, Data Domain systems can also be added manually through Data Protection Central System Management.

Server Administration

100 Dell EMC Data Protection Central Administration Guide

CHAPTER 12

Troubleshooting

The following sections may assist with troubleshooting issues with Data Protection Central.

Topics include:

l Directory structure and log information............................................................ 102 l Troubleshooting LDAP...................................................................................... 102 l Systems fail to activate.................................................................................... 105 l Avamar systems fail to activate........................................................................ 106 l NetWorker systems fail to activate...................................................................106 l Edit NetWorker Virtual Edition firewall settings to enable Data Protection Central

to read jobs.......................................................................................................107 l Lockbox............................................................................................................ 108 l Unlock a Data Protection Central user account................................................ 109 l The SSO service fails to start on Data Protection Central.................................110 l Disabling SSO ................................................................................................... 111 l Reregister SSO for a system..............................................................................111 l Resolve error notifications................................................................................. 111 l Convert IPv4 to IPv6-only or dual-stack network..............................................112

Dell EMC Data Protection Central Administration Guide 101

Directory structure and log information The following list includes information about the Data Protection Central directory structure and log information:

l All Data Protection Central specific packages are under: /usr/local/dpc/lib

l Each package has its own subdirectory. For example, setup and monitor.

l Each package has similar structures. For example, bin and conf.

l The /usr/local/dpc/bin directory includes scripts to start or stop Data Protection Central services. To start or stop an individual Data Protection Central service, use the service command.

l The /var/log/dpc directory hosts all Data Protection Central related logs including NGINX, MongoDB, and RabbitMQ.

l The /var/lib/dpc directory hosts all Data Protection Central generated data which consists of MongoDB and RabbitMQ.

l All Data Protection Central related logs are under: /var/log/dpc/[module name] [module name].out files contain console logging from starting and running the module process.

[module name].log files contain logging from the module.

l All Elemental Gateway (ELG) logs are under: /var/log/dpc/elg/

l The Data Protection Central user interface (msm-ui-main service) log is under: /var/log/dpc/msm-ui-main This log file is small and contains information from starting the Node.js server.

l The Data Protection Central Monitoring (dpc-monitor service) logs are under: /var/log/dpc/monitor This directory contains the rolling log files from the monitoring process.

Troubleshooting LDAP Learn how to diagnose and resolve common LDAP configuration issues.

Check the LDAP status in the log file Check the /var/log/dpc/elg/elg.log log file for messages about the LDAP connection status.

Messages that appear during LDAP connection failure

If the following message appears, the LDAP client did not make a successful connection to the LDAP server:

2018-04-03 11:00:26,929 INFO localhost-startStop-1 c.e.c.c.SecurityConfig LDAP or AD Directory Service providers are not available

There are multiple issues that can prevent the LDAP client from connecting to the LDAP server. Look for error messages in the log file that provide more information.

Troubleshooting

102 Dell EMC Data Protection Central Administration Guide

The following table describes various error messages that appear during LDAP connection failures and their causes.

Table 8 LDAP communication messages

Message Cause

INFO localhost-startStop-1 c.e.c.c.SecurityConfig LDAP or AD Directory Service providers are not available

No LDAP or AD settings are provided or they are provided with incorrect information.

.ADLdapAuthenticationProvider Ignoring AD authentication. Verification of ldap settings failed. Failed to connect

Invalid AD configuration information.

.LdapAuthenticationProvider Ignoring LDAP authentication. Verification of ldap settings failed. Failed to connect

Invalid LDAP configuration information.

PKIX path building failed: java.security.cert.CertPathBuilderExce ption: Could not build a validated path

Validation of the LDAP server certificate could not be completed. One possible solution for this issue is to add the LDAP server certificate to the Data Protection Central Java keystore.

Messages that appear during LDAP connection success

Messages similar to the following appear when the LDAP client successfully connects to the LDAP server:

c.e.c.s.a.l.LDAPSecureStorage LDAP admin credentials are secured c.e.c.s.a.l.ExternalAuthenticationProvider Type: LDAP c.e.c.s.a.l.ExternalAuthenticationProvider Base DN: dc=mydomain,dc=com c.e.c.s.a.l.ExternalAuthenticationProvider Admin user DN: cn=Administrator,dc=my-domain,dc=com c.e.c.s.a.l.ExternalAuthenticationProvider User Base: ou=people c.e.c.s.a.l.ExternalAuthenticationProvider User Search DN: (|(uid={0}) (cn={0})) c.e.c.s.a.l.ExternalAuthenticationProvider User Pattern DN: [] c.e.c.s.a.l.ExternalAuthenticationProvider Group Name: dp_admin c.e.c.s.a.l.ExternalAuthenticationProvider Group Search Base: ou=group c.e.c.s.a.l.ExternalAuthenticationProvider Group Search Filter: (&(member={0})(cn=dp_admin)) o.s.s.l.DefaultSpringSecurityContextSource URL 'ldap:// 12.3.104.150:546/dc=my-domain,dc=com', root DN is 'dc=mydomain,dc=com' 12.3.104.150:546/dc=my-domain,dc=com', root DN is 'dc=mydomain,dc=com'

Troubleshooting

Dell EMC Data Protection Central Administration Guide 103

Diagnosing LDAP authentication failure LDAP user authentication fails when the LDAP lookup matches more than one record for the user in the LDAP server.

Issue

If Data Protection Central is configured to use LDAP authentication, and the authentication lookup of a user returns more than one record, Data Protection Central displays the following message:

We didn't recognize the username or password you entered. Please try again

Also, the /var/log/dpc/elg/elg.log log file will contain the following message:

2018-04-04 08:23:04,834 ERROR http-nio-9002-exec-8 o.a.c.c.C.[.[.[. [dispatcherServlet] Servlet.service() for servlet[dispatcherServlet] in context with path [/elg] threw exception org.springframework.dao.IncorrectResultSizeDataAccessException: Incorrect result size: expected 1, actual 2

Solution

Ensure that each user that is registered for LDAP authentication matches only one LDAP record.

Restore access to Data Protection Central after LDAP misconfiguration When LDAP is configured incorrectly, you can be locked out of the Data Protection Central OVA.

About this task

If you cannot log into Data Protection Central after configuring LDAP, perform the following steps.

Procedure

1. To disable the ldap.properties file, rename it using the following command:

mv ldap.properties ldap.properties.old

2. To restart Data Protection Central and activate the change, type the following commands:

/usr/local/dpc/bin/dpc stop /usr/local/dpc/bin/dpc start

Results

After Data Protection Central is restarted, LDAP is disabled and access to Data Protection Central is restored.

Troubleshooting

104 Dell EMC Data Protection Central Administration Guide

Remove LDAP from Data Protection Central If required, you can remove LDAP from Data Protection Central.

Procedure

1. To access the Data Protection Central system, type the following command:

ssh -l

2. To switch to the root user, type the following command:

su -

3. To remove the ldap.properties file, type the following command:

rm /var/lib/dpc/elg/ldap.properties

4. To restart Data Protection Central and activate the change, type the following command:

/usr/local/dpc/bin/dpc start

5. Once Data Protection Central is started, type the following command to confirm that all of the services are active:

/usr/local/dpc/bin/dpc status

6. Log in to the Data Protection Central user interface with the username and password for the non-LDAP user account.

For example: https://DPC_fqdn

where DPC_fqdn is the Data Protection Central fully qualified domain name.

Systems fail to activate If a system is in a NotReporting health state for more than 5 minutes after the system is added or after a refresh is performed on the Systems Management page, reactivate messaging.

To reactivate messaging, perform the following steps:

1. Browse to the Systems Management page.

2. Select the system that is not reporting.

3. Click Reactivate.

Troubleshooting

Dell EMC Data Protection Central Administration Guide 105

4. Browse to the Audit screen, and then monitor the progress.

Avamar systems fail to activate The following error messages may appear on the Activities > Audit page when an Avamar system fails to activate.

Failed - ERROR: Unable to get signed client certificate from lava81105.dev.local

Verify the network settings are correct.

The Data Protection Central Security Configuration Guide provides information on the network settings that are required for successful communication.

Failed - unable to create root session to process msgborkerctl task

This message can appear after an Avamar system is upgraded.

Perform the following steps to resolve this issue:

1. Login to the Avamar system using SSH.

2. Switch to the root user.

3. Open the /etc/ssh/sshd_config file for editing.

4. Check for duplicate entries after the Match all text near the bottom of the file.

5. Comment out any duplicate entries that do not apply to the Avamar system.

6. Save and close the file.

7. Restart the sshd service by running the following command:

service sshd restart

8. In Data Protection Central, on the Systems Management page, select the Avamar system, and then click Reactivate.

NetWorker systems fail to activate A certificate issue on the NetWorker system may cause activation in Data Protection Central to fail.

A certificate must be imported to the NetWorker Java trust keystore to enable SSL communication with Data Protection Central. Use the following procedure to diagnose and resolve the certificate issue.

1. Perform the following steps to confirm that the failure is due to a certificate issue on the NetWorker server:

a. Check the /var/log/dpc/elg/elg.log log file for error messages about the failure.

b. Run the following command on the NetWorker server, and then verify that the same error message from the elg.log file appears in the output:

curl -k --basic --user 'Administrator:Password' https://networker.123.lab:9090/nwrestapi/v3/global/ serverconfig

2. Import the missing certificate to the Java trust keystore on the NetWorker server.

Troubleshooting

106 Dell EMC Data Protection Central Administration Guide

The NetWorker Security Configuration Guide provides instructions for importing certificates to the NetWorker Java trust keystore.

Edit NetWorker Virtual Edition firewall settings to enable Data Protection Central to read jobs

The NetWorker Virtual Edition default firewall setting blocks Data Protection Central from reading job information. As a result, no information about NetWorker jobs is reported unless you change the firewall settings.

About this task

Perform the following procedure on the NetWorker Virtual Edition system to enable Data Protection Central to read jobs information.

NOTICE This procedure modifies the firewall to use port 5671 and requires NetWorker 9.2.1.4, 18.1.0.2-41, or 18.2.0-28, and later versions. If you are using earlier NetWorker versions, you must modify the firewall to use port 5672 instead of 5671. For example, if using NetWorker 18.1.0.1-37, modify the firewall to use port 5672, but if using NetWorker 18.1.0.2-41, then modify firewall to use port 5671.

Procedure

1. Log into the NetWorker Virtual Edition system's root account (or log in to another account and 'su' to root).

2. Open the /etc/entfirewall.base file for editing.

3. Modify the following lines to allow a connection to port 5671. The added text is in bold:

# Netty and Rabbit MQ exec_rule -A INPUT -p tcp -m multiport --dport 5445,5446,5671,61619 -j ACCEPT exec_rule -A OUTPUT -p tcp -m multiport --dport 5445,5446,5671,61619 -j ACCEPT

4. To apply the changes, restart the firewall service using the following commands:

a. service entfirewall stop b. service entfirewall start

5. To confirm that job information is reported in Data Protection Central, run a NetWorker backup, and then verify that the backup is reported on the Data Protection Central Job Activities page.

Note: If you upgrade NetWorker, the firewall settings revert back to block Data Protection Central from reading job information and you must perform this workaround procedure again.

Troubleshooting

Dell EMC Data Protection Central Administration Guide 107

Lockbox Data Protection Central uses a secure storage lockbox to encrypt and store both internal system credentials and credentials for external systems that Data Protection Central monitors and manages.

The lockbox is created when you deploy Data Protection Central. During deployment, you must specify a lockbox password. The password is encrypted and stored in the lockbox along with Stable System Values (SSVs), which uniquely identify the Data Protection Central host. The lockbox uses the SSVs to generate an encryption key to encrypt the system credentials.

Lockbox password requirements The lockbox password must be between 8 and 256 characters in length.

Reset the lockbox In certain situations, for example, when a virtual machine is moved, you may have to reset the lockbox.

Procedure

1. Open an SSH session with an SSH tool, such as PuTTY.

2. As the Linux OS user admin, log in to the Data Protection Central host.

3. Type the following commands:

cd /usr/local/dpc/lib/elg sudo service msm-monitor stop sudo service msm-elg stop bin/elgcli -reset -lockbox -password {original_password} sudo service msm-monitor start sudo service msm-elg start

where original_password is the password that was specified when the lockbox was created.

If resetting the lockbox is unsuccessful, remove the existing lockbox, and then create the lockbox again.

Remove the lockbox In certain situations, you may need to remove the lockbox, for example, when resetting the lockbox is unsuccessful.

Procedure

1. Open an SSH session with an SSH tool, such as PuTTY.

2. As the Linux OS user admin, log in to the Data Protection Central host.

3. Stop Data Protection Central services:

sudo service msm-monitor stop sudo service msm-elg stop

Troubleshooting

108 Dell EMC Data Protection Central Administration Guide

4. Type the following command:

cd /var/lib/dpc/security/

5. To remove the lockbox, remove the following files with the rm -rf command:

l clp_lb.lb l clp_lb.lb.FCD

After you finish

If you are re-creating the lockbox, each system must be edited to enter the login credentials and store them in the lockbox.

Create the lockbox If for some reason you are required to remove the lockbox that was automatically created during the initial OVA deployment, you can manually create a lockbox.

About this task

Note: Each system must be edited to enter the login credentials and store them in the lockbox.

Procedure

1. Open an SSH session with an SSH tool, such as PuTTY.

2. As the Linux OS user admin, log in to the Data Protection Central host.

3. Type the following commands:

cd /usr/local/dpc/lib/elg sudo service msm-monitor stop sudo service msm-elg stop bin/elgcli -create -lockbox -password cd /var/lib/dpc/security/ chown admin:admin clp_lb.lb* sudo service msm-monitor start sudo service msm-elg start

The lockbox password must be between 8 and 256 characters in length.

Unlock a Data Protection Central user account When too many failed login attempts through SSH are made on a Data Protection Central user account, the account is locked. You can reset the account to unlock it and regain access.

Procedure

1. Connect to the console of the Data Protection Central server, and log in to the "admin" account.

2. To change to the root user, run the following command:

su -

Troubleshooting

Dell EMC Data Protection Central Administration Guide 109

3. To reset SSH access to the user account, run the following command:

pam_tally2 --user=admin --reset

The SSO service fails to start on Data Protection Central About this task

If the Data Protection Central SSO service fails to start, perform the following procedure to resolve the issue.

Procedure

1. Connect to the console of the Data Protection Central server, and log in to the "admin" account.

2. Change to the root user by running the following command:

su -

3. Open the dpc-sso.service file for editing by running the following command:

vi /usr/local/dpc/lib/sso/setup/dpc-sso.service

4. Add TimeoutStartSec= to the [Service] section.

For example:

[Service] Type=forking ExecStart=/usr/local/dpc/lib/sso/bin/dpc-sso start ExecStop=/usr/local/dpc/lib/sso/bin/dpc-sso stop User=admin TimeoutStartSec=

5. Save and close the dpc-sso.service file.

6. Copy the updated file to the /usr/lib/systemd/system/ folder by running the following command:

cp /usr/local/dpc/lib/sso/setup/dpc-sso.service /usr/lib/ systemd/system/

7. Run the following commands to restart the Data Protection Central services:

/usr/local/dpc/bin/dpc stop

/usr/local/dpc/bin/dpc start

Troubleshooting

110 Dell EMC Data Protection Central Administration Guide

Disabling SSO If single sign on (SSO) to Data Protection Central is not working, disable it to log in to Data Protection Central using the credentials stored in secure storage.

Procedure

1. Open the application.properties file located in /usr/local/dpc/lib/dpc/ elg/ for editing.

2. Add the following entry to the application.properties file:

elg.sso.enabled=false

3. Save and close the application.properties file.

4. Restart the ELG service using the following command:

service msm-elg restart

Results

You can now log in to Data Protection Central using the credentials stored in secure storage.

Reregister SSO for a system When single sign on (SSO) is not working, you can reregister the SSO client.

Procedure

1. On the System Management page, select the system that you want to reregister SSO for.

2. Click the overflow button:

3. Click Reregister SSO.

The reregister operation may take several minutes to complete. You can track the status of the operation in the Audit page.

Resolve error notifications There are several ways that you can resolve error notifications that appear in a red bar at the top of the browser window.

About this task

The following list includes the different ways that you can resolve error notifications:

l On the right side of the bar, click the red X button.

Troubleshooting

Dell EMC Data Protection Central Administration Guide 111

l If the page is not displaying or not functioning correctly, it is recommended that you refresh the browser.

l If refreshing the browser is not working, log out of the Data Protection Central user interface, and then log back in.

Convert IPv4 to IPv6-only or dual-stack network Describes how to convert Data Protection Central from an IPv4 network to an IPv6- only or dual-stack (IPv4 and IPv6) network.

Before you begin

This procedure requires Data Protection Central version 19.1 or later.

Procedure

1. Connect to the console of the Data Protection Central server, and log in to the "admin" account.

2. Change to the root user by running the following command:

su -

3. From the console, stop Data Protection Central:

/usr/local/dpc/bin/dpc stop

4. To convert from IPv4 to:

a. IPv6-only network, use YaST to replace the IPv4 address with an IPv6 address.

b. Dual-stack network, use YaST to add an IPv6 address to the existing IPv4 address.

5. If converting from IPv4 to:

a. IPv6-only network, remove the 127.0.0.1 record from /etc/hosts.

b. Dual-stack network, ensure the newly configured address appears in /etc/ hosts.

6. Use YaST to add an IPv6 address for the DNS.

7. If converting from IPv4 to:

a. IPv6-only network, use YaST to replace the routing record.

b. Dual-stack network, use YaST to add a new routing record.

8. If you are using DNS and converting from IPv4 to:

a. IPv6-only network, replace the A system record with the AAAA system record.

b. Dual-stack network, include both routing records.

9. Reboot the Data Protection Central.

Troubleshooting

112 Dell EMC Data Protection Central Administration Guide

GLOSSARY

A

administrator Person who normally installs, configures, and maintains software on network computers, and who adds users and defines user privileges.

Avamar Administrator A graphical management console software application that is used to remotely administer an Avamar system from a supported Windows or Linux client computer.

Avamar client A computer or workstation that runs Avamar software and accesses the Avamar server over a network connection. Avamar client software comprises a client agent and one or more plug-ins.

Avamar server The server component of the Avamar client/server system. Avamar server is a fault- tolerant, high-availability system that efficiently stores the backups from all protected clients. It also provides essential processes and services required for data restores, client access, and remote system administration. Avamar server runs as a distributed application across multiple networked storage nodes.

D

Data Protection Central server

The Data Protection Central server contains the business logic and supporting databases, hosts the web application, and communicates with all managed servers for management and monitoring purposes. The Data Protection Central server collects event data from adapters that run on the managed Avamar server.

E

Element managers Applications that are used to configure and manage one or more data protection and storage devices.

H

HFS check An Avamar Hash File System check (HFS check) is an internal operation that validates the integrity of a specific checkpoint. Once a checkpoint has passed an HFS check, it can be considered reliable enough to be used for a server rollback.

host Computer on a network.

hostname Name or address of a physical or virtual host computer that is connected to a network.

Dell EMC Data Protection Central Administration Guide 113

L

Lightweight Directory Access Protocol (LDAP)

Set of protocols for accessing information directories.

N

NetWorker administrator NetWorker server user who may add, change, or delete NetWorker server users.

NetWorker Management Console (NMC)

Software program that is used to manage NetWorker servers and clients. The NMC server also provides reporting and monitoring capabilities for all NetWorker processes.

NetWorker server Computer on a network that runs the NetWorker server software, contains the online indexes, and provides backup and restore services to the clients and storage nodes on the same network.

O

OVA Open Virtual Appliance (OVA) is a single file distribution of a package that follows the packaging format standard called Open Virtualization Format (OVF). The application server is deployed as an OVA virtual machine.

S

SSH Secure Shell. A remote login utility that authenticates by way of encrypted security keys instead of prompting for passwords. This prevents passwords from traveling across networks in an unprotected manner.

Glossary

11

Manualsnet FAQs

If you want to find out how the Data Protection Central Dell works, you can view and download the Dell Data Protection Central 19.1 Data Protection Administration Guide on the Manualsnet website.

Yes, we have the Administration Guide for Dell Data Protection Central as well as other Dell manuals. All you need to do is to use our search bar and find the user manual that you are looking for.

The Administration Guide should include all the details that are needed to use a Dell Data Protection Central. Full manuals and user guide PDFs can be downloaded from Manualsnet.com.

The best way to navigate the Dell Data Protection Central 19.1 Data Protection Administration Guide is by checking the Table of Contents at the top of the page where available. This allows you to navigate a manual by jumping to the section you are looking for.

This Dell Data Protection Central 19.1 Data Protection Administration Guide consists of sections like Table of Contents, to name a few. For easier navigation, use the Table of Contents in the upper left corner.

You can download Dell Data Protection Central 19.1 Data Protection Administration Guide free of charge simply by clicking the “download” button in the upper right corner of any manuals page. This feature allows you to download any manual in a couple of seconds and is generally in PDF format. You can also save a manual for later by adding it to your saved documents in the user profile.

To be able to print Dell Data Protection Central 19.1 Data Protection Administration Guide, simply download the document to your computer. Once downloaded, open the PDF file and print the Dell Data Protection Central 19.1 Data Protection Administration Guide as you would any other document. This can usually be achieved by clicking on “File” and then “Print” from the menu bar.