Contents

Dell PowerProtect 19.3 System Manger Administration Guide PDF

1 of 74
1 of 74

Summary of Content for Dell PowerProtect 19.3 System Manger Administration Guide PDF

IDPA System Manager Administration Guide

19.3

February 2021 Rev. 02

Notes, cautions, and warnings

NOTE: A NOTE indicates important information that helps you make better use of your product.

CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid

the problem.

WARNING: A WARNING indicates a potential for property damage, personal injury, or death.

2017 - 2021 Dell Inc. or its subsidiaries. All rights reserved. Dell, EMC, and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be trademarks of their respective owners.

Preface.........................................................................................................................................................................................7

Chapter 1: Overview.....................................................................................................................10 IDPA System Manager overview....................................................................................................................................10 IDPA System Manager scale limits................................................................................................................................. 11 Supported browsers...........................................................................................................................................................11 Environment and system requirements ........................................................................................................................11 Monitoring systems .......................................................................................................................................................... 12 Managing Avamar systems .............................................................................................................................................12 Systems data refresh times ............................................................................................................................................12 Search and recover capabilities......................................................................................................................................12 Report capabilities............................................................................................................................................................. 13 User Interface..................................................................................................................................................................... 13

Header.............................................................................................................................................................................13 View version information............................................................................................................................................ 13 User menu...................................................................................................................................................................... 14 Left menu.......................................................................................................................................................................15 Pages...............................................................................................................................................................................15 Main and detail panes..................................................................................................................................................15 Changing dashboards.................................................................................................................................................. 15 Filtering........................................................................................................................................................................... 15 Sort information that is displayed in tables........................................................................................................... 16 Dialog boxes...................................................................................................................................................................17 Notification bar............................................................................................................................................................. 17 Overflow button........................................................................................................................................................... 17

Chapter 2: Using Dashboards....................................................................................................... 18 Dashboards overview........................................................................................................................................................ 18 Dashboard widgets ........................................................................................................................................................... 18

Common widget functions......................................................................................................................................... 18 Activity Counts widget............................................................................................................................................... 19 Activity Trend widgets................................................................................................................................................19 Assets Summary widget............................................................................................................................................ 20 Assets Top Offenders widget ................................................................................................................................. 20 Alerts Summary widget..............................................................................................................................................20 Storage Capacity Top Utilization widget................................................................................................................21 Storage capacity summary widget ......................................................................................................................... 21 Health summary widget.............................................................................................................................................. 21

Customizing dashboards.................................................................................................................................................. 21 Add a dashboard...........................................................................................................................................................21 Edit a dashboard..........................................................................................................................................................22 Delete a dashboard..................................................................................................................................................... 22 Delete a widget............................................................................................................................................................ 23 Add a widget.................................................................................................................................................................23 Editing widgets ........................................................................................................................................................... 24

Contents

Contents 3

Reset customized dashboard................................................................................................................................... 26

Chapter 3: Monitoring System Health..........................................................................................27 Monitoring health status..................................................................................................................................................27

Reading the Health page............................................................................................................................................27 Reading the health summary detail pane...............................................................................................................28 Data Protection Advisor and Search system health information.....................................................................29

Managing alerts................................................................................................................................................................. 30 Reading alerts ............................................................................................................................................................. 30 Dismissing alerts........................................................................................................................................................... 31

Monitoring system capacity............................................................................................................................................ 31 Reading the system capacity table.......................................................................................................................... 31 Reading the system capacity detail pane.............................................................................................................. 32

Chapter 4: Monitoring Activities..................................................................................................33 Activities overview............................................................................................................................................................33 Monitoring job activities ................................................................................................................................................. 33

Reading the Job Activities page.............................................................................................................................. 33 Reading the job activity detail pane........................................................................................................................ 34 Rerun an Avamar job activity....................................................................................................................................34 View job activities for a specific system................................................................................................................35

Monitoring asset activities..............................................................................................................................................35 Reading the Asset Activities page...........................................................................................................................35 Reading the asset activity detail pane................................................................................................................... 35 Rerun an Avamar asset activity............................................................................................................................... 36 View asset activities for a specific system........................................................................................................... 36 View activities for a specific asset.......................................................................................................................... 37 View asset activities within a job............................................................................................................................. 37

Chapter 5: Managing Systems.....................................................................................................38 System management overview......................................................................................................................................38 Adding a system................................................................................................................................................................ 38

Add an Avamar system.............................................................................................................................................. 38 Add a Data Domain System...................................................................................................................................... 39 Add a Data Protection Advisor system.................................................................................................................. 40 Add a Search system..................................................................................................................................................40

Edit a system.......................................................................................................................................................................41 Delete a system.................................................................................................................................................................. 41 Managing system groups................................................................................................................................................. 41

Add a group................................................................................................................................................................... 41 Edit a group...................................................................................................................................................................42 Delete a group.............................................................................................................................................................. 43

Chapter 6: Monitoring Assets ..................................................................................................... 44 Assets overview.................................................................................................................................................................44 Monitoring assets..............................................................................................................................................................44

Reading the Assets Inventory page........................................................................................................................ 44 Reading the asset detail pane.................................................................................................................................. 45

View assets for a specific system................................................................................................................................. 45

4 Contents

Tag assets ..........................................................................................................................................................................45 Filter assets........................................................................................................................................................................ 46

Chapter 7: Managing Avamar Protection Policies ........................................................................47 Overview of Avamar policies.......................................................................................................................................... 47 Managing data protection policies for Avamar systems.......................................................................................... 47

View policies..................................................................................................................................................................47 Adding an Avamar policy............................................................................................................................................48 Editing an Avamar policy............................................................................................................................................ 51 Delete a policy.............................................................................................................................................................. 53

Run a backup policy..........................................................................................................................................................53

Chapter 8: Launching System Management Applications............................................................. 54 Launching Avamar Administrator.................................................................................................................................. 54

Launch Avamar Administrator from the overflow button................................................................................. 54 Launching Avamar AUI.....................................................................................................................................................54

Launch Avamar UI from the overflow button...................................................................................................... 55 Launch Avamar Restore from the overflow button............................................................................................55 Launch Avamar Proxy Deployment from the overflow button........................................................................ 55 Launch Avamar UI from the detail pane................................................................................................................ 56

Launching Data Domain System Manager.................................................................................................................. 56 Launch System Manager from the overflow button.......................................................................................... 56 Launch System Manager from the detail pane.................................................................................................... 57

Launching Search..............................................................................................................................................................57 Launching Data Protection Advisor.............................................................................................................................. 57

Chapter 9: Running Reports........................................................................................................ 58 Reports overview.............................................................................................................................................................. 58 Run a report........................................................................................................................................................................58 View the last report..........................................................................................................................................................59 Backup Report Card......................................................................................................................................................... 59 Backup Client Summary...................................................................................................................................................59 Strike Summary................................................................................................................................................................. 60 Backup Data Backed Up Daily........................................................................................................................................60 Backup Number of Jobs Backed Up Daily...................................................................................................................60 Data Domain Utilization................................................................................................................................................... 60 Data Domain Tier Utilization............................................................................................................................................61 Data Domain Daily Compression Statistics.................................................................................................................. 61 Data Domain Filesystem Utilization .............................................................................................................................. 61 Data Domain DeDuplication Ratio.................................................................................................................................. 61 Data Domain Active Streams.......................................................................................................................................... 61

Chapter 10: Auditing IDPA System Manager Activities.................................................................62 IDPA System Manager audit overview.........................................................................................................................62 Activities audit information............................................................................................................................................. 62

Chapter 11: Troubleshooting........................................................................................................ 63 Directory structure and log information...................................................................................................................... 63 Troubleshooting LDAP..................................................................................................................................................... 64

Contents 5

Check the LDAP status in the log file.................................................................................................................... 64 Diagnosing LDAP authentication failure.................................................................................................................65 Troubleshooting secure LDAP problems................................................................................................................65 Restore access to IDPA System Manager after LDAP misconfiguration ..................................................... 66 Remove LDAP from IDPA System Manager......................................................................................................... 66

Systems fail to activate................................................................................................................................................... 67 Avamar systems fail to activate.....................................................................................................................................67 Lockbox................................................................................................................................................................................67

Lockbox password requirements.............................................................................................................................68 Reset the lockbox........................................................................................................................................................68 Remove the lockbox................................................................................................................................................... 68 Reset the lockbox master password...................................................................................................................... 69 Create the lockbox......................................................................................................................................................69 Reset user account and password..........................................................................................................................69

Unlock a IDPA System Manager user account...........................................................................................................70 The SSO service fails to start on IDPA System Manager....................................................................................... 70 Disabling SSO .....................................................................................................................................................................71 Reregister SSO for a system...........................................................................................................................................71 Resolve error notifications.............................................................................................................................................. 72 Convert IPv4 to IPv6-only or dual-stack network.................................................................................................... 72

Glossary...................................................................................................................................... 73

6 Contents

Preface As part of an effort to improve product lines, periodic revisions of software and hardware are released. Therefore, all versions of the software or hardware currently in use might not support some functions that are described in this document. The product release notes provide the most up-to-date information on product features.

If a product does not function correctly or does not function as described in this document, contact a technical support professional.

NOTE: This document was accurate at publication time. To ensure that you are using the latest version of this document,

go to the Support website https://www.dell.com/support.

Purpose This document includes information about how to administer IDPA System Manager.

Audience This document is intended for IDPA System Manager administrators.

Revision history The following table presents the revision history of this document.

Table 1. Revision history

Revision Date Description

02 February 2021 Update to storage capacity and system health status for Data Domain.

01 September 2020 First release of the IDPA System Manager 19.3 Administration Guide.

Related Documentation For information about IDPA System Manager compatibility, refer to the IDPA System Manager Release Notes.

The IDPA System Manager documentation set includes the following publications:

IDPA System Manager Getting Started Guide IDPA System Manager Security Configuration Guide IDPA System Manager Release Notes IDPA System Manager Administration Guide

The documentation for the following products includes more information:

Avamar Data Domain Search Data Protection Advisor

Typographical conventions The following type style conventions are used in this document:

Preface 7

Table 2. Style conventions

Bold Used for interface elements that a user specifically selects or clicks, for example, names of buttons, fields, tab names, and menu paths. Also used for the name of a dialog box, page, pane, screen area with title, table label, and window.

Italic Used for full titles of publications that are referenced in text.

Monospace Used for: System code System output, such as an error message or script Pathnames, file names, file name extensions, prompts, and syntax Commands and options

Monospace italic Used for variables.

Monospace bold Used for user input.

[ ] Square brackets enclose optional values.

| Vertical line indicates alternate selections. The vertical line means or for the alternate selections.

{ } Braces enclose content that the user must specify, such as x, y, or z.

... Ellipses indicate non-essential information that is omitted from the example.

Where to find product documentation https://www.dell.com/support https://www.dell.com/community

Where to get support The Support website https://www.dell.com/support provides access to product licensing, documentation, advisories, downloads, and how-to and troubleshooting information. The information can enable you to resolve a product issue before you contact Support.

To access a product-specific page:

1. Go to https://www.dell.com/support. 2. In the search box, type a product name, and then from the list that appears, select the product.

Knowledgebase The Knowledgebase contains applicable solutions that you can search for either by solution number (for example, KB000xxxxxx) or by keyword.

To search the Knowledgebase:

1. Go to https://www.dell.com/support. 2. On the Support tab, click Knowledge Base. 3. In the search box, type either the solution number or keywords. Optionally, you can limit the search to specific products by

typing a product name in the search box, and then selecting the product from the list that appears.

Live chat To participate in a live interactive chat with a support agent:

1. Go to https://www.dell.com/support. 2. On the Support tab, click Contact Support.

8 Preface

3. On the Contact Information page, click the relevant support, and then proceed.

Service requests To obtain in-depth help from Licensing, submit a service request. To submit a service request:

1. Go to https://www.dell.com/support. 2. On the Support tab, click Service Requests.

NOTE: To create a service request, you must have a valid support agreement. For details about either an account or

obtaining a valid support agreement, contact a sales representative. To find the details of a service request, in the

Service Request Number field, type the service request number, and then click the right arrow.

To review an open service request:

1. Go to https://www.dell.com/support. 2. On the Support tab, click Service Requests. 3. On the Service Requests page, under Manage Your Service Requests, click View All Dell Service Requests.

Online communities For peer contacts, conversations, and content on product support and solutions, go to the Community Network https:// www.dell.com/community. Interactively engage with customers, partners, and certified professionals online.

How to provide feedback Feedback helps to improve the accuracy, organization, and overall quality of publications. You can send feedback to DPAD.Doc.Feedback@emc.com.

Preface 9

Overview Learn about IDPA System Manager.

This chapter contains the following sections:

Topics:

IDPA System Manager overview IDPA System Manager scale limits Supported browsers Environment and system requirements Monitoring systems Managing Avamar systems Systems data refresh times Search and recover capabilities Report capabilities User Interface

IDPA System Manager overview IDPA System Manager is an active monitoring application with management capabilities. IDPA System Manager provides a solution for data protection administrators who manage multiple independent data protection applications and storage devices.

When you work with multiple data protection applications, operational monitoring and management can be a complex, time consuming effort.

IDPA System Manager enables administrators to monitor and manage the software products within the Data Protection Suite family from a single user interface, simplifying the entire data protection experience.

IDPA System Manager includes the following features:

Comprehensive dashboards

IDPA System Manager has a comprehensive and customizable dashboard for at-a-glance monitoring of systems and activities. IDPA System Manager supports up to 20 dashboards per user.

Avamar system monitoring and management

When you add an Avamar system to IDPA System Manager, you can perform the following tasks:

Launch AUI or Avamar Administrator, using Single Sign-On (SSO) for supported versions. Monitor system health status and any alerts from the system. Monitor storage capacity usage. Monitor backup and replication activities at the Avamar job level. Monitor backup and replication activities at the Avamar asset level. Assets are virtual machines or clients that you add to the

Avamar system. Rerun failed backup and replication activities at the job or asset level. Manage and run Avamar protection policies. View assets that are added to Avamar.

1

10 Overview

Data Domain system monitoring

When you add a Data Domain system to IDPA System Manager, you can perform the following tasks:

Launch Data Domain System Manager, using Single Sign-On (SSO) for supported versions. Monitor system health status and any alerts from the system. Monitor storage capacity usage.

Search integration

When you integrate Search with IDPA System Manager, you can launch Search Web User Interface, using Single Sign-On (SSO) for supported versions.

Data Protection Advisor integration

When you integrate Data Protection Advisor with IDPA System Manager, you can perform the following tasks:

Launch DPA Web Console, using Single Sign-On (SSO) for supported versions. Run 11 of the most used Data Protection Advisor reports on Avamar and Data Domain systems.

IDPA System Manager scale limits IDPA System Manager includes scale limits for the numbers of monitored systems.

Table 3. Scale limits

System Scale limit

Avamar 200 Avamar systems. This value assumes that the maximum number of activities per hour is in the limit.

Data Domain Up to 80 Data Domain systems.

Search 1

Data Protection Advisor 1

Supported browsers IDPA System Manager supports only Mozilla Firefox and Google Chrome. Internet Explorer is not a supported browser.

NOTE: For the data protection applications and storage devices that IDPA System Manager is monitoring, it is

recommended that you select a browser that those applications support. Check the related documentation for the data

protection applications to learn which browsers they support.

Environment and system requirements The following list includes information about environment and system requirements:

IDPA System Manager requires a minimum browser window size of 1366x768. To review the simple support matrix for IDPA System Manager, see the Dell EMC Integrated Data Protection Appliance

Version 2.5 Software Compatibility Guide.

Overview 11

Monitoring systems IDPA System Manager includes system monitoring features.

The systems monitoring features include:

Job Activities: Monitor backup and replication activities at the job-level for Avamar. Asset Activities: Monitor backup and replication activities at the asset-level within jobs for Avamar systems. Health: Monitor the health status for Avamar and Data Domain systems. Alerts: Monitor alerts originating from Avamar and Data Domain systems. Capacity: Monitor capacity usage for Avamar and Data Domain systems.

NOTE: Add Avamar and Data Domain systems to enable IDPA System Manager monitoring.

Managing Avamar systems For Avamar systems, IDPA System Manager includes policy management and client management capabilities.

IDPA System Manager includes the following Policy Management capabilities:

View, add, edit, and delete policies, retentions, schedules, and datasets. Add clients and proxies to policies. Perform a backup of a policy. Rerun a backup or replication activity.

IDPA System Manager includes the capability for you to view existing clients that are associated with an Avamar system.

Systems data refresh times Every 90 seconds, IDPA System Manager refreshes system monitoring information with data that is fetched from systems within that 90 seconds.

Refresh the page to see the updated information.

Certain types of system information have different data refresh times. The following table describes the frequency that IDPA System Manager fetches information from systems being monitored.

Table 4. Systems monitoring data fetch times

Monitoring information type Approximate data fetch times

Data Domain system alert and health status Every 5 minutes

Data Domain system capacity Every 40 minutes

Avamar activation status Every 15 minutes

Avamar system alerts Real time

Avamar system health status Every 1 minute

Avamar system capacity, checkpoint, and garbage collection Real time

Running job activities that stop responding Every 12 hours

Search and recover capabilities IDPA System Manager integrates with Search to provide you with the ability to perform complex search and recover operations.

IDPA System Manager launches Search in a new browser tab.

After launching Search, you can perform the following tasks:

Perform a targeted full content index (FCI) search.

12 Overview

Search for files by name, location, size, owner, file type, and date. Perform advanced search queries including symbols, wildcards, filters, and operators. From the Search Results page:

View a preview of the content. Download content. Recover content. Review the size of files or directories.

For comprehensive information about Search, refer to the Search documentation set.

NOTE: To take full advantage of IDPA System Manager capabilities, it is recommended that all systems that are configured

in Search also be configured in IDPA System Manager.

Report capabilities IDPA System Manager provides the capability for you to run Data Protection Advisor reports for supported systems.

Supported systems include:

Avamar Data Domain

You can run, and then view these reports directly in the IDPA System Manager user interface. You can also specify the reporting period for these reports within the IDPA System Manager interface.

IDPA System Manager reporting features require you to have Data Protection Advisor in the environment. For more information about Data Protection Advisor, see the Data Protection Advisor documentation set.

NOTE: To take full advantage of IDPA System Manager capabilities, it is recommended that all systems that are configured

in Data Protection Advisor be configured also in IDPA System Manager.

User Interface Learn about the components of the IDPA System Manager user interface.

Header

The header includes the following components:

User menu: This menu enables you to change the password or log out of IDPA System Manager. About button: This button enables you to view IDPA System Manager version information.

Figure 1. Header

View version information

About this task

Click the following button to see details about the IDPA System Manager version:

Figure 2. About button

A dialog box appears and displays IDPA System Manager version information.

Overview 13

User menu

The User menu provides the capability for you to perform user tasks.

To perform the following user tasks, use the User menu:

Change the password of the local IDPA System Manager administrator user. NOTE: If an external LDAP or AD user is logged in to the IDPA System Manager environment, change password is not

supported.

Log out of the user interface.

Figure 3. User menu

Change password

IDPA System Manager provides the capability for you to change the local administrator user password.

About this task

The password must meet the following requirements:

A minimum length of 9 characters. A maximum length of 15 characters. At least one lowercase character. At least one uppercase character. At least one number. At least one of the following special characters:

! @ # $ % ^ & * ( ) - _

Steps

1. In the User menu, click the down-arrow.

2. Select Change Password.

The Change Password dialog box appears.

3. Type the current password.

4. Type the new password.

5. To confirm that the new password was typed correctly, type the new password again.

6. Click CHANGE PASSWORD.

Log out of IDPA System Manager

When you are not using IDPA System Manager, it is recommended that you log out.

Steps

1. In the User menu, click the down-arrow.

2. Select Log out.

The Confirm dialog box appears.

3. Click LOG OUT.

14 Overview

Left menu

The left menu provides the capability for you to browse the user interface.

From the left menu, you can access the following IDPA System Manager features:

Dashboard Health Alerts Capacity Asset Activities Job Activities System Management Asset Inventory Reports Audit Search and Recovery

Pages

IDPA System Manager presents information in dashboards and detail pages.

Dashboard pages provide at a glance insight into operational behavior.

Detail pages display focused information and provide the capability for you to perform IDPA System Manager tasks.

Main and detail panes

Most IDPA System Manager pages are composed of a main and detail pane.

The main pane appears in the middle of a page and displays information in a table format. The detail pane appears on the right side of a page and displays additional information for a selected row in a table. The detail pane may also include buttons that you can use to perform tasks that are specific to the selected row in the table.

Changing dashboards

Click the Dashboard drop-down list to select a different dashboard.

Filtering

IDPA System Manager includes filtering capabilities. Filtering allows you to customize the information that appears.

The following filter types are available for you to use:

Column filters: Appears in table headers Domain Filter: Appears in the Policies, Retentions, Schedules, and Datasets pages for Avamar only Active Filter: Appears in the user interface header of some pages Asset Filter: Appears as a search bar on the Asset Inventory page Widget Filter: Appears in widgets on the dashboard

Column filters Column filters can be used to filter the information that appears in table columns. Depending on the table column, you can specify one of the following options: All Available Last Hour Last 24 hours Last 7 days Custom (specific date-and-time range)

Overview 15

Domain Filter The Domain Filter can be used to select the domains that you want to view in the Policies, Retentions, Schedules, and Datasets pages for Avamar only. When you add a policy, retention, schedule, or dataset, the domain filter also determines which domain the policy, retention, schedule, or dataset is added in.

Asset Filter The Asset Filter can be used to filter assets listed on the Asset Inventory page. The Asset Filter search bar enables you to filter assets using a search phrase such as an asset tag, operating system, plug-in, or asset name.

Active Filter The Active Filter can be used to filter by system or system group (one or more). On the Asset Inventory and Asset Activities pages, you can use the Active Filter to filter by asset tags. The Active Filter appears in on the following pages: Health Alerts Capacity Job Activities Asset Activities Asset Inventory

To filter certain items with the Active Filter, move one or more systems or system groups to the Filtered By pane. When the Active Filter is enabled, a white filter icon appears in the header.

Widget Filter The Widget Filter can be used to refine the information that appears in a widget. All types of widgets include a Widget Filter that enables you to filter the information reported in the widget. The filter organizes information by time range, system, system groups, or, for asset-specific widgets, by asset tags. Several widgets allow you to filter by time range. You can specify one of the following options: All Available Last Hour Last 24 hours Last 7 days The Activities Trend widget enables you to view a historical 7-day trend of activities by using the Days Ago filter. For example, if you want to see the 7-day activity trend from 30 days ago, select Days Ago, and use the slider to select 30. To analyze to a data grid with more details, select a point in the graph.

The Activities Count and Activities Trend widgets allow you to pick whether to display backup activities, replication activities, or both.

When you use a dashboard widget to access a page, the information that is displayed is automatically filtered based on the widget filter settings.

Any active filters that are applied to a page, are listed in the filtered-by section that appears at the top of the table.

Monitoring data is stored for 90 days. The All Available option is limited to data stored within the last 90 days.

Sort information that is displayed in tables

Information that is displayed in tables can be sorted in ascending or descending order.

About this task

To sort information, click a column heading.

After you click the column heading, an arrow appears. An up-arrow indicates that the column data is sorted in ascending order. A down-arrow indicates that the column data is sorted in descending order.

16 Overview

Dialog boxes

Dialog boxes can appear with information about a specific task. Dialog boxes can also appear for questions that require a decision.

Notification bar

To inform you of completed events or to alert you of issues that may require attention, notifications may appear in a bar across the top of the IDPA System Manager interface.

Figure 4. Example notification

Overflow button

Overflow buttons can appear within the user interface. When you click an Overflow button, a menu of available operations appears.

Figure 5. Overflow button

Overview 17

Using Dashboards Learn about using IDPA System Manager dashboards.

This chapter contains the following sections:

Topics:

Dashboards overview Dashboard widgets Customizing dashboards

Dashboards overview IDPA System Manager dashboards provide at-a-glance insight into systems and activities.

Dashboard widgets include key performance indicators that display the following types of system information:

Backup Activities Replication Activities Trends Assets Capacity Health Alerts

From dashboard widgets, you can examine specific areas of interest.

All dashboard widgets have customizable settings. The customizable settings vary based on each widget. Certain widgets enable you to change the activity type, widget type, and time range. All widgets include a widget filter that you can use to filter by systems and groups. The widget filter can also filter by asset tags when available for a widget.

You can customize dashboard widgets by changing the widget type, deleting the widget, or adding a widget. To change the title of the widget, click the title and change it to a different title. For example, if you applied a filter to show only grouped Avamar systems, you might change the Alerts Summary widget title to Avamar Alerts.

Individualized dashboard settings are stored for each user. You can add, edit, and delete custom dashboards. Each user can create and store up to 20 dashboards.

Dashboard widgets IDPA System Manager dashboards are composed of widgets that include a key performance indicator (KPI) or multiple KPIs. KPIs provide the capability for you to measure the objectives and performance of the systems that are configured in IDPA System Manager.

Common widget functions

Learn about the functions that are common to most or all widgets.

Common functions include the following:

To change the title of the widget, click the title and edit it.

To filter by system, group, or asset tag (if the display includes assets), click the filter icon . The filter icon appears only if you select something to filter in the widget filter.

2

18 Using Dashboards

Depending on the widget, to change the activity type, widget type, or time period, or to delete the widget, click the overflow

button . Also, you can access the widget filter dialog from this menu. Depending on the widget, to go to the Asset Activities or Job Activities page, or the Health page, click View All (if

available for the widget).

Activity Counts widget

The Activity Counts widget lists the number of recent activities and their status.

By default, there are two Activity Counts widgets on the dashboard:

Assets | Backups & Replications widget Jobs | Backups & Replications widget

The Activity Counts widget shows the following information:

The total percentage of activities that complete successfully. A doughnut chart comparing the activity status counts A list of the status counts:

The number of activities that successfully completed The number of activities that failed. The number of activities that completed with exceptions. The number of running activities The number of pending activities

You can access detailed information for closer analysis by clicking embedded hyperlinks. Hyperlinks include any status area inside the doughnut chart and the numerical value for each status (completed, failed, and so on). Each hyperlink opens the Asset Activities or Job Activities page that is filtered based on the selected hyperlink.

Activity Trend widgets

The Activity Trend widgets show historical trends in activity status over a period of seven days that you select.

IDPA System Manager provides two Activity Trend widgets:

Asset | Backups & Replications Trend Jobs | Backups & Replications Trend

The Activity Trend widgets show the daily completion status as a line graph that covers a historical 7-day trend of activities. To select the end of the 7-day period, use the Days Ago setting.

For example, to view the activity trend between 10 days ago and 4 days ago, set Days Ago to 4.

Figure 6. Example of Days Ago setting

Using Dashboards 19

The default Activity Trend widget is the Asset | Backups & Replications Trend widget. You can customize the widget with

options from the overflow menu . These options include changing the widget type, activity type, and trend period (Days Ago setting) or deleting the widget. Also, you can filter by system, group, or asset tag (if the display includes assets).

You can access detailed information for closer analysis by clicking embedded hyperlinks. Hyperlinks include the numerical values for the total number of VMs, other assets, backed up, and replicated assets. Each hyperlink opens the Asset Inventory page that is filtered based on your selection.

Assets Summary widget

The Assets | Summary widget reports the completed asset activities for any protection type (backup or replication).

The Assets | Summary widget is divided into two panes:

The left pane displays the total number of virtual machine assets. This number includes the number of assets with recent successful backup and replication activities during the configured time range.

The right pane displays the total number of other assets. This number includes the number of assets with recent successful backup and replication activities during the configured time range.

Example

If a client SQL server and the file system are backed up, the Backed Up number for that client increments by 2. If the client SQL server is backed up, but the file system is not, the Backed Up number for that client increments by 1.

You can access detailed information for closer analysis by clicking a data point on any trend line (completed, failed, and so on). This action opens the Asset Activities or Jobs Activities page depending on your selection.

Assets Top Offenders widget

The Assets | Top Offenders widget lists the total number of assets with three or more consecutive backup or replication failures.

This widget lists the top three systems with the most consecutive failures. The widget lists the following information for each of these systems:

The name of the system The date of the most recent failed activity The number of consecutive failures

The Assets | Top Offenders widget lists the total number of assets with three or more consecutive backup or replication failures.

Click an asset in the list to view the Asset Activities page that is filtered by that asset.

You can access detailed information for closer analysis by clicking the hyperlinks for the listed assets. Each hyperlink opens the Asset Activities page that is filtered by the selected asset.

Alerts Summary widget

The Alerts | Summary widget shows a summary of active alerts for systems that are configured in IDPA System Manager.

The Alerts | Summary widget lists the following summary information:

Number of error alerts Number of warn alerts Number of info alerts

The Alerts | Summary widget also lists the three most recent alerts.

You can access detailed information for closer analysis by clicking the hyperlinks for the listed assets. Hyperlinks include the numerical values for errors, warning, and informational alerts. Each hyperlink opens the Alerts Summary page that is filtered by the selected alert type.

20 Using Dashboards

Storage Capacity Top Utilization widget

The Storage Capacity | Top Utilization widget shows a summary of the systems that are using the most storage.

The Storage Capacity | Top Utilization widget lists the top three systems using the highest percentage of their capacity. The widget lists the following information for each of these systems:

The system name A bar representing the storage usage The percentage of available storage used The amount of storage that is used and the amount of storage available

The Exceeded Threshold count shows the total number of systems exceeding 75% or more of their storage capacity.

Systems for which this widget displays storage capacity information include , and .

Storage capacity summary widget

The Storage Capacity | Summary widget shows a summary of the storage capacity usage for supported systems that are configured in IDPA System Manager.

The Storage Capacity | Summary widget lists the following information:

Used: Amount of storage used Available: Amount of storage available Total: Total amount of storage, including both used and available

The Storage Capacity | Summary widget also shows a capacity bar that represents the total storage usage. If the total storage usage reaches 80% or greater, the capacity bar and percentage are displayed in red to alert you.

Systems for which this widget displays storage capacity information include Avamar and Data Domain.

Health summary widget

The Health | Summary widget shows a health status summary of systems that are configured in IDPA System Manager.

The Health | Summary widget lists the following summary information:

Number of systems that are not reporting Number of unhealthy systems Number of healthy systems

The Health | Summary widget also lists the three most unhealthy systems with a health bar that compares the number of healthy and unhealthy key performance indicators (KPIs).

You can access detailed information by clicking the embedded hyperlinks. Hyperlinks include the numerical values for systems that are healthy, unhealthy, or not reporting. Each hyperlink opens the Health page that is filtered by your selection.

Customizing dashboards Learn how you can customize dashboards to fit your requirements.

IDPA System Manager provides a default dashboard that is populated with nine default widgets, the maximum number that can be displayed. Each user can create up to 20 dashboards, and each dashboard can contain between one and nine default or customized widgets.

Add a dashboard

Steps

1. In the dashboard, click the Dashboard button, and select Add.

Using Dashboards 21

The Add Dashboard dialog box appears.

2. In the Add Dashboard dialog box, type a name for the dashboard.

3. (Optional) To set this dashboard as the default dashboard, select Set as default dashboard.

4. Click ADD DASHBOARD.

Edit a dashboard

Steps

1. From the dashboard list, select a dashboard to edit.

The selected dashboard is displayed.

2. In the dashboard, click the Dashboard button, and select Edit.

The Edit Dashboard dialog box is displayed.

3. If required, change the name of the dashboard.

4. To set this dashboard as the default dashboard, select Set as default dashboard.

5. To reset the dashboard widgets, select Reset widgets back to defaults. This action ensures that widget filters and settings for the dashboard are reset to the default values.

6. Click SAVE.

Delete a dashboard

About this task

NOTE: You cannot delete a dashboard that is set as the default dashboard. However, you can set another dashboard to be

the default dashboard, and then return to the former default dashboard and delete it.

Steps

1. From the dashboard list, select the dashboard that you want to delete.

The selected dashboard is displayed.

2. Open the dashboard that you want to delete, click the Dashboard button, and select Delete.

The Delete Dashboard dialog box appears.

A dialog box appears and displays the following message:

Are you sure you want to delete the dashboard: ?

3. To delete the dashboard, click DELETE.

The dashboard is deleted, and the default dashboard is displayed.

22 Using Dashboards

Delete a widget

IDPA System Manager enables you to customize the number of widgets in a dashboard by deleting one or more widgets.

Prerequisites

You cannot delete a widget from a dashboard that has only one widget.

About this task

The default dashboard provides nine widgets. If you want to delete one or more widgets, use the following procedure.

Steps

1. From the dashboard list, select a dashboard.

The selected dashboard is displayed.

2. From the upper right corner of a widget in the dashboard, click the overflow button:

3. From the overflow menu, select Delete Widget.

Results

The widget is deleted from the dashboard.

Add a widget

Learn how to add a widget to a dashboard.

Prerequisites

You cannot add more than nine widgets to a dashboard.

Steps

1. From the dashboard list, select a dashboard.

The selected dashboard is displayed.

2. At the upper right of the dashboard page, click the Add Widget button:

The Select widget type to add menu is displayed.

3. To add a widget, select a widget from the menu.

Using Dashboards 23

Results

The selected widget is added to the dashboard.

Editing widgets

To customize the dashboard, you can edit and filter widgets to show the information that you want.

Change the widget title

IDPA System Manager enables you to customize widget titles.

About this task

Changing the title of a widget may be useful after applying a filter. For example, if you apply a filter to show only grouped Avamar systems, you might change the Alerts Summary widget title to Avamar Alerts.

Steps

1. From the Dashboard, click inside the widget title that you want to change.

2. Edit the existing title and press Enter.

Change the widget type

Change widget types to customize or rearrange the dashboard.

Steps

1. In the upper right corner of the widget, click the overflow button:

2. Select Widget Type.

A menu appears that displays all of the available widget type options.

3. Select one of the following widget types: Assets | Backups & Replications Assets | Backups & Replications Trend Alerts | Summary Assets | Top Offenders Assets | Summary Jobs | Backups & Replications Jobs | Backups & Replications Trend Health | Summary Storage Capacity | Summary Storage Capacity | Top Utilization

Results

The widget changes to the new type.

Edit the reporting time range

About this task

NOTE: The reporting period data only reflects the data that exists in IDPA System Manager. Any alerts or activities that

occurred before the system was added to IDPA System Manager do not appear.

24 Using Dashboards

Steps

1. In the upper right corner of the widget, click the overflow button:

2. Select Time Range.

A menu appears that displays all of the available reporting period options.

3. Select one of the following reporting period options: All Available Last Hour Last 24 Hours Last 7 Days

Results

The widget updates with the new reporting period setting.

Edit the activity type

Certain widgets enable you to change the activity type being reported to either backups or replications.

About this task

You can change the activity type for the following widgets: Assets | Backups & Replications Jobs | Backups & Replications Assets | Backups & Replications Trend

Steps

1. In the upper right corner of the widget, click the overflow button:

2. Select Activity Type.

A menu appears that displays all of the available activity type options.

3. Select one of the following activity type options: Backups Replications Backups & Replications

Results

The widget updates with the new activity type setting.

Refresh the dashboard

About this task

To manually refresh the dashboard, click the button.

Filter systems or assets in a dashboard widget

The default widget scope setting displays information for all systems and assets. To reduce the scope to a system, system group, or asset tag level, perform the following procedure.

Steps

1. Use one of the following methods to access the Widget Filter dialog box:

Using Dashboards 25

Click the filter icon that appears at the upper right of the widget.

In the upper right corner of the widget, click the overflow button and select Filter.

The Widget Filter dialog box appears.

2. To add systems, system groups, or asset tags to the filter, perform the following steps:

a. Select one or more options on the Available pane.

To narrow the amount of options listed in the Available pane, use the search bar.

b. Click:

The selections are added to the filter.

3. To remove selections from the filter, perform one of the following action sequences: To clear all selections from the filter, click:

To remove certain selections from the filter, perform the following steps: Select one or more selections in the Filtered By pane. Click:

The selections are removed from the filter

4. Click APPLY.

The widget refreshes and displays only information for the selections.

Reset customized dashboard

You can reset a customized dashboard to its original default values.

Steps

1. From the dashboard list, select a dashboard to reset.

The selected dashboard is displayed.

2. In the dashboard, click the Dashboard button, and select Edit.

The Edit Dashboard dialog box is displayed.

3. To reset the dashboard widgets, select Reset widgets back to defaults. This action ensures that widget filters and settings for the dashboard are reset to the default values.

4. Click SAVE.

26 Using Dashboards

Monitoring System Health Learn how to monitor system health in IDPA System Manager.

This chapter contains the following sections:

Topics:

Monitoring health status Managing alerts Monitoring system capacity

Monitoring health status To view the health status of systems that are configured in IDPA System Manager, go to the Health page.

The Health page lists the systems in a table with basic health summary information.

To view additional details about the health of a system, select a system in the table. The additional information for the selected system appears in the detail pane.

Reading the Health page

The table on the Health page lists the following basic system health status information.

System Name The name that was specified to identify the system when it was added to IDPA System Manager.

Version The system version.

Health A status that indicates the health of the system in IDPA System Manager. System health status criteria on page 27 provides the criteria used for each type of system. The status types that can be displayed are as follows: Good: If the criteria that are used to determine the health of a system are successful (healthy), the

system health status is Good. Not Reporting: A system health status is updated to Not Reporting when IDPA System Manager

cannot communicate with the system. Unhealthy: If any of the criteria that are used to determine the health of a system are not successful,

the system health status is updated to Unhealthy.

System health status criteria

IDPA System Manager tracks criteria to determine the health of each system.

Avamar health status criteria

If an Avamar system meets the following criteria, the health status for the system is updated to Good:

The communication between IDPA System Manager and the Avamar system is active, and that the Avamar system can report information to IDPA System Manager.

The system can report activities information to IDPA System Manager. The system has no errors or warning alerts. The capacity of the storage system is less than or equal to 75%. A successful garbage collection for the system has occurred in the last 24 hours. A successful checkpoint was taken in the last 24 hours. A successful HFS checkpoint validation has occurred in the last 24 hours.

3

Monitoring System Health 27

The license for the system is valid. The SSO connection status is good. The system information that is configured on the System Management page is completed with required connection details.

NOTE: If the capacity of the system is 75%, the system shows a warning. If the capacity of the system is 90%, the system

shows an error alert.

Data Domain health status criteria

If a Data Domain system meets the following criteria, the health status for the system is updated to Good:

The communication between IDPA System Manager and the Data Domain system is active, and the Data Domain system can report information to IDPA System Manager.

The capacity of the storage system is less than 90%. The system has no errors or warning alerts. The SSO connection status is good. The system information that is configured on the System Management page is completed with required connection details.

NOTE: If the capacity of the system is 90%, the system shows an error alert.

Reading the health summary detail pane

To view more detailed health information for a system, select the system in the Health table. The detail pane lists detailed health summary information for the system.

Avamar health information in the detail pane

Select a row in the main pane to display additional information about the health of a system. The following information is listed in the detail pane for Avamar system health.

Health Summary A summary checklist of the components that are used to determine the health of the Avamar system in IDPA System Manager. Above the checklist, the Last Update field lists the date and time of the most recent communication with the Avamar system. The components include: Reporting

If the Reporting component shows an X, to reactivate reporting, click REACTIVATE.

Capacity Alerts Garbage Collection Checkpoint Checkpoint Validation License SSO

NOTE: The SSO health status reflects the IDPA System Manager SSO connection status rather

than the status of the remote system. The SSO health may be reported as healthy when the

monitored system is out of sync.

The IDPA System Manager Security Configuration Guide provides information about which versions of Avamar are supported with SSO.

If the SSO component is broken, to re-register single sign-on, click SSO and then click REREGISTER.

Connection Information

A check mark represents success. An X represents failure.

Click a component for more information about the status.

Capacity A summary of the storage availability and usage, including the following components: Used: The amount of storage that is used, shown in GB and as a percentage. Available: The amount of storage that is available in GB.

28 Monitoring System Health

Total Capacity: The total amount of used storage and available storage.

System Details A summary of the following information: Last Garbage Collection: Reports whether garbage collection was successful in the last 24 hours. Last HFS Checkpoint: Reports whether there was an HFS checkpoint in the last 24 hours. Last HFS Checkpoint Validation: Reports whether HFS checkpoint validation occurred in the last

24 hours.

License Information

A summary of the licensing information, including the following components: License Status: Reports whether the license status is valid or invalid. License Expiration: Reports when the license expires.

Data Domain health information in the detail pane

Select a row in the main pane to display additional information about the health of a system.

The following information is listed in the detail pane for Data Domain system health.

Health Summary A summary checklist of the components that are used to determine the health of the system in IDPA System Manager. Above the checklist, the Last Update field lists the date and time of the most recent communication with the Data Domain system. The components include: Reporting Capacity Alerts SSO

NOTE: The SSO health status reflects the IDPA System Manager SSO connection status rather

than the status of the remote system. The SSO health may be reported as healthy when the

monitored system is out of sync.

The IDPA System Manager Security Configuration Guide provides information about which versions of Data Domain are supported with SSO.

The SSO status is displayed in the IDPA System Manager health summary only if SSO is enabled. To support SSO from IDPA System Manager to the Data Domain System Manager, you must enable SSO from the Data Domain System Manager. For instructions to configure SSO authentication, enable SSO, and configure SSO user groups, see the Data Domain Operating System Version Administration Guide.

If the SSO component is broken, to reregister single sign-on, click SSO and then click REREGISTER.

Connection Information

Capacity A summary of the storage availability and usage, including the following components: Used: The amount of storage that is used, shown in GB and as a percentage Available: The amount of storage that is available in GB Total Capacity: The total amount of used and available storage

Data Protection Advisor and Search system health information

IDPA System Manager does not collect health attribute information or generate a health status for Search and Data Protection Advisor systems.

As a result, IDPA System Manager reports Search and Data Protection Advisor system health status as None.

The system version for Search and Data Protection Advisor is retrieved only when you add the systems to IDPA System Manager. If you upgrade either software, IDPA System Manager does not update the version number. As a workaround, to update the version number displayed in IDPA System Manager, edit the Search or Data Protection Advisor system on the System Management page.

Monitoring System Health 29

Managing alerts To view and manage alerts for IDPA System Manager and all systems, go to the Alerts page.

To update the alerts table, click Refresh.

NOTE: Alerts that have been acknowledged in a system management UI, such as Avamar Administrator or Data Domain, are

deleted from IDPA System Manager.

Reading alerts

Alerts are listed in a table on the Alerts page.

The following information is listed for each alert:

System Name The name that was specified when the system was added to IDPA System Manager.

Level The type of alert in IDPA System Manager. The level types that can be displayed are as follows:

Error

Warn

Info

To learn how IDPA System Manager maps alert levels from different systems, see System alert levels on page 30.

Category The category of the alert.

Created Date The date on which the alert was created.

Message A description for the alert. If the alert has occurred more than once, an icon is displayed that indicates the

number of instances:

System alert levels

IDPA System Manager maps alerts from systems to three alert levels: Error, Warning, or Informational.

Avamar alert levels in IDPA System Manager

The following table shows what level Avamar alerts are reported as in IDPA System Manager:

Table 5. Avamar alert levels in IDPA System Manager

Avamar alert level IDPA System Manager alert level

Warning Warn

Error Error

Data Domain alert levels in IDPA System Manager

The following table shows what level Data Domain alerts are reported as in IDPA System Manager:

Table 6. Data Domain alert levels in IDPA System Manager

Data Domain alert level IDPA System Manager alert level

Alert Error

Critical Error

Emergency Error

30 Monitoring System Health

Table 6. Data Domain alert levels in IDPA System Manager (continued)

Data Domain alert level IDPA System Manager alert level

Error Error

Warning Warn

Debug Info

Info Info

Notice Info

Dismissing alerts

Dismiss health alerts to clear the alerts from IDPA System Manager and change the system Alerts health component status to Good.

Dismissing alerts will only remove the alerts from being displayed in IDPA System Manager and does not acknowledge or remove the alerts from the monitored systems. If the underlying issue still exists on the monitored system, the alert may reappear in IDPA System Manager.

NOTE: Fixing the underlying issue and acknowledging the alerts on the monitored system removes the alert from IDPA

System Manager.

Dismiss alerts

Steps

1. In the Left menu, select Alerts.

2. Select the alerts that you want to dismiss: To dismiss individual alerts, click the box beside one or more alerts. To dismiss all alerts, click the box in the header row.

3. Click DISMISS.

Results

The selected alerts are removed from IDPA System Manager. A Dismiss alerts action appears on the Audit page.

Monitoring system capacity To view the capacity state of supported systems that are configured in IDPA System Manager, go to the Capacity page.

Capacity monitoring can keep you aware of unexpected data growth that may cause downstream failures.

To view additional information about a system, select a system in the Capacity table. The additional information for the selected system appears in the detail pane.

Systems for which this widget displays system capacity include Avamar and Data Domain.

Reading the system capacity table

The table on the Capacity page lists the following basic system capacity information.

System Name A name that was manually specified to help identify the system.

Utilization The percentage of the system storage that is used.

Usage The amount of the storage that is used.

Available The amount of storage that is available.

Total Capacity The total amount of storage.

Monitoring System Health 31

Reading the system capacity detail pane

To view more detailed capacity information for a system, select the system in the Capacity table. The detail pane lists detailed capacity information for the system.

Avamar detailed capacity pane

When you select an Avamar system on the Capacity page, the detail pane lists the following Avamar system capacity information.

Health Summary Displays the last date and time the database was updated or displays Not Reporting if the system is not reporting. Capacity data might be outdated if the system is in the Not Reporting state.

Capacity A summary of the capacity usage, including the following components: Used: The amount of the storage that is used and the percentage of storage used. Available: The amount of storage that is available Total Capacity: The total amount of used and available storage Metadata Used: The percentage of the storage that is used for metadata

Forecast The forecasted number of days until the system storage becomes full.

Data Domain detailed capacity pane

When you select a Data Domain system on the Capacity page, the detail pane lists the following Data Domain system capacity information.

Health Summary Displays the last date and time the database was updated or displays Not Reporting if the system is not reporting. Capacity data might be outdated if the system is in the Not Reporting state.

NOTE: If the IDPA System Manager is in FIPS mode and the system being monitored is not FIPS-

compliant, that system might display Not Reporting.

Capacity A summary of the capacity usage, including the following components: Usage: The amount of the storage that is used Available: The amount of storage that is available Total Capacity: The total amount of used and available storage Compression Factor: The total reduction percentage (appears only for Data Domain 7.0 and later)

MTrees The status and usage of each MTree. The following components are reported for each MTree in the Data Domain system: The name of the MTree Usage: The amount of storage that is used on the MTree Status: The status of the MTree

32 Monitoring System Health

Monitoring Activities This chapter contains the following sections:

Topics:

Activities overview Monitoring job activities Monitoring asset activities

Activities overview IDPA System Manager Activities include system activities at the job and asset level.

System activity includes information about backup and replication activities for Avamar systems that are connected to IDPA System Manager.

Monitoring job activities To monitor backup and replication activities at the job level from all systems, go to the Job Activities page.

By default, the main pane on the Job Activities page displays activities that started in the last 24 hours. Use the filter icon in the Started column to filter for jobs, as required. To view additional information about an activity, select the activity from the table on the main pane. More details for the activity appear in the detail pane.

For Avamar systems, you can view a list of clients that are associated with any activity.

For Avamar systems only, you can rerun backup and replication jobs.

Reading the Job Activities page

The table on the Job Activities page lists basic job information.

The following information is listed on the Job Activities page:

Activity Name The name of the policy that the activity is associated with.

Type The type of activity. The activity types that can be displayed are as follows: Backup Replication

Status The status of the activity. The statuses that can be displayed are as follows: Completed Failed Completed with exceptions Running Pending

System Name The name that is defined in IDPA System Manager.

Started The date and time that the activity started. The values that can be displayed are as follows: All Available Last Hour Last 24 Hours Last 7 Days Custom (enables you to configure the date-and-time range)

4

Monitoring Activities 33

Reading the job activity detail pane

To view more detailed information about a job, select the job in the Job Activities table. The detail pane lists detailed information for the job activity.

Avamar activity information on the detail pane

Select a row in the main pane to display additional information about an activity. The following information is listed in the detail pane table for Avamar system activities.

Status The activity status information. The following components are reported: Activity Name: The name of the activity System Name: The name of the system System Type: The type of system Policy Type: The type of policy Schedule: The type of schedule

Asset Activities A summary of asset information. The following components are reported: Completed: The number of assets that completed Failed: The number of assets that failed With Exceptions: The number of assets that have exceptions Running: The number of assets that are actively running Pending: The number of assets that have a status of pending Total: The total number of assets that are associated with the activity

Target A summary of the target information for the activity. The following components are reported: Type: The storage target type for the activity.

For backups, the target type is either Avamar or Data Domain.

For replication, the target type is Avamar replication.

Hostname: The storage target hostname where the backup is stored.

This column is reported for backup activities only.

Total Size: The total size of all of the assets within the job.

Time A summary of the time information for the activity. The following components are reported: Started: The date and time that the activity started Ended: The date and time that the activity ended Duration: The length of time the activity took to complete

Rerun an Avamar job activity

IDPA System Manager provides the capability for you to rerun an Avamar activity from the Job Activities page.

About this task

You can rerun a failed activity from the top of the detail pane by clicking Rerun Activity. To rerun any activity, including successful activities, perform the following procedure.

Steps

1. In the Left menu, select Job Activities.

2. On the main pane, select the row for the Avamar activity that you want to rerun.

3. Click the overflow menu:

4. Click Rerun Activity. The activity runs and is added to a new row in the table.

34 Monitoring Activities

View job activities for a specific system

Learn how to view job activities for a specific system.

Steps

1. From the left menu, click System Management. The System Management page appears.

2. In the row for the system, click the Overflow menu ( ).

3. Click View Job Activities.

Results

The Job Activities page appears, listing only the activities for the selected system.

Monitoring asset activities To monitor backup and replication activities at the asset level from all systems, go to the Asset Activities page.

By default, the main pane on the Asset Activities page displays activities that started in the last 24 hours. Use the filter icon in the Started column to filter the activities, as required.

To view additional information about an activity, select the activity from the table on the main pane. More detail for the activity appears in the detail pane.

Reading the Asset Activities page

The table on the Asset Activities page lists basic job information.

The following information is listed on the Asset Activities page:

Asset Name The name of the asset.

Type The type of activity.

For Avamar, IDPA System Manager reports backup and replication activities.

Status The status of the activity. The statuses that can be displayed are as follows: Pending Completed Failed Completed with exceptions Running

Protection Type For Avamar, the type of plug-in that the asset is associated with.

Started The date and time that the activity started.

Reading the asset activity detail pane

To view more detailed asset activity information, select the activity in the Asset Activities table. The detail pane lists detailed information for the asset activity.

Avamar asset activity information on the detail pane

Select an activity on the Asset Activities page to view more details in the detail pane.

The detail pane lists the following information for Avamar asset activities:

Status The status of the activity.

Monitoring Activities 35

If the status is failed, to run the activity for the asset only, click RERUN ACTIVITY.

Status Message The error message or code for the failure, if applicable.

Appears only when the activity failed and an error message is available.

Activity Name The name of the job activity that the asset activity is part of.

System Name The name of the system that protects the asset.

System Type The type of protection system.

Policy Type The type of policy.

Time A summary of the time information for the activity. The following components are reported: Started: The date and time that the activity started Ended: The date and time that the activity ended

Details More details for the asset activity. The following components are reported: Backup Label: The Avamar backup label Backup Number: The Avamar backup sequence number Bytes Modified: The number of modified bytes in the activity Bytes Processed: The number of bytes processed during the activity Bytes Modified Sent: The number of bytes modified that are sent to storage during the backup or

replication activity Expiration: The expiration date for the backup

Rerun an Avamar asset activity

When an Avamar backup or replication activity fails for an asset, IDPA System Manager provides the capability for you to rerun the activity at the asset level.

About this task

You can rerun a failed activity from the top of the detail pane by clicking Rerun Activity. To rerun any activity, including successful activities, perform the following procedure.

Steps

1. From the left menu, select Asset Activities.

2. On the Asset Activities page, select the row for the Avamar activity that you want to rerun.

3. Click , and then click Rerun Asset Activity. The activity runs for the asset and is added to a new row in the table.

View asset activities for a specific system

Learn how to view asset activities for a specific system.

Steps

1. From the left menu, click System Management. The System Management page appears.

2. In the row for the system, click the Overflow menu ( ).

3. Click View Asset Activities.

Results

The Asset Activities page appears, listing only the activities for the selected system.

36 Monitoring Activities

View activities for a specific asset

Learn how to view activities for a specific asset.

Steps

1. From the left menu, click Asset Inventory. The Asset Inventory page appears.

2. Select the asset that you want to view activities for.

3. In the detail pane, click VIEW ACTIVITIES.

Results

The Asset Activities page appears, listing only the activities for the selected asset.

View asset activities within a job

Learn how to view activities within a job at the asset level.

Steps

1. From the left menu, click Job Activities. The Job Activities page appears.

2. Select the job that you want to view asset activities for.

3. In the detail pane, beside Asset Activities, click VIEW.

Results

The Asset Activities page appears, listing only the asset activities within the job.

Monitoring Activities 37

Managing Systems Learn about managing systems and groups in IDPA System Manager.

This chapter contains the following sections:

Topics:

System management overview Adding a system Edit a system Delete a system Managing system groups

System management overview The System Management page provides the capability for you to add, edit, delete, and manage systems and groups in IDPA System Manager.

The following list includes the system management capabilities that are available in IDPA System Manager:

Add, edit, and delete Avamar, Data Domain, Data Protection Advisor, and Search systems. Organize systems into groups, including the ability to add, edit, and delete groups. View system information. Launch the native management application for the system. For Avamar systems:

View, add, edit, and delete policies, retentions, schedules, and datasets. Add clients and proxies to policies. Perform a backup of a policy.

When an Avamar system is not reporting, IDPA System Manager automatically attempts to reactivate the system every 15 minutes. Manually reactivating the Avamar system is possible, but if activation is already in progress, this operation does not work. It is recommended that you allow IDPA System Manager to automatically reactivate the Avamar system.

Adding a system Learn how to add a system to IDPA System Manager.

NOTE: The IDPA System Manager supports only the Backup Server (Avamar), Protection Storage (Data Domain),

Reporting and Analytics (Data Protection Advisor), and Search systems that are part of the same IDPA system as the

IDPA System Manager.

NOTE: You can configure only one Search and Data Protection Advisor system with IDPA System Manager at a time.

Add an Avamar system

Use IDPA System Manager to add an Avamar system.

Steps

1. In the Left menu, select System Management.

2. Click ADD.

The Add System window is displayed.

3. On the Select System Type page, select Avamar, and then click Next.

5

38 Managing Systems

4. On the Connection Information page, specify the following information:

Name: Specify a name that helps identify the system. Hostname: Specify the fully qualified domain name (FQDN) of the Avamar system. Avamar Username: Specify the username of the Avamar system. For Avamar Administrator, the username is MCUser. Avamar Password: Specify the password for the Avamar system user interface.

5. (Optional) To specify optional fields, click Show optional fields, and then specify the following information, as required:

Port: Specify the Avamar MCS port. The default value is 9443. To specify the default value, leave this field blank. NOTE: When you add a system to IDPA System Manager that uses a nonstandard port, you must modify the IDPA

System Manager firewall to enable communication with that port. The IDPA System Manager Security Configuration

Guide provides instructions.

OS Root password: Specify the OS root password. NOTE: OS root credentials are optional for Avamar 19.3 and later. If the Avamar version is 19.2 or earlier, click the

toggle button to enable the field and specify the OS root password.

Override MCGUI URL: Specify an alternate URL destination for the AVAMAR ADMINISTRATOR button.

To override the AVAMAR ADMINISTRATOR link to direct to the AUI, type https:// /aui.

6. Click Next.

7. On the Certificate Verification page, to ensure that you are adding the right system, verify that the certificate information matches the exact certificate on the Avamar system.

8. Once you have confirmed that the certificate information is correct, select Accept Certificate, and then click SAVE.

IDPA System Manager does not validate the certificate and uses the certificate that you verify to connect with the system. If the remote system certificate changes, IDPA System Manager does not connect with the system.

In this scenario, edit the system on the IDPA System Manager System Management page to verify the new certificate details.

Add a Data Domain System

Steps

1. In the Left menu, select System Management.

2. Click ADD.

The Add System window is displayed.

3. On the Select System Type page, select Data Domain, and then click Next.

4. On the Connection Information page, specify the following information:

Name: Specify a name that helps identify the system. Hostname: Specify the Fully Qualified Domain Name (FQDN) of the Data Domain system. Username: Specify the Data Domain administrator username. Password: Specify the Data Domain administrator password.

5. Click Next.

6. On the Certificate Verification page, to ensure that you are adding the right system, verify that the certificate information matches the certificate on the Data Domain system.

7. Once you have confirmed that the certificate information is correct, select Accept Certificate, and then click SAVE.

IDPA System Manager does not validate the certificate and uses the certificate that you verify to connect with the system. If the remote system certificate changes, IDPA System Manager does not connect with the system.

In this scenario, edit the system on the IDPA System Manager System Management page to verify the new certificate details.

Managing Systems 39

Add a Data Protection Advisor system

To use the IDPA System Manager reporting features, you must add a Data Protection Advisor system.

Steps

1. In the Left menu, select System Management.

2. Click ADD.

The Add System dialog box is displayed.

3. On the Select System Type page, select Data Protection Advisor, and then click Next.

4. On the Connection Information page, specify the following information:

Name: Specify a name that helps identify the system. Hostname: Specify the fully qualified domain name (FQDN) of the Data Protection Advisor system. Username: Specify the Data Protection Advisor Administrator username. Password: Specify the Data Protection Advisor Administrator password.

5. (Optional) To specify a nondefault Data Protection Advisor port number, click Show optional fields, and then type the port number in the Port field.

NOTE: When you add a system to IDPA System Manager that uses a nonstandard port, you must modify the IDPA

System Manager firewall to enable communication with that port. The IDPA System Manager Security Configuration

Guide provides instructions.

6. Click Next.

7. On the Certificate Verification page, to ensure that you are adding the correct system, verify that the certificate information being displayed matches the certificate on the Data Protection Advisor system.

8. Once you have confirmed that the certificate information is correct, select Accept Certificate, and then click SAVE.

IDPA System Manager does not validate the certificate and uses the certificate that you verify to connect with the system. If the remote system certificate changes, IDPA System Manager does not connect with the system.

In this scenario, edit the system on the IDPA System Manager System Management page to verify the new certificate details.

Add a Search system

To perform advanced search and recover operations, you must add a Search system.

Steps

1. In the Left menu, select System Management.

2. Click ADD.

The Add System window is displayed.

3. On the Select System Type page, select Data Protection Search, and then click Next.

4. On the Connection Information page, specify the following information:

Name: Specify a name that helps identify the Search system. Hostname: Specify the fully qualified domain name (FQDN) of the Search system. Username: Specify the Search Administrator username. Password: Specify the Search Administrator password.

5. (Optional) To specify optional fields, click Show optional fields, and then specify the following information, as required:

Admin Rest API Port: Specify the Search REST API port. The default value is 448. Search UI Port: Specify the Search UI port. The default value is 443.

NOTE: When you add a system to IDPA System Manager that uses a nonstandard port, you must modify the IDPA

System Manager firewall to enable communication with that port. The IDPA System Manager Security Configuration

Guide provides instructions.

6. Click Next.

40 Managing Systems

7. On the Certificate Verification page, to ensure that you are adding the correct system, verify that the certificate information being displayed matches the certificate on the Search system.

8. Once you have confirmed that the certificate information is correct, select Accept Certificate, and then click SAVE.

IDPA System Manager does not validate the certificate and uses the certificate that you verify to connect with the system. If the remote system certificate changes, IDPA System Manager does not connect with the system.

In this scenario, edit the system on the IDPA System Manager System Management page to verify the new certificate details.

Edit a system After a system is added, you can edit the system details.

Steps

1. In the Left menu, select System Management.

2. Select the system that you want to edit.

3. Click EDIT. The Edit System dialog box is displayed.

4. Edit the details for the selected system.

5. Click SAVE.

Delete a system If a system is no longer required, you can delete the system.

Steps

1. In the Left menu, select System Management.

2. Select the system that you want to delete.

If required, you can select multiple systems.

3. Click DELETE.

The Confirm Delete dialog box is displayed.

4. Click DELETE.

The system is deleted.

After you delete a system, a deactivation activity message is displayed on the Audit page.

Managing system groups IDPA System Manager includes capabilities to organize systems into groups.

You can use groups in IDPA System Manager filters.

After a group is created, you can edit the group. When a group is no longer required, you can delete the group.

Add a group

To organize systems, you can use groups.

Steps

1. In the Left menu, select System Management.

2. Click GROUPS.

The GROUPS page is displayed.

3. Click ADD

Managing Systems 41

The Add Group dialog box is displayed.

4. In the Group Name field, type a name for the group.

5. To add systems to the group, perform the following steps:

a. Select one or more systems in the Available pane.

To narrow the amount of group or systems that are listed in the Available pane, use the search bar.

b. Click:

The systems are added to the group.

6. To delete systems from the group, perform one of the following action sequences: To clear all systems from the group, click:

To delete certain systems from the group, perform the following steps: Select one or more systems in the Selected pane. Click:

The systems are deleted from the group.

7. Click SAVE.

Edit a group

If changes are required to a group, you can edit the group.

Steps

1. In the Left menu, select System Management.

2. Click GROUPS.

The GROUPS page is displayed.

3. Select the group that you want to edit.

4. Click EDIT The Edit Group window is displayed.

5. (Optional) Edit the Group Name.

6. To add systems to the group, perform the following steps:

a. Select one or more systems in the Available pane.

To narrow the number of systems listed in the Available pane, use the search bar.

b. Click:

The systems are added to the group.

7. To delete systems from the group, perform one of the following action sequences: To clear all systems from the group, click:

To delete certain systems from the group, perform the following steps: Select one or more systems in the Selected pane. Click:

42 Managing Systems

The systems are deleted from the group.

8. Click SAVE.

Delete a group

If a group is no longer required, you can delete the group.

Steps

1. In the Left menu, select System Management.

2. Click GROUPS.

The GROUPS page is displayed.

3. Select the group that you want to delete.

4. Click DELETE.

The Confirm Delete dialog box is displayed.

5. Click DELETE.

Managing Systems 43

Monitoring Assets This chapter contains the following sections:

Topics:

Assets overview Monitoring assets View assets for a specific system Tag assets Filter assets

Assets overview View and manage protected assets on the Asset Inventory page.

Assets are resources that are configured in a Avamar system. IDPA System Manager discovers the assets when you add these systems to IDPA System Manager.

Protected assets from added systems are displayed for monitoring by IDPA System Manager.

Monitoring assets To view the discovered assets, go to the Asset Inventory page.

The Asset Inventory page lists system assets in a table with basic summary information. To view additional details, select an asset in the table. The additional information for the selected asset appears in the detail pane.

Reading the Assets Inventory page

The table on the Asset Inventory page lists the following basic asset information.

Name The name of the asset.

System Name The name of the system that protects the asset.

Type The type of asset. There are two asset types that IDPA System Manager displays: Virtual Machine: An asset that is hosted on a virtual machine. Other: Any other type of asset, including filesystems, databases, and NDMP.

Last Backup The timestamp of the most recent backup.

Recent Failures The number of recent activities for the asset that failed. Once an activity successfully completes, this column is cleared.

6

44 Monitoring Assets

Reading the asset detail pane

To view more detailed information for an asset, select the asset in the Asset Inventory table. The detail pane lists detailed information for the asset.

Avamar asset detail pane

When you select an Avamar asset on the Asset Inventory page, the detail pane lists the following Avamar asset information.

System Name The name of system that protects the asset.

System Type The type of system that protects the asset.

OS The operating system that is installed on the asset.

Agent Version The version of the agent on the asset. This field appears only for non-virtual machine type assets.

Domain The domain that the asset is part of

Recent Failures The number of recent failures of backup or replication activities for the asset.

Under Recent Failures, the Last Failure component lists the date of the most recent failed activity.

The Recent Failures and Last Failure components are only listed when there are recent failures.

Tags The tags that are applied to the asset.

Plugins The plugins that are installed on the asset. The following information is reported: Last Backup: The date and time of the most recent backup Protected By: The name of the policy that backs up the asset Last Replication: The date and time of the most recent replication Replicated By: The name of the policy that replicates the asset

View assets for a specific system Learn how to view asset activities for a specific system.

Steps

1. From the left menu, click System Management. The System Management page appears.

2. In the row for the system, click the Overflow menu ( ).

3. Click View Assets.

Results

The Asset Inventory page appears, listing only the assets for the selected system.

Tag assets Add asset tags to organize assets, and enable custom filtering.

Steps

1. From the left menu, click Asset Inventory. The Asset Inventory page appears.

2. Select one or more assets that you want to tag.

To select all assets, click the checkbox in the table header.

The detail pane lists the selected assets and the set of tags that are applied to the assets.

3. In the detail pane, under Tags, type the tag name, and then press Enter.

Monitoring Assets 45

The tag is added to selected assets.

4. To delete a tag, click X.

Results

When you add an asset tag, the tag is added as an option to use in filtering information about certain pages and dashboard widgets.

Filter assets Use the search bar on the Asset Inventory page to quickly filter assets.

Steps

1. From the left menu, click Asset Inventory. The Asset Inventory page appears.

2. In the search bar, type a search keyword.

Some types of keywords that you can use include a tag, asset name, system type, operating system, and Avamar plugin name.

The Assets Inventory page refreshes and lists only the assets that match the search keyword.

3. To clear the search filter, in the search bar, click x.

46 Monitoring Assets

Managing Avamar Protection Policies This chapter contains the following sections:

Topics:

Overview of Avamar policies Managing data protection policies for Avamar systems Run a backup policy

Overview of Avamar policies Policies in IDPA System Manager are rules for client backups that can be specified, named and then applied to one or more groups.

IDPA System Manager policies include information about all policies, not just policies that were initiated or configured in IDPA System Manager.

Policies include the following components:

RetentionsRetentions in IDPA System Manager are the policies that define the amount of time in which a set of data remains available for restore. Retention is a persistent and reusable policy that can be named and attached to multiple groups.

SchedulesSchedules in IDPA System Manager provide the ability to control the frequency and the start and end time of backups of clients in a group. A schedule is a persistent and reusable policy that can be named and attached to multiple groups.

DatasetsDatasets in IDPA System Manager are a policy that define a set of files, directories, and file systems for each supported platform that are included or excluded in backups across a group of clients. A dataset is a persistent and reusable policy that can be named and attached to multiple groups.

Managing data protection policies for Avamar systems For Avamar systems, IDPA System Manager provides the capability for you to view, add, edit, and delete data protection policies.

You can also start an immediate backup using a policy.

View policies

IDPA System Manager provides the capability for you to view policies for an Avamar system.

Steps

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab where a list of policies for the selected Avamar system are displayed.

7

Managing Avamar Protection Policies 47

Adding an Avamar policy

Learn how to add an Avamar backup policy with IDPA System Manager.

Add a backup policy

IDPA System Manager provides the capability for you to add a policy for an Avamar system.

Steps

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. (Optional) To change the domain where the policy will be created, select a different domain from the Domain drop-down list.

When you add a policy, the policy is created in the domain selected in the Domain drop-down list. By default, the root "/" directory is selected as the Domain.

5. Click ADD.

The Add Policy dialog box appears.

6. In the Information panel, specify information for the following fields, and then click NEXT:

NameYou can specify any name that helps identify the policy. EnabledSpecify whether to enable the policy. The default is disabled. DatasetThe dataset that is to be associated with the policy. ScheduleThe schedule that is to be associated with the policy. RetentionThe retention that is to be associated with the policy.

In the Add Policy dialog box, the Domain field is read-only and maps to the domain specified on the System Management > Manage Policies page.

7. (Optional) In the Clients panel, select one or more clients to be associated with the policy.

To perform a search for clients and filter by the client domain and name, in the Search for clients... field, type search criteria.

8. Click NEXT.

9. (Optional) In the Proxies panel, select one or more proxies to be associated with the policy.

NOTE: The Auto Proxy Enabled checkbox is automatically selected. When this checkbox is selected, all proxies are

automatically added to policies.

10. Click FINISH.

The page refreshes, a notification appears in the Notification bar that indicates the policy was successfully added, and in the list of policies, the new policy is displayed.

Add a retention

IDPA System Manager provides the capability for you to add a retention for an Avamar system.

Steps

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. To open the RETENTIONS tab, click RETENTIONS.

48 Managing Avamar Protection Policies

5. (Optional) To change the domain where the retention will be created, select a different domain from the Domain drop-down list.

When you add a retention, the retention is created in the domain selected in the Domain drop-down list. By default, the root "/" directory is selected as the Domain.

6. Click ADD.

The Add Retention dialog box appears.

7. Specify the following information:

NameYou can specify any name that helps identify the retention. Expiration Type

In the Add Retention dialog box, the Domain field is read-only and maps to the domain specified on the System Management > Manage Policies page.

If required, specify information for additional fields depending on the Expiration Type.

8. Click FINISH.

The page refreshes, a notification appears in the Notification bar that indicates the retention was successfully added, and in the list of retentions, the new retention is displayed.

Add a schedule

IDPA System Manager provides the capability for you to add a schedule for an Avamar system.

Steps

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. To open the SCHEDULES tab, click SCHEDULES.

5. (Optional) To change the domain where the schedule will be created, select a different domain from the Domain drop-down list.

When you add a schedule, the schedule is created in the domain selected in the Domain drop-down list. By default, the root "/" directory is selected as the Domain.

6. Click ADD.

The Add Schedule dialog box appears.

7. Specify the following fields:

NameYou can specify any name that helps identify the schedule. Type

In the Add Schedule dialog box, the Domain field is read-only and maps to the domain specified on the System Management > Manage Policies page.

The Timezone field is read-only. The default for this field is the local time zone of the user.

If required, specify information for additional fields depending on the selected Type.

8. If you did not specify On Demand for the Type field, specify a date for the following fields:

Delay Until End After

9. Click FINISH.

The page refreshes, a notification appears in the Notification bar that indicates the schedule was successfully added, and in the list of schedules, the new schedule is displayed.

Managing Avamar Protection Policies 49

Add a dataset

IDPA System Manager provides the capability for you to add a dataset for an Avamar system.

Steps

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. To open the DATASETS tab, click DATASETS.

5. (Optional) To change the domain where the dataset will be created, select a different domain from the Domain drop-down list.

When you add a dataset, the dataset is created in the domain selected in the Domain drop-down list. By default, the root "/" directory is selected as the Domain.

6. Click ADD.

The Add Dataset dialog box appears.

7. Specify a Name.

You can specify any name that helps identify the dataset.

In the Add Dataset dialog box, the Domain field is read-only and maps to the domain specified on the System Management > Manage Policies page.

8. Select a Plug-in type, and then select one of the following:

All Select Files and/or Folders

For the selected Plug-in type, to add a specific file or folder, type the name of the file or folder, and then click ADD. After you click ADD, the specific file or folder is added to the Plug-in list.

9. From the Plug-in list, delete any plug-in entries that you do not want to be included.

The following is the default list of plug-in options:

AIX File System FreeBSD File System HP-UX File System Linux File System Macintosh File System NetWare File System SCO OpenServer File System Solaris File System UnixWare File System Windows File System

To delete a Plug-in, in the Remove Plug-In column, click the X that is associated with the Plug-in that you want to delete.

10. Click FINISH.

The page refreshes, a notification appears in the Notification bar that indicates the dataset was successfully added, and in the list of datasets, the new dataset is displayed.

50 Managing Avamar Protection Policies

Editing an Avamar policy

Learn how to edit an Avamar backup policy with IDPA System Manager.

Edit a policy

IDPA System Manager provides the capability for you to edit a policy for an Avamar system.

About this task

NOTE: You cannot edit Avamar reserved items. For Avamar reserved items, the EDIT button is disabled.

Steps

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. Select the policy that you want to edit, and then click EDIT.

The Edit Policy dialog box appears.

5. (Optional) In the Information panel, edit the fields.

6. Click NEXT.

7. (Optional) In the Clients panel, select, or clear the checkboxes for the available clients.

8. Click NEXT.

9. (Optional) In the Proxies panel, select, or clear the checkboxes for Auto Proxy Enabled and available proxies.

10. Click FINISH.

The page refreshes, a notification appears in the Notification bar that indicates the policy was successfully updated, and in the list of policies, the updated policy is displayed.

Edit a retention

IDPA System Manager provides the capability for you to edit a retention for an Avamar system.

About this task

NOTE: You cannot edit Avamar reserved items. For Avamar reserved items, the EDIT button is disabled.

Steps

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. To open the RETENTIONS tab, click RETENTIONS.

5. From the list, select the retention that you want to edit.

6. Click EDIT.

The Edit Retention dialog box appears.

7. In the Edit Retention dialog box, edit the following:

Name Expiration Type Retention Period

If required, edit information for additional fields depending on the Expiration Type.

Managing Avamar Protection Policies 51

8. Click FINISH.

The page refreshes, a notification appears in the Notification bar that indicates the retention was successfully updated, and in the list of retentions, the updated retention is displayed.

Edit a schedule

IDPA System Manager provides the capability for you to edit a schedule for an Avamar system.

About this task

NOTE: You cannot edit Avamar reserved items. For Avamar reserved items, the EDIT button is disabled.

Steps

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. To open the SCHEDULES tab, click SCHEDULES.

5. From the list, select the schedule that you want to edit.

6. Click EDIT.

The Edit Schedule dialog box appears.

7. Edit the fields.

8. Click FINISH.

The page refreshes, a notification appears in the Notification bar that indicates the schedule was edited, and in the list of schedules, the updated schedule is displayed.

Edit a dataset

IDPA System Manager provides the capability for you to edit a dataset for an Avamar system.

About this task

NOTE: You cannot edit Avamar reserved items. For Avamar reserved items, the EDIT button is disabled.

Steps

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. To open the DATASETS tab, click DATASETS.

5. From the list, select the dataset that you want to edit.

6. Click EDIT.

The Edit Dataset dialog box appears.

7. Edit the fields.

8. Click FINISH.

The page refreshes, a notification appears in the Notification bar that indicates the dataset was successfully updated, and in the list of datasets, the updated dataset is displayed.

52 Managing Avamar Protection Policies

Delete a policy

IDPA System Manager provides the capability for you to delete a policy for an Avamar system.

About this task

NOTE: You cannot delete Avamar reserved items. For Avamar reserved items, the DELETE button is disabled.

Steps

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click , and then click Manage Policies.

The System Management > Manage Policies page appears, open to the POLICIES tab.

4. Select the policy that you want to delete, and then click DELETE. The Confirm Delete dialog box appears.

5. Click DELETE. The page refreshes, a notification appears in the Notification bar that indicates the policy was successfully deleted, and the policy is no longer displayed in the list of policies.

Run a backup policy IDPA System Manager provides the capability for you to run a backup policy.

About this task

If the policy is enabled and has clients, the BACKUP NOW button is enabled, otherwise the button is disabled.

Steps

1. In the Left menu, select System Management.

2. Select an Avamar system.

3. Click:

4. Click Manage Policies. The System Management > Manage Policies page appears, open to the POLICIES tab.

5. Select a policy, and then click BACKUP NOW.

A message appears in the Notification bar that indicates the backup has started for the selected policy.

You can track the backup progress on the Audit page or the Job Activities page.

Managing Avamar Protection Policies 53

Launching System Management Applications IDPA System Manager allows you to launch native system management applications.

This chapter includes the following topics:

Topics:

Launching Avamar Administrator Launching Avamar AUI Launching Data Domain System Manager Launching Search Launching Data Protection Advisor

Launching Avamar Administrator IDPA System Manager provides the capability for you to launch Avamar Administrator.

For instructions about how to use Avamar Administrator, refer to the Avamar documentation.

Launch Avamar Administrator from the overflow button

Prerequisites

IDPA System Manager must be open to the System Management page.

Steps

1. Click the overflow button beside the Avamar system:

2. Click Avamar Administrator. A prompt appears to download a .jnlp file for Avamar Administrator. Based on the browser settings, you can either open or save the file.

3. Execute the .jnlp file to launch Avamar Administrator. Due to system security settings, there may be security prompts when you execute the .jnlp file. Accept the security prompts to continue launching Avamar Administrator.

Results

Avamar Administrator launches.

Launching Avamar AUI IDPA System Manager provides the capability for you to launch Avamar UI. You can also choose to launch Avamar UI directly into the Avamar Restore or Avamar Proxy Deployment pages.

NOTE: To launch the AUI from IDPA System Manager, the Avamar system must be version 7.5.1 or later.

For instructions about how to use Avamar AUI, refer to the Avamar documentation.

8

54 Launching System Management Applications

Launch Avamar UI from the overflow button

Prerequisites

You can launch the Avamar UI when IDPA System Manager is open to one of the following pages:

Health Alerts Capacity Asset Activities Job Activities System Management

Steps

1. Click the overflow button beside the Avamar system:

2. Click Avamar UI.

Results

The Avamar UI launches.

Launch Avamar Restore from the overflow button

Prerequisites

You can launch the AUI Avamar Restore page when IDPA System Manager is open to one of the following pages:

Asset Activities Job Activities Asset Inventory System Management

Steps

1. Click the overflow button beside the Avamar system:

2. Click Avamar Restore.

Results

The Avamar AUI launches to the Avamar Restore page.

Launch Avamar Proxy Deployment from the overflow button

Prerequisites

You can launch the AUI Avamar Proxy Deployment page when IDPA System Manager is open to one of the following pages:

Job Activities Asset Activities System Management

Steps

1. Click the overflow button beside the Avamar system:

Launching System Management Applications 55

2. Click Avamar Proxy Deployment.

Results

The Avamar AUI launches to the Avamar Proxy Deployment page.

Launch Avamar UI from the detail pane

Prerequisites

IDPA System Manager must be open to one of the following pages:

Health Capacity Job Activities Asset Activities Asset Inventory

Steps

1. Select the Avamar system from the list of systems on the main pane.

2. In the detail pane, click AVAMAR UI.

Results

Avamar UI launches.

Launching Data Domain System Manager IDPA System Manager provides the capability for you to launch the Data Domain System Manager.

For instructions about how to log into and use Data Domain System Manager, refer to the Data Domain documentation.

Launch System Manager from the overflow button

Prerequisites

To support Single Sign-On (SSO) from IDPA System Manager to the Data Domain System Manager (6.2.0.10 and later), you must enable SSO from the Data Domain System Manager and create group mapping. For instructions to configure SSO authentication, enable SSO, and configure SSO user groups, refer to the Data Domain Operating System Version Administration Guide.

IDPA System Manager must be open to one of the following pages:

Health Alerts Capacity System Management

Steps

1. Click the overflow button beside the Data Domain system:

2. Click System Manager.

Results

Data Domain System Manager launches.

56 Launching System Management Applications

Launch System Manager from the detail pane

Prerequisites

IDPA System Manager must be open to one of the following pages:

Health Capacity

Steps

1. Select the Data Domain system from the list of systems on the main pane.

2. In the detail pane, click SYSTEM MANAGER.

Results

Data Domain System Manager launches.

Launching Search IDPA System Manager provides the capability for you to launch Search.

Steps

1. In the Left menu, select System Management. The System Management page appears.

2. In the row for the Search system, click the Overflow menu ( ).

3. Click DATA PROTECTION SEARCH.

Search launches in a new browser tab.

4. For further instructions about how to log in to Search, refer to the Search documentation.

Launching Data Protection Advisor IDPA System Manager provides the capability for you to launch Data Protection Advisor.

Steps

1. In the Left menu, select System Management. The System Management page appears.

2. In the row for the Data Protection Advisor system, click the Overflow menu ( ).

3. Click DATA PROTECTION ADVISOR.

Data Protection Advisor launches in a new browser tab.

4. For further instructions about how to log in to Data Protection Advisor, refer to the Data Protection Advisor documentation.

Launching System Management Applications 57

Running Reports Learn about IDPA System Manager reports.

This chapter contains the following sections:

Topics:

Reports overview Run a report View the last report Backup Report Card Backup Client Summary Strike Summary Backup Data Backed Up Daily Backup Number of Jobs Backed Up Daily Data Domain Utilization Data Domain Tier Utilization Data Domain Daily Compression Statistics Data Domain Filesystem Utilization Data Domain DeDuplication Ratio Data Domain Active Streams

Reports overview IDPA System Manager provides the capability for you to run Data Protection Advisor reports for Avamar and Data Domain systems.

IDPA System Manager reporting features require you to have Data Protection Advisor system configured with IDPA System Manager.

Add a Data Protection Advisor system on page 40 provides instructions for adding a Data Protection Advisor system to IDPA System Manager.

For more information about Data Protection Advisor, see the Data Protection Advisor documentation set.

You can run, and then view these reports directly in the IDPA System Manager user interface. You can also specify the reporting period for these reports within the IDPA System Manager interface.

NOTE: To take full advantage of IDPA System Manager capabilities, it is recommended that all systems that are configured

in Data Protection Advisor be configured in IDPA System Manager.

Run a report In the IDPA System Manager user interface, you can run Data Protection Advisor reports for Avamar and Data Domain systems.

Steps

1. In the Left menu, select Reports.

2. (Optional) To filter the list of reports on system type, select one or more of the following options: Avamar Data Domain

3. (Optional) To search for a specific report, type the report name in the search box.

4. (Optional) To specify a reporting period other than the default of last week for the report that you want to run, click LAST WEEK.

9

58 Running Reports

A menu appears and displays a list of the reporting periods that are available.

From the list, select a reporting period.

5. On the report that you want to run, click RUN REPORT.

While the report is generating, the RUN REPORT button displays PROCESSING.

When the report is available for viewing, a notification appears at the top of the user interface.

6. After the report generation is complete, to view the report, click VIEW LAST REPORT.

The report opens in a new window.

View the last report IDPA System Manager provides the capability for you to view the last report that was run.

About this task

Data Protection Advisor retains reports for 24 hours. If the last report was generated more than 24 hours ago, the View Report link is not visible.

Steps

1. In the Left menu, select Reports.

2. (Optional) To filter the list of reports on system type, select one or more of the following options: Avamar Data Domain

3. (Optional) To search for a specific report, type the report name in the search box.

4. On the report that you want to view, click VIEW LAST REPORT.

The report opens in a new window.

Backup Report Card The Backup Report Card reports information about each client that was backed up over the reporting period and the number of successful and unsuccessful jobs on a daily basis in a report card.

The Backup Report Card identifies clients that have repetitive failures, or more importantly, clients that have not been backed up at all. For each day in the specified reporting period, a cell displays the backup status of each client:

If the cell for a client is completely green, all backups were successful for that client on that day. If the cell is completely red, all backups failed for that client on that day. If there is a mix of red and green, the proportion represents the percentage of backups that failed on that client on that day. If a cell is white, no backups occurred for that client on that day.

Backup Client Summary The Backup Client Summary report provides of summary of the backup client in a table report.

The report includes the following information:

CompletedCount of the total number of clients on the backup server that has at least one job on it. SuccessfulIndicates that all jobs that were processed on the client during the reporting period were successful. PartialIndicates that some jobs were successful and that some jobs were unsuccessful during the reporting period. The

statuses of jobs could be Successful, Failure, or Missed. The Backup Client Summary report lists a client as a Partial client when it has a mix of failed, successful, and missed jobs within the period.

FailedCount of the total number of clients after deduplication with only failed jobs on them. MissedCount of the number of clients with all missed jobs on them. ActiveCount of the number of clients with active jobs running. Success RateSuccess rate of clients on the backup server over the reporting period.

Running Reports 59

Strike Summary The Strike Summary report returns the number of clients that have not been backed up for one or more days consecutively in a table report.

The report includes the following information:

One StrikeCount of the number of clients that have at least one failure in the last 24 hours, which is the last day. Two StrikesCount of the number of clients that have at least one failure in the last 24 hour to 48 hour period and last 24

hour period, which is the last 2 days. Three StrikesCount of the number of clients that have at least one failure in the last 3 days.

The following list includes information about strikes and other elements of this report:

Strikes are based on clients. If deduplication is enabled in Configure Report Settings in the Data Protection Advisor web console, the jobs on the client

are deduplicated to discount earlier failures where a job later succeeded. A partial success where some jobs are successful and some fail for a client, counts as strike. If a client has a combination of missed/failed or missed/successful jobs, it is considered a partial client and is included in the

strike count. Alternatively, a client with all missed jobs is included in the count. Full or incremental Backup level does not make a difference. Reports do not filter based on job level. If you run a report with a period of last day, the report only returns a one strike failed client count because you only ran it for

the last day. If you run the report for last 2 days, if any exist, it returns the count for one and two strike failures. If you run it for last week or last 3 days, the report returns any failures in last 3 days.

The report is hard-coded to return failure counts only for consecutive failed clients for the last 3 days, maximum. It does not matter if you configure the report to run with a period that is longer than 3 days. For example, if you specify the period of last month, the report does not report on any three strikes within the last month.

Backup Data Backed Up Daily The Backup Data Backed Up Daily report returns the total data by server that is backed up daily in a column chart.

The report includes the following information:

Total SizeTotal amount of data backed up (in GB). ServerName of the server on which the backup occurred.

Backup Number of Jobs Backed Up Daily The Backup Number of Jobs Backed Up Daily report returns the total number of jobs that are backed up daily in a column chart.

Num Jobs represents the number of jobs that have completed.

Data Domain Utilization The Data Domain Utilization report returns information about Data Domain utilization in a table.

The report includes the following information:

HostnameName of the host on which the file system is mounted. UtilizationAverage utilization for all hosts as a percentage. CapacityTotal capacity on the host in GB. Used CapacityAmount of space that is used on the file system in MB. Cleanable SpaceAmount of space that can be cleaned in MB. Free CapacityAmount of free space on the file system in MB. Last Day ChangeThe amount of space that is used in MB per Data Domain in the 24 hours. Dedup RatioThe de-duplication ratio that Data Domain is achieving.

60 Running Reports

Data Domain Tier Utilization The Data Domain Tier Utilization report returns information about Data Domain system tier capacity and utilization in a table report.

The report includes the following information:

HostnameName of the Data Domain. TierName of the tier. UtilizationCapacity utilization on the tier as a percentage. CapacityTotal storage space in MB. Used CapacityPost compression size in MB. Available CapacityAvailable storage space in MB. Pre Compression SizePre compression size in MB. Cleanable SpaceAmount of cleanable space in MB.

Data Domain Daily Compression Statistics Returns Data Domain daily compression statistics in a line chart. Uses data from the Daily Compression Statistics data source.

HostnameName or IP address of the Data Domain server. Total Compression FactorDifference between the Pre Compression Size and the Post Local Compression Size (in MB). Dedupe RatioDifference between the Deduplication Ratio and the Total Compression Factor, displayed as a percentage. Global Compression FactorSize after deduplication (in MB). Local Compression FactorSize after deduplication + local compression (in MB). ReductionDisplayed as a percentage.

Data Domain Filesystem Utilization The Data Domain Filesystem Utilization report returns Data Domain utilization trend values over time in a line chart.

Utilization represents Data Domain file system utilization value as a percentage.

Data Domain DeDuplication Ratio The Data Domain DeDuplication Ratio report returns the ratio for the size of data that is deduplicated against the original data size over time in a line chart.

The report includes the following information:

HostnameName or IP address of Data Domain. Dedupe RatioDifference between the Deduplication Ratio and the Total Compression Factor as a percentage.

Data Domain Active Streams The Data Domain Active Streams report returns the Data Domain active streams in a line chart.

The report includes the following information:

HostnameName or IP address of the Data Domain server. Active Read StreamsNumber of active read file streams. Active Write StreamsNumber of active write file streams. Re Opened Read StreamsRe-opened read file streams in the past 30 seconds. Re Opened Write StreamsRe-opened write file streams in the past 30 seconds.

Running Reports 61

Auditing IDPA System Manager Activities This chapter includes the following sections:

Topics:

IDPA System Manager audit overview Activities audit information

IDPA System Manager audit overview On the Audit page, you can view audit information about activities in IDPA System Manager.

Audit information includes actions and tasks that IDPA System Manager users have performed. The audit information can also be used to track the status of long running tasks.

Activities audit information The Audit page displays audit information about activities in IDPA System Manager.

Basic audit information

The following list includes the basic types of audit information for activities that are displayed in the table on the Audit page.

Title The title of the activity.

Status The state of the activity.

Progress The percentage of the activity that is complete.

Last Updated The date and time the activity was last updated.

User The user that initiated the activity.

Additional audit information

The following list includes additional details that are only displayed when you click the drop-down arrow for an activity.

Description The description of the activity.

Comments The comments for the activity, if applicable.

Sub Tasks Sub tasks for the activity, if applicable. The following information is listed for each sub task: Title Status Progress Last Updated

Click the drop-down arrow for a sub task to display additional details.

10

62 Auditing IDPA System Manager Activities

Troubleshooting The following sections may assist with troubleshooting issues with IDPA System Manager.

Topics include:

Topics:

Directory structure and log information Troubleshooting LDAP Systems fail to activate Avamar systems fail to activate Lockbox Unlock a IDPA System Manager user account The SSO service fails to start on IDPA System Manager Disabling SSO Reregister SSO for a system Resolve error notifications Convert IPv4 to IPv6-only or dual-stack network

Directory structure and log information The following list includes information about the IDPA System Manager directory structure and log information:

All IDPA System Manager specific packages are under:

/usr/local/dpc/lib Each package has its own subdirectory. For example, setup and monitor. Each package has similar structures. For example, bin and conf. The /usr/local/dpc/bin directory includes scripts to start or stop IDPA System Manager services. To start or stop an

individual IDPA System Manager service, use the service command.

The /var/log/dpc directory hosts all IDPA System Manager related logs including NGINX, MongoDB, and RabbitMQ.

The /var/lib/dpc directory hosts all IDPA System Manager generated data which consists of MongoDB and RabbitMQ.

All IDPA System Manager related logs are under:

/var/log/dpc/[module name] [module name].out files contain console logging from starting and running the module process.

[module name].log files contain logging from the module.

All Elemental Gateway (ELG) logs are under:

/var/log/dpc/elg/ The IDPA System Manager user interface (msm-ui-main service) log is under:

/var/log/dpc/msm-ui-main This log file is small and contains information from starting the Node.js server.

The IDPA System Manager Monitoring (dpc-monitor service) logs are under:

/var/log/dpc/monitor This directory contains the rolling log files from the monitoring process.

11

Troubleshooting 63

Troubleshooting LDAP Learn how to diagnose and resolve common LDAP configuration issues.

Check the LDAP status in the log file

Check the /var/log/dpc/elg/elg.log log file for messages about the LDAP connection status.

Messages that appear during LDAP connection failure

If the following message appears, the LDAP client did not make a successful connection to the LDAP server:

2018-04-03 11:00:26,929 INFO localhost-startStop-1 c.e.c.c.SecurityConfig LDAP or AD Directory Service providers are not available

There are multiple issues that can prevent the LDAP client from connecting to the LDAP server. Look for error messages in the log file that provide more information.

The following table describes various error messages that appear during LDAP connection failures and their causes.

Table 7. LDAP communication messages

Message Cause

INFO localhost-startStop-1 c.e.c.c.SecurityConfig LDAP or AD Directory Service providers are not available

No LDAP or AD settings are provided or they are provided with incorrect information.

.ADLdapAuthenticationProvider Ignoring AD authentication. Verification of ldap settings failed. Failed to connect

Invalid AD configuration information.

.LdapAuthenticationProvider Ignoring LDAP authentication. Verification of ldap settings failed. Failed to connect

Invalid LDAP configuration information.

PKIX path building failed: java.security.cert.CertPathBuilderExceptio n: Could not build a validated path

Validation of the LDAP server certificate could not be completed.

NOTE: One possible solution for this issue is to add the LDAP server certificate to the IDPA System Manager Java keystore.

Messages that appear during LDAP connection success

Messages similar to the following appear when the LDAP client successfully connects to the LDAP server:

c.e.c.s.a.l.LDAPSecureStorage LDAP admin credentials are secured c.e.c.s.a.l.ExternalAuthenticationProvider Type: LDAP c.e.c.s.a.l.ExternalAuthenticationProvider Base DN: dc=mydomain,dc=com c.e.c.s.a.l.ExternalAuthenticationProvider Admin user DN: cn=Administrator,dc=my- domain,dc=com c.e.c.s.a.l.ExternalAuthenticationProvider User Base: ou=people c.e.c.s.a.l.ExternalAuthenticationProvider User Search DN: (|(uid={0})(cn={0})) c.e.c.s.a.l.ExternalAuthenticationProvider User Pattern DN: [] c.e.c.s.a.l.ExternalAuthenticationProvider Group Name: dp_admin c.e.c.s.a.l.ExternalAuthenticationProvider Group Search Base: ou=group c.e.c.s.a.l.ExternalAuthenticationProvider Group Search Filter:(&(member={0}) (cn=dp_admin))

64 Troubleshooting

o.s.s.l.DefaultSpringSecurityContextSource URL 'ldap://12.3.104.150:546/dc=my- domain,dc=com', root DN is 'dc=mydomain,dc=com' 12.3.104.150:546/dc=my-domain,dc=com', root DN is 'dc=mydomain,dc=com'

Diagnosing LDAP authentication failure

LDAP user authentication fails when the LDAP lookup matches more than one record for the user in the LDAP server.

Issue

If IDPA System Manager is configured to use LDAP authentication, and the authentication lookup of a user returns more than one record, IDPA System Manager displays the following message:

We didn't recognize the username or password you entered. Please try again

Also, the /var/log/dpc/elg/elg.log log file will contain the following message:

2018-04-04 08:23:04,834 ERROR http-nio-9002-exec-8 o.a.c.c.C.[.[.[.[dispatcherServlet] Servlet.service() for servlet[dispatcherServlet] in context with path [/elg] threw exception org.springframework.dao.IncorrectResultSizeDataAccessException: Incorrect result size: expected 1, actual 2

Solution

Ensure that each user that is registered for LDAP authentication matches only one LDAP record.

Troubleshooting secure LDAP problems

Two optional flags are available for troubleshooting secure LDAP (LDAPS) problems.

When LDAP/AD server does not support TLS 1.2

Use TLS 1.2 instead of less secure versions (TLS 1.0 or 1.1). Operating IDPA System Manager in FIPS mode requires TLS 1.2.

Use the following key-value pair only if the LDAP or AD server does not support TLS 1.2. The default value is TLSv1.2:

elg.ldap.tls.protocols=TLSv1.1,TLSv1.2 // To support LDAP connection with TLS 1.1 and TLS 1.2

When LDAP setup connection fails because of cipher mismatch

IDPA System Manager 19.2 adds a more secure and recommended cipher list.

Use the following key-value pair only when the LDAP setup connection is failing because ciphers are mismatched. The default values are used here:

elg.ldap.crypto.ciphers=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_RSA_WITH_AES_256_ CBC_SHA384,TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256,TL S_RSA_WITH_AES_256_GCM_SHA384,TLS_RSA_WITH_AES_256_CBC_SHA256,TLS_RSA_WITH_AES_128_CBC_SH A256,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,TLS_ECDHE_ECDSA _WITH_AES_256_CBC_SHA384,TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,TLS_ECDHE_ECDSA_WITH_AES _128_CBC_SHA256

Troubleshooting 65

Restore access to IDPA System Manager after LDAP misconfiguration

When LDAP is configured incorrectly, you can be locked out of the IDPA System Manager OVA.

About this task

If you cannot log into IDPA System Manager after configuring LDAP, perform the following steps.

Steps

1. To disable the ldap.properties file, rename it using the following command:

mv ldap.properties ldap.properties.old

2. To restart IDPA System Manager and activate the change, type the following commands:

/usr/local/dpc/bin/dpc stop /usr/local/dpc/bin/dpc start

Results

After IDPA System Manager is restarted, LDAP is disabled and access to IDPA System Manager is restored.

Remove LDAP from IDPA System Manager

If required, you can remove LDAP from IDPA System Manager.

Steps

1. To access the IDPA System Manager system, type the following command:

ssh -l

2. To switch to the root user, type the following command:

su -

3. To remove the ldap.properties file, type the following command:

rm /var/lib/dpc/elg/ldap.properties

4. To restart IDPA System Manager and activate the change, type the following command:

/usr/local/dpc/bin/dpc start

5. Once IDPA System Manager is started, type the following command to confirm that all of the services are active:

/usr/local/dpc/bin/dpc status

6. Log in to the IDPA System Manager user interface with the username and password for the non-LDAP user account.

For example:

https://DPC_fqdn

where DPC_fqdn is the IDPA System Manager fully qualified domain name.

66 Troubleshooting

Systems fail to activate If a system is in a NotReporting health state for more than 5 minutes after the system is added or after a refresh is performed on the Systems Management page, you can manually reactivate messaging.

NOTE: When an Avamar system is not reporting, IDPA System Manager automatically attempts to reactivate the system

every 15 minutes. Manually reactivating the Avamar system is possible, but if activation is already in progress, this operation

does not work. It is recommended that you allow IDPA System Manager to automatically reactivate the Avamar system.

To reactivate messaging, perform the following steps:

1. Browse to the Systems Management page. 2. Select the system that is not reporting. 3. Click Reactivate. 4. Browse to the Audit screen, and then monitor the progress.

Avamar systems fail to activate The following error messages may appear on the Audit page when an Avamar system fails to activate.

Failed - ERROR: Unable to get signed client certificate from lava81105.dev.local

Verify the network settings are correct.

The IDPA System Manager Security Configuration Guide provides information on the network settings that are required for successful communication.

Failed - unable to create root session to process msgborkerctl task

This message can appear after an Avamar system is upgraded.

Perform the following steps to resolve this issue:

1. Login to the Avamar system using SSH. 2. Switch to the root user. 3. Open the /etc/ssh/sshd_config file for editing.

4. Check for duplicate entries after the Match all text near the bottom of the file.

5. Comment out any duplicate entries that do not apply to the Avamar system. 6. Save and close the file. 7. Restart the sshd service by running the following command:

service sshd restart 8. In IDPA System Manager, on the Systems Management page, select the Avamar system, and then click Reactivate.

Lockbox IDPA System Manager uses a secure storage lockbox to encrypt and store both internal system credentials and credentials for external systems that IDPA System Manager monitors and manages.

The lockbox is created during deployment and is secured by a lockbox password. The password is encrypted and stored in the lockbox along with Stable System Values (SSVs), which uniquely identify the IDPA System Manager host. The lockbox uses the master password to generate an internal encryption key. It uses the SSVs to guard access to the lockbox.

The encryption key is automatically reset whenever a loss of power or service restart occurs. The automatic reset occurs during a fresh installation, after an upgrade from an earlier release, and after the master password reset.

Troubleshooting 67

IDPA System Manager queries the host for seven different SSVs and requires at least five queries to succeed before creating the lockbox.

Lockbox password requirements

The lockbox password must be 8 to 256 characters long.

NOTE: For FIPS-compliant deployments, the minimum password length is 14 characters.

Reset the lockbox

In certain situations, for example, when a virtual machine is moved, you may have to reset the lockbox.

Steps

1. Open an SSH session with an SSH tool, such as PuTTY.

2. As the Linux OS user admin, log in to the IDPA System Manager host.

3. Type the following commands:

cd /usr/local/dpc/lib/elg sudo service msm-monitor stop sudo service msm-elg stop sudo bin/elgcli -reset -lockbox -password {original_password} sudo service msm-monitor start sudo service msm-elg start

where original_password is the password that was specified when the lockbox was created.

If resetting the lockbox is unsuccessful, remove the existing lockbox, and then create the lockbox again.

Remove the lockbox

In certain situations, you may need to remove the lockbox, for example, when resetting the lockbox is unsuccessful.

Steps

1. Open an SSH session with an SSH tool, such as PuTTY.

2. As the Linux OS user admin, log in to the IDPA System Manager host.

3. Stop IDPA System Manager services:

sudo service msm-monitor stop sudo service msm-elg stop

4. Type the following command:

cd /var/lib/dpc/security/

5. To remove the lockbox, remove the following files with the rm -rf command:

clp_lb.lb clp_lb.lb.FCD

Next steps

If you are re-creating the lockbox, each system must be edited to enter the login credentials and store them in the lockbox.

68 Troubleshooting

Reset the lockbox master password

Some situations may require you to reset the lockbox master password, for example, to meet FIPS 140-2 requirements.

Steps

1. Open an SSH session with an SSH tool, such as PuTTY.

2. As the Linux operating system user admin, log in to the IDPA System Manager host.

3. Type the following commands:

cd /usr/local/dpc/lib/elg sudo service msm-elg stop sudo service msm-monitor stop sudo /usr/local/dpc/lib/elg/bin/elgcli -lockbox -passwordReset -password {original_password} -newPassword {new_password} sudo service msm-elg start sudo service msm-monitor start

Where original_password is the password that was specified when the lockbox was created.

Create the lockbox

If for some reason you are required to delete the lockbox that was automatically created during the initial OVA deployment, you can manually create a lockbox.

About this task

NOTE: Each system must be edited to enter the login credentials and store them in the lockbox.

Steps

1. Open an SSH session with an SSH tool, such as PuTTY.

2. As the Linux OS user admin, log in to the IDPA System Manager host.

3. Type the following commands:

cd /usr/local/dpc/lib/elg sudo service msm-monitor stop sudo service msm-elg stop sudo bin/elgcli -create -lockbox -password -uiPassword cd /var/lib/dpc/security/ chown admin:admin clp_lb.lb* sudo service msm-monitor start sudo service msm-elg start

The lockbox password must be 8 to 256 characters in length.

NOTE: For FIPS-compliant deployments, the minimum password length is 14 characters.

The UI password must contain at least nine characters including one uppercase, one lower case, one number, and one special character: ! @ # $ % ^ & * ( ) - _

Reset user account and password

In certain situations, you may be required to reset the local user account and password.

About this task

The user account and password are configured during deployment. These credentials enable access to the IDPA System Manager user interface. If required, perform the following steps to reset the user account and its password.

Troubleshooting 69

Steps

1. Open an SSH session with an SSH tool, such as PuTTY.

2. As the Linux operating system user admin, log in to the IDPA System Manager host.

3. Type the following commands:

cd /usr/local/dpc/lib/elg sudo service msm-monitor stop sudo service msm-elg stop sudo bin/elgcli -lockbox -resetUserAccount -uiPassword cd /var/lib/dpc/security/ chown admin:admin clp_lb.lb* sudo service msm-monitor start sudo service msm-elg start

The ui_password must contain at least nine characters including one uppercase, one lower case, one number, and one special character: ! @ # $ % ^ & * ( ) - _

Unlock a IDPA System Manager user account When too many failed login attempts through SSH are made on a IDPA System Manager user account, the account is locked. You can reset the account to unlock it and regain access.

Steps

1. Connect to the console of the IDPA System Manager server, and log in to the "admin" account.

2. To change to the root user, run the following command:

su -

3. To reset SSH access to the user account, run the following command:

pam_tally2 --user=admin --reset

The SSO service fails to start on IDPA System Manager

About this task

If the IDPA System Manager SSO service fails to start, perform the following procedure to resolve the issue.

Steps

1. Connect to the console of the IDPA System Manager server, and log in to the "admin" account.

2. Change to the root user by running the following command:

su -

3. Open the dpc-sso.service file for editing by running the following command:

vi /usr/local/dpc/lib/sso/setup/dpc-sso.service

4. Add TimeoutStartSec= to the [Service] section.

For example:

[Service] Type=forking ExecStart=/usr/local/dpc/lib/sso/bin/dpc-sso start

70 Troubleshooting

ExecStop=/usr/local/dpc/lib/sso/bin/dpc-sso stop User=admin TimeoutStartSec=

5. Save and close the dpc-sso.service file.

6. Copy the updated file to the /usr/lib/systemd/system/ folder by running the following command:

cp /usr/local/dpc/lib/sso/setup/dpc-sso.service /usr/lib/systemd/system/

7. Run the following commands to restart the IDPA System Manager services:

/usr/local/dpc/bin/dpc stop

/usr/local/dpc/bin/dpc start

Disabling SSO If single sign-on (SSO) to IDPA System Manager is not working, disable it to log in to IDPA System Manager using the credentials stored in secure storage.

Steps

1. Open the application.properties file located in /usr/local/dpc/lib/elg for editing.

2. Add the following entry to the application.properties file:

elg.sso.enabled=false

3. Save and close the application.properties file.

4. Restart the ELG service using the following command:

service msm-elg restart

Results

You can now log in to IDPA System Manager using the credentials stored in secure storage.

Reregister SSO for a system When single sign-on (SSO) is not working, you can reregister the SSO client.

Steps

1. On the System Management page, select the system that you want to reregister SSO for.

2. Click the overflow button:

3. Click Reregister SSO.

The reregister operation may take several minutes to complete. You can track the status of the operation in the Audit page.

Troubleshooting 71

Resolve error notifications There are several ways that you can resolve error notifications that appear in a red bar at the top of the browser window.

About this task

The following list includes the different ways that you can resolve error notifications:

On the right side of the bar, click the red X button. If the page is not displaying or not functioning correctly, it is recommended that you refresh the browser. If refreshing the browser is not working, log out of the IDPA System Manager user interface, and then log back in.

Convert IPv4 to IPv6-only or dual-stack network Describes how to convert IDPA System Manager from an IPv4 network to an IPv6-only or dual-stack (IPv4 and IPv6) network.

Steps

1. Connect to the console of the IDPA System Manager server, and log in to the "admin" account.

2. Change to the root user by running the following command:

su -

3. From the console, stop IDPA System Manager:

/usr/local/dpc/bin/dpc stop

4. To convert from IPv4 to:

a. IPv6-only network, use YaST to replace the IPv4 address with an IPv6 address. b. Dual-stack network, use YaST to add an IPv6 address to the existing IPv4 address.

5. If converting from IPv4 to:

a. IPv6-only network, remove the 127.0.0.1 record from /etc/hosts.

b. Dual-stack network, ensure the newly configured address appears in /etc/hosts.

6. Use YaST to add an IPv6 address for the DNS.

7. If converting from IPv4 to:

a. IPv6-only network, use YaST to replace the routing record. b. Dual-stack network, use YaST to add a new routing record.

8. If you are using DNS and converting from IPv4 to:

a. IPv6-only network, replace the A system record with the AAAA system record. b. Dual-stack network, include both routing records.

9. Reboot the IDPA System Manager.

72 Troubleshooting

A

administrator

Person who normally installs, configures, and maintains software on network computers, and who adds users and defines user privileges.

Avamar Administrator A graphical management console software application that is used to remotely administer an Avamar system from a supported Windows or Linux client computer.

Avamar client A computer or workstation that runs Avamar software and accesses the Avamar server over a network connection. Avamar client software comprises a client agent and one or more plug-ins.

Avamar server The server component of the Avamar client/server system. Avamar server is a fault-tolerant, high-availability system that efficiently stores the backups from all protected clients. It also provides essential processes and services required for data restores, client access, and remote system administration. Avamar server runs as a distributed application across multiple networked storage nodes.

E

Element managers Applications that are used to configure and manage one or more data protection and storage devices.

H

HFS check An Avamar Hash File System check (HFS check) is an internal operation that validates the integrity of a specific checkpoint. Once a checkpoint has passed an HFS check, it can be considered reliable enough to be used for a server rollback.

host

Computer on a network.

hostname

Name or address of a physical or virtual host computer that is connected to a network.

I

IDPA System Manager server

The IDPA System Manager server contains the business logic and supporting databases, hosts the web application, and communicates with all managed servers for management and monitoring purposes. The IDPA System Manager server collects event data from adapters that run on the managed Avamar server.

L

Lightweight Directory Access Protocol (LDAP)

Set of protocols for accessing information directories.

Glossary

Glossary 73

O

OVA

Open Virtual Appliance (OVA) is a single file distribution of a package that follows the packaging format standard called Open Virtualization Format (OVF). The ap

Manualsnet FAQs

If you want to find out how the 19.3 Dell works, you can view and download the Dell PowerProtect 19.3 System Manger Administration Guide on the Manualsnet website.

Yes, we have the Administration Guide for Dell 19.3 as well as other Dell manuals. All you need to do is to use our search bar and find the user manual that you are looking for.

The Administration Guide should include all the details that are needed to use a Dell 19.3. Full manuals and user guide PDFs can be downloaded from Manualsnet.com.

The best way to navigate the Dell PowerProtect 19.3 System Manger Administration Guide is by checking the Table of Contents at the top of the page where available. This allows you to navigate a manual by jumping to the section you are looking for.

This Dell PowerProtect 19.3 System Manger Administration Guide consists of sections like Table of Contents, to name a few. For easier navigation, use the Table of Contents in the upper left corner.

You can download Dell PowerProtect 19.3 System Manger Administration Guide free of charge simply by clicking the “download” button in the upper right corner of any manuals page. This feature allows you to download any manual in a couple of seconds and is generally in PDF format. You can also save a manual for later by adding it to your saved documents in the user profile.

To be able to print Dell PowerProtect 19.3 System Manger Administration Guide, simply download the document to your computer. Once downloaded, open the PDF file and print the Dell PowerProtect 19.3 System Manger Administration Guide as you would any other document. This can usually be achieved by clicking on “File” and then “Print” from the menu bar.