Book Image

Microsoft System Center Data Protection Manager Cookbook

By : Charbel Nemnom, Patrick Lownds
Book Image

Microsoft System Center Data Protection Manager Cookbook

By: Charbel Nemnom, Patrick Lownds

Overview of this book

System Center Data Protection Manager (SCDPM) is a robust enterprise backup and recovery system that contributes to your BCDR strategy by facilitating the backup and recovery of enterprise data. With an increase in data recovery and protection problems faced in organizations, it has become important to keep data safe and recoverable. This book contains recipes that will help you upgrade to SCDPM and it covers the advanced features and functionality of SCDPM. This book starts by helping you install SCDPM and then moves on to post-installation and management tasks. You will come across a lot of useful recipes that will help you recover your VMware and Hyper-V VMs. It will also walk you through tips for monitoring SCDPM in different scenarios. Next, the book will also offer insights into protecting windows workloads followed by best practices on SCDPM. You will also learn to back up your Azure Stack Infrastructure using Azure Backup. You will also learn about recovering data from backup and implementing disaster recovery. Finally, the book will show you how to configure the protection groups to enable online protection and troubleshoot Microsoft Azure Backup Agent.
Table of Contents (17 chapters)
Title Page
Dedication
About Packt
Contributors
Preface
Index

Installing the DPM agents


This recipe will cover the installation of a DPM agent from the DPM console as well as a manual-based installation.

Getting ready

Before you can start protecting a workload within your datacenter, you must install a DPM agent on the server hosting the workload that you would like to protect (that is, Hyper-V, SQL Server, Exchange, and so on).

You can install the DPM agent via the DPM Administrator Console in push mode; however, there are some scenarios where you will not able to perform a push installation of the DPM agent to the server hosting the workload that you would like to protect. On the DPM server, you can find two executables for the DPM agent that you can share or download to a removable media. Then, you can install the agent manually. The DPM agent is also available on the DPM installation media. There are two different executables here:

  • DpmAgentInstaller_x86.exe is for 32-bit operating systems
  • DpmAgentInstaller_x64.exe is for 64-bit operating systems

Both are applicable for Windows server and Windows client operating systems.

How to do it...

The following steps will illustrate the process of installing DPM agent in two different ways.

Option 1 – installing the agent from the DPM console

  1. Open the DPM Administrator Console and click ManagementAgents. Click Install on the tool ribbon to open the Protection Agent Installation Wizard.
  2. On the Select Agent Deployment Method page, click Install agents | Next.
  3. On the Select Computers page, DPM will display a list of available computers that are in the same domain as the DPM server. Add the required computer.
  1. The Advanced button page is enabled only when there is more than one version of a protection agent available for installation on the computers. You can use this option to install a previous version of the protection agent that was installed before you upgraded DPM server to a more recent version. However, it's recommended that you always keep the protection agent updated.
  2. Click Next > to continue.
  3. On the Enter Credentials page, type the username and password for a domain account that is a member of the local administrators group on the selected computer(s).
  4. If you select a node in a cluster, DPM detects all of the additional nodes in the cluster and displays the Select Cluster Nodes page. On the Select Cluster Nodes page, select an option that you want DPM to use for installing agents on additional nodes in the cluster. Then, click Next.
  5. In the Choose Restart Method step, select the method that you want to use to restart the selected computers after the protection agent has been installed.

Note

For greenfield agent installation, the computer must be restarted before you can start protecting data. A restart is necessary to load the volume filter that DPM uses to track and transfer block-level changes between the DPM server and the protected computers.

  1. If any of the computers that you have selected are members of a cluster, an additional Choose Restart Method page will appear that you can use so that you can select the method to restart the clustered computers.

Note

Please note that you need to install a protection agent on all of the nodes in a cluster to successfully protect the clustered data.

  1. Choose an appropriate option and click on Next > to continue.
  2. In the Summary page, you can verify the information you have chosen and then click on Install to initialize the installation and configuration process of the DPM agent.
  3. After a short period of time, the Agent will appear in the DPM console and report back with statusOK.

 

 

 

Option 2 – installing the agent manually

You can perform a manual installation in two different ways:

  • By providing the FQDN of the DPM server when running the DpmAgentInstaller executable
  • By providing the NetBIOS name of the DPM server using setdpmserver.exe if the DPM agent is already installed but not configured

Now follow these steps:

  1. On the computer that you want to protect, open an elevated command window, and then run net use Z: \\<DPMServerName>\d$, where Z is the local drive letter that you want to assign and<DPMServerName>is the name of the DPM server that will protect the computer. d$ is where DPM software is installed.
  2. For a 64-bit computer, type the following:
cd /d <assigned drive letter>:\Program Files\Microsoft System Center 2019\DPM\DPM\ProtectionAgents\RA\5.0.<build number>.0\amd64 

Here, <assigned drive letter> is the drive letter that you assigned in the previous step and <build number> is the latest DPM build number. For example: 

cd /d "Z:\Program Files\Microsoft System Center 2019\DPM\DPM\ProtectionAgents\RA\5.0.158.0\amd64"
  1. For a 32-bit computer, type the following:

cd /d <assigned drive letter>:\Program Files\Microsoft System Center 2019\DPM\DPM\ProtectionAgents\RA\5.0.<build number>.0\i386 

Here, <assigned drive letter> is the drive that you mapped in the previous step and <build number> is the latest DPM build number.

  1. To install the protection agent for a 64-bit computer, run the following command:

DPMAgentInstaller_x64.exe <DPMServerName> 

Here, <DPMServerName> is the fully qualified domain name (FQDN) of the DPM server.

  1. To install the protection agent for a 32-bit computer, run the following command:
DPMAgentInstaller_x86.exe <DPMServerName> 

Here, <DPMServerName> is the FQDN of the DPM server.

  1. Select I accept the license terms and conditions for the Microsoft Software License Terms, and click OK.
  2. The installation will start and you will receive a confirmation message that states Agent installation completed successfully. The DPM agent has now been configured and the appropriate firewall exceptions have been made in the domain profile of the Windows Firewall. Press Enter key to close the window.

Note

To perform a silent installation and to accept the EULA license in a silent installation , you can use the /q and /IAcceptEULA options after the command. For example: DPMAgentInstaller_x64.exe /q <DPMServerName> /IAcceptEULA.

  1. If the DPM agent is already installed, you should run the setdpmserver.exe executable with the –dpmservername switch to configure the DPM server that the DPM agent should report to as follows:
Setdpmserver –dpmservername DPM2019

Note

When using the SetDpmServer executable, you only need the NetBIOS name of the DPM server.

After installing the agent manually, you must attach the DPM agent to the DPM server. You can do this via the DPM Administrator console or via the DPM PowerShell cmdlet.

  1. Open the DPM console and go to Management. Click on Production Servers and, at the top-left corner of the console, click on the Add button to start the Production Server Addition Wizard.
  1. Under the Select Agent Deployment Method page, click Attach agents, followed by Computer on trusted domain. Click the Next > button to continue:

Note

If you want to attach a DPM agent in a workgroup or untrusted domain, please refer to Chapter 8, Protecting Workgroups and Untrusted Domains, for more information.

  1. In the Select Computers page, choose the server that you would like to attach to the DPM server and click on Next > to continue.

 

Note

You can also provide a list of servers that you would like to have attached. The list should have all of the FQDN of every server per row in a simple text file. Click on the Add From File... button to import the files' data.

  1. In the Enter Credentials page, enter the credentials that should be used to execute this process. Keep in mind that the credentials you provide must have administrative rights on the server that you are trying to attach. Provide the credentials and click on Next > to continue.
  2. In the Summary page, verify the configuration and click on Attach to start.
  3. Verify that the Attach protected computer task has been successful. Click Close to close the Protection Agent Installation Wizard.
  4. The Agent will appear in the DPM console and report back with status OK.

How it works...

The DPM agent is the core component for the DPM so that it's able to provide restore capabilities for your data. The DPM relies on the DCOM object of the protected server which is mapped to the DPMRA service so that the SQL job on the DPM server starts. System Center Data Protection Manager stores all protection group configurations as SQL Jobs, and the SQL Server Agent initializes the DPM agent to start creating snapshots by using the underlying architecture of the Volume Shadow Copy Service (also known as Volume Snapshot Service or VSS) within the operating system.

The setdpmserver.exe executable command has the ability to configure the DPM agent to set which DPM server the DPM agent reports to. It also provides the configuration needed for the local Windows Firewall so that the DPM agent can start reporting to the DPM server.

There's more...

System Center Data Protection Manager manages data replication and provides management of the DPM agents using two different TCP ports:

  • 5718
  • 5719

 

TCP port 5718 is used for data replication and TCP port 5719 is used by the DPM agent coordinator. The coordinator is the function within the DPM agent architecture that manages the installation, uninstallation, and updates of the DPM agent. For more information regarding firewall ports and configuration, please read the Planning your DPM deployment recipe in this chapter.