Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

Dell EMC Avamar for VMware 19.7 User Guide

Set advanced plug-in options in the AUI

Perform the following optional tasks from the More Options window when performing an on-demand backup.

Prerequisites

NOTE:You can only perform data exclusion on an application consistent backup. As a result, the target VM must be in a running state.

Steps

  1. Toggle the Show Advanced Options switch to on.
  2. To enable changed block tracking, select the Use Changed Block Tracking (CBT) to increase performance checkbox.
  3. To enable the Avamar server to report information to the vSphere Client about the most recent backup and most recent successful backup, select the Set Annotation Tag LastBackupStatus and LastSuccessfulBackup checkbox.

    When selected, the following information displays in the vSphere Web Client:

    • LastSuccessfulBackupStatus-com.dellemc.avamar: The date and time of the most recent successful backup.
    • LastBackupStatus-com.dellemc.avamar: The date and time of the most recent backup, whether successful or not.
  4. To index VMware image backups, select Index VMware Image Backups.
    NOTE:Indexing VMware image backups using the Data Protection Search software is only supported with HotAdd transport mode.
  5. To exclude the Windows page file (pagefile.sys) from the backup, select Exclude page file blocks when performing image backup on Windows VM.
    NOTE:Page file exclusion is supported only for Windows Servers version 2008 R2 and above. For client versions of Windows, this option has no effect. The page file is included in backups of Windows clients, regardless of this setting.
  6. To exclude deleted file blocks from the backup, select Exclude deleted file blocks when performing image backup on Windows VM.
  7. For the Exclude files with path and filter field, type the files that you want to exclude.
    NOTE:

    If you exclude a file during backup, and then perform a restore of the entire file system which contained the excluded file, or just a restore of the excluded file, the excluded file will be visible upon restore but will not be usable.

    If you change the exclusion path or filename between backups, the next backup is a full (level 0) backup.

  8. To store this backup on a Data Domain system, select the Store backup on Data Domain System checkbox, then select a Data Domain system from the list.
  9. From the Encryption method to Data Domain system list, select the encryption method to use for data transfer between the client and the Data Domain system during the backup.
  10. For the Windows VMware Image plug-in only, select one or more Snapshot Quiesce Options. The options include the following:
    • Fail backup on snapshot quiesce error.
    • If VMware tools are not running, mark completed backup as 'Complete w/Exception' (applications are not quiesced).
  11. For the Max times to retry snapshot detele option, type the maximum number of times that a snapshot delete operation should be tried.
  12. In Guest Credentials, type a virtual machine guest OS user account name and password with sufficient privileges to run scripts before or after the backup.
    For log truncation backups of Exchange servers, guest credentials must have administrator privileges. If multiple VMs are backed up, the same credentials must be used for all VMs.
  13. To run a script before the VMDK snapshot:
    1. Type the full path and filename of the script that is run.
    2. Ensure that the script timeout is sufficient for the script to complete.
  14. To run a script after the backup completes and the VMDK snapshot is removed:
    1. Type the full path and filename of the script that is run.
    2. Ensure that the script timeout is sufficient for the script to complete.
  15. For the Windows VMware Image plug-in only, in the Snapshot quiesce timeout (minutes) filed, type the number of minutes to wait before a snapshot quiesce operation is considered to have failed.
  16. If performing an image backup of a Microsoft SQL server, select the type of authentication:
    • NT Authentication uses the credentials that are entered in Guest Credentials for authentication.
    • Application Authentication uses the SQL Server Username and SQL Server Password to log in to the SQL server.
  17. If performing an image backup of a Microsoft SQL server, identify the post-action options:
    • Type the maximum number of minutes to wait before post-action operations are considered to have failed in the Post Action Timeout (minutes) option.
    • Select the type of post-action operation. LOG Truncation performs log truncation after the backup has successfully completed.
    • All disks of the VM must be selected for on-demand backup or log truncation will not occur.
  18. If performing an image backup of a Microsoft Exchange server, select the type of post-action operation. LOG Truncation performs log truncation after the backup has successfully completed.
  19. Click FINISH.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\