Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products

PowerProtect Data Manager 19.16 for Cyber Recovery User Guide

Managing applications

When you install an application in the Cyber Recovery vault, you must present the application to the Cyber Recovery software. Applications can include the PowerProtect Data Manager, the CyberSense, or other applications.

Prerequisites

  • You are logged in as the admin user.
  • The PowerProtect Data Manager or CyberSense applications must be installed and running at the Cyber Recovery vault location before you can define them in the Cyber Recovery UI.
  • Modify and save the /etc/ssh/sshd_config file on the following specified applications' operating system:
    1. Enable password authentication:
      • Change the PasswordAuthentication field value from no to yes.
    2. Run the service sshd restart command.
  • If you plan to use CyberSense Version 7.8 or later, assign a DD Boost user to the PowerProtect DD system in the Cyber Recovery vault:
    1. Create a dedicated DD Boost user on the Cyber Recovery vault PowerProtect DD system with the same role as the backup user on the production PowerProtect DD system:
      user add <username> role <role value> uid <uid value>
      NOTE:The role value is the user who performs the backups on the production DD system. For a PowerProtect Data Manger user, the role value is none.
    2. Assign the DD Boost user:
      ddboost user assign <username>

About this task

NOTE:When adding applications:
  • The PowerProtect Data Manager application can be added as the admin user in the Cyber Recovery vault.
  • The CyberSense application can be added as an admin user in the Cyber Recovery vault.

Steps

  1. From the Main Menu, click Infrastructure > Assets.
  2. Click Applications at the top of the Assets content pane.
  3. Do one of the following:
    • To add an application, click Add.

      The Add Vault Application wizard is displayed.

    • To modify an existing application, select the application and click Edit.

      The Summary page of the Edit Vault Application wizard is displayed. Click Back to go to the wizard page that you want to modify.

  4. On the Application Information page, complete the following fields and click Next:
    Table 1. Application Information pageTable describes the field for the Application Information page.
    Field Description
    Nickname Enter a name for the application object.
    FQDN or IP Address Specify the application host by using one of the following:
    • Fully qualified domain name (FQDN)
    • IP address
    NOTE:The hostname and IP address of the PowerProtect Data Manager server in the Cyber Recovery vault do not have to match the hostname and IP address of the production PowerProtect Data Manager server. The Cyber Recovery software validates that the IP is a PowerProtect Data Manager server and checks that the default credentials are set. Do not change the default password or an error message is displayed.
    Application Type (when adding an application only) Select an application type:
    • To represent an application in Cyber Recovery, select the following:
      • PPDM and complete the following fields:
        • In the Application Username field, enter the username of the application user.
        • In the Application Password field, enter the password of the application user.
        • (For on-premises deployments only) In the vCenter Name field, select a vCenter server
      • CyberSense to choose the CyberSense
      • FileSystem if you want to mount copies on an NFS share and examine data by using any application on the host. Selecting this option does not require you to install an application on the host.
      • Other for other application types.
    NOTE: If you specify an application (in the FQDN or IP address field) and then select a different application type (in the Application Type field), the procedure fails. The application host must correspond to the application type. You cannot modify the Application Type field for an existing application.
    Security Group Tag (For the Cyber Recovery solution deployed on Amazon Web Services (AWS) only) Enter the AWS tag of the security group that controls access to and from the Cyber Recovery and PowerProtect Data Manager hosts. For more information, see the Dell PowerProtect Cyber Recovery AWS Deployment Guide.
    Tags
    • Optionally, add a tag that provides useful information about the application. The tag is displayed in the Assets content pane in the Cyber Recovery UI. Click Add Tag, enter the tag, and then click Add.
    • For PowerProtect Data Manager recoveries, add a tag that indicates the DD Boost username that is configured for the production application.
    NOTE:If a tag exceeds 24 characters, the details description displays the first 21 characters followed by an ellipsis (...).
  5. On the Host Authentication page, complete the following fields and then click Next:
    Table 2. Host Authentication pageTable describes the field for the Host Authentication page.
    Field Description
    Host Username Specify the operating system host administrator username, which is the username for the operating system host in the Cyber Recovery vault.
    Host Password Enter the password of the host administrator.
    NOTE:The password does not need to match the production account password.
    SSH Port Number Enter an application SSH port number.
    Reset Host Fingerprint (Security Officer only) If you change the FQDN or IP address of the DD host, select to reset the fingerprint. The Cyber Recovery software then sends an alert message.
    NOTE:For more information about the PowerProtect Data Manager host username and password and their role in the PowerProtect Data Manager recovery process, see thePowerProtect Data Manager credentials topic.
  6. On the Application Authentication page, complete the following fields and then click Next:
    Table 3. Application Authentication pageTable describes the fields for the Application Authentication page.
    Field Description
    Application Username Enter the username of the application user. The application username must match the application username on the production system.
    Application Password Enter the password of the application user. The application password must match the application password on the production system.
    vCenter Name (for on-premises deployments only) Select a vCenter.
    NOTE:For more information about the PowerProtect Data Manager application username and password and their role in the PowerProtect Data Manager recovery process, see PowerProtect Data Manager credentials.
  7. Review the Application Summary page and either:
    • Click Finish if you are satisfied with the summary information and want to add the application.
    • Click Back to return to the previous pages to change the information.
  8. If you added the CyberSense version 7.8 through 8.1 application, run the following commands from the CyberSense host to ensure the use of the DD Boost user while mounting the sandbox during the analysis process. Otherwise, go to the next step.
    # iesh
    # ddboostcfg add
      
      Enter hostname, username, and password for each Data Domain host you plan to connect to
      using DDBoost protocol. Enter '*' as a hostname to enable auto probe with given
      username and password. Only single probe combination is allowed. Reply with Enter or Ctrl-D
      on the Host: prompt to finish
    
      Host: <host name>
      Username: <username>
      Password: <password>
    
    # dservice restart dispatch
  9. Click an application's row to open the details pane and view additional details about the application, and then:
    1. Click Icon with a right-facing arrow that closes the details pane to close the details pane.
    2. Click Icon with a left-facing arrow that opens the details pane to open the details pane again.
  10. To customize the columns in the table that lists the applications, click Icon with an image of a gear. and select the columns to show or hide.
  11. To remove an application, select the application and click Delete.
    You cannot delete the CyberSense application if:
    • Your deployment is running CyberSense version 8.2 or later, and multilink definitions are configured.
    • It is associated with a scheduled report.
  12. To capture information about all the applications in a .csv file, click Export All.
    The Cyber Recovery software downloads the apps.csv file.

Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\