Network Configuration
Network Configuration
Outbound Policies.......................................................................................................................................................................................................................................................................6
Network Troubleshooting...................................................................................................................................................................................................................................................8
Host Resolution...............................................................................................................................................................................................................................................................................9
Configure Self Service Network for Actifio Sky Appliances in the Cloud ..................................................................................................................10
Host-Side Scripting.................................................................................................................................................................................................................................................................22
Ensuring NFS Connectivity on an IBM AIX Host Connected to a Sky Appliance ............................................................................................. 53
Assigning VDisks for the Host Copy Data (In-Band CDS Appliance only) ............................................................................................................66
Chapter 16 - Configuring External Snapshot Pools on IBM Storewize and Pure Storage FlashArray ............73
LDAP Authentication.............................................................................................................................................................................................................................................................. 77
SAML Authentication............................................................................................................................................................................................................................................................ 83
Downloading SP Metadata............................................................................................................................................................................................................................................................................... 83
Chapter 18 - APPID Pre- and Post-Scripts for Scheduled Data Protection Jobs ...................................................................87
Chapter 19 - Super Scripts for Workflows and On-Demand Data Access Jobs ................................................................... 89
Chapter 23 - Sending Traps from the Actifio Appliance to a Trap Receiver .......................................................................... 107
Setting the Community String for Forwarding Traps to a non-Actifio SNMP Trap Receiver.............................................................................................. 108
Chapter 24 - Collecting Alerts from Storage and Switches (CDS only) ........................................................................................ 115
Polling Alerts from IBM V3700, IBM DS 3512, and NetApp E2700 Storage Arrays .............................................................................................. 115
Forwarding Alerts from an IBM System Storage SAN24B-4 Express Switch to an Actifio CDS Appliance....................... 116
Actifio SecureConnect.......................................................................................................................................................................................................................................................121
Index .............................................................................................................................................................................................................................................................................123
This guide is for network administrators and system administrators who have to support Actifio systems.
It provides information and procedures necessary to ensure connectivity and performance between the
Actifio system, your production data, and your data storage.
Actifio Appliances
Unless otherwise specified, all features and functions described in this document apply to all Actifio
appliances.
Your Actifio Appliance includes a self-service network configuration feature. This chapter describes how
to use it to:
• Modify DNS and NTP on page 2
• Modify IPs and Interfaces on page 3
• Create and modify Outbound Policies on page 6
• Perform Network Troubleshooting on page 8
• Create and modify Host Resolution on page 9
• Configure Self Service Network for Actifio Sky Appliances in the Cloud on page 10
1
DNS and NTP
Enter this information:
DNS Domain: Enter the domain of the hosts connected to this appliance.
If you have additional hosts on other domains, you can set up a DNS Suffix Search to ensure the
Actifio Appliance can find them by their short names.
Note: If you set any entries in DNS Suffix Search, then the DNS Domain will NOT be searched. To
search both the manual entries AND the DNS domain, include the DNS domain in the DNS Suffix
Search.
2
IPs and Interfaces
The IPs & Interfaces tab shows a list of configured IP addresses. You can modify these if necessary, and
configure new interfaces added to the Sky Appliance in vCenter. The list is sorted by node first, then by
interface, then by type in order (Node, iSCSI). appliance IPs are listed at the end since they are not
associated with a single node. DHCP is not supported.
3
NIC Usage for Each Actifio Appliance Type
Actifio Appliances can be configured for different levels of security and availability depending on network
resources. For best results, configure appliances according to the following tables:
Table 1: Actifio Sky Appliance NIC Usage on page 4
Table 2: Actifio CDS Appliance Generation-3 NIC Usage on page 4
Table 3: Actifio CDS Appliance Generation-4 and Generation 5 NIC Usage on page 5
Table 4: Actifio CDX Appliance NIC Usage on page 5
Each Sky appliance can support up to 100 iSCSI sessions. You can support an additional 100 sessions by
adding a NIC card to the Sky appliance.
1/10G mixed High, with improved availability Eth0 (1G) for management
Eth1 (1G) for replication
Eth2/3 (10G & HA) for backup
4
Table 3: Actifio CDS Appliance Generation-4 and Generation 5 NIC Usage
1/10G mixed High, with improved availability Eth0 (1G) for management
Eth1 (1G) for replication
Eth3/4 (10G & HA) for backup
1/10G mixed High, with improved availability Eth0 (1G) for management
Eth3/4 (10G & HA) for backup
Eth5 (10G) for replication
1/10G mixed High, with improved availability Eth0 (1G) for management
Eth3/4 (10G & HA) for backup
Eth5/6 (10G & HA) for replication
5
Outbound Policies
Outbound policies define how the Actifio Appliance will reach specific remote networks for outbound
connections. Any remote network not addressed by an outbound policy will be governed by the Default
Interface configured in IPs and Interfaces on page 3.
You can also use this page to set a static route. An outbound policy is essentially a group of static routes
that are automatically tailored to each of your specific interfaces.
Outbound Policies
6
Outbound Policies and Custom Configurations
If this system has some custom networking configured by Actifio Support, then the View and Delete
Custom Configuration buttons appear on this page. You can view the text of the custom networking
configuration file here.
Note: These buttons are not visible if your appliance has never had a custom configuration. A custom
configuration can be created/modified only by Actifio Support. If you cannot make modifications to
this page, it means that this system has some custom networking configured by Actifio Support.
Contact Actifio Support for guidance.
If the appliance has an active custom configuration, then you see a Delete option. This disables the
custom part of the configuration, allowing you to proceed with the formerly disabled management
functions.
If you want to reactivate your custom configuration, use the Restore Custom Configuration button.
7
Network Troubleshooting
Use this page to troubleshoot problematic network connections. Under Utility, select the troubleshooting
tool to use, enter the necessary parameters, and then click Run Test. The results appear in the Test Results
box.
Ping: Runs a ping to determine reachability of a target host, returning the output as a plain text
stream. This command sends 3 ICMP echo packets.
Enter:
o Source IP: Select the IP address of the appliance to test. This tests the behavior of a reply
packet. If you do not enter a value here, then the Outbound Policy rules are used. This
tests the behavior of outbound connections.
o Destination IP: A valid IPv4 or IPv6 address.
Example Ping result:
PING 1.2.3.4 (1.2.3.4) 56(84) bytes of data.
--- 1.2.3.4 ping statistics ---
3 packets transmitted, 0 received, 100% packet loss, time 3001ms
IP route get: Queries the routing tables for the selected Destination IP address without sending
any packets. Enter:
o Source IP: Select the IP address of the appliance to test. This tests the behavior of a reply
packet. If enter no value, then Outbound Policy rules are used to test the behavior of
outbound connections.
o Destination IP: The IP address of a target host.
Example IP route get result:
test/routeget 1.2.3.4
1.2.3.4 via 172.17.1.2 dev eth0 src 172.17.134.80
cache mtu 1500 advmss 1460 hoplimit 64
Traceroute: Runs a traceroute to the given IP address by sending a series of UDP probes,
returning the output as a plain text stream. This can take 30 or more seconds to run. Use
Traceroute to identify intervening networks on the path. Traceroute cannot accept a source IP
parameter, so it is not useful for testing the behavior of reply packets. Only outgoing
connections can be diagnosed with this tool.
o Destination IP: The IP address of a target host.
o UDP Port: See Chapter 3, Firewall Rules
Example Traceroute result:
test/traceroute 8.8.8.8
1: dev134-86.dev.acme.com (172.17.134.86) 0.092ms pmtu 1500
1: devgw-waln5k02.dev.acme.com (172.17.0.3) 4.287ms
1: devgw-waln5k02.dev.acme.com (172.17.0.3) 1.287ms
2: e-1-20-walpalo.core.acme.com (192.168.255.21) 2.805ms
3: ge-0-0-1-walasr.edge.acme.com (192.43.242.209) 2.769ms
4: 205.158.44.81.ptr.us.xo.net (205.158.44.81) 9.247ms asymm 14
5: vb1020.rar3.nyc-ny.us.xo.net (216.156.0.25) 10.080ms asymm 12
6: 207.88.12.104.ptr.us.xo.net (207.88.12.104) 8.537ms asymm 12
7: 207.88.13.35.ptr.us.xo.net (207.88.13.35) 8.175ms asymm 11
8: no reply
9: no reply
.
.
.
31: no reply
Too many hops: pmtu 1500
Resume: pmtu 1500
8
TCP Connection Test: Attempts a TCP connection to the target IP and port. If successful, the
connection is closed immediately without transferring any data. If not successful it returns a
failure message.
o Source IP: Select the IP address of the appliance to test. This tests the behavior of a reply
packet. If you do not enter a value here, then the Outbound Policy rules are used. This
tests the behavior of outbound connections.
o Destination IP: The IP address of a target host.
o TCP Port: See Chapter 3, Firewall Rules.
Example TCP Connection Test result:
Host Resolution
A host that has both management and production IP addresses may be configured with only the IP
address for the management NIC in DNS. Use this page to add the NIC used for production
communications. The information that you enter here becomes the contents of /etc/hosts.
Note you cannot define a single hostname with multiple IP addresses, as the Management Panel will not
allow you to do this. Even if it allowed more than one IP address to be added for the same hostname, only
the first IP address would ever be used as this how name resolution with the /etc/hosts file works (which is
the reason the panel blocks attempts to add the same hostname). For the scenario where a single
hostname needs to resolve to more than IP, you must rely on an external DNS to do this resolution.
Host Resolution
9
Configure Self Service Network for Actifio Sky Appliances in the Cloud
For Actifio Appliances on the Cloud, once you login to the System Management you will see the DNS, NTP
tab.
3. Enter or modify the network settings using information in DNS and NTP on page 2. Any field you
leave empty will revert to DHCP provided values.
4. Click the IP & Interfaces tab to view the a list of configured IP addresses. You cannot edit any
information, it is view only. For more information, see IPs and Interfaces on page 3.
5. Click the Troubleshooting tab and troubleshoot problematic network connections using
information in Network Troubleshooting on page 8.
Network Troubleshooting
6. Click the Host Resolution tab to override DNS resolution for specific hosts. For more information,
see Host Resolution on page 9.
Note: For appliances on the Cloud, you will not see the Outbound Policies tab.
10
2 Reference Architectures for
Actifio Appliances
Actifio Appliances can be configured for different levels of security and high availability depending on
network resources. For best results, appliances should be configured according to the following tables:
Table 1: Actifio Sky Appliance Reference Architectures on page 11
Table 2: Actifio CDX Appliance Reference Architecture on page 11
Table 3: Actifio CDS Appliance Generation-3 Reference Architectures on page 12
Table 4: Actifio CDS Appliance Generation-4 Reference Architectures on page 13
Table 5: Actifio CDS Appliance Generation-5 Reference Architectures on page 14
Sky-1 Eth0 (1G) for all traffic 1G only virtual network Low The Sky
Appliance
Sky-2 Eth0 (1G) for management 1/10G mixed virtual Medium uses the
network hypervisor’s
Eth1 (1/10G) for backup/restore/replication High
Availability
Sky-4 Eth0 (1G) for management 1/10G mixed virtual High features.
Eth1 (10G) for backup network
CDX-1 eth0, eth1 for management 10G only High Ports bonded
eth2, eth3 for backup 10G only for HA
11
Actifio CDS Appliance: Generation-3
The Actifio CDS Appliance Generation-3 includes the two nodes in the middle and the batteries above
and below.
These are the most reliable network architectures for a CDS Appliance Generation-3:
12
Actifio CDS Appliance: Generation-4
The Actifio CDS Appliance Generation-4 looks like this:
These are the most reliable network architectures for a CDS Appliance Generation-4:
13
Actifio CDS Appliance: Generation-5
The Actifio CDS Appliance Generation-5 looks like this:
These are the most reliable network architectures for a CDS Appliance Generation-5:
14
3 Firewall Rules
This section opens with an overview of Internet Protocol (IP) Network Security in an Actifio Environment.
Then it details the network ports used within a fully functional Actifio VDP environment:
Actifio Local Management from Administrator Workstation on page 16
Actifio Appliance Local Services on page 16
Traffic to and from the Actifio Appliance on page 17
Backup Traffic from the Actifio Appliance, Replication Traffic Between Appliances on page 18
Actifio Remote Support on page 18
Local Storage Management on page 19
Actifio Report Manager on page 19
Actifio Global Manager (AGM) on page 20
Resiliency Director on page 20
SNMP
For the most part SNMP code on an Actifio Appliance is outgoing only, sending traps to a configured
receiver to notify of events and failures. The exception is when integrated with Actifio Optimized Storage
or SAN Fabric, a CDS Appliance will listen on UDP 162 for SNMP traps from specified IPs that are whitelisted
for Actifio CDS Integrated Storage components.
To see a list of whitelisted IP addresses, use udsinfo lsmonitoreddevice. SNMP v1 and v2 are supported.
No Actifio configuration can accept any SNMP walk or write (e.g. GetRequest, SetRequest, GetNextRequest,
GetBulkRequest) and this configuration of community names is not required or supported.
15
Actifio Appliance IP
Actifio Appliance IP Address depends on the type of appliance:
Actifio Sky Appliance: Actifio Appliance IP is the IP address of the Sky Appliance.
Actifio CDX Appliance: Actifio Appliance IP addresses must include Node 0, Node 1, and cluster.
Actifio CDS Appliance: Actifio Appliance IP addresses must include Node 0, Node 1, and cluster.
80 (TCP) or HTTP Admin workstation Actifio IMM Node IMM Ports for installation
443 (TCP) HTTPS addresses and service.
Enables local download of Actifio
Connector. No appliance control
or data access possible on this
port.
3900 (TCP) HTTP Admin workstation Actifio IMM Node IMM for remote access
ICMP Admin workstation Target Host System & Network Mgmt ping
25 (TCP) or SMTP Client email server Event notification via your SMTP
465 (TCP) SMTPS email relay server.
16
Traffic to and from the Actifio Appliance
5989 (TCP) CIMOM VMware SRM SSL encrypted WBEM (CDS only,
server used for VMware SRM
integration).
17
Backup Traffic from the Actifio Appliance, Replication Traffic Between Appliances
5108 (TCP) Actifio API Please keep this port open for a
planned StreamSnap feature.
18
Local Storage Management
TCP-22, 23 SSH Admin workstation Actifio SAN switch CLI access for installation and
service
TCP-80 HTTP Admin workstation Actifio SAN switch Management web GUI for
TCP-443 HTTPS installation and service
TCP-22 SSH Actifio Storage V3700 CLI access for installation and
(Node1/2) service
TCP-25 SMTP Actifio Storage Client Email Server SMTP Email Notification
V3700 (Node1/2)
TCP-22 SSH Admin workstation Actifio Storage V3700 CLI access for installation and
(Node1/2) service
19
Actifio Global Manager (AGM)
5103 (TCP) SSH AGM server Outbound connection from AGM to all
Actifio Appliances. Once the connection is
established, data flow is bidirectional.
443 (TCP) SSH AGM server Outbound connection from AGM to Sky
Appliances. Once the connection is
established, data flow is bidirectional.
443 (TCP) HTTPS Workstation AGM server Web browser access to AGM for inbound
or laptop connection to AGM server.
TCP-389 (TCP) or LDAP AGM server Client AD Microsoft AD/LDAP Active Directory
TCP-636 (TCP) LDAPS server Authentication
Resiliency Director
TCP-5103 HTTPS Resiliency Director Collector Source appliances Used to establish secure
session ID
Resiliency Director Server DR appliances
20
4 About the Actifio Connector
This chapter describes the Actifio Connector, including Obtaining the Right Actifio Connector for Your
Host on page 23 and Maintaining Connectors on Hosts on page 24. The Actifio Connector is a small-
footprint process that you install on your hosts.
This section includes:
What Does the Connector Do? on page 21
The Connector and the Network Environment on page 22
Host-Side Scripting on page 22
Obtaining the Right Actifio Connector for Your Host on page 23
Maintaining Connectors on Hosts on page 24
21
The Connector and the Network Environment
The Actifio Connector runs as the UDSAgent process, either UDSAgent.exe (Windows) or udsagent (unix).
For best results with the Actifio Connector, pay attention to network traffic and possible interference from
antivirus software.
Network Traffic
Traffic between the Actifio Appliances and the connector on your hosts is encrypted and communicated
via SSL. The Actifio Connector uses port 5106 by default for bidirectional communication from the Actifio
Appliance. You may see the legacy port 56789 in use for the same purposes. Make sure your firewall
permits bidirectional communication through this port. If you have existing services using both ports,
contact Actifio Support for assistance. For much more on network best practices, including iSCSI and
Fibre Channel configuration, see the chapter for the OS of the host.
Antivirus Software
Here are some high-level recommendations. Specific anti-virus/security products may call things by
different names, not support some features (process exclusion is commonly not supported), and are
configured by different means.
Exclude the udsagent process from Anti-Virus Monitoring: This is typically called "Process
exclusion" or "Process Threat Level". Excluding anything that UDSAgent.exe (Windows) or
udsagent (unix) does from scanning provides the best performance for the backup and the
least chance that the antivirus software will block anything.
Exclude scanning of mounted staging disks: Prevent the antivirus software from scanning
everything that VDP writes to the staging disk. This is typically slower than reading files on the
protected volume already.
o On Windows, exclude C:\Windows\act
o On Unix, exclude /act/mnt
Note: You might still have failures if the antivirus software blocks the Connector from opening or
reading a file on the protected volume.
Disable antivirus heuristics: This is not required, but may help in some cases. Anti-virus
heuristics typically block operations that look suspicious. When the connector is running a
backup of a system volume, it looks suspicious since it is reading the contents of the Windows
directory and re-creating it on the staging disk.
In some cases, disabling the antivirus software failed to prevent backup failures, but disabling the
antivirus software heuristics allowed backups to succeed.
Host-Side Scripting
The Actifio Connector enables scripting on the hosts on which it is installed. Scripts can be invoked for:
• On-demand jobs triggered by the Actifio CLI with the -scripts argument.
• Pre and Post phases of a VDP Workflow job.
For detailed instructions on how use VDP scripting, see:
• Chapter 18, APPID Pre- and Post-Scripts for Scheduled Data Protection Jobs
• Chapter 19, Super Scripts for Workflows and On-Demand Data Access Jobs
22
Obtaining the Right Actifio Connector for Your Host
The Actifio Appliance comes with different connector installer files. Each is of a file type appropriate to its
intended host type. You can download these with a web browser from the Actifio Resource Center; just
open a browser to the IP address of the appliance.
• connector-AIX-<version>.bff
• connector-HPUX-<version>.depot
• connector--Linux_x86-<version>.depot
• connector--Linux-<version>.depot
• connector-Linux_Ubuntu_amd64-latestversion.deb
• connector-Solaris_SPARC-<version>.depot
• connector-Solaris_x86-<version>.depot
• connector-win32-<version>.depot
Each section of this book details which connector installer you need for each type of host.
All of the Actifio Connectors are Available from the Actifio Resource Center
23
Maintaining Connectors on Hosts
From the AGM Manage > Appliance page, right-click the appliance that supports the host and select
Configure Appliance. Then use the Connector Management tool to uninstall or upgrade the Actifio
Connector on your hosts when new versions are available. For details, refer to the AGM online help.
24
5 Supporting VMware with
Actifio VDP
This includes:
• Actifio Sky Appliance Networking Requirements on page 25
• Ensuring iSCSI Connectivity from ESX to Storage on page 26
• Ensuring iSCSI Connectivity with an ESX Server on page 26
• Ensuring NFS Connectivity from ESX to Storage on page 28
• Setting NFS Data Transport Mode to a Host in VMware on page 29
Note: For best iSCSI network traffic results, see NIC Usage for Each Actifio Appliance Type on page 4.
Each Sky Appliance and CDX Appliance can support up to 100 iSCSI sessions. A CDS Appliance can support
275 sessions. You can support an additional 100 sessions by adding a NIC card to a Sky Appliance.
25
Ensuring iSCSI Connectivity from ESX to Storage
To test the iSCSI connection from an ESXi server to a V3700 or V7000 storage array or to an Actifio CDS
Appliance:
1. Enable ESXi Shell and connect to ESXi as root.
2. Use netcat (nc) command to confirm connectivity:
~ # nc -z 123.45.67.89 3260
Connection to 123.45.67.89 3260 port [tcp/*] succeeded!
This example confirms that the device is listening on that port. If a port is unreachable then you
return to the prompt with no output.
Note: ESXi does not have telnet, so issuing a ping does not prove that connectivity for iSCSI is available.
LoginTimeout 60 When iSCSI establishes a session between initiator and target, it must log into
the target. It will try to log in for a period of LoginTimeout. If the login attempt
exceeds LoginTimeout, then the login fails.
Noopinterval 30 iSCSI uses the noop timeout to passively discover if this path is dead when it
is not the active path.
This procedure is for a single Actifio Ethernet iSCSI connection to a single iSCSI Ethernet connection on the
ESX server. Actifio Professional Services can help you with any other configuration.
26
For CDX Appliance cluster (which is high availability), these parameters are different to ensure the iSCSI
connection survives a failover event.
27
Ensuring NFS Connectivity from ESX to Storage
Minimum ESX versions
ESXi hosts must be running these minimum levels to support NFS client.
• ESXi Version 5.5 Patch 5 (Build 2718055) OR
• ESXi Version 6.0 U1a (Build 3073146)
28
Setting NFS Data Transport Mode to a Host in VMware
NFS Datastore Transport Mode with VMware is an alternative to iSCSI. NFS datastore enables simpler initial
setup and fast onboarding of VMs into Actifio VDP. It is enabled by default for new deployments. You can
set the NFS transport mode to a VM host to avoid HBA scans that may cause the VM host to crash.
Note: Once the NFS datastore is mounted, you cannot unmount if any images exist.
1. In AGM, click the Manage tab and select Hosts from the drop-down menu. The Hosts page
opens.
2. Select Add Host. The upper portion is for network and other identification information. Below
that are dynamic sections for host connections and for organizations that the host belongs to.
3. Enter the host name and a friendly path for the host. The name of a host should start with a
letter, and can contain letters, digits (0-9), and an underscore ('_').
4. Enter the IP address of the host, then click +. You can enter an additional IP address in IP Address.
Click + to add each additional IP address for the host.
5. Optionally, add a description of this host.
6. In the Appliances section, select the AGM managed appliances that will serve this host. If the list
is long, you can use the Search box to find a specific appliance or group of appliances.
29
7. Select the Host Type: vCenter, ESX Server, or Generic. Select Generic for hosts that are not one of
the four VM types. This includes Windows and Linux hosts and all physical hosts. Generic hosts
require an Actifio Connector of the type that matches their OS.
For vCenter or ESX Server selections, you also get the option to select a Transport Mode. You see
the Transport Mode option only during adding a host. This option can be edited after the host
has been added:
o NFS (default): Select NFS if you are in an NFS network. Transport will be Network Based in
the Application Manager image details and in the System Monitor Transport column.
o SAN (block storage): Select SAN if you are using Fibre Channel or iSCSI networking.
Transport will be SAN Based in the Application Manager image details and in the System
Monitor Transport column.
Note: As of v9.0, vCenter hosts on appliances default to the transport type NFS. This may be
incompatible with External Storage Pools (ESP) under certain circumstances. If you plan to use
ESP, change the transport type to SAN. For more information, see Transport Setting for External
Snapshot Pools in the AGM Online help.
8. If you must override the connection settings from the appliance, then click Connector Settings,
vCenter Settings, or ESX Settings as appropriate. For more information, refer to Connector
Settings Overrides in the AGM Online help.
9. Click Organizations. Select one or more organizations for the host to join. For details on
Organizations, see Viewing Organizations in the AGM Online help.
10. Click Submit to save the host information.
The Edit Host page opens where additional steps are required if you are adding a host that will
use NFS storage or Oracle database authentication. If the new host is defined on multiple
appliances and if the information is not identical for them all, then you will see the Host
Reconciliation page first. Refer to the AGM Online help for more information.
30
6 Supporting Microsoft
Windows Server with Actifio
VDP
Windows Server hosts include Microsoft SQL Server, SharePoint, and Exchange hosts, as well as Active
Directory, CIFS, and other file systems.
This chapter includes:
Ensuring iSCSI Connectivity on a Windows Physical Host on page 32
Ensuring Fibre Channel Connectivity on a Windows Physical Host on page 33
Installing the Actifio Connector on Microsoft Windows Hosts on page 34
Restricting Windows Connector Communication to Specific Appliances on page 35
Notes on Discovering Specific Microsoft Application Types on page 37
Note: The Actifio Connector can be “firewalled” out if the host joins a domain after the Connector has
been installed. If this happens, uninstall and then re-install the Actifio Connector.
31
Ensuring iSCSI Connectivity on a Windows Physical Host
Windows Server hosts include Microsoft SQL Server, SharePoint, and Exchange hosts, as well as Active
Directory, CIFS, and other file systems.
When the Actifio Connector manages data movement over iSCSI, VDP uses a staging disk to create a
copy of application data during each Snapshot or Dedup Async job.
An Actifio-approved iSCSI initiator must be installed on the host. While it is possible to also present the
staging disk to a VM using an iSCSI initiator running in the VM, this is normally not necessary.
Learn the iSCSI Initiator Name from a Physical Windows Host via Server Manager
1. On Windows Server 2012, 2012 R2, or 2016, open up Server Manager.
2. Click Tools and select iSCSI Initiator to start the MSiSCSI Initiator Service.
3. The Microsoft iSCSI dialog will open indicating that the service is not running. Click Yes to start
the service and to set it to start automatically when the server reboots.
4. After the MSiSCSI Initiator Service has started the Properties dialog will be opened. Click the
Configuration tab to retrieve the iSCSI Qualified Name (IQN).
5. Write down or copy the Initiator Name.
Learn the iSCSI Initiator Name from a Physical Windows Host via the CLI
To learn the iSCSI initiator name from a physical Windows host, use the iscsicli command:
C:\Users\Administrator>iscsicli
Microsoft iSCSI Initiator Version 6.0 Build 6000
[iqn.1991-05.com.microsoft:winsql2016-1.sqa.actifio.com] Enter command or ^C to exit
You will need this value when you add the host to the Actifio Appliance.
32
Ensuring Fibre Channel Connectivity on a Windows Physical Host
When adding a new host that is accessed via Fibre Channel SAN, the new host must be zoned to the
Actifio Appliance using an Actifio-approved multipath driver by your storage administrator. The storage
administrator will need to know the host WWN; procedures to find WWN on three common Windows
servers are below.
Multipathing
Define a total of four paths (this is both the recommended minimum and maximum) or at most eight
paths (absolute maximum) between the CDS Appliance and the Windows host.
Note: Proper multipathing is especially important for maintaining application-aware mounts over a
system restart. Multiple different multipathing systems on a single HBA can result in hard-to-identify
conflicts.
If the Windows host has two HBA ports (two WWPNs) and each is zoned to one port on Actifio Node 1 and
one port on Actifio Node 2, then that host has four paths; this is the recommended configuration. Do not
use more than eight paths. When you discover the WWPN, make a note of it. You will use it when you add
the host.
33
Installing the Actifio Connector on Microsoft Windows Hosts
The Actifio Connector for Microsoft Windows runs as a Windows service under the Local System account.
The Actifio Connector writes logs to a log file in its installation directory. On Microsoft Windows systems,
the installer comes as: connector-Win32-<version>.exe.
If you are managing multiple clustered Windows hosts, then install an Actifio Connector on each host.
The Actifio Connector for Windows is also used for Hyper-V data protection. It should be installed on each
Hyper-V server. If an SCVMM Server is in use, then it should also be installed on that server as well. The
Actifio Connector only needs to be installed into a VM (VMware, Hyper-V VM, or Hyper-V VM stored on CSV
disks) if you want to protect individual applications inside the VM rather than simply protect the entire VM.
34
Restricting Windows Connector Communication to Specific
Appliances
If you have multiple Actifio Appliances and you want to restrict which appliance can communicate to the
connector of a specific host, copy the certificate file from the desired appliance to a specific location on
the host. The Actifio Connector on the host will only be able to communicate with the appliance that has
the matching certificate. This ensures that an unauthorized appliance cannot be used to create images
of application data on the host. In addition to restricting the connector to authorized appliances, this
procedure enables certificate verification in the connector, protecting it from man-in-the-middle
attacks form a device between the appliance and the connector host.
A single host connector can be restricted to any number of appliances using this method.
For this procedure, assume a host and two appliances: Host, AuthorizedAppliance, and
UnauthorizedAppliance.
1. On AuthorizedAppliance, open AGM to the Domain Manager, Appliance page.
2. Select the appliance and right click it. Select Configure Appliance.
3. The Appliance Configuration window opens. Click the gear icon in the lower left corner, then
select Download Certificate.
4. Save the file with meaningful unique name and with the extension .crt, such as
AuthorizedAppliance1.crt. The file name is not important.
5. Copy the certificate file to the host at C:\Program Files\Actifio\certs\trusted.
6. Stop and start the connector (UDSAgent) using services.msc.
7. Attempt application discovery from the AuthorizedAppliance in AGM. Discovery will succeed.
35
8. Attempt application discovery from the UnauthorizedAppliance in AGM. Discovery fails:
36
Notes on Discovering Specific Microsoft Application Types
The following information will be of use when discovering applications:
Note: In order to find the share, the username and password for the host server must be set to the user
that mapped the server. You can only find mapped shares for a user if an Actifio Appliance can
impersonate that user.
37
38
7 Supporting Microsoft Hyper-V
with Actifio VDP
39
Uninstalling the Actifio Connector from a Windows Host
To uninstall the Actifio Connector from a Windows host:
1. Go to the c:\program files\Actifio folder created during the installation.
2. Select and double-click the uninstaller executable: unins000.exe.
3. Click Yes to confirm and then click OK to finish.
40
8 Supporting Linux with
Actifio VDP
Installing the iSCSI Initiator on a Red Hat RHEL 6 or CentOS Linux Host
To install the iSCSI initiator on a Linux host:
Make sure you have the iscsiadm package installed.
Run: # rpm -qa | grep iscsi
This should show something similar to: iscsi-initiator-utils-6.2.0.865-6.el5.x86_64.rpm
If you see nothing, then you must install the package: # yum install iscsi-initiator-utils
41
Installing the iSCSI Initiator on a SLES Linux Host
Use YaST to install the iSCSI initiator package.
Make sure you have the open-iscsi package installed.
Run: # rpm -qa | grep iscsi
This should show something similar to:
open-iscsi-x.x.x.x
yast2-iscsi-client-x.x.x.x
If you do not see both of these packages, then you must install open-iscsi:
1. # yast2 sw_single
2. In the search, enter iscsi
3. Select open-iscsi and click Accept.
CentOS 6.x
devices {
device {
vendor "ACTIFIO"
product "LUN0|CDX"
path_selector "round-robin 0"
path_grouping_policy failover
path_checker tur
rr_min_io 100
failback immediate
no_path_retry "5"
dev_loss_tmo 180
}
}
42
Ensuring Fibre Channel Connectivity to a Linux Host
If an application is running on a physical server where Fibre Channel is used, then zoning must exist
between the appliance and the host, and an Actifio-approved multipath driver must be in use.
Host Zoning
When adding a new host that is accessed via Fibre Channel SAN, the new host must be zoned to the
Actifio Appliance by your storage administrator. The storage administrator will need to know the host
WWN.
To find the WWN of a Linux host on a Fibre Channel SAN:
[root@cs003-u34 ~]# cat /sys/class/scsi_host/host*/device/fc_host/host*/node_name
0x200000e08b127a8e
0x200100e08b327a8e
Multipathing
Proper multipathing is especially important for maintaining application-aware mounts over a system
restart. These are the currently supported multipathing options:
• IBM System Storage Multipath Subsystem Device Driver (SDD)
• Symantec/Veritas Volume Manager 5.1, 6.0, 6.0.1, 6.1
• PVLinks for HP-UX (pre 11.31 v1), HP-UX native
• MPIO for Windows and IBM AIX
• MPxIO for Solaris
• Native VMware multipathing driver for VMware ESX 4.X and later
• Native multipathing drivers for OpenVMS and Linux(DM-MPIO)
If the Linux host has two HBA ports (two WWPNs) and each is zoned to one port on Actifio Node 1 and one
port on Actifio Node 2, then that host will have four paths; the recommended configuration. Don’t use
more than eight paths.
Linux systems employ a multipath.conf file at /etc/multipath.conf. For each Linux distribution and
releases within a distribution, refer to the default settings:
• Red Hat Linux: /usr/share/doc/device-mapper-multipath.*
• Novell SuSE Linux: /usr/share/doc/packages/multipath-tools
Include in /etc/multipath.conf the information in the tables below that corresponds to the Linux version
on the host that you are configuring. Ensure that the entries added to multipath.conf match the format
and syntax for the required Linux distribution. Use the multipath.conf only from your related distribution
and release. Do not copy the multipath.conf file from one distribution or release to another.
Table 2: Linux Multipathing Requirements on Actifio CDS Firmware 7.3.0 on page 44
Table 3: Linux Multipathing Requirements on Actifio CDS Firmware 7.8.1 on page 44
Table 4: Linux Multipathing Requirements for an Actifio CDX Appliance on page 46
43
Table 2: Linux Multipathing Requirements on Actifio CDS Firmware 7.3.0
RHEL Versions 5.x, 6.0 and 6.1 SuSE Linux Versions 10.x, 11.0, and 11SP1
RHEL Versions 6.2 and higher and 7.x SUSE Linux versions 11SP.2 and higher
RHEL Versions 5.x, 6.0 and 6.1 SUSE Linux Versions 10.x, 11.0, and 11SP1
44
Table 3: Linux Multipathing Requirements on Actifio CDS Firmware 7.8.1
45
Table 4: Linux Multipathing Requirements for an Actifio CDX Appliance
CentOS 6.x
devices {
device {
vendor "ACTIFIO"
product "LUN0"
path_grouping_policy group_by_prio
detect_prio yes
path_checker tur
failback immediate
no_path_retry "5"
dev_loss_tmo 180
}
device {
vendor "ACTIFIO"
product "CDX"
path_grouping_policy group_by_prio
features "1 queue_if_no_path"
detect_prio yes
hardware_handler "1 alua"
path_checker tur
failback immediate
dev_loss_tmo 180
}
}
CentOS 7.x
devices {
device {
vendor "ACTIFIO"
product "LUN0"
path_grouping_policy group_by_prio
detect_prio yes
path_checker tur
failback immediate
no_path_retry "5"
dev_loss_tmo 180
}
device {
vendor "ACTIFIO"
product "CDX"
path_grouping_policy group_by_prio
features "1 queue_if_no_path"
detect_prio yes
hardware_handler "1 alua"
path_checker tur
failback immediate
dev_loss_tmo 180
}
}
46
Ensuring NFS Connectivity on a Linux Host Connected to a Sky
Appliance
When VDP manages data movement over NFS, during each Snapshot, Dedup Async, or StreamSnap job,
VDP uses an NFS share created on the appliance and exports to the Linux host a copy of application data.
NFS Transport over NFS data store ESX server raw device mapping
SAN Transport to the iSCSI initiator or to Fibre Channel Guest VM ESX is bypassed
47
Installing the Actifio Connector on a Linux Host
The Actifio Connector for Linux runs as a daemon process under the username root. It listens on a TCP
port 5106 for communication from the Actifio Appliance. The Actifio Connector writes to a log file in the
installation directory (/var/act/log/UDSAgent.log) and posts significant events to the /var/log/
messages repository.
Use the rpm utility to install the Actifio Connector. The installer creates Init RC scripts to start and stop the
Actifio Connector that runs as a daemon. After the installation completes, use the RC script to start the
Actifio Connector for the first time.
To install the Actifio Connector on a Linux host:
1. Log on to the host as root.
2. Open a browser to https://<Actifio Appliance IP> to access the Actifio Resource Center.
48
Non-systemd (SUSE Linux before 12.0 and RHEL before 7.0): /etc/init.d/udsagent restart
Systemd (SUSE Linux 12.0+ and for RHEL 7.0+): systemctl restart udsagent
Uninstalling the Actifio Connector from a Linux Host using the Command Line
To uninstall the Actifio Connector from a Linux host:
1. Stop the Actifio Connector by running /etc/init.d/udsagent stop.
2. Learn the currently installed Linux Connector RPM name:
[oregon@vq-oregon ~]$ rpm -qa udsagent
This returns the package name and version, such as: udsagent-7.1.0-62339.x86_64
3. Uninstall the package using rpm -e udsagent with the package name you obtained from the
query. For example:
rpm -e udsagent-7.1.0-62339.x86_64
Connector Management
49
50
9 Supporting IBM AIX with
Actifio VDP
51
LPAR with vSCSI mapping: You can also add LPARs with vSCSI mapping on VIO servers. These
are described in Ensuring vSCSI Connectivity on an IBM HMC Host on page 56.
52
Ensuring NFS Connectivity on an IBM AIX Host Connected to a Sky
Appliance
When Actifio VDP manages data movement over NFS, during each Snapshot or Dedup Async or
StreamSnap job, VDP uses an NFS share created on the appliance and exports to the Linux host a copy of
application data.
NFS Transport over NFS data store ESX server raw device mapping
SAN Transport to the iSCSI initiator or to Fibre Channel Guest VM ESX is bypassed
53
Installing the Actifio Connector on IBM AIX Hosts
On AIX systems, including those using the NPIV protocol, the Actifio Connector runs as a daemon process
under the username root. It listens on TCP port 5106 and 56789 (legacy port) for communication from the
Actifio Appliance. The Actifio Connector writes to a log file in the installation directory (/var/act/log/
UDSAgent.log).
Note: IBM AIX 6.1 pSeries platform introduced a bug that may cause backups to fail. TL7 fixed the bug.
Verify the successful installation of the Actifio Connector lslpp -L | grep udsagent
54
10 Supporting IBM HMC with
Actifio VDP
Limitations
IBM HMC hosts can be added to a Sky Appliance for LPAR discovery, but Sky Appliances do not support
Fibre Channel connectivity, so the LPARs must be presented to their staging disks over an iSCSI
connection.
55
Ensuring vSCSI Connectivity on an IBM HMC Host
Limitations
IBM HMC hosts can be added to an Actifio Sky Appliance for LPAR discovery, but Sky Appliances do not
support Fibre Channel connectivity, so the LPARs must be presented to their staging disks over an iSCSI
connection.
Ensuring Connectivity
LPAR hosts with vSCSI mapping are virtual hosts that rely on VIO servers for vSCSI connectivity. They do not
have direct FC connectivity and FC is not an option for them. If they are discovered as regular physical
hosts, then the only option to back them up is using iSCSI, which is inferior to vSCSI. For enabling vSCSI
connectivity with this class of LPARs:
• They must be discovered indirectly through HMC discovery, not directly as regular physical
hosts.
• The Actifio Appliance should have Fibre Channel connectivity to VIO servers catering storage to
these LPARs.
If either of these two conditions are not met, the appliance will use iSCSI connectivity.
Resources such as RAM and CPU are still managed by the HMC but I/O such as network and fibre are
managed through the VIO server. This is more scalable than earlier technologies. LUN presentation is
done through the HBA cards on the VIO server(s). The VIO server presents the LUNs in a virtual SCSI
mapping manner to the LPAR or vhost.
Because the Actifio Connector has direct ties with the HMC of the environment, VDP can protect and
recover vSCSI VIO mapped LPARS from an environment including the rootvg in a bootable state.
When the Actifio Connector manages data movement over vSCSI, VDP uses a staging disk to create a
copy of application data during each Snapshot or Dedup Async job.
To discover a vSCSI LPAR host, see Notes for HMC Hosts on page 70.
56
11 Supporting Oracle Solaris with
Actifio VDP
Limitations
The Sky Appliance does support iSCSI on Solaris V11 systems after applying Solaris patch 11.3.21.5.0.
The CDS Appliance does not support iSCSI for Solaris SPARC hosts.
The CDX Appliance does not support Solaris hosts.
Using NFS protocol for Solaris LDOM and Solaris Zones hosts in AGM
To use NFS protocol for Solaris LDOM and Zones hosts, use the AGM Manager Hosts Edit section to set the
Staging Disk Format to NFS. The staging disk will be presented as an NFS share and Actifio Connector will
consume it. When mounting an image captured this way, you can mount them as NFS shares.
57
Installing the Actifio Connector on Solaris Hosts
On Sun Solaris systems, the installer takes the form of a package file. On Solaris systems, the Actifio
Connector runs as a daemon process under the user name root. It listens on TCP port 5106 and 56789
(legacy port) for communication from the Actifio Appliance. The Actifio Connector writes to a log file in
the installation directory (/var/act/log/UDSAgent.log).
To install the Actifio Connector on a Solaris host:
1. Open a browser to https://<Actifio Appliance IP> to access the Actifio Resource Center.
2. Click the appropriate Solaris Connector install package icon to download the Actifio
Connector.
3. To install the Actifio Connector, run:
o SPARC: pkgadd -d /tmp/connector-Solaris_SPARC-<version>.pkg all
o Solaris x86: pkgadd -d /tmp/connector-Solaris_x86-<version>.pkg all
Note: You can also uninstall the Actifio Connector on many hosts simultaneously; see Maintaining
Connectors on Hosts on page 24
Using the Connector Management Tool to Upgrade or Uninstall the Actifio Connector
on a Solaris Host
Use the Connector Management tool in the AGM Domain Manager service to upgrade or uninstall the
Actifio Connector on your hosts when new versions are available. Refer to Maintaining Connectors on
Hosts on page 24.
58
Ensuring iSCSI Connectivity on an Oracle Sun Solaris Host
The Actifio Appliance must be able to communicate with the Actifio Connector running on the new host
over a Fibre Channel or iSCSI network.
Note: The Actifio CDS Appliance does not support iSCSI for Solaris SPARC hosts but the Actifio Sky
Appliance does support it.
When the Actifio Connector manages data movement over iSCSI, VDP uses a staging disk to create a
copy of application data during each Snapshot or Dedup Async job.
Note: Proper multipathing is critical for maintaining application-aware mounts over a system restart.
59
Ensuring NFS Connectivity on a Solaris Host
This section includes:
Limitations on page 57
Using NFS protocol for Solaris LDOM and Solaris Zones hosts in AGM on page 57
When the Actifio Connector manages data movement over NFS, the Actifio sky appliance uses an NFS
share created on it and exports to the Solaris host to create a copy of application data during each
Snapshot or Dedup Async or StreamSnap job.
Limitations
• Only NFSv3 is supported.
• System state captured with staging disk format NFS are ineligible for Actifio Cloud Mobility.
• Cross platform presentation of Oracle images captured over NFS is not supported. For example,
Oracle data captured from a Solaris system cannot be presented on a Linux system.
• Oracle databases captured as ASM Disk over NFS cannot be mounted as Standalone ASM or as
ASM RAC.
111 Portmapper/rpcbind
2049 nfsd
4001 Mountd
4045 lockd
756 statd
60
12 Supporting HP-UX with
Actifio VDP
Note: Only Fibre Channel connectivity to CDS Appliances is supported. For Sky Appliances, iSCSI
connectivity is supported. CDX Appliances do not support HP-UX.
Note: After the iSCSI initiator is configured, the HP-UX native multipathing is statically linked with the
kernel, so no setup is required to use the multipathing support.
61
If the HP-UX host has two HBA ports (two WWPNs) and each is zoned to one port on Actifio Node 1 and one
port on Actifio Node 2, then the host will have four paths; this is the recommended configuration.
62
Ensuring NFS Connectivity on an HP-UX Host Connected to a Sky
Appliance
When Actifio VDP manages data movement over NFS, during each Snapshot or Dedup Async or
StreamSnap job, VDP uses an NFS share created on the appliance and exports to the Linux host a copy of
application data.
NFS Transport over NFS data store ESX server raw device mapping
SAN Transport to the iSCSI initiator or to Fibre Channel Guest VM ESX is bypassed
63
Installing the Actifio Connector on HP-UX Hosts
For HP-UX, the installer comes as the file: connector-HPUX-<version>.depot. It runs as a daemon process
under the user name root. The connector writes to a log file in the installation directory (/var/act/log/
UDSAgent.log).
To install the Actifio Connector on a HP-UX host:
1. Open a browser to https://<Actifio Appliance IP> to access the Actifio Resource Center.
2. Click the HP UX Connector icon to download the HP-UX install package.
3. Install the Actifio Connector by running swinstall –s /<connector_filename>.depot \*
Note: Enter the \* included at the end of the swinstall command as shown above. It instructs
swinstall to install only the software it finds in the depot (the Actifio Connector). If you
accidentally enter /* you will receive a number of spurious error messages regarding software
packages that could not be found.
Verify the successful installation of the Actifio Connector swlist |grep udsagent
64
13 Adding Your Hosts to an Actifio
Appliance
These are the steps to connecting a non-VMware host to your VDP system. The first two are operating
system-specific, the third applies only to hosts that will use VDP in-band storage (CDS Appliance only).
Windows Server, or Installing the Actifio Connector on Microsoft Chapter 15, Adding Windows
Hyper-V or SCVMM Windows Hosts on page 34 Server and Hyper-V Hosts to AGM
After performing the OS-specific steps in the table above, the next steps are the same for all host types:
1. Assigning VDisks for the Host Copy Data (In-Band CDS Appliance only) on page 66.
2. Configuring Hosts to Auto-Discover their Applications on page 67.
3. Reconciling Inconsistent Host Information across Multiple Appliances on page 68
If you no longer want to protect the applications or VMs on a host, you can delete it from VDP
management; see Deleting Hosts Using the AGM on page 68.
You can have pre- and post-scripts run on your applications and VMs when they are triggered by a VDP
job. Scripting is detailed in Chapter 18, APPID Pre- and Post-Scripts for Scheduled Data Protection Jobs and
in Chapter 19, Super Scripts for Workflows and On-Demand Data Access Jobs.
Note: You don’t add a vCenter or an ESXi Cluster, you discover it; see A VMware Administrator’s Guide
to Actifio Copy Data Management.
65
Assigning VDisks for the Host Copy Data (In-Band CDS Appliance
only)
Hosts that use Actifio-provided in-band storage must have VDisks assigned (mapped) to them.
To assign a virtual disk to a host:
1. Open AGM to Manage > Appliances.
2. Right-click the and select Configure Appliance.
3. In the navigation pane under Hosts, select the host and the All VDisks tab.
4. Select one or more virtual disks and click Map. A confirmation dialog appears.
5. Enter the SCSI ID for the VDisk. The SCSI ID is auto-generated if it is left blank.
6. Click Map VDisk.
66
Configuring Hosts to Auto-Discover their Applications
You can enable your appliances to auto-discover new applications on a configured host. This does not
protect the new applications, it only discovers them. You can only enable this feature after the host has
been added.
1. Open the AGM to the Manage > Hosts page.
2. Right-click the host to enable auto-discovery on, and select Edit.
3. Side the Enable Auto Discovery button to the right and click Save in the lower right corner.
67
Reconciling Inconsistent Host Information across Multiple
Appliances
A host can be defined on multiple appliances, either intentionally or unintentionally. This is common with
VMware VMs. If the host is managed by two VDP appliances, then the name is preceded by a
multiple-appliances icon and the entry in the Appliance column shows a link to the other appliance.
When records of the same host reside on multiple VDP appliances, the host information can be slightly
different from one appliance to another. In that case, when you edit the host record, you will see a Host
Reconciliation section at the top of the host record. Review the information in the table, and select the
host record that has the most up-to-date information. Then click Submit. All other host records in the
table will be reset to match the selected host record. After this, you see the Edit Host page detailed in
Editing Host Properties.
68
14 Adding Unix Hosts to AGM
Unix hosts include Linux, AIX, IBM HMC, Solaris, and HP-UX hosts. To add a Unix host to your VDP system:
1. Open the AGM to Manage > Hosts.
2. In the upper right corner, select + Add Host.
3. In the Add Host form, enter the name and an optional friendly name. The name of a host should
start with a letter, and can contain letters and digits (0-9).
4. Enter the IP address of the host in IP Address. Click + to add multiple IP addresses.
5. In the Appliances section, select the AGM managed appliances that will serve this host. If the list
is long, you can use the Search box to find a specific appliance or group of appliances.
6. In Host Type, select Generic.
69
7. Enter Application Discovery Credentials as needed to discover and protect the applications
on the host.
8. In Connector Settings, use 5106 for Connector Port unless you have changed from the default
value. You can also use 56789. Do not use any other port unless instructed by Actifio Support.
Enter the user name and password of the Actifio Connector on the host if you intend to run pre-
and post-scripts on the host.
9. In Organizations, select one or more Actifio organizations for the host to be a member of.
Organizations are explained in the AGM online help.
10. Click Add.
The next step is Assigning VDisks for the Host Copy Data (In-Band CDS Appliance only) on page 66.
70
15 Adding Windows Server and
Hyper-V Hosts to AGM
CIFS file systems, SQL Server, Generic The default connector port for Generic hosts, SCVMM
SharePoint, Exchange and Hyper-V VMs is 5106. If you use a different port, then
enter it here.
Hyper-V managed by SCVMM If the Connector username and password have
Microsoft SCVMM changed, then change them here.
If you do not need to override the default settings, then
Standalone Hyper-V on Hyper-V Server enter nothing here.
Windows server
ESXi standalone ESX Server The default ESX Server management port is 902. If you
use a different port, then enter it here.
If the ESX server username and password have
changed, then change them here.
If you do not need to override the default settings, then
enter nothing here.
71
Table 1: Host Types and Connector Settings Overrides
vCenter with ESXi VMs vCenter A vCenter can have both vCenter Settings and
Connector Settings, because a vCenter might also have
the Actifio Connector installed on it.
The default vCenter management port is 443. If you use
a different port, then enter it here.
If the vCenter username and password have changed,
then change them here.
If you do not need to override the default settings, then
enter nothing here.
7. Enter Application Discovery Credentials to discover and protect the applications on the host.
8. In Connector Settings, use 5106 for Connector Port unless you have changed from the default
value. You can also use 56789. Enter the user name and password of the Actifio Connector on
the host if you intend to run pre- and post-scripts on the host.
9. In Organizations, select one or more Actifio organizations for the host to be a member of.
Organizations are explained in the AGM online help.
10. Click Add.
72
16 Configuring External Snapshot
Pools on IBM Storewize and
Pure Storage FlashArray
This chapter details:
Prerequisites for an External Snapshot Pool Deployment on page 74
Adding an External Storage Array on page 75
Adding an External Snapshot Pool on page 76
Adding New Hosts on page 76
73
Prerequisites for an External Snapshot Pool Deployment
External Snapshot pools are used to store snapshot images in IBM Storwize and Pure Storage FlashArray
storage arrays instead of within a Sky appliance’s Snapshot pool.
74
Adding an External Storage Array
Before you add an external storage array:
• AGM must be managing at least one Sky appliance. CDS appliances are not supported.
• You need administrator credentials for the storage array and the IP Address or FQDN (fully
qualified domain name) of the storage array.
• For an IBM Storwize (v3700, v5000, v7000, SVC) storage array:
o The storage array administrator has provisioned an empty mdiskpool for use by the Sky
appliance.
o VDP needs to connect to both Storwize cluster IP and iSCSI IP
To add an external storage array:
1. In the AGM Domain Manager, click Storage Arrays. The Storage Array page opens.
2. Click Add Storage Array.
3. In Name, add a descriptive name for the external storage array. This name will be used on both
the AGM and the Sky appliances. It does not need to match any name on the storage array.
4. In IP/FQDN, add the IP address or the fully qualified domain name (array.thiscompany.com) of
the external storage array.
5. From the Storage Array Type drop-down, select either Pure Storage FlashArray or IBM Storwize.
6. In Username and Password, enter login credentials of the administrator account on the
storage array.
Note: The Pound Sterling character (£) is not supported for passwords.
Note: Future pool expansion on a Storwize ESP pool must be done on the Storwize array. VDP will detect
this expansion automatically.
Note: For an IBM Storwize storage array you will see a newly created username for each Sky appliance
to use with the array. These have the pattern 'act' followed by a 10-digit number (for example:
act1415066080). Manipulations of snapshots and images on the array by Sky will appear in the Storwize
Audit Log using this act-<number> username.
75
Adding an External Snapshot Pool
Once you have created an external storage array, it is necessary to specify which pool on that array will
be used as an External Snapshot Pool for an Sky appliance.
76
17 Configuring LDAP and Role-
Based Access
LDAP Authentication
You can use a single existing LDAP (Lightweight Directory Access Protocol) server for AGM user
authentication and to map LDAP groups to AGM roles. Active Directory provides authentication, directory,
policy, and other services in a Windows environment, and LDAP is an application protocol for querying
and modifying items in directory service providers such as Active Directory.
This section includes:
Things to Consider when AGM Is Configured for LDAP Authentication on page 77
Configuring LDAP Settings on page 78
Mapping LDAP Groups to Roles and Organizations on page 79
Viewing LDAP Groups on page 81
Deleting an LDAP Group on page 82
77
• The default “admin” account will always be authenticated against internal credentials stored in
the AGM database.
• LDAP configuration is not shared between AGM and managed Actifio appliances.
Note: In the case of Microsoft Active Directory, for the SSL/TLS connection to properly connect to
the LDAP server, the server must have Certificate services installed on it so that it can answer on
port 636. You can confirm that the connection is working properly by looking in the event viewer
of the LDAPSERVER under Windows Logs -> System. Look for event 36886 by source Schannel. If
your output shows a connection and no disconnect, then that means that was a successful
connection and LDAP is communicating properly.
o Privileged User DN: The full DN (distinguished name) of the user that is to perform user
lookups in the LDAP server. This field creates the user within AGM that matches the LDAP
server account properties.
o Password: Password for the lookup user.
o Search by Base DN: The base distinguished name (DN) subtree that is used by AGM to
search for user and group entries.
o Search by Username Attribute: The LDAP attribute to use to match against the supplied
login name.
o Use Cached Credentials When Directory is Unavailable: Specifies to use the cached
credentials in the AGM database for verification when the LDAP server is offline or
unavailable. When enabled, all previously cached LDAP users can login using their
credentials.
o Auto Create User: Specifies to store the username and the hash value of the user
credentials in the AGM database when that user logs in through the LDAP server.
4. Optionally, you can use the Test button to confirm that the LDAP server access information is
accurate and that authentication has been accepted by the LDAP server. The Test Credentials
dialog opens.
Enter your login credentials, then press Test. You should receive a Success message. Click OK to
return to the LDAP Settings page.
78
Note: If you receive an Error While Testing message, double-check that you entered the login
credentials correctly. If the login credentials are correct, confirm that the LDAP server settings
are correct as described in step 5.
5. Click Save.
6. You can now set up group mapping by choosing an LDAP Group and associating it with a role.
4. Depending on whether you want to edit an existing LDAP group or create a new LDAP group:
o To modify an existing LDAP group, select the LDAP group from the list and then select Edit
(bottom right-hand corner of the window).
o To create a new LDAP group, click New Group Mapping.
79
The LDAP Group Mapping page appears. The LDAP Group Mapping page has three panels:
o Mapped LDAP Group
o Role
o Organizations
LDAP groups that appear after a query is performed
o AGM roles
o AGM organizations
5. Use the Groups search field to perform a lookup for a specific group from the LDAP server. You
can view the full path of each LDAP group found in a search query through the use of the
Verbose Name slider. Verbose Name toggles the display of all found LDAP groups by their full
distinguished name (DN).
80
6. Select the desired LDAP group from the left list and then select:
o The roles in the Roles list to map the LDAP group to the specific role(s).
o The organizations in the Organizations list that will use this resource. This action creates a
relationship between the resource (an LDAP group in this case) and one or more
organizations.
Note: For details on roles and organizations see Organizations, Users, Roles and Rights, below.
Note: Modifications to imported organizations, users, and roles are not synchronized back to the
appliance from which they were originally imported. Once imported, you cannot make changes to
these objects on the appliance; all changes must be made in AGM. This includes subsequent resource
assignments (or reassignments) to existing organizations.
Organizations, Users, Roles and Rights are detailed in the AGM Online Help.
Note: Filters of type text, list, and date, persist across different AGM sessions for the same user.
o Adjust Fields: To modify the fields that appear in the table, right-click within the table
header row and click the check boxes for the fields you want displayed (or those fields
you do not want to view).
o Sort Content: To sort the content listed in a table column by alphanumeric order, select a
column header and then click the Up or Down arrow to change the order.
81
o Adjust Column Width: To adjust the width of a table column to show more content in the
table, drag the column divider in a column header to the left or right to resize the column
width. Column dividers are marked by a pair of thin gray lines.
o Filter By: To filter the list, enter one or more filter criteria. (If you do not see the Filter By
area, click Show Filter). To clear a filter, click the x to the right of the applied filter.
Note: Filters of type text, list, and date, persist across different AGM sessions for the same user.
5. To export the LDAP groups list click the export icon. You can export in CVS or PDF format.
Note: You can also right-click on the LDAP group in the list and select Delete from the menu.
82
SAML Authentication
You can use Security Assertion Markup Language (SAML) for AGM user authentication. SAML is an open
standard for exchanging authentication and authorization data, in particular between an identity
provider and a service provider. To configure SAML authentication, you need the IDP metadata. The IDP
metadata defines the attributes/behavior of SAML IDP. This metadata must be registered with AGM SAML
SP before SAML single sign on (SSO) can work.
Terms:
• AGM SAML SP (Service Provider): Part of AGM, it serves SAML SSO/SLO requests and responses.
• SAML IDP (Identity Provider): Is the enterprise authentication and authorization server that AGM
SAML SP relies on for login decisions.
Downloading SP Metadata
If AGM is configured to use SAML authentication, you can download and review the IDP metadata.
To download IDP metadata:
1. Click the Manage tab and select Authentication from the drop-down menu. The Authentication
page opens. The Current Authentication Mode should be SAML.
2. Click the Download SP metadata option.
3. Browse to the Downloads folder and open the IDP file to view it.
83
Managing Web Certificates
Out of the box, AGM uses self-signed TLS web service certificate. Some companies may require replacing
the TLS certificates with those that are in compliance with their security model. AGM users with
administrator rights can:
• Upload PKCS12 File on page 84
• Reset and Generate New Web Certificate on page 85
Note: Non-administrator AGM users cannot see the Web Certificate drop-down menu option from the
Manage tab and cannot upload a PKCS file or replace a self signed TLS certificate.
2. Verify the Replace Web Certificate with New PKCS12 option is selected and click Upload. Browse
to the location where you have saved the PKCS file and select it.
3. In Passphrase, enter the password for the PKCS file.
84
4. Click Replace Web Certificate. You will see the following message containing useful information.
5. Click Okay to begin uploading the file. In case the PKCS file is invalid or the passphrase is
incorrect, you will see the message: Error 10040 Web certificate installation fails due to invalid
PKCS12.
6. Upload a valid PKCS file using instructions in steps 3 to 6. The certificate is replaced and the web
service restarts within one hundred and twenty (120) seconds.
7. Refresh your browser and continue using AGM. You will not need to login to a new session.
85
2. Select the Reset/Regenerate Web Certificate option and click Reset Web Certificate. You will see
this message.
3. Click Okay to begin regenerate the new certificate and replace the existing certificate file.
If you try to generate a new certificate before the generation and replacement of the in process
finishes, you see the message: Error 10040 Another web certificate management operation is in
progress.
The certificate is replaced and the web service restarts within one hundred and twenty (120)
seconds.
4. Refresh your browser and continue using AGM. You will not need to login to a new session.
86
18 APPID Pre- and Post-Scripts for
Scheduled Data Protection
Jobs
You can create application-specific pre-scripts and post-scripts to perform operations on a host before
and after a VDP capture operation. APPID scripts must follow these guidelines:
• The script name must begin with appid.<appid>. To learn the appid for an application, hold the
mouse cursor over the application name in the Actifio Desktop.
• On a Windows host, the script location must be: C:\Program Files\Actifio\scripts. Scripts run
on Windows hosts must be .bat or .vbs files.
• On a non-Windows host, the script location must be: /act/scripts. Scripts run on non-Windows
hosts must have execute permissions.
Note: You can use root credentials or a local username/password. Without valid stored credentials, the
scripts will fail to execute. The scripts run as root unless the script itself calls something like 'sudo'.
Init The init script is invoked with an init parameter when the 60 seconds N/A
backup is about to start.
Freeze The freeze script is invoked with a freeze parameter when 60 seconds 1 - 86400
the backup operation is just about to freeze the application. seconds
Unfreeze The thaw script is invoked with a thaw parameter when the 60 seconds 1 - 86400
backup operation is just finished unreeling the application. seconds
Finish The fini script is invoked with a fini parameter when the 60 seconds 1 - 86400
backup operation is about to complete. This phase is seconds
applicable only for the Actifio Connector.
Abort The abort script is invoked with an abort parameter if the N/A N/A
backup is aborted for any reason.
87
Troubleshooting APPID Scripts
A successfully executed script includes two lines in the UDSAgent.log file:
PrepareForSnapshot: Executing init script
Launched script with arguments [0]=/act/scripts/appid.22448 [1]=init pid 6914
If you only see the first line, that means the script did not execute. The most common reasons are:
• Invalid credentials or no credentials. Validate them by logging in over RDP or using "run-as" from
the shell.
• The script may not be readable or executable. Ensure that you can execute the script manually.
Sample APPID Script for Windows Sample APPID Script for Linux
88
19 Super Scripts for Workflows
and On-Demand Data Access
Jobs
You can develop scripts to be called by the scripting engine during initialization, pre, post, and final
phases of backup or restore jobs. Scripts are executed only on hosts on which the Actifio Connector is
installed. Individual script names and arguments for each phase can be specified separately. The
scripting engine uses environment variables to provide job information to the scripts.
The VDP host-side super scripts are invoked for on-demand jobs that are triggered by the CLI with the -
scripts argument. Supported CLI jobs are listed in the CLI Commands Supported in Super Scripts on page
92.
Scripts can be defined and executed for all on demand backup and restore jobs that invoke the host
connector.
Note: Super scripts are not supported for Dedup Async jobs on in-band applications.
89
Super Script Phases
INIT: The early initialization phase. It starts when the Actifio Appliance connects to the
Connector, the job is initialized, and the credentials are verified.
PRE: This phase starts just before the major operation of the job. For snapshots and direct-to-
Dedup, this starts before the application is frozen. For mount type jobs, this is after devices are
mapped to the host but before connector based operations like rescan, import and mounting
of file systems is started.
POST: This phase starts immediately after the major operation of the job is completed. For
backup type jobs, this is after the application is unfrozen. For mount type jobs, this is after all
import/mounting/bringing applications on-line is completed.
FINAL: This phase is end of the job. The operation is essentially complete, however, this script still
has the opportunity to return a non-zero code and fail the job.
ABORT: This phase is the abort handling part of the job, when it has failed due to some reason.
Any of the script failures are also considered as job failure, hence this phase will be triggered.
Example
This example demonstrates a database handler on a Unix platform:
(script: /act/scripts/init.sh with args arg1 & arg2)
#!/bin/bash
if [[ $1 != "init" ]];
then
echo "Called outside connector. Exiting…” >>/act/log/scripts.log
exit -1
fi
DB_DIR=$2 # arg1 in this example
if [[ ! -d $DB_DIR ]];
then
echo "Error: DB Directory empty." >>/act/log/scripts.log
echo "Aborting the job..." >>/act/log/scripts.log
fi
# Put the database in read-only mode…
90
Super Script Environment Variables
The Connector portion of an on-demand script is invoked with environment variables set to job-specific
values. Not all environment variables are applicable to all jobs. Only the variables applicable to the
current jobs are exported to scripts. All environment variables exported by the Connector to the scripts
are prefixed with “ACT_”.
For example:
Current phase (PHASE) is exported as ACT_PHASE
Current VDP job name (JOBNAME) is exported as ACT_JOBNAME
The following is a list of environment variables with sample values in parentheses.
• ACT_APPID: The database ID of the application (e.g. 4186)
• ACT_APPNAME: Name of the application (e.g. My-DB)
• ACT_HOSTNAME: The name of the host which is the target of this job (e.g. Jupiter)
• ACT_JOBNAME: The name of the job (e.g. Job_0123456)
• ACT_JOBTYPE: a text version of the job class (e.g. mount
• ACT_LOGSMART_TYPE: db is the only valid value. This must be present for database logs to be
captured.
• ACT_MULTI_END: After mount, if True, recover database into open state (default). If False, the
database is left in the mounted (Oracle) or restoring (SQL Server) state.
• ACT_MULTI_OPNAME: the name of the operation currently running for a job that consists of
multiple operations. Reprovision and Restore jobs involve an unmount operation followed by a
mount operation. Operations include:
o mount
o unmount
o refresh
o restore
o reprovision
o scrub-mount
o scrub-unmount
o migrate
o clone
• ACT_OPTIONS: Policy options that apply to this job
• ACT_PHASE: A text string that describes the job phase (e.g. init)
• ACT_POLICY: Name of the policy related to this job (e.g. Daily4Hr)
• ACT_PROFILE: The name of the profile (e.g. Standard)
• ACT_SCRIPT_TMOUT: Superscripting timeout. If response is not received within timeout value
(default 60 seconds), then the script will fail.
• ACT_SOURCEHOST: The name of the host that was the source for this application (e.g. Saturn)
• ACT_TEMPLATE: Name of the template related to the job (e.g. Standard)
• ACT_TIMEOUT: Define the duration of the script, how long the script is allowed to run
• ACT_VOLUMES: For generic applications, list of volumes that are configured for backup
91
CLI Commands Supported in Super Scripts
The following CLI commands are supported for on-demand super scripting:
• udstask backup
• udstask restoreimage
• udstask cloneimage
• udstask mountimage
• udstask mountimage
• udstask testfailover
• udstask failover
• udstask deletefailover
• udstask createliveclone
• udstask refreshliveclone
• udstask prepmount
• udstask prepunmount
With all of these commands, there will be an option to specify scripts to run at four phases of the job:
init: when the job is just started
pre: just before “the main operation” of the job
post: just after “the main operation” of the job
final: towards the very end of the job, but not after it is finished
The script, script parameters, and settings are specified using this CLI syntax:
-script
name=<scriptname>:phase={INIT|PRE|POST|FINAL}[:timeout=value][:args=<arg1,arg2>];[:name=<scrip
tname>:phase={INIT|PRE|POST|FINAL}...]
The script name and phase are required. Timeout and arguments are optional. There are name value
pairs, separated by colons. The arguments are a set of values separated by commas. Special characters
like colons, spaces and commas are not supported.
A command invocation with a pre script might look like this:
udstask backup -app $MYAPP -policy $MYPOLICY \
-script "name=MYSCRIPT.sh:phase=PRE:timeout=60:args=ARG1,ARG2"
92
Sample Super Scripts
Here are two sample super scripts to illustrate VDP super scripting.
LOG_FILE="/tmp/act_script.log"
echo
echo "........ Running $ACT_PHASE hook ........"
printenv | grep "ACT_" |sort
echo "Current time is: `date`"
echo "Running script as `whoami`"
echo "CLI Args are: $0 $*"
echo "........ End $ACT_PHASE hook ........"
echo
93
94
20 Actifio Event Notifications
An Actifio Appliance generates notifications for hundreds of system events ranging from critical
hardware failures to informational network messages. This chapter describes Actifio event notifications,
and then the following two chapters list all known event notifications for the CDS, AOS, and Platform
components.
Event notifications can be sent as emails and they can also be routed to a trap receiver.
This section describes:
Types of Actifio Events on page 96
Example of Automating Corrective Action Based Upon an Event Notification on page 96
Events that Go from Information or Warning to Error on page 97
Alert Methods Supported by Actifio Appliances on page 98
95
Types of Actifio Events
The Actifio appliance sends notifications for these components of your Actifio System:
Clearable Events
Some platform and AOS events are clearable. Clearable events that are not cleared trigger repeated
event notifications every 25 hours until cleared.
96
Events that Go from Information or Warning to Error
Actifio VDP employs three notification types: info, warning, and error. Some UDP events experience all
three error notification types. This is because some jobs may not succeed on their first execution due to
an event that is later resolved. For example, a snapshot job may encounter a timeout event of type
Warning due to network traffic. If there is still time within the SLA job window, the job may be retried
several times; that job gets Retried status in the Jobs Monitor.
If the job ultimately fails (the SLA time window elapses before success) then that job gets Failed status in
the System Monitor. At this time, a timeout event of type Error is posted.
For complete information on job statuses, see the AGM online help.
97
Alert Methods Supported by Actifio Appliances
The Actifio appliance actively monitors event notifications. Specifically:
• You can monitor job successes and failures directly in the System Monitor as described in
Chapter 21, Monitoring Alerts in the AGM Events Monitor.
• You can send event notifications from Actifio appliances by email or HTTPS as described in
Chapter 22, Sending Alerts from an Actifio Appliance by Email.
• You can send event notifications as SNMP traps from Actifio appliances to a trap receiver. This is
detailed in Chapter 23, Sending Traps from the Actifio Appliance to a Trap Receiver.
• You can collect alerts from some storage and switches onto the Actifio appliance, as detailed in
Chapter 24, Collecting Alerts from Storage and Switches (CDS only)
98
21 Monitoring Alerts in the AGM
Events Monitor
You can learn about the context of an event in the Events Monitor. Events are information/warning/error
notifications raised by an Actifio appliance. You can view events in the Events Monitor by:
• Viewing events based on date or severity
• Filtering events based on columns displayed in the Events window
See the AGM online help for details.
Right-click the event to select View Details of a selected event. To interpret the information in the event,
see Interpreting Event Details in the Events Monitor on page 100.
99
Interpreting Event Details in the Events Monitor
Item Meaning
Event ID Event identifier. CDS events are listed in Actifio Event IDs and Error Codes.
Appliance Name The name of the Actifio appliance that processed the job.
Component CDS, AOS, or Platform, described in Types of Actifio Events on page 96.
Application Name The name of the application as it appears in the App Manager.
Job Name The job name as it appears in the System Monitor Jobs tab.
Error Code Event identifier. Error codes are listed in Actifio Event IDs and Error Codes.
Error Message Descriptive text, often with an additional error message appended to it.
Requires Clearing Some events are clearable. Clearable events that are not cleared trigger repeated event
notifications every 25 hours until cleared.
Object Type and Object The CDS/Sky component that encountered the event:
ID 1. PSRV 2. UDP 3. OMD 4. Dedup
Note: Not all fields are shown for all events. A field is shown only if it is relevant to the event.
An Event in the Events Monitor: ERROR MESSAGE includes both the Event 43918 “Failed dedupasync
<job> for <app> on <host>” and specific Error Code 15 “Could not connect to backup host”
100
22 Configuring the Call Home
Feature
You can configure notifications to be sent to Actifio Support via email or HTTPS when an event of severity
warning or error is raised by the Actifio appliance. Call Home is disabled by default on all Actifio
Appliances. You enable Call Home on individual appliances.
This chapter details:
Sending Alerts from an Actifio Appliance by HTTPS on page 101
Sending Alerts from an Actifio Appliance by Email on page 103
Interpreting Notifications on page 106
Example Notification
2. Log into the Appliance Configuration page, to System > Configuration > Notification. Select the
Email tab and the Call Home subtab. Call Home is disabled by default.
101
Enabling Call Home
Options:
o Try SMTP if failure: If this is set, then if the HTTPS communication fails, the appliance will
try to send an email notification instead. This must be configured; see Sending Alerts
from an Actifio Appliance by Email on page 103
o Enable proxy server: Fill in the necessary HTTP or SOCKS5 proxy server information,
including credentials if your proxy server requires them.
4. Click Test Connection to verify the connection.
5. Click Save.
6. Repeat for any other Actifio Appliances that you want to send notifications.
102
Sending Alerts from an Actifio Appliance by Email
You can configure notifications to be sent to Actifio Support or to anyone via email when an event of
severity warning or error is raised by the Actifio appliance. This involves:
Configuring an Actifio Appliance to Communicate with an SMTP Server on page 103
Setting Up Automatic Emails of Events on page 104
After the email server has been configured, you can configure automated emails for events as described
in Setting Up Automatic Emails of Events on page 104.
103
Setting Up Automatic Emails of Events
Before configuring the levels of events that trigger email notifications or the addresses to receive the
emails, you must configure an email server as described in Configuring an Actifio Appliance to
Communicate with an SMTP Server on page 103.
The Actifio appliance can send an email notification when an event of the severity Warning or Error is
raised. Emails about critical events are sent immediately.
To enable Call Home on an Actifio Appliance:
1. Open the AGM to the Manage, Appliances list. Right-click the appliance to configure and select
Configure Appliance.
2. Log into the Appliance Configuration page, to System > Configuration > Notification. Select the
Email tab and the Call Home subtab. Call Home is disabled by default.
104
7. Check Warning, Error, or both checkboxes from Filter(s) to Include to send those events to the
email recipients listed in Email Recipients (below). In most cases you should check both
Warning and Error.
8. Enter the desired time interval in Interval. Emails about critical events are sent immediately.
This value is the minimum time between when emails for all other events are sent, so it may be
almost 30 minutes from the time that an event occurs until the time the next email is sent. The
default value of 30 minutes is appropriate for most sites.
9. In Email Recipients, enter a comma separated list of email addresses of persons who are to
receive email notifications. If Call Home is enabled, then [email protected] is
included by default.
105
Interpreting Notifications
Item Meaning
Cluster Id A unique identifier of the Actifio appliance that processed the job.
Cluster Name The name of the Actifio appliance that processed the job.
CDS IP Address The IP address of a Sky appliance, or the cluster IP address of a CDS appliance.
Customer The name of the customer site where the event occurred, used by service providers.
Hostname The host name of the host where the event originated.
component CDS, AOS, or Platform, described in Types of Actifio Events on page 96.
eventid Event identifier. Events are listed in Actifio Event IDs and Error Codes, available on
ActifioNOW.
jobname The job name as it appears in the System Monitor Jobs tab.
message Error Message text, sometimes with an additional error message appended to it.
106
23 Sending Traps from the Actifio
Appliance to a Trap Receiver
107
You can add multiple trap receivers and you can specify different types of events to be sent to each. The
Actifio MIB is available from the Actifio Resource Center to help analyze these traps. See Accessing the
Actifio MIB on page 110.
Setting the Community String for Forwarding Traps to a non-Actifio SNMP Trap
Receiver
If you want to send the traps to another SNMP trap receiver, and that server requires a different
community string, you can set the string from the SNMP Configuration window.
To set the community string:
1. In AGM, at Manage, select Appliances. Right-click an appliance and select Configure Appliance.
2. Under System > Configuration > Notification, select the SNMP tab to see the SNMP Configuration.
3. Enter the SNMP community string in SNMP Community.
4. Click Save.
108
Configuring the SNMP Agent to Support SNMP GET Operations
If you are using an SNMP-based monitoring and management system to pull data on-demand, you can
extend SNMPv2 support for the SNMP GET request process to the Actifio appliance through the activation
of an SNMP agent in the appliance. By using the Actifio MIB file, SNMP GET requests pull specific objects to
monitor and Actifio appliance configurations, system statistics and performance, and so on.
109
Table 1: configsnmpagent Parameters
Parameter Description
-enable true | false Optional. This value enables or disables the SNMP agent. Supported settings are:
• true: Enables the SNMP agent in the Actifio appliance
• false: Disables the SNMP agent in the Actifio appliance
-communitystring key Optional. Sets the SNMPV2 community string for performing SNMP GET requests by
the Actifio appliance. Enter an authentication pass phrase for connecting to the
SNMP agent as the key.
To enable the SNMP agent and specify Test_password_1 as the community string to connect to the SNMP
agent:
$ udstask configsnmpagent -communitystring Test_password_1 -enable true
110
Using the Actifio MIB
Supported CLI Commands and their Mapped OIDs for SNMP GET Requests
This table lists the mapped OID assignments for each of the supported udsinfo and usvcinfo CLI
commands:
This section lists the udsinfo and usvcinfo CLI commands supported for SNMP GET requests:
Table 2: Mapped OIDs
111
System MIB Variables
This section lists the System MIB variables and their mapped OIDs:
Note: The SysUptime value is the time since the SNMP agent was started.
Limiting the Number of Records Sent by the SNMP Agent with setparameter
You can use the setparameter CLI command to limit the number of records sent by the SNMP agent in the Actifio
appliance to the management system (the client). When you set the snmptablesize parameter, the SNMP agent
retrieves only the specified number of records and send those records to the respective SNMP clients. The range is 100
to 5000 records (default of 500).
To configure the SNMP agent to retrieve only 400 records and send those records to the SNMP client:
See the Actifio CLI Reference in the Actifio Documentation Library for details on CLI commands and parameters.
112
Interpreting Traps
Table 5: Contents of a CDS Trap Event
Error ID 1.4.1.0 Event identifier. CDS events are listed in Actifio Event IDs
and Error Codes, available on ActifioNOW.
Error Code 1.4.2.0 Error code. Error codes are listed in Actifio Event IDs and
Error Codes, available on ActifioNOW.
Cluster Name 1.4.3.0 The Actifio appliance that processed the job.
Timestamp 1.4.5.0 Timestamp for the event: Day Mon dd hh:mm:ss yyyy
Object Type 1.4.6.0 The object type that encountered the event:
1. PSRV 2. UDP 3. OMD 4. Dedup
Object Id 1.4.7.0 5. NetApp 6. NetApp Connector 7.
Application name 1.4.8.0 The name of the application in the Application Manager.
Job name 1.4.10.0 The job name in the System Monitor Jobs tab.
113
114
24 Collecting Alerts from Storage
and Switches (CDS only)
You can configure your Actifio CDS appliance to collect AOS event notifications from storage arrays and
platform events from Fibre Channel switches. The Actifio CDS appliance can collect alerts in two ways:
Polling Storage Arrays: Actifio CDS appliances can actively poll some storage arrays. See
Polling Alerts from IBM V3700, IBM DS 3512, and NetApp E2700 Storage Arrays on page 115.
Receiving Forwarded Alerts from Switches: You can configure an IBM System Storage SAN24B-
4 Express Fibre Channel Switch to forward alerts to the Actifio CDS appliance. See Forwarding
Alerts from an IBM System Storage SAN24B-4 Express Switch to an Actifio CDS Appliance on
page 116.
Polling Alerts from IBM V3700, IBM DS 3512, and NetApp E2700 Storage
Arrays
To monitor SNMP notifications generated by attached storage systems and switches known to the Actifio
appliance, configure them in the Switches & Storage subtab. To configure the storage and switches:
1. In AGM, at Manage, select Appliances. Right-click an appliance and select Configure Appliance.
2. Under System > Configuration > Notification, select the EMAIL tab and the Switches & Storage
subtab. This subtab is absent on Sky appliances.
3. Provide the IP address details in the Switch IP Addresses box:
o Click Add to open the IP Address dialog. Enter a label and switch address and click Save.
o Repeat to add the second Fibre Channel switch.
4. Repeat the process in the Optimized Storage IP Address box, adding two storage arrays and
another ping address. You can use Edit to modify and Delete to remove an existing IP address.
5. Click Save.
115
Forwarding Alerts from an IBM System Storage SAN24B-4 Express
Switch to an Actifio CDS Appliance
To access the SNMP configuration on an IBM System Storage SAN24B-4 Express Fibre Channel switch:
1. Open Internet Explorer (only) to the IP address of the Fibre Channel switch.
2. Select Switch Admin from the upper left hand menu list.
3. In the upper right hand corner of the window, click Show Advanced.
4. Select the SNMP tab.
5. In the SNMPv3 Inform / Trap Recipient section:
o Select the username of the switch administrator account.
o Enter the IP address of the Actifio CDS appliance to receive the traps.
o Ignore Port Number (leave it at 162).
o Select the level of traps to send to the appliance.
6. Click Apply and Close.
7. Repeat for each Fibre Channel switch.
116
Checking Fibre Channel Connectivity from a CDS Appliance to
Storage
To check the Fibre Channel connectivity to storage:
1. Use the Actifio SARG reportfabric command to ensure the appliance sees switches and target
ports.
2. Use the Actifio SARG reportmdiskspace command to check that the appliance sees LUNs.
Note: The SARG User Guide is in your Actifio Documentation Library and online at ActifioNOW.
117
118
25 Actifio Remote Support
119
Actifio Call Home Remote Event Notification
Actifio Call Home sends a notification (email or HTTPS) to Actifio Customer Support every six hours. In the
event of a problem, Actifio Support can refer to this information to minimize time to recovery. The
notification includes these statistics:
• VDP version information
• Uptime of the Actifio Appliance
• Status check of services
• Process summary
• Logs of various processes
• Failed jobs and total jobs
• Storage pool and deduplication statistics
Actifio Customer Support engineers monitor system alerts and conduct impact assessments. Based
upon the alert level, the system may even initiate a problem resolution case and an associated
escalation plan for you.
Note: Access to the Call Home web site https://callhome.actifio.net should never be blocked by your
firewall.
An Actifio Administrator must configure the Actifio Appliance to communicate with an SMTP/HTTPS/proxy
server as detailed in Chapter 20, Actifio Event Notifications.
120
Actifio SecureConnect
Actifio SecureConnect is a secure method for remote support that employs dedicated ports and
encrypted data. These built-in security features greatly reduce the risks associated with a connection to
an external network. The SecureConnect protocol allows Actifio Customer Support engineers to access
your system on an as-needed basis to manage cases and updates while meeting your SLA requirements.
Your Actifio account team is kept up to date on a repair status as the case progresses. If hardware
replacement is required, parts & local support are shipped to the site and an Actifio Services engineer is
dispatched to handle the installation. When the incident is resolved to your satisfaction, the Actifio
Customer Support engineer logs out of your Actifio Appliance, disconnects from the remote access line,
and creates a summary report of problem root cause and repair actions that is delivered to your
account team and to you.
Advantages to using Actifio SecureConnect include:
• Accelerated problem solving: By leveraging Actifio follow-the-sun support, you can resolve
problems without extending the wait time that invariably gets generated by relying on log files,
dumps, and traces being transmitted across the globe.
• Fine-grained monitoring and collaboration: You can monitor remote support activities and
join in conference calls with Actifio Customer Support engineers as the problem determination
process proceeds.
• Real-time learning: Remote Actifio Customer Support engineers provide you with ongoing
assistance in the setup, configuration, and management of your Actifio Appliances.
Without SecureConnect enabled, you can still contact Actifio Customer Support. Actifio support
engineers can work with you via WebEx and other remote support tools for log file gathering and other
forensics to help resolve the issue.
121
How Secure Is Actifio SecureConnect?
SecureConnect utilizes 2048-bit RSA cryptography for strong mutual authentication and encryption, 256-
bit AES for encryption of data in flight, and Diffie-Hellman for Perfect Forward Secrecy (PFS) key exchange.
Each connection is a point-to-point link and none of your equipment can access another endpoint.
Intrusion detection software continually monitors the connection for any anomalous activity.
Authentication records are replicated in real-time to off-site locations. The SecureConnect servers are
routinely monitored for emerging threats and vulnerabilities.
Only select users within the support and engineering organizations are authorized with this level of
access. Actifio employees who have a business need to access your systems must pass a third-party
background check and sign a security, compliance, and confidentiality agreement. Access is reviewed
annually and terminated immediately in the event of separation or role change. Authorized employees
authenticate to SecureConnect with a 2048-bit X.509 certificate stamped with the identity of the user. A
two-factor challenge is required after cryptographic authentication in the form of a smart phone push or
code-generating token. The certificate must be renewed annually. Issuance is logged to an audit log, and
all activities on a system while logged in using the certificate are logged along with the identity of the
user. The VPN connection is protected using NIST-approved strong cryptography including AES-256 data
encryption.
122
Index
Symbols C
_ 69, 71 Call Home remote event notification
£ 75 configuring 101, 120
contrasted with SecureConnect 120
A overview 119
Actifio Change Tracking Driver 34 CentOS Linux 41
Actifio Connector installer file, downloading 23 CIFS file systems 71
Actifio Connector, and encrypted network traffic 22 clearable events 96, 100
Actifio MIB CLI commands 111
accessing 110 community string
mapped OID assignments 111 for forwarding traps 108
SNMP GET requests 109 SNMPv2 community string 110
System MIB variables 112 connecting a host, overview 65
Actifio Optimized Storage, defined 96 contact information, Actifio Support ii
Actifio Remote Support 119 copyright ii
Actifio Resiliency Director, network ports used 20 custom configuration (legacy mode) 7
Actifio SNMP agent 109 custom route, see static route
AIX connector
installing 54 D
uninstalling 54 data transport mode, NFS or SAN 71
AIX host deleting hosts 68
installing/modifying Actifio Connector 39, 54 Diffie-Hellman
supported configurations 51 (PFS) key exchange 122
alerts 115 data in flight encryption 15
collecting 115 DNS domain, configuring 2
forwarding from Fibre Channel switches 116 downloading the Actifio Connector installer file 23
methods support by an Actifio appliance 98
monitoring by System Monitor 99 E
polling 115 email for Call Home
polling from Actifio Optimized Storage and Switches [email protected] 105
115 email notification of events, automatic 104
receiving forwarded alerts 115 email server, configuring appliance communications to
sending by email 101, 103 103
sending by HTTPS 101 ESXi cluster 71
sending to SNMP trap receiver 107 etc/hosts editor 9
AOS events 96 event notifications, see notifications
assigning VDisks to a host 66 Exchange 71
autodiscover applications on a host 67 External Snapshot Pools (ESP) 73
B F
backup and restore jobs 89 Fibre Channel
batch files 89 HP-UX host 61
Linux host 43
Solaris host 59
Windows Server host 33
Fibre Channel switches, forwarding alerts from 116