Cloud Backup and Recovery
Cloud Backup and Recovery
User Guide
Issue 02
Date 2019-08-27
and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.
Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.
The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.
Website: https://www.huawei.com
Email: [email protected]
Contents
1 Vault Management................................................................................................................. 1
1.1 Viewing Vaults.......................................................................................................................................................................... 1
1.2 Deleting a Vault....................................................................................................................................................................... 4
1.3 Dissociating a Server or Disk...............................................................................................................................................5
1.4 Expanding a Vault................................................................................................................................................................... 6
1.5 Changing the Billing Mode from Pay-per-Use to Yearly/Monthly..........................................................................7
1.6 Changing Vault Specifications............................................................................................................................................ 8
1.7 Managing Vault Tags............................................................................................................................................................. 9
1.8 Managing the Enterprise Projects of Vaults................................................................................................................ 10
2 Backup Management........................................................................................................... 12
2.1 Viewing Backups................................................................................................................................................................... 12
2.2 Sharing a Backup.................................................................................................................................................................. 14
2.3 Deleting a Backup................................................................................................................................................................ 16
2.4 Using a Backup to Create an Image.............................................................................................................................. 17
2.5 Using a Backup to Create a Disk..................................................................................................................................... 18
2.6 Enabling Database Backup................................................................................................................................................ 19
2.6.1 Changing a Security Group............................................................................................................................................ 19
2.6.2 Installing the Agent.......................................................................................................................................................... 21
2.6.3 Creating a Database Backup Task............................................................................................................................... 28
2.6.4 Uninstalling the Agent.....................................................................................................................................................29
3 Policy Management.............................................................................................................. 31
3.1 Creating a Backup Policy.................................................................................................................................................... 31
3.2 Modifying a Policy................................................................................................................................................................ 35
3.3 Deleting a Policy................................................................................................................................................................... 36
3.4 Binding a Vault to a Policy................................................................................................................................................ 36
3.5 Unbinding a Vault from a Policy..................................................................................................................................... 37
4 Restoring Data....................................................................................................................... 39
4.1 Restoring Data Using a Cloud Server Backup............................................................................................................. 39
4.2 Restoring Data Using a Disk Backup............................................................................................................................. 41
4.3 Restoring Data Using a Hybrid Cloud Backup............................................................................................................ 42
6 Managing Tasks..................................................................................................................... 50
7 Auditing................................................................................................................................... 51
8 Quotas......................................................................................................................................53
A Appendix................................................................................................................................. 55
A.1 Agent Security Maintenance............................................................................................................................................ 55
A.1.1 Changing the Password of User rdadmin................................................................................................................. 55
A.1.2 Changing the Password of the Account for Reporting Alarms (SNMP v3).................................................. 56
A.1.3 Replacing the Server Certificate................................................................................................................................... 58
A.1.4 Replacing CA Certificates............................................................................................................................................... 60
A.2 Change History...................................................................................................................................................................... 62
1 Vault Management
Prerequisites
A vault has been created.
2. Click in the upper left corner and select the desired region and project.
Name/ID Name and ID of the vault. Click the name of the vault to
view details about the vault.
Vault Capacity Vault capacity, which displays the capacity of the vault and
(GB) the capacity used by backups in the vault.
For example: If 20/100 is displayed, it indicates that the
capacity of the vault is 100 GB, and 20 GB is occupied by
the backup.
When the usage of a vault exceeds 80%, the system
automatically sends emails and SMSs to remind users to
expand the vault capacity or delete unnecessary backups.
Associated Servers/ Number of servers or disks associated with the vault. You
Disks can click the number to view details of an associated
server or disk.
Step 3 On any backup page, click the Vaults tab and set filter criteria to view the vaults.
● Select a value from the status drop-down list to query vaults by status. Table
1-2 describes the statuses of vaults.
– On the Search by Tag tab page that is displayed, enter a tag key and a
tag value (must be among existing keys and values) and click . The
added tag search criteria are displayed under the text boxes. Click Search
in the lower right corner.
– You can use more than one tag for a combination search. Each time after
a key and a value are entered, click . The added tag search criteria are
displayed under the text boxes. When more than one tag is added, the
tags will be applied together for a combination search. A maximum of 10
tags can be added at a time.
– You can click Reset in the lower right corner to reset the search criteria.
Step 4 Click the name of the vault to view details about the vault.
For the values of used capacity and backup space, only the integer part is maintained, and
the decimal part is rounded off. For example, the used backup space is displayed as 0 GB,
but the backup space that has actually been used might be 0.2 GB.
----End
Prerequisites
● At least one vault exists.
● The vault is in the Available or Error state.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
----End
After a resource is dissociated from a vault, the automatic backup policies of the
vault no longer have any effect on the resource. In addition, all manual and
automatic backups of the resource will be deleted. The deleted data cannot be
used for data restoration. Exercise caution when performing this operation.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
Step 2 On the cloud server backup or disk backup page, locate the target vault and click
the name of the vault.
Step 3 Click the Associated Servers or Associated Disks tab. Find the target server or
disk and click Dissociate in the Operation column. See Figure 1-2.
After a resource is dissociated from a vault, the automatic backup and replication
policies of the vault no longer have any effect on the resource. In addition, all
manual and automatic backups of the resource will be deleted. The deleted data
cannot be used for data restoration. Exercise caution when performing this
operation.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
Step 4 Click Next. Confirm the configuration information and click Submit. The system
expands the capacity of the vault.
Step 5 Return to the vault list and check that the capacity of the vault has been
successfully expanded.
----End
If you want to use a vault for an extended time, you can change its billing mode
from pay-per-use to yearly/monthly to reduce cost. This section describes the
details about the billing mode change operations.
Prerequisites
The billing mode of the vault is pay-per-use.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
Step 2 On any backup page, find the target vault. Choose More > Change Billing Mode
in the Operation column of the vault.
Step 3 Select the renewal duration of the vault, confirm the information, and click
Submit and Pay.
Step 4 Return to the vaults page. You can see that the value of the vault in the Billing
Mode column is changed to Yearly/Monthly.
----End
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
Step 3 Select Database backup for Backup Type. If you select Server backup, the value
remains unchanged. Click Next.
Step 4 Click Submit and complete the payment. The system automatically changes the
vault specifications.
----End
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
c. Click OK.
● Editing a tag
a. In the Operation column of the tag that you want to edit, click Edit.
b. In the Edit Tag dialog box that is displayed, modify the tag value. Table
1-3 describes the parameters.
c. Click OK.
● Deleting a tag
a. In the Operation column of the tag that you want to delete, click Delete.
b. In the dialog box that is displayed, confirm the deletion information.
c. Click OK.
----End
Procedure
Step 1 Click Enterprise on the upper right of console page. By default, the Overview
page of Enterprise Management is displayed.
Step 2 In the navigation pane of the Enterprise Management page, choose Enterprise
Project Management.
Step 3 Locate the enterprise project from which the vault will be removed. Click View
Resources in the Operation column. The Resources tab page is displayed. You
can view resources in the current enterprise project.
Step 5 Select the destination enterprise project to which the vault is to be added and click
OK.
After the vault is removed from the enterprise project, you can view it in the
resource list of the destination enterprise project.
----End
2 Backup Management
Prerequisites
A backup task has been created.
2. Click in the upper left corner and select the desired region and project.
Step 2 On any backup page, click the Backups tab and set filter criteria to view the
backups.
● You can search for backups by selecting a state from the All statuses drop-
down list in the upper right corner of the backup list. Table 2-1 describes the
backup states.
● You can search for backups by clicking Advanced Search in the upper right
corner of the backup list.
You can search by backup status, backup name, backup ID, server name,
server ID, server type, and the creation date.
● You can search for backups by selecting a project from the All projects drop-
down list in the upper right corner of the backup list.
Step 3 Click the backup name to view details about the backup.
----End
Context
Only cloud server backups can be shared among tenants in the same region.
A backup recipient can choose whether to accept the backup. After accepting the
backup, the recipient can use the backup to create a new server.
Encrypted backups cannot be shared. Backups cannot be shared across regions.
Projects to which a backup is shared must be in the same region as the backup.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
----End
Context
CBR supports manual deletion of backups and automatic deletion of expired
backups. The latter is implemented using the backup retention rule in the backup
policy. For details, see 3.1 Creating a Backup Policy.
Prerequisites
● At least one backup exists.
● The backup to deleted is in the Available or Error state.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
Step 2 On any backup page, click the Backups tab and locate the desired backup. For
details, see 2.1 Viewing Backups.
Step 3 In the row of the backup, choose More > Delete. See Figure 2-3. Alternatively,
select the backups you want to delete and click Delete in the upper left corner to
delete them in a batch.
----End
Prerequisites
● Confirm that the following operations have been performed before you use
an ECS's backup to create an image:
– You have optimized the Linux ECS (referring to Optimizing a Linux
Private Image) and installed Cloud-Init (referring to Installing Cloud-
Init).
– You have optimized the Windows ECS (referring to Optimizing a
Windows Private Image) and installed Cloudbase-Init (referring to
Installing Cloudbase-Init).
● A backup can be used to create an image in the following two scenarios: 1.
The backup is in the Available state. 2. The backup is in the Creating state
which is marked with Image can be created.
Once a backup creation starts, the backup enters the Creating state. After a time, a
message stating "Image can be created" is displayed under Creating. In this case, the
backup can be used for creating an image, even though it is still being created and
cannot be used for restoration.
● The backup you want to use to create an image contains the system disk
data.
● Only ECS backups can be used for creating images.
Function Description
● Images created using a backup are always the same, so CBR allows you to use
a backup to create only one full-ECS image that contains the whole data of
the ECS's system disk and data disks, in order to save the image quota. After
an image is created, you can use the image to provision multiple ECSs in a
batch.
● A backup with an image created cannot be directly deleted. If you want to
delete such a backup, delete its image first. If a backup is automatically
generated based on a backup policy and the backup has been used to create
an image, the backup will not be counted as a retained backup and will not
be deleted automatically.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
3. Click and choose Storage > Cloud Backup and Recovery >
Cloud Server Backup.
Step 2 Click the Backups tab. Locate the desired backup. For details, see 2.1 Viewing
Backups.
Step 3 In the row of the backup, choose More > Create Image.
Step 4 Create an image by referring to Creating a Full-ECS Image Using a Cloud Server
Backup in the Image Management Service User Guide.
Step 5 If you want to use an image to provision ECSs, see Creating ECSs Using an Image
in the Image Management Service User Guide.
----End
After a new disk is created using the backup data of a system disk, the new disk
can only be mounted to the cloud server as a data disk and cannot be mounted as
a system disk.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
3. Click and choose Storage > Cloud Backup and Recovery > Disk
Backup.
Step 2 Click the Backups tab. Locate the desired backup. For details, see 2.1 Viewing
Backups.
Step 3 If Status of the target backup is Available, click Create Disk in the Operation
column of the backup.
Step 4 Set the disk parameters.
For details about these parameters, see the parameter description table in the section
"Purchasing an EVS Disk" of the Elastic Volume Service User Guide.
Note the following items when setting disk parameters:
● You can choose the AZ to which the backup source disk belongs, or you can choose a
different AZ.
● The capacity of a newly created disk cannot be smaller than that of the backup source
disk.
If the capacity of the new disk is greater than that of the backup source disk, initialize
the disk by following the steps provided in section "EVS Disk Initialization (Linux)" of
the Elastic Volume Service User Guide.
● You can create a disk of any type regardless of the backup's disk type.
● Disks cannot be created in batches using backups. This parameter must be set to 1.
You can choose Pay-per-use or Yearly/Monthly as your Billing Mode. The fees you pay
will depend on the billing mode you choose. The following steps use the Yearly/Monthly
billing mode as an example.
----End
When creating a security group, you must add the inbound and outbound access
rules and enable the ports required for database backup to prevent database
backup failures.
Procedure
Before using the database backup function, you need to change the security
group. To ensure network security, CBR has not set the inbound direction of a
security group, so you need to manually configure it.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
Step 2 In the navigation tree on the left, choose Elastic Cloud Server. On the page that
is displayed, select the target server. Go to the target server details page.
Step 3 Click the Security Group tab and select the target security group. On the right of
the ECS page, click Modify Security Group Rule for an elastic cloud server.
Step 4 On the Security Groups page, click the Inbound Rules tab, and then click Add
Rule. The Add Inbound Rule dialog box is displayed, as shown in Figure 2-4.
Select TCP for Protocol/Application, enter 59526-59528 in Port & Source, select
IP address for Source and enter 100.125.0.0/16. After supplementing the
description, click OK to complete the setting of the inbound rule.
Step 5 Click the Outbound Rules tab, and then click Add Rule. The Add Outbound Rule
dialog box is displayed, as shown in Figure 2-5. Select TCP for Protocol/
Application, enter 1-65535 in Port & Source, select IP address for Source and
enter 100.125.0.0/16. After supplementing the description, click OK to complete
the setting of the outbound rule.
----End
Procedure
● Before enabling database backup, change the security group and install the
Agent on your ECSs. This section guides you on how to download and install
the Agent.
● During the Agent installation, the system requires the rdadmin user's
permissions to run the installation program. To improve O&M security, change
the user rdadmin's password of the Agent OS regularly and disable this user's
remote login permission.
● Table 2-2 lists OSs that support installation of the Agent.
Database OS Version
Name
SQL Server Windows Windows Server 2008, 2008 R2, 2012, 2012 R2
2008/2012 (for x86_64)
SQL Server Windows Windows Server 2012, 2012 R2, and 2016
2014/2016/ Datacenter for x86_64
EE
MySQL Red Hat Red Hat Enterprise Linux 6 and 7 for x86_64
5.5/5.6/5.7
SUSE SUSE Linux Enterprise Server 11 and 12 for
x86_64
Database OS Version
Name
NOTICE
To install the Agent, the system will open the firewall of a port from 59526 to
59528 of the ECS. When port 59526 is occupied, the firewall of port 59527 is
enabled, and so on.
Prerequisites
● You have obtained a username and its password for logging in to the
management console.
● The security group has been configured.
● The Agent Status of the ECS is Not installed.
● If you use Internet Explorer, you need to add the websites you will use to
trusted sites.
2. Click in the upper left corner and select the desired region and project.
3. Click and choose Storage > Cloud Backup and Recovery >
Cloud Server Backup.
Step 2 Click the Agent Installation tab.
Step 3 In method 1, select the corresponding Agent version as required, and copy the
installation command in step 2.
Step 4 On the ECS page, select the target server and click Remote Login in the
Operation column to log in to the ECS.
Step 5 Paste the installation command in step 2 to the server and run the command as
the root user. If the execution fails, run the yum install -y bind-utils command to
install the dig module.
Step 6 Finish the installation as instructed. If the installation fails, use method 2.
Step 7 After the Agent for Linux is installed, see the Database Backup Best Practice to
modify or write a custom script to implement consistent backup for MySQL, SAP
HANA, or other database types.
----End
2. Click in the upper left corner and select the desired region and project.
3. Click and choose Storage > Cloud Backup and Recovery >
Cloud Server Backup.
Step 2 Click the Agent Installation tab to go to the Agent Installation tab page.
Step 3 In method 2, click Download. On the displayed download client dialog box, select
the version to be downloaded based on the operating system type of the target
ECS, and click OK. See Figure 2-8.
Step 4 After downloading the Agent, use a file transfer tool, such as Xftp, SecureFX, or
WinSCP, to upload the Agent installation package to your ECS.
Step 5 After the upload, go to the ECS page. Select the target server and click Remote
Login in the Operation column to log in to the ECS.
Step 6 Run the tar -zxvf command to decompress the Agent installation package to any
directory and run the following command to go to the bin directory:
cd save directory of the installation package
Step 7 Run the following command to run the installation script:
sh agent_install_ebk.sh
Step 8 The system displays a message indicating that the client is installed successfully,
as shown in Figure 2-9.
Step 9 If the MySQL or SAP HANA database has been installed on the ECS, run the
following command to encrypt the password for logging in to the MySQL or SAP
HANA database:
/home/rdadmin/Agent/bin/agentcli encpwd
Step 10 Use the encrypted password in Step 9 to replace the database login password in
the script in /home/rdadmin/Agent/bin/thirdparty/ebk_user/.
Step 11 After the Agent for Linux is installed, see the Database Backup Best Practice to
modify or write a custom script to implement consistent backup for MySQL, SAP
HANA, or other database types.
----End
2. Click in the upper left corner and select the desired region and project.
3. Click and choose Storage > Cloud Backup and Recovery >
Cloud Server Backup.
Step 2 Click the Agent Installation tab.
Step 3 In method 1, click Download. Save the downloaded installation package to a local
directory.
Step 4 After downloading the Agent, use a file transfer tool, such as Xftp, SecureFX, or
WinSCP, to upload the Agent installation package to your ECS.
Step 5 Log in to the console and then log in to the ECS as the administrator.
Step 6 Decompress the installation package to any directory and go to the Installation
path\bin directory.
Step 7 Double-click the agent_install_ebk.bat script to start the installation.
Step 8 The system displays a message indicating that the client is installed successfully,
as shown in Figure 2-11.
----End
2. Click in the upper left corner and select the desired region and project.
3. Click and choose Storage > Cloud Backup and Recovery >
Cloud Server Backup.
Step 2 Click the Agent Installation tab.
Step 3 On the ECS page, select the target server and click Remote Login in the
Operation column to log in to the ECS as the administrator.
Step 4 Copy the installation commands in step 2 of method 2 to the server and run the
command in the CMD window.
Step 5 Copy any IP address in the response name, paste it in the address box of the
browser, and replace 0.0.0.0 in the following address with the address. Replace ap-
southeast-1 with the actual region. The following command uses ap-southeast-1
as an example. Then, press Enter in the browser to download the installation
package.
http://0.0.0.0/csbs-agent-ap-southeast-1/Cloud Server Backup Agent-
WIN64.zip
Step 6 Decompress the file to obtain the installation file. Decompress the installation
package to any directory and go to the Installation path\bin directory.
Step 7 Double-click the agent_install_ebk.bat script to start the installation.
Step 8 The system displays a message indicating that the client is installed successfully,
as shown in Figure 2-13.
----End
Constraints
● Database backup for clusters, for example, MySQL clusters, is not supported.
Database backup is supported only for a single server.
● You are advised to perform database backup during off-peak hours.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
3. Click and choose Storage > Cloud Backup and Recovery >
Cloud Server Backup.
Step 2 Create a vault for database backups by referring to Purchasing a Cloud Server
Backup Vault.
Step 3 Create a cloud server backup by referring to Creating a Cloud Server Backup.
Before creating a cloud server backup, you need to install the Agent. If a database
backup fails to be created, the system automatically creates a server backup and
stores the backup in the vault.
Step 4 Return to the cloud server backup page as prompted. If the execution fails, rectify
the fault based on the failure details on the creation result page.
----End
Prerequisites
The username and password for logging in to an ECS have been obtained.
----End
----End
3 Policy Management
To implement periodic automatic backup, you need to create a backup policy first.
CBR will then periodically perform backups according to the execution time
specified in the backup policy. You can choose to use the default backup policy
provided by CBR or create one as needed.
You can set backup policies for server backup vaults and disk backup vaults.
Context
● After a backup policy is enabled, CBR automatically backs up servers and
disks associated with the policy-bound vaults and periodically deletes expired
backups.
● Each user can create a maximum of 32 backup policies.
● Automatic deletion of expired backups does not apply to those backed up
manually.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
3. Click and choose Storage > Cloud Backup and Recovery >
Policies.
Step 2 Click the Backup Policies tab and then Create Policy in the upper right corner to
create a user-defined policy. See Figure 3-1.
Step 3 Set the backup policy parameters. Table 3-1 describes the parameters.
More frequent backup intervals create more backups or retain backups for a longer time,
protecting data to a greater extent but occupying more storage space. Set an appropriate
backup cycle as needed.
Step 5 Locate the target vault and choose More > Set Backup Policy to bind it to the
created backup policy. You can view the configured backup policy in the vault
details.
After the binding is successful, data is periodically backed up to the vault based on
the backup policy.
----End
Prerequisites
You have created at least one policy.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
----End
Prerequisites
You have created at least one policy.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
3. Click and choose Storage > Cloud Backup and Recovery >
Policies.
Step 2 Click the Backup Policies tab, and then click Delete in the row where the policy
to be deleted is located.
Deleting a policy will not delete backups generated based on the policy. You can manually
delete unwanted backups.
----End
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
Step 2 On any backup page, find the target vault and choose More > Set Backup Policy.
See Figure 3-3.
Step 3 You can select an existing backup policy from the drop-down list or create a new
one. For details about how to create a policy, see 3.1 Creating a Backup Policy.
Step 4 After the policy is successfully bound, you can view the binding details in the
Policies area on the vault details page.
----End
Prerequisites
A policy has been bound to the vault.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
● If a backup task is being executed for a server or disk in the vault, the policy can be
unbound normally. However, the backup task will continue and backups will be
generated.
● After the policy is unbound, backups generated based on the policy will not be deleted.
You can manually delete unwanted backups.
Step 4 Click Yes. The vault will no longer execute tasks as specified in this policy.
----End
4 Restoring Data
Context
● Data on data disks cannot be restored to system disks.
● CBR does not support restoration to servers that are in the Faulty, Resizing,
or Verifying Resizing state.
Prerequisites
● Disks on the server whose data needs to be restored are running properly.
● The server whose data needs to be restored has at least one Available
backup.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
3. Click and choose Storage > Cloud Backup and Recovery >
Cloud Server Backup.
Step 2 Click the Backups tab. Locate the desired backup. For details, see 2.1 Viewing
Backups.
Step 3 In the row of the backup, click Restore. See Figure 4-1.
NOTICE
The historical data at the backup point in time will overwrite the current server
data. The restoration cannot be undone.
If you deselect Start the server immediately after restoration, manually start
the server after the restoration is complete.
NOTICE
Servers are shut down during restoration. It is therefore recommended that you
perform restoration operations during off-peak hours.
Step 5 In the Specified Disk drop-down list, select the target disk to which the backup
will be restored.
● If the server has only one disk, the backup is restored to the disk by default.
● If the server has multiple disks, the backup is restored respectively to the original disks
by default. You can also restore the backup to another disk on the backup server by
selecting the disk from the drop-down list. However, the capacity of the specified disk
must not be smaller than that of the backup source disk.
● Data on data disks cannot be restored to system disks.
NOTICE
If the number of disks to be restored is greater than the number of disks that are
backed up, restoration may cause data inconsistency.
For example, if the data of Oracle is scattered across multiple disks and only some
of them are restored, data inconsistency occurs after the restoration and the
application may unable to start.
NOTICE
----End
Prerequisites
The status of the disk to be restored must be Available.
Before restoring the disk data, stop the server to which the disk is attached and
detach the disk from the server. After the disk data is restored, attach the disk to
the server and start the server.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
3. Click and choose Storage > Cloud Backup and Recovery > Disk
Backup.
Step 2 Click the Backups tab. Locate the desired backup. For details, see 2.1 Viewing
Backups.
Step 3 In the row of the backup, click Restore. See Figure 4-2.
NOTICE
The historical data at the backup point in time will overwrite the current disk data.
The restoration cannot be undone.
Step 4 Click OK. You can check whether the data is successfully restored on the Backups
tab page of disk backup.
When the Status of the backup changes back to Available, the restoration has
been successfully completed.
Step 5 After the restoration is complete, re-attach the disk to the server. For details, see
Attaching an Existing Non-Shared Disk.
----End
5.1 Overview
5.2 Application Scenarios
5.3 Storage Backup
5.1 Overview
CBR supports synchronizing the backup data in the offline backup software
OceanStor BCManager and VMware VMs to the cloud. Users can therefore
manage backup data on the cloud and restore data to other servers on the cloud
using the backup data.
Hybrid cloud backup is classified into the following types:
● Storage backup: supports synchronizing the backups of the offline backup
software OceanStor BCManager.
● VMware backup: supports synchronizing the backups of VMware VMs on-
premises.
If a data center disaster occurs or the fibre network fails, the backup data can be
used to quickly create servers on the public cloud, reducing service interruption
time.
VMware Backup
VMware hybrid cloud backup allows you to back up VMs for VMware virtual
environments in your data center. If an error such as virus infection or accidental
deletion occurs, the backup data can be used to restore VMware VMs in the data
center. If a data center disaster occurs or the fibre network fails, the backup data
on public cloud can be used to create servers, shortening service downtime.
VMware vSphere 5.1, 5.5, 6.0, 6.5, and 6.7 are supported.
Table 5-1 shows the operating systems that support hybrid cloud backup.
Prerequisites
● CloudBackup has been configured according to the OceanStor Dorado V3
Series V300R002 CloudBackup Feature Guide.
● The backup data has been synchronized to a bucket on the cloud.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
3. Click and choose Storage > Cloud Backup and Recovery >
Hybrid Cloud Backup > Storage Backup.
Step 2 In the upper right corner of the page, click Buy Hybrid Cloud Backup Vault.
A tag is represented in the form of a key-value pair. Tags are used to identify,
classify, and search for vaults. Tags here are used to filter and manage vaults only.
A vault can have a maximum of 10 tags.
Key Each tag has a unique key. The key of a tag is user- Key_0001
definable or is selected from those of existing tags in
Tag Management Service (TMS).
The naming rules for a tag key are as follows:
● It contains 1 to 36 Unicode characters.
● It cannot be left blank, cannot start or end with
spaces, or contain non-printable ASCII (0-31)
characters or the following special characters: =*<>\,|/
Value The values of tags can be repetitive and can be blank. Value_0001
The naming rules for a tag value are as follows:
● It contains 0 to 43 Unicode characters.
● It can be an empty string, cannot start or end with
spaces, or contain non-printable ASCII (0-31)
characters or the following special characters: =*<>\,|/
Step 7 When the billing mode is Yearly/Monthly, select the subscription duration. The
validity period ranges from 1 month to 3 years.
You can select whether to renew your order automatically. If automatic renewal is
selected,
Step 8 Click Next. Confirm the purchase details and click Pay.
Step 10 The storage resource page is displayed. You can see the created vault in the vault
list.
You can expand the vault capacity. For details, see Vault Management.
----End
Synchronizing Backups
The backup data synchronized to the cloud by using CloudBackup is stored in
buckets. After purchasing the vault, you need to synchronize the backups from the
buckets to the vault for future use.
Step 1 Click Synchronize Backup in the Operation column of the target vault. See
Figure 5-2.
----End
Context
● Backups synchronized to the cloud cannot be used to create servers.
● Synchronized backups can only be used to restore other cloud servers and can
only be restored to data disks.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
3. Click and choose Storage > Cloud Backup and Recovery >
Hybrid Cloud Backup > Storage Backup.
Step 2 Click the Backups tab. Locate the desired backup. For details, see 2.1 Viewing
Backups.
Step 3 In the row of the backup, click Restore. See Figure 5-3.
NOTICE
Step 5 In the Specified Disk drop-down list, select the target disk to which the backup
will be restored. A system disk cannot be selected.
● If the server has only one data disk, the backup is restored to the disk by default.
● If the server has only one system disk, you need to create a disk for restoration.
● If the server has multiple disks, the backup is respectively restored to the original disks
by default. You can also restore the backup to another disk on the backup server by
selecting the disk from the drop-down list. However, the capacity of the specified disk
must not be smaller than that of the backup source disk.
● Data on data disks cannot be restored to system disks.
----End
6 Managing Tasks
This section describes how to view tasks. The Tasks list can show policy-driven
backup tasks that have been executed in the past 30 days.
Prerequisites
At least one failed task exists.
Procedure
Step 1 Log in to CBR Console.
1. Log in to the management console.
2. Click in the upper left corner and select the desired region and project.
3. Click and choose Storage > Cloud Backup and Recovery >
Tasks.
Step 2 You can filter tasks by project, task type, task status, task ID, resource ID, resource
name, vault ID, vault name, and time.
----End
7 Auditing
You can use Cloud Trace Service (CTS) to trace operations in CBR.
Prerequisites
CTS has been enabled.
Step 2 In the upper left corner of the page, click and select the desired region and
project.
Step 3 Click Service List and choose Management & Deployment > Cloud Trace
Service.
Step 4 Click Tracker in the left pane.
Step 5 In the tracker list, click Disable in the Operation column.
Step 6 Click Yes.
Step 7 After the tracker is disabled, its status changes from Disable to Enable. To enable
the tracker again, click Enable and then click Yes. The system will start recording
operations again.
----End
8 Quotas
What Is Quota?
Quotas are enforced for service resources on the platform to prevent unforeseen
spikes in resource usage. Quotas can limit the number or amount of resources
available to users, such as the maximum number of ECSs or EVS disks that can be
created.
If the existing resource quota cannot meet your service requirements, you can
apply for a higher quota.
3. View the used and total quota of each type of resources on the displayed
page.
If a quota cannot meet service requirements, click Increase Quota to adjust
it.
A Appendix
Procedure
● For O&M security purposes, you are advised to change the user rdadmin's
password of the Agent OS regularly and disable this user's remote login
permission.
● In Linux, user rdadmin has no password; in Windows, obtain the default
password of user rdadmin from technical support.
● This section describes how to change the password of user rdadmin in
Windows.
Prerequisites
● You have obtained an account and its password to log in to the management
console.
● The username and password for logging in to a Windows ECS have been
obtained.
Procedure
Step 1 Go to the ECS console and log in to the Windows ECS.
Step 2 Choose Start > Control Panel. In the Control Panel window, click User Accounts.
Step 3 Click User Accounts. The User Account Control dialog box is displayed. Select
rdadmin and click Reset Password.
Step 5 In Task Manager, click the Services tab and then click Open Service.
Step 6 Select RdMonitor and RdNginx respectively. In the displayed dialog box, select
Login, change the password to the one entered in step 4, and click OK.
----End
Prerequisites
● You have obtained an account and its password to log in to the management
console.
● The username and password for logging in to a server have been obtained.
Context
This section introduces the procedures in Windows and Linux.
NOTICE
If the authentication password and data encryption password for SNMP v3 of the
Agent are the same, security risks exist. To ensure system security, you are advised
to set different passwords for authentication and data encryption.
Procedure (Windows)
Step 1 Log in to the server where the Agent is installed.
Step 2 Open the CMD interface and go to the installation path\bin directory.
Step 3 Run the agentcli.exe chgsnmp command. Type the login password of the Agent
and press Enter.
Please choose operation:
1: Change authentication password
Step 4 Select the SN of the authorization password or data encryption password that you
want to change and press Enter.
Step 5 Type the old password and press Enter.
Step 6 Type a new password and press Enter.
Step 7 Type the new password again and press Enter. The password is changed.
----End
Procedure (Linux)
Step 1 Log in to the Linux server using the server password.
Step 2 Run the TMOUT=0 command to prevent PuTTY from exiting due to session
timeout.
After the preceding command is executed, the system remains running even when no
operation is performed, which results in security risks. For security purposes, run the exit
command to exit the system after you finish performing operations.
Step 5 Select the SN of the authorization password or data encryption password that you
want to change and press Enter.
Step 6 Type the old password and press Enter.
Step 8 Type the new password again and press Enter. The password is changed.
----End
Prerequisites
● You have obtained an account and its password to log in to the management
console.
● The username and password for logging in to a server have been obtained.
● New certificates in the X.509v3 format have been obtained.
Context
● The Agent is pre-deployed with the Agent AC certificate bcmagentca, private
key file of the CA certificate server.key (), and authentication certificate
server.crt. All these files are saved in /home/rdadmin/Agent/bin/nginx/conf
(if you use Linux) or \bin\nginx\conf (if you use Windows).
● You need to restart the Agent after replacing a certificate to make the
certificate effective.
Procedure (Linux)
Step 1 Log in to the Linux server with the Agent installed.
Step 2 Run the TMOUT=0 command to prevent PuTTY from exiting due to session
timeout.
After the preceding command is executed, the system remains running even when no
operation is performed, which results in security risks. For security purposes, run the exit
command to exit the system after you finish performing operations.
Step 6 Put the new certificates and private key files in the specified directory.
Step 8 Type the login password of the Agent and press Enter.
Step 9 Enter a name for the new certificate and press Enter.
If the private key and the certificate are the same file, names of the private key and the
certificate are identical.
Step 10 Enter a name for the new private key file and press Enter.
Step 11 Enter the protection password of the private key file twice. The certificate is then
successfully replaced.
----End
Procedure (Windows)
Step 1 Log in to the Windows server with the Agent installed.
Step 2 Open the CMD interface and go to the installation path\bin directory.
Step 4 Put the new certificates and private key files in the specified directory.
Step 6 Enter a name for the new certificate and press Enter.
If the private key and the certificate are the same file, names of the private key and the
certificate are identical.
Step 7 Enter a name for the new private key file and press Enter.
The following information is displayed:
Enter new password:
Enter the new password again:
Step 8 Enter the protection password of the private key file twice. The certificate is then
successfully replaced.
Step 9 Run the agent_start.bat command to start the Agent.
----End
Prerequisites
● The username and password for logging in to an ECS have been obtained.
● A new CA certificate is ready.
Procedure (Linux)
Step 1 Log in the Linux server with the Agent installed.
Step 2 Run the following command to prevent logout due to system timeout:
TMOUT=0
Step 3 Run the following command to switch to user rdadmin:
su - rdadmin
Step 4 Run the following command to go to the path to the Agent start/stop script:
cd /home/rdadmin/Agent/bin
sh agent_stop.sh
cd /home/rdadmin/Agent/bin/nginx/conf
rm bcmagentca.crt
Step 9 Run the following command to change the owner of the CA certificate:
Step 10 Run the following command to modify the permissions on the CA certificate:
Step 11 Run the following command to go to the path to the Agent start/stop script:
cd /home/rdadmin/Agent/bin
sh agent_start.sh
----End
Procedure (Windows)
Step 1 Log in to the ECS with the Agent installed.
Step 6 Copy the new CA certificate file into the Installation path\nginx\conf directory
and rename the file bcmagentca.crt.
----End