Dell EMC Cyber Recovery - Cyber Recovery 19.13-Migrating Data
Dell EMC Cyber Recovery - Cyber Recovery 19.13-Migrating Data
SolVe Generator
Solution for Validating your engagement
Topic
Cyber Recovery 19.13
Selections
Migrating a Cyber Recovery deployment's data: Migrating data
Migrating a Cyber Recovery deployment's data: Migrate data to a Cyber Recovery virtual appliance
Migrating a Cyber Recovery deployment's data: Migrate to a different server
Cyber Recovery 19.13 data migration guide: Notes, cautions, and warnings
REPORT PROBLEMS
If you find any errors in this procedure or have comments regarding this application, send email to
[email protected]
Copyright © 2024 Dell Inc. or its subsidiaries. All Rights Reserved. Dell Technologies, Dell, EMC, Dell
EMC and other trademarks are trademarks of Dell Inc. or its subsidiaries. Other trademarks may be
trademarks of their respective owners.
The information in this publication is provided “as is.” Dell Inc. makes no representations or warranties of
any kind with respect to the information in this publication, and specifically disclaims implied warranties of
merchantability or fitness for a particular purpose.
Use, copying, and distribution of any software described in this publication requires an applicable
software license.
This document may contain certain words that are not consistent with Dell's current language guidelines.
Dell plans to update the document over subsequent future releases to revise these words accordingly.
This document may contain language from third party content that is not under Dell's control and is not
consistent with Dell's current guidelines for Dell's own content. When such third party content is updated
by the relevant third parties, this document will be revised accordingly.
Page 1 of 6
Contents
Preliminary Activity Tasks .......................................................................................................3
Read, understand, and perform these tasks.................................................................................................3
Page 2 of 6
Preliminary Activity Tasks
This section may contain tasks that you must complete before performing this procedure.
Table 1 List of cautions, warnings, notes, and/or KB solutions related to this activity
2. This is a link to the top trending service topics. These topics may or not be related to this activity.
This is merely a proactive attempt to make you aware of any KB articles that may be associated with
this product.
Note: There may not be any top trending service topics for this product at any given time.
Page 3 of 6
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
Migrating data
If necessary, migrate an existing Cyber Recovery deployment to a virtual appliance or to a different,
supported operating system.
You can:
NOTE: Because CentOS is not a supported operating system for a Cyber Recovery deployment,
consider migrating your existing Cyber Recovery deployment to either a Red Hat Enterprise Linux
or SUSE Linux Enterprise system. Future Cyber Recovery releases will not support updates and
installation on a CentOS deployment.
# .crsetup.sh ––verifypassword
3. Record information about the deployment, such as the required networks settings, which include
IP address, DNS, FQDN, mail server (Postfix), firewall settings, and so on.
Page 4 of 6
4. Create a backup copy of the existing deployment, using either:
o The Cyber Recovery UI—This option is preferred and places a server DR backup at the
configured DD MTree.
o The CLI, using the following command:
# crsetup.sh --save
NOTE: The backup copy is saved to the /opt/dellemc/cr-configs directory. Ensure that you
save the backup copy to a location external to the Cyber Recovery server.
5. Deploy the Cyber Recovery virtual appliance in the Cyber Recovery vault.
For information about how to deploy the Cyber Recovery virtual appliance, see the Installing the
Cyber Recovery virtual appliance topic in the installation guide..
Ensure that version of the Cyber Recovery virtual appliance is the same as the Cyber Recovery
version from which you created a backup copy.
6. Copy the newly created backup file onto the Cyber Recovery virtual appliance.
7. On the Cyber Recovery virtual appliance, perform a recovery and restore the data:
o If you used the Cyber Recovery UI to create the backup file, mount the Cyber Recovery
backup MTree to the Cyber Recovery host.
o If you used the CLI to create the backup file, copy the backup file to the
/opt/dellemc/cr-configs directory and run the following command:
# crsetup.sh --recover
The server must be running either Red Hat Enterprise Linux or SUSE Linux Enterprise Server.
About this task
Before you move your deployment to a different server, first save the current configuration. After you
have installed the operating system, you install the Cyber Recovery software and perform a recovery to
restore your data.
Steps
1. On the current server, verify the MongoDB and lockbox passphrases, which are required to
perform a recovery to complete the migration:
# .crsetup.sh ––verifypassword
Page 5 of 6
2. Record information about the deployment, such as:
o The required networks settings, which include IP address, DNS, FQDN, mail server
(Postfix), firewall settings, and so on
o Docker and Docker Compose versions
3. Create a backup copy of the existing deployment, using either:
o The Cyber Recovery UI—This option is preferred and places a server DR backup at the
configured DD MTree.
o The CLI, using the following command:
# crsetup.sh --save
NOTE: The backup copy is saved to the /opt/dellemc/cr-configs directory. Ensure that you
save the backup copy to an external disk.
4. Install the same version of the Cyber Recovery software that was running on the original
deployment.
We recommend that you set the MongDB and lockbox passphrases with the same passphrases
used on the original deployment.
5. Perform a recovery and restore the data:
o If you used the Cyber Recovery UI to create the backup file, mount the Cyber Recovery
backup MTree to the Cyber Recovery host.
o If you used the CLI to create the backup file, copy the backup file to location on the
Cyber Recovery server and run the following command:
# crsetup.sh --recover
Page 6 of 6