0% found this document useful (0 votes)
3 views

OceanStor Dorado 6.1.x CloudBackup Feature Guide

The OceanStor Dorado CloudBackup Feature Guide provides detailed information on the CloudBackup feature, including its configuration, management methods, and applicable product models. It outlines the importance of data backup, the working principles of the CloudBackup system, and various operational scenarios. The document is intended for technical support and maintenance engineers and is periodically updated to reflect software version changes.

Uploaded by

jarekscribd23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

OceanStor Dorado 6.1.x CloudBackup Feature Guide

The OceanStor Dorado CloudBackup Feature Guide provides detailed information on the CloudBackup feature, including its configuration, management methods, and applicable product models. It outlines the importance of data backup, the working principles of the CloudBackup system, and various operational scenarios. The document is intended for technical support and maintenance engineers and is periodically updated to reflect software version changes.

Uploaded by

jarekscribd23
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 120

OceanStor Dorado

6.1.x

CloudBackup Feature Guide

Issue 06
Date 2023-10-31

HUAWEI TECHNOLOGIES CO., LTD.


Copyright © Huawei Technologies Co., Ltd. 2023. All rights reserved.
No part of this document may be reproduced or transmitted in any form or by any means without prior
written consent of Huawei Technologies Co., Ltd.

Trademarks and Permissions

and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd.
All other trademarks and trade names mentioned in this document are the property of their respective
holders.

Notice
The purchased products, services and features are stipulated by the contract made between Huawei and
the customer. All or part of the products, services and features described in this document may not be
within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements,
information, and recommendations in this document are provided "AS IS" without warranties, guarantees
or representations of any kind, either express or implied.

The information in this document is subject to change without notice. Every effort has been made in the
preparation of this document to ensure accuracy of the contents, but all statements, information, and
recommendations in this document do not constitute a warranty of any kind, express or implied.

Huawei Technologies Co., Ltd.


Address: Huawei Industrial Base
Bantian, Longgang
Shenzhen 518129
People's Republic of China

Website: https://e.huawei.com

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. i


Security Declaration
Product Life Cycle
Huawei's regulations on product life cycle are subject to the Product End of Life Policy. For details about
the policy, see the following website:https://support.huawei.com/ecolumnsweb/en/warranty-policy

Vulnerability
Huawei's regulations on product vulnerability management are subject to "Vul. Response Process". For
details about the policy, see the following website:https://www.huawei.com/en/psirt/vul-response-process
For enterprise customers who need to obtain vulnerability information, visit:https://
securitybulletin.huawei.com/enterprise/en/security-advisory

Preconfigured Digital Certificate


Huawei has released the Huawei Preset Digital Certificate Disclaimer for the preconfigured digital
certificates delivered with devices. For details about the disclaimer, visit the following website:https://
support.huawei.com/enterprise/en/bulletins-service/ENEWS2000015789

Life Cycle of Product Documentation


Huawei released the Huawei Product Documentation Lifecycle Policy for after-sales customer
documentation. For details about this policy, see the website of Huawei's official website:https://
support.huawei.com/enterprise/en/bulletins-website/ENEWS2000017761

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. ii


OceanStor Dorado
CloudBackup Feature Guide About This Document

About This Document

Purpose
This document describes the CloudBackup feature supported by the storage
system and provides the configuration and management methods.

The following table lists the product models to which this document is applicable.

Product Model Product Version

OceanStor Dorado 5000 6.1.3

OceanStor Dorado 6000 6.1.5


6.1.6
OceanStor Dorado 8000
6.1.7
OceanStor Dorado 18000

NOTICE

This document is updated periodically with the software version. The operations
described in this document use the latest version as an example. Note that the
supported functions and features vary according to the software version. The
content in this document is for reference only.

Intended Audience
This document is intended for:

● Technical support engineers


● Maintenance engineers

Symbol Conventions
The symbols that may be found in this document are defined as follows.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. iii


OceanStor Dorado
CloudBackup Feature Guide About This Document

Symbol Description

Indicates a hazard with a high level of risk which, if not


avoided, will result in death or serious injury.

Indicates a hazard with a medium level of risk which, if not


avoided, could result in death or serious injury.

Indicates a hazard with a low level of risk which, if not


avoided, could result in minor or moderate injury.

Indicates a potentially hazardous situation which, if not


avoided, could result in equipment damage, data loss,
performance deterioration, or unanticipated results.
NOTICE is used to address practices not related to personal
injury.

Supplements the important information in the main text.


NOTE is used to address information not related to personal
injury, equipment damage, and environment deterioration.

Change History
Changes between document issues are cumulative. The latest document issue
contains all the changes made in earlier issues.

Issue 06 (2023-10-31)
This issue is the sixth official release.

Issue 05 (2023-04-20)
This issue is the fifth official release. The updates are as follows:
● Optimized descriptions about some operations.
● Added the support for deploying a CloudBackup containerized application
using DeviceManager.
● Added the support for importing the container image and Helm chart for
CloudBackup using DeviceManager.

Issue 04 (2022-11-15)
This issue is the fourth official release. The updates are as follows:
Optimized descriptions about some operations.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. iv


OceanStor Dorado
CloudBackup Feature Guide About This Document

Issue 03 (2022-08-25)
This issue is the third official release.

Issue 02 (2022-04-15)
This issue is the second official release.

Issue 01 (2022-01-25)
This issue is the first official release.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. v


OceanStor Dorado
CloudBackup Feature Guide Contents

Contents

About This Document............................................................................................................... iii


1 Feature Description................................................................................................................. 1
1.1 Overview.................................................................................................................................................................................... 1
1.2 License Requirements and Specifications....................................................................................................................... 3
1.3 Working Principles.................................................................................................................................................................. 3
1.3.1 Backup..................................................................................................................................................................................... 3
1.3.2 Recovery.................................................................................................................................................................................. 4
1.4 Impact and Restrictions.........................................................................................................................................................5
1.5 Application Scenarios............................................................................................................................................................. 6

2 Planning CloudBackup........................................................................................................... 9
3 Configuring CloudBackup....................................................................................................12
3.1 Configuration Process.......................................................................................................................................................... 12
3.2 Deploying CloudBackup on the Storage System........................................................................................................13
3.2.1 Importing the CloudBackup License........................................................................................................................... 13
3.2.2 Activating the Container Service.................................................................................................................................. 14
3.2.3 Configuring Interface Modules..................................................................................................................................... 16
3.2.3.1 Planning Interface Modules....................................................................................................................................... 16
3.2.3.2 Configuring the Front-End Container Mode......................................................................................................... 18
3.2.3.3 Configuring the Back-End Container Mode.......................................................................................................... 20
3.2.4 Configuring a Network Plane........................................................................................................................................23
3.2.4.1 Creating a Network Plane........................................................................................................................................... 23
3.2.4.1.1 Method 1: Using DeviceManager..........................................................................................................................23
3.2.4.1.2 Method 2: Using the CLI.......................................................................................................................................... 27
3.2.4.2 (Optional) Managing Routes..................................................................................................................................... 32
3.2.5 (Optional) Configuring DNS.......................................................................................................................................... 34
3.2.6 Importing the Container Image and Helm Chart for CloudBackup.................................................................35
3.2.6.1 Method 1: Using DeviceManager (Applicable to 6.1.6 and Later Versions)..............................................35
3.2.6.2 Method 2: Using the CLI.............................................................................................................................................. 36
3.2.7 Deploying the CloudBackup Containerized Application...................................................................................... 40
3.2.7.1 Method 1: Using DeviceManager (Applicable to 6.1.6 and Later Versions)..............................................40
3.2.7.2 Method 2: Using the CLI.............................................................................................................................................. 45
3.3 Establishing the Connection Between CloudBackup and the Backup Storage................................................50

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. vi


OceanStor Dorado
CloudBackup Feature Guide Contents

3.3.1 Logging In to ProtectManager......................................................................................................................................50


3.3.2 Authenticating the Local Storage (Applicable to 6.1.5 and Earlier Versions).............................................. 51
3.3.3 Authenticating the Local Storage (Applicable to 6.1.6 and Later Versions).................................................51
3.3.4 (Optional) Importing a CA Certificate....................................................................................................................... 52
3.3.5 Adding the Backup Storage to CloudBackup........................................................................................................... 54
3.4 Configuring CloudBackup Protection............................................................................................................................. 57
3.4.1 Creating a NAS Protection SLA..................................................................................................................................... 57
3.4.2 Configuring CloudBackup Protection for a File System....................................................................................... 61
3.4.2.1 Periodic Backup.............................................................................................................................................................. 61
3.4.2.2 Manual Backup............................................................................................................................................................... 64
3.5 Recovering Backup Data.................................................................................................................................................... 65
3.5.1 Recovering a File System................................................................................................................................................ 66
3.5.2 Recovering Files in a File System................................................................................................................................. 67

4 Managing CloudBackup.......................................................................................................69
4.1 Managing the Local Storage............................................................................................................................................. 69
4.1.1 Viewing Local Storage Information.............................................................................................................................69
4.1.2 Configuring the Capacity Alarm Threshold of the Local Storage..................................................................... 70
4.1.3 Viewing Local Storage Authentication Information.............................................................................................. 71
4.1.4 Modifying Local Storage Authentication Information.......................................................................................... 71
4.2 Managing the Backup Storage......................................................................................................................................... 72
4.2.1 Viewing Backup Storage Information.........................................................................................................................72
4.2.2 Modifying the AK/SK of a Backup Storage...............................................................................................................74
4.2.3 Modifying the Capacity Alarm Threshold of a Backup Storage........................................................................ 75
4.2.4 Importing a Backup Storage Copy...............................................................................................................................75
4.2.5 Deleting a Backup Storage.............................................................................................................................................76
4.3 Managing SLAs...................................................................................................................................................................... 76
4.3.1 Viewing an SLA.................................................................................................................................................................. 76
4.3.2 Cloning an SLA................................................................................................................................................................... 77
4.3.3 Modifying an SLA.............................................................................................................................................................. 77
4.3.4 Deleting an SLA................................................................................................................................................................. 77
4.4 Managing File System Resources.................................................................................................................................... 78
4.4.1 Viewing File System Information................................................................................................................................. 78
4.4.2 Managing Protection Plans for File Systems........................................................................................................... 79
4.5 Managing Backup Copies................................................................................................................................................... 81
4.5.1 Viewing Backup Copies....................................................................................................................................................81
4.5.2 Modifying Copy Retention Policies.............................................................................................................................. 83
4.5.3 Deleting Copies.................................................................................................................................................................. 84
4.6 More Management Operations....................................................................................................................................... 84

5 Expanding the CloudBackup Containerized Application............................................. 85


A Concepts Related to the Container Service.................................................................... 90
B How to Obtain Help............................................................................................................. 93

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. vii


OceanStor Dorado
CloudBackup Feature Guide Contents

B.1 Preparations for Contacting Huawei.............................................................................................................................. 93


B.1.1 Collecting Troubleshooting Information....................................................................................................................93
B.1.2 Making Debugging Preparations................................................................................................................................. 93
B.2 How to Use the Document............................................................................................................................................... 94
B.3 How to Obtain Help from Website................................................................................................................................ 94
B.4 Ways to Contact Huawei................................................................................................................................................... 94

C Glossary................................................................................................................................... 95
D Acronyms and Abbreviations........................................................................................... 111

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. viii


OceanStor Dorado
CloudBackup Feature Guide 1 Feature Description

1 Feature Description

This chapter provides an overview of CloudBackup and details its license


requirements, compatible products, working principles, restrictions, and
networking requirements.
1.1 Overview
1.2 License Requirements and Specifications
1.3 Working Principles
1.4 Impact and Restrictions
1.5 Application Scenarios

1.1 Overview
This section describes the background, definition, and benefits of CloudBackup.

Background
Data backup is crucial in protecting data from losses or corruption caused by
human factors or physical faults in storage systems.

The popularity of cloud promotes an increasing number of enterprises to back up


data to object storage on the cloud, which reduces the procurement and
maintenance costs of backup storage and achieves high cost-effectiveness and
reliability.

Definition
CloudBackup is a data protection technique deployed in storage system
containers. It backs up file system data from a storage system to the object
storage either in an on-premises data center or on the cloud, without the need for
extra backup servers.

In the event of data loss or corruption in the file system, CloudBackup can use the
backup copies to restore the data to the state at the specified point in time.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 1


OceanStor Dorado
CloudBackup Feature Guide 1 Feature Description

Functions and Features

Table 1-1 Main functions and features of CloudBackup


Function/Feature Description

High efficiency and ● CloudBackup is deployed inside the storage system


security and backs up data to the cloud without external
backup devices.
● Supports incremental backup, which sends only
changed files to the cloud.
● Supports full recovery using a complete copy or fine-
grained recovery of specific files.
● Supports HTTPS encrypted transmission for data
security.

NAS backup of file CloudBackup scans for storage file systems and displays
systems them on the ProtectManager resource management
page. You can add protection measures for a file system
to back up its data.
The system uses file system snapshots to back up data
to the cloud through NAS sharing.

Periodic incremental A full backup is performed for the first backup, and
backup incremental backups are performed periodically to
improve backup efficiency. This applies to scenarios
where the backup bandwidth and backup storage
capacity are limited.

Periodic synthetic full You can set a synthesis full cycle in the periodic backup
backup policy to avoid long dependency paths for incremental
backups.

QoS control ● CloudBackup is deployed in containers, so the impact


of backup and restoration services on host
performance is controllable.
● Supports network proxy services to the cloud,
meeting requirements of various network
environments.
● Supports network optimization and acceleration to
improve transmission performance.
● Supports rate limiting policies to limit the network
bandwidth occupied by backup services.

Concepts Related to the Container Service


You are advised to learn about basic concepts of the container service by referring
to A Concepts Related to the Container Service.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 2


OceanStor Dorado
CloudBackup Feature Guide 1 Feature Description

1.2 License Requirements and Specifications


This section describes the license requirements and specifications of CloudBackup.

License Requirements
CloudBackup requires a license.

NOTE

To obtain a license, contact your local Huawei representative office or Huawei authorized
distributor.

Specifications
For the specifications of CloudBackup, refer to the Specifications Query (https://
info.support.huawei.com/storage/spec/#/home).

1.3 Working Principles


This section describes the basic concepts and principles of CloudBackup.

1.3.1 Backup
Basic Concepts

Table 1-2 Basic concepts


Concept Description

Read-only A copy of the source data at a specific point in time.


snapshot

Snapshot Compares the difference between two read-only snapshots.


comparison During incremental backup, only differential data is backed up.

Full backup Backs up all data in the file system. By default, the first backup is
a full backup.
Full backup takes a long time and occupies a large space.

Incremental Backs up the differential data since the last backup.


backup Only a small amount of data is backed up each time, reducing
the backup duration.

Backup A set of data generated when a file system is backed up.


copy A file system has multiple backup copies at different points in
time.
You can choose a specified backup copy according to the
timestamp as the source to recover data at the production site.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 3


OceanStor Dorado
CloudBackup Feature Guide 1 Feature Description

Backup Process
Figure 1-1 shows the data backup process with CloudBackup.

Figure 1-1 Data backup process with CloudBackup

On-premises DC HUAWEI CLOUD OBS


AWS S3

Storage system

Data backup to
FS 1 FS 2
the cloud

CloudBackup

Read-only Read-only
snapshot snapshot

Data backup to the object storage


in the on-premises data center

...

Bucket
OceanStor Pacific/FusionStorage OBS

1. Creates a read-only snapshot for the protected object.


2. Obtains the data to be backed up.
Scans the difference between snapshots to identify the changed data to be
backed up. For the first backup, a full backup is performed for the entire
system.
3. Saves the data to the backup storage.
According to the information in 2, the system creates and mounts a share for
the snapshot, reads the data and metadata to be backed up, and transmits
the data and metadata to the object storage in the on-premises data center
or on the public cloud to complete data backup.

1.3.2 Recovery
In the event of data loss or corruption in the file system, you can select a backup
copy at a specified point in time to recover the data.

Recovery Process
Figure 1-2 shows the data recovery process with CloudBackup.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 4


OceanStor Dorado
CloudBackup Feature Guide 1 Feature Description

Figure 1-2 Data recovery process with CloudBackup

On-premises DC HUAWEI CLOUD OBS


AWS S3

Storage system

FS 1 FS 2 Recovery

CloudBackup

NFS share NFS share

Recovery

...

Bucket
OceanStor Pacific/FusionStorage
OBS

1. Select the local file system you want to recover and query the backup copies.
2. Select the backup copy you want to use for recovery. The backup copy can be
on the public cloud or in the object storage of the on-premises data center,
depending on how the backup system is deployed.
3. Determine whether to recover the entire file system using the selected copy
or recover specific files.
4. Determine whether to recover data to the original file system or a new file
system.
5. The system performs the recovery.
During recovery, CloudBackup reads data from the specified backup copy in
the object storage and writes the data to the share of the target file system.

NOTICE

During recovery, ensure that the target file system is not read or written by
any host service or other value-added features.

1.4 Impact and Restrictions


This section describes the impact and restrictions of CloudBackup.

Compatible Backup Storage


Table 1-3 lists the backup storage devices supported by CloudBackup.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 5


OceanStor Dorado
CloudBackup Feature Guide 1 Feature Description

Table 1-3 Backup storage devices supported by CloudBackup


Type Device

Object storage OceanStor Pacific


device in on- FusionStorage OBS
premises data
centers

Object storage on HUAWEI CLOUD OBS


public clouds AWS S3

Application Restrictions
● CloudBackup supports backup and recovery of file systems but not LUNs.
● CloudBackup does not support backup and recovery of file systems with
HyperClone and HyperLock (WORM) configured.
● In the case of a split brain of HyperMetro, the file system at the losing side of
arbitration does not support backup and recovery with CloudBackup.
● The secondary file system of HyperMetro does not support backup and
recovery with CloudBackup.
● Recovery to the secondary file system of asynchronous remote replication is
not supported.
● When backing up data to the cloud, you can use only one of the IPv4 and
IPv6 networks.
● If the protected file system of CloudBackup is also the secondary file system
of remote replication, it is recommended that you set different time windows
for CloudBackup and remote replication. In addition, after the remote
replication synchronization is complete, the wait time must be greater than or
equal to 3 minutes. Otherwise, the backup task may fail.

1.5 Application Scenarios


Rapid Local Backup and Recovery
File system data of the storage system is backed up to the backup storage in the
local data center for quick backup and recovery.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 6


OceanStor Dorado
CloudBackup Feature Guide 1 Feature Description

Figure 1-3 Rapid local backup and recovery

On-premises DC

Storage system

FS 1 FS 2

CloudBackup

Read-only Read-only
snapshot snapshot

Backup and recovery data flow

OceanStor Pacific/FusionStorage
OBS

Remote Backup
File system data of the storage system is backed up to the cloud storage of the
remote cloud data center. You do not need to purchase storage hardware,
reducing maintenance and procurement costs.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 7


OceanStor Dorado
CloudBackup Feature Guide 1 Feature Description

Figure 1-4 Remote backup

On-premises DC HUAWEI CLOUD OBS


AWS S3

Storage system

FS 1 FS 2 Data backup
to the cloud

CloudBackup

NFS share NFS share

......

Bucket

Recovery Using Backup Copies on the Cloud


CloudBackup can use copies on the cloud to rebuild data for disaster recovery and
service migration.

Figure 1-5 Recovery using backup copies on the cloud

On-premises DC HUAWEI CLOUD OBS


AWS S3

Storage system

Recovery
CloudBackup

FS 1 FS 2
Copy

Recovery

...

Bucket
OceanStor Pacific/FusionStorage OBS

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 8


OceanStor Dorado
CloudBackup Feature Guide 2 Planning CloudBackup

2 Planning CloudBackup

You are advised to properly plan resources before configuring CloudBackup.

Planning Backup and Recovery Links


For a multi-controller storage system, you must configure a container front-end
module and a container back-end module for each controller of the storage
system.
● Container front-end module: Each controller must have at least one container
front-end module (10GE or 25GE SmartIO module) to connect to the backup
storage port to carry cloud services. Select two container front-end modules
to configure a container network plane for redundant backup and recovery
links.
● Container back-end module: Each controller must have at least one dedicated
container back-end module (25 Gbit/s RoCE module). This module must not
have cable connections. It provides VF pass-through for containers to access
the storage device.
Figure 2-1 shows an example of a CloudBackup network for a storage system
(two controller enclosures and eight controllers).

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 9


OceanStor Dorado
CloudBackup Feature Guide 2 Planning CloudBackup

Figure 2-1 CloudBackup network example

On-premises DC HUAWEI CLOUD OBS


AWS S3

Storage system

Recovery

Controller
enclosure 1
WAN

Switch Router

...

Controller
enclosure 2
Bucket
OceanStor Pacific/FusionStorage OBS

Planning the Domain Name Service (DNS)


CloudBackup can be deployed on a multi-controller storage system. If the
endpoint of the backup storage is a domain name, you must configure an external
DNS server to resolve the domain name.
Domain name resolution depends on the management port of the storage system.
In a multi-controller scenario, some controllers may not be connected to the user's
management network, resulting in DNS resolution failures.
Therefore, if the endpoint of the backup storage is a domain name, the
management port of each controller must be connected to the user's
management network to ensure successful DNS resolution.
If the endpoint of the backup storage is an IP address, this is not necessary.

Planning the Network Type


CloudBackup uses IP networks to back up and recover data.
Each controller of the storage system provides two SmartIO ports to configure the
container network plane, which are used to connect to the backup storage.
Complex networks can be established using IP switches or IP WANs based on
application scenarios.

Planning Containerized Applications


● CloudBackup is deployed based on containers of storage systems and requires
a CloudBackup license.
● After the CloudBackup license is imported and the container service is
activated, the system reserves fixed system resources (16 CPU cores and 32
GB memory per controller) for CloudBackup.
● CloudBackup and other containerized applications cannot be deployed
together because the system allocates limited resources to containers.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 10


OceanStor Dorado
CloudBackup Feature Guide 2 Planning CloudBackup

NOTE

If the CloudBackup containerized application has been deployed and you want to
deploy another feature (for example, FTP), you must change the license file from
CloudBackup to the desired feature (for example, FTP) and reactivate the container
service. After the container service is reactivated, the containerized application images,
Helm charts, and application data of CloudBackup are cleared by the storage system.
● The system resources (CPU and memory size) vary with product models. For
details, refer to Specifications Query (https://info.support.huawei.com/
storage/spec/#/home).

Planning Backup Storage Capacity


Before planning the backup storage capacity, collect the following information:

1. Capacity of the file system to be backed up. Assume that one file system
needs backup and its capacity is b.
2. Estimated data change amount between two incremental backups. Assume
that the amount is c.
3. Backup scheduling policy. Determine the frequency of incremental and
synthetic full backups. For example, incremental backup is performed every x
days, and synthetic full backup is performed after every y incremental
backups.
4. Backup retention policy, for example, z days.
5. Number of full copies (n) = z/[x * (y + 1)].

After m days (assume that m is greater than z), the required backup storage
capacity can be calculated as follows: Required backup storage capacity = [(Size of
the first full copy + Size of the last full copy)]/2 * Number of full copies + Size of
an incremental copy * Number of incremental copies = [b + c(m - n) + b + cm]/2 *
n + c * ny

Example:

Assume that the file system capacity is 10 GB (b = 10 GB); the data change
amount between two incremental backups is 2 GB (c = 2 GB); the backup policy is
once a day (x = 1); a synthetic full backup is performed after every five
incremental backups (y = 5); and the retention period of backup copies is 30 days
(z = 30). Then number of full copies (n) = z/[x * (y + 1)] = 30/[1 * (5 + 1)] = 5.
After 60 days (m = 60), the required backup storage capacity = [b + c(m - n) + b +
cm]/2 * n + c * ny = [10 + 2 * (60 - 5) + 10 + 2 * 60]/2 * 5 + 2 * 5 * 5 = 675 GB.
NOTE

1. The backup storage capacity plan may not be accurate. You are advised to plan
redundancy space (usually 20%) for the backup storage capacity.
2. If capacity expansion is considered at the production site, evaluate the capacity
expansion rate of the production site during backup planning and include the expanded
capacity in the preceding formula.
For example, if a backup plan is effective for one year and the production site capacity
is expanded by 20% within a year, the backup storage capacity should also be increased
by 20%.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 11


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

3 Configuring CloudBackup

This chapter describes how to use CloudBackup to back up file system data.
3.1 Configuration Process
3.2 Deploying CloudBackup on the Storage System
3.3 Establishing the Connection Between CloudBackup and the Backup Storage
3.4 Configuring CloudBackup Protection
3.5 Recovering Backup Data

3.1 Configuration Process


This section describes the recommended process for configuring CloudBackup.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 12


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Figure 3-1 CloudBackup configuration process


Start

Import the CloudBackup


license.

Activate the container service.


Plan interface modules.

Configure the front-end


Configure the interface
container mode.
module.
Configure the back-end
container mode.
Deploy CloudBackup on the storage
system.
Create a network plane.
Configure a network plane.
(Optional) Manage routes.

(Optional) Configure DNS.

Log in to ProtectManager.
Import the container image
and Helm chart for
Authenticate the local storage CloudBackup.
system.
Establish the connection between
CloudBackup and the backup storage. Deploy the CloudBackup
(Optional) Import a CA
containerized application.
certificate.

Add the backup storage to


CloudBackup.

Create a NAS protection SLA.

Configure CloudBackup protection.


Periodic backup
Configure CloudBackup protection
for a file system.
Manual backup

Recover backup data.

End

3.2 Deploying CloudBackup on the Storage System


This section describes how to configure basic container services on the storage
system and create a containerized application for CloudBackup.

3.2.1 Importing the CloudBackup License


A license grants the permission to use a specific value-added feature. Before
configuring CloudBackup, import and activate the CloudBackup license.

Prerequisites
You have obtained the CloudBackup license.

Procedure
Step 1 Log in to DeviceManager.
NOTE

For details on how to log in to DeviceManager, see the Initialization Guide specific to your
product version.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 13


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Step 2 Choose Settings > License Management.


Step 3 Click Update License.
The Update License page is displayed on the right.
Step 4 Import the CloudBackup license file.

1. Click .
2. Select the desired license file and click Open.
The button displayed in the dialog box varies with the browser.
3. Click Upload.
Step 5 In the middle function pane, check the differences between active and inactive
license files.
Step 6 Click Activate.
Confirm your operation as prompted.

----End

Follow-up Procedure
After importing the license, choose Settings > License Management. In the
middle function pane, verify that the Feature column includes CloudBackup.

3.2.2 Activating the Container Service


CloudBackup is deployed in containers. After importing the CloudBackup license,
activate the container service for the storage system.

Prerequisites
The CloudBackup license has been imported to the system.

Context
● If the storage system does not have the container service license before the
CloudBackup license is imported, you can use either of the following methods
to activate the container service:
– Using DeviceManager: See Procedure.
– Using the CLI: Run the change container_service active enabled=?
password=? command to activate the container service. For details, visit
Command/Event/Error Code Query.
● For details about how to reactivate the container service, see "Reactivating
the Container Service" in the Container User Guide specific to your product
model and version.
● After the CloudBackup license is imported and the container service is
activated, the system reserves fixed system resources (16 CPU cores and 32
GB memory per controller) for CloudBackup. For details, see Planning
Containerized Applications.
● You are advised to learn concepts related to the container service by referring
to Concepts Related to the Container Service.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 14


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

● If more than two controller enclosures are configured with the container
service, contact Huawei technical support engineers to enable the container
function for multiple controller enclosures before activating the container
service.

Procedure
Step 1 Log in to DeviceManager as the super administrator.
Step 2 Before activating the container service, check whether the storage system
environment meets the requirements for activating the container service.
1. On the home page, view the storage system information. Ensure that the
overall running status of the storage system is normal and the capacity is
sufficient.
If a device is in the Faulty state, contact Huawei technical support to locate
and rectify the fault. After the device status becomes normal, activate the
container service.
2. In the Alarms area on the home page, check alarm information.
Click More. On the displayed Alarms and Events page, you can query
information about all alarms and events.
Clear all alarms and events by referring to suggestions. After all alarms and
events are handled, activate the container service.
Step 3 On the navigation bar, choose Settings > Container Settings.
Step 4 Activate the container service.
1. When you access the container setting page for the first time, you need to
enable Container Service. Read the description carefully and enter the login
password of the current user.
2. Select I have read and understood the consequences associated with
performing this operation.
3. Click OK to create an activation task.

NOTE

– If the kernel version is 1.1.6.0 or earlier, during the container service activation, all
controllers are restarted in batches, and the read and write performance may
deteriorate.
– If the kernel version is 1.1.7.0 or later, controllers will not be restarted in batches
during the container service activation. However, the read and write performance
may deteriorate, and the configuration may time out during the activation.
– After the container service is activated, IP addresses in the 172.16.x.x network
segment will be used for container management by default. As a result, services
that use the 172.16.x.x network segment, such as the NTP service, will become
invalid. Ensure that this network segment is not used by services.
– If allocating container resources fails and the failure cause is "the kernel version of
the current system does not support container service activation", run the create
upgrade session session=kernel configuration_data_path=? license_path=? ip=?
user=? command in developer mode to upgrade the kernel to the latest version.
For details about the command, visit Command/Event/Error Code Query. After
switching to the latest kernel version, activate the container service again.

Step 5 Deploy a container service.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 15


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

1. Set Image Storage Pool.


Select an image storage pool from the drop-down list.

2. Set Application Storage Pool.


Select one or more application storage pools from the drop-down list.
NOTE

– You can select the same storage pool for the image storage pool and application
storage pool.
– You can select multiple storage pools as application storage pools.

Step 6 Click Save.

----End

3.2.3 Configuring Interface Modules

3.2.3.1 Planning Interface Modules


Properly plan the interface modules before configuration to prevent adverse
impact on running services.

Application Restrictions
● In 6.1.6 and earlier versions, after an interface module is set to the front-end
container mode or back-end container mode, it is exclusively occupied by the
container service and cannot serve for basic services.
● In 6.1.7 and later versions, after an interface module is set to the back-end
container mode, it is exclusively occupied by the container service and cannot
serve for basic services.
● The container service must be enabled first. Each controller that supports the
container service must have at least one idle interface module configured to
the front-end container mode and only one idle interface module configured
to the back-end container mode. The requirements of the interface modules
are as follows:

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 16


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

– Front-end container mode: 10GE electrical interface modules and


SmartIO interface modules (with the rate of 10 Gbit/s or 25 Gbit/s) can
be configured to the front-end container mode.
– Back-end container mode: 25 Gbit/s RoCE interface modules can be
configured to the back-end container mode.
NOTE

If more than one interface module in back-end container mode is configured on a


controller, only one interface module takes effect.
● After an interface module is configured to work in back-end container mode,
the interface module is used only for communication between the container
service and the storage system and no cable is required.
● Interface modules that are configured to the front-end or back-end container
mode do not support hot swap. Before you replace, remove, or insert an
interface module, power off the interface module. For details, see section
"Powering off an Interface Module" in the Administrator Guide specific to
your product model and version.

Planning Interface Modules


Configure slots where interface modules are to be installed according to the
interface module type. For details, see section "Connection Planning Between the
Controller Enclosure and the Application Server" in the Installation Guide of the
corresponding product model.
● A 2 U controller enclosure has two controllers: controller A and controller B.
Each controller has at least one idle interface module configured to work in
front-end container mode and only one idle interface module configured to
work in back-end container mode. Figure 3-2 shows owning controllers of
interface modules.

Figure 3-2 Rear view of a 2 U controller enclosure

A
B

● A 4 U controller enclosure has four quadrants: A, B, C, and D. In each


quadrant, at least one idle interface module is configured to work in front-
end container mode and only one idle interface module is configured to work
in back-end container mode. Figure 3-3 shows quadrants of a 4 U controller
enclosure.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 17


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Figure 3-3 Rear view of a 4 U controller enclosure

A C

B D
3.2.3.2 Configuring the Front-End Container Mode
To use the container service, you must configure the proper idle interface module
to be in the front-end container mode so that the created applications can provide
services for external systems.

Prerequisites
● The CloudBackup license has been imported.
● The container service has been activated.

Precautions
● The slots of the interface modules that can be configured to be in the front-
end container mode are the same as those supported by the front-end
interface modules of the corresponding product models. For details about
front-end interface modules, see "Interface Module" in the Product
Description specific to your product model.
NOTE

A front-end interface module connects a controller enclosure to the service side and
transmits service data.
● An administrator who has the interface_module read and write permissions
can configure interface modules to be in the front-end container mode, for
example, the built-in super administrator and administrator of the system.
● Before performing this operation, ensure that all services on the interface
module have been stopped.
● In 6.1.6 and earlier versions, after an interface module is configured to work
in front-end container mode, the interface module can only be used for
network communication of container front-end services and does not serve
for basic services of the storage system.
● 10GE electrical interface modules and SmartIO interface modules (with the
rate of 10 Gbit/s or 25 Gbit/s) can be configured to the front-end container
mode.
● Interface modules that work in front-end container mode do not support hot
swap. Before you replace, remove, or insert an interface module, power off
the interface module. For details, see section "Powering off an Interface
Module" in the Administrator Guide specific to your product model and
version.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 18


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Procedure
Step 1 Log in to DeviceManager as the super administrator.
Step 2 Choose Settings > Container Settings.
Step 3 In the Node Information area, click the number in the Container Front-End
Modules column.
The Container Front-End Module Details dialog box is displayed.

Step 4 Click Add.


The Add Container Front-End Module dialog box is displayed.
Step 5 Select an interface module and click OK.
The system displays a Danger dialog box.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 19


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Step 6 Confirm the information in the dialog box, select I have read and understand the
consequences associated with performing this operation, and then click OK.
The interface module is configured to the front-end container mode.

----End

3.2.3.3 Configuring the Back-End Container Mode


To use the container service, you must configure the proper interface module to
be in the back-end container mode so that the created application can use
internal storage resources.

Prerequisites
● The CloudBackup license has been imported.
● The container service has been activated.

Precautions
● The slots of the interface modules that can be configured to be in the back-
end container mode are the same as those supported by the front-end
interface modules of the corresponding product models. For details about

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 20


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

front-end interface modules, see "Interface Module" in the Product


Description specific to your product model.
NOTE

A front-end interface module connects a controller enclosure to the service side and
transmits service data.
● An administrator who has the interface_module read and write permissions
can configure interface modules to be in the back-end container mode, for
example, the built-in super administrator and administrator of the system.
● Before performing this operation, ensure that all services on the interface
module have been stopped.
● After an interface module is configured to work in back-end container mode,
the interface module can only be used for network communication of
container back-end services and does not serve for basic services of the
storage system.
● 25 Gbit/s RoCE interface modules can be configured to the back-end
container mode.
● Interface modules that work in back-end container mode do not support hot
swap. Before you replace, remove, or insert an interface module, power off
the interface module. For details, see section "Powering off an Interface
Module" in the Administrator Guide specific to your product model and
version.
● During network planning, ensure that the logical port IP addresses of the
storage system and the front-end and back-end service IP addresses of the
container do not conflict with each other:
– Logical port IP addresses of the storage system cannot be used for front-
end container services.
– Front-end service IP addresses of the container cannot be used as logical
port IP addresses.
– Back-end service IP addresses of the container: When a pod is created,
the system randomly allocates IP addresses in the 172.16.x.x to 172.24.x.x
network segment for communication between the container and storage
system. The number of IP addresses increases with the specifications and
number of pods configured by the user.
NOTE

● If a conflict occurs when you configure the logical port IP addresses of the
storage system or front-end and back-end service IP addresses of the
container, the 0x40000613 alarm is reported. In this case, solve the issue
based on the preceding configuration requirements.
● If you need to change the default network segment of the container back-end
service, contact Huawei engineers for evaluation and modification.

Procedure
Step 1 Log in to DeviceManager as the super administrator.
Step 2 Choose Settings > Container Settings.
Step 3 In the Node Information area, click the number in the Container Back-End
Modules column.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 21


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

The Container Back-End Module Details dialog box is displayed.

Step 4 Click Add.

The Add Container Back-End Module dialog box is displayed.

Step 5 Select an interface module and click OK.

The system displays a Danger dialog box.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 22


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Step 6 Confirm the information in the dialog box, select I have read and understand the
consequences associated with performing this operation, and then click OK.
The interface module is configured to the back-end container mode.

----End

3.2.4 Configuring a Network Plane

3.2.4.1 Creating a Network Plane


You can create a network plane using the CLI or DeviceManager.

3.2.4.1.1 Method 1: Using DeviceManager


The network plane is used to divide network segments for applications to carry
application services. This section describes how to create a network plane using
DeviceManager.

Prerequisites
● The CloudBackup license has been imported.
● The container service has been activated.
● Interface modules have been configured for the container service.

Context
A network plane is a type of user-defined resources of a cluster. It provides
configuration items, such as the subnet, port, VLAN, and route, for the front-end
service network of a container.

Precautions
During network planning, ensure that the logical port IP addresses of the storage
system and the front-end and back-end service IP addresses of the container do
not conflict with each other:
● Logical port IP addresses of the storage system cannot be used for front-end
container services.
● Front-end service IP addresses of the container cannot be used as logical port
IP addresses.
● Back-end service IP addresses of the container: When a pod is created, the
system randomly allocates IP addresses in the 172.16.x.x to 172.24.x.x network
segment for communication between the container and storage system. The
number of IP addresses increases with the specifications and number of pods
configured by the user.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 23


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

NOTE

● If a conflict occurs when you configure the logical port IP addresses of the storage
system or front-end and back-end service IP addresses of the container, the
0x40000613 alarm is reported. In this case, solve the issue based on the preceding
configuration requirements.
● If you need to change the default network segment of the container back-end
service, contact Huawei engineers for evaluation and modification.

Communication Mode
The container service of Huawei storage system implements a high-performance
container network based on interface modules. Single Root Input/Output
Virtualization (SR-IOV) allows an interface module to provide multiple virtual
functions (VFs). The Container Network Interface (CNI) plug-in is implemented
based on the VF. When a container is created, the CNI allocates a VF and directly
connects the VF to the container to provide a high-performance network.

Figure 3-4 Container network allocation process

Container
1 APP
APP
Service LUN LUN LUN

2
Kernel

CNI Micro VM NAS NAS NAS

Container
eth0
Storage resources
service 2
3
4 1

Port Port Port Port Port Port Port Port


Interface module in the Interface module in the
front-end container mode back-end container mode

Hardware resources occupied by the container service

Front-end network implementation process:


1. The container service starts the application container pods.
2. The container service invokes the CNI plug-in to build a container network.
3. The CNI plug-in allocates VFs from the interface module that works in the
front-end container mode on the host machine.
4. The CNI plug-in directly connects the VFs to the container, creates the
container network port eth0, and assigns an IP address. Containerized
applications communicate with the external system through network port
eth0.
Back-end network implementation process:

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 24


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

1. The interface module that works in the back-end container mode allocates
VFs to communicate with containerized applications.
2. The interface module that works in the back-end container mode allocates
VFs to communicate with storage resources of the storage system.

Procedure
Step 1 Log in to DeviceManager as the super administrator.
Step 2 Choose System > Container Service > Network Planes.
Step 3 Click Create.
The Create Network Plane page is displayed on the right.

Step 4 Set network plane parameters. Table 3-1 describes the parameters.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 25


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Table 3-1 Network plane parameters


Parameter Description

Name Name of the network plane to be created.


[Rules]
When creating a network plane for CloudBackup, set this
parameter to backupNetPlane. Using other names may have
an impact on controller expansion.
[Example]
backupNetPlane

IP Address IP address type of the network plane. Possible values are IPv4
Type and IPv6.

Subnet IPv4 or IPv6 subnet segment of the network plane.


Address

Subnet Mask IPv4 subnet mask of the network plane.


NOTE
This parameter is available only when IP Address Type is set to IPv4.

Prefix Prefix length of the IPv6 subnet of the network plane.


NOTE
This parameter is available only when IP Address Type is set to IPv6.

IP Address Available IP address range of the IPv4 or IPv6 subnet of the


Segment network plane.

Gateway Gateway of the IPv4 or IPv6 subnet of the network plane.

Configure Determines whether to configure a VLAN for the network plane.


VLAN

VLAN VLAN ID of the network plane.


NOTE
This parameter is available only when Configure VLAN is selected.

MTU (Bytes) Maximum size of a data packet transmitted by a port of the


network plane.

Maximum Maximum number of pods supported by a single node. Each


Pods per node corresponds to a controller. Containerized applications run
Node on nodes. Pods are the smallest and most basic deployable
objects in Kubernetes. A pod encapsulates multiple application
containers (or, in some cases, one container), storage resources,
one or more unique network IP addresses, and options that
govern how the containers should run.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 26


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Parameter Description

IP Address Indicates whether IP address failover is enabled for the network


Failover plane. After IP Address Failover is enabled, services on the
failed port will be taken over by another available port. In the
entire process, the IP address used by services remains
unchanged.
[Rules]
When creating a network plane for CloudBackup, enable IP
address failover.

NOTE

VLAN, MTU (Bytes), Maximum Pods per Node, and IP Address Failover are hidden
options. You can click Advanced to display them.

Step 5 In Available Ports, select the desired ports. It is recommended that you select two
ports on each controller.

NOTICE

Ports added to the network plane must be connected to the object storage
network.

Step 6 Click OK.

Confirm your operation as prompted.

----End

3.2.4.1.2 Method 2: Using the CLI


The network plane is used to divide network segments for applications to carry
application services. This section describes how to create a network plane using
the CLI.

Prerequisites
● The CloudBackup license has been imported.
● The container service has been activated.
● Interface modules have been configured for the container service.

Context
A network plane is a type of user-defined resources of a cluster. It provides
configuration items, such as the subnet, port, VLAN, and route, for the front-end
service network of a container.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 27


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Precautions
During network planning, ensure that the logical port IP addresses of the storage
system and the front-end and back-end service IP addresses of the container do
not conflict with each other:
● Logical port IP addresses of the storage system cannot be used for front-end
container services.
● Front-end service IP addresses of the container cannot be used as logical port
IP addresses.
● Back-end service IP addresses of the container: When a pod is created, the
system randomly allocates IP addresses in the 172.16.x.x to 172.24.x.x network
segment for communication between the container and storage system. The
number of IP addresses increases with the specifications and number of pods
configured by the user.
NOTE

● If a conflict occurs when you configure the logical port IP addresses of the storage
system or front-end and back-end service IP addresses of the container, the
0x40000613 alarm is reported. In this case, solve the issue based on the preceding
configuration requirements.
● If you need to change the default network segment of the container back-end
service, contact Huawei engineers for evaluation and modification.

Communication Mode
The container service of Huawei storage system implements a high-performance
container network based on interface modules. Single Root Input/Output
Virtualization (SR-IOV) allows an interface module to provide multiple virtual
functions (VFs). The Container Network Interface (CNI) plug-in is implemented
based on the VF. When a container is created, the CNI allocates a VF and directly
connects the VF to the container to provide a high-performance network.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 28


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Figure 3-5 Container network allocation process

Container
1 APP
APP
Service LUN LUN LUN

2
Kernel

CNI Micro VM NAS NAS NAS

Container
eth0
Storage resources
service 2
3
4 1

Port Port Port Port Port Port Port Port


Interface module in the Interface module in the
front-end container mode back-end container mode

Hardware resources occupied by the container service

Front-end network implementation process:


1. The container service starts the application container pods.
2. The container service invokes the CNI plug-in to build a container network.
3. The CNI plug-in allocates VFs from the interface module that works in the
front-end container mode on the host machine.
4. The CNI plug-in directly connects the VFs to the container, creates the
container network port eth0, and assigns an IP address. Containerized
applications communicate with the external system through network port
eth0.
Back-end network implementation process:
1. The interface module that works in the back-end container mode allocates
VFs to communicate with containerized applications.
2. The interface module that works in the back-end container mode allocates
VFs to communicate with storage resources of the storage system.

Procedure
Step 1 Log in to the CLI as an administrator or a super administrator.
Step 2 Create a network plane by running the following command:
create net_plane name=? [ vlanid=? ] [ mtu=? ] [ ipv4_subset_base=? ]
[ mask=? ] [ ipv4_subset_range=? ] [ ipv4_gateway=? ] [ ipv6_subset_base=? ]
[ prefix_length=? ] [ ipv6_subset_range=? ] [ ipv6_gateway=? ]
[ max_pods_per_node=? ] [ failover_enabled=? ]
Example:
admin:/>create net_plane name=backupNetPlane vlanid=1 ipv4_subset_base=192.168.128.0
mask=255.255.255.0 ipv4_subset_range=192.168.128.1-192.168.128.100 ipv4_gateway=192.168.128.110

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 29


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

max_pods_per_node=3 failover_enabled=yes
Command executed successfully.

Table 3-2 Parameter description


Parameter Description

name=? Name of the network plane to be created.


[Rule]
When creating a network plane for
CloudBackup, set this parameter to
backupNetPlane. Using other names may
have an impact on controller expansion.
[Example]
backupNetPlane

vlanid=? VLAN ID of the network plane.


[Value range]
The value is an integer ranging from 1 to 4094.

mtu=? MTU value of the member port on the


network plane.
[Value range]
The value is from 1280 to 9000 (in bytes).

ipv4_subset_base=? IPv4 subnet segment of the network plane.


[Value range]
An IPv4 address cannot start with 0 or a
number ranging from 224 to 255.
NOTE
If ipv4_subset_base is set,
the parameters mask, ipv4_subset_range, and
ipv4_gateway are mandatory.

mask=? Subnet mask of the IPv4 subnet of the network


plane.

ipv4_subset_range=? Available IP address range of the IPv4 subnet


of the network plane.
[Value range]
An IPv4 address cannot start with 0 or a
number ranging from 224 to 255.
[Example]
192.168.1.10–192.168.1.11

ipv4_gateway=? IPv4 subnet gateway of the network plane.


[Value range]
An IPv4 gateway address cannot start with 0 or
a number ranging from 224 to 255.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 30


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Parameter Description

ipv6_subset_base=? IPv6 subnet segment of the network plane.


NOTE
If ipv6_subset_base is set, the parameters
prefix_length, ipv6_subset_range, and
ipv6_gateway are mandatory.

prefix_length=? Prefix length of the IPv6 subnet of the network


plane.
[Value range]
1–127

ipv6_subset_range=? Available IP address range of the IPv6 subnet


of the network plane.

ipv6_gateway=? IPv6 subnet gateway of the network plane.

max_pods_per_node=? Maximum number of pods supported by a


single node.

failover_enabled=? Indicates whether IP address failover is enabled


for the network plane. After IP Address
Failover is enabled, services on the failed port
will be taken over by another available port. In
the entire process, the IP address used by
services remains unchanged.
[Value range]
● yes: IP address failover is enabled.
● no: IP address failover is disabled.
[Rule]
When creating a network plane for
CloudBackup, enable IP address failover.

Step 3 Add ports to the network plane.


Run the add net_plane eth_port net_plane_id=? port_list=? command to add
ports to the network plane. The ports are used to carry front-end services of
applications created based on the network plane.
Example:
admin:/>add net_plane eth_port net_plane_id=1 port_list=CTE0.A.IOM1.P1,CTE0.B.IOM1.P1
Add ETH port CTE0.A.IOM1.P1 to network plane successfully.
Add ETH port CTE0.B.IOM1.P1 to network plane successfully.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 31


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Table 3-3 Parameter description

Parameter Description

net_plane_id=? ID of the network plane.


[Value range]
To obtain the value, run the show net_plane
general command without parameters. The
value is an integer ranging from 1 to 1024.

port_list=? List of Ethernet ports configured to work in the


front-end container mode.
[Value range]
To obtain the value, run show port general
physical_type=ETH. Each Ethernet port can be
used for 15 IP addresses at the same time. If
you need to enter multiple Ethernet ports, use
commas (,) to separate the port names.

Step 4 (Optional) Check the network plane information.

Run the show net_plane member net_plane_id=? command without parameters


to query information about ports on a specified network plane. If the value of
Running Status is Link Up in the command output, the interface module is
available. Example:
admin:/>show net_plane member net_plane_id=1
ETH Port:

ID Health Status Running Status Type IPv4 Address IPv6 Address MAC Role
Working Rate(Mbps)
-------------- ------------- -------------- ---- ------------ ------------ ----------------- ---- ------------------
CTE0.A.IOM1.P0 Normal Link Up -- -- -- 3a:72:c2:00:40:73 --
25000
CTE0.A.IOM1.P1 Normal Link Up -- -- -- 3a:72:c2:00:4a:fb --
25000
CTE0.B.IOM1.P0 Normal Link Up -- -- -- 3a:72:c2:00:3f:30 --
25000
CTE0.B.IOM1.P1 Normal Link Up -- -- -- 3a:72:c2:00:d7:1e -- 25000

----End

3.2.4.2 (Optional) Managing Routes


Routes must be configured if the storage system and object storage device are on
different network segments.

Procedure
Step 1 Choose System > Container Service > Network Planes.

Step 2 Select the network plane for which you want to manage routes and click Manage
Route.

The Manage Route page is displayed.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 32


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

NOTE

Alternatively, perform either of the following operations to go to the Manage Route page:
● Click More on the right of a desired network plane and select Manage Route.
● Click the name of the desired network plane. In the upper right corner of the page that
is displayed, select Manage Route from the Operation drop-down list.

Step 3 Configure route information for the network plane.


1. Click Add.
2. Set the parameters listed in Table 3-4.

Table 3-4 Route parameters

Paramete Description
r

Destinatio IPv4 or IPv6 address of the destination network segment.


n Address

Subnet IPv4 address mask or IPv6 address prefix of the destination


Mask/ network segment.
Prefix

Gateway IPv4 or IPv6 gateway of the destination network segment.

3. Click . The route information is added to the list.


NOTE

To delete a route, select it and click .

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 33


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Step 4 Click Close.

----End

3.2.5 (Optional) Configuring DNS


To access the object storage service using domain names, you must configure the
DNS.

Prerequisites
● A DNS server has been configured and is running properly.
● Port 53 for the TCP/UDP protocol between the storage system and the DNS
server is enabled.
● The latency of the network between the DNS server and the storage system is
less than or equal to the configured latency (200 ms by default).

Context
● A DNS server is used to resolve names of hosts in a domain.
● If you want to configure a standby DNS server, keep the domain names of the
active and standby servers consistent.

Procedure
Step 1 On DeviceManager, choose Settings > Basic Information > DNS Service.

Step 2 Click Modify in the upper right corner of the Management DNS area to configure
the DNS service for the management plane.
1. Set Active DNS IP Address.
2. (Optional) Set Standby DNS IP Address 1.
3. (Optional) Set Standby DNS IP Address 2.
NOTE

Set Standby DNS IP Address 1 first and then Standby DNS IP Address 2.
4. (Optional) Test the connectivity between the DNS server and the storage
system.
– You can click Test next to a DNS IP address to test its availability.
– You can click Test All to test the connectivity between the DNS server
and storage system.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 34


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

5. Click Save.

----End

Follow-up Procedure
If you want to modify the DNS IP address, save the modification and run the
change container_application general name=dataprotect command on the CLI
to restart the CloudBackup service for the configuration to take effect. It takes
about 10 minutes to restart the CloudBackup service.

3.2.6 Importing the Container Image and Helm Chart for


CloudBackup
You can import the container image and Helm chart for CloudBackup using the
CLI or DeviceManager.

3.2.6.1 Method 1: Using DeviceManager (Applicable to 6.1.6 and Later


Versions)
This section describes how to import the container image and Helm chart for
CloudBackup using DeviceManager.

Prerequisites
● Before importing the container image and Helm chart, ensure that the
container service has been enabled.
● You have used the digital signature validation tool (PGP Verify) to verify the
integrity of the container image and Helm chart. If the verification fails,
obtain the container image and Helm chart again.

Context
● Container image: The container image is a template in standard format for
packaging containerized applications and is used to create iSulad containers.
● Helm chart: The chart is a packaging format used by Helm. It is a collection of
files that describe a group of Kubernetes resources.

Precautions
Only application images and charts that have passed Huawei digital signature
authentication can be imported. You can download the CloudBackup application
images and charts provided by Huawei in the following ways:
1. Log in to Huawei technical support website (https://support.huawei.com/
enterprise/en/index.html), enter the product model of the storage system in
the search box, and select the suggested path to the Documentation page of
the product model.
2. Select Release Documents on the left tree and download the version
mapping table of the current storage version.
3. Open the version mapping table and find the OceanProtect X8000 software
version that matches the current storage system version.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 35


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

4. Go to the software download page and select the software version queried
in 3.
NOTE

If the queried software version has a patch version, obtain the container image and
Helm chart from the patch version.
5. Download the software packages named in the
XXX_Version_image_ARM_64.tgz and XXX_Version_chart_ARM_64.tgz
formats, which are the container image package and Helm chart package.

Procedure
Step 1 Log in to DeviceManager as the super administrator.

Step 2 Import the container image.


1. Choose System > Container Service > Repositories.
2. On the Images tab page, click Upload.
The Upload Image dialog box is displayed on the right.
3. Click Please choose file on the right of Image Package and select the
downloaded image package.
4. Click Upload to upload the image package.
5. After the image package is uploaded, click Close.

Step 3 Import the Helm chart.


1. Choose System > Container Service > Repositories.
2. On the Charts tab page, click Upload.
The Upload Chart dialog box is displayed on the right.
3. Click Please choose file on the right of Chart Package and select the
downloaded chart package.
4. Click Upload to upload the chart package.
5. After the chart package is uploaded, click Close.

----End

3.2.6.2 Method 2: Using the CLI


After the preceding configurations are complete, you can import the container
image and Helm chart for CloudBackup.

Prerequisites
● Before importing the container image and Helm chart, ensure that the
container service has been enabled.
● You have used the digital signature validation tool (PGP Verify) to verify the
integrity of the container image and Helm chart. If the verification fails,
obtain the container image and Helm chart again.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 36


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Context
● Container image: The container image is a template in standard format for
packaging containerized applications and is used to create iSulad containers.
● Helm chart: The chart is a packaging format used by Helm. It is a collection of
files that describe a group of Kubernetes resources.

Precautions
Only application images and charts that have passed Huawei digital signature
authentication can be imported. You can download the CloudBackup application
images and charts provided by Huawei in the following ways:
1. Log in to Huawei technical support website (https://support.huawei.com/
enterprise/en/index.html), enter the product model of the storage system in
the search box, and select the suggested path to the Documentation page of
the product model.
2. Select Release Documents on the left tree and download the version
mapping table of the current storage version.
3. Open the version mapping table and find the OceanProtect X8000 software
version that matches the current storage system version.
4. Go to the software download page and select the software version queried in
3.
– For OceanStor Dorado 6.1.5 and earlier versions, go to the software
download page.
– For OceanStor Dorado 6.1.6 and later versions, go to the software
download page.
NOTE

If the queried software version has a patch version, obtain the container image and
Helm chart from the patch version.
5. Download the software packages named in the
XXX_Version_image_ARM_64.tgz and XXX_Version_chart_ARM_64.tgz
formats, which are the container image package and Helm chart package.

Procedure
Step 1 Log in to the CLI as an administrator or a super administrator.
Step 2 Import the container image by running the following command:
import container_image ip=? user=? password=? path=? [ port=? ] [ protocol=? ]
Example:
import container_image ip=192.168.1.1 user=admin password=******
path=OceanProtect_DataProtect_1.3.RC1_image_ARM_64.tgz

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 37


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

NOTE

● Ensure that the container image has been obtained and uploaded to the FTP or SFTP
server that can communicate with the management network port of the storage system.
● If the size of the container image exceeds 4 GB, you are advised to use FileZilla Server
to create a local FTP share to import the container image. For details about how to use
FileZilla Server to create a local FTP share, see "How Do I Create a Local FTP Share?" in
the Container User Guide.

Table 3-5 Parameter description


Parameter Description

ip=? IP address of the FTP or SFTP server.


[Value range]
The value contains 1 to 64 characters.

user=? User name for logging in to the FTP or SFTP


server.
[Value range]
The value contains 1 to 64 characters without
colons (:).

password=? Password for logging in to the FTP or SFTP


server.
[Value range]
The value contains 1 to 64 characters.

path=? Path and name of the software package on the


FTP or SFTP server.
The root directory varies with the server type and
configuration. For some servers, you need to add
a slash (/) to indicate the root directory. For
other servers, you do not need to add a slash (/).
Enter the correct directory name according to the
actual situation.
[Value range]
Path for storing the .tgz file.
NOTE
The file name extension tgz is case insensitive.
[Example]
OceanProtect_DataProtect_1.3.RC1_image_ARM_
64.tgz

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 38


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Parameter Description

port=? Port number of the FTP or SFTP server.


[Value range]
The value must be an integer ranging from 1 to
65535.
NOTE
● If protocol is set to FTP, the default value is 21.
● If protocol is set to SFTP, the default value is 22.

protocol=? Transmission protocol type.


[Value range]
The value can be FTP or SFTP. The default value
is SFTP.
NOTE
To ensure data transmission security, you are advised
to use SFTP.

Step 3 Import the Helm chart by the following command:


import helm_chart ip=? user=? password=? path=?[ port=? ][ protocol=?]
Example:
import helm_chart ip=192.168.1.1 user=admin password=******
path=OceanProtect_DataProtect_1.3.RC1_chart_ARM_64.tgz

NOTE

Ensure that the Helm chart has been obtained and uploaded to the FTP or SFTP server that
can communicate with the storage system.

Table 3-6 Parameter description


Parameter Description

ip=? IP address of the FTP or SFTP server.


[Value range]
The value contains 1 to 64 characters.

user=? User name for logging in to the FTP or SFTP


server.
[Value range]
The value contains 1 to 64 characters without
colons (:).

password=? Password for logging in to the FTP or SFTP server.


[Value range]
The value contains 1 to 64 characters.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 39


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Parameter Description

path=? Path and name of the software package on the


FTP or SFTP server.
[Value range]
Path for storing the .tgz file.
NOTE
The file name extension tgz is case insensitive.
[Example]
OceanProtect_DataProtect_1.3.RC1_chart_ARM_64
.tgz

port=? Port number of the FTP or SFTP server.


[Value range]
The value must be an integer ranging from 1 to
65535.
NOTE
● If protocol is set to FTP, the default value is 21.
● If protocol is set to SFTP, the default value is 22.

protocol=? Transmission protocol type.


[Value range]
The value can be FTP or SFTP. The default value is
SFTP.
NOTE
To ensure data transmission security, you are advised to
use SFTP.

----End

3.2.7 Deploying the CloudBackup Containerized Application


CloudBackup containerized applications can be deployed using the CLI or
DeviceManager.

3.2.7.1 Method 1: Using DeviceManager (Applicable to 6.1.6 and Later


Versions)
This section describes how to deploy a CloudBackup containerized application
using DeviceManager.

Prerequisites
● Before creating an application, ensure that the container image and Helm
chart have been imported to the storage system.
● Before creating an application, ensure that the container service has been
enabled.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 40


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Context
● Container image: The container image is a template in standard format for
packaging containerized applications and is used to create iSulad containers.
● Helm chart: The chart is a packaging format used by Helm. It is a collection of
files that describe a group of Kubernetes resources.
● When you deploy an application, the storage system automatically creates a
file system whose name starts with pvc_ to ensure the normal running of the
application.

Procedure
Step 1 Log in to DeviceManager as the super administrator.
Step 2 Choose System > Container Service > Applications.
Step 3 Click Deploy.
The Deploy Application page is displayed on the right.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 41


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Step 4 Set the parameters for deploying the CloudBackup containerized application.
Table 3-7 describes the parameters.

Table 3-7 Parameters for application deployment


Parameter Description

Chart Name Name of the chart package for deploying the


application.
Click Select on the right to select the chart package
named DataBackup.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 42


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Parameter Description

Application Name Name of the application to be deployed. The value is


dataprotect.

Chart Version Chart package version.

Network Plane Network plane used by the application.


Click Select on the right to select the network plane
created in 3.2.4.1 Creating a Network Plane.

Network Plane ID ID of the network plane. That is, the ID of the selected
network plane.

Namespace Namespace where the application is deployed. The


value is dpa.

Application Type Select a containerized application type. For a


CloudBackup containerized application, select
CloudBackup.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 43


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Parameter Description

Parameter Configuration parameters of the application.


Configuration The parameter configuration items of the CloudBackup
containerized application are as follows:
● global.backupNetPlane: Backup network plane ID.
The value of this parameter must be the same as
that of Network Plane ID.
● global.deploy_type: Deployment scenario. Set this
parameter to d3 for CloudBackup.
● global.gaussdbpwd: Initial password of GaussDB
(R2F1c3NkYl8xMjM=). This password is used when
you create a containerized application. After the
containerized application has been created, the
password becomes invalid.
● global.replicas: Number of pods. Set this parameter
based on the number of controllers. For example, set
this parameter to 2 for a dual-controller device and
4 for a four-controller device.
● timeout: Timeout duration for installing an
application. When creating a CloudBackup
containerized application, set this parameter to
1800.
● wait: If you set wait to true, the system waits the
application installation result after the installation is
complete. If the installation fails, the system
automatically clears the application.
If you set wait to false, the system returns the
command execution result immediately after the
command has been executed. To check the
application installation result, you must run the
show container_application general command and
check the Status field in the command output. If
Status is Running, the application has been
successfully installed.
[Example]
global.backupNetPlane=1,global.deploy_type=d3,global.
gaussdbpwd=R2F1c3NkYl8xMjM=,global.replicas=2,time
out=1800,wait=true

Description Application description.


[Value range]
The value can only contain letters, digits, underscores
(_), hyphens (-), and periods (.).

----End

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 44


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

3.2.7.2 Method 2: Using the CLI


This section describes how to deploy a CloudBackup containerized application
using the CLI.

Prerequisites
● Before creating an application, ensure that the container image and Helm
chart have been imported to the storage system.
● Before creating an application, ensure that the container service has been
enabled.

Context
● Container image: The container image is a template in standard format for
packaging containerized applications and is used to create iSulad containers.
● Helm chart: The chart is a packaging format used by Helm. It is a collection of
files that describe a group of Kubernetes resources.
● When you deploy an application, the storage system automatically creates a
file system whose name starts with pvc_ to ensure the normal running of the
application.

Procedure
Step 1 Log in to the CLI as an administrator or a super administrator.
Step 2 Deploy an application and configure parameters such as the namespace and
storage resources for the application by running the following command:
create container_application general app=? version=? namespace=? name=?
dynamic_config=? net_plane_name=? description=?
Example:
create container_application general app=DataBackup version=1.X.X namespace=dpa name=dataprotect
dynamic_config="global.backupNetPlane=1,wait=true,timeout=1800,global.replicas=2,global.deploy_type=d3,
global.gaussdbpwd=R2F1c3NkYl8xMjM="

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 45


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Table 3-8 Parameter description


Parameter Description

app=? Name of the chart package for deploying the


application.
[Value range]
● The value can be obtained from the Application
field in the output of the show helm_chart
general command.
● The value contains 1 to 255 ASCII characters,
including digits, letters, and underscores (_).
[Example]
OceanProtect-DataProtect (applicable to 6.1.5 and
earlier versions)
DataBackup (applicable to 6.1.6 and later versions)

version=? Version of the chart package for deploying the


application.
[Value range]
● The value can be obtained from the Version field
in the output of the show helm_chart general
command.
● The value contains 1 to 255 ASCII characters,
including digits, letters, and underscores (_).

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 46


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Parameter Description

dynamic_config=? Application parameters.


[Value range]
● You can run the show container_application
dynamic_config app=? version=? command to
obtain the configurable items of
dynamic_config.
● The value contains 1 to 255 ASCII characters,
including digits, letters, and special characters
(_ . ! # $ % & ' ( ) * + , - / : ; < = > ? @ [ ] ^ { } |
~).
[Example]
dynamic_config="global.backupNetPlane=1,wait=tru
e,timeout=1800,global.replicas=2,global.deploy_type
=d3,global.gaussdbpwd=R2F1c3NkYl8xMjM="
The meaning of each field is as follows:
● global.backupNetPlane: Backup network plane
ID, that is, the ID of the network plane created in
3.2.4.1.1 Method 1: Using DeviceManager.
● wait=true: Indicates to return the application
installation result after the installation is
complete. If the installation fails, the system
automatically clears the application.
If you set wait to false, the system returns the
command execution result immediately after the
command has been executed. To check the
application installation result, you must run the
show container_application general command
and check the Status field in the command
output. If Status is Running, the application has
been successfully installed.
● timeout: Timeout duration for installing an
application. When creating a CloudBackup
containerized application, set this parameter to
1800.
● global.replicas: Number of pods. Set this
parameter based on the number of controllers.
For example, set this parameter to 2 for a dual-
controller device and 4 for a four-controller
device.
● global.deploy_type: Deployment scenario. Set
this parameter to d3 for CloudBackup.
● global.gaussdbpwd: Initial password of
GaussDB (R2F1c3NkYl8xMjM=). This password is
used when you create a containerized
application. After the containerized application
has been created, the password becomes invalid.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 47


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Parameter Description

namespace=? Application namespace. The value is dpa.

name=? Name of the application to be deployed. The value


is dataprotect.

net_plane_name=? Name of the network plane used by the application.


[Value range]
● The value can be obtained from the Name field
in the output of the show net_plane general
command.
● The value contains 1 to 255 ASCII characters,
including digits, letters, underscores (_), and
commas (,).

description=? Application description.


[Value range]
The value contains 1 to 255 ASCII characters,
including digits, letters, and underscores (_).

----End

Follow-up Procedure
● After deploying a CloudBackup containerized application:
In versions earlier than 6.1.5, run the show container_application general
name=? command to query the application details.
In 6.1.5 and later versions, run the show container_application general
name=? namespace=? command to query the application details.
NOTE

For details about the command, visit Command/Event/Error Code Query.


In 6.1.5 and later versions, the command output is as follows:
admin:/>show container_application general name=dataprotect namespace=dpa

Name : dataprotect
Namespace : dpa
Revision : 1.X.X
Updated : 2023-03-07 22:30:33
Status : deployed
Chart Name : databackup
Description : databackup Software
Application Subscribe Capacity :
2.537TB
Application Image Name List : om:1.X.X,elasticsearch:1.X.X,kafka:1.X.X,pm-database-version-
migration:1.X.X
,pm-system-
base:1.X.X,dee_initcontainer:1.X.X,dee_global_search:1.X.X,dma_nginx:1.
X.X,dme_dns:1.X.X,pm-nginx:1.X.X,zookeeper:1.X.X,dee_nginx:1.X.X,pm-re
source-lock-manager:1.X.X,dee_indexer:1.X.X,dme_initcontainer:1.X.X,pm-
gui:1.X.X
,gaussdb:1.X.X,redis:1.X.X,dme_archive:1.X.X,dme_nginx:1.X.X,dee_db_anon
ymization:1.X.X,pm-protection-service:1.X.X
Net Plane List : backupNetPlane

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 48


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

PodList:

Pod Name Pod Status Pod Restart Times Pod Cpu Percent(%) Pod Memory
Percent(%) Pod Belong Node Pod Namespace Pod Is Ready
---------------------------- ---------- ----------------- ------------------ ---------------------
--------------- ------------- ------------
gaussdb-0 Running 0 14.29 4.82 node-0
dpa true
infrastructure-0 Running 0 -- -- node-0
dpa true
dataenableengine-server-1 Running 0 14.29 3.22
node-1 dpa true
dataenableengine-server-0 Running 0 14.29 3.22
node-0 dpa true
protectengine-e-dma-0 Running 0 1.43 0.63 node-0
dpa true
protectengine-1 Running 0 -- -- node-1
dpa true
protectengine-0 Running 0 -- -- node-0
dpa true
protectmanager-biz-service-1 Running 0 15.71 10.45
node-1 dpa true
protectmanager-biz-service-0 Running 0 15.71 10.45
node-0 dpa true
protectmanager-system-base-1 Running 0 15.00 7.55
node-0 dpa true
protectmanager-system-base-0 Running 0 15.00 7.55
node-1 dpa true
Dynamic Config :

Config Name Config Value


--------------------------------- -------------------
atomic true
data-enable-engine.enabled true
global.archiveNetPlane --
global.backupNetPlane 1
global.deploy_type d3
global.environment Dorado
global.gaussdbpwd ******
global.logLevel INFO
global.replicas 2
global.updateAppTimestamp.default 1646663432780133350
global.updateTimestamp {}
global.version 1.X.X
infrastructure.enabled true
protect-engine-a.enabled true
protect-engine-e.enabled true
protect-manager.enabled true
timeout 1800
wait false
Lun List:

Lun Name Lun States Lun Capacity


-------- ---------- ------------
db-block Online 100.000GB
File System List:

File System Name File System States File System Capacity


---------------- ------------------ --------------------
dme-nas Online 200.000GB
comm-nas Online 100.000GB
data-nas Online 2.000TB
dma-nas Online 100.000GB
dee-nas Online 50.000GB
Net Information:

Net Plane Name Pod Name Pod Namespace Business IP


-------------- ------------------------- ------------- -----------
backupNetPlane protectengine-0 dpa 10.10.116.62

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 49


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

backupNetPlane dataenableengine-server-1 dpa 10.10.116.60


backupNetPlane dataenableengine-server-0 dpa 10.10.116.61
backupNetPlane protectengine-1 dpa 10.10.116.63
Node List:

Node Name Node Status Node Role Node Cpu Percent(%) Node Memory Percent(%)
--------- ----------- --------- ------------------- ----------------------
node-0 Ready master 6.49 27.21
node-1 Ready master 4.97 21.77

● If you delete the containerized application of CloudBackup, you must


manually delete the file systems named pvc_dee_share and pvc_DirtyRange.

3.3 Establishing the Connection Between CloudBackup


and the Backup Storage

3.3.1 Logging In to ProtectManager


After the CloudBackup containerized application has been created, you can
configure the backup storage, SLA, and backup policy for CloudBackup on
ProtectManager.

Prerequisites
The CloudBackup containerized application has been deployed on the storage
system.

Context
● ProtectManager is a management platform for data protection services. It
integrates the backup storage, SLA, and protection policies of CloudBackup.
● After the CloudBackup containerized application has been deployed on the
storage system, you can choose Data Protection > CloudBackup on
DeviceManager to navigate to the ProtectManager login page.

Procedure
Step 1 Log in to DeviceManager.
Step 2 Choose Data Protection > CloudBackup.
The ProtectManager login page is displayed.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 50


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

NOTE

On the ProtectManager login page, the format of the address in the browser address box is
https://XXX.XXX.XXX.XXX:25080. XXX.XXX.XXX.XXX represents the management IP address
of the controller.

Step 3 Enter the user name sysadmin and password of ProtectManager to log in.
NOTE

For details about the user name and password, see the OceanStor Dorado Account List.

----End

3.3.2 Authenticating the Local Storage (Applicable to 6.1.5


and Earlier Versions)
Procedure
Step 1 On ProtectManager, choose System > Infrastructure > Local Storage.
The Local Storage page is displayed.
Step 2 In the Authentication Information area on the Local Storage page, click Modify
on the right.
Step 3 Enter the user name and password of the super administrator of the storage
system, and click Save.
NOTE

For details about the user name and password, see the OceanStor Dorado Account List.

----End

3.3.3 Authenticating the Local Storage (Applicable to 6.1.6


and Later Versions)
Authentication information of local storage includes login authentication and
service authentication. After login authentication, you can click Open the device
management platform on the Local Storage page to access DeviceManager.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 51


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

After service authentication, you can configure CloudBackup services on the


ProtectManager management page.

Procedure
Step 1 On ProtectManager, choose System > Infrastructure > Local Storage.
The Local Storage page is displayed.
Step 2 Modify login authentication and service authentication.
1. Modify login authentication.
a. In the Authentication Information area, click Modify Login
Authentication.
b. Enter the user name and password of the super administrator of the
storage system, and click Save.
2. Modify service authentication.
a. In the Authentication Information area, click Modify Service
Authentication.
b. Enter the user name and password of the super administrator of the
storage system, and click Save.

NOTE

For details about the user name and password, see the OceanStor Dorado Account List.

----End

3.3.4 (Optional) Importing a CA Certificate


If the HTTPS protocol is used for data transmission between CloudBackup and S3
storage, you must obtain a valid CA certificate from the S3 storage administrator
and import it to ProtectManager.

Procedure
Step 1 On ProtectManager, choose System > Security > Certificates.
Step 2 Click Add External Certificate.
The Add External Certificate page is displayed.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 52


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Step 3 Set external certificate parameters.

Table 3-9 describes the parameters.

Table 3-9 External certificate parameters

Parameter Description

Name Name of the newly imported certificate.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 53


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Parameter Description

CA Certificate Select a valid CA certificate file.

Step 4 Click OK.

----End

3.3.5 Adding the Backup Storage to CloudBackup


Before backing up data, you must establish the connection between CloudBackup
and a backup storage system.

Prerequisites
● You have prepared the object storage platform for storing backup data.
● You have obtained the endpoint, AK, and SK of the object storage.
● You have created a data bucket for storing backup data on the object storage
platform.
● Versioning has been disabled for the data bucket of the object storage.

Procedure
Step 1 On ProtectManager, choose System > Infrastructure > Backup Storage.
Step 2 Click Add Backup Storage.
The Add Backup Storage page is displayed on the right.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 54


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Step 3 Set backup storage parameters.


Table 3-10 describes the parameters.

Table 3-10 Backup storage parameters


Parameter Description

Name Name of the backup storage to be created.

Type Type of the backup storage.


[Value range]
Object storage

Object Storage Product of the backup storage.


Product [Value range]
● OceanStor Pacific
● FusionStorage OBS
● HUAWEI CLOUD OBS
● AWS S3

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 55


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Parameter Description

Endpoint Service IP address or domain name of the object storage.


NOTE
The following is an example of querying the domain name on
HUAWEI CLOUD OBS:
1. Log in to the OBS website (https://www.huaweicloud.com/
intl/en-us/product/obs.html) and click Access Console.
2. In the OBS bucket list, click the bucket that has been created for
CloudBackup. The Overview of the bucket is displayed.
3. In the Basic Information area, record the value of Endpoint,
which is the domain name of the bucket.

Protocol Network protocol between the CloudBackup system and S3


storage. This can be HTTP or HTTPS.
NOTE
● HTTP has security risks. It is recommended that you use HTTPS
for security purposes.
● If HTTPS is used, you are advised to obtain a valid CA certificate
from the S3 storage administrator and import it to
ProtectManager, so that CloudBackup can verify the S3 storage
information.
To import a CA certificate to ProtectManager, choose System >
Security > Certificates and click Add External Certificate. For
details, see 3.3.4 (Optional) Importing a CA Certificate.

AK An ID that confirms the identity of a user accessing the S3


storage.
An AK matches only one user, but a user can have multiple
AKs.
NOTE
The following is an example of creating the AK and SK on HUAWEI
CLOUD OBS:
1. Log in to the OBS website (https://www.huaweicloud.com/
intl/en-us/product/obs.html) and click Access Console.
2. Hover the cursor over the user name in the upper right corner
and choose My Credentials from the drop-down list.
3. Click Access Keys in the navigation tree. The Access Keys page
is displayed.
4. Click Create Access Key, enter the key description as prompted,
and click OK. The system displays a message indicating that the
creation is successful.
5. Click Download Now. The browser automatically generates a
key file named credentials.csv.
6. Open the credentials.csv file to obtain the AK and SK. The key
file contains the User Name, Access Key Id, and Secret Access
Key. Access Key Id is the AK and Secret Access Key is the SK.

SK An authentication key for a user to access the S3 storage.


An SK matches an AK, forming a key pair for accessing the
object storage to ensure access security.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 56


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Parameter Description

Data Bucket A bucket is a container in the object storage. The data


bucket is the directory path for accessing the S3 storage.
NOTE
The following is an example of querying the bucket name on
HUAWEI CLOUD OBS:
1. Log in to the OBS website (https://www.huaweicloud.com/
intl/en-us/product/obs.html) and click Access Console.
2. In the OBS bucket list, find and manually copy the bucket name.

Use Proxy Server Determines whether to use a proxy for accessing the S3
storage.
NOTE
● Obtain the proxy information from the network administrator of
the enterprise data center.
● If Use Proxy Server is enabled, the Address, Username, and
Password parameters are displayed.

Address IP address and port number of the proxy server.

Username User name of the proxy server.


[Value range]
The user name contains 1 to 256 characters.

Password Password of the proxy server.


[Value range]
The password contains 1 to 256 characters.

Capacity Alarm Determines whether to enable the alarm threshold.


Threshold

Alarm Threshold Alarm threshold for the backup storage capacity. When the
percentage of the used capacity to the total capacity of the
backup storage reaches the alarm threshold, an alarm is
generated, prompting you to expand the capacity or delete
unnecessary backup data to release storage space.
Otherwise, subsequent backup tasks may fail.

Step 4 Click OK.

----End

3.4 Configuring CloudBackup Protection


Create a backup plan and associate it with the file system to be backed up for
protection.

3.4.1 Creating a NAS Protection SLA


You can create a custom SLA to provide backup policies for CloudBackup.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 57


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Context
● In CloudBackup, a service level agreement (SLA) is a backup plan template to
meet various backup requirements.
● Multiple backup policies can be created, but each backup storage can be
associated with only one backup policy.

Procedure
Step 1 On ProtectManager, choose Protection > Protection Policies > SLAs.

Step 2 Click Create.

The Create SLA page is displayed.

Step 3 Set the SLA name.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 58


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Step 4 In the Configuration SLA area, click the icon for Step 1 Applications.
The Select Application page is displayed.
1. Select Local File System.
2. Click OK.
Step 5 In the Configuration SLA area, click Step 2 Backup Policy.
The Backup Policy page is displayed.
Step 6 Set basic backup policy parameters.
1. Specify an incremental backup plan. The default is Incremental 01
(Incremental). To add a plan, click Add Policy.
2. Specify the backup storage for the incremental backup plan.
3. Set incremental backup parameters.
NOTE

Set a proper backup interval, retention period, and backup window based on service
requirements. The recommended settings are as follows:
– If the protected file system in CloudBackup is also the secondary file system of
remote replication, it is recommended that you set different time windows for
CloudBackup and remote replication. Otherwise, the backup task may fail.
– The backup interval must be longer than the backup duration.
– It is recommended that the time of the initial backup should be the same as the
start time of the backup time window.
– The retention period must be longer than the backup interval.

a. Set the name of the backup policy.


b. Configure the initial execution time, backup interval, copy retention
period, and backup time window for incremental backup.

▪ Configure the backup frequency and copy retention period for full
backup.
○ By Year
Configure the job to be executed once every year on XX (month)
XX (day), and copies are retained for XX days, weeks, months,
years, or permanently.
If the date does not exist in the year, no copy is generated.
○ By Month
Configure the job to be executed on xx (day) (multiple days can
be selected) or the last day of each month. Configure copies to
be retained for xx days, weeks, months, years, or permanently.
If the backup job is set to be executed once on the xxth day of
each month, no copy is generated when the date does not exist
in the current month.
○ By Week
Configure the job to be executed every Monday, Tuesday,
Wednesday, Thursday, Friday, Saturday, or Sunday (you can
select multiple options). Configure copies to be retained for xx
days, weeks, months, years, or permanently.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 59


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

○ By day
Configure the job to be executed every xx days starting from xx
(year) xx (month) xx (day). Configure copies to be retained for
xx days, weeks, months, years, or permanently.
○ By Hour
Configure the job to be executed every xx hours starting from xx
(year) xx (month) xx (day). Configure copies to be retained for
xx days, weeks, months, years, or permanently.
▪ Set the time period for performing full backup. The full backup job
will not be scheduled beyond the time range.
NOTE

○ If the end time is earlier than or the same as the start time, the end
time is actually the end time of the next day.
○ If the backup job is not completed within the specified time window, the
system does not stop the backup job, but reports an event.
○ Once the retention period expires, the system automatically deletes the
expired copies.

Step 7 Set advanced parameters for the backup policy. Table 3-11 describes the
parameters.

Table 3-11 Advanced parameters of a backup policy


Parameter Description

Rate Limiting Select a proper rate limiting policy for the SLA to limit the
Policies maximum bandwidth during backup.
NOTE
To create a rate limiting policy, choose Protection > Protection
Policies > Rate Limiting Policies and click Create.

Automatic Indicates whether to enable automatic indexing. After this


Indexing function is enabled, the system automatically creates
indexes for files or directories in copies, and performs file-
level recovery or download the files or directories.

Aggregate Indicates whether to aggregate multiple small files into a


large file to improve backup efficiency.

Network Indicates whether to enable network acceleration. After this


Acceleration function is enabled, Bottleneck Bandwidth and Round-trip
propagation time (BBR) can be used for network
acceleration. You are advised to enable this function when
the network latency is greater than or equal to 20 ms.
NOTE
It is recommended that the Network Acceleration setting should
be the same for different buckets on the same S3 object storage.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 60


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Parameter Description

Automatic Retry Indicates whether the system automatically retries the


backup task upon a failure. After this function is enabled,
you must set the number of retries and wait time.
The number of retries ranges from 1 to 5, and the wait time
ranges from 1 to 30 minutes. For example, if the number of
retries is set to 3 and the wait time to 5 minutes, the system
makes 3 retries and each retry every 5 minutes.
NOTE
During automatic retry, the system creates a backup task. If the
backup task is not within the backup time window, the task is not
executed and fails.

Synthesis Full Indicates the cycle for performing a full backup.


Cycle For example, if you enable Synthesis Full Cycle and set the
cycle to 5 backups, the system performs a full backup for
the sixth backup.

Step 8 Click OK.


The system returns to the page for creating an SLA.
Step 9 Click OK.

----End

3.4.2 Configuring CloudBackup Protection for a File System

3.4.2.1 Periodic Backup


After creating a proper SLA, you can set a protection policy for the file system and
associate the file system resources with the SLA.

Prerequisites
● An SLA has been created.
● File system resources of the storage system have been discovered by
ProtectManager.

Context
File systems created on the storage system can be automatically discovered by
ProtectManager and displayed on the Local File System page.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 61


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

NOTE

● New file systems on the storage system can be discovered by ProtectManager after a
period of time.
● NAS resources of only the System_vStore can be accessed using the container back-end
module. Therefore, only the file systems of the System_vStore can be discovered by
ProtectManager.
● File systems discovered by ProtectManager cannot be deleted on ProtectManager.
● Clone file systems are not displayed on ProtectManager.

Procedure
Step 1 On ProtectManager, choose Protection > Storage > Local File System.
Step 2 In the local file system list, select the file system that you want to protect and
choose More > Protect. The Protect page is displayed.
You can also select multiple local file systems for batch protection.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 62


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Step 3 In the Select SLA area, select a proper SLA for the file system.

You can also click Create to create an SLA.

Step 4 Click OK to complete the file system protection settings.

If the current system time is later than the first backup start time of the SLA, you
can perform manual backup immediately after the SLA is associated or wait for
the next scheduling based on the backup policy set in the SLA.

----End

Follow-up Procedure
After a backup plan is configured for a file system, the system periodically creates
and executes backup tasks for the file system based on the scheduling policy.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 63


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

3.4.2.2 Manual Backup


You can manually run a backup task to back up data immediately.

Prerequisites
An SLA has been created for the file system you want to back up manually.

Context
● During manual backup, the parameters defined in the SLA (except Automatic
Retry), such as Rate Limiting Policies, are applied to the manual backup
task.
● Copies generated by manual backup are retained for the duration defined in
the SLA.

Procedure
Step 1 On ProtectManager, choose Protection > Storage > Local File System.
Step 2 In the local file system list, select the file system that you want to protect and
choose More > Manual Protect. The Manual Backup page is displayed on the
right.
You can also select multiple local file systems for batch manual backup.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 64


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Step 3 Click OK.

----End

3.5 Recovering Backup Data

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 65


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

3.5.1 Recovering a File System


This section describes how to recover a backup file system to the original or a new
location.

Prerequisites
A file system backup copy has been generated.

Precautions
● Restoration to a file system in WORM, CLONE, or non-UNIX security mode is
not supported.
● Restoration to a file system whose name starts with pvc_ is not supported.
● Restoration to the secondary file system of asynchronous remote replication is
not supported.
● After HyperMetro brain-split occurs, the end that fails arbitration does not
support restoration.
● After an entire copy is used for restoration to the original location, new files
added to the original file system after the copy is generated are not deleted. If
you want to restore the file system to a certain point in time, you need to
create a new file system on DeviceManager and specify the new file system
for restoration.
● Ensure that no other user is reading or writing the file system during the
restoration. Otherwise, data may be inconsistent or even damaged.
● The restoration operation is irreversible. If the restoration fails, data is not
rolled back and some data may be damaged.

Procedure
Step 1 On ProtectManager, choose Explore > Copy Data > Local File System.
NOTE

The system allows you to search for copies by resource or copy. This example searches for
copies by resource, which is the default method. To search by copy, click the Copy tab.

Step 2 Click the name of the file system that you want to recover.

The file system details page is displayed.

Step 3 Click Copy Data and select the year, month, and day in sequence to find the copy.

If is displayed below a month or day, a copy was generated in that month or


day.

Step 4 Choose More > Restore in the row where the copy is located.

The Restore page is displayed.

Step 5 Set the recovery mode.


● Recover the file system to the original location.
a. Select Original location.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 66


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

b. Select the rule for overwriting the original location file. Table 3-12
describes the parameters.

Table 3-12 Overwriting rule

Parameter Description

Skip existing files Existing files in the file system are not
processed. Only the files that do not exist are
recovered.

Replace existing files The existing files are replaced during


recovery.

Only replace the files For existing files in the file system, only the
older than the files that are older than the recovered files
restoration file are replaced.

● Recover the file system to a new location.


a. Select New location.
b. Select a file system.
c. Select a share name.
d. Select the rule for overwriting the new location file. Table 3-13 describes
the parameters.

Table 3-13 Overwriting rule

Parameter Description

Skip existing files Existing files in the file system are not
processed. Only the files that do not exist are
recovered.

Replace existing files The existing files are replaced during


recovery.

Only replace the files For existing files in the file system, only the
older than the files that are older than the recovered files
restoration file are replaced.

Step 6 Click OK.

Step 7 Read the warning carefully, select I have read and understand the consequences
associated with performing this operation and click OK.

----End

3.5.2 Recovering Files in a File System


This section describes how to recover specific files in a backup file system.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 67


OceanStor Dorado
CloudBackup Feature Guide 3 Configuring CloudBackup

Prerequisites
The index status of the copy is Indexed.

Precautions
The files to be recovered are not being read or written.

Procedure
Step 1 On ProtectManager, choose Explore > Copy Data > Local File System.
NOTE

The system allows you to search for copies by resource or copy. This example searches for
copies by resource, which is the default method. To search by copy, click the Copy tab.

Step 2 Click the name of the file system that you want to recover.
The file system details page is displayed.
Step 3 Click Copy Data and select the year, month, and day in sequence to find the copy.

If is displayed below a month or day, a copy was generated in that month or


day.
Step 4 Choose More > File-level Restoration in the row where the copy is located.
The File-level Restoration page is displayed.
Step 5 Select file objects to be recovered from the left area and select the target location
from the right area.
NOTE

● File-level recovery is supported only when the index status of the copy is Indexed.
● If the name of a directory or file has garbled characters, file-level recovery is not
supported.

Step 6 Click OK.


Step 7 Read the warning carefully, select I have read and understand the consequences
associated with performing this operation and click OK.

----End

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 68


OceanStor Dorado
CloudBackup Feature Guide 4 Managing CloudBackup

4 Managing CloudBackup

This chapter describes how to manage CloudBackup.


4.1 Managing the Local Storage
4.2 Managing the Backup Storage
4.3 Managing SLAs
4.4 Managing File System Resources
4.5 Managing Backup Copies
4.6 More Management Operations

4.1 Managing the Local Storage

4.1.1 Viewing Local Storage Information


This section describes how to view the basic information of a local storage.

Procedure
Step 1 On ProtectManager, choose System > Infrastructure > Local Storage.
Step 2 In the Basic Info and Available Capacity areas, view the basic information and
available capacity of the local storage.
Table 4-1 describes related parameters.

Table 4-1 Local storage parameters


Parameter Description

Basic Info Version Current version of the system.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 69


OceanStor Dorado
CloudBackup Feature Guide 4 Managing CloudBackup

Parameter Description

ESN Current equipment serial number (ESN) of the


system.
An ESN is a character string that uniquely identifies a
device.

Model Product model of the local storage device.

WWN Current world wide name (WWN) of the system.


A WWN is a globally unique name that identifies a
connection or connection set on a network. It is
principally used in Fibre Channel and SAS.

Total Disk Current total disk capacity of the system.


Capacity

Available Total Usable capacity of a storage pool (Total disk capacity


Capacity Capacity – Capacity consumed by RAID and metadata).

Threshold When the percentage of the storage pool's used


capacity to its total capacity reaches this threshold,
the system reports an alarm. A proper capacity alarm
threshold helps you monitor the capacity usage of a
storage pool. The value ranges from 1 to 95. The
default value is 80.

Usage Percentage of the used capacity to the total capacity


of the storage pool.

Used Used capacity of the storage pool.


Capacity

Unused Unused capacity of the storage pool.


Capacity

----End

4.1.2 Configuring the Capacity Alarm Threshold of the Local


Storage
This section describes how to modify the capacity alarm threshold of a local
storage on ProtectManager. After the modification, the system reports an alarm
when the used capacity reaches the new threshold.

Procedure
Step 1 On ProtectManager, choose System > Infrastructure > Local Storage.

Step 2 In the Available Capacity area, click on the right of Threshold.

Step 3 Modify the capacity alarm threshold of the local storage.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 70


OceanStor Dorado
CloudBackup Feature Guide 4 Managing CloudBackup

Set the upper threshold of the used capacity of the local storage. When the used
capacity reaches the threshold, an alarm is reported.

Step 4 Click OK.

----End

4.1.3 Viewing Local Storage Authentication Information


This section describes how to view local storage authentication information.

Procedure
Step 1 On ProtectManager, choose System > Infrastructure > Local Storage.

Step 2 In the Authentication Information area, view the local storage authentication
information. Authentication information includes login authentication and service
authentication.
● Login authentication
– Username: used to redirect and log in to DeviceManager. The user must
have the super administrator permissions.
– Password: password of the login authentication user.
– Status: user authentication status. If the authentication status is
Abnormal, you need to modify the authentication information.
● Service Authentication
– Username: used by the backup system and storage system to perform
data protection operations. The user must have the super administrator
permissions.
– Password: password of the service authentication user.
– Status: user authentication status. If the authentication status is
Abnormal, you need to modify the authentication information.

----End

4.1.4 Modifying Local Storage Authentication Information


Authentication information of local storage includes login authentication and
service authentication. This section describes how to modify local storage
authentication information on ProtectManager. After changing the password of
the interconnection user on DeviceManager, you must update the password for
local storage authentication on ProtectManager.

Procedure
Step 1 On ProtectManager, choose System > Infrastructure > Local Storage.

Step 2 In the Authentication Information area on the Local Storage page, click Modify
Login Authentication or Modify Service Authentication on the right.

Step 3 Modify the username and password for authentication between ProtectManager
and the local storage.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 71


OceanStor Dorado
CloudBackup Feature Guide 4 Managing CloudBackup

NOTE

Ensure that the user who logs in to DeviceManager from the current page has been logged
out.

Step 4 Click Save.

----End

4.2 Managing the Backup Storage

4.2.1 Viewing Backup Storage Information


This section describes how to view the basic information of a backup storage.

Prerequisites
You have added a backup storage.

Procedure
Step 1 On ProtectManager, choose System > Infrastructure > Backup Storage.
Step 2 Click the name of a backup storage. In the dialog box that is displayed on the
right, view its information.
Table 4-2 describes the parameters.

Table 4-2 Backup storage parameters


Parameter Description

Name Name of the backup storage to be created.

Type Type of the backup storage.


[Value range]
Object storage

Object Storage Product of the backup storage.


Product [Value range]
● OceanStor Pacific
● FusionStorage OBS
● HUAWEI CLOUD OBS
● AWS S3

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 72


OceanStor Dorado
CloudBackup Feature Guide 4 Managing CloudBackup

Parameter Description

Endpoint Service IP address or domain name of the object storage.


NOTE
The following is an example of querying the domain name on
HUAWEI CLOUD OBS:
1. Log in to the OBS website (https://www.huaweicloud.com/
intl/en-us/product/obs.html) and click Access Console.
2. In the OBS bucket list, click the bucket that has been created for
CloudBackup. The Overview of the bucket is displayed.
3. In the Basic Information area, record the value of Endpoint,
which is the domain name of the bucket.

Protocol Network protocol between the CloudBackup system and S3


storage. This can be HTTP or HTTPS.
NOTE
● HTTP has security risks. It is recommended that you use HTTPS
for security purposes.
● If HTTPS is used, you are advised to obtain a valid CA certificate
from the S3 storage administrator and import it to
ProtectManager, so that CloudBackup can verify the S3 storage
information.
To import a CA certificate to ProtectManager, choose System >
Security > Certificates and click Add External Certificate. For
details, see 3.3.4 (Optional) Importing a CA Certificate.

AK An ID that confirms the identity of a user accessing the S3


storage.
An AK matches only one user, but a user can have multiple
AKs.
NOTE
The following is an example of creating the AK and SK on HUAWEI
CLOUD OBS:
1. Log in to the OBS website (https://www.huaweicloud.com/
intl/en-us/product/obs.html) and click Access Console.
2. Hover the cursor over the user name in the upper right corner
and choose My Credentials from the drop-down list.
3. Click Access Keys in the navigation tree. The Access Keys page
is displayed.
4. Click Create Access Key, enter the key description as prompted,
and click OK. The system displays a message indicating that the
creation is successful.
5. Click Download Now. The browser automatically generates a
key file named credentials.csv.
6. Open the credentials.csv file to obtain the AK and SK. The key
file contains the User Name, Access Key Id, and Secret Access
Key. Access Key Id is the AK and Secret Access Key is the SK.

SK An authentication key for a user to access the S3 storage.


An SK matches an AK, forming a key pair for accessing the
object storage to ensure access security.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 73


OceanStor Dorado
CloudBackup Feature Guide 4 Managing CloudBackup

Parameter Description

Data Bucket A bucket is a container in the object storage. The data


bucket is the directory path for accessing the S3 storage.
NOTE
The following is an example of querying the bucket name on
HUAWEI CLOUD OBS:
1. Log in to the OBS website (https://www.huaweicloud.com/
intl/en-us/product/obs.html) and click Access Console.
2. In the OBS bucket list, find and manually copy the bucket name.

Use Proxy Server Determines whether to use a proxy for accessing the S3
storage.
NOTE
● Obtain the proxy information from the network administrator of
the enterprise data center.
● If Use Proxy Server is enabled, the Address, Username, and
Password parameters are displayed.

Address IP address and port number of the proxy server.

Username User name of the proxy server.


[Value range]
The user name contains 1 to 256 characters.

Password Password of the proxy server.


[Value range]
The password contains 1 to 256 characters.

Capacity Alarm Determines whether to enable the alarm threshold.


Threshold

Alarm Threshold Alarm threshold for the backup storage capacity. When the
percentage of the used capacity to the total capacity of the
backup storage reaches the alarm threshold, an alarm is
generated, prompting you to expand the capacity or delete
unnecessary backup data to release storage space.
Otherwise, subsequent backup tasks may fail.

----End

4.2.2 Modifying the AK/SK of a Backup Storage


This section describes how to modify the AK/SK of a backup storage on
ProtectManager. If the AK or SK of a backup storage interconnected with the
system is changed, you must change it on ProtectManager accordingly.

Procedure
Step 1 On ProtectManager, choose System > Infrastructure > Backup Storage.
Step 2 Locate the row that contains the backup storage to be modified, and click More >
Modify Backup Storage.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 74


OceanStor Dorado
CloudBackup Feature Guide 4 Managing CloudBackup

Step 3 Modify backup storage parameters.


Table 4-3 lists the parameters.

Table 4-3 Backup storage parameters

Parameter Description

AK Access certificate for accessing an object storage.

SK Security certificate for accessing an object storage.

Step 4 Click OK.

----End

4.2.3 Modifying the Capacity Alarm Threshold of a Backup


Storage
This section describes how to modify the capacity alarm threshold of a backup
storage on ProtectManager. After the modification, the storage system reports an
alarm when the used capacity reaches the new threshold.

Prerequisites
You have added a backup storage.

Procedure
Step 1 On ProtectManager, choose System > Infrastructure > Backup Storage.
Step 2 Locate the row that contains the backup storage to be modified, and click More >
Modify Backup Storage.
Step 3 Modify the capacity alarm threshold.
Set the upper threshold of the used capacity of a bucket. When the used capacity
reaches the threshold, an alarm is reported.
Step 4 Click OK.

----End

4.2.4 Importing a Backup Storage Copy


ProtectManager allows you to import backup storage copies into the storage
system. If the storage system is faulty and a backup copy cannot be used for
restoration, connect the backup storage to another storage system. You can
import the metadata of a copy into a new storage system by importing the copy.
Then, the copy can be used for restoration.

Prerequisites
A backup storage has been added.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 75


OceanStor Dorado
CloudBackup Feature Guide 4 Managing CloudBackup

Precautions
After a backup storage copy is imported, all metadata in the copy is imported into
the storage system. The copy generation mode is changed from Backup to
Import.

Procedure
Step 1 Choose System > Infrastructure > Backup Storage.
Step 2 Click More next to a backup storage and select Import Backup Storage Copies.
Step 3 In the dialog box that is displayed, click OK.

----End

4.2.5 Deleting a Backup Storage


This section describes how to delete a backup storage on ProtectManager. After
the backup storage is deleted, you cannot use it to save backup data.

Prerequisites
● You have added a backup storage.
● The backup storage has not been added to an SLA.

Precautions
A backup storage cannot be restored after deletion.

Procedure
Step 1 On ProtectManager, choose System > Infrastructure > Backup Storage.
Step 2 Locate the row that contains the backup storage to be deleted, and click More >
Delete.
Step 3 In the displayed dialog box, click OK.

----End

4.3 Managing SLAs

4.3.1 Viewing an SLA


This section describes how to view the basic information and associated resources
of an SLA.

Procedure
Step 1 On ProtectManager, choose Protection > Protection Policies > SLAs.
Step 2 Click the name of an SLA.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 76


OceanStor Dorado
CloudBackup Feature Guide 4 Managing CloudBackup

The SLA details page is displayed.

Step 3 View the basic information and associated resources of the SLA.

----End

4.3.2 Cloning an SLA


This section describes how to clone an existing SLA and modify its parameters.

Procedure
Step 1 On ProtectManager, choose Protection > Protection Policies > SLAs.

Step 2 Locate the row that contains the SLA to be cloned, and click More > Clone.

The Clone page is displayed.

Step 3 Set SLA parameters. For details about the parameters, see 3.4.1 Creating a NAS
Protection SLA.

----End

4.3.3 Modifying an SLA


This section describes how to modify parameters of existing SLAs based on service
requirements.

Procedure
Step 1 On ProtectManager, choose Protection > Protection Policies > SLAs.

Step 2 Locate the row that contains the SLA to be modified, and click More > Modify.

The Modify page is displayed.

Step 3 Set SLA parameters. For details about the parameters, see 3.4.1 Creating a NAS
Protection SLA.
NOTE

The SLA name and automatic indexing function cannot be modified.

----End

4.3.4 Deleting an SLA


This section describes how to delete an SLA that is no longer used.

Precautions
● Deleted SLAs cannot be restored. Perform this operation only when necessary.
● An SLA that has been associated with resources cannot be deleted. To delete
the SLA, remove the resources associated with the SLA from protection first.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 77


OceanStor Dorado
CloudBackup Feature Guide 4 Managing CloudBackup

Procedure
Step 1 On ProtectManager, choose Protection > Protection Policies > SLAs.

Step 2 Locate the row that contains the SLA to be deleted, and click More > Delete.
NOTE

You can also select multiple SLAs and click Delete in the upper left corner to delete them in
batches.

Step 3 The Danger dialog box is displayed. Read the message carefully and perform
operations as required.

----End

4.4 Managing File System Resources

4.4.1 Viewing File System Information


This section describes how to view information about the file systems of the
storage system discovered by ProtectManager.

Prerequisites
File system resources of the storage system have been discovered by
ProtectManager.

Context
File systems created on the storage system can be automatically discovered by
ProtectManager and displayed on the Local File System page.

NOTE

● New file systems on the storage system can be discovered by ProtectManager after a
period of time.
● Currently, only file systems of the System_vStore can be discovered on ProtectManager.
● File systems discovered by ProtectManager cannot be deleted on ProtectManager.
● ProtectManager does not display WORM or clone file systems, or file systems of non-
UNIX security style.
● File systems whose names start with pvc_ are not displayed on ProtectManager.

Procedure
Step 1 Choose Protection > Storage > Local File System.

Step 2 In the local file system list, view the file system information.
1. Table 4-4 describes the details of a file system.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 78


OceanStor Dorado
CloudBackup Feature Guide 4 Managing CloudBackup

Table 4-4 Details of a file system


Parameter Description

Resource ID ID of the local file system.

Name Name of the local file system.

Storage Device Device name. The default value is CloudBackupStor-


age.

Tenant Tenant to which the file system belongs. The default


value is System_vStore.

SLAs If the local file system has been associated with an


SLA, the SLA name is displayed. Otherwise, -- is
displayed.

SLA Compliance Indicates whether a backup job is successfully


executed based on the specified backup interval or
backup time window. For example, if the backup time
of a backup job (except the first full backup) meets
the backup time window or backup interval
requirements and the backup job is executed
successfully, SLA compliance is met. If the backup
interval set in the SLA for a backup job is once every
half an hour, but the backup time exceeds half an
hour, SLA compliance is missed.

Protection Status Indicates whether the local file system is protected.


– Unprotected: The local file system is not associated
with an SLA.
– Protected: The local file system is associated with
an SLA.

2. Click the name of a local file system to view its Overview, Copy Data, and
Jobs.
– Overview
Displays the local file system name, SLA information, job execution time,
and total number of copies.
– Copy Data
You can search for copies by year, month, or day.
If is displayed below the time, a copy at that time exists.
– Jobs
Displays all jobs related to the local file system, including backup and
restore jobs. You can click Download to export the job list.
----End

4.4.2 Managing Protection Plans for File Systems


This section describes how to modify, remove, activate, or disable protection plans
of local file systems on ProtectManager.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 79


OceanStor Dorado
CloudBackup Feature Guide 4 Managing CloudBackup

Log in to ProtectManager, choose Protection > Storage > Local File System, and
locate the local file system to be operated.
Table 4-5 describes the operations.

Table 4-5 Operations on protection plans related to a local file system


Operation Description Navigation Path

Resource Scenario In the local file system


Scan If a file system is added to or deleted area, click Resource
from the storage system, it may take Scan.
about one minute for the
ProtectManager to discover the file
system change. If you want to
manually scan for file systems in the
current storage system, perform the
rescan operation.

Modify Scenario In the row where the


Protection To associate a file system with an SLA desired file system
again, you can modify the protection resides, choose More >
plan. After the modification, the next Modify Protection.
backup will be executed based on the
new protection plan.
Note
The modification does not affect the
protection job that is being executed.
The modified protection plan will
apply to the next protection period.

Remove Scenario In the row where the


Protection If a file system does not need to be desired file system
protected, you can remove its resides, choose More >
protection. After the protection is Remove Protection.
removed, the storage system cannot
execute protection jobs for the file
system. To protect the file system
again, you need to re-associate it with
an SLA.
Note
When the protection job of the file
system is running, the protection
cannot be removed.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 80


OceanStor Dorado
CloudBackup Feature Guide 4 Managing CloudBackup

Operation Description Navigation Path

Manual Scenario In the row where the


Backup This operation enables you to perform desired file system
a backup immediately. resides, choose More >
Manual Backup.
Note
Copies generated by manual backup
are retained for the duration defined in
the SLA.

Disable Scenario In the row where the


Protection If you do not need to perform periodic desired file system
protection for a file system resides, choose More >
temporarily, you can disable the Disable Protection.
protection plan of the file system.
After the protection plan is disabled,
the system does not automatically
back up the file system.
Note
Disabling protection does not affect
ongoing backup jobs.

Activate Scenario In the row where the


Protection After the protection plan of a file desired file system
system is disabled, you can activate resides, choose More >
the protection plan to make it take Activate Protection.
effect again. After the protection plan
is activated, the system backs up the
file system based on the protection
plan.
Note
This operation can be performed only
for a file system that has been
associated with an SLA and is in the
Unprotected state.

4.5 Managing Backup Copies

4.5.1 Viewing Backup Copies


After a file system is backed up, a backup copy is generated. This section describes
how to view details about the file system backup copy.

Procedure
Step 1 On ProtectManager, choose Explore > Copy Data > Local File System.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 81


OceanStor Dorado
CloudBackup Feature Guide 4 Managing CloudBackup

Step 2 View the copy information.


● Click Resource to view the copy information of the file system by resource. To
recover a file system in the event of data corruption or loss, you are advised
to click this icon and search for the copy at the desired point in time. Table
4-6 describes the parameters.

Table 4-6 Resource parameters


Parameter Description

Resources Name Name of the file system.

Location Location of the file system on the storage


system.

Status Indicates whether the file system is


discovered by ProtectManager.
– If yes, the status is Existing.
– If no, the status is Not existing.

Copy Quantity Total number of copies generated for the


file system.

● Click Copy to view all copy information by copy. When you must restore data
to the original location or a new location using a specified copy, you are
advised to click this icon and search for the copy. Table 4-7 describes the
parameters.

Table 4-7 Copy parameters


Parameter Description

Copy Copy Time Time when a copy was generated.


Click Copy Time to view the expiration time
and other information of the copy. If -- is
displayed for the expiration time, the copy is
retained permanently.

Status Copy status.


– Normal: The copy is available.
– Invalid: The copy is invalid.
– Deleting: The copy is being deleted.
– Restoring: The copy is being restored.

Location Name of the bucket on the backup storage


for storing copies.

Generation Mode in which a copy is generated. The


Mode value is Backup.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 82


OceanStor Dorado
CloudBackup Feature Guide 4 Managing CloudBackup

Parameter Description

Copy Type Backup type of a generated copy.


It can be Full Backup or Incremental
Backup.

Index Index status.


– Not indexed: The copy is not indexed.
– Indexed: The copy has been indexed.
– Indexing: The copy is being indexed.
– Deleting: The copy is being deleted.
– Deletion failed: The copy deletion fails.

Resources Name Name of the file system.

Location Location of the file system on the storage


system.

Status Indicates whether the file system is


discovered by ProtectManager.
– If yes, the status is Existing.
– If no, the status is Not existing.

----End

4.5.2 Modifying Copy Retention Policies


This section describes how to change the retention period of a copy by modifying
the copy retention policy.

Precautions
● The modified copy retention period is calculated from the time the
modification takes effect.
● If the expiration time T of any copy (except the latest one) in a copy chain is
reached, the copy and its dependent copies whose expiration time is earlier
than T are deleted in sequence.
NOTE

● A copy chain refers to a full copy and all its dependent incremental copies. If the
full copy does not have any dependent incremental copy, the full copy
independently forms a copy chain.
● The expiration of the latest copy chain cannot be triggered.

Procedure
Step 1 On ProtectManager, choose Explore > Copy Data > Local File System.

Step 2 Click the Copy tab, locate the row that contains the target copy, and choose More
> Modify Retention Policy.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 83


OceanStor Dorado
CloudBackup Feature Guide 4 Managing CloudBackup

The Modify Retention Policy page is displayed.


Step 3 You can set the retention period to xx days, xx weeks, xx months, xx years, or
permanently.

----End

4.5.3 Deleting Copies


This section describes how to delete a copy that is not required or is unavailable to
free up storage space.

Precautions
● Before deleting a copy, ensure that the copy is no longer used for restoration.
● Copies can be deleted when they are in the Invalid state, or in the Normal
state and are not indexed. Copies in other states cannot be deleted.
● After a copy is deleted, other copies that are dependent on the copy are also
deleted.
● Copies in the latest copy chain cannot be deleted (except that the latest copy
is the only copy).
NOTE

A copy chain refers to a full copy and all its dependent incremental copies. If the full
copy does not have any dependent incremental copy, the full copy independently
forms a copy chain.

Procedure
Step 1 On ProtectManager, choose Explore > Copy Data > Local File System.
Step 2 Click the Copy tab, locate the row that contains the target copy, and choose More
> Delete.
The Danger dialog box is displayed.
Step 3 Read the message carefully and perform operations as required.

----End

4.6 More Management Operations


On ProtectManager, you can click in the upper right corner and select Online
Help to view the online help of specific functions.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 84


OceanStor Dorado 5 Expanding the CloudBackup Containerized
CloudBackup Feature Guide Application

5 Expanding the CloudBackup


Containerized Application

If a CloudBackup containerized application is deployed on only part of the


controllers in a system, you can expand the application to all controllers that
support the container service.

NOTICE

Expanding the CloudBackup containerized application is risky. The containerized


application services may be interrupted during the expansion. When expanding
containerized applications, ensure that all parameters are correctly set.

Prerequisites
The CloudBackup containerized application exists in the system.

Procedure
Step 1 Check whether controllers are available for expansion of the CloudBackup
containerized application. If yes, go to the next step. If no, no further action is
required.
1. Check the number of controllers on which the CloudBackup containerized
application is deployed.
– In versions earlier than 6.1.5, run the show container_application
general name=? command and find the value of the global.replicas
field in the command output. For example, if global.replicas is 2, the
CloudBackup containerized application is deployed on two controllers.
– In 6.1.5 and later versions, run the show container_application general
name=? namespace=? command and find the value of the
global.replicas field in the command output. For example, if
global.replicas is 2, the CloudBackup containerized application is
deployed on two controllers.
2. Check the total number of controllers in the system.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 85


OceanStor Dorado 5 Expanding the CloudBackup Containerized
CloudBackup Feature Guide Application

You can run the show controller general command to query all controllers
and obtain the number of controllers that support the container service.
3. Check whether controllers are available for expansion of the CloudBackup
containerized application.
– If the number of controllers on which the CloudBackup containerized
application has been deployed is less than the total number of controllers
that support the container service, there are controllers available for
expansion. In this case, go to step 2.
– If the number of controllers on which the CloudBackup containerized
application has been deployed is equal to the total number of controllers
that support the container service, no controller is available for
expansion. In this case, no further action is required.

Step 2 Configure interface modules for the controllers you want to use to expand the
CloudBackup containerized application.

This operation includes interface module planning and configuration of the front-
end and back-end container modes. For details, see 3.2.3 Configuring Interface
Modules.

Step 3 Add the front-end container Ethernet ports of the controllers to be used for
expansion to the backupNetPlane network plane.
1. Choose System > Container Service > Network Planes.
2. Click the name of backupNetPlane. On the displayed page, click Add in the
Port area.
The Add Port page is displayed on the right.

3. Select one or more ports whose Logical Type is Container front-end and
Running Status is Link up from the controllers to be used for expansion, and
click OK.

Step 4 Check whether the number of IP addresses on the network plane meets the
requirements.
● Each controller requires at least two IP addresses. If the number of IP
addresses in the IP address segment is greater than or equal to the total
number of controllers on which the containerized application has been and
will be deployed, the requirements are met. In this case, skip this step.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 86


OceanStor Dorado 5 Expanding the CloudBackup Containerized
CloudBackup Feature Guide Application

● If the number of IP addresses in the IP address segment is smaller than the


total number of controllers on which the containerized application has been
and will be deployed, you must add an IP address segment.
– For version 6.1.3:
i. Choose System > Container Service > Network Planes.
ii. Click More on the right of backupNetPlane and select Modify.
The Modify Network Plane page is displayed.

iii. Modify IP Address Segment to ensure that the number of IP


addresses in the IP address segment meets the requirements.
iv. Click OK.
– For 6.1.5 and later versions:
i. Choose System > Container Service > Network Planes.
ii. Click More on the right of backupNetPlane and select Manage IP
Address Segment.
The Manage IP Address Segment page is displayed.

iii. Click Add to add IP address segment information. Table 5-1


describes the related parameters.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 87


OceanStor Dorado 5 Expanding the CloudBackup Containerized
CloudBackup Feature Guide Application

Table 5-1 Adding an IP address segment


Parameter Description

Name Name of the IP address segment to be added.


[Value range]
○ The name must be unique.
○ The name contains 1 to 255 characters.
Start IP Address Start IP address of the IP address segment to
be added.

End IP Address End IP address of the IP address segment to


be added.

Step 5 Expand the CloudBackup containerized application.


1. Log in to the CLI as an administrator or a super administrator.
2. Modify the deployment nodes of the CloudBackup containerized application
to expand the application.
Run the change container_application general name=? namespace=?
dynamic_config=global.replicas=? command to modify the deployment
nodes of the CloudBackup containerized application. The value of
global.replicas is the total number of controllers on which the containerized
application has been and will be deployed. The values of name and
namespace are the name and namespace of the current CloudBackup
containerized application, respectively.
Step 6 After the expansion is successful, verify that the CloudBackup containerized
application is normal.
● In versions earlier than 6.1.5, run the show container_application general
name=? command to check application details.
a. Check the value of global.replicas in the command output to verify that
the number of controllers for the application meets expectation. For
example, if the value of global.replicas is 2 before expansion and the
number of controllers used for expansion is 2, the value of
global.replicas after expansion should be 4.
b. Check the Pod Status field in the command output to determine the
status of the CloudBackup containerized application. If Pod Status is
Running, the CloudBackup containerized application is running properly.
● In 6.1.5 and later versions, run the show container_application general
name=? namespace=? command to check application details.
a. Check the value of global.replicas in the command output to verify that
the number of controllers for the application meets expectation. For
example, if the value of global.replicas is 2 before expansion and the
number of controllers used for expansion is 2, the value of
global.replicas after expansion should be 4.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 88


OceanStor Dorado 5 Expanding the CloudBackup Containerized
CloudBackup Feature Guide Application

b. Check the Pod Status field in the command output to determine the
status of the CloudBackup containerized application. If Pod Status is
Running, the CloudBackup containerized application is running properly.

----End

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 89


OceanStor Dorado
CloudBackup Feature Guide A Concepts Related to the Container Service

A Concepts Related to the Container


Service

Based on iSulad and Kubernetes, the container service provides full-stack


container capabilities, such as full-lifecycle management, containerized application
chart, application scheduling, monitoring, and O&M, offering a one-stop container
platform for users. Table A-1 describes the concepts related to the container
service.

Table A-1 Concepts related to the container service


Concept Description

Pod Pods are the smallest and most basic deployable


objects in Kubernetes. A pod encapsulates
multiple application containers (or, in some
cases, one container), storage resources, one or
more unique network IP addresses, and options
that govern how the containers should run.

Cluster Nodes where container services are deployed


and resource combination on each node.

Node Each node corresponds to a controller.


Containerized applications run on nodes. The
agent program (kubelet) runs on each node to
manage container pods on the node. The
number of nodes in a cluster can be changed.

Namespace A namespace is an abstract collection of


resources and objects. Multiple namespaces can
be created in a single cluster and data in
different namespaces is isolated from each
other. This enables namespaces to share the
same cluster services without affecting each
other.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 90


OceanStor Dorado
CloudBackup Feature Guide A Concepts Related to the Container Service

Concept Description

Container A container is a running instance of an iSulad


image. Multiple containers can run on one node.
A container is essentially a process. Unlike a
process directly executed on a host, the
container process runs in its own independent
namespace.

Network plane A network plane is a type of user-defined


resources of a cluster. It provides configuration
items, such as the subnet, port, VLAN, and route,
for the front-end service network of a container.

Front-end container mode Mode of the interface module, which is used for
communication between the host and container.

Back-end container mode Mode of the interface module, which is used for
communication between the container and
storage system.

Helm chart Chart is a packaging format used by Helm. It is


a collection of files that describe a group of
Kubernetes resources. A single chart can be used
to deploy something simple, like a memcached
Pod, or something complex, like a full web app
stack with HTTP servers, databases, caches, and
so on.

Container image The container image creates an industry


standard for packaging containerized
applications and is used to create iSulad
containers. In other words, the container image
is a special file system that includes everything
needed to run containers: programs, libraries,
resources, and configuration files. It also
contains configuration parameters (such as
anonymous volumes, environment variables, and
users) required within a container runtime. The
image does not contain dynamic data, and its
content will not be modified after construction.
NOTE
The relationship between the image and container is
similar to that between the class and instance in the
object-oriented program design. An image provides a
static definition, and a container is the entity of the
image that is running. Containers can be created,
started, stopped, deleted, and suspended.

Image storage pool A storage pool used to store container images


and Helm charts.
NOTE
The imported container images and Helm charts must
meet the compatibility requirements of the storage
system.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 91


OceanStor Dorado
CloudBackup Feature Guide A Concepts Related to the Container Service

Concept Description

Application storage pool A storage pool used to store persistent volumes


of containerized applications.

iSulad iSulad is a lightweight container runtime


daemon designed for IoT and cloud
infrastructure. The iSulad is lightweight, fast,
and free from hardware specifications or
architecture restrictions. Therefore, it can be
widely used.

Kubernetes Kubernetes is a portable and scalable open-


source platform for managing containerized
workloads and services, facilitating declarative
configuration and automation.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 92


OceanStor Dorado
CloudBackup Feature Guide B How to Obtain Help

B How to Obtain Help

If a tough or critical problem persists in routine maintenance or troubleshooting,


contact Huawei technical support.

B.1 Preparations for Contacting Huawei


To better resolve the fault, you are advised to collect troubleshooting information
and make debugging preparations before contacting Huawei.

B.1.1 Collecting Troubleshooting Information


You need to collect troubleshooting information before troubleshooting.
You need to collect the following information:
● Name and address of the customer
● Contact person and telephone number
● Time when the fault occurred
● Description of the fault phenomena
● Device type and software version
● Measures taken after the fault occurs and the related results
● Troubleshooting level and required solution deadline

B.1.2 Making Debugging Preparations


When you contact Huawei for help, the technical support engineer of Huawei
might assist you to do certain operations to collect information about the fault or
rectify the fault directly.
Before contacting Huawei for help, you need to prepare the boards, port modules,
screwdrivers, screws, cables for serial ports, network cables, and other required
materials.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 93


OceanStor Dorado
CloudBackup Feature Guide B How to Obtain Help

B.2 How to Use the Document


Huawei provides guide documents shipped with the device. The guide documents
can be used to handle the common problems occurring in daily maintenance or
troubleshooting.
To better solve the problems, use the documents before you contact Huawei for
technical support.

B.3 How to Obtain Help from Website


Huawei provides users with timely and efficient technical support through the
regional offices, secondary technical support system, telephone technical support,
remote technical support, and onsite technical support.
Contents of the Huawei technical support system are as follows:
● Huawei headquarters technical support department
● Regional office technical support center
● Customer service center
● Technical support website: https://support.huawei.com/enterprise/
You can query how to contact the regional offices at https://
support.huawei.com/enterprise/.

B.4 Ways to Contact Huawei


Huawei Technologies Co., Ltd. provides customers with comprehensive technical
support and service. For any assistance, contact our local office or company
headquarters.
Huawei Technologies Co., Ltd.
Address: Huawei Industrial Base Bantian, Longgang Shenzhen 518129 People's
Republic of China
Post code: 518129
Website: https://e.huawei.com/

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 94


OceanStor Dorado
CloudBackup Feature Guide C Glossary

C Glossary

A
AC power module The module that transfers the external AC power
supply into the power supply for internal use.
Application server A service processing node (a computer device) on the
network. Application programs of data services run
on the application server.
Asynchronous remote A kind of remote replication. When the data at the
replication primary site is updated, the data does not need to be
updated synchronously at the mirroring site to finish
the update. In this way, performance is not reduced
due to data mirroring.
Air baffle It optimizes the ventilation channels and improves
the heat dissipation capability of the system.
Audit log guarantee A mode for recording audit logs. This mode
mode preferentially ensures that the audit log function is
normal and no audit log is missing.
Audit log non- A mode for recording audit logs. In this mode,
guarantee mode services are running properly. Audit logs may be
missing.

B
Backup A collection of data stored on (usually removable)
non-volatile storage media for purposes of recovery
in case the original copy of data is lost or becomes
inaccessible; also called a backup copy. To be useful
for recovery, a backup must be made by copying the
source data image when it is in a consistent state.
The act of creating a backup.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 95


OceanStor Dorado
CloudBackup Feature Guide C Glossary

Backup window An interval of time during which a set of data can be


backed up without seriously affecting applications
that use the data.
Bandwidth The numerical difference between the upper and
lower frequencies of a band of electromagnetic
radiation. A deprecated synonym for data transfer
capacity that is often incorrectly used to refer to
throughput.
Baud rate The maximum rate of signal state changes per
second on a communications circuit. If each signal
state change corresponds to a code bit, then the
baud rate and the bit rate are the same. It is also
possible for signal state changes to correspond to
more than one code bit, so the baud rate may be
lower than the code bit rate.
Bit error An incompatibility between a bit in a transmitted
digital signal and the corresponding bit in the
received digital signal.
Bit error rate The probability that a transmitted bit will be
erroneously received. The bit error rate (BER) is
measured by counting the number of bits in error at
the output of a receiver and dividing by the total
number of bits in the transmission. BER is typically
expressed as a negative power of 10.
Bonding Bonding of multiple independent physical network
ports into a logical port, which ensures the high
availability of server network connections and
improves network performance.
Boundary scan A test methodology that uses shift registers in the
output connections of integrated circuits (ICs). One IC
is often connected to the next IC. A data pattern is
passed through the chain and the observed returned
data stream affected by the circuit conditions gives
an indication of any faults present. The system is
defined under IEEE standard 1149.1 and is also
known as Joint Test Action Group (JTAG).
Browser/Server Architecture that defines the roles of the browser and
server. The browser is the service request party and
the server is the service provider.
Built-in FRU Alarm It indicates errors on the built-in FRUs of a controller,
indicator such as errors on fans or memory modules.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 96


OceanStor Dorado
CloudBackup Feature Guide C Glossary

C
Cache hit ratio The ratio of the number of cache hits to the number
of all I/Os during a read task, usually expressed as a
percentage.
Captive screw Specially designed to lock into place on a parent
board or motherboard, allowing for easy installation
and removal of attached pieces without release of
the screw.
Challenge Handshake A password-based authentication protocol that uses a
Authentication challenge to verify that a user has access rights to a
Protocol system. A hash of the supplied password with the
challenge is sent for comparison so the cleartext
password is never sent over the connection.
Compliance mode A protection mode of WORM. In compliance mode,
files within their protection period cannot be changed
or deleted by either the file user or by the system
administrator. Files with expired protection periods
can be deleted but not changed by the file user or
the system administrator.
Controller The control logic in a disk or tape that performs
command decoding and execution, host data transfer,
serialization and deserialization of data, error
detection and correction, and overall management of
device operations. The control logic in a storage
subsystem that performs command transformation
and routing, aggregation (RAID, mirroring, striping, or
other), high-level error recovery, and performance
optimization for multiple storage devices.
Controller enclosure An enclosure that accommodates controllers and
provides storage services. It is the core component of
a storage system and generally consists of
components, such as controllers, power supplies, and
fans.
Copying A pair state. The state indicates that the source LUN
data is being synchronized to the target LUN.
Container root Space used to store the metadata for running
directory container images and container instances.
Container image An image is a special file system, which provides the
programs, libraries, resources, and configuration files
required for running containers. It also contains
configuration parameters, for example, for
anonymous disks, environment variables, and users.
The image does not contain dynamic data, and its
content will not be modified after construction.
Containerized An image can start multiple containers, and an
application application can contain one or a group of containers.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 97


OceanStor Dorado
CloudBackup Feature Guide C Glossary

Container node Controller that runs the container service.


Configuration item list A series of modifiable configuration items defined in
the Helm chart of the container.
Container service Containerized application management service, which
manages the lifecycle of containerized applications.
CloudVxLAN CloudVxLAN is a feature that uses the Virtual
eXtensible Local Area Network (VxLAN) technology,
which allows storage systems to directly connect to
the VPC network and become a part of Huawei Cloud
Stack for unified management and maintenance,
greatly simplifying O&M.

D
Data compression The process of encoding data to reduce its size. Lossy
compression (i.e., compression using a technique in
which a portion of the original information is lost) is
acceptable for some forms of data (e.g., digital
images) in some applications, but for most IT
applications, lossless compression (i.e., compression
using a technique that preserves the entire content of
the original data, and from which the original data
can be reconstructed exactly) is required.
Data flow A process that involves processing data extracted
from the source system. These processes include:
filtering, integration, calculation, and summary,
finding and solving data inconsistency, and deleting
invalid data so that the processed data meets the
requirements of the destination system for the input
data.
Data migration A movement of data or information between
information systems, formats, or media. Migration is
performed for reasons such as possible decay of
storage media, obsolete hardware or software
(including obsolete data formats), changing
performance requirements, the need for cost
efficiencies etc.
Data source A system, database (database user; database
instance), or file that can make BOs persistent.
Deduplication The replacement of multiple copies of data — at
variable levels of granularity — with references to a
shared copy in order to save storage space and/or
bandwidth.
Dirty data Data that is stored temporarily on the cache and has
not been written onto disks.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 98


OceanStor Dorado
CloudBackup Feature Guide C Glossary

Disaster recovery The recovery of data, access to data and associated


processing through a comprehensive process of
setting up a redundant site (equipment and work
space) with recovery of operational data to continue
business operations after a loss of use of all or part
of a data center. This involves not only an essential
set of data but also an essential set of all the
hardware and software to continue processing of that
data and business. Any disaster recovery may involve
some amount of down time.
Disk array A set of disks from one or more commonly accessible
disk subsystems, combined with a body of control
software. The control software presents the disks'
storage capacity to hosts as one or more virtual disks.
Control software is often called firmware or
microcode when it runs in a disk controller. Control
software that runs in a host computer is usually
called a volume manager.
Disk domain A disk domain consists of the same type or different
types of disks. Disk domains are isolated from each
other. Therefore, services carried by different disk
domains do not affect each other in terms of
performance and faults (if any).
Disk enclosure Consists of the following parts in redundancy:
expansion module, disk, power module, and fan
module. System capacity can be expanded by
cascading multiple disk enclosures.
Disk location The process of locating a disk in the storage system
by determining the enclosure ID and slot ID of the
disk.
Disk utilization The percentage of used capacity in the total available
capacity.

E
eDevLUN Logical storage array space created by a third-party
storage array.
Expansion module A component used for expansion.
Expansion Connects a storage system to more disk enclosures
through connection cables, expanding the capacity of
the storage system.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 99


OceanStor Dorado
CloudBackup Feature Guide C Glossary

Enhanced Direct Enhanced Direct Connect automatically manages


Connect Huawei hardware switches and provides Layer 3
interconnection between private IP addresses in your
cloud and networks outside the cloud. The
networking type and data plane are optimized based
on the original hardware Direct Connect. You can
select the firewall interconnection mode and
networking type to suit your business needs in
different scenarios.

F
Field replaceable unit A unit or component of a system that is designed to
be replaced in the field, i.e., without returning the
system to a factory or repair depot. Field replaceable
units may either be customer-replaceable or their
replacement may require trained service personnel.
Firmware Low-level software for booting and operating an
intelligent device. Firmware generally resides in read-
only memory (ROM) on the device.
Flash Translation Layer Flash Translation Layer (FTL) organizes and manages
host data, enables host data to be allocated to NAND
flash chips of SSDs in an orderly manner, maintains
the mapping relationship between logical block
addresses (LBAs) and physical block addresses
(PBAs), and implements garbage collection, wear
leveling, and bad block management.
Front-end port The port that connects the controller enclosure to the
service side and transfers service data. Front-end port
types are Fibre Channel and iSCSI.
Front-end interconnect On a storage device, all controllers share the front-
I/O module (FIM) end interface modules.

G
Garbage collection The process of reclaiming resources that are no
longer in use. Garbage collection has uses in many
aspects of computing and storage. For example, in
flash storage, background garbage collection can
improve write performance by reducing the need to
perform whole block erasures prior to a write.
Gateway A device that receives data via one protocol and
transmits it via another.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 100


OceanStor Dorado
CloudBackup Feature Guide C Glossary

Global garbage With a view to defragmentation of storage arrays


collection and garbage collection of disks, global garbage
collection reduces garbage of disks by enabling
storage arrays to inform disks of not implementing
invalid data relocation and of controlling space
release so that disks and controllers consume less
space, reducing costs and prolonging the useful life
of storage arrays.
Global system for The second-generation mobile networking standard
mobile defined by the European Telecommunications
communications Standards Institute (ETSI). It is aimed at designing a
standard for global mobile phone networks. GSM
consists of three main parts: mobile switching
subsystem (MSS), base station subsystem (BSS), and
mobile station (MS).
Global wear leveling With a view to individual characteristics of a single
disk, global wear leveling uses space allocation and
write algorithms to achieve wear leveling among
disks, preventing a disk from losing efficacy due to
excessive writes and prolonging the useful life of the
disk.

H
Hard disk tray The tray that bears the hard disk.
Heartbeat Heartbeat supports node communication, fault
diagnosis, and event triggering. Heartbeats are
protocols that require no acknowledgement. They are
transmitted between two devices. The device can
judge the validity status of the peer device.
Hit ratio The ratio of directly accessed I/Os from the cache to
all I/Os.
Hot swap The substitution of a replacement unit (RU) in a
system for a defective unit, where the substitution
can be performed while the system is performing its
normal functioning normally. Hot swaps are physical
operations typically performed by humans.
HyperMetro A value-added service of storage systems.
HyperMetro means two datasets (on two storage
systems) can provide storage services as one dataset
to achieve load balancing among applications and
failover without service interruption.
HyperMetro domain A HyperMetro configuration object generally; made
up of two storage arrays and one quorum server.
HyperMetro services can be created on a HyperMetro
domain.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 101


OceanStor Dorado
CloudBackup Feature Guide C Glossary

HyperMetro vStore A HyperMetro vStore pair consists of two vStores,


pair that is, two tenants. After a HyperMetro relationship
is set up for a pair of vStores, the datasets in the two
vStores work in redundancy mode and provide
storage services in one dataset view, achieving hitless
service failover.
HyperMetro-Inner On an eight-controller network, with HyperMetro-
Inner, continuous mirroring, back-end global sharing,
and three-copy technologies, a storage system can
tolerate one-by-one failures of seven controllers
among eight controllers, concurrent failures of two
controllers, and failure of a controller enclosure.
HyperDetect HyperDetect is a feature that provides ransomware
detection.
Handle A handle resides on the structural part of a module. It
is used to insert or remove a module into or from a
chassis, not helpful in saving efforts.
Helm chart A Helm chart is in TAR format. It is similar to the deb
package of APT or the rpm package of Yum. It
contains a group of yaml files that define Kubernetes
resources.

I
In-band management The management control information of the network
and the carrier service information of the user
network are transferred through the same logical
channel. In-band management enables users to
manage storage arrays through commands.
Management commands are sent through service
channels, such as I/O write and read channels. The
advantages of in-band management include high
speed, stable transfer, and no additional
management network ports required.
Initiator The system component that originates an I/O
command over an I/O interconnect. The endpoint
that originates a SCSI I/O command sequence. I/O
adapters, network interface cards, and intelligent I/O
interconnect control ASICs are typical initiators.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 102


OceanStor Dorado
CloudBackup Feature Guide C Glossary

I/O Shorthand for input/output. I/O is the process of


moving data between a computer system's main
memory and an external device or interface such as a
storage device, display, printer, or network connected
to other computer systems. This encompasses
reading, or moving data into a computer system's
memory, and writing, or moving data from a
computer system's memory to another location.
Intelligent ransomware The system detects known ransomware features to
detection identify whether the file systems are attacked by
ransomware. If no ransomware attack is identified,
the system analyzes and compares the changes in file
system snapshots, and uses machine learning
algorithms to further check whether the file systems
are infected by ransomware.
Interface module A replaceable field module that accommodates the
service or management ports.

L
Load balance A method of adjusting the system, application
components, and data to averagely distribute the
applied I/Os or computing requests to physical
resources of the system.
Logical unit The addressable entity within a SCSI target that
executes I/O commands.
Logical unit number The SCSI identifier of a logical unit within a target.
Industry shorthand, when phrased as "LUN", for the
logical unit indicated by the logical unit number.
LUN formatting The process of writing 0 bits in the data area of the
logical drive and generating related parity bits so that
the logical drive can be in the ready state.
LUN mapping A storage system maps LUNs to application servers
so that application servers can access storage
resources.
LUN migration A method for the LUN data to migrate between
different physical storage spaces while ensuring data
integrity and uninterrupted operation of host
services.
LUN snapshot A type of snapshot created for a LUN. This snapshot
is both readable and writable and is mainly used to
provide a snapshot LUN from point-in-time LUN
data.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 103


OceanStor Dorado
CloudBackup Feature Guide C Glossary

Lever A lever resides on the structural part of a module. It


is used to insert or remove a module into or from a
chassis, saving efforts.
Local image repository A private repository used to store the container
images and Helm charts imported by users. It is
different from the standard image repository. The
imported images and Helm charts must meet the
compatibility requirements of the system.

M
Maintenance terminal A computer connected through a serial port or
management network port. It maintains the storage
system.
Management interface The module that integrates one or more
module management network ports.
Management network An entity that provides means to transmit and
process network management information.
Management network The network port on the controller enclosure
port connected to the maintenance terminal. It is provided
for the remote maintenance terminal. Its IP address
can be modified with the change of the customer's
environment.

N
NVM Express A host controller interface with a register interface
and command set designed for PCI Express-based
SSDs.
NVMe SSD A solid state disk (SSD) with a non-volatile memory
express (NVMe) interface. Compared with other
SSDs, such SSDs can deliver higher performance and
shorter latency.

O
Out-of-band A management mode used during out-of-band
management networking. The management and control
information of the network and the bearer service
information of the user network are transmitted
through different logical channels.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 104


OceanStor Dorado
CloudBackup Feature Guide C Glossary

P
Power failure When an external power failure occurs, the AC PEM
protection depends on the battery for power supply. This
ensures the integrity of the dirty data in the cache.
Pre-copy When the system monitors a failing member disk in a
RAID group, the system copies the data from the disk
to a hot spare disk in advance.
Palm-sized NVMe SSD A palm-sized NVMe SSD is a type of NVMe SSD of
which the dimensions (H x W x D) are 160 mm x 79.8
mm x 9.5 mm (neither 3.5-inch nor 2.5-inch).

Q
Quorum server A server that can provide arbitration services for
clusters or HyperMetro to prevent the resource access
conflicts of multiple application servers.
Quorum Server Mode A HyperMetro arbitration mode. When a HyperMetro
arbitration occurs, the quorum server decides which
site wins the arbitration.

R
RAID level The application of different redundancy types to a
logical drive. A RAID level improves the fault
tolerance or performance of the logical drive but
reduces the available capacity of the logical drive.
You must specify a RAID level for each logical drive.
Ransomware file When launching attacks, ransomware usually
interception generates encrypted files with special file name
extensions. In light of this, the system intercepts the
write to files with specific file name extensions to
block the extortion from known ransomware and
protect file systems in the storage system.
Real-time ransomware Ransomware has similar I/O behavior characteristics.
detection By analyzing file I/O behavior characteristics, the
system quickly filters out abnormal files and
performs deep content analysis on the abnormal files
to detect files attacked by ransomware. Then, secure
snapshots are created for file systems where files
have been attacked, and alarms are reported to
notify the data protection administrator, limiting the
impact of ransomware and reducing losses.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 105


OceanStor Dorado
CloudBackup Feature Guide C Glossary

Reconstruction The regeneration and writing onto one or more


replacement disks of all of the user data and check
data from a failed disk in a mirrored or RAID array. In
most arrays, a rebuild can occur while applications
are accessing data on the array's virtual disks.
Redundancy The inclusion of extra components of a given type in
a system (beyond those required by the system to
carry out its function) for the purpose of enabling
continued operation in the event of a component
failure.
Remote replication A core technology for disaster recovery and a
foundation that implements remote data
synchronization and disaster recovery. This
technology remotely maintains a set of data mirrors
through the remote data connection function of the
storage devices that are separated in different places.
Even when a disaster occurs, the data backup on the
remote storage device is not affected. Remote
replication can be divided into synchronous remote
replication and asynchronous remote replication.
Reverse The process of restoring data from the redundancy
synchronization machine (RM) when the services of the production
machine (PM) are recovering.
Route The path that network traffic takes from its source to
its destination. On a TCP/IP network, each IP packet
is routed independently. Routes can change
dynamically.

S
Script A parameterized list of primitive I/O interconnect
operations intended to be executed in sequence.
Often used with respect to ports, most of which are
able to execute scripts of I/O commands
autonomously (without policy processor assistance).
A sequence of instructions intended to be parsed and
carried out by a command line interpreter or other
scripting language. Perl, VBScript, JavaScript and Tcl
are all scripting languages.
Serial port An input/output location (channel) that sends and
receives data (one bit at a time) to and from the CPU
of a computer or a communications device. Serial
ports are used for serial data communication and as
interfaces for some peripheral devices, such as mouse
devices and printers.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 106


OceanStor Dorado
CloudBackup Feature Guide C Glossary

Service data The user and/or network information required for the
normal functioning of services.
Service network port The network port that is used to store services.
Simple network An IETF protocol for monitoring and managing
management protocol systems and devices in a network. The data being
monitored and managed is defined by an MIB. The
functions supported by the protocol are the request
and retrieval of data, the setting or writing of data,
and traps that signal the occurrence of events.
Single point of failure One component or path in a system, the failure of
which would make the system inoperable.
Slot A position defined by an upper guide rail and the
corresponding lower guide rail in a frame. A slot
houses a board.
Small computer system A collection of ANSI standards and proposed
interface standards that define I/O interconnects primarily
intended for connecting storage subsystems or
devices to hosts through host bus adapters. Originally
intended primarily for use with small (desktop and
desk-side workstation) computers, SCSI has been
extended to serve most computing needs, and is
arguably the most widely implemented I/O
interconnect in use today.
Snapshot A point in time copy of a defined collection of data.
Clones and snapshots are full copies. Depending on
the system, snapshots may be of files, LUNs, file
systems, or any other type of container supported by
the system.
Snapshot copy A copy of a snapshot LUN.
Source LUN The LUN where the original data is located.
Static Priority Mode A HyperMetro arbitration mode. When a HyperMetro
arbitration occurs, the preferred site always wins the
arbitration.
Storage system An integrated system that consists of the following
parts: controller, storage array, host bus adapter,
physical connection between storage units, and all
control software.
Storage unit An abstract definition of backup storage media for
storing backup data. The storage unit is connected to
the actual storage media used to back up data.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 107


OceanStor Dorado
CloudBackup Feature Guide C Glossary

Streaming media Streaming media is media continuously streamed


over the network. Combining technologies
concerning streaming media data collection,
compression, encoding, storage, transmission,
playback, and network communications, streaming
media can provide high-quality playback effects in
real time at low bandwidth.
Subnet A type of smaller network that forms a larger
network according to a rule, such as, forming a
network according to different districts. This
facilitates the management of a large network.
Smart disk enclosure Being compared with traditional disk enclosures, the
smart disk enclosures are equipped with Arm chips
and DDR memories or other computing modules to
achieve powerful computing capabilities. With such
capabilities, the smart disk enclosures can help
controllers to share some computing loads,
accelerating data processing.
Share authentication During vStore configuration synchronization, the
share authentication information (including the share
information and domain controller configuration) is
synchronized to the secondary end.

T
Target The endpoint that receives a SCSI I/O command
sequence.
Target LUN The LUN on which target data resides.
Thin LUN A logic disk that can be accessed by hosts. It
dynamically allocates storage resources from the thin
pool according to the actual capacity requirements of
users.
Topology The logical layout of the components of a computer
system or network and their interconnections.
Topology deals with questions of what components
are directly connected to other components from the
standpoint of being able to communicate. It does not
deal with questions of physical location of
components or interconnecting cables. The
communication infrastructure that provides Fibre
Channel communication among a set of PN_Ports
(e.g., a Fabric, an Arbitrated Loop, or a combination
of the two).

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 108


OceanStor Dorado
CloudBackup Feature Guide C Glossary

Trim A method by which the host operating system may


inform a storage device of data blocks that are no
longer in use and can be reclaimed. Many storage
protocols support this functionality via various
names, e.g., ATA TRIM and SCSI UNMAP.

U
User interface The space where users interact with a machine.
U-shaped bracket It is an optional structural part like letter "U". It is
located between the mounting ear of a chassis and
the mounting bar of a cabinet or bay and is used to
adjust the locations of the chassis and mounting bar
of the cabinet or bay.

W
Wear leveling A set of algorithms utilized by a flash controller to
distribute writes and erases across the cells in a flash
device. Cells in flash devices have a limited ability to
survive write cycles. The purpose of wear leveling is
to delay cell wear out and prolong the useful life of
the overall flash device.
Write amplification Increase in the number of write operations by the
device beyond the number of write operations
requested by hosts.
Write amplification The ratio of the number of write operations on the
factor device to the number of write operations requested
by the host.
Write back A caching technology in which the completion of a
write request is signaled as soon as the data is in the
cache. Actual writing to non-volatile media occurs at
a later time. Write back includes inherent risks: an
application will take action predicated on the write
completion signal, and a system failure before the
data is written to non-volatile media will cause
media contents to be inconsistent with that
subsequent action. For these reasons, sufficient write
back implementations include mechanisms to
preserve cache contents across system failures
(including power failures) and a flushed cache at
system restart time.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 109


OceanStor Dorado
CloudBackup Feature Guide C Glossary

Write Once Read Many A type of storage, designed for fixed content, that
preserves what is written to it in an immutable
fashion. Optical disks are an example of WORM
storage.
Write through A caching technology in which the completion of a
write request is not signaled until data is safely
stored on non-volatile media. Write performance
equipped with the write through technology is
approximately that of a non-cached system. However,
if the written data is also held in a cache, subsequent
read performance may be dramatically improved.

Z
Zone A collection of Fibre Channel N_Ports and/or
NL_Ports (i.e., device ports) that are permitted to
communicate with each other via the fabric. Any two
N_Ports and/or NL_Ports that are not members of at
least one common zone are not permitted to
communicate via the fabric. Zone membership may
be specified by: 1) port location on a switch, (i.e.,
Domain_ID and port number); or, 2) the device's
N_Port_Name; or, 3) the device's address identifier;
or, 4) the device's Node_Name. Well-known
addresses are implicitly included in every zone.

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 110


OceanStor Dorado
CloudBackup Feature Guide D Acronyms and Abbreviations

D Acronyms and Abbreviations

A
AWS Amazon Web Services

C
CLI Command Line Interface

F
FC Fibre Channel

G
GUI Graphical User Interface

I
IP Internet Protocol

L
LUN Logical Unit Number

N
NAS Network Attached Storage
NFS Network File System

W
WWN World Wide Name
WWPN World Wide Port Name

Issue 06 (2023-10-31) Copyright © Huawei Technologies Co., Ltd. 111

You might also like