Вы находитесь на странице: 1из 281

e

ut
ib
tr
is
D
Veeam Certified or
Engineer v9.5
e
at
lic
up

Textbook
D
ot
N
o
D

Licensed to: Ivo Mayer - ivo.mayer@axians.it


e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N

© 2019 Veeam Software

All rights reserved. All trademarks are the property of their respective owners.
o

No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in
D

any form by any means, without written permission from Veeam Software Inc (Veeam). The information contained in this document
represents the current view of Veeam on the issue discussed as of the date of publication and is subject to change without notice.
Veeam shall not be liable for technical or editorial errors or omissions contained herein. Veeam makes no warranties, express or
implied, in this document. Veeam may have patents, patent applications, trademark, copyright, or other intellectual property rights
covering the subject matter of this document. All other trademarks mentioned herein are the property of their respective owners. Except
as expressly provided in any written license agreement from Veeam, the furnishing of this document does not give you any license to
these patents, trademarks, copyrights, or other intellectual property.

Important! Please read the End User Software License Agreement before using the accompanying software program(s). Using
any part of the software indicates that you accept the terms of the End User Software License Agreement.

Revision: 20190101

Licensed to: Ivo Mayer - ivo.mayer@axians.it


Table of Contents

Contents
1. Overview .................................................................................................................................. 1
1.1. Veeam Products .................................................................................................................. 1
1.1.1. Veeam Availability Suite Capabilities .......................................................................... 1
1.1.2. Veeam Backup & Replication ...................................................................................... 2
1.1.3. Veeam ONE ................................................................................................................ 2
1.1.4. Veeam Management Pack for System Center ............................................................ 2

e
1.1.5. The Veeam Backup & Replication Add-on for Kaseya ................................................ 3
1.1.6. Veeam Backup & Replication Plug-in for LabTech ..................................................... 3

ut
1.2. Key Concepts ....................................................................................................................... 3
1.2.1. Key Concepts .............................................................................................................. 4

ib
1.3. Course Overview ................................................................................................................. 4
2. Deployment ............................................................................................................................. 7

tr
2.1. Core Components and Their Interaction ........................................................................... 7
2.1.1. Veeam Backup Server ................................................................................................ 7

is
2.1.2. Veeam Backup Proxy (VMware) ................................................................................. 8
2.1.3. Veeam Backup Proxy (Hyper-V) ............................................................................... 16

D
2.1.4. Backup Repository .................................................................................................... 23
2.2. Optional Components ....................................................................................................... 34
or
2.2.1. Veeam Backup Enterprise Manager ......................................................................... 34
2.2.2. U-AIR Wizard ............................................................................................................ 34
2.2.3. Veeam Backup Search .............................................................................................. 35
e
2.3. Deployment Scenarios ...................................................................................................... 35
at

2.3.1. Simple Deployment ................................................................................................... 35


2.3.2. Advanced Deployment .............................................................................................. 37
lic

2.3.3. Distributed Deployment ............................................................................................. 40


2.3.4. Distributed Architecture ............................................................................................. 41
2.4. Prerequisites & System Requirements ........................................................................... 43
up

2.4.1. Requirements ............................................................................................................ 43


2.4.2. Platform Support ....................................................................................................... 43
2.4.3. System Requirements ............................................................................................... 47
D

2.4.4. Required Permissions ............................................................................................... 58


2.5. Upgrading Veeam Backup & Replication ........................................................................ 59
ot

2.5.1. Before You Upgrade .................................................................................................. 59


2.5.2. After You Upgrade ..................................................................................................... 59
Labs for Module 2: Deployment .............................................................................................. 61
N

3. Initial Configuration .............................................................................................................. 63


3.1. Adding Servers .................................................................................................................. 63
o

3.1.1. Adding a VMware Backup Proxy ............................................................................... 64


D

3.1.2. Adding Backup Repositories ..................................................................................... 64


3.2. Data location tagging ........................................................................................................ 65
3.2.1. Locations ................................................................................................................... 65
3.2.2. Creating and Assigning Locations ............................................................................. 67
3.2.3. Editing Locations ....................................................................................................... 67
3.2.4. Deleting Locations ..................................................................................................... 67
3.2.5. Exporting and Importing Locations List ..................................................................... 68
3.3. Performing Configuration Backup and Restore ............................................................. 68

Veeam Certified Engineer v9.5 . Textbook i


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Table of Contents

3.3.1. Creating Configuration Backups ................................................................................ 68


3.3.2. Restoring Configuration Data .................................................................................... 69
3.3.3. Encrypted Configuration Backups ............................................................................. 70
3.4. Managing Network Traffic ................................................................................................. 71
3.4.1. Setting Network Traffic Throttling Rules .................................................................... 71
3.4.2. Managing Data Transfer Connections ....................................................................... 71
3.4.3. Preferred Networks ................................................................................................... 72
3.4.4. Network Traffic Encryption ........................................................................................ 73
3.5. General options ................................................................................................................. 73

e
3.5.1. Backup I/O control ..................................................................................................... 73

ut
3.5.2. Global Notification Settings ....................................................................................... 74
3.6. Getting to Know User Interface ........................................................................................ 75
3.6.1. Main Menu ................................................................................................................. 75

ib
3.6.2. Navigation Pane ........................................................................................................ 75
3.6.3. Ribbon and Tabs ....................................................................................................... 76

tr
3.6.4. Views ......................................................................................................................... 76

is
3.6.5. Working Area ............................................................................................................. 78
Labs for Module 3: Initial Configuration ................................................................................. 79

D
4. Protect ................................................................................................................................... 81
4.1. 3-2-1 rule ............................................................................................................................. 81
4.2. Creating Backup Jobs ....................................................................................................... 81
or
4.2.1. Before You Begin ...................................................................................................... 82
4.2.2. Backup Methods ........................................................................................................ 83
4.2.3. Changed Block Tracking (CBT) ................................................................................. 93
e
4.2.4. Data size optimization ............................................................................................... 96
at

4.2.5. Data Encryption ......................................................................................................... 99


4.2.6. Transaction Consistency ......................................................................................... 100
lic

4.2.7. Scheduling ............................................................................................................... 106


4.3. Creating Restore Points with VeeamZIP and Quick Backup ....................................... 108
4.3.1. VeeamZIP ............................................................................................................... 108
up

4.3.2. Quick Backup .......................................................................................................... 108


4.4. Backup Copy .................................................................................................................... 109
4.4.1. Backup Copy Job .................................................................................................... 110
D

4.5. Replication ....................................................................................................................... 115


4.5.1. Insight into replication .............................................................................................. 115
ot

4.5.2. Reducing Amount of Transferred Data .................................................................... 117


4.5.3. Resume on Disconnect ........................................................................................... 118
N

4.6. Creating VM/File Copy Jobs ........................................................................................... 119


4.6.1. VM copy .................................................................................................................. 119
4.6.2. File Copy ................................................................................................................. 119
o

Labs for Module 4: Protect .................................................................................................... 121


D

Labs for Module P: Preparation for day 2 ............................................................................ 123


5. Entire VM Recovery ............................................................................................................ 125
5.1. Recovery from a Backup ................................................................................................ 125
5.1.1. Instant VM Recovery ............................................................................................... 125
5.1.2. Full VM Recovery .................................................................................................... 128
5.1.3. VM File Recovery .................................................................................................... 129
5.1.4. Restore to Microsoft Azure ...................................................................................... 129
5.2. Extract Utility ................................................................................................................... 131

ii Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Table of Contents

5.3. Recovery from a Replica ................................................................................................. 132


5.3.1. Failover .................................................................................................................... 132
5.3.2. Failback ................................................................................................................... 133
5.3.3. Failover Plan ........................................................................................................... 134
5.3.4. Planned Failover ..................................................................................................... 135
Labs for Module 5: Entire VM Recovery ............................................................................... 137
6. Objects Recovery ............................................................................................................... 139
6.1. Application-Item Recovery ............................................................................................. 139
6.1.1. Veeam Explorer for Microsoft Exchange ................................................................. 139

e
6.1.2. Veeam Explorer for Microsoft SharePoint ............................................................... 140

ut
6.1.3. Veeam Explorer for Microsoft Active Directory ........................................................ 142
6.1.4. Veeam Explorer for Microsoft SQL Server .............................................................. 143

ib
6.1.5. Veeam Explorer for Oracle ...................................................................................... 145
6.2. Universal Application-Item Recovery (U-AIR) ............................................................... 147
6.3. Guest OS File Recovery .................................................................................................. 150

tr
6.3.1. Guest OS File Recovery .......................................................................................... 150

is
6.3.2. Windows File-Level Recovery ................................................................................. 150
6.3.3. Multi-OS File-Level Recovery .................................................................................. 151

D
6.3.4. File-Level Recovery for Any File System ................................................................ 152
Labs for Module 6: Objects Recovery .................................................................................. 153
7. Verification .......................................................................................................................... 155
or
7.1. SureBackup Recovery Verification ................................................................................ 155
7.1.1. How It Works ........................................................................................................... 155
7.1.2. Recovery Verification Tests ..................................................................................... 157
e

7.1.3. Backup File Validation ............................................................................................. 158


at

7.1.4. Application Group .................................................................................................... 159


7.1.5. Virtual Lab ............................................................................................................... 160
lic

7.1.6. SureBackup Job ...................................................................................................... 169


7.1.7. Manual Recovery Verification .................................................................................. 172
7.2. SureReplica Recovery Verification ................................................................................ 172
up

7.3. On-Demand Sandbox ...................................................................................................... 174


Labs for Module 7: Verification ............................................................................................. 177
D

8. Introduction to Agents ....................................................................................................... 179


8.1. Why agents? .................................................................................................................... 179
8.2. Veeam Agents for Microsoft Windows .......................................................................... 179
ot

8.3. Veeam Agents for Linux ................................................................................................. 180


8.4. Veeam Agent Management ............................................................................................. 180
N

8.5. Protection Groups ........................................................................................................... 181


8.5.1. Creating Protection Groups ..................................................................................... 181
o

8.5.2. Protection Group Types .......................................................................................... 181


8.5.3. Protection Scope ..................................................................................................... 182
D

8.5.4. Discovery and Deployment Options ........................................................................ 183


8.6. Agent Jobs ....................................................................................................................... 184
8.6.1. Agent for Windows Job Modes ................................................................................ 184
8.6.2. Agent for Linux Job Modes ...................................................................................... 186
8.7. Administrative tasks ....................................................................................................... 188
8.7.1. Enabling and Disabling Veeam Agent Backup Jobs ............................................... 188
8.7.2. Deleting Veeam Agent Backup Jobs ....................................................................... 188
8.7.3. Viewing Veeam Agent Backup Job Statistics .......................................................... 188

Veeam Certified Engineer v9.5 . Textbook iii


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Table of Contents

8.7.4. Removing Veeam Agent Backups ........................................................................... 189


8.7.5. Viewing Veeam Agent Backup Statistics ................................................................. 190
8.7.6. Configuring Global Settings ..................................................................................... 190
Labs for Module 8: Introduction to Agents .......................................................................... 191
9. Advanced Data Protection ................................................................................................. 193
9.1. WAN Acceleration ........................................................................................................... 193
9.2. Tape Device Support ....................................................................................................... 194
9.2.1. Tape Job Scheduling ............................................................................................... 197
9.2.2. Tape Job Encryption ............................................................................................... 198

e
9.2.3. VM Restore from Tape to Infrastructure .................................................................. 199

ut
9.2.4. Automated Drive Cleaning ...................................................................................... 200
9.3. Storage Integration (VMware) ......................................................................................... 201

ib
9.3.1. SAN Storage Systems Support Overview ............................................................... 201
9.3.2. Dell EMC Storage Systems ..................................................................................... 203
9.3.3. HPE Storage Systems ............................................................................................. 204

tr
9.3.4. NetApp Storage Systems ........................................................................................ 205

is
9.3.5. Nimble Storage Systems ......................................................................................... 207
9.4. Microsoft Hyper-V Off-host Backup Proxy .................................................................... 207

D
9.5. Support for Deduplicating Storage Systems ................................................................ 208
9.5.1. ExaGrid ................................................................................................................... 208
9.5.2. HPE StoreOnce ....................................................................................................... 209
or
9.5.3. EMC Data Domain Boost ........................................................................................ 213
9.6. Veeam Cloud Connect .................................................................................................... 217
9.6.1. Lease and Quota ..................................................................................................... 219
e

9.6.2. Deleted Backups Protection .................................................................................... 219


at

9.6.3. Licensing for Cloud Repositories ............................................................................. 222


9.6.4. v9 Cloud Connect Enhancements ........................................................................... 223
lic

9.7. Veeam Backup Enterprise Manager .............................................................................. 225


9.7.1. Veeam plug-in for vSphere Web Client ................................................................... 225
9.7.2. Required Permissions ............................................................................................. 227
up

9.7.3. Restore of Application Items ................................................................................... 228


9.7.4. Self-restore portal .................................................................................................... 228
9.7.5. Managing Encryption Keys ...................................................................................... 229
D

9.7.6. Decrypting Data without a Password ...................................................................... 230


9.7.7. Veeam Backup Enterprise Manager RESTful API .................................................. 230
ot

9.8. Standalone Console ........................................................................................................ 231


9.9. vCloud Director Support ................................................................................................. 232
N

Labs for Module 9: Advanced Data Protection .................................................................... 235


10. Veeam ONE Features and Functionality ........................................................................ 237
10.1. Veeam ONE overview .................................................................................................... 237
o

10.2. Veeam ONE components .............................................................................................. 237


D

10.2.1. Monitoring and Alerting ......................................................................................... 237


10.2.2. Reporting and Dashboards ................................................................................... 240
10.2.3. Business Categorization ........................................................................................ 241
10.2.4. Auto Discovery of Backup and Virtual Infrastructure ............................................. 242
10.3. Veeam ONE Deployment ............................................................................................... 243
10.3.1. Typical deployment ............................................................................................... 243
10.3.2. Advanced deployment ........................................................................................... 244
10.4. Veeam ONE as an assessment tool ............................................................................. 245

iv Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Table of Contents

10.4.1. Veeam ONE as an assessment tool content ......................................................... 245


10.4.2. Data Sovereignty ................................................................................................... 246
Labs for Module 10: Veeam ONE Features and Functionality ........................................... 247
11. Product Editions ............................................................................................................... 249
11.1. Product Editions Comparison ...................................................................................... 249
11.2. Product Licensing ......................................................................................................... 252
11.3. Full and Free Functionality Modes .............................................................................. 252
12. Troubleshooting ............................................................................................................... 255
12.1. How to identify the Problem ......................................................................................... 255

e
12.2. Review and Analyze the Issue ...................................................................................... 255

ut
12.3. Common Issues & Misconfigurations ......................................................................... 256
12.3.1. Low Performance (bottlenecks) ............................................................................. 256

ib
12.4. Common VMware related issues ................................................................................. 257
12.4.1. Snapshot Creation Failure ..................................................................................... 258

tr
12.4.2. Snapshot Removal Failure .................................................................................... 258
12.4.3. Snapshot Removal Stun ........................................................................................ 258

is
12.4.4. NFC Related Errors ............................................................................................... 259
12.5. Log files .......................................................................................................................... 259

D
12.6. Veeam Support .............................................................................................................. 260
12.6.1. Support Programs ................................................................................................. 260
or
12.6.2. Response Time SLA ............................................................................................. 261
12.6.3. Contacting Customer Support ............................................................................... 261
12.6.4. Product Lifecycle ................................................................................................... 263
e
12.6.5. Third Party Software Support ................................................................................ 264
12.7. Search for Additional Information ............................................................................... 265
at

13. Additional Resources ....................................................................................................... 267


Labs for Module 13: Additional Resources .......................................................................... 269
lic

14. Training Summary ............................................................................................................ 271


14.1. Key Points ...................................................................................................................... 271
up

14.2. Useful Resources .......................................................................................................... 273


14.3. Contacts ......................................................................................................................... 273
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook v


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Table of Contents

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

vi Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 1: Overview

1. Overview
This section provides a brief overview of the course and its learning objectives.

1.1. Veeam Products


This topic will provide you with a brief overview of the range of Veeam products so you have

e
a better understanding of the business problems they cover.

ut
1.1.1. Veeam Availability Suite Capabilities

ib
In today’s interconnected and global business environment, customers, partners, suppliers and

tr
employees expect access to information and applications at any time and from any device, with no
tolerance for downtime or data loss. IT organizations must therefore make data and applications

is
available to all stakeholders every minute of every day. This is the era of the Always-On Business™.

D
Achieving non-stop service and continuous protection has traditionally required a significant
investment in fully redundant systems with instant failover capabilities. These kinds of investments
or
could only be justified for a few applications, so the vast majority of workloads were served with lower
performing, legacy backup solutions allowing recovery time objectives and recovery point objectives
(RTO and RPO) of several hours or days. These low performance levels fail to meet the requirements
e
of the Always-On Business, creating a significant availability gap.
at

Veeam® bridges this availability gap by leveraging the capabilities of the modern data center –
including virtualization, new storage integration and cloud capabilities – to provide five key enabling
lic

capabilities. These enabling capabilities in turn allow for a recovery time and point objective (RTPO™)
of <15 minutes for the majority of workloads, bridging the availability gap and enabling the Always-On
up

Business.

Benefit Description
D

Enables low recovery time objectives (RTOs) of <15 minutes; enables


High-Speed Recovery
rapid recovery of the data customers want, in the form that they want it
ot

Avoids data loss by enabling low recovery point objectives (RPOs ) of


Data Loss Avoidance
<15 minutes, and by facilitating off-site data protection
N

Ensures that files, applications, and virtual servers can be reliably


o

Verified Recoverability restored when needed; ensures business resiliency through automated
backup and DR testing
D

Eliminates the risks associated with application deployment,


Leveraged Data configuration changes, and other testing scenarios; allows testing of
changes in a production-like environment before actually deploying them

Provides monitoring and alerting tools so that you can discover and be
Complete Visibility alerted to issues and potential problems in your IT environment before
they have a significant impact on your operations

Veeam Certified Engineer v9.5 . Textbook 1


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 1: Overview

1.1.2. Veeam Backup & Replication


Veeam Backup & Replication is an availability, data protection and disaster recovery solution for
VMware vSphere and Microsoft Hyper-V virtual environments of any size and complexity.

To provide the most comprehensive protection of your virtual infrastructure, Veeam Backup &
Replication complements image-based backup with image-based replication. You can back up any
VM, VM container or VM disk, as well as replicate VMs onsite for high availability (HA) or offsite for
disaster recovery (DR), across local area and wide area networks.

e
ut
By leveraging the latest technological advancements of the virtualization technology, Veeam Backup
& Replication delivers unprecedented replication speed. It provides near-continuous data protection
(or near-CDP) at a fraction of the cost of traditional CDP systems – you can capture changes and

ib
update VM images as often as every few minutes as the replication job can be set to run
Continuously.

tr
Veeam Backup & Replication offers vPower – Veeam’s technology that allows you to:

is
Immediately recover a failed VM, thus reducing downtime of production VMs to the minimum

D
(see Instant VM Recovery).
Verify recoverability of every backup by starting and testing VMs directly from VM backups in an
or
isolated environment.
Restore items from any virtualized applications with Veeam Explorers and U-AIR.
Restore guest OS files with Multi-OS File-Level Recovery.
e
at

1.1.3. Veeam ONE


lic

Veeam ONE delivers powerful, easy-to-use and affordable monitoring, reporting and capacity
planning for virtual and backup infrastructures:
up

Real-time monitoring – 24x7 real-time monitoring and alerting, with built intelligence for fast
troubleshooting and problem resolution
D

Documentation and management reporting – pre-deployment analysis of backup requirements,


complete documentation of the structure and state of your virtual and backup infrastructures,
plus automated and on-demand reporting
ot

Capacity planning – trend analysis, provisioning recommendations, what-if modeling and more
Chargeback and billing — complete visibility into IT costs of compute, storage and backup
N

repository resources
Business categorization – technical- and business-oriented views of your virtual environment
o
D

1.1.4. Veeam Management Pack for System Center


Veeam Management Pack for System Center supports both vSphere and Hyper-V virtual
environments, offering the same features for monitoring, reporting and capacity planning for both
hypervisors.

Veeam Management Pack extends System Center’s monitoring capabilities to include Hyper-V and
vSphere virtual machines and hosts, the hardware, storage and network resources they run on, as

2 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 1: Overview

well as the Veeam Backup & Replication infrastructure. Veeam MP automatically integrates System
Center’s native monitoring of critical applications like Microsoft Exchange and SQL Server and
provides drill-down view from the application to virtualization layer and further to the hardware
sensors data.

1.1.5. The Veeam Backup & Replication Add-on for Kaseya


The Veeam Backup Add-on for Kaseya bridges the Kaseya platform with Veeam Backup &

e
Replication and allows Managed Service Providers to remotely monitor their Veeam backup

ut
infrastructures and estimate data protection efficiencies for the managed virtual environments.

With the add-on, you can perform the following operations from within the Kaseya web interface:

ib
Audit the state and performance of Veeam backup infrastructure components

tr
Analyze VM data protection for managed customer virtual environments and ensure that critical
VMs have valid backup and replica restore points that meet established RPO requirements

is
See an overview of all types of jobs managed by Veeam backup servers and monitor job
completion results

D
Receive informative alerts about critical situations around the backup infrastructure components
and data protection operations
or
Generate reports based on data collected from Veeam backup servers and protected VMs
Monitor backup infrastructure machines and protected VMs, perform basic maintenance,
troubleshoot and fix problems with Kaseya Live Connect
e
at

1.1.6. Veeam Backup & Replication Plug-in for LabTech


lic

This Veeam plugin for LabTech is designed for Service Providers and IT Departments using the
LabTech Remote Monitoring and Management (RMM) platform and Veeam Backup & Replication.
up

With the Veeam Backup & Replication Plug-in for LabTech, you get a single pane of glass view of
your Veeam backup activity from inside the LabTech Control Center, providing complete visibility into
your virtual infrastructure.
D

You can perform the following from within the LabTech Control Center:
ot

Manage, view and monitor all backup jobs managed by Veeam backup servers including the
ability to start, stop, retry and disable jobs
N

Analyze protected and unprotected VMs to ensure critical VMs have valid backup and replica
restore points
o

Receive critical alerts and automatically raise tickets and alarms


Perform day-to-day maintenance, troubleshoot and fix problems based off a pre-defined list of
D

reports, monitors and data views with zero configuration required


Generate reports based on data collected from the Veeam backup servers and associated VMs

1.2. Key Concepts


In the “key concepts” topic, concepts like RTO and RPO will be defined, and their relation to
Business Continuity and Disaster Recovery will be explained.

Veeam Certified Engineer v9.5 . Textbook 3


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 1: Overview

1.2.1. Key Concepts


Concept Details

An activity performed by an organization to ensure that critical business


Business
functions will be available to customers, suppliers, regulators, and other
Continuity (BC)
entities that must have access to those functions.

A process, policies and procedures that are related to preparing for recovery
Disaster

e
or continuation of technology infrastructure which are vital to an organization
Recovery (DR)
after a natural or human-induced disaster.

ut
The maximum tolerable period in which data might be lost from an IT service
Recovery Point

ib
due to a major incident. Essentially, it is the acceptable time period data can
Objective (RPO)
be backdated to a restore.

tr
The duration of time and a service level within which a business process

is
must be restored after a disaster (or disruption) in order to avoid
Recovery Time
unacceptable consequences associated with a break in business
Objective (RTO)

D
continuity. Essentially, it is the amount of time allowable between off-line due
to disaster and on-line from recovery.
or
1.3. Course Overview
e
Keeping your business up and running at all times is critical. Businesses today require 24/7 access to
at

data, efficient management of exploding data growth, and little tolerance for downtime and data loss.
With Veeam® Availability Suite™, Veeam has created a new solution category and thus a new
lic

market: Availability for the Modern Data Center™ to enable the Always-On Business™:

High-Speed Recovery: Rapid recovery of what you want, the way you want it
up

Data Loss Avoidance: Near-continuous data protection and streamlined disaster recovery
Verified Recoverability: Guaranteed recovery of every file, application or virtual server, every
time
D

Leveraged Data: Low-risk deployment with a production-like test environment


Complete Visibility: Proactive monitoring and alerting of issues before operational impact
ot

Veeam Backup & Replication delivers backup, recovery and replication for VMware and Hyper-V. This
#1 VM Backup™ solution helps organizations meet RPOs and RTOs, save time, eliminate risks and
N

dramatically reduce capital and operational costs. Veeam Availability Suite™ combines Veeam
Backup & Replication with advanced monitoring and reporting capabilities to help organizations of all
o

sizes protect virtualization, increase administrator productivity and mitigate daily management risks.
D

By the end of this course you should be able to:

Understand basic and advanced backup terminology


Understand Veeam Backup & Replication architecture, backup methods, transport modes and
other mechanisms
Install and set up Veeam Backup & Replication, Veeam ONE, Veeam Backup Enterprise
Manager to prepare your infrastructure for assessment and backup deployment
Create, edit and set up backups

4 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 1: Overview

Create replications and perform their failovers, set up failover plans


Verify restore points using such mechanisms as: SureReplica and SureBackup
Restore Windows, Linux and other guest OS files, Exchange, Oracle, AD, SQL and SharePoint
objects using different mechanisms provided by Veeam Backup & Replication
Take backups off and archive backups to tape using native tape support and backup copy
option
Install, set up and work with WAN Accelerator
Leverage storage snapshots for backups and restores

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 5


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 1: Overview

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

6 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

2. Deployment
Veeam Backup & Replication is a modular solution which allows flexible scalability for
environments of different sizes and configuration. The installation package of Veeam Backup
& Replication includes a set of components used to configure your backup infrastructure.
Some of them are mandatory and provide core functionality; some of them are optional and
can be installed to provide additional functionality for your business and deployment needs.
You can consolidate Veeam Backup & Replication components on the same machine, either

e
physical or virtual, or you can set them up separately for a more scalable approach.

ut
2.1. Core Components and Their Interaction

ib
Veeam Backup & Replication comprises the following components. Some of the components

tr
are installed using a setup file and others are configured while working with the product.

is
2.1.1. Veeam Backup Server

D
The Veeam Backup Server is a Windows-based physical or virtual machine on which
or
Veeam Backup & Replication is installed. It is the core component in the backup infrastructure that
fills the role of the “configuration and control center”. The Veeam backup server performs all types of
administrative activities including:
e
at

Coordinating backup, replication, recovery verification and restore tasks


Controlling job scheduling and resource allocation
lic

Setting up and managing backup infrastructure components as well as specifying global


settings for the backup infrastructure
up

In addition to its primary functions, a newly deployed Veeam backup server also performs the roles of
the default backup proxy, which manages the data handling, and the default backup repository, which
handles the data storing tasks.
D

The Veeam backup server uses the following services and components:
ot

Veeam Veeam Veeam


Backup Service Installer Service Backup Catalog Service
N

Manages scheduled jobs, Enables installing, updating Manages guest OS file system
serves Veeam Backup and configuring Veeam indexing for VMs and
o

Enterprise Manager requests. Backup & Replication replicates system index data
components. files to enable search through
D

guest OS files.

Veeam Certified Engineer v9.5 . Textbook 7


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Veeam Veeam Veeam


Backup SQL Database Backup PowerShell Snap-In Data Mover Services

Used by Veeam Backup Acts as an extension for Responsible for deploying and
Service, Veeam Backup Shell Microsoft Windows coordinating executable
and Veeam Backup Catalog PowerShell 2.0. Veeam modules that act as "data
Service to store data about Backup PowerShell adds a set movers" and perform main job
the backup infrastructure, of cmdlets to allow users to activities on behalf of
jobs, sessions and so on. The perform backup, replication Veeam Backup & Replication,
database instance can be and recovery tasks through such as communicating with

e
located on a SQL Server the command-line interface of VMware Tools, copying VM

ut
installed either locally (on the PowerShell or run custom files, performing data
same machine where the scripts to fully automate deduplication and
Veeam backup server is operation of compression and so on.

ib
running) or remotely. Veeam Backup & Replication.

tr
is
Veeam Mount Service Veeam Broker Service

D
Interacts with the virtual
infrastructure to collect and
Mounts backups and replicas
for file-level access, browsing
or
cache the virtual infrastructure
topology. Jobs and tasks
the VM guest file system and
query information about the
restoring VM guest OS files
virtual infrastructure topology
e
and application items to the
from the broker service, which
original location.
at

accelerates job and task


performance.
lic

2.1.2. Veeam Backup Proxy (VMware)


up

When Veeam Backup & Replication is initially installed, the Veeam backup server coordinates all job
activities and, until you deploy a Backup Proxy, handles data traffic itself.
D

That is, when you run a backup, replication, VM copy, VM migration job or perform restore operations,
VM data is moved from source to target through the Veeam backup server. So, by default Veeam
ot

backup server plays backup proxy role. This scenario is acceptable for virtual environments where
few backup jobs are performed; in large-scale environments, however, the workload on the Veeam
N

backup server will be significant.

To take the workload off the Veeam backup server, Veeam Backup & Replication uses backup
o

proxies. A backup proxy is an architecture component that sits between data source and target and is
D

used to process jobs and deliver backup traffic. In particular, the backup proxy tasks include retrieving
VM data from the production storage, compressing and sending it to the backup repository (for
example, if you run a backup job) or another backup proxy (for example, if you run a replication job).
As the data handling task is assigned to the backup proxy, the Veeam backup server becomes the
“point of control” for dispatching jobs to proxy servers.

The role of a backup proxy can be assigned to a dedicated Windows server (physical or virtual) in
your virtual environment. You can deploy backup proxies both in the primary site and in remote sites.

8 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

To optimize performance of several concurrent jobs, you can use a number of backup proxies. In this
case, Veeam Backup & Replication will distribute the backup workload between available backup
proxies.

Using backup proxies lets you easily scale your backup infrastructure up and down based on your
demands. Backup proxies run light-weight services that take a few seconds to deploy. Deployment is
fully automated – Veeam Backup & Replication installs the necessary components on a Windows-
based server when you add it to the product console. As soon as you assign the role of a backup
proxy to the added server, Veeam Backup & Replication starts the required services on it.

e
The primary role of the backup proxy is to provide an optimal route for backup traffic and enable

ut
efficient data transfer.

ib
Transport Modes (VMware)

tr
Efficiency of a backup job and time required for its completion in many respects depends on

is
the transport mode. The following section will review various transport modes Veeam

D
Backup & Replication uses to process VMware vSphere virtual machines.

Transport Modes (VMware)


or
The transport mode is a method that is used by the Veeam Data Mover Service to read VM data from
e
the source and write VM data to the target.
at

Depending on the type of backup proxy and your backup architecture, the backup proxy can use one
of the following data transport modes: Direct Storage Access, Virtual Appliance or Network. If the VM
lic

disks are located on the SAN storage and the SAN storage is added to the
Veeam Backup & Replication console, the backup proxy can also use the Backup from Storage
up

Snapshots mode. You can explicitly select the transport mode or let Veeam Backup & Replication
automatically choose the mode.
D

For reading data, Veeam Backup & Replication offers the following modes (starting with the most
efficient):
ot

Direct Storage Access


Virtual Appliance
N

Network

The Veeam Data Mover (transport) service is responsible for reading data on a backup proxy server.
o

The transport mode can be defined in the settings of the backup proxy that performs the job. When
D

configuring backup proxy settings, you can manually select a transport mode or let
Veeam Backup & Replication select the most appropriate mode automatically. If you use automatic
mode selection, Veeam Backup & Replication will scan the backup proxy configuration and its
connection to the VMware infrastructure to choose the optimal transport mode. If multiple transport
modes are available for the same proxy, Veeam Backup & Replication will choose the mode in the
following order: Direct Storage Access → Virtual Appliance → Network.

For writing data to the target destination, Veeam Backup & Replication normally uses the Network

Veeam Certified Engineer v9.5 . Textbook 9


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

mode. In some cases, such as VM replication or full VM recovery, Veeam Backup & Replication also
supports the Virtual Appliance mode and the Direct Storage Access mode (for restore operations
where the backup proxy is engaged, for example, full VM restore, VM disk restore and replica
failback).You cannot select the transport mode for writing data – Veeam Backup & Replication selects
it automatically, based on the backup proxy configuration.

For all transport modes, Veeam Backup & Replication leverages VMware vStorage APIs for Data
Protection (VADP). VADP can be used for VMware vSphere starting from v4

e
Applicability and efficiency of each transport mode primarily depends on the type of datastore used by
the source host (local or shared), and on the backup proxy server type (physical or virtual). The table

ut
below shows recommendations for installing the backup proxy, depending on the storage type and
desired transport mode.

ib
Production Direct Storage
Virtual Appliance Network Mode

tr
Storage Type Access

is
Physical Proxy with
Fiber Channel
direct FC access to
(FC) SAN Virtual Proxy running on

D
the SAN
an ESX(i) host connected
to the storage device Physical or Virtual
Physical or Virtual Proxy connecting to
iSCSI SAN
Proxy
or the ESX(i) host(s)
VMkernel interface
Physical or Virtual (management
NFS storage Not recommended
e
Proxy network)
at

Virtual Proxy on every


Local storage Not supported
ESX(i) host
lic

Veeam Backup & Replication processes VM disks one by one or in parallel, depending on the data
up

processing settings you select. If VM disks are located on different storages (for example, on the SAN
and local storage subsystem), Veeam Backup & Replication will use different transport modes to
process VM disks. In such scenario, it is strongly recommended that you select the Failover to
D

network mode if primary transport modes fail or are unavailable option when configuring the
mode settings for the necessary backup proxy.
ot

Direct Storage Access


N

In the Direct storage access mode, Veeam Backup & Replication reads/writes data directly
o

from/to the storage system where VM data or backups are located. This mode unites two
D

transport modes:

Direct SAN access

Direct NFS access

Direct SAN Access

10 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

The Direct SAN access transport mode is recommended for VMs whose disks are located on shared
VMFS SAN LUNs that are connected to ESX(i) hosts over FC, FCoE, iSCSI, and on shared SAS
storage.

In the Direct SAN access transport mode, Veeam Backup & Replication leverages VMware VADP to
transport VM data directly from and to FC and iSCSI storage over the SAN. VM data travels over the
SAN, bypassing ESX(i) hosts and the LAN. The Direct SAN access transport method provides the
fastest data transfer speed and produces no load on the production network.

e
ut
ib
tr
is
D
or
e
at

The Direct SAN access transport mode can be used for all operations where the backup proxy is
lic

engaged:

Backup
up

Replication
VM copy
Quick migration
D

Entire VM restore
VM disk restore
ot

Replica failback

The process of data retrieval in Direct SAN Access mode includes the following steps:
N

1. The backup proxy sends a request to the ESX(i) host to locate the necessary VM on the
o

datastore.
2. The ESX(i) host locates the VM.
D

3. Veeam Backup & Replication triggers VMware vSphere to create a VM snapshot.


4. The ESX(i) host retrieves metadata about the layout of VM disks on the storage (physical
addresses of data blocks).
5. The ESX(i) host sends metadata to the backup proxy.
6. The backup proxy uses metadata to copy VM data blocks directly from the source storage over
the SAN.
7. The backup proxy processes copied data blocks and sends them to the target.

Veeam Certified Engineer v9.5 . Textbook 11


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Important! The backup proxy using Direct SAN Access mode must be connected directly into the
SAN fabric. If no “Failover to the network mode” option is chosen and a direct SAN connection is
not configured or not available when a job or task starts, the job or task will fail.

Veeam Backup & Replication allows you to switch to the Network mode and retrieve VM data through
the ESX(i) host over the LAN if the SAN becomes inaccessible. This option is selected by default to
ensure that backup jobs can be completed in any case. However, it puts additional load on your
production network and thus may potentially affect performance if you are running backup and

e
replication jobs during business hours.

ut
Important! If you install Veeam Backup & Replication in a VM and plan to use the Direct SAN

ib
access mode without adding any Backup Proxy, you need to make sure that the Veeam Backup
Server has direct access to the production storage or that you deploy a Backup Proxy that has

tr
direct access to the production storage.

is
Additionally, you can use the Direct SAN Access mode for those restore operations where the backup

D
proxy is engaged, for example, full VM restore, VM disk restore and replica failover. The Direct SAN
Access transport mode can be used to restore VMs with thick disks only. Before VM data is restored,
or
the ESX(i) host needs to allocate space for the restored VM disk on the datastore:

When thick disks are restored, the ESX(i) host allocates space on disk before writing VM data.
When thin disks are restored, the ESX(i) host attempts to allocate space on the fly, as requests
e

for data blocks restore are received.


at

As a result, restore of thin disks involves extra allocation overhead if compared to restore of thick
lic

disks, which results in decreased performance.

To restore VMs with thin disks, you can use the Virtual Appliance mode or the Network mode. If you
up

plan to process a VM that has both thin and thick disks, you can select the Direct SAN Access
transport mode and choose to failover to the Network mode if SAN becomes inaccessible. In this
case, Veeam Backup & Replication will use the Direct SAN Access transport mode to restore thick
D

disks and the Network transport mode to restore thin disks. Alternatively, you can restore all VM disks
as thick.
ot

Direct NFS Access


N

The Direct NFS access is a recommended transport mode for VMs whose disks are located on NFS
datastores.
o

In the Direct NFS access mode, Veeam Backup & Replication bypasses the ESX(i) host and
D

reads/writes data directly from/to NFS datastores. To do this, Veeam Backup & Replication deploys
its native NFS client on the backup proxy and uses it for VM data transport. VM data still travels over
LAN but there is no load on the ESX(i) host.

12 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

e
ut
ib
tr
The Direct NFS access mode can be used for all operations where the backup proxy is engaged:

is
Backup
Replication

D
Quick migration
VM copy
Entire VM restore
or
VM disk restore
Replica failback
e

Veeam Backup & Replication deploys its NFS agent on every backup proxy when you assign the
at

backup proxy role to a Microsoft Windows server (physical or virtual). To instruct the backup proxy to
use the Direct NFS access mode, you must choose the Automatic selection or Direct storage access
lic

option in the backup proxy settings. Direct NFS access mode can be used in VMware vSphere
environments running NFS v3 and NFS v4.1 (NFS v4.1 is only supported for VMware vSphere 6.0
up

and later).

To read and write data in the Direct NFS transport mode, the backup proxy must meet the following
D

requirements:

The backup proxy must have access to the NFS datastore.


ot

The backup proxy must have Read Only/Write permissions and root access to the NFS
datastore.
N

Veeam Backup & Replication selects backup proxies working in the Direct NFS access transport
mode by the following rules:
o
D

If you instruct Veeam Backup & Replication to select a backup proxy automatically for a job or
task, Veeam Backup & Replication picks a backup proxy with the minimum number of hops to
the NFS datastore. If there are several backup proxies with the equal number of hops in the
backup infrastructure, Veeam Backup & Replication picks the least busy backup proxy in the
backup infrastructure. If all backup proxies with the minimum number of hops are busy at the
moment, Veeam Backup & Replication waits until these backup proxies are
free. Veeam Backup & Replication does not pick a backup proxy that has a greater number of
hops to the NFS datastore and works in the Direct NFS access or Virtual Appliance transport
mode.

Veeam Certified Engineer v9.5 . Textbook 13


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

If you select one or more backup proxies explicitly for a job or


task, Veeam Backup & Replication does not regard the number of hops to the NFS
datastore. Veeam Backup & Replication picks the least busy backup proxy working in the Direct
NFS access transport mode. If all backup proxies working in the Direct NFS access transport
mode are busy, Veeam Backup & Replication waits until these backup proxies are
free. Veeam Backup & Replication does not pick a backup proxy working in the Virtual
Appliance transport mode.

To detect the number of hops from a backup proxy to the NFS datastore, Veeam Backup &

e
Replication uses the host discovery process. During host discovery, Veeam Backup & Replication
obtains information about the number of hops, checks to which NFS datastores the backup proxy has

ut
access and what permissions the backup proxy has on NFS datastores.

ib
The host discovery process rescans all Microsoft Windows machines to which the backup proxy role
is assigned. The process starts automatically every 4 hours. Host discovery is also triggered when

tr
you change the transport mode settings and choose to use the Direct storage access for the backup
proxy. If necessary, you can start the host discovery process manually. To do this, perform the

is
Rescan operation for a machine to which the backup proxy role is assigned.

D
If you enable the Enable VMware tools quiescence option in the job settings, Veeam Backup &
Replication will not use the Direct NFS transport mode to process running Microsoft Windows VMs
or
that have VMware Tools installed.

If a VM has some disks that cannot be processed in the Direct NFS access mode, Veeam Backup &
Replication processes these VM disks in the Network transport mode.
e
at

Cisco HyperFlex storage


lic

If VMware vSphere VMs store their disks on Cisco HyperFlex storages, Veeam Backup & Replication
can use the Direct NFS access mode to process such VMs.
up

To allow Veeam Backup & Replication to access VM data directly over the HyperFlex Data network,
by NFS protocol, the infrastructure must meet the following requirements:
D

Direct NFS access is enabled on data platform controllers. For more information, see
https://www.veeam.com/kb2300.
VMs do not have Cisco HyperFlex snapshots (including the base snapshot) or VMware
ot

vSphere snapshots.
VMs meet requirements described in the Limitations for Direct NFS access section.
N

Backup proxies assigned for jobs work in the Direct storage access or Automatic selection
modes.
o

Backup data read over NFS is processed by a single HyperFlex Controller that holds the
HyperFlex Controller Cluster IP.
D

Important! If these requirements are not met, Veeam Backup & Replication can process VM data
in the Virtual appliance or Network transport mode.

14 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Virtual Appliance

This mode is recommended and can only be used if the backup proxy is deployed on a VM. The
Virtual Appliance (also referred to as Hot-Add) mode uses the SCSI hot-add capability of ESXi hosts
to attach disks of the backed up VM to the backup proxy VM. In In this mode, VM data is retrieved
directly from storage through the ESXi I/O stack, instead of going through the network stack, which
improves performance.

e
Important! To ensure that a VM can be backed up using Virtual Appliance mode, it’s important to
make sure the ESX(i) host on which the backup proxy VM resides has access to the storage

ut
where disks of a backed up VM are located.

ib
tr
is
D
or
e
at
lic
up

Network Mode
D

This mode can be used with any infrastructure configuration. However, when an alternative transport
ot

mode is applicable, the Network mode is not recommended because it has the lowest data retrieval
speed. It is the only applicable mode when the backup proxy is a physical machine and the host uses
N

local storage. In this mode, data is retrieved via the ESX (i) host over the LAN using Network Block
Device protocol (NBD).
o
D

Veeam Certified Engineer v9.5 . Textbook 15


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

e
ut
ib
tr
is
The process of data retrieval in Network mode includes the following steps:

D
1. The backup proxy sends a request to the ESX(i) host to locate the necessary VM on the
or
datastore.
2. The ESX(i) host locates the VM on the datastore.
3. Veeam Backup & Replication triggers VMware vSphere to create a VM snapshot, copies VM
e
data blocks from the source storage and sends them to the backup proxy over LAN.
4. The backup proxy sends the data to target.
at

Veeam Backup & Replication processes VM disks one by one or in parallel, depending on selected
lic

data processing settings. If VM disks are located on different storages (for example, on the SAN and
local storage), Veeam Backup & Replication uses different transport modes to process VM disks. In
such scenario, it is strongly recommended that you select the Failover to network mode if primary
up

transport modes fail or are unavailable option when configuring the mode settings for the backup
proxy.
D

2.1.3. Veeam Backup Proxy (Hyper-V)


ot

By default, when you perform backup, replication or VM copy jobs in the Hyper-V environment, VM
N

data is processed directly on the source Hyper-V host where VMs reside and then moved to the
target. However VM data processing can produce unwanted overhead on the production Hyper-V
o

host and impact performance of VMs running on this host. To take data processing off the production
Hyper-V host, the off-host backup mode can be used.
D

The off-host mode shifts the backup and replication load to a dedicated machine – an off-host backup
proxy. The off-host backup proxy functions as a “data mover” which retrieves VM data from the
source datastore, processes it and transfers it to the destination.

Online backup is the recommended backup method for Microsoft Hyper-V VMs. This type of backup
requires no downtime. VMs remain running for the whole period of backup, and users can access
them without any interruption. Online backup can be performed if VMs meets a number of

16 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

requirements. For more information, see Microsoft Hyper-V documentation in TechNet article
DD252619 (Planning for Backup).

The procedure of online backup depends on the Microsoft Hyper-V Server version:

Microsoft Hyper-V Server 2008 R2 and 2012


Microsoft Hyper-V Server 2012 R2
Microsoft Hyper-V Server 2016

e
Microsoft Hyper-V Server 2008 R2 and 2012

ut
For online backup of VMs on Microsoft Hyper-V Server 2008 R2 and 2012, Veeam Backup &
Replication uses a native Microsoft Hyper-V approach. To quiesce VM data, Microsoft Hyper-V

ib
employs two Microsoft VSS frameworks that work at two different levels and communicate with each
other:

tr
Microsoft VSS framework inside the VM guest OS. This framework is responsible for quiescing

is
data of Microsoft VSS-aware applications inside the VM and creating a snapshot inside the VM
guest OS. This snapshot is known as internal snapshot.

D
Microsoft VSS framework at the Microsoft Hyper-V host level. This framework is responsible for
creating a snapshot of a volume on which VM disks are located. This snapshot is known as
external snapshot.
or
Online backup for VMs on Microsoft Hyper-V Server 2008 R2 and 2012 is performed in the following
way:
e
at

1. Veeam Backup & Replication interacts with the Microsoft Hyper-V host VSS Service and
requests backup of a specific VM.
2. The Microsoft VSS Writer on the Microsoft Hyper-V host passes the request to the Microsoft
lic

Hyper-V Integration Components (HV-IC) installed inside the VM guest OS.


3. The HV-IC acts as a VSS Requestor for the framework inside the VM. It communicates with this
up

framework and requests backup of Microsoft VSS-aware applications running on the VM.
4. VSS Writers for Microsoft VSS-aware applications on the VM are instructed to quiesce
application data.
D

5. After the applications are quiesced, the framework inside the VM takes an internal snapshot
using a Microsoft VSS software provider in the VM guest OS.
6. The VM returns from the read-only state to the read-write state, and operations inside the VM
ot

are resumed. The created snapshot is passed to the HV-IC.


7. The HV-IC notifies the hypervisor that the VM is ready for backup.
N

8. The Microsoft Hyper-V host VSS provider takes a snapshot of a volume on which VM disks are
located (external snapshot). After that, Microsoft VSS triggers the auto-recovery process. For
o

more information, see Auto-Recovery.


9. The volume snapshot is presented to Veeam Backup & Replication. Veeam Backup &
D

Replication reads VM data from the volume snapshot in one of two backup modes — on-host
backup or off-host backup.
10. After the backup is complete, the volume snapshot is deleted.

Auto-Recovery

Internal and external snapshots are taken one after another, with a little time difference. During this
time interval, the VM on the volume is not frozen — its applications and OS are working as usual. For

Veeam Certified Engineer v9.5 . Textbook 17


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

this reason, when the external snapshot is created, there may remain unfinished application
transactions inside the VM, and this data can be lost during backup.

To make sure the VM data is consistent at the moment of backup, Microsoft Hyper-V VSS Writer
performs additional processing inside the created external snapshot. This process is also known as
auto-recovery.

Auto-recovery is performed after a volume snapshot is taken. The auto-recovery process is performed
in the following way:

e
1. Right after the snapshot of a volume is taken, Microsoft Hyper-V host VSS allows the Microsoft

ut
Hyper-V host VSS Writer time to update data inside the external snapshot, before it is
permanently put to the read-only state.

ib
2. The volume snapshot is temporarily mounted to the Microsoft Hyper-V host as a new volume
with the read-write access.

tr
3. The Microsoft Hyper-V host VSS Writer rolls back a VM on the external snapshot to the state of
the internal snapshot. All changes that took place after the internal snapshot was taken are

is
discarded. This way, VM data inside the external snapshot is brought to a completely consistent
state. At the same time, the internal snapshot inside the VM guest OS is deleted.

D
As a result, you have a VM on the production volume, and a consistent volume snapshot that Veeam
Backup & Replication can use for backup.
or
Microsoft Hyper-V Server 2012 R2
e
For Microsoft Hyper-V Server 2012 R2, Microsoft VSS adds backup and auto-recovery checkpoints to
at

the backup process.

To quiesce VM data, Veeam Backup & Replication leverages two Microsoft VSS frameworks that
lic

work at two different levels and communicate with each other:


up

Microsoft VSS framework inside the VM guest OS. This framework is responsible for quiescing
data of Microsoft VSS-aware applications inside the VM and creating a snapshot inside the VM
guest OS.
D

Microsoft VSS framework at the Microsoft Hyper-V host level. This framework is responsible for
creating a snapshot of a volume on which VM disks are located.
ot

Online backup for VMs on Microsoft Hyper-V 2012 R2 is performed in the following way:
N

1. Veeam Backup & Replication interacts with the Microsoft Hyper-V host VSS Service and
requests backup of a specific VM.
2. The Microsoft VSS Writer on the Microsoft Hyper-V host passes the request to the Microsoft
o

Hyper-V Integration Components (HV-IC) installed inside the VM guest OS.


D

3. The HV-IC acts as a VSS Requestor for the framework inside the VM. It communicates with this
framework and requests backup of Microsoft VSS-aware applications running on the VM.
4. VSS Writers for Microsoft VSS-aware applications on the VM are instructed to quiesce
application data.
5. After the applications are quiesced, Microsoft Hyper-V VSS takes a backup checkpoint of the
VM. Every virtual disk of a VM receives a temporary file named GUID.avhdx. All new writes that
occur to the VM until the volume snapshot is taken are redirected to this file.
6. Right after taking the backup checkpoint, Microsoft Hyper-V VSS takes another auxiliary

18 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

checkpoint — auto-recovery checkpoint. Every virtual disk of a VM receives a temporary file


named GUID-Autorecovery.avhdx. The auto-recovery checkpoint helps make sure that VM data
is consistent during backup.
7. The auto-recovery checkpoint does not depend on the backup checkpoint — it is taken
independently in a new checkpoint chain.
8. The framework inside the VM takes an internal snapshot using a Microsoft Hyper-V Integration
Services Shadow Copy provider in the VM guest OS.
9. The created internal snapshot is passed to the HV-IC.
10. The HV-IC notifies the hypervisor that the VM is ready for backup.

e
11. Microsoft Hyper-V VSS performs auto-recovery — it mounts the auto-recovery checkpoint to

ut
the VM, rolls back data on the VM to the consistent state.
12. The Microsoft Hyper-V host VSS provider takes a snapshot of a volume on which VM disks are
located (external snapshot).

ib
13. The auto-recovery checkpoint is merged with the original VM.
14. The volume snapshot is presented to Veeam Backup & Replication. Veeam Backup &

tr
Replication reads VM data from the volume snapshot in one of two backup modes — on-host
backup or off-host backup.

is
15. After the backup is complete, the volume snapshot is deleted, and the backup checkpoint is
merged with the original VM.

D
Microsoft Hyper-V Server 2016 or
Online backup of VMs on Microsoft Hyper-V 2016 relies on production checkpoints.
e
Production checkpoints are point-in-time images of VMs. When producing production checkpoints,
Microsoft Hyper-V does not put VMs to the saved state. Instead, it quiesces data on VMs with the
at

help of the Microsoft VSS technology (for Microsoft Windows VMs) or file system freeze (for Linux
VMs). The resulting checkpoints are application-consistent, so you can recover VMs without any data
lic

loss.

Veeam Backup & Replication performs online backup with the help of production checkpoints only if
up

the following conditions are met:

VM configuration version is upgraded to 8.


D

VMs are deployed on Microsoft Hyper-V Server 2016


[For Microsoft Hyper-V clusters] All hosts in the cluster are upgraded to Microsoft Hyper-V
ot

Server 2016 and the cluster functional level is upgraded.

Online backup is performed in the following way:


N

1. Veeam Backup & Replication interacts with Microsoft Hyper-V VSS and requests backup of a
o

specific VM.
2. Microsoft Hyper-V VSS leverages Microsoft VSS inside the VM (for Microsoft Windows VMs) or
D

file system freeze (for Linux VMs) to bring data on the VM guest OS to a consistent state.
3. Microsoft Hyper-V VSS creates a production checkpoint for the VM. Every virtual disk of a VM
receives a temporary AVHDX file. All new writes are redirected to temporary AVHDX files.
4. Further activities depends on the backup mode:

In the on-host backup mode, Veeam Backup & Replication reads data from VM disks in the
read-only state. After the VM processing completes, the production checkpoint is merged with
the original VM.

Veeam Certified Engineer v9.5 . Textbook 19


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

In the off-host backup mode, the Microsoft Hyper-V host VSS provider takes a snapshot of a
volume on which VM disks are located. Immediately after that, the production checkpoint is
merged with the original VM. The volume snapshot is mounted to the offhost backup proxy and
presented to Veeam Backup & Replication. Veeam Backup & Replication reads VM data from
the volume snapshot. After the backup job completes, the volume snapshot is deleted.

e
ut
ib
tr
is
D
or
e
at

Backup Modes (Hyper-V)


lic

Veeam Backup & Replication offers two modes for processing volume shadow copies – on-
up

host backup and off-host backup. The difference between the two modes lies in the location
where VM data is processed.
D

On-host Backup
ot

During on-host backup, VM data is processed on the source Hyper-V host where the VMs you want to
back up or replicate reside. All processing operations are performed directly on the source Hyper-V
N

host. For this reason, onhost backup may result in high CPU usage and network overhead on the host
system.
o

The on-host backup process includes the following steps:


D

1. Veeam Backup & Replication triggers a snapshot of the necessary volume.


2. The Veeam data mover service uses the created volume snapshot to retrieve VM data; it then
processes the VM data and copies it to the destination.
3. Once the backup process is complete, the volume snapshot is deleted.

20 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Off-host Backup

In the off-host backup mode, backup processing shifts from the source Hyper-V host to a dedicated
machine – an off-host backup proxy. The off-host backup proxy acts as a “data mover” – the Veeam
Data Mover ( also called “transport”) service running on it retrieves VM data from the source
datastore, processes it and transfers to the destination. This type of backup does not impose load on
the Hyper-V host – while resource intensive backup operations are performed on the off-host backup
proxy, production hosts remain unaffected.

e
To perform off-host backup, Veeam Backup & Replication uses transportable shadow copies. The

ut
transportable shadow copy technology enables you to create a snapshot of a data volume on one
server and import, or mount, it onto another server within the same subsystem (SAN) for backup and

ib
other purposes. The transport process is accomplished in a few minutes, regardless of the amount of
the data. The process is performed at the SAN storage layer so it does not impact the host CPU
usage or network performance.

tr
is
In order to perform off-host backup, you must meet the following requirements:

You must configure an off-host backup proxy. The role of an off-host backup proxy can be

D
assigned only to a Microsoft Windows 2008 Server R2 machine with the Hyper-V role enabled,
to a Microsoft Windows Server 2012 machine with the Hyper-V role enabled, to a Microsoft
or
Windows Server 2012 R2 machine with the Hyper-V role enabled or to a Microsoft Windows
2016 Server machine with Hyper-V role enabled.
e
at

Note: The version of the Hyper-V host and off-host backup proxy must match. For example, if you
use a Microsoft Windows 2008 Server R2 machine with the Hyper-V role enabled as a Hyper-V
lic

host, you should deploy the off-host backup proxy on a Microsoft Windows 2008 Server R2
machine with the Hyper-V role enabled. Also please note that Nano Server does not support
hardware VSS and as such cannot be used for off-host backup.
up

In the properties of a backup or replication job, you must select the off-host backup method. If
necessary, you can point the job to a specific proxy.
D

The source Hyper-V host and the off-host backup proxy must be connected (through a SAN
configuration) to the shared storage.
ot

To create and manage volume shadow copies on the shared storage, you must install and
properly configure a VSS hardware provider that supports transportable shadow copies on the
N

off-host proxy and Hyper-V host. Typically, when configuring a VSS hardware provider, you
need to specify a server controlling the LUN and disk array credentials to provide access to the
array.
o

If you back up VMs whose disks reside on a CSV with Data Deduplication enabled, make sure
D

that you use a Microsoft Windows 2012 R2 or newer machine as an off-host backup proxy and
enable the Data Deduplication option on this off-host backup proxy. Otherwise, off-host backup
will fail.

The off-host backup process includes the following steps:

1. Veeam Backup & Replication triggers a snapshot of the necessary volume on the production
Hyper-V host.
2. The created snapshot is split from the production Hyper-V server and mounted to the off-host

Veeam Certified Engineer v9.5 . Textbook 21


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

backup proxy.
3. The Veeam data mover running on a backup proxy uses the mounted volume snapshot to
retrieve VM data; the VM data is processed on the proxy server and copied to the destination.
4. Once the backup process is complete, the snapshot is dismounted from the off-host backup
proxy and deleted on the SAN.

Important! If you plan to perform off-host backup for a Hyper-V cluster with CSV, make sure you
deploy an off-host backup proxy on a host that is NOT a part of a Hyper-V cluster. When a volume

e
snapshot is created, this snapshot has the same LUN signature as the original volume. Microsoft

ut
Cluster Services do not support LUNs with duplicate signatures and partition layouts. For this
reason, volume snapshots must be transported to an off-host backup proxy outside the cluster. If

ib
the off-host backup proxy is deployed on a node of a Hyper-V cluster, a duplicate LUN signature
will be generated, and the cluster will fail during backup or replication.

tr
Services and Components for Backup Proxy (VMware) and Offhost

is
Backup proxy (Hyper-V)

D
The backup proxy uses the following services and components:
or
Veeam Installer Service is an auxiliary service that is installed and started on any Windows
server once it is added to the list of managed servers in the Veeam Backup & Replication
console. This service analyzes the system, installs and upgrades necessary components and
e

services depending on the role selected for the server.


at

Veeam Data Mover Service is responsible for deploying and coordinating executable modules
that act as "data movers" and perform main job activities on behalf of
lic

Veeam Backup & Replication, such as communicating with VMware Tools, copying VM files,
performing data deduplication and compression and so on. It is installed and started on any
Windows server once it is added to the list of managed servers in the Veeam Backup &
up

Replication console as well.


Veeam Hyper-V Integration Service (Hyper-V only) is responsible for communicating with the
VSS framework during backup, replication and other jobs, and performing recovery tasks. It
D

also deploys a driver that handles changed block tracking for Hyper-V.
ot
N
o
D

22 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

e
ut
ib
tr
is
D
or
e
Both Veeam Data Mover Service and Veeam Installer Service are always present at the Windows
server added to the Veeam Backup & Replication UI. Some other services may also be there,
at

depending on the role which this server is configured for.


lic

2.1.4. Backup Repository


up

A backup repository is a location used by Veeam Backup & Replication jobs to store:
D

Backup chains
Copies of VMs (VMware only)
Metadata for replicated VMs
ot

Technically, a backup repository is a folder on the backup storage. By assigning different repositories
N

to jobs and limiting the number of parallel jobs for each one, you can balance the load across your
backup infrastructure.
o

In the Veeam backup infrastructure, you can use one of the following repository types:
D

Windows server with local or directly attached storage. The storage can be a local disk, directly
attached disk-based storage (such as a USB hard drive), or iSCSI/FC SAN LUN in case the
server is connected into the SAN fabric.

On a Windows repository, Veeam Backup & Replication deploys Veeam Data Mover Service
(when you add a Windows-based server to the product console, Veeam Backup & Replication
installs a set of components including the Veeam data mover service on that server). When any

Veeam Certified Engineer v9.5 . Textbook 23


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

job addresses the repository, the Data Mover Service on the repository establishes a
connection with the source-side Data Mover Service on the backup proxy, enabling efficient
data transfer over LAN or WAN.

Windows repositories can be configured to function as vPower NFS Servers (VMware only). In
this case, Veeam Backup & Replication will run the Veeam vPower NFS Service directly on the
backup repository (namely, on the managing Windows server to which storage is attached) and
provide ESX(i) hosts with transparent access to backed up VM images stored on the repository.

e
Linux server with local, directly attached storage or mounted NFS. The storage can be a local
disk, directly attached disk-based storage (such as a USB hard drive), NFS share, or iSCSI/FC

ut
SAN LUN in case the server is connected into the SAN fabric.

ib
On the Linux repository, Veeam Backup & Replication deploys and starts the Veeam data
mover (transport) service when a job addressing this repository is launched. This Data Mover

tr
Service establishes a connection with the source-side Data Mover Service on the backup proxy,
enabling efficient data transfer over LAN or WAN.

is
CIFS (SMB) share. This type of repository does not support Veeam data mover services,

D
therefore data to the SMB share is written from a Windows-based gateway server. By default,
this role is performed by the Backup Proxy that is utilized by the job for data transport.
or
However, if you plan to move VM data to an offsite SMB repository over a WAN link, it is
recommended that you deploy an additional Windows gateway server in the remote site, closer
to the SMB repository.
e
at

Veeam Backup & Replication will deploy a Veeam data mover service on that proxy server,
which will improve data transfer performance.
lic

Deduplicating storage appliance. Veeam Backup & Replication supports the following
deduplicating storage appliances:
up

EMC Data Domain


ExaGrid
HPE StoreOnce
D
ot

Note: You can configure a backup repository to use rotated drives. This scenario can be helpful if
you want to store backups on several external hard drives (for example, USB or eSATA) and plan
to regularly swap these drives between different locations. If you are using rotated drives for a
N

backup repository, select the This repository is backed up by rotated hard drives check box
when setting up a job.
o
D

Fast Clone

To increase the speed of synthetic operations on Microsoft Windows backup repositories, Veeam
Backup & Replication uses the Fast Clone technology based on Block Cloning.

Block Cloning is Microsoft functionality available on ReFS 3.0. Block Cloning allows applications to
quickly copy data blocks between different files or within the limits of one file. When an application
needs to copy data, the file system does not physically copy data on the underlying storage. Instead,

24 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

it performs a low-cost metadata operation — it ‘projects’ data blocks from one region on the ReFS
volume to another one. Block Cloning increases data copying performance as the file system does
not need to read/write data from/to the underlying storage. It also helps reduce the amount of
redundant data.

Backup Repository Configuration

Important! Veeam Backup & Replication supports Fast Clone on all types of backup repositories:

e
simple, scale-out and cloud.

ut
Fast Clone works on backup repositories that meet the following requirements:

ib
Backup repository type: Microsoft Windows 2016 Server or shared folder SMB 3.11
File system: ReFS 3.0
Backup chain: all backup files are stored on the same volume

tr
is
To configure a backup repository with Fast Clone support, you must assign the role of a backup
repository to a Microsoft Windows 2016 Server or shared folder SMB 3.11. Veeam Backup &

D
Replication automatically detects if the server or shared folder meets the specified requirements and if
Fast Clone can be used for work with data stored on this backup repository.
or
Fast Clone requires that the starting and ending file offsets are aligned to cluster boundaries. For this
reason, Veeam Backup & Replication automatically enables the Align backup file data blocks option
for backup repositories that support Fast Clone. Data blocks are aligned at a 4KB or 64 KB block
e
boundary, depending on the volume configuration.
at
lic
up
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 25


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Tip: By default, Veeam Backup & Replication uses Fast Clone for all backup repositories that
meet the specified requirements. You can disable this option with a registry key. For more
information, contact Veeam Support Team.

Operations with Block Cloning

Veeam Backup & Replication leverages Fast Clone for the following synthetic operations:

e
In backup jobs:

ut
Merge of backup files
Synthetic full backup

ib
Reverse incremental backup
Compact of full backup file

tr
In backup copy job:

is
Merge of backup files

D
Creation of archive full backups (synthetic method)
Compact of full backup file or
When Veeam Backup & Replication performs a synthetic operation with Fast Clone, it reports this
information to the session details for this operation:
e
at
lic
up
D
ot
N
o
D

26 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Limitations for Fast Clone/Block Cloning

Veeam Backup & Replication does not use Fast Clone for backup repositories configured with
previous versions of the product. After upgrade, such backup repositories will work as backup
repositories without Fast Clone support. To leverage Fast Clone, you need to remove such
backup repositories from the backup infrastructure and add them once again.
Fast Clone requires that source and destination files are stored on the same ReFS volume. If
you add a backup repository with Fast Clone support as an extent to a scale-out backup
repository, make sure that you enable the Data Locality placement policy for this scale-out

e
backup repository. If backup files are stored on different extents, Fast Clone will not be used.

ut
Offsite backup

ib
The common requirement for offsite backup is that one Veeam data mover service runs in the

tr
production site (closer to the source datastore), and the other Veeam data mover service runs in the
remote target site (closer to the repository). During backup, Veeam data mover services maintain a

is
stable connection, which allows for uninterrupted operation over WAN or slow links.

D
or
e
at
lic
up
D

If you choose to backup to an offsite Windows or Linux repository, Veeam Backup & Replication will
start the target-side Veeam data mover service on the Windows or Linux repository server. The
source-side Veeam data mover service can be hosted either on the source host or on a dedicated off-
ot

host backup proxy, depending on the backup mode you use (on-host or off-host). Backup data is sent
from the source to the repository over WAN.
N

If you choose to backup to an offsite SMB share in the on-host mode, you should deploy an additional
o

Windows-based proxying server in the remote site and point the SMB share to this proxying server in
the backup repository settings. In this scenario, Veeam Backup & Replication starts the target-side
D

Veeam data mover service on the proxying server. The source-side Veeam data mover service can
be hosted either on the source host or on a dedicated off-host backup proxy in the source site,
depending on the backup mode you use (on-host or off-host).

If you choose to backup to an on-site or off-site NFS share, you should deploy an additional Linux-
based Backup Repository, as close as possible to the NFS share, and mount the NFS share on this
Linux-based server.

Veeam Certified Engineer v9.5 . Textbook 27


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

e
ut
ib
tr
is
Scale-Out Backup Repository

D
Prior to Veeam Backup & Replication version 9, each backup repository used a single dedicated
container to store data. This approach led to constraints for configuring bigger backup jobs (e.g., for
or
vCenter backup) due to limited physical capacity. V9 introduces a new logical entity – extendable, or
scale-out backup repository. It embraces several repositories (extents), summarizing their capacity
and offering flexible options for keeping massive backups.
e

An extent is a standard Veeam backup repository of any supported type (except for cloud) which was
at

added to the scale-out repository.


lic

You can use the scale-out backup repository for the following types of jobs and tasks:

Backup jobs.
up

Backup copy jobs. You can copy backups that reside on scale-out backup repositories and
store backup copies on scale-out backup repositories.
VeeamZIP tasks.
D

Backup files stored on the scale-out repository can be used for all types of restores, replication from
ot

backup and backup copy jobs. You can verify such backups with SureBackup jobs. The scale-out
backup repository can be used as a staging backup repository for restore from tape media. Files
restored from the tape media are placed to the extents according to data placement policy configured
N

for the scale-out backup repository


o

The following backup files placement policies are available:


D

Data locality - all dependent backup files are placed on the same extent. For example, all VIBs
are where possible placed together with their corresponding VBK. Built-in logic determines
where the first VBK will be placed, based on several criteria: extent status (online\offline), free
space and number of slots. When job processing starts, extent scheduler requests free space
from the extents, and then estimates the required space to store the backup – it assumes that
VBK will become avg. 50% less, and VIB will be 10% less (due to compression). The Data
locality policy does not put any limitations to backup chains. A new backup chain may be stored

28 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

on the same extent or another extent. For example, if you create an active full backup, Veeam
Backup & Replication may store the full backup file to another extent, and all dependent
incremental backup files will be stored together with this full backup file. However, if you use a
deduplicating storage appliance as an extent to the scale-out backup repository, Veeam
Backup & Replication will attempt to place a new full backup to the extent where the full backup
from the previous backup chain resides. Such behavior will help increase the data deduplication
ratio.
Performance - can improve performance of transform operations if you use raw data devices as
extents. When Veeam Backup & Replication performs transform operations, it needs to access

e
a number of backup files on the backup repository. If these files are located on different storage

ut
devices, the I/O load on the devices hosting backup files will be lower. If you set the
Performance policy, you must make sure that the network connection between extents is fast
and reliable. You must also make sure all extents are online when the backup job, backup copy

ib
job or a restore task starts. If any extent hosting backup files in the current backup chain is not
available, the backup chain will be broken, and Veeam Backup & Replication will not be able to

tr
complete the task. To avoid data loss in this situation, you can enable the Perform full backup
when required extent is offline option for the scale-out backup repository. With this option

is
enabled, Veeam Backup & Replication will create a full backup instead of incremental backup if
some files are missing from the backup chain.

D
If you decide to change the policy settings, consider that the new options will be applied starting from
or
the next job run. Similarly, extent settings you specified on the previous step (in particular, per-VM
files placement) will be updated starting from the next full backup creation.
e
To discover the extent where a particular VM data was stored, examine job session data.
at

Important! After you add an extent, you will not be able to use it as a standalone repository until
lic

you remove it from the scale-out repository.


up

You can remove an extent from scale-out repository by selecting the required scale-out repository and
clicking Edit Repository on the toolbar or using the Properties command from the shortcut menu.
After that, you can choose to keep the backups in the extent after it becomes a standalone repository
D

or manually evacuate them.


ot

When planning for a scale-out repository, consider the following limitations:

The scale-out backup repository functionality is available only in Enterprise and Enterprise Plus
N

editions of Veeam Backup & Replication.


If you configure a scale-out backup repository and then downgrade to the Standard license, you
o

will not be able to run jobs targeted at the scale-out backup repository. However, you will be
able to perform restore from the scale-out backup repository.
D

You cannot use the scale-out backup repository as a target for the following types of jobs:
Configuration backup job
Replication jobs
VM copy jobs
Endpoint backup jobs
You cannot add a backup repository as an extent to the scale-out backup repository if any job
of unsupported type is targeted at this backup repository or if the backup repository contains
data produced by jobs of unsupported types (for example, replica metadata). To add such

Veeam Certified Engineer v9.5 . Textbook 29


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

backup repository as an extent, you must first target unsupported jobs to another backup
repository and remove the job data from the backup repository.
You cannot use a scale-out backup repository as a cloud repository. You cannot add a cloud
repository as an extent to the scale-out backup repository.
You cannot use a backup repository with rotated drives as an extent to a scale-out backup
repository. Even you enable the This repository is backed up by rotated hard drives setting for
an extent, Veeam Backup & Replication will ignore this setting and use an extent as a simple
backup repository.
If a backup repository is added as an extent to the scale-out backup repository, you cannot use

e
it as a regular backup repository.

ut
You cannot add a scale-out backup repository as an extent to another scale-out backup
repository.
You cannot add a backup repository as an extent if this backup repository is already added as

ib
an extent to another scale-out backup repository.
You cannot add a backup repository on which some activity is being performed (for example, a

tr
backup job or restore task) as an extent to the scale-out backup repository.
If you use Enterprise Edition of Veeam Backup & Replication, you can create 1 scale-out

is
backup repository with 3 active extents and 1 inactive extent (extent put at the Maintenance
mode). You can add inactive extents, for example, if any of active extents has no free space,

D
and you want to evacuate backup data from it. If you add 4 extents and do not put any of them
to the Maintenance mode, the jobs targeted at the scale-out backup repository will
or
fail. Enterprise Plus Edition has no limitations on the number of scale-out backup repositories or
extents.
e

Mount Server
at
lic

The mount server is required if you perform restore VM guest OS files and application items to the
original location. The mount server lets you route VM traffic by an optimal way, reduce load on the
network and speed up the restore process.
up

When you perform file-level restore or application item restore, Veeam Backup & Replication needs to
mount the content of the backup file to a staging server. The staging server must be located in the
D

same site as the backup repository where backup files are stored. If the staging server is located in
some other site, Veeam Backup & Replication may route data traffic in a non-optimal way.
ot

To prevent VM data from traveling between sites, Veeam Backup & Replication uses the mount
server. The mount server acts as a "mount point" for backups in the backup repository. When you
N

restore files or application items to the original location, Veeam Backup & Replication mounts the
content of the backup file to the mount server (or the original VM for restore to the Microsoft SQL
o

Server and Oracle VMs) and copies files or items to their destination via this mount server or VM.
D

Mount Server Deployment

The mount server is created for every backup repository and associated with it. When you configure a
backup repository, you define which server you want to use as a mount server for this backup
repository. By default, Veeam Backup & Replication assigns the mount server role to the following
machines:

Backup repository. For Microsoft Windows backup repositories, the mount server role is

30 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

assigned to the backup repository server itself.


Backup server. For Linux, shared folder backup repositories and deduplicating storage
appliances, the mount server role is assigned to the backup server.
Veeam Backup & Replication console. The mount server role is also assigned to a machine on
which the Veeam Backup & Replication console is installed. Note that this type of mount server
is not registered in the Veeam Backup & Replication configuration database.

For scale-out backup repositories, you must define the mount server for every extent.

e
If you do not want to use default mount servers, you can assign the mount server role to any Microsoft
Windows machine in the backup infrastructure. It is recommended that you configure at least one

ut
mount server in each site and associate this mount server with the backup repository residing in this
site. The mount server and backup repository must be located as close to each other as possible. In

ib
this case, you will be able to keep the VM traffic in one site.

tr
is
D
or
e
at
lic
up

Services and Components

On the mount server machine, Veeam Backup & Replication installs the Veeam Mount Service. The
D

Veeam Mount Service requires .NET 4.5.2. If .NET 4.5.2 is not installed on the
machine, Veeam Backup & Replication will install it automatically.
ot

Requirements to Mount Server


N

The machine to which you assign the mount server role must meet the following requirements:
o

You can assign the role of a mount server to Microsoft Windows machines (physical or virtual).
You can assign the role of a mount server to 64-bit machines only.
D

The mount server must have access to the backup repository with which it is associated and to
the original VM (VM to which you restore files or application items). For restore from storage
snapshots, the mount server must also have access to the ESX(i) host on which the temporary
VM is registered.

Veeam Certified Engineer v9.5 . Textbook 31


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Proxy Affinity

By default, Veeam Backup & Replication assigns backup proxies and repositories for jobs or tasks
independently of each other. If you need to bind backup proxies to specific backup repositories and
use them together, you can define proxy affinity settings. Proxy affinity determines what backup
proxies are eligible to access a specific backup repository and read/write data from/to this backup
repository.

Proxy affinity lets you control assignment of resources in the backup infrastructure and reduce

e
administration overhead. For example, in case of a geographically distributed infrastructure, you can

ut
restrict a backup repository in the local site from communicating with backup proxies in a remote
site or you can configure proxy affinity rules based on a connection speed between backup proxies

ib
and backup repositories. Proxy affinity settings are specified at the level of a backup repository. By
default, Veeam Backup & Replication let's all backup proxies in the backup infrastructure access the
backup repository. Using proxy affinity settings, you can define a list of backup proxies that can

tr
access this backup repository.

is
D
or
e
at
lic
up
D
ot
N
o

Proxy affinity can be set up for the following types of backup repositories:
D

Simple backup repositories


Scale-out backup repositories
Cloud repositories (proxy affinity settings are configured on the tenant side)

Proxy affinity rules are applied for the following types of jobs and tasks that engage backup proxies
and repositories:

Backup jobs, including VMware vCloud backup and backup jobs from storage snapshots on

32 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

primary and target storage arrays


VeeamZIP
VM copy
Entire VM restore
Hard disk restore

Note: Proxy affinity rules are not applied for replication jobs.

e
Proxy affinity rules are not restrictive. You can think of affinity rules as a priority list. If backup proxies

ut
from the proxy affinity list cannot be used for some reason, for example, these backup proxies are
inaccessible, Veeam Backup & Replication automatically fails over to the regular processing mode. It

ib
displays a warning in the job or task session and picks the most appropriate backup proxy from the
list of proxies selected for the job or task.

tr
When you target a job at a backup repository for which proxy affinity settings are configured, you must

is
make sure that you assign a backup proxy from the proxy affinity list for job or task processing. If you
assign a backup proxy that is not bound to this backup repository, Veeam Backup & Replication will

D
display a warning. For job processing, Veeam Backup & Replication will use the backup proxy that
you define in the job settings, which may result in degraded job performance.
or
Proxy Affinity for Scale-Out Backup Repositories

In case of a scale-out backup repository, you can configure proxy affinity settings at the extent level.
e
Proxy affinity settings cannot be configured at the scale-out backup repository level. Extent selection
at

rules have a higher priority than proxy affinity rules. Veeam Backup & Replication first selects an
extent and then picks a backup proxy according to the proxy affinity rules specified for this extent. For
lic

example, you have 2 backup proxies: Backup Proxy 1 and Backup Proxy 2. You create a backup job
and target it at a scale-out backup repository configured in the following way:
up

Scale-out backup repository policy is set to Data Locality.


Scale-out backup repository has 2 extents: Extent 1 has 100 GB of free space and is bound to
Backup Proxy 1; Extent 2 has 1 TB of free space and is bound to Backup Proxy 2.
D

In the backup job settings, you define that Backup Proxy 1 must be used for job processing. When
you run the backup job, Veeam Backup & Replication will store backup files to Extent 2 since it has
ot

more free space. For job processing, it will pick Backup Proxy 1 and in the job statistics will report a
warning that requirements of proxy affinity rules cannot be met.
N

In case of restore from a scale-out backup repository, backup files may be located on different
o

extents. In this case, Veeam Backup & Replication picks a backup proxy according to the following
priority rules (starting from the most preferable one):
D

1. Backup proxy is added to the affinity list for all extents.


2. Backup proxy is added to the affinity list for the extent where the full backup file is stored.
3. Backup proxy is added to the affinity list for at least one extent.

Veeam Certified Engineer v9.5 . Textbook 33


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

2.2. Optional Components


This topic defines some of the additional components of Veeam Backup & Replication and
gives you an understanding of their functionality.

2.2.1. Veeam Backup Enterprise Manager

e
Veeam Backup Enterprise Manager is an optional component intended for distributed enterprise
environments with multiple backup servers. Veeam Backup Enterprise Manager federates Veeam

ut
backup servers and offers a consolidated view of these servers through a web browser interface. You
can centrally control and manage all jobs through a “single pane of glass", edit and clone jobs,

ib
monitor job state, and get reporting data across all backup servers. Veeam Backup Enterprise
Manager also enables you to search for the OS files in all current and archived backups across your

tr
backup infrastructure, and restore these files in one click.

is
Veeam Backup Enterprise Manager can be installed on a physical or virtual machine. You can deploy
it on the Veeam backup server or use a dedicated machine.

D
Veeam Backup Enterprise Manager uses the following services and components:
or
Veeam Backup Enterprise Manager coordinates all operations of Veeam Backup Enterprise
Manager, aggregates data from multiple Veeam backup servers and provides control over
these servers.
e
Veeam Enterprise Manager Database is used by Veeam Backup Enterprise Manager for
at

storing data. The database instance can be located on an SQL Server installed either locally
(on the same machine as Veeam Backup Enterprise Manager Server) or remotely.
lic

Veeam Backup Catalog Service on Veeam Backup Enterprise Manager works as a global,
federal catalog service. It communicates with Veeam Backup Catalog services on Veeam
backup servers connected to Veeam Backup Enterprise Manager and performs the following
up

tasks:
Replicates indexing data from Veeam backup servers to create a global catalog for the
whole backup infrastructure. By default, the Veeam Backup Catalog folder is located in
D

the C:\VBRCatalog folder on the Veeam Backup Enterprise Manager server.


Maintains indexing data retention.
ot

Lets you search for VM guest OS files in current and archived backup file.
N

2.2.2. U-AIR Wizard


o

Universal Application Item-Level Recovery (or U-AIR) addresses one of the most common IT problem
D

– it enables you to restore individual objects from virtualized applications (for example, email
messages, database records, directory objects and so on) for rare applications – when there is no
suitable Veeam Explorer.

For recovery of application objects, U-AIR leverages the vPower technology. It starts the application
and all components required for its proper work in an isolated virtual lab directly from compressed and
deduplicated backup files. Once the VM is started, U-AIR provides transparent access to the backed
up VM image through a proxy appliance that has visibility of both the virtual lab and production
environment. Users can then extract the necessary application objects from the earlier VM images

34 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

and bring them back to the production environment. U-AIR Universal wizard is a standalone
component that can be installed and updated independent of the product on any machine in the
production environment from which the restore process must be performed.

2.2.3. Veeam Backup Search


In Veeam Backup & Replication, search for guest OS files in backups is performed with Veeam
Backup Enterprise Manager. However, if you frequently need to search through a great number of

e
backups, it is recommended to install Veeam Backup Search from the installation package on a

ut
machine running Microsoft Search Server. Veeam Backup Search is an optional component in the
backup infrastructure that is used for the purpose of search performance optimization.

ib
The Veeam Backup Search server runs the MOSS Integration Service that invokes updates of index
databases on Microsoft Search Server. The service also sends search queries to Microsoft Search

tr
Server which processes them and returns necessary search results to Veeam Backup Enterprise

is
Manager.

D
2.3. Deployment Scenarios or
Veeam Backup & Replication can be used in virtual environments of any size and complexity
right out of the box. The architecture of the solution supports onsite and offsite data
e
protection, operations across remote sites and geographically dispersed locations. Veeam
Backup & Replication provides flexible scalability and easily adapts to the needs of your
at

virtual environment.
lic

Before installing Veeam Backup & Replication, it is strongly advised to familiarize yourself
with common deployment scenarios and carefully plan your backup infrastructure layout.
up

2.3.1. Simple Deployment


D

In a simple deployment scenario, one instance of Veeam Backup & Replication is installed on a
physical or virtual Windows-based machine. This server is referred to as a Veeam backup server.
ot

Simple deployment for VMware implies that the Veeam backup server fills the following roles:
N

It functions as a management point, coordinates all jobs, controls their scheduling and performs
other administrative activities.
o

It acts as the default backup proxy for handling job processing and transferring backup traffic.
D

All components necessary for the backup proxy functionality are installed on the Veeam backup
server locally.
It is used as the default backup repository. During installation, Veeam Backup & Replication
checks volumes of the machine on which you install the product and identifies a volume with
the greatest amount of free disk space. In the root of this volume, Veeam Backup & Replication
creates the Backup folder that is used as the default backup repository (for example
X:\Backup).
It is used as a mount server and guest interaction proxy.

Veeam Certified Engineer v9.5 . Textbook 35


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

e
ut
ib
tr
is
Simple deployment for Hyper-V implies that the Veeam backup server fills two major roles:

It functions as a management point, coordinates all jobs, controls their scheduling and performs

D
other administrative activities.
It is used as the default backup proxy. During installation, Veeam Backup & Replication checks
or
volumes of the machine on which you install the product and identifies a volume with the
greatest amount of free disk space. On this volume, Veeam Backup & Replication creates the
Backup folder that is used as the default backup repository.
e
It is used as a mount server and guest interaction proxy.
at

In this scenario, source Hyper-V host acts as a backup proxy, handling job processing and
transferring backup traffic directly to the target. All necessary backup proxy services are installed on
lic

source Hyper-V servers.


up

If you decide to use a simple deployment scenario in the Hyper-V environment, you can install Veeam
Backup & Replication right on the Hyper-V host where VMs you want to work with reside. However, to
use this Hyper-V host as the source for backup and replication, you will still need to add it to the
D

Veeam Backup & Replication console.


ot
N
o
D

36 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

If you plan to back up and replicate only a small number of VMs or evaluate
Veeam Backup & Replication, this configuration is enough to get you started.
Veeam Backup & Replication is ready for use right out of the box – as soon as it is installed, you can
start using the solution to perform backup and replication operations. To balance the load of backing
up and replicating your VMs, you can schedule jobs at different times.

In the environments that require a large number of backup or replication activities, the simple
deployment scenario is not appropriate for the following reasons:

e
The Veeam backup server might not have enough disk capacity to store the required amount of
backup data.

ut
[For Microsoft Hyper-V environments] A significant load is placed on production servers that
combine the roles of backup proxies and source hosts.

ib
tr
2.3.2. Advanced Deployment

is
In large-scale virtual environments with a large number of jobs, the load on the backup
server is heavy. In this case, it is recommended that you use the advanced deployment

D
scenario that moves the backup workload to dedicated backup infrastructure components.
or
Advanced Deployment for VMware

The essence of the advanced deployment is that the backup proxy takes off a part of Veeam backup
e

server activities (namely, it collects and processes data and moves backup traffic from source to
at

target). In addition, the Veeam backup server no longer acts as a storage location – the backup proxy
transports VM data to a dedicated backup repository which is the location for keeping backup files,
lic

VM copies, metadata and so on. The Veeam backup server in this scenario functions as a "manager"
for deploying and maintaining backup proxies and repositories.
up
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 37


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

e
ut
ib
tr
is
D
or
To deploy a backup proxy and/or a backup repository, you should add a server to
Veeam Backup & Replication and assign a proxy and/or repository role to it.
Veeam Backup & Replication will automatically install light-weight components and services onto
e
these servers. A backup proxy does not require a separate SQL database – all settings are stored
centrally, within the Veeam backup server’s SQL database.
at

With the advanced deployment scenario, you can easily meet your current and future data protection
lic

requirements. You can expand your backup infrastructure horizontally in a matter of minutes to match
the amount of data you want to process and available network throughput. Instead of growing the
up

number of backup servers or constantly tuning job scheduling, you can install multiple backup proxies
and repositories and distribute the backup workload among them. The installation process is fully
automated, which simplifies deployment and maintenance of the backup infrastructure in your virtual
D

environment.

Veeam Backup & Replication assigns backup proxies to VMs included in the backup job one by one.
ot

Before processing a new VM in the VM list, Veeam Backup & Replication checks available backup
proxies. If more than one backup proxy is available, Veeam Backup & Replication analyzes transport
N

modes that the backup proxies can use to retrieve VM data and the current workload on the backup
proxies to select the most appropriate one for VM processing.
o

The advanced deployment scenario can be a good choice for backing up and replicating off site. You
D

can deploy a backup proxy in the production site and another one in the DR site, closer to the backup
repository to avoid saturating the connection. When a job is performed, backup proxies on both sides
establish a stable connection, allowing for efficient transport of data over a slow network connection
or WAN.

Note: To regulate backup load, you can specify the maximum number of concurrent tasks per
proxy and set up throttling rules to limit proxy bandwidth. The maximum number of concurrent

38 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

tasks can also be specified for a backup repository in addition to the value of the read and write
data rates for it.

Another advantage of the advanced deployment scenario is that it contributes to high availability –
jobs can migrate between proxies if one of them becomes overloaded or unavailable.

Advanced Deployment for Hyper-V

e
For mid-size and large-scale Hyper-V environments with a great number of backup and replication

ut
jobs, the advanced deployment scenario can be a good choice.

ib
The advanced deployment includes the following components:

tr
Virtual infrastructure servers — Hyper-V hosts used as source and target for backup and
replication.

is
Backups server — a configuration and control center of the backup infrastructure.
Off-host backup proxy — a “data mover” component used to retrieve VM data from the source

D
datastore, process it and deliver to the target.
Backup repository — a location used to store backup files and auxiliary replica files.
Dedicated mount servers — component required for VM guest OS files and application items
or
restore to the original location.
Dedicated guest interaction proxies — components used to deploy the runtime process in
Microsoft Windows VMs.
e
at
lic
up
D
ot
N
o
D

With the advanced deployment scenario, you can expand your backup infrastructure horizontally in a
matter of minutes to meet your data protection requirements. Instead of growing the number of
backup servers or constantly tuning job scheduling, you can install multiple backup infrastructure
components and distribute the backup workload among them. The installation process is fully

Veeam Certified Engineer v9.5 . Textbook 39


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

automated, which simplifies deployment and maintenance of the backup infrastructure in your virtual
environment.

In virtual environments with several proxies, Veeam Backup & Replication dynamically distributes the
backup traffic among these proxies. A job can be explicitly mapped to a specific proxy. Alternatively,
you can let Veeam Backup & Replication choose an off-host backup proxy. In this
case, Veeam Backup & Replication will check settings of available backup proxies and select the
most appropriate one for the job. The backup proxy should have access to the source and target
hosts, and to backup repositories to which files will be written.

e
To regulate the backup load, you can specify the maximum number of concurrent tasks per backup

ut
proxy and set up throttling rules to limit the proxy bandwidth. For a backup repository, you can set the
maximum number of concurrent tasks and define a combined data rate.

ib
tr
2.3.3. Distributed Deployment

is
The distributed deployment scenario is recommended for large, geographically dispersed virtual
environments with multiple Veeam backup servers installed across different sites. These backup

D
servers are federated under Veeam Backup Enterprise Manager – an optional component that
provides centralized management and reporting for these servers through a web interface.
or
e
at
lic
up
D
ot
N

Veeam Backup Enterprise Manager collects data from Veeam backup servers and enables you to run
backup and replication jobs across the entire backup infrastructure through a “single pane of glass",
edit them, and clone jobs using a single job as a template.
o
D

Using indexing data consolidated on one server, Veeam Backup Enterprise Manager provides
advanced capabilities to search for guest OS files of Windows-based VM backups created on all
Veeam backup servers (even if they are stored in repositories on different sites), and recover them in
a single click.

With flexible delegation options and security roles, IT administrators can delegate the necessary file
restore or VM restore rights to authorized personnel in the organization – for example, allow database
administrators to restore Oracle or SQL server VMs.

40 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

If you use Veeam Backup Enterprise Manager in your backup infrastructure, you do not need to install
licenses on every Veeam backup server you deploy. Instead, you can install one license on the
Veeam Backup Enterprise Manager server and it will be applied to all servers across your backup
infrastructure. This approach simplifies tracking license usage and license updates across multiple
Veeam backup servers.

In addition, VMware administrators will benefit from Veeam’s plug-in for vSphere Web Client that can
be installed using Veeam Backup Enterprise Manager setup. They can analyze cumulative
information on used and available storage space view and statistics on processed VMs, review

e
success, warning, and failure counts for all jobs, easily identify unprotected VMs, and perform
capacity planning for repositories, all directly from vSphere.

ut
ib
2.3.4. Distributed Architecture

tr
Veeam Backup & Replication provides enterprise scalability through the distributed
architecture and automatic intelligent load balancing.

is
D
Distributed Architecture
or
Distributing backup processing across multiple proxy servers and repositories:

Makes it easier for you to scale your Backup & Replication deployment
e
Enables you to achieve higher availability and redundancy: if a proxy goes down, another one
can still complete the task – no more single point of failure
at

Reduces the impact from backups on the production infrastructure through intelligent load
balancing
lic

Dramatically simplifies job scheduling (by automatically controlling the desired tasks
concurrency)
Controls backup storage saturation (for when the backup storage is too slow)
up

With automatic intelligent load balancing, Veeam Backup & Replication picks the best proxy server
(best in terms of connectivity to VM data, as well as least loaded with other tasks) to perform the
D

backup for a VM each time the job runs.


ot

Built-in mechanisms of resource scheduling enable Veeam Backup & Replication to automatically
select and use optimal resources to run configured jobs. Resource scheduling is performed by the
N

Veeam Backup Service running on the Veeam backup server. When a job starts, it communicates
with the service to inform it about the resources it needs. The service analyzes job settings,
parameters specified for backup infrastructure components, current load on the components, and
o

automatically allocates optimal resources to the job.


D

Enabling Parallel Processing

Veeam Certified Engineer v9.5 . Textbook 41


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

e
ut
ib
tr
is
D
or
e
at

Multiple VMs and VM disks can be processed in parallel, optimizing your backup infrastructure
lic

performance and increasing the efficiency of resource usage; each data processing task within a job
requires one CPU core – consider this value when configuring job settings.
up

Note: This is a global setting, so if configured, it will take effect for all backup, backup
D

copy, replication jobs, and restore tasks — entire VM restore and VM disks restore.
ot

If you have parallel processing enabled and several proxies/repositories in the infrastructure, you can:

Distribute backup processing across multiple proxy servers to make it easier for you to scale
N

your Backup & Replication deployment


Achieve higher availability and redundancy: if a proxy goes down, another one can still
o

complete the task – no more single point of failure


D

Reduce the impact from backups on the production infrastructure through intelligent load
balancing
Dramatically simplify job scheduling (by automatically controlling the desired tasks concurrency)
Control backup storage saturation (for when the backup storage is too slow)

42 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

2.4. Prerequisites & System Requirements


Before you begin the installation process, take the following steps to prepare for deployment:

Check Item Description

Platform-specific and Make sure the computer on which Veeam Backup & Replication is to
system requirements be installed meets the system requirements

e
Make sure all accounts you will be using have sufficient permissions.

ut
Account permissions You will not be able to use Veeam Backup & Replication successfully
if the accounts do not have required permissions.

ib
Communication between components requires a number of ports to
Ports
be open. Carefully plan your backup strategy and infrastructure layout.

tr
is
Also, note the following:

D
1. Veeam Backup & Replication requires .NET Framework 4.5.2. If it is not available, the Veeam
Backup & Replication setup will install it on your computer.
2. Veeam Backup & Replication uses an SQL Server instance installed either locally or remotely.
or
In case it is not installed, the Veeam Backup & Replication setup will install Microsoft SQL
Server 2012 SP3 Express on your computer. If a Microsoft SQL Server instance has already
been installed by the previous version, Veeam Backup & Replication will connect to the existing
e
database, upgrade it (if necessary) and use it for work.
at

2.4.1. Requirements
lic

This section covers the list of system requirements for VMware vSphere and Microsoft Hyper-V
up

environments, Veeam Backup & Replication console, virtual machines and backup targets, necessary
rights and permissions, as well provides information on ports used by Veeam Backup & Replication.
D

Important! Pay attention on whether the architecture at the machine you are planning use for
ot

using for a particular role in your backup infrastructure is 64 or 32-bit.


N

The following components require 64-bit version of the operation system ONLY:

Veeam backup server


o

WAN Accelerator
D

Veeam Explorers

2.4.2. Platform Support


Veeam Backup & Replication provides full support for the VMware vSphere and Hyper-V
virtualization platform.

Veeam Certified Engineer v9.5 . Textbook 43


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Virtual Infrastructure

Specification VMware Requirement Hyper-V Requirement

- Windows Server
2016
- Windows Server
- vSphere 6.x
2012 R2
Platform - vSphere 5.x
- Windows Server
- vSphere 4.1

e
2012
- Windows Server

ut
2008 R2 SP1

ib
- Windows Nano
Server (with

tr
Microsoft Hyper-V
role installed)

is
- Windows Server
Hyper-V 2016
- Windows Server

D
Hyper-V 2012 R2
or - Windows Server
Hyper-V 2012
- ESXi 6.x - Windows Server
- ESXi 5.x Hyper-V 2008 R2
- ESX(i) 4.1 SP1
e

Hypervisor Free ESXi is not - Microsoft Hyper-V


at

supported. Veeam Backup & Replication leverages Server (free


vSphere and vStorage APIs that are disabled by hypervisor) is
lic

VMware in free ESXi. supported


Depending on your
Windows Server
up

version, some
additional hot fixes
not included in the
Windows Update
D

must be installed.
Please refer
ot

to KB1838 for more


information.
N
o
D

44 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Specification VMware Requirement Hyper-V Requirement

- Microsoft
PowerShell Engine
2.0 (optional,
enables networkless
guest processing)
- Microsoft System
Center Virtual
Machine Manager

e
2016 (optional)

ut
- Microsoft System
Management - vCenter Server 6.x
Center Virtual
Server - vCenter Server 5.x
Machine Manager

ib
(optional) - vCenter Server 4.1
2012 R2 (optional)
- Microsoft System

tr
Center Virtual
Machine Manager

is
2012 SP1 (optional)
- Microsoft System

D
Center Virtual
Machine Manager
2008 R2 SP1
or (optional)
e

Important! Please note free ESXi is not supported by Veeam Backup & Replication due to the
at

technical limitation: host?level snapshot backups are not supported with free ESXi.
lic
up
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 45


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Virtual Machines

Specification VMware Requirement Hyper-V Requirement

- All types and versions of


virtual hardware are supported,
including 62 TB VMDK.
- Supported virtual hardware versions are 5.0
- Virtual machines with disks
and 8.0 (Hyper-V 2016).

e
engaged in SCSI bus sharing
- Both Generation 1 and 2 virtual machines are
are not supported, because

ut
supported, including 64 TB VHDX disks.
VMware does not support
- [For Microsoft Hyper-V 2016 Server VMs]
snapshotting such VMs.
Processing of VMs with pass-through virtual

ib
- RDM virtual disks in physical
disks and disks connected via in-guest iSCSI
mode, independent disks, and
Hardware initiator is not supported. Veeam Backup &

tr
disks connected via in-guest
Replication cannot create checkpoints for such
iSCSI initiator are not
VMs.

is
supported, and are skipped
[For Microsoft Hyper-V 2012 R2 server and
from processing automatically.
earlier VMs] Pass-through virtual disks and
Network shares and mount

D
disks connected via in-guest iSCSI initiator are
points targeted to 3rd party
not supported, and are skipped from
storage devices are also
processing automatically.
skipped as these volumes/disks
or
are not visible in the VM
configuration file.
e

- All operating systems supported by Hyper-V.


at

- Application-aware processing is supported


for Microsoft Windows 2003 SP2 and later
lic

- All operating systems except Nano Server, due to the absence of


supported by VMware. VSS framework.
- Application-aware processing - Microsoft Windows file-level restore option is
up

OS for Microsoft Windows 2003 supported on NTFS, FAT, FAT32 and ReFS
SP1 and later except Nano file systems (ReFS is supported only
Server, due to the absence of if Veeam Backup & Replication is installed on
D

VSS framework. Microsoft Windows Server 2012 and later). To


restore files from non-Microsoft Windows
guests (Linux, Solaris, BSD, Novell OES), use
ot

the Multi-OS File Level Restore wizard.


N

- VMware Tools (optional,


recommended). VMware Tools
are required for the following
o

operations: application-aware
processing, file-level restore
D

Hyper-V integration components (required for


Software from Microsoft Windows guest
application-aware processing)
OS and SureBackup testing
functions.
- All latest OS service packs
and patches (required for
application-aware processing).

46 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

vCloud Director

Specification Requirement

vCloud Director (optional) vCloud Director 5.5, 5.6, 8.0, 8.10, 8.20

2.4.3. System Requirements

e
Make sure that servers on which you plan to deploy backup infrastructure components meet
the following system requirements:

ut
ib
Veeam Backup Server

tr
Specification VMware Requirement Hyper-V Requirement

is
CPU: x86-64 processor.
Memory: 4 GB RAM plus 500 MB RAM for each concurrent job. Additionally, for users with

D
tape installations (for file to tape jobs processing more than 1,000,000 files):
- 1,5 GB RAM for file to tape backup for each 1,000,000 files
- 2,6 GB RAM for file restore for each 1,000,000 files
or
- 1,3 GB RAM for catalog jobs for each 1,000,000 files
Hardware Disk Space: 2 GB for product installation and 4.5 GB for Microsoft .NET Framework 4.5.2
installation. 10 GB per 100 VM for guest file system catalog folder (persistent
data). Additional free disk space for Instant VM Recovery cache folder (non-persistent
e
data, at least 10 GB recommended).
at

Network: 1 Gbps or faster for on-site backup and replication, and 1 Mbps or faster for off-
site backup and replication. High latency and reasonably unstable WAN links are
supported.
lic

Only 64-bit version of the following operating systems are supported:


- Microsoft Windows Server 2016
up

- Microsoft Windows Server 2012 R2


- Microsoft Windows Server 2012
OS - Microsoft Windows Server 2008 R2 SP1
D

- Microsoft Windows Server 2008 SP2


- Microsoft Windows 10
- Microsoft Windows 8.x
ot

- Microsoft Windows 7 SP1


N
o
D

Veeam Certified Engineer v9.5 . Textbook 47


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Specification VMware Requirement Hyper-V Requirement

During setup, the setup performs system


configuration check to determine if all prerequisite
During setup, the setup performs
software is available on the machine where you
system configuration check to
plan to install Veeam Backup & Replication. If
determine if all prerequisite software
some of the required software components are
is available on the machine where
missing, the setup wizard will offer you to install
you plan to
missing software automatically. This refers to:
install Veeam Backup & Replication.
- Microsoft .NET Framework 4.5.2
If some of the required software
- Microsoft Windows Installer 4.5

e
components are missing, the setup
- Microsoft SQL Server Management Objects
wizard will offer you to install

ut
- Microsoft SQL Server System CLR Types
missing software automatically. This
- Microsoft Visual C++ 2010 Service Pack 1
refers to:
redistributable package

ib
- Microsoft .NET Framework 4.5.2
The following software must be installed manually:
- Microsoft Windows Installer 4.5
Software - Microsoft PowerShell 2.0 or later (optional).
- Microsoft SQL Server

tr
- Firefox, Google Chrome, Microsoft Edge or
Management Objects
Microsoft Internet Explorer 10.0 or later.
- Microsoft SQL Server System CLR

is
- System Center Virtual Machine Manager
Types
2016/2012 R2/2012/2008 R2 Admin UI (optional,
- Microsoft Visual C++ 2010 Service
to be able to register SCVMM server

D
Pack 1 redistributable package
with Veeam Backup & Replication infrastructure).
The following software must be
- RDP client version 7.0 and later installed on the
installed manually:
backup server (required to open the VM console
- Microsoft PowerShell 2.0 or later
or
during SureBackup recovery verification of
(optional).
Microsoft Hyper-VVMs). The RDP client is pre-
- Firefox, Google Chrome, Microsoft
installed on Microsoft Windows 7/Windows Server
Edge or Microsoft Internet Explorer
e
2008 R2 OS and later. You can download the RDP
10.0 or later.
client
at

from http://support.microsoft.com/kb/969084/en-us.
lic

Local or remote installation of the following versions of Microsoft SQL Server (both Full
and Express Editions are supported):
- Microsoft SQL Server 2016
up

- Microsoft SQL Server 2014


- Microsoft SQL Server 2012 (Microsoft SQL Server 2012 SP3 Express Edition is included
in the setup)
SQL
- Microsoft SQL Server 2008 R2
D

Database
- Microsoft SQL Server 2008
Veeam Backup & Replication and Veeam Backup Enterprise Manager configuration
databases can be deployed on Microsoft SQL AlwaysOn Availability Groups. To do this,
ot

you must modify a database connection registry key on


the Veeam Backup & Replication or Veeam Backup Enterprise Manager server. For more
N

information about the registry key, contact Veeam Support Team.


o
D

Note: If you plan to back up VMs running Microsoft Windows Server 2012 R2 or later and Data
Deduplication is enabled for some of VM volumes, it is recommended to deploy the Veeam
Backup & Replication console on a machine running the same version of Microsoft Windows
Server with Data Deduplication feature enabled. Otherwise, certain types of restore operations for
these VMs (such as Windows File Level Recovery) may fail.

48 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Backup Proxy

Specification VMware Backup Proxy Requirement Off-host Backup Proxy Requirement

CPU: modern x86 processor with minimum of 2 cores (vCPUs), plus 1 core (vCPU)
for each additional concurrent task. Using faster processors improves data
processing performance.
Memory: 2 GB RAM plus 200 MB for each concurrent task. Using faster memory
Hardware (DDR3/DDR4) improves data processing performance.

e
Disk Space: 300 MB.
Network: 1 Gbps or faster for on-site backup and replication, and 1 Mbps or faster

ut
for off-site backup and replication. High latency and reasonably unstable WAN links
are supported.

ib
Both 32-bit and 64-bit versions of the

tr
following operating systems are
supported:
- Microsoft Windows Server 2016 with

is
- Microsoft Windows Server 2016
Hyper-V role enabled
- Microsoft Windows Server 2012 R2
- Microsoft Windows Server 2012 R2
- Microsoft Windows Server 2012

D
with Hyper-V role enabled
OS - Microsoft Windows Server 2008 R2
- Microsoft Windows Server 2012 with
SP1
Hyper-V role enabled
or
- Microsoft Windows Server 2008 SP2
- Microsoft Windows Server 2008 R2
- Microsoft Windows 10
SP1 with Hyper-V role enabled
- Microsoft Windows 8.x
- Microsoft Windows 7 SP1
e

- Microsoft Windows Vista SP2


at
lic

Important! To protect VMware VMs running on ESXi 5.5 or later, you must deploy backup proxies
on machines running a 64-bit version of Microsoft Windows. VDDK 5.5 or later does not support
up

32-bit versions of Microsoft Windows.


D

Backup Repository
ot

Specification VMware Requirement Hyper-V Requirement

CPU: x86 processor (x86-64 recommended).


N

Memory: 4 GB RAM, plus up to 2 GB RAM (32-bit OS) or up to 4 GB RAM (64-bit


OS) for each concurrent job depending on backup chain’s length and backup files
Hardware sizes.
o

Network: 1 Gbps or faster for on-site backup and replication, and 1 Mbps or faster
D

for off-site backup and replication. High latency and reasonably unstable WAN
links are supported.

Veeam Certified Engineer v9.5 . Textbook 49


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Specification VMware Requirement Hyper-V Requirement

Both 32-bit and 64-bit (recommended) versions of the following operating systems
are supported:
- Microsoft Windows Server 2016
- Microsoft Windows Server 2012 R2
- Microsoft Windows Server 2012
- Microsoft Windows Server 2008 R2 SP1
- Microsoft Windows Server 2008 SP2
OS - Microsoft Windows 10

e
- Microsoft Windows 8.x

ut
- Microsoft Windows 7 SP1
- Microsoft Windows Vista SP2
- Linux (bash shell, SSH and Perl are required). Please check the full list of

ib
required Perl modules here: www.veeam.com/kb2007.
64-bit edition of Linux must be able to run 32-bit programs. Pure 64-bit Linux

tr
editions are not supported (Perl installation must support 32-bit variables).

is
Tape Server

D
Specification VMware Requirement or Hyper-V Requirement

CPU: x86 processor (x86-64 recommended).


Memory: 2 GB RAM plus 200MB for each concurrent task. Restoring VMs directly
from tape requires 400MB of RAM per 1TB of virtual disk size. Additionally (for file
e
to tape jobs processing more than 1,000,000 files):
at

Hardware - 800 MB RAM for file to tape backup for each 1,000,000 files
- 800 MB RAM catalog jobs for each 1,000,000 files
Disk Space: 300 MB, plus 10 GB for temporary data storage for backup and restore
lic

operations.
Network: 1 Gbps or faster.
up

Both 32-bit and 64-bit (recommended) versions of the following operating systems
are supported:
- Microsoft Windows Server 2016
D

- Microsoft Windows Server 2012 R2


- Microsoft Windows Server 2012
ot

OS - Microsoft Windows Server 2008 R2 SP1


- Microsoft Windows Server 2008 SP2
- Microsoft Windows 10
N

- Microsoft Windows 8.x


- Microsoft Windows 7 SP1
o

- Microsoft Windows Vista SP2


D

50 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

WAN Accelerator

Specification VMware Requirement Hyper-V Requirement

CPU: x86-64 processor. Using multi-core processors improves data processing


performance, and is highly recommended on WAN links faster than 10 Mbps.
Memory: 8 GB RAM. Using faster memory (DDR3/DDR4) improves data
processing performance.
Hardware

e
Disk Space: Disk space requirements depend on the WAN Accelerator role.
Network: 1 Gbps or faster for on-site backup and replication, and 1 Mbps or faster

ut
for off-site backup and replication. High latency and reasonably unstable WAN links
are supported.

ib
Only 64-bit version of the following operating systems are supported:

tr
- Microsoft Windows Server 2016
- Microsoft Windows Server 2012 R2

is
- Microsoft Windows Server 2012
- Microsoft Windows Server 2008 R2 SP1
OS

D
- Microsoft Windows Server 2008 SP2
- Microsoft Windows 10
- Microsoft Windows 8.x
- Microsoft Windows 7 SP1
or
- Microsoft Windows Vista SP2
e

Cloud Gateway
at

Same system requirements as for Tape Server are applicable.


lic
up

Backup Target

Backup can be performed to the following disk-based storage targets:


D

Local (internal) storage of the backup repository server.


Direct Attached Storage (DAS) connected to the backup repository server, including external
ot

USB/eSATA drives and raw device mapping (RDM) volumes.


Storage Area Network (SAN). Backup repository server must be connected into the SAN fabric
N

via hardware or virtual HBA, or software iSCSI initiator.


Network Attached Storage (NAS) able to represent itself as SMB (CIFS) share (direct
o

operation), or NFS share (must be mounted on a Linux backup repository server).


Dell EMC DataDomain (DD OS version 5.4, 5.5, 5.6, 5.7 or 6.0) with DDBoost license. Both
D

Ethernet and Fibre Channel (FC) connectivity is supported.


ExaGrid (firmware version 4.8.0.351.P28 or later).
HPE StoreOnce (firmware version 3.13.1 or later) with Catalyst license. Both Ethernet and Fibre
Channel (FC) connectivity is supported. Instant VM Recovery support requires firmware version
3.15.1 or later.

Veeam Certified Engineer v9.5 . Textbook 51


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Storage Integration

Backup from Storage Snapshots and Veeam Explorer for Storage Snapshots are supported for the
following storage devices:

Cisco HyperFlex

Cisco HyperFlex 2.0 and later (Backup from Storage Snapshots, Full Integration mode)

e
Dell EMC VNX, VNX2, VNXe and Unity

ut
NFS, Fibre Channel (FC) or iSCSI connectivity

ib
HPE 3PAR StoreServ

tr
Fibre Channel (FC) or iSCSI connectivity
3PAR OS 3.1.2 or later

is
iSCSI VLAN tags are supported. Virtual Domains are supported.

D
HPE StoreVirtual (LeftHand / P4000 series) and StoreVirtual VSA
or
iSCSI connectivity only
LeftHand OS versions 9.5 through 12.6
HPE SV3200 (LeftHand OS version 13) is not supported
e
at

NetApp FAS, FlexArray (V-Series), Edge VSA and IBM N Series (NetApp FAS OEM)

NFS, Fibre Channel (FC) or iSCSI connectivity.


lic

Data ONTAP versions from 8.1 up to 9.2.


7-mode or cluster-mode
up

ONTAP 9.2 application-aware data management and SVM-DR are not supported.
D

Nimble Storage AF-Series and CS-Series

Fibre Channel (FC) or iSCSI connectivity


ot

Nimble OS 2.3 and later


N

Note: Hyper-V has native integration with storage snapshots for backup via Hardware VSS, so the
o

list of storage devices the integration is possible for listed above is relevant only for vSphere.
D

52 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Tape

Specification VMware Requirement Hyper-V Requirement

LTO3 or later tape libraries (including VTL) and standalone drives are supported.
Tape device must be directly attached to the backup server, to a tape server via
SAS, FC or iSCSI interface. Note that VMware does not support connecting tape
libraries to ESX(i) for VM pass-through.
Hardware

e
Important! If you plan to run both Veeam Backup & Replication and 3rd party
tape-recording software (for example, in your evaluation lab), consider that Veeam

ut
Backup & Replication by default will periodically lock the drive to perform rescan,
preventing other software from recording.

ib
- Tape devices without device-specific, vendor-supplied OEM drivers for Windows

tr
installed will appear in Windows Device Manager as Unknown or Generic and
Software
require enabling native SCSI commands mode.

is
- No other backup server must be interacting with the tape device.

D
Veeam Backup Enterprise Manager Server or
Specification VMware Requirement Hyper-V Requirement

Processor: x64 processor.


e
Memory: 4 GB RAM.
at

Hard Disk Space: 2 GB for product installation plus sufficient disk space to
Hardware
store guest file system catalog from connected backup servers (according to
data retention policy).
lic

Network: 1 Mbps or faster connection to Veeam backup servers.

64-bit version of the following operating systems is supported:


up

- Microsoft Windows Server 2016


- Microsoft Windows 10
- Microsoft Windows Server 2012 R2
D

OS - Microsoft Windows Server 2012


- Microsoft Windows 2008 R2 SP1
ot

- Microsoft Windows 2008 SP2


- Microsoft Windows 8.x
- Microsoft Windows 7 SP1
N

- Microsoft Internet Information Services 7.0 or later


Software
o

- Microsoft .NET Framework 4.5.2 (included in the setup)


D

- Microsoft Internet Explorer 10 or later, Microsoft Edge, latest versions of


Mozilla Firefox and Google Chrome are supported. The browser needs to have
Client Software
JavaScript enabled.
- Microsoft Excel 2003 or later (to view Excel reports).

Veeam Certified Engineer v9.5 . Textbook 53


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Specification VMware Requirement Hyper-V Requirement

Local or remote installation of the following versions of Microsoft SQL Server


are supported:
- Microsoft SQL Server 2016
- Microsoft SQL Server 2014 (Full and Express Edition)
- Microsoft SQL Server 2012 (Full and Express Edition; SP3 Express Edition is
included in the setup)
SQL Database - Microsoft SQL Server 2008 R2 (Full and Express Edition)
- Microsoft SQL Server 2008 (Full and Express Edition)

e
Important! SQL Server 2008 and later databases with compatibility level that

ut
corresponds to SQL Server 2005, will not be supported.
If you plan to deploy Enterprise Manager database on a Microsoft SQL Server
participating in the AlwaysOn Availability Group, follow the recommendations

ib
provided in the Veeam KB article: https://www.veeam.com/kb2301.

tr
Veeam Backup Search

is
Specification VMware Requirement Hyper-V Requirement

D
Hardware Refer to corresponding Microsoft Search Server version system requirements
or
OS Refer to corresponding Microsoft Search Server version system requirements

- Microsoft Search Server 2008 (including Express edition)


e
Software
- Microsoft Search Server 2010 (including Express edition)
at
lic

Veeam Explorer for Microsoft Exchange

Specification VMware Requirement Hyper-V Requirement


up

Veeam Explorer for Microsoft Exchange supports mailbox database (EDB)


files created with 64-bit versions of the following Microsoft Exchange
D

systems:
- Microsoft Exchange 2016
- Microsoft Exchange 2013 SP1
ot

Microsoft Exchange
- Microsoft Exchange 2013
- Microsoft Exchange 2010 SP1, SP2, or SP3
N

To open mailbox databases, Veeam Explorer for Microsoft Exchange


requires a service dynamic link library (ESE.DLL) that is installed together
with Microsoft Exchange.
o
D

Software Microsoft Outlook 2016, 2013 or 2010 (64-bit) for PST exports (optional)

54 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Veeam Explorer for Microsoft SharePoint

Specification VMware Requirement Hyper-V Requirement

- Microsoft SharePoint 2016


Microsoft - Microsoft SharePoint 2013
SharePoint - Microsoft SharePoint 2010
All editions are supported (Foundation, Standard, Enterprise).

e
ut
Veeam Explorer for Microsoft SharePoint is installed on the machine running
Software Veeam Backup & Replication. All editions including Veeam Backup Free
Edition are supported.

ib
1. The staging Microsoft SQL Server can run on the machine where Veeam

tr
Explorer for Microsoft SharePoint is installed, or on another machine.
2. The staging system must have the same or a later version of Microsoft

is
Staging SQL
SQL Server as the server that hosts restored Microsoft SharePoint content
Server
databases. For example, if the Microsoft SharePoint server uses Microsoft

D
SQL Server 2008, then the staging system can run Microsoft SQL Server
2008 or later. or
Remote BLOB Stores Support
e
at

To be able to work with remote BLOB stores (RBS) of the SharePoint content database, make sure
that you have your remote BLOB store virtualized on the corresponding platform (VMware or Hyper-
lic

V). Also, make sure that it is either included in the SharePoint backup created by Veeam Backup &
Replication (for automated discovery), or stored on the local machine running Veeam Explorer and
staging SQL server (for manual discovery).
up

Veeam Explorer for Microsoft SQL


D

Specification VMware Requirement Hyper-V Requirement


ot

- Microsoft SQL Server 2016


N

- Microsoft SQL Server 2014


- Microsoft SQL Server 2012
- Microsoft SQL Server 2008R2
Microsoft SQL
o

- Microsoft SQL Server 2008


Server
- Microsoft SQL Server 2005 SP4
D

All editions of Microsoft SQL Server are supported.


AlwaysOn Availability Groups are supported for Microsoft SQL Server 2012
and later.

Veeam Certified Engineer v9.5 . Textbook 55


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Specification VMware Requirement Hyper-V Requirement

For export to selected point in time and for export/restore to the state before
selected transaction, Veeam Explorer for Microsoft SQL Server uses a staging
Microsoft SQL Server. By default, local Microsoft SQL Server deployed with
Veeam backup server will be used as a staging system.
Other If you plan to use another server as a staging Microsoft SQL Server, then it
should have the same or later version as the original Microsoft SQL Server.
Besides, if the source database uses any edition-specific features, then
staging system should be of the same or higher edition than the original SQL

e
Server. See the Staging SQL Server section for details.

ut
Veeam Explorer for Oracle

ib
Specification VMware Requirement Hyper-V Requirement

tr
The following versions of Oracle Database are supported as source/target

is
systems for database backup and restore:
- Oracle Database 12c (for Windows or Linux OS)

D
- Oracle Database 11g (for Windows or Linux OS)
Automatic Storage Management (ASM) is supported for Oracle 11g and later,
requires ASMlib present.
or
Oracle Real Application Clusters (RAC) are not supported.
Oracle servers using Data Guard are partially supported - backup and full VM
Oracle System
restore are supported, database restore via Veeam Explorer is not supported in
e
the current version. Also, current version does not support creating
at

transactionally-consistent backups of a standby database in case you are using


Oracle Active Data Guard; only crash-consistent backups can be created in this
case. However, a primary database can be backed up in a transactionally-
lic

consistent way.
Note: Currently, Oracle Database Express Edition (XE) is supported for
Windows-based machines only.
up

Staging server is used to fine-tune the restore point in case a user needs to restore database to the
D

state before specific transaction. At the first launch of Veeam Explorer it tries to obtain the staging
Oracle server settings using the built-in algorithm. You can specify another staging server, either local
(for Windows VMs only) or remote (for both Windows and Linux VMs).
ot

The following requirements apply to staging server:


N

1. A staging server must have the same Oracle database version as the source (original) and
target Oracle server.
o

2. If you plan to restore databases with Automatic Storage Management enabled, the staging and
D

target servers should have ASM enabled, too.


3. Oracle Database Express Edition (XE) cannot be used as a staging system.

56 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Veeam Explorer for Microsoft Active Directory

Specification VMware Requirement Hyper-V Requirement

- Microsoft Windows Server 2016


- Microsoft Windows Server 2012 R2
- Microsoft Windows Server 2012
Microsoft Active
- Microsoft Windows Server 2008 R2
Directory

e
- Microsoft Windows Server 2008
Domain
- Microsoft Windows Server 2003 SP2

ut
Controllers
Minimum supported domain and forest functional level is Windows
2003. Veeam Explorers can be only installed on a 64-bit Windows operating

ib
system.

tr
- Any edition of Veeam Backup & Replication 9.5.
- Microsoft PowerShell 2.0 and higher.

is
Veeam Explorer can restore the relationships between Active Directory objects
and corresponding mailboxes - if an object (user or group) was deleted from

D
production Active Directory, Veeam Explorer can restore this object from Active
Directory backup, reconnect Exchange mailbox and restore mailbox security
role for that object.
or
Veeam Explorer for Active Directory supports restore of both mailbox-enabled
objects (including hard-deleted items and Online Archives) and mail-enabled
objects for the following Microsoft Exchange versions:
e
- Microsoft Exchange Server 2016
- Microsoft Exchange Server 2013
at

- Microsoft Exchange Server 2010 SP1 and later


For other Microsoft Exchange versions, restore of mailbox-enabled objects is
lic

not supported (only mail-enabled objects can be restored).


Software
- To open database files, Veeam Explorer for Microsoft Active Directory uses a
service dynamic link library (esent.dll) which is installed together with Microsoft
up

Active Directory Domain Services and can be found in the system directory at
%SystemRoot%.
Important! Esent.dll on the machine where Veeam Explorer runs should be of
D

the same version as Microsoft Active Directory Domain Services used to create
database files.
- To restore account password, Veeam Explorer for Microsoft Active Directory
ot

uses the registry database, so if you plan to restore password(s), make sure
that System registry hive is available (default location is
N

%systemroot%\System32\Config). If you restore Active Directory database


from Active Directory backup using Veeam file-level restore, then registry hive
will be located automatically. Otherwise, for example, if you restore from an
o

imported backup or from VeeamZIP file, make sure the System registry hive is
located in the same folder as .DIT file.
D

Note: Database files created by a domain controller can be open only if Veeam Explorer is
installed on a Windows machine with OS version same or above the version of that domain
controller's OS.

Veeam Certified Engineer v9.5 . Textbook 57


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

2.4.4. Required Permissions


The accounts used for installing and using Veeam Backup & Replication should have the following
permissions:

Account VMware Requirement Hyper-V Requirement

The account used for product installation must have the Local Administrator
Setup Account permissions on the Veeam backup server to install Veeam Backup &

e
Replication.

ut
Root permissions on
the source ESX(i) host

ib
Root (or equivalent)
Local Administrator permissions on the source
permissions on Linux
Target/Source Hyper-V server

tr
backup repository
Host Root (or equivalent) permissions on Linux backup
Write permission on the
Permissions repository

is
target folder and share
Write permission on the target folder and share
If vCenter Server is

D
used, administrator
credentials are required
or
The account used to run Veeam Backup Management Service must have the
database owner role for the VeeamBackup database on the SQL Server
instance.
SQL Server
e
The account used to run Veeam Backup Enterprise Manager must have the
database owner role for the VeeamBackupReporting database on the SQL
at

Server instance.
lic

Local Administrator permissions on the Veeam Backup Enterprise Manager


Veeam Backup
server to install Veeam Backup Enterprise Manager
Enterprise
To be able to work with Veeam Backup Enterprise Manager, users should be
up

Manager
assigned the Portal Administrator, Restore Operator or Portal User role.

Veeam Backup Local Administrator permissions on the Microsoft Search Server to install
D

Search Veeam Backup Search


ot

Full access to Microsoft Exchange database and its log files for item recovery
Veeam
The account you plan to use for recovery should have both read and write
Explorer for
permissions to all files in the folder with the database.
N

Exchange
Access rights can be provided through impersonation.
o

The account used for working with Veeam Explorer for SharePoint requires
membership in the sysadmin fixed server role on the staging Microsoft SQL
D

Server.
Veeam The account used for connection with target SharePoint server where
Explorer for document item(s)/list will be restored needs the following:
SharePoint - If permissions of the item being restored are inherited from the parent item
(list) – Full Control for that list is required.
- If permissions are not inherited, and restored item will replace an existing item
– then Contribute for the item and Full Control for its parent list are required.

58 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

2.5. Upgrading Veeam Backup & Replication


To perform upgrade, run the Veeam Backup & Replication setup file. For details on the
upgrade procedure, refer to Veeam Backup & Replication Release Notes.

2.5.1. Before You Upgrade

e
To perform upgrade of Veeam Backup & Replication to version 9.5, you must be running version 9.0
(any update) or 8.0 Update #3 on the supported operating system. To upgrade from previous

ut
versions, contact Veeam Technical Support.

ib
Upgrade checklist:

tr
1. Are you using Veeam ONE to monitor your backup infrastructure? If yes, upgrade it first.
Veeam ONE supports monitoring of backup servers versions 9.5, 9.0 and 8.0.

is
2. Are you running Veeam Backup & Replication 9.0 (any update) or 8.0 Update #3? If yes,
perform the upgrade procedure. To upgrade from other versions, contact Veeam Technical

D
Support.
3. Is backup server to be upgraded installed on the supported operating system? If not, you must
migrate the server to the supported OS first, before performing the upgrade. Refer to the
or
Veeam support KB article KB1803 for more information on how to perform the migration.
4. Is your Veeam Backup & Replication or Veeam Backup Enterprise Manager configuration
database hosted on Microsoft SQL Server 2005? If yes, you must upgrade the Microsoft SQL
e
Server to version 2008 or later first. We recommend Microsoft SQL Server 2014 or later for
at

performance considerations.
5. Are you using Cloud Connect? If yes, check with your Cloud Connect service provider if they
lic

have already upgraded their system to at least the version you are upgrading to.
6. Ensure there is no active processes, such as any running jobs and restore sessions. We
recommend that you do not stop running jobs and let them complete successfully instead.
up

Disable any periodic and backup copy jobs, so that they do not start during the upgrade.
7. Perform a backup of the corresponding SQL Server configuration databases used by backup
and Enterprise Manager servers, so that you can easily go back to previous version in case of
D

issues with upgrade. Note that built-in configuration backup functionality does not protect
Enterprise Manager configuration.
ot

8. Are you using Veeam Backup Enterprise Manager? If yes, start the upgrade procedure from
this component. Note that Enterprise Manager 9.5 supports version 9.0 and 8.0 backup servers,
N

so you can potentially run both old and new product versions side by side.
o

2.5.2. After You Upgrade


D

When upgrade is complete, perform the following actions:

1. Once the upgrade process is complete, download and install the latest available update
from www.veeam.com/updates.html.
2. Open the Veeam Backup & Replication console. If necessary, the automated upgrade wizard
will automatically appear, prompting you to upgrade product components running on remote
servers. Follow the wizard to complete the upgrade process.

Veeam Certified Engineer v9.5 . Textbook 59


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

3. If some remote servers are unavailable at the time of upgrade, you can run the Upgrade wizard
at any time later from the main product menu, or by closing and re-opening
the Veeam Backup & Replication console. Note that out-of-date product components cannot be
used by jobs until they are updated to the backup server version.
4. Enable any scheduled jobs that you have disabled before the upgrade.

Please note that immediately after upgrade, backup server performance may be impacted due to
configuration database being optimized by the maintenance job. This can take up to an hour
depending on the database size.

e
You must upgrade Veeam components on all remote servers with which the backup server

ut
communicates during data protection and disaster recovery tasks. If you do not upgrade components
on remote servers, Veeam Backup & Replication jobs will be failing.

ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

60 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

Labs for Module 2: Deployment

This module gets you acquainted with the components that make up the Veeam Backup & Replication
architecture and explains how to choose between Veeam Backup & Replication deployment
scenarios.
The corresponding labs provide you with an opportunity to dive into the Veeam Backup & Replication
and Veeam Backup Enterprise Manager installation.

e
ut
Get into the Lab

ib
Lab Action Purpose

tr
Adding Veeam Backup & Add the Veeam Backup & Replication server to the
Replication to Veeam Veeam Backup Enterprise Manager console to

is
2.1
Backup Enterprise control and manage all the Veeam Backup &
Manager Replication jobs through a single pane of glass.

D
Add VMware vSphere and Microsoft Hyper-V hosts to
Setting up Veeam ONE
2.2
(part one)
or
the Veeam ONE interface and schedule data
collection.
e
at
lic
up
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 61


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 2: Deployment

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

62 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

3. Initial Configuration
In this module you will learn how to configure all components of Veeam Backup &
Replication product, including backup server, backup proxy and backup repository. We will
also review about global settings and how they improve the product’s performance and
Veeam Backup & Replication user interface.

e
3.1. Adding Servers

ut
For building your backup infrastructure in a VMware vSphere environment,
Veeam Backup & Replication supports the following types of servers:

ib
VMware Server

tr
vCloud Director
Windows Server

is
Linux Server

D
For building your backup infrastructure in a Hyper-V environment, Veeam Backup & Replication
supports the following types of servers: or
Hyper-V Server
SMB v3 Server
e
Windows Server
Linux Server
at

Managed servers are physical or virtual machines that are used as source and target hosts, backup
lic

proxies, repositories and other servers included in the backup infrastructure. The table below shows
which roles can be assigned to the different types of servers managed by Veeam Backup &
Replication.
up

Off-host
Replication Backup backup Backup
D

Server Type Source


Target Proxy proxy Repository
(Hyper-V
ot

VMware Server (standalone


ESX(i) host or vCenter
N

Server) / Hyper-V Server


(standalone Hyper-V Server,
SCVMM or Hyper-V cluster)
o
D

Windows Server *

Linux Server *

vCloud Director

* = Windows and Linux can be used as source for Agent jobs or Files to tape jobs.

Veeam Certified Engineer v9.5 . Textbook 63


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

Any ESXi host is essentially a Linux server. Thus, you can add ESXi hosts both as virtualization
servers and as standard file servers, depending on the role you wish to assign them. Note that if you
plan to use the same host as an ESXi host and Linux server, you should add it to Veeam Backup &
Replication twice.

Similarly, any Hyper-V Server is essentially a Windows server. Thus, you can add Hyper-V hosts both
as virtualization servers and as standard file servers, depending on the role you wish to assign them.
Note that if you plan to use the same host as a Hyper-V server and Windows server, you should add it
to Veeam Backup & Replication twice.

e
ut
Note: If there is a vCenter server in the infrastructure, it is recommended that you add vCenter
server instead of separate ESX(i) hosts to provide more flexibility at work.

ib
tr
Note: When you create a credential record for the user account that you plan to use to connect to

is
a Linux sever or VM running Linux OS, you can either choose a root account, or specify a non-root
account and use the Non-root account section to grant sudo rights to this account. Then, to

D
provide a non-root user with root account privileges, select the Elevate account to root check box
and to add the user account to sudoers file, select the Add account to the sudoers file
or
automatically check box. If you do not enable this option, you will have to manually add the user
account to the sudoers file.
e

3.1.1. Adding a VMware Backup Proxy


at

In the backup infrastructure, a backup proxy acts as a “data mover.” While the backup server fills the
lic

role of the job manager, the backup proxy actually performs main data handling – it retrieves data,
processes it and transfers to the target destination. Using backup proxies enables you to take the job
up

processing off the backup server and allows for better scalability of your backup infrastructure.

Proxy deployment recommendations depend on a particular configuration of your virtual


D

infrastructure.

To add a backup proxy to your backup infrastructure, you should assign this role to a Windows server
ot

that is already added to the list of managed servers.


N

By default, Veeam Backup & Replication adds the Veeam backup server to the list of backup proxies.
A local backup proxy may be sufficient for the simplest backup or replication scenarios; however, for
larger VMware environments, you will need to deploy a number of additional VMware proxy servers to
o

offload the Veeam backup server.


D

3.1.2. Adding Backup Repositories


Backup repository is a location for storing backup data and auxiliary files. You can assign the role of a
backup repository to any Windows or Linux server added to the list of managed servers in
Veeam Backup & Replication, any shared CIFS folder to which the backup server has access, or to
deduplicating storage appliances. Windows-based backup repositories can also perform the role of

64 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

the Veeam vPower NFS server, enabling advantages of the vPower technology for multi-OS file-level
restore, Instant VM Recovery, SureBackup and U-AIR capabilities.

Note: You can permanently remove a backup repository from the backup infrastructure. When you
remove a backup repository, Veeam Backup & Replication unassigns the backup repository role
from the server and this server is no longer used as a backup repository.

e
Veeam Backup & Replication does not remove backup files and other data stored on the backup
repository. You can re-connect the backup repository at any time and import backups from this

ut
backup repository to Veeam Backup & Replication.

ib
Important! The remove operation has the following limitations: you cannot remove a backup

tr
repository that is used by any backup or replication job (including Configuration Backup). To
remove such backup repository, you first need to delete a reference to this backup repository in

is
the job settings.

D
3.2. Data location tagging or
Ensure data sovereignty compliance required by various regulations, such as the General
Data Protection Regulation (GDPR), by tagging production infrastructure and backup
e
infrastructure objects with locations. Location tags are used to prevent accidental errors
at

when configuring backup and replication jobs or performing out-of-place restores, by


issuing a warning when an action may result in a data sovereignty violation and producing
lic

audit trails whenever such action is confirmed.


up

3.2.1. Locations
To control data migration in the virtual infrastructure, Veeam Backup & Replication introduces a notion
D

of location. A location defines a geographical region, or country, in which an infrastructure object


resides. You can create a list of locations, and assign to backup infrastructure objects information
ot

about locations to which they belong.

Veeam Backup & Replication allows you to assign information about locations to the following
N

infrastructure objects:
o

Virtual infrastructure objects: vCenter Servers, datacenters, clusters and hosts.


Backup infrastructure objects: simple backup repositories, scale-out backup repositories, tape
D

libraries and tape vaults.


Agent management objects: protection groups.

Information about infrastructure objects location is stored in


the Veeam Backup & Replication configuration database. When VM data in the virtual infrastructure
migrate from one location to another, Veeam Backup & Replication displays a warning and stores a
record about data migration to job or task session details. In addition to
it, Veeam Backup & Replication logs this information to Microsoft Windows event logs. For example, if

Veeam Certified Engineer v9.5 . Textbook 65


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

you back up VMs from a host that resides in Germany to a backup repository that resides in
Australia, Veeam Backup & Replication will display a warning that VM data changes its location in the
backup job wizard, display information about data migration in the backup job session details and log
it to Microsoft Windows event logs.

Veeam Backup & Replication displays information about VM data migration in statistics for the
following types of jobs:

Backup jobs — Veeam Backup & Replication compares the location of the source host on

e
which VMs are registered with the location of the target backup repository or cloud repository.
VeeamZIP tasks — Veeam Backup & Replication compares the location of the source host on

ut
which VMs are registered with the location of the target backup repository.
Replication jobs — Veeam Backup & Replication compares the location of the source host on

ib
which VMs are registered with the location of the target host.
Replica failback tasks — Veeam Backup & Replication compares the location of the host on

tr
which a VM replica is registered with the location of the host to which the VM is restored.
VM copy jobs — Veeam Backup & Replication compares the location of the source host on

is
which VMs are registered with the location of the target backup repository or target host.
Quick migration tasks — Veeam Backup & Replication compares the location of the source host

D
on which VMs are registered with the location of the target host.
Entire VM restore tasks — Veeam Backup & Replication compares the location of the backup
or
repository or cloud repository on which the backup resides, with the location of the host to
which VMs are restored.
SureBackup jobs — Veeam Backup & Replication compares the source location with the target
e
location. The target location is always a host on which the virtual lab is registered. The source
location may be one of the following:
at

If a VM is added to the application group, Veeam Backup & Replication compares the
lic

host on which the VM is registered (or was registered at the moment of backup) with the
target location.
If a VM is added to the SureBackup job from the linked
up

job, Veeam Backup & Replication compares the backup repository on which the backup
file resides with the target location.
D

For SureReplica jobs, Veeam Backup & Replication does not compare information about source and
target hosts location.
ot

Tape tasks:
N

Backup to tape jobs: In backup to tape jobs, Veeam Backup & Replication compares the
location of the source job or repository with the location of the tape library in the target
media pool. If the media pool spans multiple tape
o

libraries, Veeam Backup & Replication analyzes locations of all libraries in the media
D

pool.
Vaults: If a tape job exports offline backups to a
vault, Veeam Backup & Replication compares the location of the source job or repository
with the location of the vault. I a GFS tape job exports tapes to multiple
vaults, Veeam Backup & Replication analyzes all vaults configured for target media pools
of the GFS tape job.
Media pools: Veeam Backup & Replication compares locations of all tape libraries added
to the media pool. If the media pool exports tapes to a

66 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

vault, Veeam Backup & Replication analyzes all vaults configured for the media pool.

Important! Veeam Backup & Replication does not display a warning about VM data migration for
file copy jobs.

3.2.2. Creating and Assigning Locations

e
You can create a list of locations in Veeam Backup & Replication and assign locations to

ut
infrastructure objects.

To create a location:

ib
1. In the Inventory or Backup Infrastructure view, right-click the infrastructure object and

tr
select Location > Manage locations.
2. In the Manage Locations window, click Add.

is
3. In the Name field, enter a name of the location.

D
To assign a location to an infrastructure object, in the Inventory or Backup Infrastructure view, right-
click the infrastructure object and select Location > <Location name>. If the location is not in the list,
or
select Location > Manage Locations and add the location to the list.
e
3.2.3. Editing Locations
at

You can edit a location in the locations list, for example, if you want to change the location name.
lic

To edit a location:
up

1. In the Inventory or Backup Infrastructure view, right-click the infrastructure object and
select Location > Manage locations.
2. In the Manage Locations window, select the location and click Edit.
D

3. In the Name field, change the location name as required.


ot

3.2.4. Deleting Locations


N

You can delete a location from the locations list, for example, if you no longer host infrastructure
objects in this location.
o

To delete a location:
D

1. In the Inventory or Backup Infrastructure view, right-click the infrastructure object and
select Location > Manage locations.
2. In the Manage Locations window, select the location and click Delete. If the location is currently
assigned to some infrastructure objects, Veeam Backup & Replication will display a warning
with the list of objects that belong to this location. Click Yes to confirm the location deletion.

Veeam Certified Engineer v9.5 . Textbook 67


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

3.2.5. Exporting and Importing Locations List


You can export and import the list of locations to/from a file of XML format.

The import and export functionality facilitates the process of locations creation and maintenance. For
example, if you need to set up the same list of locations throughout the whole backup infrastructure,
you can create a list of locations on one backup server manually, export this list to an XML file, and
then import the list on other backup servers and machines running
the Veeam Backup & Replication console.

e
ut
To export the locations list:

1. In the Inventory or Backup Infrastructure view, right-click an infrastructure object and

ib
select Location > Manage locations.
2. In the Manage Locations window, click Export and specify a name of the XML file to which the

tr
locations list must be exported.

is
To import the locations list:

D
1. In the Inventory or Backup Infrastructure view, right-click an infrastructure object and
select Location > Manage locations. or
2. In the Manage Locations window, click Import and browse to the XML file from which the
locations list must be imported.
e

3.3. Performing Configuration Backup and Restore


at

With Veeam Backup & Replication, you can create a configuration backup of the Veeam
lic

backup server.
up

When you create a configuration backup, you export the configuration data from the Veeam
Backup SQL database and save it into a backup file on the repository. If the Veeam backup
server fails for some reason, you can re-install it and then quickly restore its configuration
D

from the backup file. Alternatively, you can apply the configuration of one Veeam backup
server to any other Veeam backup server in your backup infrastructure.
ot

It is recommended that you regularly create a configuration backup for every Veeam backup
server in your backup infrastructure. Periodic configuration backups reduce the possibility
N

of data loss and minimize the administrative overhead if any problem with Veeam backup
server(s) occurs.
o
D

3.3.1. Creating Configuration Backups


When you perform a configuration backup, Veeam Backup & Replication retrieves configuration data
for the Veeam backup server from the SQL database, writes this data into a set of .xml files and
archives these .xml files to a .bco file.

Veeam Backup & Replication exports configuration data for all Veeam Backup & Replication objects:

68 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

Object Contents

Hosts, servers, backup proxies, repositories, WAN accelerators


Backup infrastructure
and jobs, global settings configured on the backup server and so
components and objects
on.

Backups, replicas and backup copies created on the backup


Backups
server.

Sessions Job sessions performed on the backup server.

e
ut
Tapes Tape libraries connected to the backup server.

ib
Note: When storing credentials for the infrastructure objects, Veeam Backup & Replication does

tr
not keep passwords if encryption is not enabled. During the restore process, you will have to

is
specify passwords manually. If by the time of restore passwords for credentials records have
changed, you can specify new values for these records.

D
The configuration backup is job-driven. Just like any other job, you can schedule it to run regularly or
or
start it manually. You can choose the backup repository to which the configuration backup should be
stored and specify the necessary retention policy settings.

By default, Veeam Backup & Replication is configured to create a configuration backup daily. The
e

resulting configuration backup file is stored in the \VeeamConfigBackup\%BackupServer% folder in


at

the default backup repository. However, for security’s sake, it is recommended that you store
configuration backups on the backup repository other than the default one. In this case, configuration
lic

data of the Veeam backup server(s) will be available for recovery even if the Veeam backup server
fails.
up

Note: When you configure a new backup repository, Veeam Backup & Replication offers you to
D

change the configuration backup file location from the default backup repository to the new backup
repository. Click Yes, and Veeam Backup & Replication will automatically change the backup
target in the configuration backup job properties and will use this target in future. Configuration
ot

backups that were created before the target change will remain in the default backup repository.
You can manually copy them to the new backup repository to have all restore points of the
N

configuration backup in one place.


o

3.3.2. Restoring Configuration Data


D

To restore data from the configuration backup, you can use one of two methods: data restore and
data migration.

Data restore can be helpful in the following situations:

The configuration database got corrupted and you want to recover data from the configuration
backup.

Veeam Certified Engineer v9.5 . Textbook 69


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

The Microsoft SQL Server on which the configuration database resides got corrupted, and you
want to deploy the configuration database on a new Microsoft SQL Server, and restore data
from the configuration backup to it.
You want to roll back the configuration database to a specific point in time.
You want to restore data to a new configuration database on the same Microsoft SQL server,
for example, for testing purposes.

Data migration can be helpful if you need to move the backup server and configuration database to
another location, for example, offsite. In this case, you can configure a backup server, deploy a

e
Microsoft SQL Server in the target location and then restore data from the configuration backup to a
database on this server. As a result, you will get a "replica" of the backup server without additional

ut
adjustments and fine-tuning.

ib
It is recommended that you use Veeam Backup & Replication tools to create configuration backups
and migrate the configuration database. If you use other tools, for example, native Microsoft SQL

tr
Server tools, after migration some information such as secure configuration data may be not
accessible.

is
Before you start the restore process, check the following prerequisites:

D
Stop all jobs that are currently running. During restore of
configuration, Veeam Backup & Replication temporary stops the Veeam Backup Service and
or
jobs.
Check the version of the backup server. On the backup server
running Veeam Backup & Replication 9.5, you can restore configuration backups created with
e

the following product versions: 8.0 Update 3 and 9.0.


at

Mind the following limitation: You can only start configuration restore from
lic

the Veeam Backup & Replication console installed locally on the backup server. You cannot start
configuration restore from the console installed on a remote machine.
up

3.3.3. Encrypted Configuration Backups


D

Veeam Backup & Replication requires that you encrypt the configuration backup if you have created
at least one password in the Password Manager on the backup server.
ot

When you encrypt jobs or tapes with passwords, Veeam Backup & Replication creates a set of keys
N

that are employed in the encryption process. Some of encryption keys, for example, storage keys and
metakeys, are stored in the Veeam Backup & Replication database. If a configuration backup was
non-encrypted, data from it could be freely restored on any backup server. The encryption keys would
o

be saved to the Veeam Backup & Replication database, and the content of encrypted files might
D

become accessible for unintended audience.

If the Password Manager contains at least one password and you do not enable encryption for the
configuration backup, Veeam Backup & Replication disables configuration backup. To enable the
configuration backup, you must configure encryption settings in the configuration backup job
properties.

70 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

3.4. Managing Network Traffic


If you plan to perform offsite backup or replicate VMs to a remote DR site, you can manage
network traffic with the following options:

3.4.1. Setting Network Traffic Throttling Rules

e
To limit the impact of Veeam Backup & Replication tasks on network performance, you can throttle
network traffic for jobs. Network traffic throttling prevents jobs from utilizing the entire bandwidth

ut
available in your environment and makes sure that enough traffic is provided for other network
operations. It is especially recommended that you throttle network traffic if you perform offsite backup

ib
or replicate VMs to a DR site over slow WAN links.

tr
Network traffic throttling is implemented through rules. Network throttling rules apply to components in
the Veeam backup infrastructure, so you do not have to make any changes to the network

is
infrastructure.

D
Network traffic throttling rules are enforced globally, at the level of the backup server. Every rule limits
the maximum throughput of traffic going between backup infrastructure components on which Veeam
Data Movers are deployed. Depending on the scenario, traffic can be throttled between the following
or
components:

Backup to a Microsoft Windows or Linux backup repository: a backup proxy (onhost or


e
offhost) and backup repository
at

Backup to an SMB share, Dell EMC Data Domain and HPE StoreOnce: backup proxy (onhost
or offhost) and gateway server
lic

Backup copy: source and target backup repositories or gateway sever(s), or WAN accelerators
(if WAN accelerators are engaged in the backup copy process)
Replication: source and target backup proxies (onhost or offhost) or WAN accelerators (if WAN
up

accelerators are engaged in the replication process)


Backup to tape: backup repository and tape server
D

Rules are set for a pair of IP address ranges and are applied to the source and target components
between which data is transferred over the network. The range can include a single IP address.
ot

3.4.2. Managing Data Transfer Connections


N

By default, Veeam Backup & Replication uses multithreaded data transfer for every job session. VM
o

data going from source to target is transferred over 5 TCP/IP connections. However, if you schedule
D

several jobs to run at the same time, load on the network may be heavy. If the network capacity is not
sufficient to support multiple data transfer connections, you can disable multithreaded data transfer or
change the number of TCP/IP connections.

Veeam Certified Engineer v9.5 . Textbook 71


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

e
ut
ib
tr
is
D
or
Note: Veeam Backup & Replication performs a CRC check for the TCP traffic going between the
e
source and the target. When you perform backup and replication operations, Veeam Backup &
at

Replication calculates checksums for data blocks going from the source. On the target, it re-
calculates checksums for received data blocks and compares them to the checksums created on
lic

the source. If the CRC check fails, Veeam Backup & Replication automatically re-sends data
blocks without any impact on the job.
up

3.4.3. Preferred Networks


D

You can choose networks over which Veeam Backup & Replication must transport VM data when you
perform data protection and disaster recovery tasks. This option can be helpful if you have a non-
ot

production network and want to route VM data traffic over this network instead of the production one.

Preferred network rules are applied to the following backup infrastructure components:
N

Backup proxies
o

Backup repositories
WAN accelerators
D

Gateways (used with backup repositories)


Log shipping servers
Tape servers

To define networks for data transfer, you must create a list of preferred networks.
When Veeam Backup & Replication needs to transfer VM data, it uses networks from this list. If a
connection over preferred network(s) cannot be established for some
reason, Veeam Backup & Replication will automatically fail over to the production network.

72 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

e
ut
ib
tr
is
D
or
3.4.4. Network Traffic Encryption
e
at

You can enable network traffic encryption (in flight encryption) for data going between the primary site
and disaster recovery site. Network traffic encryption helps you raise the security level for your data. If
lic

encrypted data is intercepted in the middle of data transfer, the eavesdropper will not be able to
decrypt it or get access to it.
up

Network data encryption for different subnets is enabled by default. If you want to enable data
encryption within the same subnet, you must create a network traffic rule for this subnet and select
the data encryption option for the rule. As a result, the traffic going between servers that fall into the
D

source and target IP addresses ranges will be encrypted according to the 256-bit Advanced
Encryption Standard (AES-256).
ot

3.5. General options


N

General options that affect all jobs.


o
D

3.5.1. Backup I/O control


At the same time, it’s important to keep production storage availability from being impacted by too
much load from parallel backup tasks. Backup I/O Control is a global setting that lets you set limits on
how much latency is acceptable for any VMware or Hyper-V datastore. Those values are
customizable.

Veeam Certified Engineer v9.5 . Textbook 73


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

For the Enterprise Plus Edition, Backup I/O Control can be used to set the latency on a per-datastore
basis, rather than a single global setting. This is especially useful if you have datastores that need a
higher/lower setting based on workload or importance, for example higher latency is usually
acceptable for test/development workloads.

3.5.2. Global Notification Settings


Notifications help ensure visibility for the processes that are happening within Veeam

e
Backup and Replication.

ut
Specifying E-Mail Notification Settings

ib
With Veeam Backup & Replication, you can select to receive email messages in the case of success

tr
or failure of a created backup or replication job. To be able to receive email messages, you must
configure general email notification settings and select to receive a notification when creating a

is
corresponding job.

D
Tip: To receive email notification about all jobs performed on the Veeam backup server in one
or
email, configure email notification settings in Veeam Backup Enterprise Manager.
e
Specifying Other Notification Settings
at

You can configure Veeam Backup & Replication to automatically notify you about the following
lic

events:

Low disk space


up

Support contract expiration


New product versions and available updates
D

When you run a job, Veeam Backup & Replication checks disk space on the target backup repository
and production storage. If the disk space is below a specific value, Veeam Backup & Replication will
display a warning message in the job session details.
ot

By default, email recipients specified in global notification settings are informed about the support
N

expiration date in every received email notification. Veeam Backup & Replication starts sending such
notifications 14 days before the expiration date. Expiration information is also shown on the splash
o

screen and on the License Information window.


D

You can configure Veeam Backup & Replication to automatically check for new product versions and
updates available on the Veeam website. When a new version of the product or a new product update
becomes available on the website, Veeam Backup & Replication displays an icon in the system tray.
An icon is displayed once a week.

For Microsoft Hyper-V environments, Veeam Backup & Replication also notifies about updates that
should be installed on Microsoft Hyper-V hosts and off-host backup proxies: if a Microsoft Hyper-V
host or an off-host backup proxy connected to the Veeam backup server misses important

74 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

fixes/patches, it can potentially hinder work of Veeam Backup & Replication.

Important! To get notified about updates and patches, make sure that the Veeam backup server
is connected to the Internet. In the opposite case, update notification will not work.

If you do not want to get notified about available updates, you can disable this option. However, it is
recommended that you leave update notifications enabled not to miss critical updates and patches.

e
ut
3.6. Getting to Know User Interface

ib
The user interface of Veeam Backup & Replication is designed to let you quickly find
commands you need and perform necessary data protection and disaster recovery tasks.

tr
This section will familiarize you with elements of the application user interface.

is
3.6.1. Main Menu

D
The main menu in Veeam Backup & Replication contains commands related to general application
settings. The following operations can be performed:
or
Upgrade backup infrastructure components
e
Manage credentials
at

Manage passwords
Manage Microsoft Azure accounts
lic

Configure application settings


Set up user roles
Configure network traffic rules
up

Perform configuration backup and restore


Start PuTTy and Microsoft PowerShell console
Change color theme
D

Work with licenses


View Veeam Backup & Replication help and export program logs
ot

Exit Veeam Backup & Replication


N

3.6.2. Navigation Pane


o

The navigation pane, located on the left side of the window, provides centralized navigation and
enables you to easily access Veeam Backup & Replication items organized in views.
D

The navigation pane is made up of two areas:

The upper, or the inventory pane, displays a hierarchy or a list of all items relevant for a specific
view. The content of the inventory pane is different for different views. For example, in the
Backup Infrastructure view, the inventory pane displays a list of backup infrastructure
components – virtual infrastructure servers, backup proxies and backup repositories. In the
Virtual Machines view, the inventory pane displays a list of servers connected to

Veeam Certified Engineer v9.5 . Textbook 75


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

Veeam Backup & Replication.


The lower pane contains a set of buttons that enables you to switch between
Veeam Backup & Replication views.

3.6.3. Ribbon and Tabs


Operation commands in Veeam Backup & Replication are organized into logical groups and collected
together under tabs on the ribbon. The ribbon is displayed at the top of the main application window; it

e
contains the Home tab that is always present, and context-sensitive tabs.

ut
ib
tr
is
D
The Home tab provides quick access to the most commonly performed operations. It enables
you to create different types of jobs, perform restores, and import operations. This tab is always
or
displayed, no matter which view is currently open.
Context-sensitive tabs contain commands specific for certain items and appear when these
items are selected. For example, if you open the Backup & Replication view and select a
e

backup job in the working area, the Jobs tab containing buttons for operations with jobs will
at

appear on the ribbon. In a similar manner, if you open the Files view and select a file or folder,
the File tab containing buttons for operations with files will appear on the ribbon.
lic
up

Note: Commands for operations with items in Veeam Backup & Replication are also available
from the shortcut menu.
D

3.6.4. Views
ot

Veeam Backup & Replication displays its items in views. When you click the button of a specific view
in the navigation pane, its content is displayed in the working area of Veeam Backup & Replication.
N

Veeam Backup & Replication offers the following views:


o

Views Functions
D

Used for work with all kind of jobs. It also displays a list of created backups
Backup &
and replicas that can be used for various restore operations, and provides
Replication
statistics on recently performed jobs.

76 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

Views Functions

Displays a list of backup infrastructure components: servers, hosts, backup


proxies, backup repositories and so on. You can use this view for backup
Backup
infrastructure setup — here you can configure backup infrastructure
Infrastructure
components that will be used for data protection and disaster recovery
tasks.

Displays the inventory of your virtual infrastructure. The inventory can be


Virtual Machines presented from different perspectives: Compute, Storage, VM Folders and

e
VM Tags. This view is used to work with VMs and VM containers.

ut
Displays a list of storage systems, volumes and snapshots. This view is
Storage
used to restore data from storage snapshots (available only for VMware

ib
Infrastructure
VMs).

tr
Displays a hierarchy of tape library connected to the tape server. This view
Tape Infrastructure
is used to archive data to tapes and restore data from tapes.

is
Displays components of the Veeam Cloud Connect infrastructure. This

D
view can be used by SP to manage TLS certificates, configure cloud
Cloud Infrastructure
gateways and create accounts for users who plan to work with cloud
or
resources.

Displays a file tree for servers connected to Veeam Backup & Replication,
Files
e
and is primarily used for file copying operations.
at

Displays statistics on operations performed with


History Veeam Backup & Replication. You can use this section for viewing
lic

statistics on performed tasks and reporting.


up
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 77


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

e
ut
ib
tr
is
D
or
e
at

3.6.5. Working Area


lic

The working area of Veeam Backup & Replication displays a list of items relevant to a specific view.
The working area looks different depending on the view that is currently open. For example, if you
up

open the History view, the working area will display a list of job sessions and restore tasks performed
with Veeam Backup & Replication. If you open the Virtual Machines view, the working area will
display a list of virtual machines that reside on servers connected to Veeam Backup & Replication.
D
ot
N
o
D

78 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

Labs for Module 3: Initial Configuration

Before proceeding to the day-to-day operation sections, we need to configure the backup
infrastructure for the lab.

Get into the Lab

e
ut
Lab Action Purpose

Connecting virtual Add a vSphere host and a Hyper-V host to Veeam

ib
3.1
infrastructure servers Backup & Replication.

tr
Configuring a backup Review the default backup proxy settings to
3.2
proxy understand its specifics.

is
Configuring a backup Configure a main Scale-out Backup Repository™ and

D
3.3
repository a remote backup repository for off-site transfers.
or
Set up notifications to receive email notifications that
3.4 Setting up notifications contain results on the jobs performed on the Veeam
backup server.
e

Ensure data sovereignty compliance that is required


at

by various regulations, such as the General Data


Protection Regulation (GDPR), by tagging production
lic

infrastructure and backup infrastructure objects with


locations. Location tags are used to prevent
3.5 Setup locations
accidental errors when configuring backup and
up

replication jobs or performing out-of-place restores


by issuing a warning when an action may result in a
data sovereignty violation and by producing audit
D

trails whenever such action is confirmed.


ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 79


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 3: Initial Configuration

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

80 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

4. Protect
Veeam Backup & Replication produces image-level backups of virtual machines. It treats
virtual machines as objects, not as a set of files. When you protect virtual machines, Veeam
Backup & Replication copies a virtual machine image as a whole, at a block level. In this
module, you will learn how to create backup, backup copy, VM copy, file copy and replication
jobs. Additionally, you will also learn about the VeeamZIP and Quick Backup features.

e
4.1. 3-2-1 rule

ut
The main purpose of backup is to protect your data against disasters and VM failures. However,

ib
having one copy of a backup file does not provide the necessary level of safety. A backup file may get
corrupted or lost, leaving you with not data to restore at all.

tr
Backup experts claim that to build a successful data protection and disaster recovery plan, you must

is
follow the 3-2-1 rule:

D
3: You must have three copies of a data in different locations.
2: You must use two different types of media to store copies of a backup file, for example, disk
or
storage and tape.
1: You must keep at least one copy of a backup file offsite, for example, in the cloud or in the
remote site.
e
at
lic
up
D
ot
N
o

Thus, according to the first statement of the 3-2-1 backup strategy, you must have 2 different copies
D

of a backup file in different locations, plus your production VM data. In case a disaster strikes, multiple
backup copies increase your chances in data restore.

4.2. Creating Backup Jobs


To perform backup of VMs, you must create a backup job by means of the New Backup Job

Veeam Certified Engineer v9.5 . Textbook 81


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

wizard. This section will guide you through all steps of the wizard and provide explanations
for available options.

4.2.1. Before You Begin


Prior to creating a backup job, make sure you have set up all necessary backup infrastructure
components for the job.

e
During every job run, Veeam Backup & Replication checks disk space on the destination storage. If
the disk space is below a specific threshold value, Veeam Backup & Replication will display a warning

ut
in the job session log. To specify the disk space threshold, select Options from the main menu. On
the Notifications tab, specify the amount of free disk space required in a percentage.

ib
When estimating the amount of disk space required, you should know the following:

tr
Total size of VMs being backed up

is
Frequency of backups
Retention period for backups

D
Whether the jobs will use forward or reverse incremental
or
You must also make assumptions on compression and deduplication ratios, change rates, and other
factors. The following figures are typical for most sites; however, it is important to understand your
environment if there are exceptions:
e
Compression and deduplication savings 2:1 or more; typical is 3:1 or better, but always be
at

conservative when estimating required space.


Typical change rate of 5% day; this can vary tremendously per server and some include
lic

additional space for one-off full backups, and so on.

Using the numbers above, you can estimate required disk space for any job. Besides, you should
up

always give plenty of extra headroom for future growth, additional full backups, moving VMs, restoring
VMs from tape, and so on.
D

Note: With Veeam ONE, you can use the VM Change Rate Estimation report from the
ot

Infrastructure Assessment pack as a ballpark pre-deployment assessment of the potential amount


of free space that should be available on the target repositories.
N

When adding the VMs to the job, to quickly find the necessary object, you can use the search field at
o

the bottom of the Add Objects window. The available options are:
D

Everything, Folder, Cluster, Host, Resource pool, VirtualApp or Virtual machine for the vSphere
infrastrucutre.
Everything, Folder, Host Group, SCVMM, Cluster, Host or Virtual machine for the Hyper-V
infrastructure.

82 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

4.2.2. Backup Methods


Veeam Backup & Replication provides the following methods for creating regular backup files:

Reverse incremental backup


Incremental backup
Forward incremental backup
Forever forward incremental backup

e
ut
Retention Policy

ib
Every successful job run creates a new restore point that lets you return your data to an earlier point
in time. When you define retention policy, you specify how many restore points you want to keep and
thus how ‘far’ you want to be able to roll back. Once the specified number is exceeded, the earliest

tr
restore point will be automatically removed. So if the retention policy is set to three and you already

is
have three restore points, the fourth successful job run will generally delete the restore point created
during the first job run.

D
or
Note: When the allowed number of restore points in the backup chain is exceeded, Veeam
Backup & Replication deletes the whole backup file, not separate VMs from it. For this reason, in
some situation a certain VM may have fewer restore points in the backup chain than is specified in
e
the retention policy settings. This can happen if a backup job processes a number of VMs or VM
containers and some VMs or VM containers fail to be processed in some job sessions.
at
lic

Reverse Incremental Backup

Reverse incremental backup implies that during the first run of a backup job, a full backup of a VM is
up

created. VM data is copied block by block, compressed at an appropriate compression level, and
stored in a resulting full backup file (.vbk). All subsequent backups are incremental (that is,
Veeam Backup & Replication copies only those data blocks that have changed since the last job run).
D

During reverse incremental backup, Veeam Backup & Replication “injects” changes into the .vbk file
to rebuild it to the most recent state of the VM. It also creates a reverse incremental backup file (.vrb)
ot

containing data blocks that are replaced when the full backup file is rebuilt. Therefore, the most recent
restore point is always a full backup, and it gets updated after every backup cycle.
N
o
D

This backup method lets you perform forever-incremental backups and save disk space because you
only have to store one full backup on the backup repository. If the number of restore points allowed by
the retention policy is exceeded, Veeam Backup & Replication will simply delete the oldest reverse

Veeam Certified Engineer v9.5 . Textbook 83


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

increment.

Reverse incremental backup enables you to immediately restore a VM to the most recent state
without extra processing because the most recent restore point is a full backup file. If you need to
restore a VM to a particular point in time, Veeam Backup & Replication will apply the required .vrb
files to the .vbk file to get to the required restore point.

Retention for Reverse Incremental Backup

e
ut
Using reverse incremental backup, Veeam Backup & Replication immediately deletes the earliest
reverse increment as soon as it meets the retention policy. For example, if the retention policy is set
to three restore points, two latest reverse increments and a full backup will be retained.

ib
tr
is
D
or
Incremental Backup
e
at

Incremental Backup
lic

During the first run of an incremental backup, Veeam Backup & Replication creates a full backup file
up

(.vbk). During subsequent backups, it only gets changes that have taken place since the last
performed backup (whether full or incremental) and saves them as incremental backup files (.vib) next
to the full backup.
D

Forward Incremental Backup Forward Incremental-Forever Backup


ot

The first full backup and a set of


forward incremental backups
Backup The first and only full backup and a set of
N

following it + synthetic full and/or


Chain forward incremental backups following it
active full backups that “split” the
backup chain into shorter series
o
D

Select the Incremental backup mode Select the Incremental backup mode in
How to set in the job settings. job settings.
up Enable synthetic full backups and/or Do not enable synthetic full backups
active full backups. and/or active full backups.

84 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Forward Incremental Backup Forward Incremental-Forever Backup

- No synthetic operations – only write


- The full backup chain is removed - Always the indicated number of restore
only after the last increment in the points
chain meets the retention policy - More load on storage (because when
Specifics
- The best choice if company applying retention policy, the changes are
regulation and policies require you to injected to full backup – see Retention
regularly move a created backup file Policy for more details)
to tape or a remote site

e
ut
Forever Forward Incremental Backup

ib
tr
is
D
or
The forever forward incremental backup method produces a backup chain that consists of the first full
backup file (VBK) and a set of forward incremental backup files (VIB) following it. Veeam Backup &
Replication creates a forever forward incremental backup chain in the following way:
e
at

1. During the first session of a backup job, Veeam Backup & Replication creates a full backup file
on the backup repository.
lic

2. During subsequent backup job sessions, Veeam Backup & Replication copies only VM data
blocks that have changed since the last backup job session (full or incremental) and saves
these blocks as an incremental backup file in the backup chain.
up

3. After adding a new restore point to the backup chain, Veeam Backup & Replication checks the
retention policy for the job. If Veeam Backup & Replication detects an outdated restore point, it
transforms the backup chain to make room for the most recent restore point.
D
ot

Note: With Veeam Backup & Replication, you can easily switch between backup methods. Veeam
Backup & Replication will not transform the previously created chain. Instead, it will create a new
N

chain next to the existing one in the following manner:


o

1. If you switch from the reverse incremental method to the forward incremental method, Veeam
Backup & Replication will create a set of incremental backups next to the reverse incremental
D

chain. The full backup in the reverse incremental chain will be used as a starting point for
produced increments
2. If you switch from the forward incremental method to the reverse incremental method, Veeam
Backup & Replication will first create a full backup next to the incremental backup chain. At
subsequent job cycles, Veeam Backup & Replication will transform this full backup and add
reverse incremental backups to the chain.

Veeam Certified Engineer v9.5 . Textbook 85


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Forward Incremental Backup

e
ut
ib
Retention for Forever Forward Incremental Backup

tr
If the number of restore points in forever forward incremental backup chains exceeds the retention
policy settings, Veeam Backup & Replication transforms the backup chain to make room for the most

is
recent restore point.

D
For example: The retention policy is set to seven restore points.
or
When Veeam Backup & Replication detects that the number of allowed restore points is exceeded, it
starts the transform process. Veeam Backup & Replication merges data blocks from the incremental
e

backup copied on Monday into the full backup copied on Sunday. This way, the full backup file
at

‘moves’ one step forward – from Sunday to Monday.


lic
up
D
ot
N

The incremental backup copied on Monday becomes redundant and is removed from the chain.
o
D

As a result, you have a chain of a full backup as of Monday and six incremental backups Tuesday

86 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

through Sunday. That way, 3x I/O are performed: first the incremental backup is written to the
repository on Sunday, then one read and one more write are executed in order to perform the
transform process.

Retention for Forward Incremental Backup

To be able to restore from a forward incremental backup, you need to have a full backup and a chain
of subsequent increments on disk. If you delete a full backup, the whole chain of increments will

e
become useless. In a similar manner, if you delete any increment before the restore point to which

ut
you want to roll back, you won’t be able to restore your data (since later increments depend on earlier
increments).

ib
For this reason, if you select forward incremental backup, in some days there will be more restore
points on the disk than specified by your retention policy. Veeam Backup & Replication will remove

tr
the full backup chain only after the last increment in the chain meets your retention policy (which will

is
happen once the retention policy reaches the next full backup).

D
For example: The retention policy is set to three restore points.
or
A full backup is performed on Sunday, incremental backups are performed Monday through Saturday,
and a synthetic full backup is scheduled on Thursday. Although the policy is already breached on
e
Wednesday, the full backup is not deleted because without it the chain of increments would be
useless, leaving you without any restore point at all. Thus, Veeam Backup & Replication will wait for
at

the next full backup and two increments to be created, and only then delete the whole previous chain
consisting of the full backup and increment, which will happen on Saturday.
lic
up
D
ot
N

Active and Synthetic Full Backups


o

To let you get the most out of incremental backup, Veeam Backup & Replication enables you
D

to create active full backups and schedule the creation of synthetic full backups on specific
days. This may help you avoid long chains of increments, ensure safety of backup data, and
allow you to meet the requirements of your retention policy.

Active Full Backup

In some cases, you need to regularly create a full backup. For example, your corporate backup policy

Veeam Certified Engineer v9.5 . Textbook 87


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

may require that you create a full backup on weekends and run incremental backup on work days. To
let you conform to these requirements, Veeam Backup & Replication offers the ability to periodically
perform active full backups.

The active full backup produces a full backup of a VM, just as if you ran the backup job for the first
time. Veeam Backup & Replication retrieves data for the whole VM from the source, compresses and
deduplicates it, and stores it to the full backup file – .vbk.

The active full backup resets the chain of increments: all subsequent increments use the latest active

e
full backup as a new starting point. A previously used full backup file remains on disk until it is
automatically deleted according to the backup retention policy.

ut
ib
tr
is
D
or
You can create active full backups manually or schedule a backup job to create active full backups
e
with a certain periodicity.
at

To create an active full backup manually, use the Active Full command from the shortcut menu
of a corresponding backup job.
lic

To schedule active full backups, specify scheduling settings in the Advanced section of a
corresponding backup job. You can schedule active full backups to run weekly, for example,
up

every Saturday, or monthly, for example, every fourth Sunday of a month.

Having active fulls together with the forward incremental backup methods is generally a good method
D

when the backup repository performance is weak – that way, only sequential writes to the backup
repository are performed – no transforms. However, additional time and load at the production
storage are involved in that case as creating a full backup might be time, network bandwidth and
ot

resources consuming.
N

Synthetic Full Backup


o

In some situations, running active full backups periodically may not be an option. Active full backups
D

are very resource-intensive and consume considerable amount of network bandwidth. As an


alternative, you can create synthetic full backups.

In terms of data, the synthetic full backup is identical to an active full backup. The synthetic full
backup is a .vbk file that contains data from the whole VM. The difference between these two backup
types lies in the way VM data is retrieved:

88 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Active Full Backup Synthetic Full Backup

Veeam Backup & Replication does not retrieve VM data from


the source datastore (volume). Instead, it “synthesizes” a full
Veeam Backup & Replication
backup from data you already have on the backup repository.
retrieves VM data from the
Veeam Backup & Replication accesses the previous full
source datastore (volume)
backup file and a chain of subsequent increments on the
where the VM resides,
backup repository, consolidates VM data from these files and
compresses and deduplicates
writes consolidated data into a new full backup file. As a result,
it, and writes it to the .vbk file
the created synthetic full backup file contains the same data

e
on the backup repository.
you would have if you created a full backup in a regular

ut
manner.

ib
That way, you can minimize the load on the production storage during backup process, while still
maximizing the number of available restore points if any backup file should become corrupt.

tr
Veeam Backup & Replication treats a synthetic full backup as a regular full backup. As well as any

is
other full backup, the synthetic full backup resets the chain of increments. All subsequent increments
use the created synthetic full backup as a new starting point. A previously used full backup file

D
remains on disk until it is automatically deleted according to the backup retention policy.

The synthetic full backup has a number of advantages:


or
Does not use network resources: It is created from backup files you already have on disk.
Imposes less load on the production environment: It is created right on the backup repository.
e

With Veeam Backup & Replication, you can schedule creation of synthetic full backups on specific
at

days.
lic

For example: You can configure a backup job to perform daily forward incremental backups and
up

schedule synthetic fulls on Thursday.

Veeam Backup & Replication will perform incremental backups Sunday through Wednesday as usual.
D

On Thursday it will perform a synthetic full backup in the following way:


ot

1. Veeam Backup & Replication will first perform incremental backup in the regular manner.
2. At the end of the backup job, the Veeam data mover service on the backup repository will build
a new synthetic full backup from the backup files you already have on disk: the full backup
N

created on Sunday and a chain of increments, Monday through Wednesday plus the new
increment created on Thursday.
o

3. The Veeam data mover service will delete the increment created on Thursday.
D

As a result, you will have a backup chain consisting of the full backup created on Sunday, three
increments created on Monday through Wednesday and a synthetic full backup created on Thursday.

Veeam Certified Engineer v9.5 . Textbook 89


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

e
ut
Every next run of the backup job will create an incremental backup starting from the synthetic full
backup until next Thursday. On the next Thursday, Veeam Backup & Replication will create a new

ib
synthetic full backup.

tr
Note: Veeam Backup & Replication creates a synthetic full backup only once a day on which it is

is
scheduled. If you run the backup job again on Thursday, Veeam Backup & Replication will perform
incremental backups in the regular manner.

D
or
Note: You can schedule to perform a synthetic full backup from time to time for an incremental
backup method. This is why incremental backup is more preferrable for remote backups - with
e
reverse incremental you'd have to perfrom an active full from time to time, which is a bigger load
on the network.
at
lic

Transforming Incremental Backup Chains into Reversed Incremental Backup Chains


up

If you select to create synthetic full backups, you can additionally choose to transform a previous
forward incremental backup chain into a reverse incremental backup chain. In this case,
Veeam Backup & Replication will transform the latest backup chain consisting of the .vbk and .vib files
D

into reverse incremental backups – .vrb files.

The transform option lets you dramatically reduce the amount of space required to store backups.
ot

Instead of two full backups – the regular full backup and the synthetic full backup – you will have only
one synthetic full backup on disk. Note, however, that the transform process takes more time than
N

simply creating a periodic synthetic full backup.


o

For example: You have configured a backup job to perform daily forward incremental backups
D

and scheduled synthetic fulls on Thursday.

Additionally, you have selected to transform the incremental backup chain into the reverse
incremental backup sequence. The backup job starts on Sunday. In this case,
Veeam Backup & Replication will perform backup in the following way:

1. On Sunday, Veeam Backup & Replication will create a full backup; Monday through
Wednesday Veeam Backup & Replication will create incremental backups and add them to the

90 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

backup chain.
2. On Thursday, Veeam Backup & Replication will first create an incremental backup in the regular
manner and add it to the backup chain.
3. After that, Veeam Backup & Replication will transform the incremental backup chain into the
reverse incremental chain. As a result, you have a full backup “created” on Thursday and a set
of reverse increments Sunday through Wednesday.
4. When you run the backup job next time, Veeam Backup & Replication will add a new
incremental backup to the chain; the synthetic full backup will be used as a starting point.

e
ut
ib
tr
is
D
or
Veeam Backup & Replication always transforms only the latest incremental backup chain. For
example, you have a backup chain that consists of one full backup file and set of increments. In the
middle of the chain, you create an active full backup. When you run a transformation task,
e
Veeam Backup & Replication will transform the most recent active full backup plus increments that
at

follow it. All backups that precede the active full backup will stay intact.
lic

Note: The transform process is accounted for as an active backup repository task. Make sure you
properly plan for use of backup repository resources when you schedule backup jobs.
up

Retention Policy for Deleted VMs


D

In some situations, after you configure and run backup jobs in Veeam Backup & Replication, you may
ot

want to change something in your virtual environment or even in your backup strategy. For example,
you may remove some VMs from the virtual infrastructure or move them to some other location. You
N

may also exclude some VMs from jobs that have already been running for some time.
o
D

Veeam Certified Engineer v9.5 . Textbook 91


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

e
ut
ib
tr
is
D
or
e
at

By default, when you remove a VM protected by Veeam Backup & Replication from the virtual
lic

infrastructure or exclude it from a job, its backup files still remain on the backup repository. To avoid
keeping redundant data on disk, you can select to control retention policy for deleted VMs.
up

The retention policy for deleted VMs is an option in the backup job settings. By default, this option is
disabled. To use this option, you need to select the Remove deleted VMs data from backup after
check box and specify the desired period of time for which the data must be retained on the backup
D

repository.

If you enable retention policy for deleted VMs in backup job


ot

settings, Veeam Backup & Replication performs the following actions:


N

1. If all VMs in the job are processed with the Success status, at the end of the backup job
session Veeam Backup & Replication gets a list of VMs in the backup.
o

2. For every VM in the backup, Veeam Backup & Replication checks the configuration database
and gets the date of the latest backup job session completed with the Success status.
D

3. Veeam Backup & Replication checks if any VM in the backup meets the following conditions:

There are no successful backups for the VM for the last N days.
There are no corrupted backups for the VM for the last N days.

Where N is the number of days specified in the Remove deleted VMs data after N days setting.

1. If both conditions are true for some VM, Veeam Backup & Replication removes data for this VM
from the backup. When Veeam Backup & Replication removes data for deleted VMs, it does not

92 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

free up space on the backup repository. It marks the space as available to be overwritten, and
this space is overwritten during subsequent job sessions or the backup file compact operation.

Important! Retention policy for deleted VMs is applied to reverse incremental backup chains,
forever forward incremental backup chains and forward incremental backup chains for which
synthetic full backups with subsequent transform is enabled.

e
4.2.3. Changed Block Tracking (CBT)

ut
To perform incremental backups, Veeam Backup & Replication needs to know which data
blocks have changed since the previous job run.

ib
tr
For VMware

is
For VMware VMs with
hardware version 7 or later,

D
Veeam Backup & Replication
employs VMware vSphere or
Changed Block Tracking
(CBT) – a native VMware
feature. Instead of scanning
e
VMFS,
at

Veeam Backup & Replication queries CBT on vSphere through VADP and gets the list of blocks that
have changed since the last run of this particular job. Using CBT increases the speed and efficiency
of block-level incremental backups. CBT is enabled by default; if necessary, you can disable it in the
lic

settings of a specific backup job.


up

In some situations, Veeam Backup & Replication cannot leverage VMware vSphere CBT due to
VMware limitations. Whenever Veeam Backup & Replication cannot leverage VMware vSphere CBT
(for example, if your VMs run an earlier version of virtual hardware or CBT is disabled at the ESXi
D

host level), the filtering is still performed. Instead of tracking changed blocks of data, Veeam Backup
& Replication filters out unchanged data blocks. During backup, Veeam Backup & Replication
consolidates virtual disk content, scans through the VM image and calculates a checksum for every
ot

data block. Checksums are stored as metadata to backup files next to VM data. When incremental
backup is run, Veeam Backup & Replication opens all backup files in the chain of previous full and
N

incremental backups, reads metadata from these files and compares it with checksums calculated for
a VM in its current state. If a match is found (which means the block already exists in the backup), the
o

corresponding block is filtered out. The time of processing using Veeam filtering mechanism will
increase though compared to the time of processing when using vSphere CBT.
D

For Microsoft Hyper-V

When Veeam Backup & Replication performs incremental backup, it needs to know what data blocks
have changed since the previous job session. To get the list of changed data blocks, Veeam Backup
& Replication uses the Changed Block Tracking mechanism (CBT). CBT increases the speed and
efficiency of incremental backups.

Veeam Certified Engineer v9.5 . Textbook 93


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Veeam Backup & Replication uses CBT for the following operations:

Backup
Replication
Entire VM restore

CBT is enabled by default. You can disable it either at the host level or at the job level for
troubleshooting purposes. Note that if you choose to run incremental jobs with CBT disabled, the
backup window may increase dramatically, as Veeam Backup & Replication will read all VM data to

e
detect what blocks have changed since the last job session.

ut
ib
tr
is
D
or
e
at
lic
up
D
ot

To keep track of changed data blocks, Veeam Backup & Replication uses the following mechanisms:
N

For VMs on Microsoft Hyper-V Servers 2012 R2 and earlier: Veeam proprietary changed block
tracking mechanism (CBT)
o

For VMs on Microsoft Hyper-V Server 2016: Resilient Changed Tracking (RCT)
D

Veeam CBT

The CBT mechanism is implemented as a file system filter driver — Veeam CBT driver. The driver is
installed on every Microsoft Hyper-V host added to the backup infrastructure. The driver is activated
when the host is first addressed by a job for which CBT is enabled.

The Veeam CBT driver keeps track of changed data blocks in virtual disks. Information about
changed data blocks is registered in special CTP files. When a job runs, Veeam Backup & Replication

94 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

uses CTP files to find out what data blocks have changed since the last run of the job, and copies
only changed data blocks from the disk image. CTP files are stored in the
C:\ProgramData\Veeam\CtpStore folder on standalone Microsoft Hyper-V hosts or on every node of
the Microsoft Hyper-V cluster. The CtpStore folder contains a set of subfolders — one for every
processed VM, in which the following files are stored:

CTP files. These files are used by the Veeam CBT driver to keep track of changed data blocks.
For every VHD/VHDX or AVHD/AVHDX file of a VM, there is a separate CTP file.
notes.txt file. This file contains basic information about the VM such as VM name and ID, and

e
describes for which VHD/VHDX files changed block tracking is enabled.

ut
If a Microsoft Hyper-V VM is registered as a cluster resource, the Veeam CBT driver operates on all
cluster nodes that have access to VM disks on the CSV. When a job runs, Veeam Backup &

ib
Replication copies CTP files to the temporary folder on the backup proxy used by the backup job.

tr
If backup or replication is performed in the on-host backup mode, CTP files are copied to the
Microsoft Hyper-V host performing the role of the on-host backup proxy.

is
If backup is performed in the off-host backup mode, CTP files are copied to the off-host backup
proxy.

D
or
Important! If you process VMs on a Microsoft Hyper-V cluster, make sure that all cluster nodes
are online. If cluster nodes are in the maintenance mode, have the cluster service stopped, are
powered off or not accessible, CBT will not work. For more information about other requirements
e
for VMs on clusters and SMB3 storage, see https://www.veeam.com/kb1934.
at

Resilient Changed Tracking


lic

For VMs running on Microsoft Hyper-V Server 2016, Veeam Backup & Replication uses Resilient
Change Tracking, or RCT. RCT is a native Microsoft Hyper-V mechanism for changed block tracking
up

in virtual hard disks of VMs. The RCT mechanism is used only if the Microsoft Hyper-V environment
meets the following requirements:
D

VMs run on Microsoft Hyper-V Server 2016.


[For Microsoft Hyper-V clusters] All hosts in the cluster are upgraded to Microsoft Hyper-V
Server 2016, and the cluster functional level is upgraded. If at least one node in a cluster is not
ot

upgraded to Microsoft Hyper-V Server 2016, Veeam Backup & Replication uses its native driver
for changed block tracking.
N

VM configuration version is upgraded to 8.


o

For backup and replication with RCT, Veeam Backup & Replication uses the following mechanism:
D

1. Veeam Backup & Replication triggers Microsoft Hyper-V to create a checkpoint for a processed
VM. The checkpoint is used as a data source for backup and replication.
2. At the end of VM processing, before a checkpoint is merged with the base VM disk, Microsoft
Hyper-V converts the checkpoint to a reference point. The reference point can be thought of as
a point-in-time representation of the VM disk state.
3. When Veeam Backup & Replication performs incremental backup or replication, it creates a
new checkpoint for the VM that is used as a data source. Veeam Backup & Replication queries
Microsoft Hyper-V to get incremental changes between the reference point created during the

Veeam Certified Engineer v9.5 . Textbook 95


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

previous job session and checkpoint created during the current job session.
4. Veeam Backup & Replication copies only changed data blocks from the created checkpoint and
saves them in an incremental backup file.

To guarantee persistence of CBT data, Microsoft RCT maintains 3 bitmaps with CBT data:

In-memory bitmap contains the most granular CBT data.


RCT file contains less granular CBT data than the in-memory bitmap. The RCT file is used if the
CBT data in the in-memory bitmap is not available during normal operational situations, for

e
example, a VM is moved to another host. The RCT file size never exceeds 6 MB.
MRT file has the coarsest granularity level. The RCT file is used if the CBT data in the in-

ut
memory bitmap is not available during abnormal operational situations, for example, power loss
or host crash.

ib
RCT and MRT files are created for every VM disk and stored at the VM disk level.

tr
CBT Reset

is
In some cases, CBT data may get corrupted — as a result, Veeam Backup & Replication will fail to

D
process VMs with changed block tracking. To reset CBT data for individual VMs or specific
VHD/VHDX files, you can use the Reset-HvVmChangeTracking PowerShell cmdlet. For more
information, see the Veeam PowerShell reference guide at
or
https://www.veeam.com/documentation-guides-datasheets.html.
e

Note: Keep in mind that CBT data is reset when you perform product upgrade. When you run a
at

backup job for the first time after upgrade, Veeam Backup & Replication will not use changed
block tracking. Instead, it will scan the VM image to learn what data blocks have changed.
lic

4.2.4. Data size optimization


up

To decrease traffic and disk space required for storing backup files, Veeam Backup &
Replication provides mechanisms of compression and deduplication.
D

Compression
ot

Compression decreases the size of created backups but affects the duration of the backup procedure.
N

Veeam Backup & Replication allows you to select one of the following compression levels:
o

Level Recommendations
D

When using storage devices with hardware compression and deduplication


None
tools to store created backups

Optimized compression level for very low CPU usage. Recommended if you
Dedupe-friendly
want to decrease the proxy load.

Optimal Recommended compression level that provides the best ratio between the size
(default setting) of the backup file and time of the backup procedure.

96 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Level Recommendations

Provides additional 10% compression ratio over Optimal, but at the cost of
High
about 10x higher CPU usage. May reduce overall backup performance.

Provides the smallest size of the backup file but reduces backup performance.
Extreme We recommend running backup proxies on computers with modern multi-core
CPUs (6 cores recommended) if you intend to use the extreme compression.

e
Deduplication

ut
You can apply deduplication when backing up multiple VMs that have similar data blocks (for

ib
example, if VMs were created from the same template) or great amount of free space on their logical
disks. Veeam Backup & Replication does not store zero byte blocks or space that has been

tr
preallocated but not used. With deduplication, identical blocks or blocks of free space are eliminated,
which decreases the size of the created backup file. Thus the disk space required for backups is

is
reduced.

D
Depending on the type of storage you select as a backup target, Veeam Backup & Replication uses
data blocks of different size to process VMs, which optimizes the size of a backup file and job
performance. If you’re using storage devices with hardware compression and deduplication tools to
or
store created backups, it is recommended to select “None” level.

You can choose one of the following storage optimization options:


e
at

Option When recommended Details

If you select to use small data blocks to dedupicate a


lic

large backup file, the backup file will be cut into a great
number of data blocks. As a result, Veeam Backup &
Replication will produce a very large deduplication
up

Local Recommended for metadata table which can potentially overgrow memory
target (16 backup jobs that can and CPU resources of your backup repository.
TB + produce very large full With this option selected, Veeam Backup & Replication
D

backup backup files – larger will use data blocks of 4 MB. Large data blocks produce
size) than 16 TB a smaller metadata table that requires less memory and
ot

CPU resources to process.


Note, however, that this storage optimization option will
provide the lowest deduplication ratio and the largest
N

size of incremental backup files.


o

The SAN identifies larger blocks of data (1024 KB) and


Recommended for therefore can process large amounts of data at a time.
Local
D

backup to SAN, DAS or This option provides the fastest backup job performance
target
local storage but reduces the deduplication ratio, because with larger
data blocks it is less likely to find identical blocks.

Recommended for This option provides a better deduplication ratio and


LAN
backup to NAS and reduces the size of a backup file because of reduced
target
onsite backup data block sizes (512 KB).

Veeam Certified Engineer v9.5 . Textbook 97


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Option When recommended Details

Veeam Backup & Replication will use small data blocks


Recommended if you (256 KB), which will result in the maximum deduplication
WAN
are planning to use WAN ratio and the smallest size of backup files, allowing you
target
for offsite backup to reduce the amount of traffic over the WAN
connection.

e
Note: Changing the compression level and deduplication settings in an existing job will not have

ut
any effect on previously created backup files. It will affect only those backups that will be created
after you set the new settings:

ib
New compression settings are applied at the next run of the job.

tr
New deduplication settings are applied only after a new active full backup is created

is
Note: Note: If you upgrade to Veeam Backup & Replication 9.0 from a previous product version,

D
this option will be displayed as Local target (legacy 8MB block size) in the list and will still use
block size of 8MB. It is recommended that you switch to an option that uses a smaller block size
or
and create an active full backup to apply the new setting.

Zeroing Out Dirty Blocks


e
at

When Veeam Backup & Replication performs backup or replication, it copies data of the VM image at
the block level. The copied data contains all data of the VM, including data blocks that are marked as
lic

deleted on the VM guest OS. Such blocks are also known as dirty blocks or Deleted File Blocks.
up

Important! Veeam Backup & Replication can exclude deleted file blocks only on the VM guest OS
with Microsoft NTFS.
D

This option is enabled by default and excluding deleted file blocks in backup or replica leads to:
ot

Reduced size of backup or replica.


Possible increase in the job performance.
N

If you do not want to exclude deleted file blocks from backups or replicas, you can disable the
o

Exclude deleted file blocks option in the backup or replication job settings.
D

With this option enabled, Veeam Backup & Replication performs the following operations during the
job session:

1. Veeam Backup & Replication accesses the MFT file on the VM guest OS to identify deleted file
blocks, and zeros out these blocks.
2. Veeam Backup & Replication processes and transports data blocks of the VM image in the
following manner:

If a data block of the VM image contains only the deleted file blocks, Veeam Backup &

98 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Replication does not read this data block from the source volume.
If a data block of the VM image contains zeroed out blocks and other data, Veeam
Backup & Replication copies this block to the target. Due to data compression, data
blocks that are marked as deleted are compressed, and the size of the resulting backup
or replica file reduces.

e
ut
ib
tr
Note: If you enable or disable the Exclude deleted file blocks setting for the existing

is
job, Veeam Backup & Replication will apply the new setting from the next job session.

D
4.2.5. Data Encryption or
Data security is an important part of the backup strategy. You must protect your information from
unauthorized access, especially if you back up sensitive VM data to offsite locations or archive it to
tape. To keep your data safe, you can use data encryption. The following types of encryption are used
e

in Veeam Backup & Replication:


at

At source In flight At rest


lic

Who does
Data Mover Service Data Mover Service
the Tape Device
at the source proxy at the source proxy
up

encryption

Hardware level: Library- and


D

driver-managed encryption
Reads the data and mechanisms provided by the
encrypts the files tape vendor (preferred and
Source Data Mover
ot

that are sent to the tried first for tape media). This
Service encrypts before
Process repository, which will cause double encrypted
sending, target decrypts
N

writes the files as it backups, if source backup is


when receiving
receives them already encrypted
(already encrypted) Software level: The encryption
o

mechanism provided by
Veeam
D

Note: In Veeam Backup & Replication, encryption works at the job level and can be enabled for
the following types of jobs: backup job, backup copy job, tape jobs (backup to tape job and file to
tape job), and VeeamZIP.

Veeam Backup & Replication uses the following industry-standard data encryption algorithms:

Veeam Certified Engineer v9.5 . Textbook 99


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

To encrypt data blocks in backup files and files archived to tape, Veeam Backup & Replication
uses the 256-bit AES with a 256-bit key length in the CBC-mode.
To generate a key based on a password, Veeam Backup & Replication uses the Password-
Based Key Derivation Function, PKCS #5 version 2.0. Veeam Backup & Replication uses
10,000 HMAC-SHA1 iterations and a 512-bit salt.
For Microsoft Windows-based repositories, Veeam Backup & Replication uses the Windows
Crypto API, complying with the Federal Information Processing Standards (FIPS 140).
For Linux-based repositories, Veeam Backup & Replication uses a statically linked OpenSSL
encryption library, without the FIPS 140 support.

e
To encrypt data in backups and files, Veeam Backup & Replication employs a symmetric key

ut
encryption algorithm. The symmetric, or single-key encryption algorithm, uses a single, common
secret key to encrypt and decrypt data. Before data is sent to target side, it is encoded with a secret

ib
key. To restore encrypted data, you must have the same secret key. Users who do not have the
secret key cannot decrypt data and get access to it.

tr
When you enable encryption for a job, you must define a password to protect data processed by this

is
job, and define a hint for the password. The password and the hint are saved in the job settings.
Based on this password, Veeam Backup & Replication generates a user key.

D
During the encryption process, Veeam Backup & Replication saves a hint for the password to the
or
encrypted file. When you decrypt a file, Veeam Backup & Replication displays a hint for the password
that you must provide. After you enter the password, Veeam Backup & Replication derives a user key
from the password and uses it to unlock the storage key for the encrypted file.
e

According to the security best practices, you must change passwords for encrypted jobs regularly.
at

When you change a password for the job, Veeam Backup & Replication creates a new user key and
uses it to encrypt new restore points.
lic

Important! You must always remember passwords set for jobs or save these passwords in a safe
up

place. If you lose or forget the password, you can restore data from a backup file by issuing a
request to Veeam Backup Enterprise Manager.
D

4.2.6. Transaction Consistency


ot

When you perform backups of a running VM, it is necessary to quiesce (or ‘freeze’) it to bring the file
N

system and application data to a consistent state suitable for backup. Backing up a VM without
quiescence produces a crash-consistent backup. Restoring a crash-consistent backup is essentially
equivalent to rebooting a server after a hard reset. In contrast to it, restoring transactionally consistent
o

backups (produced with VM data quiesced) ensures the safety of data for applications running on
D

VMs.

VMware vSphere

To create transactionally consistent backup images of VMware vSphere VMs, Veeam Backup &
Replication provides two options: application-aware processing (utilizing Windows VSS framework)
and VMware Tools quiescence.

100 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Important! VMware Tools quiescence does not support log truncation recommended for highly-
transactional applications like Exchange Server or SQL Server. That is why application-aware
processing utilizing Windows VSS as the recommended option to use for backup and replication of
Exchange Server, Active Directory and other VSS-aware applications.

Persistent Snapshots

As it was mentioned earlier, during application-aware processing, Veeam Backup & Replication

e
utilizes a VSS writer for a corresponding application to freeze application data and bring it to a

ut
consistent state suitable for backup.

ib
According to Microsoft limitations, the application freeze cannot take longer than 60 seconds (20
seconds for Microsoft Exchange). If the VSS writer does not manage to freeze application data within

tr
this period of time, a VSS processing timeout occurs, and Veeam Backup & Replication fails to create
a transactionally consistent backup for the VM.

is
D
For example: The VSS processing timeout is a common problem for highly transactional
applications such as Microsoft Exchange. or
To overcome this limitation, Veeam Backup & Replication utilizes the Microsoft VSS persistent
snapshots technology for backup of Microsoft Exchange VMs. If Microsoft Exchange fails to be frozen
e
within the allowed period of time, Veeam Backup & Replication automatically fails over to the
at

persistent snapshot mechanism. The backup operation is performed in the following way:

1. Veeam Backup & Replication triggers the Microsoft VSS framework to prepare Microsoft
lic

Exchange inside the VM for backup.


2. The Microsoft VSS writer attempts to quiesce Microsoft Exchange. If the Microsoft VSS writer
up

fails to do it within the allowed period of time, the control is passed to the native Veeam VSS
writer. The Veeam VSS writer holds the freeze operation for the necessary amount of time.
3. After Microsoft Exchange data is brought to a consistent state, the control is passed to the
D

Microsoft VSS provider. The Microsoft VSS framework creates a persistent VSS snapshot for
VM disks except system VM disks.
4. The rest of the backup operation is performed in a regular way.
ot

5. After the backup operation is complete, Veeam Backup & Replication triggers Microsoft VSS to
remove a persistent VSS snapshot on the production VM. The persistent VSS snapshot holding
N

consistent application data still remains inside the created VM backup.

During full VM restore, Veeam Backup & Replication recovers data from the VM backup and reverts
o

VM disks to the persistent VSS snapshot inside the backup. As a result, the Microsoft Exchange VM
D

is restored from the backup in a consistent state without any data loss.

Veeam Backup & Replication uses the persistent VSS snapshot technology if the VM meets the
following requirements:

The VM runs Microsoft Exchange 2010, Microsoft Exchange 2013 or Microsoft Exchange 2016.
The VM does not perform the role of a domain controller.
Microsoft Exchange databases and log files are located on a non-system disk of the VM. During

Veeam Certified Engineer v9.5 . Textbook 101


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

backup, Veeam Backup & Replication does not trigger a persistent VSS snapshot for system
VM disks. As a result, system disks are restored in a crash-consistent, not transactionally
consistent state.

Snapshot Hunter

The Snapshot Hunter (available for VMware vSphere) is a Veeam technology used to detect and

e
remove orphaned snapshots that may remain after backup or replication job sessions . The Snapshot

ut
Hunter addresses the problem of “phantom” snapshots. Under some circumstances, VMware
vSphere can report a successful removal of a snapshot but the snapshot actually remains on the
datastore. Phantom snapshots can take substantial space on the datastore or impact VM

ib
performance. They can even cause the production VMs to stop if the datastore runs out of free space.

tr
To solve the problem of phantom snapshots, Veeam Backup & Replication starts the Snapshot
Hunter during each backup or replication job session. The Snapshot Hunter looks for snapshot files

is
not registered in vSphere. If there are no orphaned files, the Snapshot Hunter stops. If orphaned
snapshot files are detected, the Snapshot Hunter removes them in the background mode.

D
The Snapshot Hunter runs in jobs that use VMware VM snapshots:
or
Backup jobs: regular backup, backup from storage snapshot, vCloud Director backup
Replication jobs (the source VM snapshot): regular replication, replication from storage
e
snapshot
VeeamZIP
at
lic

Guest Interaction Proxy

To interact with the VM guest OS during the backup or replication job, Veeam Backup & Replication
up

needs to deploy a runtime process in each VM. Guest OS interaction is performed if you enable the
following options:
D

Application-aware processing
Guest file system indexing
ot

Transaction logs processing


N

Previously, the runtime process was deployed by the backup server. This could potentially cause the
following problems:
o

Increased load on the backup server.


D

Decrease in the job performance if the connection between two sites was slow.
Inability to process VMs to which the backup server had no network connection.

Since v9 the task of deploying the runtime process in a Microsoft Windows VM is performed by the
guest interaction proxy. The guest interaction proxy is a backup infrastructure component that sits
between the backup server and processed VM. The guest interaction proxy deploys the runtime
process in the VM and sends commands from the backup server to the VM.

102 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Note: Veeam Backup & Replication does not deploy persistent agents inside VMs. Instead, it uses
a runtime coordination process on every VM that is started once the backup operation is launched,
and removed as soon as it is finished. This helps avoid agent-related drawbacks such as pre-
installing, troubleshooting and updating. Runtime coordination process is used for both Linux and
Windows VMs.

The guest interaction proxy allows you to communicate with the guest OS even if the backup server
and processed VM run in different networks. As the task of runtime process deployment is assigned

e
to the guest interaction proxy, the backup server only has to coordinate job activities.

ut
During the job session with Microsoft Windows VM guest OS interaction, Veeam Backup &
Replication performs the following operations:

ib
1. The backup server defines the machine that will perform the guest interaction proxy role.

tr
2. The guest interaction proxy accesses the Microsoft Windows VM and deploys a runtime
process responsible for guest OS interaction.

is
3. The VM processing proceeds with the usual scenario.
4. Once the job session completes, the backup server instructs the guest interaction proxy to

D
delete the runtime process from the VM.
or
In case network connection breaks when the job is running, Veeam Backup & Replication will make
attempts to reconnect.
e
at
lic
up
D
ot
N

Important! The guest interaction proxy deploys the runtime process only in a Microsoft Windows
VM. In a VM with another guest OS, the runtime process will be deployed by the Veeam Backup
Server.
o
D

To perform the role of guest interaction proxy, the machine must meet the following requirements:

It must be a Microsoft Windows machine (physical or virtual).


You must add it to the Veeam Backup & Replication console as a managed server.
It must have a LAN or VIX connection to the VM that will be backed up or replicated.

Important! The Guest Interaction Proxy functionality is available in the Enterprise and Enterprise

Veeam Certified Engineer v9.5 . Textbook 103


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Plus Editions of Veeam Backup & Replication. In Standard Edition the runtime process will be
deployed by the Veeam Backup Server.

Guest Interaction Proxy Selection

When you add a Microsoft Windows machine to the backup infrastructure, Veeam Backup &
Replication deploys the Data Mover Service on it. The Data Mover Service includes the components
responsible for runtime process deployment during guest OS interaction.

e
To assign a guest interaction proxy for the job, you must select a Microsoft Windows machine that will

ut
perform the role of the guest interaction proxy at the Guest Processing step of the backup or
replication job wizard. You can assign the guest interaction proxy manually, or let Veeam Backup &
Replication do it automatically. Veeam Backup & Replication uses the following priority rules to select

ib
the guest interaction proxy:

tr
1. A machine in the same network as the protected VM that does not perform the backup server
role.

is
2. A machine in the same network as the protected VM that performs the backup server role.
3. A machine in another network that does not perform the backup server role.

D
4. A machine in another network that performs the backup server role.
or
If Veeam Backup & Replication finds several available machines of equal priority, it selects the less
loaded machine. The load is defined by the number of tasks that the machine already performs.
e
If the guest interaction proxy fails to connect to a Microsoft Windows VM, the guest interaction proxy
will not be able to access the VM and deploy a runtime process in it. In this case, the backup server
at

will take over the role of guest interaction proxy and deploy the runtime process in the VM.
lic

Microsoft Hyper-V
up

To create a transactionally consistent backup of Hyper-V VMs, Veeam Backup & Replication uses the
VSS framework. The Hyper-V VSS writer coordinates its operations with the Hyper-V Integration
D

Services running inside the backed up VM to quiesce VM operations and create a stable shadow
copy of the volume. This approach is also known as Hyper-V online backup.
ot

Veeam Backup & Replication performs host-based backups of Hyper-V VMs. In contrast to traditional
backup tools that deploy an agent inside the VM guest OS and back up from within the VM,
N

Veeam Backup & Replication uses a Veeam data mover service running on the Hyper-V host or a
Veeam data mover service running on the off-host backup proxy. A VM is treated as an object from
o

the perspective of the Hyper-V host – Veeam Backup & Replication captures the VM configuration
and state along with VM VHD/VHDXs and creates an image-based backup of the VM.
D

To perform backups of Hyper-V VMs, Veeam Backup & Replication leverages the VSS framework
and Hyper-V VSS components. It acts as a VSS requestor and communicates with the VSS
framework. Veeam Backup & Replication obtains from VSS information about available VSS
components, prescribes what components should be used, identifies volumes where files of the
necessary VMs are located, and triggers the VSS coordinator to create volume snapshots.

Before a snapshot of a volume is created, VMs on the volume must be prepared for the snapshot –

104 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

that is, data in the VM must be in a state suitable for backup. Veeam Backup & Replication uses three
methods to quiesce Hyper-V VMs on the volume: online backup, offline backup and crash-consistent
backup.

Whenever possible, Hyper-V VSS uses online backups to quiesce VMs. If online backups cannot be
performed, one of the other two methods is used to prepare a VM for a volume snapshot. By default,
Veeam Backup & Replication fails over to the crash-consistent backup if online backup is not
possible. However, you can configure your backup jobs to use the offline backup method instead.

e
Pre-Freeze and Post-Thaw Scripts

ut
If you plan to back up VMs running applications that do not support VSS, you can instruct

ib
Veeam Backup & Replication to run custom pre-freeze and post-thaw scripts for these VMs. Pre-
freeze scripts quiesce the VM file system and application data to bring the VM to a consistent state

tr
before Veeam Backup & Replication triggers a VMware VM snapshot. After the VM snapshot is

is
committed, post-thaw scripts bring the VM and applications to their initial state.

To run pre-freeze and post-thaw scripts, you must create them beforehand and specify paths to them

D
in the job settings. When the job starts, Veeam Backup & Replication will upload these scripts to the
VM guest OS and execute them. Scripts for Microsoft Windows VMs are uploaded over the network
or
or VIX, if Veeam Backup & Replication fails to connect to the VM guest OS over the network. Scripts
for Linux VMs are uploaded over SSH.
e
at

Truncation of transaction logs


lic

If you are performing a backup of database systems that use transaction logs, for example, Microsoft
Exchange or Microsoft SQL or Oracle you can select to truncate transaction logs so that logs do not
overflow the storage space. Veeam Backup & Replication provides the following options of
up

transaction logs handling:

What Result When


D

You can
If a backup job completes
recover a
ot

Truncate successfully,
database to For a non-SQL VM and when
transaction Veeam Backup & Replication
the point in it’s not required to be able to
logs upon produces a VM backup file and
N

time when restore to any point of time


successful truncates transaction logs on
the backup between backups.
backup. the production database
file was
o

system.
created.
D

You can use


transaction
If together with
Do not Veeam Backup & Replication logs to
Veeam Backup & Replication,
truncate produces a backup file and restore the
you use another backup tool to
transaction does not trigger transaction log VM to any
maintain consistency of the
logs truncation. point in time
database state.
between
backups.

Veeam Certified Engineer v9.5 . Textbook 105


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

What Result When

Back up
transaction You can use
logs with Veeam Backup & Replication transaction When you are backing up a
Veeam creates a backup of a VM and logs to Microsoft SQL or Oracle VM
Backup & additionally ships transaction restore the with no other backup tool and
Replication logs and saves them to the VM to any you want to be able to restore
(for Oracle backup repository next to the point in time to any point of time between
and VM backup. between backups.

e
Microsoft backups.

ut
SQL only)

ib
Important! To be able to back up the SQL transaction logs make sure that Full or Bulk-logged

tr
recovery model is enabled for that server and no other backup tool truncates the SQL server logs
files. To be able to back up the Oracle transaction logs make sure that ARCHIVELOG mode is

is
enabled for the Oracle database.

D
4.2.7. Scheduling or
When you create a job, you can simply start it manually whenever it is necessary. However, as the
number of backup and replication jobs increases, it may become hard to keep track of them.
e
Veeam Backup & Replication provides a number of job scheduling options which enables you to set
up automatic startup schedules for jobs, automatic retries for failed jobs, and a backup window to limit
at

the time when jobs are performed.


lic

Automatic Startup Schedule


up

To perform a job on a regular basis, you can schedule it to start automatically. The Veeam Backup
Service running on the backup server continuously checks configuration settings of jobs and starts
D

them in accordance with their schedules.

Jobs can also be scheduled to run continuously, that is, in a non-stop manner. Technically, a job
ot

running continuously is launched as soon as previous job processing is complete. With


Veeam Backup & Replication, you can run backup jobs and replication jobs continuously or with an
N

interval as low as one minute to implement near-continuous data protection (near-CDP) for the most
critical applications and workloads.
o

Even if you have scheduling set up for a job, you can still start it manually at any moment.
D

Note: For a scheduler, periodic jobs have priority over regular jobs, e.g. if you have a monthly and
a daily job scheduled to run at the same time, in case there are only enough resources to launch
one of them, the monthly job will be started.

106 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Automatic Job Retry

Veeam Backup & Replication can be configured to retry a job for a certain number of times if the initial
job pass fails. By default, Veeam Backup & Replication automatically retries a failed job three times
within one job session. If necessary, however, you can change the number of retries in the job
settings.

Veeam Backup & Replication retries a job only if the previous job session has failed and one or
several VMs in the job have not been processed. Veeam Backup & Replication does not perform a

e
retry if a job session has finished with the Success or Warning status. During the job retry,

ut
Veeam Backup & Replication processes only those VMs that have failed.

Veeam Backup & Replication creates only one backup file within one job session. That is, if a job

ib
includes several VMs and some of them fail to be processed during the first job pass,
Veeam Backup & Replication will create a backup file containing data for those VMs that have been

tr
successfully processed. At the job retry, Veeam Backup & Replication will attempt to process failed

is
VMs; in the case of success, Veeam Backup & Replication will write data of the processed VMs to the
backup file that was created at the previous job pass.

D
Important! Veeam Backup & Replication does not perform automatic retry for jobs started
or
manually.
e
In some situations, Veeam Backup & Replication may fail to process VMs during all job retries. In this
case, failed VMs will be processed within the next job session; its data will be written to the backup
at

file created within the current job session.


lic

Backup Window
up

To prevent a backup or replication job from overlapping with production hours and ensure it does not
provide unwanted overhead on your virtual environment, you can limit all jobs to a specific backup
D

window. A backup window is a period of time on week days when backup and replication jobs are
permitted to run. If the job exceeds the allowed window, it will be automatically terminated.
ot

Stopping Job Session


N

You can stop the job session:


o

With the Stop option – terminates the job session before Veeam Backup & Replication creates
D

the restore points for the VMs that are currently processed.
With the Stop after current VM option – terminates the job session after creating restore
points for the VMs that are currently processed.

The VMs that Veeam Backup & Replication succeeded to process will have new restore points.

Veeam Certified Engineer v9.5 . Textbook 107


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

4.3. Creating Restore Points with VeeamZIP and Quick


Backup
If you need to quickly create a restore point for selected VM, VeeamZIP (full backup) or Quick
Backup (incremental backup) can be used.

4.3.1. VeeamZIP

e
ut
With Veeam Backup & Replication, you can quickly perform backups of one or several VMs with
VeeamZIP. You can also VeeamZIP files for VMware vSphere and Hyper-V VMs with Veeam Backup

ib
Free Edition.

VeeamZIP is similar to full VM backup. The VeeamZIP job always produces a full backup file (.vbk)

tr
that acts as an independent restore point. You can store the backup file to a backup repository, to a

is
local folder on the Veeam backup server, or to a network share.

When you perform backups with VeeamZIP, you do not have to configure a backup job and schedule

D
it, only minimum setting are required. Instead, you can start the backup process for selected VMs
immediately. Veeam Backup Free Edition offers the following advanced options for VeeamZIP files
creation:
or
Data encryption. To create an encrypted VeeamZIP file, you must enable the encryption option
e
and specify a password in VeeamZIP task options.
at

Retention settings. You can specify retention settings for the created VeeamZIP file: define if
the file must remain on the target storage or must be deleted with time (autoretention).
Data compression – similar to the levels used for regular backup jobs.
lic

VM guest OS quiescence. VeeamZIP uses VMware Tools quiescence for VMware VMs and
native Hyper-V quiescing mechanisms for Hyper-V VMs to capture VM data. VeeamZIP
up

quiesces, or freezes, a running VM to bring its file system and application data to a consistent
state suitable for backup. Restoring a transactionally consistent VeeamZIP file ensures
successful recovery of VM applications without any data loss.
D

The VeeamZIP was in versions prior to v9 not registered in the database used by Veeam Backup &
Replication and the backup file produced with it is not available under the Backups node in the
ot

Backup & Replication view. However since v9, VeeamZIP backups are now registered in the
configuration database and shown under Backups > Disk (VeeamZIP) node to more easily track
N

them. You can easily see the location using the Location column, showing the corresponding
backup's location, such as local path, backup repository or storage snapshot.
o
D

4.3.2. Quick Backup


Quick Backup lets you perform on-demand incremental backups for VMs. You can use Quick Backup
if you want to produce an additional restore point for one or more VMs in a backup job and do not
want to configure a new job or modify the existing one. Quick Backup can be run for both incremental
and reverse incremental backup chains.

108 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Note: Quick Backup is not supported for separate vCloud Director VMs as vCD job process vApps
as integral units.

Quick Backup is an incremental backup task – and similarly, Quick Backup can only be run for VMs
that have been successfully backed up at least once and has a full restore point.

e
ut
ib
tr
is
D
To perform Quick Backup, Veeam Backup & Replication uses an existing backup job. When you start
a Quick Backup task for a VM, Veeam Backup & Replication verifies that a backup job processing this
or
VM exists on the Veeam backup server. If such job is detected, Veeam Backup & Replication triggers
a job and creates an incremental restore point for the VM. If a backup job for the VM does not exist,
Quick Backup is terminated.
e
at

Note: If many jobs exist for the same VM, the one with the most recent restore point at the
lic

repository will be selected.


up

When you perform Quick Backup, Veeam Backup & Replication creates a single VM incremental
restore point, which contains data only for a specific VM. A partial restore point is not regarded as a
full-fledged restore point in the backup chain. From the retention policy perspective, a single VM
D

incremental restore point is grouped with a regular restore point following it. When Veeam Backup &
Replication needs to delete a single VM incremental restore point by retention, it waits for the next
regular restore point to expire, and deletes two restore points at once.
ot
N

4.4. Backup Copy


o

To let you adopt the 3-2-1 rule: you must have three copies of your data on two different
D

types of media, and at least one copy of that data offsite, Veeam Backup & Replication offers
backup copying capabilities. Backup copying allows you to create several instances of the
same backup file in different locations, whether onsite or offsite. Copied backup files have
the same format as those created by backup jobs and you can use any data recovery option
for them.

Veeam Certified Engineer v9.5 . Textbook 109


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

4.4.1. Backup Copy Job


To let you adopt the 3-2-1 backup strategy, Veeam Backup & Replication offers backup copying
capabilities. Backup copying allows you to create several instances of the same backup file in
different locations, whether onsite or offsite. Copied backup files have the same format as those
created by backup jobs and you can use any data recovery option for them.

Backup copy is a job-driven process. Veeam Backup & Replication fully automates the backup
copying process and lets you specify retention policy settings to maintain the desired number of

e
restore points for copied backups.

ut
Backup data is copied per VM at the block level. When the backup copying process starts,
Veeam Backup & Replication accesses VM backup files in the source backup repository, retrieves

ib
data blocks for a specific VM from the backup file, copies them to the target backup repository, and
composes copied blocks into a backup file in the target backup repository. Therefore, the backup

tr
copying process does not affect virtual infrastructure resources, require an additional snapshot of a

is
VM, or produce any load on VMs whose backups are copied.

In the target backup repository, the backup copy job creates a chain of restore points using the

D
incremental backup method. The target backup repository always contains only one active
incremental backup chain. Restore points in the chain are rotated according to the specified retention
policy.
or
The backup chain on the target backup repository is created in the following manner:
e

1. The first synchronization interval of the backup copy job always produces a full backup file. The
at

full backup file is created in the following way:


a. From the backup chain on the source backup repository, Veeam Backup & Replication
lic

copies data blocks that are necessary to build a full backup of a VM as of the most recent
state. Data blocks can be copied from one or several backup files in the chain, the
retention policy for a backup copy job can be different than the retention period of its
up

related backup job, or backup jobs. If the backup chain on the source backup repository
was created using the reverse incremental backup method, Veeam Backup & Replication
D

simply copies data blocks of the latest full backup.


ot
N
o
D

If the backup chain on the source backup repository was created using the forward
incremental backup method, Veeam Backup & Replication copies data blocks from the
first full backup and a set of incremental backups to form a full backup of a VM as of the
most recent state.

110 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

b. On the target backup repository, Veeam Backup & Replication writes all copied data

e
blocks to the same full backup file.

ut
2. At every synchronization interval, when a new restore point appears on the source backup
repository, Veeam Backup & Replication copies incremental changes from this most recent

ib
restore point and transfers them to the target backup repository. On the target backup
repository, Veeam Backup & Replication writes the copied data blocks to the incremental

tr
backup file.

is
D
or
e
at

The backup copy job can be created for one VM or several VMs, which can be backed up by one
backup job or several backup jobs. If the backup copy job is created for several VMs, you can define
lic

the order in which the VMs should be processed. Veeam Backup & Replication will process VMs in
the job in parallel, starting from the first VM in the order list. If any VM cannot be processed for some
reason, for example, in case a new restore point for this VM is not available yet, the job will start
up

processing the next VM. Once this VM is processed, the job will attempt to copy the unprocessed VM
once again. Even if a backup copy job processes several VMs, it creates one backup file on the target
backup repository and stores the data for all VMs processed by the job.
D
ot

Important! Backup copy jobs process VMs in parallel only if you transport VM data over the direct
data path. If you use WAN accelerators for backup copy jobs, VMs will be processed
N

sequentially. Parallel data processing over the direct data path is enabled by default. If necessary,
you can disable parallel data processing using a registry key. For more information, contact the
o

Veeam Support Team.


D

Note: With v9, backup copy jobs will now process multiple VMs in parallel, just like primary backup
jobs. This improves the backup copy and retention processing performance due to removing “dead
time” between each VM, and will further speed up processing when per-VM backup file chains are
enabled on the target backup repository

To minimize the amount of traffic going over the network, Veeam Backup & Replication uses data

Veeam Certified Engineer v9.5 . Textbook 111


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

compression and deduplication technologies. And if you plan to copy VM restore points over the WAN
and slow connections, you can also use backup mapping. Backup mapping can only be used if you
already have a full backup file for the VM you plan to process with the backup copy job on the target
backup repository. In this case, you can point the backup copy job to this backup file. This full backup
file will be used as a “seed” for the backup copy job and you will need to copy only small incremental
changes over the network.

When changing backup storage settings such as encryption or block size, v9 offers a new ability to
trigger a manual Active Full in Backup Copy Jobs. This is also useful in troubleshooting scenarios.

e
ut
Note: Veeam Backup & Replication does not copy restore points if the block size of the restore
point on the source backup repository differs from the block size of restore points on the target

ib
backup repository. The data block size for restore points on the target backup repository is set at
the first synchronization cycle of the backup copy job. This size is taken from the corresponding

tr
settings of the primary backup job — the backup job that creates the backup chain on the source

is
backup repository. If after the first synchronization cycle you add to the backup copy job new
sources that use a different data block size, Veeam Backup & Replication will detect such restore

D
points and display the Restore point is located in backup file with different block
size message.
or
GFS retention policy
e
Sometimes, simple backup retention policy is not enough. You cannot store an unlimited number of
at

restore points on the target backup repository forever because it is not rational and is resource
consuming. If you want to retain VM data for longer periods of time, it is recommended that you use
lic

the GFS retention policy scheme.

The GFS, or Grandfather-Father-Son retention policy is a backup rotation scheme intended for long-
up

term archiving. It lets you keep backups of VMs for an entire year using minimum amount of storage
space. GFS is a tiered retention policy scheme. It uses a number of cycles to maintain backups at
different tiers:
D

Regular backup cycle performed according to the specified synchronization interval


Weekly backup cycle
ot

Monthly backup cycle


Quarterly backup cycle
N

Yearly backup cycle

Weekly/monthly/quarterly/yearly backups are always full backups containing data of the whole VM
o

image as of specific date. When you define retention policy settings for a
D

weekly/monthly/quarterly/yearly backup cycle, you specify how many weekly backups you want to
retain per month, monthly per year, etc. and define the day on which a full backup must be created.

These backups are not created in a separate task. Veeam Backup & Replication re-uses a full backup
created in the regular backup cycle and propagates it to the required tier. After the retention is met
and the .vbk "passes" the scheduled date, the full backup created in a backup copy job for each GFS
retention point will be deleted.

112 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Additionally, we can improve local backup copy performance and reduce the load on deduplication
appliances with the new option for active full Grandfather-Father-Son (GFS) backups in Backup Copy
jobs. The data rehydration requirement is eliminated on the deduplication appliance with this option
enabled – and instead, the entire restore point is copied over from source backup files. This
effectively turns the Backup Copy workload from random to streaming, really broadening our support
for the deduplication appliance that can serve as the target for Backup Copy jobs to any storage at all.

Maintenance Settings

e
ut
To specify settings for backup files stored in the target backup repository:

1. At the Target step of the wizard, click Advanced.

ib
2. If you want to periodically perform a health check of the most recent restore point in the backup
chain, select the Perform backup files health check check box and specify the time schedule for

tr
the health check. By default, the health check is performed on the last Saturday of every

is
month. An automatic health check allows you to avoid a situation when a restore point gets
corrupted, making all further increments corrupted, too. If Veeam Backup & Replication detects

D
corrupted data blocks in the restore point during the health check, it will transfer these data
blocks to the target backup repository during the next synchronization interval and store them in
the newly copied restore point. For more information, see Health Check for Copied Backups.
or
3. Select the Remove deleted VMs data after <N> days check box and specify the retention policy
settings for deleted VMs. If a VM is no longer processed by a job for some reason (for example,
it was excluded from the job, removed from the virtual infrastructure and so on), its data may
e
still be kept in backups on the target backup repository. To avoid this situation, you can define
at

the number of days for which data for deleted VMs must be retained.
By default, the deleted VM retention period is 30 days. Do not set the deleted VM retention
lic

period to 1 day or a similar short interval. In the opposite case, the backup copy job may work
not as expected and remove VM data that you still require.
up

Important! When Veeam Backup & Replication removes data for deleted VMs, it does not free up
space in the backup repository. It marks the space as available to be overwritten, and this space is
D

overwritten during subsequent job sessions or the backup file compact operation.
ot

4. To periodically compact a full backup, select the Defragment and compact full backup file check
box and specify the schedule for the compacting operation. By default, the compact operation is
N

performed on the last Sunday of every month. The compact option can be enabled only if you
have not specified the GFS settings. During the compacting operation, Veeam Backup &
Replication creates a new empty VBK file and copies to it all data blocks from the full backup
o

file. As a result, the full backup file gets defragmented, its size reduces and the speed of writing
D

and reading to/from the file increases.

Note: The Remove deleted VMs data after days option applies only to regular backup chains.
Veeam Backup & Replication does not remove data for deleted VMs from weekly, monthly,
quarterly and yearly backups.

Veeam Certified Engineer v9.5 . Textbook 113


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Compact of Full Backup File

The backup copy job constantly transforms the full backup file in the backup chain to meet retention
policy settings. The transformation process, however, has a side effect. In the long run, the full
backup file grows large and gets badly fragmented. The file data occurs to be written to non-
contiguous clusters on disk, and operations of reading and writing data from and to the backup file
slow down.

To resolve the fragmentation problem, you can instruct Veeam Backup & Replication to compact the

e
full backup file periodically. During the file compact operation, Veeam Backup & Replication creates a

ut
new empty VBK file and copies to it all data blocks from the full backup file. As a result, the full
backup file gets defragmented, its size reduces and the speed of reading and writing from and to the

ib
file increases.

To compact the full backup file periodically, you must enable the Defragment and compact full backup

tr
file option in the backup copy job settings and define the compact operation schedule. By default, the

is
compact operation is performed on the last Saturday of every month. You can change the compact
operation schedule and instruct Veeam Backup & Replication to perform it weekly or monthly on

D
specific days.

The full backup file compact has the following limitations:


or
The Defragment and compact full backup file option can be enabled only for the simple
retention policy scheme.
e
The target backup repository must have enough space to store a file of the full backup size.
During the compact process, Veeam Backup & Replication creates an auxiliary VBK file that
at

exists in the backup repository until the end of the compact operation.
If the full backup file contains data for a VM that has only one restore point and this restore
lic

point is older than 2 days, during the compact operation Veeam Backup & Replication will not
copy data for such VM to the newly created full backup file. Veeam Backup & Replication will
up

extract data for this VM from the full backup file and write this data to a separate backup file.
The file will be displayed under the Backups > Disk (imported) node in the Backup &
Replication view. This mechanism helps remove data for VMs that are no longer processed with
D

the backup copy job from the full backup file and reduce the size of the full backup file.
The mechanism works if the following conditions are met:
The Remove deleted VMs data option is not enabled in the backup copy job
ot

settings.
The Use per-VM backup files option is not enabled in the settings of the target
N

backup repository.
o

Active Full Backup Copies


D

You can manually create an ad-hoc full backup for the backup copy job — active full backup copy,
and add it to the backup chain on the target backup repository. To do this, you can use the Active Full
button on the ribbon or the Active Full command from the shortcut menu.

Active full backup copy can be helpful if you want to change backup copy job settings, for example,
define a new encryption password. Veeam Backup & Replication will apply new settings starting from
this full backup.

114 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Veeam Backup & Replication treats archive full backups created with the active full backup method as
regular backups and applies regular retention policy rules to maintain the necessary number of
restore points.

If you create active full backups for backup copy jobs, Veeam Backup & Replication applies to the
backup chain retention rules of the forward incremental backup
method. Veeam Backup & Replicationwaits until the number of restore points in the new backup chain
is equal to the retention policy setting, and then removes the previous backup chain on the whole.

e
If you additionally use the GFS retention scheme for the backup copy
job, Veeam Backup & Replication behaves in a different way. After the number of restore points in the

ut
new backup chain is equal to the retention policy setting, Veeam Backup & Replication merges
restore points in the previous backup chain to the restore point that must be marked as an archive

ib
backup. When the archive restore point is set aside, Veeam Backup & Replication uses the standard
scheme described above.

tr
is
4.5. Replication

D
With Veeam, you can not only back up, but also replicate your VMs. When you replicate a
VM, Veeam Backup & Replication creates an exact copy of a production VM in the native
or
format on a spare host and maintains this copy in sync with the original VM. If the primary
VM goes down for some reason, you can immediately fail over to the VM replica, and restore
critical services with minimum downtime.
e
at

4.5.1. Insight into replication


lic

Replication Overview
up

Just like backup, replication is a job-driven process. During the first run of a replication job, Veeam
Backup & Replication copies the whole VM image and registers a replicated VM on the target host.
D

During subsequent runs of a job, Veeam Backup & Replication copies only incremental changes, and
creates restore points for a VM replica – so you can recover your VM to the necessary state. Every
ot

restore point is in fact a snapshot. When you perform incremental replication, data blocks that have
changed since the last replication cycle are written to the snapshot delta file next to a full VM replica.
N

The number of restore points in the chain depends on your retention policy settings.
o
D

Veeam Certified Engineer v9.5 . Textbook 115


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

e
ut
ib
tr
is
D
or
e
at

To provide extremely fast incremental replication for VMware, Veeam Backup & Replication leverages
the vSphere functionality – ESXi Changed Block Tracking (or CBT). With CBT, you can replicate
lic

much faster as the replication job can be set to run Continuously. So you get near-CDP at only a
fraction of the cost of traditional CDP solutions.
up

For VMs on Microsoft Hyper-V Servers 2012 R2 and earlier, Veeam & Backup & Replication uses its
proprietary Hyper-V changed block tracking mechanism (CBT). The CBT mechanism is implemented
as a file system filter driver. Veeam CBT driver is installed on every Hyper-V host added to the list of
D

managed servers in Veeam Backup & Replication. The driver is activated when the host is first
addressed by a job with enabled CBT. The Veeam CBT driver keeps track of changing data blocks in
virtual disks. Information on data blocks that have changed is registered in special .ctp files. When a
ot

job is run, Veeam Backup & Replication uses .ctp files to learn what blocks of data have changed
since the last run of this particular job, and copies only changed data blocks from the disk image.
N

For VMs on Microsoft Hyper-V Server 2016, Veeam Backup & Replication uses a Microsoft
o

technology, Resilient Changed Tracking.


D

When replicating, you can select a path for VM data transfer:

Direct: To transport data directly from the backup proxy to the target host.
Through built-in WAN accelerators: To transport VM data via WAN accelerators.

With Veeam Backup & Replication, you can perform both onsite replication for HA and offsite
replication for DR scenarios. For replication over WAN or slow links, Veeam Backup & Replication
provides a number of means to optimize data transmission – it performs inline deduplication and

116 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

compresses replica traffic. You can also configure network throttling rules to prevent replication jobs
from consuming the entire bandwidth in your environment, and perform replica seeding.

Replication generally provides the best RTOs and RPOs as you actually have a copy of your VM in a
ready-to-start state. If a primary VM goes down, you just need start a VM replica to recover the VM.
That is why replication is most commonly used for VMs running tier 1 applications.

Note: When using Veeam Replication to achieve business continuity, there will be networking and

e
DNS challenges that must be overcome for a working solution. You may want to consult your

ut
network architect to define those changes.

ib
Creating Replication Jobs

tr
To create replicas, Veeam Backup & Replication uses VMware/Hyper-V VM snapshot capabilities.
Snapshot replica is similar in many respects to forward incremental backup. During the first run of a

is
replication job, Veeam Backup & Replication copies the VM running on the source host and creates
its full replica on the target host. All subsequent replication jobs are incremental: Veeam Backup &

D
Replication copies only those data blocks that have changed since the last replication cycle. For each
new incremental run of the replication job, Veeam Backup & Replication triggers a regular snapshot of
or
the replica. Thus, the created replica snapshot acts as a new restore point.

As a result, for every replicated VM, Veeam Backup & Replication produces a full replica and a chain
e
of snapshots, or restore points.
at

All replication infrastructure components engaged in replication make up a data pipe. VM data is
moved over this data pipe block by block, with multiple processing cycles. For vSphere, it’s important
lic

that there is a proxy at the destination side, so that the target data mover service could write data
directly to the target storage, not passing it over network.
up

Veeam Backup & Replication creates and maintains the following types of replica files:

Full VM replica (a set of VM configuration files and virtual disks)


D

Replica restore points (VM snapshot files)


Replica metadata (.vbm files) that stores VM replica digests (used to quickly detect changed
ot

blocks of data between two replica states)


N

The full VM replica along with its restore points is stored in a dedicated folder on the target datastore.
Replica metadata files are stored on a backup repository.
o
D

Important! Replica metadata can only be stored on Simple Backup Repositories. Scale-Out
Backup Repository is not supported for storing replica metadata.

4.5.2. Reducing Amount of Transferred Data


A replication job helps to avoid data loss. It is generally desired that low RPO is enabled and offsite
data protection is facilitated. To reduce the amount of traffic sent over the network during replication,

Veeam Certified Engineer v9.5 . Textbook 117


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

one of the following options can be used:

Remote replica from backup Replica seeding Replica mapping

The backup file


Source of data for Already existing
placed at the
the first run VM in the DR site
A backup chain on the remote site
backup repository
Source of data for
Production VM
the subsequent runs

e
ut
Point in time when the
VM state Latest state
backup was created

ib
Only differences between mapped
Reduces the workload on machine/backup “seed” state and

tr
Benefits
the production environment production VM are transferred over the
network

is
D
4.5.3. Resume on Disconnect
or
A dropped network connection used to be one of reasons for replication job failures. If a connection
was interrupted even for several seconds in the middle of data transfer, the replication job failed
reporting a connection reset error. In such situation, a failed job would have to be retried or re-run and
e
the data transfer process would start from the very beginning.
at

Resume on Network Disconnect Resume on WAN Disconnect


lic

If a network connection drops for a If you replicate VMs over WAN


When it happens short period of time during the accelerators and a WAN connection
replication process drops during VM data transfer
up

- Dramatically improves the reliability of remote replication


Characteristics - Reduces the backup window
D

- Minimizes the network/WAN link load


ot

- After a WAN connection is resumed,


Veeam Backup & Replication starts a
new data transfer cycle: data
N

transported with every new cycle is


written to a new working snapshot on a
o

Veeam Backup & Replication does VM replica.


not create a new restore point upon - In order to avoid keeping long
D

How it works resume: VM data is written to the snapshot chains, Veeam Backup &
same restore point that was created Replication merges earlier snapshots
for the current replication session. and maintains only two working
snapshots for a VM replica.
- Once all of the VM data is transferred
to the target host, the two working
snapshots are also merged to create
one fully functional VM restore point.

118 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Note: Resume on network disconnect is offered for the replication, backup, backup copy, full VM
restore processes and all Cloud Connect-related activities. It is not available for tape operations.

4.6. Creating VM/File Copy Jobs


This topic will cover Veeam Backup & Replication VM copy and file copy jobs, which will
enable you to:

e
move your data center or mirror your production environment to test lab storage with

ut
VM copying

ib
deliver image files to hosts, make backup copies of existing VMs and exchange VMs
and templates between servers or move backups across repositories using a file copy

tr
job.

is
D
4.6.1. VM copy or
With a VM copy job, you can create a fully-functioning copy of a VM that will require no manual editing
or adjustments. VM copying can be helpful if you want to move your datacenter, mirror your
e
production environment to test lab storage, and so on. Just like backup and replication jobs, a VM
copy job can be performed using the Direct SAN Access, Virtual Appliance, or Network transport
at

modes, supports VSS options, and can be run on demand or scheduled.


lic

This section will guide you through all steps of the VM Copy wizard and provide explanations for
available options.
up

Prior to creating a VM copy job, make sure you have set up all the necessary infrastructure
components. Open the Infrastructure view and check that source and destination hosts are available
under the Managed servers node in the management tree and that backup proxies and backup
D

repositories are available under the Backup Proxies and Backup Repositories nodes and properly
configured. You will not be able to add VM copy infrastructure components or change their
ot

configuration once the VM Copy Job wizard is launched.

During every job run, Veeam Backup & Replication checks disk space on the destination storage. If
N

the disk space is below a specific threshold value, Veeam Backup & Replication will display a warning
in the job session log. To specify the disk space threshold, select Options from the main menu. On
o

the Notifications tab, specify the amount of free disk space required in a percentage.
D

4.6.2. File Copy


Veeam Backup & Replication includes file copy possibilities which provides a natural way to deliver
image files to hosts, make backup copies of existing VMs, and exchange VMs and templates between
servers or move backups across repositories. Using Veeam Backup & Replication, you can copy files
and folders between and within servers connected to the Veeam Backup Server.

Veeam Certified Engineer v9.5 . Textbook 119


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Note: When the file copy destination is located on a server managed by Veeam Backup &
Replication, traffic compression can be used to minimize network bandwidth and improve
performance of file copy activities.

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

120 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

Labs for Module 4: Protect

Now you need to deliver the promised value. To reliably protect the data center, this module's labs will
showcase how to configure backup and replication jobs using the advanced settings based on the
infrastructure and business continuity plan requirements and complement successful data protection
with a disaster recovery plan while complying with the 3-2-1 Rule by copying your backups off site.

e
Get into the Lab

ut
ib
Lab Action Purpose

Create a set of backup jobs to protect the virtual

tr
4.1 Creating backups
machines used in the lab environment.

is
Creating backups with Quickly create a point-in-time copy of one of your
4.2
VeeamZIP virtual machines using VeeamZIP™.

D
Create an off-site backup copy job using a WAN
Creating an off-site
4.3
backup copy job
or
accelerator to provide the necessary level of safety
by complying with the 3-2-1 Rule.
e
Ensure efficient data protection in your virtual
environment with the best RTO and RPO by setting
at

4.4 Creating replicas


up a VM replica for several of the VMs in the
infrastructure.
lic
up
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 121


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 4: Protect

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

122 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module P: Preparation for day 2

Labs for Module P: Preparation for day 2

This module must be performed before you start the other labs of day two. You will delete a VM from
the datastore to recover it later in the course flow, deploy a second Veeam Backup & Replication
instance and review the backups and replicas created overnight.

e
Get into the Lab

ut
Lab Action Purpose

ib
P.1 Day 1 overview Make sure the retention policy was applied correctly.

tr
Install a second Veeam Backup & Replication
Deploying a second instance. We will use it later on in the course to

is
P.2
Veeam backup server showcase configuration restore and decryption
without a password.

D
Delete a VM to test out Veeam Backup & Replication
P.3 Deleting VMs
or
restore capabilities later in the course.

Delete a SQL table to force the creation of transaction


P.4 Deleting SQL table logs to test out Veeam Backup & Replication restore
e

capabilities later in the course.


at
lic
up
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 123


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module P: Preparation for day 2

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

124 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 5: Entire VM Recovery

5. Entire VM Recovery
Veeam Backup & Replication offers a number of recovery options for various disaster
recovery scenarios. In this module, you will learn how to recover the entire virtual machine
and when to utilise which recovery option.

5.1. Recovery from a Backup

e
ut
If a production VM has failed and you need to recover it from the backup, Veeam Backup &
Replication offers a number of recovery options for various disaster recovery scenarios.

ib
Scenario Purpose

tr
Instant VM Recovery Instantly start a VM directly from a backup file

is
Recover a VM from a backup file to its original or another
Full VM Recovery
location

D
Recover separate VM files (virtual disks, configuration
VM file Recovery
files and so on)
or
Recover individual Windows guest OS files (from FAT,
Windows File-Level Recovery
NTFS and ReFS file systems)
e
at

For most commonly used file systems on Windows, Linux,


MultiOS File-Level Recovery
Solaris, BSD, Novell Netware, Unix and Mac machines
lic

Veeam Explorers
Recover application objects directly from backup files
up

Universal Application-Item Recovery


(U-AIR)
D

Note: For VMware vSphere, restores are done via network or VIX (VMware Tools VIX Channel), if
ot

Veeam Backup & Replication fails to connect to the VM guest OS over the network. Also, if your
backup proxy is a VM with HotAdd access to the source datastore, during the full VM restore,
N

Veeam Backup & Replication will use the Virtual Appliance transport mode to write the VM data
from the backup proxy back to the datastore. This speeds up the restore process and reduces the
o

load on the network.


D

5.1.1. Instant VM Recovery


With Instant VM Recovery, you can immediately restore a VM into your production
environment by running it directly from the compressed and deduplicated backup file.
Instant VM Recovery helps improve recovery time objectives and minimize disruption and
downtime of production VMs. It’s like having a 'temporary spare' for a VM: users remain
productive while you troubleshoot issues with the failed VM.

Veeam Certified Engineer v9.5 . Textbook 125


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 5: Entire VM Recovery

VMware

When Instant VM Recovery is performed, Veeam Backup & Replication uses the Veeam vPower
technology to mount a VM image to an ESX(i) host directly from a compressed and deduplicated
backup file. Because there is no need to extract the VM from the backup file and copy it to production
storage, you can restart a VM from any restore point (incremental or full) in a matter of minutes.

The archived image of the VM remains in read-only state to avoid unexpected modifications. By
default, all changes to virtual disks that take place while the VM is running are logged to auxiliary redo

e
logs residing on the NFS server (Veeam backup server or backup repository). These changes are

ut
discarded as soon as a restored VM is removed, or merged with the original VM data when VM
recovery is finalized.

ib
To improve I/O performance for a restored VM, you can redirect VM changes to a specific datastore.
In this case, instead of using redo logs, Veeam Backup & Replication will trigger a snapshot and put it

tr
in the Veeam IR directory on the selected datastore along with metadata files holding changes to the

is
VM image.

Either original location or different one can be selected for restore. To finalize Instant VM Recovery,

D
you have to migrate it to production with one of the following options:
or
Use VMware Storage vMotion to quickly migrate the restored VM to the production storage
without any downtime. In this case, original VM data will be pulled from the NFS datastore to
the production storage and consolidated with VM changes while the VM is still running. Veeam
e
recommends to execute this via the Backup & Replication UI, rather than the VMware vSphere
UI.
at

Use VMware Cross-Host vMotion (XvMotion) to quickly migrate the restored VM to the
production storage without any downtime. In this case, original VM data will be pulled from the
lic

NFS datastore to the production storage and consolidated with VM changes while the VM is still
running. VMware Storage vMotion, however, can only be used if you select to keep VM
up

changes on the NFS datastore without redirecting them. This option is only available from the
VMware vSphere Web Client and requires a vMotion license.
Use replication or VM copy functionality of Veeam Backup & Replication to create a copy of a
D

VM and fail over to it during the next maintenance window. In contrast to VMware Storage
vMotion, this approach requires you to schedule some downtime while you clone or replicate
the VM, power it off, and then power the cloned copy or replica on.
ot

Use Quick Migration (SmartSwitch) to perform a two-stage migration procedure – instead of


pulling data from the vPower NFS datastore, it will restore the VM from the backup file on the
N

production server, then move all changes and consolidate them with the VM data. If you move a
VM between two hosts with compatible CPUs, Veeam Backup & Replication uses SmartSwitch.
o

Veeam Backup & Replication suspends the VM to move its state file and changes made after
snapshot creation. The VM is then resumed on the new host. This method ensures minimum
D

possible VM downtime during migration.

Beside disaster recovery matters, instant VM recovery can also be used for testing purposes. Instead
of extracting VM images to the production storage to perform regular DR testing, you can run a VM
directly from the backup file, boot it and make sure the VM guest OS and applications are functioning
properly.

126 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 5: Entire VM Recovery

Hyper-V

In the Hyper-V environment, Instant VM Recovery is performed in the following way:

1. Veeam Backup & Replication reads the VM configuration from the backup file in the repository
and creates a dummy VM with the same settings and empty disks on the destination host.
2. Veeam Backup & Replication initiates the creation of a protective snapshot for the dummy VM
and the VM is started. If the Instant VM Recovery process fails for some reason, the protective
snapshot guarantees no data is lost.

e
3. On the backup repository and on the destination host, Veeam Backup & Replication deploys a

ut
pair of Veeam data mover services that are used to mount the VM disks from the backup file to
the dummy VM.

ib
4. On the destination host, Veeam Backup & Replication starts a proprietary Veeam driver. The
driver redirects requests to the file system of the recovered VM (for example, when a user
accesses some application) and reads the necessary data from the backup file on the backup

tr
repository via the pair of Veeam data mover services which maintain the disk mount.

is
D
or
e
at
lic
up

To finalize VM recovery, you can migrate the VM to the production storage. When you begin the
D

migration process, Veeam Backup & Replication starts another pair of Veeam data mover services on
the backup repository and on the destination host. The second pair of Veeam data mover services
copies the recovered VM’s data from the backup repository to the destination host in the background,
ot

and populates disks of the VM started on the destination host.


N

The driver on the destination host knows which data has already been restored permanently and does
not redirect requests to it, reading it directly from the disks of the restored VM. Thus, performance of
the instantly recovered VM will increase as more of the data is copied. When the VM is restored
o

completely, all Veeam data mover services are stopped.


D

Important! Before you start Instant VM Recovery in the Hyper-V environment, make sure that
Changed Block Tracking is enabled for a host to which you plan to restore a VM. If Changed Block
Tracking is disabled for the host, the driver required for work of Instant VM Recovery will be
disabled.

If you do not perform VM migration, all operations on the file system of the recovered VM will be

Veeam Certified Engineer v9.5 . Textbook 127


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 5: Entire VM Recovery

carried out via the disk mount connection. This is helpful if you will only need the instantly recovered
VM for a short period of time, to perform one or two tasks (for example, look up some information
stored on the backed up VM).

5.1.2. Full VM Recovery


With Veeam Backup & Replication, you can restore an entire VM from a backup file to the latest state
or to any good-to-know point in time if the primary VM fails.

e
ut
In contrast to Instant VM Recovery, Full VM Restore (also referred to as Entire VM restore) requires
you to fully extract the VM image to the production storage. Though Full VM Restore takes more
resources and time to complete, you do not need to perform extra steps to finalize the recovery

ib
process. Veeam Backup & Replication pulls the VM data from the backup repository to the selected
storage, registers the VM on the chosen ESXi or Hyper-V host and, if necessary, powers it on.

tr
A VM can be restored to its original location or to a new location. And you can restore several VMs at

is
once. When you restore a VM to its original location, the primary VM is automatically turned off and
deleted before the restore. This type of restore ensures the quickest recovery and minimizes the

D
number of mistakes which can potentially be caused by changes in VM settings.
or
Incremental Restore
e
at

For VMware vSphere, when you restore a full VM or VM hard disk to the original location, Veeam
Backup & Replication performs incremental restore (Quick Rollback) by default, leveraging VMware
lic

Changed Block Tracking technology. Instead of restoring an entire VM or VM disk from a backup file,
Veeam Backup & Replication recovers only those data blocks that are necessary to revert the VM or
VM disk to an earlier point in time. Incremental restore:
up

Significantly reduces the recovery time.


Has little impact on the production environment.
D

It is recommended that you use quick rollback if you restore a VM after a problem that has occurred at
the level of the VM guest OS: for example, there has been an application error or a user has
ot

accidentally deleted a file on the VM guest OS. Do not use incremental restore if the problem has
occurred at the VM hardware level, storage level or due to a power loss.
N

Requirements for incremental restore:


o

VM is restored to its original location.


D

The backup file from which you plan to restore a VM is created with the Changed block
tracking option enabled.

There are also some limitations for incremental restore:

After you restore a VM or VM disk with quick rollback, the CBT on the original VM is reset.
During the subsequent backup job session, Veeam Backup & Replication will read all data of
the original VM.

128 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 5: Entire VM Recovery

[For VMware vSphere VMs] Quick rollback can be performed in the Direct NFS access, Virtual
appliance, Network transport mode. The Direct SAN access transport mode cannot be used for
quick rollback due to VMware limitations.
[For Microsoft Hyper-V 2016] You cannot run two restore sessions with quick rollback
subsequently. After you restore a VM with quick rollback, the CBT on the original VM is reset.
You must run at least one incremental backup job session to be able to perform quick rollback
again.
Use quick rollback and VM guest OS file exclusion wisely. If you exclude specific files and
folders from the VM guest OS during backup and use quick rollback to restore the VM or VM

e
disk from such backup, Veeam Backup & Replication will restore only the content of the backup

ut
file. The excluded data will not be restored. For example, if you exclude C:\Folder from the
backup, data in this folder will not be backed up and will not be available in the resulting backup
file. After some time, data in C:\Folder may change but the folder will still not be backed up

ib
(since the job excludes this folder). For this reason, when you perform quick rollback, Veeam
Backup & Replication will restore all data that have changed except the excluded C:\Folder.

tr
is
5.1.3. VM File Recovery

D
Veeam Backup & Replication can help you to restore specific VM files (.vmdk, .vmx/.vhd, .vhdx, .xml
and others) if any of these files are deleted or the datastore/volume is corrupted. This option provides
or
a great alternative to Full VM Restore, for example, when your VM configuration file is missing and
you need to restore it. Instead of restoring the whole VM image to the production storage, you can
restore the specific VM file only.
e
at

When you perform VM file restore, VM files are restored from regular image-level backups. Veeam
data mover (also referred to as “transport”) services deployed on the backup repository and the
backup proxy retrieve VM data from the backup file and send it to the original VM location, or to a new
lic

location specified by the user.


up

5.1.4. Restore to Microsoft Azure


D

Veeam Backup & Replication lets you restore physical and virtual machines from backups residing in
the on-premises environment to Microsoft Azure. You can use Veeam Backup & Replication to
ot

complete the following tasks:

Restore machines from Veeam backups to Microsoft Azure.


N

Migrate machines from the on-premises infrastructure to the cloud.


Create a test environment in the cloud for troubleshooting, testing patches and updates and so
o

on.
D

You can restore machines from the following types of backups:

Backups files of Microsoft Windows and Linux VMs created with Veeam Backup & Replication
You can use backups of VMware vSphere VMs and VMware vCloud Director VMs.
Backups of Microsoft Windows machines created with Veeam Endpoint Backup. Backups must
be created at the volume level.
Backups of Linux machines created with Veeam Agent for Linux. Backups must be created at
the volume level.

Veeam Certified Engineer v9.5 . Textbook 129


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 5: Entire VM Recovery

For restore to Microsoft Azure, Veeam Backup & Replication can employ the Microsoft Azure
Resource Manager or classic deployment model. Veeam Backup & Replication supports batch
restore — you can launch the restore process for several VMs at a time.

e
ut
ib
tr
is
D
Limitations for Restore to Microsoft Azure
or
Veeam Backup & Replication supports restore to Microsoft Azure for the following machines:
e
Microsoft Windows machines running Windows Server 2008/Windows Vista and later.
Linux machines (see the Supported Distributions & Versions
at

section: https://docs.microsoft.com/en-us/azure/virtual-machines/virtual-machines-linux-e
ndorsed-distros).
lic

The maximum size of one disk of a VM restored to Microsoft Azure must not exceed 1023 GB.
You cannot restore a machine that has disks of a greater size.
up

If the system disk of an initial machine uses the GPT partitioning scheme, the number of
partitions on the disk cannot exceed 4. During restore such disk will be converted to a disk with
the MBR partitioning scheme.
D

Veeam Backup & Replication does not support restoring VMs to the following Azure regions:
Azure Germany https://azure.microsoft.com/en-us/overview/clouds/germany/
Azure China https://www.azure.cn/
ot

The restore to Microsoft Azure functionality does not support the Azure Hybrid Use Benefit
program.
N
o

Important! You must set up correct time on the backup server. Otherwise you may not be able to
add a Microsoft Azure account to Veeam Backup & Replication, or the restore process may be
D

failing.

Restore of Microsoft Windows Machines

To restore a Microsoft Windows machine, Veeam Backup & Replication performs the following steps:

1. If you use an Azure proxy for restore, Veeam Backup & Replication powers on the Azure proxy.
For more information about the Azure proxy, see Configuring Azure Proxies.

130 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 5: Entire VM Recovery

2. Veeam Backup & Replication converts disks of a backed up machine to the VHD format and
uploads converted disks to blob storage in Microsoft Azure.
3. Veeam Backup & Replication mounts uploaded disks to the backup server.
4. Veeam Backup & Replication prepares disks for VM restore. As part of this process, it enables
Remote Desktop rules, configures firewall rules, prepares disks for Microsoft Azure agent
installation and so on.
5. Veeam Backup & Replication unmounts prepared disks from the backup server.
6. If you use an Azure proxy for restore, Veeam Backup & Replication powers off the Azure proxy
after a timeout.

e
7. Veeam Backup & Replication registers a Microsoft Azure VM with the prepared machine disks.

ut
After the registration process is complete, the Microsoft Azure VM is powered on immediately,
and the Microsoft Azure agent is installed on the machine.

ib
Restore of Linux Machines

tr
For restore of Linux machines, Veeam Backup & Replication uses a helper appliance. The helper
appliance is a small auxiliary Linux-based VM in Microsoft Azure registered by Veeam Backup &

is
Replication. During the restore process, Veeam Backup & Replication mounts disks of a backed up
machine to the helper appliance to prepare disks for restore.

D
You can set up a helper appliance when you configure initial settings for restore to Microsoft Azure. If
or
you plan to restore Linux machines to different locations, you must set up several appliances — one
appliance in every location.

The helper appliance is persistent. After you set up the appliance, it remains in Microsoft Azure in the
e

powered off state. Veeam Backup & Replication starts the helper appliance for a short period of time
at

during the restore process and powers the appliance off when the restore process is complete.
lic

To restore a Linux machine, Veeam Backup & Replication performs the following steps:

1. If you use an Azure proxy for restore, Veeam Backup & Replication powers on the Azure proxy.
up

For more information about the Azure proxy, see Configuring Azure Proxies.
2. Veeam Backup & Replication converts disks of a backed up machine to the VHD format and
uploads converted disks to blob storage in Microsoft Azure.
D

3. Veeam Backup & Replication mounts uploaded disks to the helper appliance that resides in the
location to which you restore the Linux machine.
ot

4. Veeam Backup & Replication starts the helper appliance with mounted disks.
5. Veeam Backup & Replication prepares disks for VM restore. As part of this process, it enables
remote connection rules, configures firewall rules and so on.
N

6. Veeam Backup & Replication unmounts prepared disks from the helper appliance and powers
off the helper appliance.
o

7. If you use an Azure proxy for restore, Veeam Backup & Replication powers off the Azure proxy
after a timeout.
D

8. Veeam Backup & Replication registers a Microsoft Azure VM with the prepared machine disks.
After the registration process is complete, the VM is powered on immediately.

5.2. Extract Utility


Veeam Backup & Replication comes with an extract utility that can be used to recover VMs from a full

Veeam Certified Engineer v9.5 . Textbook 131


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 5: Entire VM Recovery

backup file – VBK. The utility can be used as an independent tool on Linux and Windows computers
as it does not require any interaction with Veeam Backup & Replication. The extract utility can be
helpful; for example, if it is written to the tape next to backup files, you can possibly recover VMs from
backups even if backups are removed from Veeam Backup & Replication or the application is
uninstalled.

The extract utility can be utilized via two interfaces:

Graphic user interface (can be started on Microsoft Windows machines only)

e
Command-line interface working in the interactive or regular mode

ut
The installation folder of Veeam Backup & Replication (by default:
%PROGRAMFILES%\Veeam\Backup and Replication\Backup) contains three files for the extract

ib
utility:

tr
Veeam.Backup.Extractor.exe – The utility working via the graphic user interface(Microsoft
Windows machines only)

is
extract.exe – The utility working via the command-line interface(version for Microsoft Windows)
extract – The utility working via the command-line interface(version for Linux)

D
or
Important! The extract utility always restores a VM from the full backup file.

5.3. Recovery from a Replica


e
at

The next section will familiarize you with the various ways that you can utilize replicas for
the disaster recovery or other scenarios.
lic

5.3.1. Failover
up

If a primary VM in the production site becomes unavailable, you can quickly restore services by failing
D

over to its replica. When you perform failover, the VM replica takes over the role of the original VM
and you switch from the production VM to its replica and shift your I\O and processes from the
production host to a secondary host. As a result, you have your VM up and running within minutes,
ot

and your users can access the services and applications they need with minimum disruption.
N

In Veeam Backup & Replication, you can fail over to the latest state of a replica or to any of its good
to know restore points.
o

Failover itself is an intermediate step that needs to be finalized. Depending on the disaster recovery
D

scenario, you can do one of the following:

132 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 5: Entire VM Recovery

1. Perform permanent
2. Perform failback 3. Undo failover
failover

Switch from the Switch back to the


Switch back to the
original VM to a VM original VM after the
original VM and work
Operations flow replica and use this problem in the
with it in the normal
replica as the original production site is
operation mode.
VM. eliminated.

No transferring

e
How changes to
because all changes Transferred to the
VM replica are Discarded

ut
are initially made to a original VM
handled
replica VM

ib
Testing environment
Replica Site Disaster Recovery
Same as original VM (e.g. dedicated resource

tr
Location (DR)
pool)

is
This is best when the
original VM and a VM

D
replica are located in This is best when the
This is best when you
the same site, and VM replica is located
want to perform some
When this
hosts and storage are
or
in a DR site and is
testing and
nearly equal in terms running on a lower
scenario is troubleshooting of the
of resources. tier host and storage,
recommended VM replica without
In this case, your which is not intended
e
affecting the production
users will not for continuous
environment in any way.
at

experience any operations.


latency in ongoing
operations.
lic
up

Note: Veeam Backup & Replication supports failover and failback operations for one VM or for a
number of VMs at the same time. If you have a problem with an ESXi host, you can restore its
D

work with minimum downtime.


ot

5.3.2. Failback
N

Veeam Backup & Replication streamlines and automates disaster recovery by providing replica
failback capabilities.
o

Failback is the process of switching from the VM replica to the production VM. During failback, Veeam
D

Backup & Replication uses the working replica to recover the original VM and switch back to it.

If you managed to restore the operation of the source host, you can switch back to the original VM on
the source host. However, if the source host is not available, you can restore the original VM to a new
location and switch back to it. Veeam Backup & Replication offers three failback options:

Failback to a VM in the original location on the source host


Failback to a VM that has been restored up-front from a backup in a new location
Failback to an entirely new location by transferring all replica files to the selected destination

Veeam Certified Engineer v9.5 . Textbook 133


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 5: Entire VM Recovery

The first two options help you decrease recovery time and network traffic, as Veeam Backup &
Replication will transfer only differences between the two VMs. The third option is used in cases when
there is no way to use the original VM or restore the VM before performing failback.

During failback, Veeam Backup & Replication protects a running VM replica with a failback snapshot.
The snapshot acts as a restore point and saves the pre-failback state of a replica to which you can
return afterwards.

In Veeam Backup & Replication, failback is considered a temporary stage that should be further

e
finalized. That is, after you test the recovered original VM and make sure it is running correctly, you
should take another step to commit failback. However, while the replica is still in the failback state,

ut
you also have the option to undo failback and return the replica to the failover state.

ib
Commit failback Undo failback

tr
The production VM is not
You want to finalize recovery of the
Scenario working as expected after
original VM in the production site.

is
failback.

D
Veeam Backup & Replication removes
the protective snapshots and unlocks
replica disk files. Operations switch back to a
Operations flow
or
The original VM in the production site or VM replica.
at a new location starts to perform the
role of the primary VM.
e

VM replica state The VM replica returns to the normal The VM replica returns to the
at

after the operation state. failover state.


lic

5.3.3. Failover Plan


up

If you have a number of VMs running interdependent applications, you need to failover them one by
one, as a group. To do this automatically, you can prepare a failover plan.
D

In a failover plan, you set the order in which the VMs should be processed and the delay time needed
to start each VM. The delay time helps to ensure that some VMs, such as a DNS server, are already
ot

running at the time the dependent VMs start.


N

The failover plan should be created in advance. In case the primary VM group goes offline, you start
the corresponding failover plan manually. When you start the procedure, you can choose to fail over
to the latest state of a replica or to any of its good known restore points.
o
D

134 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 5: Entire VM Recovery

e
ut
ib
tr
Because failover is a temporary intermediate step that needs to be finalized, the finalizing options for
a group failover are similar to a regular failover: undoing failover, permanent failover or failback.

is
If you decide to commit failover or failback, you need to process every VM individually, although you

D
can undo failover for the whole group using the undo failover plan option.

Undoing the failover switches the replica back to the primary VM, discarding all changes that were
or
made to the replica while it was running. When you undo group failover, Veeam Backup & Replication
uses the list of VMs that were failed over during the last failover plan session and switches them back
to the primary VMs. If some of the VMs were already failed back, manually by a user, they are
e
skipped from processing.
at
lic

5.3.4. Planned Failover


If you know that your primary VMs are going to go offline (e.g. you plan to have the production host
up

patched), you can proactively switch the workload to their replicas. A planned failover is a smooth
manual switch from a primary virtual machine to its replica with minimum interrupting in operation.
You can use the planned failover, for example, to perform maintenance or software upgrades to the
D

primary VMs, or in case you have an advance notice of a disaster approaching that will require taking
the primary servers offline. When starting the planned failover:
ot

1. The failover process triggers the replication job to perform an incremental backup and copy the
N

un-replicated changes to the replica.


2. The VM is powered off.
3. The failover process triggers the replication job to perform another incremental backup run and
o

copy the portion of last-minute changes to the replica. The replica becomes fully synchronized
D

with the source VM.


4. The VM is failed over to its replica.

Veeam Certified Engineer v9.5 . Textbook 135


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 5: Entire VM Recovery

e
ut
ib
tr
Because the procedure is designed to transfer the current workload to the replica, it does not suggest
selecting a restore point to switch.

is
During the planned failover, Veeam Backup & Replication creates 2 helper restore points that are not

D
deleted afterwards. These restore points will appear in the list of restore points for this VM; you can
use them later to roll back to the necessary VM replica state.
or
When your primary host is online again, you can switch back to it. The finalizing options for a planned
failover are similar to those of an unplanned failover: undoing failover, permanent failover or failback.
e
at
lic
up
D
ot
N
o
D

136 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 5: Entire VM Recovery

Labs for Module 5: Entire VM Recovery

You should now be able to use the methods covered in Module 5 to restore the entire VM with Veeam
Backup & Replication in disaster recovery scenarios. Choosing from Instant VM Recovery® or failing
over to a VM replica will depend on the situation. In the lab, we will simulate production failure by
deleting some of the VMs from disk, and then we will restore them using previously created backups
and replicas.

e
ut
Get into the Lab

ib
Lab Action Purpose

tr
Perform Instant VM Recovery to restore a VM directly
5.1 Instant VM Recovery
from a backup in just a few clicks.

is
Perform full VM recovery to distinguish the ways the

D
5.2 Full VM recovery full VM recovery option differs from Instant VM
Recovery and what its use cases are.
or
Restore a VM via Veeam extract utility to get
5.3 Using extract utility acquainted with the ways you can use it in case of
disaster or for troubleshooting.
e
at

Perform failover and failback, commit failback of a


replica and undo failover to familiarize yourself with
5.4 Bringing a replica back
lic

the various ways that you can utilize replicas for


disaster recovery or other scenarios.
up

Configure and run a failover plan to fail over a group


5.5 Failover plan
of VMs running interdependent applications.
D

Perform a planned failover to minimize data loss and


5.6 Perform planned failover downtime when you know in advance that you are
going to need a failover.
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 137


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 5: Entire VM Recovery

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

138 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 6: Objects Recovery

6. Objects Recovery
There are plenty of situations when, instead of restoring an entire VM, you would prefer to
recover an individual file or an individual application item from a backup file or replica to the
most recent state or to any point in time in just a few seconds.
In this module you will learn how to use the Veeam Backup & Replication features that allow
file- and item-level restore.

e
6.1. Application-Item Recovery

ut
Veeam Explorers allow the user to browse the database of a certain application and restore

ib
items to production without fully restoring the VM from the backup. This topic details each of
the Veeam Explorers, and explains:

tr
is
The technical process behind the user interface

D
The specifics and benefits of each Veeam Explorer
or
6.1.1. Veeam Explorer for Microsoft Exchange
e
at

Veeam Explorer for Microsoft Exchange is a free tool available to users of Veeam Backup &
Replication. It allows you to browse Microsoft Exchange database files and restore necessary items,
such as mailboxes, folders, messages, tasks, contacts and so on. Veeam Backup & Replication
lic

supports recovery of hard deleted items, including those from public folders and mailboxes, and
recovery of items from/to Archive mailbox. Instead of fully restoring and starting the VM with the
up

Microsoft Exchange Server, you can use Veeam Backup & Replication capabilities to extract the
necessary Microsoft Exchange database from the backup file and then use Veeam Explorer for
Exchange to browse and restore items.
D

Starting with v9.5, Veeam Backup & Replication supports the Microsoft Exchange features Litigation
Hold and In-Place Hold:
ot

In order to preserve all mailbox content (including original versions of modified items, as well as
N

deleted items), the Litigation Hold option can be enabled for a personal mailbox. Veeam
Explorer supports the mailboxes with this option enabled: Litigation Hold Items containers
(whether empty or not) are displayed in the mailbox store hierarchy, and you can perform
o

restore operations for them.


D

Veeam also supports restore of items from mailboxes and public folders with In-Place Hold
enabled – the corresponding containers will be displayed only if they are not empty.

You can use granular browsing and searching capabilities to find any item or a bunch of items stored
in any number of Microsoft Exchange database files. Restore options include:

Exporting mailbox folders and items as Personal Folder Files (.pst)


Saving mailbox items as Microsoft Exchange Mail Documents (.msg)

Veeam Certified Engineer v9.5 . Textbook 139


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 6: Objects Recovery

Sending mailbox items as attachments via email


Restoring mailbox folders and items (available only with Veeam Backup & Replication
Enterprise and Enterprise Plus Editions)
Recovery to Online Archive mailbox.

Note: Veeam Explorer for Exchange requires full access to Microsoft Exchange database files for
item recovery. This level of access is usually granted to a very limited number of employees within
the organization. If you would like to allow less privileged users to perform recovery of Microsoft

e
Exchange items from backups, you can use the Application-Item Recovery (AIR) wizard for

ut
Microsoft Exchange.

ib
Make sure Veeam Explorer for Microsoft Exchange is aware of the Extensible Storage Engine

tr
location. Extensible Storage Engine is required to access the Exchange mailbox database (.EDB). It
runs as a special dynamic link library ese.dll supplied by Microsoft.

is
Specify path to the ese.dll in Veeam Explorer for Microsoft Exchange configuration settings:

D
1. In the Options window, open the Extensible Storage Engine tab.
2. Click Browse and specify the path to the ese.dll file. The file can be found on the Microsoft
or
Exchange Server distribution CD at X:\Setup\ServerRoles\Common\ese.dll, or in the installation
directory of Microsoft Exchange Server. For example:
e
for Microsoft Exchange 2010 default path is: %ProgramFiles%\Microsoft\Exchange
at

Server\V14\Bin
for Microsoft Exchange 2013 and Microsoft Exchange 2016 default path
is: %ProgramFiles%\Microsoft\Exchange Server\V15\Bin
lic
up

Important! Only Microsoft Exchange 2010 SP1 or later is supported, because Veeam Explorer for
Exchange leverages the UploadItems operation which was only supported in Microsoft Exchange
Web Services starting with 2010 SP1.
D

See https://msdn.microsoft.com/en-us/library/office/bb409286(v=exchg.150).aspx#bk_bulk_transfe
r for additional details.
ot

6.1.2. Veeam Explorer for Microsoft SharePoint


N

Veeam Explorer for SharePoint allows you to browse Microsoft SharePoint content and recover items
o

(such as library documents, images, webpages and so on) without needing to fully restore and start
D

the virtual machine hosting the SharePoint content database. Instead, you can use Veeam Backup &
Replication data recovery options to quickly extract the necessary Microsoft SharePoint content
database file (.MDF) from the virtualized server image-level backup, and then use Veeam Explorer for
SharePoint to find and restore the Microsoft SharePoint documents you need.

Available with all editions of Veeam Backup & Replication, Veeam Explorer for SharePoint provides
granular browsing and searching capabilities to find any item or a bunch of items stored in any
number of Microsoft SharePoint content databases. You can save items/lists to a local folder or
network drive, or send restored items as e-mail attachments.

140 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 6: Objects Recovery

With Veeam Backup & Replication Enterprise and Enterprise Plus edition, you can also use Veeam
Explorer for SharePoint to restore Microsoft SharePoint items in the way you need; authorized users
(for example, Microsoft SharePoint administrators) can also import content database files (exported
by Veeam Explorer for SharePoint) to SharePoint database using PowerShell cmdlets.

Note: If there is a SharePoint server which has a database larger than 10GB, you’ll need fully
functional (commercial) version of Microsoft SQL Server, Express version is not going to be able to
mount this database.

e
ut
Note: All of Veeam Explorers can be launched both from Veeam Backup & Replication UI and

ib
independently, from the server menu.

tr
The following versions and editions of Microsoft SharePoint Server (virtualized either on VMware or

is
Hyper-V platform) are suppported:

D
Microsoft SharePoint 2016
Microsoft SharePoint 2013
Microsoft SharePoint 2010
or
All editions are supported (Foundation, Standard, Enterprise).
e
To perform Microsoft SharePoint item recovery, Veeam Explorer requires a Microsoft SQL Server that
at

will be used as a staging system. On this staging system, Veeam Explorer creates
temporary Microsoft SharePoint content databases by attaching restored content database files.
Below are the requirements for staging server:
lic

1. The staging Microsoft SQL Server can run on the machine where Veeam Explorer for Microsoft
up

SharePoint is installed, or on another machine.


2. The staging system must have the same or a later version of Microsoft SQL Server as the
server that hosts restored Microsoft SharePoint content databases. For example, if the
D

Microsoft SharePoint server uses Microsoft SQL Server 2008, then the staging system can run
Microsoft SQL Server 2008 or later.
ot

You can use Veeam Explorer for Microsoft SharePoint options to configure staging Microsoft SQL
Server settings.
N

To be able to work with remote BLOB stores (RBS) of the SharePoint content database, make sure
that you have your remote BLOB store virtualized on the corresponding platform (VMware or Hyper-
o

V). Also, make sure that it is either included in the SharePoint backup created by Veeam Backup &
D

Replication (for automated discovery), or stored on the local machine running Veeam Explorer and
staging SQL server (for manual discovery).

Make sure the staging SQL Server configuration meets the following requirements:

1. FILESTREAM should be enabled on the database server, and filestream settings should be
enabled at database level, as described in Microsoft documentation:

For SQL Server 2016

Veeam Certified Engineer v9.5 . Textbook 141


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 6: Objects Recovery

For SQL Server 2014


For SQL Server 2012
For SQL Server 2008R2

2. RBS Client Library should be installed on the database server. For Microsoft SQL Server 2014
and later, the Remote Blob Store setup is included in the installation media; for other versions
you can use corresponding Microsoft SQL Server Remote Blob Store setup package (RBS.msi)
available at Microsoft website:

For SQL Server 2012: http://www.microsoft.com/en-us/download/details.aspx?id=35580

e
For SQL Server 2008R2:

ut
http://www.microsoft.com/en-us/download/details.aspx?id=16978

ib
6.1.3. Veeam Explorer for Microsoft Active Directory

tr
Veeam Explorer for Microsoft Active Directory is a new tool that extends the functionality of Veeam

is
Backup & Replication, allowing you to browse Active Directory database and recover items (objects
and containers) and their attributes from domain controller backup into production. For that, you do

D
not need to fully restore and start the virtual machine hosting the domain controller. Instead, you can
use Veeam Backup & Replication data recovery options to quickly extract the necessary Active
Directory database file (.DIT) from the domain controller backup, and then use Veeam Explorer for
or
Microsoft Active Directory to find and restore the required objects:

Use Veeam Explorer for Microsoft Active Directory granular browsing and searching capabilities
e
to find any object/container stored in Active Directory database.
at

Export objects/containers to a local folder or network drive.


Restore them to the original or different location.
lic

Note: Veeam Explorer for Microsoft Active Directory requires full access to Active Directory
up

database files for item recovery. This level of access is usually granted to a very limited number of
employees within the organization. If you would like to allow less privileged users to perform
recovery of Active Directory objects from backups, you can use the Application-Item Recovery
D

(AIR) wizard.
ot

When viewing the backup in Veeam Explorer for Microsoft Active Directory browser, it’s possible
detect the attributes that were changed, moved, or deleted since the Active Directory backup via
N

Compare with Original menu command that allows you to compare Active Directory objects in the
backup with those in the production database.
o
D

142 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 6: Objects Recovery

e
ut
ib
tr
is
D
or
6.1.4. Veeam Explorer for Microsoft SQL Server
e
at

Veeam Explorer for Microsoft SQL Server is a tool that extends the functionality of Veeam Backup &
Replication, allowing you to view and recover databases from within Microsoft SQL server VM
lic

backup. For that, you do not need to fully restore and start the virtual machine hosting the SQL
server. Instead, you can use Veeam Backup & Replication data recovery options to mount the
selected restore point (image-level backup or replica) of the Microsoft SQL server
up

VM to the Veeam backup server and then specify how you want your database to be restored. Veeam
Explorer for Microsoft SQL Server offers the following capabilities:
D

Browsing SQL server instances and databases


ot

Exporting the database to a local folder or network drive, including quick and easy 1-Click
Export
N

Restoring the database to the original server or different server


Restoring SQL tables
o

Veeam supports database restore to the current restore point (that is, to the state when the backup or
D

replica that is currently mounted to the Veeam backup server was created), restore to the certain
point in time (transaction log replay will bring the database to the desired state), and restore to the
state before selected transaction.

Note: Availability of these options depends on Microsoft SQL server VM logging and recovery
settings and on the backup job settings. Consider that log backups are required to restore your
database to the certain point in time or to a state before the selected transaction. Log files are

Veeam Certified Engineer v9.5 . Textbook 143


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 6: Objects Recovery

copied from the repository to the Windows machine hosting the target SQL server, and log replay
is performed to bring the database to the desired state. Log backups functionality is available in
Enterprise and Enterprise Plus version of Veeam Backup & Replication.

In most scenarios, Veeam installs a runtime component named Veeam SQL Restore Service to the
VM guest OS (target or staging server, depending on selected restore or export scenario) - to support
restore activities on the SQL server VM guest.

e
Note: If you are restoring the database to the local SQL server instance, this runtime component is

ut
not installed on the SQL server guest OS.

ib
This service runs during the restore session; it checks the rights assignment required for database
restore, gets information about databases that should be restored, performs the necessary file

tr
operations (including database and transaction log copy) and so on. When restore session ends, the
service is stopped and removed from guest. Then a new session starts, and the service is installed

is
again.

D
The Veeam SQL Restore Service operates under the Local System account.
All service activities are logged to the Veeam.SQL.Service_<timestamp>.log file stored in the
or
Temp folder of the system directory, next to the Veeam.SQL.Service_<timestamp>.exe file
(runtime component installed per session).
Communication between Veeam Explorer and the service is performed using RPC; default TCP
e
port range that should be open on the guest for inbound traffic includes ports 1025 - 1034. If
you need to change this port range, then do the following:
at

1. Open Veeam Explorer configuration file named Config.xml located at


lic

C:\ProgramData\Veeam\Backup\SQLExplorer\on the machine hosting Veeam Explorer (create


the file if it is not present).
2. Locate the <SQLExplorer> tag (create the tag if it is not present)
up

3. Supply the necessary values for Agent MinimumPort and MaximumPort.


D

SQL Server Logs Backup and Restore


ot

For highly transactional servers and applications, many organizations need to back up both the
application VM and its transaction logs in order to ensure recoverability to any point in time. Among
N

such VMs there are, for example, Microsoft Exchange server and SQL server. Another important
requirement is that backup process does not affect the production infrastructure.
o

Veeam Backup & Replication supports transaction log backups for the following systems:
D

Microsoft SQL Server 2005 SP4


Microsoft SQL Server 2008
Microsoft SQL Server 2008 R2
Microsoft SQL Server 2012
Microsoft SQL Server 2014
Microsoft SQL Server 2016

All editions of Microsoft SQL Server are supported. AlwaysOn Availability Groups are supported for

144 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 6: Objects Recovery

Microsoft SQL Server 2012 and later.

Important! To provide for recoverability of your SQL server, make sure that Full or Bulk-logged
recovery model is enabled for that server. Then all the changes to the SQL server state will be
written to transaction logs, and you will be able restore from any previous state backup to the
current state by applying a sequence of logged transactions (transaction log replay).

e
You can specify the frequency at which you want your database transaction logs to be processed
when setting up a job. In the backup repository, logs are stored as .VLB files (Veeam proprietary

ut
format) co-located with corresponding SQL server VM backups (.VBK/.VIB/.VRB files).

ib
Important! The Backup Job must be scheduled, otherwise transaction logs will not be backed up.

tr
is
For export to selected point in time and for export/restore to the state before selected transaction,
Veeam Explorer for Microsoft SQL Server uses a staging Microsoft SQL Server. By default, local

D
Microsoft SQL Server deployed with Veeam backup server will be used as a staging system.
If you plan to use another server as a staging Microsoft SQL Server, then it should have the same or
later version as the original Microsoft SQL Server. Besides, if the source database uses any edition-
or
specific features, then staging system should be of the same or higher edition than the original SQL
Server.
e
at

6.1.5. Veeam Explorer for Oracle


lic

Veeam Explorer for Oracle extends the functionality of Veeam Backup & Replication, allowing you to
view and recover databases from within Oracle server VM backup. Veeam Explorer can restore
databases from backups created by backup jobs, from imported backups and from storage. Both
up

Windows-based and Linux-based VMs are supported.

For database-level recovery, you do not need to fully restore and start the virtual machine hosting
D

your Oracle system. Instead, you can use Veeam recovery capabilities to mount the selected restore
point of Oracle server VM to Veeam backup server and then specify how you want your database to
ot

be restored.

Veeam Explorer for Oracle offers the following capabilities:


N

Browsing Oracle system hierarchy


o

Restoring databases to the original server or different server, including quick and easy 1-Click
Restore
D

Veeam supports several database restore options:


To the current point in time (that is, to the moment when currently selected Oracle VM backup
was created)
To the selected point in time (here log replay will bring the database to the desired point)
To the state before selected transaction

Veeam Certified Engineer v9.5 . Textbook 145


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 6: Objects Recovery

Note: Availability of these scenarios depends on Oracle database logging mode and on the VM
backup.

Veeam Explorer for Oracle is installed together with Veeam backup server and management console
or with the Standalone Console. The basic procedures of restoring Oracle database with Veeam
Explorer for Oracle are very similar for restore to current restore point and for restore to point in time
or selected transaction.

e
When restoring to the state as of selected restore point, the following takes place:

ut
1. Administrator uses Veeam Backup & Replication console to initiate mount of Oracle VM file
system from the backup stored in the repository.

ib
2. Mount is performed using Veeam Mount Server associated with this repository. Typically, target
(production) Oracle server is used as a staging system. When a VM is mounted to the specified

tr
server, c:\VeeamFLR folder is created on it.
3. Veeam Explorer for Oracle obtains Oracle system hierarchy information and presents it to user.

is
A user chooses the database to restore and specifies target location (original or another server)
and settings required to access that server. Database files are copied from the repository to the

D
target machine, database is ‘re-created’ on the Oracle server and becomes ready for use.
or
Note: User account that you specify for guest processing of the Oracle VM in the backup job
requires the SYSDBA rights on that Oracle system. For Linux system – the root account or
e
account included in sudoers file can be used. During the restore process, this account will be
at

automatically assigned privileges for database restore; after the restore process is finished, these
privileges will be automatically recalled
lic

Staging server is used to fine-tune the restore point in case a user needs to restore database to the
state before specific transaction. At the first launch of Veeam Explorer it tries to obtain the staging
up

Oracle server settings using the built-in algorithm. You can specify another staging server, either local
(for Windows VMs only) or remote (for both Windows and Linux VMs).
D

The following requirements apply to staging server:

1. A staging server must have the same Oracle database version as the source (original) and
ot

target Oracle server.


2. If you plan to restore databases with Automatic Storage Management enabled, the staging and
N

target servers should have ASM enabled, too.


3. Oracle Database Express Edition cannot be used as a staging system.
o
D

Oracle Logs Backup and Restore

Restore to the selected point in time or to the state before selected transaction requires Oracle
database redo log replay, so make sure the backup was created with appropriate log processing
settings:

ARCHIVELOG mode is enabled for the Oracle database


Database logs are not truncated due to VM backup job settings

146 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 6: Objects Recovery

6.2. Universal Application-Item Recovery (U-AIR)


For recovery of application objects, U-AIR leverages the vPower technology. It starts the application
and all required components in an isolated virtual lab directly from compressed and deduplicated
backup files. Once the VM is started, U-AIR provides transparent access to the backed up VM image
through a proxy appliance that has visibility of both the virtual lab and production environment. Users
can then extract the necessary application objects from the earlier VM images and bring them back to
the production environment.

e
ut
ib
tr
is
D
or
e
at
lic
up
D

U-AIR does not require any special backups or additional tools – the application is started directly
ot

from the image-level backup file and users can restore application objects with the native
management tools.
N

U-AIR offers a universal wizard, that is, Veeam Backup & Replication starts the application and all
required components in the virtual lab so that users can connect to that application with the native
o

management tools and restore items manually. U-AIR wizards are standalone components that can
be installed and updated independent of the product. You can install U-AIR wizards on any machine
D

in your production environment from which you plan to perform the restore process.

To perform the U-AIR process, you can follow a typical workflow or a simplified workflow. Note that in
both cases you need your application group, virtual lab and SureBackup job configured.

Typical Workflow

Commonly, the restore procedure requires specific knowledge and is performed by application

Veeam Certified Engineer v9.5 . Textbook 147


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 6: Objects Recovery

administrators or users working with applications. At the same time,

management tasks are controlled by Veeam Backup administrators who know about all available
resources in the backup infrastructure and user access permissions.

For this reason, in the typical U-AIR workflow, two groups of users are engaged:

Users who need to restore specific items from applications


Veeam Backup administrators who work with Veeam Backup & Replication and Veeam
Backup Enterprise Manager

e
ut
To help users who requested virtual labs manage their requests, Veeam Backup & Replication offers
a special tool – Virtual Lab Manager. Virtual Lab Manager runs on the machine from which the user

ib
sends the request and on which the user plans to perform application-item recovery.

tr
is
D
or
e
at
lic
up
D
ot
N

The typical restore procedure includes the following steps:


o

1. The user who needs to restore an application item downloads the necessary U-AIR wizard and
installs it on his or her machine. The user starts the U-AIR wizard and submits a virtual lab
D

request. The submitted request is sent over to Veeam Backup Enterprise Manager and is
registered there. (1)
2. The Veeam Backup Enterprise Manager Administrator receives an e-mail about a new
lab request submitted by the user. The e-mail is sent automatically once a new request is
registered at Veeam Backup Enterprise Manager. (1)
3. The Veeam Backup Enterprise Manager Administrator makes sure that the user who submitted
the request is eligible to access application data from the corresponding backup.
4. The Veeam Backup Enterprise Manager Administrator approves or denies access to requested

148 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 6: Objects Recovery

data using Veeam Backup Enterprise Manager. If the request is approved, the administrator
uses the request approval wizard to select the necessary SureBackup job that should
be started in order to create the required virtual lab. The SureBackup job that the administrator
selects should be pre-configured on one of Veeam Backup servers connected to Veeam
Backup Enterprise Manager. (2,3)
5. If necessary, the Administrator can manage virtual labs. For example, the Administrator can
extend the time for the virtual lab lease or stop the lab leased by the user to let somebody else
perform emergency restore using the same virtual lab.
6. Once the lab is ready, the user receives a notification from Virtual Lab Manager. (4)

e
7. The user can now start application-item recovery. If necessary, the user can extend the time for

ut
which the virtual lab should be running. (5)

After the recovery process is finished, the administrator can manually power off the virtual lab. If this

ib
does not happen, the virtual lab will be powered off automatically once the time for virtual lab lease is
exceeded.

tr
Simplified Workflow

is
If you plan to restore application items in a small environment or use U-AIR for evaluation purposes,

D
you can use a simplified U-AIR workflow.

In this case, you can skip the step of creating and approving the virtual lab request and immediately
or
start working with the necessary U-AIR wizard.

To be able to use simplified workflow, make sure that the necessary U-AIR wizard is installed on the
e
Veeam Backup server, and that a corresponding SureBackup job is configured on that server.
at
lic
up
D
ot

To launch application item recovery from the Veeam Backup console using simplified workflow, a user
N

needs to do the following:


o

1. Right-click the necessary SureBackup job and select Realtime Statistics, or double-click the
SureBackup job.
D

2. In the displayed window, select the VM needed to perform the application item recovery. Make
sure that the VM is started and the application running inside is initialized.
3. Right-click the VM and select Active Directory item recovery, Exchange item recovery or SQL
item recovery to start the corresponding U-AIR wizard.

Veeam Certified Engineer v9.5 . Textbook 149


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 6: Objects Recovery

6.3. Guest OS File Recovery


The Guest OS File Recovery topics shows you how the guest VM OS files are restored by
Veeam Backup & Replication depending on the operating system they belong to.

6.3.1. Guest OS File Recovery

e
With Veeam's Instant File-Level Recovery (IFLR), you can recover an individual file from a backup file
or replica to the most recent state or to any point in time in just a few seconds. IFLR does not require

ut
you to extract a VM image to the local drive or to start up the VM prior to restore – you can recover
files directly from a regular image-level backup or replica.

ib
IFLR is available for any virtualized file system, although, Veeam Backup & Replication provides

tr
different approaches for different file systems:

is
For Windows-based VMs with NTFS, FAT and ReFS file systems, Veeam Backup & Replication
uses built-in Windows file-level recovery.

D
For the most commonly used file systems on Windows, Linux, Solaris, BSD, Novell Netware,
Unix and Mac (OS X) machines, Veeam Backup & Replication offers multiOS file-level
recovery.
or
For any other file system, Veeam Backup & Replication enables you to leverage Instant VM
Recovery to perform manual file-level recovery.
e
at

6.3.2. Windows File-Level Recovery


lic

For FAT, NTFS and ReFS guest OS systems, Veeam Backup & Replication uses built-in file-level
restore functionality.
up

When you perform file-level restore, Veeam Backup & Replication performs the following operations:

1. Veeam Backup & Replication mounts disks of the VM from the backup or replica to the backup
D

server or machine on which the Veeam Backup & Replication console is installed, under
the C:\veeamflr\<vmname> folder.
ot

For accessing VM disks content, Veeam Backup & Replication uses a separate program —
Virtual Disk Driver (VDK) that is provided with the product. VM disks are not physically
extracted from the backup file or VM replica. Veeam Backup & Replication emulates their
N

presence on the backup server or Veeam Backup & Replication console. The backup file or VM
replica itself remains in the read-only state.
o

2. Veeam Backup & Replication launches the Veeam Backup browser where mounted VM disks
are displayed. You can browse the VM guest file system in the Veeam Backup browser.
D

3. If you restore files to the original location, Veeam Backup & Replication creates an additional
mount point on the mount server associated with the backup repository on which the backup file
resides. The mount server is typically located close to the backup repository. The second mount
point lets Veeam Backup & Replication route for VM data in an optimal way and reduce load on
the network. As a result, restored files data travels in the following way:
1. In the restore to original scenario — from the mount server to the original location. The
first mount point here is used only for browsing the VM guest file system.
2. In the restore to new location scenario — from the backup server

150 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 6: Objects Recovery

or Veeam Backup & Replication console to the specified new location.


4. When the restore process is finished or the Veeam Backup browser is closed by
timeout, Veeam Backup & Replication removes mount points from the backup server or
machine on which the Veeam Backup & Replication console is installed and from the mount
server (if the second mount was used).

Depending on the restore scenario, Veeam Backup & Replication may create mount points on
different backup infrastructure components. This can be a mount server, machine running the Veeam
Backup & Replication console or the original VM itself.

e
ut
6.3.3. Multi-OS File-Level Recovery

ib
Because Windows cannot read other file systems natively, Veeam Backup & Replication additionally
provides multiOS file-level recovery that allows reading data from different file systems:

tr
is
OS Supported File Systems

- FAT, FAT32

D
- NTFS
Windows
- ReFS (ReFS is supported only if Veeam Backup & Replication is installed on
or
Microsoft Windows Server 2012 and later).

- ext2, ext3, ext4


- ReiserFS
e
Linux - JFS
at

- XFS
- Btrfs
lic

BSD UFS, UFS2


up

Mac HFS, HFS+ (volumes up to 2 TB)

- UFS
D

- ZFS (except any pool versions of Oracle Solaris)


Solaris The FLR appliance uses module ZFSonLinux version 0.6.3. For this
reason, Veeam Backup & Replication supports only those versions of pools and
ot

features that are available in ZFSonLinux version 0.6.3.


N

File-level restore is supported for Novell Open Enterprise Server (Novell OES).
Novell NetWare is not supported (Veeam Backup & Replication may fail to detect
Novell OES NSS volumes).
o

AD-enabled NSS volumes on Open Enterprise Server 2015 are supported. Restore
D

of NSS file/folder permissions is not supported.

In addition to basic disks, MultiOS file-level recovery understands Linux LVM (Logical Volume
Manager) and Windows LDM (Logical Disk Manager) partitions and ZFS pools.

MultiOS file-level recovery is a wizard-driven process. To restore files from VM guest


OS, Veeam Backup & Replication uses a helper appliance. The helper appliance is a helper VM
running a stripped down Linux kernel that has a minimal set of components. The appliance is quite

Veeam Certified Engineer v9.5 . Textbook 151


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 6: Objects Recovery

small — around 50 MB. It requires 1024 MB RAM and takes around 10 seconds to boot.

When you perform file-level restore, Veeam Backup & Replication performs the following operations:

1. Veeam Backup & Replication deploys a helper appliance on the ESX(i) host in the virtual
infrastructure.
2. Veeam Backup & Replication mounts disks of the VM from the backup or replica to the helper
appliance. The backup file or VM replica itself remains in the read-only state on the backup
repository or datastore.

e
3. Veeam Backup & Replication launches the Veeam Backup browser where mounted VM disks
are displayed. You can browse the VM guest file system in the Veeam Backup Browser and

ut
restore files or folders to the original VM or to another location. Alternatively, you can enable an
FTP server on the virtual appliance and allow VM owners to restore files themselves.

ib
4. When the restore process is finished or the Veeam Backup browser is closed by
timeout, Veeam Backup & Replication unmounts the content of the backup file or replica from

tr
the helper appliance and unregisters the helper appliance on the ESX(i) host.

is
Tip: When you perform recovery directly to a Linux host, you can recover files with correct

D
permissions.
or
6.3.4. File-Level Recovery for Any File System
e
With the vPower technology, Veeam extends IFLR to any file system, not just Microsoft Windows
at

FAT, NTFS, ReFS and file systems supported by the multi-OS File-Level Restore wizard.

To restore files and folders from file systems not supported by file-level restore wizards, you must
lic

perform the following actions:

1. Use Instant VM Recovery to publish the VM from the backup file on the ESX(i) or Hyper-V host
up

in the virtual infrastructure. Do not start the recovered VM.


2. Mount the disks of the restored VM to any VM that can read the file system of the original VM.
3. Restore files or folders using native file management tools. Alternatively, you can mount the VM
D

disks to a Microsoft Windows VM and use file management tools such as Portlock Explorer.
ot
N
o
D

152 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 6: Objects Recovery

Labs for Module 6: Objects Recovery

A lot of daily disaster recoveries do not require an entire VM to be restored. Veeam Backup &
Replication enables you to save time and network bandwidth by performing item-level and file-level
restore. Try them on your own using the lab environment.

e
Get into the Lab

ut
Lab Action Purpose

ib
Perform Microsoft Restore Microsoft Exchange items from the backups
6.1
Exchange items recovery created with Veeam Backup & Replication.

tr
Perform Microsoft

is
Restore Microsoft SharePoint items from the backups
6.2 SharePoint items
created with Veeam Backup & Replication.
recovery

D
Perform Oracle items Restore Oracle items from the backups created with
6.3
recovery
or
Veeam Backup & Replication.

Perform Microsoft Active Restore Microsoft Active Directory items from the
6.4
Directory items recovery backups created with Veeam Backup & Replication.
e
at

Perform Microsoft SQL Restore Microsoft SQL Server databases from the
6.5
Server items recovery backups created with Veeam Backup & Replication.
lic

6.6 Guest files recovery Restore Windows and Linux guest files.
up
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 153


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 6: Objects Recovery

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

154 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

7. Verification
To guarantee recoverability of your data, Veeam Backup & Replication offers the SureBackup
technology.

7.1. SureBackup Recovery Verification

e
SureBackup is intended to automate and simplify the backup verification process – one of

ut
the most crucial parts of data management and protection. SureBackup lets validate backups
of your VMs without impacting the production infrastructure. You can automatically verify
every created restore point of every VM and ensure that they will function as expected in

ib
case a disaster strikes.

tr
7.1.1. How It Works

is
D
SureBackup is Veeam’s technology that lets you test a VM backup and ensure that you will be able to
recover data from it. To validate a VM backup, Veeam Backup & Replication performs its “live”
verification: it automatically boots the VM from the backup in the isolated environment, performs tests
or
against it, and then powers the VM off and creates a report on the VM backup state. You can verify a
VM from the latest backup or from any necessary restore point. A SureBackup job also can be
scheduled to be executed immediately after a specific backup job completes.
e
at

Note: SureBackup, or automatic recovery verification, is available in Enterprise and Enterprise


lic

Plus Editions of Veeam Backup & Replication. If you use the Standard Edition, you can manually
verify VM backups with Instant VM Recovery.
up

SureBackup recovery verification uses a regular image-based backup created with


Veeam Backup & Replication. The procedure of the VM verification is the following:
D

1. Veeam Backup & Replication leverages the Instant VM Recovery technology to publish a VM in
the isolated virtual environment. The VM is started directly from the compressed and
ot

deduplicated backup file residing on the backup repository.


2. Veeam Backup & Replication performs a number of tests against the verified VM.
N

3. When the recovery verification process is over, Veeam Backup & Replication unpublishes the
VM and creates a report on its state. The report is sent to the backup administrator by email.
o
D

Veeam Certified Engineer v9.5 . Textbook 155


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

e
ut
ib
tr
During verification, a backed up VM image remains in read-only state. All changes that take place
when a VM is running are written to redo log files that are stored on a selected datastore in the

is
production environment. Once the recovery verification process is complete, the redo logs are
removed.

D
To perform VM verification, you need to create the following entities:
or
1. Application group. During recovery verification, the verified VM is not started alone: it is started
together with VMs on which it is dependent. Starting the verified VM in conjunction with other
VMs enables full functionality of applications running inside the VM and lets you run these
e
applications just like in the production environment.
at

2. Virtual lab. SureBackup leverages the virtual lab technology to verify a VM backup. The virtual
lab is the isolated virtual environment in which the verified VM and VMs from the application
lic

group are started and tested.


3. SureBackup job. The SureBackup job is a task to run the recovery verification process. You can
run the SureBackup job manually or schedule it to run automatically according to some
up

schedule.
D

Veeam vPower NFS Service


ot

The Veeam vPower NFS Service is a Windows service that runs on a Windows backup repository
server and enables it to act as an NFS server. vPower NFS allows Veeam Backup & Replication to
mount a compressed and deduplicated backup file as a regular VMDK file directly to the ESX(i) host
N

via NFS, so ESX(i) hosts get transparent access to backed up VM images.


o

If you store backups on a Windows repository, it is highly recommended to enable the vPower NFS
Server on this repository. In this case, the vPower NFS Service will run on the managing Windows
D

server.

Besides Windows-based backup repository servers, Veeam vPower NFS Service can run on any
Windows server you choose, including the Veeam backup server itself. However, in this case,
performance may be much lower because instead of a direct connection between the ESX(i) host and
the backup repository, the connection will be split into two parts: ESX(i) host to NFS server and NFS
server to backup repository.

156 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

The vPower technology is used to enable the following features:

SureBackup: Recovery Verification


Instant VM Recovery
On-Demand Sandbox
Multi-OS File-Level Recovery
Universal Application-Item Recovery (U-AIR)

e
vPower-Specific Settings

ut
To establish a connection between the ESX(i) host and vPower NFS server, you must make sure that
the ESX(i) host has a proper network interface configuration and can access the vPower NFS server.

ib
When connecting to the vPower NFS server, the ESX(i) host uses a VMkernel interface. For this

tr
reason, the ESX(i) host must have a VMkernel interface. Otherwise, Veeam Backup & Replication will
fail to mount the vPower NFS datastore on the ESX(i) host.

is
By default, VMkernel interfaces are not available for non-ESXi versions of VMware vSphere hosts.

D
You will have to add them manually.
or
If the vPower NFS server and ESX host are located in the same network, the ESX host must
have a VMkernel interface in the same IP network as the vPower NFS server.
If the vPower NFS server and ESX host are located in different networks and use a router for
network access, in addition to creating a new VMkernel interface, you will have to manually
e

specify routing settings in the IP routing table on the ESX host.


at
lic

7.1.2. Recovery Verification Tests


To verify a VM started in the virtual lab, you can run Veeam’s predefined tests or perform your own
up

tests against VMs. The predefined tests include the following ones:

1. Heartbeat test. As soon as the VM is started, Veeam Backup & Replication performs a
D

heartbeat test. It waits for a heartbeat signal from VMware Tools/Hyper-V Integration Services
installed inside the VM to determine that the guest OS inside the VM is running. If the signal
ot

comes regularly at specific time intervals, the test is passed.


2. Ping test. During the ping test, Veeam Backup & Replication checks if the VM in the virtual lab
N

can respond to the ping requests. If VM responds to ping requests from the Veeam backup
server, the test is passed.
3. Application test. Veeam Backup & Replication waits for applications inside the VM to start and
o

runs a script against these applications. Veeam Backup & Replication uses two types of
D

predefined scripts:
For DNS servers, domain controllers, Global Catalog servers, mail servers and web
servers, Veeam Backup & Replication uses a script that probes an application-specific
port. For example, to verify a domain controller, Veeam Backup & Replication probes port
389 for a response. If the response is received, the test is passed.
For Microsoft SQL Server, Veeam Backup & Replication uses a script that attempts to
connect to instances and databases on the Microsoft SQL Server. For more information,
see Microsoft SQL Server Checker Script.

Veeam Certified Engineer v9.5 . Textbook 157


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

Beside these predefined tests, you can use custom scripts to verify the VM backup.

Important! To run ALL the recovery verification tests, you must have VMware Tools/Hyper-V
Integration Services installed inside the vSphere VM you start from the backup and Hyper-V
Integration Services for the Hyper-V VM. Otherwise these tests will be skipped; Veeam Backup &
Replication will display a warning in the SureBackup job session results.

e
7.1.3. Backup File Validation

ut
In addition to recovery verification tests, Veeam Backup & Replication allows you to perform backup

ib
file validation (also referred to as backup file verification) – a CRC check that runs for backup files of
VMs verified by the SureBackup job. The option to validate backup files is selected in the recovery
verification job settings. You can also optionally validate backup files for VMs from the application

tr
group.

is
D
or
e
at
lic
up
D
ot
N
o
D

For validation of a backup file, Veeam Backup & Replication uses the checksum algorithm. When

158 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

Veeam Backup & Replication creates a backup file for a VM, it calculates a checksum for every data
block in the backup file and stores this data together with VM data. During the backup file validation
test, Veeam Backup & Replication de-compresses the backup file, re-calculates checksums for data
blocks in the uncompressed backup file, and compares them with initial checksum values. If the
results match, the test is passed.

Note: The result of the backup file validation test impacts the state of the SureBackup job session.
If the validation tests are completed successfully but the backup validation is not passed, Veeam

e
Backup & Replication marks the SureBackup job session with the Warning status.

ut
7.1.4. Application Group

ib
In most cases, a VM works in cooperation with other services and components. To verify such VMs,

tr
you first need to start all services and components on which the VM is dependent. To this aim,

is
Veeam Backup & Replication uses the notion of the application group.

D
The application group creates the “surroundings” for the verified VM. The application group contains
one or several VMs on which the verified VM is dependent. These VMs run applications and services
that must be started to enable fully functional work of the verified VM. Typically, the application group
or
contains at least a domain controller, DNS server and DHCP server.

You can add VMs from different sources:


e

VM backups
at

VM replicas
Storage snapshots
lic

Veeam Backup & Replication supports mixed application groups. You can add VMs from backups,
storage snapshots and VM replicas to the same application groups. Keep in mind the following
up

limitations:

VMs must belong to the same platform — VMware vSphere or Microsoft Hyper-V.
D

VMs must have at least one valid restore point or must reside on a storage snapshot.
You cannot add the same VM twice. For example, if you add a VM from the storage snapshot,
ot

you will not be able to add the same VM from the backup.
N
o
D

Veeam Certified Engineer v9.5 . Textbook 159


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

e
ut
ib
tr
is
D
or
e
at

When you set up an application group, you specify the role of every VM, its boot priority and boot
delay. Additionally, you specify what tests must be performed for VMs in the application group.
lic

When a SureBackup job is launched, Veeam Backup & Replication first starts in the virtual lab VMs
from the application group in the required order (as specified in the application group settings) and
up

performs necessary tests against them. This way, Veeam Backup & Replication creates the
necessary environment to start the verified VM. After all the VMs from the application group are
started and tested, Veeam Backup & Replication starts the verified VM in the virtual lab.
D
ot

For example: If you want to verify a Microsoft Exchange Server, you need to test its functionality
in cooperation with other components: domain controller and DNS server. Subsequently, you must
add to the application group a virtualized domain controller and DNS server. When Veeam Backup
N

& Replication runs a SureBackup job, it will first start and verify the domain controller and DNS
server in the virtual lab to make verification of the Exchange Server possible.
o
D

Note: All VMs added to the application group must belong to the same platform – VMware
vSphere or Microsoft Hyper-V. Mixed platform application groups are not supported.

7.1.5. Virtual Lab


The virtual lab is an isolated virtual environment in which Veeam Backup & Replication verifies VMs.

160 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

In the virtual lab, Veeam Backup & Replication starts a verified VM and VMs from the application
group. The virtual lab is used not only for the SureBackup verification procedure, but also for U-AIR
and On-Demand Sandbox processing.

Note: On-Demand Sandbox refers to using the Virtual Lab to run as an isolated environment for
patch deployment testing or troubleshooting.

e
A virtual lab does not require provisioning of additional resources. You can deploy it on the existing
ESX(i) host in your virtual environment.

ut
The virtual lab is fully fenced off from the production environment. The network configuration in the

ib
virtual lab mirrors the network configuration of the production environment.

tr
For example: If verified VMs are located in two logical networks in your production environment,

is
the virtual lab will also have two networks. The networks in the virtual lab will be mapped to
corresponding production networks.

D
or
e
at
lic
up
D
ot
N
o

Tip: You can optionally connect VMs to the same network in the virtual lab, even if corresponding
D

VMs in the production environment are connected to different networks.

VMs in isolated networks have the same IP addresses as in the production network. This lets VMs in
the virtual lab function just as if they would in the production environment.

Veeam Certified Engineer v9.5 . Textbook 161


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

Proxy Appliance

To enable communication between the production environment and the isolated networks in the
virtual lab, Veeam Backup & Replication uses a proxy appliance. The proxy appliance is a Linux-
based auxiliary VM created on the host where the virtual lab is created. The proxy appliance VM is
assigned an IP address from the production network and placed in the dedicated virtual lab folder and
resource pool created on the host.

e
ut
ib
tr
is
D
or
e
at
lic

The proxy appliance is connected to the production network and to the isolated network so it has
visibility of the production environment and the virtual lab. In essence, the proxy appliance acts as a
up

gateway between the two networks, routing requests from the production environment to VM replicas
in the virtual lab.
D

The proxy appliance connects to isolated networks using network adapters.


Veeam Backup & Replication adds to the proxy appliance one network adapter per each isolated
network.
ot
N

For example: If there are two networks in the virtual lab, Veeam Backup & Replication will add
two network adapters to the proxy appliance. The network adapter gets an IP address from the
o

isolated network. Typically, this IP address is the same as the IP address of the default gateway in
the corresponding production network.
D

Note: The proxy appliance is an optional component. Technically, you can create a virtual lab
without a proxy appliance. However, in this case, you will not be able to perform automatic
recovery verification of VMs. VMs will be simply started from backups in the virtual lab; you will
have to access them using the VM console and perform necessary tests manually.

162 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

IP Masquerading

To let the traffic into the virtual lab, Veeam Backup & Replication uses masquerade IP addressing .
Every VM in the virtual lab has a masquerade IP address, along with the IP address from the
production network. The masquerade IP address resembles the IP address in the production network:
for example, if the IP address of a VM is 172.16.1.13, the masquerade IP address may be
172.18.1.13.

The masquerade IP address can be thought of as an entry point to the VM in the virtual lab from the

e
production environment. When you want to access a specific VM in the virtual lab,

ut
Veeam Backup & Replication addresses it by its masquerade IP address.

ib
tr
is
D
or
e
at
lic
up
D

The rules routing requests to VMs in the virtual lab are specified in the routing table on the server
from which you want to access VMs in the virtual lab. The routing table can be updated on the
ot

following servers:
N

Veeam backup server. Veeam Backup & Replication automatically creates the necessary static
route in the routing table on the Veeam backup server the moment you launch a SureBackup
job and Veeam Backup & Replication starts the virtual lab.
o

Client machine. If you want to provide your users with access to VMs in the virtual lab, you
D

need to manually update routing tables on their machines and add a new static route.

The added static route destines the masquerade network traffic to the proxy appliance. The proxy
appliance here acts as a NAT device: it resolves the masquerade IP address, replaces it with the
“real” IP address of a VM from the production network and then directs the request to the necessary
VM in the virtual lab. The static route is non-persistent: when you power off the virtual lab, the route is
removed from the routing table on the Veeam backup server or client machine.

Veeam Certified Engineer v9.5 . Textbook 163


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

e
ut
ib
tr
is
D
or
e
For example: When trying to access a VM with IP address 172.16.10.10 in the isolated network
during recovery verification, Veeam Backup & Replication sends a request to the masquerade IP
at

address 172.18.10.10.
According to the routing rule added to the IP routing table, all requests are first sent to the next
lic

hop – the proxy appliance. The proxy appliance performs address translation, substitutes the
masquerade IP address with the IP address in the isolated network, and forwards the request to
up

the necessary VM in the isolated network – in the given example, to 172.16.10.10.

Static IP Mapping
D

Sometimes it is necessary to provide many clients with access to a restored VM, especially for user-
ot

directed application item-level recovery.


N

For example: You may want to provide your users with access to the Exchange Server started in
o

the virtual lab using web-based access (like Outlook Web Access). Technically, you may update
the routing table on every client machine; however, this will demand a lot of administrative effort.
D

For such situations, Veeam Backup & Replication enables you to get access to a VM in the virtual lab
directly from the production environment. To be able to access to a VM in the virtual lab, you should
reserve a static IP address in the pool of production IP addresses and map this IP address to the IP
address of a VM in the virtual lab.

The static IP address is assigned to the proxy appliance network adapter connected to the production
network. IP traffic directed to the specified static IP address is routed by the proxy appliance to the

164 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

VM powered on in the isolated network.

e
ut
ib
tr
is
D
or
e
at

For example: For a VM with IP address 192.168.1.20 in the isolated network, you can reserve IP
address 192.168.1.99 (a free IP address from the production network). As a result, you will be able
lic

to use IP address 192.168.1.99 to access the VM in the virtual lab from the production side.
up

You can also register an alias record in the production DNS server for the reserved IP address. For
example, you can register backup.exchange.local as an alias for the IP address 192.168.1.99.
D

Virtual Lab Configuration


ot

For SureBackup recovery verification, Veeam Backup & Replication offers two types of the virtual lab
N

configuration:

Basic single-host virtual lab


o

Advanced single-host virtual lab


D

However, when verifying VM replicas that are located on different hosts, you cannot use the single-
host virtual lab configuration (either basic or advanced) as it has specific configuration limitations. So
for SureReplica recovery verification, Veeam Backup & Replication offers three types of the virtual lab
configuration:

Basic single-host virtual lab


Advanced single-host virtual lab
Advanced multi-host virtual lab

Veeam Certified Engineer v9.5 . Textbook 165


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

Basic Single-Host Virtual Labs

The basic single-host virtual lab (formerly known as the virtual lab with basic networking configuration)
should be used if all the VMs you want to verify, VMs from the application group, and the Veeam
backup server are connected to the same network.

For the basic single-host virtual lab, Veeam Backup & Replication creates one virtual network that is
mapped to the corresponding production network.

e
ut
ib
tr
is
D
or
e
at
lic

Advanced Single-Host Virtual Labs


up

The advanced single-host virtual lab (formerly known as the virtual lab with advanced networking
configuration) should be used if the VMs you want to verify and/or the VMs from the application group
D

are connected to different networks.

In the advanced single-host virtual lab, Veeam Backup & Replication creates several virtual networks
ot

for the virtual lab. The number of virtual networks corresponds to the number of production networks
to which verified VMs are connected. Networks in the virtual lab are mapped to corresponding
N

production networks.

When you create an advanced single-host virtual lab, Veeam Backup & Replication configures basic
o

settings for networks that should be created in the virtual lab. You need to review these settings and
D

manually adjust them if needed.

166 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

e
ut
ib
tr
is
D
Limitations of Single-Host Virtual Labs (VMware) or
If VM replicas are located on different hosts, you cannot use the single-host virtual lab configuration
(either basic or advanced). A single-host virtual lab, both basic and advanced, uses standard
e
vSwitches (vSS) that have specific configuration limitations.
at

When you create or edit a virtual lab, Veeam Backup & Replication creates a new port group for each
isolated network in the virtual lab. All VMs from the isolated network are added to this port group.
lic

Such configuration helps differentiate the traffic passing through the VSS to the isolated network in
the virtual lab.
up

However, the VSS has a specific restriction: it is “limited” to a certain ESX(i) host. A VSS is configured
on a specific ESX(i) host. The configuration of the VSS, such as information about port groups,
resides on the ESX(i) host where it is configured. Other ESX(i) hosts in the virtual environment do not
D

have access to this information.


ot
N
o
D

Therefore, the single-host configuration can only be used if all VM replicas are registered on the same
ESX(i) host. If you start VM replicas registered on different ESX(i) hosts in the single-host virtual lab,
VMs from different port groups will not be able to “see” each other and communicate with each other.

Veeam Certified Engineer v9.5 . Textbook 167


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

Advanced Multi-Host Virtual Labs (VMware)

The advanced multi-host virtual lab configuration should be used if your DR site is configured in the
following way:

All VM replicas you want to verify are located on the different ESX(i) hosts
VM replicas you want to verify are connected to one or several networks

e
Note: DVS is limited to one datacenter. For this reason, all verified VM replicas and VM replicas

ut
from the application group that you plan to start in the virtual lab must belong to the same
datacenter. If VM replicas belong to different datacenters, you will still be able to start them in the

ib
virtual lab, but Veeam Backup & Replication will not be able to automatically verify them with
SureBackup.

tr
To verify VM replicas registered on different ESX(i) hosts, you should use the advanced multi-host

is
configuration of the virtual lab. The advanced multi-host virtual lab leverages the VMware Distributed
vSwitch (DVS) technology.

D
or
e
at
lic
up

When you configure an advanced multi-host virtual lab, you should select an ESX(i) host on which the
D

proxy server will be created and a DVS on which Veeam Backup & Replication will create isolated
network(s). Veeam Backup & Replication does not offer an option to automatically configure the DVS.
The DVS you plan to use must be pre-configured in your virtual environment.
ot

The DVS port groups created on the DVS must be isolated from the production environment. To
N

isolate port groups, you can use one of the following methods:

1. Connect DVS uplinks to an isolated network. You can link the DVS you plan to use for recovery
o

verification to an external, isolated network using uplink adapters. Note that these network
D

configurations must be performed manually by the backup administrator.


2. Use VLAN tagging. This method can be used only if your router supports VLAN ID tagging.
When specifying settings for isolated networks in Veeam Backup & Replication, you can define
different VLAN IDs for different isolated networks. Setting VLAN IDs restricts communication of
VM replicas in the isolated network with the production environment.
If your network does not support VLAN ID tagging or the virtual lab is configured incorrectly, VM
replicas will be started in the virtual lab but Veeam Backup & Replication will not be able to
automatically verify them.

168 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

With Veeam Backup & Replication, you can optionally connect VMs from different production
networks to one network in the isolated virtual lab. In this case, all VM replicas in the virtual lab will be
started in the same network.

7.1.6. SureBackup Job


A SureBackup job is a task for VM backup recovery verification. The SureBackup job aggregates all
the settings and policies of a recovery verification task, such as the application group and virtual lab,

e
VM backups that should be verified in the virtual lab, and so on. The SureBackup job can be run

ut
manually or be scheduled to run automatically.

When a SureBackup job runs, Veeam Backup & Replication first creates an environment for VM

ib
backup verification:

tr
1. Veeam Backup & Replication starts the virtual lab.
2. In the virtual lab, it starts VMs from the application group in the required order. VMs from the

is
application group remain running until the verified VMs are booted from backups and tested. If
Veeam Backup & Replication does not find a valid restore point for any of VMs from the

D
application group, the SureBackup job will fail.
3. Once the virtual lab is ready, Veeam Backup & Replication starts verified VMs from the
or
necessary restore point, tests and verifies them one by one or, depending on the settings,
creates several streams and tests a number of VMs simultaneously. If
Veeam Backup & Replication does not find a valid restore point for any of the verified VMs,
e
verification fails, but the job continues to run.
at

By default, when using the Linked Jobs option in a SureBackup job, you can start and test up to
three VMs at the same time. You can also increase the number of VMs to be started and tested
lic

simultaneously. Keep in mind that if these VMs are resource-intensive, performance of the
SureBackup job as well as performance of the ESX(i) host holding the virtual lab may decrease.
up

Once the verification process is complete, VMs from the application group are powered off.
Optionally, you can leave the VMs from the application group running to perform manual testing or
D

enable user-directed application item-level recovery. This should be indicated when you configure a
SureBackup job.
ot

Note: In some cases, the SureBackup job schedule may overlap with the schedule of the backup
N

job linked to it. The backup file may be locked by the backup job and the SureBackup job will be
unable to verify it. In this situation, Veeam Backup & Replication will not start the SureBackup job
o

until the corresponding backup job is over. To overcome job overlapping, you may chain the
backup and SureBackup jobs.
D

SureBackup Job Processing

The recovery verification process includes the following steps:

1. Getting virtual lab configuration. Veeam Backup & Replication gets information about the
configuration of the virtual lab where verified VMs should be started.

Veeam Certified Engineer v9.5 . Textbook 169


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

2. Starting the virtual lab routing engine. Veeam Backup & Replication starts a proxy appliance
used as a gateway to provide access to the virtual lab.
3. Publishing. Veeam Backup & Replication creates an NFS datastore with a VM backup and
registers it on the selected ESX server. Veeam Backup & Replication does not deploy the
whole VM from the backup file, it deploys VM configuration files only. Virtual disks are deployed
per force and per required data blocks.
4. Reconfiguring. Veeam Backup & Replication updates configuration files for VMs that should be
run in the isolated network.
5. Registering. Veeam Backup & Replication registers the verified VM on the selected ESX(i) host.

e
6. Configuring DC. If a verified VM has the Domain Controller or Global Catalog role, the VM is

ut
reconfigured.
7. Powering on. Veeam Backup & Replication powers on the verified VM in the isolated network
(using the order of priority as specified in the application group settings).

ib
8. Running the heartbeat test. Veeam Backup & Replication checks whether or not the VMware
Tool/Hyper-V Integration Services s heartbeat signal (green or yellow) is coming from the VM. If

tr
the VM has no VMware Tools, the test will not be performed, and a notification will be written in
the session details.

is
9. Running ping tests. Veeam Backup & Replication checks if the VM responds to the ping
requests. If the VM has no NICs and mapped networks for them and/or has no VMware

D
Tools/Hyper-V Integration Services installed, the ping test will not be performed, and a
notification will be written in the session details.
or
10. Application initialization. Veeam Backup & Replication waits for the applications installed in the
VM (for example, SQL Server, web server, mail server) to start. The application initialization
period is defined in the corresponding properties of the SureBackup job, and by default equals
e
to 120 sec. However, depending on the software installed in a VM, the application initialization
at

process may require more time than specified in the SureBackup job settings. If applications
installed in a VM are not initialized within the specified period of time, test scripts can be
lic

completed with errors. If such an error situation occurs, you will need to increase the application
initialization timeout value and start the job once again.
11. Running test scripts. Veeam Backup & Replication runs scripts to test whether or not the
up

applications installed in the VM is working correctly. If the VM has no VMware Tools/Hyper-V


Integration Services installed and/or there are no NICs and mapped networks for them, Veeam
Backup & Replication will skip tests that use variables %vm_ip% and %vm_fqdn% as the IP
D

address and fully qualified domain name of the VM cannot be determined.


12. Powering off. After all tests have been performed, Veeam Backup & Replication powers off the
ot

verified VM.
13. Unregistering. Veeam Backup & Replication unregisters the verified VM on the selected ESX(i)
host.
N

14. Clearing redo logs. Veeam Backup & Replication deletes redo logs from the datastore in the
production environment. Redo logs store changes made to the VM while it is running from the
o

backup file.
15. Unpublishing. Veeam Backup & Replication unpublishes the content of the backup file on the
D

ESX(i) host.
16. Running backup validation test. After a VM has been verified, powered off and
unpublished, Veeam Backup & Replication runs a CRC check to verify the VM backup at the file
level and make sure that this file is not corrupted.
17. Stopping virtual lab engine. Veeam Backup & Replication powers off the proxy appliance in the
virtual lab.
18. Deleting network routes. Veeam Backup & Replication deletes added network routes from the
routing table on the backup server.

170 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

Stabilization Algorithm

In order to perform tests for a verified VM without errors, Veeam Backup & Replication needs to know
that the VM is ready for testing. To determine this, Veeam Backup & Replication waits for the VM to
reach a stabilization point: that is, it waits for the VM to boot completely and report it is ready for tests.
After the stabilization point has been established, Veeam Backup & Replication can start performing
heartbeat tests, ping tests and running test scripts against the VM.

Veeam Backup & Replication establishes the stabilization point with the help of the VMware

e
parameters that it gets from the VM. It can use one of three algorithms to do that, depending on the

ut
VM configuration:

Stabilization by IP. This algorithm is used if the VM has VMware Tools installed and there are

ib
NICs and mapped networks for these NICs. In this case, Veeam Backup & Replication waits for
the IP address of the VM for mapped networks, which is sent by VMware Tools running in the

tr
VM. The sent IP address should be valid and should not change for a specific period of time.

is
Stabilization by heartbeat. This algorithm is used if the VM has VMware Tools installed but
there are no vNICs or mapped networks for them. In this case Veeam Backup & Replication

D
waits for a corresponding heartbeat signal (green or yellow) to come from the VM. Just like in
the first case, the signal is sent by VMware Tools running in the VM.
Stabilization by Maximum allowed boot time. This algorithm is used if the VM has neither
or
VMware Tools installed, nor NICs and mapped networks for them. In this case, Veeam Backup
& Replication will simply wait for the time specified in the Maximum allowed boot time field,
which is considered to be a stabilization period for the VM. Once this time interval is exceeded,
e
Veeam Backup & Replication will consider that the VM is successfully booted and is ready for
at

testing.

Veeam Backup & Replication establishes a stabilization point with the help of the Hyper-V parameters
lic

that it gets from the VM. Depending on the VM configuration, it uses one of the four algorithms:
up

Stabilization by IP. This algorithm is used if the VM has network adapters and there are
mapped networks for these network adapters. In this case, Veeam Backup & Replication waits
for an IP address of the VM for mapped networks that is sent by Hyper-V Integration Services
D

running in the VM or by the Hyper-V host via the proxy appliance. The sent IP address must be
valid and must not change for a specific period of time. For more information, see Recovery
Verification Tests.
ot

Stabilization by heartbeat. This algorithm is used if the VM has Hyper-V Integration Services
installed but there are no network adapters and mapped networks for them. In this case, Veeam
N

Backup & Replication waits for a heartbeat signal from Hyper-V Integration Services installed
inside the VM.
o

Hybrid heartbeat/IP algorithm. Veeam Backup & Replication uses both the heartbeat signal (if
available) and an IP of the VM to stabilize the VM boot process.
D

Stabilization by Maximum allowed boot time. This algorithm is used if the VM has neither
Hyper-V Integration Services installed, nor network adapters and mapped networks for them. In
this case, Veeam Backup & Replication simply waits for the time specified in the Maximum
allowed boot time field, which is considered to be a stabilization period for the VM. Once this
time interval is exceeded, Veeam Backup & Replication considers that the VM is successfully
booted and is ready for testing.

Veeam Certified Engineer v9.5 . Textbook 171


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

7.1.7. Manual Recovery Verification


Beside automatic recovery verification, you can perform manual verification of VM backups. Manual
verification can be performed with all editions of Veeam Backup & Replication.

Boot Test

To perform a VM boot test, perform Instant VM Recovery for the verified VM. Power on the VM but do
not connect the VM to the production network to avoid conflicts with the original VM.

e
ut
Application Test

To perform an application test:

ib
1. Create an isolated network.

tr
2. Use the Instant VM Recovery wizard to restore the verified VM. At the Ready to Apply step of
the wizard, clear the Connect VM to network check box.

is
3. When the VM is started, connect it to the isolated network.

D
The same procedure must be performed for all VMs that run applications on which the verified VM is
dependent such as domain controller and DNS. All VMs must be connected to the same isolated
or
network and started in the correct order: for example, DNS > domain controller > verified VM.
e
7.2. SureReplica Recovery Verification
at

To guarantee recoverability of your data, Veeam Backup & Replication complements the SureBackup
lic

recovery verification technology with SureReplica. SureReplica is similar to the SureBackup recovery
verification in many respects. It lets you validate your DR environment without impacting the
production infrastructure: you can automatically verify every created restore point of every VM replica
up

and ensure that they are functioning as expected when you set up a SureReplica recovery verification
to be triggered automatically after a replica job creates a new restore point.
D

Important! SureReplica is only available for VMware vSphere - it is not available for Microsoft
ot

Hyper-V.
N

The SureReplica technology is not limited only to VM replica verification and, similar to SureBackup,
provides the following capabilities:
o

Capability Purpose
D

SureReplica Automated VM replica verification

An isolated environment for testing VM replicas, training and


On-Demand Sandbox
troubleshooting

U-AIR Recovery of individual items from applications running on VM replicas

172 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

Note: As there is no need to publish the VM from the backup file, the SureReplica processing is
typically faster than SureBackup. Correspondingly, the U-AIR and On-Demand Sandbox
operations are faster, too.

The procedure of the VM replica verification is the following:

Step Action Notes

All changes made to the

e
Veeam Backup & Replication triggers a protective snapshot for
1 VM replica are written to

ut
a VM replica.
delta files.

ib
Veeam Backup & Replication starts the VM replica in the
2
isolated virtual environment.

tr
Veeam Backup & Replication performs a number of tests
3

is
against the verified VM replica.

D
When the verification process is over,
Veeam Backup & Replication: The report is sent to the
4 1. Removes delta files from the VM replica snapshot backup administrator by
2. Powers off the VM replica
or email.
3. Creates a report on its state
e
at

Note: Veeam Backup & Replication verifies only VM replicas that are in the Normal state. If a VM
replica is in the Failover or Failback state, the verification process will fail. When
lic

Veeam Backup & Replication verifies the VM replica, it puts the VM replica to the SureBackup
state. You cannot perform failback or failover operations for a VM replica in the SureBackup state
until the recovery verification or U-AIR process is over and the VM replica returns to
up

the Normal state.


D

To perform VM replica verification, the same wizard is used as for backup verification. You need to
create the following similar entities:
ot

Application Group Virtual Lab SureBackup Job


N

The virtual lab is an


isolated virtual
During recovery verification, the VM
environment in which The SureBackup job is a task
o

replica is started with VMs on which


the VM replica and VMs which runs the replica
the VM replica is dependent. This
D

from the application verification process. This kind


enables full functionality of
group are started and of SureBackup job is often
applications running inside the VM
tested. referred to as a SureReplica
replica and allows you to start
SureReplica leverages job. It can be run manually or
required applications just like in the
the virtual lab scheduled to run automatically.
production environment.
technology to verify the
VM replica.

To verify a VM replica started in the virtual lab, you can run Veeam’s predefined tests or perform your

Veeam Certified Engineer v9.5 . Textbook 173


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

own tests against VMs.

The predefined tests include the following:

Heartbeat test Ping test Application test

As soon as the VM
When As soon as the VM As soon as applications inside
replica is started
performed replica is started the VM replica are started
(after heartbeat test)

e
Waits for a heartbeat

ut
signal from VMware
Sends ping requests
Tools installed inside Runs a script that checks
to the VM replica
How it works the VM to determine application-specific network

ib
started in the virtual
that the guest OS ports
lab
inside the VM replica

tr
is running

is
It depends on the application-
If the VM replica can
Passed: The yellow specific script.

D
respond to ping
How results and green signals For example, to verify a Domain
requests from the
are display. Controller, Veeam Backup &
Veeam backup
measured Failed: The red signal Replication probes port 389 for a
or
server, the test is
displays. response. If the response is
passed.
received, the test is passed.
e
You must have VMware Tools installed inside the VM being verified. Otherwise all
at

Notes tests will be skipped; Veeam Backup & Replication will display a warning in the
SureBackup job session results.
lic

Beside these predefined tests, you can use custom scripts to verify the VM replica.
up

7.3. On-Demand Sandbox


D

If you need to perform tests for production VMs, you can create and use an On-Demand SandboxTM.
The On-Demand Sandbox is an isolated virtual environment where you can start one or more VMs
ot

from backups, VM replicas or VMs from storage snapshots. You can use the On-Demand Sandbox to
perform the following tasks:
N

Troubleshoot problems with VMs


o

Test software patches and upgrades


Install new software
D

To create the On-Demand Sandbox, you must configure the following objects:

A virtual lab in which VMs will be started.


An application group. The application group must include all VMs and/or VM replicas that you
want to start in the On-Demand Sandbox. This can be one VM or a group of VMs that work
together. Veeam Backup & Replication supports mixed application groups. You can add to the
same application groups both VMs from backups and VMs from replicas. Keep in mind that all

174 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

VMs from the application group must belong to the same platform – VMware or Hyper-V, and
must have at least one valid restore point created by the time the SureBackup job starts.
A SureBackup job. The virtual lab and application group must be linked to this job.

The difference between using these three entities for automated verification purposes and for On-
Demand Sandbox purposes is that for On-Demand sandbox purposes you should enable the Keep
the application group running once the job completes check box when configuring a SureBackup job.
With this option enabled, the lab will not be powered off when the SureBackup job completes and you
will be able to manually test VMs started in the virtual lab.

e
You can also choose to move the VMs straight to production from the Virtual Lab (e.g if the upgrade

ut
works as expected) with a one time replication job.

ib
Note: The source backup or replication job has a higher priority than the SureBackup job. If a

tr
backup or replication job starts when the SureBackup job is running, and this job requires to
modify the restore point from which the VM is started (i.e create a new snapshot on the replica, or

is
perform a transform operation), Veeam Backup & Replication automatically powers off VMs in the
virtual lab and terminates the SureBackup job.

D
or
e
at
lic
up
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 175


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

176 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

Labs for Module 7: Verification

After completing the theoretical part of Module 7: Verification, you are familiar with configuring an
application group, Virtual Lab and SureBackup jobs, and you can name the interactions that happen
throughout the backup or replica verification.

It’s time to try out setting up the reviewed validation processes in the lab.

e
ut
ib
Get into the Lab

tr
Lab Action Purpose

is
Familiarize yourself with the components that you
Preparing the need to create in the interface so that you can
7.1

D
infrastructure automatically validate VM backups without affecting
the production infrastructure.
or
Configure a backup verification process for one of
7.2 Using SureBackup
the VMs of the infrastructure.
e
Verify a replica of a VM to review the specifics of the
at

7.3 Using SureReplica process, especially when compared with the backup
verification.
lic
up
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 177


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 7: Verification

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

178 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 8: Introduction to Agents

8. Introduction to Agents
If you have the Veeam backup infrastructure deployed in the production environment, you
can use Veeam Agent for Microsoft Windows together with Veeam Backup & Replication.

The subsequent sections describe tasks available for Veeam Agent for Microsoft Windows
operating in the standalone mode. For information about Veeam Agent management in
Veeam Backup & Replication, see the Veeam Agent Management Guide at:

e
https://www.veeam.com/documentation-guides-datasheets.html.

ut
If you plan to use Veeam Agent for Microsoft Windows with Veeam Backup & Replication,
you must install Veeam Backup & Replication 9.5 Update 3 or later on the Veeam backup

ib
server.

tr
8.1. Why agents?

is
D
Extending Availability to Microsoft Windows and Linux workloads
Delivering Availability for physical and cloud-based servers and workstations — on-premises or
remote — presents challenges all organizations must overcome, including:
or
Cumbersome and expensive processes involved in backing up and recovering Windows and
Linux instances that reside in the cloud
e
Catering to complex hardware configurations or regulatory compliance requirements when
at

providing robust backup for physical servers and workstations that cannot be virtualized
Providing low RPOs for roaming laptops and tablets belonging to traveling users and those in
lic

home offices

What’s more, everyday occurrences such as lapses in connectivity, hardware failures, file corruption
up

— even ransomware or theft — can leave an organization’s data at risk.

Veeam Agents for Microsoft Windows and Linux solve these challenges by enabling you to:
D

Reduce cost and complexity while ensuring Availability for Windows and Linux instances in the
cloud
ot

Achieve Availability for physical servers and workstations that cannot be virtualized
Meet RPOs and reduce the risk of data loss for desktops, laptops and tablets outside of the
N

corporate network.
o

8.2. Veeam Agents for Microsoft Windows


D

Free Workstation Server

Instant Recovery to Microsoft Hyper-V VM X X X

Direct Restore to Microsoft Azure X X X

Source-side encryption X X X

Endpoint protection for mobile users X X

Veeam Certified Engineer v9.5 . Textbook 179


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 8: Introduction to Agents

Free Workstation Server

Back up directly to Veeam Cloud Connect X X

Remote configuration and management API X X

Application-aware processing X

Transaction log backup for databases X

Guest file indexing and search X X

e
24.7.365 technical support

ut
8.3. Veeam Agents for Linux

ib
Free Workstation Server

tr
Entire computer, volume-level and file-level image-
X X X
based backup

is
Built-in volume snapshot and changed block
X X X
tracking drivers

D
File-level, volume-level and bare metal recovery
X X X
(same or different hardware)
Backup and recovery using console UI or command
X X X
line
or
Integration with Veeam Backup & Replication X X X

Support for multiple jobs X


e
Pre-freeze/post-thaw snapshot scripts for
X
at

application processing
Guest file indexing, catalog search and restore with
X
Veeam Backup Enterprise Manager
lic

24.7.365 technical support X X


up

8.4. Veeam Agent Management


D

Starting from version 9.5 Update 3, you can use Veeam Backup & Replication to manage Veeam
Agent for Microsoft Windows on computers in your infrastructure. As part of the Veeam Agent
management scenario, you can remotely deploy Veeam Agent for Microsoft Windows to your
ot

computers, as well as configure and manage Veeam Agent backup jobs in Veeam Backup &
Replication.
N

You can store backup files created with Veeam Agent for Microsoft Windows and Linux on backup
repositories managed by Veeam Backup & Replication. To do this, you must select a backup
o

repository as a target location in the properties of the Veeam Agent backup job. To store Veeam
D

Agent backups, you can use a simple backup repository or a scale-out backup repository.

Veeam Agent works with the backup repository as with any other target location. Backup files are
stored to a separate folder; you can perform standard restore operations using these files.

Information about Veeam Agent backups stored on the backup repositories, backup jobs and
sessions becomes available in the Veeam Backup & Replication console:

The Veeam Agent backup job is displayed in the list of jobs in Veeam Backup & Replication.

180 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 8: Introduction to Agents

Backup files created with Veeam Agent are displayed in the list of backups, under
the Backups > Disk node.
Performed job sessions are available in the History view of Veeam Backup & Replication.

Backup administrators working with Veeam Backup & Replication can perform a set of operations with
Veeam Agent backups:

Perform data protection operations: copy Veeam Agent backups to secondary backup
repositories and archive these backups to tape.

e
Perform restore operations: restore individual files and folders, application items from Veeam
Agent backups; restore computer disks and convert them to the VMDK, VHD or VHDX format;

ut
restore Veeam Agent backups to Microsoft Azure or to Hyper-V VMs.
Perform administrative tasks: disable and delete Veeam Agent backup jobs, remove Veeam

ib
Agent backups and so on.

tr
8.5. Protection Groups

is
D
8.5.1. Creating Protection Groups or
You must add computers that you plan to protect with Veeam Agents to the inventory in the Veeam
Backup & Replication console. In Veeam Backup & Replication, protected computers are organized
into protection groups. You can create one or more protection groups that contain computers of
e

different types or offer different discovery and deployment options.


at
lic

Important! If you do not want to create protection groups, for example, if you plant to manage only
a small number of computers in your infrastructure, you can add the necessary computers directly
to a Veeam Agent backup job. Veeam Backup & Replicationwill automatically add such computers
up

to the Manually Added protection group


D

Use the New Protection Group wizard to configure a protection group.

1. Launch the New Protection Group wizard.


ot

2. Specify protection group name and description.


3. Select protection group type.
N

4. Specify protection scope for the protection group.


5. Exclude objects from the protection group.
o

6. Specify credentials.
7. Specify discovery and deployment options.
D

8. Review components.
9. Assess results.
10. Finish working with the wizard.

8.5.2. Protection Group Types


You can select one of the following types:

Veeam Certified Engineer v9.5 . Textbook 181


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 8: Introduction to Agents

Individual computers — select this option if you want to define a static protection scope by
adding specific computers to the protection group. This option is recommended for smaller
environments that do not have Microsoft Active Directory deployed. With this option selected,
you will pass to the Computers step of the wizard.
Microsoft Active Directory objects — select this option if you want to add to the protection group
one or several Active Directory objects: entire domain, container, organization unit, group,
computer or cluster. Protection groups that include Active Directory containers and/or
organization units are dynamic in their nature. If a new computer is added to a container or
organization unit that you have specified in the protection group settings, during the next

e
discovery session, Veeam Backup & Replication will discover this computer and (optionally)

ut
deploy Veeam Agent on this computer. With this option selected, you will pass to the Active
Directory step of the wizard.
Computers from CSV file — select this option if you want to add to the protection scope

ib
computers listed in a CSV file that resides in a local folder on the backup server or in a network
shared folder. As well as protection groups that include Active Directory containers, protection

tr
groups of this type are also dynamic. If a new computer appears in a CSV file after the
protection job is created, within the next discovery session, Veeam Backup & Replication will

is
automatically update the protection group settings to include the added computer. With this
option selected, you will pass to the CSV File step of the wizard.

D
or
Important! You can add a Microsoft failover cluster to a protection group based on Microsoft
Active Directory objects only. To do this, you must select the Microsoft Active Directory
objects option and then add a cluster account or an AD object containing this account at the Active
e
Directory step of the wizard.
at

8.5.3. Protection Scope


lic

Specify protection scope for the created protection group:


up

Specify computers — if you have selected the Individual computers option at the Type step of
the wizard.
D

Specify Microsoft Active Directory objects — if you have selected the Microsoft Active Directory
objects option at the Type step of the wizard. If you want to include a large number of
ot

computers in the protection group but do not want to use an account with domain administrator
permissions in the protection group settings, consider configuring a protection group based on a
list of computers imported from a CSV file.
N

Specify a CSV file — if you have selected the Computers from CSV file option at the Type step
of the wizard.
o

Note: After you finish configuring the protection group, Veeam Backup & Replication will
D

perform discovery of computers listed in the CSV file upon schedule defined in the
protection group settings. If Veeam Backup & Replication is unable to read the CSV file (for
example, after the file was moved or deleted from the specified location), the discovery job
will use the list of computers imported from the CSV file during the previous discovery job
session.

182 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 8: Introduction to Agents

8.5.4. Discovery and Deployment Options


Veeam Backup & Replication regularly connects to protected computers according to the schedule
defined in the protection group settings. At this step of the wizard, you can define the discovery
schedule and specify operations that Veeam Backup & Replication must perform on discovered
computers. You can also select which server in your backup infrastructure should act as a distribution
server for Veeam Agents.

To specify discovery and deployment options:

e
ut
1. In the Discovery section, define schedule for automatic computer discovery within the scope of
the protection group:
1. To run the discovery job at specific time daily, on defined week days or with specific

ib
periodicity, select Daily at this time. Use the fields on the right to configure the necessary
schedule.

tr
2. To run the discovery job repeatedly throughout a day with a specific time interval,

is
select Periodically every. In the field on the right, select the necessary time
unit: Hours or Minutes. Click Schedule and use the time table to define the permitted time

D
window for the discovery job. In the Start time within an hour field, specify the exact time
when the job must start.
3. To run the discovery job continuously, select the Periodically every option and
or
choose Continuously from the list on the right. A new discovery job session will start as
soon as the previous discovery job session finishes.
2. In the Deployment section, from the Distribution server list, select a Microsoft Windows server
e
that you plan to use as a distribution server. Veeam Backup & Replication will use the
at

distribution server to upload Veeam Agent setup archives to computers added to the protection
group. By default, Veeam Backup & Replication assigns the distribution server role to the
lic

backup server. To learn more, see Distribution Server.


3. If you want to instruct Veeam Backup & Replication to automatically deploy Veeam Agents on
all discovered computers in the protection group, in the Deployment section, make sure that
up

the Install backup agent automatically check box is selected.


You can also choose to disable automated Veeam Agent installation. In this case, you will need
to install Veeam Agent on every computer included in the protection group and discovered
D

by Veeam Backup & Replication.


4. If you want to instruct Veeam Backup & Replication to automatically upgrade Veeam Agent on
ot

discovered computers when a new version of Veeam Agent appears on the distribution server,
in the Deployment section, make sure that the Auto-update backup agent check box is
selected.
N

5. [For protection groups that include Microsoft Windows servers] Select the Install changed block
tracking driver on Windows Server OS check box if you want to install the advanced changed
o

block tracking (CBT) driver on servers protected with Veeam Agent for Microsoft Windows. To
learn more, see the Veeam Changed Block Tracking Driver section in Veeam Agent for
D

Microsoft Windows User Guide


at: https://www.veeam.com/documentation-guides-datasheets.html.
If you included workstations and servers in the created protection group, Veeam Backup &
Replication will install the Veeam CBT driver on servers only.
6. Select the Perform reboot automatically if required check box to allow Veeam Backup &
Replication to reboot a protected computer. In particular, the reboot operation is required as
part of the Veeam CBT driver installation process.

Veeam Certified Engineer v9.5 . Textbook 183


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 8: Introduction to Agents

Note: You cannot create a protection group without defining schedule for automatic discovery.
However, you can disable automatic discovery for a specific protection group, if needed.

8.6. Agent Jobs


Creating Veeam Agent Backup Jobs
To back up data of your protected computers, you must configure a Veeam Agent backup job

e
in Veeam Backup & Replication. The Veeam Agent backup job defines how, where and when
to back up data. In Veeam Backup & Replication, you can create Veeam Agent backup jobs of

ut
the following types:

ib
Backup job that runs on the backup server in the similar way as a regular job for VM data
backup. The backup job is intended for protected computers that have permanent

tr
connection to the backup server. One job can be used to process one or more protection
groups and/or individual computers.

is
Backup policy that describes configuration of individual Veeam Agent backup jobs running

D
on protected computers. The backup policy helps speed up the process of configuring
backup job settings on protected computers that may have limited connection to the backup
server. Settings from a backup policy can be applied to one or more individual computers or
or
computers added to the inventory as a part of a protection group.
Veeam Backup & Replication lets you create Veeam Agent backup jobs of both types (the
backup job itself and backup policy) for the following types of protected computers:
e
at

Microsoft Windows computers — computers protected with Veeam Agent for Microsoft
Windows
lic

Linux computers — computers protected with Veeam Agent for Linux


If a protection group contains Microsoft Windows computers and Linux computers, you can
add this protection group to a Veeam Agent backup job intended for any of these types of
up

protected computers. Veeam Backup & Replication will automatically exclude computers of
another type from the backup job and processes only those computers that run an OS of the
same type.
D

For example, if you add a protection group that contains Microsoft Windows and Linux
ot

computers to a Veeam Agent backup job intended for Linux computers, Veeam Backup &
Replication will exclude Microsoft Windows computers from this backup job and process
N

only Linux computers within the job.


o

8.6.1. Agent for Windows Job Modes


D

Specify protection settings for the backup job:

1. Select the type of protected computers that you want to add to the backup job.
2. If you choose to configure the backup job for servers, select the job mode that defines how the
backup job should be managed: by the backup server or by Veeam Agent running on a
protected computer.

184 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 8: Introduction to Agents

To specify protection settings:

1. In the Type field, select the type of protected computers that you want to add to the backup job.
The selected type defines what mode(s) will be available for the configured backup job and
what job settings will be available at subsequent steps of the wizard. You can select one of the
following types:

Workstation — select this option if you want to add to the backup job workstations or
laptops that reside in remote locations and may have limited connection to the backup
server. For workstations, Veeam Backup & Replication offers backup job settings similar

e
to the settings of the backup job available in the Workstation edition of Veeam Agent for

ut
Microsoft Windows.

ib
With this option selected, the backup job will be managed by Veeam Agents installed on
protected computers — you do not need to select the job mode.

tr
Server — select this option if you want to add to the backup job standalone servers that

is
have permanent connection to the backup server. For servers, Veeam Backup &
Replication offers backup job settings similar to the settings of the backup job available in

D
the Server edition of Veeam Agent for Microsoft Windows.

With this option selected, you can also select the job mode.
or
Failover cluster — select this option if you want to add a failover cluster to the backup job.
For failover clusters, Veeam Backup & Replication offers the same backup job settings as
e
for servers. With this option selected, the backup job will be managed by the Veeam
at

backup server — you do not need to select the job mode.

2. If you have chosen to configure the backup job for servers, in the Mode field, select the job
lic

mode:

Managed by backup server — with this option selected, you will be able to configure a
up

Veeam Agent backup job itself. A Veeam Agent backup job configured in Veeam Backup
& Replication within the Veeam Agent management scenario is in many ways similar to a
regular job for VM data backup. You can add one or more individual computers and/or
D

protection groups to the job and instruct Veeam Backup & Replication to create Veeam
Agent backups in a Veeam backup repository.
ot

When you create a Veeam Agent backup job managed by the backup server, Veeam
Backup & Replication saves the job settings in its database. Veeam Backup &
N

Replication performs all management tasks for the Veeam Agent backup job: starts a job
upon the defined schedule, allocates backup infrastructure resources, and so on. Veeam
o

Agents running on protected computers perform data backup operations only, such as
creating a VSS snapshot, reading the backed-up data and transferring backed-up data to
D

the target location.

To manage a Veeam Agent backup job of this type, you can use the Veeam Backup &
Replication console only. The Veeam Agent control panel is not available on a computer
that is added to a Veeam Agent backup job managed by the backup server, and you
cannot perform operations with Veeam Agent directly on the protected computer.

This option is the only available option for failover clusters. It is also enabled by default

Veeam Certified Engineer v9.5 . Textbook 185


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 8: Introduction to Agents

for servers.

Managed by agent — with this option selected, you will be able to configure a backup
policy. A backup policy describes configuration of a Veeam Agent backup job, and acts
as a saved template. Backup policies speed up the process of configuring backup job
settings on protected computers: instead of specifying backup job settings manually on
each computer, you can apply settings from a backup policy to a group of computers at
once.

e
When you create a Veeam Agent backup job managed by Veeam Agent, Veeam Backup
& Replication saves the specified backup job settings to a configuration file on the backup

ut
server. After that, Veeam Backup & Replication applies these settings to create individual
backup jobs directly on Veeam Agent computers. On a Veeam Agent computer, backup

ib
job settings are saved to the Veeam Agent database. This allows Veeam Agent to
perform all backup job management and data processing tasks by itself even if a

tr
connection to the backup server is unavailable.

is
For computers specified in the backup policy, in addition to managing backup job settings
from the Veeam Backup & Replication console, you can also perform selected operations

D
directly on a protected computer. In particular, you can use the Veeam Agent control
panel to start the backup job manually and monitor backup statistics. This allows you
or
create backup of your data in case the protected computer has no connection to the
backup server.

This option is the only available option for workstations. You can also select this option
e

for servers.
at
lic

8.6.2. Agent for Linux Job Modes


up

Specify protection settings for the backup job:

1. Select the type of protected computers that you want to add to the backup job
2. If you choose to configure the backup job for servers, select the job mode that defines how the
D

backup job should be managed: by the backup server or by Veeam Agent installed on a
protected computer.
ot

To specify protection settings:


N

1. In the Type field, select the type of protected computers that you want to add to the backup job.
The selected type defines what settings will be available for the configured backup job and the
o

job mode. You can select one of the following types:


D

Workstation — select this option if you want to add to the backup job Linux-based
workstations or laptops that reside in remote locations and may have limited connection
to the backup server. For workstations, Veeam Backup & Replication offers backup job
settings similar to the job settings available in Veeam Agent for Linux operating in
the Workstation mode.

With this option selected, the backup job will be managed by Veeam Agents installed on
protected computers — you do not need to select the job mode.

186 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 8: Introduction to Agents

Server — select this option if you want to add to the backup job Linux-based servers that
have permanent connection to the backup server. For servers, Veeam Backup &
Replication offers backup job settings similar to the job settings available in Veeam Agent
for Linux operating in the Server mode.

With this option selected, you can also select the job mode.

2. If you have chosen to configure the backup job for servers, in the Mode field, select the job
mode:

e
Managed by backup server — with this option selected, you will be able to configure a

ut
Veeam Agent backup job itself. A Veeam Agent backup job configured in Veeam Backup
& Replication within the Veeam Agent management scenario is in many ways similar to a

ib
regular job for VM data backup. You can add one or more individual computers and/or
protection groups to the job and instruct Veeam Backup & Replication to create Veeam

tr
Agent backups in a Veeam backup repository.

is
When you create a Veeam Agent backup job managed by the backup server, Veeam
Backup & Replication saves the job settings in its database. Veeam Backup &

D
Replication performs all management tasks for the Veeam Agent backup job: starts a job
upon the defined schedule, allocates backup infrastructure resources, and so on. Veeam
Agents running on protected computers perform data backup operations only, such as
or
creating a volume snapshot, reading the backed-up data and transferring backed-up data
to the target location.
e
To manage a Veeam Agent backup job of this type, you can use the Veeam Backup &
at

Replication console only. The Veeam Agent UI is not available on a computer that is
added to a Veeam Agent backup job managed by the backup server, and you cannot
lic

perform operations with Veeam Agent directly on the protected computer.

This option is available for servers only.


up

Managed by agent — with this option selected, you will be able to configure a backup
policy. A backup policy describes configuration of a Veeam Agent backup job, and acts
D

as a saved template. Backup policies speed up the process of configuring backup job
settings on protected computers: instead of specifying backup job settings manually on
each computer, you can apply settings from a backup policy to a group of computers at
ot

once.
N

When you create a Veeam Agent backup job managed by Veeam Agent, Veeam Backup
& Replication saves the specified backup job settings to a configuration file on the backup
server. After that, Veeam Backup & Replication applies these settings to create individual
o

backup jobs directly on Veeam Agent computers. On a Veeam Agent computer, backup
D

job settings are saved to the Veeam Agent for Linux database. This allows Veeam Agent
to perform all backup job management and data processing tasks by itself even if a
connection to the backup server is unavailable.

For computers specified in the backup policy, in addition to managing backup job settings
from the Veeam Backup & Replication console, you can also perform selected operations
directly on a protected computer. In particular, you can use the Veeam Agent control
panel to start the backup job manually and monitor backup statistics. This allows you

Veeam Certified Engineer v9.5 . Textbook 187


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 8: Introduction to Agents

create backup of your data in case the protected computer has no connection to the
backup server.

This option is available for workstations and servers.

8.7. Administrative tasks

e
8.7.1. Enabling and Disabling Veeam Agent Backup Jobs

ut
You can disable and enable Veeam Agent jobs in Veeam Backup & Replication.

ib
When you disable the job, you prohibit the user to store the resulting backup to the backup repository.

tr
If the user starts a disabled job manually or the job starts by schedule, the job session will fail and
report the "The job has been disabled by the Veeam Backup & Replication administrator" error. To

is
let Veeam Agent for Microsoft Windows store backups to the backup repository again, you must
enable the disabled job.

D
To disable or enable the scheduled backup job in Veeam Backup & Replication:
or
1. In Veeam Backup & Replication, open the Home view.
2. In the inventory pane, click the Jobs node.
3. Select the necessary job in the working area and click Disable on the ribbon or right-click the
e

necessary job in the working area and select Disable. To enable the disabled job,
at

click Disable on the toolbar or right-click the job and select Disable once again.
lic

8.7.2. Deleting Veeam Agent Backup Jobs


up

You can delete Veeam Agent backup jobs.

When you delete a Veeam Agent backup job, Veeam Backup & Replication removes all records about
D

the job from its database and console. When the user starts a new Veeam Agent backup job session
manually or the job starts automatically by schedule, the job will appear in the Veeam Backup &
ot

Replication console again, and records about a new job session will be stored to the Veeam Backup
& Replication database. To remove the job permanently, you must delete the job and unassign
access rights permissions for this user from the backup repository.
N

To remove a job:
o

1. In Veeam Backup & Replication, open the Home view.


D

2. In the inventory pane, click the Jobs node.


3. Select the necessary job in the working area and click Delete on the ribbon or right-click the
necessary job in the working area and select Delete.

8.7.3. Viewing Veeam Agent Backup Job Statistics


You can view statistics about Veeam Agent backup jobs in the Veeam Backup &

188 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 8: Introduction to Agents

Replication console. Veeam Backup & Replication displays statistics for Veeam Agent backup jobs in
the similar way as for regular backup jobs. The main differences are the following:

The list of objects included in the job contains a Veeam Agent computer instead of one or
several VMs.
Detailed statistics become available in the Veeam Backup & Replication console after the
Veeam Agent job session completes. For currently running sessions, Veeam Backup &
Replication displays duration and the name of the Veeam Agent computer only.

e
To view Veeam Agent backup job statistics:

ut
1. In Veeam Backup & Replication, open the Home view.
2. In the inventory pane, click the Jobs node.

ib
3. In the working area, select the necessary Veeam Agent backup job and click Statistics on the
ribbon or right-click the job and select Statistics.

tr
is
8.7.4. Removing Veeam Agent Backups

D
You can remove Veeam Agent backups from Veeam Backup & Replication or permanently delete
Veeam Agent backups from the backup repository. or
Removing from Configuration

When you remove a Veeam Agent backup from configuration, Veeam Backup & Replication deletes
e

all records about the backup from its database and console. The actual backup files remain on the
at

backup repository. You can import the backup to the Veeam Backup & Replication at any time later
and restore data from it. To learn more, see Importing Veeam Agent Backups.
lic

To remove a Veeam Agent backup from configuration:


up

1. In Veeam Backup & Replication, open the Home view.


2. In the inventory pane, click Disk under the Backups node.
3. In the working area, expand the Agents node, select the necessary backup and click Remove
D

from > Configuration on the ribbon or right-click the backup and select Remove from
configuration.
ot
N

Important! You should not remove a Veeam Agent backup from configuration if Veeam Agent for
Microsoft Windows is set up to use the backup cache and the backup cache contains one or
several restore points that are not uploaded to the target location yet. If you remove such backup
o

and then import it in the Veeam Backup & Replication console, the backup will receive the new ID
D

in the configuration database. As a result, Veeam Agent for Microsoft Windows will become unable
to upload restore points from the backup cache to the target location and to create new restore
points in the backup cache. To continue creating backups in the Veeam backup repository, you will
need to delete restore points from the backup cache and run the backup job to create a new
restore point in the backup repository.

Removing from Backup Repository

Veeam Certified Engineer v9.5 . Textbook 189


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 8: Introduction to Agents

When you remove a Veeam Agent backup from backup repository, Veeam Backup &
Replication deletes all records about the backup from its database and console. The actual backup
files are removed from the backup repository, too.

To remove a Veeam Agent backup from the backup repository:

1. In Veeam Backup & Replication, open the Backup & Replication view.
2. In the inventory pane, click Disk under the Backups node.
3. In the working area, expand the Agents node, select the necessary backup and click Remove

e
from > Disk on the toolbar or right-click the backup and select Delete from disk.

ut
8.7.5. Viewing Veeam Agent Backup Statistics

ib
You can view statistics about Veeam Agent backups.

tr
To view Veeam Agent backup statistics:

is
1. In Veeam Backup & Replication, open the Home view.

D
2. In the inventory pane, click Disk under the Backups node.
3. In the working area, expand the Agents node, select the necessary backup and
or
click Properties on the ribbon or right-click the backup and select Properties.

8.7.6. Configuring Global Settings


e
at

Global settings configured on the Veeam backup server apply to Veeam Agent backup jobs as well.
You can:
lic

Configure network throttling settings so that Veeam Agent backup job does not consume all
network resources.
up

Configure global email settings to get alerted about the Veeam Agent backup job
results. Veeam Agent for Microsoft Windows sends email notifications on every type of backup
tasks, such as backup job sessions started automatically by schedule, backup job sessions
D

started from the command line and ad-hoc backup tasks.


ot
N
o
D

190 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 8: Introduction to Agents

Labs for Module 8: Introduction to Agents

Due to various factors, including complex hardware configurations and regulatory compliance
requirements, some physical servers and workstations cannot be virtualized. And everyday
occurrences such as lapses in connectivity, hardware failures, file corruption — even ransomware or
theft — can leave an organisation's data at risk.

You are now welcome to try out the corresponding labs on Veeam Agents and their capabilities. You

e
will have an opportunity for a hands-on experience when working with deploying the agent,

ut
performing a backup and finally performing a bare-metal recovery.

ib
tr
Get into the Lab

is
Lab Action Purpose

D
Deploy an agent from the Veeam Backup &
Replication Server Console using the Microsoft
Active Directory server group. Configure the backup
or
8.1 Agents job from the server (full backup) and run it. This is a
bare metal restore (for example, the original server
had LSI Logic SAS SCSI controller, and the target
e
server had SATA controller).
at
lic
up
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 191


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 8: Introduction to Agents

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

192 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

9. Advanced Data Protection


At this point, you’ve learned most of the basic data protection and disaster recovery features
of Veeam Backup & Replication. You are now able to perform backup and replication, verify it
and restore entire VMs and granular objects, such as files, Exchange and SharePoint items,
and some other options.
In addition to those crucial features, Veeam Backup & Replication provides a few more
advanced options that allow you to comply with your data protection strategy while

e
improving your RTPO to better protect your data and VMs.

ut
9.1. WAN Acceleration

ib
Offsite backup and replication always involves moving large volumes of data between remote sites.

tr
The most common problems that backup administrators encounter during are the following:

is
Insufficient network bandwidth to support VM data traffic
Transmission of redundant data

D
To solve these problems, Veeam Backup & Replication offers the WAN acceleration technology that
or
helps optimize data transfer over the WAN. To enable WAN acceleration and data deduplication
technologies, you must deploy a pair of WAN accelerators in your backup infrastructure: on the
source site and one on the target site.
e

The WAN acceleration technology is specific for remote jobs: backup copy jobs and replication jobs.
at

Being a built-in feature, Veeam’s WAN acceleration does not add complexity to the backup
infrastructure and does not require agents. On each WAN accelerator Veeam Backup & Replication,
lic

creates the VeeamWAN folder containing the following data:


up

Source WAN Target WAN

Files with digests required for global


Global cache data.
deduplication.
D

To deploy a WAN accelerator, you should assign this role to a Microsoft Windows machine added to
ot

the list of managed servers in Veeam Backup & Replication. The Microsoft Windows machine must
meet the following requirements:
N

1. You can use either physical or virtual Microsoft Windows machine as a WAN accelerator. The
role can be assigned to backup proxies and backup repositories existing in your backup
o

infrastructure as well.
D

2. You can use only 64-bit Microsoft Windows machines as WAN accelerators. 32-bit versions of
Microsoft Windows are not supported.

Note: WAN acceleration operations are resource intensive. When creating a WAN accelerator,
allocate appropriate CPU and RAM resources to the Microsoft Windows machine that you plan to
use. It is recommended to assign this role to machines with 8 GB RAM and more. Otherwise the

Veeam Certified Engineer v9.5 . Textbook 193


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

WAN acceleration process may fail.

Note: When you run a first session of a remote job, the global cache is empty, and the whole
amount of VM data needs to be transferred over the WAN. It is recommended that you populate
the global cache before you start a remote job for the first time. You can manually pre-populate the
global cache to avoid the situation when the cache remains empty. As a result, by the time a
remote job starts, the global cache will contain data blocks that can be used for data deduplication.

e
ut
9.2. Tape Device Support

ib
With Veeam Backup & Replication, you can archive to tape both backup files created in backup
repositories by a backup or a backup copy job, and regular files you might want to write to tape, such

tr
as Windows and Linux files. Veeam Backup & Replication supports file backup from any server which
has been added as a managed server to the Veeam Backup console (that is, Windows or Linux

is
server, including physical boxes). You can also archive files residing on NAS devices.

D
Veeam offers the following archiving options:

Backup to tape jobs


or Files to tape jobs

This option allows you to archive to tape media backups created This option allows you to
by Veeam Backup & Replication. Using backup to tape jobs, you archive to tape media files
e
can implement the ‘3-2-1’ backup approach (3 copies, 2 types of from Windows and Linux
at

media, 1 off-site location) considered as a best practice for data servers connected to the
protection and disaster recovery. Veeam Backup & Replication Veeam backup server. You
provides flexible retention and scheduling settings that help can create both full and
lic

automate backup archiving. incremental backups of files


You can also archive Endpoint backups to tape. on tape.
up

Important! The tape job looks only for the Veeam backups that are produced by backup jobs
D

running on your backup server. Other files will be skipped.


ot

Veeam Backup & Replication uses the MTF (Microsoft Tape Format) industry format to write data to
tape.
N

Veeam Backup & Replication offers multiple options for restoring data from tape:
o
D

You can restore an entire VM from a backup archive on tape.


Restoring VMs from
Veeam Backup & Replication supports all options available for regular
tape into the virtual
full VM recovery, including selecting a restore point, choosing a target
infrastructure
location, changing VM configuration settings and so on.

You can also restore full backups or even backup chains to a repository
Restoring backup files or any location of your choice. The restored backup is registered in
from tape to disk the Veeam Backup & Replication console so that you can work with it
and use it for any restore scenario later on.

194 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

Restoring files and


Flexible recovery options allow you to recover files or folders back to
folders from tape to the
the original location or another server, preserving ownership and
original location or to
access permissions.
another directory

To back up data to the tape media and restore from tape archives, Veeam Backup & Replication uses
several components:

e
Component Description

ut
The source is the initial location where backup files or regular files you want to
archive to tape reside. This can be a backup repository where Veeam backups
Source
are stored or a Windows or Linux server hosting files that should be archived.

ib
Regular backup or backup copy job can also be leveraged as a source.

tr
During archiving and restore processes, data is transferred between two
terminal points. This process is controlled by two Veeam data mover services:

is
- Source-side Data Mover Service communicates with the source (backup
repository or server hosting the files) and initiates reading data from that

D
Data path
source.
- Target-side Data Mover Service runs locally on the Veeam backup server
or
machine to which a tape device is connected; it initiates writing data to the tape
device.

Veeam backup The core component in the backup infrastructure that manages all operations
e
server and schedules and executes the jobs.
at

The tape device is a physical tape library, a virtual tape library or a stand-alone
Tape device
lic

tape drive.

The tape server is a Microsoft Windows server running the Data Mover Service.
up

It sits between data source and tape device and is used to create a
communication channel and route traffic to tape devices. The Data Mover
Service talks to the Veeam Backup server on one side and backup
Tape server
D

infrastructure components on the other side, and represents a communication


point over which all data between the tape device and the backup repositories
or file servers is transferred. All the drivers are installed on the machine that will
ot

perform the role of the tape server for the tape library to be visible.
N

This component is used to store the following tape-related data:


- Tape Catalog stores files/folders archived to tape media, as well as VBK and
VIB backup files. It is updated during file-to-tape and VM-to-tape jobs. The
o

content of the Tape Catalog can be examined under the Tape node in the Files
Veeam backup
D

view.
database
- Backup Catalog stores information about VMs whose backups were archived
to tape media. The content of the Backup Catalog is updated during VM-to-tape
jobs and can be examined under the Backups → Tape node in Backup &
Replication view.

To manage the tapes, Veeam Backup & Replication uses the following entities:

Veeam Certified Engineer v9.5 . Textbook 195


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

Entity Description

Media pools are logical units that distribute free tapes for writing data and store
information about data that was archived to them. To start archiving data, you
must create and configure at least one media pool that will serve as a target for
tape jobs. The following predefined media pools are available:
- Free – a media pool containing empty tapes. You can use this media pool to
replenish custom pools with new tapes when needed.
- Unrecognized – a media pool containing tapes that were loaded to a tape
device. They need further identification by a user which can be done by running

e
Media Pools
the inventory or catalog job.

ut
- Imported – a media pool containing non-empty tapes. These are tapes
identified by the tape catalog job.
- Retired – a media pool containing retired tapes that reached the maximal

ib
number of re-writes. This media pool may also contain tapes with some
mechanical breakdown.

tr
The Veeam GFS media pools are special media pools that store data to tape
with the GFS, or the Grandfather-Father-Son backup storage scheme.

is
Media sets are separate sets of tapes with data continuously written to them.

D
Media Sets Use media sets to split your tape archive into distinctly separated groups of
tapes. or
Backup Sets Backup sets are sets of files written to tape within one tape job session.

Media vaults are logical containers for visualizing data stored offline. Create and
e
Media Vaults
use media vaults for convenient managing of offline tapes.
at

Data retention is a user-defined period of time set to protect data from


Data Retention
lic

overwriting. When this period ends, the tape can be reused.

In case you have a long chains of increments, for example, if you rarely use forever-incremental
up

backup or create a full backup, restoring from tape may require loading a large number of tapes. To
“split” the tape set into shorter series and streamline the restore process, you can schedule a virtual
full backup for tape jobs (also referred to as virtual synthesized full backup). When you schedule
D

synthetic full for tape, the tape job creates the synthetic full backup directly on tape and does not
require disk space for storing additional full backup files on backup repositories. To create a virtual
ot

synthesized full backup, Veeam Backup & Replication uses a small temporary file of the .vsb (Veeam
Synthetic Backup) format. The .vsb file does not contain data blocks themselves; instead, it contains
N

pointers to data blocks in restore points of the backup chain.

Generally, you use retention settings to set the overwrite protection period for tapes. The retention
o

period is set for a media pool and is applied to all tapes that belong to this pool. However, some tapes
D

may contain data for which you may want to set a lifelong protection. To do this, you can use tape
protection. Tape protection is an option that sets an endless retention period for particular tapes
selected by the user. The protection option overrides the retention settings of the media pool. You can
single out tapes that, for example, contain particularly valuable data, and set the never overwrite
retention period for them without modifying the settings of the media pool, which would affect other
tapes. If the tape protection is no longer needed, it can be switched off at any time.

If your tape library has multiple drives, you can enable tape multistreaming/parallel processing. Tape
multistreaming/parallel processing allows you to use several drives simultaneously for processing

196 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

tape data. This option is useful if you have a lot of backup to tape jobs or file to tape jobs running at
the same time.

This option is enabled for custom media pools. You can set a maximum number of drives that a
media pool can use simultaneously. Tape jobs occupy the allowed number of drives and process
several file to tape jobs in parallel. For each drive, Veeam selects a tape with maximum free space
and starts a new media set. Restore points that refer to one file are always written to one media set.

e
Note: You cannot set multistreaming for a GFS media pool.

ut
9.2.1. Tape Job Scheduling

ib
The schedule settings are different for simple backup to tape jobs and GFS tape jobs

tr
For simple backup to tape jobs, select the Run the job automatically check box to specify the job

is
schedule. If this check box is not selected, the job is supposed to be started manually.

D
You can define the following scheduling settings for the job:
or
You can choose to run the job at specific time on defined weekdays, monthly and with specific
periodicity.
You can schedule the backup to tape job when a corresponding backup job completes. To do
e
so, select the After this job option and choose the preceding backup job from the list.
at

Note: The After this job function will only start the tape job if the primary is started automatically by
lic

schedule. If the primary job is started manually, jobs chained to it will not be started.
up

You can schedule the tape job to periodically check the jobs that you have selected as primary
for new backups and archive new backups to target media. To do so, select the As new backup
files appear option. If this option is selected, the backup to tape jobwill constantly scan the
D

repository in the background mode, monitoring for new backups to appear. As soon as new
backups are created, the job will start archiving these backup to tape. If necessary, you can
ot

define the time interval during which the backup to tape job must not archive data. These can
be hours when backup repositories are busy with other tasks (backup jobs writing to
repositories or backup copy jobs reading from repositories). To define prohibited time for the
N

backup to tape job, click the Schedule button and define the time when the job is allowed and
prohibited to run.
o

If you have scheduled the job to run at the specific time daily or monthly, consider configuring wait
D

timeout value. Select the If some linked backup jobs are still running, wait for up to … minutes check
box and specify the new timeout. When a backup to tape job starts, Veeam Backup & Replication
checks the status of the primary jobs. If a primary job is still writing data to the source repository, the
backup to tape job will wait for the specified time interval.

If the timeout is disabled, the backup to tape job will terminate without waiting for the backup job to
complete. The timeout option is unavailable if you schedule the backup to tape job to run after a
backup job or if you schedule the backup to tape job to start when new backups appear.

Veeam Certified Engineer v9.5 . Textbook 197


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

Sometimes, the primary job may start when the tape job is still running. By default, the primary job
has priority. In this case, the tape job terminates with error and no data is written to tape. Select the
Prevent this job from being interrupted by primary backup jobs option if you want to give the tape job
a higher priority. If this option is selected, the primary job will wait until the tape job finishes. Note that
the primary job may start with a significant delay.

For GFS jobs, select a GFS media pool at the Full Backup step of the wizard, then click Schedule to
select days for each media set. The GFS job starts at 00:00 on the selected day.

e
ut
Tip: After you specify necessary schedule settings, you can save them as default. To do this, click
Save as Default at the bottom left corner of the Archival Schedule window. When you create a new
GFS job, Veeam Backup & Replication will automatically apply default settings to the new job

ib
schedule.

tr
Sometimes, the primary job may start when the tape job is still running. By default, the primary job

is
has priority. In this case, the tape job terminates with error and no data is written to tape. Select the
Prevent this job from being interrupted by primary backup jobs option if you want to give the tape job

D
a higher priority. If this option is selected, the primary job will wait until the tape job finishes. Note that
the primary job may start with a significant delay. or
9.2.2. Tape Job Encryption
e

Veeam Backup & Replication supports two types of encryption for tape media:
at

Hardware level: Library- and driver-managed encryption mechanisms provided by the tape
lic

vendor
Software level: The encryption mechanism provided by Veeam Backup & Replication
up

Hardware encryption has a higher priority. If hardware encryption is enabled for the tape media,
Veeam Backup & Replication automatically disables its software encryption mechanism for such tape
libraries. The Veeam encryption mechanism can only be used if hardware encryption is disabled at
D

the tape device level or not supported.


ot

To use the Veeam encryption mechanism, you need to enable encryption at the media pool level.
Encryption is supported for both types of tape jobs: backup to tape jobs and file to tape jobs.
N

Backup to tape jobs allow double software encryption. A backup to tape job uses a backup file as a
source of data. If the backup file is encrypted with the initial backup job and the encryption option is
o

enabled for the backup to tape job, too, so the resulting backup file will be encrypted twice. To decrypt
D

such backup file, you will need to subsequently enter two passwords:

Password for a backup to tape job


Password for the primary backup job

198 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

9.2.3. VM Restore from Tape to Infrastructure


Restoring a VM from tape with Veeam Backup & Replication is a lot like restoring a VM from disk. For
example, you can choose a desired restore point, select the target location or change the
configuration of the restored VM.

To restore a VM from tape, you can choose between the following options: restore directly to
infrastructure or restore through a staging repository. To choose the needed option, select Restore
directly to the infrastructure or Restore through the staging repository at the Backup Repository step

e
of the Full VM Restore wizard.

ut
Restore Directly to the Infrastructure

ib
When you restore VMs from tape directly to the infrastructure, the restore process publishes the VMs
to the virtual infrastructure copying the VM data directly from tape. This option is recommended if you

tr
want to restore one VM or a small number of VMs from a large backup that contains a lot of VMs. In
this case, you do not need to provide a staging repository for a large amount of data most of which is

is
not needed to you at the moment.

D
This option is slow if you restore many VMs. The VMs are restored one by one: this requires a lot of
rewinding of tape as tapes do not provide random access to data.
or
For restoring a VM directly to the infrastructure, Veeam Backup & Replication performs the following
steps:
e

1. The VM from tape restore job checks the Backup Catalog in the Veeam Backup & Replication
at

database to discover the tapes containing the needed backup files. If the tapes are offline,
Veeam Backup & Replication prompts the user to insert the required tapes.
lic

2. Veeam needs to load and read the selected tapes for 3 times.
3. Veeam loads the tapes for the 1st time.
4. Veeam reads metadata and cashes it on the tape server. This requires approximately 100Mb of
up

disk space per 1TB of tape data for the default data block size.
5. Using the cached data, Veeam builds a map of data blocks. The map contains references to the
data blocks of the VM you restore: the VM configuration file and the VM disks data.
D

6. Veeam loads the tapes for the 2nd time.


7. Veeam restores the VM configuration:
ot

To restore to original location, Veeam synchronizes the VM configuration file up to the


backup state.
N

To restore to another location, Veeam copies the VM configuration file and registers the
VM on the target host.
o

8. Veeam loads the tapes for the 3rd time.


D

9. Veeam restores the VM disks. Multiple disks are restored parallely. Veeam reads the tape
consequently and, using the map of data blocks, copies the VM disks data.

Restore Through a Staging Repository

When you restore VMs from tape through a staging repository, the restore process temporarily copies
the whole restore point to a backup repository or a folder on disk. After that Veeam starts a regular
VM restore.

Veeam Certified Engineer v9.5 . Textbook 199


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

This option is recommended if you want to restore a lot of VMs from a backup as the disk provides a
much faster access to random data blocks than tape.

For the restore through a staging repository, Veeam Backup & Replication performs the following
steps:

1. Veeam starts 2 jobs at background:

Backup restore job: temporarily restores the backup to the repository.


VM restore job: restores the VM to the infrastructure.

e
ut
2. The jobs starts simultaneously. The VM restore job starts and remains pending until the backup
restore completes.
3. The backup restore job checks the Backup Catalog in the Veeam Backup & Replication

ib
database to discover the tapes containing the needed backup. If the tapes are offline, Veeam
Backup & Replication prompts the user to insert the required tapes.

tr
4. The backup restore job reads the tapes consequently and copies the backup to the selected
staging repository or folder.

is
5. When the backup is copied, Veeam registers it temporarily as an imported backup.
6. The backup restore job finishes.

D
7. The VM restore job receives information about the backup restored successfully and launches a
standard VM restore process. For details, see Entire VM Recovery.
or
8. When the VM is successfully restored, the VM restore process finishes.
9. Veeam deletes the backup from the staging repository and from disk.
e

9.2.4. Automated Drive Cleaning


at
lic

You can instruct Veeam Backup & Replication to automatically clean the tape library drives. Assigning
the automated cleaning to Veeam Backup & Replication prevents possible overlapping of cleaning
tasks and tape jobs. Such overlapping may cause tape jobs failures.
up

To instruct Veeam Backup & Replication to automatically clean the drives:


D

1. Open the Tape Infrastructure view.


2. Expand the Libraries node and select the needed library. Click Properties on the ribbon. You
can also right-click the necessary library in the working area and select Properties.
ot

3. In the Properties window, select the Perform drive cleaning automatically option.
N

Important! If you enable the automated drive cleaning option in Veeam Backup & Replication,
o

make sure that you disabled the drive cleaning tasks on your tape library device.
D

Veeam Backup & Replication cleans the drives at the beginning of backup to tape jobs or file to tape
job run. The cleaning is not performed during other tape operations such as, for example, cataloging
or export.

To clean the drives automatically, Veeam Backup & Replication performs the following actions:

1. The tape library alerts Veeam Backup & Replication on a drive that requires cleaning.
2. Veeam Backup & Replication waits for a tape job to start.

200 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

3. When the tape job locks necessary drives for writing data, Veeam Backup & Replication checks
which of them requires cleaning.
4. Veeam Backup & Replication ejects the tape from the drive, inserts a cleaning tape and
performs the cleaning.
5. Veeam Backup & Replication ejects the cleaning tape and inserts the tape that was reserved
for the tape job.
6. The tape job writes the data on tape.

The cleaning process does not exceed 2 minutes for a drive. If multiple drives require cleaning, the

e
total time for cleaning does not exceed 5 minutes. The cleaning tapes are located in the
Unrecognized media pool. The worn-out cleaning tapes are moved to the Retired media pool

ut
automatically. If a tape job locks multiple drives simultaneously for parallel processing, and one or
more drives require cleaning, all drives wait until the cleaning is finished. After cleaning, all drives start

ib
writing simultaneously.

tr
is
Note: The automated drive cleaning does not affect creation of media sets.

D
Limitations for Automated Drive Cleaning

You cannot enable the automated drive cleaning on standalone tape drives.
or
You cannot start the drive cleaning manually with Veeam Backup & Replication. The drive
cleaning is fully automated.
e
at

9.3. Storage Integration (VMware)


lic

This topic explores using image-based backups and replicas from storage snapshots, with
little to no impact on your production environment. You will become acquainted with
up

supported storage vendors and specifics for each of them.

9.3.1. SAN Storage Systems Support Overview


D

When Veeam Backup & Replication is used for VMware vSphere environments, you can take
ot

advantages of storage snapshots to build your data protection and disaster recovery plan. Veeam
Backup & Replication integrates with your storage system and offers two technologies that will help
N

you decrease impact of backup and replication operations on your production environment and
significantly improve RPOs:
o

Backup from Storage Snapshots. You can use storage snapshots to create backups and
D

replicas of VMware vSphere VMs hosted on storage systems. Backup from Storage Snapshots
speeds up backup and replication operations and reduces the impact of VMware vSphere
snapshot removal on the production environment.
If you use NetApp and Nimble storage systems, you can configure backup and replication jobs
to use storage snapshots on primary and secondary storage arrays.
Veeam Explorer for Storage Snapshots. You can restore VM data directly from storage
snapshots. Veeam Explorer for Storage Snapshots automates the process of VM data recovery
and reduces recovery time in 10 times or more.

Veeam Certified Engineer v9.5 . Textbook 201


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

Snapshot jobs. If you use NetApp or Nimble storage systems, you can configure backup jobs to
periodically create storage snapshots on primary and/or secondary storage arrays.
On-Demand Sandbox for Storage Snapshots. You can start VMs whose disks are hosted on
storage systems in the On-Demand Sandbox. On-Demand Sandbox can be used for testing,
training, troubleshooting and so on.

To create storage snapshots for backup and restore operations, Veeam Backup & Replication
leverages native APIs and technologies provided by SAN storage vendors. The technologies and
procedures of snapshot creation vary for different SAN storage systems.

e
Veeam Backup & Replication supports the following storage systems:

ut
Cisco HyperFlex

ib
Cisco HyperFlex 2.0 and later (Backup from Storage Snapshots, Full Integration mode)

tr
Dell EMC VNX, VNX2, VNXe and Unity

is
NFS, Fibre Channel (FC) or iSCSI connectivity

D
HPE 3PAR StoreServ

Fibre Channel (FC) or iSCSI connectivity


or
3PAR OS 3.1.2 or later
e
iSCSI VLAN tags are supported. Virtual Domains are supported.
at

HPE StoreVirtual (LeftHand / P4000 series) and StoreVirtual VSA


lic

iSCSI connectivity only


LeftHand OS versions 9.5 through 12.6
HPE SV3200 (LeftHand OS version 13) is not supported
up

NetApp FAS, FlexArray (V-Series), Edge VSA and IBM N Series (NetApp FAS OEM)
D

NFS, Fibre Channel (FC) or iSCSI connectivity.


Data ONTAP versions from 8.1 up to 9.2.
ot

7-mode or cluster-mode

ONTAP 9.2 application-aware data management and SVM-DR are not supported.
N

Nimble Storage AF-Series and CS-Series


o

Fibre Channel (FC) or iSCSI connectivity


D

Nimble OS 2.3 and later

Depending on the storage system type, you can perform the following operations:

Functionality/Storage Dell EMC VNX(e)/ HPE 3PAR


HPE StoreVirtual NetApp HPE Nimble Cisco HyperFlex
type Unity StoreServ

Backup from Storage Snapshots

202 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

Functionality/Storage Dell EMC VNX(e)/ HPE 3PAR


HPE StoreVirtual NetApp HPE Nimble Cisco HyperFlex
type Unity StoreServ

Backup from primary


✓ ✓ ✓ ✓ ✓ ✓
storage arrays

Backup from
secondary storage ✕ ✓ ✕ ✓ ✓ ✕
arrays

Veeam Explorer from Storage Snapshots

Restore from
primary storage ✓ ✓ ✓ ✓ ✓ ✕

e
arrays

ut
Restore from
secondary storage ✓ ✓ ✓ ✓ ✓ ✕
arrays

ib
Snapshot Jobs

tr
Snapshot-only job ✕ ✕ ✕ ✓ ✓ ✕

Snapshot in

is
secondary ✕ ✕ ✕ ✓ ✓ ✕
destination job

D
Other Operations


Storage rescan ✓ ✓
or✓ ✓ ✓ (infrastructure
only)

Snapshot creation
and deletion ✓ ✓ ✓ ✓ ✓ ✕
e
(manual)
at

9.3.2. Dell EMC Storage Systems


lic

Dell EMC VNX, VNX2, VNXe and Unity families of arrays are supported. This integration includes
both the Veeam Explorer for Storage Snapshots recovery technique and Backup from Storage
up

snapshots.

Requirements and Limitations for EMC VNX/VNXe


D

Dell EMC VNX Block


ot

Veeam Backup & Replication supports LUNs that reside on Storage Pools.
To take LUN snapshots, Veeam Backup & Replication uses the VNX snapshot technology.
N

Make sure that you have a license that covers this technology. The SnapView snapshot
technology is not supported.
o

Dell EMC VNX File


D

A read-only checkpoint can have only 1 writable snapshot. If a read-only checkpoint already
has a writable snapshot, Veeam Backup & Replication uses this writable snapshot for restore.
Writable snapshots are not detected by the storage rescan process and are not displayed in the
storage system hierarchy.

Dell EMC VNXe

Veeam Certified Engineer v9.5 . Textbook 203


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

Veeam Backup & Replication does not support Dell EMC VNXe Gen 1 OS (2.x.x). Dell EMC
VNXe Gen 2 OS (3.x.x) is supported.

In EMC VNXe, you cannot export more than 1 storage snapshot for a LUN or LUN group
concurrently. For this reason, Veeam Backup & Replication can perform only one task that uses
storage snapshots at the same time.

In Veeam Backup & Replication, tasks have the following priority levels (starting with the
highest priority): restore task > backup job > rescan task. If you start several jobs or tasks that
use storage snapshots, Veeam Backup & Replication will check what priority tasks have and

e
perform the following actions:

ut
If a LUN snapshot is exported for storage rescan and you start a backup job or restore task at

ib
the same time, the rescan process will fail.
If a LUN snapshot is exported for a backup job and you start another backup job at the same

tr
time, the second backup job will be waiting until the first backup job is finished.
If a LUN snapshot is exported for a restore task and you start a backup job at the same time,

is
the backup job will fail (or failover to the regular processing mode if corresponding settings are
enabled in the backup job).

D
If a LUN snapshot is exported for a backup job and you start a restore task at the same time,
the restore task will be waiting until the backup job is finished.
or
Dell EMC VNX(e) Working over NFS
e
VMs that you plan to back up or replicate must not have VMware vSphere snapshots. VMs with
at

VMware vSphere snapshots will be skipped from Backup from Storage Snapshots.
If you enable the Enable VMware tools quiescence option in the backup job
lic

settings, Veeam Backup & Replication will not use Backup from Storage Snapshots to process
running Microsoft Windows VMs that have VMware Tools installed.
up

9.3.3. HPE Storage Systems


D

For HPE storage systems, Veeam Backup & Replication uses the following technologies:
ot

Volume snapshot for Backup from Storage Snapshots on HPE StoreVirtual storage systems
SmartClone for restore from storage snapshots on HPE StoreVirtual storage systems
Virtual Copy for HPE 3PAR StoreServ storage systems
N

Volume snapshots, SmartClones and VirtualCopies are created at the per-volume basis. They
o

produce near instantaneous, point-in-time copies of volumes on which VM data is located. As a result,
Veeam Backup & Replication can safely perform backup and restore operations without having to risk
D

altering data on the production SAN storage or volume snapshot.

Important! The license for the HPE 3PAR StoreServ storage system must support HPE 3PAR
Virtual Copy. Otherwise, you will not be able to perform backup and restore from storage
snapshots.

204 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

9.3.4. NetApp Storage Systems


For NetApp storage systems, Veeam Backup & Replication uses the following NetApp technologies:

Backup from Storage


Requirements Considerations
Snapshots

- NetApp storage Veeam Backup &


system works Replication first

e
over iSCSI or FC. triggers NetApp to
In case of traditional LUN
- NetApp storage create a backing

ut
cloning, LUN clones created by
system runs in snapshot of the LUN
Traditional Veeam Backup & Replication
the 7-mode. that holds data for the
LUN Cloning may be locked or may fail to be

ib
- The FlexClone necessary VM. After
deleted automatically by cleanup
license is not that, NetApp creates a
operations.
installed on the clone of the LUN

tr
NetApp storage based on this backing

is
system. snapshot.

D
- NetApp primary
storage
system works Veeam Backup &
or
over iSCSI or FC Replication first
in 7-mode. triggers NetApp to FlexClones can be created in
- NetApp primary create a base seconds and require little space
e
and secondary snapshot of the on the storage. Unlike traditional
storage systems volume with the LUN LUN clones, FlexClones are not
at

FlexClone
work over iSCSI, that holds data for the coupled with backing volume
FC or NFS in necessary VM. After snapshots and do not require
lic

cDot operating that, NetApp creates a you to manage these snapshots


mode. FlexClone of the LUN or delete them.
- The FlexClone based on this
up

license is installed snapshot.


on the NetApp
storage system.
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 205


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

Backup from Storage


Requirements Considerations
Snapshots

- The NetApp
primary storage
system
works over iSCSI,
FC or NFS.
- The NetApp
Veeam Backup &
secondary

e
Replication triggers When you perform SnapRestore,
storage system
NetApp to createa NetApp does not physically copy

ut
(NetApp
base snapshot of the data from the storage snapshots.
SnapMirror or
volume with the LUN Instead, it updates pointers to
SnapRestore SnapVault) works

ib
that holds data for the data blocks. As a result, the
over NFS.
necessary VM. After restore procedure is very fast
- The NetApp
that, NetApp creates a and takes a few seconds to

tr
primary and
LUN clone via complete.
secondary
SnapRestore.

is
storage
systems run in

D
the cDot
operating mode.
or
- To be able to restore data from
e
the NetApp primary and
secondary storage systems
at

running over NFS, you must


During the backup
have a SnapRestore/FlexClone
lic

process, Veeam
license installed or the NDMP
Backup & Replication
protocol enabled. In the opposite
creates a snapshot of
The NetApp case, VM data processing will
up

NFS share a volume on which the


storage system fail.
copying NFS share with VM
runs over NFS. - To be able to restore data
data resides. The
from the NetApp secondary
created volume
D

storage system (NetApp


snapshot is used as a
SnapVault) running in the C-
source of data.
mode over NFS, you must have
ot

a FlexClone license installed. In


the opposite case, VM data
N

restore will fail.


o

Integration with NetApp SnapMirror and SnapVault


D

If the primary NetApp storage array is associated with a secondary array – NetApp SnapMirror and/or
SnapVault, you can use the secondary storage array as a data source during backup. Backup from
storage snapshots on NetApp SnapMirror or SnapVault reduces impact on the production storage.
During backup, operations on VM data reading are performed on the side of NetApp SnapMirror or
SnapVault, and the primary NetApp storage array is not affected.

To back up VMs from storage snapshots on NetApp SnapMirror and SnapVault, you must configure

206 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

the backup job to build a snapshot chain on the secondary storage array and instruct Veeam Backup
& Replication to use the created snapshots as a data source.

Before you perform backup from storage snapshots, check the following prerequisites:

NetApp SnapMirror or SnapVault must be configured for the primary NetApp storage array
where VMs that you plan to back up reside.
A license for storage snapshot export must be installed on NetApp SnapMirror or SnapVault.
For NetApp storage systems working over NFS, VMs that you plan to back up must not have

e
VMware snapshots. VMs with VMware snapshots will be skipped from processing.
A license for Veeam Backup & Replication Enterprise Plus edition must be installed on the

ut
backup server.
A properly configured backup proxy must be added to the backup infrastructure. The backup

ib
proxy must have access to the backup server and secondary storage array.

tr
The host with VMs whose disks are located on the storage system, the primary NetApp storage and
NetApp SnapMirror/SnapVault must be added to Veeam Backup & Replication.

is
To configure backing up VMs from storage snapshots on NetApp SnapMirror and SnapVault at the

D
Secondary Target step of the wizard, click Add and select NetApp SnapMirror or NetApp
SnapVault. You may specify the number of storage snapshots that you want to maintain in the
or
snapshot chain on the secondary storage in the Number of snapshot copies to retain field. When
this number is exceeded, Veeam Backup & Replication will trigger NetApp to remove an earlier
snapshot from the chain. Then select the Use as the data source check box.
e
at

9.3.5. Nimble Storage Systems


lic

Veeam's advanced integration with Nimble Storage provides additional protection and recovery
options that are not available without direct integration and joint development efforts that provide the
up

ability to:

Schedule the creation of Nimble storage snapshots containing application-consistent VM


D

images, and storage snapshot replication orchestration.


Restore from Nimble storage snapshots or their Replicated Copies (entire VM, guest files and
application items)
ot

Backup from Nimble storage snapshots or their Replicated Copies.


N

9.4. Microsoft Hyper-V Off-host Backup Proxy


o

If you plan to perform backup or replication operations in the off-host mode, you must add Hyper-V
D

off-host backup proxies. In the backup infrastructure, a backup proxy acts as a “data mover.” While
the backup server fills the role of the job manager, the off-host backup proxy actually performs main
data handling – it retrieves VM data from the source storage, processes it and transfers to the target
destination. Using off-host backup proxies enables you to take the job processing off the source
Hyper-V host.

To add an off-host backup proxy to your backup infrastructure, you must assign this role to a
Windows server that is already added to the list of managed servers. When deploying an off-host

Veeam Certified Engineer v9.5 . Textbook 207


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

backup proxy, make sure that you meet the requirements.

You must assign the off-host backup proxy role to a physical machine. For evaluation purposes,
you can assign the off-host backup proxy role to a VM.
Versions of a Microsoft Hyper-V host and off-host backup proxy must coincide. For example, if
you use a Microsoft Windows Server 2012 machine with the Hyper-V role enabled as a
Microsoft Hyper-V host, you must deploy the off-host backup proxy on a Microsoft Windows
Server 2012 machine with the Hyper-V role enabled.
The source Microsoft Hyper-V host and off-host backup proxy must be connected via SAN to

e
the shared storage that supports VSS hardware providers.
To create and manage volume shadow copies on the shared storage, you must install and

ut
properly configure a hardware VSS provider that supports transportable shadow copies. The
hardware VSS provider must be installed on the off-host proxy and source Microsoft Hyper-V

ib
host. The hardware VSS provider is typically distributed as a part of client components supplied
by the storage vendor.

tr
If you plan to perform off-host backup for a Microsoft Hyper-V cluster with CSV, you must
deploy an off-host backup proxy on a host that is not a part of the cluster. If the off-host backup

is
proxy is deployed on a node of the cluster, the cluster will fail during VM data processing.
[For off-host backup proxies processing VMs on SMB3] The Local System account of the off-

D
host backup proxy must have full access permissions on the Microsoft SMB3 file share.
[For off-host backup proxies processing VMs on SMB3] The off-host backup proxy must be
or
located in the same domain where the Microsoft SMB3 server resides. Alternatively, the domain
where the Microsoft SMB3 server resides must be trusted by the domain in which the off-host
backup proxy is located.
e
at

9.5. Support for Deduplicating Storage Systems


lic

For disk-to-disk backups, you can use a deduplicating storage system as a target. Veeam
Backup & Replication supports the following deduplicating storage appliances:
up

Dell EMC Data Domain


D

ExaGrid
ot

HPE StoreOnce
N

9.5.1. ExaGrid
o
D

Veeam Backup & Replication lets you use ExaGrid deduplicating storage appliance as backup
repository.

Veeam Backup & Replication works with ExaGrid as with a Linux-based backup repository: the
backup repository architecture for the ExaGrid appliance resembles the Linux-based backup
repository scenario. To communicate with ExaGrid, Veeam Backup & Replication deploys the Veeam
data mover service on the ExaGrid appliance. The data mover (transport) service establishes a
connection with the source-side Data Mover Service on the backup proxy and enables efficient data

208 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

transfer over LAN or WAN.

Note: If you Per-VM Backup Files feature is not enabled on the Backup Repository, maximum
concurrent tasks must be limited to 1 for an Exagrid Backup Repository. If Per-VM Backup Files
feature is enabled on the Backup Repository, maximum concurrent tasks must be limited to 10 or
less.

e
ut
Important! If there are multiple Backup Repositories in play, the administrator must limit the
number of concurrent tasks so that there is at most 10 tasks going into an ExaGrid server at any
given time. For example, if you have two Backup Repositories each with maximum concurrent

ib
tasks set to 10 on the same ExaGrid server, you can potentially end up with 20 tasks running on
the same ExaGrid server. This could potentially have a negative impact on performance. The

tr
administrator should reduce the concurrency setting of these repositories to no more than 5 each
(no more than 10 in total).

is
D
9.5.2. HPE StoreOnce
or
You can use HPE StoreOnce storage appliances as a backup repository. Depending on the storage
configuration and type of backup target, HPE StoreOnce can perform source-side or target-side data
deduplication.
e
at

Source-Side Data Deduplication Target-Side Data Deduplication

For a Catalyst store:


lic

- The Catalyst store works in the


HPE StoreOnce performs source-side
High Bandwidth mode (Primary
deduplication if the backup target
Transfer Policy is set to High
up

meets the following requirements:


Bandwidth).
- You have a Catalyst license installed
The Catalyst license is installed on
on HPE StoreOnce.
the HPE StoreOnce (required).
- You use a Catalyst store as a backup
D

The Catalyst store is added to the


repository.
Requirements backup repository as a
- The Catalyst store is configured to work
deduplicating storage appliance,
ot

in the Low Bandwidth mode (Primary


not as a shared folder.
Transfer Policy).
For a CIFS store:
- The HPE StoreOnce Catalyst is added
N

- The Catalyst license is not


to the backup repository as a
required.
deduplicating storage appliance, not as a
The CIFS store is added as a
o

shared folder.
shared folder backup repository to
D

the backup infrastructure.

Veeam Certified Engineer v9.5 . Textbook 209


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

Source-Side Data Deduplication Target-Side Data Deduplication

To deduplicate data on the source side,


HPE StoreOnce uses the HPE
StoreOnce Catalyst agent. The HPE
StoreOnce Catalyst agent is a
component of the HPE StoreOnce
Catalyst software; it is installed on the
gateway server communicating with the During the first backup job
HPE StoreOnce appliance. session, HPE StoreOnce analyzes

e
HPE StoreOnce deduplicates data on data incoming to the HPE

ut
the source side before writing it to target. StoreOnce appliance in chunks
During the first backup job session, HPE and creates a hash value for every
StoreOnce analyzes data incoming to data chunk. Hash values are

ib
the HPE StoreOnce appliance in chunks stored in an index on the target
and computes a hash value for every side.

tr
Description data chunk. Hash values are stored in an During subsequent backup job
index on disk. sessions, HPE StoreOnce

is
During subsequent backup job sessions, analyzes VM data transported to
the HPE StoreOnce Catalyst agent on target and replaces identical data

D
the gateway server calculates hash chunks with references to data
values for data chunks in a new data chunks that are already saved on
flow and sends these hash values to disk. As a result, only new data
or
target. HPE StoreOnce identifies which chunks are written to disk, which
data blocks are already saved on disk, helps save on disk space.
and the HPE StoreOnce Catalyst agent
e
sends only unique data blocks to target.
As a result, the load on the network
at

reduces, the backup job performance


improves and you can save on disk
lic

space.

Veeam Backup & Replication


up

works with HPE StoreOnce as


For source-side deduplication, Veeam
with a shared folder backup
How Veeam Backup & Replication leverages the HPE
repository. To communicate with
works with it StoreOnce Catalyst technology and two
D

HPE StoreOnce, Veeam Backup &


HPE StoreOnce components.
Replication uses two Data Mover
Services.
ot

HPE StoreOnce Schemes


N

Source-Side Data Deduplication Target-Side Data Deduplication


o
D

210 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

The gateway server is a backup infrastructure component that “bridges” the backup server and HPE
StoreOnce storage system. The gateway server must meet the following requirements:

The server must run a 64-bit version of Microsoft Windows.


The server must be added to the backup infrastructure.
The server must have access to the backup server and HPE StoreOnce appliance.

e
ut
ib
tr
is
D
or
e
at

Several Backup Repositories on HPE StoreOnce

You can configure several backup repositories on one HPE StoreOnce appliance and associate them
lic

with different gateway servers.

Consider the following:


up

If you configure several backup repositories on HPE StoreOnce and add them as extents to a
scale-out backup repository, make sure that all backup files from one backup chain are stored
D

on one extent. If backup files from one backup chain are stored to different extents, the
transform operations performance will be lower.
ot

HPE StoreOnce has a limit on the number of opened files that applies to the whole appliance.
Tasks targeted at different backup repositories on HPE StoreOnce and run in parallel will
N

equally share this limit.


For HPE StoreOnce working over Fibre Channel, there is a limitation on the number of
connections from one host. If you connect several backup repositories to one gateway, backup
o

repositories will compete for connections.


D

Deduplication on HPE StoreOnce works within the limits of one object store.

Limitations for HPE StoreOnce

If you plan to use HPE StoreOnce as a backup repository, mind the following limitations. Limitations
apply only if you use HPE StoreOnce in the integration mode, not the shared folder mode.

Backup files on HPE StoreOnce are locked exclusively by a job or task. If you start several
tasks at a time, Veeam Backup & Replication will perform a task with a higher priority and will

Veeam Certified Engineer v9.5 . Textbook 211


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

skip or terminate a task with a lower priority.


In Veeam Backup & Replication, tasks have the following priority levels (starting with the top
priority): restore > backup job > backup copy. For example, if the backup and backup copy jobs
start simultaneously, Veeam Backup & Replication will terminate the backup copy task.
When you create a backup job targeted at HPE StoreOnce, Veeam Backup & Replication will
offer you to switch to optimized job settings and use the 4 MB size of data block for VM data
processing. It is recommended that you use optimized job settings. Large data blocks produce
a smaller metadata table that requires less memory and CPU resources to process.
The HPE StoreOnce backup repository always works in the Use per-VM backup files mode. For

e
more information, see Per-VM Backup Files.

ut
HPE StoreOnce does not support the reverse incremental backup method.
The HPE StoreOnce backup repository does not support the Defragment and compact full
backup file option (for backup and backup copy jobs).

ib
You cannot use HPE StoreOnce backup repositories as targets for Veeam Endpoint backup
jobs. Backup copy jobs, however, can be targeted at HPE StoreOnce backup repositories.

tr
You cannot use HPE StoreOnce backup repositories as sources or targets for file copy jobs.
You cannot copy backup files (VBK, VIB and VRB) manually to the HPE StoreOnce backup

is
repository. To copy such files, use backup copy jobs.
You cannot use the HPE StoreOnce backup repository as a cloud repository.

D
HPE StoreOnce has a limit on the number of concurrently opened files. Due to this limit, the
maximum length of backup chains (chains that contain one full backup and a set of subsequent
or
incremental backups) on HPE StoreOnce is also limited and depends on the particular storage
model:
e
Product Maximum number of restore points per backup chain
at

Current Products
lic

6600 42 (per node)

5500 35
up

5100 21

3500 14
D

3100 7
ot

VSA 7
N

Previous Products

6500 28 (per node)


o
D

6200 14 (per node)

4900 28

4700 14

4500 14

2900 14

212 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

2700 7

VSA 7

9.5.3. EMC Data Domain Boost


Veeam Backup & Replication provides support for Dell EMC Data Domain storage systems with Data
Domain Boost (DD Boost). The DD Boost technology offers a set of features for advanced backup.

e
ut
Feature Description

With Distributed Segment Processing enabled, operations on data

ib
segmentation, filtering and compression are performed on the side of the
backup application. The Data Domain system receives only unique data

tr
Distributed blocks and writes them to disk. Distributed Segment Processing provides
Segment the following benefits:

is
Processing - Improved network throughput: only unique data blocks are transmitted
across the network

D
- Reduced backup window
- Increased backup job performance

Advanced Load
or
Balancing Advanced Load Balancing and Link Failover allow you to balance data
transfer load and perform automatic link failover in case of network outage
problems.
e
Link Failover
at

Virtual Synthetic Fulls lets you synthesize a full backup without physically
copying data. To construct a full backup file, the Data Domain uses
lic

Virtual Synthetics pointers to existing data segments on the storage system. Virtual Synthetic
Fulls reduce the workload on the network and backup infrastructure
components and increase the backup job performance.
up

Managed File Currently for Veeam Backup & Replication Managed File Replication is not
Replication supported.
D

To support the DD Boost technology, Veeam Backup & Replication leverages two Dell EMC Data
ot

Domain components that communicate with each other:


N

DD Boost server is a target-side component running on the Data Domain OS on the Data
Domain storage system.
DD Boost library is a source-side component integrated with Veeam Backup & Replication.
o
D

The DD Boost library is embedded into the Veeam Data Mover Service setup. When you add a
Microsoft Windows server to Veeam Backup & Replication, the DD Boost Library is automatically
installed on the added server with the Veeam Data Mover Service. To communicate with the Data
Domain storage appliance, Veeam Backup & Replication uses the DD Boost library deployed on a
gateway server. The gateway server is a proxying backup infrastructure component that “bridges” the
Veeam backup server and the Data Domain storage system.

Veeam Certified Engineer v9.5 . Textbook 213


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

e
ut
ib
tr
is
Veeam Backup & Replication supports EMC Data Domain storage systems working over the following

D
protocols:

TCP/IP protocol: Veeam Backup & Replication communicates with the Dell EMC Data Domain
or
server by sending commands over the network.
Fibre Channel protocol: Veeam Backup & Replication communicates with the Dell EMC Data
Domain Fibre Channel server by sending SCSI commands over Fibre Channel. DD Boost is
e

required to use Fibre Channel.


at
lic

Important! The length of forward incremental and forever forward incremental backup chains
(chains that contain one full backup and a set of subsequent incremental backups) cannot be
greater than 60 restore points. To overcome this limitation, schedule full backups (active or
up

synthetic) to split the backup chain into shorter series. For example, to perform backups at 30-
minute intervals 24 hours a day, you must schedule synthetic fulls every day. In this scenario,
D

intervals immediately after midnight may be skipped due to duration of synthetic processing.

When configuring backup jobs to land on the backup repository that supports Dell EMC Data Domain
ot

Boost, the critical decision on backup jobs will be whether to do an active full backup or leverage
synthetic full backups. For most environments, it is recommended to do synthetic full backups when
N

leveraging Dell EMC Data Domain Boost. This will save stress on primary storage for the vSphere
and Hyper-V VMs and the Boost-enabled synthesizing is very fast.
o

If a Backup Copy job is going to be used and GFS retention (Monthly, Weekly, Quarterly and/or
D

Annual restore points) implemented as well, the first consideration is to ensure that the gateway
server is closest to the Data Domain server, since the Backup Copy job frequently involves an offsite
transfer. When the Data Domain server is designated in the repository setup, ensure that
consideration is given to the gateway server if it is being used off site as GFS transformations can
leverage Dell EMC Data Domain Boost for quicker processing during synthetic full backup file
creation.

There are supplementary benefits to using DD Boost with Veeam Availability Suite that provide

214 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

performance and resiliency improvements in other areas of the VM backup process. The first of these
applies to VMs that may have multiple backup jobs and will land on the same DD Boost Storage Unit.
The first time that VM is backed up with the first of the two (or more) jobs, it will function like a full
backup as expected. The next time that VM is backed up with the second job, it will have to perform a
full backup as it is the first time the Veeam job is called. Because the first job has the bulk of the
blocks of the vSphere or Hyper-V VM on the DD Boost Storage Unit, it will only need to transfer
metadata and any possible changed blocks. This can be a significant improvement on the active full
backup process when there is a fast source storage resource in place. Still, the time of recovery can
be somewhat longer when using a deduplicating appliance due to the transform operations combined

e
with deduplication.

ut
Additionally when using Dell EMC Data Domain Boost, there is Advanced Load Balancing and Link
Failover for connectivity to the Data Domain server. When multiple network interfaces are in use, the

ib
Data Domain server will distribute connections from Veeam components over these links. This
provides improved data transfer performance with Veeam jobs operating in parallel and additional

tr
resiliency by transparently switching failed links to active links if there is an interruption in connectivity.

is
Accelerated Restore of Entire VM

D
To speed up entire VM restore on Dell EMC Data Domain, Veeam Backup & Replication uses the
or
mechanism of sequential data reading from backups and parallel VM disks restore. Dell EMC Data
Domain storage systems are optimized for sequential I/O operations. However, data blocks of VM
disks in backup files are stored not sequentially, but in the random order. If data blocks of VM disks
e
are read at random, the restore performance from backups on Dell EMC Data Domain degrades. To
at

accelerate the restore process, Veeam Backup & Replication creates a map of data blocks in backup
files. It uses the created map to read data blocks of VM disks from backup files sequentially, as they
lic

reside on disk. Veeam Backup & Replication writes data blocks to target in the random order,
restoring several VM disks in parallel. This accelerated restore mechanism is enabled by default, and
is used for the entire VM restore scenario.
up

Note: To further accelerate the process of entire VM restore, Veeam Backup & Replication reads
D

VM data from Dell EMC Data Domain in multiple threads.


ot

Entire VM restore from backups on Dell EMC Data Domain is performed in the following way:
N

1. Veeam Backup & Replication opens all backup files in the backup chain, reads metadata from
these backup files and caches this metadata on the backup proxy that is assigned for the
restore task.
o

2. Veeam Backup & Replication uses the cached metadata to build a map of data blocks. The
D

map contains references to VM data blocks, sorted by VM disks.


3. Every VM disks is processed in a separate task. For every
task, Veeam Backup & Replication starts a separate Veeam Data Mover on the backup proxy.
Veeam Data Movers read data blocks of VM disks from the backup repository sequentially, as
these blocks reside on disk, and put read data blocks to the buffer on the backup proxy.
4. Data blocks are written to target in the order in which they come from the target Veeam Data
Mover.

Veeam Certified Engineer v9.5 . Textbook 215


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

e
ut
ib
tr
is
D
or
e
Backup Proxy for Accelerated Restore
at

Veeam Backup & Replication restores all disks of a VM through one backup proxy. If you instruct
Veeam Backup & Replication to select a backup proxy for the restore task automatically, it picks the
lic

least loaded backup proxy in the backup infrastructure. If you assign a backup proxy explicitly, Veeam
Backup & Replication uses the selected backup proxy. For every VM disk, Veeam Backup &
Replication starts a separate Veeam Data Mover on the backup proxy. For example, if you restore a
up

VM with 10 disks, Veeam Backup & Replication starts 10 Veeam Data Movers on the backup proxy.

The backup proxy assigned for the entire VM restore task must have enough RAM resources to be
D

able to restore VM disks in parallel. For every VM disk, 200 MB of RAM is required. The total amount
of required RAM resources is calculated by the following formula: Total amount of RAM = Number of
ot

VM disks * 200 MB

Before starting the restore process, Veeam Backup & Replication checks the amount of RAM
N

resources on the backup proxy. If the backup proxy does not have enough RAM
resources, Veeam Backup & Replication displays a warning in the job session details and
o

automatically fails over to a regular VM disks processing mode (data of VM disks is read at random
D

and VM disks are restored sequentially).

Limitations for Accelerated Restore

The accelerated restore of entire VM has the following limitations:

Accelerated restore works on Dell EMC Data Domain systems with DD Boost.
If you restore a VM with dynamically expanding disks, the restore process may be slow.
If you restore a VM using the Network transport mode, the number of VM disks restored in

216 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

parallel cannot exceed the number of allowed connections to an ESXi host.

Important! If Dell EMC Data Domain is added as an extent to a scale-out backup repository, you
must set the backup file placement policy to Locality. If the backup file placement policy is set to
Performance, parallel VM disk restore will be disabled.

9.6. Veeam Cloud Connect

e
ut
Service providers (SP) can use Veeam Backup & Replication to deliver backup repository as a
service to their customers (tenants). Veeam Backup & Replication lets SPs set up the cloud storage

ib
so that tenants can send their VM data offsite in an easy and secure way.

Veeam Backup & Replication does not create its own cloud for storing VM data. Instead, it uses SP

tr
storage resources to configure cloud repositories – storage locations in the cloud. Tenants who want

is
to keep their data in the cloud can connect to the SP and write their VM backups to cloud repositories.
Cloud repositories can be used as primary storage locations and secondary storage locations to

D
follow the 3-2-1 backup strategy.
or
e
at
lic
up
D
ot

All data protection and disaster recovery tasks targeted at the cloud repository are performed by
tenants on their own. Tenants set up necessary jobs and perform tasks using Veeam backup servers
N

deployed on their side. Tenants can perform the following operations:


o

Back up VMs to the cloud repository


Copy VM backup files to the cloud repository
D

Restore VM data from the cloud repository (Full VM, VM hard disk, VM files and VM guest OS
files restore for Windows)
Perform file copy operations between tenant’s side and the cloud repository (Manual operations
only. Scheduled file copy jobs are not supported.)

Veeam Backup & Replication establishes a secure channel to transfer data to and from the cloud
repository and offers data encryption capabilities to protect tenants’ data stored in the cloud.

Veeam Certified Engineer v9.5 . Textbook 217


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

e
ut
ib
tr
is
SP Tenant

D
An SP’s customer who copies
An organization that provides the cloud VM data offsite and stores
Definition
repository service to tenants backups in the cloud
or repository on the SP side

- Configuring the Veeam Cloud Connect


e
infrastructure as the environment needed to
provide repository as a service to tenants.
at

As part of this process, the SP takes the


following steps:
lic

- Connect to the Veeam Cloud


- Decides what backup repositories must
Connect infrastructure to be
be used as cloud repositories
able to use cloud repositories
Roles - Sets up SSL certificates to enable
up

- Configure and run jobs and


secure communication in the Veeam Cloud
perform restore tasks targeted
Connect infrastructure
at cloud repositories
- Creates cloud gateways.
D

- Registers user accounts for tenants


- Managing tenants’ accounts and data to
ensure flawless work of the Veeam Cloud
ot

Connect infrastructure
N

- SP Veeam backup server


- Cloud repository - Tenant’s Veeam backup
Cloud connect - Cloud gateway (a network appliance that server
o

components resides on the SP side and acts as a - [Optional] Source WAN


D

communication point in the cloud) accelerator


- [Optional] Target WAN accelerator

Veeam license Veeam Cloud Connect service provider


Any paid license
type license

Note: Veeam Cloud Connect supports parallel processing. The service provider can specify the

218 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

maximum number of concurrent tasks that can be performed within tenant jobs targeted at the
cloud repository and cloud host. Task limitation settings are specified individually for each tenant.

9.6.1. Lease and Quota


When the SP configures a user account for a tenant, the SP assigns quota and, optionally, lease
settings for the tenant. Lease and quota settings help the SP control how tenants consume storage
resources on the cloud repository.

e
Quota is the amount of space (specified in GB or TB) assigned to one tenant on one cloud repository.

ut
It is a chunk of storage resources that the tenant can use for storing backups on the cloud repository.
The SP can assign quotas on different cloud repositories to one tenant. A quota can be valid for

ib
indefinite time or can be restricted in time. To limit the quota lifetime, the SP must set a lease for the
tenant.

tr
Lease is a period of time for which tenants have access to their quotas on the cloud repository. The

is
lease settings help the SP restrict for how long a tenant should be able to use cloud repository
resources.

D
9.6.2. Deleted Backups Protection
or
In some situations, keeping primary or additional backups in a cloud repository may be not enough to
e
ensure data security for a tenant. The backed-up data may become unavailable, for example, after a
at

hacker gains access to the tenant Veeam Backup & Replication console and deletes all backups
created by the tenant — both on site and in the cloud repository. Or a backup administrator on the
tenant side can accidentally delete a necessary backup from a cloud repository. To protect tenants
lic

against such cases, starting from Veeam Backup & Replication 9.5 Update 3, the SP can use the
deleted backups protection functionality.
up

Veeam Backup & Replication offers the deleted backups protection functionality for the following
types of tenant backups:
D

VM backups created by backup copy jobs configured in Veeam Backup & Replication
Backups of physical or virtual machines created by Veeam Agent backup jobs configured
ot

in Veeam Agent for Microsoft Windows and/or Veeam Agent for Linux
Backups copies of VM backups or Veeam Agent backups created by backup copy jobs
N

configured in Veeam Backup & Replication.

The SP can enable the deleted backups protection option individually for a specific tenant. To enable
o

the option, the SP must select the Keep deleted backup files for <N> days check box in the properties
D

of the tenant account. With this option enabled, when a backup or a specific restore point in the
backup chain is deleted from the cloud repository, Veeam Backup & Replication does not immediately
delete the actual backup files. Instead, Veeam Backup & Replication moves backup files to the
"recycle bin".

Technically, a "recycle bin" is a folder on the backup repository in the SP backup infrastructure whose
storage resources are exposed to tenants as cloud repositories. Veeam Backup &
Replication automatically creates this folder at the time when a tenant backup file is moved to the

Veeam Certified Engineer v9.5 . Textbook 219


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

"recycle bin" for the first time.

Backup files in the "recycle bin" do not consume the tenant quota. However, these backup files
consume disk space on the SP storage where the cloud repository is configured. Thus, if the SP plans
to offer deleted backups protection to tenants, it should consider allocating sufficient storage
resources in the Veeam Cloud Connect infrastructure.

For the tenant, backup files moved to the "recycle bin" appear as actually deleted. The tenant cannot
access backup files in the "recycle bin" and perform operations with them. If a tenant needs to restore

e
data from a deleted backup whose backup files still reside in a "recycle bin", the tenant must contact
the SP to obtain the necessary backup file(s).

ut
Important! If the SP offers the deleted backups protection to a tenant, it is recommended that the

ib
tenant uses the latest versions of Veeam products: Veeam Backup & Replication 9.5 Update
3, Veeam Agent for Microsoft Windows 2.1 and/or Veeam Agent for Linux 2.0.

tr
If a tenant renames a job targeted at the cloud repository, and then deletes a backup, Veeam

is
Backup & Replication will move the backup file(s) to a folder with the initial name of the job. As a
result, it may become difficult for the SP to find the necessary backup files in case the tenant

D
needs to restore data from backup files in the "recycle bin". To overcome such situations, the SP
should recommend tenants who use the deleted backups protection functionality to avoid
or
renaming jobs targeted at the cloud repository of the SP.
e
Veeam Backup & Replication keeps tenant backup files in the "recycle bin" for a specific number of
at

days defined by the SP. After this period expires, Veeam Backup & Replication completely deletes
tenant backup files from the "recycle bin".
lic

How Deleted Backups Protection Works


up

Veeam Backup & Replication performs protection of tenant backup files against accidental or
intentional deletion in the following way:
D

1. The SP enables the Keep deleted backup files for <N> days option in the properties of the
ot

tenant account.
2. The tenant creates a backup in the cloud repository in one of the following ways:
N

Runs a Veeam Backup & Replication backup or backup copy job targeted at the cloud
repository.
o

Runs a Veeam Agent backup job targeted at the cloud repository.


D

3. When a backup or restore point is deleted from the cloud repository, Veeam Backup &
Replication moves the backup file(s) to the _RecycleBin folder on the SP backup repository
whose storage resources are exposed to tenants as cloud repositories. Veeam Backup &
Replication performs this operation in the following cases:

When the tenant performs the Delete from disk operation with a backup on a cloud repository.

In this case, Veeam Backup & Replication performs the following operations:

220 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

1. On the tenant side, Veeam Backup & Replication removes the backup from the tenant Veeam
Backup & Replication console and database.
2. On the SP side, Veeam Backup & Replication moves backup files pertaining to the deleted
backup to the "recycle bin".

When the tenant performs the Delete operation with a backup file on the cloud repository in
the Files node of the Veeam Backup & Replication console.

When a backup file pertaining to a backup in a cloud repository is automatically deleted from
the backup chain according to the retention policy defined in the job settings.

e
ut
Veeam Backup & Replication moves to the "recycle bin" only backup files of the VBK and VIB types.
VBM backup files are deleted from disk immediately.

ib
3. Veeam Cloud Connect Service running on the SP backup server checks the configuration
database to get the date when the backup file was moved to the "recycle bin" and compares it

tr
to the current date. This operation is performed regularly with an interval of 20 minutes.
4. When the time interval between the date when the backup file was moved to the "recycle bin"

is
and the current date exceeds the number of days specified in the Keep deleted backup files for
<N> days setting, Veeam Backup & Replication deletes the backup file from

D
the _RecycleBin folder.
or
Important! If the tenant plans to create off-site copies of backed-up data with a backup copy job, it
should enable GFS retention settings in the job properties. This way, Veeam Backup & Replication
will be able to protect backups created by the job against an attack when a hacker reduces the
e
job's retention policy and creates a few incremental backups to remove backed-up data from the
at

backup chain. Without GFS retention settings enabled, the backup copy job will complete with a
warning. In the job statistics window, Veeam Backup & Replication will display a notification
lic

advising to use the GFS retention scheme for the job. Please note that the warning is displayed
only if the tenant backup server runs Veeam Backup & Replication 9.5 Update 3. In earlier
versions of Veeam Backup & Replication, the warning will not be displayed, and the backup copy
up

job will complete with the Success state.


D

Data Restore from Deleted Backups


ot

In contrast to backups that reside on the cloud repository, backup files in the "recycle bin" are not
intended for regular data restore. However, in a situation when an attacker manages to delete tenant
backup(s) from a cloud repository, or if the tenant deletes a backup from a cloud repository by
N

mistake, the tenant may need to restore data from a backup file that was moved to the "recycle bin".
Data restore directly from a backup file in the "recycle bin" is not supported in Veeam Backup &
o

Replication. To restore data from such a backup, the tenant needs to obtain backup file(s) from the
"recycle bin" first.
D

Veeam Backup & Replication moves to the "recycle bin" only backup files of the VBK and VIB type.
VBM files are deleted from disk immediately when a tenant deletes a backup or a backup file is
automatically deleted from the backup chain according to the retention policy. As a result, the SP
cannot simply move a backup file back to the folder with tenant backups on the cloud repository.
Instead, the SP and tenant need to complete the following tasks:

1. The tenant contacts the SP informing that it wants to restore data from a deleted backup.

Veeam Certified Engineer v9.5 . Textbook 221


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

2. The SP finds one or more backup files required for data restore in the "recycle bin" and passes
them to the tenant, for example, over the network or on a portable drive.
3. The tenant imports the VBK file(s) in the Veeam Backup & Replication console on the tenant
backup server.
4. After successful import of a backup, the tenant can restore data from the backup in a regular
way.
5. [Optional] The tenant may want to continue the backup chain started with the obtained backup
file(s). This operation can be available depending on multiple conditions. For details, consider
submitting a support case to the Veeam Support Team.

e
ut
Important! Before restoring data from a deleted backup, the tenant must make sure that a VBM

ib
file with metadata of this backup does not remain on the cloud repository. If a tenant needs to
restore data from a deleted backup file pertaining to a backup that still exists on the cloud
repository, the tenant must delete this backup prior to importing a VBK file in the tenant backup

tr
console. For assistance with data restore from a deleted backup, consider submitting a support

is
case to the Veeam Support Team.

D
9.6.3. Licensing for Cloud Repositories or
To enable the cloud repository functionality, the SP must install the Veeam Cloud Connect service
provider license on the SP Veeam backup server. The cloud repository functionality is licensed per
VM. The SP must obtain a license for the total number of VMs that all tenants working with this SP
e
plan to back up.
at

The Cloud Connect Provider license is consumed only by active VMs. An active VM is a VM that has
lic

been successfully backed up or copied by a tenant in the past 31 days. The number of restore points
created by tenants or the number of jobs that process VMs do not consume the license. For example,
if a tenant processes the same VM with several jobs, this VM is considered as 1 active VM.
up

The total number of active VMs must not exceed the total number of VMs in the license. Depending
on the number of active VMs, the SP license can be in one of the following states:
D

Normal: The total number of active VMs does not exceed the total number of VMs in the license. SP
tenants can freely back up and copy existing and new VMs to the cloud repository.
ot

Grace (valid for 60 days): After the total number of active VMs exceeds the total number of VMs in the
N

license, the license is put to the Grace state. Tenants can still back up and copy existing and new
VMs to the cloud repository.
o

Post grace: The total number of active VMs exceeds the total number of VMs in the license and the
D

grace period has expired. Tenants can back up and copy only those VMs that have already been
backed up and copied in the Normal state.

Recovery: During the Grace period, the SP may return to the license limits. This can happen if the SP
can performs the following actions:

Installs a new license for a greater number of VMs. The number of active VMs must not exceed
the number of VMs in a new license.
Reduces the number of active VMs (SP disables/ removes a tenant or resets a storage quota

222 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

for the tenant)

In this situation, the license it put to the Recovery state. Tenants can back up and copy existing and
new VMs to the cloud repository.

e
ut
ib
tr
is
D
or
e

9.6.4. v9 Cloud Connect Enhancements


at

Veeam Availability Suite v9 has brought Veeam Cloud Connect Replication, a fast, secure cloud-
lic

based disaster recovery (DR) solution. DR is a great solution to increase the availability of modern
datacenter, and does so by leveraging replication technologies and creating an off-site replica of
up

virtual machines. When end users want to design and create a DR site, they are facing a problem: the
capital expenses of building and maintaining the secondary site. In a second location, owned or
rented, they need to deploy new hardware and software according to the size of their production
D

environments, configure it and even manage it, virtually doubling their IT infrastructure efforts. Also,
because production workloads are running for the most part within the primary site, the secondary
one is rarely used, thus its cost it’s even higher when compared to its value.
ot

This is the situation where a cloud-based solution fits perfectly. By renting resources from a service
N

provider on a pay-as-you-go model, end users have the same final result (CPU, RAM, storage and
networking resources available for failover operations) without any capital costs and the burden of
designing and deploying the DR site.
o
D

Furthermore, VM replication through Veeam Cloud Connect is easy-to-use and simple to set-up,
there’s no need to set up and maintain VPN connections, or open multiple ports in firewall.

The end user, upon subscribing to the service and connecting to a service provider, will see a
virtual cloud host, a multi-tenant view of the assigned DR site resources with CPU, RAM, storage and
networking resource allocation. Basically, a cloud host serves as the replication target for the
replication jobs set up by the end user. A service provider assigns a hardware plan to a tenant that
defines the CPU, memory, storage and network resources available to them.

Veeam Certified Engineer v9.5 . Textbook 223


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

e
ut
ib
tr
is
Failover has multiple options:

D
Full site failover
Partial site failover. With that, end users are able to failover to the DR site just a part of their
or
workloads, while other VMs will still be running in the production site. This advanced capability
is available thanks to built-in network extension appliances that will simplify networking
complexity and preserve communication between running VMs regardless of physical location.
e
at

Disaster recovery-as-a-service (DRaaS) is no doubt one of the most requested services by end users.
With Veeam Cloud Connect Replication, service providers have a complete solution to quickly create
lic

and deliver DRaaS services for VMware vSphere and Microsoft Hyper-V environments. The software,
thanks to its native multi-tenancy capabilities, allows a complete isolation of end users hosted on the
same hardware, as well as built-in network connectivity management for all failover types – all without
up

the need to license, learn and maintain any additional 3rd party software.

There are a few more essentials pieces:


D

Ease of use: once end users register a service provider, they will see the new virtual host
added to their B&R. To replicate VMs to the service provider’s infrastructure, the tenant just
ot

needs to set up a replication job pointed to the cloud host as a target.


Ease of networking configuration. The Network Extension appliances preserve communications
N

with and between running replica VMs during full and partial failovers regardless of their
location – without having to make any changes to replica TCP/IP settings before, during or after
o

failover.
Fully automated upgrade of network extension appliances with product updates installation.
D

Bandwidth-friendliness. Seeding, compression, replication from backup, Built-in WAN


Acceleration are all provided as a part of Veeam Cloud Connect Replication to allow customers
with slow or unreliable WAN connections, or large amounts of data, to protect their workloads
with RPOs that was never before possible with their available bandwidth.
Self-service. This is critical to any cloud service, and Veeam Cloud Connect is not an exception.
A web portal is offered, running at the service provider and accessible to the end user from any
device and from any location. Using this portal, the end user is able to login and start any
failover plan on their own, without requiring any intervention from the service provider.

224 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

9.7. Veeam Backup Enterprise Manager


Veeam Backup Enterprise Manager implements security by limiting access to web
management website features and data based on user roles. This empowers administrators
to delegate permissions in a very granular way, on an as-needed basis, to the individuals
who will complete the restore process. It is possible, for example, to delegate permissions to
recover files without actually being able to see the contents of the files. Delegations can be
made to users which allows for recovery across the virtual spectrum from individual files all

e
the way through to the recovery of the entire VM.

ut
9.7.1. Veeam plug-in for vSphere Web Client

ib
Monitor your backup infrastructure directly from the vSphere Web Client, VMware’s next-generation

tr
administrative interface for vSphere. This plug-in delivers at-a-glance and detailed views of job status
and backup resources, and also simplifies capacity planning and identification of unprotected VMs.

is
D
Note: The vSphere Web Client plug-in is installed from the vCenter Servers page of Configuration
view in Veeam Backup Enterprise Manager.
or
Check the following:
e
To successfully obtain statistics from Veeam Backup Enterprise Manager, the accounts under
at

which users access vSphere web client (and then automatically connect to Enterprise Manager)
should be assigned one of the Enterprise Manager security roles.
lic

To open Veeam ONE reports (optional capability), these accounts should be also included
in Veeam ONE Users or Veeam ONE Administrators group on the machine where Veeam ONE
up

Server component is installed.

Now IT admins can quickly create a restore point for selected VM using VeeamZIP (full backup) or
D

Quick Backup (incremental backup) right from VMware vSphere web client, with no need to use
Veeam backup management console. To utilize these capabilities, a user account under which you
log on to vSphere web client needs the following:
ot

1. A security role assigned in Veeam Backup Enterprise Manager. This can be Portal
N

Administrator or Restore Operator with sufficient scope.


2. Minimal privileges on vCenter level: VirtualMachine.Interact.Backup, Task.Create, Task.Update.
o

To configure the settings for VeeamZIP (.VBK file creation), do the following:
D

1. In vSphere web client, open vCenter Inventory and in the inventory tree select the VM you need
to backup.
2. Right-click the VM and from its shortcut menu select Backup > VeeamZIP to. Alternatively, use
the Actions > Backup > VeeamZIP to menu command.

Veeam Certified Engineer v9.5 . Textbook 225


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

You will be taken to the VM’s Manage tab where you should specify VeeamZIP settings which then
will be used as default for VeeamZIP backup.

226 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

e
ut
ib
tr
is
D
3. Select Veeam backup server to process the VM. or
Note: To be visible in this list, Veeam backup server should be added to Veeam Backup
e
Enterprise Manager. Connected repositories from Veeam backup infrastructure will be shown
at

automatically.
lic

4. Select the repository where to store the VeeamZIP file.


5. If necessary, specify the encryption key.
6. Specify whether this backup should be automatically deleted after certain time interval.
up

7. Select the necessary compression level for the backup.


8. By default, guest OS quiescence is deactivated. If you need the backup to be crash-consistent,
clear the Disable guest quiescence check box.
D

9. Now you can click the VeeamZIP button to create a full VM backup (.VBK file) using the
specified settings. You can view the backup creation progress in the Recent Tasks pane on the
ot

right.
N

9.7.2. Required Permissions


o

To be able to log in to the Veeam Backup Enterprise Manager website, the user must be assigned
D

either the Portal Administrator, Restore Operator or Portal User role.

Portal Administrators have full access to all administrative functions and configuration settings;
they can browse, search and restore all VMs (please note that such actions as Instant VM
Recovery and restores from the replica are not available though), files, and application items.
The Configuration area is not accessible to Restore Operators and Portal Users.
Portal Users and Restore Operators can access their restore scope – a list of VMs that can be
recovered by appropriate personnel. For example, database administrators can restore
database servers (SQL, Oracle, or other) – this is their restore scope. Exchange administrators’

Veeam Certified Engineer v9.5 . Textbook 227


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

restore scope will include Exchange server VM, and so on. Depending on the role configuration,
non-administrative users can access the VMs and/or Files tab of Enterprise Manager website.

Important! Restore scope (list of available VMs) can be customized if you have Enterprise Plus
edition of Veeam Backup & Replication. In other editions, this list includes all VMs and cannot be
customized. However, you can delegate recovery of entire VMs, guest files, or selected file types.

Restore Operators can access VMs from their restore scope in VMs and/or Files tab and

e
perform restore operations as permitted by their settings.

ut
Portal Users can access VMs from their restore scope in VMs and/or Files tab, as well as
reports for these VMs; they also can perform restore operations as permitted by their settings.

ib
9.7.3. Restore of Application Items

tr
is
Now authorized personnel, for example, restore operators at Help Desk, can restore the necessary
Exchange items (emails, tasks, calendars) and the necessary SQL databases from backups created

D
with Veeam Backup & Replication using Enterprise Manager.
or
Note: To recover items from your Exchange or SQL database, make sure you have an
application-consistent backup (with VSS enabled) of your server VM. Also, if you plan to restore
e
the SQL database to a certain point in time (not necessarily the restore point), then transaction log
processing should be configured as described in Truncation of transaction logs section.
at

Exchange items SQL items


lic

Role that needs to be assigned to a Restore Operator or


At least Restore Operator
responsible user Portal User
up

Exchange Administrator rights and


Permissions that need to be
Administrator rights for all The “dbo” user
assigned to a corresponding user
D

mailboxes
ot

Note: If your organization’s policy does not allow for administrative rights assignment to restore
N

operators, it is recommended that Application Item Restore wizard (U-AIR) is used.


o

9.7.4. Self-restore portal


D

Veeam Backup Enterprise Manager allows users with local administrative rights for infrastructure VMs
to browse, search and restore guest OS files within restore points of the those VMs. This capability is
supported by Veeam’s runtime process, which perform guest system indexing and also identifies local
administrative accounts.

This approach streamlines delegation of restore capabilities: Instead of multiple role assignments and
restore scope fine-tuning, the Enterprise Manager administrator can simply provide users with a link

228 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

to web UI displaying exactly the controls required for file-level restore of their VMs. Communication
with that personalized web page is performed using HTTPS or HTTP.

Enterprise Managers can access both the Enterprise Manager web UI and the self-restore page. All
other users will be forwarded to the self-restore page upon the login.

9.7.5. Managing Encryption Keys

e
Enterprise Manager keys help you to restore encrypted data in case of a lost or forgotten password

ut
used for encryption. For safety’s sake, it is recommended to periodically generate new Enterprise
Manager keys for the encryption process. Regularly changing the encryption keys raises the
encryption security level.

ib
When you create new Enterprise Manager keys, Veeam Backup Enterprise Manager generates a

tr
keyset of two matching keys:

is
Public Enterprise Manager key that encrypts storage keys on Veeam backup servers connected
to Veeam Backup Enterprise Manager

D
Private Enterprise Manager key that decrypts storage keys in case a password for encrypted
backup or tape is lost or
Enterprise Manager keys are created in the inactive state. To make the keys active and use them for
encryption and decryption, you need to activate the keys.
e

In some cases, government regulations and internal company policies require that you regularly
at

change encryption keys. The shorter the lifetime of an encryption key, the smaller the amount of data
encrypted with that key. And the smaller the amount of data encrypted with a single encryption key,
lic

the higher the level of encryption security.

The lifetime of Enterprise Manager keys is controlled by a key retention period. The key retention
up

period defines for how long Enterprise Manager keys must remain in effect and used for encryption
and decryption.
D

You can specify a retention period for an Enterprise Manager keyset. Once the retention period is
over, the keyset is marked as inactive and is no longer used for encryption or decryption.
ot

It is important to regularly back up your Enterprise Manager keys or save their copies in a safe place.
If you lose a password for an encrypted backup or tape, you can unlock this backup or tape with the
N

private Enterprise Manager key and the Enterprise Keys Restore wizard.
o

However, in some situations, a matching private Enterprise Manager key may be not available. This
can happen, for example, if your Veeam Backup Enterprise Manager database has failed or you use
D

a new installation of Veeam Backup Enterprise Manager and a new database. In this case, Veeam
Backup Enterprise Manager will not find a matching private Enterprise Manager key in the database
and will be unable to unlock the backup or tape encrypted with the public Enterprise Manager key.

You can create a backup copy of an Enterprise Manager keyset with the export operation in Veeam
Backup Enterprise Manager. The exported keyset is saved as a PEM file and contains private and
public Enterprise Manager keys. You can save the exported keyset on the local disk or on a network
share. An exported keyset can be imported back to Veeam Backup Enterprise Manager any time you

Veeam Certified Engineer v9.5 . Textbook 229


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

need.

Important! Create backup copies of Enterprise Manager keysets and keep them in a safe place. If
your installation of Veeam Backup Enterprise Manager goes down for some reason, you will lose
private Enterprise Manager keys. As a result, you will not be able to use the Veeam Backup
Enterprise Manager functionality to recover data from backups and tapes.

e
ut
9.7.6. Decrypting Data without a Password

ib
If you have lost or forgotten a password, you can unlock an encrypted file with the help of Veeam
Backup Enterprise Manager.

tr
You can restore data without a password only if your backup infrastructure meets the following

is
requirements:

1. You use Enterprise or Enterprise Plus Edition of Veeam Backup & Replication.

D
2. The Veeam backup server on which you encrypted the data are added to Veeam Backup
Enterprise Manager. or
3. The Veeam backup server on which you generated a request for data decryption is added to
Veeam Backup Enterprise Manager.
e
To decrypt data without a password, connect the Veeam backup servers to Veeam Backup Enterprise
Manager. In this case, Veeam Backup & Replication will employ Enterprise Manager keys in the
at

encryption process, which will let you recover data from encrypted backups and tapes even if the
password is lost or forgotten.
lic
up

9.7.7. Veeam Backup Enterprise Manager RESTful API


D
ot
N

Veeam Backup Enterprise Manager exposes its objects via the Web Service API based on the REST
(Representational State Transfer) framework. Veeam Backup Enterprise Manager RESTful API lets
o

developers communicate with Veeam Backup Enterprise Manager to query information about objects
D

and perform basic operations with them using HTTP and HTTPS protocols and the principles of
REST. Since the HTTP protocol is very popular and widespread, REST API is platform-agnostic and
can be used with practically any programming language.

REST API relies on the client-server model:

1. The client makes requests to the server, Veeam Backup Enterprise Manager, over the HTTP
2. protocol.

230 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

3. The server processes the request and returns either a successful operation status or error. In
case of success, the server returns a response in the form of an XML document.
4. The client accepts the response, parses it and retrieves the information it needs from the
response.

To work with Veeam Backup Enterprise Manager RESTful API, you can use any browser or client
application that supports HTTP and HTTPS protocols.

Veeam Backup Enterprise Manager additionally offers its own client, Veeam Backup Enterprise

e
Manager Web Client that you can use to evaluate and test capabilities of Veeam Backup Enterprise
Manager RESTful API. Veeam Backup Enterprise Manager Web Client is a web-based client. It can

ut
be accessed via the Internet browser on the machine where Veeam Backup Enterprise Manager is
installed by the following URL:

ib
http://<enterprise-manager>:9399/web

tr
9.8. Standalone Console

is
D
The Veeam Backup & Replication console is a client-side component that provides access to the
backup server. The console lets you log in to Veeam Backup & Replication and perform all kind of
data protection and disaster recovery operations as if you work on the backup server.
or
The console does not have a direct access to the backup infrastructure components and configuration
database. Such data as user credentials, passwords, roles and permissions are stored on the backup
e
server side. To access this data, the console needs to connect to the backup server and query this
at

information periodically during the work session.

To make users' work as uninterrupted as possible, the remote console maintains the session for 5
lic

minutes if the connection is lost. If the connection is re-established within this period, you can
continue working without re-logging to the console.
up

Backup & Replication Console Deployment


D

The console is installed locally on the backup server by default. You can also use it in a standalone
mode — install the console on a dedicated machine and
access Veeam Backup & Replication remotely over the network.
ot

You can install and connect as many remote consoles as you need so that multiple users can
N

access Veeam Backup & Replication simultaneously. Veeam Backup & Replication prevents
concurrent modifications on the backup server. If several users are working
with Veeam Backup & Replication at the same time, the user who saves the changes first has the
o

priority. Other users will be prompted to reload the wizard or window to get the most recent
D

information about the changes in the configuration database.

If you have multiple backup servers in the infrastructure, you can connect to any of them from the
same console. For convenience, you can save several shortcuts for these connections.

Backup & Replication Console Components

When you install a remote console on a machine, Veeam Backup & Replication installs the following
components:

Veeam Certified Engineer v9.5 . Textbook 231


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

Veeam Backup PowerShell Snap-In


Veeam Explorer for Microsoft Active Directory
Veeam Explorer for Microsoft Exchange
Veeam Explorer for Oracle
Veeam Explorer for Microsoft SQL
Veeam Explorer for Microsoft SharePoint
Mount server

Backup & Replication Console User Access Rights

e
To log in to Veeam Backup & Replication via the console, the user must be added to the Local Users

ut
group on the backup server or a group of domain users who have access to the backup server. The
user can perform the scope of operations permitted by his or her role

ib
in Veeam Backup & Replication.

tr
Requirements for Backup & Replication Console

is
A machine on which you install the Veeam Backup & Replication console must meet the following
requirements:

D
The machine must meet the system requirements. or
The remote console can be installed on a Microsoft Windows machine (physical or virtual).
If you install the console remotely, you can deploy it behind NAT. However, the backup server
must be outside NAT. The opposite type of deployment is not supported: if the backup server is
e
deployed behind NAT and the remote console is deployed outside NAT, you will not be able to
at

connect to the backup server.

Limitations for Backup & Replication Console


lic

The Veeam Backup & Replication console has the following limitations:
up

You cannot perform restore from the configuration backup via the remote console.
The machines on which the remote console is installed are not added to the list of managed
servers automatically. For this reason, you cannot perform some operations, for example,
D

import backup files that reside on the remote console machine or assign roles of backup
infrastructure components to this machine. To perform these operations, you must add the
ot

remote console machine as a managed server to Veeam Backup & Replication.


N

9.9. vCloud Director Support


o

Backup and restore of vCloud Director vApps and VMs has always been a hot topic. Up to now,
D

backup tools offered no backup option in the vCloud Director environment. The only way was to
perform backup at the level of the underlying vCenter Server. For restore, the administrators would
first need to restore VMs to the vCenter Server level and then import them to vCloud Director.

Veeam Backup & Replication provides support for vCloud Director. It uses vCloud Director API to help
you back up vApps and VMs and restore them directly to the vCloud Director hierarchy.

232 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

e
ut
ib
The main entity with which Veeam Backup & Replication works during backup is a vApp. A vApp is a
virtual system that contains one or more individual VMs along with parameters that define operational

tr
details – vApp metadata. When Veeam Backup & Replication performs a backup of VMs, it captures

is
not only data from the VMs, but also vApp metadata.

D
As a result, you can restore vCloud Director objects back to the vCloud Director hierarchy and do not
need to perform any additional actions on import and VM configuration.
or
e
at
lic
up
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 233


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

234 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

Labs for Module 9: Advanced Data Protection

At this point, you’ve learned most of the basic data protection and disaster recovery features of
Veeam Backup & Replication. You are now able to perform backup and replication, verify it and
restore entire VMs and granular objects, such as files, Microsoft Exchange, Oracle, Microsoft Active
Directory, Microsoft SQL Server and Microsoft SharePoint items.
In addition to those crucial features, Veeam Backup & Replication provides a few more advanced

e
options that allow you to comply with your data protection strategy while improving your recovery time
and point objectives (RTPO™) to better protect your data and VMs. The next set of labs provides you

ut
with hands-on experience on taking your backups off site to tape, advanced integration with SAN
storage arrays, Veeam Backup Enterprise Manager, Veeam Backup & Replication Standalone

ib
Console and Veeam PowerShell snap-in.

tr
Get into the Lab

is
D
Lab Action Purpose

Working with SAN Configure a SAN storage so that backup and restore
9.1
storage snapshot
or
using SAN snapshots can be used.

Connect a tape device to your Veeam Backup &


e
9.2 Using backup to tape Replication installation. Create a backup job to get
backups off site.
at

Configuring Hyper-V
lic

Add an off-host proxy so that the load of data


9.3 backup to run in off-host
processing is taken from the Hyper-V host.
mode
up

Working with Veeam


Review the capabilities of Veeam Backup Enterprise
9.4 Backup Enterprise
Manager and try them out.
Manager
D

Backup Veeam server configuration and perform a


ot

Veeam configuration configuration restore using a migrate scenario to


9.5
backup and restore copy the infrastructure configuration from one
Veeam Backup & Replication server to another.
N

Introducing the Veeam


9.6 Operate the product through PowerShell cmdlets.
o

PowerShell snap-in
D

Veeam Certified Engineer v9.5 . Textbook 235


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 9: Advanced Data Protection

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

236 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 10: Veeam ONE Features and Functionality

10. Veeam ONE Features and Functionality


Veeam ONE is a management solution for virtual environments of any scale and complexity.
It delivers real-time monitoring on health and performance of virtual environments, helps
analyze the efficiency of data protection implemented with Veeam Backup & Replication,
provides intelligent reporting and offers business-based views of the virtual infrastructure
topology to simplify management and expedite decision-making.

e
10.1. Veeam ONE overview

ut
Veeam ONE incorporates three components:

ib
Component Description

tr
Veeam ONE Monitor is the primary tool used for monitoring your virtual

is
environment and Veeam Backup & Replication infrastructure. In the Veeam
ONE Monitor console, you can manage, view and interact with alarms and
Veeam ONE

D
monitoring data as well as analyze performance of virtual infrastructure and
Monitor
backup infrastructure components. You can also keep an eye on the efficiency
of data protection operations and troubleshoot issues that occur in your virtual
or
environment, generate reports, and administer monitoring settings.

Veeam ONE Reporter helps you verify configuration issues, optimize resource
e
Veeam ONE allocation and utilization, and track implemented changes. You can also plan
at

Reporter capacity growth and track whether mission-critical VMs are properly protected
in the virtualized datacenter.
lic

Veeam ONE Business View allows you to group your virtual infrastructure
objects into categories like SLA, business unit, purpose, or configuration entity.
Veeam ONE
up

Your business categorization model is further applied to the monitoring and


Business View
reporting functionality to simplify management and ensure transparency of
operations for your business across large virtual environments.
D

10.2. Veeam ONE components


ot

Veeam ONE Reporter and Veeam ONE Monitor integrate with Veeam ONE Business View out
N

of the box. Veeam ONE Business View categorization model and category values assigned to
virtual infrastructure objects are stored to the shared Veeam ONE database. Veeam ONE
o

Monitor and Veeam ONE Reporter access and use this data for business-oriented monitoring
and reporting. Therefore, you don’t need to perform any additional steps for Veeam ONE
D

components integration.

10.2.1. Monitoring and Alerting


Veeam ONE Monitor – a part of an integrated Veeam ONE solution – is the primary tool for
monitoring your VMware and Microsoft Hyper-V environment and Veeam Backup & Replication
infrastructure. With Veeam ONE Monitor, you can manage, view and interact with alarms and

Veeam Certified Engineer v9.5 . Textbook 237


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 10: Veeam ONE Features and Functionality

monitoring data, analyze performance of virtual infrastructure objects, keep an eye on the efficiency of
data protection implemented with Veeam Backup & Replication, generate reports and administer
monitoring settings. Veeam ONE Monitor provides complete visibility of your virtual and backup
infrastructure and helps you speed up troubleshooting and quickly isolate root causes of performance
issues before users and services are affected.

Veeam ONE Monitor features the following functionality:

Feature Description

e
Veeam ONE Monitor offers advanced possibilities for monitoring the

ut
efficiency of VM data protection in your virtual environment. Veeam ONE
Monitor collects real-time statistics from connected Veeam backup servers
Integration with

ib
and allows you to quickly review the latest status of backup, replication,
Veeam Backup &
SureBackup, backup copy, backup to tape, and other types of jobs. You
Replication
can also examine configuration and performance of your backup

tr
infrastructure components and instantaneously react to potentially
dangerous situations with VM data protection.

is
Veeam ONE Monitor is designed for professional use in Microsoft Hyper-V

D
and VMware vSphere virtual environments. Monitoring and alerting
Support for
capabilities for Microsoft Hyper-V and VMware vSphere virtual
heterogeneous
virtual environments
or
environments are available from a single console, which eliminates the
need to deploy and use multiple monitoring solutions for adopted
virtualization platforms.
e

Support for Veeam ONE Monitor allows you to gather monitoring information from
at

SCVMM, failover large virtual deployments with multiple SCVMM servers, failover clusters
clusters and hosts and standalone hosts.
lic

Veeam ONE Monitor connects to SCVMM and failover clusters to provide


you with cluster-aware monitoring of your virtual machines. If a VM is
up

moved to another server in the cluster by means of Live Migration or


manually, Veeam ONE Monitor will continue gathering performance data
Integrated or
from it. Veeam ONE Monitor allows you to gather monitoring information
standalone
D

from large virtual deployments with multiple SCVMM servers or failover


monitoring
clusters – all from a single console.
For small datacenters or development labs running without SCVMM or
ot

failover clusters, Veeam ONE Monitor can provide monitoring, alerting and
reporting for multiple standalone hosts.
N

Veeam ONE Monitor supports multi-admin access to performance data


without affecting virtual environment performance or changing the access
o

Client/Server
policy. It agentlessly gathers all performance information into a Microsoft
architecture
D

SQL Server database, allowing users to access infrastructure-wide


performance data as needed.

238 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 10: Veeam ONE Features and Functionality

Feature Description

With Veeam ONE Monitor alarms, you can easily set up email notifications
and SNMP traps or run custom notification scripts for important events
such as VM power off, CPU utilization level excess, and so on. SNMP
traps can be used to feed alarm data into other popular system monitors,
such as CA Unicenter, BMC Patrol, IBM Tivoli or HPE OpenView.
Alarms
Alarm modelling allows you to estimate the number of alarms that you will
receive and adjust alarms settings in case important information is not
received or too many false positive alarms are triggered. Alarm

e
suppressing makes it possible to eliminate sending multiple alarms during

ut
specific activities in your virtual infrastructure (for example, backup).

To provide enhanced control over the virtual environment, Veeam ONE

ib
Advanced Monitor features a number of advanced monitoring options: viewing and
monitoring options managing in-guest processes and services running on a host or VM and

tr
logging on to the VM console directly from Veeam ONE Monitor.

is
Veeam ONE Monitor keeps you aware of the local storage, Cluster Shared
Volumes (CSV) and SMB file shares state. To trace the storage state, it

D
CSV, SMB and local uses specific alarms, reports and charts. Direct and indirect CSV
storage monitoring workloads are differentiated in charts to help you understand the impact of
each type of workload on a datastore and determine whether an issue is
or
hardware- or configuration-based.

To obtain a point-in-time view of your virtual environment, you can create


e
reports right from the Veeam ONE Monitor console. With a couple of
at

clicks, you can generate HTML reports that describe your virtual
Historical reports
infrastructure, summarize performance statistics and help you analyze the
efficiency of data protection in your virtual environment. Or, you can easily
lic

switch to the Veeam ONE Reporter console.


up

Veeam ONE Monitor enables both technical- and business-oriented


monitoring of the virtual infrastructure. It uses categorization data from
Business view
Veeam ONE Business View to build a business topology of your virtual
categorization
infrastructure and provide you with a possibility to monitor and alert of your
D

environment presented in business terms.


ot

With Veeam ONE Monitor, you can configure and use alarms that will inform you about important
events and changes in your virtual environment. The ability to be alerted of changes in your virtual
N

environment allows for faster response to critical issues and helps to maintain the overall health of the
virtual infrastructure.
o

Out of the box, Veeam ONE Monitor comes with a set of predefined alarms including:
D

Predefined alarms for monitoring VMware vSphere, Microsoft Hyper-V environments and
vCloud Director operations framework. Predefined alarms are based on best practices for a
common virtual environment.
Veeam Backup & Replication alarms that alert on connection status of backup infrastructure
components, job state and duration, insufficient space on backup repositories, and Veeam
Backup & Replication license issues.
Internal alarms that alert on data collection issues, problems with connection to virtual servers,

Veeam Certified Engineer v9.5 . Textbook 239


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 10: Veeam ONE Features and Functionality

insufficient space for Veeam ONE database, and license concerns.

All predefined alarms include an extensive knowledge base. When a problem occurs, you will not only
be alerted, but will also have all the necessary information for troubleshooting and finding the root
cause of the issue.

Depending on your requirements to the virtual environment, you can adjust settings of predefined
alarms, or create new alarms that will analyze performance and alert on errors at any level of the
virtual infrastructure. Veeam ONE Monitor offers an extensive set of rules and different severity levels,

e
allowing you to create your own elaborate alarm model.

ut
10.2.2. Reporting and Dashboards

ib
Veeam ONE Reporter – part of an integrated Veeam ONE solution – is designed for documenting and

tr
reporting on your Veeam Backup & Replication infrastructure and virtual environment. Veeam ONE
Reporter allows you to automatically discover and collect information about your VMware vSphere,

is
vCloud Director, Microsoft Hyper-V environment, its components, configuration settings, performance
and track the efficiency of data protection performed with Veeam Backup & Replication. Veeam ONE

D
Reporter offers comprehensive visual reports and dashboards for documentation, analysis, decision-
making, change tracking, capacity planning and optimization of resource utilization.
or
Veeam ONE Monitor also offers a set of summary dashboards for monitoring your virtual environment
and data protection infrastructure. Summary dashboards serve as the "launch point" for monitoring
e
and troubleshooting. They show the summary of health state, list the most recent alarms and highlight
key performance and configuration metrics in a single view. Summary dashboards are particularly
at

helpful if you want to quickly check the overall health and reveal hotspots in your environment.
lic

Virtual infrastructure Summary dashboards are the start-off point for monitoring your virtual
environment. The dashboards reflect the aggregate health state for all components at a specific level
up

of your virtual infrastructure and show summary details for a selected virtual infrastructure object:

Virtual Infrastructure Summary


Host Summary
D

Virtual Machine Summary


Local Storage Summary
ot

SMB Share Summary


Cluster Shared Volume Summary
N

The Veeam ONE Reporter reports can be launched within the Veeam ONE Monitor interface. The
following reports are among ones available with Veeam ONE Reporter:
o
D

Report Name Description

Calculates storage costs for the backup infrastructure and tracks


Backup Billing
how much storage space is consumed by backup files

Provides inventory information for your Veeam Backup &


Backup Inventory
Replication infrastructure

240 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 10: Veeam ONE Features and Functionality

Report Name Description

Analyzes the amount of free space on backup repositories and


Capacity Planning for
estimates the projected date when the repositories will run out of
Backup Repositories
available storage capacity

Job Configuration Change Keeps a record of the backup jobs’ configuration changes that
Tracking occurred during a specified period

Backup Job Historical Provides advanced information on completed backup and

e
Information replication job sessions

ut
Provides an overview of the storage utilization trends for Cloud
Veeam Cloud Connect

ib
Connect customers, listing key details and providing capacity
User Report
availability outlook

tr
Tracks the progress of SQL server backup jobs, providing the
SQL Backup Job Historical

is
necessary details to verify that critical databases are properly
Information
backed up

D
Audits information on all types of restore actions performed across
Restore Operator Activity
the selected Veeam Backup & Replication servers
or
Examines which VMs in your environment have been bolstered by
Protected VMs
up-to-date restore points by validating their RPO compliance
e
at

Discovers the VMs that are present in existing backup files, but are
Orphaned VMs missing from any pending backup, replication or backup to tape
jobs
lic

VMs Backed Up by Multiple


Zeroes in on the VMs that are backed up by several discrete jobs
Jobs
up

Dissects the configuration of a failover plan, including the list of


VM Failover Plan Overview
designated VMs and the amount of storage data allocated to them
D

Lists the VMs whose backups are not complemented by an existing


VMs with no Archive Copy
ot

archive copy
N

10.2.3. Business Categorization


o

While the SCVMM and Failover Cluster Manager consoles offer a set of views presenting virtual
D

infrastructure hierarchy from a technical perspective (clusters, hosts, VMs and so on), Veeam ONE
Business View builds a different categorization model – it presents data about VMs, hosts, storages
and clusters in business terms, as they are categorized in your virtual infrastructure. Such insight from
the enterprise perspective allows you to control, analyze and plan constantly developing and
changing virtual environment.

vSphere tags are becoming increasingly popular with vSphere administrators, as they provide much
more flexibility than a single dimension of VM folders. In fact, both Veeam Backup & Replication and
Veeam ONE support vSphere tags. Once the rules are defined in Business View, the appropriate tags

Veeam Certified Engineer v9.5 . Textbook 241


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 10: Veeam ONE Features and Functionality

are then automatically set in vSphere. This means that you can create automatic rules in Business
View to tag VM's and then setup backup jobs in Veeam Backup & Replication to use the vSphere
tags. This will work with any product that uses vSphere tags.

As a result, Veeam ONE Business View can be used to create a tag for all mission critical VMs. This
tag can be later used in Veeam ONE Reporter and Veeam ONE to assign special alarms and reports
to that group, or in Veeam Backup & Replication to configure backup or replication jobs to
automatically include any VMs with the given tag.

e
10.2.4. Auto Discovery of Backup and Virtual Infrastructure

ut
To allow Veeam ONE to collect information about your virtual infrastructure and track the efficiency of

ib
VM data protection, you need to connect to VMware, vCloud Director or Hyper-V virtual management
servers and Veeam backup servers. You can connect to servers either during installation or configure

tr
connections later in the Veeam ONE Monitor console. Configured connection settings are

is
automatically propagated to all Veeam ONE components.

D
For example: If you connect a vCenter Server to Veeam ONE Monitor, it automatically becomes
available in Veeam ONE Reporter and Veeam ONE Business View. Therefore, there’s no need to
or
configure connections to virtual servers and backup servers for every Veeam ONE component
individually.
e
When you:
at

Change connection settings for a server, the changes are adapted across all components.
Remove a server from Veeam ONE Monitor, Veeam ONE automatically removes the server
lic

connection from all other components.

Veeam ONE provides a convenient way of gathering data from VMware vSphere servers, vCloud
up

Director servers, SCVMM servers, failover clusters, Hyper-V hosts and Veeam backup servers. Data
for Veeam ONE Monitor is collected in real-time. For Veeam ONE Reporter and Business View, you
can choose to collect data periodically, according to a specific schedule, or run data collection
D

manually. Veeam ONE collects data agentlessly, putting no additional load on virtual servers. Veeam
ONE leverages built-in monitoring means: it uses network connection to get data via a set of API calls
ot

and OS subsystems.
N

Retrieved data is stored to the SQL database. You can choose the necessary point in time to
generate reports that describe the state of the virtual infrastructure and data protection activities at the
chosen moment in the past.
o
D

Veeam ONE supports multi-user access to its monitoring and reporting capabilities. Authorized users
can concurrently access the same instance of Veeam ONE to monitor the health state of the virtual
infrastructure, view dashboards and run reports. To restrict access to sensitive infrastructure data,
you can limit the scope of virtual infrastructure objects and associated data that must be available to a
Veeam ONE user. Thus you can control what subset of the managed virtual infrastructure the user
can see and work with.

User permissions can be restricted for two types of inventories:

242 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 10: Veeam ONE Features and Functionality

VMware vSphere inventory


vCloud Director inventory

In a multi-tenant environment, you can configure restricted access to Veeam ONE data for owners of
virtualized systems or responsible personnel and delegate monitoring and reporting tasks. For
example, if you manage VMware vSphere systems that belong to different business units, you can
restrict permissions so that users can monitor and report on systems owned by their business unit.
Or, if you manage resources for multiple organizations in a vCloud Director environment, you can
restrict permissions on a per-organization basis, so that users can monitor and report on vApps and

e
VMs belonging to their organization.

ut
Important! You must not include a user with restricted permissions into Veeam ONE security

ib
groups. Members of security groups always have access to the whole infrastructure inventory in
Veeam ONE, regardless of their permissions on the vCenter Server or vCloud Director inventory

tr
hierarchy.

is
10.3. Veeam ONE Deployment

D
Veeam ONE supports two deployment scenarios: Typical and Advanced (Advanced
or
scalability). Depending on the size of the managed virtual environment, you can choose of
the following Veeam ONE installation types:
e

Typical – this type of installation is recommended for small to medium environments,


at

with up to 100 hosts and 1500 VMs


lic

Advanced Scalability – this type of installation is recommended for large environments


with more than 100 hosts and 1500 VMs
up

Installation type is defined by a set of configuration parameters that determine Veeam ONE
D

behavior in a number of areas, such as data collection and other. Choosing the appropriate
installation type allows you to optimize monitoring and reporting performance and improve
ot

user experience in Veeam ONE. Note, that Veeam ONE provides support for multi-tenant
environments.
N

10.3.1. Typical deployment


o
D

The typical deployment scenario is ideal if you want to consolidate the entire product functionality in
one place by installing all product components on a single machine (physical or virtual). This scenario
is preferable for small- to medium-scale deployments.

Veeam Certified Engineer v9.5 . Textbook 243


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 10: Veeam ONE Features and Functionality

e
ut
ib
In the typical deployment scenario, all Veeam ONE components (Veeam ONE Server, Veeam ONE

tr
Web UI, and Veeam ONE Monitor Client) are installed altogether on a single machine (either physical
or virtual).

is
To store data retrieved from connected servers, a local or remote SQL Server instance is required as

D
a supporting system. If you have an SQL Server instance that meets the Veeam ONE system
requirements, you can adopt it for Veeam ONE usage. Otherwise, you can install a new SQL Server
or
instance during the product installation – Veeam ONE setup package includes SQL Server 2012
Express.

To enable multi-user access to real-time performance statistics and configurable alarms, you can
e
additionally install several instances of Veeam ONE Monitor Client on separate machines. Thus, you
at

will be able to access Veeam ONE functionality either from the local machine or from remote
computers.
lic

10.3.2. Advanced deployment


up

The advanced deployment scenario is more suitable if you want to separate client/server roles by
D

installing structural components on different machines. It is more suitable to accommodate the need
of the large environments.
ot
N
o
D

In the advanced deployment scenario, the following Veeam ONE components are installed on
separate machines:

244 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 10: Veeam ONE Features and Functionality

Veeam ONE Server


Veeam ONE Web UI

To enable user access to real-time performance statistics and configurable alarms, you need to install
one or several instances of Veeam ONE Monitor Client.

To store data retrieved from connected servers, a local or remote SQL Server instance is required as
a supporting system. If you already have an SQL Server instance that meets the Veeam ONE system
requirements, you can adopt it for your deployment. Otherwise, you can install a new SQL Server

e
instance during the product installation – Veeam ONE setup package includes SQL Server 2012
Express.

ut
The advanced installation utilizes a client-server model for data collection and communication, which

ib
includes three components:

tr
Component Description

is
Collects data from virtual infrastructure servers, vCloud Director servers
Server and Veeam Backup & Replication servers and stores aggregated data in
the SQL database

D
Web UI
- Veeam ONE
or
Communicates with the SQL database allowing users to access collected
Reporting
data for generating reports and managing business categorization
- Veeam ONE
e
Business View
at

Communicates with Veeam ONE Server directly to obtain real-time virtual


Monitor Client
infrastructure performance data and data protection statistics
lic

Therefore, for a successful advanced deployment of Veeam ONE, it is essential that the client
up

components are aware of the Veeam ONE Server and SQL database locations and can connect to
them in order to process and manipulate data.
D

10.4. Veeam ONE as an assessment tool


ot

Veeam ONE offers the Infrastructure Assessment report pack which helps ensure your VMs
N

are ready to be properly backed up. Infrastructure assessment reports analyze your
environment for incompatibilities and configuration errors that can potentially prevent or
complicate future backup operations. The report pack helps you predict the amount of future
o

changes on virtual disks that may have an influence on the frequency of backup jobs,
D

consumed backup capacities and necessary WAN bandwidth allocated for replication jobs.

10.4.1. Veeam ONE as an assessment tool content


The following reports are included in the VMware Infrastructure Assessment pack:

Datastore Performance Assessment – provides information on datastore performance and

Veeam Certified Engineer v9.5 . Textbook 245


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 10: Veeam ONE Features and Functionality

helps reveal potential issues that can occur during the backup process.
VM Change Rate Estimation – tracks the amount of data changed on virtual disks to find VMs
that grow too fast. The report analyzes rates at which data was written to virtual disks during the
selected reporting interval, and displays top N virtual machines that grew faster and slower than
other VMs. By analyzing the VM change rate, this report helps you assess future needs for
repository free space.
VM Configuration Assessment – helps you to assess VMs readiness for performing backup with
Veeam Backup & Replication. The report analyzes configuration of VMs in your virtual
environment, and shows potential issues and possible limitations that could cause backup

e
process to fail or prevent VMs from being properly backed up – for example, VMware Tools are

ut
not installed at the VM, or the VM has independent virtual disks in its configuration (Veeam
Backup & Replication does not support independent disks; these disks are skipped from
processing automatically). This report allows you to obtain a list of VMs in your virtual

ib
environment that could experience potential issues with backups, and to get guidance on how
to resolve these issues.

tr
The following reports are included in the Hyper-V Infrastructure Assessment pack:

is
Configuration Assessment – analyzes configuration of the Hyper-V infrastructure against a set

D
of recommended settings and best practices, identifies clusters, hosts and\or VMs that are
configured inefficiently and verifies problem areas to help mitigate issues and prepare VMs for
or
backup with Veeam Backup & Replication.
Performance Assessment – evaluates whether the Hyper-V infrastructure is configured
optimally, helps find potential issues and suggests actions aimed at boosting its efficiency.
e
VM Change Rate Estimation – tracks the amount of data changed on virtual disks to find VMs
that grow too fast. The report analyzes rates at which data was written to virtual disks during the
at

selected reporting interval, and displays top N virtual machines that grew faster and slower than
other VMs. By analyzing the VM change rate, this report helps you assess future needs for
lic

repository free space.


up

10.4.2. Data Sovereignty


D

Veeam Backup & Replication supports a notion of location which you can assign to virtual
infrastructure, backup infrastructure and agent management objects. Location settings helps to
monitor where production data and their copies and replicas reside geographically. There are two
ot

reports included to track Data Sovereignty:


N

Data Sovereignty Overview


Data Sovereignty Violations analyzes whether any backups, backup copies and replicas reside
in a location different from a data source and displays results as pie charts. This visual
o

representation will help you identify which jobs and objects violate data protection regulations
D

accepted in your organization.

Data Sovereignty Overview analyzes the location of backups, backup copies and replicas for a data
source and displays it as pie charts. This visual representation will help you monitor your data in a
geographically disperse infrastructure.

246 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 10: Veeam ONE Features and Functionality

Labs for Module 10: Veeam ONE Features and


Functionality

It is crucial to have the right monitoring tools to maintain complete visibility into your virtual
environment and backup and replication infrastructure in order to maintain an Always-On Business™.
Proper visibility in both layers helps provide efficient detection of potential issues before operational

e
impact.

ut
You are now welcome to try out the corresponding labs on Veeam ONE and its capabilities. You will
have an opportunity for a hands-on experience when working with Veeam ONE, from setting it up to

ib
performing infrastructure assessment, before Veeam Backup & Replication installation.

tr
is
Get into the Lab

D
Lab Action or Purpose

Setting up Veeam ONE Add a Veeam backup server to the Veeam ONE
10.1
(part two) interface and schedule data collection.
e
Creating a custom Create a Veeam ONE Reporter dashboard to make
at

10.2 Veeam ONE Reporter working with the VMs from the course easier and
dashboard more comfortable.
lic

Set up email notifications to ensure that you do not


Customizing Veeam ONE
10.3 miss critical changes or events that occur in your
Monitor alerting options
up

environment.

Veeam ONE: Creating a


D

10.4 Business View category Set up categorization for VMs.


and group
ot

Veeam ONE backup Run the Protected VMs report to analyze the backup
10.5
reporting protection of VMs in your virtual environment.
N

Performing an Analyze the environment for incompatibilities and


10.6 infrastructure configuration errors that can potentially prevent or
o

assessment complicate future backup operations.


D

Veeam Certified Engineer v9.5 . Textbook 247


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 10: Veeam ONE Features and Functionality

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

248 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 11: Product Editions

11. Product Editions


Veeam Backup & Replication is available in Standard, Enterprise and Enterprise Plus
editions. The Enterprise and Enterprise Plus editions include additional features to
accommodate the requirements of large enterprise environments.

11.1. Product Editions Comparison

e
ut
A subset of the differences in features for Standard, Enterprise and Enterprise Plus editions
applicable to VMware vSphere and Microsoft Hyper-V environments are shown in the table below.

ib
Standard Edition Enterprise Edition Enterprise Plus Edition
Feature
VMware Hyper-V VMware Hyper-V VMware Hyper-V

tr
Available

is
Support for copying jobs Available Available
Backup copy job to remote locations over Direct operations and Direct operations and

D
WAN (direct operations WAN acceleration WAN acceleration
only)
or
Available
Built-in WAN
Not available Available
acceleration Only support for Veeam
Cloud Connect
e
at

Available
Support for
creating
lic

Backup from storage Not


Not available Not available backups and
snapshots available
replicas from
SAN
up

snapshots

Full support
Includes archiving
D

Limited Veeam backups to tape,


Native tape support Full support
File to Tape jobs only with full tracking of
ot

backups and restore


points
N

Limited
Full support
Visibility of
Support for
vCloud
o

self-service,
Director Limited
tenant
(vCD) support
D

managed
infrastructure, Support
backup and
Support for vCloud backup via Not for scheduled Not Not
restore via
Director VeeamZIP available incremental available available
Enterprise
(including backup jobs
Manager, as
backup of of vCloud
well as native
vApp and VM VMs.
vCloud
meta data
Director
and
authentication
attributes)

Veeam Certified Engineer v9.5 . Textbook 249


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 11: Product Editions

Standard Edition Enterprise Edition Enterprise Plus Edition


Feature
VMware Hyper-V VMware Hyper-V VMware Hyper-V

Available
Universal
Includes specialized
Application-Item Not available Available
universal wizard for any
Recovery (U-AIR)
application

Manual
Automated
Verify the recoverability
You can select to perform

e
of backup files by
SureBackup recovery automatic recovery
mounting VM disks from Available
verification verification jobs after

ut
backup files using Instant
every backup and verify
VM Recovery and
any restore point.
manually testing them

ib
Available

tr
Automatically
SureReplica recovery Not verify every Not Not
Not available Available

is
verification available restore point available available
in every
replica

D
On-Demand
Not available Available Available
Sandbox
or
On-Demand
Sandbox for Storage Not available Not available Available
e
Snapshots
at

Not restricted
Browse and search for
Restricted
lic

files in both current and


Browse and search for
File system indexing archived backups (for Not restricted
files in backups which are
example, backups which
currently on disk
up

have been moved to tape


storage)

Available
D

Allows help desk


administrators to restore
1-Click Restore Not available VMs and guest files Available
ot

through the Veeam


Backup Enterprise
N

Manager web UI

Available
Delegation and self-
o

Allows authorized users


recovery of VMs and Not available Not available
to restore VMs and guest
D

guest files
files through the web UI

Available
Clone existing jobs and
Job cloning and edit their settings from
Not available Available
editing via the web UI the Veeam Backup
Enterprise Manager web
UI

250 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 11: Product Editions

Standard Edition Enterprise Edition Enterprise Plus Edition


Feature
VMware Hyper-V VMware Hyper-V VMware Hyper-V

Limited support
Full support
Browse and restore mail
Veeam Explorers Includes restore to Full support
items via save, send and
original location
export

Scale-Out Backup Limited Available


Not available
Repository 3 extents maximum Unlimited extents

e
Backup from NetApp

ut
SnapMirror Not available Not available Available
and SnapVault

ib
Not available
Application-Aware

tr
Processing is still
Guest possible, but runtime will
Available Available

is
Interaction Proxy be injected by Veeam
Backup Server instead of
a Guest Interaction

D
Proxy.

Mount Server Available


or
Available Available

Direct NFS access Available Available Available


e
Standalone console Available Available Available
at

Data Domain Boost


and HPE StoreOnce Not available Available Available
lic

Support

Veeam PowerShell
up

Available Available Available


snap-in

Veeam Backup
D

Enterprise Manager Not available Not available Available


Web API
ot

All editions are installed with the same setup file, however, the extra functionality becomes available
only after installing a full license for Veeam Backup & Replication Enterprise Edition or Enterprise
N

Plus Edition. You can install the license for the necessary version during the setup process and
change the license file later. You can also change the type of license used.
o

A full comparison between all editions can be found on the Veeam website at
D

https://www.veeam.com/backup-version-standard-
enterprise-editions-compar
ison.html

Veeam Certified Engineer v9.5 . Textbook 251


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 11: Product Editions

11.2. Product Licensing


Veeam Backup & Replication is licensed per socket for each managed hypervisor, where protected
VMs reside.

ProPartner
Paid Trial Free Edition
NFR

Number of CPU

e
Number purchased 32 12 Unlimited
sockets

ut
6 or 12
Duration Perpetual/Subscription 30 days Perpetual
months

ib
Enterprise Enterprise

tr
Functionality Edition purchased Free Edition
Plus Plus

is
Technical Basic or Production Evaluation
Limited Limited
support Support Support

D
11.3. Full and Free Functionality Modes
or
Veeam Backup & Replication can operate in two functionality modes: full mode and free mode.
e

When you run Veeam Backup & Replication in the full functionality mode, you get a commercial
at

version of the product that provides access to all functions.


When you run Veeam Backup & Replication in the free functionality mode, you get a free
lic

version that provides a number of powerful utilities for managing virtual machines (VMs). It also
provides flexible recovery, with the ability to
up

restore the entire VM or individual VM files, guest files, and Microsoft Exchange, SharePoint,
SQL Server and Active Directory items directly from the backup. Veeam Backup Free Edition
does have a number of limitations, including (but not limited to):
D

Full backups of individual VMs only — no scheduled, incremental or multi-VM backups


No vPower capabilities (however, you can import VeeamZIP™ backups into the paid
editions and use vPower capabilities there)
ot

No VM replication
N

If you have a valid license installed, Veeam Backup & Replication operates in the full functionality
mode. As soon as your license expires, you will be offered to install a new license or switch to the free
functionality mode. To switch to the free mode, select View → Free functionality only from the main
o

menu.
D

To switch back to the full mode, do either of the following:

Install a valid license: select Help → License from the main menu. In the displayed window,
click Install License and select the necessary license file.
Select View → Full functionality (advanced) from the main menu. Note that if you do not
have a valid license installed, you will not be able to use the functionality provided by the full
mode.

252 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 11: Product Editions

Note: You cannot switch to the free functionality mode if a valid trial or paid license is installed on
the Veeam backup server. In this case, the View menu item will be hidden in the main menu.

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 253


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 11: Product Editions

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

254 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 12: Troubleshooting

12. Troubleshooting
In this section you will explore:

How to identify issues

How to review and analyze issues

e
ut
12.1. How to identify the Problem

ib
The first stage of the process is to identify the problem.

tr
Listed here are some of the most common problems.

is
Category Common Problems

D
- Backup job error
Error messages - Pop up messages in GUI / program
or
- Errors During restore

- Slow performance on the server / poor server performance


e
(Stunned or slow work of the server / High load on the
server)
at

- Non responsive GUI


Unexpected infrastructure behavior
- Non responsive Veeam Server
lic

- Veeam services or other services not starting


- BSOD (Windows Blue Screen)
- Incorrect information
up

Other Environmental challenges - Too fast /too heavy/poorly tuned Veeam


D

12.2. Review and Analyze the Issue


ot

Once the problem has been identified, the next step is to analyze the issue. To begin, you should
N

always check if it’s a common issue or limitation. See below for the most common issues or
limitations.
o

Issue Cause
D

When starting a backup or replication job, it fails with an error:


“Current license or ESXi version prohibits execution of the requested
Free ESX(i) is not operation.”
supported Solution: Please upgrade to a paid version of ESX(i). Free ESX(i) Version
doesn’t have API which is used by Veeam Backup & Replication.
For further information please visit http://www.veeam.com/kb1435.

Veeam Certified Engineer v9.5 . Textbook 255


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 12: Troubleshooting

Issue Cause

You can mark a support case as licensing-related when you open a case in
Licensing issues the Customer Portal.
(How do I know if I Here are some other helpful support resources:
have enough - http://www.veeam.com/kb1470
licenses?) - http://www.veeam.com/kb1718
- http://www.veeam.com/kb1191

Some common restore challenges:

e
- Restore Speeds

ut
Restore challenges - Restore Failures
- Alternative Restore options when primary restore option fails
Most inquiries around Restore Challenges are focused in online forums.

ib
In our backup jobs we have bottleneck statistics that can teach us about

tr
where the jobs are slowing down. This can be source/network/target/proxy.
The bottleneck statistics does not necessarily mean that you have a

is
Bottleneck
problem in your backup infrastructure; it simply informs you about the
detectors
weakest component in the data path. However, if you feel that the job

D
performance is low, you may try taking some measures to resolve the
bottleneck. or
12.3. Common Issues & Misconfigurations
e
at

12.3.1. Low Performance (bottlenecks)


lic

As any backup application handles a great amount of data, it is important to make sure the data flow
is efficient and all resources engaged in the backup process are optimally
up

used. Veeam Backup & Replication provides advanced statistics about the data flow efficiency and
lets you identify bottlenecks in the data transmission process.
D

Veeam Backup & Replication processes VM data in cycles. Every cycle includes a number of stages:

1. Reading VM data blocks from the source


ot

2. Processing VM data on the backup proxy


3. Transporting data over the network
N

4. Writing data to the target

To evaluate the data pipe efficiency, Veeam Backup & Replication analyzes performance of all
o

components in the data flow working as the cohesive system, and evaluates key factors on the source
D

and target sides. Veeam Backup & Replication checks the following points in the data pipe:

1. Source — source disk reader component responsible for retrieving data from the source
storage.
2. Proxy — backup proxy component responsible for processing VM data.
3. Source WAN accelerator — WAN accelerator deployed on the source side. Used for backup
copy and replication jobs working via WAN accelerators.
4. Network — network queue writer component responsible for getting processed VM data from

256 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 12: Troubleshooting

the backup proxy and sending it over the network to the backup repository or another backup
proxy.
5. Target WAN Accelerator — WAN accelerator deployed on the target side. Used for backup
copy and replication jobs working via WAN accelerators.
6. Target — target disk writer component (backup storage or replica datastore).

The resource usage level for these points is evaluated in percent. This percent rate defines the
amount of time for which components are busy during the job. An efficient data flow assumes that
there is no latency at any point of the data pipe, and all its components work for approximately equal

e
amount of time.

ut
If any of the components operates inefficiently, there may appear a bottleneck in the data path. The
insufficient component will work 100% of time while the others will be idling, waiting for data to be

ib
transferred. As a result, the whole data flow will slow down to the level of the slowest point in the data
path, and the overall time of data processing will increase.

tr
To identify a bottleneck in the data path, Veeam Backup & Replication detects the component with the

is
maximum workload: that is, the component that works for the most time of the job. For example, you
use a low-speed storage device as the backup repository. Even if VM data is retrieved from the SAN

D
storage on the source side and transported over a high-speed link, VM data flow will still be impaired
at the backup repository. The backup repository will be trying to consume transferred data at the rate
or
that exceeds its capacity, and the other components will stay idle. As a result, the backup repository
will be working 100% of job time, while other components may be employed, for example, for 60%
only. In terms of Veeam Backup & Replication, such data path will be considered insufficient.
e

The bottleneck statistics for a job is displayed in the job session data. The bottleneck statistics does
at

not necessarily mean that you have a problem in your backup infrastructure. It simply informs you
about the weakest component in the data path. However, if you feel that the job performance is low,
lic

you may try taking some measures to get rid of the bottleneck. For example, in the case described
above, you can limit the number of concurrent tasks for the backup repository.
up

Throttling as Bottleneck

In addition to main points in the data pipe, Veeam Backup & Replication may report throttling as a
D

bottleneck. This can happen in the following cases:

If you limit the read and write data rates for a backup repository, a backup repository may
ot

become a bottleneck. Veeam Backup & Replication will report Throttling in the bottleneck
statistics.
N

If you set up network throttling rules, network may become a


bottleneck. Veeam Backup & Replication will report Throttling in the bottleneck statistics.
o
D

12.4. Common VMware related issues


Common issues when protecting VMware virtual machines as per Veeam support.

Veeam Certified Engineer v9.5 . Textbook 257


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 12: Troubleshooting

12.4.1. Snapshot Creation Failure


Veeam Backup & Replication depends on VMware vSphere hypervisor snapshots to function. If
Veeam is unable to take a snapshot, try creating a snapshot manually through a VMware tool directly
such as the VMware vSphere HTML5 client. Some settings can block snapshots:

Virtual machines with disks engaged in SCSI bus sharing are not supported, because VMware
does not support snapshotting such VMs.
RDM virtual disks in physical mode

e
Independent mode disks

ut
12.4.2. Snapshot Removal Failure

ib
tr
For different reasons, sometimes snapshots are "lost" by vCenter, they are not reported any more in
the interface, but they still exist in the underlying storage. Because of this, they are still used by a

is
virtual machine, they can still impact performances, and can lead to serious problems if not
discovered like storage space consumption. Additionally, this is one root cause of one of the most

D
popular types of support cases we’ve observed.

This can happen also during Veeam Backup & Replication activities. Any data protection task starts
or
with a virtual machine snapshot: with it, Veeam can guarantee proper quiescence of data stored into
the virtual disk, thus insuring the content of the backup is consistent. For this reason, at the beginning
of a backup or replication, Veeam Backup & Replication first of all requests to vCenter to initiate a
e
snapshot of a given virtual machine. Once completed, the quiesced virtual disk (or part of it during an
at

incremental backup/replica) is copied, and at the end of the job again Veeam instructs vCenter to
commit the snapshot.
lic

Here lies the problem: sometimes, even if vCenter reports a successful removal of the snapshot, in
reality the snapshot is still there, even if there is no way from the vCenter interface to be aware of this
up

state. The snapshot keeps growing, unobserved, until something bad happens.

For this reason, Veeam created a feature Veeam Backup & Replication, specifically designed to
D

identify stuck snapshots left over after backup and replication activities, and automatically remove
them. There's no better name for this than Snapshot Hunter. As soon as a snapshot commit activity is
completed by vCenter, or better by the ESXi server running the virtual machine at that time,
ot

regardless the result the commit is reported as successful by vCenter itself. Snapshot Hunter
connects to the virtual infrastructure and reads the contents of the datastore hosting the virtual
N

machine. If the snapshot file created during the backup operation is still there, this is first of all notified
in the statistics of the job, and the removal process begins. There is a specific schedule for Snapshot
o

Hunter activities: the first attempt to remove the stuck snapshot is performed as soon as the
processing of that virtual machine is finished. Chances are in fact the snapshot file or another file
D

involved was simply locked at the time of commit, and a consolidation can immediately fix the issue

12.4.3. Snapshot Removal Stun


The following KB articles from VMware and Veeam are worth reading to better understand why guest
VM is suddenly unreachable/unable to communicate:

258 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 12: Troubleshooting

A snapshot removal can stop a virtual machine for long time (KB1002836)
VM Loses Connection During Snapshot Removal (KB1681)

12.4.4. NFC Related Errors


For example a job fails with an error related to NFC connectivity. For example: “…Client error: NFC
storage connection is unavailable…Failed to create NFC download stream.”. The cause of the
majority of NFC errors fall in to 3 primary categories:

e
ut
DNS
Port (902)
Permissions

ib
It is suggested that while attempting to resolve this issue the job be configured to use a single backup

tr
proxy. This is done to isolate an issue specific to a single backup proxy, as well as make it easier to
identify which logs are needed. The proxy being used to process a VM can be identified by opening

is
the “Task” log specific to the VM from inside the folder named after the job in
%programdata%\Veeam\Backup. Searching the Task log for the words “starting agent” will allow for

D
the identification of which server performed the task.

The NFC connection requires the following:


or
DNS Resolution of target host
Port 902 is open to/from Backup Server/Proxy to ESX(i) host
e

Permissions to download files via ESX(i) host and/or vCenter


at

An issue with Port 902 may represent an issue with a firewall on the ESXi host, Veeam Proxy, or the
lic

connection between the two.

Please see Veeam KB1198 for troubleshooting steps.


up

12.5. Log files


D

Log files can easily be collected from the Main Menu -> Help -> Support Information. Simply select
ot

the scope:
N

Export logs for this job


Export logs for this VM
Export all logs for selected components
o
D

Important! See Veeam KB1832 for more details and how to submit the log files to Veeam support.

The default location of log files are as follows:

Managed Microsoft Windows servers: %ProgramData%\Veeam\Backup


Managed Linux servers: /var/log/VeeamBackup/ or /tmp/VeeamBackup
Inside Guest OS: See Veeam KB1789

Veeam Certified Engineer v9.5 . Textbook 259


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 12: Troubleshooting

Windows Event logs: See Veeam KB1873

12.6. Veeam Support

12.6.1. Support Programs


We offer two support response programs (Basic and Production) to our customers and one

e
program (Evaluation) for 60 days if you are evaluating our software.

ut
Evaluation Support

ib
tr
Evaluation Support program provides software support services during business hours (Monday
through Friday) as defined below during the defined evaluation period.

is
D
Basic Support
or
Basic Support program provides software support services during business hours as defined below
along with upgrades and updates to the products. One year of Basic Support is included with product
license purchase.
e
at

Production Support
lic

Production Support program provides 24/7 software support services and fast response times for
critical issues. To receive Production Support, all production licensed sockets for a product must be
up

licensed at Production Support levels, otherwise support defaults to Basic Support levels.
D

Support Programs Comparison


ot

Phone/web

Service Evaluation Support Basic Support Production Support


N

Product updates NA Yes Yes


o

Product upgrades NA Yes Yes


D

Technical Support Phone/Web Phone/Web Phone/Web

Business Hours Mon – Fri 8 am – 8


Mon-Fri 8 am – 5 pm 24x7x365
(customer local time) pm

260 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 12: Troubleshooting

12.6.2. Response Time SLA


Target
Production Target Basic
Severity Description
Response Response SLA
SLA

A business critical software component or a


Veeam managed system is inoperable or
unavailable; production system is down; or

e
there is an emergency condition. Requires an

ut
immediate workaround or solution. Examples:
Severity 1 1 hour 2 hours
Excessive abnormal terminations impacting
all monitoring, backups and schedules or a

ib
down/offline production system cannot be
restored; application or system failure caused

tr
by Veeam product.

is
Adversely impacting Production operations,
but the production system is not down;

D
product operates, but is seriously restricted.
Severity 2 Examples: Production application response 3 hours 8 business hours
times or system performance are slow,
or
system is available. Some monitoring or
backups are impacted.
e
A non-production issue; the majority of
at

functions are still usable, a limited condition


that can be readily circumvented. Example:
Severity 3 non-Production application response times or 6 hours 12 business hours
lic

system performance are slow, system is


available. Some monitoring or backups are
up

impacted.

Minor issue or question that does not affect


D

the product function, and can be readily


circumvented. For example: “How to”
Severity 4 questions; the text of a message, or page of 8 hours 24 business hours
ot

documentation is worded poorly or


misspelled, General Feedback, Feature
Requests.
N
o

12.6.3. Contacting Customer Support


D

This section will detail Veeam Support services, contact information and best practices for
contacting support to ensure a quick response and issue resolution.

Contacting Customer Support

The customer should designate a few representatives responsible for opening cases with Veeam, and
receiving maintenance information. They should have the appropriate technical skills and system level

Veeam Certified Engineer v9.5 . Textbook 261


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 12: Troubleshooting

access to work with Veeam Support Engineers in resolving open issues. These support contacts will
be a customer interface to Veeam Support, and should be notified of all issues that surface within the
organization. They will escalate issues to Veeam Support as necessary.

Customer should be prepared to provide the following information:

Name, company name, and telephone number with extension


Case number (if applicable)
Product name, release level, and any maintenance applied to the product

e
It is strongly recommended to attach product logs as the case is created.

ut
ib
Logging a Case

tr
Any information a customer can provide regarding the issue can have a significant impact on how fast
the issue is diagnosed and resolved. A customer should be asked to provide the following information:

is
Issue description, impact on the system and business operations, issue severity, and the exact

D
text of error messages and diagnostic details
Steps to reproduce the problem, known workarounds
or
Contact number where a customer can be reached
Best time to reach, and contact method (i.e. email/phone)
e

Submitting a Support Case


at

To file a case, a customer may use any method below. We encourage to set the initial
lic

severity level for the problem when submitting a case and highly recommend using phone to
submit Severity 1 issues.
up

Via the Web


D

A customer can file a case using a web browser in Customer Portal: http://cp.veeam.com/. The new
case wizard should be followed to open a case. Upon submitting the case, the customer will receive
ot

an electronic confirmation with a unique case number sent to contact email address. The case will be
seen in the open cases management tab.
N
o

Via the Phone


D

To open a case using the phone, a customer should call one of the phone numbers mentioned in
Contacts at the Customer Portal. After the case is logged with the customer representative, the case
will be assigned a unique number given over the phone. If required and depending on license type,
support offering and severity level, the call will be transferred to an appropriate support engineer to
resolve issue over the phone.

262 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 12: Troubleshooting

Following Up

A support engineer will contact a customer by phone and/or email or a combination of both as
appropriate during the resolution process. Severity levels may be adjusted with customer consent and
mutual agreement on the degree of the impact based on the Severity definitions.

Customer Support Issue Resolution

e
Veeam Support provides resources to research and resolve issues on a timely basis. While an issue

ut
is open, the support team will keep the customer informed of the resolution status, and will notify
when a reported issue has been resolved. If at any point during the resolution process, the customer

ib
becomes dissatisfied with the handling of the issue, he can contact the case owner and request an
escalation to the manager. This allows us to understand customer concerns and make adjustments in

tr
resources if necessary.

is
We make three attempts, on separate business days, to contact a customer for updates or
information on an open case. If we are unable to make contact, we may close the case without

D
customer consent. If the issue continues to exist, a customer may open a new case and reference the
old one. or
Resolution of a support case can include any of the following actions:

Software that provides a fix for the problem (case closed)


e
Permanent business or system workaround (case closed)
at

Temporary business or system workaround (case severity level is reduced)


Action plan for the development of a fix or workaround: milestones and dependencies are set,
lic

communicated, and tracked (case severity level might be changed)


Issue is a customer-specific customization or enhancement, and is not covered under
maintenance (customer notification, case closed)
up

12.6.4. Product Lifecycle


D

Level of support services provided depends on the lifecycle phase determined for specific versions of
ot

the product. Current versions of the products are eligible for full support, including support services
and updates/fixes, while support for older versions may be limited. A list of known workarounds or
existing fixes and assistance with upgrading to a supported version is available for customers using
N

old or discontinued versions.


o

The list is updated each time there is a release, for the current list of products and their status, please
see the product release matrix located at http://www.veeam.com/support/releasestatus.pdf
D

Support of Releases

1. New Releases – All new products are issued for General Availability (GA).
2. Current Releases – To maximize the quality of our service, Veeam limits technical support to
the products listed on the release matrix.

Veeam Certified Engineer v9.5 . Textbook 263


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 12: Troubleshooting

3. Releases designated as End of Fixes – Support is available, existing program fixes are
available, but no new fixes will be created and no enhancements will be made.
4. Releases designated as End of Support or Withdrawal from the Market – No support is
available.
1. For unsupported releases, new product enhancements and fixes will not be
available.Veeam does not have an obligation to provide support for software that has
been publicly designated End of Support, Withdrawn from the Market, or similarly
designated.

e
Product Maintenance

ut
Our goal is to go beyond quickly solving problems, and actually preventing problems from occurring in

ib
the first place. As a result, stringent quality control procedures are built into the development and
release cycle of new products and releases.

tr
Issues sometimes occur with complex software operating in equally complex and demanding

is
environments. Fixes and resolutions are often rolled into the next product release, and others are
included as part of the next maintenance release, and the most urgent issues are addressed with a

D
hotfix that can be applied on a specific product version. When applicable, we announce the availability
of new releases on the web and through e-mail. or
12.6.5. Third Party Software Support
e
at

We will assist the customer in problem analysis to determine whether the issue is caused by third
party software or hardware. In order to isolate the problem and if Veeam support engineers
lic

believe they have reason, they may ask the customer to remove third party software or hardware
product.
up

If it is impossible to identify the cause of the problem, Veeam may contact the third party vendor using
TSANet or ask the customer to open support case with third party vendor support organization.
D
ot
N
o
D

264 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 12: Troubleshooting

12.7. Search for Additional Information


Resource Link Details

These forums
are maintained
and moderated
by the Veeam

e
Product

ut
Management
Team and
Community contain
http://forums.veeam.com/

ib
Forums product-specific
information. By

tr
registering,
users will

is
receive our
Weekly
Community

D
Digest.
or Please log on
to our
Customer
e
Center support
portal to:
at

- Manage your
support cases
lic

- Request “one
Customer
http://cp.veeam.com/ click update”
Support Portal
- Attach logs to
up

existing cases
- Obtain
product
downloads and
D

updates
- Manage your
ot

license

Find popular
N

answers in
Knowledge
http://www.veeam.com/kb_search_results.html/ Veeam Support
Base
o

Knowledge
Base.
D

Veeam Certified Engineer v9.5 . Textbook 265


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 12: Troubleshooting

Resource Link Details

An extensive
set of product
documentation
for full
Online
http://www.veeam.com/documentation-guides-datasheets.html information on
Documentation
the functionality
of Veeam
Availability

e
Suite.

ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

266 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 13: Additional Resources

13. Additional Resources


This module contains additional information, such as step-by-step descriptions and
screenshots of how to install the Veeam Availability Suite from the setup wizards.

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 267


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 13: Additional Resources

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

268 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 13: Additional Resources

Labs for Module 13: Additional Resources

This module contains the additional list of practice labs that were moved here from other modules.

Get into the Lab

e
Lab Action Purpose

ut
In live instructor-led trainings, Veeam Backup &
Analyze the Veeam Replication has already been installed to save time.

ib
13.1 Backup & Replication Review the Veeam Backup & Replication installation
installation process. Later in the class, you will install a second

tr
Veeam Backup & Replication deployment.

is
In live instructor-led trainings, Veeam Backup
Analyze the Veeam
Enterprise Manager has already been installed to
13.2 Backup Enterprise

D
save time. Review the Veeam Backup Enterprise
Manager installation
Manager installation process.
or
Analyze Veeam ONE
13.3 To save time, Veeam ONE has already been installed.
installation
e
at
lic
up
D
ot
N
o
D

Veeam Certified Engineer v9.5 . Textbook 269


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 13: Additional Resources

e
ut
ib
tr
is
D
or
e
at
lic
up
D
ot
N
o
D

270 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 14: Training Summary

14. Training Summary


This section summarizes main Veeam Certified Engineer training points.

14.1. Key Points


Veeam Backup & Replication delivers a powerful, affordable and easy-to-use solution for backup,

e
recovery and replication for both VMware and Hyper-V.

ut
Veeam Backup & Replication is a modular solution which allows flexible scalability for environments
of different sizes and configuration. Some of the following Veeam Backup & Replication components

ib
are installed using a setup file and others are configured while working with the product.

tr
Veeam Backup Server
Backup Proxy

is
Backup Repository
Veeam Backup Enterprise Manager

D
Veeam Backup Search
Mount Server or
Veeam Explorers

Veeam Backup & Replication offers Standalone Console which is a separate client-side part that
e
allows you to access Veeam backup server. You can use the console locally, or install it in a
standalone mode on a device running Microsoft Windows to access Veeam Backup & Replication
at

remotely over the network. The console logs you in to Veeam Backup & Replication, allowing you to
perform all kind of operations.
lic

For a virtual environment management solution, Veeam offers Veeam ONE, which delivers real-time
monitoring on health and performance of virtual environments, helps analyze the efficiency of data
up

protection implemented with Veeam Backup & Replication, provides intelligent reporting, and offers
business-based views of the virtual infrastructure topology to simplify management and expedite
decision-making.
D

Veeam Backup & Replication is the best solution for very different infrastructures. It can be deployed
ot

using different scenarios:

Simple deployment is when Veeam Backup & Replication is installed on a physical or virtual
N

Windows-based machine. This installation is referred to as a Veeam backup server.


Advanced deployment is when the backup workload moves to dedicated backup proxies and
o

backup repositories (in case of using VMware) or to an off-host backup proxy (in case of using
Hyper-V).
D

Distributed deployment is when virtual environments are large and geographically dispersed
with multiple Veeam backup servers installed across different sites. In this case, Veeam Backup
Enterprise Manager centralizes management and reporting for these servers.

With Veeam Backup & Replication, it is easy to create backups. It is a job-driven process where one
backup job can be used to process one or more VMs. Essentially, the job defines when, what, how
and where to back up. It indicates what VMs should be processed, what components should be used
for retrieving and processing VM data, what backup options should be enabled, and where to save

Veeam Certified Engineer v9.5 . Textbook 271


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 14: Training Summary

the resulting backup file. Jobs can be started manually by the user or scheduled to run automatically.
The resulting backup file stores compressed and deduplicated VM data. All backup files created by
the job are located in a dedicated job folder on a backup repository.

To ensure efficient and reliable data protection in your virtual environment, Veeam Backup &
Replication complements image-based backup with image-based replication. Replication is the
process of copying a VM from its primary location (source host) to a destination location (redundant
target host). Veeam Backup & Replication creates an exact copy of the VM (replica), registers it on
the target host and maintains it in sync with the original VM. Replication is also a job-driven process

e
with one replication job used to process one or more VMs. You can start the job manually every time
you need to copy VM data or, if you want to run replication unattended, create a schedule to start the

ut
job automatically. It’s possible to create a replica using backup file as a source, thus reducing the load
at the production environment.

ib
To guarantee recoverability of your data, Veeam Backup & Replication offers the SureBackup

tr
technology and complements the recovery verification technology with SureReplica for VMware
vSphere. SureBackup lets you validate backups of your VMs without impacting the production

is
infrastructure. You can automatically verify every created restore point of every VM and ensure that
they will function as expected in case a disaster strikes. SureReplica is s similar to the SureBackup

D
recovery verification in many respect. It lets you validate your DR environment without impacting the
production infrastructure: You can automatically verify every created restore point of every VM replica
or
and ensure that they are functioning as expected.

Veeam Backup & Replication offers a number of recovery options for various disaster recovery
e
scenarios:
at

Instant VM Recovery enables you to instantly start a VM directly from a backup file.
Full VM Recovery enables you to recover a VM from a backup file to its original or another
lic

location.
VM File Recovery enables you to recover separate VM files (virtual disks, configuration files
and so on).
up

Virtual drive restore enables you to recover a specific hard drive of a VM from the backup file,
and attach it to the original VM or to a new VM.
Windows file-level recovery enables you to recover individual Windows guest OS files (from
D

FAT, NTFS and ReFS file systems).


MultiOS file-level recovery enables you to recover files from many different guest OS file
ot

systems.
Veeam Explorers and Universal Application-Item Recovery (U-AIR) enables you to recover
N

application objects (such as, AD entries, SharePoint and Exchange items, Oracle and SQL
database objects and so on) directly from backup files.
o

Veeam Backup & Replication uses the same image-level backup for all data recovery operations. You
D

can restore VMs, VM files and drives, application objects and individual guest OS files to the most
recent state or to any available restore point.

Veeam Backup & Replication lets you leverage HPE, NetApp, Dell EMC, Nimble and Cisco HyperFlex
snapshots as a part of a comprehensive backup and recovery strategy, where storage snapshots and
image-level backups complement each other. With Veeam Backup & Replication, you can:

Perform backup from storage snapshots


Restore data directly from storage snapshots

272 Veeam Certified Engineer v9.5 . Textbook


Licensed to: Ivo Mayer - ivo.mayer@axians.it
Module 14: Training Summary

To solve the problems of insufficient network bandwidth to support VM data traffic and transmission of
redundant data, Veeam Backup & Replication offers the WAN acceleration technology that helps
optimize data transfer over the WAN. The WAN acceleration technology is specific for backup copy
and replication jobs. Being a built-in feature, Veeam’s WAN acceleration does not add complexity or
cost to the backup infrastructure and does not require agents. The technology has been developed for
copying backup files, with consideration of the VM backup file content.

14.2. Useful Resources

e
ut
If you have any questions or need additional information about Veeam Backup & Replication, you can
use the following resources:

ib
Resource URL

tr
Full documentation set for any
http://www.veeam.com/documentation-guides-datasheets.html

is
Veeam product

D
Knowledge Base http://www.veeam.com/kb_search_results.html

Product Demos http://www.veeam.com/product-demo.html


or
Latest Updates http://www.veeam.com/updates.html
e
Community forums http://www.veeam.com/forums
at

Veeam University for End Users http://www.veeam.com/university.html


lic

Customer Portal https://cp.veeam.com/


up

14.3. Contacts
D

At Veeam Software we value the feedback from our customers. It is important not only to help you
quickly with your technical issues, but it is our mission to listen to your input, and build products that
ot

incorporate your suggestions.

For the most up to date information about company contacts and offices location, please visit
N

www.veeam.com/contacts.html.
o
D

Veeam Certified Engineer v9.5 . Textbook 273


Licensed to: Ivo Mayer - ivo.mayer@axians.it

Вам также может понравиться