Veritas CloudPoint Administrator's Guide
- Getting started with CloudPoint
- Section I. Installing and configuring CloudPoint
- Preparing for installation
- About the deployment approach
- Deciding where to run CloudPoint
- Meeting system requirements
- CloudPoint host sizing recommendations
- Creating an instance or preparing the physical host to install CloudPoint
- Installing Docker
- Creating and mounting a volume to store CloudPoint data
- Verifying that specific ports are open on the instance or physical host
- Deploying CloudPoint
- Deploying CloudPoint in the AWS cloud
- Using plug-ins to discover assets
- Configuring off-host plug-ins
- AWS plug-in configuration notes
- Google Cloud Platform plug-in configuration notes
- Microsoft Azure plug-in configuration notes
- Dell EMC Unity array plug-in configuration notes
- Pure Storage FlashArray plug-in configuration notes
- HPE RMC plug-in configuration notes
- NetApp plug-in configuration notes
- Configuring an off-host plug-in
- About CloudPoint plug-ins and assets discovery
- Configuring the on-host agents and plug-ins
- About agents
- Oracle plug-in configuration notes
- MongoDB plug-in configuration notes
- Microsoft SQL plug-in configuration notes
- About the installation and configuration process
- Preparing to install the Linux-based on-host agent
- Preparing to install the Windows-based on-host agent
- Downloading and installing the on-host agent
- Configuring the Linux-based on-host agent
- Configuring the Windows-based on-host agent
- Configuring the on-host plug-in
- Configuring VSS to store shadow copies on the originating drive
- Protecting assets with CloudPoint's agentless feature
- Preparing for installation
- Section II. Configuring users
- Section III. Protecting and managing data
- User interface basics
- Indexing and classifying your assets
- Protecting your assets with policies
- Tag-based asset protection
- Replicating snapshots for added protection
- About snapshot replication
- About cross-account snapshot replication in the AWS cloud
- Requirements for replicating snapshots
- Cross-account snapshot replication support matrix
- Cross-account snapshot replication limitations
- Configuring replication rules
- Editing a replication rule
- Deleting a replication rule
- Managing your assets
- Creating a snapshot manually
- Displaying asset snapshots
- Replicating a snapshot manually
- About snapshot restore
- About single file restore (granular restore)
- Single file restore requirements and limitations
- Restoring a snapshot
- Additional steps required after a SQL Server snapshot restore
- Additional steps required after an Oracle snapshot restore
- Additional steps required after a MongoDB snapshot restore
- Additional steps required after restoring an AWS RDS database instance
- Restoring individual files within a snapshot
- Deleting a snapshot
- Monitoring activities with notifications and the job log
- Protection and disaster recovery
- Section IV. Maintaining CloudPoint
- CloudPoint logging
- Troubleshooting CloudPoint
- Restarting CloudPoint
- Docker may fail to start due to a lack of space
- CloudPoint installation fails if rootfs is not mounted in a shared mode
- Some CloudPoint features do not appear in the user interface
- Off-host plug-in deletion does not automatically remove file system and application assets
- Disk-level snapshot restore fails if the original disk is detached from the instance
- Snapshot restore for encrypted AWS assets may fail
- Error while adding users to CloudPoint
- CloudPoint fails to revert restored snapshots if indexing, classification, or restore operations fail
- SQL snapshot or restore and SFR operations fail if the Windows instance loses connectivity with the CloudPoint host
- Troubleshooting CloudPoint logging
- Working with your CloudPoint license
- Upgrading CloudPoint
- Uninstalling CloudPoint
- Section V. Reference
Tag-based asset protection considerations and limitations
The following conditions are applicable to the tag-based asset protection feature:
Tag-based asset protection is offered as a Technical Preview feature. It should not be used in a production environment.
Tag-based asset protection works only for assets that support associating tags. If the assets cannot be assigned a tag in the form of a
key:valuepair, then you cannot use the CloudPoint tag-based asset protection for those assets.You will have to manually assign CloudPoint policies to protect such assets.
The CloudPoint user interface (UI) does not support configuring tag-based asset protection. You will not be able to see the tags that are assigned to the assets or administer this feature from the UI.
Tags must be assigned to the assets using the cloud vendor management tools.
Newly created tagged assets are not assigned to a CloudPoint protection policy until the assets are discovered by CloudPoint.
You cannot modify a policy name if the policy is associated with a tagged asset using tag-based asset protection.
You cannot delete a policy if the policy is associated with a tagged asset using tag-based asset protection. To delete a policy, you must remove the policy name from the
"veritas-protection-policy"key value (in case multiple policies are specified in the tag), or delete the key if there are no other policies specified in the asset tag.You cannot manually disassociate a policy from a tagged asset if the policy is assigned using tag-based asset protection.
You must first remove the policy name from the asset tag or delete the asset tag altogether. After the next discovery cycle, CloudPoint automatically removes the asset from that policy in a subsequent policy run.
Tag-based asset protection feature will not take effect if the same policy is manually assigned to the tagged asset earlier. For example, consider a policy
Policy1that is manually assigned to an assetVM1. Now, even if you add a tag"veritas-protection-policy":"Policy1"toVM1, CloudPoint ignores that tag and does not reassign the policy to that asset again. The policy association is considered as manual and tag-based asset protection functionality does not take effect on that asset or policy.All tag-based asset protection operational logs are stored in the
flexsnap-policyandflexsnap-coordinatorlogs.