Veritas CloudPoint Administrator's Guide
- Getting started with CloudPoint
- Section I. Installing and configuring CloudPoint
- Preparing for installation
- About the deployment approach
- Deciding where to run CloudPoint
- Meeting system requirements
- CloudPoint host sizing recommendations
- Creating an instance or preparing the physical host to install CloudPoint
- Installing Docker
- Creating and mounting a volume to store CloudPoint data
- Verifying that specific ports are open on the instance or physical host
- Deploying CloudPoint
- Deploying CloudPoint in the AWS cloud
- Using plug-ins to discover assets
- Configuring off-host plug-ins
- AWS plug-in configuration notes
- Google Cloud Platform plug-in configuration notes
- Microsoft Azure plug-in configuration notes
- Dell EMC Unity array plug-in configuration notes
- Pure Storage FlashArray plug-in configuration notes
- HPE RMC plug-in configuration notes
- NetApp plug-in configuration notes
- Hitachi plug-in configuration notes
- InfiniBox plug-in configuration notes
- Configuring an off-host plug-in
- About CloudPoint plug-ins and assets discovery
- Configuring the on-host agents and plug-ins
- About agents
- Oracle plug-in configuration notes
- MongoDB plug-in configuration notes
- Microsoft SQL plug-in configuration notes
- About the installation and configuration process
- Preparing to install the Linux-based on-host agent
- Preparing to install the Windows-based on-host agent
- Downloading and installing the on-host agent
- Configuring the Linux-based on-host agent
- Configuring the Windows-based on-host agent
- Configuring the on-host plug-in
- Configuring VSS to store shadow copies on the originating drive
- Protecting assets with CloudPoint's agentless feature
- Preparing for installation
- Section II. Configuring users
- Section III. Protecting and managing data
- User interface basics
- Indexing and classifying your assets
- Protecting your assets with policies
- Tag-based asset protection
- Replicating snapshots for added protection
- About snapshot replication
- About cross-account snapshot replication in the AWS cloud
- Requirements for replicating snapshots
- Cross-account snapshot replication support matrix
- Cross-account snapshot replication limitations
- Configuring replication rules
- Editing a replication rule
- Deleting a replication rule
- Managing your assets
- Creating a snapshot manually
- Displaying asset snapshots
- Replicating a snapshot manually
- About snapshot restore
- About single file restore (granular restore)
- Single file restore requirements and limitations
- Restoring a snapshot
- Additional steps required after restoring disk-level snapshots
- Additional steps required after a SQL Server snapshot restore
- Additional steps required after an Oracle snapshot restore
- Additional steps required after a MongoDB snapshot restore
- Additional steps required after restoring an AWS RDS database instance
- Restoring individual files within a snapshot
- Deleting a snapshot
- Monitoring activities with notifications and the job log
- Protection and disaster recovery
- Section IV. Maintaining CloudPoint
- CloudPoint logging
- Troubleshooting CloudPoint
- Restarting CloudPoint
- Docker may fail to start due to a lack of space
- CloudPoint installation fails if rootfs is not mounted in a shared mode
- Some CloudPoint features do not appear in the user interface
- Off-host plug-in deletion does not automatically remove file system and application assets
- Disk-level snapshot restore fails if the original disk is detached from the instance
- Snapshot restore for encrypted AWS assets may fail
- Error while adding users to CloudPoint
- CloudPoint fails to revert restored snapshots if indexing, classification, or restore operations fail
- SQL snapshot or restore and SFR operations fail if the Windows instance loses connectivity with the CloudPoint host
- Troubleshooting CloudPoint logging
- Swagger UI-based authorization for CloudPoint REST API calls may fail
- Policy retention count is not honored for file system and application assets if there is an issue with the CloudPoint plug-in
- Working with your CloudPoint license
- Managing CloudPoint agents and plug-ins
- Upgrading CloudPoint
- Uninstalling CloudPoint
- Section V. Reference
Configuring CloudPoint from your browser and signing in
The following figure shows where you are in the CloudPoint installation and configuration process.
Before you complete the steps in this section, make sure that you have deployed CloudPoint on your instance or physical machine.
The final steps to configure CloudPoint are performed from a browser. Before you proceed, ensure that the browser is supported by CloudPoint.
See Meeting system requirements.
We recommend that you use Google Chrome.
To configure CloudPoint from your browser and sign in
- Open your browser and enter the following URL in the address bar:
https://<cloudpoint_hostFQDN>
Here, <cloudpoint_hostFQDN> represents the Fully Qualified Domain Name (FQDN) of the host on which you installed CloudPoint.
The configuration screen is displayed.
- In the Admin Account Setup section, enter a username and password. They are configured as the CloudPoint administrator username and password.
The user name should meet the following requirement:
A valid email address
If you forget the admin password, you can configure CloudPoint to send instructions for restoring the password to this email address.
The specified email address should not include an underscore character.
CloudPoint currently does not support adding users whose email addresses contain the underscore character.
The admin password should meet the following requirements:
At least six characters
No spaces
No & (ampersand) character
- Under Host information, in the Host names or IP field, enter any additional host names or IP address that you use to connect to this CloudPoint host and then click the + icon to add that entry to the list.
Repeat this for each additional host name that you wish to add.
The specified names or IP address are added to the list of host names to use for configuring CloudPoint. The names in the list are used to generate a server certificate for the CloudPoint host. If you connect to the host using different names (for example, myserver, myserver.mydomain, or myserver.mydomain.mycompany.com), then ensure that you add all the names here if you want to enable CloudPoint access using those names.
The names you specify here must point to the same CloudPoint host. The fully qualified domain name (FQDN) of the host is added by default.
Note:
If you are integrating CloudPoint with Veritas NetBackup, use host names only.
- Under Select Your License, select the CloudPoint trial license that you wish to activate in your CloudPoint deployment.
Pick from one of the following options depending on your requirement:
License type
Description
Freemium
A Freemium license is a permanent license that does not expire and allows you to try out a subset of the CloudPoint features. This license lets you protect up to 10 TB of front-end terabyte (FETB) data.
Evaluation
An Evaluation license is a 60-day time-bound license that allows you to try out all of the CloudPoint features. This license lets you protect up to 1000 TB of FETB data.
The selected trial license is installed on the CloudPoint instance during the initial configuration and allows you to use the features that are entitled as part of that license.
You can upgrade to a paid license any time after the initial configuration is completed.
- Select Help us improve CloudPoint by automatically sending your usage information to Veritas to enable the Telemetry service. When enabled, this service collects your CloudPoint usage information and shares it with Veritas anonymously.
- Read the End User License Agreement and then select the I agree to the terms and conditions option.
- Click Configure to begin the initial configuration process.
An installation status screen is displayed as Veritas CloudPoint configures the remaining services. This process can take a few minutes.
- After the installation completes, click Refresh browser. If you see the login screen, it confirms that CloudPoint is installed and configured successfully.
- On the login screen, enter the CloudPoint administrator username and password and then click Sign In.
The username and password are the same that you specified on the initial configuration screen in step 2 earlier.
The coffee screen is displayed. The coffee screen provides a quick high level overview of your CloudPoint environment. After you configureCloudPoint to protect your assets, you can use this coffee screen to get a quick update on the overall protection status.
- Your next step is to configure one or more plug-ins. On the coffee screen, click Manage cloud and arrays.
Plug-ins are the software modules that discover assets in your cloud or on-premise environment.
More Information