emc implementation for vsphere data protection ... · emc implementation for vsphere data...

30
EMC Corporation Technology Solutions Kit Q114 EMC Implementation for vSphere Data Protection Practitioner’s Guide Date: April 13, 2015 EMC Corporation 176 South Street Hopkinton, MA 01748

Upload: tranquynh

Post on 28-Jul-2018

238 views

Category:

Documents


0 download

TRANSCRIPT

EMC Corpora tion Technology Solutions Kit

Q114

EMC Implementation for vSphere Data Protection Practitioner’s Guide

Date: April 13, 2015

EMC Corporation 176 South Street

Hopkinton, MA 01748

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page ii

04/13/15

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page iii

04/13/15

Table of Contents

EMC Implementation for vSphere Data Protection ............................................................. 1 Reference Documentation and Resources .......................................................................... 3

Perform Project Planning ............................................................................................................... 4

Perform Planning and Requirements Review ............................................................................... 5

Environment Verification and Preparation ................................................................................... 6

Deploy Virtual Appliance ............................................................................................................... 7

Perform Performance Assessment Test ....................................................................................... 8

Configure Backup Policies ............................................................................................................ 9

Execute Initial Backup Job .......................................................................................................... 10

Execute Initial Recovery Job ....................................................................................................... 11

Conduct Functional Overview ..................................................................................................... 12

Complete Configuration Guide .................................................................................................... 13 Appendix A: Using EMC Backup System Sizer................................................................. 14 Appendix B: vSphere Data Protection Verification ........................................................... 16 Appendix C: Executing Performance Assessment Test .................................................. 18 Appendix D: Deploying Application Backup Client .......................................................... 20 Appendix E: Creating an Application-Specific Backup Job ............................................ 23 Appendix F: Executing a Recovery Job ............................................................................ 25

List of Figures Figure 1. EBSS Account Selection .................................................................................. 14 Figure 2. EBSS Data Sets ................................................................................................. 14 Figure 3. EBSS Summary and Results ............................................................................ 15 Figure 4. DP Virtual Appliance Configuration ................................................................. 16 Figure 5. VDP Connection from vClient .......................................................................... 16 Figure 6. VDP Main Screen View ...................................................................................... 17 Figure 7. Run PAT at Final Stage Completion ................................................................ 18 Figure 8. Execute PAT from Storage Menu ..................................................................... 19 Figure 9. PAT Completion ................................................................................................ 19 Figure 10. Client Download ................................................................................................ 20 Figure 11. SQL Server Feature Selection .......................................................................... 20 Figure 12. Exchange Messaging API and CBO................................................................. 21 Figure 13. VDP Exchange Backup User Configuration .................................................... 21 Figure 14. VDP Exchange User .......................................................................................... 22 Figure 15. VDP Backup Job Targets .................................................................................. 23

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page iv

04/13/15

Figure 16. VDP Backup Job Options ................................................................................. 24 Figure 17. Delete Sample SQL Database .......................................................................... 25 Figure 18. Initiate Restore Job ........................................................................................... 25 Figure 19. Select SQL Database to Restore ...................................................................... 26 Figure 20. Restore Options ................................................................................................ 26 Figure 21. Restore Job in Task Manager. ......................................................................... 26

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 1

04/13/15

EMC Implementation for vSphere Data Protection This service performs an Implementation of the vSphere Data Protection product within a customer site. The vSphere Data Protection product is an OEM version of Avamar® Virtual Edition with a reduced feature set, which is packaged and sold by VMware.

This service is limited in scope and limited to remote delivery for several reasons:

• The vSphere Data Protection product is only available as a VMware virtual appliance. • The vSphere Data Protection product is designed to protect only VMware virtual

machines. • The vSphere Data Protection has a limited feature set in contrast to Avamar Virtual

Edition, and is marketed toward small-scale installations. • There is no physical installation in the scope of work. This is an introductory service, structured to be delivered in an 8-hour window. The outline of this service is as follows: • Use the Questionnaire to get data protection requirements from the customer. The

customer must complete the Questionnaire before the commencement of the engagement.

• Verify the customer’s virtual environment to assure a successful EMC® Implementation of vSphere Data Protection.

• Deploy the virtual appliance using EMC and Avamar best practices. • Create and execute a single backup job per the request of the customer. • Perform a sample recovery based off of a successful backup job. EMC or partner personnel should have the following skills for the delivery of this service:

• vSphere Data Protection has many of the features of Avamar Virtual Edition, but does not have the same administrative interface and configuration menu. Delivery personnel should have hands-on experience with how to configure vSphere Data Protection, and use the Administrative interface.

• Unlike Avamar Virtual Edition, vSphere Data Protection can only be accessed from within VMware vCenter using the VMware vClient. Delivery personnel must have strong hands-on experience with the VMware vCenter and vClient products.

• Delivery personnel must have strong vCenter and ESXi administrative skills, specifically in the areas of virtual appliance implementation and administration, including virtual switching and virtual storage. EMC strongly recommends that delivery personnel perform at least one dry run of vSphere Data Protection in a lab environment before their first engagement.

Description

Overview

Skills Requirements

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 2

04/13/15

• vSphere Data Protection supports three Microsoft applications: Exchange, SQL, and SharePoint. Delivery personnel must be skilled in deploying a client to any of these platforms, and creating a backup job for any of these applications.

• The objective of this service is to enable the customer to be self-sufficient with vSphere Data Protection at the end of the engagement. Delivery personnel should expect a dialog to take place with the customer throughout the engagement. Delivery personnel must be ready and willing to depart sufficient knowledge during the service engagement so that the customer can effectively manage the product upon the completion of the engagement.

• The customer is responsible for providing the compatible VMware virtual infrastructure

to support the Implementation and operation of vSphere Data Protection. All the conditions listed in the “Pre-Engagement Readiness” section of the Questionnaire must be addressed before the commencement of this service.

• This service is a remote-only delivery model. Global service personnel must have the appropriate tools to support remote delivery, including a WebEx account and teleconferencing capabilities.

This service requires a browser that is compatible with VMware vClient, including an active VMware Client Integration Plug-In. This service offering is based on the customer utilizing the application protection features. The features to protect applications require a license to be purchased from VMware, or those features are enabled through a licensing agreement between EMC and VMware for specific EMC products.

Prerequisites and Assumptions

Licensing

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 3

04/13/15

Reference Documentation and Resources Links listed in this topic are functional as of this document’s publication date. Over time, the location of reference material may change. A navigation description is included to assist in those cases. If you are having difficulty locating referenced material, email TS Services Material Support at [email protected].

The vSphere Data Protection reference documents are located on the VMware Support site. Refer to http://www.vmware.com for the following documents for guidance for this service:

• vSphere Data Protection Administrator Guide • vSphere Data Protection Release Notes

PATH: Home > Support > Support Resources >Product Documentation > VMware vSphere Data Protection

• The technical documentation set for the version of ESXi and vCenter deployed at the customer site may be helpful for reference purposes. PATH: Home > Support > Support Resources >Product Documentation > VMware vSphere 5

• The EMC Backup System Sizer tool provides metrics that are used to determine the

size of the vSphere Data Protection to deploy at the customer site. To locate the tool: 1. Open the Inside EMC web site (https://inside.emc.com). 2. Select the Products and Solutions tab, and then select DPAD. 3. Select the DPAD Presales and Delivery sub-space. 4. Select Presales Tools. 5. Select DPAD Sizing Home Page. 6. Select EMC Backup System Sizer.

• The Performance Assessment Tool (PAT) built into vSphere Data Protection software is required in this service to assess whether the storage being targeted for supporting backups meets expected performance targets. To locate the tool:

1. Deploy the vSphere Data Protection vApp at the customer site. 2. Open a browser to the vSphere Data Protection configuration page

(https://<vDP IP Address>:8543/vdp-configure). 3. Select the Storage tab. 4. Select Performance Analysis.

About the Links

Web Sites

Tools

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 4

04/13/15

Perform Project Planning Project Manager

This activity covers the standard resource and Project Planning phase, which is performed ahead of the actual delivery. During this phase, it is imperative that the Questionnaire for this service is sent to the customer, and completed by the customer before the commencement of services. It is important in this phase that the customer understands the items listed in the “Pre-Engagement Readiness” section are out of scope for this service, and must be addressed before actual delivery is started.

It is also important at this phase in the engagement that the Project Manager provides guidance to the customer regarding the logistics for the remote session for service delivery. The customer must provide network access to EMC delivery resources to the data center assets affected by this service.

Role

Description

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 5

04/13/15

Perform Planning and Requirements Review Project Manager and Implementation Specialist

This is the commencement of the remote delivery session with the customer. The project manager only needs to be involved at the commencement of this session to set the agenda and make introductions.

• Execute EMC Backup System Sizer • Review Questionnaire The values in the “Data Protection Sizing Information” section of the Questionnaire are used as input into the Backup System Sizer tool. The two tables in this section are used to create ‘Data Sets’ on the ‘Summary’ page of the Backup System Sizer tool. The vSphere Data Protection product is designed to protect only VMware virtual machines. For this reason, only storage values for structured data and unstructured data base on VMware VMDKs are used for calculating storage requirements.

Read Appendix A: Using EMC Backup System Sizer for more information on how to use the tool for storage sizing for vSphere Data Protection.

The “Pre-Engagement Readiness” section of the Questionnaire addresses the state of the customer for implementation of the vSphere Data Protection product. It lists the conditions and pre-requisites the customer must have addressed for the service to be successfully delivered. Verify all these items have been resolved.

Review the “Virtual Appliance Configuration” section of the Questionnaire to be sure the vCenter host is accessible over the network, and can be accessed through the vClient.

Review the “Backup Job Planning Information” section of the Questionnaire to create the initial backup job in vSphere Data Protection after the virtual appliance is deployed.

Role

Description

Task List

Review Questionnaire

Execute EMC Backup System Sizer

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 6

04/13/15

Environment Verification and Preparation Implementation Specialist

Use the information provided in the Questionnaire to perform a verification of the customer’s environment. Use the guidelines in the section below to perform the system verification and preparation.

• Verify Customer Environment • Verify Backup Clients Use these guidelines to perform the verification:

• Verify authentication into vCenter with vCenter Web Client with login provided by customer.

• Verify user has Administrator privileges with vCenter. • Verify Client Integration Plug-in is installed and enabled. • Verify target datastore(s) for vSphere Data Protection have sufficient capacity. • Verify the virtual machine(s) to be protected. Use the information in the “Backup Job Planning Information” section of the Questionnaire.

• Verify each backup client is reachable by IP address. • Verify authentication to each backup client. A user with Administrator privilege is

needed to deploy the backup agent.

Role

Description

Verify Backup Clients

Verify Customer Environment

Task List

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 7

04/13/15

Deploy Virtual Appliance Implementation Specialist

Deploy the virtual appliance per the vSphere Data Protection Administrator Guide. Use the information in Appendix B: vSphere Data Protection Verification to verify the application is operating normally.

Role

Description

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 8

04/13/15

Perform Performance Assessment Test Implementation Specialist

Use the Performance Assessment Test tool built into the vSphere Data Protection to verify the datastores targeted for the backup jobs can support backup activity. Use the information in Appendix C: Executing Performance Assessment Test for guidance on performing this test.

It is EMC best practice to deploy vSphere Data Protection on storage, which passes this performance test. Note that this does not disqualify the application from working in the customer environment. It means the application may reach IO thresholds when executing backup jobs, which may restrict planned activity from completing within the backup window. EMC recommends higher performing storage is deployed if the storage fails the Performance Assessment Test.

Role

Description

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 9

04/13/15

Configure Backup Policies Implementation Specialist

The backup policies are enforced through the creation and execution of backup jobs in vSphere Data Protection that map to the customer’s requirements. Refer to the “Backup Job Planning Information” section of the Questionnaire to determine where to deploy the vSphere Data Protection agent and for the parameters to create the initial backup job.

Important! It is important that the customer is aware that both the execution of a backup job and the execution of a recovery job based on this initial policy are included in the scope of work. This is done to demonstrate usage of the product during the interactive session. The backup job will utilize virtual resources during execution, and the execution of the sample recovery job will likely incur downtime for the protected application. For these reasons, a limited sized, non-production application is required for this purpose.

• Deploy Data Protection agent • Configure Backup Job The configuration of the initial backup job is included in the scope of work for this service. The customer has the option of selecting the type of backup per the responses in the Questionnaire. If the initial backup job is targeted for a supported application (Exchange, SQL Server, SharePoint), then a vSphere Data Protection agent must be deployed on the target virtual machines before a backup job is created.

Refer to Appendix D: Deploying Application Backup Client for more information on deploying a vSphere Data Protection agent.

The configuration of the initial backup to support the customer’s requirements is performed from within the vSphere Data Protection instance in the vClient, and should be performed only after any necessary agents have been successfully deployed.

The settings for the schedules and the retention policies are universal for all backup jobs created in vSphere Data Protection. The responses to “Data Protection Sizing Information” section in the Questionnaire are the baselines to be used for the retention policies.

Refer to Appendix E: Creating an Application-Specific Backup Job for more information on the settings for creating a backup job for an application.

Role

Description

Configure Backup Job

Deploy Data Protection Agent

Task List

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 10

04/13/15

Execute Initial Backup Job Implementation Specialist

Verify the backup job created in the previous step works as planned through a trial execution. Upon completion of the backup job, select the Restore tab to view the protected application items.

Try to estimate the time it will take to complete the backup job, and compare that to the time remaining to complete the remainder of the service engagement. If time estimated for the backup job will compromise the time left to complete other tasks, consider the option of creating a backup job with a smaller protection set. For instance, if the customer wants a backup job that protects SQL Server databases, then reduce the number of instances in the backup job to a manageable level, and show the customer how to modify the backup job to add in more database instances.

Role

Description

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 11

04/13/15

Execute Initial Recovery Job Implementation Specialist

Upon completion of the initial backup job executed in the previous step, a trial execution of the recovery job is executed on the protected application. In order to stay within the scope parameters of the engagement, select a restoration job that can be completed within a reasonable timeframe.

Refer to Appendix F: Executing a Recovery Job for insight into executing a recovery job for an application.

Role

Description

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 12

04/13/15

Conduct Functional Overview Implementation Specialist

Provide a basic overview of vSphere Data Protection. Be sure to include an overview of the “Reports” and “Configuration” sections.

Role

Description

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 13

04/13/15

Complete Configuration Guide Implementation Specialist

The Configuration Guide is left with the customer upon completion of the service engagement.

• The Site Information worksheet contains the values from the “Virtual Appliance Configuration” section of the Questionnaire.

• The Sizing worksheet contains the values from the “Data Protection Sizing Information” section of the Questionnaire, and the results from the EMC Backup System Sizer tool.

• The Backup Window worksheet is based on the “Backup Job Planning Information” section of the Questionnaire.

• The “Backup Jobs” section should list the values for the initial backup job created in this service engagement

Role

Description

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 14

04/13/15

Appendix A: Using EMC Backup System Sizer

You can use the EMC Backup System Sizer tool to provide sizing estimates for vSphere Data Protection. The first step is to create the customer and sizing type:

Figure 1. EBSS Account Selection

Then from the Summary tab, create Data Sets for the structured data and unstructured data:

Figure 2. EBSS Data Sets

The type ‘VMDK- Content is Database’ is for virtual machines supporting applications such as Exchange, SQL Server or SharePoint. The remainder of the virtual machine to be protected can be assigned to the type ‘VMDK- Content is File System’. The estimated

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 15

04/13/15

reduction ratios for both data classifications are different, and should be sized in separate data sets.

Figure 3. EBSS Summary and Results

Use the values in the “Results” section on the “Summary” page to position to model size to deploy for vSphere Data Protection. You can use the metrics in the “Capacity Information” on the “Summary” page complete the Configuration Guide.

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 16

04/13/15

Appendix B: vSphere Data Protection Verification

During the Implementation of the vSphere Data Protection virtual appliance, the software must be configured. Upon completion of the configuration steps, log into the application from a browser: https://<IP Address>:8543/vdp-configure

Figure 4. DP Virtual Appliance Configuration

The vSphere Data Protection application plugs itself into vCenter. The application can be accessed from the main vCenter screen.

Figure 5. VDP Connection from vClient

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 17

04/13/15

Connect to the virtual appliance to access vSphere Data Protection from within the vClient interface.

Figure 6. VDP Main Screen View

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 18

04/13/15

Appendix C: Executing Performance Assessment Test

You have two options for executing the Performance Assessment Test:

• At the end of the initial configuration of the virtual appliance. • From the ‘Storage’ option within the vSphere Data Protection Configuration Menu. The advantage of the first option is the selected datastore is tested before the virtual appliance is completely configured, thereby saving the need to backtrack. However, the internal menu option allows you to select an alternative datastore in the event of a failed performance test.

Figure 7. Run PAT at Final Stage Completion

If the Performance Assessment Test is run during the virtual appliance configuration stage, the Implementation will fail if the selected datastore does not pass this test.

The Performance Assessment Test can be also be executed after the Implementation of the vSphere Data Protection virtual appliance. To execute the Performance Assessment Test using this method:

Log into the virtual appliance using this URL format: https://<IP of virtual appliance>8543/vdp-configure

Select the Storage option from the Main Menu. Select Performance Analysis. Select a datastore from the list, and run the test.

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 19

04/13/15

Figure 8. Execute PAT from Storage Menu

Typically, the PAT takes 15-25 minutes to complete.

Figure 9. PAT Completion

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 20

04/13/15

Appendix D: Deploying Application Backup Client

You can download Agents for vSphere Data Protection after the virtual appliance is configured and the management interface is accessible from a vClient. You can access the client install packages from the Configuration view.

Figure 10. Client Download

The backup clients are MSI packages, and must be downloaded to the respective virtual machines running the application the customer wants to protect.

Refer to the Questionnaire to determine which of the backup clients is to be deployed to support the initial backup job. In each instance, pre-Implementation configuration work must completed by the customer before this step is undertaken. In addition, the required settings for the backup client must be recorded in the Questionnaire.

If the application to be protected is SQL Server, then review the vSphere Data Protection Administration Guide and verify all pre-requisites for the agents are completed. For instance, the SQL Server agent requires the ‘Client Tools SDK’ be installed on the server.

Figure 11. SQL Server Feature Selection

This tool is used to provide connectivity to backup and recovery jobs enabled in vSphere Data Protection.

In addition, the customer is responsible for providing the method of authentication for the SQL Server agent. The customer is responsible for providing the appropriate Active Directory Username and Password if NT authentication is selected, or the appropriate SQL Server Username and Password if that method of authentication is selected.

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 21

04/13/15

If the application to be protected is Exchange, then the customer is responsible for any pre-requisites required for this agent. For instance, the Exchange agent requires that the Exchange ‘Messaging API and Collaboration Data Objects’ are installed in the Exchange server for the Granular Level Recoveryoption.

Figure 12. Exchange Messaging API and CBO

In addition, the customer must provide the credentials for a user with the necessary privileges to execute a backup and recovery job using this agent with vSphere Data Protection. It is advisable to review the vSphere Data Protection Administration Guide beforehand to understand the requirements for this user before configuring this application agent.

A default client can be configured for this purpose during the install process using the Client Configuration Tool. This tool can be executed during the install process, or at a

Figure 13. VDP Exchange Backup User Configuration

later time by the customer. The default path to the tool is: <C:\Program Files\avp\bin\vmbackupusercfg.exe>

If the customer has a user configured that already meets the necessary requirements, then that can be selected in the Client Configuration Tool. The tool can be used to verify the selected user meets all of the necessary criteria. If a user with the appropriate privileges does not exist, then this tool can be used to create a user for this purpose.

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 22

04/13/15

The user will be created in Active Directory, and be assigned to the necessary security groups needed to enable Exchange backups. In addition, a mailbox will be set up for this user on the Exchange server.

Figure 14. VDP Exchange User

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 23

04/13/15

Appendix E: Creating an Application-Specific Backup Job

If no application agents are deployed on a specific virtual machine, then the only type of backup job that is supported is an image-level backup. This process is enabled through a snapshot of the virtual machine being taken during the execution of a backup job.

For an application-specific protection, the agents for vSphere Data Protection must be enabled before an application-specific backup job can be created. Individual applications, such as SQL databases and Exchange stores, cannot be selected when creating a backup job if the agent is not functional. It may take a few minutes for an agent to fully register with vSphere Data Protection before individual applications can be selected for protection in a backup job.

Figure 15. VDP Backup Job Targets

When a backup job is created for a specific application, then more precise settings can be enabled to meet the customer requirements.

The settings support both full and incremental backups for a given application, for instance.

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 24

04/13/15

Figure 16. VDP Backup Job Options

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 25

04/13/15

Appendix F: Executing a Recovery Job

After the backup job from the previous step has completed, execute a sample recovery job using the backuip image. This section outlines a sample use case for restoring an SQL Server database named ‘vDPA-Sample’.

Important! The execution of the recovery job must be done with careful coordination with the customer. A recovery job is only executed on a non-production application instance and with the explicit permission of the customer. The recovery job will incur downtime on the selected application. A recovery effort is not to be performed by the delivery resource on a production application.

Use SQL Server Manager to delete the database. The customer can perfomr this step.

Figure 17. Delete Sample SQL Database

Select the Restore option in vSphere Data Protection Main Menu, and then select the location of the SQL Server database instance.

Figure 18. Initiate Restore Job

The following screens will display date and time stamps for all of the completed backup jobs. Select the most current item, and traverse through the menu to locate the SQL Server database instance.

We deleted the SQL Server database in the initial step, the entire database is restored to its original location.

EMC Corporation, Technology Solutions T.S. Service Kit: Practitioner’s Guide

EMC Implementation for vSphere Data Protection Page 26

04/13/15

Figure 19. Select SQL Database to Restore

Figure 20. Restore Options

Figure 21. Restore Job in Task Manager