Configuring Data Protection for Microsoft Hyper-V with the wizard

You can use the configuration wizard for the initial configuration or to update the configuration of Data Protection for Microsoft Hyper-V for a stand-alone Hyper-V host or a cluster environment. You can also use the wizard to enable Data Protection for Microsoft Hyper-V for file restore operations.

Before you begin

  • If you are upgrading from Data Protection for Microsoft Hyper-V Version 8.1.2 or earlier and have nodes that are already defined on the IBM Spectrum Protect™ server, complete the tasks in Updating nodes on the IBM Spectrum Protect server.
  • The Hyper-V host where Data Protection for Microsoft Hyper-V is installed must have network connectivity to the IBM Spectrum Protect server that is used to store virtual machine (VM) backups.
  • To help improve performance, use at least a 10 Gb connection between the Hyper-V hosts and the IBM Spectrum Protect server.
  • You must have the login credentials for the IBM Spectrum Protect server administrator account.
  • You must connect to a secure IBM Spectrum Protect server that uses Secure Sockets Layer (SSL) communications. A security certificate is downloaded automatically when you are completing the configuration wizard.
  • In a cluster environment, ensure that you install the Data Protection for Microsoft Hyper-V package on each host in the cluster. After you install the packages on all the hosts, run the installation wizard on one of the hosts in the cluster. The configuration wizard will connect to each host to complete the configuration.

    Any node that does not have the Data Protection for Microsoft Hyper-V software installed is omitted from the cluster configuration, and does not affect the configuration of any other nodes where the software is installed. If you add a node to the cluster later, install Data Protection for Microsoft Hyper-V on that node and run the configuration wizard for that node (locally or from any other nodes in the cluster).

  • On each host where Data Protection for Microsoft Hyper-V is installed, ensure that the HTTPS port that is used to communicate with Data Protection for Microsoft Hyper-V is open in the firewall. The default port number is 9081, unless you are using a different port.

About this task

To simplify the configuration, the configuration wizard automatically creates the nodes that are required for backup, restore, and optionally file restore operations. The configuration wizard also registers the nodes on the IBM Spectrum Protect server and configures the services on the local Windows host.

For more information about the types of nodes that are used for Data Protection for Microsoft Hyper-V, see How IBM Spectrum Protect nodes are used in Data Protection for Microsoft Hyper-V.

Restriction: The configuration wizard determines the node names to use based on the host or cluster name. You cannot specify custom node names.

Procedure

To configure Data Protection for Microsoft Hyper-V, complete the following steps on the Hyper-V host. For a cluster environment, complete the following steps on any host in the cluster where Data Protection for Microsoft Hyper-V is installed.

  1. Start the Data Protection for Microsoft Hyper-V Management Console by clicking Start > IBM Spectrum Protect > DP for Hyper-V Management Console.

    Alternatively, issue the following command at the command prompt:

    "C:\Program Files\IBM\SpectrumProtect\DPHyperV\DpHv.msc"
  2. When prompted, log on to the Data Protection for Microsoft Hyper-V Management Console. Enter the same credentials that you use to log on to the Hyper-V host.

    The account that you use must be a member of the local administrators group on the machine so that Hyper-V and cluster operations can be completed.

  3. If you are configuring Data Protection for Microsoft Hyper-V Management Console for the first time, the configuration wizard opens automatically.

    If you are changing the existing configuration in a stand-alone host environment, click a host in the navigation pane, and click Configure in the actions pane. In a cluster environment, click select a cluster node in the navigation pane, and click Configure.

  4. Complete each page of the wizard and click Next to advance to the next page.
    Page Action
    Before you Begin Click Next to start the wizard.
    Backup Server Enter information about the IBM Spectrum Protect server that is used to store VM backups.
    Backup server address
    The host name or IP address of the IBM Spectrum Protect server.
    Backup server SSL port
    Specify the port number for the server port that allows administrative connections by using the SSL protocol with TLS 1.2 enabled. The default port number is provided. Accept the default port number unless your server is configured to use a different port.
    Administrative credentials
    The user name and password of the IBM Spectrum Protect server administrator. The administrator must have system privilege, and be able to register client nodes on the server.
    Accept Certificate

    This window appears only if you are connecting to the IBM Spectrum Protect server for the first time, or if the existing security certificate is no longer valid. Click Accept to download and import the certificate automatically.

    If you are connecting to the V8.1.1 or earlier V8 server, or V7.1.7 or earlier server, and the download process fails, see Configuring security settings to connect to IBM Spectrum Protect server V8.1.1 or earlier or V7.1.7 or earlier.

    Cluster and Host Configuration The following options are available:
    Policy domain
    Select a policy domain from the list. The policy domain contains rules that determine how long VM backups are kept on the IBM Spectrum Protect server and how many versions of the VM backup are retained. The default policy domain is STANDARD.
    Target node name
    Displays the node name where VM backups are stored on the IBM Spectrum Protect server. For clusters, all VM backups are stored under the target node, regardless of which node in the cluster is running the backup.
    Node Definitions
    Displays the node definitions for the stand-alone host or hosts in the cluster. For information about the types of nodes, see Table 1.
    Enable File Restore
    If you want to use the file restore web interface to restore individual files from a VM backup, check this box. When you select this check box, the mount proxy node pair for each host is automatically added to the list.

    This node pair represents the Linux and Windows proxy systems that access the mounted VM disks through an iSCSI connection. These nodes enable the file systems on the mounted VM disks to be accessible as mount points for file restore operations.

    During the initial configuration, Enable File Restore is checked by default.

    File Restore Settings
    Click this button to enter the file restore administrator credentials.
    File Restore Settings This window appears only if you enabled the file restore feature. Enter the file restore administrator credentials. The account must be a Windows domain user account with local administrative authority over all VMs.
    Summary Review the settings and click Next to complete the configuration.
    Results

    The results of the configuration are displayed. If the configuration did not succeed, a list of errors is displayed. Correct the errors and run the configuration again.

    If the file restore feature is successfully configured, information about the host, Linux mount proxy, and file restore URLs are displayed in the file restore results table. You can click Copy to copy all the information to the clipboard.

    You must complete the file restore configuration by following the instructions in Enabling the environment for file restore operations.

Results

Upon successful completion of the wizard, you can run backup and restore operations by using the command prompt, PowerShell cmdlets, or the Data Protection for Microsoft Hyper-V Management Console.

For your convenience, you can also open the file restore interface by clicking File Restore in the Actions pane.

What to do next

You can also specify the preferred host to log in to by using the Set-DpHvMmcLoginPreferences cmdlet. For more information, see Protecting virtual machines by using Windows PowerShell cmdlets.