Administration Guides
Cloud Vault
Home
- Overview
- Key Challenges Solved
- Prerequisites
- Topology Diagram
- Configuration Steps
- Configure Cloud Storage bucket
- Configure Golden Copy
- Data Recovery & Cluster Configuration Backup
- Summary
Overview
Customers looking for next generation backup solution with an immutability option and file versioning support that require a rapid RTO for data recovery can now leverage Golden Copy and Ransomware Defender with Cloud S3 storage to create a Cyber Vault solution.
Key Challenges Solved
- 3-2-1 policy allows the vault storage to use only the S3 protocol to access the vault in a steady state.
- Rapid RTO of a Cyber Vault backup using PowerScale and the S3 protocol
- File Versioning to store multiple versions of your data
- Object Lock for Immutability
- Support for file versioning and repaid object recovery in bulk using Snapshots on PowerScale versus S3 version aware recall with Golden copy. This provides a much faster point in time recovery using S3 storage
- Integrated with Ransomware Defender Zero Trust Backup API to ensure backups automatically stop replication with the source data is under threat.
Prerequisites
- Cloud Object Storage
- Security Bundle subscription and Data Orchestration Bundle Subscription
Topology Diagram
Configuration Steps
- Enable Zero trust api integration with Ransomware defender
- Login to Golden copy node 1
- nano /opt/superna/eca/eca-env-common.conf
- paste this line to the file and change the yellow highlighted x.x.x.x with the ip address of Eyeglass VM, and the API token created to authenticate. API web token can be created from the main menu Eyeglass API menu UI.
- export EYEGLASS_LOCATION=x.x.x.x
- export EYEGLASS_API_TOKEN=yyyyyyyy
- control + x to save and exit
Configure Cloud Storage bucket
- Follow your Cloud providers bucket creation steps
- Configure versioning if needed and object lock policies
Configure Golden Copy
- NOTE: Delete handling needs to be configured globally on Golden Copy. Determine if you want data deleted from the cybervault S3 bucket during incrementals or to leave deleted data in the vault.
- Login as ecaadmin
- add a folder definition using examples for each Cloud provider. See guide.
- Run a full backup job
- Configure an incremental job on the folder definition to run before the schedule snapshot on the cyber vault path.
- Best Practice: Enabling the Configuration backup feature in Golden Copy exports all shares, nfs exports, quotas to json format and stores a copy on the vault cluster. This is documented here. This provides not only a data protection solution but also a device level solution to restore the cluster configuration information.
Data Recovery & Cluster Configuration Backup
- Recovery Scenarios
- Scenario 1 - To recover data the PowerScale can leverage SMB or NFS access in read only or read write mode anywhere in the file system tree that was created by Golden Copy.
- Select a snapshot version and reverting Golden Copy backup data to any point in the passed based on snapshot retention settings on the Vault cluster
- Scenario 2 - Restore data to the source PowerScale using Golden copy recall feature. Full or partial recovery of any path in the file system is possible to prioritize which data is recalled first.
- Scenario 3 - Create SyncIQ policies on the Vault cluster and use differential mode to only copy updated data back to the production cluster OR create new policies to replicate data to a new powerscale cluster.
- Scenario 4 - Determine if the configuration data backup is needed. Copy the json files to the PowerScale cluster and run the import configuration CLI commands to read the json files and create the configuration information on the cluster. Consult with Dell support on the specific steps.
- Scenario 1 - To recover data the PowerScale can leverage SMB or NFS access in read only or read write mode anywhere in the file system tree that was created by Golden Copy.
Summary
This solution protects provides a Cyber Vault on S3 storage that is capable of sharing data in a read-only state and providing immutability.