Search icon CANCEL
Arrow left icon
Explore Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Conferences
Free Learning
Arrow right icon
Arrow up icon
GO TO TOP
Microsoft System Center Data Protection Manager Cookbook

You're reading from   Microsoft System Center Data Protection Manager Cookbook Maximize storage efficiency, performance, and security using System Center LTSC and SAC releases

Arrow left icon
Product type Paperback
Published in Dec 2018
Publisher
ISBN-13 9781787289284
Length 424 pages
Edition 1st Edition
Languages
Arrow right icon
Authors (2):
Arrow left icon
Patrick Lownds Patrick Lownds
Author Profile Icon Patrick Lownds
Patrick Lownds
Charbel Nemnom Charbel Nemnom
Author Profile Icon Charbel Nemnom
Charbel Nemnom
Arrow right icon
View More author details
Toc

Table of Contents (12) Chapters Close

Preface 1. Installing and Upgrading DPM FREE CHAPTER 2. DPM Post-Installation and Management Tasks 3. Protecting Hyper-V VMs 4. Monitoring DPM and Configuring Role-Based Access 5. Protecting Microsoft Workloads with DPM 6. Securing Windows Client with DPM 7. Protecting Microsoft Azure Stack with DPM 8. Protecting Workgroups and Untrusted Domains 9. Recovering Data from Backup 10. Integrating DPM with Azure Backup 11. Other Books You May Enjoy

Installing the DPM agents

This recipe will cover the installation of a DPM agent from the DPM console as well as a manual-based installation.

Getting ready

Before you can start protecting a workload within your datacenter, you must install a DPM agent on the server hosting the workload that you would like to protect (that is, Hyper-V, SQL Server, Exchange, and so on).

You can install the DPM agent via the DPM Administrator Console in push mode; however, there are some scenarios where you will not able to perform a push installation of the DPM agent to the server hosting the workload that you would like to protect. On the DPM server, you can find two executables for the DPM agent that you can share or download to a removable media. Then, you can install the agent manually. The DPM agent is also available on the DPM installation media. There are two different executables here:

  • DpmAgentInstaller_x86.exe is for 32-bit operating systems
  • DpmAgentInstaller_x64.exe is for 64-bit operating systems

Both are applicable for Windows server and Windows client operating systems.

How to do it...

The following steps will illustrate the process of installing DPM agent in two different ways.

Option 1 – installing the agent from the DPM console

  1. Open the DPM Administrator Console and click Management | Agents. Click Install on the tool ribbon to open the Protection Agent Installation Wizard.
  2. On the Select Agent Deployment Method page, click Install agents | Next.
  3. On the Select Computers page, DPM will display a list of available computers that are in the same domain as the DPM server. Add the required computer.
  1. The Advanced button page is enabled only when there is more than one version of a protection agent available for installation on the computers. You can use this option to install a previous version of the protection agent that was installed before you upgraded DPM server to a more recent version. However, it's recommended that you always keep the protection agent updated.
  2. Click Next > to continue.
  3. On the Enter Credentials page, type the username and password for a domain account that is a member of the local administrators group on the selected computer(s).
  4. If you select a node in a cluster, DPM detects all of the additional nodes in the cluster and displays the Select Cluster Nodes page. On the Select Cluster Nodes page, select an option that you want DPM to use for installing agents on additional nodes in the cluster. Then, click Next.
  5. In the Choose Restart Method step, select the method that you want to use to restart the selected computers after the protection agent has been installed.
For greenfield agent installation, the computer must be restarted before you can start protecting data. A restart is necessary to load the volume filter that DPM uses to track and transfer block-level changes between the DPM server and the protected computers.
  1. If any of the computers that you have selected are members of a cluster, an additional Choose Restart Method page will appear that you can use so that you can select the method to restart the clustered computers.
Please note that you need to install a protection agent on all of the nodes in a cluster to successfully protect the clustered data.
  1. Choose an appropriate option and click on Next > to continue.
  2. In the Summary page, you can verify the information you have chosen and then click on Install to initialize the installation and configuration process of the DPM agent.
  3. After a short period of time, the Agent will appear in the DPM console and report back with status OK.

Option 2 – installing the agent manually

You can perform a manual installation in two different ways:

  • By providing the FQDN of the DPM server when running the DpmAgentInstaller executable
  • By providing the NetBIOS name of the DPM server using setdpmserver.exe if the DPM agent is already installed but not configured

Now follow these steps:

  1. On the computer that you want to protect, open an elevated command window, and then run net use Z: \\<DPMServerName>\d$, where Z is the local drive letter that you want to assign and <DPMServerName> is the name of the DPM server that will protect the computer. d$ is where DPM software is installed.
  2. For a 64-bit computer, type the following:
cd /d <assigned drive letter>:\Program Files\Microsoft System Center 2019\DPM\DPM\ProtectionAgents\RA\5.0.<build number>.0\amd64 

Here, <assigned drive letter> is the drive letter that you assigned in the previous step and <build number> is the latest DPM build number. For example: 

cd /d "Z:\Program Files\Microsoft System Center 2019\DPM\DPM\ProtectionAgents\RA\5.0.158.0\amd64"
  1. For a 32-bit computer, type the following:

cd /d <assigned drive letter>:\Program Files\Microsoft System Center 2019\DPM\DPM\ProtectionAgents\RA\5.0.<build number>.0\i386 

Here, <assigned drive letter> is the drive that you mapped in the previous step and <build number> is the latest DPM build number.

  1. To install the protection agent for a 64-bit computer, run the following command:

DPMAgentInstaller_x64.exe <DPMServerName> 

Here, <DPMServerName> is the fully qualified domain name (FQDN) of the DPM server.

  1. To install the protection agent for a 32-bit computer, run the following command:
DPMAgentInstaller_x86.exe <DPMServerName> 

Here, <DPMServerName> is the FQDN of the DPM server.

  1. Select I accept the license terms and conditions for the Microsoft Software License Terms, and click OK.
  2. The installation will start and you will receive a confirmation message that states Agent installation completed successfully. The DPM agent has now been configured and the appropriate firewall exceptions have been made in the domain profile of the Windows Firewall. Press Enter key to close the window.
To perform a silent installation and to accept the EULA license in a silent installation , you can use the /q and /IAcceptEULA options after the command. For example: DPMAgentInstaller_x64.exe /q <DPMServerName> /IAcceptEULA.
  1. If the DPM agent is already installed, you should run the setdpmserver.exe executable with the –dpmservername switch to configure the DPM server that the DPM agent should report to as follows:
Setdpmserver –dpmservername DPM2019
When using the SetDpmServer executable, you only need the NetBIOS name of the DPM server.

After installing the agent manually, you must attach the DPM agent to the DPM server. You can do this via the DPM Administrator console or via the DPM PowerShell cmdlet.

  1. Open the DPM console and go to Management. Click on Production Servers and, at the top-left corner of the console, click on the Add button to start the Production Server Addition Wizard.
  1. Under the Select Agent Deployment Method page, click Attach agents, followed by Computer on trusted domain. Click the Next > button to continue:
If you want to attach a DPM agent in a workgroup or untrusted domain, please refer to Chapter 8, Protecting Workgroups and Untrusted Domains, for more information.
  1. In the Select Computers page, choose the server that you would like to attach to the DPM server and click on Next > to continue.

You can also provide a list of servers that you would like to have attached. The list should have all of the FQDN of every server per row in a simple text file. Click on the Add From File... button to import the files' data.
  1. In the Enter Credentials page, enter the credentials that should be used to execute this process. Keep in mind that the credentials you provide must have administrative rights on the server that you are trying to attach. Provide the credentials and click on Next > to continue.
  2. In the Summary page, verify the configuration and click on Attach to start.
  3. Verify that the Attach protected computer task has been successful. Click Close to close the Protection Agent Installation Wizard.
  4. The Agent will appear in the DPM console and report back with status OK.

How it works...

The DPM agent is the core component for the DPM so that it's able to provide restore capabilities for your data. The DPM relies on the DCOM object of the protected server which is mapped to the DPMRA service so that the SQL job on the DPM server starts. System Center Data Protection Manager stores all protection group configurations as SQL Jobs, and the SQL Server Agent initializes the DPM agent to start creating snapshots by using the underlying architecture of the Volume Shadow Copy Service (also known as Volume Snapshot Service or VSS) within the operating system.

The setdpmserver.exe executable command has the ability to configure the DPM agent to set which DPM server the DPM agent reports to. It also provides the configuration needed for the local Windows Firewall so that the DPM agent can start reporting to the DPM server.

There's more...

System Center Data Protection Manager manages data replication and provides management of the DPM agents using two different TCP ports:

  • 5718
  • 5719

TCP port 5718 is used for data replication and TCP port 5719 is used by the DPM agent coordinator. The coordinator is the function within the DPM agent architecture that manages the installation, uninstallation, and updates of the DPM agent. For more information regarding firewall ports and configuration, please read the Planning your DPM deployment recipe in this chapter.

You have been reading a chapter from
Microsoft System Center Data Protection Manager Cookbook
Published in: Dec 2018
Publisher:
ISBN-13: 9781787289284
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at $19.99/month. Cancel anytime