Simplified remote access for home labs and offices with Veeam PN

Source: Veeam

On January 2018, Veeam publicly announced the release of Veeam PN (powered network) version 1, a lightweight SDN appliance that was released completely FREE to use. And while Veeam PN was released as part of a greater solution focused on extending network Availability for Microsoft Azure, Veeam PN can also be deployed as a standalone tool via a downloadable OVA. Veeam PN has some key standalone use cases we’ll explore in this blog series.

While testing the tool through it’s early dev cycles, it was clear there was an opportunity to allow access with home labs and other home devices, all without having to setup and configure relatively complex VPN or remote access solutions.

There are plenty of existing solutions that do what Veeam PN can, however, the biggest difference with comparing the VPN functionality with other VPN solutions, is that Veeam PN is purpose-built and easy-to-use, and setup is only within a couple clicks. Veeam PN’s underlying technology is built on OpenVPN, so that in itself provides users with a certain level of familiarity and trust. The other great thing about leveraging OpenVPN is that any Windows, MacOS or Linux client will work with the configuration files generated for point-to-site connectivity.

Home lab remote connectivity overview

While on the road, users need to easily access home lab/office machines. In my own case, I’m on the road quite a bit and need access without having to rely on published services externally via my entry-level Belkin router, I also didn’t have a static IP which always proved problematic for remote services while on the road. At home, I run a desktop that acts as my primary Windows workstation which also has VMware Workstation installed. I then have my SuperMicro 5028D-TNT4 server that has ESXi installed and runs my nested ESXi lab. I need access to at least RDP into that Windows workstation, but also get access to the management vCenter, SuperMicro IPMI and other systems running on the 192.168.1.0/24 subnet.

 

 

In the above diagram, you can see I also wanted to directly access workloads in the nested ESXi environment, specifically on the 172.17.0.1/24 and 172.17.1.1/24 networks. With the use of the Tunnelblick OpenVPN Client on my MBP, I am able to create a point-to-site connection to the Veeam PN Hub which is in turn connected via site-to-site to each of the subnets I want to connect into.

Deploying and configuring Veeam PN

As mentioned above, to get stared, you will need to download the Veeam PN OVA from Veeam.com. This Veeam KB describes where to get the OVA and how to deploy and configure the appliance for first use. If you don’t have a DHCP enabled subnet to deploy the appliance into, you can configure the network as a static by accessing the VM console, logging in with the default credentials and modifying the/etc/networking/interface file.

Components:

  • Veeam PN Hub Appliance x 1
  • Veeam PN Site Gateway x number of sites/subnets required
  • OpenVPN Client

The OVA is 1.5 GB, and when deployed, the virtual machine has the base specifications of 1 vCPU, 1 GB of vRAM and a 16 GB of storage, which if thin provisioned, consumes just over 5 GB initially.

Networking requirements:

  • Veeam PN Hub Appliance – Incoming Ports TCP/UDP 1194, 6179 and TCP 443
  • Veeam PN Site Gateway – Outgoing access to at least TCP/UDP 1194
  • OpenVPN Client – Outgoing access to at least TCP/UDP 6179

Note that as part of the initial configuration, you can configure the site-to-site and point-to-site protocol and ports which is handy if you are deploying into a locked-down environment and want to have Veeam PN listen on different port numbers.

 

 

In my setup, the Veeam PN Hub Appliance has been deployed into Azure, mainly because that’s where I was able to test out the product initially, and in theory it provides a centralized, highly available location for all the site-to-site connections to terminate into. This central hub can be deployed anywhere and as long as it’s got HTTPS connectivity configured correctly, you can access the web interface and start to configure your site and standalone clients.

Configuring site clients (site-to-site)

To complete the configuration of the Veeam PN Site Gateway, you need to register the sites from the Veeam PN Hub Appliance. When you register a client, Veeam PN generates a configuration file that contains VPN connection settings for the client. You must use the configuration file (downloadable as an XML) to set up the Site Gateways. Referencing the diagram at the beginning of the post, I needed to register three separate client configurations as shown below.

 


 

Once this was completed, I deployed three Veeam PN Site Gateways on my home office infrastructure as shown in the diagram — one for each site or subnet I wanted to have extended through the central hub. I deployed one to my Windows VMware Workstation instance on the 192.168.1.0/24 subnet and, as shown below, I deployed two Site Gateways into my nested ESXi lab on the 172.17.0.0/24 and 172.17.0.1/24 subnets respectively.

 

 

From there I imported the site configuration file into each corresponding Site Gateway that was generated from the central Hub Appliance and in as little as three clicks on each one, all three networks where joined using site-to-site connectivity to the central hub.

Configuring remote clients (point-to-site)

To be able to connect into my home office and home lab when on the road, the final step is to register a standalone client from the central Hub Appliance. Again, because Veeam PN is leveraging OpenVPN, what we are producing here is an OVPN configuration file that has all the details required to create the point-to-site connection — noting that there isn’t any requirement to enter in a username and password as Veeam PN is authenticating using SSL authentication.

 

 

For my MBP, I’m using the Tunnelblick OpenVPN Client. I’ve found it to be an excellent client, but it obviously being OpenVPN, there are a bunch of other clients for pretty much any platform you might be running. Once I imported the OVPN configuration file into the client, I was able to authenticate against the Hub Appliance endpoint as the site-to-site routing was injected into the network settings.

 

 

You can see above that the 192.168.1.0, 172.17.0.0 and 172.17.0.1 static routes have been added and set to use the tunnel interfaces default gateway which is on the central Hub Appliance. This means that from my MBP, I can now get to any device on any of those three subnets no matter where I am in the world — in this case I can RDP to my Windows workstation, connect to vCenter or ssh into my ESXi hosts.

Conclusion

To summarize, here are the steps that were taken in order to setup and configure the extension of a home office network using Veeam PN through its site-to-site connectivity feature to allow access to systems and services via a point-to-site VPN:

  1. Deploy and configure Veeam PN Hub Appliance
  2. Register sites
  3. Register endpoints
  4. Deploy and configure Veeam PN Site Gateway
  5. Setup endpoint and connect to Hub Appliance

Those five steps can take less than 15 minutes, which also takes into consideration the OVA deployments as well. This is a very streamlined, efficient process compared to other processes, which can take hours and would involve a more complex set of commands and configuration steps. The simplicity of the solution is what makes it very useful for home lab users wanting a quick and easy way to access their systems. It just works!

Again, Veeam PN is completely FREE, and downloadable in OVA format. And this use case I described, I have been using it without issues for a number of months, and it adds to the flexibility of the Veeam PN solution.

The post Simplified remote access for home labs and offices with Veeam PN appeared first on Veeam Software Official Blog.

Simplified remote access for home labs and offices with Veeam PN

How to avoid typical misconfigurations when setting up Veeam

Source: Veeam

This article is aimed at giving you a smooth start with Veeam Backup & Replication. It includes some basic advice on the initial setup, and outlines the most common misconfigurations that we, at Veeam Support, find in clients’ infrastructures during our investigations.

Recommendations on backup modes

In most cases, forward incremental or forever forward incremental backup modes are recommended as the fastest ones. Forever forward incremental (no periodic full backup) requires less space and offers decent performance. Forward incremental requires more space, but is also more robust (because a backup chain is further divided in subchains by periodic full backup).

Reverse incremental backup method is our oldest backup method and consequently the slowest. Depending on the type of storage in use, it can be three or more times slower than other modes. With the reverse incremental backup, you get a full backup as the last point in the chain. This allows for faster restores in case the most recent point is used, but the difference is often negligible in comparison to a forward incremental chain (if its length is not unreasonably long, we usually suggest it to be around 30 days).

Insights on the full backup

Synthetic full operation builds a full backup file from the restore points already residing in your repository. However, not every storage type provides a good performance with synthetic operations, so we advise to use active full backup as an alternative.

When you set up a synthetic full backup mode, there is an additional “Transform previous backup chains into rollbacks” option available. Keep in mind though that this option starts a task of transforming incremental backups (.VIB) into rollbacks (.VRB), which is very laborious for your target backup repository. For example, it will help you transform your current chain into the reverse incremental one for archival purposes. However, if you use it as a main backup method, it would produce a very specific backup chain consisting of a full backup file and a mix of forward and reverse incremental restore points.

 


Figure 1. A forward incremental backup job with periodic synthetic full.

Guest processing tips

Guest processing is used to create consistent backups of your VMs. And if they run instances of Microsoft Exchange, Active Directory, SharePoint, SQL Server and Oracle applications, you will be able to leverage granular restores using Veeam Explorers. Please note that guest processing relies on a VSS framework (a Windows feature), which should be functioning correctly, otherwise your backup jobs will fail.

To enable guest processing, go to Guest Processing of backup job properties. You should enable “Application-aware processing” option and you should provide an administrative account under guest OS credentials.

 


Figure 2. Guest processing step controls application-aware processing and indexing.

 

If some of VMs in the job require specific credentials, you can set them by clicking on the “Credentials” button. This brings up the Credentials menu. Click on “Set User…” to specify the credentials that should be used with the VM.

 


Figure 3. Credentials menu allows to set up users for each VM in the job.

 

Clicking on the “Applications…” button brings up a menu where you can specify options for supported applications and disable the guest processing for certain VMs, if needed.

 


Figure 4. In Applications menu, you can specify options for various application or disable guest processing completely for a VM.

VM guest file system indexing

With “VM Guest File System Indexing” enabled, Veeam Backup & Replication creates a catalog of files inside the VM, allowing you to use guest file search and perform 1-click restores through our Veeam Backup Enterprise Manager.

In case you don’t use the Enterprise Manager, then you can cut some (sometimes significant) time off your backup window and save space on the C: drive of a Veeam server by disabling this option. It doesn’t affect your ability to perform file level restores from your Veeam Backup & Replication console.

Secondary backup destination

No storage vendor can guarantee an absolute data integrity. Veeam checks a backup file once it’s written to a disk, but, with millions of operations happening on the datastore, occasional bits may get swapped causing silent corruption. Veeam Backup & Replication provides features like SureBackup and health checks that help detect an early corruption. However, sometimes it may be already too late, so it’s absolutely necessary to follow the 3-2-1 rule and use different sets of media in several locations to guarantee data Availability.

To maintain the 3-2-1 rule, right after creating a primary backup job, it’s advised to set up a secondary copy job. This can be a Backup Copy Job to a secondary storage, Backup Copy Job to a cloud repository or a copy to tape.

Instant VM recovery as it should be

Instant VM Recovery allows you to start a VM in minimal time right from a backup file. However, you need to keep in mind that a recovered VM still sits in your backup repository and consumes its resources. To finalize the restore process, the VM must be migrated back to the production. Too often we at Veeam Support see critical VMs working for weeks in the Instant VM Recovery mode until a datastore fills up and data is lost.

For those of you looking for a deep dive on the topic, I recommend the recent blog post on Instant VM Recovery by Veeam Vanguard Didier Van Hoye.

 


Figure 5. Soon after VM is started in the Instant VM Recovery mode you should initiate its migration back to the production.

Mind the CIFS as a main target repository

Veeam is storage agnostic and supports several types of backup repositories. Over the years, it was proven that a Windows or Linux physical server with internal storage gives the best performance in most cases. You can check Veeam Forums for more details — years later, these words still stay true.

Backup repository on a CIFS share still remains a popular choice, yet it generally offers the poorest performance of all options. Many modern NAS devices support iSCSI, so a better choice would be to create an iSCSI disk and present it to a Veeam server/proxy. Note though, that it’s also not recommended to use reverse incremental backup mode for repositories on NAS because it puts heavy IO load on the target.

Target proxy for replication

When replicating over the WAN, it is advised to deploy a backup proxy on the target site and configure it as a target proxy in replication job settings. This will create a robust channel between the two sites. We recommend setting a target proxy to NBD/Network mode, as using hot-add for replica can cause stuck and orphaned snapshots.

Note that when using WAN accelerators, a target proxy should still be deployed. Target WAN accelerator and target proxy can be installed on different or on a single machine, given it has enough resources.

 


Figure 6. For replication over WAN, you should specify source and target proxy.

 


Figure 7. Set the target proxy mode to Network.

A must-do for a tape server

Tape server is a component responsible for communication with a tape device. It is installed on a physical machine to which a tape device is connected (“pass through” connections via ESXi host to a virtual machine are not supported!).

Veeam Backup & Replication gets the information about the library from the OS, so you should make sure that the latest drivers are installed and the tape device is visible correctly in the device manager.

You can find more info on using tapes with Veeam Backup & Replication in my previous blog post.

Final advice on opening tickets with Veeam support

We encourage you to carefully check the Severity criteria and set an appropriate level when opening your support request. We understand that each issue, no matter the scale, is important and it is our duty to handle it in the quickest way possible, but if you set the Severity to 1 and it doesn’t meet its criteria, you will lose valuable time since your ticket will be inspected and re-directed to an appropriate queue.

 


Figure 8. When creating a case be sure to set the severity level correctly and upload the logs bundle.

 

To help our support agents get to the root of the issue straight away, make sure to compile the backbone of every successful case investigation: a log bundle. Follow our guide to retrieve them in a correct way. In some occasions, we might require logs from additional components of your infrastructure, but those would be requested by your support engineer directly.

And that’s it for today’s episode! I hope this would help you optimize your backup environment and evade the most common mistakes during a setup.

 

The post How to avoid typical misconfigurations when setting up Veeam appeared first on Veeam Software Official Blog.

How to avoid typical misconfigurations when setting up Veeam

Accelerate recovery with NetApp snapshots and Veeam

Source: Veeam

If you are responsible for meeting strict Recovery Point Objectives (RPOs) for your business, snapshots are the technology you need. Snapshots are appealing because you can make quick, point-in-time copies of your data, with little-to-no impact on production storage. This allows you to take multiple snapshots throughout the day.

One of the key players in snapshot technology is NetApp, which gives storage snapshots added functionality through its SnapMirror and SnapVault. When you add Veeam into the mix, you gain a comprehensive Availability strategy that meets, not only RPOs, but also Recovery Time Objectives (RTOs). Data Availability today is more critical than ever before and being able to leverage storage snapshots is a real game-changer when it comes to meeting the demands of your business. Veeam and NetApp integration provides you with the ability to create faster backups, quicker restores and improved protection. Veeam integrates with NetApp FAS and AFF, FlexArray (V-Series), Data ONTAP Select and IBM N Series (NetApp FAS OEM).

Faster backups

The Veeam and NetApp combination gives you useful tools such as Backup from Storage Snapshots, Veeam Explorer for Storage Snapshots and On-demand Sandbox for Storage Snapshots. Backup from Storage Snapshots lets you use a snapshot — which can be taken every 15 minutes — to create a backup without affecting production. What takes this functionality even further is the added benefit of SnapMirror and SnapVault, from which you can also use to take backups.

I know I mentioned SnapMirror and SnapVault before, but to be clear, SnapMirror is a NetApp technology that allows users to create a mirror of a snapshot on a different NetApp storage array. This could almost be termed as replicating a snapshot to a different array. SnapVault allows you to create a read-only copy of your data. Both technologies can help deliver the #1 Data Availability guideline users follow today: the 3-2-1 Rule.

I hope by now that everyone knows about the 3-2-1 Rule. If you don’t (shame!), the definition is as follows:

  • 3 copies of data, on
  • 2 different media
  • 1 of which is off site

By combining NetApp and Veeam technologies, you can easily achieve the 3-2-1 Rule with Veeam Backup from Storage Snapshots.

Quick recovery

It’s true that a backup is only as good as its recovery. In other words, the worst thing that can happen is when you go to restore and find you are unable to utilize your backup due to an unforeseen circumstance. This situation could easily ruin your day or even your career!

Veeam delivers Veeam Explorer for Storage Snapshots, utilizing snapshots to perform quick restores so you can meet RTO requirements easily. Veeam Explorer for Storage Snapshots also has the functionality to utilize SnapMirror and SnapVault as a source for restores.

 

 

Veeam Explorer for Storage Snapshots provides Instant VM Recovery, VM Guest file restores and the ability to restore from Microsoft applications like SharePoint, Active Directory or Exchange. The technology can also perform restores for SQL databases and Oracle. What makes this offering even more perfect is that you can utilize the Explorer for FREE!

One step further with Veeam DataLabs

Veeam now wants to give you a way to maximize your storage investments to the fullest. This leads us to the next capability, Veeam DataLabs for Storage Snapshots, which allows you to utilize a storage snapshot to create a lab environment, so you can troubleshoot problems, test software patches and install new software. This lab is fully fenced off from the production environment, so it allows you to do your testing for processes before implementing into your production environment. This Veeam feature requires NetApp FlexClone and is an added value to your NetApp investment.

To conclude

Veeam combined with NetApp Storage solutions can give you a Data Availability strategy that will help you meet the increasing demands of your business today. Backup from Storage Snapshots gives you fast backups. Veeam Explorer for Storage Snapshots provides quick restores. The ability to create a virtual lab through a storage snapshot takes your business to the next level when it comes to leveraging storage investments. Don’t forget that Veeam Explorer for Storage Snapshots is FREE, giving you world-class restore capabilities from a storage snapshot with no additional cost!

The post Accelerate recovery with NetApp snapshots and Veeam appeared first on Veeam Software Official Blog.

Accelerate recovery with NetApp snapshots and Veeam

New Snapshot Integration for Pure Storage now available for Veeam Software

Source: Veeam

At the back end of 2017, Veeam released the Universal Storage API with Veeam Availability Suite 9.5 update 3. This framework offers built-in integrations with storage systems to help decrease impact on the production environment and significantly improve RPOs.

Today Veeam announces Pure Storage as the next storage vendor to arrive onto this integration framework. With more and more businesses moving toward and adopting all-flash storage solutions that help those businesses to deliver more predictable performance across an ever more demanding business workload, it goes without saying that there is no requirement change for Always-On Availability. In fact, this increases the requirements around RTO and RPO SLAs.

Reduce impact of performance on production workloads

 
The features this framework unlocks are the ability to reduce the impact of performance on the primary VMware estate when it comes to creating VMware snapshots, offloading this process to the storage array to then taking the backup from the storage.

Enable granular recovery for storage snapshots

 
Secondly the ability to use the Veeam Explorer for Storage Snapshots to gain visibility into historic snapshots and still give the ability to perform granular recovery tasks against snapshots not even created by Veeam on the storage array.

Application consistent storage snapshot orchestration

Thirdly and very important to tightening that recovery point objective is the ability to drive application consistent snapshots on the storage array to provide an option for really fast recovery of data, down to the application item level.

 

Automated restore verification and on-demand labs: “Put your data to work”

 

Lastly but probably most importantly is the ability to do more with those snapshots that have been created in an application consistent manner, with this integration you will have the ability to leverage this data for many different use cases.

One use case of where this functionality could really benefit these businesses is DevOps, the ability to create copies of your production environment in minutes so that your developers can test new features against that production-like data without affecting performance and uptime of the production workloads. All of this whilst using your performant Pure Storage FlashArray features that include thin provisioning, deduplication and compression.

Another use case is around modern analytics, the ability to take the production workload and leverage that data so that as end users you can gain insight into your workloads and achieve more with those findings and deliver value for your business without having to worry about the underlying infrastructure and performance.

FlashStack — Agile IT

This integration also follows the Pure Storage FlashArray into the converged infrastructure, offering the ability to combine compute, networking, storage and virtualisation. This provides more efficiency, ease of deployment and predictable performance. Reducing management and the need to fine tune these tasks frees up resource to focus on more important tasks within the business.
 

 
This converged approach can be extended with the use of the “Virtual Data Center in a box” allowing for your remote offices to also benefit from the storage and Availability benefits from Cisco, VMware, Pure Storage and Veeam.

Conclusion

The Pure Storage FlashArray integration with Veeam Availability Suite provides backup, recovery, replication and failover capabilities to enhance recovery point objectives and recovery time objectives.

More resources

 

The post New Snapshot Integration for Pure Storage now available for Veeam Software appeared first on Veeam Software Official Blog.

New Snapshot Integration for Pure Storage now available for Veeam Software

Don't Trust Links Sent in Email Messages

Source: SANS security tip
A common method cyber criminals use to hack into people’s computers is to send them emails with malicious links. People are tricked into opening these links because they appear to come from someone or something they know and trust. If you click on a link, you may be taken to a site that attempts to harvest your information or tries to hack into your computer. Only click on links that you were expecting. Not sure about an email? Call the person to confirm they sent it.
Don’t Trust Links Sent in Email Messages

Watchdog your entire IT environment with Veeam ONE

Source: Veeam

With data becoming so valuable these days, organizations can’t afford to have their IT systems unavailable even for minutes. Monitoring your environment plays a key role to ensure Availability. You need to be alerted when things could go wrong and when it’s time to fix issues before they negatively impact your business. Veeam ONE does just that, not only for your VMware vSphere and Microsoft Hyper-V virtual environments, but also integrates with Veeam Backup & Replication and, starting with Update 3, provides visibility for Veeam Agents as well.

In this blog post, I will talk about some of the Veeam ONE capabilities that will help you keep an eye on your IT systems.

Categorizing your infrastructure objects

Veeam ONE helps you categorize objects inside your infrastructure by business unit, department, purpose or SLA by means of its Business View component. This business categorization is integrated with Veeam ONE Monitor, enabling you to monitor, troubleshoot and report on business groups of VMware and Hyper-V objects.

 


The Configuration tab allows you to configure the basic application settings

 

After adding business categories into Veeam ONE, you can start monitoring your business groups through the Business View tab in Veeam ONE Monitor.

 


Business View in Veeam ONE Monitor, showing a virtual machine in the VMs with Snapshots category

 

You can also build reports for specified categories of objects. In the Workspace view of Veeam ONE Reporter, when you select a report, you can either choose to get details on the entire virtual environment, or on specific business view objects. For example, if you group VMs by department, you can create reports for a specific department in your organization.

 


The Business View objects window in Veeam ONE Reporter

Using alarms

There are predefined alarms in Veeam ONE for VMware vSphere and vCloud Director, Microsoft Hyper-V, Veeam Cloud Connect, Veeam Agents, and for internal Veeam ONE issues. All of them are designed to alert IT admins when any notable events or issues occur in their environment. With these alarms, you can easily identify, troubleshoot issues and quickly act to keep business operations running.

If they are used properly, alarms can be a critical method to notify you about the performance of your virtual environment. It’s important to know that too many alarms can lead you to ignore them, while too sensitive triggers can lead to false alarms.

The predefined alarms are built on best practices thresholds and trigger when the parameters defined in the alarm are different against collected data from the virtual and backup servers.

 


Alarm details in the Alarm Management tab. You can create custom alarms for any kind of tasks and events

 

When an alarm is triggered, the Veeam ONE console displays details about the root cause of the issue and some ways of resolution. Veeam ONE alarms are customizable and you can edit them to fit your business needs by adding different rules, changing thresholds or assigning them to different objects. You can also choose to send an email to a group when alarm’s severity changes or to suppress an alarm during scheduled activities. Moreover, in the Knowledge base tab you can add custom text to help you with solving the alarm next time it’s triggered.

 


Alarm Settings

Performance and health state monitoring

Veeam ONE enables you to monitor the performance of your VMware vSphere or Microsoft Hyper-V environment through comprehensive charts. In Infrastructure View, you can find information about the latest alarms, CPU, memory and disk resources for different timeframes, as well as network usage details. As you browse in the Infrastructure tree, the Summary tab will display different information for different objects and the rest of the tabs will vary too as you move deeper in the environment.

 


If the parent object is selected, the Infrastructure Summary tab will display the health state overview, including the Host State, Datastores State and the Virtual Machines state.

 

Along the navigation menu, Veeam ONE Monitor also provides details about Alarms (as you saw earlier in this post), as well as very well-organized metrics on resource consumption. Here you can check the VMs and hosts that use the most resources (CPU, memory, network usage and more), but also the hosts with the lowest load. These stats are available for both VMware vSphere and Microsoft Hyper-V environments.

The CPU chart shows the amount of used processor resources on a machine where a backup infrastructure component runs. Graphs in the CPU chart illustrate the level of processor usage for every separate CPU on the machine. The Total graph shows the cumulative processor utilization for all CPUs.

Capacity planning

While Veeam ONE Monitor provides extensive visibility over your IT infrastructure, the Reporter makes it easy for IT administrators to obtain detailed analysis of their virtual infrastructure and helps to take the guesswork out of capacity planning.

In virtual environments, capacity planning is a critical task for housekeeping and allows IT admins to make correct decisions based on accurate forecasts. The first thing we can see in Veeam ONE Reporter is the VMware Capacity Planning dashboard, which includes few widgets that offer a sneak peek into the more detailed reports of the infrastructure.

 


The VMware Capacity Planning dashboards displays details about Hosts and Clusters, Datastores, loss of a host and how many VMs can be added to the infrastructure without having to purchase more resources

 

Now let’s take a look at the capacity planning reports that we have available: Capacity Planning, Host Failure Modelling, How Many More VMs Can be Provisioned and Over-provisioned Datastores.

The reports are based on collected and analyzed historical data and they are very customizable, allowing you to choose individual or all datastores, set limits for CPU and Memory, select timeframe of the analyzed performance data, as well as the period of planning.

 


The Capacity Planning report provides very detailed forecast on my virtual infrastructure

 

At the end of the day, the capacity planning exercise helps you answer some simple questions: Do I have enough resources for more virtual machines? When will I run out of resources? Don’t underestimate these questions, they may save you time and money one day.

Agents monitoring and reporting

Update 3 came with many new features for Veeam Backup & Replication 9.5 and Veeam ONE 9.5, and one of the most highly-anticipated is agent management. Veeam ONE 9.5 now supports agent monitoring and reporting for Veeam Agent for Microsoft Windows and Veeam Agent for Linux, enabling you to have visibility into both your virtual and physical infrastructures.

You can have real-time monitoring and alerting for the Veeam Agent jobs managed by Veeam Backup & Replication servers that you monitor in Veeam ONE. To do so, go to Data Protection view in Veeam ONE Monitor and open the Agent Jobs tab of the desired backup infrastructure node. For each job, you will gain information such as the status of a backup job (Success, Warning, Failed, Running, or jobs with no status), backup job name, type, transferred data and more.

 


Veeam Agent jobs in Veeam ONE Monitor

 

In the Veeam Backup Agents report you can choose to include business groups (defined in Veeam ONE Business View) or Veeam Backup & Replication servers and protection groups. Likewise, you can choose to include in the report either specific Veeam backup agents or backup jobs and policies.

 


Selecting the report’s parameters


In my example, I chose to have a report for Windows-only machines with the RPO (Recovery Point Objective) of 1 week, meaning I will get a list of computers protected weekly. On the second page, you’ll find a detailed list of protected and unprotected computers, including information like IP address, Backup Job/Policy, Last Backup Date and more.

Conclusion

Monitoring your entire IT infrastructure can often be overlooked. This is a mistake that can not only cost your business money, but also its reputation. Minor breaches, due to their complexity, can cause performance issues in virtual and physical environments. However, this can be avoided with a good monitoring tool that alerts you when things are not working as they should. Veeam ONE provides a comprehensive set of alerts and a very user-friendly interface that facilitates visibility, troubleshooting and resolving issues.

See Also

 

The post Watchdog your entire IT environment with Veeam ONE appeared first on Veeam Software Official Blog.

Watchdog your entire IT environment with Veeam ONE