Veritas CloudPoint Administrator's Guide
- Getting started with CloudPoint
- Section I. Installing and configuring CloudPoint
- Preparing for installation
- About the deployment approach
- Deciding where to run CloudPoint
- Meeting system requirements
- CloudPoint host sizing recommendations
- Creating an instance or preparing the physical host to install CloudPoint
- Installing Docker
- Creating and mounting a volume to store CloudPoint data
- Verifying that specific ports are open on the instance or physical host
- Deploying CloudPoint
- Deploying CloudPoint in the AWS cloud
- Using plug-ins to discover assets
- Configuring off-host plug-ins
- AWS plug-in configuration notes
- Google Cloud Platform plug-in configuration notes
- Microsoft Azure plug-in configuration notes
- Dell EMC Unity array plug-in configuration notes
- Pure Storage FlashArray plug-in configuration notes
- HPE RMC plug-in configuration notes
- NetApp plug-in configuration notes
- Hitachi plug-in configuration notes
- InfiniBox plug-in configuration notes
- Configuring an off-host plug-in
- About CloudPoint plug-ins and assets discovery
- Configuring the on-host agents and plug-ins
- About agents
- Oracle plug-in configuration notes
- MongoDB plug-in configuration notes
- Microsoft SQL plug-in configuration notes
- About the installation and configuration process
- Preparing to install the Linux-based on-host agent
- Preparing to install the Windows-based on-host agent
- Downloading and installing the on-host agent
- Configuring the Linux-based on-host agent
- Configuring the Windows-based on-host agent
- Configuring the on-host plug-in
- Configuring VSS to store shadow copies on the originating drive
- Protecting assets with CloudPoint's agentless feature
- Preparing for installation
- Section II. Configuring users
- Section III. Protecting and managing data
- User interface basics
- Indexing and classifying your assets
- Protecting your assets with policies
- Tag-based asset protection
- Replicating snapshots for added protection
- About snapshot replication
- About cross-account snapshot replication in the AWS cloud
- Requirements for replicating snapshots
- Cross-account snapshot replication support matrix
- Cross-account snapshot replication limitations
- Configuring replication rules
- Editing a replication rule
- Deleting a replication rule
- Managing your assets
- Creating a snapshot manually
- Displaying asset snapshots
- Replicating a snapshot manually
- About snapshot restore
- About single file restore (granular restore)
- Single file restore requirements and limitations
- Restoring a snapshot
- Additional steps required after restoring disk-level snapshots
- Additional steps required after a SQL Server snapshot restore
- Additional steps required after an Oracle snapshot restore
- Additional steps required after a MongoDB snapshot restore
- Additional steps required after restoring an AWS RDS database instance
- Restoring individual files within a snapshot
- Deleting a snapshot
- Monitoring activities with notifications and the job log
- Protection and disaster recovery
- Section IV. Maintaining CloudPoint
- CloudPoint logging
- Troubleshooting CloudPoint
- Restarting CloudPoint
- Docker may fail to start due to a lack of space
- CloudPoint installation fails if rootfs is not mounted in a shared mode
- Some CloudPoint features do not appear in the user interface
- Off-host plug-in deletion does not automatically remove file system and application assets
- Disk-level snapshot restore fails if the original disk is detached from the instance
- Snapshot restore for encrypted AWS assets may fail
- Error while adding users to CloudPoint
- CloudPoint fails to revert restored snapshots if indexing, classification, or restore operations fail
- SQL snapshot or restore and SFR operations fail if the Windows instance loses connectivity with the CloudPoint host
- Troubleshooting CloudPoint logging
- Swagger UI-based authorization for CloudPoint REST API calls may fail
- Policy retention count is not honored for file system and application assets if there is an issue with the CloudPoint plug-in
- Working with your CloudPoint license
- Managing CloudPoint agents and plug-ins
- Upgrading CloudPoint
- Uninstalling CloudPoint
- Section V. Reference
How to use tag-based asset protection feature
Using the tag-based asset protection feature involves the following steps:
Table: Using tag-based asset protection
Step # | Action |
|---|---|
Step 1 - Create protection policies | Create one or more CloudPoint protection policies with the desired snapshot and replication settings and a policy schedule. Ensure that you create the appropriate host or disk-level policy depending on the type of asset that you wish to protect. Make a note of the policy names. You are going to use the policy names in the tags that you create and assign to the assets. See About policies. |
Step 2 - Add tags to the assets | Using the cloud vendor management tools, add tags to the assets that you wish to protect using the configured CloudPoint policies. The tags must be defined as a "veritas-protection-policy":"<policyname>" Here,
For example, if the name of the policy is "veritas-protection-policy":"Policy1" Note: The key name and the value are not case sensitive. If you want to associate multiple protection policies to the same asset, you can specify all the policies within a single tag. This is the most critical step in the process. If the assets are not tagged correctly, the feature will not work. |
| |
Step 3 - Configure the CloudPoint plug-in | Configure the CloudPoint plug-in for the desired cloud environment (AWS, GCP, or Azure). See About plug-ins. When you configure the plug-in, CloudPoint immediately begins discovering the assets in that cloud and starts scanning the tags associated with the discovered assets. If an asset tag matches an existing CloudPoint policy name, CloudPoint automatically starts protecting that asset through the matching protection policy as per the policy schedule. If the asset tag does not match with any existing policy name, a notification is generated informing that the policy does not exist. However, if a policy by that name is created later, CloudPoint automatically starts protecting that asset through the matching policy as per the policy schedule. |
The order of the tasks mentioned in the table does not matter. You do not need to perform these tasks in a sequential manner. All that is required is that you create the CloudPoint policy and ensure that the corresponding tag is associated with the asset that you wish to protect.
For example, you can add tags to the assets even before you install and configure CloudPoint. Once you have installed CloudPoint and configured the plug-in, you can create the requisite protection policies. During the discovery cycle, CloudPoint checks the asset tags and automatically starts protecting the asset through the matching policy as per the policy schedule.
Similarly, if you have already deployed CloudPoint, you can add appropriate tags to new assets that are not yet discovered by CloudPoint. During the discovery cycle, CloudPoint scans all the assets and their tags and automatically starts protecting those assets through a matching policy.