Click on a link below to go to a specific section of the software installation:
Install Requirements |
|||
For VMware, the Virtual Server
iDataAgent is installed on a proxy computer that can communicate with
the VMware host computer. This proxy computer is
referred to as the Client computer in this install procedure. For Microsoft Windows Virtual Server and Microsoft Windows 2008 Hyper-V, the Virtual Server iDataAgent is installed directly onto the Microsoft Windows Virtual Server/Microsoft Windows 2008 Hyper-V host computer. This computer is referred to as the Client computer in this install procedure. Each node in the cluster must have both the Windows File System iDataAgent and Virtual Server iDataAgent installed.
Note that to backup virtual machines in Hyper-V Cluster environment, install Virtual Server iDataAgent only on the physical nodes of the cluster. For an overview of deploying the software components in a clustered environment, see Clustering Support. Verify that all of the computers to which software will be installed satisfy the minimum requirements specified in System Requirements - Virtual Server iDataAgent for a cluster. The following procedure describes the steps involved in installing the Virtual Server iDataAgent. If you choose to install additional components simultaneously, refer to the appropriate procedures for installation requirements and steps specific to the component. Note that when you install multiple components, the sequence of the install steps may vary. Review the following Install Requirements before installing the software: General
Firewall
Cluster
Multi Instancing
|
|||
Install Checklist |
|||
Collect the following information before installing the software. Use the space provided to record the information, and retain this information in your Disaster Recovery binder. | |||
1. |
Name of the disk group in which the virtual server resides ____________________________________
See Cluster Selection for more information. |
||
2. |
Install folder location:________________________________________________________________
See Select Components for Installation for more information. |
||
3. |
If the CommServe Server and the client computer communicate across a firewall:
Firewall ports: ______________________________________________________________________ Hostnames and/or IP Addresses and corresponding GxCVD port numbers of computers on the other side of the firewall:______________ Keep Alive Interval minutes:____________________________________________________________ Hostname for outgoing tunnel connections:_________________________________________________ Tunnel Initialization Interval seconds:_____________________________________________________ See Firewall Configuration for more information. |
||
4. |
CommServe Host Name or the CommServe IP address:______________________________________
See Configuration of Other Installation Options for more information. |
||
5. |
Client computer's Host name (NetBIOS name) or IP address____________________________________
See Configuration of Other Installation Options for more information. |
||
6. |
Job result folder location:________________________________________________________________
If necessary, Name and Password for the specified folder:_______________________________________ See Configuration of Other Installation Options for more information. |
||
7. |
Storage Policy used by the default subclient:________________________________________________
See Storage Policy Selection for more information. |
||
8. |
Client Group to which this Client will be associated:_____________________________________________
See Client Group Selection for more information. |
||
9. |
Time and frequency for Install of Automatic Updates:_________________________________________
See Schedule Automatic Update for more information. |
||
Before You Begin |
|||
|
Install Procedure |
||
Getting Started |
||
1. |
Place the software
installation disc for the Windows platform into the disc drive.
After a few seconds, the installation program is launched. If the installation program does not launch automatically:
NOTES
|
|
2. | In this screen, you choose the language you want to use during installation. Click the down arrow, select the desired language from the pull-down list, and click Next to continue. | |
3. |
Select the option to install software. NOTES
|
|
4. |
Select the option to install software on this computer. NOTES
|
|
5. |
Read the Welcome screen.
Click Next to continue, if no other applications are running. |
|
6. |
Read the virus scanning software warning.
Click OK to continue, if virus scanning software is disabled. |
|
7. |
Read the license agreement, then select I accept the terms
in the license agreement. Click Next to continue. |
|
Cluster Selection |
||
8. |
Select Configure a Virtual Server. Click Next to continue. NOTES:
|
![]() |
9. |
Select the disk group in which the virtual server resides. Click Next to continue. |
![]() |
Select Components for Installation |
10. |
Select the component(s) to install. NOTES
Click Next to continue. To install the Virtual Server iDataAgent, expand the Client Modules folder and the iDataAgent folder and select the appropriate iDataAgent for your operating system. |
![]() |
||
11. |
Specify the location where you want to install the software. NOTES
Click Browse to change directories. Click Next to continue. |
![]() |
||
![]() |
Proprietary disk resources will not appear in the browse window. To install
to a proprietary disk resource, manually enter the path. After installing to a proprietary disk resource, the error message CVD failed to set dependency may be generated. To set the dependency, open the Cluster Administrator and select the CVD that has just been installed. Click on the Properties Dependencies tab, and click Modify. Select the proprietary disk resource and click OK. Do not select the same destination drive in which the MSCS resides. |
|||
Firewall Configuration |
||||
12. |
Select from the following:
NOTES
|
![]() |
||
13. |
Click the Specify list of machine across the firewall option and then
specify the list of hosts separated from this computer by a firewall. Make sure
you correctly describe whether the firewall allows two-way communication (but on
a limited range of ports), or one-way communication (with either only remote
host being able to make connections to this computer, or vice versa).
For all one-way firewalls allowing incoming connections and those one-way firewalls allowing outgoing connections without additional port filtering, skip this step. Click Next to continue. NOTES
|
![]() |
||
14. |
Click the Specify list of restricted open ports option and then
specify the port range. Add the starting and ending port range and then click
Add to place it in the Open Port List. Repeat as needed.
If firewall separating this computer from others allows incoming connections, but these connections can be made only on a limited set of ports, then configure the appropriate port range here. For all other scenarios, skip this step. Note that if you do not specify hostname(s) as well as port number(s), then the firewall services will not be configured. NOTES
Click Next to continue. |
![]() |
||
15. |
If desired, modify the Keep Alive interval.
Click Next to continue. |
![]() |
||
16. |
Optionally, select Advanced Firewall Configuration and specify a local
host name interface to use for outgoing tunnel connections through
the firewall. Otherwise, the interface and port is automatically selected for
you by the OS. Click Next to continue. |
![]() |
||
17. |
If desired, modify the Tunnel Initialization interval.
Click Next to continue. |
![]() |
||
|
||||
Configuration of Other Installation Options |
||||
18. |
Enter the fully qualified domain name of the CommServe computer. (TCP/IP network
name. e.g., computer.company.com)
NOTES
Click Next to continue. |
![]() |
||
19. |
Enter the username and password information for an external
domain user account or a CommCell user account. This authorizes the installation
of an agent on the CommCell.
NOTES
Click Next to continue. |
![]() |
||
20. |
Enter the following:
NOTES
Click Next to continue. |
![]() |
||
21. |
Specify the following and click Next to continue:
NOTES
|
![]() |
||
Storage Policy Selection |
||||
22. |
Select the storage policy through which you want to back up/archive the
indicated component (subclient, instance, etc.)
NOTES
Click Next to continue. |
![]() |
||
Client Group Selection |
||||
23. |
Select a Client Group from the list. Click Next to continue. NOTES
|
![]() |
||
24. |
Select Download Pack(s) and Install to download and install the latest service packs and post packs from the software provider. NOTES
Click Next to continue. |
![]() |
||
Verify Summary of Install Options |
||||
25. |
Verify the summary of selected options.
NOTES
Click Next to continue or Back to change any of the options. The install program now starts copying the software to the computer. This step may take several minutes to complete. |
![]() |
||
26. |
The System Reboot message may be displayed. If so, select one of the following:
|
![]() |
||
Schedule Automatic Update |
||||
27. |
If necessary, select this option to schedule an automatic installation of software
updates.
NOTES
Click Next to continue. |
![]() |
||
Install Remaining Cluster Nodes |
||||
28. |
To install/upgrade the software on the remaining nodes of the cluster, click Yes. To complete the install for this node only, click No. |
![]() |
||
29. |
Select cluster nodes from the Preferred Nodes list and click the arrow
button to move them to the Selected Nodes list.
NOTES
When you have completed your selections, click Next to continue. |
![]() |
||
30. |
Type the User Name and Password for the Domain Administrator
account, so that the installer can perform the remote install/upgrade of the cluster
nodes you selected in the previous step.
Click Next to continue. |
![]() |
||
31. |
The progress of the remote install for the cluster nodes is displayed; the
install can be
interrupted if necessary.
Click Stop to prevent installation to any nodes after the current ones complete. Click Advanced Settings to specify any of the following:
NOTES
|
![]() |
||
32. |
Read the summary for remote installation to verify that all selected nodes were installed
successfully.
NOTES
Click Next to continue. |
![]() |
||
Setup Complete |
||||
33. |
Click Next to continue.
NOTES
|
![]() |
||
34. |
Setup displays the successfully installed components.
If any passive nodes were not available for installation, they will be listed in this screen. In a such a situation, you must manually install the passive node. (See Manually Installing the Software on a Passive Node for step-by-step instructions.) NOTES
Click Finish to close the install program. The installation is now complete. |
![]() |
||
35. |
Note that the following will automatically be filtered:
NOTES
|
|||
Post-Install Considerations |
||||
General
The software provides many more features that you will find useful. See the Index for a complete list of supported features. Agent Specific
Cluster
|