vProtect supports Catalogic vStor Server and integrates with it with extended File System Backup Destination logic.
You can use Catalogic volumes like any other file system (mount a single volume over NFS) or you can use the scripts provided to automatically create and replicate volumes whenever vStor volume is being accessed. This documentation describes a setup with 2 vStor servers and 1-volume-per-VM approach (with optional replication).
vProtect accesses vStor Servers using SSH public key authentication - first generate the key:
[root@vProtectbuild ~]# sudo -u vprotect ssh-keygen
Generating public/private rsa key pair.
Enter file in which to save the key (/opt/vprotect/.ssh/id_rsa):
Created directory '/opt/vprotect/.ssh'.
Enter passphrase (empty for no passphrase):
Enter same passphrase again:
Your identification has been saved in /opt/vprotect/.ssh/id_rsa.
Your public key has been saved in /opt/vprotect/.ssh/id_rsa.pub.
The key fingerprint is:
SHA256:xeceRtL4kq3zzQrUQH/K5SbiT/nv9QvAtBEfOxeT5us vprotect@vProtectbuild.lab.local
The key's randomart image is:
+---[RSA 2048]----+
| .. . o.|
| o +o ooo|
| *o=+=. |
| .o%o=o. |
| S =+@ o .|
| o *.= . |
| = +.. .|
| * +.Eo|
| +.++=|
+----[SHA256]-----+
Add the VM fingerprint to the SSH known_hosts on the node for the primary (and optionally secondary) vStor Server:
It must be a known_hosts file that belongs to the vprotect user
[root@vProtectbuild ~]# sudo -u vprotect ssh -o HostKeyAlgorithms=ssh-rsa root@10.10.10.1
The authenticity of host '10.10.10.1 (10.10.10.1)' can't be established.
RSA key fingerprint is SHA256:65M/6jNBXJTFqti/798STSFeZigRzHMivDNl0t95FNI.
RSA key fingerprint is MD5:cc:91:7d:17:8e:21:68:19:4b:c9:e4:76:bd:f5:4d:fc.
Are you sure you want to continue connecting (yes/no)? yes
Warning: Permanently added '10.10.10.1' (RSA) to the list of known hosts.
Copy the key to each vStor Server:
[root@vProtectbuild ~]# sudo -u vprotect ssh-copy-id root@10.10.10.1
/bin/ssh-copy-id: INFO: Source of key(s) to be installed: "/opt/vprotect/.ssh/id_rsa.pub"
/bin/ssh-copy-id: INFO: attempting to log in with the new key(s), to filter out any that are already installed
/bin/ssh-copy-id: INFO: 1 key(s) remain to be installed -- if you are prompted now it is to install the new keys
root@10.10.10.1's password:
_
Number of key(s) added: 1
_
Now try logging into the machine, with: "ssh 'root@10.10.10.1'"
and check to make sure that only the key(s) you wanted were added.
Open the "BACKUP DESTINATIONS" section on the left menu.
Create a new Catalogic vStor Server Backup Destination (choose from the top right drop-down menu).
Fill in the template with your information.
FIRST_VS_HOST - your primary vStor Server IP/hostname
SECOND_VS_HOST - optional, secondary vStor Server IP/hostname, where the data will be replicated to
VS_PARTNER_ID - optional, secondary vStor partner ID - you can get this ID by running this command on the vStor Server shell:
[root@localhost ~]# vstor partner show
ID | MGMT ADDRESS | API PORT | SSH PORT
55cd380b7dc848bbb439bfd444bc1799 | 10.10.10.2 | 8900 | 22
If a secondary server is not provided, vProtect will assume that no replication is needed.
Initiate backup to test it the scripts have been executed correctly - in the vprotect_daemon.log files you should be able to see messages like this:
2018-05-04 15:31:39.133 INFO
[0f2b9705-61a1-44d5-876f-ac81985c4a94] Executing pre/post store command...