
PowerProtect Data Manager 19.14 SAP HANA User Guide
PowerProtect Data Manager new deployment overview
Familiarize yourself with the high-level steps required to deploy PowerProtect Data Manager with the application agent.
Steps
-
Design how to group the backups, based on the storage requirements and retention policies.
The account team can help with backup storage design.
-
Install
PowerProtect DD Management Center.
PowerProtect Data Manager uses PowerProtect DD Management Center to connect to the DD systems. The DD Management Center Installation and Administration Guide provides instructions.
NOTE:PowerProtect DD Management Center is required with a DDOS version earlier than 6.1.2. With DDOS version 6.1.2 or later, you can add and use a DD system directly without PowerProtect DD Management Center. -
Deploy
PowerProtect Data Manager from the download file.
The PowerProtect Data Manager Deployment Guide provides instructions.
-
Add external DD systems or
PowerProtect DD Management Center to
PowerProtect Data Manager.
The PowerProtect Data Manager Administrator Guide provides instructions on how to add protection storage.
-
Install the application agent on the appropriate hosts and connect them to
PowerProtect Data Manager according to the instructions in the next chapter.
DBAs should perform this operation.
NOTE:After you create a centralized protection job, the first backup is a full backup. -
Add new or approve pending agent requests in the
PowerProtect Data Manager according to the instructions in the next chapter.
-
Add a protection policy for groups of assets that you want to back up.
The PowerProtect Data Manager Administrator Guide provides instructions.Configuration is complete.
-
Perform a full backup so that
PowerProtect Data Manager can detect the proper backup chain.
Without a full backup, PowerProtect Data Manager treats the backups as partial and assumes that you are out of compliance. DBAs create backups and PowerProtect Data Manager creates a catalog of the backups, monitoring the catalog for retention policy compliance, and, if configured, managing the life cycle of the backups.
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please provide ratings (1-5 stars).
Please select whether the article was helpful or not.
Comments cannot contain these special characters: <>()\