Skip to main content
  • Place orders quickly and easily
  • View orders and track your shipping status
  • Enjoy members-only rewards and discounts
  • Create and access a list of your products
  • Manage your Dell EMC sites, products, and product-level contacts using Company Administration.

PowerProtect Data Manager 19.16 Virtual Machine User Guide

Add a VM Direct Engine

Perform the following steps in the Protection Engines window of the PowerProtect Data Manager UI to deploy an external VM Direct Engine, also referred to as a VM proxy. The VM Direct Engine facilitates data movement for virtual machine protection policies, Kubernetes cluster protection policies that require a VM proxy instead of the cProxy, and network attached storage (NAS) protection policies.

Prerequisites

If applicable, complete all of the virtual network configuration tasks before you assign any virtual networks. The PowerProtect Data Manager Administrator Guide provides more information.

About this task

The PowerProtect Data Manager software comes bundled with an embedded VM Direct Engine, which is automatically used as a fallback proxy for performing backups and restores when the added external proxies fail or are disabled. It is recommended that you deploy external proxies by adding a VM Direct Engine for the following reasons:
  • An external VM Direct Engine for VM proxy backup and recovery can provide improved performance and reduce network bandwidth utilization by using source-side deduplication.
  • The embedded VM Direct Engine has limited capacity for backup streams.
  • The embedded VM Direct Engine is not supported for VMware Cloud on AWS operations.

An external VM Direct Engine is not required for virtual machine protection policies that use the Transparent Snapshots Data Mover (TSDM) protection mechanism. For these policies, the embedded VM Direct Engine is sufficient.

NOTE:Cloud-based OVA deployments of PowerProtect Data Manager do not support the configuration of data-traffic routing or VLANs. Those deployments skip the Networks Configuration page.

Steps

  1. From the left navigation pane, select Infrastructure > Protection Engines.
    The Protection Engines window appears.
  2. In the VM Direct Engines pane of the Protection Engines window, click Add.
    The Add Protection Engine wizard displays.
  3. On the Protection Engine Configuration page, complete the required fields, which are marked with an asterisk.
    • Hostname, Gateway, IP Address, Netmask, and Primary DNS—Note that either only IPv4 addresses or only IPv6 addresses are supported.

      Deploy
      protection engines with fully qualified domain names (FQDNs) or IP addresses only. Short names are no longer supported. Existing
      protection engines which were deployed with short names are deprecated. Subsequent releases might require you to delete and redeploy these
      protection engine with FQDNs or IP addresses instead. When you deploy
      protection engines with FQDNs, each FQDN must have a DNS record.
        

    • vCenter to Deploy—If you have added multiple vCenter server instances, select the vCenter server to which to deploy the protection engine.
      NOTE:Ensure that you do not select the internal vCenter server.
    • ESX Host/Cluster—Select to which ESXI host or cluster you want to deploy the protection engine.
    • Network—Displays all the networks that are available under the selected ESXi host or cluster. For virtual networks (VLANs), this network carries Management traffic.
    • Data Store—Displays all datastores that are accessible to the selected ESXi host or cluster based on ranking (whether the datastores are shared or local), and available capacity (the datastore with the most capacity appearing at the top of the list).

      You can choose the specific datastore on which the protection engine resides, or leave the default selection of <automatic> to allow PowerProtect Data Manager to determine the best location to host the protection engine.

    • Transport Mode—For virtual machine protection, select Hot Add. For Kubernetes namespace and PVC protection, select Hot Add, Fallback to Network Block Device or Network Block Device.
    • Supported Protection Type—Select whether this protection engine is intended for Virtual Machine, Kubernetes Tanzu guest cluster, or NAS asset protection.
  4. Click Next.
  5. On the Networks Configuration page:
    If this is a cloud-based OVA deployment of PowerProtect Data Manager, click Next and proceed to step 7.
    The Networks Configuration page configures the virtual network (VLAN) to use for Data traffic. To continue without virtual network configuration, leave the Preferred Network Portgroup selection blank and then click Next.
    1. From the Preferred Network Portgroup list, select a VST (Virtual Switch Tagging) or VGT (Virtual Guest Tagging) network.
      If you select a VGT portgroup, the list displays all virtual networks within the trunk range. If you select a VST portgroup, the list displays only the virtual network for the current VLAN ID.
    2. Select one or more virtual networks from the list.
      A protection engine requires an IP address from the static IP pool for each selected virtual network. If there are not enough IP addresses in a pool, the wizard prompts you to supply additional addresses for that network.

      Ensure that the selected virtual networks support a traffic type that is compatible with
      protection engines. The
      PowerProtect Data Manager Administrator Guide provides more information about traffic types.
        

    3. If required, type an available static IP address or IP address range in the Additional IP Addresses column for the indicated virtual network.

      For convenience when working with multiple virtual networks, you can also use one of the
      Auto Expand options:
        

      • Expand Last IP—The wizard increments the host portion of the last IP address in the static IP pool. Click Apply.
      • Same Last Digit—The wizard adds the network portion of the IP address to the specified value. Type the host portion of the IP address and then click Apply.

      The wizard updates the value in the
      Additional IP addresses column for each selected network. Verify the proposed IP addresses.
        

    4. Click Next.
  6. When adding a VM Direct Engine for Kubernetes guest cluster protection, add a second network interface card (NIC) if the PowerProtect controller pod running in the guest cluster cannot reach the VM Direct Engine on the primary network. Provide information for the second NIC, and then click Next.
  7. On the Summary page, review the information and then click Finish.
    The protection engine is added to the VM Direct Engines pane. An additional column indicates the engine purpose. Note that it can take several minutes to register the new protection engine in PowerProtect Data Manager. The protection engine also appears in the vSphere Client.

Results

When an external VM Direct Engine is deployed and registered, PowerProtect Data Manager uses this engine instead of the embedded VM Direct Engine for any data protection operations that involve virtual machine protection policies. If every external VM Direct Engine is unavailable, PowerProtect Data Manager uses the embedded VM Direct Engine as a fallback to perform limited scale backups and restores. If you do not want to use the external VM Direct Engine, you can disable this engine. Additional VM Direct actions provides more information.

NOTE:The external VM Direct Engine is always required for VMware Cloud on AWS operations, Kubernetes cluster protection policies that require a VM proxy instead of the cProxy, and NAS protection policies. If no external VM Direct Engine is available for these solutions, data protection operations fail.

Next steps

If the protection engine deployment fails, review the network configuration of PowerProtect Data Manager in the System Settings window to correct any inconsistencies in network properties. After successfully completing the network reconfiguration, delete the failed protection engine and then add the protection engine in the Protection Engines window.

When configuring the VM Direct Engine in a VMware Cloud on AWS environment, if you deploy the VM Direct Engine to the root of the cluster instead of inside the Compute-ResourcePool, you must move the VM Direct Engine inside the Compute-ResourcePool.


Rate this content

Accurate
Useful
Easy to understand
Was this article helpful?
0/3000 characters
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please provide ratings (1-5 stars).
  Please select whether the article was helpful or not.
  Comments cannot contain these special characters: <>()\