@DXWorldExpo Authors: Elizabeth White, Pat Romanski, Yeshim Deniz, Liz McMillan, William Schmarzo

Related Topics: @CloudExpo, Microservices Expo, Containers Expo Blog, Agile Computing, Cloud Security, @DXWorldExpo

@CloudExpo: Blog Post

NAS Cloud Backup: How It's Done

Basic steps for setting up NAS cloud backup (and recoveries)

Author: Nick Mueller, Zetta.net

Having Network Attached Storage (NAS) can be a lot simpler than backing up a large number of individual user machines, however, the rules for NAS cloud backup may be different then you're used to. Each NAS vendor has its own particular steps to follow. Here is how to back up NetApp devices with Zetta DataProtect. If you need to back up another type of NAS, contact Zetta.net.

NetApp Backup Basics
Zetta's NetApp backup works by reading a user generated configuration file which defines the data sources to back up and the appropriate login credentials to gain access to these data sources.

When the config file is read by Zetta, network mounts will be created to the defined data sources and the ZettaMirror agent triggers a snapshot on the NetApp appliance which is used to capture a consistent state of the NetApp file system and replicate the targeted data to the Zetta cloud. The ZettaMirror agent walks the directory tree, finds files that have changed and transmits the delta to Zetta. Once the transfer of data is complete, Zetta creates a snapshot of the file system on the Zetta storage end, deletes the NetApp snapshot and disconnects.

Install the ZettaMirror agent on a system running one of the many versions of Windows, Linux or OSX that the agents run on. This ZettaMirror Host will act as the gateway to the NetApp box and should have connectivity to both the NetApp filer and the Internet.

# Zetta Mirror NetApp Server configuration
# Server: The name or the IP address of the server in IPv4 or IPv6 format server:
# HTTPS: set to 1 if HTTPS is to be used, 0 otherwise use_https: 1
# Port: Port Number, leave in blank if default value is to be used
# User and Password for NetApp API authentication: leave in blank if Hosts Equiv auth style is to be used
# Note: netapp filer should be configured to use hosts equiv auth style if username and password are omitted
# NetApp sources to backup.
# Configure excludes using exclude_files, exclude_paths, exclude_directories, exclude_errors.
# Value must be enclosed by double-quote. Separate multiple entries by comma or semi-colon. For example: exclude_files: "*.tmp, *.log"
# Configure minimum/maximum file age excludes using min_age, max_age. Value should be in format of YYYYMMDD for date or between 0 and 1899 for a number of days
# Configure minimun/maximum file size excludes using min_size, max_size
# For Linux only, target directory which netapp source is to be mounted, please make sure this is an existing directory

If the ZettaMirror host is a Windows system, the agent will create a network mount using an available drive letter.

After creating and saving the config file, be sure to edit the file security settings to lock file permissions. In Windows, set the ZettaMirror service to run as a specific user by right clicking on the ZettaMirror GUI in the system tray>Local Settings>This Account or the backup will not function.

The local system must be setup to interact with the cloud backup systems. Log into the ZettaMirror Service Management Portal (https://admin.zetta.net), select Advanced>NetApp Settings, enter the path to the configuration file and click Save. The final step is to add a data source to the sync, even a temp folder, or the plug-in will not run.

The NetApp GUI or the NetApp Command Line Interface must be used to create a CIFS share so ZettaMirror can access the data.

Recovering the Data
Different protocols are used for recovering the data depending on if it is traditional file data or LUN data using SAN protocols. Files are recovered by logging into the ZettaMirror Service Management Portal, navigating to the host system's recovery page, clicking on the recovery tab and then the URL for the data set. One can then navigate to the directory and right-click on the item to recover or download it.

Block-level LUN recovery is performed by downloading the backup, creating a duplicate LUN on the NetApp, mounting the LUN with iSCSI and using dd to copy the contents from the backup into the new LUN.

Want More Information?
Above are the basic steps for setting up NAS cloud backup (and recoveries). Further information, including details on how to fill out the configuration text, setting up security, enabling NFS and backing up on Linux, and backing up block-based LUNs, see the NetApp cloud backup page.

Nick is Zetta's Chief Content Officer, and has been working with writing and social media teams to create digital content since the days when the BBS reigned.

More Stories By Derek Kol

Derek Kol is a technology specialist focused on SMB and enterprise IT innovations.

DXWorldEXPO Digital Transformation Stories
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
Intel is an American multinational corporation and technology company headquartered in Santa Clara, California, in the Silicon Valley. It is the world's second largest and second highest valued semiconductor chip maker based on revenue after being overtaken by Samsung, and is the inventor of the x86 series of microprocessors, the processors found in most personal computers (PCs). Intel supplies processors for computer system manufacturers such as Apple, Lenovo, HP, and Dell. Intel also manufactu...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
OpsRamp is an enterprise IT operation platform provided by US-based OpsRamp, Inc. It provides SaaS services through support for increasingly complex cloud and hybrid computing environments from system operation to service management. The OpsRamp platform is a SaaS-based, multi-tenant solution that enables enterprise IT organizations and cloud service providers like JBS the flexibility and control they need to manage and monitor today's hybrid, multi-cloud infrastructure, applications, and wor...
Apptio fuels digital business transformation. Technology leaders use Apptio's machine learning to analyze and plan their technology spend so they can invest in products that increase the speed of business and deliver innovation. With Apptio, they translate raw costs, utilization, and billing data into business-centric views that help their organization optimize spending, plan strategically, and drive digital strategy that funds growth of the business. Technology leaders can gather instant recomm...
The Master of Science in Artificial Intelligence (MSAI) provides a comprehensive framework of theory and practice in the emerging field of AI. The program delivers the foundational knowledge needed to explore both key contextual areas and complex technical applications of AI systems. Curriculum incorporates elements of data science, robotics, and machine learning-enabling you to pursue a holistic and interdisciplinary course of study while preparing for a position in AI research, operations, ...
After years of investments and acquisitions, CloudBlue was created with the goal of building the world's only hyperscale digital platform with an increasingly infinite ecosystem and proven go-to-market services. The result? An unmatched platform that helps customers streamline cloud operations, save time and money, and revolutionize their businesses overnight. Today, the platform operates in more than 45 countries and powers more than 200 of the world's largest cloud marketplaces, managing mo...
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...