Cohesity DataProtect With Wasabi
    • 17 Jun 2024
    • 5 Minutes to read
    • PDF

    Cohesity DataProtect With Wasabi

    • PDF

    Article summary

    How do I use Cohesity DataProtect with Wasabi?

    Cohesity DataProtect is a high-performance, secure backup and recovery solution. Wasabi is validated to be used as an External Target for Cohesity DataProtect. The procedures in this article detail the steps to add a Wasabi bucket as an External Target. To learn more about the Cohesity + Wasabi solution, please refer to our solution brief.

    1. Prerequisites:

    • An active Wasabi cloud storage account

    • Cohesity DataProtect installed and licensed

    • A VMware vCenter or another hypervisor is added as a source. A source is an object in your organization that you want to protect, such as a VM, physical server, Pure Storage volume, MS SQL Server and NAS. Refer to Register a Hypervisor Source page on Cohesity documentation for details on how to add a source or an asset for data protection. This article provides an example to protect a virtual machine on VMware vCenter which is added as a source.

    Please Note: The data restoration process is handled by your specific backup software application. As there are many potential variables that will affect your unique environment, it is strongly recommended that you seek the guidance of your backup software's technical support team in the event that you encounter difficulty, or have application-specific inquiries.

    2. Architecture Diagram

    Screenshot 2023-09-14 at 1.20.36 PM.png

    3. Create a Wasabi Bucket and Keys

    Follow the steps in this section to create a standard Wasabi bucket. We will later use this bucket to create an External Target on Cohesity to write backups to Wasabi.  

    3.1 Log in to Wasabi Console and click on “Create Bucket” on top right. 

    Picture1.png

    3.2 In the “Create Bucket” window enter a unique bucket name. Select the appropriate region and click "Next". 

    Picture2.png

    3.3 Review create a sub-user with access keys to create access keys for a user to access the Wasabi bucket created above. The following user permissions are required to use the Cohesity cloud services- AbortMultipartUpload, DeleteObject, DeleteObjectVersion, GetBucketLocation, GetBucketObjectLockConfiguration, GetBucketVersioning, GetLifecycleConfiguration, GetObject, GetObjectAttributes, GetObjectVersion, GetObjectVersionAttributes, ListBucket, ListBucketMultipartUploads, ListMultipartUploadParts, PutObject, PutObjectRetention, RestoreObject and ListBucketVersions.

    4. Adding Wasabi as an External Target

    Wasabi can be added as an External Target to be used for archiving or as a Cloud Tier.

    4.1 Log in to your Cohesity System.

    Screenshot 2023-08-30 at 6.44.36 PM.png

    4.2 Select "Infrastructure" and then "External Targets".  Click "Add External Target" on the top right.

    Screenshot 2023-08-31 at 8.59.19 AM.png

    4.3 Check the "Archival" checkbox and select "S3 Compatible" from the dropdown menu.

    This example uses Archival type for External Target. Cohesity has two external Target types-

    • Cloud Archival- Archive's benefits include long term data retention on low cost storage to meet compliance and retention requirements. Cohesity archive automatically copies an existing Snapshot created by Protection Groups located in a Cohesity cluster and stores it on a registered External Target.

    • Cloud Tier- Cohesity Cloud Tier enables an additional storage tier where cold data can be stored. You can enable Cloud Tier to move rarely used and inactive data to the cloud when HDD used capacity exceeds a set threshold.

    Screenshot 2023-09-14 at 10.33.59 PM.png

    4.4 Enter the following details-

    • Bucket Name- Name of the Wasabi bucket created in section 3

    • Access Key ID- Access key for the Wasabi user

    • Secret Access Key- Secret key for the Wasabi user

    • Endpoint- This will very depending on your buckets chosen region

    • Port- 443

    • Region- Region for your Wasabi bucket

    • External Target Name- Name for the external target that is being added.

    • Archival Format- Use the default format "Incremental with Periodic Full". "Incremental Forever" format is not supported by Wasabi.

    Once the above details are added, click "Register" to add the External target.

    Important: This example uses Wasabi's 'us-east-1' storage region. To use other Wasabi storage regions, please use the appropriate Wasabi service URL as described in this article.

    Screenshot 2023-08-31 at 9.45.27 AM.png

    4.5 The newly created External target can be viewed by clicking on "Infrastructure" and then "External Targets".

    Screenshot 2023-09-14 at 10.42.02 PM.png

    5. Create a Protection Policy

    A protection policy is a collection of reusable settings that define how and when sources are protected and archived. Follow the steps below to create a protection policy to archive backups to Wasabi.

    5.1 Click on "Data Protection" and "Policies". Then click on "Create Policy".

    Screenshot 2023-09-14 at 11.58.58 PM.png

    5.2 Input the "Policy Name" and configure the number of days/weeks to run backups and the retention  period as per requirements. Click on "More Options". 

    Screenshot 2023-09-15 at 12.51.44 AM.png

    5.3 Click on "Add Archive" to add the external target pointing to Wasabi as an archive. 

    Screenshot 2023-09-15 at 12.53.11 AM.png

    5.4 Select the Archive target that was created in Section 4 from the pull down list under "Archive to". Configure the retention period. Remove DataLock for Archive by clicking the "-" sign beside the lock period. Then click "Create" to create the protection policy.

    Screenshot 2023-09-15 at 12.54.09 AM.png

    6. Create a Backup

    6.1 Click on "Data Protection", then "Protection" to open the Protection page. Click on "Protect" and then "Virtual Machines". 

    Note: In this example we are protecting Virtual Machines, please refer to Cohesity documentation for protecting other sources.

    Screenshot 2023-09-15 at 1.08.55 AM.png

    6.2 Click "Add Objects" to add the Virtual Machines for protection.

    Screenshot 2023-09-15 at 1.18.56 AM.png

    6.3 Select the Registered Source from the pull down list and add the VMs to be protected by selecting the checkbox next to them. 

    Note: In this example the source VMs are already discovered on Cohesity. Refer to Register a Hypervisor Source page on Cohesity documentation.

    Screenshot 2023-09-15 at 1.21.51 AM.png

    6.4. Input the name of the Protection Group if you want to create one. Then click on "Policy".

    Screenshot 2023-09-15 at 1.27.33 AM.png

    6.5 Select the protection policy created in Section 5 from the pulldown list. Then click "Protect".

    Screenshot 2023-09-15 at 1.28.43 AM.png

    6.6 The Protection will now be added and can be viewed on the Protection page. You can run it manually by clicking on the three dots beside the protection name and clicking "Run Now".

    Screenshot 2023-09-15 at 1.30.29 AM.png

    7. Recovering a VM from a Backup

    This example details steps to recover a VM from a backup. For recovering 

    7.1 Click on "Data Protection" and then "Recoveries" to open the Recoveries page. To start recovery of VMs, click on "Recover", then click "Virtual Machines" and "VMs". To learn about other recovery types please refer to Cohesity documentation.

    Screenshot 2023-09-15 at 1.55.01 AM.png

    7.2 On the Virtual Machines window, search the virtual machine if you know the name or type "*" to list all all VMs that are backed up. Then, select the VM you want to recover by checking the checkbox next to the VM.

    Click "Next: Recover Options" to goto the next window. 

    Screenshot 2023-09-15 at 1.56.50 AM.png

    7.3 Select the Recover to location, recovery method and Existing VM Handling option based on your requirement. Click "Recover" to start the recovery. 

    • Recover to the Original Location—Recover the VM files (such as the VMDK files) to their original datastores and create new instances of the VMs in the original Resource Pool available in the original Source.

    • Recover to a New Location—Recover the VM files (such as the VMDK files) to an alternate datastore and create new instances of the VMs in an alternate Resource Pool of a registered Source.

    Screenshot 2023-09-15 at 2.11.43 AM.png

    7.4 Progress of the recovery can be monitored from the Recoveries page.

    Screenshot 2023-09-15 at 2.21.02 AM.png


    ESC

    Eddy AI, facilitating knowledge discovery through conversational intelligence