12

My first backups with Veeam Backup for Google Cloud Platform

 3 years ago
source link: https://www.virtualtothecore.com/my-first-backups-with-veeam-backup-for-google-cloud-platform/
Go to the source link to view the article. You can view the picture content, updated content and better typesetting reading experience. If the link is broken, please click the button below to view the snapshot at that time.
neoserver,ios ssh client

My first backups with Veeam Backup for Google Cloud Platform

Twitter 0 Tweet Facebook 0 LinkedIn 0 Email -- Email to a friend 0 Flares

In yesterday’s article we have installed and configured Veeam Backup for Google Cloud Platform. In this article, we will run the first backup and restore operations.

Adding components

My GCP lab is totally new, and thus it has no workloads. So, even before configuring the needed components from the Veeam point of view, we need to have at least one virtual machine to be protected.

To make things easier, I’ve created a quick script that we can run directly into the web-based shell after it has been uploaded. This script creates two tiny virtual machines in out GCP project.

01# Create two tiny VM's for my Veeam Backup For GCP lab
02 
03resources:
04- name: tinyvm-1
05type: compute.v1.instance
06properties:
07zone: europe-west1-b
09disks:
10- deviceName: bootdisk
11type: PERSISTENT
12boot: true
13autoDelete: true
14initializeParams:
16networkInterfaces:
18accessConfigs:
19- name: External NAT
20type: ONE_TO_ONE_NAT
21 
22- name: tinyvm-2
23type: compute.v1.instance
24properties:
25zone: europe-west1-b
27disks:
28- deviceName: bootdisk
29type: PERSISTENT
30boot: true
31autoDelete: true
32initializeParams:
34networkInterfaces:
36accessConfigs:
37- name: External NAT
38type: ONE_TO_ONE_NAT

NOTE: replace “yourprojectnamehere” with the ID of the GCP project where you want to deploy the VM’s.

We can then run this script in the Cloud shell:

gcloud deployment-manager deployments create tiny-vms --config two-gcp-vms.yaml

120aa977ef734fbf4e338e8dd1501512.png

The two new virtual machines are quickly created, in the same subnet where our Veeam machine was already deployed.

Reconfigure networking

One of the requirements in Veeam Backup for GCP to correctly operate is to have the networks where the workers are deployed with Private Google Access enabled. To do this, we run these command:

gcloud compute networks subnets update default --region=europe-west1 --enable-private-ip-google-access

We get the “updated” message in return, and we can move to the next steps.

Create a storage bucket

Veeam Backup for GCP can do both native VM snapshots and regular backups. The latter are stored in a GCP storage bucket, so we need at least one of them as the target of our backups.

We leverage again the cloud shell to quickly create one:

gsutil mb -c standard -l europe-west1 gs://veeamgcp-backup

Configure Veeam Backup

We can now go back into the Veeam console, and configure the missing components. We start with deploying at least one worker in the same region where our VM’s are. To do so, we go into the configuration section and we add a worker, and its parameters will be like these:

82365c6a910ae2bd0be0d03fab44bfd6.png

We can see in the summary that there’s a nice verification step, so we are sure that we did all the configurations correctly before applying them.

Note: the firewall rule can be anything that allows https over port 443.

We now need one repository to store our backups.  We are going to use the bucket we created before. In the wizard, we select again our project, we create the credentials to access the bucket and copy them somewhere safe, we choose if we want to enable encryption, and we complete the wizard:

89d317da6798d0bb3545d9fbbdc10c2e.png

Backup policy

It’s finally time to create our first backup policy.

To do so, we go and add our first policy. As usual, we give it a name, and we then select the sources, that are “what we want to protect”. Our only project is already selected, we then select the region(s) we want to protect, and the specific VM’s:

5eae559c87f51774436b70c868c7cdef.png

We can also choose “all resources” so that every new VM that we be added will be also automatically protected.

In the target, we select our repository that we created before, and we move to scheduling. Here we can configure any combination that we want.

A very nice feature is the cost estimator:

0d9c0ea05fa2ca5574e18fff3358fb95.png

the estimator is telling us what are the expected costs of the policy we are creating, BEFORE applying it. In this way, we can plan for our budget without any bad surprise at the end of the month.

First execution and fine tuning

After the policy has been saved, we immediately run it manually to test it. After a few seconds, the policy fails, and when checking it, we see the error is in the backup portion:

87a7bf7c606292a8add12c56614315a8.png

By clicking on the “Failed” link, we see the details of the execution, and once again we can appreciate how accurate and “self-explaining” are the error messages from GCP. The Cloud Pub/Sub API has never been used in our project, and we need to enable it. GCP , again, gives us the direct link to do it.

Once we have executed the policy again, we can finally see our protected data:

235928918a4acdcf49b9a6b930972ba9.png

The two restore points for each VM are the native snapshot and the backup:

ee4c656c01c9995d008f17456bb9b88e.png

Our VM’s are fully protected now!


About Joyk


Aggregate valuable and interesting links.
Joyk means Joy of geeK