IBM Cloud Docs
Cyber recovery with Dell

Cyber recovery with Dell

A VMware Cloud Foundation for Classic - Automated instance can host a Dell® Cyber Recovery vault.

The Dell Cyber Recovery vault maintains your mission-critical business data and technology configurations in a secure, air-gapped vault environment that can be used for recovery and analysis.

The IBM Cloud® solution is based on the Dell PowerProtect DataDomain Virtual Edition (DDVE) storage appliance that is hosted on a vCenter Server instance. The DDVE stores the replicated data from a production DataDomain (DD) system. The data on the DDVE can be recovered back to the production DD system when needed. The production DD system can be on-premises or deployed in IBM Cloud or another cloud provider.

The DDVE in the Cyber Recovery vault is air-gapped from the network most of the time and is only connected when the Cyber Recovery software triggers replication from the production DD system to the DDVE in the Cyber Recovery vault.

Multiple production PowerProtect DD systems can replicate data to multiple DDVE appliances in the Cyber Recovery vault.

You can also deploy the Index Engines™ CyberSense® appliance to validate and analyze your data in the Cyber Recovery vault. CyberSense scans the backup data in the DDVE to validate its integrity and identify malicious changes indicative of cyberattack. CyberSense uses a combination of over 200 full-content-based analytics and machine learning to detect corruption. If data corruption is identified, CyberSense provides forensic tools to diagnose and recover, including reports on files that were impacted so they can be replaced with the last known good version to ensure business operations return to normal with minimal downtime.

The Dell Cyber Recovery vault in IBM Cloud architecture is suitable for clients who are using Dell PowerProtect DD technology in the production environment and are looking to protect business data in the cloud.

Cyber recovery with Dell overview

The following diagram shows the high-level architecture:

Overview of Dell Cyber Recovery vault on VMware Solutions
Overview of Dell Cyber Recovery vault on VMware Solutions

The production environment, in the primary and secondary data centers can be on premises or deployed in IBM Cloud or another cloud provider.

The Admins are people in your organization who maintain your production environment and have no access to the Cyber Recovery vault, while the Cyber Admins are you staff that manage the Cyber Recovery vault.

Within your IBM Cloud account, you order a vCenter server instance with the following add-on services:

  • Edge Gateway – The edge gateway hosts the firewall appliances.
  • A firewall – Juniper®, Fortigate®, or Bring Your Own firewall is supported.

After provisioning, you have full administrative access to the vCenter Server instance to deploy the following components the use your own licenses:

  • One or more DataDomain Virtual Edition appliances.
  • Cyber Recovery.

The diagram also shows:

  1. Backup applications like Dell Avamar, NetWorker, or PowerProtect Data Manager back up your mission-critical business data and technology configurations to a MTree in the production DD system.
  2. A deduplication process is performed in the production DD system to expedite the replication process so that connection time to the Cyber Recovery vault is as short as possible.
  3. The Cyber Recovery software controls the virtual air gap between the production DD system and the Cyber Recovery vault, by disabling the replication ports on the DDVE system in the Cyber Recovery vault when Cyber Recovery policies are idle.
  4. A policy, which can be scheduled, orchestrates the workflow between the production DD system and the Cyber Recovery vault DDVE. A policy is a combination of objects, such as PowerProtect DD storage and applications, and jobs, such as synchronization, copy, and lock. Data from the production DD system enters the Cyber Recovery vault DDVE through DD series MTree replication.
  5. Within the Cyber Recovery vault, the Cyber Recovery software creates point-in-time (PIT) retention-locked copies that can be validated and then used for recovery of the production system.
  6. PowerProtect DD Retention Lock provides data immutability for a specified time and is enabled on a per-MTree basis, while the retention time is set on a per-file basis. Retention Lock is recommended as an extra cyber-resiliency measure.
  7. If Index Engines™ CyberSense® software is installed, then this software is used by the Cyber Recovery software to validate and analyze your data in the DDVE.
  8. Your Cyber Admins manage the Cyber Recovery vault by using the jump hosts.

Cyber recovery with Dell architecture

The following diagram shows more details of the vCenter Server instance architecture:

Architecture of Dell Cyber Recovery vault on VMware Solutions
Architecture of Dell Cyber Recovery vault on VMware Solutions

The primary and secondary data centers:

  • Backup clients – Your servers or virtual machines that are being backed up.
  • Backup application – Your backup applications like Dell Avamar, NetWorker, or PowerProtect Data Manager.
  • PowerProtect DataDomain – Your production DD system in which an MTree is configured to designate the backup data that needs to be replicated to the Cyber Recovery vault.

Public network - You can connect to your Cyber Recovery vault by using one or more of the following methods:

  • Site-to-site VPN – Uses an IPsec VPN across the internet.
  • IBM Cloud Direct Link – You extend your network through your telco to one of the IBM Cloud PoPs.

IBM Cloud account:

  • vCenter Server instance - used for the Cyber Recovery vault only, deployed in an IBM Cloud account restricted to Cyber Recovery vault activities. For more information about vCenter Server instances, see Overview of VMware Solutions.

The vCenter Server instance:

  • Can use VMware vSAN or NFS data stores. For more information, see Physical storage design.

  • Does not host production or disaster recovery workloads.

  • Includes an edge cluster to host your choice of one of the following to protect vCenter Server instance networks:

    • Juniper vSRX appliances
    • FortiGate Security Appliance
    • FortiGate Virtual Appliance
    • Bring Your Own gateway appliance
  • Can include any of the vCenter Server options, such as Caveonix, Entrust, and VMware vRealize Operations.

  • Optionally, you can use encryption with Hyper Protect Crypto Services, Key Protect, and the VMware KMIP service. For more information, see KMIP for VMware overview.

  • VMware NSX – NSX is used to create overlay segments, routers, and firewalling on the vCenter Server instance.

  • Jump server – After the vCenter Server instance is provisioned, you must upload Windows OVF, OVA, or ISO files to vCenter so that you can install one or more jump servers. The Windows jump servers have the following requirements:

    • 2 vCPU
    • 8 GB RAM
    • 1 NIC
    • 150 GB disk
  • DDVE – You must upload the OVA file and license file so that you can install one or more DDVE appliances. The appliances have the following requirements:

    • 2-8 vCPU
    • 6-64 GB RAM
    • 2 NICs
    • Minimum of 3 disks
      • One 250 GB root disk
      • One 10 GB NVRAM disk
      • Minimum of one 1 TB metadata disk
  • Cyber Recovery – The Cyber Recovery management host is a VM with the following requirements:

    • One of the following operating systems with the most recent updates, patches, and security patches:
      • CentOS Linux Version 7.6 and 7.7
      • Red Hat Enterprise Linux Version 7.4, 7.5, 7.6, and 7.7
      • SUSE Linux Enterprise Server Version 12 SP3 and 12 SP4
    • 4 GB RAM
    • 50 GB disk space
    • 1.5 GB available space to extract the Cyber Recovery software
    • 10 GB or more available space for installation of the Cyber Recovery software
  • CyberSense - You must upload the OVA file and the license file so that you can install the CyberSense appliance. The appliance has the following requirements:

    • 20 vCPU
    • 196 GB RAM
    • 4 NICs
    • 4 disks:
      • 120 GB
      • 1 TB
      • 832 GB
      • 100 MB

How to use Cyber recovery with Dell

Consider using a separate IBM Cloud account to deploy your Dell Cyber Recovery vault instance into. This process promotes separation of duties between ownership of any other production or disaster recovery solution that you might host in IBM Cloud.

The minimum number of hosts in a consolidated cluster is three, and the minimum host configuration is 128 GB RAM and 20 cores at 2.2 GHz giving a total of 384 GB RAM and 132 GHz in the cluster for both management and customer workloads. The number of clusters, the number of hosts in the cluster and the cores and RAM in the hosts can be scaled. For more information, see CPU Model and RAM.

If you plan to use CyberSense, you must size the hosts considering that the appliance requires 20 vCPU and 196 GB RAM.

To create your Dell Cyber Recovery vault based on a VCF for Classic - Automated instance, follow the procedure to order a VCF for Classic - Automated instance:

  1. In Step 4, select Primary.
  2. In Step 6, order Private Networks.
  3. In Step 7, order a gateway cluster with your preferred firewall option:

After your vCenter Server instance is provisioned:

  1. Configure your firewalls by using the vendor’s documentation as a guide and the following information:

  2. Upload your OVF, OVA, and ISO files.

  3. Deploy a Windows VM for a jump server.

  4. Deploy one or more DDVEs.

  5. Deploy a Linux VM and install the Cyber Recovery software.

  6. Optionally, install CyberSense.