Creating a Protected Group

eReplication provides policy-based automatic protection for different protected objects.

To implement policy-based automatic protection, you need to create protected groups for protected objects on eReplication. Once a protected group is created, it will be automatically executed based on the preset policy.

This section describes how to create a protected group at the production site for Kubernetes that need DR protection. After the protected group is created, the system automatically matches suitable protection policies for the protected group.

Prerequisites

Context

Protected objects in a protected group must reside on the same storage device.

Procedure

  1. In the menu bar, choose Protection.
  2. Click Create.
  3. Select a protected object.

    1. Select kubernetes as the protected object type.
    2. Select Production Site and Kubernetes Cluster where Kubernetes to be protected resides.
    3. Select Kubernetes Object to be protected. You can select Application resource or Data volume.
      1. If you select Application resource as Kubernetes Object to be protected, select the application resources to be protected.

        If you need to refresh the application resource information, click Refresh in the Operation column of the corresponding resource.

      2. If you select Data volume as Kubernetes Object to be protected, select the storage backend where the data volume resides and select the data volume to be protected.
    • If the protected object is an application resource, only one application resource can be added to one protected object.
    • If the protected object is a data volume, a maximum of 256 data volumes can be added to one protected object.

  4. Click Next.
  5. The system automatically matches supported protection policies. Select a proper protection policy and configure a time policy based on your data protection solution. If application consistency is involved, configure an application consistency policy.

    1. If you select application resources as protected objects, perform the following operations to set a protection policy:

      Click Settings. In the Set Execution Policy dialog box, set the protection policy.

      1. If the selected data protection solution is Local Storage Backup for Application Resources, set protection policy parameters as described in Table 1.
    Table 1 Parameters of the local storage backup policy

    Parameter

    Description

    Setting

    Execution Policy

    Protected group execution policy

    Select On-demand scheduling or Period-based scheduling as required.

    If you select Period-based scheduling, you also need to set the execution period.

    Execution Period

    • Set the execution time of the protected group.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.

    Hour, Day, Week, Month.

    Select as required. By default, all options are not selected.

    Hour

    • The time policy can be configured by hour.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.
    • The time ranges from 0 to 59 minutes.
    • The number of retained copies ranges from 1 to 256.

    Day

    • The time policy can be configured by day.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.
    • The time ranges from 00:00 to 23:59.
    • The number of retained copies ranges from 1 to 256.

    Week

    • The time policy can be configured by week.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.
    • The policy can be executed on a specified day.

      Value range: Monday-Sunday

    • The execution time ranges from 00:00 to 23:59 every day.
    • The number of retained copies ranges from 1 to 256.

    Month

    • The time policy can be configured by month.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.
    • The policy can be executed on a specified day.

      The value ranges from 1 to 31.

    • The execution time ranges from 00:00 to 23:59 every day.
    • The number of retained copies ranges from 1 to 256.

    Pre-hook

    Select the HOOK to be executed before the backup. This parameter is optional.

    Select a value as required.

    Post-hook

    Select the HOOK to be executed after the backup. This parameter is optional.

    Select a value as required.

    Consistent Snapshot

    Whether to enable the consistent snapshot function during backup.

    Enable, Disable.

    This function is disabled by default.

    Sync Rate

    Speed at which backup restoration is performed.

    The default value is Medium.

    • Low: 0 MB/s to 5 MB/s. The restoration takes a long time. This mode is applicable to scenarios where the service load is heavy.
    • Medium: 10 MB/s to 20 MB/s. The restoration takes a relatively short period of time. This mode is applicable to scenarios where the service load is relatively heavy.
    • High: 50 MB/s to 70 MB/s. The restoration takes a short time. This mode is applicable to scenarios where the service load is relatively light.
    • Highest: Above 100 MB/s. The restoration takes the shortest time. This mode is applicable to scenarios where the service load is light.
    1. If the selected data protection solution is Cross-Storage Backup for Application Resources, set protection policy parameters as described in Table 2.
    Table 2 Parameters of a cross-storage backup policy

    Parameter

    Description

    Setting

    Target storage for volume backup

    Backend of the target storage to be backed up.

    Select a value as required.

    Execution Policy

    Protected group execution policy

    Select On-demand scheduling or Period-based scheduling as required.

    If you select Period-based scheduling, you also need to set the execution period.

    Execution Period

    • Set the execution time of the protected group.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.

    Hour, Day, Week, Month.

    Select as required. By default, all options are not selected.

    Hour

    • The time policy can be configured by hour.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.
    • The time ranges from 0 to 59 minutes.
    • The number of retained copies ranges from 1 to 256.

    Day

    • The time policy can be configured by day.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.
    • The time ranges from 00:00 to 23:59.
    • The number of retained copies ranges from 1 to 256.

    Week

    • The time policy can be configured by week.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.
    • The policy can be executed on a specified day.

      Value range: Monday-Sunday

    • The execution time ranges from 00:00 to 23:59 every day.
    • The number of retained copies ranges from 1 to 256.

    Month

    • The time policy can be configured by month.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.
    • The policy can be executed on a specified day.

      The value ranges from 1 to 31.

    • The execution time ranges from 00:00 to 23:59 every day.
    • The number of retained copies ranges from 1 to 256.

    Pre-hook

    Select the HOOK to be executed before the backup. This parameter is optional.

    Select a value as required.

    Post-hook

    Select the HOOK to be executed after the backup. This parameter is optional.

    Select a value as required.

    Consistent Snapshot

    Whether to enable the consistent snapshot function during backup.

    Enable, Disable.

    This function is disabled by default.

    Sync Rate

    Rate of synchronizing data to the target storage during backup.

    The default value is Medium.

    • Low: 0 MB/s to 5 MB/s. The restoration takes a long time. This mode is applicable to scenarios where the service load is heavy.
    • Medium: 10 MB/s to 20 MB/s. The restoration takes a relatively short period of time. This mode is applicable to scenarios where the service load is relatively heavy.
    • High: 50 MB/s to 70 MB/s. The restoration takes a short time. This mode is applicable to scenarios where the service load is relatively light.
    • Highest: Above 100 MB/s. The restoration takes the shortest time. This mode is applicable to scenarios where the service load is light.
    1. If the selected data protection solution is Cross-Cluster Replication for Application Resources, set protection policy parameters as described in Table 3.
    Table 3 Parameters of a cross-cluster replication policy for application resources

    Parameter

    Description

    Setting

    DR Site

    DR site.

    Select a value as required.

    Disaster Recovery Cluster

    Cluster at the DR site.

    Select a value as required.

    Disaster Recovery Storage Backend

    Storage backend at the DR site.

    Select a value as required.

    Execution Policy

    Protected group execution policy

    Select On-demand scheduling or Period-based scheduling as required.

    If you select Period-based scheduling, you also need to set the execution period.

    Execution Period

    • Set the execution time of the protected group.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.

    Hour, Day, Week, Month.

    Select as required. By default, all options are not selected.

    Hour

    • The time policy can be configured by hour.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.
    • The time ranges from 0 to 59 minutes.
    • The number of retained copies ranges from 1 to 256.

    Day

    • The time policy can be configured by day.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.
    • The time ranges from 00:00 to 23:59.
    • The number of retained copies ranges from 1 to 256.

    Week

    • The time policy can be configured by week.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.
    • The policy can be executed on a specified day.

      Value range: Monday-Sunday

    • The execution time ranges from 00:00 to 23:59 every day.
    • The number of retained copies ranges from 1 to 256.

    Month

    • The time policy can be configured by month.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.
    • The policy can be executed on a specified day.

      The value ranges from 1 to 31.

    • The execution time ranges from 00:00 to 23:59 every day.
    • The number of retained copies ranges from 1 to 256.

    Consistency Group

    Whether to select Remote replication relationship for Consistency Group.

    Enable, Disable.

    This function is disabled by default.

    Sync Rate

    Rate of synchronizing data to the target storage during protection execution.

    The default value is Medium.

    • Low: 0 MB/s to 5 MB/s. The restoration takes a long time. This mode is applicable to scenarios where the service load is heavy.
    • Medium: 10 MB/s to 20 MB/s. The restoration takes a relatively short period of time. This mode is applicable to scenarios where the service load is relatively heavy.
    • High: 50 MB/s to 70 MB/s. The restoration takes a short time. This mode is applicable to scenarios where the service load is relatively light.
    • Highest: Above 100 MB/s. The restoration takes the shortest time. This mode is applicable to scenarios where the service load is light.
    1. If you select a data volume as the protected object, perform the following operations to set a protection policy:

      If the data protection solution is Cross-Cluster Replication for Data Volumes, click Settings. In the Set Execution Policy dialog box, set the protection policy.

      Table 4 lists related parameters.

    Table 4 Parameters of a cross-cluster replication policy for data volumes

    Parameter

    Description

    Setting

    DR Site

    DR site.

    Select a value as required.

    Disaster Recovery Cluster

    Cluster at the DR site.

    Select a value as required.

    Disaster Recovery Storage Backend

    Storage backend at the DR site.

    Select a value as required.

    Execution Policy

    Protected group execution policy

    Select On-demand scheduling or Period-based scheduling as required.

    If you select Period-based scheduling, you also need to set the execution period.

    Sync Type

    Supported

    Specific time policy: The system starts synchronization at a specific time.

    Timed wait after sync begins: The system starts timing as soon as the latest synchronization begins. After the time specified in Timing Duration is reached, the system automatically starts synchronizing data between primary and secondary resources again.

    Timed wait after sync ends: The system starts timing after the last synchronization ends. After the time specified in Timing Duration is reached, the system automatically starts data synchronization between primary and secondary resources again.

    NOTE:

    If Timed wait after sync begins or Timed wait after sync ends is selected, Remote replication relationship cannot be enabled.

    Time Policy

    • Set the time policy for executing the protected group.
    • This parameter is available only when Sync Type of the protected group is set to Specific time policy.

    Every Hour, Every Day, Every Week.

    Select as required. By default, Every Week is selected.

    Timing Duration

    Synchronization interval.

    This option is displayed when you select Timed wait after sync begins or Timed wait after sync ends.

    If the unit is minutes, the value must range from 1 to 1440.

    If the unit is seconds, the value must range from 15 to 59.

    Every Hour

    • The time policy can be configured by hour.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.
    • The time ranges from 0 to 59 minutes.
    • The number of retained copies ranges from 1 to 256.

    Every Day

    • The time policy can be configured by day.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.
    • The time ranges from 00:00 to 23:59.
    • The number of retained copies ranges from 1 to 256.

    Every Week

    • The time policy can be configured by week.
    • This option is displayed when the execution policy of the protected group is Period-based scheduling.
    • The policy can be executed on a specified day.

      Value range: Monday-Sunday

    • The execution time ranges from 00:00 to 23:59 every day.
    • The number of retained copies ranges from 1 to 256.

    Consistency Group

    Determine whether to select Remote replication relationship.

    This option is not selected by default.

    Sync Rate

    Synchronization rate of the remote replication during protection execution.

    The default value is Medium.

    • Low: 0 MB/s to 5 MB/s. The restoration takes a long time. This mode is applicable to scenarios where the service load is heavy.
    • Medium: 10 MB/s to 20 MB/s. The restoration takes a relatively short period of time. This mode is applicable to scenarios where the service load is relatively heavy.
    • High: 50 MB/s to 70 MB/s. The restoration takes a short time. This mode is applicable to scenarios where the service load is relatively light.
    • Highest: Above 100 MB/s. The restoration takes the shortest time. This mode is applicable to scenarios where the service load is light.

  6. Click OK.
  7. Click Next.
  8. Set Name and Description of the protected group.

    • Name: contains 4 to 32 characters, including letters, digits, hyphens (-), and underscores (_), but cannot start with a hyphen (-).
    • Description: contains 0 to 255 characters.

  9. Click Finish.
  10. Click OK.

    • After a protected group is created, the Kubernetes cluster at the standby end automatically creates an application resource that is the same as that at the active end and the resource cannot be deleted.
    • There is a low probability that the failure is caused by a database error. In this case, try again.


Copyright © Huawei Technologies Co., Ltd.