Skip to main content
SnapCenter Software

Create resource groups and enable secondary protection for resources on ASA r2 systems

Contributors netapp-soumikd

You should create the resource group to add the resources that are on ASA r2 systems. You can also provision the secondary protection while creating the resource group.

Before you begin
  • You should ensure that you are not adding both ONTAP 9.x resources and ASA r2 resources to the same resource group.

  • You should ensure that you do not have a database with both ONTAP 9.x resources and ASA r2 resources.

About this task
  • The secondary protection is available only if the logged-in user is assigned to the role that has the SecondaryProtection capability enabled.

  • If you enabled secondary protection, the resource group is put into maintenance mode while creating the primary and secondary consistency groups. After the primary and secondary consistency groups are created, the resource group is put out of maintenance mode.

  • SnapCenter does not support secondary protection for a clone resource.

Steps
  1. In the left navigation pane, select Resources, and the appropriate plug-in from the list.

  2. In the Resources page, click New Resource Group.

  3. In the Name page, perform the following actions:

    1. Enter a name for the resource group in the Name field.

      Note The resource group name should not exceed 250 characters.
    2. Enter one or more labels in the Tag field to help you search for the resource group later.

      For example, if you add HR as a tag to multiple resource groups, you can later find all resource groups associated with the HR tag.

    3. Select this check box, and enter a custom name format that you want to use for the Snapshot name.

      For example, customtext_resource group_policy_hostname or resource group_hostname. By default, a timestamp is appended to the Snapshot name.

    4. Specify the destinations of the archive log files that you do not want to back up.

      Note You should use the exact same destination as it was set in the application including prefix, if needed.
  4. In the Resources page, select the database host name from the Host drop-down list.

    Note The resources are listed in the Available Resources section only if the resource is discovered successfully. If you have recently added resources, they will appear on the list of available resources only after you refresh your resource list.
  5. Select the ASA r2 resources from the Available Resources section and move them to the Selected Resources section.

  6. In the Application Settings page, select the backup option.

  7. In the Policies page, perform the following steps:

    1. Select one or more policies from the drop-down list.

      Note You can also create a policy by clicking add symbol.

      In the Configure schedules for selected policies section, the selected policies are listed.

    2. Click add symbol in the Configure Schedules column for the policy for which you want to configure a schedule.

    3. In the Add schedules for policy policy_name window, configure the schedule, and then click OK.

      Where, policy_name is the name of the policy that you have selected.

      The configured schedules are listed in the Applied Schedules column.

    Third party backup schedules are not supported when they overlap with SnapCenter backup schedules.

  8. If the secondary protection is enabled for the policy that you have selected, then Secondary Protection page is displayed and you need to perform the following steps:

    1. Select the type of the replication policy.

      Note Synchronous replication policy is not supported.
    2. Specify the consistency group suffix that you want to use.

    3. From the Destination Cluster and Destination SVM drop-downs select the peered cluster and SVM that you want to use.

      Note The cluster and SVM peering is not supported by SnapCenter. You should use System Manager or ONTAP CLIs to perform cluster and SVM peering.
Note If the resources are already protected outside of SnapCenter, those resources will be displayed in the Secondary Protected Resources section.
  1. On the Verification page, perform the following steps:

    1. Click Load locators to load the SnapMirror or SnapVault volumes to perform verification on secondary storage.

    2. Click add symbol in the Configure Schedules column to configure the verification schedule for all the schedule types of the policy.

    3. In the Add Verification Schedules policy_name dialog box, perform the following actions:

      If you want to…​ Do this…​

      Run verification after backup

      Select Run verification after backup.

      Schedule a verification

      Select Run scheduled verification and then select the schedule type from the drop-down list.

    4. Select Verify on secondary location to verify your backups on secondary storage system.

    5. Click OK.

      The configured verification schedules are listed in the Applied Schedules column.

  2. In the Notification page, from the Email preference drop-down list, select the scenarios in which you want to send the emails.

    You must also specify the sender and receiver email addresses, and the subject of the email. If you want to attach the report of the operation performed on the resource group, select Attach Job Report.

    Note For email notification, you must have specified the SMTP server details using the either the GUI or the PowerShell command Set-SmSmtpServer.
  3. Review the summary, and then click Finish.