Self-managed workloads, such as Oracle, SAP HANA, and Google Cloud VMware Engine, leverage Google-managed backup vaults for long-term, immutable storage through the OnVault storage mechanism. This integration requires explicit authorization of backup and recovery appliances and the registration of these appliances as authorized accessors.
Backup model
This section describes the two backup models for resources protected using the appliance management console.
Centralized model
In the centralized model, organizations streamline backup management by creating backup vaults and deploying the appliance management console within a designated central administrator project. This central repository consolidates backups of various resources, such as VMware Engine VMs running across multiple service projects. Organizations configure policies within the appliance management console to protect their resources residing in different service projects.
Decentralized model
In the decentralized model, appliance management consoles and backup vaults exist in various projects based on the organization's specific needs and required isolation levels. For example, an organization chooses to have a separate appliance management console for each line of business. This approach serves decentralized organizations where the responsibility for managing and backing up resources splits between multiple teams.
Integration with backup vaults
Integrating backup vaults with the Management Console stack allows legacy and complex workloads to achieve the same ransomware resilience as Google Cloud console managed resources.
Architecture and orchestration
Data protection involves a two-step process: a Snapshot Phase for local staging followed by a Vault Phase for transfer to the backup vault. The appliance's UDP Engine orchestrates the flow, while a component called Cloudbacker performs the actual data transfer to the vault using downscoped tokens.
Appliances don't have permission to write to a vault by default. Each appliance requires registration as an "accessor" for the specific vault. Once data writes to the vault, the appliance finalizes the backup with the backup vault service, which updates the internal Spanner database and marks the backup as immutable.
Set up self-managed backup vaults
These are the steps to configure a backup vault in a appliance management console environment.
IAM authorization for the appliance
- In the Google Cloud console, go to the Compute Engine > VM instances page.
- Locate your backup/recovery appliance and copy its service account email address.
- Switch to the project where the backup vault is located.
- Go to Identity and Access Management (IAM) & Admin > IAM and click Grant Access.
- Paste the appliance's service account email.
- Select the role:
Backup and DR Backup Vault Accessor(roles/backupdr.backupvaultAccessor). - (Optional) Add a condition to restrict access to a specific vault name.
Register accessor and configure pool
- Ensure the vault's access restriction is set to UNRESTRICTED to allow cross-project appliance connections.
- Sign into the Backup and DR Service management console.
- Navigate to the storage management section and create a new OnVault Pool.
- Select the target backup vault from the list.
- Save the pool. The appliance registers itself as an accessor for that vault.
Enable protection for workloads
- In the management console, edit the Resource Profile used by your workloads.
- Set the OnVault Pool to the one created in the previous step.
- Assign the profile to your workloads using an SLA Domain or Backup Template.
- Verify the job status; you see the Snapshot Phase followed by the Vault Phase.
What's next
- Learn more about Backup and DR.
- Review IAM roles and permissions.