Deploying the Phoenix AWS proxy
Phoenix AWS proxy deployment comprises of the following steps:
Step 3: View deployed proxy
- You must register the Phoenix AWS proxy in the same region as the server storage region.
The Phoenix AWS proxy can be deployed in a customer VPC that has DNS resolution enabled and provided by an Amazon-owned DNS server. In situations where DNS resolution is disabled or provided by a third-party-owned DNS server, we recommend deploying a new VPC dedicated to the Phoenix AWS Proxy. This newly deployed VPC must have:
- DNS resolution enabled.
- DNS server configured in the DHCP option should be set to an Amazon-provided DNS server, not a custom DNS server.
- The Druva services should be available in the availability zone for the subnet that you intend to select during the Phoenix AWS proxy deployment. See Prerequisite check for Phoenix AWS proxy VPC and subnet and AWS Proxy deployment fails due to AWS Availability Zone limitation for details.
- When you delete a stack, AWS does not delete resources attached to the stack. Ensure that you manually delete the resources attached to the AWS account. For more information, see AWS KB article.
All the endpoints require a security group attached to them. Druva Phoenix creates the following security groups:
- For the DR proxy, Druva Phoenix creates a security group called DruvaSGGroup. This security group has a rule allowing outbound connections on port 443.
- Druva Phoenix creates a security group called DruvaSGGroupEndpoint for all the endpoints created as part of the Phoenix AWS proxy deployment. This security group has a rule allowing inbound and outbound connections on port 443.
- To login to the AWS proxy use "centos" as the username and use the key pair you provided while deploying the AWS proxy.
Step 1: Select an AWS region on the Phoenix Management Console
Deploy the Phoenix AWS proxy in the same region where the virtual machines that you intend to configure for disaster recovery are backed up in Druva Phoenix. For example, if the virtual machines are backed up to a storage in Druva Phoenix that is located in the US-East region, deploy the Phoenix AWS proxy in the US-East region.
The backup data from the Druva Cloud S3 bucket can be stored only to the S3 bucket of the customer account that belongs to same the region. Also, the optimum transfer rate can be ensured only within the same region.
- Log in to the Phoenix Management Console.
- On the menu bar, click All Organizations, and select the required organization from the drop-down list.
- On the menu bar, click Disaster Recovery.
- In the left pane, click the Phoenix AWS proxies tab.
- On the Phoenix AWS proxies page, click Register Phoenix AWS proxy.
- On the Register Phoenix AWS proxy page, from the AWS Region drop-down list, select the AWS region where you want to deploy the proxy. For example, us-west-1.
The Activation Token section displays an activation token that is used while creating the CloudFormation Stack.
Note: Druva Phoenix lists the activation token under Manage > Activation Tokens.
- In the AWS CloudFormation Stack section, click Create CloudFormation Stack to register the Phoenix AWS proxy.
If you are logged in to the AWS Management Console, you are directed to the Quick Create Stack page. Else, you are directed to the login page of the AWS Management Console. Use your credentials to login and view the Quick Create Stack page.
Step 2: Create a CloudFormation Stack on the AWS Management Console
The Quick create stack page on the AWS Management Console uses a proxy deployment template depending on your first-time proxy deployment or the subsequent deployments. In the Quick create stack page configure parameters for your AWS resources defined in the template.
Verify the stack details and click Next.
Field Description Template URL Displays the URL of the Druva deployment template used for your proxy deployment. Stack description The description of the Druva deployment template used. Stack name Displays the name generated by Druva Phoenix for your stack.
Enter the parameters and click Next.
Field Description Druva Phoenix Configuration parameters PhoenixActivationToken Displays the Druva Phoenix activation token generated based on the selected AWS storage region on the Phoenix Management Console. InstanceCount Specify the number of proxy instances that you want to launch. You can specify up to 5 instances. The default value is 1. Network Configuration parameters VPC
Select a Virtual Private Cloud (VPC) network specific to the AWS account to launch the Phoenix AWS proxies. For more information, see Supported AWS regions.
Note: Ensure that the DNS hostnames option is enabled for the VPC. For more information, see AWS documentation.
Subnet Select a subnet to launch the Phoenix AWS proxies in the specific network in your VPC. Amazon EC2 Configuration parameters InstanceType
Select the instance type for the Phoenix AWS proxy. For more information, see Supported AWS instance types.
Note: It is recommended to select the instances based on the following configuration: 8 CPUs, 16 GB memory, 3500 Mbps bandwidth, 10,000 IOPS.
KeyPair Select an EC2 key-pair to enable SSH access to the proxy instance.
Optionally, update the stack options and click Next.
Review the configurations and in the Capabilities section, select the check boxes acknowledging that AWS CloudFormation might create IAM resources with custom names and that AWS CloudFormation might require the following capability: CAPABILITY_AUTO_EXPAND.
Click Create stack.
Verify the status of stack creation on the Stacks page on the AWS Management Console. If the status is:
CREATE_COMPLETE: Druva Phoenix lists the registered Phoenix AWS proxy on the Phoenix AWS proxies tab on the Phoenix Management Console.
- You can view the deployed AWS resources, such as EC2 instance IDs and security groups, on the Resources tab on the Stacks page.
The following VPC endpoints are deployed. These VPC endpoint services (AWS PrivateLink) are used for secure communication.
S3 Endpoint: Used for log upload, job resume functionality, etc.
SQS Endpoint: Used for failover instances to communicate with the Phoenix AWS proxy.
EC2 Endpoint: Used for operations on EBS volumes and snapshots.
Cloud Formation Endpoint: Used for activation of Phoenix AWS proxy.
Custom Druva Endpoints:
Druva Backup Service Endpoint: Used for metadata transfer.
Druva Node Service Endpoint: Used for data transfer.
Note : All the endpoints require a security group attached to it with inbound port 443 enabled.
A new Route 53 hosted zone is added for the VPC.
Note: The AWS resources deployed as part of the Phoenix AWS proxy deployment are only accessible within your AWS account. None of these resources are accessible publicly.
Step 3: View deployed proxy
After the registration completes successfully, the Phoenix AWS proxy appears on the Phoenix AWS proxies page. From this page, you can also deploy additional Phoenix AWS proxies.
Note: To login to the AWS proxy use "centos" as the username and use the key pair you provided while deploying the AWS proxy.
Deploying a Phoenix AWS proxy in another availability zone
To deploy another Phoenix AWS proxy in a different availability zone, perform the steps outlined under Deploying the Phoenix AWS proxy. Ensure that the subnet and VPC you select belong to the availability zone you deploy the proxy in.
Re-deploying a Phoenix AWS proxy
The Phoenix AWS proxy (DR Proxy) is stateless. Stateless means that if you lose the DR proxy instance for any reason, you can always redeploy another DR proxy instance and it can continue functioning like the previous instance. Any available DR proxy can handle DR jobs for VMs. The DR jobs aren't tied to specific DR proxies.
To re-deploy a Phoenix AWS proxy, perform the steps outlined under Deploying the Phoenix AWS proxy. The Druva Phoenix AWS CloudFormation template takes less than 10 minutes to deploy.