This Quick Guide describes the steps towards enabling bweb Enterprise Bacula graphical interface integration with the vSphere Environment. It requires and enhances the Bacula Enterprise Plugin operation.
The integration enables the VMware Center, at the bweb Bacula Configuration screen, where the vCenter connections and all the Plugin options can be set. Also, Virtual Machines and other VMware components can be graphically selected for backup, at the FileSet Plugin Options screen.
It also allows to set up a Admin Scan Job, that automatically creates FileSets and backup Jobs for existing virtual machines.
Configuration
As shown in Figures 1 and 2, the bweb Bacula Configuration VMware Center is Enabled after the BWeb installation.
Figure 1 and 2. bweb Bacula Configuration VMware Center
As exhibited in Figure 3 it is possible to add or change the Plugin vSphere connection configuration and plugin options. The Check button allows testing the configuration.
Figure 3. New vSphere Connection Configuration
Note: in case of connection problems, check the error messages in /opt/bacula/working/bweb-error.log.
As displayed in Figure 4, it should be possible to navigate and select Virtual Machines from the FileSet Include Plugin Options screen.
Figure 4. VMware Plugin Options Virtual Machine Selection Tree
Problems with the VCenter Certificate
If the VCenter certificate is self-signed or unrecognized, you would need to install the certificate on the same machine as BWeb. Refer to the following VMware pages to see how to extract the vCenter certificate (depending on your version):
- https://pubs.vmware.com/vsphere-50/index.jsp?topic=%2Fcom.vmware.wssdk.dsg.doc_50%2Fsdk_sg_server_certificate_Appendix.6.4.html
- https://pubs.vmware.com/vsphere-6-0/index.jsp?topic=%2Fcom.vmware.wssdk.dsg.doc%2Fsdk_sg_server_certificate_Appendixes.6.4.html
- https://pubs.vmware.com/vsphere-6-5/index.jsp?topic=%2Fcom.vmware.vcli.getstart.doc%2FGUID-9AF8E0A7-1A64-4839-AB97-2F18D8ECB9FE.html
Once you have the certificates, copy them to “/etc/pki/ca-trust/source/anchors/” and run the following two commands to update the certificate store on the system:
update-ca-trust force-enable update-ca-trust export
Disponível em: Português (Portuguese (Brazil))EnglishEspañol (Spanish)