Creating a validation plan
To validate a backup archive as an off-host data processing operation, you must create a validation plan.
A validation plan might include multiple backups and one backup can be validated by multiple validation plans.
To create a validation plan
- In the Cyber Protect console, go to Management > Validation.
-
Click Create plan.
-
To modify the plan name, click the default name, and then specify a new name.
-
In Agent, select the agent that will perform the validation, and then click OK.
- If you want to perform validation by running a virtual machine from a backup, select a machine with Agent for VMware or Agent for Hyper-V.
- If you do not want to perform validation by running a virtual machine from a backup, select any machine that has access to the backup location.
-
In Items to validate, select the backup archives that you want to validate.
-
Select the validation scope—Backup archives or backup locations, by clicking Backups or Locations in the upper-right corner.
If the selected archives are encrypted, all of them must use the same encryption password. For archives that use different encryption passwords, create separate plans.
-
Click Add.
-
Depending on the validation scope, select one or more locations, or a location and one or more backup archives, and then click Done.
-
Click Done.
-
-
In What to validate, select which backups (also known as recovery points) within the selected archives to validate. The following options are available:
-
All backups
-
Only the last backup
-
-
In How to validate, select the validation method.
You can select one or both of the following options:
-
Checksum verification
-
Run as a virtual machine
The Run as a virtual machine option provides the VM heartbeat and Screenshot validation methods. For more information, see Validation methods.
-
-
[If you selected Checksum verification] Click Done.
-
[If you selected Run as a virtual machine] Configure the settings for this option.
-
In Target machine, select the virtual machine type (ESXi or Hyper-V), the host, and the machine name template, and then click OK.
The default name is [Machine Name]_validate.
- In Datastore (for ESXi) or Path (for Hyper-V), select the datastore for the virtual machine.
- Select one or both validation methods:
- VM heartbeat
- Screenshot validation
-
Click VM settings to change the memory size and network connections of the virtual machine.
By default, the virtual machine is not connected to a network and the virtual machine memory size equals that of the original machine.
-
Click Done.
-
-
In the validation plan, click Schedule, and then configure the schedule.
- [If the archives selected in Items to validate are encrypted] Enable the Backup password switch, and then provide the encryption password.
-
To modify the plan options, click the gear icon.
- Click Create.
As a result, the validation plan is created and will run according to the schedule that you configured. To run the plan immediately, select it in Management > Validation, and then click Run now. After the validation starts, you can check the running activity and drill down to its details in Cyber Protect console, under Monitoring > Activities.