Introduction

Dell EMC PowerProtect Cyber Recovery focuses on the protection and recovery pillars that are referenced in many well-known cybersecurity frameworks. This solution is a combination of professional services and technology that provides the following key elements:

  • Planning and design
  • Isolation and replication
  • Vault analytics
  • Recovery

The Cyber Recovery solution provides management tools and the technology that performs the actual data recovery. It automates the creation of the restore points that are used for recovery or security analytics. Dell Implementation Services provide Cyber Recovery vault design and implementation. Dell Advisory Services can design an effective recovery strategy. Organizations can dramatically reduce their surface of attack from inside and outside threats by removing the cyber attack recovery environment from the production network. The only required connection is a data path for periodically synchronizing the data, which is brought online only for data synchronization. This logical air gap provides another layer of defense by reducing the surface of attack. The Cyber Recovery software automates the recovery procedure for the NetWorker and PowerProtect Data Manager applications.

OpsRamp integrates with Cyber Recovery Manager through REST APIs.

Prerequisites

  • OpsRamp Classic Gateway 12.0.1 and above.
  • NextGen gateway 13.0.0 and above.
  • Ensure that “adapter integrations” add-on is enabled in client configuration. Once enabled you can see Dell Cyber Recovery Manager integration under Setup > Integrations > Adapter section

Hierarchy of Dell CyberRecovery Manager resources

Dell CyberRecovery Manager
— Dell CyberRecovery Manager Jobs

Default Monitoring Configurations

dell-cyber-recovery-manager application has default Global Device Management Policies, Global Templates, Global Monitors and Global metrics in OpsRamp. You can customize these default monitoring configurations as per your business use cases by cloning respective Global Templates and Global Device Management Policies. OpsRamp recommends doing this activity before installing the application to avoid noise alerts and data.

  1. Default Global Device Management Policies

    OpsRamp has a Global Device Management Policy for each Native Type of dell-cyber-recovery-manager. You can find those Device Management Policies at Setup > Resources > Device Management Policies, search with suggested names in global scope. Each Device Management Policy follows below naming convention:

    {appName nativeType - version}

    Ex: dell-cyber-recovery-manager Dell Cyber Recovery Manager - 2 (i.e, appName = dell-cyber-recovery-manager, nativeType = Dell Cyber Recovery Manager, version = 2)

  2. Default Global Templates

    OpsRamp has a Global Template for each Native Type of dell-cyber-recovery-manager. You can find those templates at Setup > Monitoring > Templates, search with suggested names in global scope. Each template follows below naming convention:

    {appName nativeType 'Template' - version}

    Ex: dell-cyber-recovery-manager Dell Cyber Recovery Manager Template - 2 (i.e, appName = dell-cyber-recovery-manager, nativeType = Dell Cyber Recovery Manager, version = 2)

  3. Default Global Monitors

    OpsRamp has a Global Monitors for each Native Type which has monitoring support. You can find those monitors at Setup > Monitoring > Monitors, search with suggested names in global scope. Each Monitors follows below naming convention:

    {monitorKey appName nativeType - version}

    Ex: Dell Cyber Recovery Manager Monitor dell-cyber-recovery-manager Dell Cyber Recovery Manager 2 (i.e, monitorKey = Dell Cyber Recovery Manager Monitor, appName = dell-cyber-recovery-manager, nativeType = Dell Cyber Recovery Manager, version = 2)

Application Migration

  1. Check for the gateway version as a prerequisite step - classic gateway-12.0.1 and above.
    Notes:

    • You only have to follow these steps when you want to migrate from sdk 1.0 to sdk 2.0.
    • For first time installation below steps are not required.
  2. Once all discoveries are completed with the sdk 2.0 applicaion, follow any one of the approaches.

    • Direct uninstallation of the sdk1.0 adaptor application through the uninstall API with skipDeleteResources=true in the post request

End-Point: https://{{host}}/api/v2/tenants/{tenantId}/integrations/installed/{installedIntgId}

Request Body:

{
    "uninstallReason": "Test",
    "skipDeleteResources": true
}

(OR)

  • Delete the configuration one by one through the Delete adaptor config API with the request parameter as skipDeleteResources=true

End-Point: https://{{host}}/api/v2/tenants/{tenantId}/integrations/installed/config/{configId}?skipDeleteResources=true.

  • Finally, uninstall the adaptor application through API with skipDeleteResources=true in the post request.

End-Point:

https://{{host}}/api/v2/tenants/{tenantId}/integrations/installed/{installedIntgId}

Request Body:

{
    "uninstallReason": "Test",
    "skipDeleteResources": true
}

Configure and Install the Dell Cyber Recovery Manager Integration

  1. From All Clients, select a client.
  2. Go to Setup > Account.
  3. Select the Integrations and Apps tab.
  4. The Installed Integrations page, where all the installed applications are displayed. If there are no installed applications, it will navigate to the Available Integrations and Apps page.
  5. Click + ADD on the Installed Integrations page. The Available Integrations and Apps page displays all the available applications along with the newly created application with the version.
  6. Search for Dell Cyber Recovery Manager using the search option available. Alternatively, use the All Categories option to search.
  1. Click ADD in the Dell Cyber Recovery Manager application. The Install Dell Cyber Recovery Manager Integration popup appears.
  2. In the Configurations page, click + ADD. The Add Configuration page appears.
  3. Enter the below mentioned BASIC INFORMATION:
FunctionalityDescription
NameEnter the name for the configuration.
Ip AddressEnter the Ip Address.
PortPort number.
CredentialSelect the Credential from the drop-down list.

Notes:
  • Click + Add to create a credential. The ADD CREDENTIAL window is displayed. Enter the following information.
    • Name: Credential name.
    • Description: Brief description of the credential.
    • User Name: User name.
    • Password: Password.
    • Confirm Password: Confirm password

Notes:

  • By default the Is Secure checkbox is selected.

  • Select the following:

    • App Failure Notifications: if turned on, you will be notified in case of an application failure that is, Connectivity Exception, Authentication Exception.
    • Event Polling: enables integrating third party alerts into OpsRamp using further configurations.
      • Below are the default values set for:
        • Alert Severity: Provides alerts severity and gets integrated out of all possible alerts.
          • Default Values: Critical, Warning.
          • Possible Values: Critical, Warning.
        • Alert Severity Mapping: Provides alert severity mapping configuration. Default values for Alert Severity Mapping configuration are {“Critical”: “Critical”,“Warning”: “Warning”}.
    • API Timeouts: These are the maximum API Timeouts that the application can use to connect and get responses from the end device.
      • Connection Timeout in Secs: a time period in which a client should establish a connection with a server.
        Note: By default, 60 is selected.
      • Connection Request Timeout in Secs: a time period required to process an HTTP call: from sending a request to receiving a response.
        Note: By default, 10 is selected.
      • Socket Timeout in Secs: a maximum time of inactivity between two data packets when exchanging data with a server.
        Note: By default, 10 is selected.
  1. Select the below mentioned Custom Attribute:
FunctionalityDescription
Custom AttributeSelect the custom attribute from the drop down list box.
ValueSelect the value from the drop down list box.

Note: The custom attribute that you add here will be assigned to all the resources that are created by the integration. You can add a maximum of five custom attributes (key and value pair).

  1. In the RESOURCE TYPE section, select:

    • ALL: All the existing and future resources will be discovered.
    • SELECT: You can select one or multiple resources to be discovered.

  2. In the DISCOVERY SCHEDULE section, select Recurrence Pattern to add one of the following patterns:

    • Minutes
    • Hourly
    • Daily
    • Weekly
    • Monthly

  3. Click ADD.

Now the configuration is saved and displayed on the configurations page after you save it.
Note: From the same page, you may Edit and Remove the created configuration.

  1. Click NEXT.
  2. Below are the optional steps you can perform on the Installation page.
  • Under the ADVANCED SETTINGS, Select the Bypass Resource Reconciliation option, if you wish to bypass resource reconciliation when encountering the same resources discovered by multiple applications.

    Note: If two different applications provide identical discovery attributes, two separate resources will be generated with those respective attributes from the individual discoveries.

  • Click +ADD to create a new collector by providing a name or use the pre-populated name.
  1. Select an existing registered profile.
  1. Click FINISH.

The integration is now installed and displayed on the Installed Integration page. Use the search field to find the installed integration.

Modify the Configuration

View the Dell Cyber Recovery Manager Details

The Dell Cyber Recovery Manager integration is displayed in the Infrastructure > Resources > Server. You can navigate to the Attributes tab to view the discovery details and Metrics tab to view the metric details for Dell Cyber Recovery Manager.

View Resource Metrics

To confirm Dell CyberRecovery Manager monitoring, review the following:

  • Metric graphs: A graph is plotted for each metric that is enabled in the configuration.
  • Alerts: Alerts are generated for metrics that are configured as defined for integration.

Resource Filter Input Keys

dell-cyber-recovery-manager app resources are filtered and discovered based on below keys.

Note: You can filter the resources with the discoverable keys only.

Click here to view the Supported Input Keys
Resource TypeKeys
All TypesresourceName
hostName
aliasName
dnsName
ipAddress
macAddress
os
make
model
serialNumber

Supported Alert Custom Macros

Customize the alert subject and description with below macros then it will generate alert based on customisation.
Supported macros keys:

Click here to view the alert subject and description with macros

                                ${resource.name}

                                ${resource.ip}

                                ${resource.mac}

                                ${resource.aliasname}

                                ${resource.os}

                                ${resource.type}

                                ${resource.dnsname}

                                ${resource.alternateip}

                                ${resource.make}

                                ${resource.model}

                                ${resource.serialnumber}

                                ${resource.systemId}

                                ${Custome Attributes in the resource}

                                ${parent.resource.name}

Supported Metrics

Click here to view the supported metrics
Metric NameMetric Display NameUnitsDescription
dell_cyber_recovery_manager_StatusDell Cyber Recovery Manager StatusGives the Dell Cyber Recovery Manager Status.
Possible values: Running(1),Others(0).
dell_cyber_recovery_manager_vault_StatusDell Cyber Recovery Manager Vault StatusGives the Dell Cyber Recovery Manager Vault Status.
Possible values: Locked(0),Unlocked(1).
dell_cyber_recovery_manager_job_StatusDell Cyber Recovery Manager Job StatusGives the latest status of Dell Cyber Recovery Manager Jobs.
Possible values: Canceled(0),Running(1),Warning(2),Critical(3),Success(4).
dell_cyber_recovery_manager_job_ProgressDell Cyber Recovery Manager Job Progress%Gives the progress of Dell Cyber Recovery Manager Jobs
dell_cyber_recovery_manager_job_ElapsedTimeDell Cyber Recovery Manager Job Elapsed TimemGives the elapsed time of Dell Cyber Recovery Manager Jobs
dell_cyber_recovery_manager_resource_APIStatsDell CyberRecovery Manager Resource API StatisticsProvides the number of API calls made within the frequency and resources
dell_cyber_recovery_manager_event_StatisticsDell CyberRecovery Manager Event StatisticsProvides Dell CyberRecovery Manager Event Statistics

Risks, Limitations & Assumptions

  • Application can handle Critical/Recovery failure notifications for below two cases when user enables App Failure Notifications in configuration
    • Connectivity Exception
    • Authentication Exception
  • Application will send any duplicate/repeat failure alert notification for every 6 hours.
  • Application cannot control monitoring pause/resume actions based on above alerts. Metrics can be used to monitor the resources and can generate alerts based on the threshold values.
  • dell-cyber-recovery-manager Event/Alert polling will be started only if the user enables Event/Alert Polling in configuration.
    Notes:
    • Here Event/Alert polling support is given for dell-cyber-recovery-manager Alarms only. When a status value which presents in the Event/Alert Cleared Status field occurs, OpsRamp has provided an Ok alert accordingly. Otherwise, OpsRamp has provided an alert based on Event/Alert Severity Filter & Event/Alert Severity Mappings of Event/Alert Polling configurations.
    • Possible dell-cyber-recovery-manager status values are CRITICAL, WARNING.
    • Default/Possible values of Event/Alert Severity Filter configuration are CRITICAL, WARNING.
    • OpsRamp has given default mappings to map dell-cyber-recovery-manager Severity with OpsRamp Severities as part of Event/Alert Severity Mapping configuration.
    • Users can modify them as per their use-case at any point of time from the application configuration page. Possible OpsRamp Severities are Critical, Warning, Ok, Info.
  • Component level thresholds can be configured on each resource level.
  • No support of showing activity log and applied time.
  • No support for the option to get Latest snapshot metric.