Skip to content

Commit 297563a

Browse files
committed
changes
Signed-off-by: Abhishek Kumar <abhishek.mrt22@gmail.com>
1 parent eaab196 commit 297563a

1 file changed

Lines changed: 14 additions & 7 deletions

File tree

source/adminguide/kvm_veeam.rst

Lines changed: 14 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -208,10 +208,10 @@ communicate with both the management server and the hypervisor hosts.
208208
For Advanced and Basic zones with security groups, the default security group
209209
for the service account must have Ingress and Egress rules configured to allow
210210
communication between the Veeam Backup and Replication platform, the Veeam
211-
worker VM, the management server, and the hypervisor hosts. For the Veeam
212-
Backup and Replication platform to communicate with the worker VM, an Ingress
213-
rule for the service account's security group should be added for all TCP
214-
ports (1-65355), with the platform IP as the CIDR.
211+
worker VM, the management server, and the hypervisor hosts. To allow the
212+
Veeam Backup and Replication platform to communicate with the worker VM,
213+
ingress and egress rules can be added for all protocols and ports as Veeam
214+
platform may connect with the worker VM on different ports.
215215

216216
.. note::
217217
The integration has been tested only with the worker VM deployed on a
@@ -481,8 +481,9 @@ To use the CloudStack Veeam integration for KVM, use one of the following config
481481
Limitations and Recommendations
482482
-------------------------------
483483

484-
* Supported only with Advanced Core zones (without security groups) and
485-
Edge zones using KVM hypervisor.
484+
* Supported for all zone types using the KVM hypervisor when the
485+
worker VM is deployed on a shared network. Additional ingress and
486+
egress rules may be required depending on the network configuration.
486487
* All backup and restore operations must be initiated from **Veeam Backup
487488
& Replication**.
488489
* CloudStack does not maintain state or visibility of backup or restore
@@ -494,7 +495,11 @@ Limitations and Recommendations
494495
* Restore operations always result in **deployment of a new instance**
495496
rather than restoring an existing instance in place. The
496497
administrators must update the corresponding backup jobs for the new
497-
instance if needed.
498+
instance if needed. This may also result in cloud-init re-running on
499+
the restored instance if cloud-init is used for instance
500+
initialization. Instances restored from password-protected templates
501+
must be stopped, have the password reset, and then be started before
502+
use.
498503
* During restore, it is recommended to not select the option to power on the
499504
instance immediately. This allows administrators to first verify the
500505
restored instance configuration and attach any missing networks before
@@ -518,3 +523,5 @@ Limitations and Recommendations
518523
queued successfully, the backup may fail. During restore, any
519524
operations on the instance or its volumes may interfere with the
520525
restore process and cause it to fail.
526+
* After restore, instances and volumes may not show all associated
527+
action events.

0 commit comments

Comments
 (0)