Environment Planning

Before you deploy Veeam Plug-in, keep in mind the following requirements and limitations.

Hosting Environments and Backup Job Names

By default, Veeam Plug-in uses the hostname of the IBM Db2 machine or cluster to create a Veeam Backup & Replication job and backup folder. To distinguish between servers with the same hostnames, you can assign custom names to these servers.

To assign a custom name, update the Veeam configuration XML file as follows:

  1. On the machine with Veeam Plug-in, open the /opt/veeam/VeeamPluginforDB2/veeam_config.xml file.
  2. Add the customServerName parameter entry to the <PluginParameters /> line in the Veeam configuration XML file:

<PluginParameters customServerName="hostname.domain.tld" />

where <hostname.domain.tld> is a custom name of the server.

After adding this parameter, Veeam Plug-in will use the specified custom name of the server to name the backup job and backup folder.

For example:

<PluginParameters customServerName="srv01.tech.local" />

Alternatively, you can use the useFQDNInServerName parameter:

<PluginParameters useFQDNInServerName="true" />

After adding this parameter, Veeam Plug-in will use the fully qualified domain name (FQDN) of the server to name the backup job and backup folder.

Keep in mind that you must add the parameters to the existing line in the veeam_config.xml file. If you create a new line with the same name as the existing line, Veeam Plug-in will consider parameters only in the first detected line. Other parameters will be ignored.

Important

For security reasons, it is recommended to use separate repositories for different customers and limit the Veeam Repository Authentication to the specific customer.

Network Traffic Encryption

Veeam Plug-in supports network traffic encryption rules set on the Veeam Backup & Replication side. By default, Veeam Plug-in for IBM Db2 automatically applies the traffic encryption rules. To decrease the processing load on the database server, you can disable network traffic encryption by ignoring the rules set on the Veeam Backup & Replication side.

To ignore network traffic encryption rules, do the following:

  1. On the machine with Veeam Plug-in, open the /opt/veeam/VeeamPluginforDB2/veeam_config.xml file.
  2. Add the following parameter to the Veeam configuration XML file:

<IgnoreVBRNetworkRules=true />

To learn more about traffic encryption, see the Enabling Traffic Encryption section in the Veeam Backup & Replication User Guide.

Page updated 10/30/2024

Page content applies to build 12.3.0.310