Environment Planning
Before you deploy Veeam Plug-in, keep in mind the following requirements and limitations.
By default, Veeam Plug-in uses the hostname of the IBM Db2 machine or cluster to create a Veeam Backup & Replication job and backup folder. To distinguish between individual servers, do the following:
- Locate the Veeam configuration XML file in the following location:
/opt/veeam/VeeamPluginforDB2/veeam_config.xml |
- Add the following entry in the Veeam configuration XML file:
<PluginParameters customServerName="hostname.domain.tld" /> |
If your servers have the same hostname in multiple environments, also add the following entry in the Veeam configuration XML file:
<PluginParameters useFQDNInServerName="true" /> |
Note |
You can use this procedure to distinguish between both standalone and cluster server names. |
Important |
For security reasons, it is recommended to use separate repositories for different customers and limit the Veeam Repository Authentication to the specific customer. |
Starting from Veeam Backup & Replication 12.1.2, Veeam Plug-in supports network traffic encryption rules set on the Veeam Backup & Replication side. By default, Veeam Plug-in automatically applies the traffic encryption rules. To decrease the processing load on the database server, you can disable network traffic encryption by ignoring the rules set on the Veeam Backup & Replication side.
To ignore network traffic encryption rules, do the following:
- Locate the Veeam configuration XML file in the following location:
/opt/veeam/VeeamPluginforDB2/veeam_config.xml |
- Add the following parameter to the Veeam configuration XML file:
<IgnoreVBRNetworkRules=true /> |
To learn more about traffic encryption, see the Enabling Traffic Encryption section in the Veeam Backup & Replication User Guide.