For automated discovery of protected computers, Veeam Backup & Replication uses the rescan job that runs on the backup server. Veeam Backup & Replication automatically creates this job once you create the first protection group in the inventory. The rescan job runs upon schedule defined individually for every protection group in the protection group settings. By default, Veeam Backup & Replication is set up to perform discovery at 9:00 PM daily. You can adjust daily schedule in the protection group settings or define periodic schedule.
The rescan job itself is not displayed in the Veeam Backup & Replication console. However, you can start and stop rescan job sessions manually for a specific protection group or individual computer in the inventory. This may be helpful, for example, if new computers appeared in your infrastructure, and you want to discover these computers without waiting for the next scheduled rescan job session start. To learn more, see Rescanning Protection Group and Rescanning Protected Computer.
You can view statistics for currently running and already performed rescan job sessions. To learn more, see Viewing Rescan Job Statistics.
How It Works
When the rescan job is started — either automatically upon schedule or manually — Veeam Backup & Replication performs the following operations:
- Obtains settings specified for the protection group from the configuration database. The settings include a list of computers to scan, an account for connecting to these computers, and so on.
- Connects to each computer in the list under the specified account:
- On Microsoft Windows computers, Veeam Backup & Replication connects to a computer using the administrative share (admin$) of the target computer. An account that you plan to use to connect to a computer included in the protection group must have access to the administrative share.
- On Linux computers, Veeam Backup & Replication connects to a computer using SSH.
Keep in mind that to connect to Linux computer via SSH, this Linux computer must be added to the list of trusted hosts. To learn more, see Configuring Security Settings.
- Deploys Veeam Installer Service on each newly discovered computer.
In case of Linux-based computers, Veeam Backup & Replication also deploys Veeam Deployer Service.
- If the automatic Veeam Plug-in deployment option is enabled in the protection group settings, Veeam Backup & Replication deploys Veeam Plug-in on discovered computers. As a part of this process, Veeam Backup & Replication performs the following operations:
- Veeam Installer Service running on the computer collects information about the computer and sends it to Veeam Backup & Replication. The collected data includes details on the computer (platform, host name, guest OS, IP address, BIOS UUID) and Veeam Plug-in (product presence on the computer and version).
- Veeam Backup & Replication uploads the Veeam Plug-in setup file from the distribution server to the discovered computer.
- Veeam Installer Service deploys Veeam Plug-in and accompanying product components (for example, Plug-in Manager and Data Mover) on the target computer.
If Veeam Installer Service detects that Veeam Plug-in is already deployed on the target computer, Veeam Backup & Replication becomes the owner of this Veeam Plug-in. To learn more, see Plug-in Ownership.
- Veeam Installer Service retrieves the TLS certificate with a public key from the backup server and saves a TLS certificate with a public key in the Veeam Plug-in configuration database on the target computer. Veeam Plug-in will use this certificate to connect to Veeam Backup & Replication.
- Plug-in Manager running on the target computer collects information about databases available on the target computer. To learn more, see Database Detection.