{"version":1,"pages":[{"id":"-MgA7xlOjBHt2qu7ybFx","title":"1  Introduction to N2W","pathname":"/user-guide","siteSpaceId":"sitesp_WVytv","description":"Welcome to the N2W Backup & Recovery User Guide. Here you will find all the documentation that you need to make the most of N2W."},{"id":"-MgA9lkImTkVGUkIA5n3","title":"2  Installing and Upgrading N2W","pathname":"/user-guide/2-configuring-n2ws","siteSpaceId":"sitesp_WVytv"},{"id":"-MgAAdx8GYt6maHr7S1z","title":"3  Start Using N2W","pathname":"/user-guide/3-start-using-n2ws","siteSpaceId":"sitesp_WVytv","description":"Now you can jump in and start building your backup and recovery services."},{"id":"-MgACX7BsodUctCpKW-e","title":"4  Defining Backup Policies","pathname":"/user-guide/4-defining-backup-policies","siteSpaceId":"sitesp_WVytv","description":"In this section, you will learn how to build the foundations for your backup and recovery management program."},{"id":"-MgADhzwftnYx4swvRxS","title":"5  Consistent Backup with N2W","pathname":"/user-guide/5-consistent-backup","siteSpaceId":"sitesp_WVytv","description":"This section explains a few key concepts to help you use N2W correctly."},{"id":"-MgAE5rhopwwn6gxyRlE","title":"6  Windows Instances Backup","pathname":"/user-guide/6-windows-instances-backup","siteSpaceId":"sitesp_WVytv","description":"When working with Windows, it is important to understand some of its basic features."},{"id":"-MgAFesl1Wus8lSj-kNd","title":"7  Linux/Unix Instances Backup","pathname":"/user-guide/7-linux-unix-instances-backup","siteSpaceId":"sitesp_WVytv","description":"When working with Linux/Unix, it is important to understand some of its basic features."},{"id":"-MgAFx-Sm9w-sf5Ppibb","title":"8  Using Elastic File System (EFS)","pathname":"/user-guide/8-using-elastic-file-system-efs","siteSpaceId":"sitesp_WVytv","description":"In this section, you will learning about working with Amazon Elastic File System."},{"id":"-MgAGUjIIMS1zImR5GcB","title":"9  Additional Backup Topics","pathname":"/user-guide/9-additional-backup-topics","siteSpaceId":"sitesp_WVytv","description":"Here we cover some backup topics that haven't been addressed earlier."},{"id":"-MgAHCZ7sqwIEw5TZ9vx","title":"10  Performing Recovery","pathname":"/user-guide/10-performing-recovery","siteSpaceId":"sitesp_WVytv","description":"Now that you have created some backups, it is time to perform a recovery."},{"id":"-MgAqZam_XwpX_bolwVc","title":"11  Disaster Recovery","pathname":"/user-guide/11-disaster-recovery","siteSpaceId":"sitesp_WVytv","description":"In this section, you will learn how to plan and configure your disaster recovery solution."},{"id":"-MgAtSv_k9t5SOpmHTLk","title":"12 Cross-Account DR, Backup, and Recovery","pathname":"/user-guide/12-cross-account-dr-backup-and-recovery","siteSpaceId":"sitesp_WVytv","description":"With cross-account backup and recovery, you can easily copy backups between accounts as part of the disaster recovery process."},{"id":"-MgAtogxyjqT3t4AzF6J","title":"13 File-Level Recovery","pathname":"/user-guide/13-file-level-recovery","siteSpaceId":"sitesp_WVytv","description":"Here you will learn how to recover specific files and folders rather than an entire volume."},{"id":"-MgAu8WHQVaId8VD4X8C","title":"14  Tag-based Backup Management","pathname":"/user-guide/14-tag-based-backup-management","siteSpaceId":"sitesp_WVytv","description":"N2W's tag-based backup management allows you to automatically fine-tune functionality."},{"id":"-MgAuiK8cDQ8DvmqtcME","title":"15  Resource Control","pathname":"/user-guide/15-resource-control","siteSpaceId":"sitesp_WVytv","description":"Learn how to control the state of resources for each account during the course of a week or in the future."},{"id":"-MgAv8WoBCu-07AsXdXr","title":"16  Security Concerns and Best Practices","pathname":"/user-guide/16-security-concerns-and-best-practices","siteSpaceId":"sitesp_WVytv","description":"Understand how to create the optimum security profile for your system."},{"id":"-MgAvRx-HStvCVttOpHN","title":"17  Alerts, Announcements, Notifications, and Reporting","pathname":"/user-guide/17-alerts-announcements-notifications-and-reporting","siteSpaceId":"sitesp_WVytv","description":"N2W provides many ways to communicate with you about the status and state of your resources and operations."},{"id":"-MgAxcLKFeRh48ZVHpdn","title":"18  N2W User Management","pathname":"/user-guide/18-user-management","siteSpaceId":"sitesp_WVytv","description":"In this section, you will learn about the different types of users and the variety of user-related reporting from N2W."},{"id":"-MgAyikZEE9K-fRSNEAR","title":"19  N2W IdP Integration","pathname":"/user-guide/19-n2ws-idp-integration","siteSpaceId":"sitesp_WVytv","description":"Here you will learn about integrating Identity Providers (IdP) with N2W."},{"id":"-MgB77zWBlUTvUc4vU2Z","title":"20  Configuring N2W with CloudFormation","pathname":"/user-guide/20-configuring-n2ws-with-cloudformation","siteSpaceId":"sitesp_WVytv","description":"You can model and manage your infrastructure resources with AWS CloudFormation."},{"id":"-MgB7WYujLKDzr_cV4P7","title":"21  Managing Snapshots with Lifecycle Policies","pathname":"/user-guide/21-managing-snapshots-with-lifecycle-policies","siteSpaceId":"sitesp_WVytv","description":"Manage the destination and costs associated with backup storage by using Lifecycle Policies."},{"id":"-MgCjWKSdWZnDmPDLcXe","title":"22  Configuring Workers","pathname":"/user-guide/22-configuring-workers","siteSpaceId":"sitesp_WVytv","description":"Learn how to perform operations in non-N2W server regions using temporary worker instances."},{"id":"-MgClbVyC5uQsuuiyj-O","title":"23  Capturing and Cloning in Network Environments with AWS","pathname":"/user-guide/23-capturing-and-cloning-in-vpc-environments","siteSpaceId":"sitesp_WVytv","description":"In this section, you will learn how to use a Amazon Virtual Private Cloud (VPC) to launch AWS resources into a logically separate virtual network."},{"id":"ar8bxU7iBae5qjmjTU6p","title":"24  Capturing and Cloning in VNet Environments with Azure","pathname":"/user-guide/23-capturing-and-cloning-in-vpc-environments-1","siteSpaceId":"sitesp_WVytv","description":""},{"id":"-MgCmJvFB3N19_P8e_Yb","title":"25  Orchestrating Recovery Scenarios","pathname":"/user-guide/24-orchestrating-recovery-scenarios","siteSpaceId":"sitesp_WVytv","description":"Design a procedure to execute multiple recoveries within one recovery session."},{"id":"-MgCmy7Z43fhdCE1hoXS","title":"26  Monitoring Costs and Savings","pathname":"/user-guide/25-monitoring-costs-and-savings","siteSpaceId":"sitesp_WVytv","description":"This section describes how to monitor and manage N2W costs."},{"id":"-MgCnGsq9V_FyHGX87WU","title":"27  Using N2W with Azure","pathname":"/user-guide/26-using-n2ws-with-azure","siteSpaceId":"sitesp_WVytv","description":"Manage the backup and recovery of your Azure resources."},{"id":"hd9lD7hMeVk4m0G16STX","title":"28 Using Wasabi Storage","pathname":"/user-guide/28-using-wasabi-storage","siteSpaceId":"sitesp_WVytv"},{"id":"5zvd5eZwmyPz1vAWH9zf","title":"29 Working with Elastic Kubernetes Service (EKS)","pathname":"/user-guide/29-working-with-elastic-kubernetes-service-eks","siteSpaceId":"sitesp_WVytv","description":"Back up and restore entire EKS clusters and selected Namespaces."},{"id":"-MgCtxhUvfhZqAaHg9cn","title":"Appendix A -Recommended Configuration for Copy to S3","pathname":"/user-guide/appendix-a-recommended-configuration-for-copy-to-s3","siteSpaceId":"sitesp_WVytv","description":"This section describes considerations when configuring Copy to S3 and how to create a VPC S3 endpoint."},{"id":"-MgCuKSL42gHukUML6-A","title":"Appendix B - Agents Configuration Format","pathname":"/user-guide/appendix-b-agents-configuration-format","siteSpaceId":"sitesp_WVytv","description":"In this section, you will learn how to configure agents."},{"id":"-MgCuhznB0QK8NQVz4v1","title":"Appendix C - Time Zones","pathname":"/user-guide/appendix-c-time-zones","siteSpaceId":"sitesp_WVytv","description":"Learn how to set the time zone for a server."},{"id":"-MgCuy3zvvnmw7oehiq-","title":"Appendix D - Datadog Integration","pathname":"/user-guide/appendix-d-datadog-integration","siteSpaceId":"sitesp_WVytv","description":"In this section, you will learn how to integrate Datadog with N2W."},{"id":"-MgCvVUhVMeiWlfoLvmb","title":"Appendix E - Splunk Integration Support","pathname":"/user-guide/appendix-e-splunk-integration-support","siteSpaceId":"sitesp_WVytv","description":"Learn how to integrate Splunk with N2W."},{"id":"1CpcmEVCZhT3ar5qPhcS","title":"Appendix F - Resetting Root Password or MFA","pathname":"/user-guide/appendix-f-resetting-root-password-or-mfa","siteSpaceId":"sitesp_WVytv","description":"Learn how to reset a root password or multi-factor authentication."},{"id":"8SG6O7Z6YbjFbF6rSTsF","title":"Appendix G - Securing Default Certificates on N2W Server","pathname":"/user-guide/appendix-g-securing-default-certificates-on-n2w-server","siteSpaceId":"sitesp_WVytv"},{"id":"nhnnr3r3EA8YP5En73l3","title":"Appendix H - Velero Installation Guide","pathname":"/user-guide/appendix-h-velero-installation-guide","siteSpaceId":"sitesp_WVytv","description":"Follow this guide to install Velero on an EKS Cluster."}]}