1. Impossible Cloud Knowledge Base
  2. Integrations with other applications

How to Integrate Acronis Cyber Protect Cloud with Impossible Cloud Storage

This article guides administrators on integrating Acronis Cyber Protect Cloud with Impossible Cloud Storage, covering storage account creation, configuration, and setting up a backup location.

Prerequisites

  • Administrator access to Acronis Cyber Protect Cloud Partner Tenant
  • Channel partner's Administrator or Distributor's partner Administrator access to Impossible Cloud Management Console.
  • Necessary permissions to create and manage storage accounts and backup locations.

Steps to Integrate Acronis Cyber Protect Cloud with Impossible Cloud Storage

1. Create Storage Accounts in Impossible Cloud Management Console

2. Configure Integration and Map Acronis Customer Tenants to Impossible Cloud Storage Account

  • Configure Integration: Follow the instructions in this guide to configure the Acronis Cyber App integration.

Ensure Acronis customer tenants are mapped correctly to the created Impossible Cloud Storage Accounts.

3. Access Acronis Cyber Protection service

  • Follow the instructions in this guide to access the Acronis Cyber Protect web console.

4. Create a Bucket for Backup Location

  • Access Buckets: In the Acronis Cyber Protect web console, navigate to the Management => Impossible Cloud section. This section will appear only after the Step 2. of this guide is complete.
  • Use existing Bucket (for non-immutable backups): You can use an automatically created bucket (the name will be like this: "acronis-cyberapp-20240724-7233-cc218") that will be used as a new backup location.

The pre-created bucket cannot be used with the backup immutability feature. If you need to use immutability, you will need to create a new bucket!

  • Create a new Bucket with immutability: click the Create Bucket button. Give it a name that must be unique across all the buckets of all the Impossible Cloud Storage Accounts. Ensure to enable both Versioning and Object Lock switches.

Please pay attention to NOT enable default Retention for the bucket.

5. Create an Access Key

  • In the same section, you will find options for creating and deleting keys.
  • Create a Key: Click on "Create Key" to generate a new key.
  • Copy Access Key and Secret Key: Copy and save both Access Key and Secret Key securely. These will be used in the next steps for configuring the Backup Location for this particular Acronis customer tenant.

6. Add a New Backup Location in Acronis Backup Console

  • Access Backup Storage: Navigate to Backup Storage tab on the left in Acronis Cyber Protect web console.
  • Add Location: Click on + Add location, select Public Cloud, choose Impossible Cloud and then click Connect and select the eu-central-2 region. 

Until further notice, only  the "eu-central-2" region should be selected.

  • Select any Management agent which is currently online.
  • Enter Credentials: Enter the Access Key from Step 5 into the Access key ID field and the Secret Key into the Access key secret field.
  • Connect: Click "Connect" to save the backup location settings.
  • On the next screen, give the new backup location a meaningful Location name.
  • Open the drop-down Buckets menu and select a bucket for this particular backup location.
  •  Set the backup immutability period in days as per your needs.

7. Ensure proper configuration of Immutability Period and Cleanup rules

Ensure that the Cleanup rules of your protection plan exceed the Backup Immutability Period. For example, if the immutability period is set to 30 days, the Cleanup setting of your protection plan for that backup location should be at least 30 days. Otherwise, a backup agent will remove the backup from its database but will be unable to delete it from Impossible Cloud Storage due to immutability protection. Consequently, without being cleaned up, the cloud storage usage will continue to increase, potentially leading to unexpected cost increases.
 

    Result

    Once the public cloud location is created, it can be used as a destination in Protection Plans and Replication Plans. For detailed instructions on adding access to a public cloud connection, refer to the Acronis guide.


    For further assistance, please refer to the linked guides or contact support.