Veeam Cloud Connect v13: Tenant Setup and Configuration Guide

Veeam v13 Series
Role: Tenant (customer of a Veeam Cloud Connect service provider)
Applies to: Veeam Backup and Replication v13 (13.0.1+)
Cloud Connect Tenant Setup VBR v13 Off-Site Backup Cloud Repository

What this covers

The Cloud Connect service provider guide in this series covered everything from the provider side: deploying gateways, configuring tenant accounts, setting quotas. This article is the other half of that story. If you are an organization buying Cloud Connect backup services from a provider, this is your setup guide. You will walk out of this with a working backup copy job sending data to your provider's cloud repository, a way to verify your quota usage, and a clear picture of what restore operations look like when you need them.

Cloud Connect is not a cloud backup product in the AWS S3 sense. It is a Veeam-to-Veeam architecture where your VBR installation sends data over an encrypted, deduplicated connection to a service provider who runs a VBR infrastructure on their end. Your data is logically isolated from other tenants even though it lands on the same physical repository hardware.

How Cloud Connect works from the tenant side

Your VBR installation connects to the provider's Cloud Gateway, which is a specialized component that handles the authentication, SSL encryption, and traffic routing for all tenant connections. You authenticate with credentials the provider gives you. Once connected, the cloud repository appears in your VBR console as just another backup repository, indistinguishable in the UI from a local repo except for its location.

Your backup and backup copy jobs target the cloud repository the same way they would target any local repository. The difference is that all data in transit flows through the Cloud Gateway connection, which is encrypted with a TLS certificate presented by the provider's infrastructure. You do not need to set up VPN tunnels or configure firewall rules beyond opening outbound TCP 6180 to the provider's gateway address.

Quota is enforced by the provider

The provider sets your storage quota on the cloud repository. When you run jobs targeting the cloud repo, VBR checks available quota before each session. If a job would exceed your quota, it fails with a quota exceeded error. Contact your provider to increase quota before it becomes a problem. VBR shows your current quota usage in the Backup Infrastructure view after you add the service provider.

What you need from your service provider

Before you can configure anything in VBR, you need four pieces of information from your provider: the DNS name or IP address of their Cloud Gateway, the port it listens on (typically 6180 but providers sometimes customize this), your tenant username, and your tenant password. Some providers also issue a certificate thumbprint for you to verify during the initial connection, which is worth requesting if they offer it as it prevents man-in-the-middle attacks during the first handshake.

Your provider should also tell you your storage quota, whether the repository supports immutability, and any lease expiry date on your account. Knowing the lease date matters because when a lease expires, your ability to run jobs, restore data, and access the cloud repository all stop until the lease is renewed.

v13 tenant version requirement

If your provider has already upgraded their Cloud Connect infrastructure to v13, you need to be running VBR 12.3.2.3617 or later on your tenant VBR server to connect. VBR 12.3.1 and older will fail to authenticate against a v13 Cloud Gateway. Upgrade your tenant VBR before attempting to connect to a v13 provider.

Adding the service provider in VBR

Step 1

Open the Service Providers section

In the VBR console, go to the Backup Infrastructure view. In the left inventory pane, you will see a Service Providers node. Right-click it and select Add Service Provider.

Step 2

Enter the provider DNS name and port

Enter the provider's Cloud Gateway DNS name in the DNS name or IP address field. Set the port to whatever your provider specified, typically 6180. Leave the description blank or add a note for internal reference. Click Next.

Step 3

Verify the TLS certificate

VBR will connect to the gateway and display the certificate it receives. Compare the thumbprint to what your provider gave you. If they match, click Trust and Continue. If you do not have a thumbprint from the provider, inspect the certificate issuer and expiry and make a judgment call. For production connections, always verify the thumbprint before trusting.

Step 4

Enter your tenant credentials

Enter the tenant username and password provided by your service provider. These credentials are specific to Cloud Connect and are not Windows or Active Directory accounts. They exist only in the provider's VBR database. Note that Active Directory-based tenant authentication was removed for new tenant accounts in v13, so if you see an option for AD authentication it applies only to legacy tenant accounts that predate v13.

Step 5

Finish and review the connection

VBR will connect, authenticate, and retrieve information about the resources the provider has allocated to your account. Click Finish. The service provider will appear under the Service Providers node. Expanding it shows the cloud repositories and, if you have Cloud Connect Replication enabled, any cloud hosts allocated to you.

Verifying the cloud repository and quota

After adding the service provider, go to Backup Repositories in the Backup Infrastructure view. The cloud repository will appear here listed with the provider's name as a prefix. Right-click it and select Properties to see the quota details, including total quota assigned, space used, and space remaining. This is the same view your provider sees, so the numbers should match what they tell you.

Run a quick connectivity test by right-clicking the cloud repository and selecting Test Connection. If you get a success message, the connection path from your VBR server through the gateway to the repository is clear and working.

Creating a backup copy job to the cloud repository

The most common use of Cloud Connect from the tenant side is backup copy jobs, where you copy your local backups off-site to the provider. This follows the 3-2-1 rule: three copies, two media types, one off-site. Your local backup jobs run as normal, and the backup copy job reads from those local restore points and sends copies to the cloud repository.

Step 1

Create a new Backup Copy job

From the Home view, right-click Jobs, select Backup Copy, and choose your platform. Give the job a name that indicates this is the off-site copy, something like Cloud Offsite Copy - Critical VMs.

Step 2

Set the copy schedule

Choose between an Immediate copy mode, which runs continuously and copies restore points as they are created by backup jobs, and a Periodic copy mode, which runs on a schedule and transfers whatever restore points have accumulated since the last run. Periodic copy with a daily or 12-hour window works well for most environments and is easier to predict in terms of bandwidth usage.

Step 3

Select the source backups

On the Objects step, click Add, and select the backup jobs or individual VMs whose restore points you want copied to the cloud. You are selecting from backups that already exist locally, not from live VMs. The backup copy job will read from those backup files.

Step 4

Target the cloud repository

On the Target step, select the cloud repository from the backup repository dropdown. It will be listed with your provider's name. Set the restore points to keep on the cloud side. This can differ from your local retention. Many organizations keep fewer restore points off-site, for example 7 daily or 4 weekly, to manage cloud repository quota consumption.

Step 5

Configure data transfer

Backup copy jobs to cloud repositories go through the Cloud Gateway by default. If you have WAN accelerators deployed, you can enable them here to reduce the bandwidth consumed by the copy job. Enable encryption for data in flight if your provider does not already enforce it at the gateway level. Check with your provider.

Direct backup job to cloud (where supported)

In addition to backup copy jobs, Veeam supports targeting the cloud repository directly from a standard backup job. This means your primary backup runs straight to the provider's cloud repository rather than to a local repository first. This works but it has tradeoffs worth understanding.

The main advantage is simplicity: you do not need local storage for backups that go off-site anyway. The main disadvantage is that every backup job now depends on WAN connectivity to your provider. If that connection is down during your backup window, jobs fail. For most organizations, a local primary backup with a cloud backup copy provides better resilience than direct-to-cloud backup. Use direct cloud backup for endpoints and remote machines that do not have a local Veeam repository available to them.

Restoring from cloud repository

Restoring from the cloud repository works through the same restore wizards as restoring from a local repository. Go to the Home view, open the Backups node, and look under the cloud repository name. The backups stored there appear as normal backup objects. Right-click the VM you want to restore and choose your restore type.

Be realistic about restore times from cloud repositories over a WAN link. A 200 GB VM restore at 100 Mbps takes roughly 4 to 5 hours if everything goes perfectly. Plan for this in your RTO calculations. Cloud repositories are an excellent safety net for long-term retention and off-site copies, but for fast RTO you still want your recent backups on local storage. Instant VM Recovery from a cloud repository is possible but performance depends entirely on the quality of your WAN connection to the provider.

Restoring to the provider's cloud host

If your provider has allocated Cloud Connect Replication resources to your account in addition to a cloud repository, you can restore a VM directly to a cloud host at the provider's site. This is useful for disaster recovery scenarios where your primary site is unavailable and you need VMs running at the provider while your own infrastructure recovers. Ask your provider whether your account includes cloud host access.

Version compatibility

Cloud Connect has a version dependency between provider and tenant. The provider must always be running the same or newer version of VBR than the tenant. VBR v13.0.1 on the provider side is compatible with tenants running VBR 12.3.2.3617 and later, as well as any v13 build. Veeam Agent for Windows 6.3.2 and later and Veeam Agent for Linux 6.3.2 and later are also compatible with a v13 Cloud Connect provider.

When upgrading, the provider upgrades first. Tenants can then upgrade at their own pace. If your provider upgrades to v14 in the future, you will need to upgrade your tenant VBR to a compatible version before that cutoff. Your provider should give you advance notice of major version upgrades and the compatibility window.

What you have set up
  • Service provider added and authenticated in your VBR console
  • Cloud repository visible with quota usage confirmed
  • Backup copy job sending daily copies of critical VMs to the cloud
  • Restore path from cloud repository tested and understood

Cloud Connect is one of the cleaner implementations of off-site backup that exists in the market. When you are on the tenant side, the complexity lives at the provider. You get a repository that looks local, behaves predictably, and encrypts everything in transit automatically. The part that needs attention is making sure your quota keeps pace with your data growth and that your retention settings on the cloud side reflect what you actually need to store there rather than defaulting to whatever the job wizard suggests.

Read more