background image

Section

Description

Available Actions

and create a seed drive for 

the new protected 

machine's initial transfer.

Incoming Replication

Lists all source machines from 
which the target receives 
replicated data. It includes the 
remote core name, state, 
machines, and progress.

On a target core, in the drop-
down menu, you can select the 
following options:

Details

 — Lists the ID, host 

name, customer ID, email 

address, and comments for 

the replicated core.

Consume

 — Consumes the 

initial data from the seed 

drive and saves it to the 

local repository.

3.

Click the 

Refresh

 button to update the sections of this tab with the latest information.

Managing replication settings 

You can adjust a number of settings for how replication executes on the source and target cores.
To manage replication settings:

1.

In the Core Console, click the 

Replication

 tab.

2.

In the 

Actions

 drop-down menu, click 

Settings

.

3.

In the 

Replication Settings

 window, edit the replication settings described as follows:

Option

Description

Cache lifetime

Specify the amount of time between each target-core status request 
performed by the source core.

Volume image 
session timeout

Specify the amount of time the source core spends attempting to transfer a 
volume image to the target core.

Max. concurrent 
replication jobs

Specify the number of protected machines permitted to replicate to the target 
core at one time.

Max. parallel 
streams

Specify the number of network connections permitted to be used by a single 
protected machine to replicate that machine’s data at one time.

4.

Click 

Save

.

Removing replication 

You can discontinue replication and remove protected machines from replication in several ways. The 
options include:

Removing An Agent From Replication On The Source Core

Removing An Agent On The Target Core

Removing A Target Core From Replication

Removing A Source Core From Replication

89

Summary of Contents for DL1000

Page 1: ...Dell DL1000 Appliance User s Guide ...

Page 2: ...problem WARNING A WARNING indicates a potential for property damage personal injury or death Copyright 2015 Dell Inc All rights reserved This product is protected by U S and international copyright and intellectual property laws Dell and the Dell logo are trademarks of Dell Inc in the United States and or other jurisdictions All other marks and names mentioned herein may be trademarks of their res...

Page 3: ...e Console 14 Updating trusted sites in Internet Explorer 14 Configuring browsers to remotely access the core console 14 Managing licenses 15 Changing a license key 16 Contacting the license portal server 16 Changing the AppAssure language manually 16 Changing the OS language during installation 17 Managing core settings 17 Changing the core display name 17 Changing the nightly job time 18 Modifyin...

Page 4: ...ring your DL1000 30 Upgrading your DL1000 30 Repairing your DL1000 30 Rapid Appliance Self Recovery 30 3 Protecting workstations and servers 33 About protecting workstations and servers 33 Deploying an Agent Push Install 33 Protecting a machine 34 Pausing and resuming protection 36 Deploying the Agent Software when protecting an agent 36 Understanding protection schedules 37 Creating custom schedu...

Page 5: ...n 56 Forcing a snapshot 56 Restoring data 57 About exporting protected data from Windows machines to virtual machines 57 Managing exports 58 Exporting backup information from your Windows machine to a virtual machine 59 Exporting Windows data using ESXi export 59 Exporting Windows data using VMware workstation export 61 Exporting Windows data using Hyper V export 64 Exporting Windows data using Or...

Page 6: ...re from replication 90 Recovering replicated data 91 Understanding failover and failback 91 Performing Failover 91 Performing Failback 92 6 Reporting 94 About reports 94 About the reports toolbar 94 About compliance reports 94 About errors reports 95 About the Core Summary Report 95 Repositories summary 95 Agents summary 96 Generating a report for a Core or agent 96 About the Central Management Co...

Page 7: ...ery Live Recovery is instant recovery technology for VMs or servers It gives you near continuous access to data volumes on virtual or physical servers DL1000 backup and replication technology records concurrent snapshots of multiple VMs or servers providing near instantaneous data and system protection You can resume the use of the server by mounting the recovery point without waiting for a full r...

Page 8: ...and use ensuring data privacy The data can be accessed and decrypted using the encryption key Encryption is performed inline on snapshot data at line speeds without impacting performance Dell DL1000 data protection features Dell DL1000 Core The Core is the central component of the DL1000 deployment architecture The Core stores and manages machine backups and provides services for backup recovery r...

Page 9: ...sk before the snapshot Additionally other enterprise applications such as Microsoft Exchange and SQL use VSS Writer plug ins to get notified when a snapshot is being prepared and when they have to flush their used database pages to disk to bring the database to a consistent transactional state The captured data is rapidly transferred and stored on the Core Replication disaster recovery site or ser...

Page 10: ...port recovery testing or actual recovery operations Customers wanting to perform recovery in the cloud can configure replication on their protected machines on the local cores to an AppAssure service provider In the event of a disaster the MSPs can instantly spin up virtual machines for the customer The DL1000 is not multi tenant The MSPs can use the DL1000 at multiple sites and create a multi ten...

Page 11: ...ware block level snapshots DL1000 performs log truncation of the protected Microsoft Exchange server The following diagram depicts a simple DL1000 deployment DL1000 Agents are installed on machines such as a file server email server database server or virtual machines are connected to and protected by a single DL1000 Core which consists of the central repository The Dell software License Portal ma...

Page 12: ...des information on how to set up the hardware and install the software on your AppAssure solution Owner s Manual Provides information about system features and describes how to troubleshoot the system and install or replace system components Deployment Guide Provides information on hardware deployment and the initial deployment of the appliance User s Guide Provides information about configuring a...

Page 13: ...r system that provides documentation and tools for configuring and managing your system This includes those pertaining to the operating system system management software system updates and system components that you purchased with your system 13 ...

Page 14: ... trusted sites in Internet Explorer 1 Open Internet Explorer 2 If the File Edit View and other menus are not displayed press F10 3 Click the Tools menu and select Internet Options 4 In the Internet Options window click the Security tab 5 Click Trusted Sites and then click Sites 6 In Add this website to the zone enter https Display Name using the new name you provided for the Display Name 7 Click A...

Page 15: ...rd 8 Click OK and then select the Advanced tab 9 Scroll to Multimedia and select Play animations in webpages 10 Scroll to Security check Enable Integrated Windows Authentication and then click OK To modify Mozilla Firefox browser settings 1 In the Firefox address bar type about config and then click I ll be careful I promise if prompted 2 Search for the term ntlm The search should return at least ...

Page 16: ...ortal server 1 Navigate to the Core Console and then click Configuration Licensing The Licensing page is displayed 2 From the License Server option click Contact Now Changing the AppAssure language manually AppAssure allows you to change the language that you had selected while running AppAssure Appliance Configuration Wizard to any of the supported languages To change the AppAssure language to th...

Page 17: ...a language pack is available for your language select Download and install language pack 7 When the language pack is installed the language is displayed as available to use for the Windows display language 8 To make this language your display language move it to the top of your language list 9 Log out and log in again to Windows for the change to take effect Managing core settings The Core setting...

Page 18: ...the load is on network and other system resources As the capacity that is processed increases so does the load on the system 4 In the Maximum Retries text box enter a value to update the maximum number of retries 5 Click OK Adjusting the client time out settings Client Timeout Settings specifies the number of seconds or minutes the server waits before it times out when connecting to a client To ad...

Page 19: ...ettings 2 In the Replay Engine Configuration section click Change The Replay Engine Configuration dialog box appears 3 In the Replay Engine Configuration dialog box specify the IP address Select one of the following To use the preferred IP address from your TCP IP click Automatically Determined To manually enter an IP address click Use a specific IP Address 4 Enter the configuration information de...

Page 20: ...ction settings 1 Navigate to the Core Console click Configuration Settings 2 In the Database Connection Settings section perform one of the following To restore the default configuration click Restore Default To modify the database connection settings click Change On clicking change the Database Connection Settings dialog box appears 3 Enter the settings for modifying the database connection descr...

Page 21: ...tion Archive Core Service Export Protection Replication Rollback Specify the type of alert error warning and informational Specify to whom and where the alerts are sent Options include Email Address Windows Events Logs Syslog Server Specify a time threshold for repetition Specify the retention period for all events Configuring notification groups To configure notification groups 1 From the Core Co...

Page 22: ... Notify by sys logd Select this option if you want alerts to be reported through sys logd Enter the details for the sys logd in the following text boxes Hostname Port 1 Notify by Toast alerts Select this option if you want the alert to appear as a pop up in the lower right corner of your screen 2 Click OK The following message is displayed The Group name cannot be changed after the creation of the...

Page 23: ... connection such as Transport Layer Security TLS or Secure Sockets Layer SSL 4 Click Send Test Email perform the following a In the Send Test Email dialog box enter a destination email address for the test message and click Send b If the test message fails exit the error dialog box and the Send Test Email dialog box and revise your email server configuration settings Repeat step 4 c Click OK to co...

Page 24: ...Configuration dialog box click OK to close the dialog box and save your settings Configuring repetition reduction To configure repetition reduction 1 From the Core Console click Configuration Events 2 From the Repetition Reduction section click Change The Enable Repetition Reduction dialog box appears 3 Select Enable Repetition Reduction 4 In the Store events for text box enter the number of minut...

Page 25: ...t of an improper shut down or a hardware failure NOTE This procedure must only be performed for diagnostic purposes To check a repository 1 Click Configuration Repositories 2 Click the Settings icon next to the Compression Ratio column below the Actions button 3 Click Check The Check Repository dialog box appears 4 In the Check Repository dialog box click Check NOTE When you perform a check all ac...

Page 26: ...iting an encryption key To edit an encryption key 1 From the Core Console click Configuration Security The Encryption Keys screen is displayed 2 Click next to the name of the encryption key that you want to edit and then click Edit The Edit Encryption Key dialog box appears 3 In the Edit Encryption Key dialog box edit the name or modify the description of the encryption key 4 Click OK Changing an ...

Page 27: ...n encryption key To remove an encryption key 1 From the Core Console click Configuration Security 2 From the Configuration drop down menu for the encryption key that you want to remove select Remove The Remove Key dialog box appears 3 In the Remove Key dialog box click OK to remove the encryption key NOTE Removing an encryption key does decrypt the data Managing cloud accounts Your DL Appliance al...

Page 28: ... Storage Account Name Enter the name of your Windows Azure storage account Access Key Enter the access key for your account Display Name Create a display name for this account in AppAssure for example Windows Azure 1 Amazon S3 Access Key Enter the access key for your Amazon cloud account Secret Key Enter the secret key for this account Display Name Create a display name for this account in AppAssu...

Page 29: ...loud account and the amount of time spent on an attempt before it times out To configure the connection settings for your cloud account 1 In the Core Console click the Configuration tab 2 In the left menu click Settings 3 On the Settings page scroll down to Cloud Configuration 4 Click the drop down menu next to the cloud account you want to configure and then do one of the following Click Edit The...

Page 30: ...a status light next to each subsystem along with a status description indicating the health of the subsystem The Overall Status page also provides links to tools that drill down into the details of each subsystem which can be helpful for troubleshooting warnings or errors The System Administrator link available for the Appliance Hardware and Storage Hardware subsystems prompts you to log on to the...

Page 31: ...d This operation will recover the operating system All OS disk data will be overwritten in a dialog box 9 Click Yes The operating system disk starts restoring back to factory reset 10 Click Finish Creating the RASR USB key NOTE After the initial setup of the software the AppAssure Appliance Configuration Wizard starts automatically The Appliance tab status icon is yellow To create a RASR USB key 1...

Page 32: ...ly Remove USB Drive or the Windows Eject Drive function to prepare the USB key for removal Otherwise the content in the USB key may be damaged and the USB key will not work as expected Remove the key label and store for future use 32 ...

Page 33: ...achines at the same time see Deploying To Multiple Machines NOTE Agents must be configured with a security policy that makes remote installation possible To deploy an agent 1 From the Core Console s left navigation area click Protected Machines 2 Click Actions Deploy Agent The Deploy Agent dialog box appears 3 In the Deploy Agent dialog box enter the logon settings as described in the following ta...

Page 34: ...tions If you do not need to define a repository or establish encryption select Typical If you do not wish to see the Welcome page for the Protect Machine Wizard in the future select the Skip this Welcome page the next time the wizard opens option 4 Click Next 5 On the Connection page enter the information about the machine to which you want to connect as described in the following table Text Box D...

Page 35: ... to see repository and encryption options If you selected Advanced configuration for the Protect Machine Wizard and specified custom protection then click Next and proceed to Step 10 to choose which volumes to protect 10 On the Protection Volumes page select the volumes on the agent machine that you want to protect If any volumes are listed that you do not want to include in protection click in th...

Page 36: ...d as appropriate NOTE To resume protection select Resume Protection from the Protected Machines drop down menu Deploying the Agent Software when protecting an agent You can download and deploy agents during the process of adding an agent for protection NOTE This procedure is not required if you have already installed the Agent software on a machine that you want to protect To deploy agents during ...

Page 37: ...apshots is 3 hours The second period is for weekends Saturday and Sunday The default interval for the second period is 3 hours When protection is first enabled the schedule is activated Thus using the default settings regardless of the current time of day the first backup will occur every 3 hours The first backup transfer saved to the Core is called a base image snapshot All data on all specified ...

Page 38: ...desired start time and then click Done To specify the current time click Now 3 To set a single time of day for a single backup to occur daily select Daily protection time and then enter a time in format HH MM AM 4 To define the schedule without beginning backups select Initially pause protection Once you pause protection from the wizard it remains paused until you explicitly resume it Once you res...

Page 39: ...ppropriate category weekdays or weekends a new time period appears If the first period started later than 12 00 AM then AppAssure automatically starts this period at 12 00 Following the above example this second period starts at 12 00 AM You may need to adjust hours or minutes for the start and end times b Drag the Hours and Minutes slider controls as appropriate for the desired start and end time...

Page 40: ... the data from this machine NOTE This setting can only be changed if there are no recovery points or the previous repository is missing Viewing system information for a machine The Core Console displays all the machines that are being protected To view system information for a machine 1 In the left navigation area of the Core Console under Protected Machines select the machine to view detailed sys...

Page 41: ... specified by the schedule defined for protecting the machine Restore A process that restores backup information on a protected machine Data transfer in DL1000 involves the transmission of a volume of data along a network from AppAssure Agent machines to the Core In the case of replication transfer also occurs from the originating or source Core to the target Core Data transfer can be optimized fo...

Page 42: ... lower For example if Maximum Current Streams is set at 8 set this option to 7 Maximum Retries Sets the maximum number of retries for each protected machine if some of the operations fail to complete Maximum Segment Size Specifies the largest amount of data in bytes that a computer can receive in a single TCP segment The default setting is 4194304 CAUTION Do not change this option from the default...

Page 43: ...policies enforce the periods for which backups are stored on short term fast and expensive media Sometimes certain business and technical requirements mandate extended retention of these backups but use of fast storage is cost prohibitive Therefore this requirement creates a need for long term slow and cheap storage Businesses often use long term storage for archiving both compliance and noncompli...

Page 44: ...t an account from the drop down list NOTE To select a cloud account you must first add it to the Core Console See Adding A Cloud Account Container Select a container associated with your account from the drop down menu Folder Name Enter a name for the folder in which the archived data is to be saved The default name is AppAssure 5 Archive DATE CREATED TIME CREATED 4 Click Next 5 On the Machines pa...

Page 45: ... archive Incremental Lets you add recovery points to an existing archive It compares recovery points to avoid duplicating data that already exists in the archive Comment Enter any additional information that is necessary to capture for the archive The comment will be displayed if you import the archive later Use compatible format Select this option to archive your data in a format that is compatib...

Page 46: ...It is used to establish logon credentials for the network share Cloud Account Select an account from the drop down list NOTE To select a cloud account you must first add it to the Core Console See Adding A Cloud Account Container Select a container associated with your account from the drop down menu Folder Name Enter a name for the folder in which the archived data is to be saved The default name...

Page 47: ... In the Core Console click Tools Diagnostics View Log The Download Core Log page appears 2 Select Click here to begin the download A message will appear alerting you to open or save the file 3 Choose your preferred method for handling the log file Uploading machine logs 1 Navigate to the Core Console click Tools Diagnostics Upload Log The Upload Log page is displayed 2 Select Click here to begin t...

Page 48: ...ile System type Space Usage Current Schedule Next Snapshot Total size Used Space Free space If SQL Server is installed on the machine detailed information about the server also appears and includes Online status Name Install Path Version If Exchange Server is installed on the machine detailed information about the server and mail stores also appears and includes Version Install Path Data Path Name...

Page 49: ...e machines that you are deploying must have access to the internet to download and install bits as AppAssure uses the web version of the AppAssure Agent Installer to deploy the installation components If access to the internet is not available you can push the AppAssure Agent installation program from the Core machine You can download core and agent updates from the License Portal Monitoring the d...

Page 50: ... click Next Text Box Description Host The host name or IP address of the Active Directory domain or of the VMware vCenter Server ESX i virtual host Username Enter the username used to connect to this machine for example Administrator Password Enter the secure password used to connect to this machine To add the machines manually select Add the machines manually Click Next 5 On the Machines page to ...

Page 51: ...urity 12 Enter the information as described in the following table to add an encryption key for the Core Text Box Description Name Enter a name for the encryption key Description Enter a description to provide additional details for the encryption key Passphrase Enter the passphrase used to control access Confirm Passphrase Re enter the passphrase you just entered 13 Click Finish to save and apply...

Page 52: ...epository Snapshots capture and store the state of a disk volume at a given point in time while the applications that generate the data are still in use In AppAssure you can force a snapshot temporarily pause snapshots and view lists of current recovery points in the repository as well as delete them if needed Recovery points are used to restore protected machines or to mount to a local file syste...

Page 53: ... The Actions menu includes the following operations that you can perform on the selected recovery point Mount Select this option to mount the selected recovery point For more information about mounting a selected recovery point see Mounting A Recovery Point For A Windows Machine Export From the Export option you can export the selected recovery point to ESXi VMware workstation or HyperV Restore Se...

Page 54: ...t click Mount The Mount Recovery Points dialog box appears 5 In the Mount dialog box edit the text boxes for mounting a recovery point as described in the following table Text Box Description Mount Location Local Folder Specify the path used to access the mounted recovery point Volume Images Specify the volume images that you want to mount Mount Type Specify the way to access data for the mounted ...

Page 55: ...ple 293cc667 44b4 48ab 91d8 44bc74252a4f 7 Enter the following command to list the recovery points that are available for a specified machine lr line_number_of_machine 8 Enter the following command to select and mount the specified recovery point at the specified mount point path m volume_recovery_point_ID_number path 9 To verify the mount was successful enter the following command which should li...

Page 56: ...s expand the orphaned recovery point This recovery point is labeled in the Type column as Incremental Orphaned 4 Next to Actions click Delete The Delete Recovery Points window appears 5 In the Delete Recovery Points window click Yes CAUTION Deleting this recovery point deletes the entire chain of recovery points including any incremental recovery points that occur before or after it until the next...

Page 57: ... copy of the data If a protected machine goes down you can boot up the virtual machine to then perform recovery The following diagram shows a typical deployment for exporting data to a virtual machine Figure 4 Exporting data to a virtual machine You create a virtual standby by continuously exporting protected data from your Windows machine to a virtual machine When you export to a virtual machine ...

Page 58: ...Virtual Standby tab On the Virtual Standby tab you can view a table of saved export settings which includes the information described in the following table Menu Description Status NOTE The status of the virtual standby configuration is defined by the color of the icon Green The Virtual Standby is successfully configured is active and not paused The next Virtual Standby export will be performed af...

Page 59: ...e The type of export as either One time or Continuous Status The progress of the export displayed as a percentage in a progress bar Exporting backup information from your Windows machine to a virtual machine You can export data from your Windows machines to a virtual machine VMware ESXi and Hyper V by exporting all of the backup information from a recovery point as well as the parameters defined f...

Page 60: ... Enter the logon credentials for the host machine Password Enter the logon credentials for the host machine 3 On the Virtual Machine Options page enter the information described in the following table Text Box Description Resource Pool Select a resource pool from the drop down list Data Store Select a data store from the drop down list Virtual Machine Name Enter a name for the Virtual Machine Memo...

Page 61: ...Store Select a data store from the drop down list Virtual Machine Name Enter a name for the virtual machine Memory Click Use a specific amount of RAM to specify how much RAM to use For example 4096 MB The minimum amount allowed is 512 MB and the maximum is determined by the capability and limitations of the host machines Recommended Disk Provisioning Select the type of disk provisioning as either ...

Page 62: ...l folder or network share on which to create the virtual machine NOTE If you specified a network share path you will need to enter a valid logon credentials for an account that is registered on the target machine The account must have read and write permissions to the network share User Name Enter the logon credentials for the virtual machine If you specified a network share path you must enter a ...

Page 63: ...ick Next Navigate to the machine you want to export and on the Summary tab in the Actions drop down menu for that machine click Export Virtual Standby 2 On the Destination page of the Export Wizard click Recover to a Virtual Machine VMware Workstation 3 Click Next 4 On the Virtual Machine Options page enter the parameters for accessing the virtual machine as described in the following table Text B...

Page 64: ...xport immediately instead of after the next scheduled snapshot 6 Click Next 7 On the Volumes page select the volumes to export for example C and D click Next 8 On the Summary page click Finish to complete the wizard and to start the export NOTE You can monitor the status and progress of the export by viewing the Virtual Standby or Events tab Exporting Windows data using Hyper V export In AppAssure...

Page 65: ...ocation must have sufficient space to hold the VM metadata and virtual drives needed for the virtual machine 5 Enter the name for the virtual machine in the Virtual Machine Name text box The name that you enter appears in the list of virtual machines in the Hyper V Manager console 6 Click one of the following Use the same amount of RAM as the source machine to identify that the RAM use is identica...

Page 66: ...ptions page in the VM Machine Location text box enter the path or location for the virtual machine For example D export The VM location must have sufficient space to hold the VM metadata and virtual drives needed for the virtual machine 7 Enter the name for the virtual machine in the Virtual Machine Name text box The name that you enter appears in the list of virtual machines in the Hyper V Manage...

Page 67: ...en click Next 5 On the Destination page in the Export Wizard in the Recover to Virtual machine drop down menu select VirtualBox click Next 6 On the Virtual Machine Options page select Remote Linux Machine 7 Enter the parameters for accessing the virtual machine as follows Text Box Description VirtualBox Host Name Enter an IP address or host name for the VirtualBox server This field represents the ...

Page 68: ... RAM as the source machine to specify that the RAM configuration is the same as the source machine Click Use a specific amount of RAM to specify how much RAM to use for example 4096 Megabytes MB The minimum amount allowed is 512 MB and the maximum is determined by the capability and limitations of the host machine 5 To specify a user account for the virtual machine select Specify the user account ...

Page 69: ... Step 7 If you want to restore data from the selected recovery point to a different protected machine for example to replace the contents of Machine2 with data from Machine1 then select Recover to a protected machine only non system volumes select the destination machine for example Machine2 from the list and then click Next The Volume Mapping page appears Proceed to Step 7 If you want to restore ...

Page 70: ...2 bit 11 Optionally to set up network parameters for the restored agent or to use UltraVNC select Show advanced options and do one of the following To establish a network connection for the restored machine select Use the following IP address as described in the following table Option Description IP Address Specify an IP address or host name for the restored machine Subnet Mask Specify the subnet ...

Page 71: ... must be selected to perform the restore c Select the destination disk for the restore d Click Next and then proceed to Step 19 18 If you want to map volumes manually do the following a Select Manual volume mapping b In the Manual volume mapping area from the Destination Volumes drop down list for each volume select the volume you want to restore If you do not wish to restore a listed volume clear...

Page 72: ...ber in this command instead of the line item number A list is displayed that shows the base and incremental recovery points for that machine This list includes a line item number date timestamp location of volume size of recovery point and an ID number for the volume that includes a sequence number at the end for example 293cc667 44b4 48ab 91d8 44bc74252a4f 2 which identifies the recovery point 6 ...

Page 73: ...achine Roadmap for performing a Bare Metal Restore for a Windows machine To perform a BMR for a Windows machine 1 Create a boot CD 2 Burn the image to disk 3 Boot the target server from the boot CD 4 Connect to the recovery disk 5 Map the volumes 6 Initiate the recovery 7 Monitor the progress Creating a bootable CD ISO image To perform a BMR for a Windows machine you must create a bootable CD ISO ...

Page 74: ...IP address and enter the IP address subnet mask default gateway and DNS server in the appropriate fields You must specify all of these fields 2 If required in the UltraVNC Options select Add UltraVNC and then enter the UltraVNC options The UltraVNC settings enable you to manage the recovery console remotely while it is in use NOTE This step is optional If you need remote access to the recovery con...

Page 75: ...erver load the boot CD and then start the machine 2 Specify to Boot from CD ROM which loads the following Windows 7 PE AppAssure Agent software The AppAssure Universal Recovery Console starts and displays the IP address and authentication password for the machine 3 Record the IP address displayed in the Network Adapters Settings pane and the authentication password displayed in the Authentication ...

Page 76: ...m which you want to restore then click Rollback 6 In the Rollback dialog box under Choose Destination select Recovery Console Instance 7 In the Host and Password text boxes enter the IP address and the authentication password for the new server to which you want to restore data NOTE The Host and Password values are the credentials you recorded in the previous task For more information see Loading ...

Page 77: ...l completion of the task 2 Optionally to monitor the rollback task progression from the Active Task dialog box click Open Monitor Window You can view the status of the recovery as well as the start and end times from the Monitor Open Task window NOTE To return to the recovery points for the source machine from the Active Task dialog box click Close Starting the restored target server To start the ...

Page 78: ... window 2 If needed create a new disk partition for example by running the fdisk command as root and make this partition bootable by using the a command 3 Run the AppAssure aamount utility as root for example sudo aamount 4 At the AppAssure mount prompt enter the following command to list the protected machines lm 5 When prompted enter the IP address or host name of your AppAssure Core server 6 En...

Page 79: ... before unmounting the volume bsctl d path to volume In this command path to volume does not refer to the mount point of the volume but instead refers to the file descriptor of the volume it must be in a form similar to this example dev sda1 Installing the screen utility Before you begin utilizing the AppAssure commands you can install the screen utility The screen utility enables you to scroll th...

Page 80: ... the root and boot volumes 6 Install Grand Unified Bootloader GRUB by using the following commands mount bind dev mnt dev mount bind proc mnt proc chroot mnt bin bash grub install dev sda 7 Verify that the boot grub grub conf file contains the correct UUID for the root volume or update it as needed by using a text editor 8 Remove the Live CD disk from the CD ROM drive and restart the Linux machine...

Page 81: ...u replicate to an MSP you can use built in workflows that let you request connections and receive automatic feedback notifications Figure 5 Basic Replication Architecture Replication begins with seeding The initial transfer of deduplicated base images and incremental snapshots of the protected agents which can add up to hundreds or thousands of gigabytes of data Initial replication can be seeded t...

Page 82: ...nage replication settings as needed For more information on managing replication settings see Managing Replication Settings Recover replicated data in the event of disaster or data loss For more information on recovering replicated data see Recovering Replicated Data Replicating to a self managed core A self managed core is a core to which you have access often because it is managed by your compan...

Page 83: ...Use a seed drive to perform initial transfer If you currently have one or more machines replicating to a target core you can include these protected machines on the seed drive by selecting With already replicated b Click Next c On the Seed Drive Location page use the Location type drop down list to select one of the following Local In the Location text box enter where you want to save the seed dri...

Page 84: ...pical seeding in AppAssure replicates only the latest recovery point to the seed drive which reduces the amount of time and space required for creating the seed drive Opting to build recovery point RP chains to the seed drive requires enough space on the seed drive to store the latest recovery points from the specified agent or agents and may take additional time to complete the task Use compatibl...

Page 85: ...ained in the seed drive It also imports any comments entered in Configuring Replication For A Self Managed Core 7 Under Agent Names on the Consume window select the machines for which you want to consume data and then click Consume NOTE To monitor the data consumption progress select the Events tab Abandoning an outstanding seed drive If you create a seed drive with the intent to consume it on the...

Page 86: ...ore Console and then click the Machines tab 2 In the Actions drop down menu click Protect Machine 3 In the Protect Machine dialog box enter the information as described in the following table Text Box Description Host Enter the host name or IP address of the machine that you want to protect Port Enter the port number the AppAssure Core uses to communicate with the agent on the machine Username Ent...

Page 87: ...ion can be configured to a Managed Service Provider providing off site backup and disaster recovery service or to a self managed core To replicate agent data on a machine 1 From the Core Console click the Machines tab 2 Select the machine that you want to replicate 3 In the Actions drop down menu click Replication and then complete one of the following options If you are setting up replication cli...

Page 88: ...rvice provider It is listed here until the MSP accepts the request In the drop down menu click Ignore to ignore or reject the request Outstanding Seed Drives Lists seed drives that have been written but not yet consumed by the target core It includes the remote core name date on which it was created and the date range In the drop down menu click Abandon to abandon or cancel the seed process Outgoi...

Page 89: ...on tab 2 In the Actions drop down menu click Settings 3 In the Replication Settings window edit the replication settings described as follows Option Description Cache lifetime Specify the amount of time between each target core status request performed by the source core Volume image session timeout Specify the amount of time the source core spends attempting to transfer a volume image to the targ...

Page 90: ...n click Delete and then select one of the following options Option Description Relationship Only Removes the protected machine from replication but retains the replicated recovery points With Recovery Point Removes the protected machine from replication and deletes all replicated recovery points received from that machine Removing a target Core from replication To remove a target core from replica...

Page 91: ...ciated agents The main goal of failover is to launch a new agent identical to the failed agent The secondary goal is to switch the target core into a new mode so that the target core protects the failover agent in the same way as the source core protected the initial agent before the failure The target core can recover instances from replicated agents and immediately commence protection on the fai...

Page 92: ...ur failed over machines to restore the source machines To perform failback 1 Navigate to the Core Console on the target core and click the Replication tab 2 Under Incoming Replication select the failover agent and expand the details 3 On the Actions menu click Failback The Fail Back dialog box opens to describe the steps you need to follow before you click the Continue button to complete failback ...

Page 93: ... Navigate to the Core Console on the source core and on the Machines tab modify the machine protection settings to add the new network connection details For more information Configuring Machine Settings 18 Navigate to the Core Console on the target core and delete the agent from the Replication tab 19 In the Core Console of the source core set up replication again between the source and target by...

Page 94: ...describes the print and save options Icon Description Print the report Print the current page Export a report and save it to the disk Export a report and show it in a new window Use this option to copy paste and e mail the URL for others to view the report with a Web browser About compliance reports Compliance Reports are available for the Core and AppAssure Agent They provide you with a way to vi...

Page 95: ...ollowing categories Core Agent Type Summary Error Start Time End Time Elapsed Time Total Work About the Core Summary Report The Core Summary Report includes information about the repositories on the selected Core and about the agents protected by that core The information is displayed as two summaries within one report Repositories summary The Repositories portion of the Core Summary Report includ...

Page 96: ...port you want to run The reports available depend on the selection you made in Step 1 and are described below Machine Available Reports Core Compliance Report Summary Report Errors Report Agent Compliance Report Errors Report 5 In the Start Time drop down calendar select a start date and then enter a start time for the report NOTE No data is available before the time the Core or the Agent was depl...

Page 97: ...drop down menu in the upper right corner 2 From the drop down menu click Reports and then select one of the following options Compliance Report Summary Report Failure Report 3 From the left navigation area select the Core or Cores for which you want to run the report 4 In the Start Time drop down calendar select a start date and then enter a start time for the report NOTE No data is available befo...

Page 98: ...m the left pane navigate Appliance Software Updates link Contacting Dell Dell provides several online and telephone based support and service options If you do not have an active Internet connection you can find contact information on your purchase invoice packing slip bill or Dell product catalog Availability varies by country and product and some services may not be available in your area To con...

Reviews: