background image

DL4300 Appliance

Get-VirtualizedServers

442

Option

Description
connection is made to the Core installed on the local

machine.

-user

Optional. User name for the remote Core host

machine. If you specify a user name, you also have

to provide a password.
If none are provided, then the logged-on user's

credentials will be used.

-password

Optional. Password to the remote Core host

machine. If you specify a password, you also have to

provide a log on.
If none are provided, then the logged-on user's

credentials will be used.

-protectedserver

Show jobs for a specific protected machine,

indicated by IP address.

Example:

Lists all volumes available for protection (but not get protected) on the specified agent machine:

>Get-UnprotectedVolumes -protectedserver 10.10.10.10

Parent topic  

Get-VirtualizedServers

The 

Get-VirtualizedServers

 command returns information about virtualized servers.

Usage

The usage for the command is as follows:

Get-VirtualizedServers -core [host name] -user [user name] -password [password]

Command Options

The following table describes the options available for the 

Get-VirtualizedServers 

command:

Table 207. Get-VirtualizedServers command options

Option

Description

-?

Display this help message.

-core

Optional. Remote Core host machine IP address

(with an optional port number). By default the

connection is made to the Core installed on the local

machine.

-user

Optional. User name for the remote Core host

machine. If you specify a user name, you also have

to provide a password.
If none are provided, then the logged-on user's

credentials will be used.

Summary of Contents for DL4300

Page 1: ...DL4300 Appliance User Guide...

Page 2: ...liance Core 27 Running the Appliance Configuration Wizard 27 Understanding the Rapid Recovery Core Console 28 Accessing the Rapid Recovery Core Console 28 Understanding the Quick Start Guide 28 Hiding...

Page 3: ...gs 65 Understanding Core jobs 66 Managing licenses 74 Understanding SNMP settings 78 Configuring vSphere settings 80 Backing up and restoring Core settings 81 Core level tools 82 Understanding system...

Page 4: ...cloud account 114 Editing a cloud account 116 Configuring cloud account settings 116 Removing a cloud account 117 Archiving 117 Understanding archives 117 Creating an archive 118 Archiving to a cloud...

Page 5: ...the Local Mount Utility 151 Exploring a mounted recovery point using the Local Mount Utility 152 Refreshing recovery points 152 Dismounting individual recovery points using the Local Mount Utility 152...

Page 6: ...ected machine 236 Downloading and viewing the log file for a protected machine 236 Viewing machine status and other details 237 Managing machines 238 Removing a machine 238 Canceling operations on a m...

Page 7: ...Replicating to a third party target Core 294 Submitting a replication request to a third party service provider 295 Reviewing a replication request from a customer 298 Approving a replication request...

Page 8: ...a recovery point 328 Restoring volumes from a recovery point 329 Restoring a directory or file using Windows Explorer 331 Restoring a directory or file and preserving permissions using Windows Explor...

Page 9: ...bout Rapid Recovery reports 367 Generating a report from the Core Console 369 Generating a Core report on demand 369 Generating a protected machine report on demand 372 Managing scheduled reports from...

Page 10: ...config 411 Launching PowerShell and importing the module 411 Working with commands and cmdlets 412 Rapid Recovery PowerShell module cmdlets 412 Edit EsxiVirtualStandby 416 Edit HyperVVirtualStandby 4...

Page 11: ...Remove Mount 464 Remove Mounts 465 Remove RecoveryPoints 466 Remove Repository 467 Remove ScheduledArchive 468 Remove VirtualStandby 469 Resume Replication 470 Resume Snapshot 471 Resume VirtualStand...

Page 12: ...r PowerShell Scripting 506 Sample PowerShell scripts 518 PreTransferScript ps1 518 PostTransferScript ps1 518 PreExportScript ps1 519 PostExportScript ps1 519 PreNightlyJobScript ps1 520 PostNightlyJo...

Page 13: ...loud using cloud storage vendors that support both proprietary and open source platforms Intelligent deduplication You can reduce storage requirements by storing data once and referencing it thereafte...

Page 14: ...ck level snapshots Your appliance can also perform log truncation of the protected Microsoft Exchange and SQL servers The following diagram depicts a simple deployment In this diagram AppAsure agent s...

Page 15: ...n encryption and deduplication of the data received from the protected machine The Core then stores the snapshot backups in repositories such as Storage Area Network SAN or Direct Attached Storage DAS...

Page 16: ...ppliance supports failover and failback in replicated environments In case of a comprehensive outage the target core in the secondary site can recover instances from replicated protected machines and...

Page 17: ...erformance limitations when used as primary storage DAS offers the highest data bandwidth and fastest access rate and is easy to implement For optimum results use DAS with Redundant Array of Independe...

Page 18: ...ta storing snapshot data in a repository local to the Core with all data processed through the Core Cannot be renamed after creation New repositories of this type can be created using REST APIs the Ra...

Page 19: ...d post processing deduplication For more information on where the references to unique blocks are stored for DVM repositories see Understanding deduplication cache and storage locations Parent topic U...

Page 20: ...randomly generated upper case and lower case English characters The Comment contains the text of the key description entered when the key was created Component Description Name This value is equivale...

Page 21: ...guration the loss of the Core would not prevent a recovery Replication to an off site location The target Core is located at an off site disaster recovery facility for recovery in the event of a loss...

Page 22: ...eplication with Rapid Recovery 22 Figure 4 Multipoint to point replication configuration Point to multipoint replication Replicates one or more protected machines from a single source Core to more tha...

Page 23: ...very 23 Figure 5 Point to multipoint replication configuration Multi hop replication Replicates one or more protected machines from one target Core to another target Core producing additional failover...

Page 24: ...pliance backup and retention policies are flexible and therefore easily configurable The ability to tailor retention polices to the needs of an organization not only helps to meet compliance requireme...

Page 25: ...deduplicated If the total size of the archive is larger than the space available on the removable media the archive spans across multiple devices based on the available space on the media The archive...

Page 26: ...cores from one central location MSPs and enterprise customers with multiple distributed cores can deploy the central console to get a unified view for central management The central console provides...

Page 27: ...tings screen view or enter a different host name Additionally you can join this system to a domain Click Next 9 In the Alerts and Monitoring screen Enable system SNMP alerts Enable software SNMP alert...

Page 28: ...r install the Rapid Recovery Core and navigate to the Core Console Click Start Guide on the Welcome page of the guide to see the various suggested configuration tasks Navigate through the guide using...

Page 29: ...tting up replication from a primary source Core to a secondary target Core Click Replication to open the Replication page Prompts you to add a target Core using the Replication Wizard For information...

Page 30: ...he default retention policy for the Core Click Retention Policy to open the Retention Policy page for the Core From here you can define how long to keep a recovery point before rolling it up For conce...

Page 31: ...e and you can see summary tables showing protected machines repositories and recent alerts For more information see Understanding the Home page summary tables view and Understanding the Core dashboard...

Page 32: ...points only machines see Viewing the Recovery Points Only menu Parent topic Understanding the left navigation area The left navigation area of the Core Console appears on the left side of that user i...

Page 33: ...expand the view to see all protected machines again click the expand view icon The following table describes the various elements on the Home page when in the summary tables view Table 3 Home page opt...

Page 34: ...ication Name The display name of the originating source Core for any machines you replicate on this target Core You can define this name when setting up replication Repository Name The name of the rep...

Page 35: ...ry page appears for this recovery points only machine DVM Repositories This pane appears for the DL1000 regardless of whether any DVM repositories have been created This pane does not appear unless yo...

Page 36: ...iated with your Core It shows the number of repositories how many machines are protected in each the number of recovery points and the percentage of compression or deduplication This report is refresh...

Page 37: ...elected machine Generate reports specific to that machine Access more functions specific to the selected machine including system information mounts retention policy notifications or a machine specifi...

Page 38: ...the Exchange Server Information pane See also Viewing the SQL Server Information pane Viewing the Summary pane The Summary pane contains summary information about the protected machine including the h...

Page 39: ...or a machine The Recovery Points page shows a list of the recovery points collected for that protected machine as well as pertinent machine and repository data On this page you can mount export and re...

Page 40: ...or tasks only To To narrow your results you can enter a date at which to stop searching Available for tasks only Status icons Each icon represents a different job status For alerts and tasks clicking...

Page 41: ...able for alerts or journal items click the header to filter the results by status Name Name is available for tasks only This text field lists the task type that completed for this protected machine Ex...

Page 42: ...by clicking the arrow on the left side of this menu Each replicated machines menu includes a drop down menu on the right side which includes functions you can perform simultaneously on all of the rep...

Page 43: ...multaneously on all of the like items in that group For more information see Understanding custom groups Parent topic Using the Error dialog box When an error occurs in the Rapid RecoveryRapid Recover...

Page 44: ...u can use it to restore or migrate Core settings For more information about backing up and restoring Core settings see Backing up and restoring Core settings General General settings include configura...

Page 45: ...about deduplication cache see Understanding deduplication cache and storage locations For information on adjusting the settings see Configuring DVM deduplication cache settings Replay Engine Replay en...

Page 46: ...configuration The Cloud Configuration settings let you specify configuration settings for supported cloud storage accounts These settings do not create cloud accounts Instead they associate existing...

Page 47: ...a Protection Rapid Recovery License Portal has a different release cycle than Rapid Recovery software For the latest product documentation see the Dell Technical Documentation website SNMP configurati...

Page 48: ...splay in the Rapid Recovery Core Console You can enter up to 64 characters Web server port Enter a port number for the Web server The default port is 8006 Service port Enter a port number for the Rapi...

Page 49: ...the settings the system uses to check for updates at any time CAUTION When using replication configuring your system to install updates automatically could result in upgrading the source core before...

Page 50: ...are memory intensive and include various integrity checks and data consolidation tasks that are best conducted when the Rapid Recovery Core is less active All the nightly jobs and the scope for which...

Page 51: ...ction groups containing databases Connect to the database from SQL Server Open the database Close the database Dismount the recovery point To enable this nightly check specify a SQL Server instance to...

Page 52: ...machine Checks the integrity of recovery points containing Exchange Database EDB files NOTE This option does not appear if you are not protecting an Exchange Server in your Core Truncate SQL logs sim...

Page 53: ...o the Rapid Recovery Core Console 2 On the icon bar click Settings and then do one of the following From the list of Core settings on the left side of the Settings page click Nightly Jobs Scroll down...

Page 54: ...ettings Client timeout settings control the length of time that various operations are attempted before the operation times out NOTE Dell recommends leaving default timeout settings unless you experie...

Page 55: ...nd writing data streams between the graphic user interface and the Rapid Recovery Core service across http Enter the amount of time you want to lapse before a timeout occurs during read or write event...

Page 56: ...eration is finished memory consumption decreases accordingly However administrators should consider the highest RAM load requirement for efficient operations Default settings for the Rapid Recovery Co...

Page 57: ...r the configuration information as described in the following table Table 14 DVM deduplication cache settings information Setting Description Restore Default This control resets DVM cache locations to...

Page 58: ...change and exit edit mode or click to exit edit mode without saving Parent topic Configuring Replay engine settings You can configure information regarding the Replay engine which is the communicatio...

Page 59: ...for the Replay engine Port in use Represents the port that is in use for the Replay engine configuration Allow port auto assigning Click for allow for automatic TCP port assignment Admin Group Enter a...

Page 60: ...ngs appear 3 Click on the setting you want to change The setting you selected becomes editable 4 Enter the configuration information as described in the following table Table 16 Deployment settings in...

Page 61: ...work to the Rapid Recovery Core The event transaction data for your Core is then saved to that service database not locally For more information about establishing or modifying database connection set...

Page 62: ...or the database connection NOTE The default setting is 27017 User name Enter the name of a user with administrative privileges to the MongoDB service database NOTE If the host name parameter is localh...

Page 63: ...en do one of the following From the list of Core settings on the left side of the Settings page click Local Database Settings Scroll down on the right side of the Settings page until you can see the L...

Page 64: ...eps in this procedure to manage report settings for Core reports 1 Navigate to the Rapid Recovery Core Console 2 On the icon bar click Settings and then do one of the following From the list of Core s...

Page 65: ...censing costs Rapid Recovery gives you two options for performing attachability checks using a licensed instance of SQL Server installed on the Rapid Recovery Core machine or using the instance of SQL...

Page 66: ...n the Core and then enter the authentication information as described in the following table Table 19 SQL Server credentials information Descriptions of the information required for authenticating a c...

Page 67: ...or other communication errors prevent the job from succeeding the first time In the Core Jobs table the Settings column indicates if the job listed is included in Core job settings by default or must...

Page 68: ...Exchange databases Checks the integrity of recovery points containing Exchange databases Process Mount the latest recovery point for protection groups containing SQL databases Connect to the database...

Page 69: ...ce Core and controls outgoing replication 1 3 Default Roll up recovery points Applies the retention policy to your backed up data by combining or rolling up recovery points on the schedule defined in...

Page 70: ...overy ExchangeLibraries 1 0 Add Export to archive Creates backup in the specified path with an archive of the selected recovery points Process Mount recovery points Write data to backups Dismount the...

Page 71: ...nt recovery point snapshots Performs mount of recovery point to the specified path 1 0 Add Protect ESX virtual machines Adds all specified virtual machines to agentless protection Job is performed imm...

Page 72: ...ch job type listed 1 The maximum number of jobs of this type for the Core to attempt at one time This must be set to a value between 1 to 50 2 The number of times a job should be attempted if a networ...

Page 73: ...Maximum concurrent jobs text box enter a new value between 1 to 50 6 To set the number of attempts the Core should make before abandoning the job in the Try count text box enter a new value between 0...

Page 74: ...ses Many Rapid Recovery Core users start with a trial license which has limited capabilities A trial license is valid for 14 days and can be extended one time by the group administrator to a 28 day li...

Page 75: ...ding License Pools in the Dell Data Protection Rapid Recovery License Portal User Guide Protected by this Core Indicates the number of machines from the license pool that are protected by this core To...

Page 76: ...settings area click Change License The Change License dialog box appears 5 To enter a license key or upload a license file do one of the following a If you want to manually enter the license key in t...

Page 77: ...Choose File In the File Upload dialog box navigate through the file system and locate the new license file you want to use For example locate Software YourCompany lic c Click the license file and the...

Page 78: ...y status and protected machines An SNMP host can read this information using a standalone application called an SNMP browser You can install the SNMP browser on any machine accessible over the network...

Page 79: ...it mode or click to exit edit mode without saving Parent topic Downloading the SNMP MIB file The Simple Network Management Protocol is used to monitor devices on a network for conditions that require...

Page 80: ...y to virtual machines Use this procedure to configure vSphere settings for the Core 1 Navigate to the Rapid Recovery Core Console 2 On the icon bar click Settings and then do one of the following From...

Page 81: ...ity risk to saving a Core configuration file NOTE You must first back up Core setting information before you can use this process to restore Core settings Use this procedure to back up and restore Cor...

Page 82: ...ue click Close to clear the error dialog box i After restoring the configuration verify the following Unlock all encryption keys For more information see Unlocking an encryption key If virtual standby...

Page 83: ...jobs see Understanding nightly jobs For more information about how to configure nightly job settings for the Core see Configuring nightly jobs for the Core For more information about configuring night...

Page 84: ...mation about currently mounted recovery points You can view the local end point remote end point mounted image agent ID mounted image ID and the mounted image display name You can see if the mount is...

Page 85: ...ore information about machine logs see Accessing protected machine diagnostics The ability to access logs can be useful when troubleshooting an issue or working with Dell Rapid Recovery support To acc...

Page 86: ...oints manually from one repository to another Parent topic Managing a DVM repository Before you can use Rapid Recovery you need to set up one or more repositories on the Rapid Recovery Core A reposito...

Page 87: ...ies The Repositories page appears On the Repositories page the DVM Repositories pane appears 3 At the top of the page click Add New DVM Repository The Add New Repository dialog box appears 4 Enter the...

Page 88: ...Box Description Data path Enter the location for storing the protected data For example type X Repository Data When specifying the path use only alphanumeric characters the hyphen and the period only...

Page 89: ...exceed the size of the volume If the storage location is a New Technology File System NTFS volume using Windows XP or Windows 7 the file size limit is 16 TB If the storage location is a NTFS volume us...

Page 90: ...ation 10 Optionally repeat Step 6 through Step 9 to add additional storage locations for the repository 11 When all of the storage locations you want to create for the repository at this time have bee...

Page 91: ...the repository license is displayed In the Estimated capacity box the estimated capacity available for creating a repository is displayed The Controller available space displays the available space on...

Page 92: ...New DVM Repository Add a new DVM repository Open Existing DVM Repository Open an existing DVM repository from another Core which changes ownership of the repository to this Core For more information s...

Page 93: ...hich changes ownership to this repository Parent topic Adding a storage location to an existing DVM repository NOTE It s recommended that you expand the repository through Appliance tab For more infor...

Page 94: ...enter the information as described in the following table Table 31 CIFS share credentials Text Box Description UNC Path Enter the path for the network share location If this location is at the root de...

Page 95: ...g Policy The write caching policy controls how the Windows Cache Manager is used in the repository and helps to tune the repository for optimal performance on different configurations Set the value to...

Page 96: ...te than on the source Core Similarly you can now define a custom retention policy for any replicated machine For example you can roll up recovery points in the target Core at a faster rate and with le...

Page 97: ...repository the data you capture in each snapshot is deduplicated This deduplication occurs incrementally as snapshots are saved to the repository One occurrence of each string of information is saved...

Page 98: ...DVM repostiory in your Core to perform this procedure You can perform offline deduplication of data saved to an existing DVM repository This is accomplished by launching the Repository Optimization Jo...

Page 99: ...to resume an interrupted optimization job do the following a In the repositories summary table from the row representing the appropriate repository click and then select Continue Optimization Job A wa...

Page 100: ...Parent topic Deleting a repository Complete the steps in this procedure to delete a repository 1 Navigate to the Rapid Recovery Core Console 2 On the icon bar click More and then select Repositories T...

Page 101: ...required after the check from the icon bar click Events 6 From the Events page click Job Details for the job to view more information about the job status If you see an error in any child tasks for th...

Page 102: ...ion If you change the name or passphrase for an existing encryption key currently used to a protected machine then upon the next scheduled or forced snapshot Rapid Recovery Core captures and reflects...

Page 103: ...n existing universal unlocked encryption key to any protected machine in your Core If you just added a new encryption key using the process described in the topic Adding an encryption key and want to...

Page 104: ...or this protected machine and the lock now appears as closed Optionally if you want the encryption key applied immediately force a snapshot For more information see Forcing a snapshot CAUTION Rapid Re...

Page 105: ...you see the information described in the following table Table 35 Information about each encryption key UI Element Description Select Item For each encryption key you can select the checkbox to perfor...

Page 106: ...to locked After the key locks automatically you must unlock the key again in order to use it For more information see the topic Unlocking an encryption key Description The description is an optional f...

Page 107: ...achines This step describes how to add an encryption key from the Rapid Recovery Core Console This process does not apply the key to any machines currently being protected on the Core You can also add...

Page 108: ...rt an encryption key from another Rapid Recovery Core and use that key to encrypt data for a protected machine in your Core To import the key you must be able to access it from the Core machine either...

Page 109: ...E You cannot use a locked encryption key to recover data or to apply to a protected machine You must first provide the passphrase thus unlocking the key You can also lock an unlocked encryption key en...

Page 110: ...ocate the encryption key you want to lock If its type is Universal then click its drop down menu and select Change the type to Replicated The Change Encryption Key Type dialog box appears 4 In the dia...

Page 111: ...1 Navigate to the Rapid Recovery Core 2 On the icon bar click More and then select Encryption Keys The Encryption Keys page appears 3 Locate the encryption key you want to update click its drop down m...

Page 112: ...tected machine You must first view the encryption settings for each protected machine using the key and disassociate the encryption key you want to remove For more information see the topic Disassocia...

Page 113: ...and then select Encryption Keys The Encryption Keys page appears Any encryption keys accessible to the Core appear in a summary table Each lists a type of Universal or Replicated 3 Locate the encrypti...

Page 114: ...perations you specify To add a cloud account complete the steps in the following procedure 1 On the Rapid Recovery Core Console icon bar click the More icon and then select Cloud Accounts The Cloud Ac...

Page 115: ...ccount Password or API Key Select whether to use a password or an API key and then enter your selection for this account Tenant ID Enter your tenant ID for this account Authentication URL Enter the au...

Page 116: ...dit the details as necessary and then click Save NOTE You cannot edit the cloud type Parent topic Configuring cloud account settings Cloud configuration settings let you determine how much time should...

Page 117: ...Delete Account dialog box click Yes to confirm that you want to remove the account 4 If the cloud account is currently in use a second dialog box prompts you to confirm that you still want to remove...

Page 118: ...machine to be saved without the inconvenience of needing to manually create the archives each time 1 On the button bar of the Rapid Recovery Core Console click Archive The Archive Wizard opens 2 On t...

Page 119: ...8 Do one of the following If you chose to create a one time archive skip to Step 15 If you chose to create a scheduled archive continue to Step 9 9 On the Schedule page select one of the following op...

Page 120: ...t leaves the data for other cores intact Erase completely Clears all archived data from the directory before writing the new archive 14 Optionally select Build recovery points chains fix orphans and t...

Page 121: ...selected by default 16 Click Next 17 On the Date Range page either manually enter the start date and end date of the recovery points to be archived or select the date time by clicking the calendar ic...

Page 122: ...he archive as described in the following table based on the location type you selected in Step 3 Table 42 Archive details Option Text Box Description Local Location Enter the location for the output I...

Page 123: ...lection from Step 8 Table 43 Send data options Option Text Box Description Daily At time Select the hour of the day you want to create a daily archive At day of week Select a day of the week on which...

Page 124: ...times when you want to pause a scheduled archive job such as if you need to change the destination archive location Also if you opted to initially pause archiving when you performed the Creating an a...

Page 125: ...the presence of all necessary files within the archive and that the files are healthy To perform an archive check complete the steps in the following procedure 1 From the Rapid Recovery Core Console c...

Page 126: ...sum integrity This option checks the integrity of the data segments in the archive to ensure that the segments are healthy 6 Click Check File Rapid Recovery checks the archive according to your select...

Page 127: ...loud 4 Enter the details for the archive as described in the following table based on the location type you selected in Step 3 Table 46 Location type details Option Text Box Description Local Location...

Page 128: ...chive Wizard opens 2 On the Import Type page of the wizard select one of the following options One time import Continuous import by schedule 3 Click Next 4 On the Location page select the location of...

Page 129: ...8 On the Machines page select the machines that you want to import from the archive If you selected One time import in Step 2 and at least one machine is not present on the Core as a protected replica...

Page 130: ...do not want the import job to begin at the next scheduled time after you complete the wizard NOTE You may want to pause the scheduled import if you need time to prepare the target location before imp...

Page 131: ...ee Configuring event retention Parent topic Viewing events using tasks alerts and journal From the Core console you can view events for the Core and you can view events for a specific protected or rep...

Page 132: ...nter 1 1 2016 8 00 AM To select the current date and time click the Calendar widget in the From text box and then click the current date The current time will automatically appear Click the Calendar w...

Page 133: ...pecified machine click the Events menu and then click Alerts The list of events is filtered to display only important alerts for the Core or for the machine you selected 2 Optionally to filter the lis...

Page 134: ...time will automatically appear Click the Calendar widget select the date then click the Clock widget and select the desired time using the controls Click away from the calendar to accept the selected...

Page 135: ...ng The SMTP Server core settings appear 3 Click on the setting you want to change The setting you selected becomes editable 4 Enter the configuration information as described in the following table Op...

Page 136: ...id Recovery events by email This topic describes the process of configuring the default email notification template or customizing the content Using the Restore Default option you can restore changes...

Page 137: ...About this event description coreAdminUrl Send Test Email Clicking this button sends a test email message to the email address you specify in the resulting Send Test Email dialog box Restore Defaults...

Page 138: ...s exit the error dialog box and the Send Test Email dialog box click OK to save the current email template settings Then modify your email server settings as described in the procedure Configuring an...

Page 139: ...Core level from the icon bar click More and then select Notifications The Notifications page appears To set notifications for a specific protected machine do the following 1 From the Protected Machin...

Page 140: ...ypes menu click Warning This is represented by a yellow exclamation point icon Info To create alerts for informational messages from the Select Types menu click Info This is represented by a blue i Re...

Page 141: ...stall Recovery Point Check Remote Mount Repository Common Replication Restore Rollup Scheduled Archives Security Server Logs vSphere To define alerts for all events in every group select the checkbox...

Page 142: ...r The result is the reporting of Core information such as alerts repository status and protected machines Select this option if you want to notify Core events by SNMP trap You must also specify a trap...

Page 143: ...lerts portion of the Events page However it displays the event only once with the date and time of the most recent occurrence The events log is not updated with the same event until the threshold of t...

Page 144: ...Rapid Appliance Self Recovery RASR is a bare metal restore process that quickly restores your Appliance to an operating state RASR offers two recovery options Restore factory settings Recover your ap...

Page 145: ...3 In the Boot Manager Main Menu select One shot BIOS Boot Menu 4 In the Boot Manager Boot Menu select the attached USB drive 5 Select your keyboard layout 6 Click Troubleshoot Rapid Appliance Self Rec...

Page 146: ...Files AppRecovery Local Mount Utility and a shortcut appears on the machine s desktop While the utility was designed for remote access to a Rapid Recovery Core machine you can also install the LMU on...

Page 147: ...dding a Core machine to the Local Mount Utility To mount a recovery point you must add a Core machine to the LMU There is no limit as to how many Cores you can add Complete the following procedure to...

Page 148: ...Rapid Recovery Cores connected to the LMU 1 From the Local Mount Utility user interface click Options 2 In the Options dialog box you can change the setting described in the following table Table 52 C...

Page 149: ...edit settings and then click Edit Core 2 In the Edit Core dialog box you can change the settings described in the following table Table 53 Core settings Option Description Host name The name of the Co...

Page 150: ...remove a Core from the LMU NOTE This option is not available for a Rapid Recovery Core located on and labeled as the localhost 1 From the Local Mount Utility user interface right click the Core you wa...

Page 151: ...re in the navigation tree to reveal the protected machines 2 From the navigation tree select the machine from which you want to mount a recovery point The recovery points appear in the main frame 3 Op...

Page 152: ...ctive Mounts window opens and displays all mounted recovery points 2 Expand the navigation tree to reveal the recovery points mounted for each machine and their volumes 3 Click Explore next to the vol...

Page 153: ...are two main ways in which you can dismount all recovery points at one time in the LMU You can dismount all recovery points without viewing which recovery points are currently mounted or you can view...

Page 154: ...Option Description Browse Recovery Points Opens the LMU main window Active Mounts Opens the Active Mounts dialog box on top of the LMU main window Options Opens the Options dialog box on top of the L...

Page 155: ...vailable for the Storage Hardware subsystem opens the health page of your system where you can analyze the health of the controller enclosure physical drives and so on The Controllers link available f...

Page 156: ...e backups in any location but in this case an error is displayed on the RASR page because backups cannot be controlled and cannot be guaranteed if they will be consistent to perform restore using RASR...

Page 157: ...ndows backup policy perform the following steps 1 In the Core Console navigate to Appliance Backup 2 Click the Configure Policy button The Windows Backup Policy window is displayed 3 Enter the paramet...

Page 158: ...Recovery repository to host standby virtual machines For example if you are using Storage Resource Management SRM you can allocate up to 100 percent capacity of the storage remaining after creating t...

Page 159: ...tween 1 and 40 alphanumeric characters including spaces Do not use prohibited characters or prohibited phrases For more information see the topics prohibited characters or prohibited phrases in the De...

Page 160: ...software and appliance specific components RUU consists of updated versions of the Windows Server Roles and Features Net 4 5 2 LSI Provider DL Applications OpenManage Server Administrator and Rapid R...

Page 161: ...files 3 Double click the launchRUU icon 4 When prompted click Yes to acknowledge that you are not running any of the listed processes 5 When the Recovery and Update Utility screen displays click Star...

Page 162: ...ork hostname or IP address For more information on how to protect a single machine Protecting a machine You can protect a network cluster using the Protect Cluster function which connects to the clust...

Page 163: ...Server and SQL Server appear in the Rapid Recovery Core Console only when an instance of the software and related files are detected on protected servers In those cases additional options are availabl...

Page 164: ...e time export or setting up virtual standby mounting or viewing recovery points restoring from a recovery point converting the cluster node to its own protected machine or removing the node from prote...

Page 165: ...ine with the Rapid Recovery Agent software a notification appears in the user interface to alert you that exports are limited and restricted to simple dynamic volumes If you attempt to export anything...

Page 166: ...the Rapid Recovery Agent Installer and deploy it to any machine that you want to protect on the Rapid Recovery Core Complete the steps in this procedure to download the web installer 1 To download th...

Page 167: ...owing tasks Deploy Rapid Recovery Agent to multiple machines See Deploying the Rapid Recovery Agent software to one or more machines Monitor the deployment See Verifying the deployment to multiple mac...

Page 168: ...credentials as described in the following table Table 58 Domain information and credentials Text Box Description Host The host name or IP address of the Active Directory domain User name The user name...

Page 169: ...SX i 3 Enter the host information and logon credentials as described in the following table Table 59 vCenter ESX i connection settings Text Box Description Host The name or IP address of the VMware vC...

Page 170: ...n the Machines page of the wizard select the protected machines to which you want to deploy an upgrade of the Rapid Recovery Agent software 5 Click Finish The system automatically verifies each machin...

Page 171: ...Alert events appear in the list showing the time the event initiated and a message For each successful deployment of the Agent software you will see an alert indicating that the protected machine has...

Page 172: ...every hour on the hour 12 00 AM 1 00 AM 2 00 AM and so on Selecting periods lets you view the default protection schedule and make adjustments accordingly Selecting a daily protection time causes Rapi...

Page 173: ...s using one process simultaneously see About protecting multiple machines When you add protection you need to define connection information such as the IP address and port and provide credentials for...

Page 174: ...trator or if the machine is in a domain domain name Administrator Password The password used to connect to this machine If the Install Agent page appears next in the Protect Machine Wizard that means...

Page 175: ...dvanced configuration for the Protect Machine Wizard and default protection then click Next and proceed to Step 14 to see repository and encryption options If you selected Advanced configuration for t...

Page 176: ...ears 3 Click Add Storage Location to define the specific storage location or volume for the repository This volume should be a primary storage location 4 In the Storage Location area specify how to ad...

Page 177: ...are permitted User name Specify a user name for accessing the network share location Password Specify a password for accessing the network share location 5 In the Storage Configuration area click More...

Page 178: ...Windows Server 2008 SP2 or Windows Server 2008 R2 SP2 the recommended setting is Off If set to Off Rapid Recovery controls the caching If set to Sync Windows controls the caching as well as the synch...

Page 179: ...ers such as the back slash forward slash pipe colon asterisk quotation mark question mark open or close brackets ampersand or hash Description Enter a comment for the encryption key This information a...

Page 180: ...assword The password used to connect to this machine 3 Click Connect 4 In the Protect Cluster dialog box select a repository for this cluster 5 If you want to secure the recovery points for this clust...

Page 181: ...ent topic Protecting nodes in a cluster This task requires that you first protect a cluster For more information see Protecting a cluster This topic describes how to protect the data on a cluster node...

Page 182: ...interval text box and type an appropriate interval in minutes For example highlight the default interval of 60 and replace it with the value 20 to perform snapshots every 20 minutes during this period...

Page 183: ...ing If you previously created a protection schedule template and want to apply it to this protected machine select the template from the drop down list and then go to Step 7 If you want to remove an e...

Page 184: ...aused until explicitly resumed If you pause protection outside of a wizard you can choose whether to pause protection until resumed or to pause it for a designated amount of time specified in any comb...

Page 185: ...me Protection dialog box select Yes The Resume Protection dialog box closes and protection is resumed for the selected machine 5 To pause protection for a single machine from the machine pages navigat...

Page 186: ...tory for the machine and the total amount of storage space the snapshots use in the repository To manage aspects of any protected machine start by navigating to the machine you want to view configure...

Page 187: ...writer is interfering with or precluding successful backup transfers these can be disabled one by one Dell recommends leaving these settings alone unless you are otherwise directed by a Dell Support...

Page 188: ...lt this is the host name of the machine You can change this to something more user friendly if needed Do not use prohibited characters or prohibited phrases Host Name Enter a host name for the machine...

Page 189: ...ty checks 6 To modify transfer settings for a protected machine click the appropriate setting and then enter the configuration information as described in the following table NOTE For conceptual infor...

Page 190: ...ng Reads per Stream Specifies how many queued read operations will be stored on the back end This setting helps to control the queuing of protected machines The default setting is 0 Transfer Data Serv...

Page 191: ...ng table Table 72 License details for a protected machine Text Box Description Expiration Date Indicates the expiration date of the license for the selected protected machine License Status Indicates...

Page 192: ...in the machine s metadata NOTE Do not change this setting as doing so could break the connection between the protected machine and the Core 5 Under Transfer Queue to change the number of transfer jobs...

Page 193: ...S snapshot during transfer first if it fails create a checkpoint If the VSS snapshot succeeds the recovery point will be in an application consistent state If the VSS snapshot fails and a checkpoint i...

Page 194: ...n incremental snapshot for data updated since the last snapshot This type of transfer creates recovery points which are stored on the repository associated with the Core For more information see Manag...

Page 195: ...The speed of your network is another critical factor with many variables The network backbone in place for example 1GbE versus 10GbE architecture configuration intentional use of NIC teaming and even...

Page 196: ...wn in the Settings page to view nightly jobs settings 4 Under the Nightly Jobs heading click Change The Nightly Jobs dialog box appears NOTE For information about the Rollup setting including setting...

Page 197: ...Removing a machine When you remove a machine from protection on the Rapid Recovery Core you are presented with two options you can keep the recovery points saved thus far to the RR Core or you can re...

Page 198: ...lick Remove Machine The Remove Node dialog box appears 3 Optionally in the dialog box to remove all currently stored recovery points for this cluster from the repository select Remove with recovery po...

Page 199: ...one of the following To open the log file select Open with then select an application such as Notepad for viewing the text based log file and finally click OK The AgentAppRecovery log file opens in th...

Page 200: ...eplicated machines if you apply a group action such as forcing replication this will only apply to the replicated machines You can create one or more groups A single protected machine or replicated ma...

Page 201: ...nt to modify 3 Click on the drop down menu for that group and then click Edit The Edit Label dialog box appears within which the name of the custom group becomes editable 4 In the Name field update th...

Page 202: ...en confirm that you want to resume For more information see Pausing and resuming replication To refresh the information for all of the objects in the group click Refresh Metadata To pause replication...

Page 203: ...e or more machines You can deploy the Rapid Recovery Agent software as part of Protect Multiple Machines Wizard The process of protecting multiple machines includes optional steps that you can access...

Page 204: ...ines you want to protect or if any of the machines you specified cannot be protected for another reason then the selected machines appear on the Warnings page 9 Optionally on the Warnings page of the...

Page 205: ...select Create a Repository and then complete the following steps 1 On the Repository enter the information described in the following table Table 80 Add New Repository settings Text Box Description Re...

Page 206: ...o not use spaces No other symbols or punctuation characters are permitted Metadata path Enter the location for storing the protected metadata For example type X Repository Metadata When specifying the...

Page 207: ...S volume using Windows 8 8 1 Windows 10 or Windows Server 2012 2012 R2 the file size limit is 256 TB NOTE For Rapid Recovery to validate the operating system Windows Management Instrumentation WMI mus...

Page 208: ...hile using encryption is optional Dell highly recommends that you establish an encryption key and that you protect the passphrase you define Store the passphrase in a secure location as it is critical...

Page 209: ...that you limit protection to no more than 200 VMs at once For example do not select more than 200 VMs when using the Protect Multiple Machines Wizard Protecting more than 200 VMs results in slow perfo...

Page 210: ...f the machines you specified cannot be protected for another reason then the selected machines appear on the Warnings page 11 Optionally on the Warnings page you can verify any machine by selecting th...

Page 211: ...ption If you want to create a repository select Create a Repository and then complete the following steps 1 On the Repository enter the information described in the following table Table 86 Add New Re...

Page 212: ...o not use spaces No other symbols or punctuation characters are permitted Metadata path Enter the location for storing the protected metadata For example type X Repository Metadata When specifying the...

Page 213: ...S volume using Windows 8 8 1 Windows 10 or Windows Server 2012 2012 R2 the file size limit is 256 TB NOTE For Rapid Recovery to validate the operating system Windows Management Instrumentation WMI mus...

Page 214: ...using encryption is optional Dell highly recommends that you establish an encryption key and that you protect the passphrase you define Store the passphrase in a secure location as it is critical for...

Page 215: ...ions Typical Advanced show optional steps 3 Click Next 4 On the Connection page of the wizard from the Source drop down list select Manually 5 Click Next 6 On the Select Machines page enter the machin...

Page 216: ...onfiguration for the Protect Machine Wizard and specified custom protection click Next to set up a custom protection schedule For details on defining a custom protection schedule see Creating custom p...

Page 217: ...local machine and then enter the information as described in the following table Table 92 Local disk settings Text Box Description Data path Enter the location for storing the protected data For examp...

Page 218: ...ult is 250 GB You can choose from the following GB TB NOTE The size that you specify cannot exceed the size of the volume If the storage location is a New Technology File System NTFS volume using Wind...

Page 219: ...es for this machine You can change the settings later from the Encryption Keys page in the Rapid Recovery Core Console For more information about encryption see the topic Understanding encryption keys...

Page 220: ...the machines are added to protection on the Core Parent topic Monitoring the protection of multiple machines You can monitor the progress as Rapid Recovery applies the protection polices and schedule...

Page 221: ...hat Exchange databases are mountable to detect corruption and alert administrators so that all data on the Exchange server can be recovered successfully For more information about forcing a mountabili...

Page 222: ...At the top of the page click the Exchange drop down menu and select Force Log Truncation 3 In the resulting dialog box click to confirm that you want to force log truncation The dialog box closes The...

Page 223: ...For instructions on how to view the status of the mountability check see Viewing events using tasks alerts and journal Parent topic Forcing a checksum check of Exchange database files In order to for...

Page 224: ...default credentials for all protected SQL Servers For more information about setting credentials for SQL servers see Setting credentials for a SQL Server machine Truncate SQL logs When you force log...

Page 225: ...s procedure to force log truncation NOTE When conducted for a SQL machine truncation identifies the free space on a disk but does not reduce the size of the logs 1 In the left navigation area of the R...

Page 226: ...Server on disk storage format is the same in both 64 bit and 32 bit environments and attachability works across both versions A database that is detached from a server instance that is running in one...

Page 227: ...pid Recovery creates recovery points based on volumes not VMDKs each volume can be separately mounted restored and exported NOTE Rapid Recovery recommends that VMware Tools be installed on virtual mac...

Page 228: ...on tables or GUID partition tables GPTs VMDKs without these partition tables are protected as whole disks rather than as individual volumes Each VMware virtual machine must have VMware Tools installed...

Page 229: ...ing VMware Tools on protected VMs on vSphere or ESXi hosts to take full advantage of Microsoft Volume Shadow Services VSS functionality Agentless protection uses the snapshot technology native to VMwa...

Page 230: ...y Core captures use Microsoft Volume Shadow Services VSS For information on the behavior of agentless VMs with or without VMware Tools see Benefits of installing VMware Tools for agentless protection...

Page 231: ...of all volumes If you want to define a different protection schedule then in the Schedule Settings option select Custom protection 11 Proceed with your configuration as follows If you selected a Typic...

Page 232: ...dicated folder within the root for the storage location for your repository Do not specify the root location For example use E Repository not E If the repository that you are creating in this step is...

Page 233: ...icated folder name for example Repository The path must begin with When specifying the path use only alphanumeric characters the hyphen and the period only to separate host names and domains The lette...

Page 234: ...s the default Windows controls the caching This is appropriate for Windows 10 and for versions of Windows Server 2012 and later NOTE Setting the write caching policy to On could result in faster perfo...

Page 235: ...mation as described in the following table Table 102 Encryption key settings Text Box Description Name Enter a name for the encryption key Encryption key names must contain between 1 and 130 alphanume...

Page 236: ...e selected application To save the file locally select Save File and then click OK The AgentAppRecovery log file saves to your Downloads folder It can be opened using any text editor Parent topic Down...

Page 237: ...rver also displays and includes Last successful Mountability check performed Last successful Checksum check performed Last Log Truncation performed Detailed information about the volumes contained on...

Page 238: ...N If you delete recovery points you will no longer be able to restore data for that machine Complete the steps in the following procedure to remove a machine from protection in your Rapid Recovery env...

Page 239: ...process that creates a virtual machine from a recovery point The VM is a bootable clone of a protected machine NOTE The recovery point used must be part of a complete recovery point chain For more inf...

Page 240: ...operating system and settings from the original protected machine You can perform virtual export of recovery points for your protected Windows or Linux machines to VMware ESXi Hyper V and VirtualBox...

Page 241: ...g table and then click Next Table 103 Virtual machine parameters Options Description Host name Enter a name for the host machine Port Enter the port for the host machine The default is 443 User name E...

Page 242: ...m the protected server even if only a portion of the original volume is being used For example if the volume is 1 TB large but contains only 2 GB of used space Rapid Recovery creates a virtual disk of...

Page 243: ...105 ESXi credentials Option Description Host name Enter a name for the host machine Port Enter the port for the host machine The default is 443 User name Enter the logon credentials for the host mach...

Page 244: ...ioning creates a new disk or volume that is the same size as the original volume from the protected server even if only a portion of the original volume is being used For example if the volume is 1 TB...

Page 245: ...able 107 Virtual machine parameters Option Description VM Machine Location Specify the path of the local folder or network share on which to create the virtual machine NOTE If you specified a network...

Page 246: ...ber of processors The number of processors CPUs you want for the exported virtual machine The minimum is 1 Cores per processor The number of cores you want to have for each processor The minimum is 1...

Page 247: ...escription Target Path Specify the path of the local folder or network share on which to create the virtual machine NOTE If you specified a network share path you will need to enter a valid logon cred...

Page 248: ...imum allowed by the application is 65536 MB The maximum amount of memory usage is limited by the amount of RAM available to the host machine Number of processors The number of processors CPUs you want...

Page 249: ...h this machine User name Enter the user name for the user with administrative privileges for the workstation with the Hyper V server It is used to specify the logon credentials for the virtual machine...

Page 250: ...orted VM 18 On the Volumes page select the volume s to export for example C NOTE If the selected volumes are larger than the appropriate maximum allocations supported by the application as indicated b...

Page 251: ...nter the user name for the user with administrative privileges for the workstation with the Hyper V server It is used to specify the logon credentials for the virtual machine Password Enter the passwo...

Page 252: ...o larger than 64 TB For VHD disk format your selected volumes should be no larger than 2040 GB 15 Select Perform initial one time export to perform the virtual export immediately instead of after the...

Page 253: ...ecify a user account for the virtual machine select Specify the user account for the exported virtual machine and then enter the following information This refers to a specific user account for which...

Page 254: ...n the Virtual Machine Options page select Remote Linux Machine 8 Enter information about the virtual machine as described in the following table Table 112 Remote Linux machine settings Option Descript...

Page 255: ...parameters for each virtual export appear as a row on the Virtual Standby page From here you can view the status of exports that you currently have set up and manage your virtual standby machines You...

Page 256: ...xported Export Type The type of virtual machine platform for the export such as ESXi VMware Hyper V or VirtualBox Last Export The date and time of the last export If an export has just been added but...

Page 257: ...forced snapshot 3 To remove an export from the system select the export and then click Remove The export configuration is permanently removed from the system Removing the virtual standby configuration...

Page 258: ...s described in the following table and then click Next Table 115 Virtual machine parameters Options Description Host name Enter a name for the host machine Port Enter the port for the host machine The...

Page 259: ...ins only 2 GB of used space Rapid Recovery creates a virtual disk of 2 GB Thick Thick provisioning creates a new disk or volume that is the same size as the original volume from the protected server e...

Page 260: ...e export 5 Click Next 6 On the Destination page of the Export Wizard in the Recover to a Virtual Machine drop down menu select ESXi 7 Enter the information for accessing the virtual machine as describ...

Page 261: ...eates a new disk or volume that is the same size as the original volume from the protected server even if only a portion of the original volume is being used For example if the volume is 1 TB large bu...

Page 262: ...use for the export 7 Click Next 8 On the Destination page in the Export Wizard in the Recover to Virtual machine drop down menu select VirtualBox and then click Next 9 On the Virtual Machine Options p...

Page 263: ...complete the wizard and to start the export NOTE You can monitor the status and progress of the export by viewing the Virtual Standby or Events tab Parent topic Performing a continual Virtual Standby...

Page 264: ...ting up the export You will also need to manually attach or load the virtual machine after the export User Name User name of the account on the target machine for example root Password Password for th...

Page 265: ...Points page select the recovery point that you want to use for the export 7 Click Next 8 On the Destination page in the Export Wizard in the Recover to Virtual machine drop down menu select VMware Wo...

Page 266: ...VMware Workstation 12 0 Amount of RAM MB Specify the memory usage for the virtual machine by clicking one of the following Use the same amount of RAM as source machine Use a specific amount of RAM an...

Page 267: ...hine Export Wizard in the Recover to a Virtual Machine drop down menu select VMware Workstation and then click Next 7 On the Virtual Machine Options page enter the parameters for accessing the virtual...

Page 268: ...is 65536 MB The maximum amount of memory usage is limited by the amount of RAM available to the host machine Number of processors The number of processors CPUs you want for the exported virtual machin...

Page 269: ...have enough RAM allocated to perform the export Complete the steps in the following procedures for the appropriate type of export Parent topic Performing a one time Hyper V export Complete the steps i...

Page 270: ...the Hyper V server Non existent directories are automatically created You should not attempt to create them manually Export to shared folders for example to data share is not permitted 13 In the Virtu...

Page 271: ...down menu and then select VM Export 1 In the Virtual Machine Export Wizard select Continuous Virtual Standby 2 Click Next From the Core Console in the icon bar click Virtual Standby On the Virtual Sta...

Page 272: ...amount of RAM Select this option if you want to specify the amount of RAM in MB The minimum amount is 1024 MB and the maximum allowed by the application is 65536 MB The maximum amount of memory usage...

Page 273: ...iod To keep recovery points that would otherwise be combined and eventually deleted you can create an archive from the Core Console An archive is a file containing the full set of recovery points for...

Page 274: ...Configuring Core default retention policy settings The retention policy for the Core specifies how long the recovery points for a protected machine are stored in the repository The Core retention poli...

Page 275: ...s or Years and then keep one recovery point per hour for n retention time period Provides a more granular level of retention It is used as a building block with the primary setting to further define h...

Page 276: ...d machine see Customizing retention policy settings for a protected machine Parent topic Customizing retention policy settings for a protected machine The retention policy for a protected machine spec...

Page 277: ...overy points Enter a number to represent the retention period and then select the time period The default is 3 days You can choose from Days Weeks Months and Years and then keep one recovery point per...

Page 278: ...following a Select the Relocate outdated recovery points to an R3 repository option b Specify the age at which you want to relocate recovery points from your primary repository to the R3 repository Y...

Page 279: ...ite that is a self managed target Core Or you can configure outbound replication to a third party managed service provider MSP or cloud provider that hosts off site backup and disaster recovery servic...

Page 280: ...urce Core to a single target Core Figure 9 Point to point replication configuration Multipoint to point replication Replicates protected machines from multiple source Cores to a single target Core Fig...

Page 281: ...ery 281 Figure 11 Point to multipoint replication configuration Multi hop replication Replicates one or more protected machines from one target Core to another target Core producing additional failove...

Page 282: ...ch volume you choose to protect as well as all data on those volumes Successive backups are incremental snapshots which consist only of data changed on the protected volumes since the last backup The...

Page 283: ...a create a seed drive from the source Core and then consume the seed drive on the target Core You can also customize the replication schedule for a protected machine For example if you use the default...

Page 284: ...s to you you do not need to seed data In such cases replication can be completed entirely from the source Core If you set up replication for a Core with existing recovery points and may need to restor...

Page 285: ...f a seed drive This process seeds the target Core with base images and recovery points from the selected servers protected on the source Core The seeding process can be performed at any time Seeding c...

Page 286: ...Rapid Recovery transfers such as backups and any other critical applications you must run If you experience issues successfully transferring data over the network especially for certain protected or...

Page 287: ...ed recovery point data For more information see Determining your seeding needs and strategy Complete the steps in the following procedure to configure your source Core to replicate to a self managed t...

Page 288: ...vice a On the Protected Machines page of the Replication Wizard select Use a seed drive to perform the initial transfer If you currently have one or more protected machines replicating to a target Cor...

Page 289: ...scribed in the following table Table 130 Seed drive options Enter the details as described in the table Item Description Maximum Size Large archives of data can be divided into multiple segments Selec...

Page 290: ...he amount of time and space required for creating the seed drive Opting to build recovery point RP chains to the seed drive requires enough space on the seed drive to store the latest recovery points...

Page 291: ...ed circles in the Status column show whether a replicated machine is online or unreachable If you hover the cursor over the colored circle the status condition is displayed Status conditions include g...

Page 292: ...a list of actions to perform to affect the specific replication relationship Information about incoming replication from another Core is described in the following table Table 133 Information about i...

Page 293: ...g Replication grid To perform actions on multiple source Cores select the checkbox for each Core in the grid and then from the menu above the grid select the action you want to perform You can perform...

Page 294: ...as needed For more information on monitoring replication see Viewing incoming and outgoing replication Manage replication settings as needed For more information on managing replication settings see M...

Page 295: ...1 Select Use an existing target core 2 Select the target core from the drop down list 3 Click Next 4 Skip to Step 7 4 Click Next 5 On the Request page of the Replication Wizard enter the information...

Page 296: ...chive Output location Enter the location for the output It is used to define the location path where you want the archive to reside for example servername sharename User Name Enter a user name It is u...

Page 297: ...not overwrite or clear any existing seed data from the location If the location is not empty the seed drive write will fail Replace this Core Overwrites any pre existing seed data pertaining to this...

Page 298: ...approve a replication request on a third party target core 1 On the target Core navigate to the Rapid Recovery Core Console 2 From the icon bar click Replication The Replication page appears 3 On the...

Page 299: ...stomer This option could be used if a request was sent by mistake or if you want to deny a request without reviewing it For more information about replication requests see Reviewing a replication requ...

Page 300: ...ly have one or more protected machines replicating to a target Core you can include these machines on the seed drive by selecting the option Include already replicated recovery points in the seed driv...

Page 301: ...reserve for creating the seed drive by doing one of the following Select Entire Target to reserve all available space in the path provided on the Seed Drive Location page for example if the location...

Page 302: ...Drive go to Step 5 h On the Protected Machines page of the wizard select the protected machines you want to replicate to the target Core using the seed drive 5 Click Finish Parent topic Consuming the...

Page 303: ...Container Select a container associated with your account from the drop down menu Cloud Folder Name Enter the name of the folder in which the archived data is saved for example Rapid Recovery Archive...

Page 304: ...Abandoning the seed drive in the Core Console does not affect the seed drive file from its storage location 1 On the source Core open the Rapid Recovery Core Console and from the icon bar click Repli...

Page 305: ...a replication schedule for any replicated machine 1 On the target Core open the Rapid Recovery Core Console and from the icon bar click Replication The Replication page appears 2 In the Outgoing Repl...

Page 306: ...In the menu under the Outgoing Replication pane click Copy The Replication Wizard appears 5 On the Seed Drive Location page of the wizard use the Location drop down list to select from the following...

Page 307: ...erve for creating the seed drive by doing one of the following Select Entire Target to reserve all available space in the path provided on the Seed Drive Location page for example if the location is D...

Page 308: ...all Agents to Seed Drive go to Step 10 10 On the Protected Machines page of the wizard select the protected machines for which you want to create a seed drive 11 Click Finish Parent topic Monitoring r...

Page 309: ...t the host and port for the target Core Schedule Lets you set a customized schedule for replication to this target Core Add Machines Lets you select a host from a drop down list select protected machi...

Page 310: ...e following procedure to pause or resume replication 1 Open the Rapid Recovery Core Console and from the icon bar click Replication The Replication page appears 2 To pause replication for all replicat...

Page 311: ...he Outgoing Replication pane select a Core and from the menu at the top of the summary table click Force To force replication on a target Core from the Incoming Replication pane select a Core and from...

Page 312: ...to confirm this action 4 When satisfied click Save to save the replication settings and close the dialog box Parent topic Changing target Core settings You can change the host and port settings for in...

Page 313: ...On the source Core open the Rapid Recovery Core Console and from the icon bar click Replication The Replication page appears 2 In the Outgoing Replication pane click the arrow to the right of any sour...

Page 314: ...the protected machines you want to remove from outgoing replication as follows To completely remove the existing replication relationship between this source Core and any target Core click the Settin...

Page 315: ...eceived from that machine as well as remove the source core from replication select Delete existing recovery points 4 Click Yes to confirm deletion WARNING If you select this option all of the recover...

Page 316: ...continuous export to virtual machines Parent topic Snapshots and recovery points This section describes how to use and manage the snapshots and recovery points generated by Rapid Recovery It includes...

Page 317: ...pane and a Recovery Points pane You can view summary information about the recovery points for the machine as described in the following table Table 147 Recovery point summary information Info Descrip...

Page 318: ...is captured for a protected SQL or Exchange server the application displays a corresponding color status indicator in the Recovery Points grid This grid appears in the Recovery Points pane when viewi...

Page 319: ...where both an Exchange and SQL database exists for the recovery point the most severe status indicator displays for the recovery point Parent topic Mounting a recovery point In Rapid Recovery you can...

Page 320: ...another Windows machine you can use Windows Explorer to copy them with default permissions or original file access permissions For details see Restoring a directory or file using Windows Explorer to R...

Page 321: ...y points click the checkbox in the first column of each row representing the mount point you want to disconnect b Click Disconnect A confirmation dialog box appears c Click to confirm that you want to...

Page 322: ...he end to identify the recovery point For example 7d658e5f fa08 4600 95f0 5f486bc1b6a4 de0896fd 571a 4cc5 aeed 264d2c3c72f4 f377e145 dd4d 3ac3 5b15 37ce8f4913ba 2 8 Enter the following command to sele...

Page 323: ...d of the line item number A list of the base and incremental recovery points for the machine will display and includes The list includes the line item number date and timestamp location of volume size...

Page 324: ...the base image which is all data on the machine as well as all recovery points after the current until the next base image NOTE You cannot recover the recovery points you have deleted If you need the...

Page 325: ...points of a protected machine from a repository without deleting them you can migrate them to a different repository manually by using this procedure This process involves archiving recovery points f...

Page 326: ...ormation see Pausing and resuming protection 8 Take a new base image for each of the protected machines you moved For more information see Forcing a snapshot and use the Force Base Image option 9 Impo...

Page 327: ...Operating System instantly making that data available on demand For example if the database volume of Microsoft Exchange is corrupt Live Recovery can restore the volume database and Exchange services...

Page 328: ...dows 8 Windows 8 1 Windows 10 Windows Server 2012 and Windows Server 2012 R2 for normal transfers both base and incremental as well as with restoring data bare metal restore and virtual exports For mo...

Page 329: ...can filter by volumes if defined or by creation date of the recovery point 4 Click any recovery point to select it and then click Next The Destination page appears 5 On the Destination page choose th...

Page 330: ...h information from the selected recovery point using the Restore Machine Wizard click Next and proceed to Performing a bare metal restore for Windows machines If you have already created the boot CD t...

Page 331: ...or Linux machines or VMs using agentless protection If you want to force the selected volumes to dismount before the restore begins select Force Dismount CAUTION If you do not force a dismount before...

Page 332: ...ility 1 Mount the recovery point that contains the data you want to restore For details see Mounting a recovery point 2 In Windows Explorer navigate to the mounted recovery point and select the direct...

Page 333: ...would for a currently protected machine by mounting a recovery point locating the item that you want to recover and using Windows Explorer to copy and paste the item to your destination There are adv...

Page 334: ...al machine If you are performing a restore to a system volume this is considered a BMR If you are performing a restore and require a boot CD this is also considered a BMR Other circumstances in which...

Page 335: ...communicate with backups on the Core See Understanding boot CD creation for Windows machines If you require physical media to start up the destination machine you need to transfer the boot CD ISO ima...

Page 336: ...ry points of the protected server you want to restore Hardware to restore new or old similar or dissimilar The target machine must meet the installation requirements for an agent for details see the D...

Page 337: ...t of the process for performing a BMR using that wizard You can also manage a boot image from the Create Boot CD dialog box For information on managing a boot CD image outside of the Restore Machine W...

Page 338: ...ple F filename iso NOTE The file extension must be iso When specifying the path use only alphanumeric characters the hyphen the backslash only as a path delimiter and the period only to separate host...

Page 339: ...through the filing system to locate the compressed driver file select the file and then click Open e Repeat Step c and Step d as appropriate until you inject all necessary drivers For more informatio...

Page 340: ...restore Optionally if you do not wish to restore a listed volume clear the option NOTE At least one volume must be selected to perform the restore 18 Click Finish CAUTION All existing partitions and...

Page 341: ...ng the boot CD If you discover the boot CD you created does not contain the drivers necessary to complete the restore you can also load drivers on to the target machine using the URC Fore more informa...

Page 342: ...load UltraVNC version 1 0 9 1 or later for x64 architecture Install it and save the winvnc exe file to C Program Files AppRecovery Core BootCdKit UltraVnc_x64 6 If you plan to restore to dissimilar ha...

Page 343: ...loading additional drivers you must first load an Ethernet controller and network adapter For more information see Loading drivers using the Universal Recovery Console NOTE If you created the boot CD...

Page 344: ...a bare metal restore for Windows machines Parent topic About the Universal Recovery Console tools The Universal Recovery Console URC includes access to tools that may assist you with completing a bar...

Page 345: ...wing tasks are prerequisites for this procedure Creating a boot CD ISO image Transferring the boot CD ISO image to media Loading the boot CD and starting the target machine Complete the following proc...

Page 346: ...s list shows the drivers that are necessary for the hardware but are not included in the boot CD 7 Right click a device from the list and then click Load Driver 8 In the Select driver load mode window...

Page 347: ...can identify each other properly on the network then the volumes for the selected recovery point are loaded and the Disk Mapping page appears In this case your next step is to map volumes 8 Proceed to...

Page 348: ...e the steps in the following procedure to automatically select the volumes you want to recover and where to restore them 1 On the Disk Mapping page of the Restore Machine Wizard next to Volume mapping...

Page 349: ...ent topic Performing a BMR from an archive Rapid Recovery lets you restore a machine from bare metal using an archived recovery point The following tasks are prerequisites for this procedure Creating...

Page 350: ...rop down list select a container 3 For the Cloud path from the drop down list select the path to the archive For Amazon S3 complete the following steps 1 Enter the following credentials Access key Sec...

Page 351: ...see DiskPart Command Line Options Standard 7 SP1 on the Microsoft Developer Network NOTE If no volumes exist on the drive of the machine on which you are performing a bare metal restore BMR you cannot...

Page 352: ...e through the filing system to locate the compressed driver file and then select the file 5 Click OK The URC loads the driver into the operating system you selected 6 Repeat Step 3 through Step 5 for...

Page 353: ...ss to perform a BMR from the command line See Launching a bare metal restore for a Linux machine using the command line If you are using auto partitioning for BMR within the Core Console you do not ne...

Page 354: ...drive to create destination partitions on the target machine to contain the source volumes Any destination partition should be at least as large as the original source partition Restore path Identify...

Page 355: ...click Download 4 Save the Live DVD ISO image If you are restoring a virtual machine you can save it to a network location and set the VM to start up from a CD or DVD drive associated with the ISO ima...

Page 356: ...ns to meet this requirement You can launch the restore from the command line using the aamount utility or you can launch the restore from the Rapid Recovery Core Console If restoring using the user in...

Page 357: ...r the boot partition to make the partition bootable type the following command and then press Enter a 10 To assign a bootable flag for the appropriate partition type the number of the partition and th...

Page 358: ...Performing a bare metal restore for Linux machines It is part of the process for Managing Linux partitions Complete the steps in this procedure to mount partitions on the Linux machine before performi...

Page 359: ...local_mount utility then you must first set appropriate privileges mount volumes execute local_mount obtain information about the Core from the list of machines connect to the core obtain a list of r...

Page 360: ...virtual BMR target machine 1 To run the Rapid Recovery local_mount utility as root type the following command and then press Enter sudo local_mount 2 To list the protected machines type the following...

Page 361: ...ist of volumes within the recovery point followed by the path For example r machine_line_item_number base_image_recovery_point_line_number volume_letter path For example type r 1 24 a dev sda1 In this...

Page 362: ...the specified path The path for the restore is the path for the device file descriptor not the directory to which it is mounted You can also specify a line number in the command instead of the recover...

Page 363: ...ore information about monitoring Rapid Recovery events see Viewing tasks alerts and events Parent topic Starting a restored target server Complete the steps in this procedure to start the restored tar...

Page 364: ...g system to operate all devices on your target server successfully For more information see Loading drivers using the Universal Recovery Console Complete the following procedure to repair startup prob...

Page 365: ...g systems You can perform this procedure using the version that comes with your Linux distribution If a version of GRUB is not installed you will have to re install the default version appropriate for...

Page 366: ...the old UUID of the partition or partitions from the mounted recovery points etc mtab file and compare it to the UUIDs for the root for Ubuntu and CentOS boot for CentOS and RHEL and data partitions b...

Page 367: ...t can specify details for one or more Cores By default this set of information includes jobs for all machines every protected machine replicated machine and recovery point only machine in the specifie...

Page 368: ...select or exclude jobs that are machine independent in which case the report shows status for Core jobs only This report is not available from the perspective of any single protected machine This job...

Page 369: ...es apply All reports can be generated from the perspective of the Core Additionally two job types the Job report and the Failure report can be generated from the perspective of a protected machine For...

Page 370: ...o the time you generate the report Last 365 days Reports activity for the last year relative to the time you generate the report All Time This time period spans the lifetime of the Core Custom This ti...

Page 371: ...tected but still have recovery points saved in the repository Source cores If your Core is a target Core and replicates recovery points for any machines protected on a source Core then the name of tha...

Page 372: ...ne Complete the steps in the following procedure to generate a report for a protected machine 1 Navigate to the Rapid Recovery Core Console 2 From the Protected Machines menu click the protected machi...

Page 373: ...lear that type You can select some or all jobs from either category 6 Click Preview to generate the report with the specified criteria If the report criteria you selected is not found the report still...

Page 374: ...Navigate to the Rapid Recovery Core Console 2 From the icon bar click More and then select Reports The Job Report page appears A downward facing arrow appears to the right of the current report name 3...

Page 375: ...ou can customize the report Use the filters to select or exclude some machines You can also select or exclude jobs that are machine independent in which case the report shows status for Core jobs only...

Page 376: ...Folder Name field specify a folder into which to store future generated reports 7 When satisfied with your Destination options click Next 8 On the Schedule page of the wizard from the Send data menu s...

Page 377: ...ave the generated report Finally you can also change the schedule of the report Complete the steps in this procedure to modify parameters for a scheduled report 1 Navigate to the Rapid Recovery Core C...

Page 378: ...duled reports click Delete Deleting a scheduled report only prevents the generation of future reports If previous scheduled reports have been saved they are not removed Parent topic Using the Reports...

Page 379: ...re display options To the right of the toolbar the Tools option expands a drop down menu providing report navigation controls The elements of the Reports toolbar are described in the following table T...

Page 380: ...re described below Tools Go to first page Navigates you to the first page of the generated report Tools Go to last page Navigates you to the last page of the generated report Tools Rotate clockwise Th...

Page 381: ...e appropriate core protected machine and job type each row includes A summary of the job The job status Any errors related to the job The start and end dates for the job The job duration in seconds Th...

Page 382: ...re no errors within the date range specified in your report criteria NOTE Results for target Cores and protected machines parameters appear for the Core level report only For information on how to gen...

Page 383: ...The chart shows protected machines by the ratio of successful jobs of any type compared to failed jobs Canceled jobs are not considered for these statistics The X or horizontal axis shows the number o...

Page 384: ...012 R2 operating systems must have the ASP NET 4 5 feature installed on the server for proper loading of the GUI This configuration is included for you as part of the Rapid Recovery installer For more...

Page 385: ...the navigation area collapses To expand the navigation area click the right arrow Links menu Contact Dell Support Links to the Dell Support website in a new browser window providing access to Live Cha...

Page 386: ...Configuring the Rapid Recovery Central Management Console involves adding Cores and Core groups establishing their settings and specifying access settings for groups if required Once you complete the...

Page 387: ...the IP address for accessing the Core If the Core you are adding is the current server you can use localhost Port Enter a port number for the connection The default value is 8006 User name Enter a use...

Page 388: ...u choose to specify the connection through the use of a host name or IP address you must enter the appropriate information in the hostname or IP address field On what port is Core name listening Selec...

Page 389: ...first For more information see Adding a Core group to the Central Management Console Complete the steps in the following procedure to configure core group settings 1 From the Rapid Recovery Central Ma...

Page 390: ...f you want to provide access to an individual then in the Name text field enter the name of the individual and then click User This is the default option For example type Administrator or if the machi...

Page 391: ...u want to include in the report 3 From the report type drop down menu select the type of report you want to generate You can choose from one of the following options Job Report Failure Report Summary...

Page 392: ...Core 5 Do one of the following Click Preview to generate and view the generated report online Update the report dynamically by changing report criteria then click Preview again Choose an export format...

Page 393: ...ng area contains buttons accessible from anywhere in the Core Console These buttons launch wizards to accomplish common tasks such as protecting a machine performing a restore from a recovery point cr...

Page 394: ...er interface below the icon bar The left navigation area contains the text filter and the Protected Machines menu If you have added replication to this Core then this area contains a Replicated Machin...

Page 395: ...are to one or more machines simultaneously This function uses the Deploy Agent Software Wizard Button bar Restore button and menu The Restore button opens the Restore Machine Wizard to allow you to re...

Page 396: ...ication begin immediately Additionally you can specify whether a seed drive will be used to copy data for existing recovery points to the target Core Icon bar Details about the icon bar appear in the...

Page 397: ...ettings SNMP settings and vSphere settings Icon bar More icon More Click the More icon to access other important features Each has its own icon listed below Icon bar More icon System Info System Info...

Page 398: ...sitories Repositories Lets you view and manage repositories associated with your Core Icon bar More icon Encryption Keys Encryption Keys Lets you view manage import or add encryption keys that you can...

Page 399: ...igation area UI Element Description Protected Machines menu The Protected Machines menu appears as the first menu in the left navigation area if one or more machines is protected in your Core If you c...

Page 400: ...upper case letters You can perform actions for like items in a custom group by clicking the arrow to the right of the custom group title For example you can force a snapshot for every protected machin...

Page 401: ...e Viewing the Protected Machines menu Replicated Machines menu If replicating machines from another Rapid Recovery Core the name of that Core appears as a separate menu under the Protected Machines me...

Page 402: ...rm actions for like items in the group If you click the Custom Groups menu the Machines page appears showing a pane for each of the Rapid Recovery objects that appear in your group protected machines...

Page 403: ...ion red authentication error and gray offline or unreachable Encryption status The lock icon indicates encryption status for the selected protected machine An open lock indicates no encryption a close...

Page 404: ...ing a snapshot One time Export Launches the Virtual Machine Export Wizard This Wizard let you perform a one time export of recovery point data from a protected machine to a virtual machine in any supp...

Page 405: ...r resume replication You can also copy existing recovery points to a seed drive For more information see Managing replication settings Cancel Lets you cancel all currently active operations for the se...

Page 406: ...r the selected agent machine For more information see Managing snapshots and recovery points Restore Launches the Restore Machine Wizard This process lets you restore data from recovery point on the C...

Page 407: ...ting for another job to complete before it can initiate Waiting A job waiting for your approval or completion such as a seed drive For more information about seed drives see Replication Complete A job...

Page 408: ...Shows the date and time when the task completed Job Details Available for tasks only Opens the Monitor Active Task dialog box so you can view details of the specific job or task These details include...

Page 409: ...licy Lets you specify a retention policy for the selected machine You can choose to use the Core s default policy or you can differentiate the retention policy for this machine only For more informati...

Page 410: ...a to the repository managed by the Core The Rapid Recovery PowerShell Module is a Windows utility that lets users interact with the Core server by using Windows PowerShell scripts This module offers s...

Page 411: ...timeActivationPolicy true supportedRuntime version v4 0 30319 supportedRuntime version v2 0 50727 startup configuration Parent topic Launching PowerShell and importing the module Unlike other system m...

Page 412: ...ny time by using the Get Help command_name cmdlet For example to get information about the virtual machine export cmdlet enter the following cmdlet and then press Enter Get Help Start VMExport The obj...

Page 413: ...Clusters Retrieve a collection of protected clusters Get CompletedJobs Retrieve a collection of completed jobs Get ExchangeMailStores Retrieve a collection of Exchange mail stores Get Failed Get infor...

Page 414: ...achine New Mount Mount recovery points New Replication Set up and force replication New Repository Create new DVM repository New ScheduledArchive Schedule a new recurring archive New Snapshot Force sn...

Page 415: ...check for protected Exchange mail stores Start EsxiExport Force export to an ESXi server Start HypervExport Force export to a Hyper V server Start LogTruncation Force log truncation Start Mountability...

Page 416: ...e for the command is as follows Edit EsxiVirtualStandby HostName String HostPort String HostUserName String HostP Command Options The following table describes the options available for the Edit EsxiV...

Page 417: ...tore bootcdbuilder create boot CDs diagnostics upload logs exchange Exchange Server files check export recovery point export pushinstall deploy agents rollback restoring from a recovery point rollup r...

Page 418: ...ou specify a password you also have to provide a log on If none are provided then the logged on user s credentials will be used protectedserver Show jobs for a specific protected machine indicated by...

Page 419: ...l Parent topic Edit ScheduledArchive The Edit ScheduledArchive command lets you use PowerShell to make changes to an existing scheduled archive Usage The usage for the command is as follows Edit Sched...

Page 420: ...00 for local and network locations and should not be greater than 150 for a cloud location cloudaccountname Optional Use only for cloud archiving The name of the cloud account where you want to save t...

Page 421: ...te the archive for example Monday dayofmonth Use only for the month option of the scheduletype parameter The day number of the month on which to automatically create the archive for example 15 time Th...

Page 422: ...ed protectedserver Show jobs for a specific protected machine indicated by IP address all Show all jobs including those performed by the Core and all protected servers number Optional Determine how ma...

Page 423: ...lStandby TargetPath String PathUserName String PathPassword String tring Volumes String VMName String UseSourceRam Ram String User Strin Password String Verbose Debug ErrorAction ActionPreference Warn...

Page 424: ...and restore bootcdbuilder create boot CDs diagnostics upload logs exchange Exchange Server files check export recovery point export pushinstall deploy agents rollback restoring from a recovery point r...

Page 425: ...d to the remote Core host machine If you specify a password you also have to provide a log on If none are provided then the logged on user s credentials will be used protectedserver Show jobs for a sp...

Page 426: ...ll active jobs on the local Core Get activejobs all Parent topic Get Clusters The Get Clusters command returns information about server clusters protected in the Core Usage The usage for the command i...

Page 427: ...all f number l number number jobtyp Command Options The following table describes the options available for the Get CompletedJobs command Table 192 Get CompletedJobs command options Option Descriptio...

Page 428: ...ploy agents rollback restoring from a recovery point rollup recovery point rollups sqlattach agent attachability checks and mount mount repository By default all jobs of the specified type are returne...

Page 429: ...hen the logged on user s credentials will be used password Optional Password to the remote Core host machine If you specify a password you also have to provide a log on If none are provided then the l...

Page 430: ...be used protectedserver Show jobs for a specific protected machine indicated by IP address number Optional Determine how many records to display available values are all display all jobs l number or...

Page 431: ...ding those performed by the Core and all protected servers number Optional Determine how many records to display available values are all display all jobs l number or number fetches most recent jobs s...

Page 432: ...d is as follows Get Mounts core host name user user name password password protectedserver server name Command Options The following table describes the options available for the Get Mounts command Ta...

Page 433: ...s available for the Get Passed command Table 197 Get Passed command options Option Description Display this help message core Optional Remote Core host machine IP address with an optional port number...

Page 434: ...nstalled on the local machine user Optional User name for the remote Core host machine If you specify a user name you also have to provide a password If none are provided then the logged on user s cre...

Page 435: ...remote Core host machine If you specify a password you also have to provide a log on If none are provided then the logged on user s credentials will be used protectedserver Show jobs for a specific p...

Page 436: ...isplay available values are all display all jobs l number or number fetches most recent jobs sorted by execution and time f number displays first recovery jobs sorted by execution and time By default...

Page 437: ...bes the options available for the Get RecoveryPoints command Table 201 Get RecoveryPoints command options Option Description Display this help message core Optional Remote Core host machine IP address...

Page 438: ...eplicated server If used in an MSP environment from the target Core this can potentially expose the login password of the administrator user For environments with encrypted repository data this does n...

Page 439: ...machine IP address with an optional port number By default the connection is made to the Core installed on the local machine user Optional User name for the remote Core host machine If you specify a u...

Page 440: ...provide a password If none are provided then the logged on user s credentials will be used password Optional Password to the remote Core host machine If you specify a password you also have to provide...

Page 441: ...r s credentials will be used protectedserver Show jobs for a specific protected machine indicated by IP address Example Lists all SQL databases jobs on the local Core Get SqlDatabases protectedserver...

Page 442: ...on the specified agent machine Get UnprotectedVolumes protectedserver 10 10 10 10 Parent topic Get VirtualizedServers The Get VirtualizedServers command returns information about virtualized servers U...

Page 443: ...ss Command Options The following table describes the options available for the Get Volumes command Table 208 Get Volumes command options Option Description Display this help message core Optional Remo...

Page 444: ...following table describes the options available for the New Base command Table 209 New Base command options Option Description Display this help message all Base image for all agents core Optional Re...

Page 445: ...l port number By default the connection is made to the Core installed on the local machine user Optional User name for the remote Core host machine If you specify a user name you also have to provide...

Page 446: ...of an OpenStack cloud account This option is required only for OpenStack cloud accounts Example Create a new Amazon S3 cloud account named Amazon S3 Account with the access key akey and the secret ke...

Page 447: ...al The description of the encryption key Example Create an encryption key on the local Core New EncryptionKey name EncryptionKey1 passphrase 123456 Parent topic New EsxiVirtualStandby The New EsxiVirt...

Page 448: ...example c d NOTE Do not use trailing slashes in volume names vmname The Microsoft Windows name of the virtual machine hostname The name of the virtual server host hostport The port number to use for c...

Page 449: ...he command is as follows New HyperVVirtualStandby core host name user login password password protectedserver na volumes volumes names vmname virtual machine name gen2 useVhdx uselocalmachine st name...

Page 450: ...to use the second VM generation If not specified generation 1 is used Rapid Recovery supports generation 2 from Windows Server 2012 R2 through Windows 8 1 usevhdx Optional If you specify this option...

Page 451: ...Mount The New Mount command mounts a snapshot of one or more drives Usage The usage for the command is as follows New Mount core host name user user name password password protectedserver machine name...

Page 452: ...quotes If not specified all volumes will be mounted drivers Optional Comma separated list of volume names to mount If not specified all volumes will be mounted NOTE This option is obsolete use volume...

Page 453: ...f you specify a user name you also have to provide a password If none are provided then the logged on user s credentials will be used password Optional Password to the remote Core host machine If you...

Page 454: ...ogged on user s credentials will be used name Repository name size Size of repository extent Available units are b Kb MB GB TB PB datapath For local location only Determines data path of repository ex...

Page 455: ...the Core installed on the local machine user Optional User name for the remote Core host machine If you specify a user name you also have to provide a password If none are provided then the logged on...

Page 456: ...ified by using one of the following four values replacethiscore Overwrites any pre existing archived data pertaining to this Core but leaves the data for other Cores intact erasecompletely Clears all...

Page 457: ...w archive New ScheduledArchive core 10 10 10 10 user administrator password 23WE sdd protectedserver Create an incremental archive for all recovery points with creation dates starting from 04 30 2012...

Page 458: ...apshot for all protected machines New Snapshot all Parent topic New VBVirtualStandby The New VBVirtualStandby command lets you use PowerShell to create a new virtual export to a VirtualBox virtual mac...

Page 459: ...virtual server that the source protected machine has linuxhostname The Linux VirtualBox server host name hostport The Linux VirtualBox server port targetpath The local network or Linux path to the fo...

Page 460: ...ibes the options available for the New VMVirtualStandby command Table 220 New VMVirtualStandby command options Option Description Display this help message core Optional Remote Core host machine IP ad...

Page 461: ...ptional Specify this option if you need to start an initial on demand virtual machine export after configuring the virtual standby Example Create a new VMware Workstation virtual standby New VMVirtual...

Page 462: ...n user Optional Login for the remote Core host machine If you specify a login you also have to provide a password If none are provided then the logged on user s credentials will be used Example Push r...

Page 463: ...le Push rollup for a single protected machine Push Rollup core 10 10 10 10 8006 user administrator password 23WE sdd protectedserver 10 1 Push rollup for all protected machines Push Rollup all Parent...

Page 464: ...0 10 10 10 8006 user administrator password 23WE sdd deleterecoverypoint Parent topic Remove Mount The Remove Mount command dismounts a mounted recovery point specified by the Path Dismount points for...

Page 465: ...r password 23WE sdd path C mountedReco Parent topic Remove Mounts The Remove Mounts command dismounts all mounted recovery points Usage The usage for the command is as follows Remove Mounts core host...

Page 466: ...e RecoveryPoints command options Option Description Display this help message core Optional Remote Core host machine IP address with an optional port number By default the connection is made to the Co...

Page 467: ...uential incrementals or a sequential set of orphaned points to delete selected by recovery point number or time of recovery point creation all Optional Delete all protected machines from the Core Exam...

Page 468: ...Remove repository all Parent topic Remove ScheduledArchive If you scheduled Rapid Recovery to regularly archive recovery points for a specific machine you can use the Remove ScheduledArchive PowerShe...

Page 469: ...lStandby If you scheduled Rapid Recovery to continuously export data to a virtual machine then you can use the Remove VirtualStandby PowerShell command to cancel and delete this scheduled job Usage Th...

Page 470: ...command is as follows Resume Replication core host name user user name password password all protectedserve Command Options The following table describes the options available for the Resume Replicat...

Page 471: ...from the list above or type exit to exit Script pauses requiring user to specify an index number for the appropriate repository Enter the index number for the script to complete in this case 2 Example...

Page 472: ...10 10 4 Parent topic Resume VirtualStandby The Resume VirtualStandby PowerShell command lets you resume the suspended export of data to a Rapid Recovery virtual standby machine Usage The usage for the...

Page 473: ...nes See Suspend VMExport for more details Usage The usage for the command is as follows Resume VMExport core host name user user name password password all protectedserver Command Options The followin...

Page 474: ...Archive path startdate enddate all protectedserver machine name or IP core h Command Options The following table describes the options available for the Start Archive command Table 234 Start Archive c...

Page 475: ...2012 all Parent topic Start AttachabilityCheck The Start AttachabilityCheck command forces an attachability check for all SQL Server databases protected by the Core Usage The usage for the command is...

Page 476: ...used for the attachability check time Optional Determines recovery point to be selected for SQL attachability check You need to specify exact time in the format MM DD YYYY hh mm tt for example 04 24...

Page 477: ...obtain the numbers You can specify several space separated numbers to delete multiple recovery points with a single command time Optional Select the recovery point to check by its creation time inste...

Page 478: ...e provided then the logged on user s credentials will be used protectedserver Protected machine with recovery points to be exported volumes Optional List of volume names to be exported If not specifie...

Page 479: ...on the original drive plus some extra space in megabytes By default thin provisioning is selected diskmapping Optional Select either auto manual or withvm By default auto mapping is enabled resetup O...

Page 480: ...rver Protected machine with recovery points to be exported volumes Optional List of volume names to be exported If not specified all volumes in the specified recovery points will be exported Values mu...

Page 481: ...mber hostusername The user name to the virtual server host hostpassword The password to the virtual server host vmlocation Local or network path to the folder where you want to store the virtual machi...

Page 482: ...og truncation either sql or exchange If not specified logs are truncated on all databases Example Truncate SQL logs Start LogTruncation protectedserver SQL1 target sql Truncate Exchange server logs al...

Page 483: ...or rpn option is specified in this command than the most recent recovery point will be exported time Optional Determines recovery point to be selected for export You need to specify exact time in the...

Page 484: ...be used repository Name of a repository on the Core where the protected machine s data is stored agentname Protected machine name or IP address agentusername Log on to the server to be protected agen...

Page 485: ...redentials will be used repository Name of a repository on the Core where the protected machine s data is stored The name must be enclosed in double quotes clustername The name of the cluster to prote...

Page 486: ...onnection is made to the Core installed on the local machine user Optional User name for the remote Core host machine If you specify a user name you also have to provide a password If none are provide...

Page 487: ...optional port number By default the connection is made to the Core installed on the local machine user Optional User name for the remote Core host machine If you specify a user name you also have to...

Page 488: ...t where the archive will be saved When you use this option you should also specify the cloudaccountname parameter manifestcore Optional Specify the Core that you want to use from the manifest of the r...

Page 489: ...ve ids 799138c8 3dfc 4398 9711 1823733c2a31 26c29bb7 b320 47f5 b5a8 dffc49f Parent topic Start VBExport The start VBExport command initiates the launch of a virtual export from the selected recovery p...

Page 490: ...volume names to be exported If not specified all volumes in the specified recovery points will be exported Values must be enclosed in double quotes each separated by a space do not use trailing slashe...

Page 491: ...Optional Use only when you specify a user account to register the exported virtual machine using parameter accountusername For local or network machine only Example Export all volumes from the latest...

Page 492: ...rtualStandby core 10 10 10 10 8006 user administrator password 23WE sdd protectedse Parent topic Start VMExport The Start VMExport command initiates the launch of a virtual export from the selected re...

Page 493: ...quotes each separated by a space do not use trailing slashes in volume names For example specify C not C rpn Optional The sequential number of a recovery point to be exported You can use the Get Reco...

Page 494: ...ws Stop ActiveJobs protectedserver machine name IP address core host name user user nam Command Options The following table describes the options available for the Stop ActiveJobs command Table 249 St...

Page 495: ...ta from recovery point rollup recovery point rollup s sqlattach agent attachability checks mount not repository By default all jobs of the specified type are canceled Example Stop transfer job in prot...

Page 496: ...ame you also have to provide a password If none are provided then the logged on user s credentials will be used incoming Host name of the remote Core that replicates to the Core machine Replication is...

Page 497: ...number By default the connection is made to the Core installed on the local machine password Optional Password to the remote Core host machine If you specify a password you also have to provide a user...

Page 498: ...he Core installed on the local machine password Optional Password to the remote Core host machine If you specify a password you also have to provide a user name If none are provided then the logged on...

Page 499: ...used password Optional Password to the remote Core host machine If you specify a password you also have to provide a user name If none are provided then the logged on user s credentials will be used...

Page 500: ...s will be used all Pause exports for all virtual standby machines protectedserver The name or names separated by a comma and space of the protected machines with virtual standby machines that you want...

Page 501: ...VMExport protectedserver 10 10 12 25 Parent topic Update Repository The Update Repository command adds an extent to an existing DVM repository The size specified must be between 250MB and 16TB Usage...

Page 502: ...etermines login to share location sharepassword For share location only Determines password to share location Example Add an extent to the DVM repository of the minimum size Update Repository name Rep...

Page 503: ...ingle server protected Mode READ READWRITE WRITE Recovery Point Mount mode Default Read Volumes Snapshot Volume Letter Snapshot volume letter from Rapid Recovery Agent Default All User User Name User...

Page 504: ...ly covered by Dell Support Using PowerShell scripts in Rapid Recovery Windows PowerShell is a Microsoft NET Framework connected environment designed for administrative automation Rapid Recovery includ...

Page 505: ...lder the configuration file powershell exe config NOTE The configuration file powershell_ise exe config must have the same content as the powershell exe config file CAUTION If the pre PowerShell or po...

Page 506: ...ame as the sample script files AgentProtectionStorageConfiguration namespace Replay Common Contracts Agents The following table presents the available objects for the AgentProtectionStorageConfigurati...

Page 507: ...GetChangedBlocksRetries get set Gets or sets the count of retries if initial retrieval of changed blocks from the agent failed public int MaxRetries get set Gets or sets the maximum number of times a...

Page 508: ...e is lower than the amount specified in this parameter then all change logs are deleted and a base image is forced public uint MaxChangeLogsSizePercents get set Gets or sets a maximum size of driver c...

Page 509: ...ackgroundJobRequest The following table presents the available objects for the ExportJobRequest parameter Table 263 Objects for the ExportJobRequest parameter Method Description public uint RamInMegab...

Page 510: ...snap TransferJobRequest namespace Replay Core Contracts Transfer Inherits its values from the parameter BackgroundJobRequest The following table presents the available objects for the TransferJobRequ...

Page 511: ...s many block writes are outstanding those additional blocks will be ignored until one of the outstanding blocks gets written MaxSegmentSize The maximum number of contiguous blocks to transfer in a sin...

Page 512: ...value indicating whether the log truncation job is performing or not TransferPrescriptParameter namespace Replay Common Contracts PowerShellExecution Inherits its values from the TransferScriptParame...

Page 513: ...onfiguration AgentTransferConfiguration is an object which will have the following data MaxConcurrentStreams The maximum number of concurrent TCP connections the core will establish to the agent for t...

Page 514: ...f times a failed transfer should be retried before it is presumed failed UseDefaultMaxRetries A value indicating that the maximum number of retries is the default value ProviderId The GUID of the VSS...

Page 515: ...rformed public AgentProtectionStorageConfiguration StorageConfiguration get set Gets or sets the storage configuration The AgentProtectionStorageConfiguration object contains the following data Reposi...

Page 516: ...n VirtualMachineLocation namespace Replay Common Contracts Virtualization The following table presents the available objects for the VirtualMachineLocation parameter Table 269 Objects for the VirtualM...

Page 517: ...for the VolumeNameCollection parameter Method Description public override bool Equals object obj Determines whether this instance and a specified object which must also be a VolumeNameCollection objec...

Page 518: ...regVal regVal Common Contracts dll System Reflection Assembly LoadFrom regVal out null Converting input parameter into specific object TransferPrescriptParameterObject TransferPrescriptParameter as R...

Page 519: ...overy Core 5 regVal regLM GetValue InstallLocation regVal regVal CoreService Common Contracts dll System Reflection Assembly LoadFrom regVal out null Converting input parameter into specific object Ex...

Page 520: ...ARE Microsoft Windows CurrentVersion Uninstall AppRecovery Core 5 regVal regLM GetValue InstallLocation regVal regVal CoreService Common Contracts dll System Reflection Assembly LoadFrom regVal out nu...

Page 521: ...er is null else echo TransferConfiguration TransferJobRequestObject TransferConfiguration echo StorageConfiguration TransferJobRequestObject StorageConfiguration echo LatestEpochSeenByCore LatestEpoch...

Page 522: ...else echo AgentIds RollupJobRequestObject AgentIds echo IsNightlyJob RollupJobRequestObject IsNightlyJob AgentsCollection Agents as System Collections Generic List 1 System Guid if AgentsCollection eq...

Page 523: ...ooks you can perform system operations before and after a transfer or export For example you may want to disable a certain cronjob while a transfer is occurring and enable it once the transfer has fin...

Page 524: ...nsferPrescriptParameter_LatestEpochSeenByCore The following parameters are supported on Linux for post transfer scripts TransferPostscriptParameter_VolumeNames TransferPostscriptParameter_VolumeNames...

Page 525: ...set The Key method generates a pseudorandom but not cryptographically secure key which can be used as a one time password to authenticate transfer requests public bool ForceBaseImage get set Gets or s...

Page 526: ...s the ordinal number of the most recent snapshot taken by the Core This is the epoch number assigned by the filter driver to this particular snapshot at the moment it was taken with VSS Parent topic S...

Page 527: ...run on the protected machine after transferring a snapshot The following script stores the values from input parameters in the Pre Post TransferScriptResult txt which is located and stored in the roo...

Page 528: ...means that they use HTTP requests to provide access to resources data entities through URI paths Rapid Recovery APIs use standard HTTP methods such as GET PUT POST and DELETE Because REST APIs are ba...

Page 529: ...EST service operations including methods and descriptions 2 Open the Core Client HTML file in a web browser to view detailed C information When you click any hyperlinked service contract class the bro...

Page 530: ...work with Rapid Recovery Core these DLLs are required NOTE The DLL version used must match the version of the Core You can download the SDK as archive API Reference x x x xxxx Each x represents a dig...

Page 531: ...Upgrade Guide provides an overview of the Rapid Recovery architecture and describes the steps necessary for installing the Rapid Recovery components and for upgrading the Core or Agent components from...

Page 532: ...ftware with a valid maintenance contract and to customers who have trial versions To access the Support Portal go to https support quest com The Support Portal provides self help tools you can use to...

Page 533: ...onent intended for environments with two or more Rapid Recovery Cores This component is a web portal providing a central interface where you can group manage and generate reports for multiple Cores us...

Page 534: ...lock of data is XORed with the previous ciphertext block before being encrypted this way each new ciphertext block depends on all preceding plaintext blocks A passphrase is used as an initialization v...

Page 535: ...runcation Log truncation is a function that removes log records from the transaction log For a SQL Server machine when you force truncation of the SQL Server logs this process identifies free space on...

Page 536: ...pipe machine display name encryption key repository path description colon machine display name encryption key repository Use of this symbol is supported when specifying a path for example c data forw...

Page 537: ...stalled Some virtual machines can also be protected agentlessly with some limitations Parent topic quorum For a failover cluster the number of elements that must be online for a given cluster to conti...

Page 538: ...State Transfer REST is a simple stateless software architecture designed for scalability Rapid Recovery uses this architecture for its Application Program Interfaces APIs to automate and customize ce...

Page 539: ...oft Volume Shadow Services VSS to facilitate application crash consistent snapshots Parent topic SQL attachability SQL attachability is a test run within the Rapid Recovery Core to ensure that all SQL...

Page 540: ...mand or you can define requirements to create the bootable VM and continually update it after each snapshot is captured on the original protected machine Parent topic Volume Manager The Rapid Recovery...

Reviews: