background image

Removing a Cloud Account

Adding a cloud account

Before you can export your archived data to a cloud, add the account for your cloud provider in the Core 
Console.
To add a cloud account:

1.

In the Core Console, click the

 Tools

 tab.

2.

In the left menu, click 

Clouds

.

3.

On the 

Clouds

 page, click 

Add New Account

.

The 

Add New Account

 dialog box opens.

4.

Select a compatible cloud provider from the

 Cloud Type

 drop-down list.

5.

Enter the details described in the following table based on the cloud type selected in Step 4.

Table 1. Adding a cloud account

Cloud Type

Text Box

Description

Microsoft Azure

Storage Account Name

Enter the name of your 
Windows Azure storage 
account.

Access Key

Enter the access key for your 
account.

Display Name

Create a display name for this 
account in AppAssure; for 
example, Windows Azure 1.

Amazon S3

Access Key

Enter the access key for your 
Amazon cloud account.

Secret Key

Enter the secret key for this 
account.

Display Name

Create a display name for this 
account in AppAssure; for 
example, Amazon 1.

Powered by OpenStack

User Name

Enter the user name for you 
OpenStack-based cloud 
account.

API Key

Enter the API key for your 
account.

Display Name

Create a display name for this 
account in AppAssure; for 
example, OpenStack 1.

Tenant ID

Enter your tenant ID for this 
account.

Authentication URL

Enter the authentication URL 
for this account.

40

Содержание PowerVault DL4000

Страница 1: ...Dell DL4000 Appliance User s Guide ...

Страница 2: ...problem WARNING A WARNING indicates a potential for property damage personal injury or death Copyright 2015 Dell Inc All rights reserved This product is protected by U S and international copyright and intellectual property laws Dell and the Dell logo are trademarks of Dell Inc in the United States and or other jurisdictions All other marks and names mentioned herein may be trademarks of their res...

Страница 3: ... Recovery as a Service RaaS 19 Retention and archiving 19 Virtualization and cloud 20 Alerts and event management 20 License portal 20 Web console 20 Service management APIs 21 2 Working with the DL4000 Core 22 Accessing the DL4000 Core Console 22 Updating trusted sites in Internet Explorer 22 Configuring browsers to remotely access the Core Console 22 Roadmap for configuring the Core 23 Managing ...

Страница 4: ...cryption key 38 Editing an encryption key 38 Changing an encryption key passphrase 38 Importing an encryption key 39 Exporting an encryption key 39 Removing an encryption key 39 Managing cloud accounts 39 Adding a cloud account 40 Editing a cloud account 41 Configuring cloud account settings 41 Understanding replication 42 About protecting workstations and servers 42 About replication 42 About see...

Страница 5: ...talling the agent installer 63 About the local mount utility 63 Downloading and installing the local mount utility 63 Adding a core to the local mount utility 64 Mounting a recovery point by using the local mount utility 65 Dismounting a recovery point by using the local mount utility 66 About the local mount utility tray menu 66 Using Core and agent options 66 Managing retention policies 67 Archi...

Страница 6: ...iting notification groups for system events 84 Customizing retention policy settings 86 Viewing license information 88 Modifying protection schedules 88 Modifying transfer settings 89 Restarting a service 91 Viewing machine logs 92 Protecting a machine 92 Deploying the agent software when protecting an agent 94 Creating custom schedules for volumes 95 Modifying exchange server settings 95 Modifyin...

Страница 7: ...ting Windows data using VMware workstation export 118 Exporting Windows data using Hyper V export 120 Exporting Microsoft Windows data using Oracle VirtualBox export 123 Virtual Machine Management 125 Performing a rollback 129 Performing a rollback for a Linux machine by using the command line 130 About bare metal restore for Windows machines 131 Prerequisites for performing a bare metal restore f...

Страница 8: ...ster snapshots 149 Dismounting local recovery points 149 Performing a rollback for clusters and cluster nodes 150 Performing a rollback for CCR Exchange and DAG clusters 150 Performing a rollback for SCC Exchange SQL clusters 150 Replicating cluster data 150 Removing a cluster from protection 150 Removing cluster nodes from protection 151 Removing all nodes in a cluster from protection 151 Viewing...

Страница 9: ...nternet Explorer 161 9 Appendix A scripting 162 About powershell scripting 162 Powershell scripting prerequisites 162 Testing scripts 162 Input parameters 163 VolumeNameCollection namespace Replay Common Contracts Metadata Storage 167 Pretransferscript ps1 168 Posttransferscript ps1 168 Preexportscript ps1 169 Postexportscript ps1 170 Prenightlyjobscript ps1 170 Postnightlyjobscript ps1 172 Sample...

Страница 10: ...ulti hypervisor environments on VMware vSphere and Microsoft Hyper V private and public clouds Your appliance combines the following technologies Live Recovery Verified Recovery Universal Recovery True Global Deduplication These technologies are engineered with secure integration for cloud disaster recovery and deliver fast and reliable recovery With its scalable object store your appliance is uni...

Страница 11: ...very Universal Recovery technology gives you unlimited machine restoration flexibility You can restore your backups from physical systems to virtual machines virtual machines to virtual machines virtual machines to physical systems or physical systems to physical systems and carry out bare metal restores to dissimilar hardware For example P2V V2V V2P P2P P2C V2C C2P and C2V Universal Recovery tech...

Страница 12: ...aves retrieves maintains and then replicates objects that are derived from application aware snapshots The volume manager delivers scalable I O performance in tandem with global data deduplication encryption and retention management Deployment architecture Your appliance is a scalable backup and recovery product that is flexibly deployed within the enterprise or as a service delivered by a managed...

Страница 13: ...nes such as a file server email server database server or virtual machines and connect to and are protected by a single Core which also consists of the central repository The License Portal manages license subscriptions groups and users for the protected machines and cores in your environment The License Portal allows users to log in activate accounts download software and deploy protected machine...

Страница 14: ...nagement The Core is a self contained network addressable computer that runs a 64 bit of Microsoft Windows operating system Your appliance performs target based inline compression encryption and deduplication of the data received from the protected machine The Core then stores the snapshot backups in repositories such as Storage Area Network SAN or Direct Attached Storage DAS The repository can al...

Страница 15: ...aster recovery site The off site location can be a company owned data center self managed core or a third party managed service provider s MSP s location or cloud environment When replicating to a MSP you can use built in workflows that let you request connections and receive automatic feedback notifications For the initial transfer of data you can perform data seeding using external media which i...

Страница 16: ...ss different storage technologies The maximum size of a repository is 32 exabytes Multiple repositories can exist on a single core True Global Deduplication True global deduplication is an effective method of reducing backup storage needs by eliminating redundant or duplicate data Deduplication is effective because only one unique instance of the data across multiple backups is stored in the repos...

Страница 17: ... to the disk with a reduction ratio of as much as 50 1 Encryption Your appliance provides integrated encryption to protect backups and data at rest from unauthorized access and use ensuring data privacy Only a user with the encryption key can access and decrypt the data There is no limit to the number of encryption keys that can be created and stored on a system DVM uses AES 256 bit encryption in ...

Страница 18: ...request connections and receive automatic feedback notifications Replication is managed on a per protected machine basis Any machine or all machines protected or replicated on a source core can be configured to replicate to a target core Figure 5 Basic replication architecture Replication is self optimizing with a unique Read Match Write RMW algorithm that is tightly coupled with deduplication Wit...

Страница 19: ...Retention and archiving In your appliance backup and retention policies are flexible and therefore easily configurable The ability to tailor retention polices to the needs of an organization not only helps to meet compliance requirements but does so without compromising on RTO Retention policies enforce the periods of time in which backups are stored on short term fast and expensive media Sometime...

Страница 20: ...uous exports the virtual machine is incrementally updated after every snapshot The incremental updates are very fast and provide standby clones that are ready to be powered up with a click of a button The supported virtual machine export types are VMware Workstation Server on a folder direct export to a vSphere VMware ESX i host export to Oracle VirtualBox and export to Microsoft Hyper V Server on...

Страница 21: ...nality available through the Central Management Console The service management API is a REST API All the API operations are performed over SSL and are mutually authenticated using X 509 v3 certificates The management service can be accessed from within the environment or directly over the Internet from any application that can send and receive an HTTPS request and response This approach facilitate...

Страница 22: ...o update trusted sites in Microsoft Internet Explorer 1 Open Internet Explorer 2 If the File Edit View and other menus are not displayed press F10 3 Click the Tools menu and select Internet Options 4 In the Internet Options window click the Security tab 5 Click Trusted Sites and then click Sites 6 In Add this website to the zone enter https Display Name using the new name you provided for the Disp...

Страница 23: ...o Multimedia and select Play animations in webpages 10 Scroll to Security check Enable Integrated Windows Authentication and then click OK Configuring Mozilla Firefox browser settings NOTE To modify Mozilla Firefox browser settings in the latest versions of Firefox disable protection Right click the Site Identify button located to the left of the URL go to Options and click on Disable protection f...

Страница 24: ...ense type License status License constraints Number of machines protected Status of last response from the licensing server Time of last contact with the licensing server Next scheduled attempt of contact with the licensing server Changing a license key To change a license key 1 Navigate to the Core Console 2 Select Configuration Licensing The Licensing page appears 3 From the License Details sect...

Страница 25: ...nstallation you can use the control panel to select language packs and configure additional international settings To change OS language NOTE It is recommended that the OS language and the AppAssure language be set to the same language otherwise some messages may be displayed in mixed languages NOTE It is recommended to change the OS language before changing the AppAssure language 1 On the Start p...

Страница 26: ...y name 1 Navigate to the Core Console 2 Click Configuration Settings 3 In the General pane click Change The General Settings dialog box appears 4 In the Display Name text box enter a new display name for the Core This is the name that will display in the Core Console You can enter up to 64 characters 5 In the Web Server Port text box enter a port number for the web server The default is 8006 6 In ...

Страница 27: ...ds before a connection UI time out occurs 6 In the Read Write Timeout text box enter the number of minutes and seconds that you want to lapse before a time out occurs during a read write event 7 In the Read Write UI Timeout text box enter the number of minutes and seconds that will to lapse before a read write UI time out occurs 8 Click OK Configuring deduplication cache settings To configure dedu...

Страница 28: ...ation Allow port auto assigning Click for allow for automatic TCP port assignment Admin Group Enter a new name for the administration group The default name is BUILTIN Administrators Minimum Async I O Length Enter a value or choose the default setting It describes the minimum asynchronous input output length The default setting is 65536 Receive Buffer Size Enter an inbound buffer size or accept th...

Страница 29: ...e Sets the maximum number of database connections cached to allow dynamic reuse Default setting is 100 Min connection pool size Sets the minimum number of database connections cached to allow dynamic reuse Default setting is 0 5 Click Test Connection to verify your settings 6 Click Save About repositories A repository stores the snapshots that are captured from your protected workstations and serv...

Страница 30: ...pliance you must set up one or more repositories on the core server A repository stores your protected data More specifically it stores the snapshots that are captured from the protected servers in your environment When you configure a repository you can perform various tasks such as specifying where to locate the data storage on the Core server how many locations can be added to each repository t...

Страница 31: ... repositories must not be stored on NAS filers that tier to the cloud as these devices tend to have performance limitations when used as primary storage The Add Storage Location dialog box is displayed 6 Specify how to add the file for the storage location You can choose to add the file on the local disk or on CIFS share To specify a local machine click Add file on local disk and then enter the in...

Страница 32: ...ize of the volume NOTE If the storage location is a New Technology File System NTFS volume using Windows XP or Windows 7 the file size limit is 16 TB If the storage location is an NTFS volume using Windows 8 or Windows Server 2012 the file size limit is 256 TB NOTE To validate the operating system Windows Management Instrumentation WMI must be installed on the intended storage location Write Cachi...

Страница 33: ...on Check a Repository Delete a Repository Details also display for the repository and include the storage locations and statistics Storage location details include the metadata path data path and size Statistical information includes Deduplication Reported as the number of block dedupe hits block dedupe misses and block compression rate Record I O Consisting of the rate MB s read rate MB s and wri...

Страница 34: ...n after the setting has been changed Existing data or data replicated from another core or imported from an archive retains the compression values in place at the time the data was captured from the protected machine 5 Click Save Expanding an existing repository If you add another MD1200 DAS to your appliance you can use the available storage to expand an existing repository To expand an existing ...

Страница 35: ...xt Box Description Size Set the size or capacity for the storage location The default size is 250 MB You can choose from the following MB GB TB NOTE The size that you specify cannot exceed the size of the volume NOTE If the storage location is an NTFS volume using Windows XP or Window 7 the file size limit is 16 TB If the storage location is an NTFS volume using Windows 8 or Windows Server 2012 th...

Страница 36: ...tory 1 On the Configuration tab click Repositories select next to the repository that you want to check 2 In the Actions pane click Check The Check Repository dialog box appears 3 In the Check Repository dialog box click Check NOTE If the check fails restore the repository from an archive Deleting a repository To delete a repository 1 On the Configuration tab click Repositories select next to the ...

Страница 37: ...m a failed import state 1 Navigate to the Core Console The Repositories screen displays the failed repository with a red status indicator 2 Click Configuration Repositories 3 Expand the failed repository by clicking next to Status 4 From the Actions section click Check and then click Yes to confirm that you want to run the check The appliance recovers the repository Managing security The Core can ...

Страница 38: ...ou protect the passphrase If you lose the passphrase you cannot access the data Editing an encryption key To edit an encryption key 1 Navigate to the Core Console 2 Click Configuration Security The Encryption Keys screen is displayed 3 Select the encryption key that you want to modify click Edit The Edit Encryption Key dialog box appears 4 In the Edit Encryption Key dialog box edit the name or mod...

Страница 39: ... Key to save and store the encryption keys in a secure location 5 Click OK Removing an encryption key To remove an encryption key 1 Navigate to Core Console 2 Click Configuration Security 3 Click next to the name of the encryption key that you want to remove and then click Remove The Remove Key dialog box appears 4 In the Remove Key dialog box click OK to remove the encryption key NOTE Removing an...

Страница 40: ...crosoft Azure Storage Account Name Enter the name of your Windows Azure storage account Access Key Enter the access key for your account Display Name Create a display name for this account in AppAssure for example Windows Azure 1 Amazon S3 Access Key Enter the access key for your Amazon cloud account Secret Key Enter the secret key for this account Display Name Create a display name for this accou...

Страница 41: ...loud account and the amount of time spent on an attempt before it times out To configure the connection settings for your cloud account 1 In the Core Console click the Configuration tab 2 In the left menu click Settings 3 On the Settings page scroll down to Cloud Configuration 4 Click the drop down menu next to the cloud account you want to configure and then do one of the following Click Edit The...

Страница 42: ...achine on which an AppAssure Agent software is installed and specify which volumes to protect define schedules for protection add extra security measures such as encryption and more For more information on how to access the Core Console to protect workstations and servers see Protecting A Machine About replication Replication is the process of copying recovery points and transmitting them to a sec...

Страница 43: ...rget cores in a data center or a public cloud On each of these cores the MSP partner lets one or more of their customers replicate recovery points from a source core on the customer s site to the MSP s target core for a fee NOTE In this scenario customers only have access to their own data Possible replication configurations include Point to Point Replicates a single protected machine from a singl...

Страница 44: ... the available space on the media During the seeding process the incremental recovery points are replicated to the target site After the target core consumes the seeding archive the newly replicated incremental recovery points automatically synchronize Seeding is a two part process also known as copy consume The first part involves copying which is the writing of the initial replicated data to a r...

Страница 45: ...cryption keys from the source core if the recovery points being replicated from source to target are encrypted The replicated recovery points remain encrypted after they are transmitted to the target core The owners or administrators of the target core need the passphrase to recover the encrypted data About retention policies for replication The retention policy on the source core determines the r...

Страница 46: ...e Maximum change rate for wan connection types Table 2 Maximum change rate for wan connection types Broadband Bandwidth Max Change Rate DSL 768 Kbps and up 330 MB per hour Cable 1 Mbps and up 429 MB per hour T1 1 5 Mbps and up 644 MB per hour Fiber 20 Mbps and up 838 GB per hour If a link fails during data transfer replication resumes from the previous failure point of the transfer after link func...

Страница 47: ...nd the one target core Configuring the source core to replicate to a self managed target core To configure the source core to replicate to a self managed target core 1 In the Core click the Replication tab 2 Click Add Target Core The Replication wizard appears 3 Select I have my own Target Core and then enter the information as described in the following table Text Box Description Host Name Enter ...

Страница 48: ...aved d Click Next ntainer 9 In the Seed Drive Option dialog box enter the information described as follows Text Box Description Maximum Size Large archives of data can be divided into multiple segments Select the maximum size of the segment you want to reserve for creating the seed drive by doing one of the following Select Entire Target to reserve all available space in the path provided on the S...

Страница 49: ...ce core to the target core is complete Replication begins but produces orphaned recovery points on the target core until the seed drive is consumed and provides the necessary base images Consuming the seed drive on a target core This procedure is only necessary if you created a seed drive while Configuring Replication For A Self Managed Core To consume the seed drive on a target core 1 If the seed...

Страница 50: ...the link to the outstanding seed drive from the Core Console on the source core It does not remove the drive from the storage location on which it is saved To abandon an outstanding seed drive 1 From the Core Console on the source core select the Replication tab 2 Click Outstanding Seed Drive The Outstanding seed drives section appears It includes the name of the remote target core the data and ti...

Страница 51: ...e Core dialog box do the following a Select the protected machines to replicate b Select a repository for each protected machine c Enter your subscription email address and customer ID that was assigned to you by the service provider 6 If you plan to perform the seeding process for the transfer of base data select Use a seed drive to perform initial transfer 7 Click Submit Request NOTE If you sele...

Страница 52: ...A replication request is sent from the source core to the third party target core As the third party you can review the request and then approve it to begin replication for your customer or you can deny it to prevent replication from occurring To review a replication request on a third party target core 1 Open the Core Console on the target core and select the Replication tab 2 Click Pending Reque...

Страница 53: ...d more To monitor replication 1 In the Core Console click the Replication tab 2 On this tab you can view information about and monitor the status of replication tasks described as follows Table 3 Monitoring replication Section Description Available Actions Pending Replication Requests Lists your customer ID email address and host name when a replication request is submitted to a third party servic...

Страница 54: ...ion Managing replication settings You can adjust a number of settings for how replication executes on the source and target cores To manage replication settings 1 In the Core Console click the Replication tab 2 In the Actions drop down menu click Settings 3 In the Replication Settings window edit the replication settings described as follows Option Description Cache lifetime Specify the amount of ...

Страница 55: ...n the drop down menu for the protected machine that you want to remove from replication click Delete and then select one of the following options Option Description Relationship Only Removes the protected machine from replication but retains the replicated recovery points With Recovery Point Removes the protected machine from replication and deletes all replicated recovery points received from tha...

Страница 56: ...lover in AppAssure to switch protection to your identical failover target core and launch a new replicated agent identical to the failed agent After your source core and agents have been repaired you can then perform failback to restore the data from the failed over core and agent back to the source core and agent In AppAssure failover and failback involve the following procedures Setting up your ...

Страница 57: ... be installed 8 Reboot the virtual machine and wait for the agent service to start 9 Go back to the Core Console for the target core and verify that the new agent is displayed on the Machines tab under Protected Machines and on the Replication tab under Incoming Replication 10 Force multiple snapshots and verify they complete correctly For more information see Forcing A Snapshot 11 You can now pro...

Страница 58: ... the Core Console on the target core and delete the agent from the Replication tab 19 In the Core Console of the source core set up replication again between the source and target by clicking the Replication tab and then adding the target core for replication Managing events Managing core events assists with the monitoring of the health and usage of the Core The core includes predefined sets of ev...

Страница 59: ...n group described as follows Text Box Description Name Enter a name for event notification group used to identify the event notification group Description Enter a description for the event notification group used to describe the purpose of the event notification group 5 In the Enable Events panel select the conditions for which event logs alerts to create and report You can elect to create alerts ...

Страница 60: ... about events configure an email server and an email notification template NOTE You must also configure notification group settings including enabling the Notify by email option before email alert messages will be sent For more information on specifying events to receive email alerts see Configuring Notification Groups For System Events in Dell DL4000 Appliance User s Guide To configure an email s...

Страница 61: ...ormation for the body of the template that describes the event when it occurred and the severity 5 Click Send Test Email and review the results 6 After you are satisfied with the results of the tests click OK Configuring repetition reduction To configure repetition reduction 1 From the Core click the Configuration tab 2 From the Manage option click Events 3 From the Repetition Reduction area click...

Страница 62: ...pAssure engine connections If you want to dismount individual or all recovery points that are mounted locally on a core you can accomplish this from the Mount option on the Tools tab Viewing system information To view system information 1 Navigate to the Core and then select the Tools tab 2 From the Tools option click System Info Downloading installers You can download installers from the Core Fro...

Страница 63: ... mounts performed on the LMU are also displayed in the console Downloading and installing the local mount utility To download and install the Local Mount Utility 1 From the machine on which you want to install the LMU access the Core Console by entering the console URL into your browser and logging on with your user name and password 2 From the Core Console click the Tools tab 3 From the Tools tab...

Страница 64: ... Yes to let the program to make changes to the machine 3 In the upper left corner of the AppAssure Local Mount Utility window click Add core 4 In the Add Core window enter the requested credentials described as follows Text Box Description Host name The name of the Core from which you want to mount recovery points NOTE If installing the LMU on a core LMU automatically adds the localhost machine Po...

Страница 65: ...t of an agent protected by one core and then mount a recovery point of an agent protected by a different core the LMU automatically disconnects from the first core to establish a connection with the second core To mount a recovery point by using the Local Mount Utility 1 From the machine on which the LMU is installed launch LMU by double clicking the desktop icon 2 From the main AppAssure Local Mo...

Страница 66: ...e window Dismount all Dismounts all mounted recovery points a Click Dismount all b In the Dismount All window click Yes to confirm c Close the window About the local mount utility tray menu The LMU tray menu is located in your desktop taskbar Right click the icon to reveal the following options Browse Recovery Points Opens the LMU main screen Active Mounts Opens the Active Mounts screen Options Op...

Страница 67: ...n policy is enforced by a nightly rollup process that helps in aging and deleting old backups For information about configuring retention policies see Customizing Retention Policy Settings Archiving to a cloud You can archive your data to a cloud by uploading it to a variety of cloud providers directly from the Core Console Compatible clouds include Windows Azure Amazon Rackspace and any OpenStack...

Страница 68: ... for connecting to the share User name Enter a user name which is used to establish logon credentials for the network share Password Enter a password for the network path which is used to establish logon credentials for the network share Maximum Size Enter how much space to use for the archive You can select from Entire Target Specific amount in MB or GB Recycle action Select the appropriate recyc...

Страница 69: ...t Replace this Core Overwrites any existing archived data pertaining to this core but leaves the data for other cores intact Erase completely Clears all archived data from the directory before writing the new archive Incremental Lets you add recovery points to an existing archive It compares recovery points to avoid duplicating data that already exists in the archive 9 On the Schedule page select ...

Страница 70: ... location Enter the location for the output It defines the location path where you want the archive to reside Network Output location Enter the location for the output It defines the location path where you want the archive to reside User Name Enter a user name It establishes logon credentials for the network share Password Enter a password for the network path It establishes logon credentials for...

Страница 71: ...ng options from the drop down list Local Output location Enter the location for the output It defines the location path where you want the archive to reside Network Output location Enter the location for the output It defines the location path where you want the archive to reside User Name Enter a user name It establishes logon credentials for the network share Password Enter a password for the ne...

Страница 72: ...low the use of passive SQL licenses Attachability supports SQL Server 2005 2008 2008 R2 2012 and 2014 The account used to perform the test must be granted the sysadmin role on the SQL Server instance The SQL Server on disk storage format is the same in both 64 bit and 32 bit environments and attachability works across both versions A database that is detached from a server instance that is running...

Страница 73: ...QL Server databases 10 In the Nightly Jobs window click OK Attachability checks are now schedule to occur with the nightly jobs Configuring nightly SQL attachability checks and log truncation To configure nightly SQL attachability checks and log truncation 1 In the left navigation area of the Core select the machine for which you want to have nightly attachability checks and log truncation and cli...

Страница 74: ...settings based on the needs of your organization Enable automatic mountability check Enable nightly checksum check Enable nightly log truncation 4 Click OK The mountability and log truncation settings take effect for the protected Exchange server NOTE For information on forcing log truncation see Forcing Log Truncation Forcing a mountability check To force a mountability check 1 In the left naviga...

Страница 75: ...ication is displayed a corresponding color status indicator in the Recovery Points table The color that is displayed is based on the check settings for the protected machine and the success or failure of those checks as described in the following tables NOTE For more information on viewing Recovery Points see Viewing Recovery Points The following table lists the status indicators that display for ...

Страница 76: ...yet run Red Indicates that either the mountability or checksum checks failed on at least one database Green Indicates that the mountability check passed or that the checksum check passed NOTE Recovery points that do not have an Exchange or SQL database associated with it is displayed with a white status indicator In situations where both an Exchange and SQL database exists for the recovery point t...

Страница 77: ...ons displays next to the provision task Provisioning storage The appliance configures available DL4000 internal storage and any attached external storage enclosures for AppAssure Repositories NOTE If fibre channel HBA is configured then the process of creating the repositories is manual AppAssure will not create a repository automatically in the root directory For more information see the Dell DL4...

Страница 78: ...cate a percentage of storage to allocate Otherwise the percentage of storage indicated in the Optional Storage Reserve section will be taken from all of the attached disks 4 Click Provision Provisioning selected storage To provision selected storage 1 In the Appliance tab click Tasks Provisioning The Provisioning screen displays estimated capacity for provisioning This capacity is used to create a...

Страница 79: ...so on the Appliance tab Tasks screen To understand how to resolve a failed task select the Appliance tab and then click Tasks Expand the failed task by clicking next to Status and review the error message and recommended action Upgrading your Appliance To upgrade your appliance 1 Download the Recovery and Update Utility from dell com support to the DL4000 Backup to Disk appliance 2 Copy the utilit...

Страница 80: ...e are installed as part of the Recovery and Update Utility 7 If the bundled version in the utility is the same as the installed version the Recovery and Update Utility prompts you to confirm that you want to run a repair installation This step can be skipped if a repair install of the AppAssure Core is not needed 8 If the bundled version in the utility is higher than the installed version then the...

Страница 81: ... configuration settings such as name and host name protection settings changing the protection schedule for volumes on the machine adding or removing volumes or pausing protection and more Viewing and modifying configuration settings To view and modify configuration settings 1 After you have added a protected machine perform one of the following From the Core Console click the Machines tab and the...

Страница 82: ...m information for a machine 1 In the Core Console under Protected Machines select the machine for which you want to view detailed system information 2 Click the Tools tab for that machine The information about the machine displays in the System Information page The details that display include the following Host Name OS Version OS Architecture Memory Physical Display Name Fully Qualified Domain Na...

Страница 83: ...n groups for sending a list of system events The Add Notification Group dialog box displays NOTE To use the default alert settings select the Use Core alert settings option 6 Add the notification options as described in the following table Text Box Description Name Enter a name for the notification group Description Enter a description for the notification group Enable Events Select which events t...

Страница 84: ...ck OK to save your changes 8 To edit an existing notification group click Edit next to the notification group that you want to edit The Edit Notification Group dialog box opens where you can edit the settings Editing notification groups for system events To edit notification groups for system events 1 Navigate to the Core Console and then click the Machines tab 2 From the Machines tab perform one ...

Страница 85: ... by default the appropriate events are automatically enabled For example if you choose Warning the Attachability Jobs Licensing Archive CoreService Export Protection Replication and Rollback events are enabled Notification Options Select the method to specify how to handle notifications You can choose from the following options Notify by Email Specify the e mail addresses to which to send the even...

Страница 86: ... Retention Policy NOTE To use the default retention policy configured for the Core ensure that you select the Use Core default retention policy option The Retention Policy screen appears 4 To set the customized policies click Use custom retention policy The Custom Retention Policy screen appears 5 Select Enable Rollup and specify the time intervals for retaining the backup data as needed The reten...

Страница 87: ...riod and then select the time period The default is 3 You can choose from Weeks Months Years and then keep one Recovery Point per month for n retention time period Provides a more refined level of retention It is used as a building block to further define how long recovery points are maintained Enter a number that represents the retention period and then select the time period The default is 2 You...

Страница 88: ...r the machine that you want to view In the navigation pane select the machine that you want to view 3 Click the Configuration tab and then click Licensing The Status screen displays the details about the product licensing Modifying protection schedules In AppAssure you can modify the protection schedules for specific volumes on a machine To modify protection schedules 1 In the Core Console click t...

Страница 89: ...transfer processes for a protected machine The transfer settings described in this section are agent level settings To affect transfer at the core level see Modifying The Transfer Queue Settings CAUTION Changing transfer setting could have dramatic effects on your environment Before modifying transfer settings values refer to the Transfer Performance Tuning Guide in the Dell AppAssure knowledge ba...

Страница 90: ...escription Priority Sets the transfer priority between protected machines Enables you to assign priority by comparison with other protected machines Select a number from 1 to 10 with 1 being the highest priority The default setting establishes a priority of 5 NOTE Priority is applied to transfers that are in the queue Maximum Concurrent Streams Sets the maximum number of TCP links that are sent to...

Страница 91: ...Performance Counters Writer Registry Writer Shadow Copy Optimization Writer SQLServerWriter System Writer Task Scheduler Writer VSS Metadata Store Writer WMI Writer Transfer Data Server Port Sets the port for transfers The default setting is 8009 Transfer Timeout Specifies in minutes and seconds the amount of time to allow a packet to be static without transfer Snapshot Timeout Specifies in minute...

Страница 92: ...Connection dialog box For specific steps to install the agent software during the process of protecting a machine see Deploying The Agent Software When Protecting An Agent When you add protection you must specify the name or IP address of the machine to protect and the volumes on that machine to protect as well as define the protection schedule for each volume To protect multiple machines at the s...

Страница 93: ...yption settings for a repository are defined under the Configuration tab in the Core Console Initially Pause Protection After you add a machine for protection AppAssure automatically begins taking a base snapshot of data You can select this check box to pause protection initially You then must force a snapshot manually when you are ready to start protecting your data For more information about man...

Страница 94: ...ttings as follows Host name Specifies the host name or IP address of the machine that you want to protect Port Specifies the port number on which the Core communications with the Agent on the machine The default value is 8006 User name Specifies the user name used to connect to this machine for example administrator Password Specifies the password used to connect to this machine Display name Speci...

Страница 95: ...ect the Daily protection option and then in the Time drop down menu select a time to start protecting data No Protection To remove protection from this volume select the No Protection option If you want to apply these custom settings to all the volumes on this machine select Apply to All Volumes 3 When you have made all necessary changes click OK 4 Repeat step 2 and step 3 for any additional volum...

Страница 96: ...L Server Information table and then click Change Credentials The Set SQL Server Credentials dialog box appears 5 Enter the new credentials and then click OK Deploying an agent push install AppAssure requires microsoft net for the agent installation Microsoft net must be installed on any client machine prior to installing the agent either manually or by a push installation process AppAssure lets yo...

Страница 97: ...new agent 1 Navigate to the Core Console and then click the Machines tab 2 In the Actions drop down menu click Protect Machine 3 In the Protect Machine dialog box enter the information as described in the following table Text Box Description Host Enter the host name or IP address of the machine that you want to protect Port Enter the port number the AppAssure Core uses to communicate with the agen...

Страница 98: ...ppAssure environment setting up replication forcing log truncation canceling operations and more Removing a machine 1 Navigate to the Core Console and then click the Machines tab 2 From the Machines tab perform one of the following Click the hyperlink for the machine that you want to remove Or in the navigation pane select the machine that you want to remove 3 In the Actions drop down menu click R...

Страница 99: ...r Resume as needed Setting replication priority for an agent To set replication priority for an agent 1 From the Core Console select the protected machine for which you want to set replication priority and click the Configuration tab 2 Click Select Transfer Settings and then use the Priority drop down list to select one of the following options Default Highest Lowest 1 2 3 4 NOTE The default prior...

Страница 100: ...n the Summary page The details that display include the following Host name Last Snapshot taken Next Snapshot scheduled Encryption status Version number Mountability Check status Checksum Check status Last Log Truncation performed Detailed information about the volumes contained on this machine also appear and include Total size Used Space Free space If SQL Server is installed on the machine detai...

Страница 101: ... vCenter ESXi virtual host Machines on an Active Directory domain Machines on any other host The Bulk Deploy feature automatically detects machines on a host and allows you to select those to which you want to deploy Alternatively you can manually enter host and machine information NOTE The machines that you are deploying must have access to the Internet to download and install bits as AppAssure u...

Страница 102: ...connect to the domain 4 Click Connect 5 On the Add Machines from Active Directory dialog box select the machines to which you want to deploy the AppAssure Agent and then click Add The machines that you added appear on the Deploy Agent on Machines window 6 To enter the password for the machine select a repository add an encryption key or edit other settings for a machine click the Edit link for tha...

Страница 103: ...e cannot connect to the machine This may be because the logon credentials are incorrect the machine is shut down the firewall is blocking traffic or another problem To correct click Edit Settings on the toolbar or the Edit link next to the machine 9 After the machines are successfully verified select each machine to which you want to deploy the AppAssure Agent and then click Deploy 10 If you chose...

Страница 104: ... blocking traffic or another problem To correct click Edit Settings on the toolbar or the Edit link next to the machine 8 After machines are successfully verified select each machine and click Deploy 9 If you chose the Protect machine after install option after deployment is successful the machines automatically rebooted and protection is enabled Deploying to machines on any other host To deploy t...

Страница 105: ...ccessfully check the box next to each machine and click Deploy 6 If you chose the Protect machine after install option after deployment is successful the machines are automatically rebooted and protection is enabled Monitoring the deployment of multiple machines You can view the progress of the deployment of AppAssure Agent software to the machines To monitor the deployment of multiple machines 1 ...

Страница 106: ...number on which the Core communicates with the agent on the machine Repository Select the repository on the Core where the data from the machines is stored The repository you select is used for all machines being protected Encryption Key Specify whether encryption is applied to the agent on the machines that is stored in the repository The encryption key is assigned to all machines that are being ...

Страница 107: ...ration was successful or errors were logged The level of the alert along with the transactional date and message is displayed If you want to remove all alerts from the page click Dismiss All To view event information Details about the machine and the data that is transferred appear in the Events pane The level of the event transactional date and time message appear Managing snapshots and recovery ...

Страница 108: ... a recovery point in the list to expand the view You can view more detailed information about the contents of the recovery point for the selected machine as well as access a variety of operations that can be performed on the recovery point described in the following table Info Description Actions The Actions menu includes the following operations that you can perform on the selected recovery point...

Страница 109: ...overy point that you want to mount select Mount from the Actions drop down menu b Select a recovery point from the list in the Mount Recovery Point dialog box and then click Next The Mount Recovery Points dialog box appears From the Core Console select the machine that you want to mount to a local file system The Summary tab for the selected machine displays a Select the Recovery Points tab b In t...

Страница 110: ...eate a new directory for mounting the recovery point for example you can use the mkdir command 2 Verify the directory exists for example by using the ls command 3 Run the AppAssure aamount utility as root or as the super user for example sudo aamount 4 At the AppAssure mount prompt enter the following command to list the protected machines lm 5 When prompted enter the IP address or hostname of you...

Страница 111: ...pAssure you can specify one of the following options Text Box Description Delete All Recovery Points Removes all recovery points for the selected agent machine from the Repository Delete a Range of Recovery Points Removes all recovery points in a specified range before the current up to and including the base image which is all data on the machine as well as all recovery points after the current u...

Страница 112: ...ed If there is no previous recovery point all data on the protected volumes is transferred which is referred to as a base image To force a snapshot 1 In the Core Console click the Machines tab and then in the list of protected machines select the machine or cluster with the recovery point for which you want to force a snapshot 2 Click the Actions drop down menu for that machine click Force Snapsho...

Страница 113: ... policy and recover your system through the RASR USB key or IDSDM To use this feature Windows Backup virtual disk should exist Windows Backup virtual disk is created during AppAssure Appliance Configuration Wizard For more information see Rapid Appliance Self Recovery in the Dell DL43000 Appliance Deployment Guide Without a Windows Backup virtual disk you cannot configure a policy or create Window...

Страница 114: ... will be backed up OS C RECOVERY Bare metal recovery System State All of the above are selected by default Select the time to schedule the backup Enter the time to schedule a backup 4 Click Configure Once configured you have the option to Backup now Delete policy or View policy from the Windows Backup Policy window About exporting protected data from Windows machines to virtual machines AppAssure ...

Страница 115: ...tual machines use the hypervisor management tools NOTE The virtual machine to which you are exporting must be a licensed version of ESXi VMWare Workstation or Hyper V and not the trial or free versions Dynamic and basic volumes support limitations AppAssure supports taking snapshots of all dynamic and basic volumes AppAssure also supports exporting simple dynamic volumes that are on a single physi...

Страница 116: ... appears Exporting Windows data using ESXi export In AppAssure you can choose to export data using ESXi Export by performing a one time or continuous export Performing a one time ESXi export To perform a one time ESXi export 1 In the Select Export Type dialog box click One time export 2 Click Next The ESXi Export Select Recovery Point dialog box appears 3 Select a recovery point to export and then...

Страница 117: ... for the virtual machine being created For example VM 0A1B2C3D4 NOTE It is recommended to use a name that is derived from the agent name or one that matches the agent name You can also create a name derived from the hypervisor type IP address or DNS name Memory Specify the memory usage You can choose from the following options Use the same amount of RAM as source machine Click Use a specific amoun...

Страница 118: ...hine described as follows Text Box Description Target Path Specify the path of the local folder or network share on which to create the virtual machine NOTE If you specified a network share path enter a valid logon credentials for an account that is registered on the target machine The account must have read and write permissions to the network share User Name Enter the logon credentials for the v...

Страница 119: ...al Standby Recovery Point to VMware Workstation Server dialog box appears 3 Enter the parameters for accessing the virtual machine described as follows Text Box Description Target Path Specify the path of the local folder or network share on which to create the virtual machine NOTE If you specified a network share path enter a valid logon credentials for an account that is registered on the target...

Страница 120: ...export data using Hyper V Export by performing a one time or continuous export Complete the steps in the following procedures to export using Hyper V Export for the appropriate type of export Your DL Appliance supports first generation Hyper V export to the following hosts Windows 8 Windows 8 1 Windows Server 2008 Windows Server 2008 R2 Windows Server 2012 Windows Server 2012 R2 Yourb DL Appliance...

Страница 121: ... the user with administrative privileges for the workstation with the Hyper V server It is used to specify the logon credentials for the virtual machine Password Enter the password for the user account with administrative privileges on the workstation with Hyper V server It is used to specify the logon credentials for the virtual machine 3 Click Next 4 On the Virtual Machines Options page in the V...

Страница 122: ...r host name for the Hyper V server It represents the IP address or host name of the remote Hyper V server Port Enter a port number for the machine It represents the port through which the Core communicates with this machine User Name Enter the user name for the user with administrative privileges for the workstation with the Hyper V server It is used to specify the logon credentials for the virtua...

Страница 123: ...e VirtualBox installed on the Core machine VirtualBox Version 4 2 18 or higher is supported for Windows hosts Performing a one time Oracle VirtualBox export Complete the steps in this procedure to perform a one time export to Oracle VirtualBox To perform a one time Oracle VirtualBox export 1 In the AppAssure Core Console do one of the following From the button bar click Export to launch the Export...

Страница 124: ...istered for all existing users on the Windows machine with Oracle VirtualBox User name Enter the user name for which the virtual machine is registered Password Enter the password for this user account 7 Click Next The name that you enter appears in the list of virtual machines in the Hyper V Manager console 8 On the Volumes page select the volume s to export For the virtual machine to be an effect...

Страница 125: ...rted virtual machine and then enter the following information This refers to a specific user account for which the virtual machine will be registered in the event there are multiple user accounts on the virtual machine When this user account is logged on only this user will see this Virtual Machine in VirtualBox manager If an account is not specified then the Virtual Machine will be registered for...

Страница 126: ... the hypervisor type IP address or DNS name Status Indicates the status of the virtual machine Possible values are Running Stopped Starting Suspended Stopping Unknown temporary status NOTE The above status values depend on the hypervisor type Not all hypervisors display all the status values Location Indicates the location of VM For example D export The VM location must have sufficient space to ho...

Страница 127: ...ion of VM For example D export The VM location must have sufficient space to hold the VM metadata and virtual drives needed for the virtual machine Export Status Status 1 Indicates the following status of an export process Complete Failed In progress Not performed 2 If an export is currently in progress percentage of export is displayed as a progress bar Last Export Indicates the time of last expo...

Страница 128: ...Create NOTE To remove a virtual network adapter use the hypervisor management interface Starting a VM operation To start a VM operation 1 Navigate to the VM Management window 2 Click the Start button associated with the VM to start NOTE The GUI may lag in showing the correct status of the machine The Start button may remain disabled upto 30 seconds after the buttons have been used The Start button...

Страница 129: ...ist of protected machines select the check box next to the machine that you want to export b In the Actions drop down menu for that machine click Rollback c In the Rollback Select Recovery Point dialog box select a recovery point to export and then click Next In the left navigation area of the AppAssure Core Console select the machine that you want to roll back which launches the Summary tab for t...

Страница 130: ...to list the protected machines lm 3 When prompted enter the IP address or host name of your AppAssure Core server 4 Enter the logon credentials that is the username and password for this server A list displays showing the machines that this AppAssure server protects It lists the agent machines found by line item number host IP address and an ID number for the machine for example 293cc667 44b4 48ab...

Страница 131: ...th to volume does not refer to the mount point of the volume but instead refers to the file descriptor of the volume it must be in a form similar to dev sda1 About bare metal restore for Windows machines Servers when operating as expected run and perform the tasks they are configured to do When a catastrophic event occurs rendering the server inoperable immediate steps are needed to restore the se...

Страница 132: ...very Console is an environment used to restore the system drive or the entire server directly from the AppAssure Core The ISO image that you create is tailored to the machine being restored therefore it must contain the correct network and mass storage drivers If you anticipate that you will be restoring to different hardware from the machine on which you are creating the boot CD you must include ...

Страница 133: ...ly while it is in use NOTE This step is optional If you need remote access to the recovery console you must configure and use the UltraVNC You cannot log on using Microsoft Terminal Services while using the boot CD Injecting drivers in a boot cd Driver injection is used to facilitate the operability between the recovery console network adapter and storage on the target server If you anticipate res...

Страница 134: ...address displayed in the Network Adapters Settings pane and the authentication password displayed in the Authentication pane You will use this information later during the data recovery process to log back on to the console 4 If you want to change the IP address select it and click Change NOTE If you specified an IP address in Create Boot CD dialog box the Universal Recovery Console uses it and di...

Страница 135: ...re the credentials you recorded in the previous task For more information see Loading A Boot CD 8 Click Load Volumes to load the target volumes to the new machine Mapping volumes You can choose to map volumes to the disks on the target server automatically or manually For automatic disk alignment the disk is cleaned and repartitioned and all data is deleted The alignment is performed in the order ...

Страница 136: ...ecovery as well as the start and end times from the Monitor Open Task window NOTE To return to the recovery points for the source machine from the Active Task dialog box click Close Starting the restored target server To start the restored target server 1 Navigate back to the target server and in the AppAssure Universal Recovery Console interface click Reboot to start the machine 2 Specify to star...

Страница 137: ...p the Linux machine and open a Terminal window 2 If needed create a new disk partition for example by running the fdisk command as root and make this partition bootable by using the a command 3 Run the AppAssure aamount utility as root for example sudo aamount 4 At the AppAssure mount prompt enter the following command to list the protected machines lm 5 When prompted enter the IP address or host ...

Страница 138: ...before unmounting the volume bsctl d path to volume In this command path to volume does not refer to the mount point of the volume but instead refers to the file descriptor of the volume it must be in a form similar to this example dev sda1 Installing the screen utility Before you begin utilizing the AppAssure commands you can install the screen utility The screen utility enables you to scroll the...

Страница 139: ...da 7 Verify that the boot grub grub conf file contains the correct UUID for the root volume or update it as needed by using a text editor 8 Remove the Live CD disk from the CD ROM drive and restart the Linux machine Viewing events and alerts To view events and alerts 1 Do one of the following In the Core Console on the Machines tab click the hyperlink for the machine for which you want to view eve...

Страница 140: ...included in the cluster At the cluster level you can also view corresponding Exchange and SQL cluster metadata for the nodes in the cluster You can specify settings for the entire cluster and the shared volumes in that cluster or you can navigate to an individual node machine in the cluster to configure settings just for that node and the associated local volumes Supported applications and cluster...

Страница 141: ...Actions and then click Protect Cluster 2 In the Connect to Cluster dialog box enter the following information Text Box Description Host The host name or IP address of the cluster the cluster application or one of the cluster nodes that you want to protect NOTE If you use the IP address of one of the nodes this node needs to have an AppAssure agent installed and started Port The port number on the ...

Страница 142: ...en click the Settings link next to the node Repeat Step 5 to edit the protection schedule For more information on customizing nodes see Protecting Nodes In A Cluster 8 In the Protect Cluster dialog box click Protect Protecting nodes in a cluster This topic describes how to protect the data on a cluster node or machine that has an AppAssure agent installed When you add protection you need to select...

Страница 143: ... see Protecting A Cluster Process of modifying cluster node settings After you have added protection for cluster nodes you can easily modify basic configuration settings for those machines or nodes for example display name host name and so on protection settings for example changing the protection schedule for local volumes on the machine adding or removing volumes and pausing protection and more ...

Страница 144: ...lt this is the host name for the cluster You can change this to something more descriptive if needed Host Name This setting represents the host name for the cluster It is listed here for informational purposes only and cannot be modified Repository Enter the Core repository associated with the cluster NOTE If snapshots have already been taken for this cluster this setting is listed here for inform...

Страница 145: ...ents are automatically enabled For example if you choose Warning the Attachability Jobs Licensing Archive CoreService Export Protection Replication and Rollback events are enabled Notification Options Select the method to specify how to handle notifications You can choose from the following options Notify by Email Specify the e mail addresses to which to send the events in the To CC and BCC text b...

Страница 146: ...owing In the Core Console click the Machines tab and then select the cluster that you want to modify In the left navigation area select the cluster that you want to modify 2 Click the Configuration tab and then click Protection Settings 3 Follow the instructions for modifying the protection settings as described in Modifying Protection Schedules starting with Step 2 Modifying cluster transfer sett...

Страница 147: ...to Node Viewing server cluster information Viewing cluster system information To view cluster system information 1 Do one of the following In the Core Console click the Machines tab and then select the cluster that you want to view In the left navigation area select the cluster that you want to view 2 Click the Tools tab The System Information page shows system details about the cluster such as na...

Страница 148: ...very points NOTE If you are protecting data from a DAG or CCR server cluster the associated recovery points do not appear at the cluster level They are only visible at the node or machine level For information about viewing recovery points for individual machines in a cluster see Viewing Recovery Points To work with cluster recovery points 1 Do one of the following In the Core Console click the Ma...

Страница 149: ...en select the cluster for which you want to view recovery points In the left navigation area under Clusters select the cluster for which you want to view recovery points 2 On the Summary tab click the Actions drop down menu and then click Pause Snapshots 3 In the Pause Protection dialog box select one of the options described as follows Text Box Description Pause until resumed Pauses the snapshot ...

Страница 150: ...dard AppAssure procedure for the machine as described in Performing A Rollback and Performing A Rollback For A Linux Machine By Using the Command Line 3 After the rollback is finished mount all databases from the cluster volumes 4 Turn on all other nodes one by one NOTE You do not need to roll back the quorum disk It can be regenerated automatically or by using cluster service functionality Replic...

Страница 151: ...n the following table Option Description Relationship Only Removes the source core from replication but retains the replicated recovery points With Recovery Points Removes the source core from replication and deletes all replicated recovery points received from that machine Removing all nodes in a cluster from protection To remove all nodes in a cluster from protection 1 Do one of the following In...

Страница 152: ...tart Time drop down calendar select a start date and then enter a start time for the report NOTE No data is available before the time the AppAssure Core or AppAssure Agent software was deployed 4 In the End Time drop down calendar select an end date and then enter an end time for the report 5 Click Generate Report If the report spans multiple pages you can click the page numbers or the arrow butto...

Страница 153: ...describes the print and save options Icon Description Print the report Print the current page Export a report and save it to the disk Export a report and show it in a new window Use this option to copy paste and e mail the URL for others to view the report with a Web browser About compliance reports Compliance Reports are available for the Core and AppAssure Agent They provide you with a way to vi...

Страница 154: ...llowing categories Core Agent Type Summary Error Start Time End Time Elapsed Time Total Work About the Core Summary Report The Core Summary Report includes information about the repositories on the selected Core and about the agents protected by that core The information is displayed as two summaries within one report Repositories summary The Repositories portion of the Core Summary Report include...

Страница 155: ...port you want to run The reports available depend on the selection you made in Step 1 and are described below Machine Available Reports Core Compliance Report Summary Report Errors Report Agent Compliance Report Errors Report 5 In the Start Time drop down calendar select a start date and then enter a start time for the report NOTE No data is available before the time the Core or the Agent was depl...

Страница 156: ...drop down menu in the upper right corner 2 From the drop down menu click Reports and then select one of the following options Compliance Report Summary Report Failure Report 3 From the left navigation area select the Core or Cores for which you want to run the report 4 In the Start Time drop down calendar select a start date and then enter a start time for the report NOTE No data is available befo...

Страница 157: ... NOTE If the RAID 1 OS VD is already present then fast init the RAID 1 OS VD 5 On the Virtual Disk Management page select RAID 1 for RAID Level 6 Select both disks in the Physical Disks box NOTE The size of the virtual disk should not exceed 278 87 GB 7 Enter a VD Name such as OS that identifies the virtual disk as the one that contains the operating system 8 Press Tab to move the cursor to Initia...

Страница 158: ...r extracting the drivers may take several minutes NOTE All drivers copied by the OS Deployment wizard are removed after 18 hours You must complete the operating system installation within 18 hours for the copied drivers to be available To remove the drivers before the 18 hour period is over reboot the system and press the F10 key to re enter USC Using the F10 key to cancel the operating system ins...

Страница 159: ...nformation and Configuring phase of the AppAssure Appliance Recovery Wizard and then click Next The Disk Recovery phase begins 10 Click Next after viewing the warning about AppAssure services being shut down The virtual disks for repositories and any virtual standby machines are restored and AppAssure services are restarted The recovery is complete 159 ...

Страница 160: ...ws Server Manager 2 In the tree on the left select Configuration Services 3 Right click AppAssure Core Service and select Stop Deleting server certificates To delete AppAssure server certificates 1 Open a command line interface 2 Type Certmgr and press Enter 3 In the Certificate Manager window select Trusted Root Certification Authorities Certificates 4 Delete any certificate for which the Issue T...

Страница 161: ...re Console as administrator 2 Select the Configuration tab and then click the change button on the General bar 3 Enter the new Display Name and click OK Updating trusted sites in Internet Explorer To update the trusted sites in Internet Explorer 1 Open Internet Explorer 2 If the File Edit View and other menus are not displayed press F10 3 Click the Tools menu and select Internet Options 4 In the I...

Страница 162: ...d in the ALLUSERSPROFILE AppRecovery Scripts folder In Windows 7 the path to locate the ALLUSERSPROFILE folder is C ProgramData In Windows 2003 the path to locate the folder is Documents and Settings All Users Application Data NOTE Windows PowerShell is required and must be installed and configured prior to using and executing AppAssure scripts Powershell scripting prerequisites Before using and e...

Страница 163: ...eads stop is the maximum transfer queue depth public uint MaxConcurrentWrites get set Gets or sets the maximum number of block write operations to have outstanding on an epoch at any given time If additional blocks are received when this many block writes are outstanding those additional blocks are ignored until one of the outstanding writes finishes public ulong MaxSegmentSize get set Gets or set...

Страница 164: ...ts the timeout for network write operations related to this transfer Table 6 BackgroundJobRequest namespace Replay Core Contracts BackgroundJobs Method Description public Guid AgentId get set Gets or sets the ID of the agent public bool IsNightlyJob get set Gets or sets the value indicating whether the background job is a nightly job public virtual bool InvolvesAgentId Guid agentId Determines the ...

Страница 165: ...snap TransferJobRequest namespace Replay Core Contracts Transfer Inherits its values from the parameter BackgroundJobRequest Method Description public VolumeNameCollection VolumeNames get set Gets or sets the collection of volume names for transfer public ShadowCopyType ShadowCopyType get set Gets or sets the type of copying for transfer Available values Unknown Copy and Full Public AgentTransferC...

Страница 166: ...alue indicating whether the job is a log truncation public uint LatestEpochSeenByCore get set Gets or sets latest epoch value public Guid SnapshotSetId get set Gets or sets the GUID assigned by VSS to this snapshot public VolumeSnapshotInfoDictionary VolumeSnapshots get set Gets or sets the collection of snapshot info for each volume included in the snap Table 8 TransferPrescriptParameter namespac...

Страница 167: ...e 10 VolumeName namespace Replay Common Contracts Metadata Storage Method Description public string GuidName get set Gets or sets the ID of the volume public string DisplayName get set Gets or sets the name of the volume public string UrlEncode Gets a URL encoded version of the name which can be passed cleanly on a URL NOTE A known issue exists in NET 4 0 WCF https connect microsoft com VisualStud...

Страница 168: ...shot receiving parameter from transfer job param object TransferPrescriptParameter building path to Agent s Common Contracts dll and loading this assembly regLM Microsoft Win32 Registry LocalMachine regLM regLM OpenSubKey SOFTWARE Microsoft Windows CurrentVersion Uninstall AppRecovery Agent 5 regVal regLM GetValue InstallLocation regVal regVal Common Contracts dll System Reflection Assembly LoadFr...

Страница 169: ...orceBaseImage TransferPostscriptParameterObject ForceBaseImage echo IsLogTruncation TransferPostscriptParameterObject IsLogTruncation Preexportscript ps1 The PreExportScript is executed on the Core side prior to any export job receiving parameter from export job param object ExportJobRequest building path to Core s Common Contracts dll and loading this assembly regLM Microsoft Win32 Registry Local...

Страница 170: ...f ExportJobRequestObject eq null echo ExportJobRequestObject parameter is null else echo VolumeImageIds ExportJobRequestObject VolumeImageIds echo RamInMegabytes ExportJobRequestObject RamInMegabytes Prenightlyjobscript ps1 The PreNightlyJobScript is executed before every nighty job on Core side It has JobClassName parameter that helps to handle those child jobs separately receiving parameters fro...

Страница 171: ...f RollupJobRequestObject eq null echo RollupJobRequestObject parameter is null else echo SimultaneousJobsCount RollupJobRequestObject SimultaneousJobsCount echo AgentId RollupJobRequestObject AgentId echo IsNightlyJob RollupJobRequestObject IsNightlyJob AgentsCollection Agents as System Collections Generic List 1 System Guid if AgentsCollection eq null echo AgentsCollection parameter is null else ...

Страница 172: ...ssMethod object NightlyAttachabilityJobRequest object RollupJobRequest object Agents object ChecksumCheckJobRequest object TransferJobRequest int LatestEpochSeenByCore object TakeSnapshotResponse building path to Core s Common Contracts dll and loading this assembly regLM Microsoft Win32 Registry LocalMachine regLM regLM OpenSubKey SOFTWARE Microsoft Windows CurrentVersion Uninstall AppRecovery Co...

Страница 173: ...JobsCount RollupJobRequestObject SimultaneousJobsCount echo AgentId RollupJobRequestObject AgentId echo IsNightlyJob RollupJobRequestObject IsNightlyJob AgentsCollection Agents as System Collections Generic List 1 System Guid if AgentsCollection eq null echo AgentsCollection parameter is null else echo Agents GUIDs foreach a in AgentsCollection echo a break working with Checksum Check Job Checksum...

Страница 174: ...Core LatestEpochSeenByCore TakeSnapshotResponseObject TakeSnapshotResponse as Replay Agent Contracts Transfer TakeSnapshotResponse if TakeSnapshotResponseObject eq null echo TakeSnapshotResponseObject parameter is null else echo ID of this transfer session TakeSnapshotResponseObject Id echo Volumes TakeSnapshotResponseObject Volumes break Sample scripts The following sample scripts are provided to...

Страница 175: ...n on your purchase invoice packing slip bill or Dell product catalog Dell provides several online and telephone based support and service options If you do not have an active Internet connection you can find contact information on your purchase invoice packing slip bill or Dell product catalog Availability varies by country and product and some services may not be available in your area To contact...

Отзывы: