background image

DL4300 Appliance

Attaching an archive

126

Option

Text Box

Description

 

NOTE: 

To select a cloud

account, you must first

have added it in the

Core Console. For more

information, see 

Adding a

cloud account

.

Container

Select a container associated with

your account from the drop-down

menu.

Folder Name

Select the folder in which the

archived data is saved; for

example, Rapid Recovery -5-

Archive-[DATE CREATED]-[TIME

CREATED]

5. Select or clear the checks described in the following table. All are selected by default.

 

NOTE: 

Do not clear all checks. You must select at least one option.

Option

Description

Index files mapping offsets

This option checks that all the data on the internal

structure of the archive is in the correct location.

Structure integrity

This option verifies the presence of certain internal

files and the folder structure of the archive. If any

files or folders are missing, the check fails.

Checksum integrity

This option checks the integrity of the data segments

in the archive to ensure that the segments are

healthy.

6. Click Check File.

Rapid Recovery checks the archive according to your selections.

Parent topic  

Attaching an archive

Attaching an archive lets you see recovery points from the archive.

You must have a pre-existing archive created in Rapid Recovery Core 6.0.1 or later

to complete this procedure. For more information, see 

Creating an archive

.

When you attach an archive, the archive name you provide appears as an archive menu in the left navigation

menu of the Core Console. Each protected machine with recovery points in the archive is listed separately below

the archive menu. You can click any machine name in the archive and browse its recovery points. You can then

take the same actions as with any other recovery points currently visible in your Core.
Attaching the archive also caches the credentials for accessing the information. Until you delete the attached

archive definition, you can easily re-attach and detach the archive, making its recovery points easily accessible.

Содержание DL4300

Страница 1: ...DL4300 Appliance User Guide...

Страница 2: ...liance Core 27 Running the Appliance Configuration Wizard 27 Understanding the Rapid Recovery Core Console 28 Accessing the Rapid Recovery Core Console 28 Understanding the Quick Start Guide 28 Hiding...

Страница 3: ...gs 65 Understanding Core jobs 66 Managing licenses 74 Understanding SNMP settings 78 Configuring vSphere settings 80 Backing up and restoring Core settings 81 Core level tools 82 Understanding system...

Страница 4: ...cloud account 114 Editing a cloud account 116 Configuring cloud account settings 116 Removing a cloud account 117 Archiving 117 Understanding archives 117 Creating an archive 118 Archiving to a cloud...

Страница 5: ...the Local Mount Utility 151 Exploring a mounted recovery point using the Local Mount Utility 152 Refreshing recovery points 152 Dismounting individual recovery points using the Local Mount Utility 152...

Страница 6: ...ected machine 236 Downloading and viewing the log file for a protected machine 236 Viewing machine status and other details 237 Managing machines 238 Removing a machine 238 Canceling operations on a m...

Страница 7: ...Replicating to a third party target Core 294 Submitting a replication request to a third party service provider 295 Reviewing a replication request from a customer 298 Approving a replication request...

Страница 8: ...a recovery point 328 Restoring volumes from a recovery point 329 Restoring a directory or file using Windows Explorer 331 Restoring a directory or file and preserving permissions using Windows Explor...

Страница 9: ...bout Rapid Recovery reports 367 Generating a report from the Core Console 369 Generating a Core report on demand 369 Generating a protected machine report on demand 372 Managing scheduled reports from...

Страница 10: ...config 411 Launching PowerShell and importing the module 411 Working with commands and cmdlets 412 Rapid Recovery PowerShell module cmdlets 412 Edit EsxiVirtualStandby 416 Edit HyperVVirtualStandby 4...

Страница 11: ...Remove Mount 464 Remove Mounts 465 Remove RecoveryPoints 466 Remove Repository 467 Remove ScheduledArchive 468 Remove VirtualStandby 469 Resume Replication 470 Resume Snapshot 471 Resume VirtualStand...

Страница 12: ...r PowerShell Scripting 506 Sample PowerShell scripts 518 PreTransferScript ps1 518 PostTransferScript ps1 518 PreExportScript ps1 519 PostExportScript ps1 519 PreNightlyJobScript ps1 520 PostNightlyJo...

Страница 13: ...loud using cloud storage vendors that support both proprietary and open source platforms Intelligent deduplication You can reduce storage requirements by storing data once and referencing it thereafte...

Страница 14: ...ck level snapshots Your appliance can also perform log truncation of the protected Microsoft Exchange and SQL servers The following diagram depicts a simple deployment In this diagram AppAsure agent s...

Страница 15: ...n encryption and deduplication of the data received from the protected machine The Core then stores the snapshot backups in repositories such as Storage Area Network SAN or Direct Attached Storage DAS...

Страница 16: ...ppliance supports failover and failback in replicated environments In case of a comprehensive outage the target core in the secondary site can recover instances from replicated protected machines and...

Страница 17: ...erformance limitations when used as primary storage DAS offers the highest data bandwidth and fastest access rate and is easy to implement For optimum results use DAS with Redundant Array of Independe...

Страница 18: ...ta storing snapshot data in a repository local to the Core with all data processed through the Core Cannot be renamed after creation New repositories of this type can be created using REST APIs the Ra...

Страница 19: ...d post processing deduplication For more information on where the references to unique blocks are stored for DVM repositories see Understanding deduplication cache and storage locations Parent topic U...

Страница 20: ...randomly generated upper case and lower case English characters The Comment contains the text of the key description entered when the key was created Component Description Name This value is equivale...

Страница 21: ...guration the loss of the Core would not prevent a recovery Replication to an off site location The target Core is located at an off site disaster recovery facility for recovery in the event of a loss...

Страница 22: ...eplication with Rapid Recovery 22 Figure 4 Multipoint to point replication configuration Point to multipoint replication Replicates one or more protected machines from a single source Core to more tha...

Страница 23: ...very 23 Figure 5 Point to multipoint replication configuration Multi hop replication Replicates one or more protected machines from one target Core to another target Core producing additional failover...

Страница 24: ...pliance backup and retention policies are flexible and therefore easily configurable The ability to tailor retention polices to the needs of an organization not only helps to meet compliance requireme...

Страница 25: ...deduplicated If the total size of the archive is larger than the space available on the removable media the archive spans across multiple devices based on the available space on the media The archive...

Страница 26: ...cores from one central location MSPs and enterprise customers with multiple distributed cores can deploy the central console to get a unified view for central management The central console provides...

Страница 27: ...tings screen view or enter a different host name Additionally you can join this system to a domain Click Next 9 In the Alerts and Monitoring screen Enable system SNMP alerts Enable software SNMP alert...

Страница 28: ...r install the Rapid Recovery Core and navigate to the Core Console Click Start Guide on the Welcome page of the guide to see the various suggested configuration tasks Navigate through the guide using...

Страница 29: ...tting up replication from a primary source Core to a secondary target Core Click Replication to open the Replication page Prompts you to add a target Core using the Replication Wizard For information...

Страница 30: ...he default retention policy for the Core Click Retention Policy to open the Retention Policy page for the Core From here you can define how long to keep a recovery point before rolling it up For conce...

Страница 31: ...e and you can see summary tables showing protected machines repositories and recent alerts For more information see Understanding the Home page summary tables view and Understanding the Core dashboard...

Страница 32: ...points only machines see Viewing the Recovery Points Only menu Parent topic Understanding the left navigation area The left navigation area of the Core Console appears on the left side of that user i...

Страница 33: ...expand the view to see all protected machines again click the expand view icon The following table describes the various elements on the Home page when in the summary tables view Table 3 Home page opt...

Страница 34: ...ication Name The display name of the originating source Core for any machines you replicate on this target Core You can define this name when setting up replication Repository Name The name of the rep...

Страница 35: ...ry page appears for this recovery points only machine DVM Repositories This pane appears for the DL1000 regardless of whether any DVM repositories have been created This pane does not appear unless yo...

Страница 36: ...iated with your Core It shows the number of repositories how many machines are protected in each the number of recovery points and the percentage of compression or deduplication This report is refresh...

Страница 37: ...elected machine Generate reports specific to that machine Access more functions specific to the selected machine including system information mounts retention policy notifications or a machine specifi...

Страница 38: ...the Exchange Server Information pane See also Viewing the SQL Server Information pane Viewing the Summary pane The Summary pane contains summary information about the protected machine including the h...

Страница 39: ...or a machine The Recovery Points page shows a list of the recovery points collected for that protected machine as well as pertinent machine and repository data On this page you can mount export and re...

Страница 40: ...or tasks only To To narrow your results you can enter a date at which to stop searching Available for tasks only Status icons Each icon represents a different job status For alerts and tasks clicking...

Страница 41: ...able for alerts or journal items click the header to filter the results by status Name Name is available for tasks only This text field lists the task type that completed for this protected machine Ex...

Страница 42: ...by clicking the arrow on the left side of this menu Each replicated machines menu includes a drop down menu on the right side which includes functions you can perform simultaneously on all of the rep...

Страница 43: ...multaneously on all of the like items in that group For more information see Understanding custom groups Parent topic Using the Error dialog box When an error occurs in the Rapid RecoveryRapid Recover...

Страница 44: ...u can use it to restore or migrate Core settings For more information about backing up and restoring Core settings see Backing up and restoring Core settings General General settings include configura...

Страница 45: ...about deduplication cache see Understanding deduplication cache and storage locations For information on adjusting the settings see Configuring DVM deduplication cache settings Replay Engine Replay en...

Страница 46: ...configuration The Cloud Configuration settings let you specify configuration settings for supported cloud storage accounts These settings do not create cloud accounts Instead they associate existing...

Страница 47: ...a Protection Rapid Recovery License Portal has a different release cycle than Rapid Recovery software For the latest product documentation see the Dell Technical Documentation website SNMP configurati...

Страница 48: ...splay in the Rapid Recovery Core Console You can enter up to 64 characters Web server port Enter a port number for the Web server The default port is 8006 Service port Enter a port number for the Rapi...

Страница 49: ...the settings the system uses to check for updates at any time CAUTION When using replication configuring your system to install updates automatically could result in upgrading the source core before...

Страница 50: ...are memory intensive and include various integrity checks and data consolidation tasks that are best conducted when the Rapid Recovery Core is less active All the nightly jobs and the scope for which...

Страница 51: ...ction groups containing databases Connect to the database from SQL Server Open the database Close the database Dismount the recovery point To enable this nightly check specify a SQL Server instance to...

Страница 52: ...machine Checks the integrity of recovery points containing Exchange Database EDB files NOTE This option does not appear if you are not protecting an Exchange Server in your Core Truncate SQL logs sim...

Страница 53: ...o the Rapid Recovery Core Console 2 On the icon bar click Settings and then do one of the following From the list of Core settings on the left side of the Settings page click Nightly Jobs Scroll down...

Страница 54: ...ettings Client timeout settings control the length of time that various operations are attempted before the operation times out NOTE Dell recommends leaving default timeout settings unless you experie...

Страница 55: ...nd writing data streams between the graphic user interface and the Rapid Recovery Core service across http Enter the amount of time you want to lapse before a timeout occurs during read or write event...

Страница 56: ...eration is finished memory consumption decreases accordingly However administrators should consider the highest RAM load requirement for efficient operations Default settings for the Rapid Recovery Co...

Страница 57: ...r the configuration information as described in the following table Table 14 DVM deduplication cache settings information Setting Description Restore Default This control resets DVM cache locations to...

Страница 58: ...change and exit edit mode or click to exit edit mode without saving Parent topic Configuring Replay engine settings You can configure information regarding the Replay engine which is the communicatio...

Страница 59: ...for the Replay engine Port in use Represents the port that is in use for the Replay engine configuration Allow port auto assigning Click for allow for automatic TCP port assignment Admin Group Enter a...

Страница 60: ...ngs appear 3 Click on the setting you want to change The setting you selected becomes editable 4 Enter the configuration information as described in the following table Table 16 Deployment settings in...

Страница 61: ...work to the Rapid Recovery Core The event transaction data for your Core is then saved to that service database not locally For more information about establishing or modifying database connection set...

Страница 62: ...or the database connection NOTE The default setting is 27017 User name Enter the name of a user with administrative privileges to the MongoDB service database NOTE If the host name parameter is localh...

Страница 63: ...en do one of the following From the list of Core settings on the left side of the Settings page click Local Database Settings Scroll down on the right side of the Settings page until you can see the L...

Страница 64: ...eps in this procedure to manage report settings for Core reports 1 Navigate to the Rapid Recovery Core Console 2 On the icon bar click Settings and then do one of the following From the list of Core s...

Страница 65: ...censing costs Rapid Recovery gives you two options for performing attachability checks using a licensed instance of SQL Server installed on the Rapid Recovery Core machine or using the instance of SQL...

Страница 66: ...n the Core and then enter the authentication information as described in the following table Table 19 SQL Server credentials information Descriptions of the information required for authenticating a c...

Страница 67: ...or other communication errors prevent the job from succeeding the first time In the Core Jobs table the Settings column indicates if the job listed is included in Core job settings by default or must...

Страница 68: ...Exchange databases Checks the integrity of recovery points containing Exchange databases Process Mount the latest recovery point for protection groups containing SQL databases Connect to the database...

Страница 69: ...ce Core and controls outgoing replication 1 3 Default Roll up recovery points Applies the retention policy to your backed up data by combining or rolling up recovery points on the schedule defined in...

Страница 70: ...overy ExchangeLibraries 1 0 Add Export to archive Creates backup in the specified path with an archive of the selected recovery points Process Mount recovery points Write data to backups Dismount the...

Страница 71: ...nt recovery point snapshots Performs mount of recovery point to the specified path 1 0 Add Protect ESX virtual machines Adds all specified virtual machines to agentless protection Job is performed imm...

Страница 72: ...ch job type listed 1 The maximum number of jobs of this type for the Core to attempt at one time This must be set to a value between 1 to 50 2 The number of times a job should be attempted if a networ...

Страница 73: ...Maximum concurrent jobs text box enter a new value between 1 to 50 6 To set the number of attempts the Core should make before abandoning the job in the Try count text box enter a new value between 0...

Страница 74: ...ses Many Rapid Recovery Core users start with a trial license which has limited capabilities A trial license is valid for 14 days and can be extended one time by the group administrator to a 28 day li...

Страница 75: ...ding License Pools in the Dell Data Protection Rapid Recovery License Portal User Guide Protected by this Core Indicates the number of machines from the license pool that are protected by this core To...

Страница 76: ...settings area click Change License The Change License dialog box appears 5 To enter a license key or upload a license file do one of the following a If you want to manually enter the license key in t...

Страница 77: ...Choose File In the File Upload dialog box navigate through the file system and locate the new license file you want to use For example locate Software YourCompany lic c Click the license file and the...

Страница 78: ...y status and protected machines An SNMP host can read this information using a standalone application called an SNMP browser You can install the SNMP browser on any machine accessible over the network...

Страница 79: ...it mode or click to exit edit mode without saving Parent topic Downloading the SNMP MIB file The Simple Network Management Protocol is used to monitor devices on a network for conditions that require...

Страница 80: ...y to virtual machines Use this procedure to configure vSphere settings for the Core 1 Navigate to the Rapid Recovery Core Console 2 On the icon bar click Settings and then do one of the following From...

Страница 81: ...ity risk to saving a Core configuration file NOTE You must first back up Core setting information before you can use this process to restore Core settings Use this procedure to back up and restore Cor...

Страница 82: ...ue click Close to clear the error dialog box i After restoring the configuration verify the following Unlock all encryption keys For more information see Unlocking an encryption key If virtual standby...

Страница 83: ...jobs see Understanding nightly jobs For more information about how to configure nightly job settings for the Core see Configuring nightly jobs for the Core For more information about configuring night...

Страница 84: ...mation about currently mounted recovery points You can view the local end point remote end point mounted image agent ID mounted image ID and the mounted image display name You can see if the mount is...

Страница 85: ...ore information about machine logs see Accessing protected machine diagnostics The ability to access logs can be useful when troubleshooting an issue or working with Dell Rapid Recovery support To acc...

Страница 86: ...oints manually from one repository to another Parent topic Managing a DVM repository Before you can use Rapid Recovery you need to set up one or more repositories on the Rapid Recovery Core A reposito...

Страница 87: ...ies The Repositories page appears On the Repositories page the DVM Repositories pane appears 3 At the top of the page click Add New DVM Repository The Add New Repository dialog box appears 4 Enter the...

Страница 88: ...Box Description Data path Enter the location for storing the protected data For example type X Repository Data When specifying the path use only alphanumeric characters the hyphen and the period only...

Страница 89: ...exceed the size of the volume If the storage location is a New Technology File System NTFS volume using Windows XP or Windows 7 the file size limit is 16 TB If the storage location is a NTFS volume us...

Страница 90: ...ation 10 Optionally repeat Step 6 through Step 9 to add additional storage locations for the repository 11 When all of the storage locations you want to create for the repository at this time have bee...

Страница 91: ...the repository license is displayed In the Estimated capacity box the estimated capacity available for creating a repository is displayed The Controller available space displays the available space on...

Страница 92: ...New DVM Repository Add a new DVM repository Open Existing DVM Repository Open an existing DVM repository from another Core which changes ownership of the repository to this Core For more information s...

Страница 93: ...hich changes ownership to this repository Parent topic Adding a storage location to an existing DVM repository NOTE It s recommended that you expand the repository through Appliance tab For more infor...

Страница 94: ...enter the information as described in the following table Table 31 CIFS share credentials Text Box Description UNC Path Enter the path for the network share location If this location is at the root de...

Страница 95: ...g Policy The write caching policy controls how the Windows Cache Manager is used in the repository and helps to tune the repository for optimal performance on different configurations Set the value to...

Страница 96: ...te than on the source Core Similarly you can now define a custom retention policy for any replicated machine For example you can roll up recovery points in the target Core at a faster rate and with le...

Страница 97: ...repository the data you capture in each snapshot is deduplicated This deduplication occurs incrementally as snapshots are saved to the repository One occurrence of each string of information is saved...

Страница 98: ...DVM repostiory in your Core to perform this procedure You can perform offline deduplication of data saved to an existing DVM repository This is accomplished by launching the Repository Optimization Jo...

Страница 99: ...to resume an interrupted optimization job do the following a In the repositories summary table from the row representing the appropriate repository click and then select Continue Optimization Job A wa...

Страница 100: ...Parent topic Deleting a repository Complete the steps in this procedure to delete a repository 1 Navigate to the Rapid Recovery Core Console 2 On the icon bar click More and then select Repositories T...

Страница 101: ...required after the check from the icon bar click Events 6 From the Events page click Job Details for the job to view more information about the job status If you see an error in any child tasks for th...

Страница 102: ...ion If you change the name or passphrase for an existing encryption key currently used to a protected machine then upon the next scheduled or forced snapshot Rapid Recovery Core captures and reflects...

Страница 103: ...n existing universal unlocked encryption key to any protected machine in your Core If you just added a new encryption key using the process described in the topic Adding an encryption key and want to...

Страница 104: ...or this protected machine and the lock now appears as closed Optionally if you want the encryption key applied immediately force a snapshot For more information see Forcing a snapshot CAUTION Rapid Re...

Страница 105: ...you see the information described in the following table Table 35 Information about each encryption key UI Element Description Select Item For each encryption key you can select the checkbox to perfor...

Страница 106: ...to locked After the key locks automatically you must unlock the key again in order to use it For more information see the topic Unlocking an encryption key Description The description is an optional f...

Страница 107: ...achines This step describes how to add an encryption key from the Rapid Recovery Core Console This process does not apply the key to any machines currently being protected on the Core You can also add...

Страница 108: ...rt an encryption key from another Rapid Recovery Core and use that key to encrypt data for a protected machine in your Core To import the key you must be able to access it from the Core machine either...

Страница 109: ...E You cannot use a locked encryption key to recover data or to apply to a protected machine You must first provide the passphrase thus unlocking the key You can also lock an unlocked encryption key en...

Страница 110: ...ocate the encryption key you want to lock If its type is Universal then click its drop down menu and select Change the type to Replicated The Change Encryption Key Type dialog box appears 4 In the dia...

Страница 111: ...1 Navigate to the Rapid Recovery Core 2 On the icon bar click More and then select Encryption Keys The Encryption Keys page appears 3 Locate the encryption key you want to update click its drop down m...

Страница 112: ...tected machine You must first view the encryption settings for each protected machine using the key and disassociate the encryption key you want to remove For more information see the topic Disassocia...

Страница 113: ...and then select Encryption Keys The Encryption Keys page appears Any encryption keys accessible to the Core appear in a summary table Each lists a type of Universal or Replicated 3 Locate the encrypti...

Страница 114: ...perations you specify To add a cloud account complete the steps in the following procedure 1 On the Rapid Recovery Core Console icon bar click the More icon and then select Cloud Accounts The Cloud Ac...

Страница 115: ...ccount Password or API Key Select whether to use a password or an API key and then enter your selection for this account Tenant ID Enter your tenant ID for this account Authentication URL Enter the au...

Страница 116: ...dit the details as necessary and then click Save NOTE You cannot edit the cloud type Parent topic Configuring cloud account settings Cloud configuration settings let you determine how much time should...

Страница 117: ...Delete Account dialog box click Yes to confirm that you want to remove the account 4 If the cloud account is currently in use a second dialog box prompts you to confirm that you still want to remove...

Страница 118: ...machine to be saved without the inconvenience of needing to manually create the archives each time 1 On the button bar of the Rapid Recovery Core Console click Archive The Archive Wizard opens 2 On t...

Страница 119: ...8 Do one of the following If you chose to create a one time archive skip to Step 15 If you chose to create a scheduled archive continue to Step 9 9 On the Schedule page select one of the following op...

Страница 120: ...t leaves the data for other cores intact Erase completely Clears all archived data from the directory before writing the new archive 14 Optionally select Build recovery points chains fix orphans and t...

Страница 121: ...selected by default 16 Click Next 17 On the Date Range page either manually enter the start date and end date of the recovery points to be archived or select the date time by clicking the calendar ic...

Страница 122: ...he archive as described in the following table based on the location type you selected in Step 3 Table 42 Archive details Option Text Box Description Local Location Enter the location for the output I...

Страница 123: ...lection from Step 8 Table 43 Send data options Option Text Box Description Daily At time Select the hour of the day you want to create a daily archive At day of week Select a day of the week on which...

Страница 124: ...times when you want to pause a scheduled archive job such as if you need to change the destination archive location Also if you opted to initially pause archiving when you performed the Creating an a...

Страница 125: ...the presence of all necessary files within the archive and that the files are healthy To perform an archive check complete the steps in the following procedure 1 From the Rapid Recovery Core Console c...

Страница 126: ...sum integrity This option checks the integrity of the data segments in the archive to ensure that the segments are healthy 6 Click Check File Rapid Recovery checks the archive according to your select...

Страница 127: ...loud 4 Enter the details for the archive as described in the following table based on the location type you selected in Step 3 Table 46 Location type details Option Text Box Description Local Location...

Страница 128: ...chive Wizard opens 2 On the Import Type page of the wizard select one of the following options One time import Continuous import by schedule 3 Click Next 4 On the Location page select the location of...

Страница 129: ...8 On the Machines page select the machines that you want to import from the archive If you selected One time import in Step 2 and at least one machine is not present on the Core as a protected replica...

Страница 130: ...do not want the import job to begin at the next scheduled time after you complete the wizard NOTE You may want to pause the scheduled import if you need time to prepare the target location before imp...

Страница 131: ...ee Configuring event retention Parent topic Viewing events using tasks alerts and journal From the Core console you can view events for the Core and you can view events for a specific protected or rep...

Страница 132: ...nter 1 1 2016 8 00 AM To select the current date and time click the Calendar widget in the From text box and then click the current date The current time will automatically appear Click the Calendar w...

Страница 133: ...pecified machine click the Events menu and then click Alerts The list of events is filtered to display only important alerts for the Core or for the machine you selected 2 Optionally to filter the lis...

Страница 134: ...time will automatically appear Click the Calendar widget select the date then click the Clock widget and select the desired time using the controls Click away from the calendar to accept the selected...

Страница 135: ...ng The SMTP Server core settings appear 3 Click on the setting you want to change The setting you selected becomes editable 4 Enter the configuration information as described in the following table Op...

Страница 136: ...id Recovery events by email This topic describes the process of configuring the default email notification template or customizing the content Using the Restore Default option you can restore changes...

Страница 137: ...About this event description coreAdminUrl Send Test Email Clicking this button sends a test email message to the email address you specify in the resulting Send Test Email dialog box Restore Defaults...

Страница 138: ...s exit the error dialog box and the Send Test Email dialog box click OK to save the current email template settings Then modify your email server settings as described in the procedure Configuring an...

Страница 139: ...Core level from the icon bar click More and then select Notifications The Notifications page appears To set notifications for a specific protected machine do the following 1 From the Protected Machin...

Страница 140: ...ypes menu click Warning This is represented by a yellow exclamation point icon Info To create alerts for informational messages from the Select Types menu click Info This is represented by a blue i Re...

Страница 141: ...stall Recovery Point Check Remote Mount Repository Common Replication Restore Rollup Scheduled Archives Security Server Logs vSphere To define alerts for all events in every group select the checkbox...

Страница 142: ...r The result is the reporting of Core information such as alerts repository status and protected machines Select this option if you want to notify Core events by SNMP trap You must also specify a trap...

Страница 143: ...lerts portion of the Events page However it displays the event only once with the date and time of the most recent occurrence The events log is not updated with the same event until the threshold of t...

Страница 144: ...Rapid Appliance Self Recovery RASR is a bare metal restore process that quickly restores your Appliance to an operating state RASR offers two recovery options Restore factory settings Recover your ap...

Страница 145: ...3 In the Boot Manager Main Menu select One shot BIOS Boot Menu 4 In the Boot Manager Boot Menu select the attached USB drive 5 Select your keyboard layout 6 Click Troubleshoot Rapid Appliance Self Rec...

Страница 146: ...Files AppRecovery Local Mount Utility and a shortcut appears on the machine s desktop While the utility was designed for remote access to a Rapid Recovery Core machine you can also install the LMU on...

Страница 147: ...dding a Core machine to the Local Mount Utility To mount a recovery point you must add a Core machine to the LMU There is no limit as to how many Cores you can add Complete the following procedure to...

Страница 148: ...Rapid Recovery Cores connected to the LMU 1 From the Local Mount Utility user interface click Options 2 In the Options dialog box you can change the setting described in the following table Table 52 C...

Страница 149: ...edit settings and then click Edit Core 2 In the Edit Core dialog box you can change the settings described in the following table Table 53 Core settings Option Description Host name The name of the Co...

Страница 150: ...remove a Core from the LMU NOTE This option is not available for a Rapid Recovery Core located on and labeled as the localhost 1 From the Local Mount Utility user interface right click the Core you wa...

Страница 151: ...re in the navigation tree to reveal the protected machines 2 From the navigation tree select the machine from which you want to mount a recovery point The recovery points appear in the main frame 3 Op...

Страница 152: ...ctive Mounts window opens and displays all mounted recovery points 2 Expand the navigation tree to reveal the recovery points mounted for each machine and their volumes 3 Click Explore next to the vol...

Страница 153: ...are two main ways in which you can dismount all recovery points at one time in the LMU You can dismount all recovery points without viewing which recovery points are currently mounted or you can view...

Страница 154: ...Option Description Browse Recovery Points Opens the LMU main window Active Mounts Opens the Active Mounts dialog box on top of the LMU main window Options Opens the Options dialog box on top of the L...

Страница 155: ...vailable for the Storage Hardware subsystem opens the health page of your system where you can analyze the health of the controller enclosure physical drives and so on The Controllers link available f...

Страница 156: ...e backups in any location but in this case an error is displayed on the RASR page because backups cannot be controlled and cannot be guaranteed if they will be consistent to perform restore using RASR...

Страница 157: ...ndows backup policy perform the following steps 1 In the Core Console navigate to Appliance Backup 2 Click the Configure Policy button The Windows Backup Policy window is displayed 3 Enter the paramet...

Страница 158: ...Recovery repository to host standby virtual machines For example if you are using Storage Resource Management SRM you can allocate up to 100 percent capacity of the storage remaining after creating t...

Страница 159: ...tween 1 and 40 alphanumeric characters including spaces Do not use prohibited characters or prohibited phrases For more information see the topics prohibited characters or prohibited phrases in the De...

Страница 160: ...software and appliance specific components RUU consists of updated versions of the Windows Server Roles and Features Net 4 5 2 LSI Provider DL Applications OpenManage Server Administrator and Rapid R...

Страница 161: ...files 3 Double click the launchRUU icon 4 When prompted click Yes to acknowledge that you are not running any of the listed processes 5 When the Recovery and Update Utility screen displays click Star...

Страница 162: ...ork hostname or IP address For more information on how to protect a single machine Protecting a machine You can protect a network cluster using the Protect Cluster function which connects to the clust...

Страница 163: ...Server and SQL Server appear in the Rapid Recovery Core Console only when an instance of the software and related files are detected on protected servers In those cases additional options are availabl...

Страница 164: ...e time export or setting up virtual standby mounting or viewing recovery points restoring from a recovery point converting the cluster node to its own protected machine or removing the node from prote...

Страница 165: ...ine with the Rapid Recovery Agent software a notification appears in the user interface to alert you that exports are limited and restricted to simple dynamic volumes If you attempt to export anything...

Страница 166: ...the Rapid Recovery Agent Installer and deploy it to any machine that you want to protect on the Rapid Recovery Core Complete the steps in this procedure to download the web installer 1 To download th...

Страница 167: ...owing tasks Deploy Rapid Recovery Agent to multiple machines See Deploying the Rapid Recovery Agent software to one or more machines Monitor the deployment See Verifying the deployment to multiple mac...

Страница 168: ...credentials as described in the following table Table 58 Domain information and credentials Text Box Description Host The host name or IP address of the Active Directory domain User name The user name...

Страница 169: ...SX i 3 Enter the host information and logon credentials as described in the following table Table 59 vCenter ESX i connection settings Text Box Description Host The name or IP address of the VMware vC...

Страница 170: ...n the Machines page of the wizard select the protected machines to which you want to deploy an upgrade of the Rapid Recovery Agent software 5 Click Finish The system automatically verifies each machin...

Страница 171: ...Alert events appear in the list showing the time the event initiated and a message For each successful deployment of the Agent software you will see an alert indicating that the protected machine has...

Страница 172: ...every hour on the hour 12 00 AM 1 00 AM 2 00 AM and so on Selecting periods lets you view the default protection schedule and make adjustments accordingly Selecting a daily protection time causes Rapi...

Страница 173: ...s using one process simultaneously see About protecting multiple machines When you add protection you need to define connection information such as the IP address and port and provide credentials for...

Страница 174: ...trator or if the machine is in a domain domain name Administrator Password The password used to connect to this machine If the Install Agent page appears next in the Protect Machine Wizard that means...

Страница 175: ...dvanced configuration for the Protect Machine Wizard and default protection then click Next and proceed to Step 14 to see repository and encryption options If you selected Advanced configuration for t...

Страница 176: ...ears 3 Click Add Storage Location to define the specific storage location or volume for the repository This volume should be a primary storage location 4 In the Storage Location area specify how to ad...

Страница 177: ...are permitted User name Specify a user name for accessing the network share location Password Specify a password for accessing the network share location 5 In the Storage Configuration area click More...

Страница 178: ...Windows Server 2008 SP2 or Windows Server 2008 R2 SP2 the recommended setting is Off If set to Off Rapid Recovery controls the caching If set to Sync Windows controls the caching as well as the synch...

Страница 179: ...ers such as the back slash forward slash pipe colon asterisk quotation mark question mark open or close brackets ampersand or hash Description Enter a comment for the encryption key This information a...

Страница 180: ...assword The password used to connect to this machine 3 Click Connect 4 In the Protect Cluster dialog box select a repository for this cluster 5 If you want to secure the recovery points for this clust...

Страница 181: ...ent topic Protecting nodes in a cluster This task requires that you first protect a cluster For more information see Protecting a cluster This topic describes how to protect the data on a cluster node...

Страница 182: ...interval text box and type an appropriate interval in minutes For example highlight the default interval of 60 and replace it with the value 20 to perform snapshots every 20 minutes during this period...

Страница 183: ...ing If you previously created a protection schedule template and want to apply it to this protected machine select the template from the drop down list and then go to Step 7 If you want to remove an e...

Страница 184: ...aused until explicitly resumed If you pause protection outside of a wizard you can choose whether to pause protection until resumed or to pause it for a designated amount of time specified in any comb...

Страница 185: ...me Protection dialog box select Yes The Resume Protection dialog box closes and protection is resumed for the selected machine 5 To pause protection for a single machine from the machine pages navigat...

Страница 186: ...tory for the machine and the total amount of storage space the snapshots use in the repository To manage aspects of any protected machine start by navigating to the machine you want to view configure...

Страница 187: ...writer is interfering with or precluding successful backup transfers these can be disabled one by one Dell recommends leaving these settings alone unless you are otherwise directed by a Dell Support...

Страница 188: ...lt this is the host name of the machine You can change this to something more user friendly if needed Do not use prohibited characters or prohibited phrases Host Name Enter a host name for the machine...

Страница 189: ...ty checks 6 To modify transfer settings for a protected machine click the appropriate setting and then enter the configuration information as described in the following table NOTE For conceptual infor...

Страница 190: ...ng Reads per Stream Specifies how many queued read operations will be stored on the back end This setting helps to control the queuing of protected machines The default setting is 0 Transfer Data Serv...

Страница 191: ...ng table Table 72 License details for a protected machine Text Box Description Expiration Date Indicates the expiration date of the license for the selected protected machine License Status Indicates...

Страница 192: ...in the machine s metadata NOTE Do not change this setting as doing so could break the connection between the protected machine and the Core 5 Under Transfer Queue to change the number of transfer jobs...

Страница 193: ...S snapshot during transfer first if it fails create a checkpoint If the VSS snapshot succeeds the recovery point will be in an application consistent state If the VSS snapshot fails and a checkpoint i...

Страница 194: ...n incremental snapshot for data updated since the last snapshot This type of transfer creates recovery points which are stored on the repository associated with the Core For more information see Manag...

Страница 195: ...The speed of your network is another critical factor with many variables The network backbone in place for example 1GbE versus 10GbE architecture configuration intentional use of NIC teaming and even...

Страница 196: ...wn in the Settings page to view nightly jobs settings 4 Under the Nightly Jobs heading click Change The Nightly Jobs dialog box appears NOTE For information about the Rollup setting including setting...

Страница 197: ...Removing a machine When you remove a machine from protection on the Rapid Recovery Core you are presented with two options you can keep the recovery points saved thus far to the RR Core or you can re...

Страница 198: ...lick Remove Machine The Remove Node dialog box appears 3 Optionally in the dialog box to remove all currently stored recovery points for this cluster from the repository select Remove with recovery po...

Страница 199: ...one of the following To open the log file select Open with then select an application such as Notepad for viewing the text based log file and finally click OK The AgentAppRecovery log file opens in th...

Страница 200: ...eplicated machines if you apply a group action such as forcing replication this will only apply to the replicated machines You can create one or more groups A single protected machine or replicated ma...

Страница 201: ...nt to modify 3 Click on the drop down menu for that group and then click Edit The Edit Label dialog box appears within which the name of the custom group becomes editable 4 In the Name field update th...

Страница 202: ...en confirm that you want to resume For more information see Pausing and resuming replication To refresh the information for all of the objects in the group click Refresh Metadata To pause replication...

Страница 203: ...e or more machines You can deploy the Rapid Recovery Agent software as part of Protect Multiple Machines Wizard The process of protecting multiple machines includes optional steps that you can access...

Страница 204: ...ines you want to protect or if any of the machines you specified cannot be protected for another reason then the selected machines appear on the Warnings page 9 Optionally on the Warnings page of the...

Страница 205: ...select Create a Repository and then complete the following steps 1 On the Repository enter the information described in the following table Table 80 Add New Repository settings Text Box Description Re...

Страница 206: ...o not use spaces No other symbols or punctuation characters are permitted Metadata path Enter the location for storing the protected metadata For example type X Repository Metadata When specifying the...

Страница 207: ...S volume using Windows 8 8 1 Windows 10 or Windows Server 2012 2012 R2 the file size limit is 256 TB NOTE For Rapid Recovery to validate the operating system Windows Management Instrumentation WMI mus...

Страница 208: ...hile using encryption is optional Dell highly recommends that you establish an encryption key and that you protect the passphrase you define Store the passphrase in a secure location as it is critical...

Страница 209: ...that you limit protection to no more than 200 VMs at once For example do not select more than 200 VMs when using the Protect Multiple Machines Wizard Protecting more than 200 VMs results in slow perfo...

Страница 210: ...f the machines you specified cannot be protected for another reason then the selected machines appear on the Warnings page 11 Optionally on the Warnings page you can verify any machine by selecting th...

Страница 211: ...ption If you want to create a repository select Create a Repository and then complete the following steps 1 On the Repository enter the information described in the following table Table 86 Add New Re...

Страница 212: ...o not use spaces No other symbols or punctuation characters are permitted Metadata path Enter the location for storing the protected metadata For example type X Repository Metadata When specifying the...

Страница 213: ...S volume using Windows 8 8 1 Windows 10 or Windows Server 2012 2012 R2 the file size limit is 256 TB NOTE For Rapid Recovery to validate the operating system Windows Management Instrumentation WMI mus...

Страница 214: ...using encryption is optional Dell highly recommends that you establish an encryption key and that you protect the passphrase you define Store the passphrase in a secure location as it is critical for...

Страница 215: ...ions Typical Advanced show optional steps 3 Click Next 4 On the Connection page of the wizard from the Source drop down list select Manually 5 Click Next 6 On the Select Machines page enter the machin...

Страница 216: ...onfiguration for the Protect Machine Wizard and specified custom protection click Next to set up a custom protection schedule For details on defining a custom protection schedule see Creating custom p...

Страница 217: ...local machine and then enter the information as described in the following table Table 92 Local disk settings Text Box Description Data path Enter the location for storing the protected data For examp...

Страница 218: ...ult is 250 GB You can choose from the following GB TB NOTE The size that you specify cannot exceed the size of the volume If the storage location is a New Technology File System NTFS volume using Wind...

Страница 219: ...es for this machine You can change the settings later from the Encryption Keys page in the Rapid Recovery Core Console For more information about encryption see the topic Understanding encryption keys...

Страница 220: ...the machines are added to protection on the Core Parent topic Monitoring the protection of multiple machines You can monitor the progress as Rapid Recovery applies the protection polices and schedule...

Страница 221: ...hat Exchange databases are mountable to detect corruption and alert administrators so that all data on the Exchange server can be recovered successfully For more information about forcing a mountabili...

Страница 222: ...At the top of the page click the Exchange drop down menu and select Force Log Truncation 3 In the resulting dialog box click to confirm that you want to force log truncation The dialog box closes The...

Страница 223: ...For instructions on how to view the status of the mountability check see Viewing events using tasks alerts and journal Parent topic Forcing a checksum check of Exchange database files In order to for...

Страница 224: ...default credentials for all protected SQL Servers For more information about setting credentials for SQL servers see Setting credentials for a SQL Server machine Truncate SQL logs When you force log...

Страница 225: ...s procedure to force log truncation NOTE When conducted for a SQL machine truncation identifies the free space on a disk but does not reduce the size of the logs 1 In the left navigation area of the R...

Страница 226: ...Server on disk storage format is the same in both 64 bit and 32 bit environments and attachability works across both versions A database that is detached from a server instance that is running in one...

Страница 227: ...pid Recovery creates recovery points based on volumes not VMDKs each volume can be separately mounted restored and exported NOTE Rapid Recovery recommends that VMware Tools be installed on virtual mac...

Страница 228: ...on tables or GUID partition tables GPTs VMDKs without these partition tables are protected as whole disks rather than as individual volumes Each VMware virtual machine must have VMware Tools installed...

Страница 229: ...ing VMware Tools on protected VMs on vSphere or ESXi hosts to take full advantage of Microsoft Volume Shadow Services VSS functionality Agentless protection uses the snapshot technology native to VMwa...

Страница 230: ...y Core captures use Microsoft Volume Shadow Services VSS For information on the behavior of agentless VMs with or without VMware Tools see Benefits of installing VMware Tools for agentless protection...

Страница 231: ...of all volumes If you want to define a different protection schedule then in the Schedule Settings option select Custom protection 11 Proceed with your configuration as follows If you selected a Typic...

Страница 232: ...dicated folder within the root for the storage location for your repository Do not specify the root location For example use E Repository not E If the repository that you are creating in this step is...

Страница 233: ...icated folder name for example Repository The path must begin with When specifying the path use only alphanumeric characters the hyphen and the period only to separate host names and domains The lette...

Страница 234: ...s the default Windows controls the caching This is appropriate for Windows 10 and for versions of Windows Server 2012 and later NOTE Setting the write caching policy to On could result in faster perfo...

Страница 235: ...mation as described in the following table Table 102 Encryption key settings Text Box Description Name Enter a name for the encryption key Encryption key names must contain between 1 and 130 alphanume...

Страница 236: ...e selected application To save the file locally select Save File and then click OK The AgentAppRecovery log file saves to your Downloads folder It can be opened using any text editor Parent topic Down...

Страница 237: ...rver also displays and includes Last successful Mountability check performed Last successful Checksum check performed Last Log Truncation performed Detailed information about the volumes contained on...

Страница 238: ...N If you delete recovery points you will no longer be able to restore data for that machine Complete the steps in the following procedure to remove a machine from protection in your Rapid Recovery env...

Страница 239: ...process that creates a virtual machine from a recovery point The VM is a bootable clone of a protected machine NOTE The recovery point used must be part of a complete recovery point chain For more inf...

Страница 240: ...operating system and settings from the original protected machine You can perform virtual export of recovery points for your protected Windows or Linux machines to VMware ESXi Hyper V and VirtualBox...

Страница 241: ...g table and then click Next Table 103 Virtual machine parameters Options Description Host name Enter a name for the host machine Port Enter the port for the host machine The default is 443 User name E...

Страница 242: ...m the protected server even if only a portion of the original volume is being used For example if the volume is 1 TB large but contains only 2 GB of used space Rapid Recovery creates a virtual disk of...

Страница 243: ...105 ESXi credentials Option Description Host name Enter a name for the host machine Port Enter the port for the host machine The default is 443 User name Enter the logon credentials for the host mach...

Страница 244: ...ioning creates a new disk or volume that is the same size as the original volume from the protected server even if only a portion of the original volume is being used For example if the volume is 1 TB...

Страница 245: ...able 107 Virtual machine parameters Option Description VM Machine Location Specify the path of the local folder or network share on which to create the virtual machine NOTE If you specified a network...

Страница 246: ...ber of processors The number of processors CPUs you want for the exported virtual machine The minimum is 1 Cores per processor The number of cores you want to have for each processor The minimum is 1...

Страница 247: ...escription Target Path Specify the path of the local folder or network share on which to create the virtual machine NOTE If you specified a network share path you will need to enter a valid logon cred...

Страница 248: ...imum allowed by the application is 65536 MB The maximum amount of memory usage is limited by the amount of RAM available to the host machine Number of processors The number of processors CPUs you want...

Страница 249: ...h this machine User name Enter the user name for the user with administrative privileges for the workstation with the Hyper V server It is used to specify the logon credentials for the virtual machine...

Страница 250: ...orted VM 18 On the Volumes page select the volume s to export for example C NOTE If the selected volumes are larger than the appropriate maximum allocations supported by the application as indicated b...

Страница 251: ...nter the user name for the user with administrative privileges for the workstation with the Hyper V server It is used to specify the logon credentials for the virtual machine Password Enter the passwo...

Страница 252: ...o larger than 64 TB For VHD disk format your selected volumes should be no larger than 2040 GB 15 Select Perform initial one time export to perform the virtual export immediately instead of after the...

Страница 253: ...ecify a user account for the virtual machine select Specify the user account for the exported virtual machine and then enter the following information This refers to a specific user account for which...

Страница 254: ...n the Virtual Machine Options page select Remote Linux Machine 8 Enter information about the virtual machine as described in the following table Table 112 Remote Linux machine settings Option Descript...

Страница 255: ...parameters for each virtual export appear as a row on the Virtual Standby page From here you can view the status of exports that you currently have set up and manage your virtual standby machines You...

Страница 256: ...xported Export Type The type of virtual machine platform for the export such as ESXi VMware Hyper V or VirtualBox Last Export The date and time of the last export If an export has just been added but...

Страница 257: ...forced snapshot 3 To remove an export from the system select the export and then click Remove The export configuration is permanently removed from the system Removing the virtual standby configuration...

Страница 258: ...s described in the following table and then click Next Table 115 Virtual machine parameters Options Description Host name Enter a name for the host machine Port Enter the port for the host machine The...

Страница 259: ...ins only 2 GB of used space Rapid Recovery creates a virtual disk of 2 GB Thick Thick provisioning creates a new disk or volume that is the same size as the original volume from the protected server e...

Страница 260: ...e export 5 Click Next 6 On the Destination page of the Export Wizard in the Recover to a Virtual Machine drop down menu select ESXi 7 Enter the information for accessing the virtual machine as describ...

Страница 261: ...eates a new disk or volume that is the same size as the original volume from the protected server even if only a portion of the original volume is being used For example if the volume is 1 TB large bu...

Страница 262: ...use for the export 7 Click Next 8 On the Destination page in the Export Wizard in the Recover to Virtual machine drop down menu select VirtualBox and then click Next 9 On the Virtual Machine Options p...

Страница 263: ...complete the wizard and to start the export NOTE You can monitor the status and progress of the export by viewing the Virtual Standby or Events tab Parent topic Performing a continual Virtual Standby...

Страница 264: ...ting up the export You will also need to manually attach or load the virtual machine after the export User Name User name of the account on the target machine for example root Password Password for th...

Страница 265: ...Points page select the recovery point that you want to use for the export 7 Click Next 8 On the Destination page in the Export Wizard in the Recover to Virtual machine drop down menu select VMware Wo...

Страница 266: ...VMware Workstation 12 0 Amount of RAM MB Specify the memory usage for the virtual machine by clicking one of the following Use the same amount of RAM as source machine Use a specific amount of RAM an...

Страница 267: ...hine Export Wizard in the Recover to a Virtual Machine drop down menu select VMware Workstation and then click Next 7 On the Virtual Machine Options page enter the parameters for accessing the virtual...

Страница 268: ...is 65536 MB The maximum amount of memory usage is limited by the amount of RAM available to the host machine Number of processors The number of processors CPUs you want for the exported virtual machin...

Страница 269: ...have enough RAM allocated to perform the export Complete the steps in the following procedures for the appropriate type of export Parent topic Performing a one time Hyper V export Complete the steps i...

Страница 270: ...the Hyper V server Non existent directories are automatically created You should not attempt to create them manually Export to shared folders for example to data share is not permitted 13 In the Virtu...

Страница 271: ...down menu and then select VM Export 1 In the Virtual Machine Export Wizard select Continuous Virtual Standby 2 Click Next From the Core Console in the icon bar click Virtual Standby On the Virtual Sta...

Страница 272: ...amount of RAM Select this option if you want to specify the amount of RAM in MB The minimum amount is 1024 MB and the maximum allowed by the application is 65536 MB The maximum amount of memory usage...

Страница 273: ...iod To keep recovery points that would otherwise be combined and eventually deleted you can create an archive from the Core Console An archive is a file containing the full set of recovery points for...

Страница 274: ...Configuring Core default retention policy settings The retention policy for the Core specifies how long the recovery points for a protected machine are stored in the repository The Core retention poli...

Страница 275: ...s or Years and then keep one recovery point per hour for n retention time period Provides a more granular level of retention It is used as a building block with the primary setting to further define h...

Страница 276: ...d machine see Customizing retention policy settings for a protected machine Parent topic Customizing retention policy settings for a protected machine The retention policy for a protected machine spec...

Страница 277: ...overy points Enter a number to represent the retention period and then select the time period The default is 3 days You can choose from Days Weeks Months and Years and then keep one recovery point per...

Страница 278: ...following a Select the Relocate outdated recovery points to an R3 repository option b Specify the age at which you want to relocate recovery points from your primary repository to the R3 repository Y...

Страница 279: ...ite that is a self managed target Core Or you can configure outbound replication to a third party managed service provider MSP or cloud provider that hosts off site backup and disaster recovery servic...

Страница 280: ...urce Core to a single target Core Figure 9 Point to point replication configuration Multipoint to point replication Replicates protected machines from multiple source Cores to a single target Core Fig...

Страница 281: ...ery 281 Figure 11 Point to multipoint replication configuration Multi hop replication Replicates one or more protected machines from one target Core to another target Core producing additional failove...

Страница 282: ...ch volume you choose to protect as well as all data on those volumes Successive backups are incremental snapshots which consist only of data changed on the protected volumes since the last backup The...

Страница 283: ...a create a seed drive from the source Core and then consume the seed drive on the target Core You can also customize the replication schedule for a protected machine For example if you use the default...

Страница 284: ...s to you you do not need to seed data In such cases replication can be completed entirely from the source Core If you set up replication for a Core with existing recovery points and may need to restor...

Страница 285: ...f a seed drive This process seeds the target Core with base images and recovery points from the selected servers protected on the source Core The seeding process can be performed at any time Seeding c...

Страница 286: ...Rapid Recovery transfers such as backups and any other critical applications you must run If you experience issues successfully transferring data over the network especially for certain protected or...

Страница 287: ...ed recovery point data For more information see Determining your seeding needs and strategy Complete the steps in the following procedure to configure your source Core to replicate to a self managed t...

Страница 288: ...vice a On the Protected Machines page of the Replication Wizard select Use a seed drive to perform the initial transfer If you currently have one or more protected machines replicating to a target Cor...

Страница 289: ...scribed in the following table Table 130 Seed drive options Enter the details as described in the table Item Description Maximum Size Large archives of data can be divided into multiple segments Selec...

Страница 290: ...he amount of time and space required for creating the seed drive Opting to build recovery point RP chains to the seed drive requires enough space on the seed drive to store the latest recovery points...

Страница 291: ...ed circles in the Status column show whether a replicated machine is online or unreachable If you hover the cursor over the colored circle the status condition is displayed Status conditions include g...

Страница 292: ...a list of actions to perform to affect the specific replication relationship Information about incoming replication from another Core is described in the following table Table 133 Information about i...

Страница 293: ...g Replication grid To perform actions on multiple source Cores select the checkbox for each Core in the grid and then from the menu above the grid select the action you want to perform You can perform...

Страница 294: ...as needed For more information on monitoring replication see Viewing incoming and outgoing replication Manage replication settings as needed For more information on managing replication settings see M...

Страница 295: ...1 Select Use an existing target core 2 Select the target core from the drop down list 3 Click Next 4 Skip to Step 7 4 Click Next 5 On the Request page of the Replication Wizard enter the information...

Страница 296: ...chive Output location Enter the location for the output It is used to define the location path where you want the archive to reside for example servername sharename User Name Enter a user name It is u...

Страница 297: ...not overwrite or clear any existing seed data from the location If the location is not empty the seed drive write will fail Replace this Core Overwrites any pre existing seed data pertaining to this...

Страница 298: ...approve a replication request on a third party target core 1 On the target Core navigate to the Rapid Recovery Core Console 2 From the icon bar click Replication The Replication page appears 3 On the...

Страница 299: ...stomer This option could be used if a request was sent by mistake or if you want to deny a request without reviewing it For more information about replication requests see Reviewing a replication requ...

Страница 300: ...ly have one or more protected machines replicating to a target Core you can include these machines on the seed drive by selecting the option Include already replicated recovery points in the seed driv...

Страница 301: ...reserve for creating the seed drive by doing one of the following Select Entire Target to reserve all available space in the path provided on the Seed Drive Location page for example if the location...

Страница 302: ...Drive go to Step 5 h On the Protected Machines page of the wizard select the protected machines you want to replicate to the target Core using the seed drive 5 Click Finish Parent topic Consuming the...

Страница 303: ...Container Select a container associated with your account from the drop down menu Cloud Folder Name Enter the name of the folder in which the archived data is saved for example Rapid Recovery Archive...

Страница 304: ...Abandoning the seed drive in the Core Console does not affect the seed drive file from its storage location 1 On the source Core open the Rapid Recovery Core Console and from the icon bar click Repli...

Страница 305: ...a replication schedule for any replicated machine 1 On the target Core open the Rapid Recovery Core Console and from the icon bar click Replication The Replication page appears 2 In the Outgoing Repl...

Страница 306: ...In the menu under the Outgoing Replication pane click Copy The Replication Wizard appears 5 On the Seed Drive Location page of the wizard use the Location drop down list to select from the following...

Страница 307: ...erve for creating the seed drive by doing one of the following Select Entire Target to reserve all available space in the path provided on the Seed Drive Location page for example if the location is D...

Страница 308: ...all Agents to Seed Drive go to Step 10 10 On the Protected Machines page of the wizard select the protected machines for which you want to create a seed drive 11 Click Finish Parent topic Monitoring r...

Страница 309: ...t the host and port for the target Core Schedule Lets you set a customized schedule for replication to this target Core Add Machines Lets you select a host from a drop down list select protected machi...

Страница 310: ...e following procedure to pause or resume replication 1 Open the Rapid Recovery Core Console and from the icon bar click Replication The Replication page appears 2 To pause replication for all replicat...

Страница 311: ...he Outgoing Replication pane select a Core and from the menu at the top of the summary table click Force To force replication on a target Core from the Incoming Replication pane select a Core and from...

Страница 312: ...to confirm this action 4 When satisfied click Save to save the replication settings and close the dialog box Parent topic Changing target Core settings You can change the host and port settings for in...

Страница 313: ...On the source Core open the Rapid Recovery Core Console and from the icon bar click Replication The Replication page appears 2 In the Outgoing Replication pane click the arrow to the right of any sour...

Страница 314: ...the protected machines you want to remove from outgoing replication as follows To completely remove the existing replication relationship between this source Core and any target Core click the Settin...

Страница 315: ...eceived from that machine as well as remove the source core from replication select Delete existing recovery points 4 Click Yes to confirm deletion WARNING If you select this option all of the recover...

Страница 316: ...continuous export to virtual machines Parent topic Snapshots and recovery points This section describes how to use and manage the snapshots and recovery points generated by Rapid Recovery It includes...

Страница 317: ...pane and a Recovery Points pane You can view summary information about the recovery points for the machine as described in the following table Table 147 Recovery point summary information Info Descrip...

Страница 318: ...is captured for a protected SQL or Exchange server the application displays a corresponding color status indicator in the Recovery Points grid This grid appears in the Recovery Points pane when viewi...

Страница 319: ...where both an Exchange and SQL database exists for the recovery point the most severe status indicator displays for the recovery point Parent topic Mounting a recovery point In Rapid Recovery you can...

Страница 320: ...another Windows machine you can use Windows Explorer to copy them with default permissions or original file access permissions For details see Restoring a directory or file using Windows Explorer to R...

Страница 321: ...y points click the checkbox in the first column of each row representing the mount point you want to disconnect b Click Disconnect A confirmation dialog box appears c Click to confirm that you want to...

Страница 322: ...he end to identify the recovery point For example 7d658e5f fa08 4600 95f0 5f486bc1b6a4 de0896fd 571a 4cc5 aeed 264d2c3c72f4 f377e145 dd4d 3ac3 5b15 37ce8f4913ba 2 8 Enter the following command to sele...

Страница 323: ...d of the line item number A list of the base and incremental recovery points for the machine will display and includes The list includes the line item number date and timestamp location of volume size...

Страница 324: ...the base image which is all data on the machine as well as all recovery points after the current until the next base image NOTE You cannot recover the recovery points you have deleted If you need the...

Страница 325: ...points of a protected machine from a repository without deleting them you can migrate them to a different repository manually by using this procedure This process involves archiving recovery points f...

Страница 326: ...ormation see Pausing and resuming protection 8 Take a new base image for each of the protected machines you moved For more information see Forcing a snapshot and use the Force Base Image option 9 Impo...

Страница 327: ...Operating System instantly making that data available on demand For example if the database volume of Microsoft Exchange is corrupt Live Recovery can restore the volume database and Exchange services...

Страница 328: ...dows 8 Windows 8 1 Windows 10 Windows Server 2012 and Windows Server 2012 R2 for normal transfers both base and incremental as well as with restoring data bare metal restore and virtual exports For mo...

Страница 329: ...can filter by volumes if defined or by creation date of the recovery point 4 Click any recovery point to select it and then click Next The Destination page appears 5 On the Destination page choose th...

Страница 330: ...h information from the selected recovery point using the Restore Machine Wizard click Next and proceed to Performing a bare metal restore for Windows machines If you have already created the boot CD t...

Страница 331: ...or Linux machines or VMs using agentless protection If you want to force the selected volumes to dismount before the restore begins select Force Dismount CAUTION If you do not force a dismount before...

Страница 332: ...ility 1 Mount the recovery point that contains the data you want to restore For details see Mounting a recovery point 2 In Windows Explorer navigate to the mounted recovery point and select the direct...

Страница 333: ...would for a currently protected machine by mounting a recovery point locating the item that you want to recover and using Windows Explorer to copy and paste the item to your destination There are adv...

Страница 334: ...al machine If you are performing a restore to a system volume this is considered a BMR If you are performing a restore and require a boot CD this is also considered a BMR Other circumstances in which...

Страница 335: ...communicate with backups on the Core See Understanding boot CD creation for Windows machines If you require physical media to start up the destination machine you need to transfer the boot CD ISO ima...

Страница 336: ...ry points of the protected server you want to restore Hardware to restore new or old similar or dissimilar The target machine must meet the installation requirements for an agent for details see the D...

Страница 337: ...t of the process for performing a BMR using that wizard You can also manage a boot image from the Create Boot CD dialog box For information on managing a boot CD image outside of the Restore Machine W...

Страница 338: ...ple F filename iso NOTE The file extension must be iso When specifying the path use only alphanumeric characters the hyphen the backslash only as a path delimiter and the period only to separate host...

Страница 339: ...through the filing system to locate the compressed driver file select the file and then click Open e Repeat Step c and Step d as appropriate until you inject all necessary drivers For more informatio...

Страница 340: ...restore Optionally if you do not wish to restore a listed volume clear the option NOTE At least one volume must be selected to perform the restore 18 Click Finish CAUTION All existing partitions and...

Страница 341: ...ng the boot CD If you discover the boot CD you created does not contain the drivers necessary to complete the restore you can also load drivers on to the target machine using the URC Fore more informa...

Страница 342: ...load UltraVNC version 1 0 9 1 or later for x64 architecture Install it and save the winvnc exe file to C Program Files AppRecovery Core BootCdKit UltraVnc_x64 6 If you plan to restore to dissimilar ha...

Страница 343: ...loading additional drivers you must first load an Ethernet controller and network adapter For more information see Loading drivers using the Universal Recovery Console NOTE If you created the boot CD...

Страница 344: ...a bare metal restore for Windows machines Parent topic About the Universal Recovery Console tools The Universal Recovery Console URC includes access to tools that may assist you with completing a bar...

Страница 345: ...wing tasks are prerequisites for this procedure Creating a boot CD ISO image Transferring the boot CD ISO image to media Loading the boot CD and starting the target machine Complete the following proc...

Страница 346: ...s list shows the drivers that are necessary for the hardware but are not included in the boot CD 7 Right click a device from the list and then click Load Driver 8 In the Select driver load mode window...

Страница 347: ...can identify each other properly on the network then the volumes for the selected recovery point are loaded and the Disk Mapping page appears In this case your next step is to map volumes 8 Proceed to...

Страница 348: ...e the steps in the following procedure to automatically select the volumes you want to recover and where to restore them 1 On the Disk Mapping page of the Restore Machine Wizard next to Volume mapping...

Страница 349: ...ent topic Performing a BMR from an archive Rapid Recovery lets you restore a machine from bare metal using an archived recovery point The following tasks are prerequisites for this procedure Creating...

Страница 350: ...rop down list select a container 3 For the Cloud path from the drop down list select the path to the archive For Amazon S3 complete the following steps 1 Enter the following credentials Access key Sec...

Страница 351: ...see DiskPart Command Line Options Standard 7 SP1 on the Microsoft Developer Network NOTE If no volumes exist on the drive of the machine on which you are performing a bare metal restore BMR you cannot...

Страница 352: ...e through the filing system to locate the compressed driver file and then select the file 5 Click OK The URC loads the driver into the operating system you selected 6 Repeat Step 3 through Step 5 for...

Страница 353: ...ss to perform a BMR from the command line See Launching a bare metal restore for a Linux machine using the command line If you are using auto partitioning for BMR within the Core Console you do not ne...

Страница 354: ...drive to create destination partitions on the target machine to contain the source volumes Any destination partition should be at least as large as the original source partition Restore path Identify...

Страница 355: ...click Download 4 Save the Live DVD ISO image If you are restoring a virtual machine you can save it to a network location and set the VM to start up from a CD or DVD drive associated with the ISO ima...

Страница 356: ...ns to meet this requirement You can launch the restore from the command line using the aamount utility or you can launch the restore from the Rapid Recovery Core Console If restoring using the user in...

Страница 357: ...r the boot partition to make the partition bootable type the following command and then press Enter a 10 To assign a bootable flag for the appropriate partition type the number of the partition and th...

Страница 358: ...Performing a bare metal restore for Linux machines It is part of the process for Managing Linux partitions Complete the steps in this procedure to mount partitions on the Linux machine before performi...

Страница 359: ...local_mount utility then you must first set appropriate privileges mount volumes execute local_mount obtain information about the Core from the list of machines connect to the core obtain a list of r...

Страница 360: ...virtual BMR target machine 1 To run the Rapid Recovery local_mount utility as root type the following command and then press Enter sudo local_mount 2 To list the protected machines type the following...

Страница 361: ...ist of volumes within the recovery point followed by the path For example r machine_line_item_number base_image_recovery_point_line_number volume_letter path For example type r 1 24 a dev sda1 In this...

Страница 362: ...the specified path The path for the restore is the path for the device file descriptor not the directory to which it is mounted You can also specify a line number in the command instead of the recover...

Страница 363: ...ore information about monitoring Rapid Recovery events see Viewing tasks alerts and events Parent topic Starting a restored target server Complete the steps in this procedure to start the restored tar...

Страница 364: ...g system to operate all devices on your target server successfully For more information see Loading drivers using the Universal Recovery Console Complete the following procedure to repair startup prob...

Страница 365: ...g systems You can perform this procedure using the version that comes with your Linux distribution If a version of GRUB is not installed you will have to re install the default version appropriate for...

Страница 366: ...the old UUID of the partition or partitions from the mounted recovery points etc mtab file and compare it to the UUIDs for the root for Ubuntu and CentOS boot for CentOS and RHEL and data partitions b...

Страница 367: ...t can specify details for one or more Cores By default this set of information includes jobs for all machines every protected machine replicated machine and recovery point only machine in the specifie...

Страница 368: ...select or exclude jobs that are machine independent in which case the report shows status for Core jobs only This report is not available from the perspective of any single protected machine This job...

Страница 369: ...es apply All reports can be generated from the perspective of the Core Additionally two job types the Job report and the Failure report can be generated from the perspective of a protected machine For...

Страница 370: ...o the time you generate the report Last 365 days Reports activity for the last year relative to the time you generate the report All Time This time period spans the lifetime of the Core Custom This ti...

Страница 371: ...tected but still have recovery points saved in the repository Source cores If your Core is a target Core and replicates recovery points for any machines protected on a source Core then the name of tha...

Страница 372: ...ne Complete the steps in the following procedure to generate a report for a protected machine 1 Navigate to the Rapid Recovery Core Console 2 From the Protected Machines menu click the protected machi...

Страница 373: ...lear that type You can select some or all jobs from either category 6 Click Preview to generate the report with the specified criteria If the report criteria you selected is not found the report still...

Страница 374: ...Navigate to the Rapid Recovery Core Console 2 From the icon bar click More and then select Reports The Job Report page appears A downward facing arrow appears to the right of the current report name 3...

Страница 375: ...ou can customize the report Use the filters to select or exclude some machines You can also select or exclude jobs that are machine independent in which case the report shows status for Core jobs only...

Страница 376: ...Folder Name field specify a folder into which to store future generated reports 7 When satisfied with your Destination options click Next 8 On the Schedule page of the wizard from the Send data menu s...

Страница 377: ...ave the generated report Finally you can also change the schedule of the report Complete the steps in this procedure to modify parameters for a scheduled report 1 Navigate to the Rapid Recovery Core C...

Страница 378: ...duled reports click Delete Deleting a scheduled report only prevents the generation of future reports If previous scheduled reports have been saved they are not removed Parent topic Using the Reports...

Страница 379: ...re display options To the right of the toolbar the Tools option expands a drop down menu providing report navigation controls The elements of the Reports toolbar are described in the following table T...

Страница 380: ...re described below Tools Go to first page Navigates you to the first page of the generated report Tools Go to last page Navigates you to the last page of the generated report Tools Rotate clockwise Th...

Страница 381: ...e appropriate core protected machine and job type each row includes A summary of the job The job status Any errors related to the job The start and end dates for the job The job duration in seconds Th...

Страница 382: ...re no errors within the date range specified in your report criteria NOTE Results for target Cores and protected machines parameters appear for the Core level report only For information on how to gen...

Страница 383: ...The chart shows protected machines by the ratio of successful jobs of any type compared to failed jobs Canceled jobs are not considered for these statistics The X or horizontal axis shows the number o...

Страница 384: ...012 R2 operating systems must have the ASP NET 4 5 feature installed on the server for proper loading of the GUI This configuration is included for you as part of the Rapid Recovery installer For more...

Страница 385: ...the navigation area collapses To expand the navigation area click the right arrow Links menu Contact Dell Support Links to the Dell Support website in a new browser window providing access to Live Cha...

Страница 386: ...Configuring the Rapid Recovery Central Management Console involves adding Cores and Core groups establishing their settings and specifying access settings for groups if required Once you complete the...

Страница 387: ...the IP address for accessing the Core If the Core you are adding is the current server you can use localhost Port Enter a port number for the connection The default value is 8006 User name Enter a use...

Страница 388: ...u choose to specify the connection through the use of a host name or IP address you must enter the appropriate information in the hostname or IP address field On what port is Core name listening Selec...

Страница 389: ...first For more information see Adding a Core group to the Central Management Console Complete the steps in the following procedure to configure core group settings 1 From the Rapid Recovery Central Ma...

Страница 390: ...f you want to provide access to an individual then in the Name text field enter the name of the individual and then click User This is the default option For example type Administrator or if the machi...

Страница 391: ...u want to include in the report 3 From the report type drop down menu select the type of report you want to generate You can choose from one of the following options Job Report Failure Report Summary...

Страница 392: ...Core 5 Do one of the following Click Preview to generate and view the generated report online Update the report dynamically by changing report criteria then click Preview again Choose an export format...

Страница 393: ...ng area contains buttons accessible from anywhere in the Core Console These buttons launch wizards to accomplish common tasks such as protecting a machine performing a restore from a recovery point cr...

Страница 394: ...er interface below the icon bar The left navigation area contains the text filter and the Protected Machines menu If you have added replication to this Core then this area contains a Replicated Machin...

Страница 395: ...are to one or more machines simultaneously This function uses the Deploy Agent Software Wizard Button bar Restore button and menu The Restore button opens the Restore Machine Wizard to allow you to re...

Страница 396: ...ication begin immediately Additionally you can specify whether a seed drive will be used to copy data for existing recovery points to the target Core Icon bar Details about the icon bar appear in the...

Страница 397: ...ettings SNMP settings and vSphere settings Icon bar More icon More Click the More icon to access other important features Each has its own icon listed below Icon bar More icon System Info System Info...

Страница 398: ...sitories Repositories Lets you view and manage repositories associated with your Core Icon bar More icon Encryption Keys Encryption Keys Lets you view manage import or add encryption keys that you can...

Страница 399: ...igation area UI Element Description Protected Machines menu The Protected Machines menu appears as the first menu in the left navigation area if one or more machines is protected in your Core If you c...

Страница 400: ...upper case letters You can perform actions for like items in a custom group by clicking the arrow to the right of the custom group title For example you can force a snapshot for every protected machin...

Страница 401: ...e Viewing the Protected Machines menu Replicated Machines menu If replicating machines from another Rapid Recovery Core the name of that Core appears as a separate menu under the Protected Machines me...

Страница 402: ...rm actions for like items in the group If you click the Custom Groups menu the Machines page appears showing a pane for each of the Rapid Recovery objects that appear in your group protected machines...

Страница 403: ...ion red authentication error and gray offline or unreachable Encryption status The lock icon indicates encryption status for the selected protected machine An open lock indicates no encryption a close...

Страница 404: ...ing a snapshot One time Export Launches the Virtual Machine Export Wizard This Wizard let you perform a one time export of recovery point data from a protected machine to a virtual machine in any supp...

Страница 405: ...r resume replication You can also copy existing recovery points to a seed drive For more information see Managing replication settings Cancel Lets you cancel all currently active operations for the se...

Страница 406: ...r the selected agent machine For more information see Managing snapshots and recovery points Restore Launches the Restore Machine Wizard This process lets you restore data from recovery point on the C...

Страница 407: ...ting for another job to complete before it can initiate Waiting A job waiting for your approval or completion such as a seed drive For more information about seed drives see Replication Complete A job...

Страница 408: ...Shows the date and time when the task completed Job Details Available for tasks only Opens the Monitor Active Task dialog box so you can view details of the specific job or task These details include...

Страница 409: ...licy Lets you specify a retention policy for the selected machine You can choose to use the Core s default policy or you can differentiate the retention policy for this machine only For more informati...

Страница 410: ...a to the repository managed by the Core The Rapid Recovery PowerShell Module is a Windows utility that lets users interact with the Core server by using Windows PowerShell scripts This module offers s...

Страница 411: ...timeActivationPolicy true supportedRuntime version v4 0 30319 supportedRuntime version v2 0 50727 startup configuration Parent topic Launching PowerShell and importing the module Unlike other system m...

Страница 412: ...ny time by using the Get Help command_name cmdlet For example to get information about the virtual machine export cmdlet enter the following cmdlet and then press Enter Get Help Start VMExport The obj...

Страница 413: ...Clusters Retrieve a collection of protected clusters Get CompletedJobs Retrieve a collection of completed jobs Get ExchangeMailStores Retrieve a collection of Exchange mail stores Get Failed Get infor...

Страница 414: ...achine New Mount Mount recovery points New Replication Set up and force replication New Repository Create new DVM repository New ScheduledArchive Schedule a new recurring archive New Snapshot Force sn...

Страница 415: ...check for protected Exchange mail stores Start EsxiExport Force export to an ESXi server Start HypervExport Force export to a Hyper V server Start LogTruncation Force log truncation Start Mountability...

Страница 416: ...e for the command is as follows Edit EsxiVirtualStandby HostName String HostPort String HostUserName String HostP Command Options The following table describes the options available for the Edit EsxiV...

Страница 417: ...tore bootcdbuilder create boot CDs diagnostics upload logs exchange Exchange Server files check export recovery point export pushinstall deploy agents rollback restoring from a recovery point rollup r...

Страница 418: ...ou specify a password you also have to provide a log on If none are provided then the logged on user s credentials will be used protectedserver Show jobs for a specific protected machine indicated by...

Страница 419: ...l Parent topic Edit ScheduledArchive The Edit ScheduledArchive command lets you use PowerShell to make changes to an existing scheduled archive Usage The usage for the command is as follows Edit Sched...

Страница 420: ...00 for local and network locations and should not be greater than 150 for a cloud location cloudaccountname Optional Use only for cloud archiving The name of the cloud account where you want to save t...

Страница 421: ...te the archive for example Monday dayofmonth Use only for the month option of the scheduletype parameter The day number of the month on which to automatically create the archive for example 15 time Th...

Страница 422: ...ed protectedserver Show jobs for a specific protected machine indicated by IP address all Show all jobs including those performed by the Core and all protected servers number Optional Determine how ma...

Страница 423: ...lStandby TargetPath String PathUserName String PathPassword String tring Volumes String VMName String UseSourceRam Ram String User Strin Password String Verbose Debug ErrorAction ActionPreference Warn...

Страница 424: ...and restore bootcdbuilder create boot CDs diagnostics upload logs exchange Exchange Server files check export recovery point export pushinstall deploy agents rollback restoring from a recovery point r...

Страница 425: ...d to the remote Core host machine If you specify a password you also have to provide a log on If none are provided then the logged on user s credentials will be used protectedserver Show jobs for a sp...

Страница 426: ...ll active jobs on the local Core Get activejobs all Parent topic Get Clusters The Get Clusters command returns information about server clusters protected in the Core Usage The usage for the command i...

Страница 427: ...all f number l number number jobtyp Command Options The following table describes the options available for the Get CompletedJobs command Table 192 Get CompletedJobs command options Option Descriptio...

Страница 428: ...ploy agents rollback restoring from a recovery point rollup recovery point rollups sqlattach agent attachability checks and mount mount repository By default all jobs of the specified type are returne...

Страница 429: ...hen the logged on user s credentials will be used password Optional Password to the remote Core host machine If you specify a password you also have to provide a log on If none are provided then the l...

Страница 430: ...be used protectedserver Show jobs for a specific protected machine indicated by IP address number Optional Determine how many records to display available values are all display all jobs l number or...

Страница 431: ...ding those performed by the Core and all protected servers number Optional Determine how many records to display available values are all display all jobs l number or number fetches most recent jobs s...

Страница 432: ...d is as follows Get Mounts core host name user user name password password protectedserver server name Command Options The following table describes the options available for the Get Mounts command Ta...

Страница 433: ...s available for the Get Passed command Table 197 Get Passed command options Option Description Display this help message core Optional Remote Core host machine IP address with an optional port number...

Страница 434: ...nstalled on the local machine user Optional User name for the remote Core host machine If you specify a user name you also have to provide a password If none are provided then the logged on user s cre...

Страница 435: ...remote Core host machine If you specify a password you also have to provide a log on If none are provided then the logged on user s credentials will be used protectedserver Show jobs for a specific p...

Страница 436: ...isplay available values are all display all jobs l number or number fetches most recent jobs sorted by execution and time f number displays first recovery jobs sorted by execution and time By default...

Страница 437: ...bes the options available for the Get RecoveryPoints command Table 201 Get RecoveryPoints command options Option Description Display this help message core Optional Remote Core host machine IP address...

Страница 438: ...eplicated server If used in an MSP environment from the target Core this can potentially expose the login password of the administrator user For environments with encrypted repository data this does n...

Страница 439: ...machine IP address with an optional port number By default the connection is made to the Core installed on the local machine user Optional User name for the remote Core host machine If you specify a u...

Страница 440: ...provide a password If none are provided then the logged on user s credentials will be used password Optional Password to the remote Core host machine If you specify a password you also have to provide...

Страница 441: ...r s credentials will be used protectedserver Show jobs for a specific protected machine indicated by IP address Example Lists all SQL databases jobs on the local Core Get SqlDatabases protectedserver...

Страница 442: ...on the specified agent machine Get UnprotectedVolumes protectedserver 10 10 10 10 Parent topic Get VirtualizedServers The Get VirtualizedServers command returns information about virtualized servers U...

Страница 443: ...ss Command Options The following table describes the options available for the Get Volumes command Table 208 Get Volumes command options Option Description Display this help message core Optional Remo...

Страница 444: ...following table describes the options available for the New Base command Table 209 New Base command options Option Description Display this help message all Base image for all agents core Optional Re...

Страница 445: ...l port number By default the connection is made to the Core installed on the local machine user Optional User name for the remote Core host machine If you specify a user name you also have to provide...

Страница 446: ...of an OpenStack cloud account This option is required only for OpenStack cloud accounts Example Create a new Amazon S3 cloud account named Amazon S3 Account with the access key akey and the secret ke...

Страница 447: ...al The description of the encryption key Example Create an encryption key on the local Core New EncryptionKey name EncryptionKey1 passphrase 123456 Parent topic New EsxiVirtualStandby The New EsxiVirt...

Страница 448: ...example c d NOTE Do not use trailing slashes in volume names vmname The Microsoft Windows name of the virtual machine hostname The name of the virtual server host hostport The port number to use for c...

Страница 449: ...he command is as follows New HyperVVirtualStandby core host name user login password password protectedserver na volumes volumes names vmname virtual machine name gen2 useVhdx uselocalmachine st name...

Страница 450: ...to use the second VM generation If not specified generation 1 is used Rapid Recovery supports generation 2 from Windows Server 2012 R2 through Windows 8 1 usevhdx Optional If you specify this option...

Страница 451: ...Mount The New Mount command mounts a snapshot of one or more drives Usage The usage for the command is as follows New Mount core host name user user name password password protectedserver machine name...

Страница 452: ...quotes If not specified all volumes will be mounted drivers Optional Comma separated list of volume names to mount If not specified all volumes will be mounted NOTE This option is obsolete use volume...

Страница 453: ...f you specify a user name you also have to provide a password If none are provided then the logged on user s credentials will be used password Optional Password to the remote Core host machine If you...

Страница 454: ...ogged on user s credentials will be used name Repository name size Size of repository extent Available units are b Kb MB GB TB PB datapath For local location only Determines data path of repository ex...

Страница 455: ...the Core installed on the local machine user Optional User name for the remote Core host machine If you specify a user name you also have to provide a password If none are provided then the logged on...

Страница 456: ...ified by using one of the following four values replacethiscore Overwrites any pre existing archived data pertaining to this Core but leaves the data for other Cores intact erasecompletely Clears all...

Страница 457: ...w archive New ScheduledArchive core 10 10 10 10 user administrator password 23WE sdd protectedserver Create an incremental archive for all recovery points with creation dates starting from 04 30 2012...

Страница 458: ...apshot for all protected machines New Snapshot all Parent topic New VBVirtualStandby The New VBVirtualStandby command lets you use PowerShell to create a new virtual export to a VirtualBox virtual mac...

Страница 459: ...virtual server that the source protected machine has linuxhostname The Linux VirtualBox server host name hostport The Linux VirtualBox server port targetpath The local network or Linux path to the fo...

Страница 460: ...ibes the options available for the New VMVirtualStandby command Table 220 New VMVirtualStandby command options Option Description Display this help message core Optional Remote Core host machine IP ad...

Страница 461: ...ptional Specify this option if you need to start an initial on demand virtual machine export after configuring the virtual standby Example Create a new VMware Workstation virtual standby New VMVirtual...

Страница 462: ...n user Optional Login for the remote Core host machine If you specify a login you also have to provide a password If none are provided then the logged on user s credentials will be used Example Push r...

Страница 463: ...le Push rollup for a single protected machine Push Rollup core 10 10 10 10 8006 user administrator password 23WE sdd protectedserver 10 1 Push rollup for all protected machines Push Rollup all Parent...

Страница 464: ...0 10 10 10 8006 user administrator password 23WE sdd deleterecoverypoint Parent topic Remove Mount The Remove Mount command dismounts a mounted recovery point specified by the Path Dismount points for...

Страница 465: ...r password 23WE sdd path C mountedReco Parent topic Remove Mounts The Remove Mounts command dismounts all mounted recovery points Usage The usage for the command is as follows Remove Mounts core host...

Страница 466: ...e RecoveryPoints command options Option Description Display this help message core Optional Remote Core host machine IP address with an optional port number By default the connection is made to the Co...

Страница 467: ...uential incrementals or a sequential set of orphaned points to delete selected by recovery point number or time of recovery point creation all Optional Delete all protected machines from the Core Exam...

Страница 468: ...Remove repository all Parent topic Remove ScheduledArchive If you scheduled Rapid Recovery to regularly archive recovery points for a specific machine you can use the Remove ScheduledArchive PowerShe...

Страница 469: ...lStandby If you scheduled Rapid Recovery to continuously export data to a virtual machine then you can use the Remove VirtualStandby PowerShell command to cancel and delete this scheduled job Usage Th...

Страница 470: ...command is as follows Resume Replication core host name user user name password password all protectedserve Command Options The following table describes the options available for the Resume Replicat...

Страница 471: ...from the list above or type exit to exit Script pauses requiring user to specify an index number for the appropriate repository Enter the index number for the script to complete in this case 2 Example...

Страница 472: ...10 10 4 Parent topic Resume VirtualStandby The Resume VirtualStandby PowerShell command lets you resume the suspended export of data to a Rapid Recovery virtual standby machine Usage The usage for the...

Страница 473: ...nes See Suspend VMExport for more details Usage The usage for the command is as follows Resume VMExport core host name user user name password password all protectedserver Command Options The followin...

Страница 474: ...Archive path startdate enddate all protectedserver machine name or IP core h Command Options The following table describes the options available for the Start Archive command Table 234 Start Archive c...

Страница 475: ...2012 all Parent topic Start AttachabilityCheck The Start AttachabilityCheck command forces an attachability check for all SQL Server databases protected by the Core Usage The usage for the command is...

Страница 476: ...used for the attachability check time Optional Determines recovery point to be selected for SQL attachability check You need to specify exact time in the format MM DD YYYY hh mm tt for example 04 24...

Страница 477: ...obtain the numbers You can specify several space separated numbers to delete multiple recovery points with a single command time Optional Select the recovery point to check by its creation time inste...

Страница 478: ...e provided then the logged on user s credentials will be used protectedserver Protected machine with recovery points to be exported volumes Optional List of volume names to be exported If not specifie...

Страница 479: ...on the original drive plus some extra space in megabytes By default thin provisioning is selected diskmapping Optional Select either auto manual or withvm By default auto mapping is enabled resetup O...

Страница 480: ...rver Protected machine with recovery points to be exported volumes Optional List of volume names to be exported If not specified all volumes in the specified recovery points will be exported Values mu...

Страница 481: ...mber hostusername The user name to the virtual server host hostpassword The password to the virtual server host vmlocation Local or network path to the folder where you want to store the virtual machi...

Страница 482: ...og truncation either sql or exchange If not specified logs are truncated on all databases Example Truncate SQL logs Start LogTruncation protectedserver SQL1 target sql Truncate Exchange server logs al...

Страница 483: ...or rpn option is specified in this command than the most recent recovery point will be exported time Optional Determines recovery point to be selected for export You need to specify exact time in the...

Страница 484: ...be used repository Name of a repository on the Core where the protected machine s data is stored agentname Protected machine name or IP address agentusername Log on to the server to be protected agen...

Страница 485: ...redentials will be used repository Name of a repository on the Core where the protected machine s data is stored The name must be enclosed in double quotes clustername The name of the cluster to prote...

Страница 486: ...onnection is made to the Core installed on the local machine user Optional User name for the remote Core host machine If you specify a user name you also have to provide a password If none are provide...

Страница 487: ...optional port number By default the connection is made to the Core installed on the local machine user Optional User name for the remote Core host machine If you specify a user name you also have to...

Страница 488: ...t where the archive will be saved When you use this option you should also specify the cloudaccountname parameter manifestcore Optional Specify the Core that you want to use from the manifest of the r...

Страница 489: ...ve ids 799138c8 3dfc 4398 9711 1823733c2a31 26c29bb7 b320 47f5 b5a8 dffc49f Parent topic Start VBExport The start VBExport command initiates the launch of a virtual export from the selected recovery p...

Страница 490: ...volume names to be exported If not specified all volumes in the specified recovery points will be exported Values must be enclosed in double quotes each separated by a space do not use trailing slashe...

Страница 491: ...Optional Use only when you specify a user account to register the exported virtual machine using parameter accountusername For local or network machine only Example Export all volumes from the latest...

Страница 492: ...rtualStandby core 10 10 10 10 8006 user administrator password 23WE sdd protectedse Parent topic Start VMExport The Start VMExport command initiates the launch of a virtual export from the selected re...

Страница 493: ...quotes each separated by a space do not use trailing slashes in volume names For example specify C not C rpn Optional The sequential number of a recovery point to be exported You can use the Get Reco...

Страница 494: ...ws Stop ActiveJobs protectedserver machine name IP address core host name user user nam Command Options The following table describes the options available for the Stop ActiveJobs command Table 249 St...

Страница 495: ...ta from recovery point rollup recovery point rollup s sqlattach agent attachability checks mount not repository By default all jobs of the specified type are canceled Example Stop transfer job in prot...

Страница 496: ...ame you also have to provide a password If none are provided then the logged on user s credentials will be used incoming Host name of the remote Core that replicates to the Core machine Replication is...

Страница 497: ...number By default the connection is made to the Core installed on the local machine password Optional Password to the remote Core host machine If you specify a password you also have to provide a user...

Страница 498: ...he Core installed on the local machine password Optional Password to the remote Core host machine If you specify a password you also have to provide a user name If none are provided then the logged on...

Страница 499: ...used password Optional Password to the remote Core host machine If you specify a password you also have to provide a user name If none are provided then the logged on user s credentials will be used...

Страница 500: ...s will be used all Pause exports for all virtual standby machines protectedserver The name or names separated by a comma and space of the protected machines with virtual standby machines that you want...

Страница 501: ...VMExport protectedserver 10 10 12 25 Parent topic Update Repository The Update Repository command adds an extent to an existing DVM repository The size specified must be between 250MB and 16TB Usage...

Страница 502: ...etermines login to share location sharepassword For share location only Determines password to share location Example Add an extent to the DVM repository of the minimum size Update Repository name Rep...

Страница 503: ...ingle server protected Mode READ READWRITE WRITE Recovery Point Mount mode Default Read Volumes Snapshot Volume Letter Snapshot volume letter from Rapid Recovery Agent Default All User User Name User...

Страница 504: ...ly covered by Dell Support Using PowerShell scripts in Rapid Recovery Windows PowerShell is a Microsoft NET Framework connected environment designed for administrative automation Rapid Recovery includ...

Страница 505: ...lder the configuration file powershell exe config NOTE The configuration file powershell_ise exe config must have the same content as the powershell exe config file CAUTION If the pre PowerShell or po...

Страница 506: ...ame as the sample script files AgentProtectionStorageConfiguration namespace Replay Common Contracts Agents The following table presents the available objects for the AgentProtectionStorageConfigurati...

Страница 507: ...GetChangedBlocksRetries get set Gets or sets the count of retries if initial retrieval of changed blocks from the agent failed public int MaxRetries get set Gets or sets the maximum number of times a...

Страница 508: ...e is lower than the amount specified in this parameter then all change logs are deleted and a base image is forced public uint MaxChangeLogsSizePercents get set Gets or sets a maximum size of driver c...

Страница 509: ...ackgroundJobRequest The following table presents the available objects for the ExportJobRequest parameter Table 263 Objects for the ExportJobRequest parameter Method Description public uint RamInMegab...

Страница 510: ...snap TransferJobRequest namespace Replay Core Contracts Transfer Inherits its values from the parameter BackgroundJobRequest The following table presents the available objects for the TransferJobRequ...

Страница 511: ...s many block writes are outstanding those additional blocks will be ignored until one of the outstanding blocks gets written MaxSegmentSize The maximum number of contiguous blocks to transfer in a sin...

Страница 512: ...value indicating whether the log truncation job is performing or not TransferPrescriptParameter namespace Replay Common Contracts PowerShellExecution Inherits its values from the TransferScriptParame...

Страница 513: ...onfiguration AgentTransferConfiguration is an object which will have the following data MaxConcurrentStreams The maximum number of concurrent TCP connections the core will establish to the agent for t...

Страница 514: ...f times a failed transfer should be retried before it is presumed failed UseDefaultMaxRetries A value indicating that the maximum number of retries is the default value ProviderId The GUID of the VSS...

Страница 515: ...rformed public AgentProtectionStorageConfiguration StorageConfiguration get set Gets or sets the storage configuration The AgentProtectionStorageConfiguration object contains the following data Reposi...

Страница 516: ...n VirtualMachineLocation namespace Replay Common Contracts Virtualization The following table presents the available objects for the VirtualMachineLocation parameter Table 269 Objects for the VirtualM...

Страница 517: ...for the VolumeNameCollection parameter Method Description public override bool Equals object obj Determines whether this instance and a specified object which must also be a VolumeNameCollection objec...

Страница 518: ...regVal regVal Common Contracts dll System Reflection Assembly LoadFrom regVal out null Converting input parameter into specific object TransferPrescriptParameterObject TransferPrescriptParameter as R...

Страница 519: ...overy Core 5 regVal regLM GetValue InstallLocation regVal regVal CoreService Common Contracts dll System Reflection Assembly LoadFrom regVal out null Converting input parameter into specific object Ex...

Страница 520: ...ARE Microsoft Windows CurrentVersion Uninstall AppRecovery Core 5 regVal regLM GetValue InstallLocation regVal regVal CoreService Common Contracts dll System Reflection Assembly LoadFrom regVal out nu...

Страница 521: ...er is null else echo TransferConfiguration TransferJobRequestObject TransferConfiguration echo StorageConfiguration TransferJobRequestObject StorageConfiguration echo LatestEpochSeenByCore LatestEpoch...

Страница 522: ...else echo AgentIds RollupJobRequestObject AgentIds echo IsNightlyJob RollupJobRequestObject IsNightlyJob AgentsCollection Agents as System Collections Generic List 1 System Guid if AgentsCollection eq...

Страница 523: ...ooks you can perform system operations before and after a transfer or export For example you may want to disable a certain cronjob while a transfer is occurring and enable it once the transfer has fin...

Страница 524: ...nsferPrescriptParameter_LatestEpochSeenByCore The following parameters are supported on Linux for post transfer scripts TransferPostscriptParameter_VolumeNames TransferPostscriptParameter_VolumeNames...

Страница 525: ...set The Key method generates a pseudorandom but not cryptographically secure key which can be used as a one time password to authenticate transfer requests public bool ForceBaseImage get set Gets or s...

Страница 526: ...s the ordinal number of the most recent snapshot taken by the Core This is the epoch number assigned by the filter driver to this particular snapshot at the moment it was taken with VSS Parent topic S...

Страница 527: ...run on the protected machine after transferring a snapshot The following script stores the values from input parameters in the Pre Post TransferScriptResult txt which is located and stored in the roo...

Страница 528: ...means that they use HTTP requests to provide access to resources data entities through URI paths Rapid Recovery APIs use standard HTTP methods such as GET PUT POST and DELETE Because REST APIs are ba...

Страница 529: ...EST service operations including methods and descriptions 2 Open the Core Client HTML file in a web browser to view detailed C information When you click any hyperlinked service contract class the bro...

Страница 530: ...work with Rapid Recovery Core these DLLs are required NOTE The DLL version used must match the version of the Core You can download the SDK as archive API Reference x x x xxxx Each x represents a dig...

Страница 531: ...Upgrade Guide provides an overview of the Rapid Recovery architecture and describes the steps necessary for installing the Rapid Recovery components and for upgrading the Core or Agent components from...

Страница 532: ...ftware with a valid maintenance contract and to customers who have trial versions To access the Support Portal go to https support quest com The Support Portal provides self help tools you can use to...

Страница 533: ...onent intended for environments with two or more Rapid Recovery Cores This component is a web portal providing a central interface where you can group manage and generate reports for multiple Cores us...

Страница 534: ...lock of data is XORed with the previous ciphertext block before being encrypted this way each new ciphertext block depends on all preceding plaintext blocks A passphrase is used as an initialization v...

Страница 535: ...runcation Log truncation is a function that removes log records from the transaction log For a SQL Server machine when you force truncation of the SQL Server logs this process identifies free space on...

Страница 536: ...pipe machine display name encryption key repository path description colon machine display name encryption key repository Use of this symbol is supported when specifying a path for example c data forw...

Страница 537: ...stalled Some virtual machines can also be protected agentlessly with some limitations Parent topic quorum For a failover cluster the number of elements that must be online for a given cluster to conti...

Страница 538: ...State Transfer REST is a simple stateless software architecture designed for scalability Rapid Recovery uses this architecture for its Application Program Interfaces APIs to automate and customize ce...

Страница 539: ...oft Volume Shadow Services VSS to facilitate application crash consistent snapshots Parent topic SQL attachability SQL attachability is a test run within the Rapid Recovery Core to ensure that all SQL...

Страница 540: ...mand or you can define requirements to create the bootable VM and continually update it after each snapshot is captured on the original protected machine Parent topic Volume Manager The Rapid Recovery...

Отзывы: