VMware VCENTER CONFIGURATION MANAGER 5.3 - SOFTWARE CONTENT REPOSITORY TOOL GUIDE User's Guide

Browse online or download User's Guide for Software VMware VCENTER CONFIGURATION MANAGER 5.3 - SOFTWARE CONTENT REPOSITORY TOOL GUIDE. VMware VCENTER CONFIGURATION MANAGER 5.3 - SOFTWARE CONTENT REPOSITORY TOOL GUIDE User guide User Manual

  • Download
  • Add to my manuals
  • Print
  • Page
    / 254
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews

Summary of Contents

Page 1 - User Guide

AppAssure 5 User GuideVersion 5.3.6

Page 3 - Contents

100 | Protecting Workstations and Servers  Memory (Physical)  Display Name Fully Qualified Domain NameDetailed information about the volumes conta

Page 4 - 4

Protecting Workstations and Servers | 1012. From the Machines tab, perform one of the following: Click the hyperlink for the machine you want to modi

Page 5

102 | Protecting Workstations and Servers Enable Events Select which events to share with this notification group. You can select All or select a sub

Page 6 - 6

Protecting Workstations and Servers | 1037. Click OK to save your changes. 8. To edit an existing notification group, click Edit next to the notificat

Page 7

104 | Protecting Workstations and Servers 7. Click OK. Enable Events Select which events to share with the notification group.You can select All or s

Page 8 - Appendix A: Scripting 213

Protecting Workstations and Servers | 105Customizing Retention Policy SettingsThe retention policy for a machine specifies how long the recovery point

Page 9

106 | Protecting Workstations and Servers 5. Select Enable Rollup, and specify the time intervals for retaining the backup data as needed. The retent

Page 10 -

Protecting Workstations and Servers | 107The Newest Recovery Point text box displays the most recent recovery point. The oldest recovery point would b

Page 11 - What’s New in AppAssure 5

108 | Protecting Workstations and Servers 3. Click the Configuration tab, and then click Licensing.The Status screen appears and presents the details

Page 12 - Topic Description

Protecting Workstations and Servers | 1094. In the Edit Protection Settings dialog box, click the Edit link next to the volume for which you want to c

Page 13

What’s New in AppAssure 5 | 11This chapter lists new and changed features in this release of AppAssure 5.What’s New in AppAssure 5 User GuideThe follo

Page 14

110 | Protecting Workstations and Servers 5. In the Protection Schedule dialog box, edit the following schedule options as needed for protecting your

Page 15

Protecting Workstations and Servers | 111 Virtual Machine Export. Creates a virtual machine (VM) from a recovery point, containing all of the data fr

Page 16 - Additional Changes

112 | Protecting Workstations and Servers To modify transfer settings1. On the AppAssure 5 Core Console, do one of the following:  Click the Machine

Page 17 - Introduction to AppAssure 5

Protecting Workstations and Servers | 1134. Enter the Transfer Settings options for the machine as described in the following table.Text Box Descripti

Page 18 - AppAssure 5 Core Technologies

114 | Protecting Workstations and Servers 5. Click OK.Restarting a ServiceComplete the steps in this procedure to restart a service.To restart a serv

Page 19 - True Global Deduplication

Protecting Workstations and Servers | 115Viewing Machine LogsIf you encounter any errors or issues with the machine, it may be useful to view the logs

Page 20 - Repository

116 | Protecting Workstations and Servers 4. Click Verify to validate the credentials you entered. The Deploy Agent dialog box displays a message to

Page 21

Protecting Workstations and Servers | 1176. Click Protect.Managing MachinesThis section describes a variety of tasks you can perform in managing your

Page 22 - Encryption

118 | Protecting Workstations and Servers 3. In the Actions drop-down menu, click Remove Machines, and then select one of the option described in the

Page 23 - Replication

Protecting Workstations and Servers | 119Setting Replication Priority for an AgentComplete the steps below to set the priority for when an agent repli

Page 24 - Retention and Archiving

12 | What’s New in AppAssure 5 About the Local Mount Utility on page 75 Modified topic. It describes the Local Mount Utility (the LMU). Updated langu

Page 25 - Figure 3. Retention Policy

120 | Protecting Workstations and Servers Viewing Machine Status and Other DetailsComplete the step in this procedure to view the status as well as o

Page 26 - Web Console

Protecting Workstations and Servers | 121 Used Space Free spaceIf SQL Server is installed on the machine, detailed information about the server also

Page 27 - White Labeling

122 | Protecting Workstations and Servers Deploying to Multiple MachinesYou can simplify the task of deploying the AppAssure Agent software to multip

Page 28

Protecting Workstations and Servers | 1235. On the Add Machines from Active Directory dialog box, select the machines to which you want to deploy the

Page 29 - Working with the AppAssure 5

124 | Protecting Workstations and Servers b. Click Save.7. To verify that AppAssure 5 can connect to each machine successfully, select each machine i

Page 30 - Managing Licenses

Protecting Workstations and Servers | 125Deploying to Machines on a VMware vCenter/ESX(i) Virtual HostBefore starting this procedure, you must have th

Page 31 - Changing a License Key

126 | Protecting Workstations and Servers 5. In the Deploy Agent on Machines window, you should see the machines that you added. If you want to selec

Page 32

Protecting Workstations and Servers | 1272. On the Deploy Agent on Machines window, do one of the following: Click New to enter a new machine host, l

Page 33

128 | Protecting Workstations and Servers 4. Verify that AppAssure 5 can connect to each machine successfully. To do this, select each machine in the

Page 34

Protecting Workstations and Servers | 129Protecting Multiple MachinesAfter bulk deploying the AppAssure 5 Agent software to your Windows machines, you

Page 35 -  Or, click Change

What’s New in AppAssure 5 | 13Understanding Bare Metal Restore on page 156 Modified topic. Formerly titled About Bare Metal Restore for Windows Machin

Page 36

130 | Protecting Workstations and Servers 3. Once you have added the machines for protection, in the Protect Machines window, you should see the newl

Page 37 - Creating a Repository

Protecting Workstations and Servers | 131Monitoring the Protection of Multiple MachinesYou can monitor the progress as AppAssure 5 applies the protect

Page 38

132 | Protecting Workstations and Servers 2. Click the Events tab to view related tasks and alerts.The Events tab displays, showing Task and Alert ev

Page 39

Protecting Workstations and Servers | 133 Progress Phase Failure Reason, if applicable2. Click Open in New window to launch a new window to view th

Page 40 - Modifying Repository Settings

134 | Protecting Workstations and Servers To view recovery points In the left navigation area of the AppAssure Core Console, select the machine for

Page 41

Protecting Workstations and Servers | 135To view a specific recovery point1. In the left navigation area of the AppAssure Core Console, select the mac

Page 42

136 | Protecting Workstations and Servers 3. Click the right angle bracket > symbol next to a volume in the selected recovery point to expand the

Page 43

Protecting Workstations and Servers | 1372. In the Mount Recovery Point dialog box, edit the text boxes for mounting a recovery point as described in

Page 44 - Managing Security

138 | Protecting Workstations and Servers 2. From the Tools option, click System Info.3. In the Local Mounts section, click Dismount All.Mounting a R

Page 45 - Editing an Encryption Key

Protecting Workstations and Servers | 1398. Enter the following command to select and mount the specified recovery point at the specified mount point/

Page 46 - Importing an Encryption Key

14 | What’s New in AppAssure 5 Mapping Volumes for a Bare Metal Restore on page 166Modified topic. This topic, previously entitled “Mapping Volumes,”

Page 47 - Removing an Encryption Key

140 | Protecting Workstations and Servers To remove recovery points 1. In the left navigation area of the AppAssure 5 Core Console, select the machin

Page 48 - Understanding Replication

Protecting Workstations and Servers | 141For more information about forcing a base image, see “Forcing a Snapshot” on page 141.To delete an orphaned r

Page 49

142 | Protecting Workstations and Servers 2. Click the Actions drop-down menu for that machine, click Force Snapshot, and then select one of the opti

Page 50 - About Seeding

Protecting Workstations and Servers | 143The following diagram shows a typical deployment for exporting data to a virtual machine.Figure 23. Virtual

Page 51

144 | Protecting Workstations and Servers Non-simple dynamic volumes have arbitrary disk geometries that cannot be fully interpreted and therefore Ap

Page 52

Protecting Workstations and Servers | 145Performing a One-Time ESXi ExportYou can choose to perform a one-time export for ESXi. Complete the steps in

Page 53

146 | Protecting Workstations and Servers 2. In the list of protected machines, select the machine or cluster with the recovery point that you want t

Page 54

Protecting Workstations and Servers | 147Exporting Windows Data using VMware Workstation ExportIn AppAssure 5, you can choose to export data using VMw

Page 55 - The entire target

148 | Protecting Workstations and Servers To define one-time settings for performing a VMware Workstation export1. From the Virtual Standby Recovery

Page 56

Protecting Workstations and Servers | 149Performing a Continuous (Virtual Standby) VMware Workstation ExportYou can choose to perform a continuous exp

Page 57

What’s New in AppAssure 5 | 15Transferring the Live DVD ISO Image to Media on page 174New topic. It describes burning the Live DVD boot ISO image to m

Page 58

150 | Protecting Workstations and Servers 8. In the Options pane, enter the information for the virtual machine and memory usage as described in the

Page 59

Protecting Workstations and Servers | 151Defining One-Time Settings for Performing a Hyper-V ExportComplete the steps in this procedure to define the

Page 60 - Monitoring Replication

152 | Protecting Workstations and Servers Performing a Continuous (Virtual Standby) Hyper-V ExportYou can choose to perform a continuous export for H

Page 61 - Consume. Consumes the

Protecting Workstations and Servers | 1539. Select the Options tab and then enter the name for the virtual machine in the Virtual Machine Name text bo

Page 62

154 | Protecting Workstations and Servers 3. Click Load Volumes.The Volume Mapping dialog box displays.NOTE: The Core console does not automatically

Page 63

Protecting Workstations and Servers | 155To perform a rollback for a volume on a Linux machine1. Run the AppAssure aamount utility as root, for exampl

Page 64 - Recovering Replicated Data

156 | Protecting Workstations and Servers 7. When prompted to proceed, enter y for Yes.Once the rollback proceeds, a series of messages will display

Page 65

Protecting Workstations and Servers | 157Examples of performing a BMR for similar hardware include replacing the hard drive of the existing system, or

Page 66 - Performing Failback

158 | Protecting Workstations and Servers  In all cases, you will need to load the boot image into the destination server and start the server from

Page 67

Protecting Workstations and Servers | 159 Storage space and partitions, as appropriate. Ensure that there is enough space on the hard drive to create

Page 68 - Managing Events

16 | What’s New in AppAssure 5 Additional ChangesThis version of the AppAssure 5 User Guide also includes the following general changes: Editorial c

Page 69

160 | Protecting Workstations and Servers The boot CD ISO image that you create is tailored to the machine being restored; therefore, it must contain

Page 70 - Hostname:

Protecting Workstations and Servers | 161Naming the Boot CD File and Setting the Path Complete the following step to name the boot CD file and set the

Page 71

162 | Protecting Workstations and Servers Data restored from the recovery point includes drivers for the hardware previously in place. If performing

Page 72 - Configuring Event Retention

Protecting Workstations and Servers | 163Accessing the ISO ImageComplete the following step to access the ISO image.To access the ISO image To access

Page 73 - Managing Recovery

164 | Protecting Workstations and Servers  AppAssure 5 Agent softwareThe AppAssure Universal Recovery Console starts and displays the IP address and

Page 74 - About the Agent Installer

Protecting Workstations and Servers | 165Selecting a Recovery Point and Initiating Rollback for BMR Once the Universal Recovery Console is accessible

Page 75 - About the Local Mount Utility

166 | Protecting Workstations and Servers 6. Enter the information about the machine to which you want to connect as described in the following table

Page 76

Protecting Workstations and Servers | 167To map volumes for a bare metal restore1. If you want to map volumes automatically, do the following. If you

Page 77

168 | Protecting Workstations and Servers If you are unsure which drivers are required by your target server, click the System Info tab in the Univer

Page 78

Protecting Workstations and Servers | 169Viewing the Recovery ProgressComplete the steps in this procedure to view the recovery progress of a rollback

Page 79

Introduction to AppAssure 5 | 17This chapter provides an introduction and overview of AppAssure 5. It describes the features, functionality, and archi

Page 80 - Accessing Localhost Options

170 | Protecting Workstations and Servers Troubleshooting Connections to the Universal Recovery Console The following are troubleshooting steps for c

Page 81 - About Archiving

Protecting Workstations and Servers | 171Roadmap for Performing a Bare Metal Restore on Linux MachinesIn AppAssure 5 you can perform a Bare Metal Rest

Page 82 - Importing an Archive

172 | Protecting Workstations and Servers  Verifying a Bare Metal Restore. After starting the bare metal restore, you can verify and monitor your pr

Page 83 - Managing SQL Attachability

Protecting Workstations and Servers | 173Managing a Linux Boot ImageA bare metal restore for Linux requires a Live DVD boot image, which you download

Page 84

174 | Protecting Workstations and Servers This task is a step in “Roadmap for Performing a Bare Metal Restore for a Windows Machine” on page 157. It

Page 85

Protecting Workstations and Servers | 175To load a Live DVD and start the target machine1. Navigate to the new server and load the Live DVD image from

Page 86 - Log Truncation

176 | Protecting Workstations and Servers This task is a step in “Roadmap for Performing a Bare Metal Restore on Linux Machines” on page 171. It is p

Page 87 - Forcing Checksum Checks

Protecting Workstations and Servers | 177Mounting Partitions from the Command LineIf performing a BMR using the AppAssure 5 Core Console, you must fir

Page 88 - Forcing Log Truncation

178 | Protecting Workstations and Servers  “Selecting a Recovery Point and Initiating Rollback for BMR” on page 165 “Mapping Volumes for a Bare Met

Page 89 - Status Color Description

Protecting Workstations and Servers | 179Launching a Bare Metal Restore for a Linux Machine using the Command LineOnce the Live DVD ISO image is acces

Page 90

18 | Introduction to AppAssure 5 Today's legacy backup tools and first generation VM backup tools are inefficient and ineffective. The outdated

Page 91 - Protecting Workstations and

180 | Protecting Workstations and Servers 6. When prompted, enter the connection information for the AppAssure 5 Core as described in the following t

Page 92 - Protecting a Machine

Protecting Workstations and Servers | 181 Size of the recovery point An ID number for the volume that includes a sequence number at the end, which i

Page 93

182 | Protecting Workstations and Servers 9. When prompted to proceed, enter y for Yes and then press Enter.After the rollback begins, a series of me

Page 94

Protecting Workstations and Servers | 183To perform a file system check on the restored volume1. From the command line in the Universal Recovery Conso

Page 95

184 | Protecting Workstations and Servers To create bootable partitions on a Linux machine by using the command line1. From the command line in the U

Page 96

Protecting Workstations and Servers | 1855. Now you must delete the existing bitmap store by typing the following command and then press Enter:rm -rf

Page 97 - To modify SQL server settings

186 | Protecting Workstations and Servers 13. Obtain the UUID of mount /etc/mtab and compare it to the UUIDs for the root (for Ubuntu and CentOS) an

Page 98 - Configuring Machine Settings

Protecting Workstations and Servers | 187 To view events for all machines managed by a core, in the Core Console, click the Events tab. To view even

Page 99 -  OS Architecture

188 | Protecting Workstations and Servers This page is intentionally left blank.

Page 100

Protecting Server Clusters | 189This chapter describes how to protect information on Microsoft SQL Server or Exchange Server clusters using AppAssure

Page 101

Introduction to AppAssure 5 | 19Universal RecoveryUniversal Recovery technology gives you unlimited machine restoration flexibility. You can restore y

Page 102 - Text Box Description

190 | Protecting Server Clusters You can easily configure an AppAssure 5 Core to protect and manage a cluster. In the Core Console, a cluster is orga

Page 103

Protecting Server Clusters | 191Protecting a ClusterThis topic describes how to add a cluster for protection in AppAssure 5. When you add a cluster to

Page 104 - Click OK

192 | Protecting Server Clusters b. In the Volumes dialog box, select the volume(s) to protect, and then click Edit. c. In the Protection Schedule di

Page 105

Protecting Server Clusters | 1933. In the Protect Cluster Node dialog box, select or enter as appropriate the following information, and then click Co

Page 106

194 | Protecting Server Clusters 1. Do one of the following.  Navigate to the cluster that contains the node you want to modify, click the Machines

Page 107 - Viewing License Information

Protecting Server Clusters | 195 In the Core Console, click the Machines tab, and then select the cluster you wish to modify. Or, in the left naviga

Page 108

196 | Protecting Server Clusters 4. If you selected Custom alert settings, do the following:a. Click Add Group to add a new notification group for se

Page 109

Protecting Server Clusters | 197 In the Core Console, click the Machines tab, and then select the cluster you wish to modify. Or, in the left naviga

Page 110 - Modifying Transfer Settings

198 | Protecting Server Clusters  Rollback. Restores backup information for a protected cluster.To modify cluster transfer settings1. Do one of the

Page 111

Protecting Server Clusters | 199 In the Core Console, click the Machines tab, and then select the cluster you wish to view. Or, in the left navigati

Page 112 - To modify transfer settings

Notes, Cautions and WarningsInformation in this publication is subject to change without notice.© 2013 Dell Inc. All rights reserved.Reproduction of t

Page 113

20 | Introduction to AppAssure 5 RepositoryThe AppAssure repository uses deduplication volume manager (DVM) to implement a volume manager that provid

Page 114 - Restarting a Service

200 | Protecting Server Clusters For information about viewing summary and status information for an individual machine or node in the cluster, see “

Page 115 - Viewing Machine Logs

Protecting Server Clusters | 201Managing Snapshots for a ClusterIn AppAssure 5, you can manage snapshots by forcing a snapshot or by pausing current s

Page 116 - Replicating a New Agent

202 | Protecting Server Clusters 3. In the Pause Protection dialog box, select one of the options described in the following table.Dismounting Local

Page 117 - Managing Machines

Protecting Server Clusters | 2032. Perform a rollback using the standard AppAssure procedure for the machine as described in “Performing a Rollback” o

Page 118

204 | Protecting Server Clusters Removing a Cluster from ProtectionComplete the steps in the following procedure to remove a cluster from protection.

Page 119

Protecting Server Clusters | 205Removing All Nodes in a Cluster from ProtectionComplete the steps in this procedure to remove all nodes in a cluster f

Page 120

206 | Protecting Server Clusters 3. In the Start Time drop-down calendar, select a start date, and then enter a start time for the report.NOTE: No da

Page 121 - Managing Multiple Machines

Reporting | 207This chapter provides an overview of reporting available in AppAssure 5. It consists of the following topics: About Reports on page 20

Page 122 -  Machines on any other host

208 | Reporting About the Reports ToolbarThe toolbar available for all reports lets you print and save in two different ways. The following table des

Page 123

Reporting | 209 Time Total WorkFor information about how to generate a report, see “Generating a Report for a Core or Agent” on page 210.About Error

Page 124

Introduction to AppAssure 5 | 21The typical disk layout of a server consists of the operating system, application, and data. In most environments, the

Page 125

210 | Reporting Details about the repositories are presented in a column view with the following categories: Name Data Path Metadata Path Allocat

Page 126

Reporting | 2114. In the left navigation area, select the report you want to run. The reports available depend on the selection you made in Step 1 and

Page 127

212 | Reporting To generate a report from the Central Management Console1. From the Central Management Console Welcome screen, click the drop-down me

Page 128

Scripting | 213This appendix describes the scripts that can be used by administrators at designated occurrences in AppAssure 5 for Windows and Linux.

Page 129 - Protecting Multiple Machines

214 | Scripting About PowerShell Scripting in AppAssure 5Windows PowerShell is a Microsoft .NET Framework-connected environment designed for administ

Page 130

Scripting | 215Testing PowerShell ScriptsIf you want to test the scripts you plan to run, you can do so by using the PowerShell graphical editor, powe

Page 131

216 | Scripting AgentTransferConfiguration (namespace Replay.Common.Contracts.Transfer)The following table presents the available objects for the Age

Page 132 - To view task details

Scripting | 217BackgroundJobRequest (namespace Replay.Core.Contracts.BackgroundJobs)The following table presents the available objects for the Backgro

Page 133 - Viewing Recovery Points

218 | Scripting NightlyAttachabilityJobRequest (namespace Replay.Core.Contracts.Sql)Inherits its values from the parameter, BackgroundJobRequest.Roll

Page 134 - To view recovery points

Scripting | 219TransferPrescriptParameter (namespace Replay.Common.Contracts.PowerShellExecution)The following table presents the available objects fo

Page 135

22 | Introduction to AppAssure 5 EncryptionAppAssure 5 provides integrated encryption to protect backups and data-at-rest from unauthorized access an

Page 136 -  Click the Machines tab

220 | Scripting public AgentTransferConfiguration TransferConfiguration { get; set; } Gets or sets the transfer configuration.AgentTransferConfigurat

Page 137

Scripting | 221public AgentTransferConfiguration TransferConfiguration { get; set; } (cont.)ExcludedWriterIds - collection of VSS writer IDs which s

Page 138

222 | Scripting TransferPostscriptParameter (namespace Replay.Common.Contracts.PowerShellExecution)The following table presents the available objects

Page 139 - Removing Recovery Points

Scripting | 223public AgentTransferConfiguration TransferConfiguration { get; set; } Gets or sets the transfer configuration.AgentTransferConfiguratio

Page 140 - To remove recovery points

224 | Scripting public AgentTransferConfiguration TransferConfiguration { get; set; } (cont.)ExcludedWriterIds - collection of VSS writer IDs which

Page 141 - Forcing a Snapshot

Scripting | 225VirtualMachineLocation (namespace Replay.Common.Contracts.Virtualization)The following table presents the available objects for the Vir

Page 142 - Restoring Data

226 | Scripting VolumeNameCollection (namespace Replay.Common.Contracts.Metadata.Storage)Inherits its values from the parameter, System.Collections.O

Page 143

Scripting | 227PreTransferScript.ps1The PreTransferScript is executed on the agent side prior to transferring a snapshot.Sample PreTransferScript# rec

Page 144 -  Hyper-V Export

228 | Scripting Sample PostTransferScript# receiving parameter from transfer jobparam([object] $TransferPostscriptParameter)# building path to Agent&

Page 145

Scripting | 229PreExportScript.ps1The PreExportScript is executed on the Core side prior to any export job.Sample PreExportScript# receiving parameter

Page 146

Introduction to AppAssure 5 | 23ReplicationReplication is the process of copying recovery points and transmitting them to a secondary location for the

Page 147

230 | Scripting PostExportScript.ps1The PostExportScript is executed on the Core side after any export job.NOTE: There are no input parameters for th

Page 148

Scripting | 231PreNightlyJobScript.ps1The PreNightlyJobScript is executed before every nighty job on Core side. It has $JobClassName parameter, that h

Page 149

232 | Scripting echo 'AgentId:' $NightlyAttachabilityJobRequestObject.AgentId; echo 'IsNightlyJob:&apos

Page 150

Scripting | 233# working with Checksum Check Job ChecksumCheckJob { $ChecksumCheckJobRequestObject = $ChecksumCheckJobRequest -as [Replay.Co

Page 151

234 | Scripting }}PostNightlyJobScript.ps1The PostNightlyJobScript is executed after every nighty job on Core side. It has $JobClassName paramete

Page 152

Scripting | 235 $NightlyAttachabilityJobRequestObject = $NightlyAttachabilityJobRequest -as [Replay.Core.Contracts.Sql.NightlyAttachabilityJobR

Page 153 - Performing a Rollback

236 | Scripting echo 'Agents GUIDs:' foreach ($a in $AgentsCollection) { echo $a }

Page 154

Scripting | 237 else { echo 'TransferConfiguration:' $TransferJobRequestObject.TransferConfiguration; e

Page 155

238 | Scripting You can add available objects from the TransferPrescript parameter or add your own commands to the PreTransferScript.sh and PostTrans

Page 156

Scripting | 239TransferPostscriptParameterThe following table presents the available objects for the TransferPostscript parameter.public string Key {

Page 157 - Windows Machine

24 | Introduction to AppAssure 5 Replication begins with seeding: the initial transfer of deduplicated base images and incremental snapshots of the p

Page 158

240 | Scripting Sample Bourne Shell ScriptsThe following sample scripts are provided to assist administrative users in executing Bourne Shell scripts

Page 159 - Managing a Windows Boot Image

Scripting | 241TransferPrescriptParameter_ForceBaseImage=$TransferPrescriptParameter_ForceBaseImageTransferPrescriptParameter_IsLogTruncation=$Transfe

Page 160 - To create a boot CD ISO image

242 | Scripting This page is intentionally left blank.

Page 161 - Creating Connections

Glossary | 243AgentAn agent is a machine or server that is protected or to be protected by AppAssure 5.AppAssure 5AppAssure 5 sets a new standard for

Page 162

244 | Glossary CoreThe AppAssure 5 Core is the central component of the AppAssure architecture. The Core provides the essential services for backup,

Page 163 - Accessing the ISO Image

Glossary | 245MachineA machine, sometimes referred to as an agent, is a physical or virtual machine or server that is protected by the AppAssure 5 Cor

Page 164 -  AppAssure 5 Agent software

246 | Glossary ReplicationReplication is self-optimizing with a unique read-match-write (RMW) algorithm that is tightly coupled with deduplication. I

Page 165

Glossary | 247Target CoreThe target core, which is sometimes referred to as replica core, is the AppAssure 5 Core receiving the replicated data from t

Page 166

248 | Glossary This page intentionally left blank.

Page 167

Index | 1Aabout - 80, - 178Active Directorydeploying to multiple machines - 122agentdeploying when protecting an agent - 94replicating - 116reporting

Page 168

Introduction to AppAssure 5 | 25Retention policies enforce the periods of time in which backups are stored on short-term (fast and expensive) media. S

Page 169 - Viewing the Recovery Progress

2 | IndexCentral Management Console Core Reportsgenerating - 211checksum checksforcing - 87cloudabout - 26clustersnapshot, forcing - 201snapshot, pau

Page 170 - Repairing Startup Problems

Index | 3Llaunching, from command line - 179license informationviewing - 107license keychanging - 31licensesmanaging - 30live cdloading - 174Live DVD

Page 171 - Machines

4 | Indexprotection schedulesmodifying - 108modifying for clusters - 197Rrecoverymanaging - 73recovery pointmounting for Linux machines - 138mounting

Page 172

Index | 5input parameters - 215, - 238NightlyAttachabilityJobRequest - 218powershell.exe.config - 214RollupJobRequest - 218TakeSnapshotResponse - 218

Page 174 - 2. Access the Downloads area

26 | Introduction to AppAssure 5 Virtualization and CloudThe AppAssure 5 Core is cloud-ready, which allows you to leverage the compute capacity of th

Page 175 - Managing Linux Partitions

Introduction to AppAssure 5 | 27Service Management APIsAppAssure 5 comes bundled with a set of service management APIs and provides programmatic acces

Page 176

28 | Introduction to AppAssure 5 This page is intentionally left blank.

Page 177

Working with the AppAssure 5 Core | 29This chapter describes the various aspects of working with, configuring, and managing the AppAssure 5 Core. It i

Page 178 - Starting the Screen Utility

Contents | 3Chapter 1: What’s New in AppAssure 5What’s New in AppAssure 5 User Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 179

30 | Working with the AppAssure 5 Core Accessing the AppAssure 5 Core ConsoleComplete the following steps to access the AppAssure 5 Core Console.To a

Page 180 -  Location of the volume

Working with the AppAssure 5 Core | 31The Licensing page includes the following information:  License type License status License pool size Number

Page 181

32 | Working with the AppAssure 5 Core 2. Click Licensing.The Licensing page appears.3. From the License Server option, click Contact Now.Managing Ap

Page 182

Working with the AppAssure 5 Core | 333. In the Start Time text box, enter a new start time.4. Click OK.Modifying the Transfer Queue SettingsTransfer

Page 183 - Command Line

34 | Working with the AppAssure 5 Core Configuring Deduplication Cache SettingsComplete the steps in this procedure to configure deduplication cache

Page 184

Working with the AppAssure 5 Core | 354. Click OK.Modifying Database Connection SettingsComplete the steps in this procedure to modify the database co

Page 185

36 | Working with the AppAssure 5 Core 4. Click Test Connection to verify your settings.5. Click Save.About RepositoriesA repository is used to store

Page 186 - Viewing Events and Alerts

Working with the AppAssure 5 Core | 37When you create a repository, the Core pre-allocates the space required for storing data and metadata in the spe

Page 187

38 | Working with the AppAssure 5 Core 4. Click Add Storage Location to define the specific storage location or volume for the repository. NOTE: AppA

Page 188

Working with the AppAssure 5 Core | 396. In the Details pane, click Show/Hide Details and enter the details for the storage location as described in t

Page 189 - Protecting Server Clusters

4 | ContentsManaging AppAssure 5 Core Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

Page 190 -  Basic disks

40 | Working with the AppAssure 5 Core Viewing Details about a RepositoryComplete the following step to view the details for a repository.To view det

Page 191

Working with the AppAssure 5 Core | 412. Click the right angle bracket > symbol next to the Status column of the repository that you want to modify

Page 192 - To protect nodes in a cluster

42 | Working with the AppAssure 5 Core  Select Add file on local disk to specify a local machine and then enter the information as described in the

Page 193

Working with the AppAssure 5 Core | 434. In the Details pane, click Show/Hide Details and enter the details for the storage location as described in t

Page 194 - Modifying Cluster Settings

44 | Working with the AppAssure 5 Core Checking a RepositoryAppAssure 5 provides the ability to perform a diagnostic check of a repository volume whe

Page 195

Working with the AppAssure 5 Core | 45Key security concepts and considerations include: Encryption is performed using 256 Bit AES in Cipher Block Cha

Page 196

46 | Working with the AppAssure 5 Core To edit an encryption key1. Navigate to the AppAssure 5 Core, and then click the Configuration tab.2. From the

Page 197

Working with the AppAssure 5 Core | 473. Click the Actions drop-down menu, and then click Import.The Import Key dialog box displays.4. In the Import K

Page 198

48 | Working with the AppAssure 5 Core Understanding ReplicationThis section provides conceptual and procedural information to help you understand an

Page 199 - Viewing Summary Information

Working with the AppAssure 5 Core | 49Possible replication configurations include: Point to Point. Replicates a single agent from a single source cor

Page 200

Contents | 5Managing Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Page 201 - 1. Do one of the following:

50 | Working with the AppAssure 5 Core About SeedingReplication begins with seeding: the initial transfer of deduplicated base images and incremental

Page 202

Working with the AppAssure 5 Core | 51About Failover and Failback in AppAssure 5In the case of a severe outage in which your source core and agents fa

Page 203 - Replicating Cluster Data

52 | Working with the AppAssure 5 Core Performance Considerations for Replicated Data TransferIf the bandwidth between the source core and the target

Page 204

Working with the AppAssure 5 Core | 53If a link fails during data transfer, replication resumes from the previous failure point of the transfer once l

Page 205

54 | Working with the AppAssure 5 Core Configuring the Source Core to Replicate to a Self-Managed Target CoreComplete the steps in the following proc

Page 206

Working with the AppAssure 5 Core | 559. In the Copy to Seed Drive dialog box, enter the information described in the following table.NOTE: Because la

Page 207 - Reporting

56 | Working with the AppAssure 5 Core Configuring Replication to a Target Core Managed by a Third PartyComplete the steps in this procedure to confi

Page 208 - About Compliance Reports

Working with the AppAssure 5 Core | 578. In the Copy to Seed Drive dialog box, enter the information for the seed drive as described in the table belo

Page 209 - About the Core Summary Report

58 | Working with the AppAssure 5 Core To deny a request without reviewing it, see “Ignoring a Replication Request” on page 58.To review a replicatio

Page 210 - Agents Summary

Working with the AppAssure 5 Core | 593. Under Pending Replication Requests, click the drop-down menu next to the request you want to ignore, and then

Page 211

6 | ContentsViewing and Modifying Configuration Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98Viewing System Inf

Page 212 - 212

60 | Working with the AppAssure 5 Core Abandoning an Outstanding Seed DriveIf you create a seed drive with the intent to consume it on the target cor

Page 213 - Scripting

Working with the AppAssure 5 Core | 612. On this tab, you can view information about and monitor the status of replication tasks as described in the f

Page 214 - 214

62 | Working with the AppAssure 5 Core Pausing and Resuming ReplicationYou can pause replication temporarily for the source (outgoing) or target (inc

Page 215 - Testing PowerShell Scripts

Working with the AppAssure 5 Core | 63 “Removing a Target Core from Replication” on page 63 “Removing a Source Core from Replication” on page 64NOTE

Page 216 - Method Description

64 | Working with the AppAssure 5 Core To remove a target core from replication1. On the source core, open the AppAssure 5 Core Console, and click to

Page 217

Working with the AppAssure 5 Core | 65 Perform a virtual machine (VM) export. For more information, see “Exporting Backup Information for your Window

Page 218 - Replay.Core.Contracts.Sql)

66 | Working with the AppAssure 5 Core Performing Failover on the Target CoreWhen you encounter a disaster situation in which your source core and as

Page 219 - Scripting

Working with the AppAssure 5 Core | 673. On the Actions menu, click Failback. The Failback Warnings dialog box opens to describe the steps you need to

Page 220

68 | Working with the AppAssure 5 Core Managing EventsManaging core events assists with the monitoring of the health and usage of the AppAssure 5 Cor

Page 221 - Scripting

Working with the AppAssure 5 Core | 69 Enable Events Notification Options4. In the description area, enter basic information for the notification gr

Page 222

Contents | 7Prerequisites for Performing a Bare Metal Restore for a Windows Machine . . . . . . . . . . . 158Managing a Windows Boot Image . . . .

Page 223 - Scripting

70 | Working with the AppAssure 5 Core 6. In the Notification Options tab, specify how to handle the notification process. The following table descri

Page 224

Working with the AppAssure 5 Core | 713. In the Email SMTP Settings pane, click Change.The Edit Email Notification Configuration dialog box appears.4.

Page 225

72 | Working with the AppAssure 5 Core 5. Enter a subject for the email template. It is used to define the subject of the email notification template

Page 226 - Sample PowerShell Scripts

Working with the AppAssure 5 Core | 734. In the Retain event and job history for: text box, enter the number of days that you want to retain informati

Page 227 - PostTransferScript.ps1

74 | Working with the AppAssure 5 Core About System InformationAppAssure 5 lets you view information about the AppAssure 5 Core that includes system

Page 228 - Sample PostTransferScript

Working with the AppAssure 5 Core | 75Downloading the Agent InstallerYou can download and deploy the AppAssure 5 Agent Installer on any machine that w

Page 229 - PreExportScript.ps1

76 | Working with the AppAssure 5 Core 5. From the Opening LocalMountUtility-Web.exe window, click Save File.The file saves to the local Downloads fo

Page 230 - PostExportScript.ps1

Working with the AppAssure 5 Core | 773. In the upper-left corner of the AppAssure Local Mount Utility window, click Add Core.4. In the Add Core dialo

Page 231 - PreNightlyJobScript.ps1

78 | Working with the AppAssure 5 Core 2. From the main AppAssure Local Mount Utility window, expand the Core in the navigation tree to reveal the pr

Page 232

Working with the AppAssure 5 Core | 79ii. Click Mount.The LMU automatically opens the folder containing the mounted recovery point.NOTE: If you select

Page 233 - Scripting

8 | ContentsModifying Cluster Transfer Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197Convertin

Page 234 - PostNightlyJobScript.ps1

80 | Working with the AppAssure 5 Core 5. To minimize the LMU application, click the X in the upper-right corner of the Local Mount Utility window.6.

Page 235 - Scripting

Working with the AppAssure 5 Core | 81Accessing Remote Core OptionsComplete the steps in this procedure to access remote core options.To access remote

Page 236

82 | Working with the AppAssure 5 Core Creating an ArchiveComplete the steps in this procedure to create an archive.To create an archive1. Navigate t

Page 237

Working with the AppAssure 5 Core | 833. In the Import Archive dialog box, enter the details for importing the archive as described in the following t

Page 238 - TransferPrescriptParameter

84 | Working with the AppAssure 5 Core Configuring SQL Attachability SettingsPrior to running attachability checks on protected SQL databases, you mu

Page 239 - TransferPostscriptParameter

Working with the AppAssure 5 Core | 85Configuring Nightly SQL Attachability Checks and Log TruncationComplete the steps in this procedure to have the

Page 240 - Sample Bourne Shell Scripts

86 | Working with the AppAssure 5 Core Managing Exchange Database Mountability Checks and Log TruncationWhen using AppAssure 5 to back up Microsoft E

Page 241 - PostTransferScript.sh

Working with the AppAssure 5 Core | 87Forcing a Mountability CheckComplete the steps in this procedure to force the system to perform a mountability c

Page 242

88 | Working with the AppAssure 5 Core Forcing Log TruncationComplete the steps in this procedure to force log truncation.To force log truncation1. N

Page 243 - Glossary

Working with the AppAssure 5 Core | 89Recovery Status Point Colors for Exchange DatabasesThe following table lists the status indicators that display

Page 244 - 244

Contents | 9PreExportScript.ps1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

Page 245

90 | Working with the AppAssure 5 Core This page intentionally left blank.

Page 246 - 246

Protecting Workstations and Servers | 91This chapter describes how to protect, configure, and manage the agent machines in your AppAssure environment.

Page 247

92 | Protecting Workstations and Servers About Protecting Workstations and ServersTo protect your data using AppAssure 5, you need to add the worksta

Page 248 -

Protecting Workstations and Servers | 93 Select the Machines tab, and in the Actions drop-down menu, click Protect Machine.The Connect dialog box dis

Page 249 - Index

94 | Protecting Workstations and Servers 7. Click Protect.The first time protection is added for a machine, a base image (that is, a snapshot of all

Page 250 - 2

Protecting Workstations and Servers | 95To deploy agents when protecting an agent.1. From the Connect dialog box, after entering the appropriate conne

Page 251 - Index

96 | Protecting Workstations and Servers The Deploy Agent dialog box closes. There may be a slight delay before you see the selected agent appear in

Page 252 - 4

Protecting Workstations and Servers | 97Modifying Exchange Server SettingsIf you are protecting data from a Microsoft Exchange server, you need to con

Page 253 - Index

98 | Protecting Workstations and Servers 4. You can also modify the logon credentials for SQL Server. To do so, scroll down to the SQL Server Informa

Page 254 - 6

Protecting Workstations and Servers | 993. Click Change to modify the machine settings as described in the following table.Viewing System Information

Comments to this Manuals

No comments