VMware VCENTER CONFIGURATION MANAGER 5.3 - SOFTWARE CONTENT REPOSITORY TOOL GUIDE Betriebsanweisung Seite 1

Stöbern Sie online oder laden Sie Betriebsanweisung nach Software VMware VCENTER CONFIGURATION MANAGER 5.3 - SOFTWARE CONTENT REPOSITORY TOOL GUIDE herunter. VMware VCENTER CONFIGURATION MANAGER 5.3 - SOFTWARE CONTENT REPOSITORY TOOL GUIDE User guide Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 254
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - User Guide

AppAssure 5 User GuideVersion 5.3.6

Seite 3 - Contents

100 | Protecting Workstations and Servers  Memory (Physical)  Display Name Fully Qualified Domain NameDetailed information about the volumes conta

Seite 4 - 4

Protecting Workstations and Servers | 1012. From the Machines tab, perform one of the following: Click the hyperlink for the machine you want to modi

Seite 5

102 | Protecting Workstations and Servers Enable Events Select which events to share with this notification group. You can select All or select a sub

Seite 6 - 6

Protecting Workstations and Servers | 1037. Click OK to save your changes. 8. To edit an existing notification group, click Edit next to the notificat

Seite 7

104 | Protecting Workstations and Servers 7. Click OK. Enable Events Select which events to share with the notification group.You can select All or s

Seite 8 - Appendix A: Scripting 213

Protecting Workstations and Servers | 105Customizing Retention Policy SettingsThe retention policy for a machine specifies how long the recovery point

Seite 9

106 | Protecting Workstations and Servers 5. Select Enable Rollup, and specify the time intervals for retaining the backup data as needed. The retent

Seite 10 -

Protecting Workstations and Servers | 107The Newest Recovery Point text box displays the most recent recovery point. The oldest recovery point would b

Seite 11 - What’s New in AppAssure 5

108 | Protecting Workstations and Servers 3. Click the Configuration tab, and then click Licensing.The Status screen appears and presents the details

Seite 12 - Topic Description

Protecting Workstations and Servers | 1094. In the Edit Protection Settings dialog box, click the Edit link next to the volume for which you want to c

Seite 13

What’s New in AppAssure 5 | 11This chapter lists new and changed features in this release of AppAssure 5.What’s New in AppAssure 5 User GuideThe follo

Seite 14

110 | Protecting Workstations and Servers 5. In the Protection Schedule dialog box, edit the following schedule options as needed for protecting your

Seite 15

Protecting Workstations and Servers | 111 Virtual Machine Export. Creates a virtual machine (VM) from a recovery point, containing all of the data fr

Seite 16 - Additional Changes

112 | Protecting Workstations and Servers To modify transfer settings1. On the AppAssure 5 Core Console, do one of the following:  Click the Machine

Seite 17 - Introduction to AppAssure 5

Protecting Workstations and Servers | 1134. Enter the Transfer Settings options for the machine as described in the following table.Text Box Descripti

Seite 18 - AppAssure 5 Core Technologies

114 | Protecting Workstations and Servers 5. Click OK.Restarting a ServiceComplete the steps in this procedure to restart a service.To restart a serv

Seite 19 - True Global Deduplication

Protecting Workstations and Servers | 115Viewing Machine LogsIf you encounter any errors or issues with the machine, it may be useful to view the logs

Seite 20 - Repository

116 | Protecting Workstations and Servers 4. Click Verify to validate the credentials you entered. The Deploy Agent dialog box displays a message to

Seite 21

Protecting Workstations and Servers | 1176. Click Protect.Managing MachinesThis section describes a variety of tasks you can perform in managing your

Seite 22 - Encryption

118 | Protecting Workstations and Servers 3. In the Actions drop-down menu, click Remove Machines, and then select one of the option described in the

Seite 23 - Replication

Protecting Workstations and Servers | 119Setting Replication Priority for an AgentComplete the steps below to set the priority for when an agent repli

Seite 24 - Retention and Archiving

12 | What’s New in AppAssure 5 About the Local Mount Utility on page 75 Modified topic. It describes the Local Mount Utility (the LMU). Updated langu

Seite 25 - Figure 3. Retention Policy

120 | Protecting Workstations and Servers Viewing Machine Status and Other DetailsComplete the step in this procedure to view the status as well as o

Seite 26 - Web Console

Protecting Workstations and Servers | 121 Used Space Free spaceIf SQL Server is installed on the machine, detailed information about the server also

Seite 27 - White Labeling

122 | Protecting Workstations and Servers Deploying to Multiple MachinesYou can simplify the task of deploying the AppAssure Agent software to multip

Seite 28

Protecting Workstations and Servers | 1235. On the Add Machines from Active Directory dialog box, select the machines to which you want to deploy the

Seite 29 - Working with the AppAssure 5

124 | Protecting Workstations and Servers b. Click Save.7. To verify that AppAssure 5 can connect to each machine successfully, select each machine i

Seite 30 - Managing Licenses

Protecting Workstations and Servers | 125Deploying to Machines on a VMware vCenter/ESX(i) Virtual HostBefore starting this procedure, you must have th

Seite 31 - Changing a License Key

126 | Protecting Workstations and Servers 5. In the Deploy Agent on Machines window, you should see the machines that you added. If you want to selec

Seite 32

Protecting Workstations and Servers | 1272. On the Deploy Agent on Machines window, do one of the following: Click New to enter a new machine host, l

Seite 33

128 | Protecting Workstations and Servers 4. Verify that AppAssure 5 can connect to each machine successfully. To do this, select each machine in the

Seite 34

Protecting Workstations and Servers | 129Protecting Multiple MachinesAfter bulk deploying the AppAssure 5 Agent software to your Windows machines, you

Seite 35 -  Or, click Change

What’s New in AppAssure 5 | 13Understanding Bare Metal Restore on page 156 Modified topic. Formerly titled About Bare Metal Restore for Windows Machin

Seite 36

130 | Protecting Workstations and Servers 3. Once you have added the machines for protection, in the Protect Machines window, you should see the newl

Seite 37 - Creating a Repository

Protecting Workstations and Servers | 131Monitoring the Protection of Multiple MachinesYou can monitor the progress as AppAssure 5 applies the protect

Seite 38

132 | Protecting Workstations and Servers 2. Click the Events tab to view related tasks and alerts.The Events tab displays, showing Task and Alert ev

Seite 39

Protecting Workstations and Servers | 133 Progress Phase Failure Reason, if applicable2. Click Open in New window to launch a new window to view th

Seite 40 - Modifying Repository Settings

134 | Protecting Workstations and Servers To view recovery points In the left navigation area of the AppAssure Core Console, select the machine for

Seite 41

Protecting Workstations and Servers | 135To view a specific recovery point1. In the left navigation area of the AppAssure Core Console, select the mac

Seite 42

136 | Protecting Workstations and Servers 3. Click the right angle bracket > symbol next to a volume in the selected recovery point to expand the

Seite 43

Protecting Workstations and Servers | 1372. In the Mount Recovery Point dialog box, edit the text boxes for mounting a recovery point as described in

Seite 44 - Managing Security

138 | Protecting Workstations and Servers 2. From the Tools option, click System Info.3. In the Local Mounts section, click Dismount All.Mounting a R

Seite 45 - Editing an Encryption Key

Protecting Workstations and Servers | 1398. Enter the following command to select and mount the specified recovery point at the specified mount point/

Seite 46 - Importing an Encryption Key

14 | What’s New in AppAssure 5 Mapping Volumes for a Bare Metal Restore on page 166Modified topic. This topic, previously entitled “Mapping Volumes,”

Seite 47 - Removing an Encryption Key

140 | Protecting Workstations and Servers To remove recovery points 1. In the left navigation area of the AppAssure 5 Core Console, select the machin

Seite 48 - Understanding Replication

Protecting Workstations and Servers | 141For more information about forcing a base image, see “Forcing a Snapshot” on page 141.To delete an orphaned r

Seite 49

142 | Protecting Workstations and Servers 2. Click the Actions drop-down menu for that machine, click Force Snapshot, and then select one of the opti

Seite 50 - About Seeding

Protecting Workstations and Servers | 143The following diagram shows a typical deployment for exporting data to a virtual machine.Figure 23. Virtual

Seite 51

144 | Protecting Workstations and Servers Non-simple dynamic volumes have arbitrary disk geometries that cannot be fully interpreted and therefore Ap

Seite 52

Protecting Workstations and Servers | 145Performing a One-Time ESXi ExportYou can choose to perform a one-time export for ESXi. Complete the steps in

Seite 53

146 | Protecting Workstations and Servers 2. In the list of protected machines, select the machine or cluster with the recovery point that you want t

Seite 54

Protecting Workstations and Servers | 147Exporting Windows Data using VMware Workstation ExportIn AppAssure 5, you can choose to export data using VMw

Seite 55 - The entire target

148 | Protecting Workstations and Servers To define one-time settings for performing a VMware Workstation export1. From the Virtual Standby Recovery

Seite 56

Protecting Workstations and Servers | 149Performing a Continuous (Virtual Standby) VMware Workstation ExportYou can choose to perform a continuous exp

Seite 57

What’s New in AppAssure 5 | 15Transferring the Live DVD ISO Image to Media on page 174New topic. It describes burning the Live DVD boot ISO image to m

Seite 58

150 | Protecting Workstations and Servers 8. In the Options pane, enter the information for the virtual machine and memory usage as described in the

Seite 59

Protecting Workstations and Servers | 151Defining One-Time Settings for Performing a Hyper-V ExportComplete the steps in this procedure to define the

Seite 60 - Monitoring Replication

152 | Protecting Workstations and Servers Performing a Continuous (Virtual Standby) Hyper-V ExportYou can choose to perform a continuous export for H

Seite 61 - Consume. Consumes the

Protecting Workstations and Servers | 1539. Select the Options tab and then enter the name for the virtual machine in the Virtual Machine Name text bo

Seite 62

154 | Protecting Workstations and Servers 3. Click Load Volumes.The Volume Mapping dialog box displays.NOTE: The Core console does not automatically

Seite 63

Protecting Workstations and Servers | 155To perform a rollback for a volume on a Linux machine1. Run the AppAssure aamount utility as root, for exampl

Seite 64 - Recovering Replicated Data

156 | Protecting Workstations and Servers 7. When prompted to proceed, enter y for Yes.Once the rollback proceeds, a series of messages will display

Seite 65

Protecting Workstations and Servers | 157Examples of performing a BMR for similar hardware include replacing the hard drive of the existing system, or

Seite 66 - Performing Failback

158 | Protecting Workstations and Servers  In all cases, you will need to load the boot image into the destination server and start the server from

Seite 67

Protecting Workstations and Servers | 159 Storage space and partitions, as appropriate. Ensure that there is enough space on the hard drive to create

Seite 68 - Managing Events

16 | What’s New in AppAssure 5 Additional ChangesThis version of the AppAssure 5 User Guide also includes the following general changes: Editorial c

Seite 69

160 | Protecting Workstations and Servers The boot CD ISO image that you create is tailored to the machine being restored; therefore, it must contain

Seite 70 - Hostname:

Protecting Workstations and Servers | 161Naming the Boot CD File and Setting the Path Complete the following step to name the boot CD file and set the

Seite 71

162 | Protecting Workstations and Servers Data restored from the recovery point includes drivers for the hardware previously in place. If performing

Seite 72 - Configuring Event Retention

Protecting Workstations and Servers | 163Accessing the ISO ImageComplete the following step to access the ISO image.To access the ISO image To access

Seite 73 - Managing Recovery

164 | Protecting Workstations and Servers  AppAssure 5 Agent softwareThe AppAssure Universal Recovery Console starts and displays the IP address and

Seite 74 - About the Agent Installer

Protecting Workstations and Servers | 165Selecting a Recovery Point and Initiating Rollback for BMR Once the Universal Recovery Console is accessible

Seite 75 - About the Local Mount Utility

166 | Protecting Workstations and Servers 6. Enter the information about the machine to which you want to connect as described in the following table

Seite 76

Protecting Workstations and Servers | 167To map volumes for a bare metal restore1. If you want to map volumes automatically, do the following. If you

Seite 77

168 | Protecting Workstations and Servers If you are unsure which drivers are required by your target server, click the System Info tab in the Univer

Seite 78

Protecting Workstations and Servers | 169Viewing the Recovery ProgressComplete the steps in this procedure to view the recovery progress of a rollback

Seite 79

Introduction to AppAssure 5 | 17This chapter provides an introduction and overview of AppAssure 5. It describes the features, functionality, and archi

Seite 80 - Accessing Localhost Options

170 | Protecting Workstations and Servers Troubleshooting Connections to the Universal Recovery Console The following are troubleshooting steps for c

Seite 81 - About Archiving

Protecting Workstations and Servers | 171Roadmap for Performing a Bare Metal Restore on Linux MachinesIn AppAssure 5 you can perform a Bare Metal Rest

Seite 82 - Importing an Archive

172 | Protecting Workstations and Servers  Verifying a Bare Metal Restore. After starting the bare metal restore, you can verify and monitor your pr

Seite 83 - Managing SQL Attachability

Protecting Workstations and Servers | 173Managing a Linux Boot ImageA bare metal restore for Linux requires a Live DVD boot image, which you download

Seite 84

174 | Protecting Workstations and Servers This task is a step in “Roadmap for Performing a Bare Metal Restore for a Windows Machine” on page 157. It

Seite 85

Protecting Workstations and Servers | 175To load a Live DVD and start the target machine1. Navigate to the new server and load the Live DVD image from

Seite 86 - Log Truncation

176 | Protecting Workstations and Servers This task is a step in “Roadmap for Performing a Bare Metal Restore on Linux Machines” on page 171. It is p

Seite 87 - Forcing Checksum Checks

Protecting Workstations and Servers | 177Mounting Partitions from the Command LineIf performing a BMR using the AppAssure 5 Core Console, you must fir

Seite 88 - Forcing Log Truncation

178 | Protecting Workstations and Servers  “Selecting a Recovery Point and Initiating Rollback for BMR” on page 165 “Mapping Volumes for a Bare Met

Seite 89 - Status Color Description

Protecting Workstations and Servers | 179Launching a Bare Metal Restore for a Linux Machine using the Command LineOnce the Live DVD ISO image is acces

Seite 90

18 | Introduction to AppAssure 5 Today's legacy backup tools and first generation VM backup tools are inefficient and ineffective. The outdated

Seite 91 - Protecting Workstations and

180 | Protecting Workstations and Servers 6. When prompted, enter the connection information for the AppAssure 5 Core as described in the following t

Seite 92 - Protecting a Machine

Protecting Workstations and Servers | 181 Size of the recovery point An ID number for the volume that includes a sequence number at the end, which i

Seite 93

182 | Protecting Workstations and Servers 9. When prompted to proceed, enter y for Yes and then press Enter.After the rollback begins, a series of me

Seite 94

Protecting Workstations and Servers | 183To perform a file system check on the restored volume1. From the command line in the Universal Recovery Conso

Seite 95

184 | Protecting Workstations and Servers To create bootable partitions on a Linux machine by using the command line1. From the command line in the U

Seite 96

Protecting Workstations and Servers | 1855. Now you must delete the existing bitmap store by typing the following command and then press Enter:rm -rf

Seite 97 - To modify SQL server settings

186 | Protecting Workstations and Servers 13. Obtain the UUID of mount /etc/mtab and compare it to the UUIDs for the root (for Ubuntu and CentOS) an

Seite 98 - Configuring Machine Settings

Protecting Workstations and Servers | 187 To view events for all machines managed by a core, in the Core Console, click the Events tab. To view even

Seite 99 -  OS Architecture

188 | Protecting Workstations and Servers This page is intentionally left blank.

Seite 100

Protecting Server Clusters | 189This chapter describes how to protect information on Microsoft SQL Server or Exchange Server clusters using AppAssure

Seite 101

Introduction to AppAssure 5 | 19Universal RecoveryUniversal Recovery technology gives you unlimited machine restoration flexibility. You can restore y

Seite 102 - Text Box Description

190 | Protecting Server Clusters You can easily configure an AppAssure 5 Core to protect and manage a cluster. In the Core Console, a cluster is orga

Seite 103

Protecting Server Clusters | 191Protecting a ClusterThis topic describes how to add a cluster for protection in AppAssure 5. When you add a cluster to

Seite 104 - Click OK

192 | Protecting Server Clusters b. In the Volumes dialog box, select the volume(s) to protect, and then click Edit. c. In the Protection Schedule di

Seite 105

Protecting Server Clusters | 1933. In the Protect Cluster Node dialog box, select or enter as appropriate the following information, and then click Co

Seite 106

194 | Protecting Server Clusters 1. Do one of the following.  Navigate to the cluster that contains the node you want to modify, click the Machines

Seite 107 - Viewing License Information

Protecting Server Clusters | 195 In the Core Console, click the Machines tab, and then select the cluster you wish to modify. Or, in the left naviga

Seite 108

196 | Protecting Server Clusters 4. If you selected Custom alert settings, do the following:a. Click Add Group to add a new notification group for se

Seite 109

Protecting Server Clusters | 197 In the Core Console, click the Machines tab, and then select the cluster you wish to modify. Or, in the left naviga

Seite 110 - Modifying Transfer Settings

198 | Protecting Server Clusters  Rollback. Restores backup information for a protected cluster.To modify cluster transfer settings1. Do one of the

Seite 111

Protecting Server Clusters | 199 In the Core Console, click the Machines tab, and then select the cluster you wish to view. Or, in the left navigati

Seite 112 - To modify transfer settings

Notes, Cautions and WarningsInformation in this publication is subject to change without notice.© 2013 Dell Inc. All rights reserved.Reproduction of t

Seite 113

20 | Introduction to AppAssure 5 RepositoryThe AppAssure repository uses deduplication volume manager (DVM) to implement a volume manager that provid

Seite 114 - Restarting a Service

200 | Protecting Server Clusters For information about viewing summary and status information for an individual machine or node in the cluster, see “

Seite 115 - Viewing Machine Logs

Protecting Server Clusters | 201Managing Snapshots for a ClusterIn AppAssure 5, you can manage snapshots by forcing a snapshot or by pausing current s

Seite 116 - Replicating a New Agent

202 | Protecting Server Clusters 3. In the Pause Protection dialog box, select one of the options described in the following table.Dismounting Local

Seite 117 - Managing Machines

Protecting Server Clusters | 2032. Perform a rollback using the standard AppAssure procedure for the machine as described in “Performing a Rollback” o

Seite 118

204 | Protecting Server Clusters Removing a Cluster from ProtectionComplete the steps in the following procedure to remove a cluster from protection.

Seite 119

Protecting Server Clusters | 205Removing All Nodes in a Cluster from ProtectionComplete the steps in this procedure to remove all nodes in a cluster f

Seite 120

206 | Protecting Server Clusters 3. In the Start Time drop-down calendar, select a start date, and then enter a start time for the report.NOTE: No da

Seite 121 - Managing Multiple Machines

Reporting | 207This chapter provides an overview of reporting available in AppAssure 5. It consists of the following topics: About Reports on page 20

Seite 122 -  Machines on any other host

208 | Reporting About the Reports ToolbarThe toolbar available for all reports lets you print and save in two different ways. The following table des

Seite 123

Reporting | 209 Time Total WorkFor information about how to generate a report, see “Generating a Report for a Core or Agent” on page 210.About Error

Seite 124

Introduction to AppAssure 5 | 21The typical disk layout of a server consists of the operating system, application, and data. In most environments, the

Seite 125

210 | Reporting Details about the repositories are presented in a column view with the following categories: Name Data Path Metadata Path Allocat

Seite 126

Reporting | 2114. In the left navigation area, select the report you want to run. The reports available depend on the selection you made in Step 1 and

Seite 127

212 | Reporting To generate a report from the Central Management Console1. From the Central Management Console Welcome screen, click the drop-down me

Seite 128

Scripting | 213This appendix describes the scripts that can be used by administrators at designated occurrences in AppAssure 5 for Windows and Linux.

Seite 129 - Protecting Multiple Machines

214 | Scripting About PowerShell Scripting in AppAssure 5Windows PowerShell is a Microsoft .NET Framework-connected environment designed for administ

Seite 130

Scripting | 215Testing PowerShell ScriptsIf you want to test the scripts you plan to run, you can do so by using the PowerShell graphical editor, powe

Seite 131

216 | Scripting AgentTransferConfiguration (namespace Replay.Common.Contracts.Transfer)The following table presents the available objects for the Age

Seite 132 - To view task details

Scripting | 217BackgroundJobRequest (namespace Replay.Core.Contracts.BackgroundJobs)The following table presents the available objects for the Backgro

Seite 133 - Viewing Recovery Points

218 | Scripting NightlyAttachabilityJobRequest (namespace Replay.Core.Contracts.Sql)Inherits its values from the parameter, BackgroundJobRequest.Roll

Seite 134 - To view recovery points

Scripting | 219TransferPrescriptParameter (namespace Replay.Common.Contracts.PowerShellExecution)The following table presents the available objects fo

Seite 135

22 | Introduction to AppAssure 5 EncryptionAppAssure 5 provides integrated encryption to protect backups and data-at-rest from unauthorized access an

Seite 136 -  Click the Machines tab

220 | Scripting public AgentTransferConfiguration TransferConfiguration { get; set; } Gets or sets the transfer configuration.AgentTransferConfigurat

Seite 137

Scripting | 221public AgentTransferConfiguration TransferConfiguration { get; set; } (cont.)ExcludedWriterIds - collection of VSS writer IDs which s

Seite 138

222 | Scripting TransferPostscriptParameter (namespace Replay.Common.Contracts.PowerShellExecution)The following table presents the available objects

Seite 139 - Removing Recovery Points

Scripting | 223public AgentTransferConfiguration TransferConfiguration { get; set; } Gets or sets the transfer configuration.AgentTransferConfiguratio

Seite 140 - To remove recovery points

224 | Scripting public AgentTransferConfiguration TransferConfiguration { get; set; } (cont.)ExcludedWriterIds - collection of VSS writer IDs which

Seite 141 - Forcing a Snapshot

Scripting | 225VirtualMachineLocation (namespace Replay.Common.Contracts.Virtualization)The following table presents the available objects for the Vir

Seite 142 - Restoring Data

226 | Scripting VolumeNameCollection (namespace Replay.Common.Contracts.Metadata.Storage)Inherits its values from the parameter, System.Collections.O

Seite 143

Scripting | 227PreTransferScript.ps1The PreTransferScript is executed on the agent side prior to transferring a snapshot.Sample PreTransferScript# rec

Seite 144 -  Hyper-V Export

228 | Scripting Sample PostTransferScript# receiving parameter from transfer jobparam([object] $TransferPostscriptParameter)# building path to Agent&

Seite 145

Scripting | 229PreExportScript.ps1The PreExportScript is executed on the Core side prior to any export job.Sample PreExportScript# receiving parameter

Seite 146

Introduction to AppAssure 5 | 23ReplicationReplication is the process of copying recovery points and transmitting them to a secondary location for the

Seite 147

230 | Scripting PostExportScript.ps1The PostExportScript is executed on the Core side after any export job.NOTE: There are no input parameters for th

Seite 148

Scripting | 231PreNightlyJobScript.ps1The PreNightlyJobScript is executed before every nighty job on Core side. It has $JobClassName parameter, that h

Seite 149

232 | Scripting echo 'AgentId:' $NightlyAttachabilityJobRequestObject.AgentId; echo 'IsNightlyJob:&apos

Seite 150

Scripting | 233# working with Checksum Check Job ChecksumCheckJob { $ChecksumCheckJobRequestObject = $ChecksumCheckJobRequest -as [Replay.Co

Seite 151

234 | Scripting }}PostNightlyJobScript.ps1The PostNightlyJobScript is executed after every nighty job on Core side. It has $JobClassName paramete

Seite 152

Scripting | 235 $NightlyAttachabilityJobRequestObject = $NightlyAttachabilityJobRequest -as [Replay.Core.Contracts.Sql.NightlyAttachabilityJobR

Seite 153 - Performing a Rollback

236 | Scripting echo 'Agents GUIDs:' foreach ($a in $AgentsCollection) { echo $a }

Seite 154

Scripting | 237 else { echo 'TransferConfiguration:' $TransferJobRequestObject.TransferConfiguration; e

Seite 155

238 | Scripting You can add available objects from the TransferPrescript parameter or add your own commands to the PreTransferScript.sh and PostTrans

Seite 156

Scripting | 239TransferPostscriptParameterThe following table presents the available objects for the TransferPostscript parameter.public string Key {

Seite 157 - Windows Machine

24 | Introduction to AppAssure 5 Replication begins with seeding: the initial transfer of deduplicated base images and incremental snapshots of the p

Seite 158

240 | Scripting Sample Bourne Shell ScriptsThe following sample scripts are provided to assist administrative users in executing Bourne Shell scripts

Seite 159 - Managing a Windows Boot Image

Scripting | 241TransferPrescriptParameter_ForceBaseImage=$TransferPrescriptParameter_ForceBaseImageTransferPrescriptParameter_IsLogTruncation=$Transfe

Seite 160 - To create a boot CD ISO image

242 | Scripting This page is intentionally left blank.

Seite 161 - Creating Connections

Glossary | 243AgentAn agent is a machine or server that is protected or to be protected by AppAssure 5.AppAssure 5AppAssure 5 sets a new standard for

Seite 162

244 | Glossary CoreThe AppAssure 5 Core is the central component of the AppAssure architecture. The Core provides the essential services for backup,

Seite 163 - Accessing the ISO Image

Glossary | 245MachineA machine, sometimes referred to as an agent, is a physical or virtual machine or server that is protected by the AppAssure 5 Cor

Seite 164 -  AppAssure 5 Agent software

246 | Glossary ReplicationReplication is self-optimizing with a unique read-match-write (RMW) algorithm that is tightly coupled with deduplication. I

Seite 165

Glossary | 247Target CoreThe target core, which is sometimes referred to as replica core, is the AppAssure 5 Core receiving the replicated data from t

Seite 166

248 | Glossary This page intentionally left blank.

Seite 167

Index | 1Aabout - 80, - 178Active Directorydeploying to multiple machines - 122agentdeploying when protecting an agent - 94replicating - 116reporting

Seite 168

Introduction to AppAssure 5 | 25Retention policies enforce the periods of time in which backups are stored on short-term (fast and expensive) media. S

Seite 169 - Viewing the Recovery Progress

2 | IndexCentral Management Console Core Reportsgenerating - 211checksum checksforcing - 87cloudabout - 26clustersnapshot, forcing - 201snapshot, pau

Seite 170 - Repairing Startup Problems

Index | 3Llaunching, from command line - 179license informationviewing - 107license keychanging - 31licensesmanaging - 30live cdloading - 174Live DVD

Seite 171 - Machines

4 | Indexprotection schedulesmodifying - 108modifying for clusters - 197Rrecoverymanaging - 73recovery pointmounting for Linux machines - 138mounting

Seite 172

Index | 5input parameters - 215, - 238NightlyAttachabilityJobRequest - 218powershell.exe.config - 214RollupJobRequest - 218TakeSnapshotResponse - 218

Seite 174 - 2. Access the Downloads area

26 | Introduction to AppAssure 5 Virtualization and CloudThe AppAssure 5 Core is cloud-ready, which allows you to leverage the compute capacity of th

Seite 175 - Managing Linux Partitions

Introduction to AppAssure 5 | 27Service Management APIsAppAssure 5 comes bundled with a set of service management APIs and provides programmatic acces

Seite 176

28 | Introduction to AppAssure 5 This page is intentionally left blank.

Seite 177

Working with the AppAssure 5 Core | 29This chapter describes the various aspects of working with, configuring, and managing the AppAssure 5 Core. It i

Seite 178 - Starting the Screen Utility

Contents | 3Chapter 1: What’s New in AppAssure 5What’s New in AppAssure 5 User Guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 179

30 | Working with the AppAssure 5 Core Accessing the AppAssure 5 Core ConsoleComplete the following steps to access the AppAssure 5 Core Console.To a

Seite 180 -  Location of the volume

Working with the AppAssure 5 Core | 31The Licensing page includes the following information:  License type License status License pool size Number

Seite 181

32 | Working with the AppAssure 5 Core 2. Click Licensing.The Licensing page appears.3. From the License Server option, click Contact Now.Managing Ap

Seite 182

Working with the AppAssure 5 Core | 333. In the Start Time text box, enter a new start time.4. Click OK.Modifying the Transfer Queue SettingsTransfer

Seite 183 - Command Line

34 | Working with the AppAssure 5 Core Configuring Deduplication Cache SettingsComplete the steps in this procedure to configure deduplication cache

Seite 184

Working with the AppAssure 5 Core | 354. Click OK.Modifying Database Connection SettingsComplete the steps in this procedure to modify the database co

Seite 185

36 | Working with the AppAssure 5 Core 4. Click Test Connection to verify your settings.5. Click Save.About RepositoriesA repository is used to store

Seite 186 - Viewing Events and Alerts

Working with the AppAssure 5 Core | 37When you create a repository, the Core pre-allocates the space required for storing data and metadata in the spe

Seite 187

38 | Working with the AppAssure 5 Core 4. Click Add Storage Location to define the specific storage location or volume for the repository. NOTE: AppA

Seite 188

Working with the AppAssure 5 Core | 396. In the Details pane, click Show/Hide Details and enter the details for the storage location as described in t

Seite 189 - Protecting Server Clusters

4 | ContentsManaging AppAssure 5 Core Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 32

Seite 190 -  Basic disks

40 | Working with the AppAssure 5 Core Viewing Details about a RepositoryComplete the following step to view the details for a repository.To view det

Seite 191

Working with the AppAssure 5 Core | 412. Click the right angle bracket > symbol next to the Status column of the repository that you want to modify

Seite 192 - To protect nodes in a cluster

42 | Working with the AppAssure 5 Core  Select Add file on local disk to specify a local machine and then enter the information as described in the

Seite 193

Working with the AppAssure 5 Core | 434. In the Details pane, click Show/Hide Details and enter the details for the storage location as described in t

Seite 194 - Modifying Cluster Settings

44 | Working with the AppAssure 5 Core Checking a RepositoryAppAssure 5 provides the ability to perform a diagnostic check of a repository volume whe

Seite 195

Working with the AppAssure 5 Core | 45Key security concepts and considerations include: Encryption is performed using 256 Bit AES in Cipher Block Cha

Seite 196

46 | Working with the AppAssure 5 Core To edit an encryption key1. Navigate to the AppAssure 5 Core, and then click the Configuration tab.2. From the

Seite 197

Working with the AppAssure 5 Core | 473. Click the Actions drop-down menu, and then click Import.The Import Key dialog box displays.4. In the Import K

Seite 198

48 | Working with the AppAssure 5 Core Understanding ReplicationThis section provides conceptual and procedural information to help you understand an

Seite 199 - Viewing Summary Information

Working with the AppAssure 5 Core | 49Possible replication configurations include: Point to Point. Replicates a single agent from a single source cor

Seite 200

Contents | 5Managing Events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

Seite 201 - 1. Do one of the following:

50 | Working with the AppAssure 5 Core About SeedingReplication begins with seeding: the initial transfer of deduplicated base images and incremental

Seite 202

Working with the AppAssure 5 Core | 51About Failover and Failback in AppAssure 5In the case of a severe outage in which your source core and agents fa

Seite 203 - Replicating Cluster Data

52 | Working with the AppAssure 5 Core Performance Considerations for Replicated Data TransferIf the bandwidth between the source core and the target

Seite 204

Working with the AppAssure 5 Core | 53If a link fails during data transfer, replication resumes from the previous failure point of the transfer once l

Seite 205

54 | Working with the AppAssure 5 Core Configuring the Source Core to Replicate to a Self-Managed Target CoreComplete the steps in the following proc

Seite 206

Working with the AppAssure 5 Core | 559. In the Copy to Seed Drive dialog box, enter the information described in the following table.NOTE: Because la

Seite 207 - Reporting

56 | Working with the AppAssure 5 Core Configuring Replication to a Target Core Managed by a Third PartyComplete the steps in this procedure to confi

Seite 208 - About Compliance Reports

Working with the AppAssure 5 Core | 578. In the Copy to Seed Drive dialog box, enter the information for the seed drive as described in the table belo

Seite 209 - About the Core Summary Report

58 | Working with the AppAssure 5 Core To deny a request without reviewing it, see “Ignoring a Replication Request” on page 58.To review a replicatio

Seite 210 - Agents Summary

Working with the AppAssure 5 Core | 593. Under Pending Replication Requests, click the drop-down menu next to the request you want to ignore, and then

Seite 211

6 | ContentsViewing and Modifying Configuration Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98Viewing System Inf

Seite 212 - 212

60 | Working with the AppAssure 5 Core Abandoning an Outstanding Seed DriveIf you create a seed drive with the intent to consume it on the target cor

Seite 213 - Scripting

Working with the AppAssure 5 Core | 612. On this tab, you can view information about and monitor the status of replication tasks as described in the f

Seite 214 - 214

62 | Working with the AppAssure 5 Core Pausing and Resuming ReplicationYou can pause replication temporarily for the source (outgoing) or target (inc

Seite 215 - Testing PowerShell Scripts

Working with the AppAssure 5 Core | 63 “Removing a Target Core from Replication” on page 63 “Removing a Source Core from Replication” on page 64NOTE

Seite 216 - Method Description

64 | Working with the AppAssure 5 Core To remove a target core from replication1. On the source core, open the AppAssure 5 Core Console, and click to

Seite 217

Working with the AppAssure 5 Core | 65 Perform a virtual machine (VM) export. For more information, see “Exporting Backup Information for your Window

Seite 218 - Replay.Core.Contracts.Sql)

66 | Working with the AppAssure 5 Core Performing Failover on the Target CoreWhen you encounter a disaster situation in which your source core and as

Seite 219 - Scripting

Working with the AppAssure 5 Core | 673. On the Actions menu, click Failback. The Failback Warnings dialog box opens to describe the steps you need to

Seite 220

68 | Working with the AppAssure 5 Core Managing EventsManaging core events assists with the monitoring of the health and usage of the AppAssure 5 Cor

Seite 221 - Scripting

Working with the AppAssure 5 Core | 69 Enable Events Notification Options4. In the description area, enter basic information for the notification gr

Seite 222

Contents | 7Prerequisites for Performing a Bare Metal Restore for a Windows Machine . . . . . . . . . . . 158Managing a Windows Boot Image . . . .

Seite 223 - Scripting

70 | Working with the AppAssure 5 Core 6. In the Notification Options tab, specify how to handle the notification process. The following table descri

Seite 224

Working with the AppAssure 5 Core | 713. In the Email SMTP Settings pane, click Change.The Edit Email Notification Configuration dialog box appears.4.

Seite 225

72 | Working with the AppAssure 5 Core 5. Enter a subject for the email template. It is used to define the subject of the email notification template

Seite 226 - Sample PowerShell Scripts

Working with the AppAssure 5 Core | 734. In the Retain event and job history for: text box, enter the number of days that you want to retain informati

Seite 227 - PostTransferScript.ps1

74 | Working with the AppAssure 5 Core About System InformationAppAssure 5 lets you view information about the AppAssure 5 Core that includes system

Seite 228 - Sample PostTransferScript

Working with the AppAssure 5 Core | 75Downloading the Agent InstallerYou can download and deploy the AppAssure 5 Agent Installer on any machine that w

Seite 229 - PreExportScript.ps1

76 | Working with the AppAssure 5 Core 5. From the Opening LocalMountUtility-Web.exe window, click Save File.The file saves to the local Downloads fo

Seite 230 - PostExportScript.ps1

Working with the AppAssure 5 Core | 773. In the upper-left corner of the AppAssure Local Mount Utility window, click Add Core.4. In the Add Core dialo

Seite 231 - PreNightlyJobScript.ps1

78 | Working with the AppAssure 5 Core 2. From the main AppAssure Local Mount Utility window, expand the Core in the navigation tree to reveal the pr

Seite 232

Working with the AppAssure 5 Core | 79ii. Click Mount.The LMU automatically opens the folder containing the mounted recovery point.NOTE: If you select

Seite 233 - Scripting

8 | ContentsModifying Cluster Transfer Settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197Convertin

Seite 234 - PostNightlyJobScript.ps1

80 | Working with the AppAssure 5 Core 5. To minimize the LMU application, click the X in the upper-right corner of the Local Mount Utility window.6.

Seite 235 - Scripting

Working with the AppAssure 5 Core | 81Accessing Remote Core OptionsComplete the steps in this procedure to access remote core options.To access remote

Seite 236

82 | Working with the AppAssure 5 Core Creating an ArchiveComplete the steps in this procedure to create an archive.To create an archive1. Navigate t

Seite 237

Working with the AppAssure 5 Core | 833. In the Import Archive dialog box, enter the details for importing the archive as described in the following t

Seite 238 - TransferPrescriptParameter

84 | Working with the AppAssure 5 Core Configuring SQL Attachability SettingsPrior to running attachability checks on protected SQL databases, you mu

Seite 239 - TransferPostscriptParameter

Working with the AppAssure 5 Core | 85Configuring Nightly SQL Attachability Checks and Log TruncationComplete the steps in this procedure to have the

Seite 240 - Sample Bourne Shell Scripts

86 | Working with the AppAssure 5 Core Managing Exchange Database Mountability Checks and Log TruncationWhen using AppAssure 5 to back up Microsoft E

Seite 241 - PostTransferScript.sh

Working with the AppAssure 5 Core | 87Forcing a Mountability CheckComplete the steps in this procedure to force the system to perform a mountability c

Seite 242

88 | Working with the AppAssure 5 Core Forcing Log TruncationComplete the steps in this procedure to force log truncation.To force log truncation1. N

Seite 243 - Glossary

Working with the AppAssure 5 Core | 89Recovery Status Point Colors for Exchange DatabasesThe following table lists the status indicators that display

Seite 244 - 244

Contents | 9PreExportScript.ps1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 229

Seite 245

90 | Working with the AppAssure 5 Core This page intentionally left blank.

Seite 246 - 246

Protecting Workstations and Servers | 91This chapter describes how to protect, configure, and manage the agent machines in your AppAssure environment.

Seite 247

92 | Protecting Workstations and Servers About Protecting Workstations and ServersTo protect your data using AppAssure 5, you need to add the worksta

Seite 248 -

Protecting Workstations and Servers | 93 Select the Machines tab, and in the Actions drop-down menu, click Protect Machine.The Connect dialog box dis

Seite 249 - Index

94 | Protecting Workstations and Servers 7. Click Protect.The first time protection is added for a machine, a base image (that is, a snapshot of all

Seite 250 - 2

Protecting Workstations and Servers | 95To deploy agents when protecting an agent.1. From the Connect dialog box, after entering the appropriate conne

Seite 251 - Index

96 | Protecting Workstations and Servers The Deploy Agent dialog box closes. There may be a slight delay before you see the selected agent appear in

Seite 252 - 4

Protecting Workstations and Servers | 97Modifying Exchange Server SettingsIf you are protecting data from a Microsoft Exchange server, you need to con

Seite 253 - Index

98 | Protecting Workstations and Servers 4. You can also modify the logon credentials for SQL Server. To do so, scroll down to the SQL Server Informa

Seite 254 - 6

Protecting Workstations and Servers | 993. Click Change to modify the machine settings as described in the following table.Viewing System Information

Kommentare zu diesen Handbüchern

Keine Kommentare