You can use the Start-ProtectEsxServer
cmdlet to add a VMware ESXi virtual machine to protection.
The usage for the command is as follows:
Start-ProtectEsxServer -core [host name] -user [user name] -password [password] -repository [repository name] -server [name | IP address] -serverusername [user name] -serverpassword [password for server login] -serverport [port] -virtualMachines [virtual machines collection | all] -autoProtect [object ID or name collection]
The following table describes the options available for the Start-ProtectEsxServer
command:
Option | Description |
---|---|
-?? |
Display this help message. |
-core |
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. |
-user |
Optional. The user name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. |
-password |
Optional. The password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. |
-repository |
Required. The name of the repository that is associated with the Core that you want to use to protect the virtual machine.
Note: You must enclose the name in double quotes. |
-server |
The name or IP address for the vCenter or ESXi server you want to protect. |
-serverusername |
The user name for logging in to the vCenter or ESXi server that you want to protect. |
-serverpassword |
The password for logging in to the vCenter or ESXi server that you want to protect. |
-serverport |
Optional. The port number for the vCenter or ESXi server that you want to protect. |
-virtualmachines |
Optional. This option lets you list the virtual machines that you want to protect. |
-autoprotect |
Optional. This option lets you list new virtual machines that you want to automatically protect. |
Protect specific virtual machines from a vCenter or ESXi server with the Core:
>Start-ProtectEsxServer -core 10.10.10.10 -user admin -password password -repository "Repository 1" -server 10.10.8.150 -serverport 443 -serverusername root -serverpassword password -virtualmachines "VM1" "VM2" -autoprotect "Folder1"
The Start-ProtectHyperVCluster
cmdlet adds a Hyper-V cluster to protection by a Core using agentless protection.
The usage for the command is as follows:
Start-ProtectHyperVCluster -core [host name] -user [user name] -password [password] -repository [name] -server [name | IP address] -serverusername [user name] -serverpassword [password] -serverport [port] -virtualmachines [virtual machines collection | all] -isagentprotection
The following table describes the options available for the Start-ProtectHyperVCluster
command:
Option | Description |
---|---|
-? |
Display this help message. |
-core |
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. |
-user |
Optional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. |
-password |
Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. |
-repository |
Name of a repository on the Core to which the protected machine data should be stored. The name must be enclosed in double quotes. |
-server |
Name or IP address of the Hyper-V server that you want to protect. |
-serverusername |
User name for the Hyper-V server to be protected. |
-serverpassword |
Password for the Hyper-V server to be protected. |
-serverport |
Optional. Protected Hyper-V server port number. |
-virtualmachines |
Optional. List of virtual machines to protect. Values must be enclosed in double quotes and separated by a space. If you exclude this parameter, only the Hyper-V cluster container is protected. |
-isagentprotection |
Optional. Use this option to protect a cluster with an Agent in each guest virtual machine, which is false by default. |
-autoprotect |
Optional. This option enables the autoprotect feature for the Hyper-V server. It is not compatible with the -isagentprotection option. |
Protect specific virtual machines of a Hyper-V cluster:
>Start-ProtectHyperVCluster -core 10.10.10.10 -username admin -password password -repository “Repository 1” -server 10.10.8.150 -serverport 443 -serverusername root clusterpassword password -virtualmachines “VM1” "VM2" -autoprotect
The Start-ProtectHyperVServer
cmdlet adds a Hyper-V server to protection by a Core using agentless protection.
The usage for the command is as follows:
Start-ProtectHyperVServer -core [host name] -user [user name] -password [password] -repository [name] -server [name | IP address] -serverusername [user name] -serverpassword [password] -serverport [port] -virtualmachines [virtual machines collection | all] -isagentprotection
The following table describes the options available for the Start-ProtectHyperVServer
command:
Option | Description |
---|---|
-? |
Display this help message. |
-core |
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. |
-user |
Optional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. |
-password |
Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. |
-repository |
Name of a repository on the Core to which the protected machine data should be stored. The name must be enclosed in double quotes. |
-server |
Name or IP address of the Hyper-V server that you want to protect. |
-serverusername |
User name for the Hyper-V server to be protected. |
-serverpassword |
Password for the Hyper-V server to be protected. |
-serverport |
Optional. Protected Hyper-V server port number. |
-virtualmachines |
Optional. List of virtual machines to protect. Values must be enclosed in double quotes and separated by a space. If you exclude this parameter, only the Hyper-V cluster container is protected. |
Protect specific virtual machines of a Hyper-V server:
>Start-ProtectHyperVServer -core 10.10.10.10 -username admin -password password -repository “Repository 1” -server 10.10.8.150 -serverport 443 -serverusername root clusterpassword password -virtualmachines “VM1” "VM2"
The Start-RepositoryCheck
PowerShell cmdlet lets you check the integrity of a DVM repository.
The usage for the command is as follows:
Start-RepositoryCheck -name [repository name] | -all [check all repositories] -password [password] -force
The following table describes the options available for the Start-RepositoryCheck
command:
Option | Description |
---|---|
-? |
Display this help message. |
-core |
Optional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine. |
-user |
Optional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password. If none are provided, then the logged-on user's credentials will be used. |
-password |
Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a log on.
If none are provided, then the logged-on user's credentials will be used. |
-repository |
Required. The name of the repository that you want to check. |
-all |
Optional. Check all repositories associated with this Core. |
-force |
Optional. Perform the repository check without confirmation. |
Start checking a DVM repository:
>Start-RepositoryCheck -repository newRepository1 -core 10.10.10.10:8006 -user administrator -password 23WE@#$sdd
© ALL RIGHTS RESERVED. Conditions d’utilisation Confidentialité Cookie Preference Center