Chatta subito con l'assistenza
Chat con il supporto

Rapid Recovery 6.6 - User Guide

Introduction to Rapid Recovery The Core Console Repositories Core settings Protecting machines
About protecting machines with Rapid Recovery Understanding the Rapid Recovery Agent software installer Deploying Agent to multiple machines simultaneously from the Core Console Using the Deploy Agent Software Wizard to deploy to one or more machines Modifying deploy settings Understanding protection schedules Protecting a machine About protecting multiple machines Enabling application support Settings and functions for protected Exchange servers Settings and functions for protected SQL servers
Managing protected machines Snapshots and recovery points Managing privacy Encryption Credentials Vault Replication Events Reporting VM export Restoring data Bare metal restore
About bare metal restore Differences in bare metal restore for Windows and Linux machines Understanding boot CD creation for Windows machines Managing a Linux boot image Performing a bare metal restore using the Restore Machine Wizard Using the Universal Recovery Console for a BMR Performing a bare metal restore for Linux machines Verifying a bare metal restore
Managing aging data Archiving Cloud accounts Core Console references REST APIs Glossary

Deploying to machines on a VMware vCenter/ESXi virtual host

Use this procedure to simultaneously deploy the Rapid Recovery Agent software to one or more machines on a VMware vCenter/ESXi virtual host.

Before starting this procedure, you must have the following information:
  • Logon credentials for the VMware vCenter/ESXi virtual host.
  • Host location.
  • Logon credentials for each machine you want to protect.

NOTE: All virtual machines must have VMware Tools installed; otherwise, Rapid Recovery cannot detect the host name of the virtual machine to which to deploy. In lieu of the host name, Rapid Recovery uses the virtual machine name, which may cause issues if the host name is different from the virtual machine name

  1. From the Rapid Recovery Core Console button bar, click the Protect[Expand drop-down menu] drop-down menu, , and then select [Deploy Agent]Deploy Agent Software.
    The Deploy Agent Software Wizard opens.
  2. On the Connection page of the wizard, from the Source drop-down list, select vCenter / ESXi.
  3. Enter the host information and logon credentials as described in the following table.
    Table 40: vCenter/ESXi connection settings
    Text Box Description
    Host The name or IP address of the VMware vCenter Server/ESXi virtual host.
    Port The port used to connect to the virtual host.

    The default setting is 443.

    User name The user name used to connect to the virtual host; for example, Administrator or, if the machine is in a domain, [domain name]\Administrator.
    Password The secure password used to connect to this virtual host.
  4. Click Next.
  5. On the Machines page of the wizard, select one of the following options from the drop-down menu:
    • Hosts and Clusters
    • VMs and Templates
  6. Expand the list of machines, and then select the VMs to which you want to deploy the software.
    A notification appears if Rapid Recovery detects that a machine is offline or that VMware Tools are not installed.
  7. If you want to restart the machines automatically after deployment, select After Agent installation, restart the machines automatically (Recommended).
  8. Click Next.
    Rapid Recovery automatically verifies each machine you selected.
  9. On the Adjustments page of the wizard, enter the credentials for each machine in the following format: hostname::username::password.

    NOTE: Enter one machine on each line.

  10. Click Finish.
    The system automatically verifies each machine that you selected.

    If Rapid Recoverydetects any concerns during automatic verification, the wizard progresses to a Warnings page, where you can clear machines from selection and manually verify the selected machines. If the machines you added pass the automatic verification, they appear on the Deploy Agent to Machines pane.

  11. If the Warning page appeared and you are still satisfied with your selections, click Finish again.
The Rapid Recovery Agent software deploys to the specified machines.

Caution: The machines are not yet protected. Protection begins after you complete the steps in the topic Protecting multiple machines on a VMware vCenter/ESXi virtual host.

Deploying an upgrade of the Rapid Recovery Agent software to protected machines

You can use the Deploy Agent Software Wizard to push an upgrade of the Rapid Recovery Agent software to Windows machines that are already protected by the local Rapid Recovery Core.

NOTE: For Linux users, if the prior version of Agent is branded AppAssure (release 5.4.3 or earlier), you must first remove the Agent software using the shell script appropriate to your specific AppAssure Agent version. Removing AppAssure Agent after installing Rapid Recovery Agent can break the connection between the Linux machine and the Core. For more information on uninstalling AppAssure Agent from a Linux machine, see "Uninstalling the AppAssure Agent software from a Linux machine" in the Rapid Recovery Installation and Upgrade Guide.

  1. From the Rapid Recovery Core Console button bar, click the Protect[Expand drop-down menu] drop-down menu, and then select [Deploy Agent] Deploy Agent Software.
    The Deploy Agent Software Wizard opens.
  2. On the Connection page of the wizard, from the Source drop-down list, select Local Core.
  3. Click Next.
  4. On the Machines page of the wizard, select the protected machines to which you want to deploy an upgrade of the Rapid Recovery Agent software.

    NOTE: At this time, you cannot use this process to update protected Linux machines.

  5. Best practice is to restart each machine after installing or updating the Agent software. If you want to restart the machines after deploying, leave the default option After Agent installation, restart the machines automatically (Recommended). If you do not want to restart upgraded machines immediately, clear this option.
  6. Click Finish.
    The system automatically verifies each machine that you selected.

    If Rapid Recovery detects any concerns during automatic verification, the wizard progresses to a Warnings page, where you can clear machines from selection and manually verify the selected machines. If the machines you added pass the automatic verification, they appear on the Deploy Agent to Machines pane.

  7. If the Warning page appeared, and you are still satisfied with your selections, click Finish again.

Deploying to machines manually

Use the following procedure to deploy the Rapid Recovery Agent to multiple machines on any type of host other than the local Core, Active Directory, vCenter/ESXi, or Hyper-V.

Caution: If AppAssure Agent was previously installed on a Linux machine, then before installing Rapid Recovery Agent, remove the AppAssure Agent from the machine using a shell script. For information about removing the Agent from a Linux machine, see the topic "Uninstalling the AppAssure Agent software from a Linux machine" in the Rapid Recovery Installation and Upgrade Guide. To successfully deploy the Agent software to Linux machines, see the prerequisites in the topic "About installing the Agent software on Linux machines" in the same document.

  1. From the Rapid Recovery Core Console button bar, click the Protect[Expand drop-down menu] drop-down menu, , and then select [Deploy Agent]Deploy Agent Software.
    The Deploy Agent Software Wizard opens.
  2. On the Connection page of the wizard, from the Source drop-down list, select Manually.
  3. Click Next.
  4. On the Machines page of the wizard, for each machine to which you want to deploy Agent, enter the machine details in the dialog box. Press Enter to separate information for each machine. Use the format hostname::username::password::port. For Windows machines, the port setting is optional. For Linux machines, always include the SSH port, which by default is 22. Examples include:
    	10.255.255.255::administrator::&11@yYz90z
    	abc-host-00-1::administrator::99!zU$o83r::8006
    	Linux-host-00-2::administrator::p@$$w0rD::22
  5. If you want to restart the machines automatically after deployment, select After Agent installation, restart the machines automatically (Recommended).
  6. Click Finish.
    The system automatically verifies each machine that you selected.

    If Rapid Recovery detects any concerns during automatic verification, the wizard progresses to a Warnings page, where you can clear machines from selection and manually verify the selected machines. If the machines you added pass the automatic verification, they appear on the Deploy Agent to Machines pane.

  7. If the Warning page appeared, and you are still satisfied with your selections, click Finish again.
The Rapid Recovery Agent software deploys to the specified machines.

Caution: The machines are not yet protected. Protection begins after you complete the steps in the topic Protecting multiple machines manually.

Verifying the deployment to multiple machines

Once you have deployed the Rapid Recovery Agent software to two or more machines simultaneously, you can verify the success by viewing each machine listed under the Protected Machines menu.

You can also view information regarding the bulk deploy process from the Events page. Complete the steps in this procedure to verify the deployment.

  1. From the Rapid Recovery Core Console, click [Events]
    (Events), and then click Alerts.
    Alert events appear in the list, showing the time the event initiated and a message. For each successful deployment of the Agent software, you will see an alert indicating that the protected machine has been added.
  2. Optionally, click on any link for a protected machine.

    The Summary page for the selected machine appears, showing pertinent information including:

    • the host name of the protected machine
    • the last snapshot, if applicable
    • the time of the next scheduled snapshot, based on the protection schedule for the selected machine
    • the encryption key, if any, used for this protected machine
    • the version of the software.
Related Documents

The document was helpful.

Seleziona valutazione

I easily found the information I needed.

Seleziona valutazione