サポートと今すぐチャット
サポートとのチャット

Rapid Recovery 6.7 - User Guide

Introduction to Rapid Recovery The Core Console Repositories Core settings Protecting machines
About protecting machines with Rapid Recovery Understanding the Rapid Recovery Agent software installer Deploying Agent to multiple machines simultaneously from the Core Console Using the Deploy Agent Software Wizard to deploy to one or more machines Modifying deploy settings Understanding protection schedules Protecting a machine About protecting multiple machines Enabling application support Settings and functions for protected Exchange servers Settings and functions for protected SQL servers
Managing protected machines Snapshots and recovery points Managing privacy Encryption Authentication Replication Events Reporting VM export Restoring data Bare metal restore
About bare metal restore Differences in bare metal restore for Windows and Linux machines Understanding boot CD creation for Windows machines Managing a Linux boot image Performing a bare metal restore using the Restore Machine Wizard Using the Universal Recovery Console for a BMR Performing a bare metal restore for Linux machines Verifying a bare metal restore
Managing aging data Archiving Cloud accounts Core Console references REST APIs Glossary

Protecting a cluster

This topic describes how to add a cluster for protection in Rapid Recovery. When you add a cluster to protection, you need to specify the host name or IP address of the cluster, the cluster application, or one of the cluster nodes or machines that includes the Rapid Recovery Agent software.

NOTE: A repository is used to store the snapshots of data that are captured from your protected nodes. Before you start protecting data in your cluster, you should have set up at least one repository that is associated with your Rapid Recovery Core.

For information about setting up repositories, see Understanding repositories.

  1. From the Rapid Recovery Core Console button bar, click the Protect[Expand drop-down menu] drop-down menu, and then select [Protect cluster] Protect Cluster.

    The Protect Cluster Wizard opens.

  2. On the Welcome page of the wizard, select one of the following options:
    • Typical
    • Advanced (show optional steps)
  3. Optionally, if you want to skip this step the next time you open the Protect Cluster Wizard, select Skip this Welcome page the next time the wizard opens.
  4. Click Next.
  5. On the Connection page of the wizard, enter the following information.
    Table 45: Connect to Cluster settings
    Text Box Description
    Host The host name or IP address of the cluster, the cluster application, or one of the cluster nodes.
    Port The port number on the machine on which the Rapid Recovery Core communicates with the Agent.

    The default port is 8006.

    User name The user name of the domain administrator used to connect to this machine: for example, domain_name\administrator.

    NOTE: The domain name is mandatory. You cannot connect to the cluster using the local administrator user name.

    Password The password used to connect to this machine.
  6. Click Next.

    NOTE: If the cluster nodes already have an older version of the Rapid Recovery Agent installed, an Upgrade page appears in the wizard and offers the opportunity to upgrade the Agent.

  7. On the Nodes page of the wizard, select the nodes that you want to protect.

    The system automatically verifies each machine you selected.

  8. Click Next.

    If the Protection page appears next in the Protect Cluster Wizard, skip to step 11.

    If the Agent software is not yet deployed to the machines you want to protect, or if any of the machines you specified cannot be protected for another reason, then the selected machines appear on the Warnings page.

  9. Optionally, on the Warnings page of the wizard, you can verify any machine by selecting the machine and then clicking Verify in the toolbar.
  10. Optionally, on the Warnings page, select After Agent installation, restart the machines automatically.

    NOTE:Quest recommends this option. You must restart agent machines before they can be protected.

  11. If the status indicates that the machine is reachable, click Next to install the Rapid Recovery Agent software.

    The Protection page appears.

  12. Optionally, on the Protection page, if you want a name other than the IP address to display in the Rapid Recovery Console for this protected machine, then in the Display name field, type a name in the dialog box.

    You can enter up to 64 characters. Do not use the special characters described in the topic prohibited characters. Additionally, do not begin the display name with any of the character combinations described in the topic prohibited phrases.

  13. Select the appropriate protection schedule settings as described below:
    • To use the default protection schedule, in the Schedule Settings option, select Default protection (hourly snapshots of all volumes).

      With a default protection schedule, the Core will take snapshots of all volumes on the protected machine once every hour. To change the protection settings at any time after you close the wizard, including choosing which volumes to protect, go to the Summary page for the specific protected machine.

    • To define a different protection schedule, in the Schedule Settings option, select Custom protection.
  14. Optionally, on the Protection page, if you want a name other than the IP address to display in the Rapid Recovery Core for this protected machine, then in the Display name field, type a name in the dialog box.

    You can enter up to 64 characters. Do not use the special characters described in the topic prohibited characters. Additionally, do not begin the display name with any of the character combinations described in the topic prohibited phrases.

  15. Select the appropriate protection schedule settings as described below:
    • To use the default protection schedule, in the Schedule Settings option, select Default protection (hourly snapshots of all volumes).

      With a default protection schedule, the Core will take snapshots of all volumes on the protected machine once every hour. To change the protection settings at any time after you close the wizard, including choosing which volumes to protect, go to the Summary page for the specific protected machine.

    • To define a different protection schedule, in the Schedule Settings option, select Custom protection.
  16. Proceed with your configuration as follows:
    • If you selected a Typical configuration for the Protect Machine Wizard and specified default protection, and if a repository exists, then click Finish to confirm your choices, close the wizard, and protect the machine you specified.
    • If you selected a Typical configuration for the Protect Machine Wizard and specified default protection, and if no repository exists, then click Next and proceed to step 19 to create a repository.
    • If you selected a Typical configuration for the Protect Machine Wizard and specified custom protection, then click Next and continue to the next step to choose which volumes to protect.
    • If you selected Advanced configuration for the Protect Machine Wizard, and default protection, then click Next and proceed to step 19 to see repository and encryption options.
    • If you selected Advanced configuration for the Protect Machine Wizard and specified custom protection, then click Next and continue to the next step to choose which volumes to protect.
  17. On the Protection Volumes page, select which volumes you want to protect. If any volumes are listed that you do not want to include in protection, click in the Check column to clear the selection. Then click Next.

    NOTE: Typically, it is good practice to protect, at minimum, the System Reserved volume and the volume with the operating system (typically the C drive).

  18. On the Protection Schedule page, define a custom protection schedule and then click Next. For details on defining a custom protection schedule, see Creating custom protection schedules in Simple Mode.

    If you already have repository information configured, and you selected the Advanced option in step 1, then the Encryption page appears. Proceed to step 22.

  19. On the Repository page, do the following: If you already have a repository and want to store the data from this machine for protection in the existing repository, then do the following:
    1. Select Use an existing repository.
    2. Select an existing repository from the list.
    3. Click Next.

    The Encryption page appears. Skip to step 22 to optionally define encryption.

    If you want to create a repository, then on the Repository page, enter the information described in the following table, and then click Next or Finish, as appropriate.
    Table 46: Repository settings
    Text Box Description
    Name Enter the display name of the repository.

    By default, this text box consists of the word Repository and a number, which corresponds to the number of repositories for this Core. For example, if this is the first repository, the default name is Repository 1. Change the name as needed.

    Repository names must contain between 1 and 40 alphanumeric characters, including spaces. Do not use prohibited characters or prohibited phrases.

    Location Enter the location for storing the protected data. This volume should be a primary storage location. The location could be local (a drive on the Core machine) or it could be a CIFS share network drive.

    For a CIFS share, the path must begin with \\. When specifying the path, use only alphanumeric characters, the hyphen, and the period (only to separate host names and domains). The letters a to z are case-insensitive. Do not use spaces. No other symbols or punctuation characters are permitted.

    Caution: Define a dedicated folder within the root for the storage location for your repository. Do not specify the root location. For example, use E:\Repository\, not E:\. If the repository that you are creating in this step is later removed, all files at the storage location of your repository are deleted. If you define your storage location at the root, all other files in the volume (e.g., E:\) are deleted, which could result in catastrophic data loss.

    For example, type X:\Repository\Data.

    When specifying the path, use only alphanumeric characters, the hyphen, and the period (only to separate host names and domains). You can use the backslash character only to define levels in the path. Do not use spaces. No other symbols or punctuation characters are permitted.

    User name Enter a user name for a user with administrative access. This information is only required when the repository location specified is a network path.
    Password Enter the password for the user with administrative access. This information is only required when the repository location specified is a network path.
    Metadata path Enter the location for storing the protected metadata.

    For example, type X:\Repository\Metadata.

    When specifying the path, use only alphanumeric characters, the hyphen, and the period (only to separate host names and domains). You can use the backslash character only to define levels in the path. Do not use spaces. No other symbols or punctuation characters are permitted.

  20. On the Repository Configuration page, configure the amount of space on the disk to allocate to the repository. Quest recommends reserving 20 percent of the volume for metadata, which is the default. Optionally, using the slider control or the Size field, you can allocate more or less space on the volume for the repository.
  21. Optionally, if you want to view and enter detailed information regarding storage location settings, select Show advanced options, and adjust the settings as described in the following table. To hide these options, clear the option Show advanced options. When you have completed your repository configuration, click Next or Finish, as appropriate.
    Table 47: Storage configuration details
    Text Box Description

    Bytes per sector

    Specify the number of bytes you want each sector to include. The default value is 512.

    NOTE: Quest recommends setting the bytes per sector to match the physical sector size of the storage location in which the repository resides. For example, if the disk on the intended storage location has a 4096 byte sector size, change the bytes per sector setting to 4096.

    If using multiple storage locations with different sector sizes, Quest recommends retaining the default setting of 512 bytes per sector.

    Bytes per record

    Specify the average number of bytes per record. The default value is 8192.

    Write caching policy

    The write caching policy controls how the Windows Cache Manager is used in the repository and helps to tune the repository for optimal performance on different configurations. As of release 6.4, the default for this setting is Off.

    Set the value to one of the following:

    • On. If set to On, Windows controls the caching.
    • Off. If set to Off, which is the default, Rapid Recovery controls the caching.
    • Sync. If set to Sync, Windows controls the caching as well as the synchronous input/output.

    If you chose the Advanced option in Step 1, the Encryption page appears.

  22. Optionally, on the Encryption page, if you want to use encryption keys for data stored in the repository, select Encrypt the data at rest in a repository, and then do one of the following:
    • To select an existing encryption key to apply to all new data stored in your repository, select Encrypt data using Core-based encryption with an existing key, and from the Select encryption key drop-down menu, select the encryption key.
    • To define a new encryption key at this time to apply to all future data stored in your repository, select Encrypt data using Core-based encryption with a new key, and then enter information about the key as described in the table below:
    Table 48: Define new encryption key
    Text Box Description
    Name Enter a name for the encryption key.

    Encryption key names must contain between 1 and 64 alphanumeric characters. Do not use prohibited characters or prohibited phrases.

    Description Enter a descriptive comment for the encryption key. This information appears in the Description field when viewing a list of encryption keys in the Rapid Recovery. Descriptions may contain up to 254 characters.

    Best practice is to avoid using prohibited characters and prohibited phrases.

    Passphrase Enter a passphrase used to control access.

    Best practice is to avoid using prohibited characters.

    Record the passphrase in a secure location. Quest Data Protection Support cannot recover a passphrase. Once you create an encryption key and apply it to one or more protected machines, you cannot recover data if you lose the passphrase.

    Confirm passphrase Re-enter the passphrase. It is used to confirm the passphrase entry.
  23. Optionally, on the Encryption page, to encrypt all data that transports over a network, select Encrypt the data in transport over a network. This option is enabled by default, so if you do not want to encrypt data in this fashion, clear this option.
  24. Click Finish to save and apply your settings.

    NOTE: The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) transfers to the repository indicated in your Rapid Recovery Core following the schedule you defined, unless you specified that the Core should initially pause protection. For information on pausing and resuming protection, see Pausing and resuming protection.

Protecting nodes in a cluster

This task requires that you first protect a cluster. For more information, see Protecting a cluster.

This topic describes how to protect the data on a cluster node or machine that has a Rapid Recovery Agent installed. This procedure lets you add individual nodes to protection that you may have omitted when you protected a cluster.

  1. In the Rapid Recovery Core Console, under Protected Machine, click the cluster with the nodes that you want to protect.
  2. On the Summary page for the cluster, click the Protected Nodes.
  3. On the Protected Nodes page, click Protect Cluster Node.
  4. In the Protect Cluster Node dialog box, select or enter as appropriate the following information.
    Table 49: Protect Cluster Node settings
    Text Box Description
    Host A drop-down list of nodes in the cluster available for protection.
    Port The port number on which the Rapid Recovery Core communicates with the Agent on the node.
    User name The user name of the domain administrator used to connect to this node; for example, example_domain\administrator or administrator@example_domain.com.
    Password The password used to connect to this machine.
  5. To add the node, click Connect.
  6. To start protecting this node with default protection settings, go to step 11.

    NOTE: The default settings ensure that all volumes on the machine are protected with a schedule of every 60 minutes.

  7. In the Protect [Node Name] dialog box, if you want to use a repository other than the default setting, use the drop-down list to select a repository.
  8. If you want to secure the recovery points for this cluster using Core-based encryption, use the drop-down list to select an encryption key.
  9. If you do not want protection to begin immediately after completing this procedure, select Initially pause protection.
  10. To enter custom settings (for example, to customize the protection schedule for the shared volumes), do the following:
    1. To customize settings for an individual volume, next to the volume that you want to customize, click Function next to the relevant volume.
    2. See Creating custom protection schedules in Simple Mode.
  11. Click Protect.

Creating custom protection schedules in Simple Mode

The procedure for creating a custom protection schedule from within a protection wizard is identical to the procedure for creating a protection schedule for an existing machine in Simple Mode. Protection schedules created in a wizard or in Simple Mode are not saved as templates. To create templates or multiple protection schedules, see Creating multiple protection schedule periods in Advanced Mode. Complete the steps in this procedure to create custom schedules for using Rapid Recovery to back up data from protected machines.

To create custom protection schedules in Simple Mode

  1. Complete one of the following options:
    • If using a protection wizard (Protect Machine, Protect Multiple Machines, Protecting a Cluster), on the Protection page of the wizard, select Custom protection, and then click Next.
    • If creating a protection schedule for a machine that is already protected, on the Summary page for the protected machine, expand the volumes of the protected machine, select the applicable volumes, and then click Set a Schedule.
    The Protection Schedule page or dialog appears.
  2. On the Protection Schedule page or dialog, complete one of the following options:
    • To set a protection period that runs on set days and at specified times, select Periods, and then continue to step 3.
    • To set a specific time to back up the machine every day, select Daily protection time, and then continue to step 7.
    • To take a backup after a specific number of days, select Every number of days, and then continue to step 7.
  3. To change the interval schedule for any period, complete the following steps:
    1. Create a span of time by selecting a From time and a To time.
    2. For each period, click in the interval text box, and then enter an appropriate interval in minutes.

      For example, highlight the default interval of 60 and replace it with the value 20 to perform snapshots every 20 minutes during this period.

  4. To customize snapshots for peak and off-peak business hours, complete the following steps: set an optimal interval for the peak range, select Take snapshots for the remaining time, and then set an off-peak interval by doing the following:
    1. Select Weekdays.
    2. Set the From and To times to create a span of time during your peak business hours.
    3. In the Every X minutes box, enter an interval in minutes for how often Rapid Recovery should create recovery points during this span of peak business hours.

      For example, highlight the default interval of 60 and replace it with the value 20 to perform snapshots every 20 minutes during the time range you selected for this period.

    4. To schedule snapshots during off-peak business hours, select Take snapshots for the rest of the time.
    5. In the Every X minutes box, enter an interval in minutes for how often Rapid Recovery Core should create recovery points during this span of off-peak business hours.

      For example, because there is less business activity during these hours, and fewer changes to back up, you may decide to take fewer snapshots and keep the default interval of 60 minutes.

  5. Continue to step 7.
  6. To set a single time of day for a single backup to occur daily, select Daily protection time and then enter a time in format HH:MM AM. For example, to do a daily backup at 9:00 PM, enter 09:00 PM.
  7. To define the schedule without beginning backups, select Initially pause protection.

    After you pause protection from the wizard, it remains paused until you explicitly resume it. Once you resume protection, backups occur based on the schedule you established. For more information on resuming protection, see Pausing and resuming protection.

  8. When you are satisfied with changes made to your protection schedule, click Finish or Next, as appropriate.

    If you are using a wizard, proceed to the next step in the wizard. Refer to the procedure for the appropriate wizard to complete any remaining requirements.

For more information, see the following related topics:

Creating multiple protection schedule periods in Advanced Mode

A protection schedule defines when backups are transferred from protected machines to the Rapid Recovery Core. Protection schedules are initially defined using the Protect Machine Wizard or the Protect Multiple Machines Wizard.

You can modify an existing protection schedule at any time from the Summary page for a specific protected machine.

NOTE: For conceptual information about protection schedules, see Understanding protection schedules. For information about protecting a single machine, see Protecting a machine. For information about bulk protect (protecting multiple machines), see About protecting multiple machines. For information on customizing protection periods when protecting an agent using either of these wizards, see Creating custom protection schedules in Simple Mode. For information about modifying an existing protection schedule, see Creating multiple protection schedule periods in Advanced Mode.

Complete the steps in this procedure to modify an existing protection schedule for volumes on a protected machine.

  1. In the Rapid Recovery Core Console, from the list of protected machines, click the name of the machine with the protection schedule that you want to change.
  2. On the Summary page for the machine you selected, in the Volumes pane, expand the volumes of the protected machine, select the applicable volumes, and then click Set a Schedule.

    Initially, all volumes share a protection schedule.

    To select all volumes at once, click in the checkbox in the header row. Click on [Protection group] 
      (Protection Group) to expand the volumes being protected, so you can view all volumes and select one or more.

    NOTE: It is best practice to protect, at minimum, the system reserved volume and the volume with the operating system (typically the C:/ drive).

    The Protection Schedule dialog box appears.
  3. On the Protection Schedule dialog box, do one of the following:
    • If you previously created a protection schedule template and want to apply it to this protected machine, click Advanced mode, select the template from the Templates drop-down list, click OK to confirm, and then go to step 7.
    • If you want to remove an existing time period from the schedule, clear the check box next to each time period option, and then go to Options include the following:
      • Weekdays (Mon - Fri): This range of time denotes a typical five-day work week.
      • Weekends (Sat, Sun): This range of time denotes a typical weekend.

    If you want to save a new protection schedule as a template, click Advanced mode, and then continue to step 4.

  4. A period is a specified span of time during which you determine how many minutes should pass between each snapshot taken. When the weekday start and end times are from 12:00 AM to 11:59 PM, then a single period exists. To change the start or end time of a defined period, do the following:
    1. Select the appropriate time period.
    2. To change the start time for this period, use the clock icon under Start Time.

      For example, use the arrows to show a time of 08:00 AM.

    3. To change the end time for this period, use the clock icon under End Time.

      For example, use the arrows to show a time of 06:00 PM.

    4. Change the interval according to your requirements. For example, if defining a peak period, change the interval from 60 minutes to 20 minutes to take snapshots three times hourly.

      A blue bar provides a visual representation of this interval.

  5. If you defined a period other than 12:00 AM to 11:59 PM in step 7, and you want backups to occur in the remaining time ranges, you must add more periods to define protection by doing the following:
    1. Under the appropriate category, click Add Period.
    2. Click the clock icon and select the desired start and end times, as appropriate.

      For example, set a start time of 12:00 AM and an end time of 07:59 AM.

    3. Change the interval according to your requirements. For example, if defining an off-peak period, change the interval from 60 minutes to 120 minutes to take snapshots every two hours.
  6. If needed, continue to create more periods, setting start and end times and intervals as appropriate.

    NOTE: If you want to remove a period you added, click the trash icon to the far right of that period, and then click Yes to confirm.

  7. To create a template from the schedule you set, click Save as a Template.
  8. In the Save Template dialog box, enter a name for the template, and then click Save.
  9. When your protection schedule meets your requirements, click Apply.
    The protection Schedule dialog box closes.

For more information, see Understanding protection schedules.

関連ドキュメント

The document was helpful.

評価を選択

I easily found the information I needed.

評価を選択