This procedure requires that you first create a repository that is accessible from the Rapid Recovery Core. For more information, see Understanding repositories.
The Rapid Snap for Virtual feature lets you protect Hyper-V virtual machines or clusters agentlessly by installing the Rapid Recovery Agent on only the Hyper-V host instead of every virtual machine (VM).
|
Caution: Quest recommends that you limit agentless protection to no more than 200 VMs at once. For example, do not select more than 200 VMs when using the Protect Multiple Machines Wizard. Protecting more than 200 VMs results in slow performance. There is no limit to how many VMs a Core can agentlessly protect over time. For example, you could protect 200 VMs today and another 200 VMs tomorrow. |
The Protect Multiple Machines Wizard opens.
Optionally, if you do not wish to see the Welcome page for the Protect Machine Wizard in the future, select the option Skip this Welcome page the next time the wizard opens.
Text Box | Description |
---|---|
Host |
The name or IP address of the virtual host. |
Port |
The port used to connect to the virtual host. The default setting is 8006. |
User name |
The user name used to connect to this machine; for example, Administrator (or, if the machine is in a domain, [domain name]\Administrator). Enter the user name or, to use a set of credentials saved to Credentials Vault, use the drop-down list and select a user name. Optionally, to save your credentials to Credentials Vault, click the plus sign next to the text box. For more information, see Credentials Vault. |
Password |
The secure password used to connect to this virtual host. |
|
Caution: Quest recommends that you limit agentless protection to no more than 200 VMs at once. For example, do not select more than 200 VMs when using the Protect Multiple Machines Wizard. Protecting more than 200 VMs results in slow performance. There is no limit to how many VMs a Core can agentlessly protect over time. For example, you could protect 200 VMs today and another 200 VMs tomorrow. |
Option | Description |
---|---|
Install the Agent on the host on which the virtual disks for VMs are located |
Installs the Agent on the same machine as the virtual disks, which may be located on Hyper-V Server, a Hyper-V cluster node, SMB Server, or Scale-Out File Server (SOFS). If necessary, the host restarts automatically after the installation is complete. This option is selected by default. |
Upgrade the Agent on the hosts on which virtual disks for VMs are located |
If the Agent is located on the same host as the virtual disks, this option upgrades the Agent to the latest release. Virtual disks may be located on Hyper-V Server, a Hyper-V cluster node, SMB Server, or Scale-Out File Server. If necessary, the host restarts automatically after the upgrade is complete. This option is selected by default. |
Protect SMB/SOFS server if a disk is located on an SMB or SOFS server |
If any of the virtual disks for VMs are located on an SMB Server or Scale-Out File Server, then the server that hosts the share is also protected. This option is selected by default. |
Protect machine if it is orphaned by this Core |
Lets the Core protect a machine that was previously protected but was then removed from protection because the hypervisor became unreachable. This option is selected by default. |
Protect machine if it already has recovery points |
Shows existing recovery points alongside the new recovery points after protection. This option is selected by default. |
Protect machine agentlessly if it is already protected with the Rapid Recovery Agent |
If a Core detects that a machine is already protected by the Rapid Recovery Agent, this option permits duplicate protection (both agentlessly and with the Agent). The protected VM must be powered on and Integration Services must be installed. |
Protect machine with both supported and unsupported virtual disk types |
The Core does not support VHD or VHD Set virtual disk formats. If selected, only the support virtual disk types will be protected. If not selected, virtual machines with an unsupported disk format will not be protected. |
Save Rules |
Saves the selected rules to use for future VM agentless protection on this hypervisor host. These rules apply to machines protected automatically or by using the Protect Multiple Machines wizard. |
With a default protection schedule, the Core will take snapshots of all volumes on the protected machine once every hour. To change the protection settings at any time after you close the wizard, including choosing which volumes to protect, go to the Summary page for the specific protected machine.
Schedule options are added to the wizard workflow.
Option | Description | ||
---|---|---|---|
Enable Active Block Mapping | Lets you enable or disable the ABM feature. | ||
Enable swap file blocks exclusion |
Excludes the content of system files, such as pagefile.sys, hyberfill.sys, and swapfile.sys, from the backup. | ||
Exclude subdirectories |
Lets you exclude specific files by specifying '<file name>' or '<folder>\<subfolder>\<file name>'. Only the files will be excluded. The folders or subfolders that contained excluded files are included in the mount point, with no contents.
| ||
+ Add |
If you opted to exclude subdirectories, click Add and enter the location in the Path table for each item you want to exclude. |
For more information, see Understanding Active Block Mapping.
NOTE: Active Block Mapping only supports NTFS file systems. Any type of dynamic disk is not supported. |
Text Box | Description |
---|---|
Name | Enter a name for the encryption key.
Encryption key names must contain between 1 and 64 alphanumeric characters. Do not use prohibited characters or prohibited phrases. |
Description | Enter a descriptive comment for the encryption key. This information appears in the Description field when viewing a list of encryption keys in the Rapid Recovery. Descriptions may contain up to 254 characters.
Best practice is to avoid using prohibited characters and prohibited phrases. |
Passphrase | Enter a passphrase used to control access.
Best practice is to avoid using prohibited characters. Record the passphrase in a secure location. Quest Data Protection Support cannot recover a passphrase. Once you create an encryption key and apply it to one or more protected machines, you cannot recover data if you lose the passphrase. |
Confirm passphrase | Re-enter the passphrase. It is used to confirm the passphrase entry. |
NOTE: This option is enabled by default, so if you do not want to encrypt data in this fashion, clear this option. |
|
NOTE: The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) transfers to the repository indicated in your Rapid Recovery Core following the schedule you defined, unless you specified that the Core should initially pause protection. For information on pausing and resuming protection, see Pausing and resuming protection. |
The protecting procedure requires the following tasks be completed before you begin:
Use this procedure to manually specify details for multiple machines that you want to protect simultaneously using the Agent software. The details identify each machine on the network uniquely, and include connection information and credentials. This approach is often used when protecting Linux machines. However, using this process, you can protect only Windows machines, only Linux machines, or a combination of both.
The Protect Multiple Machines Wizard opens.
Optionally, if you do not wish to see the Welcome page for the Protect Machine Wizard in the future, select the option Skip this Welcome page the next time the wizard opens.
hostname::username::password::port
. The port setting is optional. The default port for installing Agent on Windows machines is 8006. For Linux machines, the default port is number 22 (SSH port). Examples include:
10.255.255.255::administrator::&11@yYz90z
Linux-host-00-2::administrator::p@$$w0rD::22
If the Protection page appears next in the Protect Multiple Machines Wizard, skip to step 11.
If the Agent software is not yet deployed to the machines you want to protect, or if any of the machines you specified cannot be protected for another reason, then the selected machines appear on the Warnings page.
|
Caution: Quest recommends this option. You must restart agent machines before they can be protected. Restarting ensures that the Agent service is running, and that proper kernel module is used to protect the machine, if relevant. |
The Protection page appears.
You can enter up to 64 characters. Do not use the special characters described in the topic prohibited characters. Additionally, do not begin the display name with any of the character combinations described in the topic prohibited phrases.
With a default protection schedule, the Core will take snapshots of all volumes on the protected machine once every hour. To change the protection settings at any time after you close the wizard, including choosing which volumes to protect, go to the Summary page for the specific protected machine.
Schedule options are added to the wizard workflow.
|
NOTE: Typically, it is good practice to protect, at minimum, the System Reserved volume and the volume with the operating system (typically the C drive). |
Text Box | Description |
---|---|
Name | Enter a name for the encryption key.
Encryption key names must contain between 1 and 64 alphanumeric characters. Do not use prohibited characters or prohibited phrases. |
Description | Enter a descriptive comment for the encryption key. This information appears in the Description field when viewing a list of encryption keys in the Rapid Recovery. Descriptions may contain up to 254 characters.
Best practice is to avoid using prohibited characters and prohibited phrases. |
Passphrase | Enter a passphrase used to control access.
Best practice is to avoid using prohibited characters. Record the passphrase in a secure location. Quest Data Protection Support cannot recover a passphrase. Once you create an encryption key and apply it to one or more protected machines, you cannot recover data if you lose the passphrase. |
Confirm passphrase | Re-enter the passphrase. It is used to confirm the passphrase entry. |
NOTE: This option is enabled by default, so if you do not want to encrypt data in this fashion, clear this option. |
|
NOTE: The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) transfers to the repository indicated in your Rapid Recovery Core following the schedule you defined, unless you specified that the Core should initially pause protection. For information on pausing and resuming protection, see Pausing and resuming protection. |
You can monitor the progress as Rapid Recovery applies the protection polices and schedules to the machines.
The Events page displays, broken down by Tasks, Alerts, and Events. As volumes are transferred, the status, start times, and end times display in the Tasks pane.
You can also filter tasks by status (active, waiting, completed, queued, and failed). For more information, see Viewing tasks.
|
NOTE: To only see tasks that are waiting to be performed, make sure that you select the (Waiting Tasks) icon. |
As each protected machine is added, an alert is logged, which lists whether the operation was successful or if errors were logged. For more information, see Viewing alerts.
For information on viewing all events, see Viewing a journal of all logged events.
After a VM has been placed under agentless protection, you can support the Exchange or SQL application installed on that machine.
Before you begin, the following prerequisites must be in place.
winrm quickconfig
Complete the following steps to enable application support for agentlessly protected VMs.
If you want to add application credentials, you can do so by clicking SQL or Exchange at the top of the Summary page for the specific machine.
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. 이용 약관 개인정보 보호정책 Cookie Preference Center