Managing protected machines
This section describes how to view, configure and manage the protected machines in your Rapid Recovery environment.
Topics include:
You can manage protected machines from the Rapid Recovery Core Console, including the following tasks:
- You can view protected machines in the Rapid Recovery Core Console using options described in the topic Viewing protected machines.
- You can configure settings for a particular machine, which supersede Core default settings. Some configuration tasks include changing hypervisor host or VM settings, accessing system information, modifying transfer settings, customizing nightly jobs, or configuring notifications for events. For more information, see Configuring machine settings.
- You can remove a machine or cluster from protection, view license information for a protected machine, or diagnose problems by viewing the log file for a protected machine. For more information on these and other tasks, see Managing machines.
- You can view and manage data saved in the Core. For more information, see Managing snapshots and recovery points.
From the Home page on the Rapid Recovery Core Console, when viewing the Summary Tables view, you can see summary information for any machines protected by the Core in the Protected Machines pane.
|
NOTE: A software agent acts on behalf of the user to take specific actions. Protected machines are sometimes referred to as agents, since they run the Rapid Recovery Agent software to facilitate data backup and replication on the Rapid Recovery Core. |
You can view the status, the display name for each machine, which repository it uses, the date and time of the last snapshot, how many recovery points exist in the repository for the machine, and the total amount of storage space the snapshots use in the repository.
To manage aspects of any protected machine, start by navigating to the machine you want to view, configure, or manage. From the Home page, there are three ways to navigate to a protected machine:
- You can click on the IP address or display name of any protected machine from the Protected Machines pane. This takes you to the Summary page for the selected protected machine.
- In the left navigation area, you can click on the title of the Protected Machines menu. The Protected Machines page appears. On this page, you can see summary information about each machine. For a detailed description of this page, see Viewing summary information for a protected machine.
- In the left navigation area, under the Protected Machines menu, you can click any protected machine IP address or display name. This takes you to the Summary page for the selected protected machine. For a detailed description of this page, see Viewing summary information for a protected machine.
Complete the steps in this procedure to view summary information about a cluster including information about the associated quorum for the cluster.
- In the Rapid Recovery Core Console, under Protected Machines, click the cluster you want to view.
The Summary page for the machine appears.
- On the Summary page, you can view such information as the cluster name, cluster type, quorum type (if applicable), and the quorum path (if applicable). This page also shows at-a-glance information about the volumes in this cluster, including size and protection schedule. If applicable, you can also view SQL Server or Exchange Server information for a different cluster.
- To view the most current information, click Refresh.
For information about viewing summary and status information for an individual machine or node in the cluster, see Viewing protected machines.