When transferring backup data or replicated recovery points between protected machines and Cores over the network, you can intentionally reduce the speed of the transfer. This process is known as throttling.
When you throttle the transfer speed, you limit the amount of your network bandwidth dedicated to file transfers from Rapid Recovery. When setting up replication, for example, throttling can reduce the likelihood that the transfer of prior recovery points to the replicated Core consumes all of your network bandwidth.
|
Caution: Throttling transfer speed is not always required or recommended. This information is provided to provide insight into a potential solution for performance issues in your Rapid Recovery environment. For example, sometimes, throttling may solve issues related to repeated transfer failures or network slowdowns caused by transferring a substantial amount of data for your protected or replicated Cores. |
There are several factors involved in determining the best approach to throttling. The type of machine being protected is a key factor. For example, a busy Microsoft Exchange server has a much higher change rate than a seldom-used legacy web server.
The input and output capabilities of the storage volumes on your protected machines can also contribute to more or less efficiency.
The speed of your network is another critical factor, with many variables. The network backbone in place (for example, 1GbE versus 10GbE), architecture, configuration, intentional use of NIC teaming, and even the type of cables used can all affect network transfer speed. If your environment has a slower wide area network, and if transfer jobs fail for backup or replication, consider throttling the transfer speed using some of these settings.
Ultimately, the process of network throttling involves trial and error. Quest recommends that you adjust and test your transfer settings, and revisit these settings periodically to ensure that your settings continue to meet your needs.
Adjusting transfer speed should be accomplished on an individual machine basis. In the Core Console, navigate to a specific machine, select Settings, and adjust the Transfer speed. For specific information about viewing and changing these settings, see Viewing and modifying protected machine settings.
That topic also includes descriptions of each of the settings used for throttling transfer. Those descriptions may be useful in determining which settings you should experiment with first.
The four main settings involved in throttling transfer speed are described in the following table:
Table 72: Transfer speed settings
Maximum Concurrent Streams |
8 |
4 |
Maximum Concurrent Writes |
8 |
4 |
Maximum Segment Size |
4194304 |
2097152 |
Outstanding Reads per Stream |
0 |
Start at 24 |
Quest recommends adjusting and testing the other settings prior to changing the default setting for outstanding reads per stream, unless directed otherwise by a Quest Support representative. When tuning and testing this setting, start with a value of 24.
When you specify limitations to protected machine transfer parameters, these limitations apply per job. If two transfer jobs occur simultaneously or overlap, twice the bandwidth is used. If four transfer jobs across the network overlap, four times the bandwidth is used; and so on.
Nightly jobs can be configured at the Core level or at the machine level. When nightly jobs are set at the Core level, the changes are applied to all relevant machines protected by that Core. Changes made to the nightly jobs at the machine level supersede the changes made at the Core level, and apply only to the machines specified.
For a list of all nightly jobs, including descriptions and the scope available for each, see the topic Understanding nightly jobs.
Complete the steps in the following procedure to make changes to the nightly jobs for a single protected machine.
- In the Rapid Recovery Core Console, under the Machines menu, click the IP address or machine name for the machine for which you want to customize nightly jobs.
The Summary page for the selected machine appears.
- Click the Settings menu.
The Settings page appears, showing configuration settings for the selected machine.
- Optionally, click the Nightly Jobs link to scroll down in the Settings page to view nightly jobs settings.
- Under the Nightly Jobs heading, click Change.
The Nightly Jobs dialog box appears.
- In the Nightly Jobs dialog box, select the jobs you want to include to run nightly, or clear the options you want to omit for this machine.
|
NOTE: Options may vary by machine. For example, a protected machine using Exchange Server may include Check checksum of Exchange databases and Truncate Exchange logs. |
- Click OK.
|
NOTE: The results of this procedure apply only to the selected protected machine. To apply elsewhere, repeat the procedure for each machine you want to customize. To change the nightly job settings for all machines protected by a Core, see Configuring nightly jobs for the Core. |
You can view system information about each machine protected in your Rapid Recovery Core. To see how to access this information, see Viewing system information for a protected machine
You can see the following information on the System Information page for each protected machine. Each of the following elements appears in its own pane, if applicable:
Table 73: Protected machine system information
System Information |
For the protected machine you are viewing, this pane includes the following information:
Host name, OS version and architecture, physical memory, display name, domain name, and VM type.
If available, click Summary on the bottom of this pane to return to the Summary page for this protected machine. |
Volumes |
This pane includes the volume name, device ID, file system, formatted capacity, and capacity used. |
Processors |
This pane includes the architecture, number of microprocessor cores and threads, clock speed, and description. |
Network Adapters |
This pane includes the physical or virtual network adapter type and speed. |
IP Addresses |
This pane includes the IP address and family. |
The Rapid Recovery Core Console provides you with easy access to system information about the machines protected on your Core. System information viewed at the machine level includes relevant information about the protected machine. For more information, see Understanding system information for a protected machine.
Complete the steps in this procedure to view detailed system information for a protected machine.
- Navigate to the Rapid Recovery Core Console, and from the protected machines menu in the left navigation area, click a protected machine name.
The Summary page appears for the selected protected machine.
- On the Summary page, at the bottom of the Summary pane, click System Information.
The System Information page appears.