지금 지원 담당자와 채팅
지원 담당자와 채팅

Rapid Recovery 6.7 - Commands and Scripting Reference Guide

Introduction to Rapid Recovery Command Line Management utility PowerShell module
Prerequisites for using PowerShell Working with commands and cmdlets Rapid Recovery PowerShell module cmdlets
Add-EsxAutoProtectObjects Add-EsxVirtualMachines Add-HyperVClusterSharedVirtualDisks Add-HyperVClusterVirtualMachines Add-HyperVVirtualMachines Disable-HyperVAutoProtection Edit-AzureVirtualStandby Edit-EsxiVirtualStandby Edit-HyperVVirtualStandby Edit-OracleDBVerifyNightlyJob Edit-OracleLogTruncationNightlyJob Edit-Replication Edit-ScheduledArchive Edit-VBVirtualStandby Edit-VMVirtualStandby Enable-HyperVAutoProtection Enable-OracleArchiveLogMode Get-ActiveJobs Get-CloudAccounts Get-Clusters Get-CompletedJobs Get-ExchangeMailStores Get-Failed Get-FailedJobs Get-HyperVClusterSharedVirtualDisks Get-ListAzureVMSizes Get-Mounts Get-OracleInstances Get-Passed Get-ProtectedServers Get-ProtectionGroups Get-QueuedJobs Get-RecoveryPoints Get-ReplicatedServers Get-Repositories Get-ScheduledArchives Get-SqlDatabases Get-TransferQueueEntries Get-UnprotectedVolumes Get-Version Get-VirtualizedServers Get-Volumes New-AzureVirtualStandby New-Base New-BootCD New-CloudAccount New-EncryptionKey New-EsxiVirtualStandby New-FileSearch New-HyperVVirtualStandby New-Mount New-Replication New-Repository New-ScheduledArchive New-Snapshot New-VBVirtualStandby New-VMVirtualStandby Push-Replication Push-Rollup Remove-Agent Remove-EsxAutoProtectObjects Remove-HyperVClusterSharedVirtualDisks Remove-HyperVClusterVirtualMachines Remove-HyperVVirtualMachines Remove-Mount Remove-Mounts Remove-RecoveryPoints Remove-RemoteMount Remove-RemoteMounts Remove-Replication Remove-Repository Remove-ScheduledArchive Remove-VirtualStandby Restart-CoreService Resume-Replication Resume-ScheduledArchive Resume-Snapshot Resume-VirtualStandby Set-AgentMetadataCredentials Set-DedupCacheConfiguration Set-License Set-OracleMetadataCredentials Set-ReplicationResponse Start-Archive Start-AttachabilityCheck Start-AzureDeploy Start-AzureExport Start-ChecksumCheck Start-ConsumeSeedDrive Start-CopySeedDrive Start-EsxiExport Start-HypervExport Start-LogTruncation Start-MountabilityCheck Start-OptimizationJob Start-OracleDBVerifyJob Start-OracleLogTruncationJob Start-Protect Start-ProtectCluster Start-ProtectEsxServer Start-ProtectHyperVCluster Start-ProtectHyperVServer Start-RepositoryCheck Start-RestoreAgent Start-RestoreArchive Start-ScheduledArchive Start-VBExport Start-VirtualStandby Start-VMExport Stop-ActiveJobs Stop-CoreService Suspend-Replication Suspend-ScheduledArchive Suspend-Scheduler Suspend-Snapshot Suspend-VirtualStandby Suspend-VMExport Update-Repository
Localization Qualifiers
Scripting

EditOracleDBVerifyNightlyJob

Use the command editoracledbverifynightlyjob to enable or disable this nightly job for specific Oracle machines that are under protection.

Usage

The usage for the command is as follows:

/editoracledbverifynightlyjob -core [host name] -user [user name] -password [password] -protectedserver [name | IP address] [-enable | -disable] [-global]

Command Options

The following table describes the options available for the editoracledbverifynightlyjob command:

Table 22: EditOracleDBVerifyNightlyJob command options
Option Description
-?
Display this help message.
-core
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine.
-user
Optional. The user name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used.
-password
Optional. The password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used.
-repository
Required. The name of the repository that is associated with the Core that you want to use to protect the virtual machine.
Note: You must enclose the name in double quotes.
-protectedserver
Use this option to specify the protected machine for which you want to enable the Oracle DBVerify nightly job.
-enable
Use this option to enable the DBVerify nightly job for the specified protected machine.
-disable
Use this option to disable the DBVerify nightly job for the specified protected machine.
-global
Use this option to apply the specified setting as the default for this Core.
-all
This option applies the specified changes for every protected machine that has at least one Oracle instance installed.

Example:

Enable the Oracle DBVerify nightly job for a protected server:

>cmdutil /editoracledbverifynightlyjob -core 10.10.127.42 -user admin -password 676df#df -protectedserver 10.10.34.88 -enable

EditOracleLogTruncationNightlyJob

Use the command editoraclelogtruncationnightlyjob to enable or disable this nightly job for specific Oracle machines that are under protection and to set the deletion policy and retention duration for the logs.

Usage

The usage for the command is as follows:

/editoraclelogtruncationnightlyjob -core [host name] -user [user name] -password [password] -protectedserver [name | IP address] [-enable | -disable] [-global] [-usedefault] -deletionpolicy [automatic | keepnewest | keepspecificnumber] -retentionduration [duration value] -retentionunit [day | week | month | year] -numberoffiles [number of archive files to create]

Command Options

The following table describes the options available for the editoraclelogtruncationnightlyjob command:

Table 23: EditOracleLogTruncationNightlyJob command options
Option Description
-?
Display this help message.
-core
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine.
-user
Optional. The user name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used.
-password
Optional. The password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used.
-protectedserver
Use this option to specify the protected machine for which you want to enable Oracle log truncation as a nightly job.
-enable
Use this option to enable log truncation for the specified protected machine. This is the default option and can be omitted.
-disable
Use this option to disable log truncation for the specified protected machine.
-global
Use this option to apply the specified setting as the default for this Core.
-all
This option applies the specified changes for every protected machine that has at least one Oracle instance installed.
-usedefault
Optional. Use this option to apply the default Core settings to the specified machine, which may also be set by using the -global option.
-deletionpolicy
Optional. This option must be represented by one of the following values:
  • "automatic"
  • "keepnewest"
  • "keepspecificnumber"
-retentionduration
Optional. This value determines the length of time to keep a log before truncating and is constrained to positive integer values. If using the "keepnewest" value of the -deletionpolicy option, a retention duration value is required.
-retentionunit
Optional. This option identifies the time unit for the -retentionduration option. It must be represented by one of the following values:
  • "day"
  • "week"
  • "month"
  • "year"
-numberoffiles
Optional. This option sets the number of recent archive log files to keep. If using the "keepspecificnumber" value of the -deletionpolicy option, a number of files value is required.

Examples:

Enable the Oracle log truncation nightly job for a protected server:

>cmdutil /editoraclelogtruncationnightlyjob -core 10.10.127.42 -user admin -password 676df#df -protectedserver 10.10.34.88 -enable

Enable the Oracle log truncation nightly job (when -enable is the default option) for a protected server and configure the deletion policy as "keepnewest" with the logs kept for 10 days:

>cmdutil /editoraclelogtruncationnightlyjob -core 10.10.127.42 -user admin -password 676df#df -protectedserver 10.10.34.88 -deletionpolicy keepnewest -retentionduration 10 -retentionunit day

EnableOracleArchiveLogMode

Use the command enableoraclearchivelogmode to enable or disable this mode for specific Oracle machines that are under protection.

Usage

The usage for the command is as follows:

/enableoraclearchivelogmode -core [host name] -user [user name] -password [password] -protectedserver [name | IP address]

Command Options

The following table describes the options available for the enableoraclearchivelogmode command:

Table 24: EnableOracleArchiveLogMode command options
Option Description
-?
Display this help message.
-core
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine.
-user
Optional. The user name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used.
-password
Optional. The password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used.
-protectedserver
Use this option to specify the protected machine for which you want to enable the Oracle archive log mode.

Example:

Enable the Oracle archive log mode for a protected server:

>cmdutil /enableoraclearchivelogmode -core 10.10.127.42 -user admin -password 676df#df -protectedserver 10.10.34.88

FileSearch

The filesearch command lets you search for a specific file among the recovery points in a repository, which helps you determine which recovery point you need to mount for a restore.

Usage

The usage for the command is as follows:

/filesearch -core [host name] -user [user name] -password [password] -protectedserver [name | IP address] -startdate [start date] -enddate [end date] -filemasks [file masks] -paths [paths] -subdiroff -ntfsfastoff -limitsearch [limit search]

Command Options

The following table describes the options available for the filesearch command:

Table 25: FileSearch command options
Option Description
-?
Display this help message.
-core
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine.
-user
Optional. The user name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used.
-password
Optional. The password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used.
-protectedserver
Use this option to specify the protected machine for which you want to enable the Oracle archive log mode.
-startdate
The earliest date of a period within you want to conduct your search. Use the date pattern "MM/DD/YYYY HH:mm:ss AM."
-enddate
The latest date of a period within you want to conduct your search. Use the date pattern "MM/DD/YYYY HH:mm:ss AM."
-filemasks
A combination of fixed and wildcard characters to search for the file. It can be one string or an array of strings. All masks should be separated by a space; for example: -filemasks "first" "second."
-paths
Optional. If there are specific directories in which you want to search, use this option to list the paths. It can be one string or an array of strings. All directories should be separated by a space; for example: -paths "E:\" "C:\Program Files."
-subdiroff
Optional. By default, the file search is performed in subdirectories. Use this option if you want to turn this feature off and not search in subdirectories.
-ntfsfastoff
Optional. By default, the file search is performed using the NTFS fast algorithm. If you want to perform the search without this feature, specify this option.
-limitsearch
Optional. Use this option to limit the number of search results. The default value is 1000.

Examples:

Perform a file search with one file mask:

>cmdutil /filesearch -core 10.10.10.10 -user administrator -password 23WE@#$sdd -protectedserver 10.10.10.10 -filemasks "sample"

Perform a file search with multiple file masks in specified directories and without the NTFS fast algorithm:

>cmdutil /filesearch -core 10.10.10.10 -user administrator -password 23WE@#$sdd -protectedserver 10.10.10.10 -filemasks "sample" "second" -paths "C:\dir" -ntfsfastoff
관련 문서

The document was helpful.

평가 결과 선택

I easily found the information I needed.

평가 결과 선택