Converse agora com nosso suporte
Chat com o suporte

Rapid Recovery 6.4 - User Guide

Introduction to Rapid Recovery The Core Console Repositories Core settings Managing privacy Encryption Protecting machines
About protecting machines with Rapid Recovery Understanding the Rapid Recovery Agent software installer Deploying Agent to multiple machines simultaneously from the Core Console Using the Deploy Agent Software Wizard to deploy to one or more machines Modifying deploy settings Understanding protection schedules Protecting a machine About protecting multiple machines Enabling application support Settings and functions for protected Exchange servers Settings and functions for protected SQL servers
Managing protected machines Credentials Vault Snapshots and recovery points Replication Events Reporting VM export Restoring data Bare metal restore
About bare metal restore Differences in bare metal restore for Windows and Linux machines Understanding boot CD creation for Windows machines Managing a Linux boot image Performing a bare metal restore using the Restore Machine Wizard Using the Universal Recovery Console for a BMR Performing a bare metal restore for Linux machines Verifying a bare metal restore
Managing aging data Archiving Cloud accounts Core Console references REST APIs Glossary

Customizing nightly jobs for a protected machine

Nightly jobs can be configured at the Core level or at the machine level. When nightly jobs are set at the Core level, the changes are applied to all relevant machines protected by that Core. Changes made to the nightly jobs at the machine level supersede the changes made at the Core level, and apply only to the machines specified.

For a list of all nightly jobs, including descriptions and the scope available for each, see the topic Understanding nightly jobs.

Complete the steps in the following procedure to make changes to the nightly jobs for a single protected machine.

  1. In the Rapid Recovery Core Console, under the Machines menu, click the IP address or machine name for the machine for which you want to customize nightly jobs.
    The Summary page for the selected machine appears.
  2. Click the Settings menu.

    The Settings page appears, showing configuration settings for the selected machine.

  3. Optionally, click the Nightly Jobs link to scroll down in the Settings page to view nightly jobs settings.
  4. Under the Nightly Jobs heading, click [Change] 
    Change.

    The Nightly Jobs dialog box appears.

     
  5. In the Nightly Jobs dialog box, select the jobs you want to include to run nightly, or clear the options you want to omit for this machine.

    NOTE: Options may vary by machine. For example, a protected machine using Exchange Server may include Check checksum of Exchange databases and Truncate Exchange logs.

     

    NOTE: For information about the Rollup setting, including setting a custom retention policy, see Customizing retention policy settings for a protected machine.

  6. Click OK.

    NOTE: The results of this procedure apply only to the selected protected machine. To apply elsewhere, repeat the procedure for each machine you want to customize. To change the nightly job settings for all machines protected by a Core, see Configuring nightly jobs for the Core.

Understanding system information for a protected machine

You can view system information about each machine protected in your Rapid Recovery Core. To see how to access this information, see Viewing system information for a protected machine

NOTE: This topic describes system information for a specific protected machine. For information about accessing system information for the Core, see Viewing system information for the Core.

You can see the following information on the System Information page for each protected machine. Each of the following elements appears in its own pane, if applicable:

Table 76: Protected machine system information
Topic Description

System Information

For the protected machine you are viewing, this pane includes the following information: 

Host name, OS version and architecture, physical memory, display name, domain name, and VM type.

If available, click Summary on the bottom of this pane to return to the Summary page for this protected machine.

Volumes

This pane includes the volume name, device ID, file system, formatted capacity, and capacity used.

Processors

This pane includes the architecture, number of microprocessor cores and threads, clock speed, and description.

Network Adapters

This pane includes the physical or virtual network adapter type and speed.

IP Addresses

This pane includes the IP address and family.

Viewing system information for a protected machine

The Rapid Recovery Core Console provides you with easy access to system information about the machines protected on your Core. System information viewed at the machine level includes relevant information about the protected machine. For more information, see Understanding system information for a protected machine.

Complete the steps in this procedure to view detailed system information for a protected machine.

  1. Navigate to the Rapid Recovery Core Console, and from the protected machines menu in the left navigation area, click a protected machine name.
    The Summary page appears for the selected protected machine.
  2. On the Summary page, at the bottom of the Summary pane, click System Information.

    The System Information page appears.

Managing machines

This section describes a variety of tasks you can perform to manage your protected machines managing your machines.

Topics include:

Documentos relacionados

The document was helpful.

Selecione a classificação

I easily found the information I needed.

Selecione a classificação