You can manage protected machines from the Rapid Recovery Core Console, including the following tasks:
From the Home page on the Rapid Recovery Core Console, when viewing the Summary Tables view, you can see summary information for any machines protected by the Core in the Protected Machines pane.
|
NOTE: A software agent acts on behalf of the user to take specific actions. Protected machines are sometimes referred to as agents, since they run the Rapid Recovery Agent software to facilitate data backup and replication on the Rapid Recovery Core. |
You can view the status, the display name for each machine, which repository it uses, the date and time of the last snapshot, how many recovery points exist in the repository for the machine, and the total amount of storage space the snapshots use in the repository.
To manage aspects of any protected machine, start by navigating to the machine you want to view, configure, or manage. From the Home page, there are three ways to navigate to a protected machine:
Complete the steps in this procedure to view summary information about a cluster including information about the associated quorum for the cluster.
The Summary page for the machine appears.
For information about viewing summary and status information for an individual machine or node in the cluster, see Viewing protected machines.
Once you have protected a machine in your Rapid Recovery Core, you can easily view and modify the settings that govern the behavior of that protected machine. When you modify settings for a specific machine, those settings supersede the behavior set at the Core level.
You can view and configure the following machine settings in the Rapid Recovery Core Console:
vSphere. These settings let Rapid Recovery Core manage some aspects of protected vSphere hosts. One setting lets Core delete user-created VMware snapshots required before capturing Rapid Recovery snapshots). One setting allows transfer of volumes with invalid used capacity. The third setting lets Core take quiesced snapshots.
The procedure for viewing or changing machine-level settings is identical for general, excluded writers, and license details. For more information, see Viewing and modifying protected machine settings.
The procedure for modifying nightly jobs for a machine is different. For information about configuring nightly job settings for a machine, see Customizing nightly jobs for a protected machine.
The procedure for modifying vSphere settings differs slightly. For more information, see Configuring vSphere settings.
In some cases, you may want to adjust the data transfer rate for a protected machine. For more information, see About modifying transfer settings.
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center