Machine settings help determine the behavior of a machine protected by the Core. When you modify settings for a specific machine, those settings supersede the behavior set at the Core level.
Likewise, a protected Hyper-V virtual host has different machine settings than the virtual machines it manages. For more information, see Viewing summary information for a hypervisor or cluster host.
Complete the steps in this procedure to view and modify general settings, transfer settings, settings for excluded writers, and licensing settings for a protected machine.
|
NOTE: To view and modify nightly job settings, see Customizing nightly jobs for a protected machine. |
The Summary page for the selected machine displays.
The Settings page displays, showing settings for the selected machine. Optionally, to display setting categories from anywhere on the page, click the appropriate hyperlink on the left side of the page.
When you click on a setting you want to change, that setting becomes an editable control. Do one of the following:
For each setting, when satisfied with your changes, click to confirm and save the change and exit edit mode, or click to exit edit mode without saving.
Text Box | Description | ||
---|---|---|---|
Display name |
Enter a display name for the machine. This is the name that displays for a protected machine in the Rapid Recovery Core Console. You can enter up to 64 characters. By default, this is the host name of the machine. You can change this to something more user-friendly if needed. Do not use prohibited characters or prohibited phrases. | ||
Host name |
This is the name of the protected machine as it appears in the machine's metadata.
| ||
Repository |
This setting only appears for protected Hyper-V clusters, which support shared virtual hard disks. Displays the repository configured on the Rapid Recovery Core in which recovery points of shared virtual hard disks for the protected Hyper-V cluster are stored. | ||
Port |
Enter a port number for the machine. The port is used by the Rapid Recovery Core service to communicate with this machine. The default port is 8006. | ||
Encryption key |
If you want an encryption key that is already defined for this Rapid Recovery Core to be applied to the data for every volume on this protected machine, you can specify the encryption key here. The key must be unlocked. If no encryption keys exist, you can add an encryption key. For more information on managing encryption keys, see Managing encryption keys. If the volumes on this protected machine are encrypted, you can change to a different encryption key. Alternatively, you can disassociate an encryption key by selecting (none) from the Encryption key drop-down menu.
| ||
Repository |
Select a repository for the recovery points. Displays the repository configured on the Rapid Recovery Core in which to store the data from this machine. The repository volume can be local (on storage attached to the Core server), or on a volume on a CIFS shared location.
| ||
Hypervisor |
This setting only appears for virtual machines. The value of this setting indicates whether the selected virtual machine is associated as the child of a protected hypervisor host.
| ||
OS version |
This setting only appears for guest virtual machines associated with a protected hypervisor host. Generally, Rapid Recovery detects and displays the operating system running on the protected VM. |
For more information about automatic mountability checks, see About Exchange database mountability checks.
|
NOTE: For conceptual information about transfer settings, see About modifying transfer settings. |
Text Box | Description | ||
---|---|---|---|
Restore Default |
This control restores all transfer settings to the system default settings. | ||
Priority |
Sets the transfer priority between protected machines. Enables you to assign priority by comparison with other protected machines. Select a number from 1 to 10, with 1 being the highest priority. The default setting establishes a priority of 5.
| ||
Maximum Concurrent Streams |
Sets the maximum number of TCP links that are sent to the Core to be processed in parallel per protected machine, for machines protected in a DVM repository.
| ||
Maximum Concurrent Writes |
Sets the maximum number of simultaneous disk write actions per protected machine connection.
| ||
Use Core Default Maximum Retries |
Select this option to use default retries number for each protected machine, if some of the operations fail to complete. | ||
Maximum Segment Size |
Specifies the largest amount of data, in bytes, that a computer can receive in a single TCP segment. The default setting is 4194304. Do not change this setting from the default unless directed to do so by a Quest Support representative. | ||
Maximum Transfer Queue Depth |
Specifies the amount of commands that can be sent concurrently. The default setting is 64. You can adjust this to a higher number if your system has a high number of concurrent input/output operations. | ||
Outstanding Reads per Stream |
Specifies how many queued read operations will be stored on the back end. This setting helps to control the queuing of protected machines. The default setting is 0. | ||
Transfer Data Server Port |
Sets the port for transfers. The default setting is 8009. | ||
Transfer Timeout |
Specifies in minutes and seconds the amount of time to allow a packet to be static without transfer. | ||
Snapshot Timeout |
Specifies in minutes and seconds the maximum time to wait to take a snapshot. | ||
Snapshot Cleaning Timeout |
Specifies in minutes and seconds the maximum time for process of deleting VSS snapshot on a protected machine. | ||
Network Read Timeout |
Specifies in minutes and seconds the maximum time to wait for a read connection. If the network read cannot be performed in that time, the operation is retried. | ||
Network Write Timeout |
Specifies the maximum time in seconds to wait for a write connection. If the network write cannot be performed in that time, the operation is retried. | ||
Encrypt snapshot data |
Specifies whether data transported between the protected machine and the Core is encrypted. This option is enabled by default. This setting applies to data in transit over a network. When this option is enabled, all snapshot data transported to a DVM repository are encrypted.
|
|
NOTE: Because the writers that appear in the list are specific to the machine you are configuring, you will not see all writers in your list. |
Text Box | Description |
---|---|
Expiration Date | Indicates the expiration date of the license for the selected protected machine. |
License Status | Indicates the current status of the license for the selected protected machine. |
License Type | Indicates the type of the license for the selected protected machine. |
Agent type | Indicates if the current protected machine is a physical or virtual agent. |
Related topics:
A Hyper-V host that is using Rapid Snap for Virtual (agentless protection) to protect VMs is indicated in the left navigation area by the host icon .
The settings for a Hyper-V host with VMs that are protected agentlessly are not the same as a typical protected machine. All changes made to the settings for a host apply to the VMs on that host.
The setting you selected becomes editable, as a text field or a drop-down menu.
Text Box | Description | ||
---|---|---|---|
Display Name |
The name that displays for a protected machine in the Rapid Recovery Core Console. You can enter up to 64 characters. By default, it is the host name of the machine. You can change the display name to something more user-friendly if needed. Do not use prohibited characters or prohibited phrases. | ||
Host Name |
The name of the protected machine as it appears in the machine's metadata.
|
|
NOTE: For best performance, it is recommended that the maximum concurrent transfers for the Hyper-V host or node be set to 1, which is the default setting. |
Text Box | Description |
---|---|
Clear orphaned registry keys on protected Hyper-V host |
Removes the unnecessary files from the registry that result from attaching and detaching virtual disks during data transfers. |
Check integrity of recovery points |
Conducts an integrity check of each recovery point created for the virtual machines on the Hyper-V host. |
This procedure applies to Hyper-V virtual machines (VMs) that are protected using Rapid Recovery Rapid Snap for Virtual (agentless protection).
A Hyper-V VM that is being protected by Rapid Snap for Virtual (agentless protection) is indicated in the left navigation area by the host icon .
The settings for a Hyper-V agentless VM the same as a typical protected machine with the exception of the Hyper-V section at the bottom of the Settings page. The following task provides instructions for only the Hyper-V section settings. For all other protected machine settings, see Viewing and modifying protected machine settings.
The setting you selected becomes editable, as a text field or a drop-down menu.
The setting you selected becomes editable a drop-down menu.
Text Box | Description |
---|---|
Try to create VSS snapshot during transfer first, if it fails, create a checkpoint | If the VSS snapshot succeeds, the recovery point will be in an application-consistent state. If the VSS snapshot fails and a checkpoint is created, the recovery point will be in a crash-consistent state. |
Do not create VSS snapshot during transfer | Generates a recovery point in a crash-consistent state. |
Use only VSS snapshots during transfers. If VSS snapshot creation fails, the entire transfer will fail | Generates only application-consistent recovery points. If the VSS snapshot fails, no recovery point is generated. |
The setting you selected becomes editable, as a text field or a drop-down menu.
The setting you selected becomes editable, as a text field or a drop-down menu.
Text Box | Description |
---|---|
Allow Rapid Recovery to delete user created in VMware | The default setting is No. |
Allow transfer for volumes with invalid used capacity | The default setting is Yes. |
Allow quiesced snapshots | The default setting is Yes. |
© ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center