Cloud account connection settings let you determine how much time should pass between Rapid Recovery attempts to connect to your cloud account before the operation times out. Complete the steps in the following procedure to configure the connection settings for your cloud account.
Complete the steps in this procedure to manage report settings for Core reports.
The Reports Core settings appear. Report settings are described in the following table.
Option | Description |
---|---|
Restore Default |
This option restores all report settings to the default settings. Defaults are listed below for each setting. |
Font |
This option controls the default font used for reports. The default typeface is Trebuchet MS. You can change this font to any typeface available to your system. |
Paper size |
This option controls the default paper size for printing reports. The default is letter. You can choose from the following paper sizes:
|
Page orientation |
This option controls the page orientation for exported reports. The default orientation is Landscape. You can choose from the following layout options:
|
The setting field appears as a configurable drop-down menu.
For example, in the Font field, click Times New Roman.
The option you selected now appears as the new setting for the selected Reports parameter.
SQL attachability checks occur as part of the Rapid Recovery nightly jobs. To ease licensing costs, Rapid Recovery gives you two options for performing attachability checks: using a licensed instance of SQL Server installed on the Rapid Recovery Core machine or using the instance of SQL Server already installed on your protected machine. This second option is now the default setting. However, if your protected machine is already exerted during the time when the nightly jobs occur, consider performing the checks with an instance of SQL Server on the Core.
The ability to perform attachability checks using the SQL Server instance on a protected machine is a function of the Rapid Recovery Agentsoftware. This feature does not work if the SQL Server is protected agentlessly. Therefore, if using agentless protection on the SQL machine, configure this Core setting to Use SQL Server on the Core, as shown in step 3 of this procedure.
In summary, the process of managing Core SQL attachability settings involves the following tasks:
To enable this nightly check, specify a SQL Server instance to use to perform attachability checks for SQL Server databases on protected machines.
NOTE: This option does not appear if you are not protecting a SQL Server in your Core. |
To configure the Core to perform SQL attachability checks as part of the nightly jobs, complete the following steps.
|
NOTE: If you select the default option to use the instance of SQL Server installed on the protected machine, that SQL Server instance will manage SQL attachability for all protected SQL machines. If you do not want this setting to apply to all protected SQL machines, select Use SQL Server on the Core. To perform attachability checks on the Core, you must install or use a licensed version of SQL Server on the Core machine. |
Text Box | Description |
---|---|
SQL Server | From the SQL Server drop-down menu, select the appropriate SQL Server instance from the Core server. |
Credential Type | Select the appropriate authentication method for your credentials from the following options:
|
User Name | Specify a user name for accessing the SQL Server on the Core based on your selected credential type. |
Password | Specify a password for accessing the SQL Server on the Core based on your selected credential type. |
|
NOTE: If you entered the credentials incorrectly, a message displays to alert you that the credentials failed. Correct the credential information and test the connection again. |
Core jobs are processes that the Rapid Recovery Core performs to support its operations, including backing up to recovery points, replicating data, archiving data, exporting data to VMs, maintaining repositories, and so on. Core jobs are initiated automatically for some operations, such as replicating or archiving on an established schedule. You can also invoke some jobs on demand from various elements on the Core Console.
The following table describes the primary Core jobs available and their functions.
Job Name | Description | Maximum Concurrent Jobs | Try Count | Settings |
---|---|---|---|---|
Check attachability of SQL databases in snapshots |
Lets the Core check the consistency of SQL databases and ensures that all supporting MDF (data) and LDF (log) files are available in the backup snapshot. Process:
|
1 |
0 |
Default |
Check checksum of Exchange databases |
Checks the integrity of recovery points containing Exchange databases. Process:
|
1 |
0 |
Default |
Check mountability of Exchange databases |
Checks that Exchange databases are mountable. |
1 |
0 |
Default |
Replicate protected machines data from remote source |
Transfers a copy of recovery points for a protected machine from a source Core to a target Core. This job runs on the target Core receiving the incoming replicated recovery points. |
3 |
0 |
Default |
Replicate protected machines data to remote target |
Transfers a copy of recovery points for a protected machine from a source Core (on which they were originally saved) to a target Core. This job runs on the source Core and controls outgoing replication. |
1 |
3 |
Default |
Roll up recovery points |
Applies the retention policy to your backed-up data by combining or "rolling up" recovery points on the schedule defined in the retention policy. |
1 |
0 |
Default |
Check recovery points |
Checks the integrity of recovery points. |
1 |
0 |
Add |
Delete all recovery points |
Deletes the full set of recovery points on a protected machine. |
1 |
0 |
Add |
Delete chain of recovery points |
Deletes a complete recovery point chain on a protected machine. |
1 |
0 |
Add |
Delete range of recovery points |
Deletes a set of recovery points on a protected machine, by recovery point identifier or date range. |
1 |
0 |
Add |
Deploy Agent software to machines |
Deploys Rapid Recovery Agent software to the specified machine or machines. |
1 |
0 |
Add |
Download Exchange libraries |
Downloads Microsoft Exchange libraries from the protected machine to the Core machine at path C:\ProgramData\AppRecovery\ExchangeLibraries. |
1 |
0 |
Add |
Export to archive |
Creates backup in the specified path with an archive of the selected recovery points. Process:
|
1 |
0 |
Add |
Export to virtual machine |
Exports data from specified recovery point of protected machine to destination path as a virtual machine. Process:
|
1 |
0 |
Add |
Import archives |
Imports recovery point from the specified backup on a previously created Core archive. |
1 |
0 |
Add |
Maintain repository |
Performs a check of the repository. Process:
|
1 |
0 |
Add |
Mount recovery point snapshots |
Performs mount of recovery point to the specified path. |
1 |
0 |
Add |
Protect ESX virtual machines |
Adds all specified virtual machines to agentless protection. Job is performed immediately after adding agentless protection of one or more VMs to the Core using the Protect Multiple Machines Wizard. Job sets ID number for each specified VM, writes information about the Core to a configuration file, and retrieves metadata from the file. |
1 |
0 |
Add |
Restore from recovery point |
Performs a restore from a recovery point to a specified target machine. Process:
|
1 |
0 |
Add |
Uploading logs |
Uploads logs to specified server. |
1 |
0 |
Add |
Some Core jobs are included in Settings. The Jobs settings let you specify how many concurrent jobs of the same type the Core can run, and how many retries should be attempted if the first job attempt fails.
For more information about these Settings, see Core job settings.
For information on adding jobs to Core Settings, see Adding Core jobs to settings.
For information on editing settings for jobs in the Settings list, see Editing Core job settings.
© ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center