• |
Quest NetVault Installation Guide: This guide provides information about installing the NetVault Server and Client software. |
• |
Quest NetVault Administrator’s Guide: This guide provides information about configuring and using NetVault to protect your data. It provides comprehensive information about all NetVault features and functionality. |
• |
RHV documentation: You can download the documentation from https://access.redhat.com/documentation/en-us/. |
• |
RHV-M: The RHV-M provides the access point for an RHV cluster. You must define an RHV-M for each RHV cluster and provide credentials for the RHV-M when configuring the Plug‑in for Red Hat Virtualization on the backup proxy VM. The RHV backup proxy VM connects to RHV using the RHV-M to list, back up, and restore the VMs on this cluster. |
• |
Backup proxy: The backup proxy accesses the storage container associated with the RHV cluster. You must create a Windows backup proxy VM for each cluster that you want to protect. You should install the NetVault Client on this VM, and then deploy the Plug‑in for Red Hat Virtualization on this VM. This configuration works with all types of storage devices, including local storage on the Red Hat Virtualization Server. You must create a Windows-based backup proxy for each cluster that you want to protect. The number of CPU cores of the Windows proxy VM should be greater than the number of streams you select for backup. |
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. Terms of Use Privacy Cookie Preference Center