The usage for the command is as follows:
The following table describes the options available for the opentieredrepository command:
Optional. The tiering repository port. If you do not provide one, Rapid Recovery uses the default port. | |
Optional. The login to the tiering repository service. If you do not provide one, Rapid Recovery uses a default user name. | |
Optional. The password for the tiering repository service. If you do not provide one, Rapid Recovery uses a default password. | |
Optional. The ID of the stored tiering repository. You can use this option instead of -corename if there is more than one Core stored in the repository. | |
Optional. Use this option and set it to true if the tiering repository is currently being used by another Core. | |
Open an existing tiering repository:
An administrator can pause snapshots, export to virtual machines, or replicate a Core. The pause command accepts three parameters: snapshot, vmexport, and replication. Only one parameter can be specified. A snapshot can be paused until a certain time, if a time parameter is specified.
A user can pause replication in three ways:
• |
• |
• |
The usage for the command is as follows:
The following table describes the options available for the pause command:
[snapshots], [replication] or [vmexport]. | |
Optional. Host name of the remote core that replicates to the core machine. | |
Optional. Host name of the remote target core to which data is replicated. | |
Pause creating snapshots for a specific protected server:
Pause export to virtual machine for all protected machines on the core:
Pause outgoing replication on the core for a specific protected machine:
Pause outgoing replication for all protected machines on the target core:
Pause incoming replication for all machines on the target core:
The protect command adds a server under protection by a core.
The usage for the command is as follows:
The following table describes the options available for the protect command:
Protect specific volumes of a server with the Core:
The protectcluster command adds a cluster under protection by a core.
The usage for the command is as follows:
The following table describes the options available for the protectcluster command:
List of the cluster nodes and the volumes you want to protect on each node. |
© 2024 Quest Software Inc. ALL RIGHTS RESERVED. Feedback Terms of Use Privacy Cookie Preference Center