Quest has been named as an ASP "Ten Best Web Support Sites" award winner. Learn more.

Rapid Recovery 6.0.2 - User Guide

*** Legend Introduction to Dell Data Protection | Rapid Recovery Understanding the Rapid Recovery Core Console Working with repositories Managing Rapid Recovery Core settings Using custom groups Working with encryption keys Protecting machines using the Rapid Recovery Core Working with Microsoft Exchange and SQL Servers Protecting server clusters Exporting protected data to virtual machines Managing protected machines Understanding replication Managing events Generating and viewing reports Restoring data Understanding bare metal restore for Windows machines Retention and archiving Managing cloud accounts Working with Linux machines Understanding the Local Mount Utility Central Management Console Understanding the Rapid Recovery Command Line Management utility Understanding the Rapid Recovery PowerShell module
Prerequisites for using PowerShell Working with commands and cmdlets Rapid Recovery PowerShell module cmdlets Localization Qualifiers
Extending Rapid Recovery jobs using scripting Rapid Recovery APIs Glossary

RemoveVirtualStandby

Use this command to discontinue the continuous export of data to a virtual machine in the Rapid Recovery command utility.

Usage

The usage for the command is as follows:

/removevirtualstandby -core [host name] -user [user name] -password [password login] -protectedserver [name] | -all

Command Options

The following table describes the options available for the removevirtualstandby command:

Table 1. RemoveVirtualStandby command options
Option Description
-?
Display this help message.
-core
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine.
-user
Optional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used.
-password
Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used.
-protectedserver
The name or space-separated names of virtualized machines.
-all
This command specifies whether to remove all scheduled virtual exports.

Examples:

Remove all virtual standby exports:

>cmdutil /removevirtualstandby -all

Remove virtual standby export for two machines:

>cmdutil /removevirtualstandby -protectedserver 10.10.35.48 10.10.35.69

Was this topic helpful?

[Select Rating]



Replicate

Use the Replicate command to set up replication between two Rapid Recovery Cores.

Usage

The usage for the command is as follows:

/replicate -request [email | email customer ID] -targetserver [host name | hostname port | hostname user name password | hostname port user name password] -replicationname [name] -seeddrive [localpath | network path username password] [comment] -protectedserver [name | name repository]

Command Options

The following table describes the options available for the Replicate command:

Table 1. Replicate command options
Option Description
-?
Display this help message.
-core
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine.
-user
Optional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used.
-password
Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used
-request
Optional. Specify this option if you want to use a subscription to a third-party provider of off-site backup and disaster recovery services.
-targetserver
The name of the server where you want to establish replication. It includes the following parameters:
  • port
  • user name
  • password
The port parameter is optional, with a default of 8006. If you used the request option, you should also use the user name and password for the target server.
-replicationname
Optional. Use the name of the replication job if you do not use the request option.
-seeddrive
Optional. Use this option to specify a seed drive for the initial data transfer. The comment parameter is optional.
-protectedserver
The list of protected machines you want to replicate. If you use the request option, list only the names or IP addresses of protected machines. Otherwise, list both protected machines and the corresponding remote repository name.

Example:

Replicate two protected machines to the remote Core using a seed drive from a network share:

>cmdutil /replicate -targetserver 10.10.1.100 Administrator 123Q -replicationname ReplicationName -seeddrive Network \\10.10.1.100\seeddrive Administrator 123Q -protectedserver 10.10.1.1 Repository1 10.10.1.2 Repository2

Was this topic helpful?

[Select Rating]



Replication

Use the replication command to control existing replication between two Rapid Recovery Cores and manage pending replication requests.

Note: This command succeeds the Replicate command, which establishes the connection—called pairing—between the Cores and uses a seed drive for the initial data transfer. For more information about this command, see Replicate.

Usage

The usage for the command is as follows:

/replication [-list [incoming | outgoing | pending] -accept | -deny | -ignore | -delete | -edit] -id [replication ID] -protectedserver [name | name repository] -responsecomment [comment] -deleterecoverypoints -scheduletype [type] -dailystarttime [time] -dailyendtime [time] -weekdaystarttime [time] -weekdayendtime [time] -weekendstarttime [time] -weekendendtime [time]

Command Options

The following table describes the options available for the replication command:

Table 1. Replication command options
Option Description
-?
Display this help message.
-core
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine.
-user
Optional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used.
-password
Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used
-list
The list of incoming or outgoing replication jobs or pending replication requests.
-accept
Accepts the replication request.
-deny
Denies the replication request.
-ignore
Ignores the replication request.
-delete
Use this option to delete an existing replication job or a machine from the replication job. Specify only the -id parameter to delete an entire replication relationship, or specify both the -id and -protectedserver parameters to delete only specific machines from replication.
-edit
Edits the schedule of existing replication jobs.
-id
The identifier for the replication job or pending replication request. It can be a remote Core ID, host name, customer ID, email address, or pending replication request ID.
-protectedserver
When responding to a replication request, use this option to apply your response to list of protected servers with a repository name or ID. Use the parameter "all" to apply response to all requested machines.
-responsecomment
The comment you provide with the response to a pending replication request.
-deleterecoverypoints
Use this option if specific recovery points from a deleted replicated machine should also be removed.
-scheduletype
If you use the -edit option, this option specifies the type of replication schedule. Include one of the following four values:
  • atalltimes - Automatically replicate at any time.
  • daily - Replicate daily. Specify the -dailystarttime and -dailyendtime parameters.
  • custom - When using daily replication, use this value to schedule replication on weekdays or weekends. Specify the -weekdaystarttime, -weekdayendtime, -weekendstarttime, and -weekendendtime parameters.
-dailystarttime
Use only for the daily value of the -scheduletype option. It is used to establish a window of time for when replication should occur. Use this option to specify the earliest time of day when you want replication to start.
-dailyendtime
Use only for the daily value of the -scheduletype option. It is used to establish a window of time for when replication should occur. Use this option to specify the latest time of day when you want replication to start.
-weekdaystarttime
Use only for the custom value of the -scheduletype option. It is used to establish a window of time for when replication should occur. Use this option to specify the earliest time of a weekday when you want replication to start.
-weekdayendtime
Use only for the custom value of the -scheduletype option. It is used to establish a window of time for when replication should occur. Use this option to specify the latest time of a weekday when you want replication to start.
-weekendstarttime
Use only for the custom value of the -scheduletype option. It is used to establish a window of time for when replication should occur. Use this option to specify the earliest time of the weekend when you want replication to start.
-weekendendtime
Use only for the custom value of the -scheduletype option. It is used to establish a window of time for when replication should occur. Use this option to specify the latest time of the weekend when you want replication to start.

Example:

List all incoming replication:

>cmdutil /replication -list incoming

Accept pending replication requests for two protect machines:

>cmdutil /replication -accept -id customer@email.address -protectedserver 10.10.1.1 Repository1 10.10.1.2 Repository2 -responsecomment A response comment

Deny a pending replication request:

>cmdutil /replication -deny -id customer@email.address

Delete existing replication with replicated recovery points:

>cmdutil /replication -delete -id RemoteServerHostname -deleterecoverypoints

Remove two machines from existing replication:

>cmdutil /replication -delete -id "156d7a46-8e44-43f4-9ed8-60d998e582bf" -protectedserver 10.10.1.1 10.10.1.2

Edit schedule of replication with specified weekday and weekend times:

>cmdutil /replication -edit -id RemoteServerHostName -scheduletype custom -weekdaystarttime "9:00 AM" -weekdayendtime "6:00 PM" -weekendstarttime "9:00 AM" -weekendendtime "6:00 PM"

Was this topic helpful?

[Select Rating]



RestoreAgent

The restoreagent command lets you restore a protected machine or volume from a specific Rapid Recovery recovery point.

Usage

The usage for the command is as follows:

/restoreagent -protectedserver [name | IP address] -rpn [recovery point number] -volumes [IDs | names | all] -targetmachine [name] -targetvolume [volume name] -forcedismount -autorestart

Command Options

The following table describes the options available for the restoreagent command:

Table 1. RestoreAgent command options
Option Description
-?
Display this help message.
-core
Optional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine.
-user
Optional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used.
-password
Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used.
-protectedserver
The name or IP address of the server you want to restore.
-rpn
The identification number of the recovery point you want to use to restore the machine. To find the correct number, use the command /list rps.
-volumes
The IDs or names of the volumes you want to restore. To restore all protected volumes, use -volumes all.
-targetmacchine
The name of the machine to which you want to restore the protected machine.
-targetvolume
The name or ID of the volume to which you want to restore the machine.
-forcedismount
Optional. Use this option to force the dismount of the database on demand.
-autorestart
Optional. Use this command if restarting an Exchange Server machine is necessary.

Example:

Restore a machine to a protected machine with the IP address 192.168.20.130, including the force database dismount option:

>cmdutil /restoreagent -protectedserver 192.168.20.130 -rpn 259 -volumes "F:" "E:" "C:" -targetmachine 192.168.20.174 -targetvolume "E:" "G:" "F:" -forcedismount

Was this topic helpful?

[Select Rating]



Related Documents