Quest has been named as an ASP "Ten Best Web Support Sites" award winner. Learn more.

Rapid Recovery 6.0.2 - User Guide

*** Legend Introduction to Dell Data Protection | Rapid Recovery Understanding the Rapid Recovery Core Console Working with repositories Managing Rapid Recovery Core settings Using custom groups Working with encryption keys Protecting machines using the Rapid Recovery Core Working with Microsoft Exchange and SQL Servers Protecting server clusters Exporting protected data to virtual machines Managing protected machines Understanding replication Managing events Generating and viewing reports Restoring data Understanding bare metal restore for Windows machines Retention and archiving Managing cloud accounts Working with Linux machines Understanding the Local Mount Utility Central Management Console Understanding the Rapid Recovery Command Line Management utility Understanding the Rapid Recovery PowerShell module
Prerequisites for using PowerShell Working with commands and cmdlets Rapid Recovery PowerShell module cmdlets Localization Qualifiers
Extending Rapid Recovery jobs using scripting Rapid Recovery APIs Glossary

Deploying to machines on a VMware vCenter/ESX(i) virtual host

Use this procedure to simultaneously deploy the Rapid Recovery Agent software to one or more machines on a VMware vCenter/ESX(i) virtual host.

Before starting this procedure, you must have the following information:
  • Logon credentials for the VMware vCenter/ESX(i) virtual host.
  • Host location.
  • Logon credentials for each machine you want to protect.
Note: All virtual machines must have VMware Tools installed; otherwise, Rapid Recovery cannot detect the host name of the virtual machine to which to deploy. In lieu of the host name, Rapid Recovery uses the virtual machine name, which may cause issues if the host name is different from the virtual machine name.
  1. On the Rapid Recovery Core Console, click the Protect drop-down menu, and then click Deploy Agent Software.
    The Deploy Agent Software Wizard opens.
  2. On the Connection page of the wizard, from the Source drop-down list, select vCenter / ESX(i).
  3. Enter the host information and logon credentials as described in the following table.
    Table 1. vCenter/ESX(i) connection settings
    Text Box Description
    Host The name or IP address of the VMware vCenter Server/ESX(i) virtual host.
    Port The port used to connect to the virtual host.

    The default setting is 443.

    User name The user name used to connect to the virtual host; for example, Administrator or, if the machine is in a domain, [domain name]\Administrator.
    Password The secure password used to connect to this virtual host.
  4. Click Next.
  5. On the Machines page of the wizard, select one of the following options from the drop-down menu:
    • Hosts and Clusters
    • VMs and Templates
  6. Expand the list of machines, and then select the VMs to which you want to deploy the software.
    A notification appears if Rapid Recovery detects that a machine is offline or that VMware Tools are not installed.
  7. If you want to restart the machines automatically after deployment, select After Agent installation, restart the machines automatically (Recommended).
  8. Click Next.
    Rapid Recovery automatically verifies each machine you selected.
  9. On the Adjustments page of the wizard, enter the credentials for each machine in the following format: hostname::username::password.
    Note: Enter one machine on each line.
  10. Click Finish.
    The system automatically verifies each machine that you selected.

    If Rapid Recovery detects any concerns during automatic verification, the wizard progresses to a Warnings page, where you can clear machines from selection and manually verify the selected machines. If the machines you added pass the automatic verification, they appear on the Deploy Agent to Machines pane.

  11. If the Warning page appeared and you are still satisfied with your selections, click Finish again.
The Rapid Recovery Agent software deploys to the specified machines. The machines are not yet protected. Protection begins after you complete Protecting multiple machines on a VMware vCenter/ESX(i) virtual host.

Was this topic helpful?

[Select Rating]



Deploying an upgrade of the Rapid Recovery Agent software to protected machines

You can use the Deploy Agent Software Wizard to push an upgrade of the Rapid Recovery Agent software to machines that are already protected by the local Rapid Recovery Core.

  1. On the Rapid Recovery Core Console, click the Protect drop-down menu, and then click Deploy Agent Software.
    The Deploy Agent Software Wizard opens.
  2. On the Connection page of the wizard, from the Source drop-down list, select Local Core.
  3. Click Next.
  4. On the Machines page of the wizard, select the protected machines to which you want to deploy an upgrade of the Rapid Recovery Agent software.
  5. Click Finish.
    The system automatically verifies each machine that you selected.

    If Rapid Recovery detects any concerns during automatic verification, the wizard progresses to a Warnings page, where you can clear machines from selection and manually verify the selected machines. If the machines you added pass the automatic verification, they appear on the Deploy Agent to Machines pane.

  6. If the Warning page appeared, and you are still satisfied with your selections, click Finish again.

Was this topic helpful?

[Select Rating]



Deploying to machines manually

Use the following procedure to deploy the Rapid Recovery Agent to multiple machines on any type of host other than the local Core, Active Directory, or vCenter/ESXi.

  1. On the Rapid Recovery Core Console, click the Protect drop-down menu, and then select Deploy Agent Software.
    The Deploy Agent Software Wizard opens.
  2. On the Connection page of the wizard, from the Source drop-down list, select Manually.
  3. Click Next.
  4. On the Machines page of the wizard, enter the machine details in the dialog box in the format hostname::username::password::port. Examples include:
    10.255.255.255::administrator::&11@yYz90z::8006
    abc-host-00-1::administrator::99!zU$o83r::168
  5. If you want to restart the machines automatically after deployment, select After Agent installation, restart the machines automatically (Recommended).
  6. Click Finish.
    The system automatically verifies each machine that you selected.

    If Rapid Recovery detects any concerns during automatic verification, the wizard progresses to a Warnings page, where you can clear machines from selection and manually verify the selected machines. If the machines you added pass the automatic verification, they appear on the Deploy Agent to Machines pane.

  7. If the Warning page appeared, and you are still satisfied with your selections, click Finish again.
The Rapid Recovery Agent software deploys to the specified machines. The machines are not yet protected. Protection begins after you complete Protecting multiple machines manually.

Was this topic helpful?

[Select Rating]



Verifying the deployment to multiple machines

Once you have deployed the Rapid Recovery Agent software to two or more machines simultaneously, you can verify the success by viewing each machine listed under the Protected Machines menu.

You can also view information regarding the bulk deploy process from the Events page. Complete the steps in this procedure to verify the deployment.

  1. Navigate to the Rapid Recovery Core Console, click [Events] (Events), and then click Alerts.
    Alert events appear in the list, showing the time the event initiated and a message. For each successful deployment of the Agent software, you will see an alert indicating that the protected machine has been added.
  2. Optionally, click on any link for a protected machine.

    The Summary page for the selected machine appears, showing pertinent information including:

    • The host name of the protected machine
    • The last snapshot, if applicable
    • The time of the next scheduled snapshot, based on the protection schedule for the selected machine
    • The encryption key, if any, used for this protected machine.
    • The version of the Agent software.

Was this topic helpful?

[Select Rating]



Related Documents