Quest has been named as an ASP "Ten Best Web Support Sites" award winner. Learn more.

Rapid Recovery 6.0.2 - User Guide

*** Legend Introduction to Dell Data Protection | Rapid Recovery Understanding the Rapid Recovery Core Console Working with repositories Managing Rapid Recovery Core settings Using custom groups Working with encryption keys Protecting machines using the Rapid Recovery Core Working with Microsoft Exchange and SQL Servers Protecting server clusters Exporting protected data to virtual machines Managing protected machines Understanding replication Managing events Generating and viewing reports Restoring data Understanding bare metal restore for Windows machines Retention and archiving Managing cloud accounts Working with Linux machines Understanding the Local Mount Utility Central Management Console Understanding the Rapid Recovery Command Line Management utility Understanding the Rapid Recovery PowerShell module
Prerequisites for using PowerShell Working with commands and cmdlets Rapid Recovery PowerShell module cmdlets Localization Qualifiers
Extending Rapid Recovery jobs using scripting Rapid Recovery APIs Glossary

Modifying deploy settings

Complete the steps in this procedure to modify deploy settings.

  1. From the Rapid Recovery Core Console, click [Settings] (Settings).
  2. On the Settings page, in the left column, click Deploy to navigate to the Deploy section.
  3. Modify any of the following options by clicking the setting you want to change to make it editable as a text box or drop-down list, and then click [Save] to save the setting.
    Table 1. Deploy options
    Option Description
    Agent Installer Name Enter the name of the agent executable file. The default is Agent-web.exe.
    Core Address Enter the address for the Core.
    Failed Receive Timeout Enter the number of minutes to wait without activity before timeout.
    Maximum Parallel Installs Enter a number for the maximum installations you want to install simultaneously. The default and limit is 100.
    Automatic reboot after install Select the check box for Yes, or clear it for No.
    Protect After Deploy Select the check box for Yes, or clear it for No.

Was this topic helpful?

[Select Rating]



Understanding protection schedules

A protection schedule defines when backups are transferred from protected agent machines to the Rapid Recovery Core.

The first backup transfer saved to the Core is called a base image snapshot. All data on all specified volumes (including the operating system, applications, and settings), are saved to the Core, which can take a significant amount of time depending on the amount of data being transferred. Thereafter, incremental snapshots (smaller backups, consisting only of data changed on the protected machine since the last backup) are saved to the Core regularly, based on the interval defined (for example, every 60 minutes). This backup contains less data than a base image, and therefore takes a shorter amount of time to transfer.

Protection schedules are initially defined using the Protect Machine Wizard or the Protect Multiple Machines Wizard. Using a wizard, you can customize protection schedules (choosing either periods or a daily protection time) to accommodate your business needs. You can then modify the existing schedule or create a new schedule at any time in the Protection Schedule dialog box from the summary page of a specific protected machine.

Rapid Recovery provides a default protection schedule, which includes a single period spanning all days of the week, with a single time period defined (from 12:00 AM to 11:59 PM). The default interval (the time period between snapshots) is 60 minutes. When you first enable protection, you also activate the schedule. Thus, using the default settings, regardless of the current time of day, the first backup will occur every hour, on the hour (12:00 AM, 1:00 AM, 2:00 AM, and so on).

Selecting periods lets you view the default protection schedule and make adjustments accordingly. Selecting a daily protection time causes Rapid Recovery Core to back up the designated protected machines once daily at a time you specify.

You can customize the schedule to define peak and off-peak times using the weekday and weekend periods available. For example, if your protected machines are mostly in use on weekdays, you could decrease the interval for the weekday period to 20 minutes, resulting in three snapshots every hour. Or you can increase the interval for the weekend period from 60 minutes to 180 minutes, resulting in snapshots once every three hours when traffic is low.

Alternatively, you can change the default schedule to define peak and off-peak times daily. To do this, change the default start and end time to a smaller range of time (for example, 12:00 AM to 4:59 PM), and set an appropriate interval (for example, 20 minutes). This represents frequent backups during peak periods. You can then add an additional weekday time range for the remaining span of time (5:00 pm to 11:59 pm) and set an appropriate (presumably larger) interval (for example, 180 minutes). These settings define an off-peak period that includes 5:00 PM to midnight every day. This customization results in snapshots every three hours from 5:00 PM through 11:59 PM, and snapshots every 20 minutes from 12:00 AM until 4:59 PM.

When you modify or create a protection schedule using the Protection Schedule dialog box, Rapid Recovery gives you the option to save that schedule as a reusable template that you can then apply to other protected machines.

Other options in the protection wizards include setting a daily protection time. This results in a single backup daily at the period defined (the default setting is 12:00 PM).

When protecting one or multiple machines using a wizard, you can initially pause protection, which defines the protection schedule without protecting the machines. When you are ready to begin protecting your machines based on the established protection schedule, you must explicitly resume protection. For more information on resuming protection, see Pausing and resuming protection. Optionally, if you want to protect a machine immediately, you can force a snapshot. For more information, see Forcing a snapshot.


Was this topic helpful?

[Select Rating]



Protecting a machine

If you have already installed the Rapid Recovery Agent software on the machine you want to protect, but have not restarted it yet, restart the machine now.

This topic describes how to start protecting the data on a single machine that you specify using the Protect Machine Wizard.

Note: Unless using agentless protection on a VMware or ESXi host, the machine you want to protect must have the Rapid Recovery Agent software installed in order to be protected. You can choose to install the Agent software prior to this procedure, or you can deploy the software to the target machine as a part of completing the Protect Machine Wizard.

For more information on agentless protection and its restrictions, see Understanding agentless protection.

For more information on installing the Agent software, see “Installing the Rapid Recovery Agent software” in the Dell Data Protection | Rapid Recovery License Portal Installation and Upgrade Guide.
 If the Agent software is not installed prior to protecting a machine, you will not be able to select specific volumes for protection as part of this wizard. In this case, by default, all volumes on the agent machine will be included for protection.

Rapid Recovery supports the protection and recovery of machines configured with EISA partitions. Support is also extended to Windows 8 and 8.1, and Windows 2012 and 2012 R2 machines that use Windows Recovery Environment (Windows RE).

To protect multiple machines using one process simultaneously, see About protecting multiple machines.

When you add protection, you need to define connection information such as the IP address and port, and provide credentials for the machine you want to protect. Optionally, you can provide a display name to appear in the Core Console instead of the IP address. If you change this, you will not see the IP address for the protected machine when you view details in the Core Console. You will also define the protection schedule for the machine.

The protection process includes optional steps you can access if you select an advanced configuration. Advanced options include repository functions and encryption. For example, you can specify an existing Rapid Recovery repository to save snapshots, or create a new repository. You can also specify an existing encryption key (or add a new encryption key) to apply to the data saved to the Core for this machine. For more information about encryption keys, see Working with encryption keys.

The workflow of the protection wizard may differ slightly based on your environment. For example, if the Rapid Recovery Agent software is installed on the machine you want to protect, you will not be prompted to install it from the wizard. Likewise, if a repository already exists on the Core, you will not be prompted to create one.

CAUTION:
Rapid Recovery does not support bare metal restores (BMRs) of Linux machines with ext2 boot partitions. Any BMR performed on a machine with this type of partition results in a machine that does not start. If you want to be able to perform a BMR on this machine in the future, you must convert any ext2 partitions to ext3 or ext4 before you begin protecting and backing up the machine.
  1. Do one of the following:
    • If you are starting from the Protect Machine Wizard, proceed to Step 2.
    • If you are starting from the Rapid Recovery Core Console, from the button bar, click Protect.
    The Protect Machine Wizard appears.
  2. On the Welcome page, select the appropriate installation options:
    • If you do not need to define a repository or establish encryption, select Typical.
    • If you need to create a repository, or define a different repository for backups for the selected machine, or if you want to establish encryption using the wizard, select Advanced (show optional steps).
    • Optionally, if you do not wish to see the Welcome page for the Protect Machine Wizard in the future, select the option Skip this Welcome page the next time the wizard opens.
  3. When you are satisfied with your choices on the Welcome page, then click Next.

    The Connection page appears.

  4. On the Connection page, enter the information about the machine to which you want to connect as described in the following table, and then click Next.
    Table 1. Machine connection settings
    Text Box Description
    Host The host name or IP address of the machine that you want to protect.
    Port The port number on which the Rapid Recovery Core communicates with the Agent on the machine.

    The default port number is 8006.

    User name The user name used to connect to this machine; for example, Administrator (or, if the machine is in a domain, [domain name]\Administrator).
    Password The password used to connect to this machine.
    If the Install Agent page appears next in the Protect Machine Wizard, that means that Rapid Recovery does not detect the Rapid RecoveryAgent on the machine and will install the current version of the software. Go to Step 7.

    If the Upgrade Agent page appears next in the wizard, that means that an older version of the Agent software exists on the machine you want to protect.

    Note: The Agent software must be installed on the machine you want to protect, and that machine must be restarted, before it can back up to the Core. To have the installer reboot the protected machine, select the option After installation, restart the machine automatically (recommended) before clicking Next.
  5. On the Upgrade Agent page, do one of the following:
    • To deploy the new version of the Agent software (matching the version for the Rapid Recovery Core), select Upgrade the Agent to the latest version of the software.
    • To continue protecting the machine without updating the Agent software version, clear the option Upgrade the Agent to the latest version of the software.
  6. Click Next.
  7. Optionally, on the Protection page, if you want a name other than the IP address to display in the Rapid Recovery Core console for this protected machine, then in the Display Name field, type a name in the dialog box.

    You can enter up to 64 characters. Do not use the special characters described in the topic prohibited characters. Additionally, do not begin the display name with any of the character combinations described in the topic prohibited phrases.

  8. Select the appropriate protection schedule as described below:
    • To use the default protection schedule, in the Schedule Settings option, select Default protection.

    With a default protection schedule, the Core will take snapshots of all volumes on the protected machine once every hour. To change the protection settings at any time after you close the wizard, including choosing which volumes to protect, go to the Summary page for the specific protected machine.

    • To define a different protection schedule, in the Schedule Settings option, select Custom protection.
  9. Proceed with your configuration as follows:
    • If you selected a Typical configuration for the Protect Machine Wizard and specified default protection, then click Finish to confirm your choices, close the wizard, and protect the machine you specified.

      The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) will transfer to the repository on the Rapid Recovery Core following the schedule you defined, unless you specified to initially pause protection.

    • If you selected a Typical configuration for the Protect Machine Wizard and specified custom protection, then click Next to set up a custom protection schedule. For details on defining a custom protection schedule, see Creating custom protection schedules.
    • If you selected Advanced configuration for the Protect Machine Wizard, and default protection, then click Next and proceed to Step 14 to see repository and encryption options.
    • If you selected Advanced configuration for the Protect Machine Wizard and specified custom protection, then click Next and proceed to Step 11 to choose which volumes to protect.
  10. On the Protection Volumes page, select which volumes you want to protect. If any volumes are listed that you do not want to include in protection, click in the Check column to clear the selection. Then click Next.
    Note: Typically, it is good practice to protect, at minimum, the System Reserved volume and the volume with the operating system (typically the C drive).
  11. On the Protection Schedule page, define a custom protection schedule and then click Next. For details on defining a custom protection schedule, see Creating custom protection schedules.
    If you already have repository information configured, and you selected the Advanced option in Step 1, then the Encryption page appears. Proceed to Step 13.
  12. On the Repository page, the following:
    • If you already have a repository and want to store the data from this machine for protection in the existing repository, then do the following:
      1. Select Use an existing repository.
      2. Select an existing repository from the list.
      3. Click Next.

      The Encryption page appears. Skip to Step 13 to optionally define encryption.

    • If you want to create a repository, select Create a Repository, and then complete the following steps.
      1. On the Repository, enter the information described in the following table.
        Table 2. Add New Repository settings
        Text Box Description
        Repository Name Enter the display name of the repository.

        By default, this text box consists of the word Repository and a number, which corresponds to the number of repositories for this Core. For example, if this is the first repository, the default name is Repository 1. Change the name as needed.

        Repository names must contain between 1 and 40 alphanumeric characters, including spaces. Do not use prohibited characters or prohibited phrases.

        Concurrent Operations Define the number of concurrent requests you want the repository to support. By default the value is 64.
        Comments Optionally, enter a descriptive note about this repository. You can enter up to 254 characters. For example, type DVM Repository 2.
      2. Click Add Storage Location to define the specific storage location or volume for the repository. This volume should be a primary storage location.
        CAUTION:
        Define a dedicated folder within the root for the storage location for your repository. Do not specify the root location. For example, use E:\Repository\, not E:\. If the repository that you are creating in this step is later removed, all files at the storage location of your repository are deleted. If you define your storage location at the root, all other files in the volume (e.g., E:\) are deleted, which could result in catastrophic data loss.

        The Add Storage Location dialog box appears.

      3. Click Add Storage Location to define the specific storage location or volume for the repository. This volume should be a primary storage location.
      4. In the Storage Location area, specify how to add the file for the storage location. You can choose to add a locally attached storage volume (such as direct attached storage, a storage area network, or network attached storage). You could also specify a storage volume on a Common Internet File System (CIFS) shared location.
        • Select Add file on local disk to specify a local machine, and then enter the information as described in the following table.
          Table 3. Local disk settings
          Text Box Description
          Data path Enter the location for storing the protected data.

          For example, type X:\Repository\Data.

          When specifying the path, use only alphanumeric characters, the hyphen, and the period (only to separate host names and domains). You can use the backslash character only to define levels in the path. Do not use spaces. No other symbols or punctuation characters are permitted.

          Metadata path Enter the location for storing the protected metadata.

          For example, type X:\Repository\Metadata.

          When specifying the path, use only alphanumeric characters, the hyphen, and the period (only to separate host names and domains). You can use the backslash character only to define levels in the path. Do not use spaces. No other symbols or punctuation characters are permitted.

        • Or, select Add file on CIFS share to specify a network share location, and then enter the information as described in the following table.
          Table 4. CIFS share credentials
          Text Box Description
          UNC path Enter the path for the network share location.

          If this location is at the root, define a dedicated folder name (for example, Repository).

          The path must begin with \\. When specifying the path, use only alphanumeric characters, the hyphen, and the period (only to separate host names and domains). The letters a to z are case-insensitive. Do not use spaces. No other symbols or punctuation characters are permitted.

          User name Specify a user name for accessing the network share location.
          Password Specify a password for accessing the network share location.
      5. In the Storage Configuration area, click More Details and enter the details for the storage location as described in the following table.
        Table 5. Storage configuration details
        Text Box Description
        Size Set the size or capacity for the storage location. The minimum size is 1 GB. The default is 250 GB. You can choose from the following:
        • GB
        • TB
          Note: The size that you specify cannot exceed the size of the volume.

          If the storage location is a New Technology File System (NTFS) volume using Windows XP or Windows 7, the file size limit is 16 TB.

          If the storage location is a NTFS volume using Windows 8, 8.1, Windows 10, or Windows Server 2012, 2012 R2, the file size limit is 256 TB.

          Note: For Rapid Recovery to validate the operating system, Windows Management Instrumentation (WMI) must be installed on the intended storage location.
        Write caching policy The write caching policy controls how the Windows Cache Manager is used in the repository and helps to tune the repository for optimal performance on different configurations.

        Set the value to one of the following:

        • On
        • Off
        • Sync

          If set to On, which is the default, Windows controls the caching. This is appropriate for Windows 10, and for versions of Windows Server 2012 and later.

          Note: Setting the write caching policy to On could result in faster performance. If you are using Windows Server 2008 SP2 or Windows Server 2008 R2 SP2, the recommended setting is Off.

          If set to Off, Rapid Recovery controls the caching.

          If set to Sync, Windows controls the caching as well as the synchronous input/output.

        Bytes per sector Specify the number of bytes you want each sector to include. The default value is 512.
        Average bytes per record Specify the average number of bytes per record. The default value is 8192.
      6. Click Next.
    If you chose the Advanced option in Step 1, the Encryption page appears.
  13. Optionally, on the Encryption page, to enable encryption, select Enable Encryption.

    Encryption key fields appear on the Encryption page.

    Note: If you enable encryption, it will be applied to data for all protected volumes for this machine.

You can change encryption settings later from the Rapid Recovery Core Console.
 For more information about encryption, see the topic Working with encryption keys.
    CAUTION:
    Rapid Recovery uses AES 256-bit encryption in the Cipher Block Chaining (CBC) mode with 256-bit keys. While using encryption is optional, Dell highly recommends that you establish an encryption key, and that you protect the passphrase you define. Store the passphrase in a secure location as it is critical for data recovery. Without a passphrase, data recovery is not possible.
  14. On the Encryption page, select one of the following options:
    • If you want to encrypt this protected machine using an encryption key that is already defined on this Rapid Recovery Core, select Encrypt data using an existing Encryption key, and then select the appropriate key from the drop-down menu. Proceed to the next step.
    • If you want to add a new encryption key to the Core and apply that key to this protected machine, then enter the information as described in the following table.
      Table 6. Encryption key settings
      Text Box Description
      Name Enter a name for the encryption key.

      Encryption key names must contain between 1 and 130 alphanumeric characters. You may not include special characters such as the back slash, forward slash, pipe, colon, asterisk, quotation mark, question mark, open or close brackets, ampersand or hash.

      Description Enter a comment for the encryption key.

      This information appears in the Description field when viewing encryption keys from the Core Console.

      Passphrase Enter the passphrase used to control access.

      Best practice is to avoid special characters listed above.

      Record the passphrase in a secure location. Dell Support cannot recover a passphrase. Once you create an encryption key and apply it to one or more protected machines, you cannot recover data if you lose the passphrase.

      Confirm Passphrase Re-enter the passphrase you just entered.
  15. Click Finish to save and apply your settings.

    The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) will transfer to the repository on the Rapid Recovery Core following the schedule you defined, unless you specified to initially pause protection.


Was this topic helpful?

[Select Rating]



Creating custom protection schedules

Complete the steps in this procedure to create custom schedules for protecting data on protected machines when defining protection using a wizard.

  1. On the Protection page of the protection wizard (Protect Machine, Protect Multiple Machines, Protecting a Cluster), select Custom protection.
  2. Click Next.
  3. On the Protection Volumes page, select the volumes you want to protect, and then click Next.
  4. On the Protection Schedule page, to change the interval schedule for any period, do the following:
    1. Select Periods.

      The existing periods display and can be modified. Editable fields include a start time, end time, and interval (Every X minutes) for each period.

    2. For each period, click in the interval text box and type an appropriate interval in minutes.

      For example, highlight the default interval of 60 and replace it with the value 20 to perform snapshots every 20 minutes during this period.

  5. To create a peak and off-peak period for weekdays, change the time range of the weekday period so that it does not include a 24-hour period, set an optimal interval for the peak range, select Take snapshots for the remaining time ,and then set an off-peak interval by doing the following:
    1. Select Periods.

      The existing periods display and can be modified.

    2. Click in the From box or use the clock icon to change the start time for this period.
    3. Click in the To box or use the clock icon to change the end time for this period.
    4. Click in the interval text box and type an appropriate interval in minutes.

      For example, highlight the default interval of 60 and replace it with the value 20 to perform snapshots every 20 minutes during the time range you selected for this period.

    5. Select Take snapshots for the rest of the time, and then enter an interval in minutes.
  6. To set a single time of day for a single backup to occur daily, select Daily protection time and then enter a time in format HH:MM AM. For example, to do a daily backup at 9:00 PM, enter 09:00 PM.
  7. To define the schedule without beginning backups, select Initially pause protection.

    After you pause protection from the wizard, it remains paused until you explicitly resume it. Once you resume protection, backups will occur based on the schedule you established. For more information on resuming protection, see Pausing and resuming protection.

  8. When you are satisfied with changes made to your protection schedule, click Finish or Next, as appropriate. Return to the procedure for the appropriate wizard to complete any requirements remaining.

Was this topic helpful?

[Select Rating]



Related Documents