Quest has been named as an ASP "Ten Best Web Support Sites" award winner. Learn more.

Rapid Recovery 6.0.2 - User Guide

*** Legend Introduction to Dell Data Protection | Rapid Recovery Understanding the Rapid Recovery Core Console Working with repositories Managing Rapid Recovery Core settings Using custom groups Working with encryption keys Protecting machines using the Rapid Recovery Core Working with Microsoft Exchange and SQL Servers Protecting server clusters Exporting protected data to virtual machines Managing protected machines Understanding replication Managing events Generating and viewing reports Restoring data Understanding bare metal restore for Windows machines Retention and archiving Managing cloud accounts Working with Linux machines Understanding the Local Mount Utility Central Management Console Understanding the Rapid Recovery Command Line Management utility Understanding the Rapid Recovery PowerShell module
Prerequisites for using PowerShell Working with commands and cmdlets Rapid Recovery PowerShell module cmdlets Localization Qualifiers
Extending Rapid Recovery jobs using scripting Rapid Recovery APIs Glossary

Protecting a cluster

This topic describes how to add a cluster for protection in Rapid Recovery . When you add a cluster to protection, you need to specify the host name or IP address of the cluster, the cluster application, or one of the cluster nodes or machines that includes the Rapid Recovery Agent software.

Note: A repository is used to store the snapshots of data that are captured from your protected nodes. Before you start protecting data in your cluster, you should have set up at least one repository that is associated with your Rapid Recovery Core.

For information about setting up repositories, see Understanding repositories.

  1. From the Rapid Recovery Core Console, click the Protect button drop-down menu, and then click Protect Cluster.
  2. In the Connect to Cluster dialog box, enter the following information.
    Table 1. Connect to Cluster settings
    Text Box Description
    Host The host name or IP address of the cluster, the cluster application, or one of the cluster nodes.
    Port The port number on the machine on which the Rapid Recovery Core communicates with the Agent.

    The default port is 8006.

    User name The user name of the domain administrator used to connect to this machine: for example, domain_name\administrator.
    Note: The domain name is mandatory. You cannot connect to the cluster using the local administrator user name.
    Password The password used to connect to this machine.
  3. Click Connect.
  4. In the Protect Cluster dialog box, select a repository for this cluster.
  5. If you want to secure the recovery points for this cluster using Core-based encryption, select an encryption key.
  6. If you do not want protection to begin immediately after completing this procedure, select Initially pause protection.
  7. To protect the cluster based on default settings, select the nodes for default protection, and then go to Step 10.
    Note: The default settings schedule a snapshot of all volumes every 60 minutes.
  8. To enter custom settings for the cluster (for example, to customize the protection schedule for the shared volumes), do one of the following, and then see Creating custom protection schedules.
    • To customize settings for an individual node, next to the node that you want to customize, click Settings, and then click Function next to the relevant volume.
    • To customize settings for the cluster, click the Settings button at the bottom of the dialog box, and then click Function next to the relevant volume.

    For more information about customizing nodes, see Protecting nodes in a cluster.

  9. When you have made all necessary changes, click Save.
  10. In the Protect Cluster dialog box, click Protect.

Was this topic helpful?

[Select Rating]



Protecting nodes in a cluster

This task requires that you first protect a cluster. For more information, see Protecting a cluster.

This topic describes how to protect the data on a cluster node or machine that has a Rapid Recovery Agent installed. This procedure lets you add individual nodes to protection that you may have omitted when you protected a cluster.

  1. In the Rapid Recovery Core Console, under Protected Machine, click the cluster with the nodes that you want to protect.
  2. On the Summary page for the cluster, click the Protected Nodes.
  3. On the Protected Nodes page, click Protect Cluster Node.
  4. In the Protect Cluster Node dialog box, select or enter as appropriate the following information.
    Table 1. Protect Cluster Node settings
    Text Box Description
    Host A drop-down list of nodes in the cluster available for protection.
    Port The port number on which the Rapid Recovery Core communicates with the Agent on the node.
    User name The user name of the domain administrator used to connect to this node; for example, example_domain\administrator or administrator@example_domain.com.
    Password The password used to connect to this machine.
  5. To add the node, click Connect.
  6. To start protecting this node with default protection settings, go to Step 13.
    Note: The default settings ensure that all volumes on the machine are protected with a schedule of every 60 minutes.
  7. In the Protect [Node Name] dialog box, if you want to use a repository other than the default setting, use the drop-down list to select a repository.
  8. If you want to secure the recovery points for this cluster using Core-based encryption, use the drop-down list to select an encryption key.
  9. If you do not want protection to begin immediately after completing this procedure, select Initially pause protection.
  10. To enter custom settings (for example, to customize the protection schedule for the shared volumes), do the following:
    1. To customize settings for an individual volume, next to the volume that you want to customize, click Function next to the relevant volume.
    2. See Creating custom protection schedules.
  11. Click Protect.

Was this topic helpful?

[Select Rating]



Modifying cluster node settings

Once you have added protection for cluster nodes, you can easily modify basic configuration settings for those machines or nodes (for example, display name, host name, and so on), protection settings (for example, changing the protection schedule for local volumes on the machine, adding or removing volumes, and pausing protection), and more.

To modify cluster node settings, you must perform the following tasks:


Was this topic helpful?

[Select Rating]



Configuring cluster settings

Configuring cluster settings involves performing the following tasks:


Was this topic helpful?

[Select Rating]



Related Documents