Quest has been named as an ASP "Ten Best Web Support Sites" award winner. Learn more.

Rapid Recovery 6.0.2 - User Guide

*** Legend Introduction to Dell Data Protection | Rapid Recovery Understanding the Rapid Recovery Core Console Working with repositories Managing Rapid Recovery Core settings Using custom groups Working with encryption keys Protecting machines using the Rapid Recovery Core Working with Microsoft Exchange and SQL Servers Protecting server clusters Exporting protected data to virtual machines Managing protected machines Understanding replication Managing events Generating and viewing reports Restoring data Understanding bare metal restore for Windows machines Retention and archiving Managing cloud accounts Working with Linux machines Understanding the Local Mount Utility Central Management Console Understanding the Rapid Recovery Command Line Management utility Understanding the Rapid Recovery PowerShell module
Prerequisites for using PowerShell Working with commands and cmdlets Rapid Recovery PowerShell module cmdlets Localization Qualifiers
Extending Rapid Recovery jobs using scripting Rapid Recovery APIs Glossary

Modifying cluster transfer settings

In Rapid Recovery, you can modify the settings to manage the data transfer processes for a protected cluster.

There are three types of transfers in Rapid Recovery:

Types of transfer in Rapid Recovery
Transfer Type Description
Snapshot Backs up the data on your protected cluster.
Virtual machine export Creates a virtual machine with all of the backup information and parameters specified by the scheduled defined for protecting the cluster.
Restore Recovers backup information for a protected cluster.
Note: You can modify cluster transfer settings only if your cluster has shared volumes.
  1. In the Rapid Recovery Core Console, under the Protected Machines menu, click the cluster.
    The Summary page for the selected cluster appears.
  2. On the Summary page, click Settings.
  3. On the left side of the Settings page, click Transfer.

    The transfer settings for the cluster appear.

    When you click on a setting you want to change, that setting becomes editable as a text field or a drop-down menu.

    For each setting, when satisfied with your changes, click [Save] to save the change and exit edit mode, or click to [Cancel] exit edit mode without saving.

  4. Change any of the transfer settings described in the following table by clicking the setting.
    Table 1. Cluster transfer settings
    Text Box Description
    [Restore default] Restore Default This control restores all transfer settings to the system default settings.
    Priority Sets the transfer priority between protected machines. Enables you to assign priority by comparison with other protected machines. Select a number from 1 to 10, with 1 being the highest priority. The default setting establishes a priority of 5.
    Note: Priority is applied to transfers that are in the queue.
    Maximum Concurrent Streams Sets the maximum number of TCP links that are sent to the Core to be processed in parallel per protected machine.
    Note: Dell recommends setting this value to 8. If you experience dropped packets, try increasing this setting.
    Maximum Concurrent Writes Sets the maximum number of simultaneous disk write actions per protected machine connection.
    Note: Dell recommends setting this to the same value you select for Maximum Concurrent Streams. If you experience packet loss, set slightly lower—for example, if Maximum Current Streams is 8, set this to 7.
    Use Core Default Maximum Retries Select this option to use default retries number for each protected machine, if some of the operations fail to complete.
    Maximum Segment Size Specifies the largest amount of data, in bytes, that a computer can receive in a single TCP segment. The default setting is 4194304.

    Do not change this setting from the default unless directed to do so by a Dell Support representative.

    Maximum Transfer Queue Depth Specifies the amount of commands that can be sent concurrently. The default setting is 64.

    You can adjust this to a higher number if your system has a high number of concurrent input/output operations.

    Outstanding Reads per Stream Specifies how many queued read operations will be stored on the back end. This setting helps to control the queuing of protected machines. The default setting is 0.
    Transfer Data Server Port Sets the port for transfers. The default setting is 8009.
    Transfer Timeout Specifies in minutes and seconds the amount of time to allow a packet to be static without transfer.
    Snapshot Timeout Specifies in minutes and seconds the maximum time to wait to take a snapshot.
    Snapshot Cleaning Timeout Specifies in minutes and seconds the maximum time for process of deleting VSS snapshot on a protected machine.
    Network Read Timeout Specifies in minutes and seconds the maximum time to wait for a read connection. If the network read cannot be performed in that time, the operation is retried.
    Network Write Timeout Specifies the maximum time in seconds to wait for a write connection. If the network write cannot be performed in that time, the operation is retried.

Was this topic helpful?

[Select Rating]



Converting a protected cluster node to a protected machine

In Rapid Recovery, you can convert a protected cluster node to a protected machine so that it is still managed by the Core, but it is no longer part of the cluster. This is helpful, for example, if you need to remove the cluster node from the cluster but still keep it protected.

  1. In the Rapid Recovery Core Console, navigate to the cluster that contains the machine you wish to convert, and then click Protected Nodes.
  2. On the Protected Nodes page, from the specific node you want to convert, click the Actions drop-down menu and select Convert to Agent.
  3. To add the machine back to the cluster, select the machine, and then on the Summary tab, from the Actions menu, select Convert to Cluster Node, and then click Yes to confirm the action.

Was this topic helpful?

[Select Rating]



Viewing server cluster information

Complete the steps in the following procedures to view summary, event, alert information, and so on for server clusters.

Viewing cluster system information

Complete the steps in this procedure to view detailed system information about a cluster.

  1. In the Rapid Recovery Core Console, under Protected Machines, click the cluster that you want to view.
  2. On the Summary page for the cluster, click the More drop-down menu, and then click System Information.

    The system information page displays to show system details about the cluster such as name, included nodes with associated state and Windows versions, network interface information, and volume capacity information.

Viewing cluster tasks, events and alerts

Complete the steps in this procedure to view events and alerts for a cluster.

For information about viewing events and alerts for an individual machine or node in a cluster, see Viewing events using tasks, alerts, and journal.

  1. In the Rapid Recovery Core Console, under Protected Machines, click the cluster that you want to view.
  2. On the Summary page for the cluster, click Events.

    The Events page opens and shows all tasks for this cluster.

  3. To filter the tasks that display for this cluster, see Viewing tasks.
  4. To view only alerts, click Alerts.

    The list of events is filtered to display only alerts for the cluster or node you selected.

  5. Optionally, if you want to remove all alerts from the page, click Dismiss All.
  6. To view a collection of all events for this machine, click Journal.

    All events display for the cluster or node you selected.

Viewing summary information

Complete the steps in this procedure to view summary information about a cluster including information about the associated quorum for the cluster.

  1. In the Rapid Recovery Core Console, under Protected Machines, click the cluster you want to view.

    The Summary page for the machine appears.

  2. On the Summary page, you can view such information as the cluster name, cluster type, quorum type (if applicable), and the quorum path (if applicable). This tab also shows at-a-glance information about the volumes in this cluster, including size and protection schedule. If applicable, you can also view SQL Server or Exchange Server information for a different cluster.
  3. To view the most current information, click Refresh.

For information about viewing summary and status information for an individual machine or node in the cluster, see Viewing machine status and other details.


Was this topic helpful?

[Select Rating]



Working with cluster recovery points

A recovery point, also referred to as a snapshot, is a point-in-time copy of the folders and files for the shared volumes in a cluster, which are stored in the repository. Recovery points are used to recover protected machines or to mount to a local file system. In Rapid Recovery, you can view the lists of recovery points in the repository. Complete the steps in the following procedure to review recovery points.

Note: If you are protecting data from a DAG or CCR server cluster, the associated recovery points do not appear at the cluster level. They are only visible at the node or machine level.

For information about viewing recovery points for individual machines in a cluster, see Viewing recovery points.

  1. In the Rapid Recovery Core Console, under Protected Machines, click the cluster for which you wish to view recovery points.
  2. On the Summary tab for the cluster, click Recovery Points.
  3. To view detailed information about a specific recovery point, click the arrow next to a recovery point in the list to expand the view.

    For information about the operations you can perform on the recovery points, see Viewing a specific recovery point.

  4. To mount a recovery point, see Mounting a recovery point.
  5. To delete recovery points, see Removing recovery points.

Was this topic helpful?

[Select Rating]



Related Documents