Quest has been named as an ASP "Ten Best Web Support Sites" award winner. Learn more.

Rapid Recovery 6.0.2 - User Guide

*** Legend Introduction to Dell Data Protection | Rapid Recovery Understanding the Rapid Recovery Core Console Working with repositories Managing Rapid Recovery Core settings Using custom groups Working with encryption keys Protecting machines using the Rapid Recovery Core Working with Microsoft Exchange and SQL Servers Protecting server clusters Exporting protected data to virtual machines Managing protected machines Understanding replication Managing events Generating and viewing reports Restoring data Understanding bare metal restore for Windows machines Retention and archiving Managing cloud accounts Working with Linux machines Understanding the Local Mount Utility Central Management Console Understanding the Rapid Recovery Command Line Management utility Understanding the Rapid Recovery PowerShell module
Prerequisites for using PowerShell Working with commands and cmdlets Rapid Recovery PowerShell module cmdlets Localization Qualifiers
Extending Rapid Recovery jobs using scripting Rapid Recovery APIs Glossary

Performing a continual (Virtual Standby) VirtualBox export

To perform this step, VirtualBox must be installed on the Core machine.

Complete the steps in this procedure to perform a continuous export to a VirtualBox virtual machine (VM) using Rapid Recovery.

  1. In the Rapid Recovery Core Console, do one of the following:
    • From the Core Console, in the button bar, click the [Restore] Restore drop-down menu, and then select VM Export.
      1. In the Virtual Machine Export Wizard, select Continuous (Virtual Standby).
      2. Click Next.
    • From the Core Console, in the icon bar, click [Virtual Standby] (Virtual Standby).
      • On the Virtual Standby page, click Add to launch the Virtual Machine Export Wizard.
  2. On the Machines page of the Virtual Machine Export Wizard, select the protected machine that you want to export.
  3. Click Next.
  4. On the Recovery Points page, select the recovery point that you want to use for the export.
  5. Click Next.
  6. On the Destination page of the Export Wizard, in the Recover to a Virtual Machine drop-down menu, select VirtualBox.
  7. On the Virtual Machine Options page, select Remote Linux Machine.
  8. Enter information about the virtual machine as described in the following table.
    Table 1. Remote Linux machine settings
    Option Description
    VirtualBox Host Name Enter an IP address or host name for the VirtualBox server. This field represents the IP address or host name of the remote VirtualBox server.
    Port Enter a port number for the machine. This number represents the port through which the Core communicates with this machine.
    Virtual Machine Name Enter a name for the virtual machine being created.
    Note: The default name is the name of the source machine.
    Target Path Specify a target path to create the virtual machine.
    Note: It is recommended that you create a root folder from root so that the virtual machine runs from root. If you do not use root, you will need to create the destination folder manually on the target machine prior to setting up the export. You will also need to manually attach or load the virtual machine after the export.
    User Name User name of the account on the target machine, for example, root.
    Password Password for the user account on the target machine.
    Memory Specify the memory usage for the virtual machine by clicking one of the following:
    • Use the same amount of RAM as source machine
    • Use a specific amount of RAM, and then specify the amount in MB

      The minimum amount is 1024 MB and the maximum allowed by the application is 65536 MB. The maximum amount of memory usage is limited by the amount of RAM available to the host machine.

  9. Select Perform initial one-time export to perform the virtual export immediately instead of after the next scheduled snapshot.
  10. Click Next.
  11. On the Volumes page, select the volumes of data to export, and then click Next.
  12. On the Summary page, click Finish to complete the wizard and to start the export.
    Note: You can monitor the status and progress of the export by viewing the Virtual Standby or Events pages.

Was this topic helpful?

[Select Rating]



Managing protected machines

This section describes how to view, configure and manage the protected machines in your Rapid Recovery environment.


Was this topic helpful?

[Select Rating]



About managing protected machines

The tasks you can accomplish to manage protected machines are broken down into a few categories.


Was this topic helpful?

[Select Rating]



Viewing protected machines

From the Home page on the Rapid Recovery Core Console, when viewing the Summary Tables view, you can see summary information for any machines protected by the Core in the Protected Machines pane.

Note: A software agent acts on behalf of the user to take specific actions. Protected machines are sometimes referred to as agents, since they run the Rapid Recovery Agent software to facilitate data backup and replication on the Rapid Recovery Core.

You can view the status, the display name for each machine, which repository it uses, the date and time of the last snapshot, how many recovery points exist in the repository for the machine, and the total amount of storage space the snapshots use in the repository.

To manage aspects of any protected machine, start by navigating to the machine you want to view, configure, or manage. From the Home page, there are three ways to navigate to a protected machine:

  • You can click on the IP address or display name of any protected machine from the Protected Machines pane. This takes you to the Summary page for the selected protected machine.
  • In the left navigation area, you can click on the title of the Protected Machines menu. The Protected Machines page appears. On the Protected Machines page, you can see summary information about each machine. For a detailed description of this page, see Viewing summary information for a protected machine.
  • In the left navigation area, under the Protected Machines menu, you can click any protected machine IP address or display name. This takes you to the Summary page for the selected protected machine. For a detailed description of this page, see Viewing summary information for a protected machine

Was this topic helpful?

[Select Rating]



Related Documents