Quest has been named as an ASP "Ten Best Web Support Sites" award winner. Learn more.

Rapid Recovery 6.0.2 - User Guide

*** Legend Introduction to Dell Data Protection | Rapid Recovery Understanding the Rapid Recovery Core Console Working with repositories Managing Rapid Recovery Core settings Using custom groups Working with encryption keys Protecting machines using the Rapid Recovery Core Working with Microsoft Exchange and SQL Servers Protecting server clusters Exporting protected data to virtual machines Managing protected machines Understanding replication Managing events Generating and viewing reports Restoring data Understanding bare metal restore for Windows machines Retention and archiving Managing cloud accounts Working with Linux machines Understanding the Local Mount Utility Central Management Console Understanding the Rapid Recovery Command Line Management utility Understanding the Rapid Recovery PowerShell module
Prerequisites for using PowerShell Working with commands and cmdlets Rapid Recovery PowerShell module cmdlets Localization Qualifiers
Extending Rapid Recovery jobs using scripting Rapid Recovery APIs Glossary

Customizing nightly jobs for a protected machine

Nightly jobs can be configured at the Core level and the machine level on the appropriate Configuration tab. When nightly job settings are set at the Core level, the changes are applied to all relevant machines protected by that Core. Changes made to the nightly jobs at the machine level supersede the changes made at the Core level, only for the machines specified.

For a list of all nightly jobs, including descriptions and the scope available for each, see the topic Understanding nightly jobs.

Complete the steps in the following procedure to make changes to the nightly jobs for a single protected machine.

  1. In the Rapid Recovery Core Console, under the Protected Machines menu, click the IP address or machine name for the machine for which you want to customize nightly jobs.
    The Summary page for the selected machine appears.
  2. Click the Settings menu.

    The Settings page appears, showing configuration settings for the selected machine.

  3. Optionally, click the Nightly Jobs link to scroll down in the Settings page to view nightly jobs settings.
  4. Under the Nightly Jobs heading, click [Change]Change.

    The Nightly Jobs dialog box appears.

    Note: For information about the Rollup setting, including setting a custom retention policy, see Customizing retention policy settings for a protected machine.
  5. In the Nightly Jobs dialog box, select the jobs you want to include to run nightly, or clear the options you want to omit for this machine.
    Note: Options may vary by machine. For example, a protected machine using Exchange Server may include Check checksum of Exchange databases and Truncate Exchange logs.
  6. Click OK.
    Note: The results of this procedure apply only to the selected protected machine. To apply elsewhere, repeat the procedure for each machine you want to customize. To change the nightly job settings for all machines protected by a Core, see Configuring nightly jobs for the Core.

Was this topic helpful?

[Select Rating]



Viewing system information for a protected machine

The Rapid Recovery Core Console provides you with easy access to system information about the machines protected on your Core.

The General pane includes general information about the Core machine and environment. The Volumes pane lists information about the storage volumes on the Core machine. The Replay Engine Connections pane displays , volumes all of the machines that are being protected.

Complete the steps in this procedure to view detailed system information for a protected machine.

  1. Navigate to the Rapid Recovery Core Console, and from the protected machines menu in the left navigation area, click a protected machine name.
    The Summary page appears for the selected protected machine.
  2. On the Summary page, at the bottom of the Summary pane, click [System information] System Information.
  3. On the System Information page, you can view the following details about the selected protected machine.
    • System Information. This includes Host Name, OS Version, OS Architecture, Memory (Physical), Display Name, Fully Qualified Domain Name, Cache metadata location, Primary cache location, Secondary cache location, and Virtual Machine Type (if applicable).
    • Volumes. This includes the Volume Name, Device ID, File System, Formatted Capacity, Used Capacity, and Mount Points.
    • Processors. This includes the Architecture and Number of Cores.
    • Network Adapters. This includes the Adapter Type and Speed.
    • IP Addresses. This includes the IP Address and Family.

Was this topic helpful?

[Select Rating]



Notification groups, SMTP settings and notification templates for system events

Notification groups let you define sets of specific events for which users are alerted, and the manner in which that notification takes place. To configure or edit notification groups, see Configuring notification groups.

You must also configure Simple Mail Transfer Protocol (SMTP) server settings if you want to send alerts as email messages. For more information on setting email server configuration settings, see Configuring an email server.

When sending notification of events, the system uses an email notification. You can customize this template. For more information on configuring or customizing the email notification template, see Configuring an email notification template.


Was this topic helpful?

[Select Rating]



Accessing protected machine diagnostics

In Rapid Recovery, you can download and view diagnostic information for individual protected machines. Additionally, Rapid Recovery lets you download and view log data for the Core.

To access logs, see the following procedures:


Was this topic helpful?

[Select Rating]



Related Documents