Chat now with support
Chat with Support

Rapid Recovery 6.1.2 - User Guide

Introduction to Rapid Recovery Core Console Core settings Repositories Encryption keys Protecting machines
About protecting machines with Rapid Recovery Support for dynamic and basic volumes Understanding the Rapid Recovery Agent software installer Deploying Agent to multiple machines simultaneously from the Core Console Using the Deploy Agent Software Wizard to deploy to one or more machines Modifying deploy settings Understanding protection schedules Protecting a machine About protecting multiple machines Settings and functions for protected Exchange servers Settings and functions for protected SQL servers
Managing protected machines Snapshots and recovery points Replication Events Reporting VM export Restoring data Bare metal restore
Bare metal restore for Windows machines Understanding boot CD creation for Windows machines Using the Universal Recovery Console for a BMR Performing a bare metal restore for Linux machines Viewing the recovery progress Starting a restored target server Troubleshooting connections to the Universal Recovery Console Repairing boot problems Performing a file system check on the restored volume
Managing aging data Archiving Cloud storage accounts The Local Mount Utility The Central Management Console Core Console references Command Line Management utility PowerShell module
Prerequisites for using PowerShell Working with commands and cmdlets Rapid Recovery PowerShell module cmdlets Localization Qualifiers
Scripting REST APIs About us Glossary

Get-UnprotectedVolumes

The Get-UnprotectedVolumes command returns information about volumes that are available for protection but not currently protected on the Core.

Usage

The usage for the command is as follows:

Command Options

The following table describes the options available for the Get-UnprotectedVolumes command:

Table 250. Get-UnprotectedVolumes command options

Option

Description

Display this help message.

Optional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine.

Optional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password.

If none are provided, then the logged-on user's credentials will be used.

Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a log on.

If none are provided, then the logged-on user's credentials will be used.

Show jobs for a specific protected machine, indicated by IP address.

Example:

Lists all volumes available for protection (but not get protected) on the specified agent machine:

Get-VirtualizedServers

The Get-VirtualizedServers command returns information about virtualized servers.

Usage

The usage for the command is as follows:

Command Options

The following table describes the options available for the Get-VirtualizedServers command:

Table 251. Get-VirtualizedServers command options

Option

Description

Display this help message.

Optional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine.

Optional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password.

If none are provided, then the logged-on user's credentials will be used.

Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a log on.

If none are provided, then the logged-on user's credentials will be used.

Example:

Lists all virtualized servers on the local Core:

Get-Volumes

The Get-Volumes command returns information about volumes on a specified machine that is protected by the Core.

Usage

The usage for the command is as follows:

Command Options

The following table describes the options available for the Get-Volumes command:

Table 252. Get-Volumes command options

Option

Description

Display this help message.

Optional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine.

Optional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password.

If none are provided, then the logged-on user's credentials will be used.

Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a log on.

If none are provided, then the logged-on user's credentials will be used.

Show jobs for a specific protected machine, indicated by IP address.

Example:

Lists all volumes on the specified machine:

New-Base

The New-Base command forces a new base image resulting in a data transfer for the current protected machine. When you force a base image, the transfer will start immediately or will be added to the queue. Only the data that has changed from a previous recovery point will be transferred. If there is no previous recovery point, all data on the protected volumes will be transferred.

Usage

The usage for the command is as follows:

Command Options

The following table describes the options available for the New-Base command:

Table 253. New-Base command options

Option

Description

Display this help message.

Base image for all agents.

Optional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine.

Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none are provided, then the logged-on user's credentials will be used.

Force for the current protected machine’s name.

Optional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password. If none are provided, then the logged-on user's credentials will be used.

Example:

Force base image for all protected machines:

Related Documents