Chat now with support
Chat with Support

Rapid Recovery 6.1.2 - User Guide

Introduction to Rapid Recovery Core Console Core settings Repositories Encryption keys Protecting machines
About protecting machines with Rapid Recovery Support for dynamic and basic volumes Understanding the Rapid Recovery Agent software installer Deploying Agent to multiple machines simultaneously from the Core Console Using the Deploy Agent Software Wizard to deploy to one or more machines Modifying deploy settings Understanding protection schedules Protecting a machine About protecting multiple machines Settings and functions for protected Exchange servers Settings and functions for protected SQL servers
Managing protected machines Snapshots and recovery points Replication Events Reporting VM export Restoring data Bare metal restore
Bare metal restore for Windows machines Understanding boot CD creation for Windows machines Using the Universal Recovery Console for a BMR Performing a bare metal restore for Linux machines Viewing the recovery progress Starting a restored target server Troubleshooting connections to the Universal Recovery Console Repairing boot problems Performing a file system check on the restored volume
Managing aging data Archiving Cloud storage accounts The Local Mount Utility The Central Management Console Core Console references Command Line Management utility PowerShell module
Prerequisites for using PowerShell Working with commands and cmdlets Rapid Recovery PowerShell module cmdlets Localization Qualifiers
Scripting REST APIs About us Glossary

Start-HypervExport

The Start-HypervExport PowerShell command initiates the launch of a virtual export from the selected Rapid Recovery recovery point to a Hyper-V server virtual machine.

Usage

The usage for the command is as follows:

Start-HypervExport -core [host name] -user [user name] -password [password] -protectedserver [[machine name] or [IP address]] -volumes [volume names] -rpn [number | numbers] | -time [time string] [-vmname [uselocalmachine] | -hostname [virtual host name] -hostport [virtual host port number] -hostusername [virtual host user name] -hostpassword [virtual host password] -vmlocation [location]] [-ram [total megabytes] | -usesourceram] -diskformat [VHD | VHDX]

Command Options

The following table describes the options available for the Start-HypervExport command:

Table 282. Start-HypervExport command options

Option

Description

Display this help message.

Optional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine.

Optional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password. If none are provided, then the logged-on user's credentials will be used.

Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none are provided, then the logged-on user's credentials will be used.

Protected machine with recovery points to be exported.

Optional. List of volume names to be exported. If not specified, all volumes in the specified recovery points will be exported. Values must be enclosed in double quotes, each separated by a space. do not use trailing slashes in volume names. For example, specify “C:” not “C:/”

Optional. The sequential number of a recovery point to be exported. (You can use the Get-RecoveryPoints command to obtain recovery point numbers.

Optional. Determines recovery point to be selected for export. You need to specify exact time in the format “MM/DD/YYYY hh:mm tt” (for example: “04/24/2015 09:00 AM”).” Specify date time values of the time zone set on your local machine.

Windows name of the virtual machine.

Optional. Specify to use the second VM generation. If not specified, generation 1 is used. Rapid Recovery supports generation 2 from Windows Server 2012 R2 through Windows 8.1.

Optional. If you specify this option, Rapid Recovery uses the VHDX disk format to create the VM. If you do not, it uses the VHD disk format. Generation 2 uses only the VHDX format.

Optional. Connect the local Hyper-V server. If this parameter is used, the following options are ignored: hostname, host port, host username, host password.

The virtual server host name.

The virtual server port number.

The user name to the virtual server host.

The password to the virtual server host.

Local or network path to the folder where you want to store the virtual machine files.

Allocate specific amount of RAM on the virtual server.

Optional. Allocate the same amount of RAM on the virtual server as the source protected machine.

Start-LogTruncation

The Start-LogTruncation command forces log truncation for the specified protected SQL Server or Microsoft Exchange server.

Usage

The usage for the command is as follows:

Command Options

The following table describes the options available for the Start-LogTruncation command:

Table 283. Start-LogTruncation command options

Option

Description

Display this help message.

Optional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine.

Optional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password. If none are provided, then the logged-on user's credentials will be used.

Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none are provided, then the logged-on user's credentials will be used.

Archive of recovery points for the specified machine.

Specify the type of log truncation (either ‘sql’ or ‘exchange’). If not specified, logs are truncated on all databases.

Example:

Truncate SQL logs:

Truncate Exchange server logs: all recovery points for all machines on the Core:

Start-MountabilityCheck

The Start-MountabilityCheck command forces a mountability check for protected Microsoft Exchange mail stores.

Usage

The usage for the command is as follows:

Command Options

The following table describes the options available for the Start-MountabilityCheck command:

Table 284. Start-MountabilityCheck command options

Option

Description

Display this help message.

Optional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine.

Optional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password. If none are provided, then the logged-on user's credentials will be used.

Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none are provided, then the logged-on user's credentials will be used.

Archive of recovery points for the specified machine.

Optional. The sequential number of a recovery point to be exported. (You can use the -GetRecoveryPoints command to obtain recovery point numbers.

Optional. Determines recovery point to be selected for export. You need to specify exact time in the format “MM/DD/YYYY hh:mm tt” (for example: “04/24/2015 09:00 AM”).” Specify date time values of the time zone set on your local machine.

Example:

Start a mountability check for oall recovery points for all machines on the Core:

Start-Protect

The Start-Protect command lets an administrator add a server under protection by a Core.

Usage

Command Options

The following table describes the options available for the Start-Protect command:

Table 285. Start-Protect command options

Option

Description

Display this help message.

Optional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine.

Optional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password. If none are provided, then the logged-on user's credentials will be used.

Optional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none are provided, then the logged-on user's credentials will be used.

Name of a repository on the Core where the protected machine's data is stored.

Protected machine name or IP address.

Log on to the server to be protected.

Password to the server to be protected.

Protected server port number.

List of volumes to protect. Values must be enclosed in double quotes and separated by a space. Do not use trailing slashes in volume names. For example, "c:" or "d:".

Example:

Put volumes of a server under protection:

Related Documents