1. |
On the Rapid Recovery Core Console, click the Protect drop-down menu, and then click Protect Multiple Machines. |
2. |
◦ |
3. |
4. |
5. |
6. |
On the Select Machines page, enter the machine details in the dialog box in the format hostname::username::password::port. The port setting is optional. Examples include: |
7. |
8. |
Optionally, on the Machines Warnings page, you can verify any machine by selecting the machine and then clicking Verify in the toolbar. |
9. |
Optionally, on the Machines Warnings page, select After Agent installation, restart the machines automatically. |
NOTE: Quest recommends this option. You must restart agent machines before they can be protected. Restarting ensures that the Agent service is running, and that proper kernel module is used to protect the machine, if relevant. |
10. |
11. |
◦ |
If you want to use the default protection schedule, then in the Schedule Settings option, select Default protection (hourly snapshots of all volumes). |
◦ |
◦ |
If you selected a Typical configuration for the Protect Machine Wizard and specified default protection, then click Finish to confirm your choices, close the wizard, and protect the machine you specified. |
The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) will transfer to the repository on the Rapid Recovery Core following the schedule you defined, unless you specified to initially pause protection.
◦ |
◦ |
If you selected Advanced configuration for the Protect Machine Wizard, and default protection, then click Next and proceed to Step 14 to see repository and encryption options. |
◦ |
If you selected Advanced configuration for the Protect Machine Wizard and specified custom protection, click Next, to set up a custom protection schedule. For details on defining a custom protection schedule, see Creating a custom protection schedule from a wizard in Simple Mode. |
13. |
1. |
Select Use an existing repository. |
3. |
Click Next. |
The Encryption page appears. Skip to Step 19 to optionally define encryption.
◦ |
If you want to create a repository, select Create a Repository, and then complete the following steps. |
1. |
On the Repository, enter the information described in the following table. |
2. |
Click Add Storage Location to define the specific storage location or volume for the repository. This volume should be a primary storage location. |
CAUTION: Define a dedicated folder within the root for the storage location for your repository. Do not specify the root location. For example, use E:\Repository\, not E:\. If the repository that you are creating in this step is later removed, all files at the storage location of your repository are deleted. If you define your storage location at the root, all other files in the volume (e.g., E:\) are deleted, which could result in catastrophic data loss. |
3. |
Click Add Storage Location to define the specific storage location or volume for the repository. This volume should be a primary storage location. |
4. |
In the Storage Location area, specify how to add the file for the storage location. You can choose to add a locally attached storage volume (such as direct attached storage, a storage area network, or network attached storage). You could also specify a storage volume on a Common Internet File System (CIFS) shared location. |
▪ |
Select Add file on local disk to specify a local machine, and then enter the information as described in the following table. |
Enter the location for storing the protected data. For example, type X:\Repository\Data. | |
Enter the location for storing the protected metadata. For example, type X:\Repository\Metadata. |
▪ |
Or, select Add file on CIFS share to specify a network share location, and then enter the information as described in the following table. |
5. |
In the Storage Configuration area, click More Details and enter the details for the storage location as described in the following table. |
| |||||||||
Set the value to one of the following:
If set to Off, Rapid Recovery controls the caching. If set to Sync, Windows controls the caching as well as the synchronous input/output. | |||||||||
Specify the number of bytes you want each sector to include. The default value is 512. | |||||||||
Specify the average number of bytes per record. The default value is 8192. |
6. |
Click Next. |
14. |
Encryption key fields appear on the Encryption page.
NOTE: If you enable encryption, it will be applied to data for all protected volumes for this machine. You can change the settings later from the Encryption Keys page in the Rapid Recovery Core Console.
For more information about encryption, see the topic Encryption keysUnderstanding encryption keys. |
CAUTION: Rapid Recovery uses AES 256-bit encryption in the Cipher Block Chaining (CBC) mode with 256-bit keys. While using encryption is optional, Quest highly recommends that you establish an encryption key, and that you protect the passphrase you define. Store the passphrase in a secure location, as it is critical for data recovery. Without a passphrase, data recovery is not possible. |
15. |
If you want to encrypt these protected machines using an encryption key that is already defined on this Rapid Recovery Core, select Encrypt data using an existing Encryption key, and select the appropriate key from the drop-down menu. |
Enter the passphrase used to control access. | |
17. |
18. |
The Rapid Recovery Agent software is deployed to the specified machines, if necessary, and the machines are added to protection on the Core.
You can monitor the progress as Rapid Recovery applies the protection polices and schedules to the machines.
1. |
In the Rapid Recovery Core Console, navigate to the Rapid Recovery Home page and then click |
The Events page displays, broken down by Tasks, Alerts, and Events. As volumes are transferred, the status, start times, and end times display in the Tasks pane.
You can also filter tasks by status (active, waiting, completed, queued, and failed). For more information, see Viewing tasks.
As each protected machine is added, an alert is logged, which lists whether the operation was successful or if errors were logged. For more information, see Viewing alerts.
For information on viewing all events, see Viewing a journal of all logged events.
If you are protecting a Microsoft Exchange Server in your Core, there are additional settings you can configure in the Rapid Recovery Core Console, and there are additional functions you can perform.
A single setting, Enable automatic mountability check, is available in the Core Console related to Exchange Server. If enabled, Exchange server mountability checks are conducted automatically. This setting is available when the status for the protected machine is green (active) or yellow (paused).
For more information, see About Exchange database mountability checks.
You can also perform a mountability check on demand, from the Recovery Points pane on a protected Exchange server machine. For more information, see Forcing a mountability check of an Exchange database.
Following are functions you can perform for an Exchange server protected by the Core.
• |
Specify Exchange server credentials. Rapid Recovery Core lets you set credentials so the Core can authenticate to the Exchange server to obtain information. |
For more information about setting credentials for Exchange servers, see Setting credentials for an Exchange server machine.
• |
Truncate Exchange logs. When you force log truncation of Exchange server logs, this process identifies the available space and reclaims space on the protected Exchange server. |
For more information about truncating Exchange server logs on demand, see Forcing log truncation for an Exchange machine. This process can also be performed as part of the nightly jobs.
• |
Force a mountability check of an Exchange database. This function checks that Exchange databases are mountable, to detect corruption and alert administrators so that all data on the Exchange server can be recovered successfully. |
For more information about forcing a mountability check on demand, see Forcing a mountability check of an Exchange database.
You can also force a mountability check to occur automatically after each snapshot. For more information about mountability checks, see About Exchange database mountability checks.
• |
Force a checksum check of Exchange Server recovery points. This function checks the integrity of recovery points containing Exchange database files. |
For more information about forcing a checksum check on demand, see Forcing a checksum check of Exchange database files.
You can truncate Exchange logs and force a checksum check as part of nightly jobs. For more information about the tasks you can schedule as nightly jobs, see Understanding nightly jobs. For information on configuring nightly jobs, see Configuring nightly jobs for the Core.
In order to set login credentials, an Exchange server must be present on a protected volume. If Rapid Recovery does not detect the presence of an Exchange server, the Set Credentials function does not appear in the Core Console.
Once you protect data on a Microsoft Exchange server, you can set login credentials in the Rapid Recovery Core Console.
Complete the steps in this procedure to set credentials for each Exchange Server.
1. |
In the left navigation area of the Rapid Recovery Core Console, select the protected Exchange server machine for which you want to set credentials. |
The Summary page appears for the protected Exchange server.
2. |
On the Summary page, from the links at the top of the page, click the downward-facing arrow |
3. |
a. |
In the User name text field, enter the user name for a user with permissions to the Exchange server; for example, Administrator (or, if the machine is in a domain, [domain name]\Administrator). |
b. |
In the Password text field, enter the password associated with user name you specified to connect to the Exchange server. |
c. |
© ALL RIGHTS RESERVED. Feedback Terms of Use Privacy