Chat now with support
Chat with Support

Rapid Recovery 6.1.2 - User Guide

Introduction to Rapid Recovery Core Console Core settings Repositories Encryption keys Protecting machines
About protecting machines with Rapid Recovery Support for dynamic and basic volumes Understanding the Rapid Recovery Agent software installer Deploying Agent to multiple machines simultaneously from the Core Console Using the Deploy Agent Software Wizard to deploy to one or more machines Modifying deploy settings Understanding protection schedules Protecting a machine About protecting multiple machines Settings and functions for protected Exchange servers Settings and functions for protected SQL servers
Managing protected machines Snapshots and recovery points Replication Events Reporting VM export Restoring data Bare metal restore
Bare metal restore for Windows machines Understanding boot CD creation for Windows machines Using the Universal Recovery Console for a BMR Performing a bare metal restore for Linux machines Viewing the recovery progress Starting a restored target server Troubleshooting connections to the Universal Recovery Console Repairing boot problems Performing a file system check on the restored volume
Managing aging data Archiving Cloud storage accounts The Local Mount Utility The Central Management Console Core Console references Command Line Management utility PowerShell module
Prerequisites for using PowerShell Working with commands and cmdlets Rapid Recovery PowerShell module cmdlets Localization Qualifiers
Scripting REST APIs About us Glossary

Viewing cluster summary information

Complete the steps in this procedure to view summary information about a cluster including information about the associated quorum for the cluster.

1.
In the Rapid Recovery Core Console, under Protected Machines, click the cluster you want to view.

The Summary page for the machine appears.

For information about viewing summary and status information for an individual machine or node in the cluster, see Viewing protected machines.

Configuring machine settings

Once you have added machines for protection in Rapid Recovery, you can easily view and modify the settings that govern the behavior of that protected machine. When you modify settings for a specific machine, those settings supersede the behavior set at the Core level.

You can view and configure the following machine settings in the Rapid Recovery Core Console:

General. General machine configuration settings include display name, host name, port, encryption key, and repository. For information about configuring general settings for a machine, see Viewing and modifying protected machine settings.
Nightly jobs. The subset of Core nightly job settings that appear for a specific protected machine allow you to supersede nightly job settings set at the Core level. This includes rollup, which lets you manage the retention policy. Some settings may differ based on the type of machine that is protected.
Transfer settings. Settings specific to managing data transfer processes for the selected protected machine. For information about the types of data transfer affected by these settings, see About modifying transfer settings.
Excluded writers. These settings let you exclude writers. These are machine-specific. A writer is a specific API published my Microsoft to allow other software components to participate in using Microsoft Volume Shadow Services (VSS). Each of the writers in Rapid Recovery that participate in volume snapshots are listed in the Excluded Writers settings. In the event that a writer is interfering with or precluding successful backup transfers, these can be disabled one by one. Quest recommends leaving these settings alone, unless you are otherwise directed by a Quest Support representative.
License details. These are details about the license for the specific protected machine. These settings report information from the Core and the Rapid Recovery License Portal. These settings are read-only. To change these settings, update your license information between the Core and the license portal. See your license administrator for details. For more information, see the Rapid Recovery License Portal User Guide.

The procedure for viewing or changing machine-level settings is identical for general, excluded writers, and license details. For more information, see Viewing and modifying protected machine settings.

The procedure for modifying nightly jobs for a machine is different. For information about configuring nightly job settings for a machine, see Customizing nightly jobs for a protected machine.

In some cases, you may want to adjust the data transfer rate for a protected machine. For more information, see About modifying transfer settings.

Viewing and modifying protected machine settings

Machine settings help determine the behavior of a machine protected by the Core. When you modify settings for a specific machine, those settings supersede the behavior set at the Core level.

Likewise, a protected Hyper-V virtual host has different machine settings than the virtual machines it manages. For more information, see

Complete the steps in this procedure to view and modify general settings, transfer settings, settings for excluded writers, and licensing settings for a protected machine.

The Summary page for the selected machine appears.
2.
Click the Settings menu.

The Settings page appears, showing settings for the selected machine. Optionally, to display setting categories from anywhere on the page, click the appropriate hyperlink on the left side of the page.

When you click on a setting you want to change, that setting becomes editable as a text field or a drop-down menu.

For each setting, when satisfied with your changes, click [Checkmark] to save the change and exit edit mode, or click [Cancel] to exit edit mode without saving.

Table 84. General settings for a protected machine

Text Box

Description

Display Name

Enter a display name for the machine.

This is the name that displays for a protected machine in the Rapid Recovery Core Console. You can enter up to 64 characters. By default, this is the host name of the machine. You can change this to something more user-friendly if needed. Do not use prohibited characters or prohibited phrases .

Host Name

This is the name of the protected machine as it appears in the machine's metadata.

Port

Enter a port number for the machine.

The port is used by the Rapid Recovery Core service to communicate with this machine. The default port is 8006.

Encryption Key

If you want an encryption key that is already defined for this Rapid Recovery Core to be applied to the data for every volume on this protected machine, you can specify the encryption key here. The key must be unlocked. If no encryption keys exist, you can add an encryption key. For more information on managing encryption keys, see Managing encryption keys.

If the volumes on this protected machine are encrypted, you can change to a different encryption key. Alternatively, you can disassociate an encryption key by selecting (none) from the Encryption key drop-down menu.

Repository

Select a repository for the recovery points.

Displays the repository configured on the Rapid Recovery Core in which to store the data from this machine.

The repository volume can be local (on storage attached to the Core server), or on a volume on a CIFS shared location.

Table 85. Transfer Settings for a protected machine

Text Box

Description

[Restore default] Restore Default

This control restores all transfer settings to the system default settings.

Priority

Sets the transfer priority between protected machines. Enables you to assign priority by comparison with other protected machines. Select a number from 1 to 10, with 1 being the highest priority. The default setting establishes a priority of 5.

Maximum Concurrent Streams

Sets the maximum number of TCP links that are sent to the Core to be processed in parallel per protected machine, for machines protected in a DVM repository.

Maximum Concurrent Writes

Sets the maximum number of simultaneous disk write actions per protected machine connection.

Use Core Default Maximum Retries

Select this option to use default retries number for each protected machine, if some of the operations fail to complete.

Maximum Segment Size

Specifies the largest amount of data, in bytes, that a computer can receive in a single TCP segment. The default setting is 4194304.

Do not change this setting from the default unless directed to do so by a Quest Support representative.

Maximum Transfer Queue Depth

Specifies the amount of commands that can be sent concurrently. The default setting is 64.

You can adjust this to a higher number if your system has a high number of concurrent input/output operations.

Outstanding Reads per Stream

Specifies how many queued read operations will be stored on the back end. This setting helps to control the queuing of protected machines. The default setting is 0.

Transfer Data Server Port

Sets the port for transfers. The default setting is 8009.

Transfer Timeout

Specifies in minutes and seconds the amount of time to allow a packet to be static without transfer.

Snapshot Timeout

Specifies in minutes and seconds the maximum time to wait to take a snapshot.

Snapshot Cleaning Timeout

Specifies in minutes and seconds the maximum time for process of deleting VSS snapshot on a protected machine.

Network Read Timeout

Specifies in minutes and seconds the maximum time to wait for a read connection. If the network read cannot be performed in that time, the operation is retried.

Network Write Timeout

Specifies the maximum time in seconds to wait for a write connection. If the network write cannot be performed in that time, the operation is retried.

Table 86. License details for a protected machine

Text Box

Description

Expiration Date

Indicates the expiration date of the license for the selected protected machine.

License Status

Indicates the current status of the license for the selected protected machine.

License Type

Indicates the type of the license for the selected protected machine.

Agent type

Indicates if the current protected machine is a physical or virtual agent.

Changing the settings for a Hyper-V host or node

This procedure applies to Hyper-V hosts or nodes that use Rapid Recovery Rapid Snap for Virtual (agentless protection) to protect virtual machines (VMs) .

A Hyper-V host that is using Rapid Snap for Virtual (agentless protection) to protect VMs is indicated in the left navigation area by the host icon . The settings for a Hyper-V host with VMs that are protected agentlessly are not the same as a typical protected machine. All changes made to the settings for a host apply to the VMs on that host.

The Summary page for the host opens.
The Settings page opens.
3.
Under General, click the setting you want to change.

The setting you selected becomes editable, as a text field or a drop-down menu.

Table 87. General settings information

Text Box

Description

Display Name

The name that displays for a protected machine in the Rapid Recovery Core Console. You can enter up to 64 characters. By default, it is the host name of the machine. You can change the display name to something more user-friendly if needed. Do not use prohibited characters or prohibited phrases .

Host Name

The name of the protected machine as it appears in the machine's metadata.

5.
Under Transfer Queue, to change the number of transfer jobs that can occur on the host at one time, click the setting for Maximum concurrent transfers.
6.
Under Nightly Jobs, to change the settings for the available nightly jobs, click Change.
The Nightly Jobs windows appears.

Table 88. Nightly Jobs settings information

Text Box

Description

Clear orphaned registry keys on protected Hyper-V host

Removes the unnecessary files from the registry that result from attaching and detaching virtual disks during data transfers.

Check integrity of recovery points

Conducts an integrity check of each recovery point created for the virtual machines on the Hyper-V host.

8.
9.
Under Auto Protection, to determine whether to automatically protect new virtual machines when they are added to the Hyper-V host, click the setting for Auto protect new virtual machines.
Related Documents