Chat now with support
Chat with Support

Rapid Recovery 6.1.2 - User Guide

Introduction to Rapid Recovery Core Console Core settings Repositories Encryption keys Protecting machines
About protecting machines with Rapid Recovery Support for dynamic and basic volumes Understanding the Rapid Recovery Agent software installer Deploying Agent to multiple machines simultaneously from the Core Console Using the Deploy Agent Software Wizard to deploy to one or more machines Modifying deploy settings Understanding protection schedules Protecting a machine About protecting multiple machines Settings and functions for protected Exchange servers Settings and functions for protected SQL servers
Managing protected machines Snapshots and recovery points Replication Events Reporting VM export Restoring data Bare metal restore
Bare metal restore for Windows machines Understanding boot CD creation for Windows machines Using the Universal Recovery Console for a BMR Performing a bare metal restore for Linux machines Viewing the recovery progress Starting a restored target server Troubleshooting connections to the Universal Recovery Console Repairing boot problems Performing a file system check on the restored volume
Managing aging data Archiving Cloud storage accounts The Local Mount Utility The Central Management Console Core Console references Command Line Management utility PowerShell module
Prerequisites for using PowerShell Working with commands and cmdlets Rapid Recovery PowerShell module cmdlets Localization Qualifiers
Scripting REST APIs About us Glossary

Customizing nightly jobs for a protected machine

Nightly jobs can be configured at the Core level or at the machine level. When nightly jobs are set at the Core level, the changes are applied to all relevant machines protected by that Core. Changes made to the nightly jobs at the machine level supersede the changes made at the Core level, but apply only for the machines specified.

For a list of all nightly jobs, including descriptions and the scope available for each, see the topic Understanding nightly jobs.

Complete the steps in the following procedure to make changes to the nightly jobs for a single protected machine.

1.
In the Rapid Recovery Core Console, under the Protected Machines menu, click the IP address or machine name for the machine for which you want to customize nightly jobs.
The Summary page for the selected machine appears.
2.
Click the Settings menu.

The Settings page appears, showing configuration settings for the selected machine.

3.
Optionally, click the Nightly Jobs link to scroll down in the Settings page to view nightly jobs settings.

The Nightly Jobs dialog box appears.

5.
In the Nightly Jobs dialog box, select the jobs you want to include to run nightly, or clear the options you want to omit for this machine.
6.
Click OK.

Viewing system information for a protected machine

The Rapid Recovery Core Console provides you with easy access to system information about the machines protected on your Core.

The General pane includes general information about the Core machine and environment. The Volumes pane lists information about the storage volumes on the Core machine. The Replay Engine Connections pane displays , volumes all of the machines that are being protected.

Complete the steps in this procedure to view detailed system information for a protected machine.

1.
Navigate to the Rapid Recovery Core Console, and from the protected machines menu in the left navigation area, click a protected machine name.
The Summary page appears for the selected protected machine.
2.
On the Summary page, at the bottom of the Summary pane, click [System information] System Information.
3.
On the System Information page, you can view the following details about the selected protected machine.
System Information. This includes Host Name, OS Version, OS Architecture, Memory (Physical), Display Name, Fully Qualified Domain Name, Cache metadata location, Primary cache location, Secondary cache location, and Virtual Machine Type (if applicable).
Volumes. This includes the Volume Name, Device ID, File System, Formatted Capacity, Used Capacity, and Mount Points.
Processors. This includes the Architecture and Number of Cores.
Network Adapters. This includes the Adapter Type and Speed.
IP Addresses. This includes the IP Address and Family.

Managing machines

This section describes a variety of tasks you can perform in managing your machines. Topics include:

Removing a machine

When you remove a machine from protection on the Rapid Recovery Core, you are presented with two options: you can keep the recovery points saved thus far to the RR Core, or you can remove the recovery points. If you keep the recovery points, you have what is known as a “recovery points only” machine. Using those recovery points for the machine that has been removed from current protection, you can continue to restore the machine in the future, but only up to the state captured in a saved recovery point.

If you remove the recovery points, this action deletes any snapshot data for that formerly protected machine from the Rapid Recovery Core.

Complete the steps in the following procedure to remove a machine from protection in your Rapid Recovery environment.

1.
From the Rapid Recovery Core Console, in the left navigation pane under Protected Machines, click the machine you want to remove.
Rapid Recovery removes the machine from protection and cancels all active tasks for that machine.
Related Documents