1. |
In the left navigation area of the Core Console, under the Protected Machines menu, click the arrow to expand the context-sensitive menu for the relevant protected machine. Scroll down to More, expand that menu, and then select |
2. |
3. |
◦ |
To open the log file, select Open with, then select an application (such as Notepad) for viewing the text-based log file, and finally click OK. |
The AgentAppRecovery.log file opens in the selected application.
◦ |
The AgentAppRecovery.log file saves to your Downloads folder. It can be opened using any text editor.
In Rapid Recovery, you can convert a protected cluster node to a protected machine so that it is still managed by the Core, but it is no longer part of the cluster. This is helpful, for example, if you need to remove the cluster node from the cluster but still keep it protected.
1. |
In the Rapid Recovery Core Console, navigate to the cluster that contains the machine you wish to convert, and then click Protected Nodes. |
2. |
On the Protected Nodes page, from the specific node you want to convert, click the Actions drop-down menu and select Convert to Agent. |
3. |
To add the machine back to the cluster, select the machine, and then on the Summary page, from the Actions menu, select Convert to Cluster Node, and then click Yes to confirm the action. |
The Rapid Recovery Core Console shows a Protected Machines menu in the left navigation area. This includes all machines or server clusters added to protection on your Rapid Recovery Core. Beneath this, other menus may appear, based on whether you include those objects in your Core. In the same manner, you can create a custom group, which displays as the last menu type in the left navigation area.
The act of creating a group always adds one group member (for example, a protected machine or server cluster, a replicated machine, or a recovery points-only machine) to the new custom group. The object added is determined by your origin point when you create the group. Ideally, you would then add additional members to the group. Thereafter, you can perform group actions that apply to all like members of that custom group, as described in Performing group actions.
For more information, see the following topics:
Use the procedure below to create a custom group.
1. |
2. |
c. |
3. |
5. |
Optionally, you can add other protected machines, replicated machines, or recovery point-only machines to this group. Navigate to the machine name in the appropriate menu, click its drop-down menu, scroll down and select Label as, and then click the name of the custom group. |
You can now perform group actions on this group. For more information, see Performing group actions.
© ALL RIGHTS RESERVED. Feedback Terms of Use Privacy