Chat now with support
Chat with Support

Rapid Recovery 6.7 - User Guide

Introduction to Rapid Recovery The Core Console Repositories Core settings Protecting machines
About protecting machines with Rapid Recovery Understanding the Rapid Recovery Agent software installer Deploying Agent to multiple machines simultaneously from the Core Console Using the Deploy Agent Software Wizard to deploy to one or more machines Modifying deploy settings Understanding protection schedules Protecting a machine About protecting multiple machines Enabling application support Settings and functions for protected Exchange servers Settings and functions for protected SQL servers
Managing protected machines Snapshots and recovery points Managing privacy Encryption Authentication Replication Events Reporting VM export Restoring data Bare metal restore
About bare metal restore Differences in bare metal restore for Windows and Linux machines Understanding boot CD creation for Windows machines Managing a Linux boot image Performing a bare metal restore using the Restore Machine Wizard Using the Universal Recovery Console for a BMR Performing a bare metal restore for Linux machines Verifying a bare metal restore
Managing aging data Archiving Cloud accounts Core Console references REST APIs Glossary

Forcing a SQL Server attachability check

In order to force an attachability check, a SQL database must be present on a protected volume. If Rapid Recovery does not detect the presence of a database, the attachability check function does not appear in the Core Console.

Complete the steps in this procedure to force the system to perform an attachability check for a specific SQL server recovery point.

  1. In the left navigation area of the Rapid Recovery Core Console, select the protected SQL Server machine for which you want to force the attachability check, and then click the Recovery Points menu.
  2. Scroll down to the Recovery Points pane.
  3. Navigate through the recovery points to find the desired recovery point. Optionally, click the [Expand]
    arrow to the right of a recovery point in the list to expand the view.
    In the expanded recovery point information, you can see volumes included in the recovery point.
  4. In the Recovery Points pane, from the row representing the correct recovery point, click [Settings] 
    , and from the drop-down menu, select Force Attachability Check.
  5. In the resulting dialog box, click to confirm that you want to force an attachability check.
    The dialog box closes. The system performs the attachability check.

For instructions on how to view the status of the attachability check, see Viewing events using tasks, alerts, and journal pages.

Managing protected machines

This section describes how to view, configure and manage the protected machines in your Rapid Recovery environment.

Topics include:

About managing protected machines

You can manage protected machines from the Rapid Recovery Core Console, including the following tasks:

  • You can view protected machines in the Rapid Recovery Core Console using options described in the topic Viewing protected machines.
  • You can configure settings for a particular machine, which supersede Core default settings. Some configuration tasks include changing hypervisor host or VM settings, accessing system information, modifying transfer settings, customizing nightly jobs, or configuring notifications for events. For more information, see Configuring machine settings.
  • You can remove a machine or cluster from protection, view license information for a protected machine, or diagnose problems by viewing the log file for a protected machine. For more information on these and other tasks, see Managing machines.
  • You can view and manage data saved in the Core. For more information, see Managing snapshots and recovery points.

Viewing protected machines

From the Home page on the Rapid Recovery Core Console, when viewing the Summary Tables view, you can see summary information for any machines protected by the Core in the Protected Machines pane.

NOTE: A software agent acts on behalf of the user to take specific actions. Protected machines are sometimes referred to as agents, since they run the Rapid Recovery Agent software to facilitate data backup and replication on the Rapid Recovery Core.

You can view the status, the display name for each machine, which repository it uses, the date and time of the last snapshot, how many recovery points exist in the repository for the machine, and the total amount of storage space the snapshots use in the repository.

To manage aspects of any protected machine, start by navigating to the machine you want to view, configure, or manage. From the Home page, there are three ways to navigate to a protected machine:

  • You can click on the IP address or display name of any protected machine from the Protected Machines pane. This takes you to the Summary page for the selected protected machine.
  • In the left navigation area, you can click on the title of the Protected Machines menu. The Protected Machines page appears. On this page, you can see summary information about each machine. For a detailed description of this page, see Viewing summary information for a protected machine.
  • In the left navigation area, under the Protected Machines menu, you can click any protected machine IP address or display name. This takes you to the Summary page for the selected protected machine. For a detailed description of this page, see Viewing summary information for a protected machine.
Related Documents

The document was helpful.

Select Rating

I easily found the information I needed.

Select Rating