Home > Dell > System > Dell Appassure 5 User Guide

Dell Appassure 5 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Dell Appassure 5 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 327 Dell manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 518
    							Dell™ AppAssure™ 
    User Guide
    5.4.3 Revision B 
    						
    							© 2015 Dell Inc.
    ALL RIGHTS RESERVED.
    This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a 
    software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the 
    applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or 
    mechanical, including photocopying and recording for any purpose other than the purchaser’s personal use without the written 
    permission of Dell Inc.
    The information in this document is provided in connection with Dell products. No license, express or implied, by estoppel or 
    o t h e r w i s e ,  t o  a n y  i n t e l l e c t u a l  p r o p e r t y  r i g h t  i s  g r a n t e d  b y  t h i s  d o c u m e n t  o r  i n  c o n n e c t i o n  w i t h  t h e  s a l e  o f  D e l l  p r o d u c t s .  E X C EPT 
    AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, DELL ASSUMES NO 
    LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS 
    INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR 
    NON-INFRINGEMENT. IN NO EVENT SHALL DELL BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR 
    INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS 
    OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF DELL HAS BEEN ADVISED OF THE 
    POSSIBILITY OF SUCH DAMAGES. Dell makes no representations or warranties with respect to the accuracy or completeness of 
    the contents of this document and reserves the right to make changes to specifications and product descriptions at any time 
    without notice. Dell does not make any commitment to update the information contained in this document.
    If you have any questions regarding your potential use of this material, contact:
    Dell Inc.
    Attn: LEGAL Dept
    5 Polaris Way
    Aliso Viejo, CA 92656
    Refer to our web site (software.dell.com) for regional and international office information.
    Dell AppAssure software makes use of the Emit Mapper dynamic link library v. 1.0.0 (DLL) licensed under the GNU Library 
    General Public License (LGPL) version 2.1, February 1999. Emit Mapper’s copyright notice is: “Copyright © 1991, 1999 Free 
    Software Foundation, Inc. 59 Temple Place, Suite 330, Boston, MA 02111-1307 USA. Everyone is permitted to copy and 
    distribute verbatim copies of this license document, but changing it is not allowed.”
    Users may view the full text of the LGPL license where it is posted as a third party license agreement at 
    http://www.software.dell.com/legal/license-agreements.aspx. The Emit Mapper source code can be found at 
    http://opensource.dell.com/. 
    Trademarks
    Dell, the Dell logo, and AppAssure are trademarks of Dell Inc. and/or its affiliates. Other trademarks and trade names may be 
    used in this document to refer to either the entities claiming the marks and names or their products. Dell disclaims any 
    proprietary interest in the marks and names of others.
    Dell AppAssure User Guide
    Updated - April 2015
    Software Version - 5.4.3 Revision B Legend
    CAUTION: A CAUTION icon indicates potential damage to hardware or loss of data if instructions are not followed.
    WA R N I N G : A WARNING icon indicates a potential for property damage, personal injury, or death.
    IMPORTANT NOTE, NOTE, TIP, MOBILE, or VIDEO: An information icon indicates supporting information. 
    						
    							Contents
    Dell AppAssure User Guide
    Version 5.4.3 Revision B1
    Introduction to AppAssure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  13
    AppAssure core technologies  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
    Live Recovery  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
    Verified Recovery   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
    Universal Recovery . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
    True Global Deduplication  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14
    Product features of AppAssure  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
    Repository   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
    True Global Deduplication  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15
    Encryption  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16
    Replication  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17
    Recovery-as-a-Service (RaaS)  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
    Retention and archiving   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18
    Virtualization and cloud   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
    Alerts and event management  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
    License Portal  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
    Web console  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .19
    Service management APIs  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
    White labeling   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
    AppAssure wizards  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .20
    Understanding the AppAssure Core Console . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  22
    Navigating the Core Console  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .25
    Viewing the Home tab   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .26
    Viewing the Replication tab  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .27
    Viewing the Virtual Standby tab  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .30
    Viewing the Events tab  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .31
    Viewing the Tools tab  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .32
    Viewing the Configuration tab   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .34
    Using the Error dialog box   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .35
    Understanding the Quick Start Guide   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .36
    Launching the Quick Start Guide   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .37
    Hiding the Quick Start Guide  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
    Viewing the protected machines menu   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .38
    Viewing the Machines tab for a protected machine  . . . . . . . . . . . . . . . . . . . . . . .39
    Viewing the Summary tab   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .43
    Viewing the Recovery Points tab  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .44
    Viewing the Events tab for a protected machine   . . . . . . . . . . . . . . . . . . . . . . . . .45
    Viewing the Tools tab for a protected machine   . . . . . . . . . . . . . . . . . . . . . . . . . .47
    Viewing the configuration tab for a protected machine   . . . . . . . . . . . . . . . . . . . .48
    Viewing the replicated machines menu  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .48
    Viewing the Recovery Points Only menu   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49
    Viewing the Custom Groups menu   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .49 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B2
    Configuring the AppAssure Core  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  50
    Understanding repositories  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .51
    Managing a repository   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52
    Creating a repository   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .52
    Viewing details about a repository   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .55
    Modifying repository settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .56
    Opening an existing repository  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .57
    Adding a storage location to an existing repository   . . . . . . . . . . . . . . . . . . . . . . .57
    Checking a repository  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
    Deleting a repository   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
    About the repository Integrity Check job  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .59
    Running the Integrity Check job on a repository   . . . . . . . . . . . . . . . . . . . . . . . . .60
    Understanding custom groups   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .61
    Creating custom groups   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
    Modifying custom group names . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .62
    Removing custom groups  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
    Performing group actions   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .63
    Viewing all machines in a custom group on one page   . . . . . . . . . . . . . . . . . . . . . .64
    Backing up and restoring the Core configuration  . . . . . . . . . . . . . . . . . . . . . . . . . . . .64
    Backing up the Core configuration   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .64
    Restoring a backed-up Core configuration   . . . . . . . . . . . . . . . . . . . . . . . . . . . . .65
     Managing AppAssure Core settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  66
    Understanding system information  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71
    Viewing system information  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .71
    Configuring the Core general settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72
    Configuring update settings   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .72
    Understanding nightly jobs  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .73
    Configuring nightly jobs for the Core  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .74
    Modifying transfer queue settings   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75
    Adjusting client timeout settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .75
    Understanding deduplication cache size and storage locations   . . . . . . . . . . . . . . . . . .76
    Configuring deduplication cache settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .77
    Configuring Replay engine settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .78
    Configuring deployment settings   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .79
    Configuring database connection settings   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .80
    Managing licenses  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81
    Changing a license  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .81
    Contacting the Dell AppAssure License Portal server   . . . . . . . . . . . . . . . . . . . . . .82
    Backing up and restoring Core settings   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .83
    Configuring Core job settings   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .84
    Editing Core job settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85
    Adding Core jobs  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .85
    Accessing diagnostics for the Core   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
    Downloading the Core logs   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
    Viewing the Core logs  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86
    Uploading logs   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .86 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B3
    Understanding encryption keys   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .  88
    Applying or removing encryption from a protected machine   . . . . . . . . . . . . . . . . . . . .89
    Associating an encryption key with a protected machine . . . . . . . . . . . . . . . . . . . .89
    Applying an encryption key from the Machines tab . . . . . . . . . . . . . . . . . . . . . . . .90
    Disassociating an encryption key from a protected machine   . . . . . . . . . . . . . . . . .91
    Managing encryption keys  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .92
    Adding an encryption key   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .93
    Importing an encryption key   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94
    Locking or unlocking an encryption key   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .94
    Editing an encryption key   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96
    Changing an encryption key passphrase  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .96
    Exporting an encryption key   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97
    Removing an encryption key   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97
    Changing encryption key status   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .97
    Protecting machines using the AppAssure Core   . . . . . . . . . . . . . . . . . . . . . . . . . .  99
    Dynamic and basic volumes support limitations   . . . . . . . . . . . . . . . . . . . . . . . . . . . .99
    About the Agent Installer  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
    Downloading the Agent Installer  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
    Deploying the Agent (push install)   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 100
    Modifying deploy settings   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
    Understanding bulk deploy  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101
    Deploying to multiple machines  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 102
    Deploying to machines on an Active Directory domain   . . . . . . . . . . . . . . . . . . . . 102
    Deploying to machines on a VMware vCenter/ESX(i) virtual host  . . . . . . . . . . . . . . 104
    Deploying to machines on any other host  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 105
    Verifying the deployment to multiple machines  . . . . . . . . . . . . . . . . . . . . . . . . . 105
    Understanding protection schedules  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 106
    Protecting a machine  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 107
    Creating custom protection schedules  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111
    Modifying protection schedules   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113
    Pausing and resuming protection   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 114
    Protecting multiple machines   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116
    Monitoring the protection of multiple machines  . . . . . . . . . . . . . . . . . . . . . . . . 120
    Managing Microsoft Exchange and SQL Servers  . . . . . . . . . . . . . . . . . . . . . . . . . . .122
    Configuring Exchange and SQL Server settings   . . . . . . . . . . . . . . . . . . . . . . . . . . . . 123
    Setting credentials for an Exchange Server machine  . . . . . . . . . . . . . . . . . . . . . . 123
    Setting credentials for a SQL Server machine   . . . . . . . . . . . . . . . . . . . . . . . . . . 123
    Understanding recovery point status indicators  . . . . . . . . . . . . . . . . . . . . . . . . . 124
    Modifying Exchange Server settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
    Modifying SQL Server settings   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 125
    Managing SQL attachability and log truncation  . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
    Configuring SQL attachability settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 126
    Configuring nightly SQL attachability checks and log truncation for all protected machines 
    127
    Forcing a SQL Server attachability check   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128
    Forcing log truncation for a SQL machine  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 128 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B4
    Managing Exchange database mountability checks and log truncation  . . . . . . . . . . . . . 129
    Configuring nightly Exchange database checksum checks and log truncation  . . . . . . 129
    Forcing a mountability check of an Exchange database  . . . . . . . . . . . . . . . . . . . . 129
    Forcing a checksum check of Exchange Server recovery points  . . . . . . . . . . . . . . . 130
    Forcing log truncation for an Exchange machine   . . . . . . . . . . . . . . . . . . . . . . . . 130
    Protecting server clusters  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .131
    Supported applications and cluster types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 132
    Limited support for cluster shared volumes  . . . . . . . . . . . . . . . . . . . . . . . . . .132
    Protecting a cluster  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 133
    Protecting nodes in a cluster  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 134
    Modifying cluster node settings   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
    Configuring cluster settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
    Modifying cluster settings   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 135
    Configuring cluster event notifications   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 136
    Modifying the cluster retention policy  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 137
    Modifying cluster protection schedules   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
    Modifying cluster transfer settings   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 138
    Converting a protected cluster node to a protected machine   . . . . . . . . . . . . . . . . . . 138
    Viewing server cluster information  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
    Viewing cluster system information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
    Viewing cluster tasks, events and alerts  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 139
    Viewing summary information   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
    Working with cluster recovery points   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
    Managing snapshots for a cluster   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 140
    Forcing a snapshot for a cluster   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
    Pausing and resuming cluster snapshots  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 141
    Performing a restore for clusters and cluster nodes  . . . . . . . . . . . . . . . . . . . . . . . . . 141
    Performing a restore for CCR and DAG (Exchange) clusters   . . . . . . . . . . . . . . . . . 141
    Performing a restore for SCC (Exchange, SQL) clusters   . . . . . . . . . . . . . . . . . . . . 142
    Replicating cluster data  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
    Removing a cluster from protection   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 142
    Removing cluster nodes from protection  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
    Removing all nodes in a cluster from protection  . . . . . . . . . . . . . . . . . . . . . . . . 143
    Viewing a cluster or node report   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 143
    Exporting protected data from Windows machines to virtual machines  . . . . . . . . . .145
    Managing exports   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 146
    Exporting data to a Windows-based virtual machine   . . . . . . . . . . . . . . . . . . . . . . . . 147
    Exporting data to an ESXi virtual machine  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
    Performing a one-time ESXi export  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 148
    Performing a continual (Virtual Standby) ESXi export  . . . . . . . . . . . . . . . . . . . . . 149
    Exporting data to a VMware Workstation virtual machine  . . . . . . . . . . . . . . . . . . . . . 150
    Performing a one-time VMware Workstation export   . . . . . . . . . . . . . . . . . . . . . . 150
    Performing a continual (Virtual Standby) VMware Workstation export   . . . . . . . . . . 152
    Exporting data to a Hyper-V virtual machine   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 153
    Performing a one-time Hyper-V export   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 154 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B5
    Performing a continual (Virtual Standby) Hyper-V export   . . . . . . . . . . . . . . . . . . 156
    Exporting data to a VirtualBox virtual machine  . . . . . . . . . . . . . . . . . . . . . . . . . . . . 157
    Performing a one-time VirtualBox export  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 158
    Performing a continual (Virtual Standby) VirtualBox export  . . . . . . . . . . . . . . . . . 159
    Managing protected machines   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .161
    Configuring machine settings   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 162
    Viewing and modifying configuration settings  . . . . . . . . . . . . . . . . . . . . . . . . . . 162
    Viewing system information for a machine  . . . . . . . . . . . . . . . . . . . . . . . . . . . . 163
    Configuring notification groups for system events   . . . . . . . . . . . . . . . . . . . . . . . 163
    Editing notification groups for system events   . . . . . . . . . . . . . . . . . . . . . . . . . . 165
    Modifying transfer settings   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 167
    Customizing nightly jobs for a protected machine  . . . . . . . . . . . . . . . . . . . . . . . 169
    Accessing protected machine diagnostics   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 169
    Downloading machine logs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
    Viewing machine logs  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
    Viewing machine status and other details . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 170
    Managing machines  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 171
    Removing a machine   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
    Canceling operations on a machine  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 172
    Viewing license information on a machine   . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
    Managing snapshots and recovery points   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
    Viewing recovery points   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 173
    Viewing a specific recovery point  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 174
    Mounting a recovery point  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 175
    Dismounting recovery points   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
    Forcing a snapshot  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 176
    Removing recovery points  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
    Deleting an orphaned recovery point chain . . . . . . . . . . . . . . . . . . . . . . . . . . . . 177
    Migrating recovery points to a different repository   . . . . . . . . . . . . . . . . . . . . . . 178
    Understanding replication  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .179
    Understanding seed drives   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 183
     Understanding failover and failback in AppAssure . . . . . . . . . . . . . . . . . . . . . . . . . . 184
    Performance considerations for replicated data transfer   . . . . . . . . . . . . . . . . . . . . . 184
    About replication and encrypted recovery points  . . . . . . . . . . . . . . . . . . . . . . . . 185
    About retention policies for replication  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 185
    Configuring replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
    Replicating to a self-managed target core  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 186
    Replicating to a third-party target core  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 189
    Submitting a replication request to a third-party service provider   . . . . . . . . . . . . 190
    Reviewing a replication request from a customer  . . . . . . . . . . . . . . . . . . . . . . . 192
    Approving a replication request   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
    Denying a replication request   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 193
    Ignoring a replication request from a customer  . . . . . . . . . . . . . . . . . . . . . . . . . 194
    Adding a machine to existing replication  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 194
    Consuming the seed drive on a target core   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 197
    Abandoning a seed drive  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B6
    Managing replication settings   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 198
    Scheduling replication   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 199
    Using the Copy function to create a seed drive  . . . . . . . . . . . . . . . . . . . . . . . . . 199
    Monitoring replication   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 201
    Pausing and resuming replication   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
    Forcing replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 203
    Managing settings for outgoing replication  . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
    Changing target core settings   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 204
    Setting replication priority for a protected machine . . . . . . . . . . . . . . . . . . . . . . 205
    Removing replication  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 205
    Removing a protected machine from replication on the source core   . . . . . . . . . . . 205
    Removing a protected machine on the target core  . . . . . . . . . . . . . . . . . . . . . . . 206
    Removing a target core from replication   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
    Removing a source core from replication  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 206
    Recovering replicated data  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
    Understanding failover and failback  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
    Setting up an environment for failover   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 207
    Performing failover on the target core . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
    Performing failback   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 208
    Managing events   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .210
    Viewing tasks, alerts, and events  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
    Viewing tasks   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 210
    Viewing alerts  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
    Viewing all events   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
    Understanding email notifications   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212
    Configuring an email server  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 213
    Configuring an email notification template . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
    Configuring notification groups   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 214
    Configuring repetition reduction   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 217
    Configuring event retention   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 218
    Generating and viewing reports  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .219
    Using the reports toolbar   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
    Understanding Compliance reports  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 220
    Understanding Failure reports  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
    Understanding the Summary report   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
    Repositories summary  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 221
    Agents summary   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
    Generating a report for a core or agent   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 222
    Understanding Central Management Console core reports  . . . . . . . . . . . . . . . . . . . . . 223
    Generating a report from the Central Management Console   . . . . . . . . . . . . . . . . . . . 223
    Restoring data  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .224
    Restoring data from recovery points  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 224
    Restoring volumes from a recovery point  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 225
    Restoring a directory or file using Windows Explorer   . . . . . . . . . . . . . . . . . . . . . . . . 228 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B7
    Restoring a directory or file and preserving permissions using Windows Explorer  . . . . . . 228
    Understanding bare metal restore for Windows machines  . . . . . . . . . . . . . . . . . . .229
    Performing a bare metal restore for Windows machines  . . . . . . . . . . . . . . . . . . . . . . 230
    Prerequisites for performing a bare metal restore for a Windows machine  . . . . . . . 231
    Managing a Windows boot image   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 231
    Creating a boot CD ISO image for Windows  . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
    Defining boot CD ISO image parameters  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 232
    Naming the boot CD file and setting the path  . . . . . . . . . . . . . . . . . . . . . . . . . . 233
    Creating connections   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
    Specifying a recovery environment  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233
    Injecting drivers in a boot CD . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
    Creating the boot CD ISO image  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 234
    Viewing the ISO image creation progress   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
    Accessing the ISO image   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 235
    Transferring the boot CD ISO image to media   . . . . . . . . . . . . . . . . . . . . . . . . . . 235
    Loading the boot CD and starting the target machine  . . . . . . . . . . . . . . . . . . . . . 235
    Managing a Windows boot image and launching a BMR from the Restore Machine Wizard 
    236
    Launching a bare metal restore for Windows   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 239
    Selecting a recovery point and initiating BMR  . . . . . . . . . . . . . . . . . . . . . . . . . . 239
    Mapping volumes for a bare metal restore   . . . . . . . . . . . . . . . . . . . . . . . . . . . . 240
    Loading drivers using the Universal Recovery Console  . . . . . . . . . . . . . . . . . . . . . 241
    Injecting drivers to your target server  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
    Verifying a bare metal restore  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 242
    Viewing the recovery progress  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
    Starting a restored target server   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243
    Troubleshooting connections to the Universal Recovery Console  . . . . . . . . . . . . . . 243
    Repairing startup problems   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 244
    Retention and archiving   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .245
    Managing retention policies   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 245
    Configuring Core default retention policy settings  . . . . . . . . . . . . . . . . . . . . . . . 245
    Understanding archives   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
    Creating an archive   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 249
    Setting a scheduled archive  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 251
    Pausing or resuming a scheduled archive   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
    Editing a scheduled archive  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253
    Checking an archive  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 255
    Importing an archive   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 256
    Archiving to a cloud . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 257
    Managing cloud accounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .258
    Adding a cloud account   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 258
    Editing a cloud account   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
    Configuring cloud account settings  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 259
    Removing a cloud account   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 260 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B8
    Working with Linux machines   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .261
    Working with Linux recovery points   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 261
    Mounting a recovery point volume on a Linux machine  . . . . . . . . . . . . . . . . . . . . 261
    Unmounting a recovery point on a Linux machine   . . . . . . . . . . . . . . . . . . . . . . . 263
    Exporting data to a Linux-based VirtualBox virtual machine   . . . . . . . . . . . . . . . . . . . 263
    Performing a one-time VirtualBox export  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 264
    Performing a continual (Virtual Standby) VirtualBox export  . . . . . . . . . . . . . . . . . 265
    Restoring volumes for a Linux machine using the command line  . . . . . . . . . . . . . . . . . 266
    Performing a bare metal restore for Linux machines  . . . . . . . . . . . . . . . . . . . . . . . . 268
    Prerequisites for performing a bare metal restore for a Linux machine   . . . . . . . . . 269
    Managing a Linux boot image   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 269
    Downloading a boot ISO image for Linux   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 270
    Transferring the Live DVD ISO image to media  . . . . . . . . . . . . . . . . . . . . . . . . . . 270
    Loading the Live DVD and starting the target machine   . . . . . . . . . . . . . . . . . . . . 271
    Managing Linux partitions  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
    Creating partitions on the destination drive   . . . . . . . . . . . . . . . . . . . . . . . . . . . 271
    Formatting partitions on the destination drive   . . . . . . . . . . . . . . . . . . . . . . . . . 273
    Mounting partitions from the command line  . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
    Launching a bare metal restore for Linux   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 274
    Starting the Screen utility  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 275
    Launching a bare metal restore for a Linux machine using the command line  . . . . . 275
    Verifying the bare metal restore from the command line   . . . . . . . . . . . . . . . . . . . . . 277
    Performing a file system check on the restored volume   . . . . . . . . . . . . . . . . . . . 277
    Using the command line to make a restored
    Linux machine bootable   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 278
    Understanding the Local Mount Utility   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .281
    Downloading the Local Mount Utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 281
    Downloading the LMU from the AppAssure Core Console  . . . . . . . . . . . . . . . . . . . 282
    Downloading the LMU from the Dell AppAssure License Portal   . . . . . . . . . . . . . . . 282
    Installing the Local Mount Utility  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 282
    Using the Local Mount Utility   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 284
    Adding a Core machine to the Local Mount Utility   . . . . . . . . . . . . . . . . . . . . . . . 284
    Mounting a recovery point using the Local Mount Utility  . . . . . . . . . . . . . . . . . . . 285
    Exploring a mounted recovery point using the Local Mount Utility   . . . . . . . . . . . . 286
    Dismounting a recovery point using the Local Mount Utility  . . . . . . . . . . . . . . . . . 286
    Using the Local Mount Utility tray menu   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
    Using AppAssure Core and protected machine options   . . . . . . . . . . . . . . . . . . . . . . . 287
    Accessing localhost options  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 287
    Accessing remote core options  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
    Accessing protected machine options   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 288
    Understanding the AppAssure Command Line Management Utility   . . . . . . . . . . . . .289
    Commands  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
    Archive   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 290
    CancelActiveJobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 292
    CreateRepository  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 293
    Dismount  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 294 
    						
    All Dell manuals Comments (0)

    Related Manuals for Dell Appassure 5 User Guide