Home > Dell > System > Dell Appassure 5 User Guide

Dell Appassure 5 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Dell Appassure 5 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 327 Dell manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 518
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B9
    Force   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
    ForceAttach   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295
    ForceChecksum  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296
    ForceLogTruncation   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297
    ForceMount   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298
    ForceReplication  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
    ForceRollup   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299
    Help   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
    List  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300
    Mount   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302
    Pause [snapshot | vmexport | replication]  . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303
    Protect   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305
    ProtectCluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306
    RemoveAgent   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307
    RemovePoints  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
    RestoreArchive   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308
    Resume [snapshot | vmexport | replication]  . . . . . . . . . . . . . . . . . . . . . . . . . . . 309
    StartExport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311
    UpdateRepository   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313
    Version   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
    Localization  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314
    Understanding the AppAssure PowerShell module   . . . . . . . . . . . . . . . . . . . . . . . .315
    Prerequisites for using PowerShell   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
    powershell.exe.config   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316
    Launching PowerShell and importing the module  . . . . . . . . . . . . . . . . . . . . . . . . 316
    Working with commands and cmdlets  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
    Getting cmdlet help and examples   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
    AppAssure PowerShell module cmdlets   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317
    Get-ActiveJobs   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318
    Get-Clusters  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319
    Get-CompletedJobs  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320
    Get-ExchangeMailStores   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321
    Get-Failed   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322
    Get-FailedJobs   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323
    Get-Mounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
    Get-Passed  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324
    Get-ProtectedServers  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325
    Get-ProtectionGroups  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326
    Get-RecoveryPoints   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
    Get-ReplicatedServers   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327
    Get-Repositories   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328
    Get-SqlDatabases   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
    Get-UnprotectedVolumes   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329
    Get-VirtualizedServers   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330
    Get-Volumes  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
    New-Base  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331
    New-Mount  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B10
    New-Repository  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334
    New-Snapshot  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
    Push-Replication   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335
    Push-Rollup   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336
    Remove-Mount   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337
    Remove-Mounts  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338
    Resume-Replication   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
    Resume-Snapshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339
    Resume-VMExport   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340
    Start-Archive   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341
    Start-AttachabilityCheck  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342
    Start-EsxiExport   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343
    Start-HypervExport   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344
    Start-LogTruncation  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
    Start-MountabilityCheck  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346
    Start-Protect   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347
    Start-ProtectCluster  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348
    Start-RestoreArchive   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349
    Start-VBExport   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350
    Start-VMExport   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352
    Suspend-Replication  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353
    Stop-ActiveJobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354
    Suspend-Snapshot   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355
    Suspend-VMExport  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
    Update-Repository  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356
    Localization  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357
    Qualifiers   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358
    Extending AppAssure jobs using scripting   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .359
    Using PowerShell scripts in AppAssure  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359
    Prerequisites for PowerShell scripting   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
    Testing PowerShell Scripts  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
    Localization   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360
    Qualifiers  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
    Input Parameters for PowerShell Scripting  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361
    Sample PowerShell scripts   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372
    PreTransferScript.ps1  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373
    PostTransferScript.ps1   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374
    PreExportScript.ps1  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
    PostExportScript.ps1   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375
    PreNightlyJobScript.ps1   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376
    PostNightlyJobScript.ps1  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378
    Using Bourne Shell scripting in AppAssure   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
    Prerequisites for Bourne Shell scripting   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
    Testing Bourne Shell scripting   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381
    Input parameters for Bourne Shell scripting  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382
    Sample Bourne Shell scripts   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
    PreTransferScript.sh  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B11
    PostTransferScript.sh   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
    PostExportScript.sh   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385
    Understanding AppAssure APIs  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .386
    Intended Audience  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
    Recommended additional reading  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
    Working with AppAssure REST APIs  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386
    Using AppAssure Core API  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387
    IAgentDiagnosticsManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389
    IAgentsGroupsManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390
    IAgentsManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391
    IApplianceEventsManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
    IApplicationIdManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
    IAutoUpdateManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399
    IBackgroundJobManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400
    IBackupManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402
    IBootCdBuilderManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
    ICloudManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405
    IClustersManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408
    ICoreBackupRestoreManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409
    ICoreCallbackManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
    ICoreDiagnosticsManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410
    ICoreMetadataManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412
    ICoreSettingsManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413
    IDatabaseStorageManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414
    IDiagnosticsManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415
    IEmailsManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
    IEncryptionKeyManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416
    IEventsManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419
    IExchangeManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422
    IExportQueueManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424
    IExportSchedulerManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425
    IHyperVAgentManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430
    IIsoDatabaseManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
    ILicenseManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433
    ILocalizationManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435
    ILocalMountManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436
    ILoggingManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437
    ILogTruncationManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
    INightlyJobsManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438
    IProtectedItemsManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440
    IPushInstallCommunication  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440
    IPushInstallManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441
    IRecoveryPointsManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442
    IRemoteMountManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447
    IReplayEngineManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448
    IReplicationCommunication  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449
    IReplicationManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B12
    IReportingManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467
    IRepositoryManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468
    IRollbackManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474
    IRollupManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476
    ISeedDriveManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477
    IServiceHostManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478
    ISqlManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479
    IStatusSummaryManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480
    ITransferQueueManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482
    ITransferSchedulerManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483
    IUtilitiesManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
    IVirtualDiskManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486
    IWhiteLabelingManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
    Using AppAssure Agent API   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489
    IAgentMetadataManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490
    IAgentPairManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491
    IAgentServiceHostManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492
    IAgentSettingsManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
    IAgentUpdateManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
    IApplicationIdManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493
    IDiagnosticsManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494
    IDriverChangeLogsManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495
    IExchangeManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496
    IExchangeServerManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496
    IHyperVAgentManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497
    IPowerShellManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
    IRollbackManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500
    IRrcRollbackManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502
    IServiceHostManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502
    IShadowCopyManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
    ITransferManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503
    IVirtualDiskManagement   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505
    IWhiteLabelingManagement  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508
    Glossary   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .509
    About Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .516
    Contacting Dell  . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
    Technical support resources   . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B
    1
    13
    Introduction to AppAssure
    This chapter provides an introduction and overview of Dell AppAssure. It describes the features, functionality, 
    and architecture, and consists of the following topics:
    •AppAssure core technologies
    •Product features of AppAssure
    AppAssure sets a new standard for unified data protection by combining backup, replication, and recovery in a 
    single solution that is engineered to be the fastest and most reliable backup for protecting virtual machines 
    (VM), physical machines, and cloud environments.
    AppAssure combines backup and replication into one integrated and unified data protection product that also 
    provides application awareness to ensure reliable application data recovery from your backups. AppAssure is 
    built on the new, patent-pending True Scale architecture which delivers the fastest backup performance with 
    very aggressive, near-zero recovery time objectives (RTO) and recovery point objectives (RPO).
    AppAssure combines several unique, innovative, and breakthrough technologies:
    •Live Recovery
    •Verified Recovery
    •Universal Recovery
    •True Global Deduplication
    These technologies are engineered with secure integration for cloud disaster recovery and deliver fast and 
    reliable recovery. With its scalable object store, AppAssure is uniquely capable of handling up to petabytes of 
    data very rapidly with built-in global deduplication, compression, encryption, and replication to any private or 
    public cloud infrastructure. Server applications and data can be recovered in minutes for data retention and 
    compliance purposes.
    Todays legacy backup tools and first-generation VM backup tools are inefficient and ineffective. The outdated 
    backup tools lack the ability to handle large-scale data and do not offer the level of performance and reliability 
    needed for protecting business-critical applications. Combine this with complex and mixed IT environments and 
    it presents an administrative challenge for IT professionals and vulnerability of system data.
    AppAssure addresses this complexity and inefficiency through our core technology and support of multi-
    hypervisor environments including those running on VMware vSphere and Microsoft Hyper-V, which comprise 
    both private and public clouds. AppAssure offers these technological advances while dramatically reducing IT 
    management and storage costs. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B14
    AppAssure core technologies
    Details about the core technologies of AppAssure are described in the following topics.
    Live Recovery
    Live Recovery is instant recovery technology for VMs or servers. It gives you near-continuous access to data 
    volumes on virtual or physical servers. You can recover an entire volume with near-zero RTO and an RPO of 
    minutes.
    AppAssure backup and replication technology records concurrent snapshots of multiple VMs or servers, providing 
    near instantaneous data and system protection. You can resume the use of the server directly from the backup 
    file without waiting for a full restore to production storage. Users remain productive and IT departments reduce 
    recovery windows to meet todays increasingly stringent RTO and RPO service-level agreements.
    Ve r i f i e d  R e c o v e r y
    Verified Recovery lets you perform automated recovery testing and verification of backups. It includes, but is 
    not limited to, file systems; Microsoft Exchange Server 2007, 2010, and 2013; and Microsoft SQL Server 2005, 
    2008, 2008 R2, 2012 and 2014. Verified Recovery provides recoverability of applications and backups in virtual 
    and physical environments, and features a comprehensive integrity checking algorithm based on 256-bit SHA 
    keys that check the correctness of each disk block in the backup during archiving, replication, and data seeding 
    operations. This ensures that data corruption is identified early and prevents corrupted data blocks from being 
    maintained or transferred during the backup process.
    Universal Recovery
    Universal Recovery technology gives you unlimited machine restoration flexibility. You can restore your backups 
    from physical to virtual, virtual to virtual, virtual to physical, or physical to physical. You can also carry out bare 
    metal restores to dissimilar hardware; for example, P2V, V2V, V2P, P2P, P2C, V2C, C2P, C2V.
    It also accelerates cross-platform moves among virtual machines; for instance, moving from VMware to Hyper-V 
    or Hyper-V to VMware. It builds in application-level, item-level, and object-level recovery: individual files, 
    folders, email, calendar items, databases, and applications. With AppAssure, you can also recover or export 
    physical to cloud, or virtual to cloud.
    True Global Deduplication
    AppAssure provides true global deduplication that dramatically reduces your physical disk capacity 
    requirements by offering space reduction ratios exceeding 50:1, while still meeting the data storage 
    requirements. True Scale inline block-level compression and deduplication with line speed performance, along 
    with built-in integrity checking, prevents data corruption from affecting the quality of the backup and archiving 
    processes. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B15
    Product features of AppAssure
    Using AppAssure, you can manage all aspects of protection and recovery of critical data through the following 
    features and functionality. They include:
    •Repository
    •True Global Deduplication
    •Encryption
    •Replication
    •Recovery-as-a-Service (RaaS)
    •Retention and archiving
    •Virtualization and cloud
    •Alerts and event management
    •License Portal
    •Web consol e
    •Service management APIs
    •White labeling
    •AppAssure wizards
    Repository
    The AppAssure repository uses deduplication volume manager (DVM) to implement a volume manager that 
    provides support for multiple volumes, each of which could reside on different storage technologies such as 
    Storage Area Network (SAN), Direct Attached Storage (DAS), Network Attached Storage (NAS), or cloud storage. 
    Each volume consists of a scalable object store with deduplication. The scalable object store behaves as a 
    records-based file system, where the unit of storage allocation is a fixed-sized data block called a record. This 
    architecture lets you configure block-sized support for compression and deduplication. Rollup operations are 
    reduced to metadata operations from disk intensive operations because the rollup no longer moves data but 
    only moves the records.
    The DVM can combine a set of object stores into a volume and they can be expanded by creating additional file 
    systems. The object store files are pre-allocated and can be added on demand as storage requirements change. 
    It is possible to create up to 255 independent repositories on a single AppAssure Core and to further increase 
    the size of a repository by adding new file extents. An extended repository may contain up to 4,096 extents that 
    span across different storage technologies. The maximum size of a repository is 32 Exabytes. Multiple 
    repositories can exist on a single core.
    True Global Deduplication
    True global deduplication is an effective method of reducing backup storage needs by eliminating redundant or 
    duplicate data. Deduplication is effective because only one unique instance of the data across multiple backups 
    is stored in the repository. The redundant data is stored, but not physically; it is simply replaced with a pointer 
    to the one unique data instance in the repository.
    Conventional backup applications have been performing repetitive full backups every week, but AppAssure 
    performs incremental block-level backups of the machines forever. This incremental-forever approach in 
    tandem with data deduplication helps to drastically reduce the total quantity of data committed to the disk.
    The typical disk layout of a server consists of the operating system, application, and data. In most 
    environments, the administrators often use a common flavor of the server and desktop operating system across 
    multiple systems for effective deployment and management. When AppAssure backs up at the block level across 
    multiple machines simultaneously, it provides a more detailed view of what is in the backup and what is not,  
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B16 irrespective of the source. This data includes the operating system, the applications, and the application data 
    across the environment.
    Figure 1. True global deduplication
    AppAssure performs target-based inline data deduplication. This method transmits the snapshot data to the 
    Core before it is deduplicated. Inline data deduplication simply means that the data is deduplicated before it is 
    committed to disk. This is very different from at-source or post-process deduplication, where the data is 
    deduplicated at the source before it is transmitted to the target for storage, and in post-process the data is sent 
    raw to the target where it is analyzed and deduplicated after the data has been committed to disk. At-source 
    deduplication consumes precious system resources on the machine whereas the post-process data deduplication 
    approach needs all the requisite data on disk (a greater initial capacity overhead) before commencing the 
    deduplication process. On the other hand, inline data deduplication does not require additional disk capacity 
    and CPU cycles on the source or on the Core for the deduplication process. Lastly, conventional backup 
    applications perform repetitive full backups every week, while AppAssure performs incremental block-level 
    backups of the machines forever. This incremental forever approach in tandem with data deduplication helps to 
    drastically reduce the total quantity of data committed to the disk with a reduction ratio of as much as 80:1.
    Encryption
    AppAssure provides integrated encryption to protect backups and data-at-rest from unauthorized access and 
    use, ensuring data privacy. AppAssure provides strong encryption. By doing so, backups of protected computers 
    are inaccessible. Only the user with the encryption key can access and decrypt the data. There is no limit to the 
    number of encryption keys that can be created and stored on a system. DVM uses AES 256-bit encryption in the 
    Cipher Block Chaining (CBC) mode with 256-bit keys. Encryption is performed inline on snapshot data, at line 
    speeds without impacting performance. This is because DVM implementation is multi-threaded and uses 
    hardware acceleration specific to the processor on which it is deployed.
    Encryption is multi-tenant ready. The deduplication has been specifically limited to records that have been 
    encrypted with the same key; two identical records that have been encrypted with different keys will not be 
    deduplicated against each other. This design decision ensures that deduplication cannot be used to leak data 
    between different encryption domains. This is a benefit for managed service providers, as replicated backups 
    for multiple tenants (customers) can be stored on a single core without any tenant being able to see or access  
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B17 other tenant data. Each active tenant encryption key creates an encryption domain within the repository where 
    only the owner of the keys can see, access, or use the data. In a multi-tenant scenario, data is partitioned and 
    deduplicated within the encryption domains.
    In replication scenarios, AppAssure uses SSL 3.0 to secure the connections between the two cores in a 
    replication topology to prevent eavesdropping and tampering.
    Replication
    Replication is the process of copying recovery points from an AppAssure core and transmitting them to another 
    AppAssure core in a separate location for the purpose of disaster recovery. The process requires a paired source-
    target relationship between two or more cores.
    The source core copies the recovery points of selected protected machines, and then asynchronously and 
    continually transmits the incremental snapshot data to the target core at a remote disaster recovery site. You 
    can configure outbound replication to a company-owned data center or remote disaster recovery site (that is, a 
    “self-managed” target core). Or, you can configure outbound replication to a third-party managed service 
    provider (MSP) or cloud provider that hosts off-site backup and disaster recovery services. When replicating to a 
    third-party target core, you can use built-in work flows that let you request connections and receive automatic 
    feedback notifications.
    Replication is managed on a per-protected-machine basis. Any machine (or all machines) protected or 
    replicated on a source core can be configured to replicate to a target core.
    Figure 2. Replication
    Replication is self-optimizing with a unique Read-Match-Write (RMW) algorithm that is tightly coupled with 
    deduplication. With RMW replication, the source and target replication service matches keys before transferring 
    data and then replicates only the compressed, encrypted, deduplicated data across the WAN, resulting in a 10x 
    reduction in bandwidth requirements.
    Replication begins with seeding: the initial transfer of deduplicated base images and incremental snapshots of 
    the protected agents, which can add up to hundreds or thousands of gigabytes of data. Initial replication can be 
    seeded to the target core using external media. This is typically useful for large sets of data or sites with slow 
    links. The data in the seeding archive is compressed, encrypted and deduplicated. If the total size of the 
    archive is larger than the space available on the removable media, the archive can span across multiple devices 
    based on the available space on the media. During the seeding process, the incremental recovery points 
    replicate to the target site. After the target core consumes the seeding archive, the newly replicated 
    incremental recovery points automatically synchronize. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B18
    Recovery-as-a-Service (RaaS)
    Managed service providers (MSPs) can fully leverage AppAssure as a platform for delivering recovery as a service 
    (RaaS). RaaS facilitates complete recovery-in-the-cloud by replicating customers physical and virtual servers 
    along with their data to the service providers cloud as virtual machines to support recovery testing or actual 
    recovery operations. Customers wanting to perform recovery-in-the-cloud can configure replication on their 
    protected machines on the local cores to an AppAssure service provider. In the event of a disaster, the MSPs can 
    instantly spin-up virtual machines for the customer.
    MSPs can deploy multi-tenant AppAssure-based RaaS infrastructure that can host multiple and discrete 
    organizations or business units (the tenants) that ordinarily do not share security or data on a single server or a 
    group of servers. The data of each tenant is isolated and secure from other tenants and the service provider.
    Retention and archiving
    AppAssure offers flexible backup and retention policies that are easily configurable. The ability to tailor 
    retention polices to the needs of an organization not only helps to meet compliance requirements but does so 
    without compromising recovery time objectives (RTO).
    Retention policies enforce the periods of time in which backups are stored on short-term (fast and expensive) 
    media. Sometimes certain business and technical requirements mandate extended retention of these backups, 
    but use of fast storage is cost prohibitive. Therefore, this requirement creates a need for long-term (slow and 
    cheap) storage. Businesses often use long-term storage for archiving both compliance and non-compliance data. 
    The archive feature supports extended retentions for compliance and non-compliance data, as well as being 
    used for seeding replication data to a target core.
    Figure 3. Retention policy
    In AppAssure, retention policies can be customized to specify the length of time a backup recovery point is 
    maintained. As the age of the recovery points approach the end of their retention period, they age out and are 
    removed from the retention pool. Typically, this process becomes inefficient and eventually fails as the amount 
    of data and the period of retention start growing rapidly. AppAssure solves the big data problem by managing 
    the retention of large amounts of data with complex retention policies and performing rollup operations for 
    aging data using efficient metadata operations.
    Backups can be performed with an interval of a few minutes; and, these backups age over days, months, and 
    years. Retention policies manage the aging and deletion of old backups. A simple waterfall method defines the 
    aging process. The levels within the waterfall are defined in minutes, hours, and days; weeks, months, and 
    years. The retention policy is enforced by the nightly rollup process.
    For long term archiving, AppAssure lets you create an archive of the source or target core on any removable 
    media. The archive is internally optimized, and all data in the archive is compressed, encrypted, and  
    						
    All Dell manuals Comments (0)

    Related Manuals for Dell Appassure 5 User Guide