Home > Dell > System > Dell Appassure 5 User Guide

Dell Appassure 5 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Dell Appassure 5 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 327 Dell manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 518
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B299
    ForceReplication
    Use the ForceReplication command to force a one-time transfer of replicated data from the source core to 
    the target core. You can replicate one specific protected server or replicate all protected servers. The 
    protected servers must be already configured for replication.
    Usage
    The usage for the command is as follows:
    /[forcereplication |frep] -core [host name] -user [user name] -password [password] -
    targetcore [host name] -all | -protectedserver [name | IP address]
    Command Options
    The following table describes the options available for the ForceReplication command:
    Example:
    Force replication for a protected server on a specific target core:
    >aacmd /forcereplication -target core 10.10.10.10 -protectedserver 10.20.30.40
    ForceRollup
    Use the ForceRollup command to force the rollup of recovery points on a protected machine.
    Usage
    The usage for the command is as follows:
    /[forcerollup | fro] -core [host name] -user [user name] -password [password] -
    protectedserver [name | IP address] Table 146. ForceReplication command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default, the connection is made to the Core installed on the local machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you must also provide a password. If none is provided, then the credentials for the 
    logged-on user are used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none is provided, then the credentials for the 
    logged-on user are used
    -targetcoreHost name of the target core against which replication should be forced.
    -protectedserverOptional. Protected machine against which to perform log file truncation.
    -allForce replication for all machines being replicated to the target core. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B300
    Command Options
    The following table describes the options available for the ForceRollup command:
    Example:
    Force rollup for agent 10.10.10.1 on the Core:
    >aacmd /forcerollup -core 10.10.10.10 - user administrator -password 23WE@#$sdd -
    protectedserver 10.10.10.1
    Help
    The Help command displays a list of the available commands and their definitions. It also provides copyright 
    and version details.
    Usage
    The usage for the command is as follows:
    /help
    Example:
    Request Command Line help:
    >aacmd /help
    List
    The List command returns information about all recovery points, active jobs, completed jobs, failed jobs, 
    invalid (failed) recovery points, valid (passed) recovery points, mounts, protected servers, volumes, virtualized 
    servers, unprotected volumes, clusters, protection groups, SQL databases, Exchange databases, replicated 
    servers, and repositories for the specified agent or list of servers currently protected by the Core. The most 
    recent records return by default. You can list all records or specify how many records display by using a number 
    parameter. This parameter should contain the letter l for the latest recovery points and f for the first recovery 
    point. Each recovery point has its own number, which the administrator can use for mounting. Table 147. ForceRollup command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default, the connection is made to the Core installed on the local machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you must also provide a password. If none is provided, then the credentials for the 
    logged-on user are used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none is provided, then the credentials for the 
    logged-on user are used
    -protectedserverOptional. Protected machine against which to perform log file truncation. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B301
    Usage
    The usage for the command is as follows:
    /list [rps | passed | failed | mounts | volumes | protectedservers | activejobs | 
    completed jobs | failedjobs | virtualizedservers | unprotectedvolumes | clusters | 
    protectiongroups | sqldatabases | exchangemailstores | replicatedservers | 
    repositories] -protectedserver [name | IP address] -core [host name] -user [user 
    name] -password [password] –number [all | l | f | ] -jobtype
    Command Options
    The following table describes the options available for the List command:
    Table 148. List command options
    Option Description
    -?Display this help message.
    -listSelect one of the following options:
    •all recovery points (rps)
    •valid recovery points (passed) 
    •invalid recovery points (failed)
    •mounts (mounts)
    •protected volumes (volumes)
    •unprotected volumes (unprotectedvolumes)
    •protected machines (protectedservers)
    •active jobs (activejobs)
    •failed jobs (failedjobs)
    •completed jobs (completedjobs)
    •virtualized servers (virtualizedservers)
    •clusters (clusters)
    •protection groups (protectiongroups)
    •SQL Server databases (sqldatabases)
    •MS Exchange databases (exchangemailstores)
    •replicated servers (replicatedservers)
    •repositories (‘repositories’)
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default, the connection is made to the Core installed on the local machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you must also provide a password. If none is provided, then the credentials for the 
    logged-on user are used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none is provided, then the credentials for the 
    logged-on user are used.
    -allFor show jobs only. Display al events of a specific type (active/failed/completed) 
    on the core server.
    -protectedserverProtected machine with recovery points to display. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B302
    Examples:
    List the 30 most recent recovery points:
    >aacmd /list rps -core 10.10.10.10 -user administrator -password 23WE@#$sdd 
    -protectedserver 10.10.5.22 -number l30
    View all failed data transfer jobs performed by a protected machine:
    >aacmd /list failed jobs -core 10.10.10.10 -user administrator -password 23WE@#$sdd 
    -protectedserver 10.10.5.22 -number all -jobtype transfer
    Mount
    The Mount command mounts a snapshot of one or more drives. You can specify whether the mount should be 
    read, write, or read-only with previous writes. The default selection is read-only.
    Usage
    The usage for the command is as follows:
    /mount -core [host name] -user [user name] -password [password] -protectedserver 
    [name | IP address] -mounttype [read | write | readOnlyWithPreviousWrites] -drives 
    [drive names] -volumes [volume names] -path [location] -rpn [number | numbers] | -
    time [time string]-numberOptional. Number of data items to display. Use only with the following specifiers: 
    rps, activejobs, completedjobs, failedjobs. Available values are: 
    •all (fetch all data items)
    •l[number] or [number] (fetches top ## data items)
    •f[number] (fetches first ## data items)
    Only takes effect when displaying recovery points and jobs.
    -jobtypeOptional. Filter output by job type. Available values include: 
    •transfer (data transfer)
    •repository (repository maintenance)
    •replication (local and remote replications)
    •backup (backup and restore)
    •bootcdbuilder (create boot CDs)
    •diagnostics (upload logs)
    •exchange (Exchange Server files check)
    •export (recovery point export)
    •pushinstall (deploy agents)
    •rollback (recovery point rollbacks)
    •rollup (protected machine rollups)
    •sqlattach (agent attachability checks)
    •mount (mount repository) Table 148. List command options
    Option Description 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B303
    Command Options
    The following table describes the options available for the Mount command:
    Examples:
    Mount the most recent recovery points containing volumes “c:\” and “d:\” in the read-only mode:
    >aacmd /mount -core 10.10.10.10 -user administrator -password 23WE@#$sdd -
    protectedserver 10.10.5.22 -path c:\mountedrecoverypoint -mounttype read -volumes 
    c: d:
    Mount recovery points with numbers 2 and 7:
    >aacmd /mount -core 10.10.10.10 -user administrator -password 23WE@#$sdd -
    protectedserver 10.10.5.22 -path c:\mountedrecoverypoint -rpn 2 7
    Pause [snapshot | vmexport | replication]
    An administrator can pause snapshots, export to virtual machines, or replicate a Core. The Pause command 
    accepts three parameters: snapshot, vmexport, and replication. Only one parameter can be specified. A 
    snapshot can be paused until a certain time, if a time parameter is specified. Table 149. Mount command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default, the connection is made to the Core installed on the local machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you must also provide a password. If none is provided, then the credentials for the 
    logged-on user are used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none is provided, then the credentials for the 
    logged-on user are used.
    -protectedserverProtected machine with a recovery point or points to be mounted.
    -mounttypeOptional. Specifies a mount mode. Available values are read (read-only), 
    readOnlyWithPreviousWrites (read-only with previous writes), write 
    (writable). The default mode is read-only.
    -volumesOptional. List of volume names to mount. If not specified, all volumes are mounted. 
    Values must be enclosed in double quotes and separated by spaces; for example: 
    c: d:. Do not use trailing slashes in volume names. 
    -pathPath to a folder on the core server to which the recovery point should be mounted. 
    If one does not exist, a folder is automatically created.
    -rpnOptional. The sequential number of a recovery point to mount (use /list rps 
    command to get the numbers). Specify several space-separated numbers to mount 
    multiple recovery points with a single command. In this case data from each 
    recovery point will be stored in a separate child folder. Note: if neither option -
    time nor -rpn is specified then the most recent recovery point that successfully 
    passed integrity check will be mounted.
    -timeOptional. Determines recovery point or points to be selected for mount. Available 
    values include: latest, passed, exact time in the format mm/dd/yyyy hh:mm tt 
    (for instance, 2/24/2012 09:00 AM). Keep in mind to specify date time values of 
    the time zone set on your PC. If neither the -time option nor the -rpn option is 
    specified, then the most recent recovery point that successfully passed an integrity 
    check is mounted.
    -localdriveOptional. Perform mount to user disk on local PC. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B304 A user can pause replication in three ways:
    •On a source Core for all Agents (-[outgoing]).
    The administrator must specify the remote machine name with the outgoing replication pairing to pause 
    outgoing replication on the source Core:
    >aacmd /Pause replication /o 10.10.12.10
    •On the source Core for a single Agent (-protectedserver):
    >aacmd /Pause replication /protectedserver 10.10.12.97
    •On target Core (-incoming).
    If the local Core is a target Core, the administrator can pause replication by specifying the source Core 
    using the incoming parameter:
    >aacmd /Pause replication /i 10.10.12.25
    Usage
    The usage for the command is as follows:
    /pause [snapshot | vmexport | replication] -core [host name] -user [user name] 
    -password [password] -all | -protectedserver [name | IP address] -incoming [host 
    name] | outgoing [host name] -time [time string]
    Command Options
    The following table describes the options available for the Pause command:
    Examples:
    Pause creating snapshots for a specific protected server:
    >aacmd /pause snapshot -core 10.10.10.10 -user administrator -password 23WE@#$sdd 
    -protectedserver 10.10.10.4 Table 150. Pause command options
    Option Description
    -?Display this help message.
    -pause[snapshots], [replication] or [vmexport].
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default, the connection is made to the Core installed on the local machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you must also provide a password. If none is provided, then the credentials for the 
    logged-on user are used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none is provided, then the credentials for the 
    logged-on user are used.
    -allPause all agents on the selected Core.
    -protectedserverPause current protected server.
    -incomingHost name of the remote core that replicates to the core machine.
    -outgoingHost name of the remote target core to which data is replicated.
    -timeThe time in the format ‘Day-Hours-Minutes’ when the snapshots will be resumed 
    (only for snapshots pause). 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B305 Pause creating snapshots for a protected machine and resume it after three days, 20 hours, and 50 minutes:
    >aacmd /pause snapshot -core 10.10.10.10 -user administrator -password 23WE@#$sdd 
    -protectedserver 10.10.10.4 -time 3-20-50
    Pause export to virtual machine for all protected machines on the core:
    >aacmd /pause vmexport -core 10.10.10.10 /user administrator -password 23WE@#$sdd –
    all
    Pause outgoing replication on the core for a specific protected machine:
    >aacmd /pause replication –core 10.10.10.10 -user administrator -password 23WE@#$sdd 
    –protectedserver 10.10.1.76
    Pause outgoing replication for all protected machines on the target core:
    >aacmd /pause replication -core 10.10.10.10 -user administrator -password -
    23WE@#$sdd –outgoing 10.10.1.63
    Pause incoming replication for all machines on the target core:
    >aacmd /pause replication –core 10.10.10.10 -user administrator -password 23WE@#$sdd 
    –incoming 10.10.1.82
    Protect
    The Protect command adds a server under protection by a core.
    Usage
    The usage for the command is as follows:
    /protect -core [host name] -user [user name] -password [password] -repository [name] 
    -agentname [name | IP address] -agentusername [user name] -agentpassword [password] 
    -agentport [port] -volumes [volume names]
    Command Options
    The following table describes the options available for the Protect command:
    Table 151. Protect command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default, the connection is made to the Core installed on the local machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you must also provide a password. If none is provided, then the credentials for the 
    logged-on user are used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none is provided, then the credentials for the 
    logged-on user are used.
    -repositoryName of a repository on the Core to which the protected machine data should be 
    stored. The name must be enclosed in double quotes.
    -agentnameName or IP address of the server you want to protect.
    -agentusernameUser name for the server to be protected.
    -agentpasswordPassword for the server to be protected. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B306
    Example:
    Protect specific volumes of a server with the Core:
    >aacmd /protect -core 10.10.10.10 -username administrator -password 23WE@#$sdd -
    repository “Repository 1” -agentname 10.10.9.120 -agentport 5002 -agentusername 
    administrator agentpassword 12345 -volumes “c:” “d:”
    ProtectCluster
    The ProtectCluster command adds a cluster under protection by a core.
    Usage
    The usage for the command is as follows:
    /protectcluster -core [host name] -user [user name] -password [password] -repository 
    [name] -clustername [name | IP address] -clusterusername [user name] -
    clusterpassword [password] -clusterport [port] -clustervolumes [volume names] -
    clusternodes [cluster nodes collection]
    Command Options
    The following table describes the options available for the ProtectCluster command: -agentportProtected server port number.
    -volumesList of volumes to protect. Values must be enclosed in double quotes and separated 
    by a space. Do not use trailing slashes in volume names; for example: “c:” “d:”. 
    Table 152. ProtectCluster command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default, the connection is made to the Core installed on the local machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you must also provide a password. If none is provided, then the credentials for the 
    logged-on user are used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none is provided, then the credentials for the 
    logged-on user are used.
    -repositoryName of a repository on the Core to which the protected machine data should be 
    stored. The name must be enclosed in double quotes.
    -clusternameName or IP address of the cluster you want to protect.
    -clusterusernameUser name for the cluster to be protected.
    -clusterpasswordPassword for the cluster to be protected.
    -clusterportProtected cluster server port number.
    -clustervolumesList of volumes to protect. Values must be enclosed in double quotes and separated 
    by a space. Do not use trailing slashes in volume names; for example: “c:” “d:”. 
    -clusternodesList of the cluster nodes and the volumes you want to protect on each node. Table 151. Protect command options
    Option Description 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B307
    Example:
    Protect specific volumes of a cluster server with the Core:
    >aacmd /protectcluster -core 10.10.10.10 -username administrator -password 
    23WE@#$sdd -repository “Repository 1” -clustername 10.10.8.150 -clusterport 8006 -
    clusterusername clusterAdmin clusterpassword password -volumes 
    “C:\ClusterStorage\Volume1” -clusternodes nodeName 10.10.8.150 volumes “c:” nodeName 
    10.10.8.151 volumes “c:”
    RemoveAgent
    The RemoveAgent command lets you remove a protected machine from the protection of a Core and optionally 
    delete the recovery points of the removed machine. If you do not delete the recovery points, AppAssure retains 
    and labels them as a recovery points only machine.
    Usage
    The usage for the command is as follows:
    /removeagent -core [host name] -user [user name] -password [password] -
    protectedserver [name | IP address] -deleterecoverypoints
    Command Options
    The following table describes the options available for the RemoveAgent command:
    Example:
    Remove a machine from protection and delete the associated recovery points:
    >aacmd /removeagent -protectedserver 10.10.1.1 -deleterecoverypoints Table 153. RemoveAgent command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port 
    number). By default, the connection is made to the Core installed on the local 
    machine.
    -userOptional. User name for the remote Core host machine. If you specify a user 
    name, you must also provide a password. If none is provided, then the 
    credentials for the logged-on user are used.
    -passwordOptional. Password to the remote Core host machine. If you specify a 
    password, you also have to provide a user name. If none is provided, then the 
    credentials for the logged-on user are used.
    -protectedserverThe name or IP address of the server you want to remove from protection.
    -deleterecoverypointsOptional. Deletes all recovery points for the machine you want to remove. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B308
    RemovePoints
    The RemovePoints command lets you delete specific recovery points of a protected machine.
    Usage
    The usage for the command is as follows:
    /removepoints -core [host name] -user [user name] -password [password] -
    protectedserver [name | IP address] -rpn [number | numbers] | -time [time string]
    Command Options
    The following table describes the options available for the RemovePoints command:
    Example:
    Delete the recovery points with number 5 and 7:
    >aacmd /removepoints -core 10.10.10.10 -user administrator -password 23WE@#$sdd -
    protectedserver 10.10.5.22 -rpn 5 7
    RestoreArchive
    This command restores an archive from a local archive or share and places the restored data in a specified 
    repository. Table 154. RemovePoints command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port 
    number). By default, the connection is made to the Core installed on the local 
    machine.
    -userOptional. User name for the remote Core host machine. If you specify a user 
    name, you must also provide a password. If none is provided, then the 
    credentials for the logged-on user are used.
    -passwordOptional. Password to the remote Core host machine. If you specify a 
    password, you also have to provide a user name. If none is provided, then the 
    credentials for the logged-on user are used.
    -protectedserverThe name or IP address of the server for which you want to delete recovery 
    points
    -rpnOptional. The sequential number of a recovery point to be deleted (use /list 
    rps command to get the numbers). Specify several space-separated numbers 
    to delete multiple recovery points with a single command.
    -timeOptional. Determines which recovery point or points to delete by creation 
    time. Specify the exact time in the format mm/dd/yyyy hh:mm tt (for 
    example, 2/24/2012 09:00 AM). Keep in mind to specify the date time values 
    of the time zone set on your PC. 
    						
    All Dell manuals Comments (0)

    Related Manuals for Dell Appassure 5 User Guide