Dell PowerVault DL4000 User Manual

Backup to disk appliance - poweredby appassure
Hide thumbs Also See for PowerVault DL4000:
Table of Contents

Advertisement

Quick Links

Dell PowerVault DL4000 Backup To Disk Appliance —
Powered By AppAssure
User's Guide

Advertisement

Table of Contents
loading

Summary of Contents for Dell PowerVault DL4000

  • Page 1 Dell PowerVault DL4000 Backup To Disk Appliance — Powered By AppAssure User's Guide...
  • Page 2: Notes, Cautions, And Warnings

    CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. WARNING: A WARNING indicates a potential for property damage, personal injury, or death. © 2013 Dell Inc. Trademarks used in this text: Dell , the Dell logo, Dell Boomi , Dell Precision , OptiPlex...
  • Page 3: Table Of Contents

    Contents Notes, Cautions, and Warnings....................2 1 Introduction To AppAssure 5....................11 ..............................11 About AppAssure 5 ..........................11 AppAssure 5 Core Technologies ..............................11 Live Recovery ..............................12 Recovery Assure ............................12 Universal Recovery ..........................12 True Global Deduplication ........................12 AppAssure 5 True Scale Architecture ........................13 AppAssure 5 Deployment Architecture ..........................14 AppAssure 5 Smart Agent ............................14...
  • Page 4 ..............25 Registering Your Appliance With Existing License Portal Account ..........25 Registering Your Appliance When You Do Not Have A License Portal Account ......................26 Registering For A License Portal Account ........................27 Activating A License Portal Account ....................27 Logging On To The AppAssure 5 License Portal ..........................27 Using The License Portal Wizard ........................29...
  • Page 5: About Appassure

    3 Working With The AppAssure 5 Core..................47 ......................47 Accessing The AppAssure 5 Core Console ....................47 Roadmap For Configuring The AppAssure 5 Core ..............................47 Managing Licenses ..........................48 Changing A License Key ......................48 Contacting The License Portal Server ........................48 Managing AppAssure 5 Core Settings ........................48 Changing The Core Display Name ........................49...
  • Page 6 ............................66 Removing Replication ................66 Removing An Agent From Replication On The Source Core ......................67 Removing An Agent On The Target Core ......................67 Removing A Target Core From Replication .....................67 Removing A Source Core From Replication ..........................67 Recovering Replicated Data ........................68 Roadmap For Failover And Failback ......................68 Setting Up An Environment For Failover...
  • Page 7 ..........................83 Forcing Checksum Checks ........................83 Recovery Point Status Indicators 4 Protecting Workstations And Servers...................85 ......................85 About Protecting Workstations And Servers ..........................85 Configuring Machine Settings ....................85 Viewing And Modifying Configuration Settings ....................86 Viewing System Information For A Machine ..................86 Configuring Notification Groups For System Events ....................88 Editing Notification Groups For System Events ......................89...
  • Page 8 ..............................110 Restoring Data ........110 Exporting Backup Information For Your Windows Machine To A Virtual Machine ....................111 Exporting Windows Data Using ESXi Export ..............112 Exporting Windows Data Using VMware Workstation Export ...................114 Exporting Windows Data Using Hyper-V Export ..................116 Performing A Rollback For A Windows Machine ....................117 Performing A Rollback For A Linux Machine ....................118...
  • Page 9 ..............134 Performing A Rollback For CCR (Exchange) And Dag Clusters ................135 Performing A Rollback For SCC (Exchange, SQL) Clusters ............................135 Replicating Cluster Data ........................135 Removing A Cluster From Protection ......................135 Removing Cluster Nodes From Protection ..................136 Removing All Nodes In A Cluster From Protection ........................136 Viewing A Cluster Or Node Report 6 Reporting..........................139...
  • Page 10 Replay.Common.Contracts.PowerShellExecution)VirtualMachineLocation (namespace Replay.Common.Contracts.Virtualization)VolumeImageIdsCollection (namespace Replay.Core.Contracts.RecoveryPoints) VolumeName (namespace Replay.Common.Contracts.Metadata.Storage)VolumeNameCollection (namespace Replay.Common.Contracts.Metadata.Storage) VolumeSnapshotInfo (namesapce Replay.Common.Contracts.Transfer)VolumeSnapshotInfoDictionary (namespace ......................150 Replay.Common.Contracts.Transfer) .............................155 Pretransferscript.ps1 ...........................156 Posttransferscript.ps1 ............................157 Preexportscript.ps1 ............................157 Postexportscript.ps1 ..........................158 Prenightlyjobscript.ps1 ..........................160 Postnightlyjobscript.ps1 ..............................162 Sample Scripts 10 Getting Help..........................163 ..............................163 Contacting Dell .............................163 Documentation Feedback...
  • Page 11: Introduction To Appassure 5

    Introduction To AppAssure 5 This chapter describes the features, functionality, and architecture of AppAssure 5. About AppAssure 5 AppAssure 5 sets a new standard for unified data protection by combining backup, replication, and recovery in a single solution that is engineered to be the fastest and most reliable backup for protecting virtual machines (VM), physical machines, and cloud environments.
  • Page 12: Recovery Assure

    without waiting for a full restore to production storage. Users remain productive and IT departments reduce recovery windows to meet today's increasingly stringent RTO and RPO service-level agreements. Recovery Assure AppAssure Recovery Assure enables you to perform automated recovery testing and verification of backups. It includes, but is not limited to, file systems, Microsoft Exchange 2007 and 2010, and different versions of Microsoft SQL Server 2005, 2008, and 2008 R2.
  • Page 13: Appassure 5 Deployment Architecture

    Figure 1. AppAssure True Scale Architecture The AppAssure Volume Manager and scalable object store serve as the foundation of the AppAssure 5 True Scale architecture. The scalable object store stores block-level snapshots that are captured from virtual and physical servers. The volume manager manages the numerous object stores by providing a common repository or just-in-time storage for only what is needed.
  • Page 14: Appassure 5 Smart Agent

    Figure 2. AppAssure 5 Deployment Architecture AppAssure 5 Smart Agent The AppAssure 5 Smart Agent is installed on the machines that is protected by the AppAssure 5 Core. The Smart Agent tracks the changed blocks on the disk volume and then snaps an image of the changed blocks at a predefined interval of protection.
  • Page 15: Snapshot Process

    Snapshot Process The protection process commences with a base image followed by incremental snapshots forever. The agent uses Microsoft Volume Shadow Copy Service (VSS) to freeze and quiesce application data to disk to capture a file-system- consistent and an application-consistent backup. When a snapshot is created, the VSS writer on the target server prevents content from being written to the disk.
  • Page 16: Repository

    • Replication • Recovery-as-a-Service (RaaS) • Retention and Archiving • Virtualization and Cloud • Alerts and Event Management • AppAssure 5 License Portal • Web Console • Service Management APIs • White Labeling Repository The repository uses deduplication volume manager (DVM) to implement a volume manager that provides support for multiple volumes, each of which could reside on different storage technologies such as Storage Area Network (SAN), Direct Attached Storage (DAS), Network Attached Storage (NAS), or cloud storage.
  • Page 17: Encryption

    Figure 3. True Global Deduplication AppAssure 5 performs target-based inline data deduplication. This means that the snapshot data is transmitted over to the Core before it is deduplicated. Inline data deduplication simply means the data is deduplicated before it is committed to disk.
  • Page 18: Replication

    In replication scenarios, AppAssure 5 uses SSL 3.0 to secure the connections between the two cores in a replication topology to prevent eavesdropping and tampering. Replication Replication is the process of copying recovery points and transmitting them to a secondary location for the purpose of disaster recovery.
  • Page 19: Recovery-As-A-Service (Raas)

    Recovery-as-a-Service (RaaS) Managed service providers (MSPs) can fully leverage AppAssure 5 as a platform for delivering recovery as a service (RaaS). RaaS facilitates complete recovery-in-the-cloud by replicating customers' physical and virtual servers along with their data to the service provider's cloud as virtual machines to support recovery testing or actual recovery operations.
  • Page 20: Virtualization And Cloud

    The levels within the waterfall are defined in minutes, hours, and days; weeks, months, and years. The retention policy is enforced by the nightly rollup process. For long term archiving, AppAssure 5 provides the ability to create an archive of the source or target core on any removable media.
  • Page 21: White Labeling

    application such as relationship management methodology (RMM) tools or billing systems. Also included with AppAssure 5 is an SDK client for PowerShell scripting. White Labeling AppAssure 5 also can be re-branded and white-labeled for select enterprise and OEM partners under the Platinum service provider program.
  • Page 23: Managing Appassure 5 Licenses

    From this link, you can also access the License Portal Setup Wizard. Contact Displays a dialog box that includes contact information for Dell AppAssure. Help Provides access to AppAssure 5 documentation. Log Off Logs you out of the license portal session and deletes the session from the server.
  • Page 24: About Accounts

    • A user registers on the license portal and creates an account. • During the registration process, the license portal automatically creates a default root group for the account and gives it a name. • When the user logs into the portal, the license portal represents the user as an account for that session. •...
  • Page 25: Registering Your Appliance On The License Portal

    Registering Your Appliance On The License Portal You must register your appliance on the Dell AppAssure license portal. Registering Your Appliance With Existing License Portal Account To register your appliance if you have already created an account on the License portal: On your web browser, enter https://appliance.licenseportal.com/.
  • Page 26: Registering For A License Portal Account

    Registering For A License Portal Account If you do not currently have an AppAssure 5 License Portal account, you must register for an account to access the AppAssure 5 License Portal. When an initial user account is created in the License Portal, it is created as a default user with administrative rights. This account also has the root group associated with it, meaning it can have subgroups but no “parent group.”...
  • Page 27: Activating A License Portal Account

    Activating A License Portal Account After you register for an account, you receive an e-mail confirming your registration. This e-mail includes a hyperlink for you to activate the newly created account. To activate a license portal account: In the confirmation e-mail you receive after registering, click the hyperlink provided. The Confirmation and Activation page is displayed, which prompts you to create a password for your account.
  • Page 28 12. To download and add the AppAssure 5 Core, select the desired group to which you want to add the Core, and then click Add Core. NOTE: You must have administrative rights to download and add a core. The Dell AppAssure 5 Core is the central component of AppAssure 5. It stores and manages all the machine backups and provides core services for backup, recovery and retention;...
  • Page 29: Adding A Core To The License Portal

    NOTE: You must have administrative privileges to download and add agents. You must download and install AppAssure 5 Agent software on the machines you want to protect in your environment. The installer is available for 64-bit or 32-bit processors. NOTE: By default, the software you download is valid for 14 days. If you are a new customer, your license is automatically activated by AppAssure.
  • Page 30: Configuring Personal Settings

    – 32-bit Red Hat Enterprise Linux 6.3 installer – 64-bit Red Hat Enterprise Linux 6.3 installer – 32-bit CentOS 6.3 installer – 64-bit CentOS 6.3 installer – 32-bit Ubuntu 12.04 LTS installer – 64-bit Ubuntu 12.04 LTS installer – 32-bit SUSE Linux Enterprise Server 11 SP2 installer –...
  • Page 31: Changing Your Appassure License Portal Password

    – I successfully logged into my account – A core was added – A core was deleted – A machine has been added – A machine has been deleted – License pool has exceeded the limit – License pool has changed –...
  • Page 32: Inviting Users And Setting User Security Privileges

    – Email address – Name – Last log in date – Privilege type – Actions NOTE: This list is specific for the selected group. The user currently logged on is not displayed. Inviting Users And Setting User Security Privileges You can use the license portal to invite users into a group or subgroup and to set security privileges for those users. NOTE: You must have administrative rights to invite, remove, or edit a user.
  • Page 33: Editing User Security Privileges

    Editing User Security Privileges NOTE: A user’s access rights are inherited by their subgroup. To edit user security privileges: On the License Portal Home page, select a group in the left navigation area. Expand the Users area. Next to the user you wish to modify, click Actions and then click Privileges. The User Security dialog box is displayed.
  • Page 34: Managing Groups

    Managing Groups From the License Portal Home page, you can easily view and manage groups and subgroups. You can add subgroups and view all subgroups for the current group as well as edit and delete groups. NOTE: Only users with administrative rights can manage groups and subgroups. Adding A Group Or Subgroup NOTE: Only users with administrative rights can add groups and subgroups.
  • Page 35: Editing Branding Settings For The Root Group

    Field Description Group Name Enter a name for the group. The group name is used to identify the group. NOTE: This is a required text box. Display Name Enter a name for the group. The display name is displayed in the license portal. NOTE: This is a required text box.
  • Page 36: Adding Company And Billing Information For A Group

    Adding Company And Billing Information For A Group To add company and billing information for a group: On the AppAssure 5 License Portal Home page in the left navigation area, select the root group or select a subgroup. On the Groups page, do one of the following: –...
  • Page 37: Managing Licenses

    Text Box Description Billing Phone Enter a phone number for the responsible party. The number is used to specify the contact information for the responsible party. Billing Email Enter an e-mail address for the responsible party. It is used to specify the contact information for the responsible party.
  • Page 38: About License Pools

    About License Pools The license pool is used to administer non-trial licenses. The number assigned to the pool indicates how many licenses can be allocated. Each group maintains a number (or pool) of allocated licenses. A license pool with zero (0) defined, represents an unlimited pool of licenses.
  • Page 39: Assigning Subgroup Licenses

    Text Box Description License Pool Represents the number of available licenses that can be used for adding new agents. Available The type of license is displayed in the License Type area of the Licensing tab. Click Save. Assigning Subgroup Licenses If you put a zero (0) in the license pool, by default, you automatically enable the draw licenses from the parent group feature, which means that additional licenses is taken directly from a parent license.
  • Page 40: About Disposing Of Licenses

    Users pay for only the licenses that are used. For example, if the license pool for the group is 50 licenses and only three are in use, they are only billed for the three licenses in use. Bills are generated on the first day of each month for the previous month.
  • Page 41: About License Portal Reports

    – License – Actions (drop-down menu) You can select from the actions described in the following table to manage an agent. Option Description Activate Re-enables deactivated agent. Deactivate A deactivated agent is still billed for the current month. It is not billed for the next month. Upgrade Upgrades the version of AppAssure installed on the agent, if it is not running the latest available version.
  • Page 42: User Category

    • Total space protected for a period of time. It contains the following drill-downs: • Total machines • Active machines • Inactive machines • Blocked machines User Category The Added Users report is available for the User category. Added Users Report This report displays the list of users who were added during a specified period of time.
  • Page 43: License Category

    List of Machines Report This report shows the list of machines in a selected group, including all subgroups. It contains the following drill-downs: • Machine Name • Group • Group Path List of Cores Report This report shows the list of cores in a selected group, including all subgroups. It contains the following drill-downs: •...
  • Page 44: Drill-Downs

    Inactive Licenses Report This report displays the list of inactive machines for a group and its subgroups. It contains the following drill-downs: • Machine Name • Group • Group Path Trial Licenses Report This report displays the list of trial licenses for a group and its subgroups. It contains the following drill-downs: •...
  • Page 45: Generating A Report

    Generating A Report To generate a report: Do one of the following: – On the Home page of the License Portal, select a category from the Category drop-down list. – For a group report, navigate to the group, and then scroll down to the Reports area of the group page. From the Report drop-down list, select a report.
  • Page 47: Working With The Appassure 5 Core

    Status of last response from the licensing server • Time of last contact with the licensing server • Next scheduled attempt of contact with the licensing server For more information about AppAssure 5 licenses, see the Dell DL4000 Deployment Guide at dell.com/support/manuals.
  • Page 48: Changing A License Key

    Changing A License Key To change a license key: Navigate to the AppAssure 5 Core Console and then select the Configuration tab. Click Licensing. The Licensing page is displayed. From the license details, click Change. The Change License Key dialog box is displayed. In the Change License Key dialog box, enter the new license key and click OK.
  • Page 49: Adjusting The Nightly Job Time

    In the Name text box, enter a new display name for the Core. Click OK. Adjusting The Nightly Job Time To adjust the nightly job time: Navigate to the AppAssure 5 Core Console and click the Configuration tab, and then Settings. In the Nightly Jobs area, click Change.
  • Page 50: Modifying Appassure 5 Engine Settings

    NOTE: You must restart the Core service for the changes to take effect. Modifying AppAssure 5 Engine Settings To modify AppAssure 5 engine settings: Navigate to the AppAssure 5 Core Console and click the Configuration tab, and then Settings. In the Replay Engine Configuration area, click Change. The Replay Engine Configuration dialog box is displayed.
  • Page 51: About Repositories

    Text Box Description User Name (optional) Enter a user name for accessing and managing the database connection settings. It is used to specify the log in credentials for accessing the database connection. Password (optional) Enter a password for accessing and managing the database connection settings. Retain event and job Enter the number of days to retain the event and job history for the database connection.
  • Page 52: Creating A Repository

    When you create a repository, the Core pre-allocates the space required for storing data and metadata in the specified location. You can create up to 255 independent repositories on a single core. To further increase the size of a single repository, you can add new storage locations or volumes.
  • Page 53: Viewing Details About A Repository

    Text Box Description Size Set the size or capacity for the storage location. The default is 250 MB. You can choose from the following: – – – NOTE: The size that you specify cannot exceed the size of the volume. Write Caching Policy The write caching policy controls how the Windows Cache Manager is used in the repository and helps to tune the repository for optimal performance on different...
  • Page 54: Adding A Storage Location To An Existing Repository

    In the AppAssure 5 Core Console, click the Configuration tab. The Repositories page is displayed. Click the right angle bracket (>) symbol next to the Status column of the repository you wish to modify. Next to Actions, click Settings. The Repository Settings dialog box is displayed. Edit the repository information as described below.
  • Page 55 Text Box Description Metadata Path Enter the location for storing the protected metadata. Data Path Enter the location for storing the protected data. – Or, click Add file on CIFS share to specify a network share location and then enter the information as described below.
  • Page 56: Checking A Repository

    Checking A Repository AppAssure 5 provides the ability to perform a diagnostic check of a repository volume when errors occur. Core errors could be the result of it being improperly shut down, a hardware failure, and so on. NOTE: This procedure must only be performed for diagnostic purposes. For example, in the event of hardware failure, improper shutdown of the Core, and so on.
  • Page 57: Editing An Encryption Key

    Navigate to the AppAssure 5 Core, and then click the Configuration tab. From the Manage option are on the Configuration tab, select Security. Click Actions, and then click Add Encryption Key. The Create Encryption Key dialog box is displayed. In the Create Encryption Key dialog box, enter the details for the key as described below. Text Box Description Name...
  • Page 58: Importing An Encryption Key

    Importing An Encryption Key To import an encryption key Navigate to the AppAssure 5 Core, and then click the Configuration tab. From the Manage option, click Security. Click right angle bracket (>) symbol next to the name of the encryption key you want to import, and then click Import.
  • Page 59: About Seeding

    Text Box Description Replication to a Local The target core is located in a local data center or on-site location, and replication is Location maintained at all times. In this configuration, the loss of the Core does not prevent a recovery. Replication to an Off- The target core is located at an off-site disaster recovery facility for recovery in the event of a site Location...
  • Page 60: About Failover And Failback In Appassure 5

    Because large amounts of data need to be copied to the portable storage device, an eSATA, USB 3.0, or other high- speed connection to the portable storage device is recommended. About Failover And Failback In AppAssure 5 In the case of a severe outage in which your source core and agents fail, AppAssure 5 supports failover and failback in replicated environments.
  • Page 61: Roadmap For Performing Replication

    NOTE: Bandwidth specified by the ISP is the total available bandwidth. The outgoing bandwidth is shared by all devices on the network. Make sure that there is enough free bandwidth for replication to accommodate the change rate. Number of It is important to consider the number of agents protected per source core and how many you Agents plan to replicate to the target.
  • Page 62 NOTE: The AppAssure 5 Core must be installed on both the source and target machines if you are replicating to a self-managed core. If you are using a MSP for disaster recovery or replicating to a third party, you need to install the AppAssure 5 Core only on your source machine.
  • Page 63 Text Box Description User name Enter the user name for connecting to the drive. NOTE: This is required if the seed drive is on a network share. Password Enter the password for connecting to the drive. NOTE: This is required if the seed drive is on a network share. Maximum size Select one of the following options: –...
  • Page 64: Monitoring Replication

    a) Select the agents to replicate. b) Select a repository for each agent. c) Enter your subscription e-mail address and customer ID that was assigned to you by the service provider. If you plan to perform the seeding process for the transfer of base data, select Use a seed drive to perform initial transfer.
  • Page 65: Pausing And Resuming Replication

    To monitor replication: In the Core Console, click the Replication tab. On this tab, you can view information about and monitor the status of replication tasks as described below. Section Description Available Actions Pending Replication Requests Lists your customer ID, e-mail In the drop-down menu, click Ignore address, and host name when a to ignore or reject the request.
  • Page 66: Managing Replication Settings

    To pause and resume replication: In the Core Console, click the Replication tab. Under Outgoing Replication for a source core or Incoming Replication for a target core, click Pause Replication to pause replication temporarily. Click Resume Replication to resume replication after it has been paused. Managing Replication Settings You can adjust a number of settings for how replication executes on the source and target cores.
  • Page 67: Removing An Agent On The Target Core

    Removing An Agent On The Target Core To remove an agent on the target core: On the target core, open the AppAssure 5 Core Console, and click the Replication tab. Expand the Incoming Replication section. In the drop-down menu for the agent you wish to remove from replication, click Delete, and then select one of the following options.
  • Page 68: Roadmap For Failover And Failback

    To set up an environment for failover: Install an AppAssure 5 Core for the source and install an AppAssure 5 Core for the target. Dell DL4000 Deployment Guide at dell.com/support/manuals. For more information, see the Install an AppAssure 5 Agent to be protected by the source core.
  • Page 69: Performing Failback

    Export the backup recovery point information on that agent to a virtual machine. Shut down the machine that has the AppAssure agent. Start the virtual machine that now includes the exported backup information. You need to wait for the device driver software to be installed. Reboot the virtual machine and wait for the agent service to start.
  • Page 70: Managing Events

    For more information, see Configuring Machine Settings. 18. Navigate to the Core Console on the target core, and delete the agent from the Replication tab. For more information, see Removing Replication. 19. In the Core Console of the source core, set up replication again between the source and target by clicking the Replication tab, and then adding the target core for replication.
  • Page 71: Configuring An Email Server And Email Notification Template

    – Notification Options In the General panel, enter basic information for the notification group, as described below. Text Box Description Name Enter a name for event notification group. It is used to identify the event notification group. Description Enter a description for the event notification group. It is used to describe the purpose of the event notification group.
  • Page 72: Configuring Repetition Reduction

    Navigate to the AppAssure 5 Core, and then click the Configuration tab. From the Manage option, click Events. In the Email SMTP Settings pane, click Change. The Edit Email Notification Configuration dialog box is displayed. Select Enable Email Notifications, and then enter details for the e-mail server as described below. Text Box Description SMTP Server...
  • Page 73: Managing Recovery

    Navigate to the AppAssure 5 Core, and then click the Configuration tab. From the Manage option, click Events. Click Change. The Event Retention dialog box is displayed. In the Store Events For text box, select the duration for retaining information about events. Click OK.
  • Page 74: Dismounting Select Recovery Points

    NOTE: For access to the Agent Installer, see Downloading And Installing The Agent Installer. For more information Dell DL4000 Deployment Guide at dell.com/support/manuals. For about deploying the Agent Installer, see the access to the Local Mount Utility Installer, see About The Local Mount Utility...
  • Page 75: Managing Replication Settings

    Managing Replication Settings You can adjust a number of settings for how replication executes on the source and target cores. To manage replication settings: In the Core Console, click the Replication tab. In the Actions drop-down menu, click Settings. In the Replication Settings window, edit the replication settings as described below. Option Description Cache lifetime...
  • Page 76: Importing An Archive

    Text Box Description Output Location Enter the location for the output. It is used to define the location path where you want the archive to reside. This can be a local disk or a network share. For example, d:\work \archive or \\servername\sharename for network paths. NOTE: If the output location is a network share, enter a user name and password for connecting to the share.
  • Page 77: Configuring Sql Attachability Settings

    consistency of the SQL databases and ensure that all data files (MDF and LDF files) are available in the backup snapshot. Attachability checks can be run for specific recovery points on demand or as part of a nightly job. Attachability requires the presence of a local instance of Microsoft SQL Server on the Core.
  • Page 78: Configuring Nightly Sql Attachability Checks And Log Truncation

    Configuring Nightly SQL Attachability Checks And Log Truncation To configure nightly SQL attachability checks and log truncation: In the left navigation area of the AppAssure 5 Core, select the machine for which you want to have nightly attachability checks and click SQL Server Settings. The SQL Server Settings window is displayed.
  • Page 79: Adding A Core To The Local Mount Utility

    10. On the Prerequisites page, install any necessary prerequisites and click Next to continue to the Installation Options page. 11. On the Installation Options page, complete the following tasks: a) Choose a destination folder for LMU by clicking the Change button. NOTE: The default destination folder is C:\Program Files\AppRecovery\LocalMountUtility.
  • Page 80: Exploring A Mounted Recovery Point Using The Local Mount Utility

    application can connect to only one core at a time. For example, if you mount a recovery point of an agent protected by one core and then mount a recovery point of an agent protected by a different core, LMU automatically disconnects from the first core to establish a connection with the second core.
  • Page 81: About The Local Mount Utility Tray Menu

    From the machine on which LMU is installed, launch LMU by double-clicking the desktop icon. From the main Local Mount Recovery screen, click Active mounts. The Active Mounts window opens and displays all mounted recovery points. Select one of the options described in the table below to dismount recovery points. Option Description Dismount...
  • Page 82: Managing Exchange Database Mountability Checks And Log Truncation

    Option Description Reconnect to core Refreshes and updates information from the Core, such as recently added agents. Remove core Deletes core from the Local Mount Utility. Edit core Opens the Edit Core window, where you can change the host name, port, and credentials. Accessing Agent Options To access agent options, right-click on the AppAssure 5 Core or agent and then click Refresh recovery points.
  • Page 83: Forcing Checksum Checks

    Click Force Mountability Check. A message prompts you to force a mountability check. Click Yes. NOTE: For instructions on how to view the status of the attachability checks, see Viewing Events And Alerts. The system performs the mountability check. Forcing Checksum Checks To force a checksum check: In the left navigation area of the AppAssure Core Console, select the machine for which you want to force the checksum check, and then click the Recovery Points tab.
  • Page 84 Status Color Description • An Exchange database did not exist • Mountability checks were not enabled. NOTE: This can apply to certain volumes within a recovery point. Yellow Indicates that the Exchange database mountability checks are enabled, but the checks have not yet run. Indicates that either the mountability or checksum checks failed on at least one database.
  • Page 85: Protecting Workstations And Servers

    Protecting Workstations And Servers About Protecting Workstations And Servers To protect your data using AppAssure 5, you need to add the workstations and servers for protection in the AppAssure 5 Core Console. For example, your Exchange server, SQL Server, your Linux server, and so on. NOTE: In this chapter, generally the word machine also refers to the AppAssure Agent software installed on that machine.
  • Page 86: Viewing System Information For A Machine

    Text Box Description Repository Select a repository for the recovery points. Displays the repository on the AppAssure 5 Core in which to store the data from this machine. NOTE: This setting can only be changed if there are no recovery points or the previous repository is missing.
  • Page 87 The Summary tab is displayed. Click the Configuration tab, and then click Events. The Notification Groups page is displayed. Click Use custom alert settings and then click Apply. The Custom Notification Groups screen is displayed. Click Add Group to add new notification groups for sending a list of system events. The Add Notification Group dialog box is displayed.
  • Page 88: Editing Notification Groups For System Events

    Text Box Description Notification Options Select the method to specify how to handle notifications. You can choose from the following options: – Notify by Email — Specify to which e-mail addresses to send the events in the To, CC and, optionally, BCC text boxes. NOTE: To receive mail, SMTP must be previously configured.
  • Page 89: Customizing Retention Policy Settings

    Text Box Description – Clusters – Notification – PowerShellScripting – PushInstall – Attachability – Jobs – Licensing – LogTruncation – Archive – CoreService – Export – Protection – Replication – Rollback – Rollup You can also choose to select by type: –...
  • Page 90 backup snapshots. The retention policy is enforced by a rollup process that helps with aging and deleting old backups. This task is also a step in Process Of Modifying Cluster Node Settings. To customize retention policy settings: Navigate to the AppAssure 5 Core Console and then click the Machines tab. From the Machines tab, perform one of the following: –...
  • Page 91 Text Box Description day for n [retention Enter a number to represent the retention period and then select the time period. The time period] default is 4. You can choose from: – Days – Weeks – Months – Years ...and then keep one Provides a more granular level of retention.
  • Page 92: Viewing License Information

    Select Force Rollup to perform a rollup, based on the current retention policy for the machine, or let the retention policy you defined to be applied during the nightly rollup. Viewing License Information You can view current license status information for the AppAssure 5 Agent software installed on a machine. To view license information: Navigate to the AppAssure 5 Core Console and then click the Machines tab.
  • Page 93: Modifying Transfer Settings

    Option Description NOTE: If the SQL or Exchange databases and logs are on different volumes, the volumes must belong to one protection group. Daily To protect data on a daily basis, select the Daily option, and then and in the Protection Time drop-down menu, select a time to start protecting data.
  • Page 94: Restarting A Service

    Text Box Description Maximum Transfer Specifies the time to process a program without freezing or locking up during the transfer. Queue Depth Transfer Data Server Port Sets the port for transfers. Transfer Timeout Specifies the time to respond after waiting. Network Read Specifies the maximum time in seconds to wait for a connection.
  • Page 95: Protecting A Machine

    – Or, in the Navigation pane, select the machine you want to view. Click the Tools tab, and then click Diagnostics. Click the View Log link. Protecting A Machine This topic describes how to start protecting the data on a machine that has the AppAssure 5 Agent software installed. When you add protection, you need to specify the name or IP address of the machine to protect and the volumes on that machine to protect as well as define the protection schedule for each volume.
  • Page 96: Creating Custom Schedules For Volumes

    Field Description – To set a custom schedule, click Edit. For more information about setting custom schedules, see Creating Custom Schedules For Volumes. Click Protect. CAUTION: If you protected a Linux machine, you must not unmount a protected volume manually. In the event you need to do this, you must execute the following command before unmounting the volume: bsctl -d [path_to_volume].
  • Page 97: Modifying Sql Server Settings

    The Summary tab is displayed for the machine. From the Summary tab, click the Exchange Server Settings link. The Exchange Server Settings dialog box is displayed. In the Exchange Server Settings dialog box, you can select or clear the following settings: –...
  • Page 98: Replicating A New Agent

    Text Box Description Machine Enter the host name or IP address of the machine that you want to deploy. Username Enter the user name to connect to this machine. For example, administrator. Password Enter the password to connect to this machine Automatic reboot Select to specify whether the Core starts upon the completion of the deployment and after install...
  • Page 99: Managing Machines

    Text Box Description NOTE: The encryption settings for a repository are defined under the Configuration tab in the AppAssure 5 Core Console. Remote Core Specify the target core to which you want to replicate the agent. Remote Repository The name of the desired repository on the target core in which to store the replicated data from this machine.
  • Page 100: Replicating Agent Data On A Machine

    Navigate to the AppAssure 5 Core Console and then click the Machines tab. From the Machines tab, perform one of the following: – Click the hyperlink for the machine you want to truncate the log. – Or, in the navigation pane, select the machine you want to truncate the log. In the Actions drop-down menu for that machine, click Force Log Truncation.
  • Page 101: Canceling Operations On A Machine

    NOTE: The default priority is 5. If one agent is given the priority 1, and another agent is given the priority Highest, the agent with the Highest priority replicates before the agent with the 1 priority. Click OK. Canceling Operations On A Machine You can cancel currently executing operations for a machine.
  • Page 102 Dell DL4000 and deploy the installer to the machines. For more information about the License Portal, see the Deployment Guide at dell.com/support/manuals. Deploying To Machines On An Active Directory Domain Before starting this procedure, you must have the domain information and logon credentials for the Active Directory server.
  • Page 103 Text Box Description NOTE: This option is mandatory if you want to automatically protect the machine after deployment by checking the Protect Machine After Install box. Protect Machine Specify whether you want to automatically protect the machine after deployment. This After Install allows you to skip Protecting Multiple Machines.
  • Page 104 Text Box Description Green icon AppAssure 5 is able to connect to the machine and it is ready to be deployed. Yellow icon AppAssure 5 is able to connect to the machine; however, the agent is already paired with a core machine. Red icon AppAssure 5 cannot connect to the machine.
  • Page 105: Monitoring The Deployment Of Multiple Machines

    After machines are verified successfully, check the box next to each machine and click Deploy. If you chose the Protect machine after install option, after deployment is successful the machines are rebooted automatically and protection is enabled. Monitoring The Deployment Of Multiple Machines You can view the progress of the deployment of AppAssure 5 Agent software to the machines.
  • Page 106: Monitoring The Protection Of Multiple Machines

    Text Box Description Username The username used to connect to this machine. For example, Administrator. Password The secure password used to connect to this machine. Port The port number on which the AppAssure 5 Core communicates with the agent on the machine.
  • Page 107: Managing Snapshots And Recovery Points

    Text Box Description To view alert As each protected machine is added, an alert is logged that details whether the operation information was successful or errors were logged. The level of the alert along with the transactional date and message is displayed. If you want to remove all alerts from the page, click Dismiss All.
  • Page 108: Mounting A Recovery Point Volume On A Linux Machine

    – In the Actions drop-down menu for that machine, click Mount. – In the Mount Recovery Point dialog box, select a Recovery Point in the list, and then click Next. – In the left navigation area of the AppAssure 5 Core Console, select the machine you want to mount to a local file system, which launches the Summary tab for that machine.
  • Page 109: Removing Recovery Points

    NOTE: You can also specify a line number in the command instead of the recovery point ID number to identify the recovery point. In that case, use the agent/machine line number (from the lm output), followed by the recovery point line number and volume letter, followed by the path, such as, m <machine_line_number>...
  • Page 110: Pausing And Resuming Snapshots

    – Click the Actions drop-down menu for that machine, click Force Snapshot, and then select one of the options described below. Text Box Description Snapshot Takes an incremental snapshot of data updated since the last snapshot was taken. Base Image Takes a complete snapshot of all data on the volumes of the machine.
  • Page 111: Exporting Windows Data Using Esxi Export

    – ESXi Export – VMware Workstation Export – Hyper-V Export The Select Export Type dialog box is displayed. Exporting Windows Data Using ESXi Export In AppAssure 5, you can choose to export data using ESXi Export by performing a one-time or continuous export. Performing A One-Time ESXi Export To perform a one-time ESXi export: In the Select Export Type dialog box, click One-time export.
  • Page 112: Exporting Windows Data Using Vmware Workstation Export

    In the Options tab, enter the information for the virtual machine as described. Text Box Description Virtual Machine Enter a name for the virtual machine. Name Memory Specify the memory usage. You can choose from the following options: – Use the same amount of RAM as source machine –...
  • Page 113 Text Box Description – If you specified a network share path, you need to enter a valid user name for an account that is registered on the target machine. – If you entered a local path, a user name is not required. Password Enter the logon credentials for the virtual machine.
  • Page 114: Exporting Windows Data Using Hyper-V Export

    Text Box Description – If you entered a local path, a user name is not required. Password Enter the logon credentials for the virtual machine. – If you specified a network share path, you need to enter a valid password for an account that is registered on the target machine.
  • Page 115 Text Box Description Hyper-V Host Name Enter an IP address or host name for the Hyper-V server. It represents the IP address or host name of the remote Hyper-V server. Port Enter a port number for the machine. It represents the port through which the Core communicates with this machine.
  • Page 116: Performing A Rollback For A Windows Machine

    Text Box Description Password Enter the password for the user account with administrative privileges on the workstation with Hyper-V server. It is used to specify the logon credentials for the virtual machine. VM Machine Enter the path for the virtual machine. For example, D:\export. It is used to identify the Location location of the virtual machine.
  • Page 117: Performing A Rollback For A Linux Machine

    Text Box Description Alternate Machine Specify a different agent machine to restore the recovery point to a custom agent. Recovery Console Enter the user name and password to restore the recovery point to any machine that Instance booted in URC mode. Click Load Volumes.
  • Page 118: About Bare Metal Restore For Windows Machines

    NOTE: It is possible to rollback to /, but only when performing a Bare Metal Restore while booted with a Live CD. For more information, see Performing A Bare Metal Restore For A Linux Machine. When prompted to proceed, enter y for Yes. after the rollback proceeds, a series of messages are displayed to notify you of the status.
  • Page 119: Creating A Bootable Cd Iso Image

    Create a boot CD. See Creating A Bootable CD ISO Image. Burn the image to disk. Boot the target server from the boot CD. See Loading A Boot Connect to the recovery disk. Map the volumes. See Mapping Volumes. Initiate the recovery. See Launching A Restore From The Appassure 5 Core.
  • Page 120: Loading A Boot Cd

    NOTE: Inject Windows 7 PE 32-bit compatible drivers in the boot CD. To inject drivers in a boot CD: Download the drivers from the manufacturer’s Web site for the server and unpack them. Compress the folder that contains the drivers using a file compressing utility. For example, Win Zip. Click Browse to locate the compressed file, and then click Upload.
  • Page 121: Launching A Restore From The Appassure 5 Core

    Launching A Restore From The Appassure 5 Core To launch a restore from the AppAssure 5 Core: If the NICs on any system being restored are teamed (bonded), remove all but one of the network cables. NOTE: AppAssure Restore does not recognize teamed NICs. The process is not able to resolve which NIC to use if presented with more than one active connection.
  • Page 122: Starting A New Server

    Starting A New Server To start a new server: Navigate back to the new server, and, in the AppAssure Universal Recovery Console interface, select Reboot to start the machine. Specify to start Windows normally. Log on to the machine. The system is restored to its state prior to the bare metal restore. Repairing Startup Problems To repair startup problems, if you encounter problems when starting from a new restore, select the Repair Boot Problems option in the Driver Injection window of the AppAssure Universal Recovery Console to automatically fix the...
  • Page 123: Viewing Events And Alerts

    includes a sequence number at the end (for example: ”293cc667-44b4-48ab-91d8-44bc74252a4f:2”), which identifies the recovery point. Enter the following command to select the base image recovery point for rollback: r <volume_base_image_recovery_point_ID_number> <path> CAUTION: You need to ensure that the system volume is not mounted. This command rolls back the volume image specified by the ID from the Core to the specified path The path for the rollback is the path for the device file descriptor and is not the directory to which it is mounted.
  • Page 125: Protecting Server Clusters

    Protecting Server Clusters About Server Cluster Protection In AppAssure 5 In AppAssure 5, server cluster protection is associated with the AppAssure agents installed on individual cluster nodes (that is, individual machines in the cluster) and the AppAssure 5 Core, which protects those agents, all as if they were one composite machine.
  • Page 126: Protecting A Cluster

    Protecting A Cluster This topic describes how to add a cluster for protection in AppAssure 5. When you add a cluster to protection, you need to specify the host name or IP address of the cluster, the cluster application, or one of the cluster nodes or machines that includes the AppAssure 5 Agent.
  • Page 127: Protecting Nodes In A Cluster

    Text Box Description • To customize when to protect data during peak times, you can specify a start time, end time, and an interval. • To protect data during off-peak times, select the Protect during off- peak times check box, and then select an interval for protection. Weekends —...
  • Page 128: Process Of Modifying Cluster Node Settings

    Text Box Description Repository Select the repository on the AppAssure 5 Core in which the data from this machine is be stored. Encryption Specify whether encryption is to be applied to the data for every volume on this machine to be stored in the repository. NOTE: The encryption settings for a repository are defined under the Configuration tab in the AppAssure 5 Core Console.
  • Page 129: Configuring Cluster Event Notifications

    To modify cluster settings: Do one of the following: – In the Core Console, click the Machines tab, and then select the cluster you wish to modify. – Or, in the left navigation area, select the cluster you wish to modify. Click the Configuration tab.
  • Page 130: Modifying The Cluster Retention Policy

    The Add Notification Group dialog box opens. Add the notification options as described in the following table. Text Box Description Name Enter a name for the notification group. Description Enter a description for the notification group. Enable Events Select the events for notification, for example, Clusters. You can also choose to select by type: –...
  • Page 131: Modifying Cluster Protection Schedules

    Text Box Description Use Custom retention This lets you configure custom settings. Continue to Step 4. policy If you selected Custom alert settings, follow the instructions for setting a custom retention policy as described in Customizing Retention Policy Settings, beginning with Step 4. Modifying Cluster Protection Schedules In AppAssure 5, you can modify the protection schedules only if your cluster has shared volumes.
  • Page 132: Viewing Server Cluster Information

    Do one of the following: – In the Core Console, click the Machines tab, and select the cluster that contains the machine you wish to convert. Then, click the Machines tab for the cluster. – Or, from the left navigation area, select the cluster that contains the machine you want to convert, and click the Machines tab.
  • Page 133: Working With Cluster Recovery Points

    To refresh this information to the most current, click the Actions drop-down menu, and click Refresh Metadata. For information about viewing summary and status information for an individual machine or node in the cluster, see Viewing Machine Status And Other Details.
  • Page 134: Pausing And Resuming Cluster Snapshots

    – Or, in the left navigation area, under Clusters, select the cluster for which you wish to view recovery points. On the Summary tab, click the Actions drop-down menu, and then click Force Snapshot. Pausing And Resuming Cluster Snapshots To pause and resume cluster snapshots: Do one of the following: –...
  • Page 135: Performing A Rollback For Scc (Exchange, Sql) Clusters

    NOTE: You do not need to roll back the quorum disk. It can be regenerated automatically or by using cluster service functionality. Performing A Rollback For SCC (Exchange, SQL) Clusters To perform a rollback for SCC (Exchange, SQL) clusters: Turnoff all nodes except one. Perform a rollback using the standard AppAssure procedure for the machine as described in Performing A Rollback For A Windows Machine...
  • Page 136: Removing All Nodes In A Cluster From Protection

    Select one of the options described in the following table. Option Description Relationship Only Removes the source core from replication but retains the replicated recovery points. With Recovery Points Removes the source core from replication and deletes all replicated recovery points received from that machine.
  • Page 137 The report results appear in the page. To export the report results to one of the available format – PDF, XLS, XLSX, RTF, MHT, HTML, TXT, CSV, or image – select the format for export from the drop-down list, and then do one of the following: –...
  • Page 139: Reporting

    Reporting About Reports AppAssure 5 lets you generate and view compliance, error, and summary information for multiple core and agent machines. You can choose to view reports online, print reports, or export and save them in one of several supported formats. The formats from which you can choose are: •...
  • Page 140: About Errors Reports

    Details about the jobs are presented in a column view that includes the following categories: • Core • Protected Agent • Type • Summary • Status • Error • Start Time • End Time • Time • Total Work For information about how to generate a report, see Generating A Report For A Core Or Agent.
  • Page 141: Agents Summary

    • Allocated Space • Used Space • Free Space • Compression/Dedupe Ratio Agents Summary The Agents portion of the Core Summary Report includes data for all agents protected by the selected core. Details about the agents are presented in a column view with the following categories: •...
  • Page 142: About The Central Management Console Core Reports

    About The Central Management Console Core Reports AppAssure 5 lets you generate and view compliance, error, and summary information for multiple AppAssure 5 Cores. Details about the Cores are presented in column views with the same categories described in the sections About Compliance Reports,...
  • Page 143: Completing A Full Recovery Of The Dl4000 Backup To Disk Appliance

    Completing A Full Recovery Of The DL4000 Backup To Disk Appliance The data drives on the DL4000 Backup To Disk appliance are located in slots 2-9 and in RAID 6 format, meaning they can sustain up to two drive failures without data loss. The operating system resides on drives 0 and 1, which are formatted as a RAID 1 virtual disk.
  • Page 144: Run The Recovery And Update Utility

    (if it is the incorrect CD or DVD, for example), a message is displayed requesting that you insert the correct installation media. Start USC by booting the system and pressing the <F10> key within 10 seconds of the Dell logo being displayed. Click OS Deployment in the left pane.
  • Page 145 The virtual disks for repositories and any virtual standby machines are restored and AppAssure services are restarted. The recovery is complete.
  • Page 147: Changing The Host Name Manually

    Changing The Host Name Manually It is recommended that you select a host name during the initial configuration of the DL4000 Backup to Disk Appliance. If you change the hostname at a later time using Windows System Properties, you must perform the following steps manually to ensure that the new host name takes effect and the appliance functions properly: 1.
  • Page 148: Change The Display Name In Appassure

    Start AppAssure Core services. Double-click the AppAssure 5 Core icon on the desktop to open your browser. NOTE: The browser opens the AppAssure core using the old server name. In the browser replace the old server name with the new <server name:8006>. For example, https://<servername:8006/apprecovery/admin/Core.
  • Page 149: Appendix A - Scripting

    Appendix A — Scripting About Powershell Scripting Windows PowerShell is a Microsoft .NET Framework-connected environment designed for administrative automation. AppAssure 5 includes comprehensive client software development kits (SDKs) for PowerShell scripting that enables administrators to automate the administration and management of AppAssure 5 resources by the execution of commands through scripts.
  • Page 150: Input Parameters

    NOTE: The configuration file, powershell_ise.exe.config must have the same content as that of the powershell.exe.config file. CAUTION: If the pre-PowerShell or post-PowerShell script fails, the job also fails. Input Parameters All available input parameters are used in sample scripts. The parameters are described in the following tables. NOTE: Script files must possess the same name as the sample script files.
  • Page 151 Method Description public Guid ProviderId{ get; set; } Gets or sets the GUID of the VSS provider to use for snapshots on this host. Administrators typically accept the default. public Gets or sets the collection of VSS writer IDs, which is Collection<ExcludedWriter>ExcludedWrite excluded from this snapshot.
  • Page 152 DatabaseCheckJobRequestBase (namespace Replay.Core.Contracts.Exchange) Inherits its values from the parameter, BackgroundJobRequest. ExportJobRequest (namespace Replay.Core.Contracts.Export) Inherits its values from the parameter, BackgroundJobRequest. Method Description public uint RamInMegabytes { get; Gets or sets the memory size for the exported VM. Set to set; } zero (0) to use the memory size of the source machine.
  • Page 153 Method Description Public AgentTransferConfiguration Gets or sets the transfer configuration. TransferConfiguration { get; set; } public Gets or sets the storage configuration. AgentProtectionStorageConfiguration StorageConfiguration { get; set; } public string Key { get; set; } Generates a pseudorandom (but not cryptographically secure) key, which can be used as a one-time password to authenticate transfer requests.
  • Page 154 TransferPrescriptParameter (namespace Replay.Common.Contracts.PowerShellExecution) Method Description public VolumeNameCollection VolumeNames Gets or sets the collection of volume names for transfer. { get; set; } public ShadowCopyType ShadowCopyType Gets or sets the type of copying for transfer. Available { get; set; } values: Unknown, Copy, and Full. public AgentTransferConfiguration Gets or sets the transfer configuration.
  • Page 155: Pretransferscript.ps1

    Method Description NOTE: A known issue exists in .NET 4.0 WCF (https:// connect.microsoft.com/VisualStudio/ feedback/ ViewFeedback.aspx?FeedbackID=413312), which prevents path escape characters from working correctly in a URI template. Because a volume name contains both '\' and '?', you must replace the special characters '\' and '?' with other special characters.
  • Page 156: Posttransferscript.ps1

    \AppRecovery Agent 5') $regVal = $regLM.GetValue('InstallLocation') $regVal = $regVal + 'Common.Contracts.dll' [System.Reflection.Assembly]::LoadFrom($regVal) | out-null # Converting input parameter into specific object $TransferPrescriptParameterObject = $TransferPrescriptParameter -as [Replay.Common.Contracts.PowerShellExecution.TransferPrescriptParameter]; # Working with input object. All echo's are logged if($TransferPrescriptParameterObject -eq $null) { echo 'TransferPrescriptParameterObject parameter is null' else { echo 'TransferConfiguration:'$TransferPrescriptParameterObject.TransferConfiguration...
  • Page 157: Preexportscript.ps1

    Preexportscript.ps1 The PreExportScript is executed on the Core side prior to any export job. # receiving parameter from export job param([object]$ExportJobRequest) # building path to Core's Common.Contracts.dll and loading this assembly $regLM = [Microsoft.Win32.Registry]::LocalMachine$regLM = $regLM.OpenSubKey('SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall \AppRecovery Core 5') $regVal = $regLM.GetValue('InstallLocation') $regVal = $regVal + 'CoreService\Common.Contracts.dll' [System.Reflection.Assembly]::LoadFrom($regVal) | out-null # Converting input parameter into specific object...
  • Page 158: Prenightlyjobscript.ps1

    if($ExportJobRequestObject -eq $null) { echo 'ExportJobRequestObject parameter is null' else { echo 'VolumeImageIds:' $ExportJobRequestObject.VolumeImageIds echo 'RamInMegabytes:' $ExportJobRequestObject.RamInMegabytes Prenightlyjobscript.ps1 The PreNightlyJobScript is executed before every nighty job on Core side. It has $JobClassName parameter, that helps to handle those child jobs separately. # receiving parameters from Nightlyjob param([System.String]$JobClassMethod , [object] $NightlyAttachabilityJobRequest,...
  • Page 159 echo 'RollupJobRequestObject parameter is null'; else { echo 'SimultaneousJobsCount:' $RollupJobRequestObject.SimultaneousJobsCount; echo 'AgentId:' $RollupJobRequestObject.AgentId; echo 'IsNightlyJob:' $RollupJobRequestObject.IsNightlyJob; $AgentsCollection = $Agents -as "System.Collections.Generic.List``1[System.Guid]" if($AgentsCollection -eq $null) { echo 'AgentsCollection parameter is null'; else { echo 'Agents GUIDs:' foreach ($a in $AgentsCollection) { echo $a break;...
  • Page 160: Postnightlyjobscript.ps1

    Postnightlyjobscript.ps1 The PostNightlyJobScript is executed after every nightly job on Core side. It has $JobClassName parameter, that helps to handle those child jobs separately. # receiving parameters from Nightlyjob param([System.String]$JobClassMethod , [object] $NightlyAttachabilityJobRequest, [object]$RollupJobRequest, [object]$Agents, [object]$ChecksumCheckJobRequest, [object]$TransferJobRequest, [int] $LatestEpochSeenByCore, [object]$TakeSnapshotResponse) # building path to Core's Common.Contracts.dll and loading this assembly $regLM = [Microsoft.Win32.Registry]::LocalMachine $regLM = $regLM.OpenSubKey('SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall...
  • Page 161 echo 'SimultaneousJobsCount:' $RollupJobRequestObject.SimultaneousJobsCount; echo 'AgentId:' $RollupJobRequestObject.AgentId; echo 'IsNightlyJob:' $RollupJobRequestObject.IsNightlyJob; $AgentsCollection = $Agents -as "System.Collections.Generic.List``1[System.Guid]" if($AgentsCollection -eq $null) { echo 'AgentsCollection parameter is null'; else { echo 'Agents GUIDs:' foreach ($a in $AgentsCollection) { echo $a break; # working with Checksum Check Job ChecksumCheckJob { $ChecksumCheckJobRequestObject = $ChecksumCheckJobRequest -as [Replay.Core.Contracts.Exchange.ChecksumChecks.ChecksumCheckJobRequest];...
  • Page 162: Sample Scripts

    break; Sample Scripts The following sample scripts are provided to assist administrative users in executing PowerShell scripts. The sample scripts include: • PreTransferScript.ps1 • PostTransferScript.ps1 • PreExportScript.ps1 • PostExportScript.ps1 • PreNightlyJobScript.ps1 • PostNightlyJobScript.ps1...
  • Page 163: Getting Help

    Select the appropriate option depending on your requirement. Documentation Feedback If you have feedback for this document, write to documentation_feedback@dell.com. Alternatively, you can click on the Feedback link in any of the Dell documentation pages, fill up the form, and click Submit to send your feedback.

Table of Contents