Download  Print this page

Dell DL1000 User Manual

Hide thumbs

Advertisement

Dell DL1000 Appliance
User's Guide

Advertisement

Table of Contents
loading

  Also See for Dell DL1000

  Related Manuals for Dell DL1000

  Summary of Contents for Dell DL1000

  • Page 1 Dell DL1000 Appliance User's Guide...
  • Page 2 WARNING: A WARNING indicates a potential for property damage, personal injury, or death. Copyright © 2015 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell and the Dell logo are trademarks of Dell Inc.
  • Page 3: Table Of Contents

    Contents 1 Introducing your Dell DL1000................7 ......................7 Dell DL1000 core technologies ........................... 7 Live Recovery .......................... 7 Universal Recovery ......................8 True Global Deduplication ............................8 Encryption ....................8 Dell DL1000 data protection features ..........................8 Dell DL1000 Core ........................9 Dell DL1000 Smart Agent ..........................
  • Page 4 ........................ 29 Editing a cloud account .....................29 Configuring cloud account settings ......................30 Removing a Cloud account ........................30 Monitoring your DL1000 ........................30 Upgrading your DL1000 ........................30 Repairing your DL1000 ..................... 30 Rapid Appliance Self Recovery 3 Protecting workstations and servers.............. 33 ..................
  • Page 5 ........................47 Viewing machine logs ....................... 47 Uploading machine logs ................... 47 Canceling operations on a machine ...................47 Viewing machine status and other details ......................48 Managing multiple machines ....................49 Deploying To Multiple Machines ..............49 Monitoring the deployment of multiple machines .......................50 Protecting multiple machines ................
  • Page 6 ..............97 About the Central Management Console Core reports ............97 Generating a report from the Central Management Console 7 Getting help......................98 ..................98 Finding documentation and software updates ..........................98 Documentation .......................... 98 Software updates ........................... 98 Contacting Dell ........................98 Documentation feedback...
  • Page 7: Introducing Your Dell Dl1000

    Introducing your Dell DL1000 Your Dell DL1000 combines backup and replication into a unified data protection product. It provides reliable application data recovery from your backups to protect virtual machines and physical machines. Your appliance is capable of handling up to terabytes of data with built-in global deduplication, compression, encryption, and replication to specific private or public cloud infrastructure.
  • Page 8: True Global Deduplication

    Dell DL1000 data protection features Dell DL1000 Core The Core is the central component of the DL1000 deployment architecture. The Core stores and manages machine backups and provides services for backup, recovery, retention, replication, archival, and management. The Core is a self-contained network, addressable computer that runs a 64-bit version of Microsoft Windows Server 2012 R2 Foundation and Standard operating systems.
  • Page 9: Dell Dl1000 Smart Agent

    Snapshot process Your DL1000 protection process begins when a base image is transferred from a protected machine to the Core. In this phase, full copy of the machine is transported across the network under normal operation, followed by incremental snapshots forever. The DL1000 Agent for Windows uses Microsoft Volume Shadow copy Service (VSS) to freeze and quiesce application data to disk to capture a file- system-consistent and an application-consistent backup.
  • Page 10: Recovery

    AppAssure service provider. In the event of a disaster, the MSPs can instantly spin-up virtual machines for the customer. The DL1000 is not multi-tenant. The MSPs can use the DL1000 at multiple sites and create a multi-tenant environment at their end.
  • Page 11 DL1000 Core, which consists of the central repository. The Dell software License Portal manages license subscriptions, groups and users for the agents and cores in your environment. The License Portal allows users to log in, activate accounts, download software, and deploy agents and cores per your license for your environment.
  • Page 12: Other Information You May Need

    Other information you may need NOTE: For all Dell OpenManage documents, go to dell.com/openmanagemanuals. NOTE: Always check for updates on dell.com/support/home and read the updates first because they often supersede information in other documents. NOTE: For any documentation related to Dell OpenManage Server Administrator, see dell.com/ openmanage/manuals.
  • Page 13 Resource Media Any media that ships with your system that provides documentation and tools for configuring and managing your system. This includes those pertaining to the operating system, system management software, system updates, and system components that you purchased with your system.
  • Page 14: Working With Your Dl1000

    Console. Perform one of the following to access the DL1000 Core Console: • Log on locally to your DL1000 core server, and then double-click the Core Console icon. • Type one of the following URLs in your web browser: – https://<yourCoreServerName>:8006/apprecovery/admin/core –...
  • Page 15: Managing Licenses

    Restart Firefox. Managing licenses You can manage your DL1000 licenses directly from the Core Console. From the console, you can change the license key and contact the license server. You can also access the Dell AppAssure License Portal from the Licensing page in the Core Console.
  • Page 16: Changing A License Key

    • Time of last contact with the licensing server • Next scheduled attempt of contact with the licensing server • License constraints Changing a license key To change a license key: Navigate to the Core Console, select Configuration → Licensing. The Licensing page is displayed.
  • Page 17: Changing The Os Language During Installation

    AppAssure Core Clear the browser cache. Close the browser and restart the core console from the desktop icon. Changing the OS language during installation On a running Windows installation, you can use the control panel to select language packs and configure additional international settings.
  • Page 18: Changing The Nightly Job Time

    Click OK. Changing the nightly job time The Nightly Job option schedules jobs such as rollup, attachability, and truncation for agents protected by the Core. To adjust the nightly job time: Navigate to the Core Console and select Configuration → Settings. In the Nightly Jobs section, click Change.
  • Page 19: Modifying Engine Settings

    deduplication cache holds references to unique blocks. By default, the deduplication cache is 1.5 GB. If the amount of redundant information isso large that the deduplication cache is full, your repository can no longer take full advantage of further deduplication across your repository for newly added data. You can then increase the size of the deduplication cache by changing the deduplication cache configuration in the Core Console.
  • Page 20: Modifying Deploy Settings

    Click OK. Modifying deploy settings To modify deploy settings: Navigate to the Core Console and click the Configuration tab, and then Settings. In the Deploy Settings pane, click Change. The Deploy Settings dialog box displays. In the Agent Installer Name text box, enter the name of the agent executable file. The default is Agentweb.
  • Page 21: Managing Events

    Managing Events The Core includes predefined sets of events, which can be used to notify administrators of critical issues on the Core or the backup jobs. From the Events tab, you can manage notification groups, e-mail SMTP settings, Server Settings, Enabled Trace Logs, Cloud Configuration, repetition reduction, and event retention.
  • Page 22: Configuring An Email Server

    • To create alerts specific to errors, warnings, informational messages, or a combination, select one of the following: – red triangle icon (Error) – yellow triangle icon (Warning) – blue circle (Information) – curved arrow (Restores default) • To create alerts for specific events click the > symbol next to the relevant group and select the check box to enable the alert.
  • Page 23: Configuring An Email Notification Template

    Enter details for the email server as follows: Text Box Description SMTP Server Enter the name of the email server to be used by the email notification template. The naming convention includes the host name, domain, and suffix; for example, smtp.gmail.com. From Enter a return email address.
  • Page 24: Configuring Repetition Reduction

    For example, you could select 30 days(default). Click Save. Managing repositories A repository stores the snapshots that are captured from your protected workstations and servers. The repository for your DL1000 is pre-configured. The repository resides on the internal storage of your system.
  • Page 25: Viewing Repository Details

    Managing security Your DL1000 provides strong encryption. By doing so, backups of protected machines are inaccessible. Only the user with the encryption key can access and decrypt the data. Encryption does not affect performance.
  • Page 26: Adding An Encryption Key

    Adding an encryption key To add an encryption key: In the Core Console, click Configuration → Security. From the Actions drop–down menu, click Add Encryption Key. The Create Encryption Key dialog box displays. In the Create Encryption Key dialog box, enter the details for the key described as follows. Text Box Description Name...
  • Page 27: Importing An Encryption Key

    Importing an encryption key To import an encryption key: From the Core Console, click Configuration → Security. From the Actions drop-down menu, and then click Import. The Import Key dialog box appears. In the Import Key dialog box, click Browse to locate the encryption key that you want to import, and then click Open.
  • Page 28: Adding A Cloud Account

    Adding a cloud account Before you can export your archived data to a cloud, add the account for your cloud provider in the Core Console. To add a cloud account: In the Core Console, click the Tools tab. In the left menu, click Clouds. On the Clouds page, click Add New Account.
  • Page 29: Editing A Cloud Account

    Cloud Type Text Box Description Rackspace Cloud Block Storage User Name Enter the user name for your Rackspace cloud account. API Key Enter the API key for this account. Display Name Create a display name for this account in AppAssure; for example, Rackspace 1.
  • Page 30: Removing A Cloud Account

    Monitoring your DL1000 You can monitor the status of the DL1000 Appliance subsystems by using the Appliance tab Overall Status page. The Overall Status page displays a status light next to each subsystem, along with a status description indicating the health of the subsystem.
  • Page 31 NOTE: Dell recommends you to create RASR USB key after you have set up the Appliance. To create RASR USB key, see Creating the RASR USB Key section . Insert the RASR USB key created. Reboot the appliance through the RASR USB key.
  • Page 32 NOTE: Make sure to use the Safely Remove USB Drive or the Windows Eject Drive function to prepare the USB key for removal. Otherwise, the content in the USB key may be damaged and the USB key will not work as expected. Remove the key, label, and store for future use.
  • Page 33: Protecting Workstations And Servers

    Protecting workstations and servers About protecting workstations and servers To protect your data using DL1000, add the workstations and servers you want to protect in the Core Console; for example, your Exchange server, SQL Server, or your Linux server. NOTE: In this chapter, the word machine also refers to the AppAssure Agent software installed on that machine.
  • Page 34: Protecting A Machine

    A message indicating that the deployment has started appears. You can view the progress in the Events tab. Click Show details to view more information about the status of the agent deployment. Click OK. Protecting a machine This topic describes how to start protecting the data on a machine that you specify. NOTE: The machine must have the AppAssure Agent software installed in order to be protected.
  • Page 35 CAUTION: AppAssure uses AES 256-bit encryption in the Cipher Block Chaining (CBC) mode with 256-bit keys. While using encryption is optional, Dell highly recommends that you establish an encryption key, and that you protect the passphrase you define. Store the passphrase in a secure location as it is critical for data recovery.
  • Page 36: Pausing And Resuming Protection

    Text Box Description Passphrase Enter the passphrase used to control access. Confirm Re-enter the passphrase you just entered. Passphrase 16. Click Finish to save and apply your settings. The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) will transfer to the repository on the Core following the schedule you defined, unless you specified to initially pause protection.
  • Page 37: Understanding Protection Schedules

    • Port — Specifies the port number on which the Core communications with the Agent on the machine. The default value is 8006. • Repository — Select the repository in which to store data from this agent. NOTE: You can store data from multiple agents in a single repository. •...
  • Page 38: Creating Custom Schedules

    Creating custom schedules On the Protection Schedule page of the Protect Machine or Protect Multiple Machines Wizard, to change the interval schedule for any period, do the following: a. Select Periods. The existing periods display and can be modified. Editable fields include a start time, end time, and interval (in minutes) for each period.
  • Page 39: Configuring Protected Machine Settings

    If you want to remove an existing time period from the schedule, clear the check boxes next to each time period option. Options include the following: • Mon - Fri. This range of time denotes a typical five-day work week. •...
  • Page 40: Viewing System Information For A Machine

    Text Box Description Display Name Enter a display name for the machine. A name for this machine to be displayed in the Core Console. By default, this is the host name of the machine. You can change the display name to something more user-friendly if needed.
  • Page 41: Viewing License Information

    A process that restores backup information on a protected machine. Data transfer in DL1000 involves the transmission of a volume of data along a network from AppAssure Agent machines to the Core. In the case of replication, transfer also occurs from the originating or source Core to the target Core.
  • Page 42 Sets the maximum number of simultaneous disk write actions per agent Concurrent Writes connection. NOTE: Dell recommends setting this value to the same value that you select for Maximum Concurrent Streams. If you experience packet loss, set this value slightly lower. For example, if Maximum Current Streams is set at 8, set this option to 7.
  • Page 43: Archiving Data

    Text Box Description • SQLServerWriter • System Writer • Task Scheduler Writer • VSS Metadata Store Writer • WMI Writer Transfer Data Sets the port for transfers. The default setting is 8009. Server Port Transfer Timeout Specifies in minutes and seconds the amount of time to allow a packet to be static without transfer.
  • Page 44 Table 2. Creating an archive Option Text Box Description Local Output location Enter the location for the output. It is used to define the location path where you want the archive to reside; for example, d:\work\archive. Network Output location Enter the location for the output.
  • Page 45: Importing An Archive

    Text Box Description • Select Entire Target to reserve all available space in the path provided on the destination provided in Step 4. (for example, if the location is D:\work \archive, all of the available space on the D: drive is reserved). •...
  • Page 46 Table 3. Importing an archive Option Text Box Description Local Output location Enter the location for the output. It is used to define the location path where you want the archive to reside; for example, d:\work\archiveea. Network Output location Enter the location for the output.
  • Page 47: Archiving To A Cloud

    Archiving to a cloud You can archive your data to a cloud by uploading it to a variety of cloud providers directly from the Core Console. Compatible clouds include Windows Azure, Amazon, Rackspace, and any OpenStack-based provider. To export an archive to a cloud: •...
  • Page 48: Managing Multiple Machines

    In the Core Console, navigate to the protected machine you want to view. The information about the machine displays on the Summary page. The details that display include the following: • Host name • Last Snapshot taken • Next Snapshot scheduled •...
  • Page 49: Deploying To Multiple Machines

    To deploy and protect multiple agents, perform the following tasks: Deploy AppAssure to multiple machines. Deploying To Multiple Machines. Monitor the activity of the batch deployment. Monitoring The Deployment Of Multiple Machines. Protect multiple machines. Protecting Multiple Machines NOTE: This step can be skipped if you selected the Protect Machine After Install option during deployment.
  • Page 50: Protecting Multiple Machines

    • The encryption key, if any, used for this protected agent • The version of the Agent software Protecting multiple machines After bulk deploying the AppAssure Agent software to the Windows machines, you must protect the machines to protect the data. If you select Protect Machine After Install when you deployed the agent, you can skip this procedure.
  • Page 51: Monitoring The Protection Of Multiple Machines

    • If you have selected a Typical configuration for the Protect Multiple Machines Wizard and specified custom protection, click Next and set up a custom schedule. • If you have selected Advanced configuration for the Protect Machine Wizard, click Next and proceed to Step 9 to see repository and encryption options.
  • Page 52: Recovering Data

    Recovering data Managing recovery The AppAssure Core can instantly restore data or recover machines to physical or virtual machines from the recovery points. The recovery points contain agent volume snapshots captured at the block level. These snapshots are application-aware, meaning all open transactions and rolling transaction logs are completed and caches are flushed to disk before creating the snapshot.
  • Page 53: Viewing A Specific Recovery Point

    Status Indicates current status of the recovery point. Encrypted Indicates if the recovery point is encrypted. Contents Lists the volumes included in the recovery point. Type Defines a recovery point as either base or differential. Creation Date Displays the date when the recovery point was created. Size Displays the amount of space that the recovery point consumes in the repository.
  • Page 54: Mounting A Recovery Point For A Windows Machine

    Text Box Description Raw Capacity Indicates the amount of raw storage space on the entire volume. Formatted Indicates the amount of storage space on the volume that is available for data after Capacity the volume is formatted. Used Capacity Indicates the amount of storage space currently used on the volume. Mounting a recovery point for a Windows machine In AppAssure, you can mount a recovery point for a Windows machine to access stored data through a local file system.
  • Page 55: Dismounting All Recovery Points

    Dismounting all recovery points To dismount all recovery points: Navigate to the Core Console, click Tools → Mounts . On the Local Mounts page, click Dismount All. In the Dismounting the Recovery Point window, click Yes to confirm. Mounting a recovery point for a Linux machine Using the aamount utility in AppAssure, you can remotely mount a volume from a recovery point as a local volume, on a Linux machine.
  • Page 56: Deleting An Orphaned Recovery Point Chain

    • To delete all currently stored recovery points, click Delete All. • To delete a set of recovery points in a specific data range, click Delete Range. The Delete dialog box appears. In the Delete Range dialog box, specify the range of recovery points that you want to delete by using a start date and time and an end date and time, and then click Delete.
  • Page 57: Restoring Data

    Restoring data Using AppAssure, you can instantly recover or restore data to your physical machines (for Windows or Linux machines) or to virtual machines from stored recovery points for Windows machines. The topics in this section describe how you can export a specific recovery point for Windows machines to a virtual machine or to roll back a machine to a previous recovery point.
  • Page 58: Managing Exports

    On this tab, you can manage exports by pausing, stopping, removing exports, or viewing a queue of upcoming exports. NOTE: Only the Dell DL1000, 3 TB with 2 VMs configuration supports the one-time export and continuous export (virtual standby) capabilities.
  • Page 59: Exporting Backup Information From Your Windows Machine To A Virtual Machine

    NOTE: Only the Dell DL1000, 3 TB with 2 VMs configuration supports the one-time export and continuous export (virtual standby) capabilities.
  • Page 60 Performing a one-time ESXi export To perform a one-time ESXi export: In the Core Console, navigate to the machine you want to export. On the Summary tab, click Actions → Export → One-time. The Export Wizard displays on the Protected Machines page. Select a machine for export for export and then click Next.
  • Page 61: Exporting Windows Data Using Vmware Workstation Export

    • On the Virtual Standby tab, click Add to launch the Export Wizard. On the Protected Machines page of the Export Wizard, select the protected machine you want to export, and then click Next. • Navigate to the machine you want to export, and click Actions → Export → Virtual Standby. On the Destination page of the Export Wizard, in the Recover to a Virtual Machine drop-down menu, select ESXi.
  • Page 62 Performing a one-time VMware Workstation export To perform a one-time VMware Workstation export: In the Core Console, navigate to the machine you want to export. On the Summary click Actions → Export → One-time. The Export Wizard displays on the Protected Machines page. Select a machine for export, and then click Next.
  • Page 63 Text Box Description Memory Specify the memory usage for the virtual machine by clicking one of the following: • Use the same amount of RAM as the source machine - To specify that the RAM configuration is the same as the source machine. •...
  • Page 64: Exporting Windows Data Using Hyper-V Export

    Text Box Description Virtual Machine Enter a name for the virtual machine being created; for example, VM-0A1B2C3D4. NOTE: The default name is the name of the source machine. Version Specify the version of VMware Workstation for the virtual machine. You can choose from: •...
  • Page 65 On the Summary page, click Finish to complete the wizard and to start the export. Performing a continuous (virtual standby) Hyper-V export NOTE: Only the 3 TB with 2 VMs configuration of DL1000 supports the one-time export and continuous export (virtual standby) capabilities.
  • Page 66 To perform a continuous (virtual standby) Hyper-V export: In the Core Console, on the Virtual Standby tab, click Add to launch the Export Wizard. On the Protected Machines page of the Export Wizard. Select the machine you want to export and then click Next. On the Summary tab, click Export →...
  • Page 67: Exporting Windows Data Using Oracle Virtualbox Export

    12. On the Summary page, click Finish to complete the wizard and to start the export. NOTE: You can monitor the status and progress of the export by viewing the Virtual Standby or Events tab Exporting Windows data using Oracle VirtualBox export In AppAssure, you can choose to export data using VirtualBox Export by performing a one-time or continuous export, or by establishing a continuous export (for virtual standby).
  • Page 68 • On the Virtual Standby tab, click Add to launch the Export Wizard. On the Protected Machines page of the Export Wizard, select the protected machine you want to export, and then click Next. • Navigate to the machine you want to export, and, on the Summary tab in the Actions drop-down menu for that machine, click Export →...
  • Page 69: Restoring Volumes From A Recovery Point

    Restoring Volumes from a Recovery Point You can restore the volumes on a protected machine from the recovery points stored in the AppAssure Core. To restore volumes from a recovery point: In the Core Console, click the Restore tab. The Restore Machine Wizard appears. From the Protected Machines page, select the protected machine for which you want to restore data, and then click Next.
  • Page 70 On the Volume Mapping page, for each volume in the recovery point that you want to restore, select the appropriate destination volume. If you do not want to restore a volume, in the Destination Volumes column, select Do not restore. Select Show advanced options and then do the following: •...
  • Page 71 • Boot the agent machine from an ISO image, if possible. • If not, copy the ISO image to physical media (a CD or DVD), load the disc in the agent machine, configure the machine to load from the boot CD, and restart from the boot CD. NOTE: You may need to change the BIOS settings of the agent machine to ensure the volume that loads first is the boot CD.
  • Page 72: Restoring Volumes For A Linux Machine Using The Command Line

    databases after the restore is complete, select Automatically remount all databases after the recovery point is restored. Click Finish. 21. Click OK to confirm the status message that the restore process has started. 22. To monitor the progress of your restore action, on the Core Console, click Events. Restoring volumes for a Linux machine using the Command Line In AppAssure, you can restore volumes on your protected Linux machines using the command-line aamount utility.
  • Page 73: Launching Bare Metal Restore For Windows Machines

    Upon a successful rollback, the aamount utility automatically mounts and reattach the kernel module to the rolled back volume if the target was previously protected and mounted. If not, mount the rollback volume to the local disk and then verify that the files are restored. For example, you can use the sudo mount command and then the ls command.
  • Page 74 To create a bootable CD ISO image: From the Core Console on which the server you want to restore is located, select the Core and then click the Tools tab. Click Boot CDs. Select Actions, and then click Create Boot ISO. The Create Boot CD dialog box displays.
  • Page 75 The injected drivers appear highlighted in the Drivers pane. Creating the boot cd To create a boot CD, after you have named the boot CD and specified the path, created a connection and optionally injected the drivers, from the Create Boot CD screen, click Create Boot CD. The ISO image is then created.
  • Page 76 To inject drivers to your target server: Download the drivers from the manufacturer’s website for the server and unpack them. Compress the folder that contains the drivers by using a file compressing utility (for example, Win Zip) and copy it to the target server. In the Universal Recovery Console, click Driver Injection.
  • Page 77 d. Click Restore, and then proceed to step 3. To manually map volumes, do the following: a. On the Disk Mapping page of the Restore Machine Wizard, select the Manually Map Volumes tab. b. In the Volume Mapping area, under Source Volume, verify that the source volume is selected and that the appropriate volumes are both listed beneath and are selected.
  • Page 78: Launching A Bare Metal Restore For A Linux Machine

    Launching a bare metal restore for a Linux machine Your DL1000 can perform a Bare Metal Restore (BMR) for a Linux machine including rollback of the system volume. Using the AppAssure command line utility aamount, roll back to the boot volume base image.
  • Page 79: Installing The Screen Utility

    This command rolls back the volume image specified by the ID from the Core to the specified path. The path for the rollback is the path for the device file descriptor and is not the directory to which it is mounted. NOTE: You can also specify a line number in the command instead of the recovery point ID number to identify the recovery point.
  • Page 80 Verify that the Universally Unique Identifier (UUID) contains the new volumes by using either the blkid command or the ll /dev/disk/by-uuid command. Verify that /etc/fstab contains the correct UUIDs for the root and boot volumes. Install Grand Unified Bootloader (GRUB) by using the following commands: mount --bind /dev/ /mnt/dev mount --bind /proc/ /mnt/proc chroot/mnt/bin/bash...
  • Page 81: Replicating Recovery Points

    Replicating recovery points Replication Replication is the process of copying recovery points and transmitting them to a secondary location for the purpose of disaster recovery. The process requires a paired source-target relationship between two cores. Replication is managed on a per-protected-machine basis; meaning, backup snapshots of a protected machine are replicated to the target replica core.
  • Page 82: Roadmap For Performing Replication

    Roadmap for performing replication To replicate data using AppAssure, you must configure the source and target cores for replication. After you configure replication, you can then replicate data of the protected machine, monitor and manage replication, and perform recovery. Performing replication in AppAssure involves performing the following operations: •...
  • Page 83 Text Box Description Port Enter the port number on which the AppAssure Core communicates with the machine. The default port number is 8006. User Name Enter the user name for accessing the machine. For example, Administrator. Password Enter the password for accessing the machine. If the Core you want to add has been paired with this source core previously, perform the following: a.
  • Page 84 Text Box Description required for copying the seed drive, but is not reserved immediately after starting the copying process). • Select the blank text box, enter an amount, and then select a unit of measurement from the drop-down list to customize the maximum space you want to reserve.
  • Page 85 Under Incoming Replication, select the correct source core by using the drop-down menu, and then click Consume. The Consume window appears. For Location type, select one of the following options from the drop-down list: • Local • Network • Cloud Enter the following information as needed: Text Box Description...
  • Page 86: Replicating To A Core Managed By A Third Party

    Click Yes to confirm the action. The seed drive is removed. If there are no more seed drives that exist on the source core, then the next time that you open the Replication tab, the Outstanding Seed Drive (#) link and Outstanding seed drives section do not appear.
  • Page 87: Replicating Agent Data On A Machine

    Text Box Description Remote The name of the desired repository on the target core in which to store the Repository replicated data from this machine. Pause Select this check box if you want to pause replication; for example, to pause it until after AppAssure takes a base image of the new agent.
  • Page 88: Monitoring Replication

    • • • • NOTE: The default priority is 5. If one agent is given the priority 1, and another agent is given the priority Highest, the agent with the Highest priority replicates before the agent with the 1 priority. Click OK.
  • Page 89: Managing Replication Settings

    Section Description Available Actions and create a seed drive for the new protected machine's initial transfer. Incoming Replication Lists all source machines from On a target core, in the drop- which the target receives down menu, you can select the replicated data.
  • Page 90: Removing A Protected Machine From Replication On The Source Core

    NOTE: Removing a source core results in the removal of all replicated machines that are protected by that core. Removing a protected machine from replication on the source Core To remove a protected machine from replication on the source core: From the source core, open the Core Console, and click the Replication tab.
  • Page 91: Recovering Replicated Data

    Option Description Relationship Only Removes the source core from replication but retains the replicated recovery points. With Recovery Removes the source core from replication and deletes all replicated recovery Points points received from that machine. In the Incoming Replication dialog box, click Yes to confirm deletion. Recovering replicated data Day-to-day replication functionality is maintained on the source core, while only the target core is capable of completing the functions necessary for disaster recovery.
  • Page 92: Performing Failback

    On the Actions menu for that core, click Failover. The Fail Over dialog box appears and lists the next steps required for completing a failover. Click Continue. In the left navigation area, under Protected Machines, select the machine that has the associated AppAssure Agent software with recovery points.
  • Page 93 NOTE: When you launch the restore you must use the recovery points that were imported from the target core to the agent on the virtual machine. 16. Wait for the BMR reboot and for the agent service to restart, and then view and record the network connection details of the machine.
  • Page 94: Reporting

    Reporting About reports Your DL Appliance lets you generate and view compliance, error, and summary information for multiple core and agent machines. You can choose to view reports online, print reports, or export and save them in one of several supported formats.
  • Page 95: About Errors Reports

    • Core • Protected Agent • Type • Summary • Status • Error • Start Time • End Time • Time • Total Work About errors reports Errors Reports are subsets of the Compliance Reports and are available for Cores and AppAssure Agents. Errors Reports include only the failed jobs listed in Compliance Reports and compile them into a single report that can be printed and exported.
  • Page 96: Agents Summary

    • Compression/Dedupe Ratio Agents summary The Agents portion of the Core Summary Report includes data for all agents protected by the selected core. Details about the agents are presented in a column view with the following categories: • Name • Protected Volumes •...
  • Page 97: About The Central Management Console Core Reports

    About the Central Management Console Core reports Your DL Appliance lets you generate and view compliance, error, and summary information for multiple Cores. Details about the Cores are presented in column views with the same categories described in this section. Generating a report from the Central Management Console To generate a report from the Central Management Console:...
  • Page 98: Getting Help

    To contact Dell for sales, technical support, or customer-service issues, go to software.dell.com/ support. Documentation feedback Click the Feedback link in any of the Dell documentation pages, fill up the form, and click Submit to send your feedback.