Contents Notes, Cautions, and Warnings....................2 1 Introduction To AppAssure 5....................11 ..............................11 About AppAssure 5 ..........................11 AppAssure 5 Core Technologies ..............................11 Live Recovery ..............................12 Recovery Assure ............................12 Universal Recovery ..........................12 True Global Deduplication ........................12 AppAssure 5 True Scale Architecture ........................13 AppAssure 5 Deployment Architecture ..........................14 AppAssure 5 Smart Agent ............................14...
Page 4
..............25 Registering Your Appliance With Existing License Portal Account ..........25 Registering Your Appliance When You Do Not Have A License Portal Account ......................26 Registering For A License Portal Account ........................27 Activating A License Portal Account ....................27 Logging On To The AppAssure 5 License Portal ..........................27 Using The License Portal Wizard ........................29...
3 Working With The AppAssure 5 Core..................47 ......................47 Accessing The AppAssure 5 Core Console ....................47 Roadmap For Configuring The AppAssure 5 Core ..............................47 Managing Licenses ..........................48 Changing A License Key ......................48 Contacting The License Portal Server ........................48 Managing AppAssure 5 Core Settings ........................48 Changing The Core Display Name ........................49...
Page 6
............................66 Removing Replication ................66 Removing An Agent From Replication On The Source Core ......................67 Removing An Agent On The Target Core ......................67 Removing A Target Core From Replication .....................67 Removing A Source Core From Replication ..........................67 Recovering Replicated Data ........................68 Roadmap For Failover And Failback ......................68 Setting Up An Environment For Failover...
Page 7
..........................83 Forcing Checksum Checks ........................83 Recovery Point Status Indicators 4 Protecting Workstations And Servers...................85 ......................85 About Protecting Workstations And Servers ..........................85 Configuring Machine Settings ....................85 Viewing And Modifying Configuration Settings ....................86 Viewing System Information For A Machine ..................86 Configuring Notification Groups For System Events ....................88 Editing Notification Groups For System Events ......................89...
Page 8
..............................110 Restoring Data ........110 Exporting Backup Information For Your Windows Machine To A Virtual Machine ....................111 Exporting Windows Data Using ESXi Export ..............112 Exporting Windows Data Using VMware Workstation Export ...................114 Exporting Windows Data Using Hyper-V Export ..................116 Performing A Rollback For A Windows Machine ....................117 Performing A Rollback For A Linux Machine ....................118...
Page 9
..............134 Performing A Rollback For CCR (Exchange) And Dag Clusters ................135 Performing A Rollback For SCC (Exchange, SQL) Clusters ............................135 Replicating Cluster Data ........................135 Removing A Cluster From Protection ......................135 Removing Cluster Nodes From Protection ..................136 Removing All Nodes In A Cluster From Protection ........................136 Viewing A Cluster Or Node Report 6 Reporting..........................139...
Introduction To AppAssure 5 This chapter describes the features, functionality, and architecture of AppAssure 5. About AppAssure 5 AppAssure 5 sets a new standard for unified data protection by combining backup, replication, and recovery in a single solution that is engineered to be the fastest and most reliable backup for protecting virtual machines (VM), physical machines, and cloud environments.
without waiting for a full restore to production storage. Users remain productive and IT departments reduce recovery windows to meet today's increasingly stringent RTO and RPO service-level agreements. Recovery Assure AppAssure Recovery Assure enables you to perform automated recovery testing and verification of backups. It includes, but is not limited to, file systems, Microsoft Exchange 2007 and 2010, and different versions of Microsoft SQL Server 2005, 2008, and 2008 R2.
Figure 1. AppAssure True Scale Architecture The AppAssure Volume Manager and scalable object store serve as the foundation of the AppAssure 5 True Scale architecture. The scalable object store stores block-level snapshots that are captured from virtual and physical servers. The volume manager manages the numerous object stores by providing a common repository or just-in-time storage for only what is needed.
Figure 2. AppAssure 5 Deployment Architecture AppAssure 5 Smart Agent The AppAssure 5 Smart Agent is installed on the machines that is protected by the AppAssure 5 Core. The Smart Agent tracks the changed blocks on the disk volume and then snaps an image of the changed blocks at a predefined interval of protection.
Snapshot Process The protection process commences with a base image followed by incremental snapshots forever. The agent uses Microsoft Volume Shadow Copy Service (VSS) to freeze and quiesce application data to disk to capture a file-system- consistent and an application-consistent backup. When a snapshot is created, the VSS writer on the target server prevents content from being written to the disk.
• Replication • Recovery-as-a-Service (RaaS) • Retention and Archiving • Virtualization and Cloud • Alerts and Event Management • AppAssure 5 License Portal • Web Console • Service Management APIs • White Labeling Repository The repository uses deduplication volume manager (DVM) to implement a volume manager that provides support for multiple volumes, each of which could reside on different storage technologies such as Storage Area Network (SAN), Direct Attached Storage (DAS), Network Attached Storage (NAS), or cloud storage.
Figure 3. True Global Deduplication AppAssure 5 performs target-based inline data deduplication. This means that the snapshot data is transmitted over to the Core before it is deduplicated. Inline data deduplication simply means the data is deduplicated before it is committed to disk.
In replication scenarios, AppAssure 5 uses SSL 3.0 to secure the connections between the two cores in a replication topology to prevent eavesdropping and tampering. Replication Replication is the process of copying recovery points and transmitting them to a secondary location for the purpose of disaster recovery.
Recovery-as-a-Service (RaaS) Managed service providers (MSPs) can fully leverage AppAssure 5 as a platform for delivering recovery as a service (RaaS). RaaS facilitates complete recovery-in-the-cloud by replicating customers' physical and virtual servers along with their data to the service provider's cloud as virtual machines to support recovery testing or actual recovery operations.
The levels within the waterfall are defined in minutes, hours, and days; weeks, months, and years. The retention policy is enforced by the nightly rollup process. For long term archiving, AppAssure 5 provides the ability to create an archive of the source or target core on any removable media.
application such as relationship management methodology (RMM) tools or billing systems. Also included with AppAssure 5 is an SDK client for PowerShell scripting. White Labeling AppAssure 5 also can be re-branded and white-labeled for select enterprise and OEM partners under the Platinum service provider program.
From this link, you can also access the License Portal Setup Wizard. Contact Displays a dialog box that includes contact information for Dell AppAssure. Help Provides access to AppAssure 5 documentation. Log Off Logs you out of the license portal session and deletes the session from the server.
• A user registers on the license portal and creates an account. • During the registration process, the license portal automatically creates a default root group for the account and gives it a name. • When the user logs into the portal, the license portal represents the user as an account for that session. •...
Registering Your Appliance On The License Portal You must register your appliance on the Dell AppAssure license portal. Registering Your Appliance With Existing License Portal Account To register your appliance if you have already created an account on the License portal: On your web browser, enter https://appliance.licenseportal.com/.
Registering For A License Portal Account If you do not currently have an AppAssure 5 License Portal account, you must register for an account to access the AppAssure 5 License Portal. When an initial user account is created in the License Portal, it is created as a default user with administrative rights. This account also has the root group associated with it, meaning it can have subgroups but no “parent group.”...
Activating A License Portal Account After you register for an account, you receive an e-mail confirming your registration. This e-mail includes a hyperlink for you to activate the newly created account. To activate a license portal account: In the confirmation e-mail you receive after registering, click the hyperlink provided. The Confirmation and Activation page is displayed, which prompts you to create a password for your account.
Page 28
12. To download and add the AppAssure 5 Core, select the desired group to which you want to add the Core, and then click Add Core. NOTE: You must have administrative rights to download and add a core. The Dell AppAssure 5 Core is the central component of AppAssure 5. It stores and manages all the machine backups and provides core services for backup, recovery and retention;...
NOTE: You must have administrative privileges to download and add agents. You must download and install AppAssure 5 Agent software on the machines you want to protect in your environment. The installer is available for 64-bit or 32-bit processors. NOTE: By default, the software you download is valid for 14 days. If you are a new customer, your license is automatically activated by AppAssure.
– I successfully logged into my account – A core was added – A core was deleted – A machine has been added – A machine has been deleted – License pool has exceeded the limit – License pool has changed –...
– Email address – Name – Last log in date – Privilege type – Actions NOTE: This list is specific for the selected group. The user currently logged on is not displayed. Inviting Users And Setting User Security Privileges You can use the license portal to invite users into a group or subgroup and to set security privileges for those users. NOTE: You must have administrative rights to invite, remove, or edit a user.
Editing User Security Privileges NOTE: A user’s access rights are inherited by their subgroup. To edit user security privileges: On the License Portal Home page, select a group in the left navigation area. Expand the Users area. Next to the user you wish to modify, click Actions and then click Privileges. The User Security dialog box is displayed.
Managing Groups From the License Portal Home page, you can easily view and manage groups and subgroups. You can add subgroups and view all subgroups for the current group as well as edit and delete groups. NOTE: Only users with administrative rights can manage groups and subgroups. Adding A Group Or Subgroup NOTE: Only users with administrative rights can add groups and subgroups.
Field Description Group Name Enter a name for the group. The group name is used to identify the group. NOTE: This is a required text box. Display Name Enter a name for the group. The display name is displayed in the license portal. NOTE: This is a required text box.
Adding Company And Billing Information For A Group To add company and billing information for a group: On the AppAssure 5 License Portal Home page in the left navigation area, select the root group or select a subgroup. On the Groups page, do one of the following: –...
Text Box Description Billing Phone Enter a phone number for the responsible party. The number is used to specify the contact information for the responsible party. Billing Email Enter an e-mail address for the responsible party. It is used to specify the contact information for the responsible party.
About License Pools The license pool is used to administer non-trial licenses. The number assigned to the pool indicates how many licenses can be allocated. Each group maintains a number (or pool) of allocated licenses. A license pool with zero (0) defined, represents an unlimited pool of licenses.
Text Box Description License Pool Represents the number of available licenses that can be used for adding new agents. Available The type of license is displayed in the License Type area of the Licensing tab. Click Save. Assigning Subgroup Licenses If you put a zero (0) in the license pool, by default, you automatically enable the draw licenses from the parent group feature, which means that additional licenses is taken directly from a parent license.
Users pay for only the licenses that are used. For example, if the license pool for the group is 50 licenses and only three are in use, they are only billed for the three licenses in use. Bills are generated on the first day of each month for the previous month.
– License – Actions (drop-down menu) You can select from the actions described in the following table to manage an agent. Option Description Activate Re-enables deactivated agent. Deactivate A deactivated agent is still billed for the current month. It is not billed for the next month. Upgrade Upgrades the version of AppAssure installed on the agent, if it is not running the latest available version.
• Total space protected for a period of time. It contains the following drill-downs: • Total machines • Active machines • Inactive machines • Blocked machines User Category The Added Users report is available for the User category. Added Users Report This report displays the list of users who were added during a specified period of time.
List of Machines Report This report shows the list of machines in a selected group, including all subgroups. It contains the following drill-downs: • Machine Name • Group • Group Path List of Cores Report This report shows the list of cores in a selected group, including all subgroups. It contains the following drill-downs: •...
Inactive Licenses Report This report displays the list of inactive machines for a group and its subgroups. It contains the following drill-downs: • Machine Name • Group • Group Path Trial Licenses Report This report displays the list of trial licenses for a group and its subgroups. It contains the following drill-downs: •...
Generating A Report To generate a report: Do one of the following: – On the Home page of the License Portal, select a category from the Category drop-down list. – For a group report, navigate to the group, and then scroll down to the Reports area of the group page. From the Report drop-down list, select a report.
Status of last response from the licensing server • Time of last contact with the licensing server • Next scheduled attempt of contact with the licensing server For more information about AppAssure 5 licenses, see the Dell DL4000 Deployment Guide at dell.com/support/manuals.
Changing A License Key To change a license key: Navigate to the AppAssure 5 Core Console and then select the Configuration tab. Click Licensing. The Licensing page is displayed. From the license details, click Change. The Change License Key dialog box is displayed. In the Change License Key dialog box, enter the new license key and click OK.
In the Name text box, enter a new display name for the Core. Click OK. Adjusting The Nightly Job Time To adjust the nightly job time: Navigate to the AppAssure 5 Core Console and click the Configuration tab, and then Settings. In the Nightly Jobs area, click Change.
NOTE: You must restart the Core service for the changes to take effect. Modifying AppAssure 5 Engine Settings To modify AppAssure 5 engine settings: Navigate to the AppAssure 5 Core Console and click the Configuration tab, and then Settings. In the Replay Engine Configuration area, click Change. The Replay Engine Configuration dialog box is displayed.
Text Box Description User Name (optional) Enter a user name for accessing and managing the database connection settings. It is used to specify the log in credentials for accessing the database connection. Password (optional) Enter a password for accessing and managing the database connection settings. Retain event and job Enter the number of days to retain the event and job history for the database connection.
When you create a repository, the Core pre-allocates the space required for storing data and metadata in the specified location. You can create up to 255 independent repositories on a single core. To further increase the size of a single repository, you can add new storage locations or volumes.
Text Box Description Size Set the size or capacity for the storage location. The default is 250 MB. You can choose from the following: – – – NOTE: The size that you specify cannot exceed the size of the volume. Write Caching Policy The write caching policy controls how the Windows Cache Manager is used in the repository and helps to tune the repository for optimal performance on different...
In the AppAssure 5 Core Console, click the Configuration tab. The Repositories page is displayed. Click the right angle bracket (>) symbol next to the Status column of the repository you wish to modify. Next to Actions, click Settings. The Repository Settings dialog box is displayed. Edit the repository information as described below.
Page 55
Text Box Description Metadata Path Enter the location for storing the protected metadata. Data Path Enter the location for storing the protected data. – Or, click Add file on CIFS share to specify a network share location and then enter the information as described below.
Checking A Repository AppAssure 5 provides the ability to perform a diagnostic check of a repository volume when errors occur. Core errors could be the result of it being improperly shut down, a hardware failure, and so on. NOTE: This procedure must only be performed for diagnostic purposes. For example, in the event of hardware failure, improper shutdown of the Core, and so on.
Navigate to the AppAssure 5 Core, and then click the Configuration tab. From the Manage option are on the Configuration tab, select Security. Click Actions, and then click Add Encryption Key. The Create Encryption Key dialog box is displayed. In the Create Encryption Key dialog box, enter the details for the key as described below. Text Box Description Name...
Importing An Encryption Key To import an encryption key Navigate to the AppAssure 5 Core, and then click the Configuration tab. From the Manage option, click Security. Click right angle bracket (>) symbol next to the name of the encryption key you want to import, and then click Import.
Text Box Description Replication to a Local The target core is located in a local data center or on-site location, and replication is Location maintained at all times. In this configuration, the loss of the Core does not prevent a recovery. Replication to an Off- The target core is located at an off-site disaster recovery facility for recovery in the event of a site Location...
Because large amounts of data need to be copied to the portable storage device, an eSATA, USB 3.0, or other high- speed connection to the portable storage device is recommended. About Failover And Failback In AppAssure 5 In the case of a severe outage in which your source core and agents fail, AppAssure 5 supports failover and failback in replicated environments.
NOTE: Bandwidth specified by the ISP is the total available bandwidth. The outgoing bandwidth is shared by all devices on the network. Make sure that there is enough free bandwidth for replication to accommodate the change rate. Number of It is important to consider the number of agents protected per source core and how many you Agents plan to replicate to the target.
Page 62
NOTE: The AppAssure 5 Core must be installed on both the source and target machines if you are replicating to a self-managed core. If you are using a MSP for disaster recovery or replicating to a third party, you need to install the AppAssure 5 Core only on your source machine.
Page 63
Text Box Description User name Enter the user name for connecting to the drive. NOTE: This is required if the seed drive is on a network share. Password Enter the password for connecting to the drive. NOTE: This is required if the seed drive is on a network share. Maximum size Select one of the following options: –...
a) Select the agents to replicate. b) Select a repository for each agent. c) Enter your subscription e-mail address and customer ID that was assigned to you by the service provider. If you plan to perform the seeding process for the transfer of base data, select Use a seed drive to perform initial transfer.
To monitor replication: In the Core Console, click the Replication tab. On this tab, you can view information about and monitor the status of replication tasks as described below. Section Description Available Actions Pending Replication Requests Lists your customer ID, e-mail In the drop-down menu, click Ignore address, and host name when a to ignore or reject the request.
To pause and resume replication: In the Core Console, click the Replication tab. Under Outgoing Replication for a source core or Incoming Replication for a target core, click Pause Replication to pause replication temporarily. Click Resume Replication to resume replication after it has been paused. Managing Replication Settings You can adjust a number of settings for how replication executes on the source and target cores.
Removing An Agent On The Target Core To remove an agent on the target core: On the target core, open the AppAssure 5 Core Console, and click the Replication tab. Expand the Incoming Replication section. In the drop-down menu for the agent you wish to remove from replication, click Delete, and then select one of the following options.
To set up an environment for failover: Install an AppAssure 5 Core for the source and install an AppAssure 5 Core for the target. Dell DL4000 Deployment Guide at dell.com/support/manuals. For more information, see the Install an AppAssure 5 Agent to be protected by the source core.
Export the backup recovery point information on that agent to a virtual machine. Shut down the machine that has the AppAssure agent. Start the virtual machine that now includes the exported backup information. You need to wait for the device driver software to be installed. Reboot the virtual machine and wait for the agent service to start.
For more information, see Configuring Machine Settings. 18. Navigate to the Core Console on the target core, and delete the agent from the Replication tab. For more information, see Removing Replication. 19. In the Core Console of the source core, set up replication again between the source and target by clicking the Replication tab, and then adding the target core for replication.
– Notification Options In the General panel, enter basic information for the notification group, as described below. Text Box Description Name Enter a name for event notification group. It is used to identify the event notification group. Description Enter a description for the event notification group. It is used to describe the purpose of the event notification group.
Navigate to the AppAssure 5 Core, and then click the Configuration tab. From the Manage option, click Events. In the Email SMTP Settings pane, click Change. The Edit Email Notification Configuration dialog box is displayed. Select Enable Email Notifications, and then enter details for the e-mail server as described below. Text Box Description SMTP Server...
Navigate to the AppAssure 5 Core, and then click the Configuration tab. From the Manage option, click Events. Click Change. The Event Retention dialog box is displayed. In the Store Events For text box, select the duration for retaining information about events. Click OK.
NOTE: For access to the Agent Installer, see Downloading And Installing The Agent Installer. For more information Dell DL4000 Deployment Guide at dell.com/support/manuals. For about deploying the Agent Installer, see the access to the Local Mount Utility Installer, see About The Local Mount Utility...
Managing Replication Settings You can adjust a number of settings for how replication executes on the source and target cores. To manage replication settings: In the Core Console, click the Replication tab. In the Actions drop-down menu, click Settings. In the Replication Settings window, edit the replication settings as described below. Option Description Cache lifetime...
Text Box Description Output Location Enter the location for the output. It is used to define the location path where you want the archive to reside. This can be a local disk or a network share. For example, d:\work \archive or \\servername\sharename for network paths. NOTE: If the output location is a network share, enter a user name and password for connecting to the share.
consistency of the SQL databases and ensure that all data files (MDF and LDF files) are available in the backup snapshot. Attachability checks can be run for specific recovery points on demand or as part of a nightly job. Attachability requires the presence of a local instance of Microsoft SQL Server on the Core.
Configuring Nightly SQL Attachability Checks And Log Truncation To configure nightly SQL attachability checks and log truncation: In the left navigation area of the AppAssure 5 Core, select the machine for which you want to have nightly attachability checks and click SQL Server Settings. The SQL Server Settings window is displayed.
10. On the Prerequisites page, install any necessary prerequisites and click Next to continue to the Installation Options page. 11. On the Installation Options page, complete the following tasks: a) Choose a destination folder for LMU by clicking the Change button. NOTE: The default destination folder is C:\Program Files\AppRecovery\LocalMountUtility.
application can connect to only one core at a time. For example, if you mount a recovery point of an agent protected by one core and then mount a recovery point of an agent protected by a different core, LMU automatically disconnects from the first core to establish a connection with the second core.
From the machine on which LMU is installed, launch LMU by double-clicking the desktop icon. From the main Local Mount Recovery screen, click Active mounts. The Active Mounts window opens and displays all mounted recovery points. Select one of the options described in the table below to dismount recovery points. Option Description Dismount...
Option Description Reconnect to core Refreshes and updates information from the Core, such as recently added agents. Remove core Deletes core from the Local Mount Utility. Edit core Opens the Edit Core window, where you can change the host name, port, and credentials. Accessing Agent Options To access agent options, right-click on the AppAssure 5 Core or agent and then click Refresh recovery points.
Click Force Mountability Check. A message prompts you to force a mountability check. Click Yes. NOTE: For instructions on how to view the status of the attachability checks, see Viewing Events And Alerts. The system performs the mountability check. Forcing Checksum Checks To force a checksum check: In the left navigation area of the AppAssure Core Console, select the machine for which you want to force the checksum check, and then click the Recovery Points tab.
Page 84
Status Color Description • An Exchange database did not exist • Mountability checks were not enabled. NOTE: This can apply to certain volumes within a recovery point. Yellow Indicates that the Exchange database mountability checks are enabled, but the checks have not yet run. Indicates that either the mountability or checksum checks failed on at least one database.
Protecting Workstations And Servers About Protecting Workstations And Servers To protect your data using AppAssure 5, you need to add the workstations and servers for protection in the AppAssure 5 Core Console. For example, your Exchange server, SQL Server, your Linux server, and so on. NOTE: In this chapter, generally the word machine also refers to the AppAssure Agent software installed on that machine.
Text Box Description Repository Select a repository for the recovery points. Displays the repository on the AppAssure 5 Core in which to store the data from this machine. NOTE: This setting can only be changed if there are no recovery points or the previous repository is missing.
Page 87
The Summary tab is displayed. Click the Configuration tab, and then click Events. The Notification Groups page is displayed. Click Use custom alert settings and then click Apply. The Custom Notification Groups screen is displayed. Click Add Group to add new notification groups for sending a list of system events. The Add Notification Group dialog box is displayed.
Text Box Description Notification Options Select the method to specify how to handle notifications. You can choose from the following options: – Notify by Email — Specify to which e-mail addresses to send the events in the To, CC and, optionally, BCC text boxes. NOTE: To receive mail, SMTP must be previously configured.
Text Box Description – Clusters – Notification – PowerShellScripting – PushInstall – Attachability – Jobs – Licensing – LogTruncation – Archive – CoreService – Export – Protection – Replication – Rollback – Rollup You can also choose to select by type: –...
Page 90
backup snapshots. The retention policy is enforced by a rollup process that helps with aging and deleting old backups. This task is also a step in Process Of Modifying Cluster Node Settings. To customize retention policy settings: Navigate to the AppAssure 5 Core Console and then click the Machines tab. From the Machines tab, perform one of the following: –...
Page 91
Text Box Description day for n [retention Enter a number to represent the retention period and then select the time period. The time period] default is 4. You can choose from: – Days – Weeks – Months – Years ...and then keep one Provides a more granular level of retention.
Select Force Rollup to perform a rollup, based on the current retention policy for the machine, or let the retention policy you defined to be applied during the nightly rollup. Viewing License Information You can view current license status information for the AppAssure 5 Agent software installed on a machine. To view license information: Navigate to the AppAssure 5 Core Console and then click the Machines tab.
Option Description NOTE: If the SQL or Exchange databases and logs are on different volumes, the volumes must belong to one protection group. Daily To protect data on a daily basis, select the Daily option, and then and in the Protection Time drop-down menu, select a time to start protecting data.
Text Box Description Maximum Transfer Specifies the time to process a program without freezing or locking up during the transfer. Queue Depth Transfer Data Server Port Sets the port for transfers. Transfer Timeout Specifies the time to respond after waiting. Network Read Specifies the maximum time in seconds to wait for a connection.
– Or, in the Navigation pane, select the machine you want to view. Click the Tools tab, and then click Diagnostics. Click the View Log link. Protecting A Machine This topic describes how to start protecting the data on a machine that has the AppAssure 5 Agent software installed. When you add protection, you need to specify the name or IP address of the machine to protect and the volumes on that machine to protect as well as define the protection schedule for each volume.
Field Description – To set a custom schedule, click Edit. For more information about setting custom schedules, see Creating Custom Schedules For Volumes. Click Protect. CAUTION: If you protected a Linux machine, you must not unmount a protected volume manually. In the event you need to do this, you must execute the following command before unmounting the volume: bsctl -d [path_to_volume].
The Summary tab is displayed for the machine. From the Summary tab, click the Exchange Server Settings link. The Exchange Server Settings dialog box is displayed. In the Exchange Server Settings dialog box, you can select or clear the following settings: –...
Text Box Description Machine Enter the host name or IP address of the machine that you want to deploy. Username Enter the user name to connect to this machine. For example, administrator. Password Enter the password to connect to this machine Automatic reboot Select to specify whether the Core starts upon the completion of the deployment and after install...
Text Box Description NOTE: The encryption settings for a repository are defined under the Configuration tab in the AppAssure 5 Core Console. Remote Core Specify the target core to which you want to replicate the agent. Remote Repository The name of the desired repository on the target core in which to store the replicated data from this machine.
Navigate to the AppAssure 5 Core Console and then click the Machines tab. From the Machines tab, perform one of the following: – Click the hyperlink for the machine you want to truncate the log. – Or, in the navigation pane, select the machine you want to truncate the log. In the Actions drop-down menu for that machine, click Force Log Truncation.
NOTE: The default priority is 5. If one agent is given the priority 1, and another agent is given the priority Highest, the agent with the Highest priority replicates before the agent with the 1 priority. Click OK. Canceling Operations On A Machine You can cancel currently executing operations for a machine.
Page 102
Dell DL4000 and deploy the installer to the machines. For more information about the License Portal, see the Deployment Guide at dell.com/support/manuals. Deploying To Machines On An Active Directory Domain Before starting this procedure, you must have the domain information and logon credentials for the Active Directory server.
Page 103
Text Box Description NOTE: This option is mandatory if you want to automatically protect the machine after deployment by checking the Protect Machine After Install box. Protect Machine Specify whether you want to automatically protect the machine after deployment. This After Install allows you to skip Protecting Multiple Machines.
Page 104
Text Box Description Green icon AppAssure 5 is able to connect to the machine and it is ready to be deployed. Yellow icon AppAssure 5 is able to connect to the machine; however, the agent is already paired with a core machine. Red icon AppAssure 5 cannot connect to the machine.
After machines are verified successfully, check the box next to each machine and click Deploy. If you chose the Protect machine after install option, after deployment is successful the machines are rebooted automatically and protection is enabled. Monitoring The Deployment Of Multiple Machines You can view the progress of the deployment of AppAssure 5 Agent software to the machines.
Text Box Description Username The username used to connect to this machine. For example, Administrator. Password The secure password used to connect to this machine. Port The port number on which the AppAssure 5 Core communicates with the agent on the machine.
Text Box Description To view alert As each protected machine is added, an alert is logged that details whether the operation information was successful or errors were logged. The level of the alert along with the transactional date and message is displayed. If you want to remove all alerts from the page, click Dismiss All.
– In the Actions drop-down menu for that machine, click Mount. – In the Mount Recovery Point dialog box, select a Recovery Point in the list, and then click Next. – In the left navigation area of the AppAssure 5 Core Console, select the machine you want to mount to a local file system, which launches the Summary tab for that machine.
NOTE: You can also specify a line number in the command instead of the recovery point ID number to identify the recovery point. In that case, use the agent/machine line number (from the lm output), followed by the recovery point line number and volume letter, followed by the path, such as, m <machine_line_number>...
– Click the Actions drop-down menu for that machine, click Force Snapshot, and then select one of the options described below. Text Box Description Snapshot Takes an incremental snapshot of data updated since the last snapshot was taken. Base Image Takes a complete snapshot of all data on the volumes of the machine.
– ESXi Export – VMware Workstation Export – Hyper-V Export The Select Export Type dialog box is displayed. Exporting Windows Data Using ESXi Export In AppAssure 5, you can choose to export data using ESXi Export by performing a one-time or continuous export. Performing A One-Time ESXi Export To perform a one-time ESXi export: In the Select Export Type dialog box, click One-time export.
In the Options tab, enter the information for the virtual machine as described. Text Box Description Virtual Machine Enter a name for the virtual machine. Name Memory Specify the memory usage. You can choose from the following options: – Use the same amount of RAM as source machine –...
Page 113
Text Box Description – If you specified a network share path, you need to enter a valid user name for an account that is registered on the target machine. – If you entered a local path, a user name is not required. Password Enter the logon credentials for the virtual machine.
Text Box Description – If you entered a local path, a user name is not required. Password Enter the logon credentials for the virtual machine. – If you specified a network share path, you need to enter a valid password for an account that is registered on the target machine.
Page 115
Text Box Description Hyper-V Host Name Enter an IP address or host name for the Hyper-V server. It represents the IP address or host name of the remote Hyper-V server. Port Enter a port number for the machine. It represents the port through which the Core communicates with this machine.
Text Box Description Password Enter the password for the user account with administrative privileges on the workstation with Hyper-V server. It is used to specify the logon credentials for the virtual machine. VM Machine Enter the path for the virtual machine. For example, D:\export. It is used to identify the Location location of the virtual machine.
Text Box Description Alternate Machine Specify a different agent machine to restore the recovery point to a custom agent. Recovery Console Enter the user name and password to restore the recovery point to any machine that Instance booted in URC mode. Click Load Volumes.
NOTE: It is possible to rollback to /, but only when performing a Bare Metal Restore while booted with a Live CD. For more information, see Performing A Bare Metal Restore For A Linux Machine. When prompted to proceed, enter y for Yes. after the rollback proceeds, a series of messages are displayed to notify you of the status.
Create a boot CD. See Creating A Bootable CD ISO Image. Burn the image to disk. Boot the target server from the boot CD. See Loading A Boot Connect to the recovery disk. Map the volumes. See Mapping Volumes. Initiate the recovery. See Launching A Restore From The Appassure 5 Core.
NOTE: Inject Windows 7 PE 32-bit compatible drivers in the boot CD. To inject drivers in a boot CD: Download the drivers from the manufacturer’s Web site for the server and unpack them. Compress the folder that contains the drivers using a file compressing utility. For example, Win Zip. Click Browse to locate the compressed file, and then click Upload.
Launching A Restore From The Appassure 5 Core To launch a restore from the AppAssure 5 Core: If the NICs on any system being restored are teamed (bonded), remove all but one of the network cables. NOTE: AppAssure Restore does not recognize teamed NICs. The process is not able to resolve which NIC to use if presented with more than one active connection.
Starting A New Server To start a new server: Navigate back to the new server, and, in the AppAssure Universal Recovery Console interface, select Reboot to start the machine. Specify to start Windows normally. Log on to the machine. The system is restored to its state prior to the bare metal restore. Repairing Startup Problems To repair startup problems, if you encounter problems when starting from a new restore, select the Repair Boot Problems option in the Driver Injection window of the AppAssure Universal Recovery Console to automatically fix the...
includes a sequence number at the end (for example: ”293cc667-44b4-48ab-91d8-44bc74252a4f:2”), which identifies the recovery point. Enter the following command to select the base image recovery point for rollback: r <volume_base_image_recovery_point_ID_number> <path> CAUTION: You need to ensure that the system volume is not mounted. This command rolls back the volume image specified by the ID from the Core to the specified path The path for the rollback is the path for the device file descriptor and is not the directory to which it is mounted.
Protecting Server Clusters About Server Cluster Protection In AppAssure 5 In AppAssure 5, server cluster protection is associated with the AppAssure agents installed on individual cluster nodes (that is, individual machines in the cluster) and the AppAssure 5 Core, which protects those agents, all as if they were one composite machine.
Protecting A Cluster This topic describes how to add a cluster for protection in AppAssure 5. When you add a cluster to protection, you need to specify the host name or IP address of the cluster, the cluster application, or one of the cluster nodes or machines that includes the AppAssure 5 Agent.
Text Box Description • To customize when to protect data during peak times, you can specify a start time, end time, and an interval. • To protect data during off-peak times, select the Protect during off- peak times check box, and then select an interval for protection. Weekends —...
Text Box Description Repository Select the repository on the AppAssure 5 Core in which the data from this machine is be stored. Encryption Specify whether encryption is to be applied to the data for every volume on this machine to be stored in the repository. NOTE: The encryption settings for a repository are defined under the Configuration tab in the AppAssure 5 Core Console.
To modify cluster settings: Do one of the following: – In the Core Console, click the Machines tab, and then select the cluster you wish to modify. – Or, in the left navigation area, select the cluster you wish to modify. Click the Configuration tab.
The Add Notification Group dialog box opens. Add the notification options as described in the following table. Text Box Description Name Enter a name for the notification group. Description Enter a description for the notification group. Enable Events Select the events for notification, for example, Clusters. You can also choose to select by type: –...
Text Box Description Use Custom retention This lets you configure custom settings. Continue to Step 4. policy If you selected Custom alert settings, follow the instructions for setting a custom retention policy as described in Customizing Retention Policy Settings, beginning with Step 4. Modifying Cluster Protection Schedules In AppAssure 5, you can modify the protection schedules only if your cluster has shared volumes.
Do one of the following: – In the Core Console, click the Machines tab, and select the cluster that contains the machine you wish to convert. Then, click the Machines tab for the cluster. – Or, from the left navigation area, select the cluster that contains the machine you want to convert, and click the Machines tab.
To refresh this information to the most current, click the Actions drop-down menu, and click Refresh Metadata. For information about viewing summary and status information for an individual machine or node in the cluster, see Viewing Machine Status And Other Details.
– Or, in the left navigation area, under Clusters, select the cluster for which you wish to view recovery points. On the Summary tab, click the Actions drop-down menu, and then click Force Snapshot. Pausing And Resuming Cluster Snapshots To pause and resume cluster snapshots: Do one of the following: –...
NOTE: You do not need to roll back the quorum disk. It can be regenerated automatically or by using cluster service functionality. Performing A Rollback For SCC (Exchange, SQL) Clusters To perform a rollback for SCC (Exchange, SQL) clusters: Turnoff all nodes except one. Perform a rollback using the standard AppAssure procedure for the machine as described in Performing A Rollback For A Windows Machine...
Select one of the options described in the following table. Option Description Relationship Only Removes the source core from replication but retains the replicated recovery points. With Recovery Points Removes the source core from replication and deletes all replicated recovery points received from that machine.
Page 137
The report results appear in the page. To export the report results to one of the available format – PDF, XLS, XLSX, RTF, MHT, HTML, TXT, CSV, or image – select the format for export from the drop-down list, and then do one of the following: –...
Reporting About Reports AppAssure 5 lets you generate and view compliance, error, and summary information for multiple core and agent machines. You can choose to view reports online, print reports, or export and save them in one of several supported formats. The formats from which you can choose are: •...
Details about the jobs are presented in a column view that includes the following categories: • Core • Protected Agent • Type • Summary • Status • Error • Start Time • End Time • Time • Total Work For information about how to generate a report, see Generating A Report For A Core Or Agent.
• Allocated Space • Used Space • Free Space • Compression/Dedupe Ratio Agents Summary The Agents portion of the Core Summary Report includes data for all agents protected by the selected core. Details about the agents are presented in a column view with the following categories: •...
About The Central Management Console Core Reports AppAssure 5 lets you generate and view compliance, error, and summary information for multiple AppAssure 5 Cores. Details about the Cores are presented in column views with the same categories described in the sections About Compliance Reports,...
Completing A Full Recovery Of The DL4000 Backup To Disk Appliance The data drives on the DL4000 Backup To Disk appliance are located in slots 2-9 and in RAID 6 format, meaning they can sustain up to two drive failures without data loss. The operating system resides on drives 0 and 1, which are formatted as a RAID 1 virtual disk.
(if it is the incorrect CD or DVD, for example), a message is displayed requesting that you insert the correct installation media. Start USC by booting the system and pressing the <F10> key within 10 seconds of the Dell logo being displayed. Click OS Deployment in the left pane.
Page 145
The virtual disks for repositories and any virtual standby machines are restored and AppAssure services are restarted. The recovery is complete.
Changing The Host Name Manually It is recommended that you select a host name during the initial configuration of the DL4000 Backup to Disk Appliance. If you change the hostname at a later time using Windows System Properties, you must perform the following steps manually to ensure that the new host name takes effect and the appliance functions properly: 1.
Start AppAssure Core services. Double-click the AppAssure 5 Core icon on the desktop to open your browser. NOTE: The browser opens the AppAssure core using the old server name. In the browser replace the old server name with the new <server name:8006>. For example, https://<servername:8006/apprecovery/admin/Core.
Appendix A — Scripting About Powershell Scripting Windows PowerShell is a Microsoft .NET Framework-connected environment designed for administrative automation. AppAssure 5 includes comprehensive client software development kits (SDKs) for PowerShell scripting that enables administrators to automate the administration and management of AppAssure 5 resources by the execution of commands through scripts.
NOTE: The configuration file, powershell_ise.exe.config must have the same content as that of the powershell.exe.config file. CAUTION: If the pre-PowerShell or post-PowerShell script fails, the job also fails. Input Parameters All available input parameters are used in sample scripts. The parameters are described in the following tables. NOTE: Script files must possess the same name as the sample script files.
Page 151
Method Description public Guid ProviderId{ get; set; } Gets or sets the GUID of the VSS provider to use for snapshots on this host. Administrators typically accept the default. public Gets or sets the collection of VSS writer IDs, which is Collection<ExcludedWriter>ExcludedWrite excluded from this snapshot.
Page 152
DatabaseCheckJobRequestBase (namespace Replay.Core.Contracts.Exchange) Inherits its values from the parameter, BackgroundJobRequest. ExportJobRequest (namespace Replay.Core.Contracts.Export) Inherits its values from the parameter, BackgroundJobRequest. Method Description public uint RamInMegabytes { get; Gets or sets the memory size for the exported VM. Set to set; } zero (0) to use the memory size of the source machine.
Page 153
Method Description Public AgentTransferConfiguration Gets or sets the transfer configuration. TransferConfiguration { get; set; } public Gets or sets the storage configuration. AgentProtectionStorageConfiguration StorageConfiguration { get; set; } public string Key { get; set; } Generates a pseudorandom (but not cryptographically secure) key, which can be used as a one-time password to authenticate transfer requests.
Page 154
TransferPrescriptParameter (namespace Replay.Common.Contracts.PowerShellExecution) Method Description public VolumeNameCollection VolumeNames Gets or sets the collection of volume names for transfer. { get; set; } public ShadowCopyType ShadowCopyType Gets or sets the type of copying for transfer. Available { get; set; } values: Unknown, Copy, and Full. public AgentTransferConfiguration Gets or sets the transfer configuration.
Method Description NOTE: A known issue exists in .NET 4.0 WCF (https:// connect.microsoft.com/VisualStudio/ feedback/ ViewFeedback.aspx?FeedbackID=413312), which prevents path escape characters from working correctly in a URI template. Because a volume name contains both '\' and '?', you must replace the special characters '\' and '?' with other special characters.
Preexportscript.ps1 The PreExportScript is executed on the Core side prior to any export job. # receiving parameter from export job param([object]$ExportJobRequest) # building path to Core's Common.Contracts.dll and loading this assembly $regLM = [Microsoft.Win32.Registry]::LocalMachine$regLM = $regLM.OpenSubKey('SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall \AppRecovery Core 5') $regVal = $regLM.GetValue('InstallLocation') $regVal = $regVal + 'CoreService\Common.Contracts.dll' [System.Reflection.Assembly]::LoadFrom($regVal) | out-null # Converting input parameter into specific object...
if($ExportJobRequestObject -eq $null) { echo 'ExportJobRequestObject parameter is null' else { echo 'VolumeImageIds:' $ExportJobRequestObject.VolumeImageIds echo 'RamInMegabytes:' $ExportJobRequestObject.RamInMegabytes Prenightlyjobscript.ps1 The PreNightlyJobScript is executed before every nighty job on Core side. It has $JobClassName parameter, that helps to handle those child jobs separately. # receiving parameters from Nightlyjob param([System.String]$JobClassMethod , [object] $NightlyAttachabilityJobRequest,...
Postnightlyjobscript.ps1 The PostNightlyJobScript is executed after every nightly job on Core side. It has $JobClassName parameter, that helps to handle those child jobs separately. # receiving parameters from Nightlyjob param([System.String]$JobClassMethod , [object] $NightlyAttachabilityJobRequest, [object]$RollupJobRequest, [object]$Agents, [object]$ChecksumCheckJobRequest, [object]$TransferJobRequest, [int] $LatestEpochSeenByCore, [object]$TakeSnapshotResponse) # building path to Core's Common.Contracts.dll and loading this assembly $regLM = [Microsoft.Win32.Registry]::LocalMachine $regLM = $regLM.OpenSubKey('SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall...
Select the appropriate option depending on your requirement. Documentation Feedback If you have feedback for this document, write to documentation_feedback@dell.com. Alternatively, you can click on the Feedback link in any of the Dell documentation pages, fill up the form, and click Submit to send your feedback.