Process Of Modifying Cluster Node Settings; Roadmap For Configuring Cluster Settings - Dell DL4000 User Manual

Tape library
Hide thumbs Also See for DL4000:
Table of Contents

Advertisement

4.
Click Protect to start protecting this machine with default protection settings.
NOTE: The default settings ensure that all volumes on the machine are protected with a
schedule of every 60 minutes.
5.
To enter custom settings for this machine, (for example, to change the Display name, add
encryption, or customize the protection schedule), click Show Advanced Options.
6.
Edit the following settings as needed, as described below.
Text Box
Display Name
Repository
Encryption
Schedule

Process of modifying cluster node settings

After you have added protection for cluster nodes, you can easily modify basic configuration settings for
those machines or nodes (for example, display name, host name, and so on), protection settings (for
example, changing the protection schedule for local volumes on the machine, adding or removing
volumes, and pausing protection), and more.
To modify cluster node settings, you must perform the following tasks:
1.
Do one of the following:
Navigate to the cluster that contains the node you want to modify, click the Machines tab, and
select the machine or node that you want to modify.
Or, from the Navigation pane, under the Cluster heading, select the machine or node you want
to modify.
2.
To modify and view configuration settings, see
3.
To configure notification groups for system events, see
Events.
4.
To customize retention policy settings, see
5.
To modify the protection schedule, see
6.
To modify transfer settings, see

Roadmap for configuring cluster settings

The roadmap for configuring cluster settings involves performing the following tasks:
Description
Enter a new name for the machine to be displayed in the Core Console.
Select the repository on the Core in which the data from this machine is be
stored.
Specify whether encryption is to be applied to the data for every volume on
this machine to be stored in the repository.
NOTE: The encryption settings for a repository are defined under the
Configuration tab in the Core Console.
Select one of the following options.
Protect all volumes with default schedule.
Protect specific volumes with custom schedule. Then, under Volumes,
select a volume and click Edit. For information about setting custom
intervals, see
Protecting A Cluster
Customizing Retention Policy
Modifying Protection
Modifying Transfer
.
Viewing And Modifying Configuration
Configuring Notification Groups For System
Schedules.
Settings.
Settings.
Settings.
143

Advertisement

Table of Contents
loading

Table of Contents