Dell Appassure 5 User Guide
Here you can view all the pages of manual Dell Appassure 5 User Guide. The Dell manuals for System are available online for free. You can easily download all the documents as PDF.
Page 341
Dell AppAssure User Guide Version 5.4.3 Revision B339 Resume-Replication The Resume-Replication command lets you resume replication. See Suspend-Replication for more details. Usage The usage for the command is as follows: Resume-Replication -core [host name] -user [user name] -password [password] -all | -protectedserver [machine name | IP address] -incoming [host name] | -outgoing [host name] Command Options The following table describes the options available for the Resume-Replication command:...
Page 342
Dell AppAssure User Guide Version 5.4.3 Revision B340 Command Options The following table describes the options available for the Resume-Snapshot command: Example: Resume snapshots for the protected machine with IP 10.10.10.4 for the local Core: >Resume-Snapshot -protectedserver 10.10.10.4 Resume-VMExport The Resume-VMExport command lets an administrator export to virtual machines. See Suspend-VMExport for more details. Usage The usage for the command is as follows: Resume-VMExport -core [host name]...
Page 343
Dell AppAssure User Guide Version 5.4.3 Revision B341 Example: Resume export to a virtual machine for each protected machine on the local Core: >Resume-VMExport –all Start-Archive Businesses often use long-term storage to archive both compliant and non-compliant data. The archive feature in AppAssure is used to support the extended retention for compliant and non-compliant data. The administrator can save an archive on the local storage or network location by specifying the /Path command and...
Page 344
Dell AppAssure User Guide Version 5.4.3 Revision B342 Example: Archive all recovery points for all machines on the Core: >Start-Archive -path D:\work\archive -startdate Example 04/30/2012 –all Start-AttachabilityCheck The Start-AttachabilityCheck command forces an attachability check for all SQL Server databases protected by the Core. Usage The usage for the command is as follows: Start-AttachabilityCheck -core [host name] -user [username] - password [password] - protectedserver [machine name | IP...
Page 345
Dell AppAssure User Guide Version 5.4.3 Revision B343 Start-EsxiExport The Start-EsxiExport command initiates the launch of a virtual export from the selected recovery point to an ESX(i) server virtual machine. Required parameters include the name of the protected machine containing recovery points to export; the name of the virtual machine you are exporting to; the amount of RAM to be allocated on the virtual machine; the host name and port of the Linux server host, and the path to the local,...
Page 346
Dell AppAssure User Guide Version 5.4.3 Revision B344 Start-HypervExport The Start-HypervExport command initiates the launch of a virtual export from the selected recovery point to a Hyper-V server virtual machine. Usage The usage for the command is as follows: Start-HypervExport -core [host name] -user [user name] -password [password] -protectedserver [[machine name] or [IP address]] -volumes [volume names] -rpn [number | numbers] | -time [time string] [-vmname [uselocalmachine] | -hostname [virtual...
Page 347
Dell AppAssure User Guide Version 5.4.3 Revision B345 -rpnOptional. The sequential number of a recovery point to be exported. (You can use the -GetRecoveryPoints command to obtain recovery point numbers. NOTE: If neither ‘time’ nor ‘rpn’ option is specified in this command, than the most recent recovery point will be exported. -timeOptional. Determines recovery point to be selected for export. You need to specify exact time in the format “MM/DD/YYYY hh:mm tt” (for example: “04/24/2015 09:00 AM”).”...
Page 348
Dell AppAssure User Guide Version 5.4.3 Revision B346 Start-LogTruncation The Start-LogTruncation command forces log truncation for the specified protected SQL Server or Microsoft Exchange server. Usage The usage for the command is as follows: Start-LogTruncation -core [host name] -user [user name] -password [password] -protectedserver [[machine name] or [IP address]] -target [sql | exchange] Command Options The following table describes the options available for the Start-LogTruncation command:...
Page 349
Dell AppAssure User Guide Version 5.4.3 Revision B347 Command Options The following table describes the options available for the Start-MountabilityCheck command: Example: Start a mountability check for oall recovery points for all machines on the Core: > Start-MountabilityCheck -protected EX01 Start-Protect The Start-Protect command lets an administrator add a server under protection by a Core. Usage Start-Protect -core [host name] -user [user name] -password [password] -repository [repository name]...
Page 350
Dell AppAssure User Guide Version 5.4.3 Revision B348 Example: Put volumes of a server under protection: >Start-Protect -repository Repository 1 -agentname 10.10.9.120 -agentusername administrator -agentpassword 12345 -agentport 5002 -volumes c: d: Start-ProtectCluster The Start-ProtectCluster command lets an administrator add a server cluster under protection by a Core. Usage Usage for the command is as follows: Start-ProtectCluster -core [host name] -user [user name] -password [password] - repository...