Home > Dell > System > Dell Appassure 5 User Guide

Dell Appassure 5 User Guide

Here you can view all the pages of manual Dell Appassure 5 User Guide. The Dell manuals for System are available online for free. You can easily download all the documents as PDF.

Page 341

Dell AppAssure User Guide
Version 5.4.3 Revision B339
Resume-Replication
The Resume-Replication command lets you resume replication. See Suspend-Replication for more details.
Usage
The usage for the command is as follows:
Resume-Replication -core [host name] -user [user name] -password [password] -all | 
-protectedserver [machine name | IP address] -incoming [host name] | -outgoing [host 
name]
Command Options
The following table describes the options available for the Resume-Replication command:...

Page 342

Dell AppAssure User Guide
Version 5.4.3 Revision B340
Command Options
The following table describes the options available for the Resume-Snapshot command:
Example:
Resume snapshots for the protected machine with IP 10.10.10.4 for the local Core:
>Resume-Snapshot -protectedserver 10.10.10.4
Resume-VMExport
The Resume-VMExport command lets an administrator export to virtual machines. See Suspend-VMExport for 
more details.
Usage
The usage for the command is as follows:
Resume-VMExport -core [host name]...

Page 343

Dell AppAssure User Guide
Version 5.4.3 Revision B341
Example:
Resume export to a virtual machine for each protected machine on the local Core:
>Resume-VMExport –all
Start-Archive
Businesses often use long-term storage to archive both compliant and non-compliant data. The archive feature 
in AppAssure is used to support the extended retention for compliant and non-compliant data. The 
administrator can save an archive on the local storage or network location by specifying the /Path command 
and...

Page 344

Dell AppAssure User Guide
Version 5.4.3 Revision B342
Example:
Archive all recovery points for all machines on the Core:
>Start-Archive -path D:\work\archive -startdate Example 04/30/2012 –all
Start-AttachabilityCheck
The Start-AttachabilityCheck command forces an attachability check for all SQL Server databases 
protected by the Core.
Usage
The usage for the command is as follows:
Start-AttachabilityCheck -core [host name] -user [username] - password [password] 
- protectedserver [machine name | IP...

Page 345

Dell AppAssure User Guide
Version 5.4.3 Revision B343
Start-EsxiExport
The Start-EsxiExport command initiates the launch of a virtual export from the selected recovery point to 
an ESX(i) server virtual machine.
Required parameters include the name of the protected machine containing recovery points to export; the 
name of the virtual machine you are exporting to; the amount of RAM to be allocated on the virtual machine; 
the host name and port of the Linux server host, and the path to the local,...

Page 346

Dell AppAssure User Guide
Version 5.4.3 Revision B344
Start-HypervExport
The Start-HypervExport command initiates the launch of a virtual export from the selected recovery point 
to a Hyper-V server virtual machine.
Usage
The usage for the command is as follows:
Start-HypervExport -core [host name] -user [user name] -password [password] 
-protectedserver [[machine name] or [IP address]] -volumes [volume names] -rpn 
[number | numbers] | -time [time string] [-vmname [uselocalmachine] | -hostname 
[virtual...

Page 347

Dell AppAssure User Guide
Version 5.4.3 Revision B345 -rpnOptional. The sequential number of a recovery point to be exported. (You can use 
the -GetRecoveryPoints command to obtain recovery point numbers.
NOTE: If neither ‘time’ nor ‘rpn’ option is specified in this command, than the most 
recent recovery point will be exported.
-timeOptional. Determines recovery point to be selected for export. You need to specify 
exact time in the format “MM/DD/YYYY hh:mm tt” (for example: “04/24/2015 
09:00 AM”).”...

Page 348

Dell AppAssure User Guide
Version 5.4.3 Revision B346
Start-LogTruncation
The Start-LogTruncation command forces log truncation for the specified protected SQL Server or 
Microsoft Exchange server.
Usage
The usage for the command is as follows:
Start-LogTruncation -core [host name] -user [user name] -password [password] 
-protectedserver [[machine name] or [IP address]] -target [sql | exchange]
Command Options
The following table describes the options available for the Start-LogTruncation command:...

Page 349

Dell AppAssure User Guide
Version 5.4.3 Revision B347
Command Options
The following table describes the options available for the Start-MountabilityCheck command:
Example:
Start a mountability check for oall recovery points for all machines on the Core:
> Start-MountabilityCheck -protected EX01
Start-Protect
The Start-Protect command lets an administrator add a server under protection by a Core.
Usage
Start-Protect -core [host name] -user [user name] -password [password] -repository 
[repository name]...

Page 350

Dell AppAssure User Guide
Version 5.4.3 Revision B348
Example:
Put volumes of a server under protection:
>Start-Protect -repository Repository 1 -agentname 10.10.9.120 -agentusername 
administrator -agentpassword 12345 -agentport 5002 -volumes c: d:
Start-ProtectCluster
The Start-ProtectCluster command lets an administrator add a server cluster under protection by a Core.
Usage
Usage for the command is as follows:
Start-ProtectCluster -core [host name] -user [user name] -password [password] -
repository...
Start reading Dell Appassure 5 User Guide

Related Manuals for Dell Appassure 5 User Guide

All Dell manuals