Home > Dell > System > Dell Appassure 5 User Guide

Dell Appassure 5 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Dell Appassure 5 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 327 Dell manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 518
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B129
    Managing Exchange database mountability 
    checks and log truncation
    When using AppAssure to back up Microsoft Exchange Servers, mountability checks can be performed on all 
    Exchange databases after every snapshot. This corruption detection feature alerts administrators of potential 
    failures and ensures that all data on the Exchange servers will be recovered successfully in the event of a 
    failure.
    Log truncation minimizes the size of the logs from an Exchange database on a daily basis when scheduled to 
    occur with the nightly jobs. For information about forcing log truncation, see Forcing log truncation for an 
    Exchange machine.
    Configuring nightly Exchange database checksum 
    checks and log truncation
    You can view, enable, or disable Exchange database server settings, including automatic mountability check, 
    nightly checksum check, or nightly log truncation, from the Core-level Configuration tab. Changes made to the 
    settings on this tab apply to all Exchange machines protected by the Core.
    Complete the steps in this procedure to configure settings for Exchange database mountability and log 
    truncation.
    To configure Exchange database mountability and log truncation
    1 Navigate to the AppAssure Core, and then click the Configuration tab.
    2Click Settings.
    3 In the Nightly Jobs section, click Change.
    4 Select or clear the Exchange Server settings based on the needs of your organization:
    •Checksum Check Job
    •Tr u n c a t e  E x c h a n g e  l o g s
    5Click OK.
    The checksum and log truncation settings take effect for the protected Exchange Server.
    Forcing a mountability check of an Exchange 
    database
    Complete the steps in this procedure to force the system to perform a mountability check for a specific 
    Exchange server recovery point.
    NOTE: The mountability checks only apply to Microsoft Exchange 2007, 2010, and 2013. Additionally, the 
    AppAssure Agent service account must be assigned the Organizational Administrator role in Exchange.
    NOTE: For information on forcing log truncation, see Forcing log truncation for an Exchange 
    machine.
    NOTE: To have the ability to force a mountability check, an Exchange database must be present on a 
    protected volume. If AppAssure does not detect the presence of a database, the mountability check 
    function does not appear in the Core Console. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B130
    To force a mountability check
    1 In the left navigation area of the AppAssure Core Console, select the machine for which you want to 
    force the mountability check, and then click the Recovery Points tab.
    2 Click the right angle bracket > symbol next to a recovery point in the list to expand the view.
    3Click Check, and then click Force Mountability Check.
    A pop-up window displays asking if you want to force a mountability check.
    4Click Ye s.
    The system performs the mountability check.
    Forcing a checksum check of Exchange Server 
    recovery points
    Complete the steps in this procedure to force the system to perform a checksum check for a specific Exchange 
    server recovery point.
    To force a checksum check of Exchange Server recovery points
    1 In the left navigation area of the AppAssure Core Console, select the machine for which you want to 
    force the checksum check, and then click the Recovery Points tab.
    2 Click the right angle bracket > symbol next to a recovery point in the list to expand the view.
    3Click Check, and then click Force Checksum Check.
    The Force Attachability Check window appears for you to indicate that you want to force a checksum 
    check.
    4Click Ye s.
    The system performs the checksum check.
    Forcing log truncation for an Exchange machine
    Log truncation is available for machines that use Exchange Server. When log truncation is conducted for an 
    Exchange machine, the size of the logs are reduced. Complete the steps in this procedure to force log 
    truncation.
    To force log truncation for an Exchange machine
    1 On the AppAssure Core Console, navigate to the protected machine for which you want to force log 
    truncation.
    •From the Summary tab of the protected machine, click the Actions drop-down menu, select 
    Exchange, and then click Force Log Truncation.
    2Click Ye s to confirm that you want to force log truncation.
    NOTE: For instructions on how to view the status of the attachability checks, see Viewing tasks, 
    alerts, and events.
    NOTE: To have the ability to force a checksum check, an Exchange database must be present on a 
    protected volume. If AppAssure does not detect the presence of a database, the checksum check function 
    does not appear in the Core Console.
    NOTE: For information on how to view the status of the attachability checks, see Viewing tasks, 
    alerts, and events. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B
    8
    131
    Protecting server clusters
    This chapter describes how to protect information on Microsoft SQL Server or Exchange Server clusters using 
    AppAssure. It includes the following topics:
    •Supported applications and cluster types
    •Protecting a cluster
    •Protecting nodes in a cluster
    •Modifying cluster node settings
    •Configuring cluster settings
    •Converting a protected cluster node to a protected machine
    •Viewing server cluster information
    •Working with cluster recovery points
    •Managing snapshots for a cluster
    •Performing a restore for clusters and cluster nodes
    •Replicating cluster data
    •Removing a cluster from protection
    •Removing cluster nodes from protection
    •Viewing a cluster or node report
    In AppAssure, server cluster protection is associated with the AppAssure protected machines installed on 
    individual cluster nodes (that is, individual machines in the cluster) and the AppAssure Core, which protects 
    those machines, all as if they were one composite machine.
    You can easily configure an AppAssure Core to protect and manage a cluster. In the Core Console, a cluster is 
    organized as a separate entity, which acts as a container that includes the related nodes. For example, in the 
    left navigation area, under the Protected Machines menu, protected clusters are listed. Directly below each 
    cluster, the associated individual nodes or agent machines appear. Each of these is a protected machine on 
    which the AppAssure Agent software is installed. If you click on the cluster, the tab appears in the Core Console
    At the Core and cluster levels, you can view information about the cluster, such as the list of related nodes and 
    shared volumes. A cluster appears in the Core Console on the Protected Nodes tab, and you toggle the view 
    (using Show/Hide) to view the nodes included in the cluster. At the cluster level, you can also view 
    corresponding Exchange and SQL cluster metadata for the nodes in the cluster. You can specify settings for the 
    entire cluster and the shared volumes in that cluster, or you can navigate to an individual node (machine) in the 
    cluster to configure settings just for that node and the associated local volumes. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B132
    Supported applications and cluster types
    To protect your cluster properly, you must have installed the AppAssure Agent software on each of the machines 
    or nodes in the cluster. AppAssure supports the application versions and cluster configurations listed in the 
    following table.
    The supported disk types include:
    •GUID partition table (GPT) disks greater than 2 TB
    •Basic disks
    The supported mount types include:
    •Shared drives that are connected as drive letters (for example, D:)
    •Simple dynamic volumes on a single physical disk (not striped, mirrored, or spanned volumes)
    •Shared drives that are connected as mount points
    Limited support for cluster shared volumes
    AppAssure cluster shared volumes (CSV) support applies only to native backup of CSVs on Windows 2008 R2 
    agents only.
    For other operating systems, the agent service can be run on all nodes in a cluster, and the cluster can be 
    protected as a cluster within the AppAssure Core; however, CSVs do not display in the Core Console and are not 
    available for protection. All local disks (such as the operating system volume) are available for protection.
    The following table depicts current support in AppAssure core for cluster shared volumes. Table 60. Supported application versions and cluster configurations
    ApplicationApplication Version and Related Cluster 
    ConfigurationWindows Failover Cluster
    Microsoft Exchange 
    Server2007 Single Copy Cluster (SCC)
    2007 Cluster Continuous Replication (CCR)2003, 2008, 2008 R2
    2010 Database Availability Group (DAG) 2008, 2008 R2
    2013 Database Availability Group (DAG) 2008 R2 SP1, 2012, 2012 R2
    Microsoft SQL Server 2005 2003, 2008, 2008 R2
    2008, 2008 R2 Single Copy Cluster (SCC) 2003, 2008, 2008 R2, 2012, 2012 R2
    2012, 2014 Single Copy Cluster (SCC) 2008, 2008 R2, 2012, 2012 R2
    2012, 2014 Availability Groups Server 2012, 2012 R2
    Table 61. Compatibility for cluster shared volumes in AppAssure
    AppAssure Cluster 
    Shared Volumes SupportProtect, Replicate, 
    Rollup, Mount ArchiveRestore CSV VolumesVirtual Export to 
    Hyper-V CSV
    AppAssure version 5.3 5.4 5.3 5.4 5.3 5.4
    W i n d o w s  2 0 0 8  R 2 Ye s Ye s N o Ye s Ye s Ye s
    Windows 2012 No No No No No No
    Windows 2012 R2 No No No No No No 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B133
    Protecting a cluster
    This topic describes how to add a cluster for protection in AppAssure. When you add a cluster to protection, you 
    need to specify the host name or IP address of the cluster, the cluster application, or one of the cluster nodes or 
    machines that includes the AppAssure Agent software.
    For information about setting up repositories, see Understanding repositories.
    To protect a cluster
    1 In the Core Console, navigate to the Home tab, and then click the Protect button drop-down menu and 
    then click Protect Cluster.
    2 In the Connect to Cluster dialog box, enter the following information, and then click Connect.
    3 In the Protect Cluster dialog box, select a repository for this cluster.
    4 If you want to secure the recovery points for this cluster, select an encryption key.
    5 If you do not want protection to begin immediately after completing this procedure, select Initially 
    pause protection.
    6 To protect the cluster based on default settings, select the nodes for default protection, and then skip to 
    Step 8.
    7 To enter custom settings for the cluster (for example, to customize the protection schedule for the 
    shared volumes), click settings next to the node whose protection you want to customize, and then see 
    Creating custom protection schedules.
    For more information on customizing nodes, see Protecting nodes in a cluster.
    8 In the Protect Cluster dialog box, click Protect.
    NOTE: A repository is used to store the snapshots of data that are captured from your protected nodes. 
    Before you start protecting data in your cluster, you should have set up at least one repository that is 
    associated with your AppAssure Core.
    Table 62. Connect to Cluster settings
    Te x t  B o x D e s c r i p t i o n
    Host The host name or IP address of the cluster, the cluster application, or one of the 
    cluster nodes.
    Port The port number on the machine on which the AppAssure Core communicates with 
    the Agent.
    The default port is 8006.
    User name The user name of the domain administrator used to connect to this machine: for 
    example, domain_name\administrator or administrator@domain_name.com
    NOTE: The domain name is mandatory. You cannot connect to the cluster using the 
    local administrator user name.
    Password The password used to connect to this machine.
    NOTE: The default settings ensure that all volumes are protected with a schedule of every 60 
    minutes. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B134
    Protecting nodes in a cluster
    This topic describes how to protect the data on a cluster node or machine that has an AppAssure Agent 
    installed. When you add protection, you need to select a node from the list of available nodes as well as specify 
    the host name and the user name and password of the domain administrator.
    To protect nodes in a cluster
    1 In the AppAssure Core Console, once you have added a cluster, navigate to the cluster that you want to 
    protect.
    The Summary tab for the selected cluster displays.
    2 Click the Protected Nodes tab, and then from the Actions menu, select Protect Cluster Node.
    3 In the Protect Cluster Node dialog box, select or enter as appropriate the following information, and 
    then click Connect to add the machine or node.
    4Click Protect to start protecting this machine with default protection settings.
    5 To enter custom settings for this machine, (for example, to change the Display name, add encryption, or 
    customize the protection schedule), click Show Advanced Options.
    6 Edit the following settings as needed, as described in the following table.Table 63. Protect Cluster Node settings
    Te x t  B o x D e s c r i p t i o n
    Host A drop-down list of nodes in the cluster available for protection.
    Port The port number on which the AppAssure Core communicates with the Agent on the 
    node.
    User name The user name of the domain administrator used to connect to this node; for 
    example, example_domain\administrator or administrator@example_domain.com.
    Password The password used to connect to this machine.
    NOTE: The default settings ensure that all volumes on the machine are protected with a schedule 
    of every 60 minutes.
    Table 64. Advanced Options settings
    Te x t  B o x D e s c r i p t i o n
    Display Name Enter a new name for the machine to be displayed in the Core Console.
    Repository Select the repository on the AppAssure Core in which the data from this machine 
    should be stored.
    Encryption Specify whether encryption should be applied to the data for every volume on this 
    machine to be stored in the repository.
    NOTE: The encryption settings for a repository are defined under the Configuration 
    tab in the AppAssure Core Console.
    Schedule Select one of the following options.
    •Protect all volumes with default schedule
    •Protect specific volumes with custom schedule. Then, under Volumes, select a 
    volume and click Edit. For more information on setting custom intervals, see 
    Step 7 in Protecting a cluster.  
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B135
    Modifying cluster node settings
    Once you have added protection for cluster nodes, you can easily modify basic configuration settings for those 
    machines or nodes (for example, display name, host name, and so on), protection settings (for example, 
    changing the protection schedule for local volumes on the machine, adding or removing volumes, and pausing 
    protection), and more.
    To modify cluster node settings, you must perform the following tasks:
    1 In the AppAssure Core Console, navigate to the cluster that contains the node you want to modify, and 
    select the machine or node that you want to modify.
    2 To modify and view configuration settings, see Configuring notification groups for system events.
    3 To configure notification groups for system events, see Viewing and modifying configuration settings.
    4 To customize retention policy settings, see Customizing retention policy settings for a protected 
    machine.
    5 To modify the protection schedule, see Modifying protection schedules.
    6 To modify transfer settings, see Modifying transfer settings.
    Configuring cluster settings
    Configuring cluster settings involves performing the following tasks:
    • Modify cluster settings. For more information about modifying cluster settings, see Modifying cluster 
    settings.
    • Configure cluster event notifications. For more information about configuring cluster event 
    notifications, see Configuring cluster event notifications.
    • Modify the cluster retention policy. For more information about modifying the cluster retention policy, 
    see Modifying the cluster retention policy.
    • Modify the cluster protection schedules. For more information about modifying the cluster protection 
    schedules, see Modifying cluster protection schedules.
    • Modify the cluster transfer settings. For more information about modifying cluster transfer settings, 
    see Modifying cluster transfer settings.
    Modifying cluster settings
    Once you have added a cluster, you can easily modify basic settings (for example, display name), protection 
    settings (for example, protection schedules, adding or removing volumes, and pausing protection), and more.
    To modify cluster settings
    1 In the AppAssure Core Console, navigate to the cluster that you want to modify,
    2 Click the Configuration tab.
    The Settings page displays.
    3Click Edit to modify the settings on this page for the cluster as described in the following table. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B136
    Configuring cluster event notifications
    You can configure how system events are reported for your cluster by creating notification groups. These events 
    could be system alerts or errors. Complete the steps in this procedure to configure notification groups for 
    events.
    To configure cluster event notifications
    1 In the AppAssure Core Console, navigate to the cluster that you want to modify,
    2 Click the Configuration tab, and then click Events.
    3 Select one of the options described in the following table.
    4 If you selected Custom alert settings, do the following:
    aClick Add Group to add a new notification group for sending a list of system events.
    The Add Notification Group dialog box opens.
    b Add the notification options as described in the following table. Table 65. Cluster settings
    Te x t  B o x D e s c r i p t i o n
    Display Name Enter a display name for the cluster.
    The name for this cluster displays in the AppAssure Core Console. By default, this 
    is the host name for the cluster. You can change this to something more 
    descriptive, if needed.
    Repository Enter the Core repository associated with the cluster.
    NOTE: If snapshots have already been taken for this cluster, this setting is listed 
    here for informational purposes only and cannot be modified.
    Encryption Key Edit and select an encryption key if necessary.
    This specifies whether encryption should be applied to the data for every volume 
    on this cluster to be stored in the repository.
    Table 66. Event notification options
    Option Description
    Use Core alert settings This adopts the settings used by the associated core:
    •Click Apply and then perform Step 5.
    Use Custom alert settings This lets you configure custom settings:
    •Proceed to Step 4.
    Table 67. Event notification settings
    Te x t  B o x D e s c r i p t i o n
    Name Enter a name for the notification group.
    Description Enter a description for the notification group. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B137 cClick OK to save your changes, and then click Apply.
    5 To edit an existing notification group, next to a notification group in the list, click Edit.
    The Edit Notification Group dialog box displays for you to edit the settings.
    Modifying the cluster retention policy
    The retention policy for a cluster specifies how long the recovery points for the shared volumes in the cluster 
    are stored in the repository. Retention policies are used to retain backup snapshots for longer periods of time 
    and to help with management of these backup snapshots. The retention policy is enforced by a rollup process 
    that helps in aging and deleting old backups.
    To modify the cluster retention policy
    1 In the AppAssure Core Console, navigate to the cluster that you want to modify,
    2 Click the Configuration tab, and then click Retention Policy.
    3 Select one of the options in the following table.Enable Events Select the events for notification, for example, Clusters.
    You can also choose to select by type:
    •Error
    •Wa r n i n g
    •Info
    NOTE: When you choose to select by type, by default, the appropriate 
    events are automatically enabled. For example, if you choose Warning, the 
    Attachability, Jobs, Licensing, Archive, CoreService, Export, Protection, 
    Replication, and Rollback events are enabled.
    Notification Options Select the method to specify how to handle notifications.
    You can choose from the following options:
    •Notify by Email. Specify the email addresses to which to send the 
    events in the To, CC, and BCC text boxes.
    • Notify by Windows Event log. The Windows Event log controls the 
    notification.
    •Notify by syslogd. Specify the host name and port to which to send 
    the events.
    • Notify by Toast alerts. Select this option if you want the alert to 
    appear as a pop-up in the lower-right corner of your screen.
    Table 68. Retention policy options
    Option Description
    Use Core default retention policy This adopts the settings used by the associated core.
    •Click Apply.
    Use Custom retention policy This lets you configure custom settings.
    NOTE: If you selected Custom alert settings, follow the instructions for setting a custom retention 
    policy as described in Customizing nightly jobs for a protected machine. Table 67. Event notification settings
    Te x t  B o x D e s c r i p t i o n 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B138
    Modifying cluster protection schedules
    In AppAssure, you can modify the protection schedules only if your cluster has shared volumes.
    To modify cluster protection schedules
    1 In the AppAssure Core Console, navigate to the cluster that you want to modify, and then select the 
    cluster.
    2 Follow the instructions for modifying the protection settings as described in Modifying protection 
    schedules.
    Modifying cluster transfer settings
    In AppAssure, you can modify the settings to manage the data transfer processes for a protected cluster.
    There are three types of transfers in AppAssure:
    •Snapshots. Backs up the data on your protected cluster.
    •VM Export. Creates a virtual machine with all of the backup information and parameters as specified by 
    the schedule defined for protecting the cluster.
    •Restore. Restores backup information for a protected cluster.
    To modify cluster transfer settings
    1 In the AppAssure Core Console, navigate to the cluster that you want to modify.
    2 Click the Configuration tab, and then click Tr a n s f e r  S e t t i n g s.
    3 Modify the protection settings as described in Modifying protection schedules.
    Converting a protected cluster node to a 
    protected machine
    In AppAssure, you can convert a protected cluster node to a protected machine so that it is still managed by the 
    Core, but it is no longer part of the cluster. This is helpful, for example, if you need to remove the cluster node 
    from the cluster but still keep it protected.
    To convert a protected cluster node to a protected machine
    1 In the AppAssure Core Console, navigate to the cluster that contains the machine you wish to convert, 
    and then click Protected Nodes.
    2 On the Protected Nodes page, from the specific node you want to convert, click the Actions drop-down 
    menu and select Convert to Agent.
    3 To add the machine back to the cluster, select the machine, and then on the Summary tab, from the 
    Actions menu, select Convert to Cluster Node, and then click Ye s to confirm the action.
    NOTE: You can modify cluster transfer settings only if your cluster has shared volumes. 
    						
    All Dell manuals Comments (0)