Dell Appassure 5 User Guide
Have a look at the manual Dell Appassure 5 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 327 Dell manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Dell AppAssure User Guide Version 5.4.3 Revision B129 Managing Exchange database mountability checks and log truncation When using AppAssure to back up Microsoft Exchange Servers, mountability checks can be performed on all Exchange databases after every snapshot. This corruption detection feature alerts administrators of potential failures and ensures that all data on the Exchange servers will be recovered successfully in the event of a failure. Log truncation minimizes the size of the logs from an Exchange database on a daily basis when scheduled to occur with the nightly jobs. For information about forcing log truncation, see Forcing log truncation for an Exchange machine. Configuring nightly Exchange database checksum checks and log truncation You can view, enable, or disable Exchange database server settings, including automatic mountability check, nightly checksum check, or nightly log truncation, from the Core-level Configuration tab. Changes made to the settings on this tab apply to all Exchange machines protected by the Core. Complete the steps in this procedure to configure settings for Exchange database mountability and log truncation. To configure Exchange database mountability and log truncation 1 Navigate to the AppAssure Core, and then click the Configuration tab. 2Click Settings. 3 In the Nightly Jobs section, click Change. 4 Select or clear the Exchange Server settings based on the needs of your organization: •Checksum Check Job •Tr u n c a t e E x c h a n g e l o g s 5Click OK. The checksum and log truncation settings take effect for the protected Exchange Server. Forcing a mountability check of an Exchange database Complete the steps in this procedure to force the system to perform a mountability check for a specific Exchange server recovery point. NOTE: The mountability checks only apply to Microsoft Exchange 2007, 2010, and 2013. Additionally, the AppAssure Agent service account must be assigned the Organizational Administrator role in Exchange. NOTE: For information on forcing log truncation, see Forcing log truncation for an Exchange machine. NOTE: To have the ability to force a mountability check, an Exchange database must be present on a protected volume. If AppAssure does not detect the presence of a database, the mountability check function does not appear in the Core Console.
Dell AppAssure User Guide Version 5.4.3 Revision B130 To force a mountability check 1 In the left navigation area of the AppAssure Core Console, select the machine for which you want to force the mountability check, and then click the Recovery Points tab. 2 Click the right angle bracket > symbol next to a recovery point in the list to expand the view. 3Click Check, and then click Force Mountability Check. A pop-up window displays asking if you want to force a mountability check. 4Click Ye s. The system performs the mountability check. Forcing a checksum check of Exchange Server recovery points Complete the steps in this procedure to force the system to perform a checksum check for a specific Exchange server recovery point. To force a checksum check of Exchange Server recovery points 1 In the left navigation area of the AppAssure Core Console, select the machine for which you want to force the checksum check, and then click the Recovery Points tab. 2 Click the right angle bracket > symbol next to a recovery point in the list to expand the view. 3Click Check, and then click Force Checksum Check. The Force Attachability Check window appears for you to indicate that you want to force a checksum check. 4Click Ye s. The system performs the checksum check. Forcing log truncation for an Exchange machine Log truncation is available for machines that use Exchange Server. When log truncation is conducted for an Exchange machine, the size of the logs are reduced. Complete the steps in this procedure to force log truncation. To force log truncation for an Exchange machine 1 On the AppAssure Core Console, navigate to the protected machine for which you want to force log truncation. •From the Summary tab of the protected machine, click the Actions drop-down menu, select Exchange, and then click Force Log Truncation. 2Click Ye s to confirm that you want to force log truncation. NOTE: For instructions on how to view the status of the attachability checks, see Viewing tasks, alerts, and events. NOTE: To have the ability to force a checksum check, an Exchange database must be present on a protected volume. If AppAssure does not detect the presence of a database, the checksum check function does not appear in the Core Console. NOTE: For information on how to view the status of the attachability checks, see Viewing tasks, alerts, and events.
Dell AppAssure User Guide Version 5.4.3 Revision B 8 131 Protecting server clusters This chapter describes how to protect information on Microsoft SQL Server or Exchange Server clusters using AppAssure. It includes the following topics: •Supported applications and cluster types •Protecting a cluster •Protecting nodes in a cluster •Modifying cluster node settings •Configuring cluster settings •Converting a protected cluster node to a protected machine •Viewing server cluster information •Working with cluster recovery points •Managing snapshots for a cluster •Performing a restore for clusters and cluster nodes •Replicating cluster data •Removing a cluster from protection •Removing cluster nodes from protection •Viewing a cluster or node report In AppAssure, server cluster protection is associated with the AppAssure protected machines installed on individual cluster nodes (that is, individual machines in the cluster) and the AppAssure Core, which protects those machines, all as if they were one composite machine. You can easily configure an AppAssure Core to protect and manage a cluster. In the Core Console, a cluster is organized as a separate entity, which acts as a container that includes the related nodes. For example, in the left navigation area, under the Protected Machines menu, protected clusters are listed. Directly below each cluster, the associated individual nodes or agent machines appear. Each of these is a protected machine on which the AppAssure Agent software is installed. If you click on the cluster, the tab appears in the Core Console At the Core and cluster levels, you can view information about the cluster, such as the list of related nodes and shared volumes. A cluster appears in the Core Console on the Protected Nodes tab, and you toggle the view (using Show/Hide) to view the nodes included in the cluster. At the cluster level, you can also view corresponding Exchange and SQL cluster metadata for the nodes in the cluster. You can specify settings for the entire cluster and the shared volumes in that cluster, or you can navigate to an individual node (machine) in the cluster to configure settings just for that node and the associated local volumes.
Dell AppAssure User Guide Version 5.4.3 Revision B132 Supported applications and cluster types To protect your cluster properly, you must have installed the AppAssure Agent software on each of the machines or nodes in the cluster. AppAssure supports the application versions and cluster configurations listed in the following table. The supported disk types include: •GUID partition table (GPT) disks greater than 2 TB •Basic disks The supported mount types include: •Shared drives that are connected as drive letters (for example, D:) •Simple dynamic volumes on a single physical disk (not striped, mirrored, or spanned volumes) •Shared drives that are connected as mount points Limited support for cluster shared volumes AppAssure cluster shared volumes (CSV) support applies only to native backup of CSVs on Windows 2008 R2 agents only. For other operating systems, the agent service can be run on all nodes in a cluster, and the cluster can be protected as a cluster within the AppAssure Core; however, CSVs do not display in the Core Console and are not available for protection. All local disks (such as the operating system volume) are available for protection. The following table depicts current support in AppAssure core for cluster shared volumes. Table 60. Supported application versions and cluster configurations ApplicationApplication Version and Related Cluster ConfigurationWindows Failover Cluster Microsoft Exchange Server2007 Single Copy Cluster (SCC) 2007 Cluster Continuous Replication (CCR)2003, 2008, 2008 R2 2010 Database Availability Group (DAG) 2008, 2008 R2 2013 Database Availability Group (DAG) 2008 R2 SP1, 2012, 2012 R2 Microsoft SQL Server 2005 2003, 2008, 2008 R2 2008, 2008 R2 Single Copy Cluster (SCC) 2003, 2008, 2008 R2, 2012, 2012 R2 2012, 2014 Single Copy Cluster (SCC) 2008, 2008 R2, 2012, 2012 R2 2012, 2014 Availability Groups Server 2012, 2012 R2 Table 61. Compatibility for cluster shared volumes in AppAssure AppAssure Cluster Shared Volumes SupportProtect, Replicate, Rollup, Mount ArchiveRestore CSV VolumesVirtual Export to Hyper-V CSV AppAssure version 5.3 5.4 5.3 5.4 5.3 5.4 W i n d o w s 2 0 0 8 R 2 Ye s Ye s N o Ye s Ye s Ye s Windows 2012 No No No No No No Windows 2012 R2 No No No No No No
Dell AppAssure User Guide Version 5.4.3 Revision B133 Protecting a cluster This topic describes how to add a cluster for protection in AppAssure. When you add a cluster to protection, you need to specify the host name or IP address of the cluster, the cluster application, or one of the cluster nodes or machines that includes the AppAssure Agent software. For information about setting up repositories, see Understanding repositories. To protect a cluster 1 In the Core Console, navigate to the Home tab, and then click the Protect button drop-down menu and then click Protect Cluster. 2 In the Connect to Cluster dialog box, enter the following information, and then click Connect. 3 In the Protect Cluster dialog box, select a repository for this cluster. 4 If you want to secure the recovery points for this cluster, select an encryption key. 5 If you do not want protection to begin immediately after completing this procedure, select Initially pause protection. 6 To protect the cluster based on default settings, select the nodes for default protection, and then skip to Step 8. 7 To enter custom settings for the cluster (for example, to customize the protection schedule for the shared volumes), click settings next to the node whose protection you want to customize, and then see Creating custom protection schedules. For more information on customizing nodes, see Protecting nodes in a cluster. 8 In the Protect Cluster dialog box, click Protect. NOTE: A repository is used to store the snapshots of data that are captured from your protected nodes. Before you start protecting data in your cluster, you should have set up at least one repository that is associated with your AppAssure Core. Table 62. Connect to Cluster settings Te x t B o x D e s c r i p t i o n Host The host name or IP address of the cluster, the cluster application, or one of the cluster nodes. Port The port number on the machine on which the AppAssure Core communicates with the Agent. The default port is 8006. User name The user name of the domain administrator used to connect to this machine: for example, domain_name\administrator or administrator@domain_name.com NOTE: The domain name is mandatory. You cannot connect to the cluster using the local administrator user name. Password The password used to connect to this machine. NOTE: The default settings ensure that all volumes are protected with a schedule of every 60 minutes.
Dell AppAssure User Guide Version 5.4.3 Revision B134 Protecting nodes in a cluster This topic describes how to protect the data on a cluster node or machine that has an AppAssure Agent installed. When you add protection, you need to select a node from the list of available nodes as well as specify the host name and the user name and password of the domain administrator. To protect nodes in a cluster 1 In the AppAssure Core Console, once you have added a cluster, navigate to the cluster that you want to protect. The Summary tab for the selected cluster displays. 2 Click the Protected Nodes tab, and then from the Actions menu, select Protect Cluster Node. 3 In the Protect Cluster Node dialog box, select or enter as appropriate the following information, and then click Connect to add the machine or node. 4Click Protect to start protecting this machine with default protection settings. 5 To enter custom settings for this machine, (for example, to change the Display name, add encryption, or customize the protection schedule), click Show Advanced Options. 6 Edit the following settings as needed, as described in the following table.Table 63. Protect Cluster Node settings Te x t B o x D e s c r i p t i o n Host A drop-down list of nodes in the cluster available for protection. Port The port number on which the AppAssure Core communicates with the Agent on the node. User name The user name of the domain administrator used to connect to this node; for example, example_domain\administrator or administrator@example_domain.com. Password The password used to connect to this machine. NOTE: The default settings ensure that all volumes on the machine are protected with a schedule of every 60 minutes. Table 64. Advanced Options settings Te x t B o x D e s c r i p t i o n Display Name Enter a new name for the machine to be displayed in the Core Console. Repository Select the repository on the AppAssure Core in which the data from this machine should be stored. Encryption Specify whether encryption should be applied to the data for every volume on this machine to be stored in the repository. NOTE: The encryption settings for a repository are defined under the Configuration tab in the AppAssure Core Console. Schedule Select one of the following options. •Protect all volumes with default schedule •Protect specific volumes with custom schedule. Then, under Volumes, select a volume and click Edit. For more information on setting custom intervals, see Step 7 in Protecting a cluster.
Dell AppAssure User Guide Version 5.4.3 Revision B135 Modifying cluster node settings Once you have added protection for cluster nodes, you can easily modify basic configuration settings for those machines or nodes (for example, display name, host name, and so on), protection settings (for example, changing the protection schedule for local volumes on the machine, adding or removing volumes, and pausing protection), and more. To modify cluster node settings, you must perform the following tasks: 1 In the AppAssure Core Console, navigate to the cluster that contains the node you want to modify, and select the machine or node that you want to modify. 2 To modify and view configuration settings, see Configuring notification groups for system events. 3 To configure notification groups for system events, see Viewing and modifying configuration settings. 4 To customize retention policy settings, see Customizing retention policy settings for a protected machine. 5 To modify the protection schedule, see Modifying protection schedules. 6 To modify transfer settings, see Modifying transfer settings. Configuring cluster settings Configuring cluster settings involves performing the following tasks: • Modify cluster settings. For more information about modifying cluster settings, see Modifying cluster settings. • Configure cluster event notifications. For more information about configuring cluster event notifications, see Configuring cluster event notifications. • Modify the cluster retention policy. For more information about modifying the cluster retention policy, see Modifying the cluster retention policy. • Modify the cluster protection schedules. For more information about modifying the cluster protection schedules, see Modifying cluster protection schedules. • Modify the cluster transfer settings. For more information about modifying cluster transfer settings, see Modifying cluster transfer settings. Modifying cluster settings Once you have added a cluster, you can easily modify basic settings (for example, display name), protection settings (for example, protection schedules, adding or removing volumes, and pausing protection), and more. To modify cluster settings 1 In the AppAssure Core Console, navigate to the cluster that you want to modify, 2 Click the Configuration tab. The Settings page displays. 3Click Edit to modify the settings on this page for the cluster as described in the following table.
Dell AppAssure User Guide Version 5.4.3 Revision B136 Configuring cluster event notifications You can configure how system events are reported for your cluster by creating notification groups. These events could be system alerts or errors. Complete the steps in this procedure to configure notification groups for events. To configure cluster event notifications 1 In the AppAssure Core Console, navigate to the cluster that you want to modify, 2 Click the Configuration tab, and then click Events. 3 Select one of the options described in the following table. 4 If you selected Custom alert settings, do the following: aClick Add Group to add a new notification group for sending a list of system events. The Add Notification Group dialog box opens. b Add the notification options as described in the following table. Table 65. Cluster settings Te x t B o x D e s c r i p t i o n Display Name Enter a display name for the cluster. The name for this cluster displays in the AppAssure Core Console. By default, this is the host name for the cluster. You can change this to something more descriptive, if needed. Repository Enter the Core repository associated with the cluster. NOTE: If snapshots have already been taken for this cluster, this setting is listed here for informational purposes only and cannot be modified. Encryption Key Edit and select an encryption key if necessary. This specifies whether encryption should be applied to the data for every volume on this cluster to be stored in the repository. Table 66. Event notification options Option Description Use Core alert settings This adopts the settings used by the associated core: •Click Apply and then perform Step 5. Use Custom alert settings This lets you configure custom settings: •Proceed to Step 4. Table 67. Event notification settings Te x t B o x D e s c r i p t i o n Name Enter a name for the notification group. Description Enter a description for the notification group.
Dell AppAssure User Guide Version 5.4.3 Revision B137 cClick OK to save your changes, and then click Apply. 5 To edit an existing notification group, next to a notification group in the list, click Edit. The Edit Notification Group dialog box displays for you to edit the settings. Modifying the cluster retention policy The retention policy for a cluster specifies how long the recovery points for the shared volumes in the cluster are stored in the repository. Retention policies are used to retain backup snapshots for longer periods of time and to help with management of these backup snapshots. The retention policy is enforced by a rollup process that helps in aging and deleting old backups. To modify the cluster retention policy 1 In the AppAssure Core Console, navigate to the cluster that you want to modify, 2 Click the Configuration tab, and then click Retention Policy. 3 Select one of the options in the following table.Enable Events Select the events for notification, for example, Clusters. You can also choose to select by type: •Error •Wa r n i n g •Info NOTE: When you choose to select by type, by default, the appropriate events are automatically enabled. For example, if you choose Warning, the Attachability, Jobs, Licensing, Archive, CoreService, Export, Protection, Replication, and Rollback events are enabled. Notification Options Select the method to specify how to handle notifications. You can choose from the following options: •Notify by Email. Specify the email addresses to which to send the events in the To, CC, and BCC text boxes. • Notify by Windows Event log. The Windows Event log controls the notification. •Notify by syslogd. Specify the host name and port to which to send the events. • Notify by Toast alerts. Select this option if you want the alert to appear as a pop-up in the lower-right corner of your screen. Table 68. Retention policy options Option Description Use Core default retention policy This adopts the settings used by the associated core. •Click Apply. Use Custom retention policy This lets you configure custom settings. NOTE: If you selected Custom alert settings, follow the instructions for setting a custom retention policy as described in Customizing nightly jobs for a protected machine. Table 67. Event notification settings Te x t B o x D e s c r i p t i o n
Dell AppAssure User Guide Version 5.4.3 Revision B138 Modifying cluster protection schedules In AppAssure, you can modify the protection schedules only if your cluster has shared volumes. To modify cluster protection schedules 1 In the AppAssure Core Console, navigate to the cluster that you want to modify, and then select the cluster. 2 Follow the instructions for modifying the protection settings as described in Modifying protection schedules. Modifying cluster transfer settings In AppAssure, you can modify the settings to manage the data transfer processes for a protected cluster. There are three types of transfers in AppAssure: •Snapshots. Backs up the data on your protected cluster. •VM Export. Creates a virtual machine with all of the backup information and parameters as specified by the schedule defined for protecting the cluster. •Restore. Restores backup information for a protected cluster. To modify cluster transfer settings 1 In the AppAssure Core Console, navigate to the cluster that you want to modify. 2 Click the Configuration tab, and then click Tr a n s f e r S e t t i n g s. 3 Modify the protection settings as described in Modifying protection schedules. Converting a protected cluster node to a protected machine In AppAssure, you can convert a protected cluster node to a protected machine so that it is still managed by the Core, but it is no longer part of the cluster. This is helpful, for example, if you need to remove the cluster node from the cluster but still keep it protected. To convert a protected cluster node to a protected machine 1 In the AppAssure Core Console, navigate to the cluster that contains the machine you wish to convert, and then click Protected Nodes. 2 On the Protected Nodes page, from the specific node you want to convert, click the Actions drop-down menu and select Convert to Agent. 3 To add the machine back to the cluster, select the machine, and then on the Summary tab, from the Actions menu, select Convert to Cluster Node, and then click Ye s to confirm the action. NOTE: You can modify cluster transfer settings only if your cluster has shared volumes.