Dell Appassure 5 User Guide
Have a look at the manual Dell Appassure 5 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 327 Dell manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Dell AppAssure User Guide Version 5.4.3 Revision B9 Force . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 ForceAttach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 295 ForceChecksum . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 296 ForceLogTruncation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 297 ForceMount . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 298 ForceReplication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 ForceRollup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 299 Help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 List . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 300 Mount . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 302 Pause [snapshot | vmexport | replication] . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303 Protect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 305 ProtectCluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 306 RemoveAgent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 307 RemovePoints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308 RestoreArchive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 308 Resume [snapshot | vmexport | replication] . . . . . . . . . . . . . . . . . . . . . . . . . . . 309 StartExport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 311 UpdateRepository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 313 Version . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 Localization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 314 Understanding the AppAssure PowerShell module . . . . . . . . . . . . . . . . . . . . . . . .315 Prerequisites for using PowerShell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316 powershell.exe.config . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 316 Launching PowerShell and importing the module . . . . . . . . . . . . . . . . . . . . . . . . 316 Working with commands and cmdlets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317 Getting cmdlet help and examples . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317 AppAssure PowerShell module cmdlets . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 317 Get-ActiveJobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 318 Get-Clusters . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 319 Get-CompletedJobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 320 Get-ExchangeMailStores . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 321 Get-Failed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 322 Get-FailedJobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 323 Get-Mounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324 Get-Passed . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 324 Get-ProtectedServers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 325 Get-ProtectionGroups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 326 Get-RecoveryPoints . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327 Get-ReplicatedServers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 327 Get-Repositories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 328 Get-SqlDatabases . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 Get-UnprotectedVolumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 329 Get-VirtualizedServers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 330 Get-Volumes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 New-Base . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 331 New-Mount . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 332
Dell AppAssure User Guide Version 5.4.3 Revision B10 New-Repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334 New-Snapshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335 Push-Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 335 Push-Rollup . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 336 Remove-Mount . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 337 Remove-Mounts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 338 Resume-Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 Resume-Snapshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 339 Resume-VMExport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 340 Start-Archive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 341 Start-AttachabilityCheck . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 342 Start-EsxiExport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 343 Start-HypervExport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344 Start-LogTruncation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346 Start-MountabilityCheck . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 346 Start-Protect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 347 Start-ProtectCluster . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 348 Start-RestoreArchive . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 349 Start-VBExport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 350 Start-VMExport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 352 Suspend-Replication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 353 Stop-ActiveJobs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354 Suspend-Snapshot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 355 Suspend-VMExport . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356 Update-Repository . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 356 Localization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 357 Qualifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 358 Extending AppAssure jobs using scripting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .359 Using PowerShell scripts in AppAssure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 359 Prerequisites for PowerShell scripting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360 Testing PowerShell Scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360 Localization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 360 Qualifiers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 Input Parameters for PowerShell Scripting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 361 Sample PowerShell scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 372 PreTransferScript.ps1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 373 PostTransferScript.ps1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374 PreExportScript.ps1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375 PostExportScript.ps1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 375 PreNightlyJobScript.ps1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 376 PostNightlyJobScript.ps1 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 378 Using Bourne Shell scripting in AppAssure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381 Prerequisites for Bourne Shell scripting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381 Testing Bourne Shell scripting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 381 Input parameters for Bourne Shell scripting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 382 Sample Bourne Shell scripts . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384 PreTransferScript.sh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 384
Dell AppAssure User Guide Version 5.4.3 Revision B11 PostTransferScript.sh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385 PostExportScript.sh . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 385 Understanding AppAssure APIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .386 Intended Audience . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 Recommended additional reading . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 Working with AppAssure REST APIs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 386 Using AppAssure Core API . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 387 IAgentDiagnosticsManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 389 IAgentsGroupsManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 390 IAgentsManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 391 IApplianceEventsManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399 IApplicationIdManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399 IAutoUpdateManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 399 IBackgroundJobManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 400 IBackupManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 402 IBootCdBuilderManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405 ICloudManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 405 IClustersManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 408 ICoreBackupRestoreManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 409 ICoreCallbackManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410 ICoreDiagnosticsManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 410 ICoreMetadataManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 412 ICoreSettingsManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 413 IDatabaseStorageManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 414 IDiagnosticsManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 415 IEmailsManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416 IEncryptionKeyManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 416 IEventsManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 419 IExchangeManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 422 IExportQueueManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 424 IExportSchedulerManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 425 IHyperVAgentManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 430 IIsoDatabaseManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433 ILicenseManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 433 ILocalizationManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435 ILocalMountManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 436 ILoggingManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 437 ILogTruncationManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438 INightlyJobsManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 438 IProtectedItemsManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440 IPushInstallCommunication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 440 IPushInstallManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 441 IRecoveryPointsManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 442 IRemoteMountManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 447 IReplayEngineManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 448 IReplicationCommunication . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 449 IReplicationManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 460
Dell AppAssure User Guide Version 5.4.3 Revision B12 IReportingManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 467 IRepositoryManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 468 IRollbackManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 474 IRollupManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 476 ISeedDriveManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 477 IServiceHostManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 478 ISqlManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 479 IStatusSummaryManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 480 ITransferQueueManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 482 ITransferSchedulerManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 483 IUtilitiesManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486 IVirtualDiskManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486 IWhiteLabelingManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489 Using AppAssure Agent API . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 489 IAgentMetadataManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 490 IAgentPairManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 491 IAgentServiceHostManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 492 IAgentSettingsManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493 IAgentUpdateManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493 IApplicationIdManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 493 IDiagnosticsManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 494 IDriverChangeLogsManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 495 IExchangeManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496 IExchangeServerManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 496 IHyperVAgentManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 497 IPowerShellManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500 IRollbackManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 500 IRrcRollbackManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502 IServiceHostManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 502 IShadowCopyManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503 ITransferManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 503 IVirtualDiskManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 505 IWhiteLabelingManagement . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 508 Glossary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .509 About Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .516 Contacting Dell . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516 Technical support resources . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 516
Dell AppAssure User Guide Version 5.4.3 Revision B 1 13 Introduction to AppAssure This chapter provides an introduction and overview of Dell AppAssure. It describes the features, functionality, and architecture, and consists of the following topics: •AppAssure core technologies •Product features of AppAssure AppAssure sets a new standard for unified data protection by combining backup, replication, and recovery in a single solution that is engineered to be the fastest and most reliable backup for protecting virtual machines (VM), physical machines, and cloud environments. AppAssure combines backup and replication into one integrated and unified data protection product that also provides application awareness to ensure reliable application data recovery from your backups. AppAssure is built on the new, patent-pending True Scale architecture which delivers the fastest backup performance with very aggressive, near-zero recovery time objectives (RTO) and recovery point objectives (RPO). AppAssure combines several unique, innovative, and breakthrough technologies: •Live Recovery •Verified Recovery •Universal Recovery •True Global Deduplication These technologies are engineered with secure integration for cloud disaster recovery and deliver fast and reliable recovery. With its scalable object store, AppAssure is uniquely capable of handling up to petabytes of data very rapidly with built-in global deduplication, compression, encryption, and replication to any private or public cloud infrastructure. Server applications and data can be recovered in minutes for data retention and compliance purposes. Todays legacy backup tools and first-generation VM backup tools are inefficient and ineffective. The outdated backup tools lack the ability to handle large-scale data and do not offer the level of performance and reliability needed for protecting business-critical applications. Combine this with complex and mixed IT environments and it presents an administrative challenge for IT professionals and vulnerability of system data. AppAssure addresses this complexity and inefficiency through our core technology and support of multi- hypervisor environments including those running on VMware vSphere and Microsoft Hyper-V, which comprise both private and public clouds. AppAssure offers these technological advances while dramatically reducing IT management and storage costs.
Dell AppAssure User Guide Version 5.4.3 Revision B14 AppAssure core technologies Details about the core technologies of AppAssure are described in the following topics. Live Recovery Live Recovery is instant recovery technology for VMs or servers. It gives you near-continuous access to data volumes on virtual or physical servers. You can recover an entire volume with near-zero RTO and an RPO of minutes. AppAssure backup and replication technology records concurrent snapshots of multiple VMs or servers, providing near instantaneous data and system protection. You can resume the use of the server directly from the backup file without waiting for a full restore to production storage. Users remain productive and IT departments reduce recovery windows to meet todays increasingly stringent RTO and RPO service-level agreements. Ve r i f i e d R e c o v e r y Verified Recovery lets you perform automated recovery testing and verification of backups. It includes, but is not limited to, file systems; Microsoft Exchange Server 2007, 2010, and 2013; and Microsoft SQL Server 2005, 2008, 2008 R2, 2012 and 2014. Verified Recovery provides recoverability of applications and backups in virtual and physical environments, and features a comprehensive integrity checking algorithm based on 256-bit SHA keys that check the correctness of each disk block in the backup during archiving, replication, and data seeding operations. This ensures that data corruption is identified early and prevents corrupted data blocks from being maintained or transferred during the backup process. Universal Recovery Universal Recovery technology gives you unlimited machine restoration flexibility. You can restore your backups from physical to virtual, virtual to virtual, virtual to physical, or physical to physical. You can also carry out bare metal restores to dissimilar hardware; for example, P2V, V2V, V2P, P2P, P2C, V2C, C2P, C2V. It also accelerates cross-platform moves among virtual machines; for instance, moving from VMware to Hyper-V or Hyper-V to VMware. It builds in application-level, item-level, and object-level recovery: individual files, folders, email, calendar items, databases, and applications. With AppAssure, you can also recover or export physical to cloud, or virtual to cloud. True Global Deduplication AppAssure provides true global deduplication that dramatically reduces your physical disk capacity requirements by offering space reduction ratios exceeding 50:1, while still meeting the data storage requirements. True Scale inline block-level compression and deduplication with line speed performance, along with built-in integrity checking, prevents data corruption from affecting the quality of the backup and archiving processes.
Dell AppAssure User Guide Version 5.4.3 Revision B15 Product features of AppAssure Using AppAssure, you can manage all aspects of protection and recovery of critical data through the following features and functionality. They include: •Repository •True Global Deduplication •Encryption •Replication •Recovery-as-a-Service (RaaS) •Retention and archiving •Virtualization and cloud •Alerts and event management •License Portal •Web consol e •Service management APIs •White labeling •AppAssure wizards Repository The AppAssure repository uses deduplication volume manager (DVM) to implement a volume manager that provides support for multiple volumes, each of which could reside on different storage technologies such as Storage Area Network (SAN), Direct Attached Storage (DAS), Network Attached Storage (NAS), or cloud storage. Each volume consists of a scalable object store with deduplication. The scalable object store behaves as a records-based file system, where the unit of storage allocation is a fixed-sized data block called a record. This architecture lets you configure block-sized support for compression and deduplication. Rollup operations are reduced to metadata operations from disk intensive operations because the rollup no longer moves data but only moves the records. The DVM can combine a set of object stores into a volume and they can be expanded by creating additional file systems. The object store files are pre-allocated and can be added on demand as storage requirements change. It is possible to create up to 255 independent repositories on a single AppAssure Core and to further increase the size of a repository by adding new file extents. An extended repository may contain up to 4,096 extents that span across different storage technologies. The maximum size of a repository is 32 Exabytes. Multiple repositories can exist on a single core. True Global Deduplication True global deduplication is an effective method of reducing backup storage needs by eliminating redundant or duplicate data. Deduplication is effective because only one unique instance of the data across multiple backups is stored in the repository. The redundant data is stored, but not physically; it is simply replaced with a pointer to the one unique data instance in the repository. Conventional backup applications have been performing repetitive full backups every week, but AppAssure performs incremental block-level backups of the machines forever. This incremental-forever approach in tandem with data deduplication helps to drastically reduce the total quantity of data committed to the disk. The typical disk layout of a server consists of the operating system, application, and data. In most environments, the administrators often use a common flavor of the server and desktop operating system across multiple systems for effective deployment and management. When AppAssure backs up at the block level across multiple machines simultaneously, it provides a more detailed view of what is in the backup and what is not,
Dell AppAssure User Guide Version 5.4.3 Revision B16 irrespective of the source. This data includes the operating system, the applications, and the application data across the environment. Figure 1. True global deduplication AppAssure performs target-based inline data deduplication. This method transmits the snapshot data to the Core before it is deduplicated. Inline data deduplication simply means that the data is deduplicated before it is committed to disk. This is very different from at-source or post-process deduplication, where the data is deduplicated at the source before it is transmitted to the target for storage, and in post-process the data is sent raw to the target where it is analyzed and deduplicated after the data has been committed to disk. At-source deduplication consumes precious system resources on the machine whereas the post-process data deduplication approach needs all the requisite data on disk (a greater initial capacity overhead) before commencing the deduplication process. On the other hand, inline data deduplication does not require additional disk capacity and CPU cycles on the source or on the Core for the deduplication process. Lastly, conventional backup applications perform repetitive full backups every week, while AppAssure performs incremental block-level backups of the machines forever. This incremental forever approach in tandem with data deduplication helps to drastically reduce the total quantity of data committed to the disk with a reduction ratio of as much as 80:1. Encryption AppAssure provides integrated encryption to protect backups and data-at-rest from unauthorized access and use, ensuring data privacy. AppAssure provides strong encryption. By doing so, backups of protected computers are inaccessible. Only the user with the encryption key can access and decrypt the data. There is no limit to the number of encryption keys that can be created and stored on a system. DVM uses AES 256-bit encryption in the Cipher Block Chaining (CBC) mode with 256-bit keys. Encryption is performed inline on snapshot data, at line speeds without impacting performance. This is because DVM implementation is multi-threaded and uses hardware acceleration specific to the processor on which it is deployed. Encryption is multi-tenant ready. The deduplication has been specifically limited to records that have been encrypted with the same key; two identical records that have been encrypted with different keys will not be deduplicated against each other. This design decision ensures that deduplication cannot be used to leak data between different encryption domains. This is a benefit for managed service providers, as replicated backups for multiple tenants (customers) can be stored on a single core without any tenant being able to see or access
Dell AppAssure User Guide Version 5.4.3 Revision B17 other tenant data. Each active tenant encryption key creates an encryption domain within the repository where only the owner of the keys can see, access, or use the data. In a multi-tenant scenario, data is partitioned and deduplicated within the encryption domains. In replication scenarios, AppAssure uses SSL 3.0 to secure the connections between the two cores in a replication topology to prevent eavesdropping and tampering. Replication Replication is the process of copying recovery points from an AppAssure core and transmitting them to another AppAssure core in a separate location for the purpose of disaster recovery. The process requires a paired source- target relationship between two or more cores. The source core copies the recovery points of selected protected machines, and then asynchronously and continually transmits the incremental snapshot data to the target core at a remote disaster recovery site. You can configure outbound replication to a company-owned data center or remote disaster recovery site (that is, a “self-managed” target core). Or, you can configure outbound replication to a third-party managed service provider (MSP) or cloud provider that hosts off-site backup and disaster recovery services. When replicating to a third-party target core, you can use built-in work flows that let you request connections and receive automatic feedback notifications. Replication is managed on a per-protected-machine basis. Any machine (or all machines) protected or replicated on a source core can be configured to replicate to a target core. Figure 2. Replication Replication is self-optimizing with a unique Read-Match-Write (RMW) algorithm that is tightly coupled with deduplication. With RMW replication, the source and target replication service matches keys before transferring data and then replicates only the compressed, encrypted, deduplicated data across the WAN, resulting in a 10x reduction in bandwidth requirements. Replication begins with seeding: the initial transfer of deduplicated base images and incremental snapshots of the protected agents, which can add up to hundreds or thousands of gigabytes of data. Initial replication can be seeded to the target core using external media. This is typically useful for large sets of data or sites with slow links. The data in the seeding archive is compressed, encrypted and deduplicated. If the total size of the archive is larger than the space available on the removable media, the archive can span across multiple devices based on the available space on the media. During the seeding process, the incremental recovery points replicate to the target site. After the target core consumes the seeding archive, the newly replicated incremental recovery points automatically synchronize.
Dell AppAssure User Guide Version 5.4.3 Revision B18 Recovery-as-a-Service (RaaS) Managed service providers (MSPs) can fully leverage AppAssure as a platform for delivering recovery as a service (RaaS). RaaS facilitates complete recovery-in-the-cloud by replicating customers physical and virtual servers along with their data to the service providers cloud as virtual machines to support recovery testing or actual recovery operations. Customers wanting to perform recovery-in-the-cloud can configure replication on their protected machines on the local cores to an AppAssure service provider. In the event of a disaster, the MSPs can instantly spin-up virtual machines for the customer. MSPs can deploy multi-tenant AppAssure-based RaaS infrastructure that can host multiple and discrete organizations or business units (the tenants) that ordinarily do not share security or data on a single server or a group of servers. The data of each tenant is isolated and secure from other tenants and the service provider. Retention and archiving AppAssure offers flexible backup and retention policies that are easily configurable. The ability to tailor retention polices to the needs of an organization not only helps to meet compliance requirements but does so without compromising recovery time objectives (RTO). Retention policies enforce the periods of time in which backups are stored on short-term (fast and expensive) media. Sometimes certain business and technical requirements mandate extended retention of these backups, but use of fast storage is cost prohibitive. Therefore, this requirement creates a need for long-term (slow and cheap) storage. Businesses often use long-term storage for archiving both compliance and non-compliance data. The archive feature supports extended retentions for compliance and non-compliance data, as well as being used for seeding replication data to a target core. Figure 3. Retention policy In AppAssure, retention policies can be customized to specify the length of time a backup recovery point is maintained. As the age of the recovery points approach the end of their retention period, they age out and are removed from the retention pool. Typically, this process becomes inefficient and eventually fails as the amount of data and the period of retention start growing rapidly. AppAssure solves the big data problem by managing the retention of large amounts of data with complex retention policies and performing rollup operations for aging data using efficient metadata operations. Backups can be performed with an interval of a few minutes; and, these backups age over days, months, and years. Retention policies manage the aging and deletion of old backups. A simple waterfall method defines the aging process. The levels within the waterfall are defined in minutes, hours, and days; weeks, months, and years. The retention policy is enforced by the nightly rollup process. For long term archiving, AppAssure lets you create an archive of the source or target core on any removable media. The archive is internally optimized, and all data in the archive is compressed, encrypted, and