Dell Appassure 5 User Guide
Have a look at the manual Dell Appassure 5 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 327 Dell manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Dell AppAssure User Guide Version 5.4.3 Revision B299 ForceReplication Use the ForceReplication command to force a one-time transfer of replicated data from the source core to the target core. You can replicate one specific protected server or replicate all protected servers. The protected servers must be already configured for replication. Usage The usage for the command is as follows: /[forcereplication |frep] -core [host name] -user [user name] -password [password] - targetcore [host name] -all | -protectedserver [name | IP address] Command Options The following table describes the options available for the ForceReplication command: Example: Force replication for a protected server on a specific target core: >aacmd /forcereplication -target core 10.10.10.10 -protectedserver 10.20.30.40 ForceRollup Use the ForceRollup command to force the rollup of recovery points on a protected machine. Usage The usage for the command is as follows: /[forcerollup | fro] -core [host name] -user [user name] -password [password] - protectedserver [name | IP address] Table 146. ForceReplication command options Option Description -?Display this help message. -coreOptional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. -userOptional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used -targetcoreHost name of the target core against which replication should be forced. -protectedserverOptional. Protected machine against which to perform log file truncation. -allForce replication for all machines being replicated to the target core.
Dell AppAssure User Guide Version 5.4.3 Revision B300 Command Options The following table describes the options available for the ForceRollup command: Example: Force rollup for agent 10.10.10.1 on the Core: >aacmd /forcerollup -core 10.10.10.10 - user administrator -password 23WE@#$sdd - protectedserver 10.10.10.1 Help The Help command displays a list of the available commands and their definitions. It also provides copyright and version details. Usage The usage for the command is as follows: /help Example: Request Command Line help: >aacmd /help List The List command returns information about all recovery points, active jobs, completed jobs, failed jobs, invalid (failed) recovery points, valid (passed) recovery points, mounts, protected servers, volumes, virtualized servers, unprotected volumes, clusters, protection groups, SQL databases, Exchange databases, replicated servers, and repositories for the specified agent or list of servers currently protected by the Core. The most recent records return by default. You can list all records or specify how many records display by using a number parameter. This parameter should contain the letter l for the latest recovery points and f for the first recovery point. Each recovery point has its own number, which the administrator can use for mounting. Table 147. ForceRollup command options Option Description -?Display this help message. -coreOptional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. -userOptional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used -protectedserverOptional. Protected machine against which to perform log file truncation.
Dell AppAssure User Guide Version 5.4.3 Revision B301 Usage The usage for the command is as follows: /list [rps | passed | failed | mounts | volumes | protectedservers | activejobs | completed jobs | failedjobs | virtualizedservers | unprotectedvolumes | clusters | protectiongroups | sqldatabases | exchangemailstores | replicatedservers | repositories] -protectedserver [name | IP address] -core [host name] -user [user name] -password [password] –number [all | l | f | ] -jobtype Command Options The following table describes the options available for the List command: Table 148. List command options Option Description -?Display this help message. -listSelect one of the following options: •all recovery points (rps) •valid recovery points (passed) •invalid recovery points (failed) •mounts (mounts) •protected volumes (volumes) •unprotected volumes (unprotectedvolumes) •protected machines (protectedservers) •active jobs (activejobs) •failed jobs (failedjobs) •completed jobs (completedjobs) •virtualized servers (virtualizedservers) •clusters (clusters) •protection groups (protectiongroups) •SQL Server databases (sqldatabases) •MS Exchange databases (exchangemailstores) •replicated servers (replicatedservers) •repositories (‘repositories’) -coreOptional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. -userOptional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. -allFor show jobs only. Display al events of a specific type (active/failed/completed) on the core server. -protectedserverProtected machine with recovery points to display.
Dell AppAssure User Guide Version 5.4.3 Revision B302 Examples: List the 30 most recent recovery points: >aacmd /list rps -core 10.10.10.10 -user administrator -password 23WE@#$sdd -protectedserver 10.10.5.22 -number l30 View all failed data transfer jobs performed by a protected machine: >aacmd /list failed jobs -core 10.10.10.10 -user administrator -password 23WE@#$sdd -protectedserver 10.10.5.22 -number all -jobtype transfer Mount The Mount command mounts a snapshot of one or more drives. You can specify whether the mount should be read, write, or read-only with previous writes. The default selection is read-only. Usage The usage for the command is as follows: /mount -core [host name] -user [user name] -password [password] -protectedserver [name | IP address] -mounttype [read | write | readOnlyWithPreviousWrites] -drives [drive names] -volumes [volume names] -path [location] -rpn [number | numbers] | - time [time string]-numberOptional. Number of data items to display. Use only with the following specifiers: rps, activejobs, completedjobs, failedjobs. Available values are: •all (fetch all data items) •l[number] or [number] (fetches top ## data items) •f[number] (fetches first ## data items) Only takes effect when displaying recovery points and jobs. -jobtypeOptional. Filter output by job type. Available values include: •transfer (data transfer) •repository (repository maintenance) •replication (local and remote replications) •backup (backup and restore) •bootcdbuilder (create boot CDs) •diagnostics (upload logs) •exchange (Exchange Server files check) •export (recovery point export) •pushinstall (deploy agents) •rollback (recovery point rollbacks) •rollup (protected machine rollups) •sqlattach (agent attachability checks) •mount (mount repository) Table 148. List command options Option Description
Dell AppAssure User Guide Version 5.4.3 Revision B303 Command Options The following table describes the options available for the Mount command: Examples: Mount the most recent recovery points containing volumes “c:\” and “d:\” in the read-only mode: >aacmd /mount -core 10.10.10.10 -user administrator -password 23WE@#$sdd - protectedserver 10.10.5.22 -path c:\mountedrecoverypoint -mounttype read -volumes c: d: Mount recovery points with numbers 2 and 7: >aacmd /mount -core 10.10.10.10 -user administrator -password 23WE@#$sdd - protectedserver 10.10.5.22 -path c:\mountedrecoverypoint -rpn 2 7 Pause [snapshot | vmexport | replication] An administrator can pause snapshots, export to virtual machines, or replicate a Core. The Pause command accepts three parameters: snapshot, vmexport, and replication. Only one parameter can be specified. A snapshot can be paused until a certain time, if a time parameter is specified. Table 149. Mount command options Option Description -?Display this help message. -coreOptional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. -userOptional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. -protectedserverProtected machine with a recovery point or points to be mounted. -mounttypeOptional. Specifies a mount mode. Available values are read (read-only), readOnlyWithPreviousWrites (read-only with previous writes), write (writable). The default mode is read-only. -volumesOptional. List of volume names to mount. If not specified, all volumes are mounted. Values must be enclosed in double quotes and separated by spaces; for example: c: d:. Do not use trailing slashes in volume names. -pathPath to a folder on the core server to which the recovery point should be mounted. If one does not exist, a folder is automatically created. -rpnOptional. The sequential number of a recovery point to mount (use /list rps command to get the numbers). Specify several space-separated numbers to mount multiple recovery points with a single command. In this case data from each recovery point will be stored in a separate child folder. Note: if neither option - time nor -rpn is specified then the most recent recovery point that successfully passed integrity check will be mounted. -timeOptional. Determines recovery point or points to be selected for mount. Available values include: latest, passed, exact time in the format mm/dd/yyyy hh:mm tt (for instance, 2/24/2012 09:00 AM). Keep in mind to specify date time values of the time zone set on your PC. If neither the -time option nor the -rpn option is specified, then the most recent recovery point that successfully passed an integrity check is mounted. -localdriveOptional. Perform mount to user disk on local PC.
Dell AppAssure User Guide Version 5.4.3 Revision B304 A user can pause replication in three ways: •On a source Core for all Agents (-[outgoing]). The administrator must specify the remote machine name with the outgoing replication pairing to pause outgoing replication on the source Core: >aacmd /Pause replication /o 10.10.12.10 •On the source Core for a single Agent (-protectedserver): >aacmd /Pause replication /protectedserver 10.10.12.97 •On target Core (-incoming). If the local Core is a target Core, the administrator can pause replication by specifying the source Core using the incoming parameter: >aacmd /Pause replication /i 10.10.12.25 Usage The usage for the command is as follows: /pause [snapshot | vmexport | replication] -core [host name] -user [user name] -password [password] -all | -protectedserver [name | IP address] -incoming [host name] | outgoing [host name] -time [time string] Command Options The following table describes the options available for the Pause command: Examples: Pause creating snapshots for a specific protected server: >aacmd /pause snapshot -core 10.10.10.10 -user administrator -password 23WE@#$sdd -protectedserver 10.10.10.4 Table 150. Pause command options Option Description -?Display this help message. -pause[snapshots], [replication] or [vmexport]. -coreOptional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. -userOptional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. -allPause all agents on the selected Core. -protectedserverPause current protected server. -incomingHost name of the remote core that replicates to the core machine. -outgoingHost name of the remote target core to which data is replicated. -timeThe time in the format ‘Day-Hours-Minutes’ when the snapshots will be resumed (only for snapshots pause).
Dell AppAssure User Guide Version 5.4.3 Revision B305 Pause creating snapshots for a protected machine and resume it after three days, 20 hours, and 50 minutes: >aacmd /pause snapshot -core 10.10.10.10 -user administrator -password 23WE@#$sdd -protectedserver 10.10.10.4 -time 3-20-50 Pause export to virtual machine for all protected machines on the core: >aacmd /pause vmexport -core 10.10.10.10 /user administrator -password 23WE@#$sdd – all Pause outgoing replication on the core for a specific protected machine: >aacmd /pause replication –core 10.10.10.10 -user administrator -password 23WE@#$sdd –protectedserver 10.10.1.76 Pause outgoing replication for all protected machines on the target core: >aacmd /pause replication -core 10.10.10.10 -user administrator -password - 23WE@#$sdd –outgoing 10.10.1.63 Pause incoming replication for all machines on the target core: >aacmd /pause replication –core 10.10.10.10 -user administrator -password 23WE@#$sdd –incoming 10.10.1.82 Protect The Protect command adds a server under protection by a core. Usage The usage for the command is as follows: /protect -core [host name] -user [user name] -password [password] -repository [name] -agentname [name | IP address] -agentusername [user name] -agentpassword [password] -agentport [port] -volumes [volume names] Command Options The following table describes the options available for the Protect command: Table 151. Protect command options Option Description -?Display this help message. -coreOptional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. -userOptional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. -repositoryName of a repository on the Core to which the protected machine data should be stored. The name must be enclosed in double quotes. -agentnameName or IP address of the server you want to protect. -agentusernameUser name for the server to be protected. -agentpasswordPassword for the server to be protected.
Dell AppAssure User Guide Version 5.4.3 Revision B306 Example: Protect specific volumes of a server with the Core: >aacmd /protect -core 10.10.10.10 -username administrator -password 23WE@#$sdd - repository “Repository 1” -agentname 10.10.9.120 -agentport 5002 -agentusername administrator agentpassword 12345 -volumes “c:” “d:” ProtectCluster The ProtectCluster command adds a cluster under protection by a core. Usage The usage for the command is as follows: /protectcluster -core [host name] -user [user name] -password [password] -repository [name] -clustername [name | IP address] -clusterusername [user name] - clusterpassword [password] -clusterport [port] -clustervolumes [volume names] - clusternodes [cluster nodes collection] Command Options The following table describes the options available for the ProtectCluster command: -agentportProtected server port number. -volumesList of volumes to protect. Values must be enclosed in double quotes and separated by a space. Do not use trailing slashes in volume names; for example: “c:” “d:”. Table 152. ProtectCluster command options Option Description -?Display this help message. -coreOptional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. -userOptional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. -repositoryName of a repository on the Core to which the protected machine data should be stored. The name must be enclosed in double quotes. -clusternameName or IP address of the cluster you want to protect. -clusterusernameUser name for the cluster to be protected. -clusterpasswordPassword for the cluster to be protected. -clusterportProtected cluster server port number. -clustervolumesList of volumes to protect. Values must be enclosed in double quotes and separated by a space. Do not use trailing slashes in volume names; for example: “c:” “d:”. -clusternodesList of the cluster nodes and the volumes you want to protect on each node. Table 151. Protect command options Option Description
Dell AppAssure User Guide Version 5.4.3 Revision B307 Example: Protect specific volumes of a cluster server with the Core: >aacmd /protectcluster -core 10.10.10.10 -username administrator -password 23WE@#$sdd -repository “Repository 1” -clustername 10.10.8.150 -clusterport 8006 - clusterusername clusterAdmin clusterpassword password -volumes “C:\ClusterStorage\Volume1” -clusternodes nodeName 10.10.8.150 volumes “c:” nodeName 10.10.8.151 volumes “c:” RemoveAgent The RemoveAgent command lets you remove a protected machine from the protection of a Core and optionally delete the recovery points of the removed machine. If you do not delete the recovery points, AppAssure retains and labels them as a recovery points only machine. Usage The usage for the command is as follows: /removeagent -core [host name] -user [user name] -password [password] - protectedserver [name | IP address] -deleterecoverypoints Command Options The following table describes the options available for the RemoveAgent command: Example: Remove a machine from protection and delete the associated recovery points: >aacmd /removeagent -protectedserver 10.10.1.1 -deleterecoverypoints Table 153. RemoveAgent command options Option Description -?Display this help message. -coreOptional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. -userOptional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. -protectedserverThe name or IP address of the server you want to remove from protection. -deleterecoverypointsOptional. Deletes all recovery points for the machine you want to remove.
Dell AppAssure User Guide Version 5.4.3 Revision B308 RemovePoints The RemovePoints command lets you delete specific recovery points of a protected machine. Usage The usage for the command is as follows: /removepoints -core [host name] -user [user name] -password [password] - protectedserver [name | IP address] -rpn [number | numbers] | -time [time string] Command Options The following table describes the options available for the RemovePoints command: Example: Delete the recovery points with number 5 and 7: >aacmd /removepoints -core 10.10.10.10 -user administrator -password 23WE@#$sdd - protectedserver 10.10.5.22 -rpn 5 7 RestoreArchive This command restores an archive from a local archive or share and places the restored data in a specified repository. Table 154. RemovePoints command options Option Description -?Display this help message. -coreOptional. Remote Core host machine IP address (with an optional port number). By default, the connection is made to the Core installed on the local machine. -userOptional. User name for the remote Core host machine. If you specify a user name, you must also provide a password. If none is provided, then the credentials for the logged-on user are used. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none is provided, then the credentials for the logged-on user are used. -protectedserverThe name or IP address of the server for which you want to delete recovery points -rpnOptional. The sequential number of a recovery point to be deleted (use /list rps command to get the numbers). Specify several space-separated numbers to delete multiple recovery points with a single command. -timeOptional. Determines which recovery point or points to delete by creation time. Specify the exact time in the format mm/dd/yyyy hh:mm tt (for example, 2/24/2012 09:00 AM). Keep in mind to specify the date time values of the time zone set on your PC.