Home > Dell > System > Dell Appassure 5 User Guide

Dell Appassure 5 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Dell Appassure 5 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 327 Dell manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 518
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B329
    Get-SqlDatabases
    The Get-SqlDatabases command returns a list of SQL databases from the specified protected machine.
    Usage
    The usage for the command is as follows:
    Get-SqlDatabases -core [host name] -user [user name] -password [password] 
    -protectedserver [server name or IP address] 
    Command Options
    The following table describes the options available for the Get-SqlDatabases command:
    Example:
    Lists all SQL databases jobs on the local Core:
    >Get-SqlDatabases -protectedserver 10.10.10.10
    Get-UnprotectedVolumes
    The Get-UnprotectedVolumes command returns information about volumes that are available for 
    protection but not currently protected on the Core.
    Usage
    The usage for the command is as follows:
    Get-UnprotectedVolumes
    -core [host name] -user [user name] -password [password] -protectedserver [server 
    name or IP address] Table 174. Get-SqlDatabases command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password.
    If none are provided, then the logged-on users credentials will be used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a log on.
    If none are provided, then the logged-on users credentials will be used.
    -protectedserverShow jobs for a specific protected machine, indicated by IP address. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B330
    Command Options
    The following table describes the options available for the Get-UnprotectedVolumes command:
    Example:
    Lists all volumes available for protection (but not get protected) on the specified agent machine:
    >Get-UnprotectedVolumes -protectedserver 10.10.10.10
    Get-VirtualizedServers
    The Get-VirtualizedServers command returns information about virtualized servers.
    Usage
    The usage for the command is as follows:
    Get-VirtualizedServers -core [host name] -user [user name] -password [password]
    Command Options
    The following table describes the options available for the Get-VirtualizedServers command: Table 175. Get-UnprotectedVolumes command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password.
    If none are provided, then the logged-on users credentials will be used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a log on.
    If none are provided, then the logged-on users credentials will be used.
    -protectedserverShow jobs for a specific protected machine, indicated by IP address.
    Table 176. Get-VirtualizedServers command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password.
    If none are provided, then the logged-on users credentials will be used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a log on.
    If none are provided, then the logged-on users credentials will be used. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B331
    Example:
    Lists all virtualized servers on the local Core:
    >Get-VirtualizedServers
    Get-Volumes
    The Get-Volumes command returns information about volumes on a specified machine that is protected by 
    the Core.
    Usage
    The usage for the command is as follows:
    Get-Volumes -core [host name] -user [user name] -password [password] 
    -protectedserver [server name or IP address]
    Command Options
    The following table describes the options available for the Get-Volumes command:
    Example:
    Lists all volumes on the specified machine:
    >Get-Volumes -protectedserver 10.10.10.10
    New-Base
    The New-Base command forces a new base image resulting in a data transfer for the current protected 
    machine. When you force a base image, the transfer will start immediately or will be added to the queue. Only 
    the data that has changed from a previous recovery point will be transferred. If there is no previous recovery 
    point, all data on the protected volumes will be transferred.
    Usage
    The usage for the command is as follows:
    New-Base [[-all] | -protectedserver [machine name]] -core [host name] -user [user 
    name] -password [password] Table 177. Get-Volumes command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password.
    If none are provided, then the logged-on users credentials will be used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a log on.
    If none are provided, then the logged-on users credentials will be used.
    -protectedserverShow jobs for a specific protected machine, indicated by IP address. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B332
    Command Options
    The following table describes the options available for the New-Base command:
    Example:
    Force base image for all protected machines:
    >New-Base –all
    New-Mount
    The New-Mount command mounts a snapshot of one or more drives.
    Usage
    The usage for the command is as follows:
    New-Mount -core [host name] -user [user name] -password [password] 
    -protectedserver [machine name] -mounttype [read | write | 
    readonlywithpreviouswrites] -drives [drive names] -path [location] –time [MM/DD/YYYY 
    hh:mm:ss tt | passed | latest] –rpn [number]
    Command Options
    The following table describes the options available for the New-Mount command: Table 178. New-Base command options
    Option Description
    -?Display this help message.
    -allBase image for all agents.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none are provided, then the logged-on users 
    credentials will be used.
    -protectedserverForce for the current protected machine’s name.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password. If none are provided, then the logged-on users 
    credentials will be used.
    Table 179. New-Mount command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -protectedserverThe protected server IP address or machine name (depends on how the particular 
    machine was protected.
    -timeOptional. The timestamp of the Recovery Point to mount. This should be in the 
    format that is specified by the OS on the current PC. The administrator is able to 
    get the latest recovery point by specifying latest or last checked recovery point by 
    passed parameter value. By default the latest time option is chosen. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B333
    Example:
    >New-Mount -core 10.10.10.10:8006 -user administrator -password 23WE@#$sdd 
    -protectedserver 10.10.5.22 -path C:\MountedRecoveryPoint -mounttype read -volumes c 
    “d, ko”
    Mount an array of recovery points:
    >New-Mount –rpn 10 52 41 -protectedserver localhost –path “D:/Folder for mount”
    Mount a recovery point with certain time created:
    >New-Mount -protectedserver 10.10.5.56 –path “D:/Folder for mount” –time “8/24/2012 
    11:46 AM”-userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password. If none are provided, then the logged-on users 
    credentials will be used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a log on.
    If none are provided, then the logged-on users credentials will be used.
    -pathPath on the Core machine to which recovery points will be mounted.
    -mounttypeOptional. Specifies a mount mode. Available options are read, 
    readOnlyWithPreviousWrites (read-only with previous writes), write 
    (writable). Default mode is read-only.
    -volumesOptional. Space-separated list of volume names to mount. If the volume’s name 
    contains spaces or special characters, it has to be specified using double quotes. If 
    not specified, all volumes will be mounted.
    -driversOptional. Comma-separated list of volume names to mount. If not specified, all 
    volumes will be mounted.
    NOTE: This option is obsolete, use -volumes instead.
    -rpnOptional. Recovery point number for the mount. You can obtain this using the get-
    mounts command. Specify several numbers for the rpn parameter to mount 
    different points with a single command.
    NOTE: If you set an array of points to mount, each point will be located in a 
    separate child directory. The name describes the time when the recovery point was 
    created. When you call dismount, all child directories will be removed. You should 
    remove the parent directory manually. Table 179. New-Mount command options
    Option Description 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B334
    New-Repository
    The New-Repository command creates a new repository in the AppAssure Core. The size specified must be 
    between 250 Mb and 16 Tb.
    Usage
    The usage for the command is as follows:
    New-Repository | –name [name] -size [size] -datapath [location] -metadatapath 
    [location] 
    Command Options
    The following table describes the options available for the New-Repository command:
    Example:
    Create new repository of minimum size in local drive E:
    >New-Repository –name Repository2 -size 250Mb -datapath e:\Repository\Data -
    metadatapath e:\Repository\Metadata Table 180. New-Repository command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none are provided, then the logged-on users 
    credentials will be used.
    -nameRepository name.
    -sizeSize of repository extent. Available units are: b, Kb, Mb, Gb, Tb, Pb.
    -datapathFor local location only. Determines data path of repository extent.
    -metadatapathFor local location only. Determines metadata path of repository extent.
    -uncpathFor share location only. Determines data and metadata paths of repository extent.
    -shareusernameFor share location only. Determines login to share location.
    -sharepasswordFor share location only. Determines password to share location.
    -commentOptional. Description of repository.
    -concurrent
    OperationsOptional. Maximum number of operations that can be pending at one time. Value by 
    default: 64. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B335
    New-Snapshot
    The New-Snapshot command forces a snapshot resulting in a data transfer for the current protected machine. 
    When you force a snapshot, the transfer will start immediately or will be added to the queue. Only the data 
    that has changed from a previous recovery point will be transferred. If there is no previous recovery point, all 
    data on the protected volumes will be transferred.
    Usage
    The usage for the command is as follows:
    New-Snapshot [-all] | -protectedserver [machine name]] -core [host name] -user [user 
    name] -password [password]
    Command Options
    The following table describes the options available for the New-Snapshot command:
    Example:
    Force a snapshot for all protected machines:
    >New-Snapshot -all
    Push-Replication
    The Push-Replication command forces replication for one or more protected machines. 
    Usage
    The usage for the command is as follows:
    Push-Replication -core [host name] -user [user name] -password [password] 
    -targetcore [host name] -all | -protectedserver [machine name | IP address] Table 181. New-Snapshot command options
    Option Description
    -?Display this help message.
    -allForce all protected machines.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none are provided, then the logged-on users 
    credentials will be used.
    -protectedserverForce for the current protected machine’s name.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password. If none are provided, then the logged-on users 
    credentials will be used. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B336
    Command Options
    The following table describes the options available for the Push-Replication command:
    Example:
    Push replication for a single protected machine:
    >Push-Replication -core 10.10.10.10:8006 -user administrator -password 23WE@#$sdd 
    -targetcore 10.10.10.20:8006 –protectedserver 10.10.5.22
    Push replication for all protected machines:
    >Push-Replication -all
    Push-Rollup
    The Push-Rollup command forces rollup for a protected machine. 
    Usage
    The usage for the command is as follows:
    Push-Rollup -core [host name] -user [user name] -password [password] 
    -protectedserver [machine name | IP address]
    Command Options
    The following table describes the options available for the Push-Rollup command: Table 182. Push-Replication command options
    Option Description
    -?Display this help message.
    -allForce replication for all machines being replicated to the target Core.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none are provided, then the logged-on users 
    credentials will be used.
    -protectedserverProtected machine name on the target Core against which to force replication.
    -userOptional. Login for the remote Core host machine. If you specify a login, you also 
    have to provide a password. If none are provided, then the logged-on users 
    credentials will be used.
    Table 183. Push-Rollup command options
    Option Description
    -?Display this help message.
    -allForce all protected machines.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none are provided, then the logged-on users 
    credentials will be used. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B337
    Example:
    Push rollup for a single protected machine:
    >Push-Rollup -core 10.10.10.10:8006 -user administrator -password 23WE@#$sdd –
    protectedserver 10.10.5.22
    Push rollup for all protected machines:
    >Push-Rollup -all
    Remove-Mount
    The Remove-Mount command dismounts a mounted recovery point specified by the /Path. Dismount points 
    for the selected machine using the -protectedserver parameter or dismount points for all the mounted 
    recovery points by using the -all parameter.
    Usage
    The usage for the command is as follows:
    Remove-Mount -core [host name] -user [user name] -password [password] 
    [-protectedserver [machine name] | -path [mount path]]
    Command Options
    The following table describes the options available for the Remove-Mount command: -protectedserverForce for the current protected machine’s name.
    -userOptional. Login for the remote Core host machine. If you specify a login, you also 
    have to provide a password. If none are provided, then the logged-on users 
    credentials will be used.
    Table 184. Remove-Mount command options
    Option Description
    -?Display this help message.
    -allDismount all mounted recovery points.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a log on.
    If none are provided, then the logged-on users credentials will be used.
    -pathDismount selected mount point.
    -protectedserverDismount all mounted recovery points for the current protected machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password. If none are provided, then the logged-on users 
    credentials will be used. Table 183. Push-Rollup command options
    Option Description 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B338
    Example:
    Dismount the recovery point specified by the path:
    >Remove-Mount -core 10.10.10.10:8006 -user administrator -password 23WE@#$sdd -path 
    C:\mountedRecoveryPoint
    Remove-Mounts
    The Remove-Mounts command dismounts all mounted recovery points.
    Usage
    The usage for the command is as follows:
    Remove-Mounts -core [host name] -user [user name] -password [password]
    Command Options
    The following table describes the options available for the Remove-Mounts command:
    Example:
    Dismount all recovery points on the specified Core:
    >Remove-Mounts -core 10.10.10.10:8006 -user administrator -password 23WE@#$sdd Table 185. Remove-Mounts command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none are provided, then the logged-on users 
    credentials will be used.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password. If none are provided, then the logged-on users 
    credentials will be used. 
    						
    All Dell manuals Comments (0)

    Related Manuals for Dell Appassure 5 User Guide