Dell Appassure 5 User Guide
Have a look at the manual Dell Appassure 5 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 327 Dell manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.
Dell AppAssure User Guide Version 5.4.3 Revision B329 Get-SqlDatabases The Get-SqlDatabases command returns a list of SQL databases from the specified protected machine. Usage The usage for the command is as follows: Get-SqlDatabases -core [host name] -user [user name] -password [password] -protectedserver [server name or IP address] Command Options The following table describes the options available for the Get-SqlDatabases command: Example: Lists all SQL databases jobs on the local Core: >Get-SqlDatabases -protectedserver 10.10.10.10 Get-UnprotectedVolumes The Get-UnprotectedVolumes command returns information about volumes that are available for protection but not currently protected on the Core. Usage The usage for the command is as follows: Get-UnprotectedVolumes -core [host name] -user [user name] -password [password] -protectedserver [server name or IP address] Table 174. Get-SqlDatabases command options Option Description -?Display this help message. -coreOptional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine. -userOptional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password. If none are provided, then the logged-on users credentials will be used. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a log on. If none are provided, then the logged-on users credentials will be used. -protectedserverShow jobs for a specific protected machine, indicated by IP address.
Dell AppAssure User Guide Version 5.4.3 Revision B330 Command Options The following table describes the options available for the Get-UnprotectedVolumes command: Example: Lists all volumes available for protection (but not get protected) on the specified agent machine: >Get-UnprotectedVolumes -protectedserver 10.10.10.10 Get-VirtualizedServers The Get-VirtualizedServers command returns information about virtualized servers. Usage The usage for the command is as follows: Get-VirtualizedServers -core [host name] -user [user name] -password [password] Command Options The following table describes the options available for the Get-VirtualizedServers command: Table 175. Get-UnprotectedVolumes command options Option Description -?Display this help message. -coreOptional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine. -userOptional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password. If none are provided, then the logged-on users credentials will be used. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a log on. If none are provided, then the logged-on users credentials will be used. -protectedserverShow jobs for a specific protected machine, indicated by IP address. Table 176. Get-VirtualizedServers command options Option Description -?Display this help message. -coreOptional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine. -userOptional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password. If none are provided, then the logged-on users credentials will be used. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a log on. If none are provided, then the logged-on users credentials will be used.
Dell AppAssure User Guide Version 5.4.3 Revision B331 Example: Lists all virtualized servers on the local Core: >Get-VirtualizedServers Get-Volumes The Get-Volumes command returns information about volumes on a specified machine that is protected by the Core. Usage The usage for the command is as follows: Get-Volumes -core [host name] -user [user name] -password [password] -protectedserver [server name or IP address] Command Options The following table describes the options available for the Get-Volumes command: Example: Lists all volumes on the specified machine: >Get-Volumes -protectedserver 10.10.10.10 New-Base The New-Base command forces a new base image resulting in a data transfer for the current protected machine. When you force a base image, the transfer will start immediately or will be added to the queue. Only the data that has changed from a previous recovery point will be transferred. If there is no previous recovery point, all data on the protected volumes will be transferred. Usage The usage for the command is as follows: New-Base [[-all] | -protectedserver [machine name]] -core [host name] -user [user name] -password [password] Table 177. Get-Volumes command options Option Description -?Display this help message. -coreOptional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine. -userOptional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password. If none are provided, then the logged-on users credentials will be used. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a log on. If none are provided, then the logged-on users credentials will be used. -protectedserverShow jobs for a specific protected machine, indicated by IP address.
Dell AppAssure User Guide Version 5.4.3 Revision B332 Command Options The following table describes the options available for the New-Base command: Example: Force base image for all protected machines: >New-Base –all New-Mount The New-Mount command mounts a snapshot of one or more drives. Usage The usage for the command is as follows: New-Mount -core [host name] -user [user name] -password [password] -protectedserver [machine name] -mounttype [read | write | readonlywithpreviouswrites] -drives [drive names] -path [location] –time [MM/DD/YYYY hh:mm:ss tt | passed | latest] –rpn [number] Command Options The following table describes the options available for the New-Mount command: Table 178. New-Base command options Option Description -?Display this help message. -allBase image for all agents. -coreOptional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none are provided, then the logged-on users credentials will be used. -protectedserverForce for the current protected machine’s name. -userOptional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password. If none are provided, then the logged-on users credentials will be used. Table 179. New-Mount command options Option Description -?Display this help message. -coreOptional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine. -protectedserverThe protected server IP address or machine name (depends on how the particular machine was protected. -timeOptional. The timestamp of the Recovery Point to mount. This should be in the format that is specified by the OS on the current PC. The administrator is able to get the latest recovery point by specifying latest or last checked recovery point by passed parameter value. By default the latest time option is chosen.
Dell AppAssure User Guide Version 5.4.3 Revision B333 Example: >New-Mount -core 10.10.10.10:8006 -user administrator -password 23WE@#$sdd -protectedserver 10.10.5.22 -path C:\MountedRecoveryPoint -mounttype read -volumes c “d, ko” Mount an array of recovery points: >New-Mount –rpn 10 52 41 -protectedserver localhost –path “D:/Folder for mount” Mount a recovery point with certain time created: >New-Mount -protectedserver 10.10.5.56 –path “D:/Folder for mount” –time “8/24/2012 11:46 AM”-userOptional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password. If none are provided, then the logged-on users credentials will be used. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a log on. If none are provided, then the logged-on users credentials will be used. -pathPath on the Core machine to which recovery points will be mounted. -mounttypeOptional. Specifies a mount mode. Available options are read, readOnlyWithPreviousWrites (read-only with previous writes), write (writable). Default mode is read-only. -volumesOptional. Space-separated list of volume names to mount. If the volume’s name contains spaces or special characters, it has to be specified using double quotes. If not specified, all volumes will be mounted. -driversOptional. Comma-separated list of volume names to mount. If not specified, all volumes will be mounted. NOTE: This option is obsolete, use -volumes instead. -rpnOptional. Recovery point number for the mount. You can obtain this using the get- mounts command. Specify several numbers for the rpn parameter to mount different points with a single command. NOTE: If you set an array of points to mount, each point will be located in a separate child directory. The name describes the time when the recovery point was created. When you call dismount, all child directories will be removed. You should remove the parent directory manually. Table 179. New-Mount command options Option Description
Dell AppAssure User Guide Version 5.4.3 Revision B334 New-Repository The New-Repository command creates a new repository in the AppAssure Core. The size specified must be between 250 Mb and 16 Tb. Usage The usage for the command is as follows: New-Repository | –name [name] -size [size] -datapath [location] -metadatapath [location] Command Options The following table describes the options available for the New-Repository command: Example: Create new repository of minimum size in local drive E: >New-Repository –name Repository2 -size 250Mb -datapath e:\Repository\Data - metadatapath e:\Repository\Metadata Table 180. New-Repository command options Option Description -?Display this help message. -coreOptional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none are provided, then the logged-on users credentials will be used. -nameRepository name. -sizeSize of repository extent. Available units are: b, Kb, Mb, Gb, Tb, Pb. -datapathFor local location only. Determines data path of repository extent. -metadatapathFor local location only. Determines metadata path of repository extent. -uncpathFor share location only. Determines data and metadata paths of repository extent. -shareusernameFor share location only. Determines login to share location. -sharepasswordFor share location only. Determines password to share location. -commentOptional. Description of repository. -concurrent OperationsOptional. Maximum number of operations that can be pending at one time. Value by default: 64.
Dell AppAssure User Guide Version 5.4.3 Revision B335 New-Snapshot The New-Snapshot command forces a snapshot resulting in a data transfer for the current protected machine. When you force a snapshot, the transfer will start immediately or will be added to the queue. Only the data that has changed from a previous recovery point will be transferred. If there is no previous recovery point, all data on the protected volumes will be transferred. Usage The usage for the command is as follows: New-Snapshot [-all] | -protectedserver [machine name]] -core [host name] -user [user name] -password [password] Command Options The following table describes the options available for the New-Snapshot command: Example: Force a snapshot for all protected machines: >New-Snapshot -all Push-Replication The Push-Replication command forces replication for one or more protected machines. Usage The usage for the command is as follows: Push-Replication -core [host name] -user [user name] -password [password] -targetcore [host name] -all | -protectedserver [machine name | IP address] Table 181. New-Snapshot command options Option Description -?Display this help message. -allForce all protected machines. -coreOptional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none are provided, then the logged-on users credentials will be used. -protectedserverForce for the current protected machine’s name. -userOptional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password. If none are provided, then the logged-on users credentials will be used.
Dell AppAssure User Guide Version 5.4.3 Revision B336 Command Options The following table describes the options available for the Push-Replication command: Example: Push replication for a single protected machine: >Push-Replication -core 10.10.10.10:8006 -user administrator -password 23WE@#$sdd -targetcore 10.10.10.20:8006 –protectedserver 10.10.5.22 Push replication for all protected machines: >Push-Replication -all Push-Rollup The Push-Rollup command forces rollup for a protected machine. Usage The usage for the command is as follows: Push-Rollup -core [host name] -user [user name] -password [password] -protectedserver [machine name | IP address] Command Options The following table describes the options available for the Push-Rollup command: Table 182. Push-Replication command options Option Description -?Display this help message. -allForce replication for all machines being replicated to the target Core. -coreOptional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none are provided, then the logged-on users credentials will be used. -protectedserverProtected machine name on the target Core against which to force replication. -userOptional. Login for the remote Core host machine. If you specify a login, you also have to provide a password. If none are provided, then the logged-on users credentials will be used. Table 183. Push-Rollup command options Option Description -?Display this help message. -allForce all protected machines. -coreOptional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none are provided, then the logged-on users credentials will be used.
Dell AppAssure User Guide Version 5.4.3 Revision B337 Example: Push rollup for a single protected machine: >Push-Rollup -core 10.10.10.10:8006 -user administrator -password 23WE@#$sdd – protectedserver 10.10.5.22 Push rollup for all protected machines: >Push-Rollup -all Remove-Mount The Remove-Mount command dismounts a mounted recovery point specified by the /Path. Dismount points for the selected machine using the -protectedserver parameter or dismount points for all the mounted recovery points by using the -all parameter. Usage The usage for the command is as follows: Remove-Mount -core [host name] -user [user name] -password [password] [-protectedserver [machine name] | -path [mount path]] Command Options The following table describes the options available for the Remove-Mount command: -protectedserverForce for the current protected machine’s name. -userOptional. Login for the remote Core host machine. If you specify a login, you also have to provide a password. If none are provided, then the logged-on users credentials will be used. Table 184. Remove-Mount command options Option Description -?Display this help message. -allDismount all mounted recovery points. -coreOptional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a log on. If none are provided, then the logged-on users credentials will be used. -pathDismount selected mount point. -protectedserverDismount all mounted recovery points for the current protected machine. -userOptional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password. If none are provided, then the logged-on users credentials will be used. Table 183. Push-Rollup command options Option Description
Dell AppAssure User Guide Version 5.4.3 Revision B338 Example: Dismount the recovery point specified by the path: >Remove-Mount -core 10.10.10.10:8006 -user administrator -password 23WE@#$sdd -path C:\mountedRecoveryPoint Remove-Mounts The Remove-Mounts command dismounts all mounted recovery points. Usage The usage for the command is as follows: Remove-Mounts -core [host name] -user [user name] -password [password] Command Options The following table describes the options available for the Remove-Mounts command: Example: Dismount all recovery points on the specified Core: >Remove-Mounts -core 10.10.10.10:8006 -user administrator -password 23WE@#$sdd Table 185. Remove-Mounts command options Option Description -?Display this help message. -coreOptional. Remote Core host machine IP address (with an optional port number). By default the connection is made to the Core installed on the local machine. -passwordOptional. Password to the remote Core host machine. If you specify a password, you also have to provide a user name. If none are provided, then the logged-on users credentials will be used. -userOptional. User name for the remote Core host machine. If you specify a user name, you also have to provide a password. If none are provided, then the logged-on users credentials will be used.