Home > Dell > System > Dell Appassure 5 User Guide

Dell Appassure 5 User Guide

    Download as PDF Print this page Share this page

    Have a look at the manual Dell Appassure 5 User Guide online for free. It’s possible to download the document as PDF or print. UserManuals.tech offer 327 Dell manuals and user’s guides for free. Share the user manual or guide on Facebook, Twitter or Google+.

    Page
    of 518
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B339
    Resume-Replication
    The Resume-Replication command lets you resume replication. See Suspend-Replication for more details.
    Usage
    The usage for the command is as follows:
    Resume-Replication -core [host name] -user [user name] -password [password] -all | 
    -protectedserver [machine name | IP address] -incoming [host name] | -outgoing [host 
    name]
    Command Options
    The following table describes the options available for the Resume-Replication command:
    Example:
    Resume replication for the protected machine with IP 10.10.10.4 for the local Core:
    >Resume-Replication -protectedserver 10.10.10.4
    Resume-Snapshot
    An administrator is able to resume snapshots, export to virtual machines, and perform replication. See Start-
    VMExport for more details.
    Usage
    The usage for the command is as follows:
    Resume-Snapshot -core [host name] -user [user name] -password [password] -all | -
    protectedserver [name | IP address] Table 186. Resume-Replication command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none are provided, then the logged-on users 
    credentials will be used.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password. If none are provided, then the logged-on users 
    credentials will be used.
    -allAll protected servers.
    -protectedserverResume replication for the specified machine.
    -incomingHost name of the remote Core that replicates to the Core machine. Replication is 
    resumed for all protected machines on the remote Core.
    -outgoingHost name of the remote target core to which data is replicating. Replication is 
    resumed for all protected machines on the remote core. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B340
    Command Options
    The following table describes the options available for the Resume-Snapshot command:
    Example:
    Resume snapshots for the protected machine with IP 10.10.10.4 for the local Core:
    >Resume-Snapshot -protectedserver 10.10.10.4
    Resume-VMExport
    The Resume-VMExport command lets an administrator export to virtual machines. See Suspend-VMExport for 
    more details.
    Usage
    The usage for the command is as follows:
    Resume-VMExport -core [host name] -user [user name] -password [password] -all | -
    protectedserver [name | IP address]
    Command Options
    The following table describes the options available for the Resume-VMExport command: Table 187. Resume-Snapshot command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none are provided, then the logged-on users 
    credentials will be used.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password. If none are provided, then the logged-on users 
    credentials will be used.
    -allAll protected servers.
    -protectedserverResume snapshot for the specified machine.
    Table 188. Resume-VMExport command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none are provided, then the logged-on users 
    credentials will be used.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password. If none are provided, then the logged-on users 
    credentials will be used. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B341
    Example:
    Resume export to a virtual machine for each protected machine on the local Core:
    >Resume-VMExport –all
    Start-Archive
    Businesses often use long-term storage to archive both compliant and non-compliant data. The archive feature 
    in AppAssure is used to support the extended retention for compliant and non-compliant data. The 
    administrator can save an archive on the local storage or network location by specifying the /Path command 
    and credentials.
    Usage
    The usage for the command is as follows:
    Start-Archive -path -startdate -enddate [-all] | -protectedserver [machine name] or 
    [IP]] -core [host name] -user [user name] -password [password]
    Command Options
    The following table describes the options available for the Start-Archive command: -allAll protected servers.
    -protectedserverResume snapshot for the specified machine.
    Table 189. Start-Archive command options
    Option Description
    -?Display this help message.
    -pathLocation path. Example path: ‘D:\work\archive’ or network path: 
    ‘\\servername\sharename’.
    -allArchive recovery points for all machines on the Core.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -startdateStart date of the date range for the created recovery points. Should be in the 
    format specified by the OS on the current PC.
    -enddateEnd date of the date range. Defaults to the current time.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none are provided, then the logged-on users 
    credentials will be used.
    -protectedserverArchive recovery points for the specified machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password. If none are provided, then the logged-on users 
    credentials will be used.
    -archiveusernameOptional. Required for network path only.
    -archivepasswordOptional. Required for network path only.
    -commentOptional. Example: -comment Before install new application. Table 188. Resume-VMExport command options
    Option Description 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B342
    Example:
    Archive all recovery points for all machines on the Core:
    >Start-Archive -path D:\work\archive -startdate Example 04/30/2012 –all
    Start-AttachabilityCheck
    The Start-AttachabilityCheck command forces an attachability check for all SQL Server databases 
    protected by the Core.
    Usage
    The usage for the command is as follows:
    Start-AttachabilityCheck -core [host name] -user [username] - password [password] 
    - protectedserver [machine name | IP address] -rpn [number | numbers] | -time [time 
    string]
    Command Options
    The following table describes the options available for the Start-AttachabilityCheck command:
    Example:
    Perform a SQL attachability check on the most recent recovery point for the specified protected SQL server:
    >Start-AttachabilityCheck - protectedserver 10.10.9.120  Table 190. Start-AttachabilityCheck command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password. If none are provided, then the logged-on users 
    credentials will be used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none are provided, then the logged-on users 
    credentials will be used.
    -protectedserverThe protected machine on which to perform the SQL attachability check.
    -rpnOptional. The sequential number of a recovery point on which to perform the SQL 
    attachability check. 
    You can use the -GetRecoveryPoints command to obtain recovery point 
    numbers. You can specify several space-separated numbers to perform the checks 
    against multiple recovery points with a single command.
    NOTE: If neither ‘time’ nor ‘rpn’ option is specified in this command, than the most 
    recent recovery point is used for the attachability check.
    -timeOptional. Determines recovery point to be selected for SQL attachability check. You 
    need to specify exact time in the format “MM/DD/YYYY hh:mm tt” (for example: 
    “04/24/2015 09:00 AM”).” Specify date time values of the time zone set on your 
    local machine.
    NOTE: If neither ‘time’ nor ‘rpn’ option is specified in this command, than the most 
    recent recovery point will be exported. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B343
    Start-EsxiExport
    The Start-EsxiExport command initiates the launch of a virtual export from the selected recovery point to 
    an ESX(i) server virtual machine.
    Required parameters include the name of the protected machine containing recovery points to export; the 
    name of the virtual machine you are exporting to; the amount of RAM to be allocated on the virtual machine; 
    the host name and port of the Linux server host, and the path to the local, network, or Linux folder where the 
    resulting virtual machine files will be stored.
    Usage
    The usage for the command is as follows:
    Start-EsxiExport -core [host name] -user [user name] -password [password] 
    -protectedserver [machine name | IP address] -volumes [volume names] -rpn [number | 
    numbers] | -time [time string] -vmname [virtual machine name] -hostname [virtual 
    host name] -hostport [virtual host port number] -hostusername [virtual host user 
    name] hostpassword [virtual host password] [-ram [total megabytes] | -usesourceram] 
    -diskprovisioning [thin | thick] -diskmapping [automatic | manual | withvm]
    Command Options
    The following table describes the options available for the Start-EsxiExport command:
    Table 191. Start-EsxiExport command options
    Option Description
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password. If none are provided, then the logged-on users 
    credentials will be used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none are provided, then the logged-on users 
    credentials will be used.
    -protectedserverProtected machine with recovery points to be exported.
    -volumesOptional. List of volume names to be exported. If not specified, all volumes in the 
    specified recovery points will be exported. Values must be enclosed in double 
    quotes, each separated by a space. do not use trailing slashes in volume names. For 
    example, specify “C:” not “C:/”
    -rpnOptional. The sequential number of a recovery point to be exported. (You can use 
    the -GetRecoveryPoints command to obtain recovery point numbers.
    NOTE: If neither ‘time’ nor ‘rpn’ option is specified in this command, than the most 
    recent recovery point will be exported.
    -timeOptional. Determines recovery point to be selected for export. You need to specify 
    exact time in the format “MM/DD/YYYY hh:mm tt” (for example: “04/24/2015 
    09:00 AM”).” Specify date time values of the time zone set on your local machine.
    NOTE: If neither ‘time’ nor ‘rpn’ option is specified in this command, than the most 
    recent recovery point will be exported.
    -vmnameWindows name of the virtual machine.
    -hostnameThe virtual server host name.
    -hostportThe virtual server port number.
    -hostusernameThe user name to the virtual server host.
    -hostpasswordThe password to the virtual server host. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B344
    Start-HypervExport
    The Start-HypervExport command initiates the launch of a virtual export from the selected recovery point 
    to a Hyper-V server virtual machine.
    Usage
    The usage for the command is as follows:
    Start-HypervExport -core [host name] -user [user name] -password [password] 
    -protectedserver [[machine name] or [IP address]] -volumes [volume names] -rpn 
    [number | numbers] | -time [time string] [-vmname [uselocalmachine] | -hostname 
    [virtual host name] -hostport [virtual host port number] -hostusername [virtual host 
    user name] -hostpassword [virtual host password] -vmlocation [location]] [-ram 
    [total megabytes] | -usesourceram] -diskformat [VHD | VHDX]
    Command Options
    The following table describes the options available for the Start-HypervExport command: -ramAllocate specific amount of RAM on the virtual server.
    -usesourceramOptional. Allocate the same amount of RAM on the virtual server as the source 
    protected machine.
    -diskprovisioningOptional. The amount of disk space that will be allocated on the virtual machine. 
    Specify ‘thick’ to make the virtual disk as large as the original drive on the 
    protected server, or ‘thin’ to allocate the amount of actual disk space occupied on 
    the original drive, plus some extra space in megabytes.
    By default, ‘thin’ provisioning is selected.
    -diskmappingOptional. Select either ‘auto,’ ‘manual,’ or ‘withvm’. By default, auto-mapping is 
    enabled.
    Table 192. Start-HypervExport command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password. If none are provided, then the logged-on users 
    credentials will be used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none are provided, then the logged-on users 
    credentials will be used.
    -protectedserverProtected machine with recovery points to be exported.
    -volumesOptional. List of volume names to be exported. If not specified, all volumes in the 
    specified recovery points will be exported. Values must be enclosed in double 
    quotes, each separated by a space. do not use trailing slashes in volume names. For 
    example, specify “C:” not “C:/” Table 191. Start-EsxiExport command options
    Option Description 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B345 -rpnOptional. The sequential number of a recovery point to be exported. (You can use 
    the -GetRecoveryPoints command to obtain recovery point numbers.
    NOTE: If neither ‘time’ nor ‘rpn’ option is specified in this command, than the most 
    recent recovery point will be exported.
    -timeOptional. Determines recovery point to be selected for export. You need to specify 
    exact time in the format “MM/DD/YYYY hh:mm tt” (for example: “04/24/2015 
    09:00 AM”).” Specify date time values of the time zone set on your local machine.
    NOTE: If neither ‘time’ nor ‘rpn’ option is specified in this command, than the most 
    recent recovery point will be exported.
    -vmnameWindows name of the virtual machine.
    -uselocalmachineOptional. Connect the local Hyper-V server. If this parameter is used, the following 
    options are ignored: hostname, host port, host username, host password.
    -hostnameThe virtual server host name.
    -hostportThe virtual server port number.
    -hostusernameThe user name to the virtual server host.
    -hostpasswordThe password to the virtual server host.
    -ramAllocate specific amount of RAM on the virtual server.
    -usesourceramOptional. Allocate the same amount of RAM on the virtual server as the source 
    protected machine.
    -diskprovisioningOptional. The amount of disk space that will be allocated on the virtual machine. 
    Specify ‘thick’ to make the virtual disk as large as the original drive on the 
    protected server, or ‘thin’ to allocate the amount of actual disk space occupied on 
    the original drive, plus some extra space in megabytes.
    By default, ‘thin’ provisioning is selected.
    -diskmappingOptional. Select either ‘auto,’ ‘manual,’ or ‘withvm’. By default, auto-mapping is 
    enabled.
    -diskformatOptional. Specify the appropriate disk format from options VHD or VHDX. VHD is 
    otherwise used by default. Table 192. Start-HypervExport command options
    Option Description 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B346
    Start-LogTruncation
    The Start-LogTruncation command forces log truncation for the specified protected SQL Server or 
    Microsoft Exchange server.
    Usage
    The usage for the command is as follows:
    Start-LogTruncation -core [host name] -user [user name] -password [password] 
    -protectedserver [[machine name] or [IP address]] -target [sql | exchange]
    Command Options
    The following table describes the options available for the Start-LogTruncation command:
    Example:
    Tr u n c a t e  S Q L  l o g s :
    >Start-LogTruncation -protectedserver SQL1 -target sql 
    Truncate Exchange server logs: all recovery points for all machines on the Core:
    > start-LogTruncation -protectedserver ExServer2 -target exchange 
    Start-MountabilityCheck
    The Start-MountabilityCheck command forces a mountability check for protected Microsoft Exchange 
    mail stores.
    Usage
    The usage for the command is as follows:
    Start-MountabilityCheck -core [host name] -user [user name] -password [password] 
    -protectedserver [[machine name] or [IP address]] -rpn [number | numbers] | 
    -time [time string] Table 193. Start-LogTruncation command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password. If none are provided, then the logged-on users 
    credentials will be used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none are provided, then the logged-on users 
    credentials will be used.
    -protectedserverArchive of recovery points for the specified machine.
    -targetSpecify the type of log truncation (either ‘sql’ or ‘exchange’). If not specified, logs 
    are truncated on all databases. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B347
    Command Options
    The following table describes the options available for the Start-MountabilityCheck command:
    Example:
    Start a mountability check for oall recovery points for all machines on the Core:
    > Start-MountabilityCheck -protected EX01
    Start-Protect
    The Start-Protect command lets an administrator add a server under protection by a Core.
    Usage
    Start-Protect -core [host name] -user [user name] -password [password] -repository 
    [repository name] -agent [name | IP address] -agentusername [user name] 
    -agentpassword [password] -agentport [port] -volumes [volume names]
    Command Options
    The following table describes the options available for the Start-Protect command: Table 194. Start-MountabilityCheck command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password. If none are provided, then the logged-on users 
    credentials will be used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none are provided, then the logged-on users 
    credentials will be used.
    -protectedserverArchive of recovery points for the specified machine.
    -rpnOptional. The sequential number of a recovery point to be exported. (You can use 
    the -GetRecoveryPoints command to obtain recovery point numbers.
    NOTE: If neither ‘time’ nor ‘rpn’ option is specified in this command, than the most 
    recent recovery point will be exported.
    -timeOptional. Determines recovery point to be selected for export. You need to specify 
    exact time in the format “MM/DD/YYYY hh:mm tt” (for example: “04/24/2015 
    09:00 AM”).” Specify date time values of the time zone set on your local machine.
    NOTE: If neither ‘time’ nor ‘rpn’ option is specified in this command, than the most 
    recent recovery point will be exported.
    Table 195. Start-Protect command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine. 
    						
    							Dell AppAssure User Guide
    Version 5.4.3 Revision B348
    Example:
    Put volumes of a server under protection:
    >Start-Protect -repository Repository 1 -agentname 10.10.9.120 -agentusername 
    administrator -agentpassword 12345 -agentport 5002 -volumes c: d:
    Start-ProtectCluster
    The Start-ProtectCluster command lets an administrator add a server cluster under protection by a Core.
    Usage
    Usage for the command is as follows:
    Start-ProtectCluster -core [host name] -user [user name] -password [password] -
    repository [repository name] -clustername [name | IP address] -clusterusername [user 
    name for cluster] -clusterpassword [password for cluster] -clusterport [port] -
    clustervolumes [volume names] -clusternodes [cluster nodes names and volumes]
    Command Options
    The following table describes the options available for the Start-ProtectCluster command: -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password. If none are provided, then the logged-on users 
    credentials will be used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none are provided, then the logged-on users 
    credentials will be used.
    -repositoryName of a repository on the Core where the protected machines data is stored.
    -agentnameProtected machine name or IP address.
    -agentusernameLog on to the server to be protected.
    -agentpasswordPassword to the server to be protected.
    -agentportProtected server port number.
    -volumesList of volumes to protect. Values must be enclosed in double quotes and separated 
    by a space. Do not use trailing slashes in volume names. For example, c: or d:.
    Table 196. Start-ProtectCluster command options
    Option Description
    -?Display this help message.
    -coreOptional. Remote Core host machine IP address (with an optional port number). By 
    default the connection is made to the Core installed on the local machine.
    -userOptional. User name for the remote Core host machine. If you specify a user name, 
    you also have to provide a password. If none are provided, then the logged-on users 
    credentials will be used.
    -passwordOptional. Password to the remote Core host machine. If you specify a password, you 
    also have to provide a user name. If none are provided, then the logged-on users 
    credentials will be used. Table 195. Start-Protect command options
    Option Description 
    						
    All Dell manuals Comments (0)

    Related Manuals for Dell Appassure 5 User Guide