Dell DL4300 Appliance Deployment Guide

Dell DL4300 Appliance Deployment Guide
Dell DL4300 Appliance
Deployment Guide
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you
how to avoid the problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual
property laws. Dell and the Dell logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other
marks and names mentioned herein may be trademarks of their respective companies.
2016 - 09
Rev. A03
Contents
1 Setting up DL4300 Appliance............................................................................. 5
Introduction........................................................................................................................................... 5
Terms used in this document......................................................................................................... 5
Available configurations........................................................................................................................ 5
Installation prerequisites....................................................................................................................... 6
Network requirements.................................................................................................................... 6
Recommended network infrastructure.......................................................................................... 6
Setting up the hardware........................................................................................................................6
Installing the appliance in a rack..................................................................................................... 7
Setting the storage enclosure configuration switch...................................................................... 7
Connecting the storage enclosure to the system..........................................................................7
Connecting the Cable Management Arm (Optional).....................................................................9
Cabling the appliance......................................................................................................................9
Turning on the appliance................................................................................................................ 9
DL4300 disk configurations..................................................................................................................9
2 Initial software setup.......................................................................................... 11
AppAssure Appliance Configuration Wizard....................................................................................... 11
Configuring the network interface................................................................................................12
Configuring host name and domain settings............................................................................... 12
Configuring SNMP settings........................................................................................................... 13
Creating Windows and RASR virtual disk(s).................................................................................. 13
DL Appliance Configuration Wizard................................................................................................... 14
Configuring the network interface................................................................................................15
Registration and Host settings...................................................................................................... 16
Alerts and Monitoring.................................................................................................................... 16
Access and Management...............................................................................................................17
Configuring Windows backup ...................................................................................................... 17
Storage provisioning......................................................................................................................18
Configuring Retention policy and update options.......................................................................18
Recovery and Update Utility............................................................................................................... 20
Rapid Appliance Self Recovery........................................................................................................... 20
Creating the RASR USB key.......................................................................................................... 20
Executing RASR..............................................................................................................................21
Executing the RASR through the Internal Dual SD Module.........................................................22
Provisioning storage............................................................................................................................22
Configuring the DL4300 using fibre channel storage (optional)...................................................... 24
3
3 Post installation tasks........................................................................................ 25
Accessing the Core Console.............................................................................................................. 25
Updating trusted sites in Internet Explorer........................................................................................ 25
Configuring browsers to remotely access the Core Console...........................................................25
Configuring browser settings in Internet Explorer and Chrome.................................................26
Configuring browser settings in Firefox....................................................................................... 26
Reviewing retention periods...............................................................................................................26
Encrypting agent snapshot data......................................................................................................... 27
Configuring an email server and email notification template .......................................................... 27
Adjusting the number of streams....................................................................................................... 28
4 Preparing to protect your servers................................................................... 29
Overview..............................................................................................................................................29
Installing agents on clients................................................................................................................. 29
Deploying the agent software when protecting an agent.......................................................... 29
Installing the Rapid Recovery Agent software on Windows machines.......................................30
Deploying the Rapid Recovery Agent software to one or more machines................................ 32
About installing the Agent software on Linux machines................................................................... 35
Location of Linux Agent files.........................................................................................................37
Agent dependencies......................................................................................................................37
Installing the Rapid Recovery Agent software on Debian or Ubuntu......................................... 38
Installing the Rapid Recovery Agent software on SUSE Linux Enterprise Server........................39
Installing the agent on Red Hat Enterprise Linux and CentOS....................................................39
Installing the Agent software on offline Linux machines.................................................................. 40
Installing the Agent software on Windows Server Core Edition machines.................................41
Configuring the Rapid Recovery Agent on a Linux machine.......................................................41
Protecting a machine..........................................................................................................................43
Checking network connectivity....................................................................................................46
Checking the firewall settings...................................................................................................... 46
Verifying name resolution (if applicable)...................................................................................... 47
Teaming network adapters........................................................................................................... 47
5 Getting help.........................................................................................................49
Finding documentation and software updates..................................................................................49
Finding software updates................................................................................................................... 49
Contacting Dell................................................................................................................................... 49
Documentation feedback...................................................................................................................49
4
Setting up DL4300 Appliance
1
Introduction
The Dell DL4300 appliance is the latest generation of backup-to-disk appliance powered by Rapid
Recovery software. The appliance allows:
•
Scalable storage capabilities to support organizations of any size
•
Faster backups, as well as quicker recovery scenarios over conventional tape devices and backup
methodologies
•
Optional deduplication capability
•
Continuous data protection for data center and remote office servers
•
Quick and easy deployment experience that reduces the time required to begin protecting critical
data
•
Optional Fibre Channel configuration
Terms used in this document
The following table lists the terms used in this document to refer to various hardware and software
components of the DL4300 appliance.
Table 1. DL4300 Appliance hardware and software components
Component
Term Used
DL4300 Appliance
Appliance
Dell Storage MD1400 storage enclosure
Storage enclosure
Dell AppAssure Software
AppAssure
Rapid Recovery Software
Rapid Recovery
Available configurations
The DL appliance comes in two configurations: Standard Edition and High Capacity Edition.
Table 2. DL4300 Standard Edition capacity configurations
Capacity
Hardware Configuration
5 TB
12 x 1 TB drives, 4 x 1 TB internal drives
10–20 TB
12 x 2 TB drives, 4 x 2 TB internal drives
30–40 TB
12 x 4 TB drives, 4 x 4 TB internal drives
5
Capacity
Hardware Configuration
50–60 TB
12 x 6 TB drives, 4 x 6 TB internal drives
Table 3. DL4300 High Capacity Edition capacity configurations
Capacity
Hardware Configuration
40 TB, 50 TB, 60 TB, 70 TB, 80 TB, 90 TB, 100 TB,
110 TB, and 120 TB
12 x 6 TB drives, 4 x 6 TB internal drives
NOTE: Additional storage can be added through expansion shelves (Dell Storage MD1400).
Additional storage can be added to any model, however the Standard Edition has a maximum
capacity of 60 TB and the High Capacity Edition has a maximum capacity of 120 TB. Both editions
support up to four expansion shelves.
Each configuration includes the following hardware and software:
•
Dell DL4300 system
•
Dell PowerEdge RAID Controllers (PERC)
•
Preinstalled operating system and Dell OpenManage system and storage management software
•
AppAssure software
NOTE: If your appliance configuration does not include Dell Storage MD1400 storage enclosures,
ignore any references to Dell Storage MD1400 and storage enclosures in this document.
Installation prerequisites
Network requirements
Your Appliance requires the following network environment:
•
Active network with available Ethernet cables and connections
•
A static IP address and DNS server IP address, if not provided by the Dynamic Host Configuration
Protocol (DHCP)
•
User name and password with administrator privileges
Recommended network infrastructure
Dell recommends that organizations use a 1 GbE backbone for efficient performance for use with Rapid
Recovery and 10 GbE networks for extremely robust environments.
Setting up the hardware
The appliance ships with a single DL4300 system. Before setting up the appliance hardware, see the Dell
DL4300 Appliance Getting Started With Your System document that shipped with the appliance. Unpack
and set up the DL Appliance hardware.
NOTE: The software is pre-installed on the appliance. Any media included with the system must be
used only in the event of a system recovery.
6
To set up the DL Appliance hardware:
1.
Rack and cable the DL4300 system and storage enclosure(s).
2.
Turn on the storage enclosure(s) and then the DL4300 system.
Installing the appliance in a rack
If your system includes a rail kit, locate the Rack Installation Instructions supplied with the rack kit. Follow
the instructions to install the rails in the rack unit, the system, and the storage enclosure in the rack.
Setting the storage enclosure configuration switch
Set the storage mode for the storage enclosure to unified mode as indicated in the following figure.
NOTE: The configuration switch must be set before turning on the storage enclosure. Changing the
configuration mode after turning on the storage enclosure has no effect on enclosure configuration
until the system is power cycled. For more information, see the Dell Storage MD1400 Enclosures
Hardware Owner's Manual at Dell.com/support/home.
Figure 1. Setting the PowerVault MD1400 storage enclosure configuration switch
1.
configuration switch
Connecting the storage enclosure to the system
Connect the data cable from the PowerEdge RAID Controller (PERC) installed in the Dell DL4300 system
to the primary Enclosure Management Module (EMM) SAS port of the storage enclosure.
7
Figure 2. Connecting the DL4300 system to the MD1400 storage enclosure
Redundant port configuration
For redundant port configuration:
1.
Connect one end of each SAS cable to port 0 and port 1 on the DL4300 system PERC controller.
2.
Connect the other end of each SAS cable to port 1 on each Enclosure Management Module (EMM)
on the MD1400 storage enclosure.
Single port configuration
For single port configuration:
1.
Connect one end of the SAS cable to port 0 on the DL4300 system PERC controller.
2.
Connect the other end of the SAS cable to port 1 on the Enclosure Management Module (EMM) on
the MD1400 storage enclosure.
8
Multichain configuration
Figure 3. Multichain configuration
Multichain configuration supports up to four enclosures. The first two enclosures are daisy-chained with
one of the enclosures connected to a single port on the controller card. The other two enclosures are
daisy-chained with one of the enclosures connected to the second port on the controller card.
Connecting the Cable Management Arm (Optional)
If the appliance includes a Cable Management Arm (CMA), locate the CMA Installation Instructions that
shipped with the CMA kit and follow the instructions to install the CMA.
Cabling the appliance
Locate the Getting Started With Your System document at Dell.com/support/home that shipped with
your appliance. Follow the instructions to attach the keyboard, mouse, monitor, power, and network
cables to the appliance.
Turning on the appliance
After cabling the appliance, turn on the MD1400 storage enclosure, and then turn on the DL4300 system.
NOTE: It is recommended that you connect the appliance to an Uninterrupted Power Supply (UPS)
for maximum reliability and availability.
DL4300 disk configurations
The DL4300 supports both nearline SAS drives and SATA drives. The operating system resides on a RAID 1
(mirrored) virtual disk located in slots 12 and 13. For information on these disks, see the Dell DL4300
Appliance Owner’s Manual at Dell.com/support/home. Drives available in slots 0–11 and 14–17 are
available for automatic configuration by the AppAssure Appliance Configuration Wizard (recommended)
9
but can be manually configured for custom configurations if required. The disks are auto-provisioned as
RAID 6. Capacity expansion using an MD1400 storage enclosure is optional.
10
Initial software setup
2
When you turn on the appliance for the first time, and change the system password, the AppAssure
Appliance Configuration Wizard runs automatically.
1.
After you turn on the system, choose your operating system language from the Windows language
options.
The Microsoft EULA (End User License Agreement) is displayed on the Settings page.
2.
To accept the EULA, click I accept button.
A screen to change the administrator password is displayed.
3.
Click OK on the message that prompts you to change the administrator password.
4.
Enter and confirm the new password.
A message prompts you confirming that the password is changed.
5.
Click OK.
6.
From the Dell readme.htm screen, scroll down and click Proceed.
7.
Log on using the changed administrator password.
The Select the language for AppAssure Appliance screen is displayed.
8.
Select the language for your appliance from the list of supported languages.
The AppAssure Appliance Configuration Wizard welcome screen is displayed.
NOTE: The AppAssure Appliance Configuration Wizard may take up to 30 seconds to display on
the system console.
NOTE: Do not close the AppAssure Appliance Configuration Wizard until all the tasks have been
completed.
AppAssure Appliance Configuration Wizard
CAUTION: Make sure you complete all the steps of AppAssure Appliance Configuration Wizard
before performing any other task or change any settings on the Appliance. Do not make any
changes through the Control Panel, use Microsoft Windows Update, update AppAssure software
or install licenses, until the wizard is complete.
The AppAssure Appliance Configuration Wizard guides you through the following steps to configure the
software on the appliance.
•
Configuring the network Interface
•
Configuring host name and domain settings
•
Configuring SNMP settings
•
Creating Windows and RASR virtual disk(s)
On completing the installation using the wizard, the Core Console launches automatically.
11
Configuring the network interface
To configure the available network interfaces:
1.
On the AppAssure Appliance Configuration Wizard Welcome screen, click Next.
The network interfaces page displays the available connected network interfaces.
2.
Select the network interfaces that you want to configure.
NOTE: The AppAssure Appliance Configuration wizard configures network interfaces as
individual ports (non-teamed). To improve ingest performance, you can create a larger ingest
channel by teaming NICs. However, this must be done after the initial configuration of the
appliance.
3.
If required, connect additional network interfaces and click Refresh.
The additional connected network interfaces will be displayed.
4.
Click Next.
The Configure selected network interface page is displayed.
5.
Select the appropriate internet protocol for the selected interface.
You can choose IPv4 or IPv6.
The network details are displayed depending on the internet protocol you select.
6.
To assign the internet protocol details, do one of the following:
•
To assign the selected internet protocol details automatically, select Obtain an IPV4 address
automatically.
•
To assign the network connection manually, select Use the following IPv4 address and enter the
following details:
– IPv4 Address or IPv6 Address
– Subnet mask for IPv4 and Subnet prefix length for IPv6
7.
– Default Gateway
To assign the DNS server details, do one of the following:
•
To assign the DNS server address automatically, select Obtain DNS server address automatically.
•
To assign the DNS server manually, select Use the following DNS server address and enter the
following details:
– Preferred DNS sever
8.
– Alternate DNS server
Click Next.
The Configure hostname and domain setting page is displayed.
For information on NIC teaming, see Teaming Network Adapters.
Configuring host name and domain settings
You must assign a host name for the appliance. It is recommended that you change the host name
before starting backups. By default, the host name is the system name that the operating system assigns.
NOTE: If you plan to change the host name, it is recommended that you change the host name at
this stage. Changing the host name after completing the AppAssure Appliance Configuration
wizard requires manually performing several steps.
12
To configure the host name and domain settings:
1.
On the Configure host name and domain setting page, to change the host name for the appliance,
in New host name enter an appropriate host name.
2.
If you do not want the appliance to join a domain, select No in Do you want this appliance to join a
domain?
By default, Yes is selected.
3.
To join the appliance to a domain, enter the following details:
•
Domain name
•
Domain user name
NOTE: The domain user must have local administrative rights.
4.
• Domain user password
Click Next.
NOTE: Changing the host name or the domain requires restarting the machine. After restarting
the machine, the AppAssure Appliance Configuration wizard launches automatically. If the
appliance is joined to a domain, after restarting the machine, you must log in as a domain user
with administrative privileges on the appliance.
The Configure SNMP Settings page is displayed.
Configuring SNMP settings
Simple Network Management Protocol (SNMP) is a commonly used network management protocol that
allows SNMP-compatible management functions such as device discovery, monitoring, and event
generation. SNMP provides network management of the TCP/IP protocol.
To configure SNMP alerts for the appliance:
1.
On the Configure SNMP Settings page, select Configure SNMP on this appliance on the Configure
SNMP Settings page.
NOTE: Deselect Configure SNMP on this appliance if you do not want to set up SNMP details
and alerts on the appliance and skip to step 6.
2.
In Communities, enter one or more SNMP community names.
Use commas to separate multiple community names.
3.
In Accept SNMP packets from these hosts, enter the names of hosts with which the appliance can
communicate.
Separate the host names with commas, or leave blank to allow communication with all hosts.
4.
To configure SNMP alerts, enter the Community Name and the Trap destinations for the SNMP
alerts and click Add.
Repeat this step to add more SNMP addresses.
5.
To remove a configured SNMP address, in Configured SNMP addresses, select the appropriate SNMP
address and click Remove.
6.
Click Next.
The Create Windows and RASR virtual disk(s) page is displayed.
Creating Windows and RASR virtual disk(s)
The DL4300 system supports:
13
•
Two operating system drives, twelve data drives, and four internal hard drives
•
Option to create Logical Unit Numbers (LUNs) for the Bare Metal Restore (BMR) information to be
stored
•
Option to create separate space for the Windows backup RASR file.
To create optional virtual disk(s):
1.
Select the following virtual disks:
a. Windows Backup virtual disk
CAUTION: If you skipped this option in the AppAssure Appliance Configuration Wizard,
you will not be able to create a Windows Server backup and configure a backup policy.
Windows backup virtual disk provides the target space to create Windows Server backups. A disk
space of 75 GB is allocated by default for the Windows backup VD that is created and you cannot
increase the size of the Windows backup VD. Overtime, the data that is backed up may exceed 75
GB and if it does, you will not be able to perform backup or configure backup policy on the
Backup page and an out of capacity error is displayed. In this case, the Windows backup can be
reconfigured to a network share or to another disk volume on the Dl Appliance. For more
information, see Configure a Scheduled Shared Network Drive Backup Policy section in
Recovering a Dell™ DL Backup and Recovery Appliance using Rapid Appliance Self Recovery
(RASR) at Dell.com/supportmanuals.
b. Bootable RASR virtual disk
Bootable RASR virtual disk provides a redundant recovery volume to perform a RASR recovery.
You can reboot to the redundant recovery volume by pressing< F8> during POST. After
rebooting, follow the steps in Executing RASR.
2.
Click Next.
A thank you screen is displayed while the system is configuring. A Configuration complete message is
displayed.
3.
Click Exit.
The Core Console launches automatically.
4.
Continue the configuration process by Provisioning storage
DL Appliance Configuration Wizard
NOTE: You see the DL Appliance Configuration Wizard only when you upgrade your appliance
using the latest RUU.
CAUTION: Make sure you complete all the steps of DL Appliance Configuration Wizard before
performing any other task or change any settings on the Appliance. Do not make any changes
through the Control Panel, use Microsoft Windows Update, update Rapid Recovery software or
install licenses, until the wizard is complete. The Windows update service is disabled temporarily
during the configuration process. Exiting the DL Appliance Configuration Wizard before it is
complete may cause errors in system operation.
The DL Appliance Configuration wizard guides you through the following steps to configure the software
on the appliance:
•
Configuring the network Interface
•
Registration and Host settings
•
Alerts and Monitoring
14
•
Access and Management
•
Configuring Windows backup
•
Storage provisioning
•
Configuring Retention policy and update options
NOTE: After you complete the Appliance configuration, you can either skip the wizard or continue
performing Machine protection, Replication, Virtual Machine Exports/Standby. If you choose to
skip the wizard, the Core Console launches automatically and you can perform machine protection,
replication, and virtual machine Exports at the later stages.
For more information on performing machine protection, replication, and virtual machine Exports see
Rapid Recovery on DL Appliances User’s Guide at www.dell.com/support/home.
Configuring the network interface
To configure the available network interfaces:
1.
On the DL Appliance Configuration Wizard Welcome screen, click Next.
The License Agreement page is displayed.
2.
To accept the agreement, click I accept license agreement, and then click Next.
The Network Settings page displays the available connected network interfaces.
3.
If necessary, connect extra network interfaces and click Refresh.
The additional connected network interfaces are displayed.
4.
Select the appropriate network interfaces that are suitable for your environment.
You have the following options: IPV4 and IPV6.
The network details are displayed depending on the internet protocol you select.
5.
To enable IPV4, select Enable an IPv4 interface.
a. To assign the internet protocol details for IPV4 interface, do one of the following:
•
To assign the selected internet protocol details automatically, select Obtain an IPV4 address
automatically.
•
To assign the network connection manually, select Set manually IPV4 address and enter the
following details:
– IPv4 Address
– Subnet mask
6.
– Default Gateway
To enable IPV6, select Enable an IPv6 interface
a. To assign the internet protocol details for IPV6 interface, do one of the following:
•
To assign the selected internet protocol details automatically, select Obtain an IPV6 address
automatically.
•
To assign the network connection manually, select Set manually IPV6 address and enter the
following details:
– IPv6 Address
– Subnet prefix length
7.
– Default Gateway
To enable NIC teaming, select Enable NIC teaming.
For information on NIC teaming, see Teaming network adapters.
8.
Click Next.
15
The Registration page is displayed.
Registration and Host settings
Register your appliance with the appropriate license key to avail the features accordingly. It is
recommended that you change the host name before starting backups. By default, the host name is the
system name that the operating system assigns.
NOTE: If you want to change the host name, it is recommended that you change the host name at
this stage. Changing the host name after completing the DL Appliance Configuration wizard
requires you to perform several steps.
1.
On the Registration page, you must select one of the options below:
•
Register now– To register your appliance with the purchased license. Enter the following details:
license number in the License number text box and the valid email address in the Email
address text box
•
2.
Use trial license– To register your appliance with the trial license. The trial license expires in 30
days. To continue using the product without interruption, register your appliance within that
period.
Click next.
The Host Settings page is displayed.
3.
By default, the Host name of your appliance is displayed in the Host Name box. To change the host
name of your appliance, enter appropriate name in the Host Name text box.
4.
If you want to join your appliance to a domain, select Join this system to a domain check box and
specify the following information:
Otherwise, go to step 5.
NOTE: Joining to a domain is not possible on Windows Server 2012 R2 Foundation Edition. In
this case the Join this system to a domain check box is disabled).
5.
Text box
Description
Domain Address
Address of the domain to which you want to add your system
Domain
Administrator
Domain Administrator
Password
Password
Click Next.
The Alerts and Monitoring page is displayed.
Alerts and Monitoring
To enable alerts for both hardware and software changes you have two options — SNMP and SMTP.
Simple Network Management Protocol (SNMP) is a commonly used network management protocol that
allows SNMP-compatible management functions such as device discovery, monitoring, and event
generation. SNMP provides network management of the TCP/IP protocol. You can use Simple Network
Management Protocol (SNMP) or Simple Mail Transfer Protocol (SMTP) to set alerts and monitoring for
your appliance.
To receive notifications, configure the options here:
NOTE: It is recommended that you configure alerts. You also have the option to skip configuring
alerts, to skip configuring alerts go to step 3.
1.
16
You have the following options to enable alerts:
•
•
To enable system SNMP alerts, select Enable system SNMP alerts.
1.
In SNMP Community, enter one or more SNMP community names. Use commas to separate
multiple community names.
2.
In SNMP Trap destinations, enter trap destinations and click Add.
To enable software SNMP alerts, select Enable software SNMP alerts option.
1.
In SNMP Community, enter one or more SNMP community names. Use commas to separate
multiple community names.
2.
In SNMP Trap destinations, enter trap destinations and click Add.
2.
To set software alerts through email, select Notify via email option and enter the valid email address.
3.
Click Next.
The Access and Management page is displayed.
Access and Management
To access and manage your appliance, you must configure Access and Management settings.
To configure the access and management settings of your appliance:
1.
2.
3.
On the Access and Management page, select or deselect the following options to access and
manage your appliance through the following:
•
Enable Remote Desktop
•
Enable Windows Firewall
•
Enable IE Enhanced Security
•
Enable Windows Updates
• Use Proxy Server
If you select Use Proxy Server, enter the proxy address in the Proxy address text box and port
number in the Port text box.
NOTE: If you want to set the access and management setting to default options, click Reset to
Default button.
Click Next.
The Appliance Configuration Backup Options page is displayed.
Configuring Windows backup
NOTE: All DL flavors, except DL 1000 support Windows backup feature.
Appliance configuration backup options allows you to set the frequency at which your appliance
configuration is backed up. Windows backup data helps in recovering your appliance configuration
settings from any of the states before failure.
1.
On the Appliance Configuration Backup Options, select Perform Appliance configuration backup.
You have the following options: Daily, Weekly, and Monthly.
2.
To set the frequency for Windows backup, select one of the options:
Option
Description
Daily
Backs your configuration settings daily beginning at 12:01 AM
17
3.
Option
Description
Weekly
Backs your configuration settings every week beginning every Sunday at 12:01
AM
Monthly
Backs your configuration settings every month beginning every Sunday at
12:01 AM
Click Next.
The Storage Provisioning page is displayed.
Storage provisioning
Your appliance allows you to provision its internal storage to create Virtual disks (VDs) to host repositories
and Virtual Standby, archives or other purposes.
1.
On the Storage Provisioning page, select the following configuration options for your storage.
The Repository Name is displayed as Repository 1 by default.
NOTE: The size of the repository depends on the license applied during registration of your
appliance.
•
If you had applied trial license while registering your appliance there is no restriction in the
repository size.
•
If you had applied purchased license while registering your appliance, the size of the
repository corresponds to the model. For example: In DL 4300 5 TB Appliance, repository of
size 5 TB is created. You have an option to expand the repository from the Provisioning
page, by applying the expansion license, for more information see Rapid Recovery 6.0 on
DL Appliance User’s Guide
•
2.
3.
If you had applied the purchased expansion license, the size of the repository corresponds
to the applied license. For example: In DL43005 TB appliance, if the purchased license (N
TB) is applied during registration, the repository of size 5+N TB is created.
Select Allocate a portion of your storage for Virtual Standby, archives, or other purposes.
Allocate the percentage of storage space that is available after creating the repository by using the
slider. You can also use Size box to specify the exact size.
A virtual disk of specified capacity for hosting virtual standby VMs, archives, other purpose is created.
4.
Click Next.
The initial repository is created and the VDs for hosting VMs or other purposes are created.
The Retention Policy page is displayed.
Configuring Retention policy and update options
Retention policies enforce the periods of time in which backups are stored on short-term (fast and
expensive) media. Sometimes certain business and technical requirements mandate extended retention
of these backups, but use of fast storage is cost prohibitive. In your appliance, retention policies can be
customized to specify the length of time a backup recovery point is maintained. As the age of the
recovery points approaches the end of their retention period, the recovery points age out and are
removed from the retention pool.
1.
18
The following options let you define the length of time the backup snapshots of protected machines
are stored and modify the rollup process of merging and deleting old backups. The Retention Policy
page displays the following options:
Table 4. Schedule options for default retention policy
Text Box
Description
Keep all recovery
points for n [retention
time period]
Enter a number to represent the retention period and then select the time
period. The default is 3 days.
Specifies the retention period for the recovery points.
You can choose from: Days, Weeks, Months, or Years
…and then keep one
recovery point per hour
for n [retention time
period]
Provides a more granular level of retention. It is used as a building block
with the primary setting to further define how long recovery points are
maintained.
Enter a number to represent the retention period and then select the time
period. The default is 2 days.
You can choose from: Days, Weeks, Months, or Years
…and then keep one
recovery point per day
for n [retention time
period]
Provides a more granular level of retention. It is used as a building block to
further define how long recovery points are maintained.
Enter a number to represent the retention period and then select the time
period. The default is 4 days.
You can choose from: Days, Weeks, Months, or Years
…and then keep one
recovery point per
week for n [retention
time period]
Provides a more granular level of retention. It is used as a building block to
further define how long recovery points are maintained.
Enter a number to represent the retention period and then select the time
period. The default is 3 weeks.
You can choose from: Weeks, Months, or Years
…and then keep one
recovery point per
month for n [retention
time period]
Provides a more granular level of retention. It is used as a building block to
further define how long recovery points are maintained.
Enter a number to represent the retention period and then select the time
period. The default is 2 months.
You can choose from: Months or Years
…and then keep one
Enter a number to represent the retention period and then select the time
recovery point per year period.
for n [retention time
You can choose from: Years
period]
2.
Click Next.
The Update Options page is displayed.
3.
To check for appliance software update, select Check for appliance software update option.
If an update exists, it is downloaded and installed upon completion of the wizard.
4.
To enable Rapid Recovery Core updates, select Enable Rapid Recovery Core updates and then
select one of the options below:
•
5.
Notify about updates, but don not install them automatically
• Automatically install updates
Click Finish
19
The appliance settings are applied.
Recovery and Update Utility
The Recovery and Update Utility (RUU) is an all-in-one installer to recover and update DL Appliances
(DL1000, DL1300, DL4000 and DL4300) software. It includes the Rapid Recovery Core software and
appliance-specific components.
RUU consists of updated versions of the Windows Server Roles and Features, .Net 4.5.2, LSI Provider, DL
Applications, OpenManage Server Administrator and Rapid Recovery Core Software. In addition, the
Recovery and Update Utility also updates the Rapid Appliance Self Recovery (RASR) content.
NOTE: If you are currently using any of the AppAssure Core versions, Rapid Recovery Core version
6.0.2.144 or earlier, RUU forces an update to the most recent version available in the Payload. It is
not possible to skip the update and this update is not revertible. If you do not want to upgrade the
Core software, do not run the RUU.
To install the most recent version of the RUU:
1.
Go to the License Portal under the Downloads section or go to support.dell.com and download the
RUU installer.
2.
To start the RUU process, run launchRUU.exe file in the RUU package.
NOTE: Your system may reboot during the RUU update process.
Rapid Appliance Self Recovery
Rapid Appliance Self Recovery (RASR) is a bare metal restore process that quickly restores your Appliance
to an operating state.
RASR offers two recovery options:
•
Restore factory settings
•
Recover your appliance to a state just before failure (OS, configurations, and settings are recovered)
Creating the RASR USB key
To create a RASR USB key:
1.
Navigate to the Appliance tab.
2.
Using the left pane navigation, select Appliance → Backup.
Create RASR USB Drive window is displayed.
NOTE: Insert a 16 GB or larger USB key before attempting to create the RASR key.
3.
After inserting a 16 GB or larger USB key, click on Create RASR USB Drive now.
A Prerequisite Check message is displayed.
After the prerequisites are checked, Create the RASR USB Drive window displays the minimum size
required to create the USB drive and List of Possible target paths.
4.
Select the target and click Create.
A warning dialog box is displayed.
5.
20
Click Yes.
The RASR USB Drive key is created.
6.
NOTE: Make sure to use the Windows Eject Drive function to prepare the USB key for removal.
Otherwise, the content in the USB key may be damaged and the USB key doesn’t work as
expected.
Remove the RASR USB key created for each DL Appliance, label, and store for future use.
Executing RASR
NOTE: Dell recommends you to create a RASR USB key after you have set up the appliance. To
create RASR USB key, see Creating the RASR USB Key section.
NOTE: Ensure that you have the latest RUU available and reachable on your appliance.
.
NOTE: To perform system recovery using RASR, see Recovering a Dell™ DL Backup and Recovery
Appliance using Rapid Appliance Self Recovery (RASR) document at Dell.com/support/home.
To perform a factory reset:
1.
Insert the RASR USB key created.
2.
Restart the appliance and select Boot Manager (F11).
3.
In the Boot Manager Main Menu, select One-shot BIOS Boot Menu.
4.
In the Boot Manager Boot Menu, select the attached USB drive.
5.
Select your keyboard layout.
6.
Click Troubleshoot → Rapid Appliance Self Recovery.
7.
Select the target operating system (OS).
RASR is launched and welcome screen is displayed.
8.
Click Next.
The Prerequisites check screen is displayed.
NOTE: Ensure all the hardware and other prerequisites are checked before performing the
RASR.
9.
Click Next.
The Recovery Mode Selection screen is displayed with three options:
•
System Recovery
•
Windows Recovery Wizard
•
Factory Reset
10. Select the Factory Reset option.
This option will recover the operating system disk from the factory image.
11. Click Next.
The following warning message is displayed in a dialog box: This operation will recover the
operating system. All OS disk data will be overwritten.
12. Click Yes.
The operating system disk starts restoring back to factory reset.
13. The RASR Completed page is displayed on completion of the recovery process. Click Finish.
14. Boot the system after restore.
15.
NOTE: Continue further only if you see the AppAssure Appliance Configuration Wizard,
otherwise go to Step 17.
21
Wait for AppAssure Appliance Configuration Wizard to load, you need to close it. Close the wizard
using the Windows Task Manager.
16. Run launchRUU.exe file in the RUU package. Follow the instructions and select the option to
continue with RUU installation and complete the RUU installation.
17. The DL Appliance Configuration Wizard launches and will guide you through the rest of the restore
process.
Your appliance operates normally now.
Executing the RASR through the Internal Dual SD Module
Your system is shipped with an Internal dual SD module and an SD card of 16 GB capacity.
To execute the RASR using the Internal Dual SD module (IDSDM):
1.
Reboot the appliance through the IDSDM.
CAUTION: Make sure that the SD Card is inserted in slot 1.
The following message is displayed.
The secondary SD card is missing, not responding, or in write-protected
mode. Do one of the following: 1) Install a SD card media in the secondary
SD card reader. 2) Reseat or replace the SD card media.3) If writeprotected mode is expected, then no respose action is required.
Ignore the above message.
2.
To continue executing the RASR through the Internal SD Module, perform step 5 through step 13 of
the Executing the RASR through RASR USB key section.
Provisioning storage
The appliance configures available internal storage and any attached supported external storage
enclosures for:
•
Repositories
NOTE: If fibre channel HBA is configured then the process of creating the repositories is manual.
Rapid Recovery will not create a repository automatically in the root directory. For more
information, see Configuring the DL4300 using fibre channel storage (optional) section.
•
\
Disk volumes for standby VMs or any other purpose
NOTE: MD1400s with 1 TB, 2 TB, 4 TB or 6 TB (for high capacity) drives connected to the H830
controller are supported. Up to four MD 1400s are supported.
NOTE: The DL4300 high-capacity configuration supports either H830 PERC SAS adapter or two
Fibre Channel HBAs. For more information on configuring fibre channel HBAs, see the DL4xxx —
Fibre Channel Implementation whitepaper located at Dell.com/support/home.
Before you begin provisioning storage on the disk, determine how much storage you want to allocate for
standby virtual machines. You can allocate any percentage of the available capacity remaining after
creating the Rapid Recovery repository to host standby virtual machines. For example, if you are using
Storage Resource Management (SRM), you can allocate up to 100 percent capacity of the storage
remaining after creating the Rapid Recovery repository. Space can be allocated for standby VMs only on
the appliances that are provisioned to host virtual machines. Using the Rapid Recovery’s Live Recovery
feature, you can use these virtual machines to quickly replace a failed server that the appliance protects.
22
Based on a medium-sized environment that does not need standby virtual machines, you can use all of
the storage to back up a significant number of agents. However, if you need more resources for standby
virtual machines and back up a smaller number of agent machines, you can allocate more resources for
larger VMs.
When you select the Appliance → Provisioning tab, the Rapid Recovery Appliance software locates the
available storage space for all supported controllers in the system and validates that the hardware meets
the requirements.
To complete disk provisioning for all available storage:
1.
Click Appliance → Provisioning.
The Provisioning screen displays the Repositories and Storage Volumes sections.
CAUTION: Before proceeding ensure Step 2 through Step 4 is followed in this procedure.
2.
Provision available storage to create:
•
3.
Repository
• Disk volumes for standby VMs or any other purpose
To create a repository:
a. On the provisioning page, in the Repositories section, click Add New Repository
The Add New Repository dialog box appears.
b. Enter the information as described in the following table.
Table 5. Provisioning storage
Text Box
Repository Name
Description
Enter the display name of the repository.
By default, this text box consists of the word Repository and a
number, which corresponds to the number of repositories for this
Core. For example, if this is the second repository, the default name
is Repository 2. Change the name as needed.
Repository names must contain between 1 and 40 alphanumeric
characters, including spaces. Do not use prohibited characters or
prohibited phrases . For more information, see the topics ‘prohibited
characters’ or ‘prohibited phrases’ in the Dell Data Protection | Rapid
Recovery 6.0 User Guide.
Controller
Select the appropriate storage controller depending on whether you
are creating repository on internal storage or on direct-attached
storage enclosure.
Enclosure
Select the appropriate storage enclosure.
RAID type
Select the appropriate RAID level. You have the following options for
RAID configuration: 1, 5, or 6.
23
Text Box
Description
NOTE: Your system allows you to create repository only in the
RAID levels in which the storage is configured and as available
out of factory. To create repository in desired RAID
configuration, you must configure your storage in the desired
RAID level. To configure storage in the desired RAID level, see
Dell Adapters documentation at www.dell.com/support/home.
Estimated capacity
Displays the estimated capacity available for creating a repository.
Controller available
space
Displays the available space on the controller.
Size
Enter the size of the repository.
c. Click Create.
A new repository is created.
4.
To create disk volumes for standby VM or any other purpose:
a. In the Storage Volume section, click Create Volume.
b. In the Create Volume dialog box, specify the following information for a new disk volume
Volume name, Controller, Enclosure, RAID type, and Size.
The Controller available space is displayed by default. You can select one of the following RAID
configurations: 1, 5, or 6.
c. Click Create.
A new storage volume is created.
Configuring the DL4300 using fibre channel storage
(optional)
The DL4300 high-capacity edition offers a fibre channel HBA storage option allowing for creation of
repositories using fibre channel storage arrays.
NOTE: If the fibre channel configuration is ordered it will replace the slotted H830 PERC SAS
adapter.
NOTE: For prerequisites, assumptions, and detailed information on the following steps, see the
DL4xxx — Fibre Channel Implementation whitepaper located at dell.com/support/home.
To integrate and configure the DL4300 using the fibre channel storage:
1.
Connect the DL4300 fibre channel HBA to a SAN switch.
2.
Install either the Qlogic or the Emulex HBAs management software for any adapter that was ordered
with the system.
3.
Install the storage array multi-path software.
4.
Perform the fibre channel zoning.
5.
Create a fibre channel LUN to be assigned and used as a DL4300 repository.
6.
Mount the fibre channel storage LUN.
7.
Configure the DL4300 fibre channel storage as a backup repository.
24
Post installation tasks
3
After completing the DL Appliance Configuration Wizard perform the following procedures to ensure
that your backup appliance and the servers that the appliance is backing up are correctly configured.
NOTE: The appliance is configured with a 30–day temporary Rapid Recovery software license. To
obtain a permanent license key, log on to the Dell AppAssure License Portal at www.dell.com/
DLActivation. For details on changing a license key in the Rapid Recovery software, see the Dell
Data Protection | Rapid Recovery License Portal User Guide.
Accessing the Core Console
Ensure that you update trusted sites as discussed in the topic Update Trusted Sites In Internet Explorer,
and configure your browsers as discussed in the topic Configuring Browsers To Remotely Access The
Core Console. After you update trusted sites in Internet Explorer, and configure your browsers, perform
one of the following to access the Core Console:
•
•
Log on locally to your Rapid Recovery core server, and then double-click the Core Console icon.
Type one of the following URLs in your web browser:
– https://<yourCoreServerName>:8006/apprecovery/admin/core
– https://<yourCoreServerIPaddress>:8006/apprecovery/admin/core
Updating trusted sites in Internet Explorer
To update the trusted sites in Internet Explorer:
1.
Open Internet Explorer.
2.
If the File, Edit View, and other menus are not displayed, press <F10>.
3.
Click the Tools menu, and select Internet Options.
4.
In the Internet Options window, click the Security tab.
5.
Click Trusted Sites and then click Sites.
6.
In Add this website to the zone, enter https://[Display Name], using the new name you provided for
the Display Name.
7.
Click Add.
8.
In Add this website to the zone, enter about:blank.
9.
Click Add.
10. Click Close and then OK.
Configuring browsers to remotely access the Core
Console
To access the Core Console from a remote machine, you need to modify your browser settings.
25
NOTE: To modify the browser settings, log in to the system as an administrator.
NOTE: Google Chrome uses Microsoft Internet Explorer settings, change Chrome browser settings
using Internet Explorer.
NOTE: Ensure that the Internet Explorer Enhanced Security Configuration is turned on when you
access the Core Web Console either locally or remotely. To turn on the Internet Explorer
Enhanced Security Configuration:
1.
Open Server Manager.
2.
Select Local Server IE Enhanced Security Configuration displayed on the right. Ensure that it is
On.
Configuring browser settings in Internet Explorer and Chrome
To configure browser settings in Internet Explorer and Chrome:
1.
From the Internet Options screen, select the Security tab.
2.
Click Trusted Sites and then click Sites.
3.
Deselect the option Require server verification (https:) for all sites in the zone, and then add
http://<hostname or IP Address of the Appliance server hosting the Rapid Recovery Core> to Trusted
Sites.
4.
Click Close, select Trusted Sites, and then click Custom Level.
5.
Scroll to Miscellaneous → Display Mixed Content and select Enable.
6.
Scroll to the bottom of the screen to User Authentication → Logon, and then select Automatic
logon with current user name and password.
7.
Click OK, and then select the Advanced tab.
8.
Scroll to Multimedia and select Play animations in webpages.
9.
Scroll to Security, check Enable Integrated Windows Authentication, and then click OK.
Configuring browser settings in Firefox
To modify browser settings in Firefox:
1.
In the Firefox address bar, type about:config, and then click I’ll be careful, I promise if prompted.
2.
Search for the term ntlm.
The search should return at least three results.
3.
4.
Double-click network.automatic-ntlm-auth.trusted-uris and enter the following setting as
appropriate for your machine:
•
For local machines, enter the host name.
•
For remote machines, enter the host name or IP address separated by a comma of the appliance
system hosting the Core; for example, IP Address, host name.
Restart Firefox.
Reviewing retention periods
Rapid Recovery sets default retention periods that determine how often snapshots are taken and how
long the snapshots are retained. The retention periods must be based on the needs of your environment.
For example, if you are backing up servers that run frequently changing, mission-critical data that is
essential for business continuity, snapshots must be taken frequently.
26
To review and change retention periods:
1.
Open the Core Console.
2.
Select the Configuration tab and then click Retention Policy.
3.
Adjust the retention policy based on the needs of your organization.
4.
Click Apply.
Encrypting agent snapshot data
The Core can encrypt agent snapshot data within the repository. Instead of encrypting the entire
repository, it allows you to specify an encryption key during the protection of an agent in a repository
which allows the keys to be reused for different agents.
To encrypt agent snapshot data:
1.
From the AppAssure Core, click Configuration → Manage → Security.
2.
Click Actions, and then click Add Encryption Key.
The Create Encryption Key page is displayed.
3.
Complete the following information:
Field
Description
Name
Enter a name for the encryption key.
Comment
Enter a comment for the encryption key. It is used to provide extra details
about the encryption key.
Passphrase
Enter a passphrase. It is used to control access.
Confirm
Passphrase
Re-enter the passphrase. It is used to confirm the passphrase entry.
NOTE: It is recommended that you record the encryption passphrase, as losing the passphrase
makes the data inaccessible.
Configuring an email server and email notification
template
If you want to receive email notifications about events, configure an email server and an email
notification template.
NOTE: You must also configure notification group settings, including enabling the Notify by email
option, before email alert messages will be sent. For more information on specifying events to
receive email alerts, see 'Configuring Notification Groups For System Events' in Dell DL4300
Appliance User’s Guide.
To configure an email server and email notification template:
1.
From the Core, select the Configuration tab.
2.
From the Manage option, click Events.
3.
In the Email SMTP Settings pane, click Change.
The Edit Email Notification Configuration dialog box appears.
4.
Select Enable Email Notifications, and then enter details for the email server described as follows:
27
Text Box
Description
SMTP Server
Enter the name of the email server to be used by the email notification
template. The naming convention includes the host name, domain, and suffix;
for example, smtp.gmail.com.
Port
Enter a port number. It is used to identify the port for the email server; for
example, the port 587 for Gmail.
The default is 25.
Timeout (seconds) To specify how long to try a connection before timing out, enter an integer
value. It is used to establish the time in seconds when trying to connect to the
email server before a time-out occurs.
The default is 30 seconds.
TLS
Select this option if the mail server uses a secure connection such as Transport
Layer Security (TLS) or Secure Sockets Layer (SSL).
Username
Enter a user name for the email server.
Password
Enter a password for accessing the email server.
From
Enter a return email address. It is used to specify the return email address for
the email notification template; for example, [email protected]
Email Subject
Enter a subject for the email template. It is used to define the subject of the
email notification template; for example, <hostname> - <level> <name>.
Email
Enter information for the body of the template that describes the event, when
it occurred, and the severity.
5.
Click Send Test Email and review the results.
6.
After you are satisfied with the results of the tests, click OK.
Adjusting the number of streams
By default, Rapid Recovery is configured to allow three concurrent streams to the appliance. It is
recommended that the number of streams is set between 10 and 15 for optimal performance.
To change the number of concurrent streams:
1.
Select the Configuration tab and then click Settings.
2.
Select change in Transfer Queue.
3.
Change Maximum Concurrent Transfers to a number between 10 and 15 for optimal performance,
but if the performance seems unsatisfactory, try tuning it manually.
28
Preparing to protect your servers
4
Overview
To protect your data using DL 4300, you need to add the workstations and servers for protection in the
Core Console; for example, your Exchange server, SQL Server, your Linux server, and so on.
In the Core Console, you can identify the machine on which an Agent is installed and specify which
volumes, for example, a Microsoft Windows Storage Space, to protect. You can define the schedules for
protection, add additional security measures such as encryption, and much more. For more information
on how to access the Core Console to protect workstations and servers, see Protecting a machine.
Installing agents on clients
Each client that is backed up by the DL 4300 appliance must have the Rapid Recovery agent installed.
The Rapid Recovery Core console enables you to deploy agents to machines. Deploying agents to
machines requires pre-configuring settings to select a single type of agent to push to clients. This
method works well if all clients are running the same operating system. However, if there are different
versions of operating systems, you may find it easier to install the agents on the machines.
You can also deploy the Agent software to the agent machine during the process of protecting a
machine. This option is available for machines that do not already have the Agent software installed. For
more information on deploying the Agent software while protecting a machine, see the Rapid Recovery
on DL Appliance User’s Guide at Dell.com/support/home.
Deploying the agent software when protecting an agent
You can download and deploy agents during the process of adding an agent for protection.
NOTE: This procedure is not required if you have already installed the Agent software on a machine
that you want to protect.
If the Agent software is not installed prior to protecting a machine, you will not be able to select
specific volumes for protection as part of this wizard. In this case, by default, all volumes on the
agent machine will be included for protection.
Rapid Recovery supports the protection and recovery of machines configured with EISA partitions.
Support is also extended to Windows 8 and 8.1, and Windows 2012 and 2012 R2 machines that use
Windows Recovery Environment (Windows RE).
1.
Do one of the following:
•
If you are starting from the Protect Machine Wizard, proceed to Step 2 . .
•
If you are starting from the Rapid Recovery Core Console, from the button bar, click Protect.
29
The Protect Machine Wizard appears.
2.
On the Welcome page, select the appropriate installation options:
•
•
3.
If you do not need to define a repository or establish encryption, select Typical.
If you need to create a repository, or define a different repository for backups for the selected
machine, or if you want to establish encryption using the wizard, select Advanced (show optional
steps).
• Optionally, if you do not wish to see the Welcome page for the Protect Machine Wizard in the
future, select the option Skip this Welcome page the next time the wizard opens.
When you are satisfied with your choices on the Welcome page, then click Next.
The Connection page appears.
4.
On the Connection page, enter the information about the machine to which you want to connect as
described in the following table, and then click Next.
Table 6. Machine connection settings
Text Box
Description
Host
The host name or IP address of the machine that you want to protect.
Port
The port number on which the Rapid Recovery Core communicates with the
Agent on the machine.
The default port number is 8006.
User name
The user name used to connect to this machine; for example, Administrator (or, if
the machine is in a domain, [domain name]\Administrator).
Password
The password used to connect to this machine.
If the Install Agent page appears next in the Protect Machine Wizard, that means that Rapid Recovery
does not detect the Rapid Recovery Agent on the machine and will install the current version of the
software.
5.
NOTE: The Agent software must be installed on the machine you want to protect, and that
machine must be restarted, before it can back up to the Core. To have the installer reboot the
protected machine, select the option After installation, restart the machine automatically
(recommended) before clicking Next.
Click Next.
Installing the Rapid Recovery Agent software on Windows machines
Deploy the Rapid Recovery Agent installer file to the machine you want to protect using one of the
methods described in the topic “Installing the Rapid Recovery Agent software” in the Dell Data Protection
| Rapid Recovery 6.0 Installation and Upgrade Guide. Then launch the installer program as described
below to install or upgrade the software on each Windows machine you want to protect in the Rapid
Recovery Core.
NOTE: You must run the installer with local administrator privileges.
1.
From the machine you want to protect, double-click on the executable Rapid Recovery Agent
installer file to start the installer.
Depending on the configuration of your machine, the User Account Control window or the Open
File - Security Warning window could appear.
2.
30
If prompted for permission, confirm that you want to run the installer and make changes to the
system.
3.
If .NET components are missing or need to be upgraded, accept the prompts to download and install
the framework.
4.
In the language field, select the appropriate language and then click OK.
5.
Choose from one of the following:
•
If this is the first time the Rapid Recovery Agent software is being installed on this machine, the
installer prepares the installation, and then the Rapid Recovery Agent Installation Wizard appears.
Proceed to Step 6.
•
If this machine has an earlier version of the AppAssure Agent or Rapid Recovery Agent software
installed, you will see a message asking if you want to upgrade to the current version.
1.
Click Yes.
The Rapid Recovery Agent Installation Wizard appears, showing the Progress page of the
wizard. The application downloads to the destination folder, with progress displayed in the
progress bar. When finished, the wizard automatically advances to the Completed page.
6.
2. Skip to Step 12.
In the Rapid Recovery Agent Installation Wizard, on the Welcome page, click Next to continue with
the installation.
The License Agreement page appears.
7.
On the License Agreement page, click I accept the terms in the license agreement, and then click
Next.
The Prerequisites page appears.
8.
The Rapid Recovery Agent Installer verifies the existence of the prerequisite files.
•
If the prerequisite files exist, a message appears indicating that all prerequisites are installed on
the machine.
•
9.
If the prerequisite files do not exist, the Rapid Recovery Agent Installer identifies which files are
needed and displays the results accordingly; for example, CRT 2013 (x64) ENU (distributable code
for Microsoft Visual Studio®), or Microsoft System CLR Types for SQL Server 2008 R2 (x64). Click
Install Prerequisites.
When the installation of the prerequisite files is completed, click Next.
The Installation Options page appears.
10. On the Installation Options page, review the installation options. If necessary, modify them as
described below.
•
In the Destination Folder text field, review the destination folder for the installation. If you want
to change the location, do the following:
– Click the folder icon.
– In the Browse to Destination Folder dialog box, select a new location.
– Click OK.
•
In the Port Number text field, enter a port number to use for communication between the Agent
software on the protected machine and the Rapid Recovery Core.
NOTE: The default value is 8006. If you change the port number, be sure to make note of it
in the event that you need to adjust configuration settings at a later time.
•
Select Allow Agent to automatically send diagnostic and usage information to Dell Inc. to send
diagnostic and usage information to Dell. If you do not want to send this information, clear this
option.
11. Once you are satisfied with the installation options, click Install.
The Progress page appears, and includes a status bar that lets you monitor the progress of the
installation.
31
When the installation is complete, the Completed page appears. Skip to Step 12. .
12. On the Completed page, if you see a message indicating that the system must be restarted before
the installation takes effect, perform one of the following steps:
•
To restart now, select Yes, I want to restart my computer now.
• To restart later, clear the Yes, I want to restart my computer now option.
13. On the Completed page, click Finish.
The installer wizard closes, and the Agent installation is complete.
Deploying the Rapid Recovery Agent software to one or more machines
You can simplify the task of deploying the Rapid Recovery Agent software to one or more Windows
machines by using the Deploy Agent Software Wizard.
NOTE: In the past, this feature was referred to as "bulk deploy."
When you use the Deploy Agent Software Wizard, Rapid Recovery can automatically detect machines on
a host and let you select the machines to which you want to deploy. For machines on domains or hosts
other than Active Directory or vCenter or ESX(i), you can manually connect to individual machines by
using their IP addresses and the appropriate credentials. You can also push upgrades of the software to
machines that the local Rapid Recovery Core already protects.
From within the Core Console, you can complete any of the following tasks:
•
Deploying to machines on an Active Directory domain
•
Deploying to machines on a VMware vCenter/ESX(i) virtual host
NOTE: Dell recommends limiting the number of machines to which you deploy simultaneously to
50 or fewer, to preclude experiencing resource constraints that may cause the deploy operation to
fail.
Installing Microsoft Windows agents at the client
To install the agents:
1.
Verify that the client has the Microsoft .NET 4 framework installed:
a. On the client, start the Windows Server Manager.
b. Click Configuration → Services.
c. Ensure that Microsoft .NET Framework appears in the list of services.
If it is not installed, you can get a copy from microsoft.com.
2.
Install the agent:
a. On your appliance, share the directory C:\Program Files\AppRecovery to the client(s) you plan to
back up.
b. On the client system, map a drive to C:\Program Files\AppRecovery on your DL appliance.
c. On the client system, open the C:\Program Files\AppRecovery directory and double-click the
correct agent for the client system to begin the installation.
32
Deploying to machines on an Active Directory domain
Use this procedure to simultaneously deploy the Rapid Recovery Agent software to one or more
machines on an Active Directory domain.
Before you begin this procedure, have the domain information and logon credentials for the Active
Directory server on hand.
1.
On the Rapid Recovery Core Console, click the Protect drop-down menu, and then click Deploy
Agent Software.
The Deploy Agent Software Wizard opens.
2.
3.
On the Connection page of the wizard, from the Source drop-down list, select Active Directory.
Enter the domain information and logon credentials as described in the following table.
Table 7. Domain information and credentials
Text Box
Description
Host
The host name or IP address of the Active Directory domain.
User name
The user name used to connect to the domain; for example, Administrator or, if
the machine is in a domain, [domain name]\Administrator).
Password
The secure password used to connect to the domain.
4.
Click Next.
5.
On the Machines page, select the machines to which you want to deploy the Rapid Recovery Agent
software.
6.
Optionally, to automatically restart the protected machines after the Agent is installed, select After
Agent installation, restart the machines automatically (Recommended).
7.
Click Finish.
The system automatically verifies each machine that you selected.
If Rapid Recovery detects any concerns during automatic verification, the wizard progresses to a
Warnings page, where you can clear machines from selection and manually verify the selected
machines. If the machines you added pass the automatic verification, they appear on the Deploy
Agent to Machines pane.
8.
If the Warning page appeared and you are still satisfied with your selections, click Finish again.
The Rapid Recovery Agent software deploys to the specified machines. The machines are not yet
protected. To protect machines, see the topic “Protecting multiple machines on the Active Directory
domain” in the Rapid Recovery 6.0 on DL Appliances User’s Guide.
Deploying to machines on a VMware vCenter/ESX(i) virtual host
Use this procedure to simultaneously deploy the Rapid Recovery Agent software to one or more
machines on a VMware vCenter/ESX(i) virtual host.
Before starting this procedure, you must have the following information:
•
Logon credentials for the VMware vCenter/ESX(i) virtual host.
•
Host location.
•
Logon credentials for each machine you want to protect.
33
NOTE: All virtual machines must have VMware Tools installed; otherwise, Rapid Recovery cannot
detect the host name of the virtual machine to which to deploy. In lieu of the host name, Rapid
Recovery uses the virtual machine name, which may cause issues if the host name is different from
the virtual machine name.
1.
On the Rapid Recovery Core Console, click the Protect drop-down menu, and then click Deploy
Agent Software.
The Deploy Agent Software Wizard opens.
2.
On the Connection page of the wizard, from the Source drop-down list, select vCenter / ESX(i).
3.
Enter the host information and logon credentials as described in the following table.
Table 8. vCenter/ESX(i) connection settings
Text Box
Description
Host
The name or IP address of the VMware vCenter Server/ESX(i) virtual host.
Port
The port used to connect to the virtual host.
The default setting is 443.
User name
The user name used to connect to the virtual host; for example, Administrator or, if
the machine is in a domain, [domain name]\Administrator.
Password
The secure password used to connect to this virtual host.
4.
Click Next.
5.
On the Machines page of the wizard, select one of the following options from the drop-down menu:
•
6.
Hosts and Clusters
• VMs and Templates
Expand the list of machines, and then select the VMs to which you want to deploy the software.
A notification appears if Rapid Recovery detects that a machine is offline or that VMware Tools are
not installed.
7.
If you want to restart the machines automatically after deployment, select After Agent installation,
restart the machines automatically (Recommended).
8.
Click Next.
Rapid Recovery automatically verifies each machine you selected.
9.
On the Adjustments page of the wizard, enter the credentials for each machine in the following
format: hostname::username::password.
NOTE: Enter one machine on each line.
10. Click Finish.
The system automatically verifies each machine that you selected.
If Rapid Recovery detects any concerns during automatic verification, the wizard progresses to a
Warnings page, where you can clear machines from selection and manually verify the selected
machines. If the machines you added pass the automatic verification, they appear on the Deploy
Agent to Machines pane.
11. If the Warning page appeared and you are still satisfied with your selections, click Finish again.
The Rapid Recovery Agent software deploys to the specified machines.
34
About installing the Agent software on Linux machines
When installing the Agent software on Linux machines that you want to protect, use the following
guidance. After installation is complete, configure the Agent as described in the topic “Configuring the
Rapid Recovery Agent on a Linux machine” in the Dell Data Protection | Rapid Recovery 6.0 Installation
and Upgrade Guide.
CAUTION: After configuring the newly installed Agent software on a Linux machine, restart the
machine. Restarting ensures that the proper kernel driver version is used to protect your
machine.
The method for installing and removing the Agent software on Linux machines has changed. As of
release 6.0.1, the following factors apply:
•
One set of instructions applies to installations of Agent on a Linux machine with current access to the
Internet. This is referred to as online installation. Instead of using shell scripts, package managers are
used to install or remove the Rapid Recovery software from a repository referenced on the local Linux
machine.
NOTE: The repository is used for staging of files for the relevant package managers. This
repository is not related to the Rapid Recovery repository.
•
If installing Agent on a Linux machine with no access to the Internet (such as an air-gapped or
secured standalone machine), this is referred to as offline installation. For this process, you must first
download an installation package from a Linux machine with Internet access, and then move those
installation files to the secured computer for installation.
Because the various supported Linux distributions use different package managers for online installation,
the procedure for installing, upgrading, or removing Agent on any supported Linux OS depends on the
package manager used. The package managers, and the Linux distributions they support, are described in
the following table.
Table 9. Package managers and the Linux distributions they support
Package
Manager
Linux Distribution
yum
Linux distributions based on Red Hat Enterprise Linux (RHEL), including RHEL, CentOS,
and Oracle Linux.
zypper
SUSE Linux Enterprise Server (SLES) versions 11, 12
apt
Linux distributions based on Debian, including Debian 7 or 8, and Ubuntu 12.04 and
later
As a one-time setup step for each Linux machine, you must configure your local software repository to
point to the location where the package manager obtains Dell Rapid Recovery installation files.
NOTE: This process is represented by steps 1 through 4 in each of the installation procedures. When
upgrading future editions of the Rapid Recovery Agent on a Linux machine with the repository
configured, you will not need to perform these steps.
After you configure a software repository on your Linux machine, the package manager is able to retrieve
and install the packages needed for installation or removal of Rapid Recovery Agent software and related
components, such as aamount (now called local mount), aavdisk (now called rapidrecovery-vdisk), and
35
Mono (an open source, Ecma standard-compliant, .NET Framework-compatible tool set used for porting
the Agent software to Linux platforms).
For each package manager, you can run the appropriate command at the command line to determine if
it is configured to download Rapid Recovery packages. These commands are listed in the following table.
Table 10. Command to show package manager repository configuration
Package
Manager
Command to list configured repositories
yum
yum replolist
zypper
zypper repos
apt
ls /etc/apt/sources.list.d
Previous versions of the AppAssure Agent software must be completely removed from a Linux machine
before installing the Rapid Recovery Agent version and protecting the Linux machine using the Rapid
Recovery Core. This is true for online or offline installations. Removing AppAssure Agent employs the use
of shell scripts. The uninstall instructions differ, depending on the Linux distribution you are using. For
more information on uninstalling AppAssure Agent from a Linux machine, see the topic “Uninstalling the
AppAssure Agent software from a Linux machine” in the Dell Data Protection | Rapid Recovery 6.0
Installation and Upgrade Guide.
NOTE: Removal of the new Rapid Recovery Agent software uses the package manager for each
distribution. Therefore, if uninstalling a version of Rapid Recovery Agent, see the appropriate
procedure under the topic see the topic “Uninstalling the AppAssure Agent software from a Linux
machine” in the Dell Data Protection | Rapid Recovery 6.0 Installation and Upgrade Guide.
If installing Rapid Recovery Agent on a Linux machine that has never had AppAssure Agent installed,
determine the appropriate package manager from the preceding table. Then follow the appropriate
installation procedure.
After configuring the newly installed Agent software on a Linux machine, you must restart the machine.
Restarting ensures that the proper kernel driver version is used to protect your machine.
Thus, the installation process when upgrading from AppAssure to Rapid Recovery involves:
•
Removing the AppAssure Agent software (not required for first-time installations)
•
Determine the relevant package manager for your Linux distribution
•
Follow the procedure for installing Rapid Recovery Agent on the Linux machine, including configuring
the software repository (steps 1 through 4 of the installation procedure)
•
Run the configuration utility to set port, configure users, add firewall exclusions, install the kernel
module, and start the Agent service.
•
Restart the Linux machine
The instructions for installing the Agent software on a Linux machine differ slightly depending on the
Linux distribution you are using. For more information about preparing for and installing the Agent
software for a Linux machine connected to the Internet, see the appropriate topic. You can choose from
the following sections:
•
Installing the Rapid Recovery Agent software on Debian or Ubuntu
•
Installing the Rapid Recovery Agent software on SUSE Linux Enterprise Server
36
For more information about preparing for and installing the Agent software for a Linux machine that is
not connected to the Internet, see the topic:
•
Installing the Agent software on offline Linux machines
Before you begin installation of Agent software, see the topics: Downloading the Linux distribution, About
security, Location of Linux Agent files, Agent dependencies, Linux scripting information in the Dell Data
Protection | Rapid Recovery 6.0 Installation and Upgrade Guide.
Location of Linux Agent files
There are several files required to support the Rapid Recovery Agent software on a Linux machine. For all
supported Linux distributions, these files are located in the following directories:
•
mono:
/opt/apprecovery/mono
•
agent:
/opt/apprecovery/agent
•
local mount:
/opt/apprecovery/local_mount
•
rapidrecovery-vdisk and aavdctl:
/usr/bin/aavdisk
•
configuration files for rapidrecovery-vdisk:
/etc/apprecovery/aavdisk.conf
•
wrappers for agent and local_mount
/usr/bin/agent
/usr/bin/local_mount
•
autorun scripts for agent and rapidrecovery-vdisk:
/etc/init.d/rapidrecovery-agent
/etc/init.d/rapidrecovery-vdisk
Agent dependencies
The following dependencies are required and are installed as part of the Agent installer package:
•
For Debian and Ubuntu:
– The rapidrecovery-agent requires:
dkms, gcc, make, linux-headers-‘uname-r‘
libc6 (>=2.7-18), libblkid1, libpam0g, libpcre3
– The rapidrecovery-mono requires:
libc6 (>=2.7-18)
•
For Red Hat Enterprise Linux, CentOS, and Oracle Linux:
– The nbd-dkms requires
dkms, gcc, make, kernel-headers-‘uname-r‘ kernel-devel-‘uname-r‘
– The rapidrecovery-agent requires:
dkms, gcc, make, kernel-headers-‘uname-r‘ kernel-devel-‘uname-r‘,
nbd-dkms, libblkid, pam, pcre
– The rapidrecovery-mono requires:
glibc >=2.11
37
•
For SUSE Linux Enterprise Server:
– The nbd-dkms requires:
dkms, gcc, make, kernel-syms
– The rapidrecovery-agent requires:
dkms, kernel-syms, gcc, make, libblkid1, pam, pcre
– The rapidrecovery-mono requires:
glibc >= 2.11
Installing the Rapid Recovery Agent software on Debian or Ubuntu
The Rapid Recovery Agent .deb file is an archive containing repository information specific to the apt
package manager. Complete the following steps to install the Rapid Recovery Agent on Debian or
Ubuntu machines for an online installation.
NOTE: This procedure applies to a Linux machine that is connected to the internet. For offline
installation of Rapid Recovery Agent on any Linux machine, see Installing the Agent software on
offline Linux machines.
1.
Open a terminal session with root access.
2.
Determine your present working directory by entering PWD and pressing Enter. For example, assume
your directory is /home/rapidrecovery/.
3.
Download the appropriate Rapid Recovery Agent .deb installation file from the License Portal at
https://licenseportal.com to your present working directory.
For more information about the license portal, see the Dell Data Protection | Rapid Recovery License
Portal User Guide.
4.
To establish a persistent connection between your Linux machine and the remote Dell repository in
which Rapid Recovery software and components are stored, type the following command:
dpkg -i <.deb installation file you downloaded>
For example, if the installer file is named rapidrecovery-repo-6.0.2.999.deb in the directory /home/
rapidrecovery/, type the following command, and then press Enter:
dpkg -i rapidrecovery-repo-6.0.2.999.deb
Any missing packages or files required by the Agent will be downloaded from the remote repository
and installed automatically as part of the script.
NOTE: For more information on dependencies for installing on a Linux machine, see Agent
dependencies.
5.
Install the Rapid Recovery Agent by invoking the apt package manager, updating the repository
manager. Type the following command, and then press Enter:
apt-get update
6.
Instruct the package manager to install the Rapid Recovery Agent software. Type the following
command, and then press Enter:
apt-get install rapidrecovery-agent
7.
The package manager prepares to install all dependent files. If prompted to confirm installation of
unsigned files, enter y and then press Enter.
The Rapid Recovery Agent files are installed.
38
Installing the Rapid Recovery Agent software on SUSE Linux Enterprise
Server
The Rapid Recovery Agent .rpm file is an archive containing repository information for SUSE Linux
Enterprise Server (SLES) . This distribution uses the zypper package manager. Complete the following
steps to install the Rapid Recovery Agent on SLES.
NOTE: This procedure applies to a Linux machine that is connected to the internet. For offline
installation of Rapid Recovery Agent on any Linux machine, see Installing the Agent software on
offline Linux machines .
1.
Open a terminal session with root access.
2.
Determine your present working directory by entering PWD and pressing Enter. For example, assume
your directory is /home/rapidrecovery/.
3.
Download the appropriate Rapid Recovery Agent .rpm installation file from the License Portal at
https://licenseportal.com to your present working directory.
For more information about the license portal, see the Dell Data Protection | Rapid Recovery License
Portal User Guide.
4.
To establish a persistent connection between your Linux machine and the remote Dell repository in
which Rapid Recovery software and components are stored, type the following command:
rpm -ivh <.rpm installation file you downloaded>
For example, if the installer file is named rapidrecovery-repo-6.0.2.999.rpm in the directory /home/
rapidrecovery/, type the following command, and then press Enter:
rpm -ivh rapidrecovery-repo-6.0.2.999.rpm
Any missing packages or files required by the Agent will be downloaded from the remote repository
and installed automatically as part of the script.
NOTE: For more information on dependencies for installing on a Linux machine, see Agent
dependencies.
5.
Install the Rapid Recovery Agent by invoking the zypper package manager, updating the repository
manager. Type the following command, and then press Enter:
apt-get update
6.
Instruct the package manager to install the Rapid Recovery Agent software. Type the following
command, and then press Enter:
apt-get install rapidrecovery-agent
7.
The package manager prepares to install all dependent files. If prompted to confirm installation of
unsigned files, enter y and then press Enter.
The Rapid Recovery Agent files are installed.
Installing the agent on Red Hat Enterprise Linux and CentOS
NOTE: Before performing these steps, ensure that you have downloaded the Red Hat or CentOS
installer package to the /home/system directory. The following steps are the same for both 32-bit
and 64-bit environments.
To install an agent on Red Hat Enterprise Linux and CentOS:
1.
Open a terminal session with root access.
2.
To make the Agent installer executable, type the following command:
39
chmod +x appassure-installer__rhel_amd64_5.x.x.xxxxx.sh and then press <Enter>.
NOTE: For 32-bit environments, the installer is named appassureinstaller__
rhel_i386_5.x.x.xxxxx.sh.
The file becomes executable.
3.
To extract and install the Agent, type the following command:
/appassure-installer_rhel_amd64_5.x.x.xxxxx.sh and then press <Enter>.
The Linux agent begins its extraction and installation process. Any missing packages or files required
by the agent is downloaded and installed automatically as part of the script.
For information on the files required by the Agent, see Agent dependencies.
After the installer completes, the Agent will be running on your machine. For more information on
protecting this machine with the Core, see the topic 'Protecting Workstations and Servers' in the Rapid
Recovery 6.0 on DL Appliances User’s Guide at Dell.com/support/home.
Installing the Agent software on offline Linux machines
This task requires access to an online Linux machine, removable storage media, and access to the final
offline Linux machine. If AppAssure Agent is installed on the offline Linux machine, you must first uninstall
it before installing Rapid Recovery Agent. For more information, see “Uninstalling the AppAssure Agent
software from a Linux machine” section in Dell Data Protection | Rapid Recovery Installation and Upgrade
Guide.
When installing the Agent software on Linux machines that do not have access to the Internet, follow this
procedure. After installation is complete, configure the Agent as described in the topic Configuring the
Rapid Recovery Agent on a Linux machine.
NOTE: If installing on multiple Linux distributions, perform this procedure once for each distribution.
1.
From a Linux machine with access to the Internet, open a terminal window and type the following
command:
wget http://s3.amazonaws.com/repolinux/6.0.2/packages-downloader.sh
The shell script downloads to your current directory.
2.
Run the shell script by executing the following command:
bash packages-downloader.sh
The script executes and prompts you to select a specific Linux distribution and architecture.
3.
Type the index of the installation package you want and press Enter.
For example, to obtain an installation package for Red Hat Enterprise Linux 7, enter 3 and press Enter.
The appropriate installer is extracted into the ~/rapidrecovery.packages/ directory.
NOTE: The tilde ~/ characters represent your home directory.
4.
40
Copy the packages for Rapid Recovery Agent to removable media. The specific location of your
removable media can differ based on Linux distribution. Type the following command and then press
Enter:
cp -R ~/rapidrecovery.packages/ <your_removable_media>
For example, if using a removable USB drive that is mounted to location /media/USB-drive-1, type
the following command and then press Enter:
cp -R ~/rapidrecovery.packages /media/USB-drive-1
All the necessary files are copied to the removable medium.
5.
Take the removable medium to the offline Linux machine and mount the drive.
6.
Copy the data from the mounted device to your home directory or other desired location. For
example, type the following command and then press Enter:
cp -R /media/USB-drive-1 ~/rapidrecovery.packages
7.
Change to the Rapid Recovery directory. For example, type the following command and then press
Enter:
cd ~/rapidrecovery.packages
8.
Run the installation of Agent with root privileges. This command differs based on Linux distribution.
• For Red Hat, SLES, Oracle, and CentOS, type the following command and then press Enter:
sudo rpm -i *.rpm
•
For Debian and Ubuntu, type the following command and then press Enter:
sudo dpkg -i *.deb
The local package manager runs the installation of Rapid Recovery Agent.
After installation is complete, configure the Agent as described in the topic Configuring the Rapid
Recovery Agent on a Linux machine.
CAUTION: After configuring the newly installed Agent software on a Linux machine, you must
restart the machine. Restarting ensures that the proper kernel driver version is used to protect
your machine.
Installing the Agent software on Windows Server Core Edition machines
Complete the steps in the following procedure to install the Agent software on a Windows Server Core
machine.
NOTE: The following procedure installs the Agent software in console mode. To install in silent
mode instead, append /silent to the installer file name on the command line. For example,
Agent-X64-6.X.X.xxxxx.exe /silent.
1.
Download the Rapid Recovery Agent installer file from the Dell Data Protection | Rapid Recovery
License Portal or from the Rapid Recovery Core.
2.
From a command prompt, navigate to the directory containing the Rapid Recovery Agent installer file
and enter the installer file name to begin the installation:
Agent-X64-6.x.x.xxxxx.exe
The installation program installs the Agent software and displays progress in the console. Upon
completion, new installations trigger an automatic restart of the machine, whereas Agent upgrades
may not require a machine restart.
Configuring the Rapid Recovery Agent on a Linux machine
Run the Rapid Recovery Configuration utility after installing Rapid Recovery Agent software on a Linux
machine. This compiles and installs the kernel module on the Linux machine you want to protect in your
Core.
41
The configuration utility offers several configuration options, and provides hints in the numbered steps of
the instructions when it detects your specific configuration information.
Complete the steps below to configure the Rapid Recovery Agent software on any Linux machine. Some
configuration options differ based on the Linux distribution you are installing.
1.
Open a terminal session with root access.
2.
Launch the configuration utility by typing the following command, and then press Enter:
sudo /usr/bin/rapidrecovery-config
The configuration utility starts. This lists several configuration options, each with an index number to
enter for the appropriate configuration step.
3.
Configure the port for this protected machine by typing the following command, and then press
Enter. The default port is 8006.
1 <agent_port>
For example, if using the default port, type the command:
1 8006
4.
Configure users available for protection, by typing the following command, and then press Enter:
1 <user_names_separated_by_comma>
For example, if using usernames michael, administrator, and test_user1, type the command:
2 michael,administrator,test_user1
5.
Configure firewall rules to select a firewall configuration manager. This establishes firewall
exceptions for the port designated in step 1.
If the utility detects one or more firewall configuration managers (such as lokkit or firewalld), each is
listed in the utility in line 3. Select the appropriate configuration manager and enter it, starting with
the command number (3), and then press Enter:
3 <firewall_configuration>
For example, if using firewalld, type the command:
3 firewalld
6.
Query the list of compatible kernel modules from the utility by entering the command number, and
then press Enter:
4
A sub-shell returns all kernel modules compatible for installation. For example, the following could
be returned:
Searching for all available for installation kernels.
This might take a while, depending on the Internet connection speed.
Kernels compatible for module installation:
0 - linux-image-3.16.0.23-generic
1 - linux-image-3.16.0.31-generic
2 - linux-image-3.16.0.33-generic
3 - linux-image-3.16.0.34-generic
Input indices of the kernel modules you wish to install, delimited by
space; use 'all' to install into all supported kernels, or 'q' to quit.
7.
Configure the appropriate Rapid Recovery kernel module.
For example, to enter kernel modules for 3.16.0-23 and 3.16.0-34, enter 1 4 and press Enter.
42
To enter all kernel modules, enter all and press Enter.
8.
After configuring the newly installed Agent software, restart the machine. Restarting ensures that the
proper kernel driver version is used to protect your machine.
After completing this process, the local repository has been configured on this Linux machine. The Agent
software is installed and the kernel module is loaded.
Your next step is to protect the machine on the Rapid Recovery Core.
Protecting a machine
If you have already installed the Rapid Recovery Agent software on the machine you want to protect, but
have not restarted it yet, restart the machine now.
This topic describes how to start protecting the data on a single machine that you specify using the
Protect Machine Wizard.
When you add protection, you need to define connection information such as the IP address and port,
and provide credentials for the machine you want to protect. Optionally, you can provide a display name
to appear in the Core Console instead of the IP address. If you change this, you will not see the IP address
for the protected machine when you view details in the Core Console. You will also define the protection
schedule for the machine.
The workflow of the protection wizard may differ slightly based on your environment. For example, if the
Rapid Recovery Agent software is installed on the machine you want to protect, you will not be prompted
to install it from the wizard. Likewise, if a repository already exists on the Core, you will not be prompted
to create one.
1.
Do one of the following:
•
If you are starting from the Protect Machine Wizard, proceed to Step 2.
•
If you are starting from the Rapid Recovery Core Console, from the button bar, click Protect.
The Protect Machine Wizard appears.
2.
On the Welcome page, select the appropriate installation options:
•
If you do not need to define a repository or establish encryption, select Typical.
•
If you need to create a repository, or define a different repository for backups for the selected
machine, or if you want to establish encryption using the wizard, select Advanced (show optional
steps).
•
3.
Optionally, if you do not wish to see the Welcome page for the Protect Machine Wizard in the
future, select the option Skip this Welcome page the next time the wizard opens.
When you are satisfied with your choices on the Welcome page, then click Next.
The Connection page appears.
4.
On the Connection page, enter the information about the machine to which you want to connect as
described in the following table, and then click Next.
43
Table 11. Machine connection settings
Text Box
Description
Host
The host name or IP address of the machine that you want to protect.
Port
The port number on which the Rapid Recovery Core communicates with the
Agent on the machine.
The default port number is 8006.
User name
The user name used to connect to this machine; for example, Administrator (or, if
the machine is in a domain, [domain name]\Administrator).
Password
The password used to connect to this machine.
If the Install Agent page appears next in the Protect Machine Wizard, that means that Rapid Recovery
does not detect the Rapid Recovery Agent on the machine and will install the current version of the
software. Go to Step 7.
If the Upgrade Agent page appears next in the wizard, that means that an older version of the Agent
software exists on the machine you want to protect.
NOTE: The Agent software must be installed on the machine you want to protect, and that
machine must be restarted, before it can back up to the Core. To have the installer reboot the
protected machine, select the option After installation, restart the machine automatically
(recommended) before clicking Next.
5.
On the Upgrade Agent page, do one of the following:
•
To deploy the new version of the Agent software (matching the version for the Rapid Recovery
Core), select Upgrade the Agent to the latest version of the software.
•
6.
7.
To continue protecting the machine without updating the Agent software version, clear the
option Upgrade the Agent to the latest version of the software.
Click Next.
Optionally, on the Protection page, if you want a name other than the IP address to display in the
Rapid Recovery Core console for this protected machine, then in the Display Name field, type a
name in the dialog box.
You can enter up to 64 characters. Do not use the special characters described in the topic
“Prohibited characters” in the Rapid Recovery on DL Appliances User’s Guide. Additionally, do not
begin the display name with any of the character combinations described in the topic prohibited
phrases in the Rapid Recovery on DL Appliances User’s Guide.
8.
Select the appropriate protection schedule as described below:
•
To use the default protection schedule, in the Schedule Settings option, select Default
protection.
With a default protection schedule, the Core will take snapshots of all volumes on the protected
machine once every hour. To change the protection settings at any time after you close the wizard,
including choosing which volumes to protect, go to the Summary page for the specific protected
machine.
•
9.
To define a different protection schedule, in the Schedule Settings option, select Custom
protection.
Proceed with your configuration as follows:
•
44
If you selected a Typical configuration for the Protect Machine Wizard and specified default
protection, then click Finish to confirm your choices, close the wizard, and protect the machine
you specified.
The first time protection is added for a machine, a base image (that is, a snapshot of all the data in
the protected volumes) will transfer to the repository on the Rapid Recovery Core following the
schedule you defined, unless you specified to initially pause protection.
•
If you selected a Typical configuration for the Protect Machine Wizard and specified custom
protection, then click Next to set up a custom protection schedule. For details on defining a
custom protection schedule, see “Creating custom protection schedules” section in the Rapid
Recovery 6.0 on DL Appliances User’s Guide. .
•
If you selected Advanced configuration for the Protect Machine Wizard, and default protection,
then click Next and proceed to Step 14 o see repository and encryption options.
•
If you selected Advanced configuration for the Protect Machine Wizard and specified custom
protection, then click Next and proceed to Step 11 to choose which volumes to protect.
10. On the Protection Volumes page, select which volumes you want to protect. If any volumes are
listed that you do not want to include in protection, click in the Check column to clear the selection.
Then click Next.
NOTE: Typically, it is good practice to protect, at minimum, the System Reserved volume and
the volume with the operating system (typically the C drive).
11. On the Protection Schedule page, define a custom protection schedule and then click Next. For
details on defining a custom protection schedule, see “Creating custom protection schedules”
section in the Rapid Recovery 6.0 on DL Appliances User’s Guide.
If you already have repository information configured, and you selected the Advanced option in Step
1, then the Encryption page appears. Proceed to Step 13.
12. Optionally, on the Encryption page, to enable encryption, select Enable Encryption.
Encryption key fields appear on the Encryption page.
NOTE: If you enable encryption, it will be applied to data for all protected volumes for this
machine.
You can change encryption settings later from the Rapid Recovery Core Console.
For more information about encryption, see the topic “Understanding encryption keys” in the
Rapid Recovery 6.0 on DL Appliances User’s Guide at www.dell.com/support/home.
CAUTION: Rapid Recovery uses AES 256-bit encryption in the Cipher Block Chaining (CBC)
mode with 256-bit keys. While using encryption is optional, Dell highly recommends that you
establish an encryption key, and that you protect the passphrase you define. Store the
passphrase in a secure location as it is critical for data recovery. Without a passphrase, data
recovery is not possible.
13. On the Encryption page, select one of the following options:
•
If you want to encrypt this protected machine using an encryption key that is already defined on
this Rapid Recovery Core, select Encrypt data using an existing Encryption key, and then select
the appropriate key from the drop-down menu. Proceed to the next step.
•
If you want to add a new encryption key to the Core and apply that key to this protected
machine, then enter the information as described in the following table.
Table 12. Encryption key settings
Text Box
Description
Name
Enter a name for the encryption key.
Encryption key names must contain between 1 and 130 alphanumeric
characters. You may not include special characters such as the back slash,
forward slash, pipe, colon, asterisk, quotation mark, question mark, open or
45
Text Box
Description
close brackets, ampersand or hash. This information appears in the Description
field when viewing encryption keys from the Core Console.
Description
Enter a comment for the encryption key.
This information appears in the Description field when viewing encryption keys
from the Core Console.
Passphrase
Enter the passphrase used to control access.
Best practice is to avoid special characters listed above.
Record the passphrase in a secure location. Dell Support cannot recover a
passphrase. Once you create an encryption key and apply it to one or more
protected machines, you cannot recover data if you lose the passphrase.
Confirm
Passphrase
Re-enter the passphrase you just entered.
14. Click Finish to save and apply your settings.
The first time protection is added for a machine, a base image (that is, a snapshot of all the data in
the protected volumes) will transfer to the repository on the Rapid Recovery Core following the
schedule you defined, unless you specified to initially pause protection.
15. If you receive an error message, the appliance cannot connect to the machine to back it up. To
resolve the issue:
a.
b.
c.
d.
Check Network Connectivity.
Check the Firewall Settings.
Verify Rapid Recovery Services and RPC are running.
Verify Domain Name Service Lookups (if applicable).
Checking network connectivity
To check network connectivity:
1.
On the client system to which you are trying to connect, open a command line interface.
2.
Run the command ipconfig and note the IP address of the client.
3.
Open a command line interface on the appliance.
4.
Run the command ping <IP address of client>.
5.
Depending on the result, do one of the following:
•
If the client does not reply to the ping, verify the server’s connectivity and network settings.
•
If the client replies, check that the firewall settings allow the Rapid Recovery components to run.
Checking the firewall settings
If the client is connected properly to the network, but cannot be seen by the Core Console, check the
firewall to ensure that necessary inbound and outbound communications are allowed.
To check the firewall settings on the Rapid Recovery Core and any clients that it backs up:
1.
On the appliance, click Start → Control Panel.
2.
In the Control Panel, click System and Security, under Windows Firewall click Check firewall status.
3.
Click Advanced Settings.
4.
In the Windows Firewall with Advanced Security screen, click Inbound Rules.
46
5.
Ensure the Rapid Recovery Core and ports display Yes in the Enabled column.
6.
If the rule is not enabled, right-click on the Rapid Recovery Core and select Enable Rule.
7.
Click Outbound Rules and verify the same for Rapid Recovery Core.
Verifying name resolution (if applicable)
If the machine you are trying to back up uses DNS, verify that DNS forward and reverse lookups are
correct.
To ensure that the reverse lookups are correct:
1.
On the appliance, go to C:\Windows\system32\drivers\etc hosts.
2.
Enter the IP address of each client that backs up to DL4300.
Teaming network adapters
By default, the network adapters (NICs) on the DL4300 Appliance are not bonded, which affects the
performance of the system. It is recommended that you team the NICs to a single interface. Teaming the
NICs require:
•
Reinstalling the Broadcom Advanced Control Suite
•
Creating the NIC team
•
Configuring a Hyper-V Virtual Switch
Reinstalling Broadcom Advanced Configuration Suite
To reinstall Broadcom Advanced Configuration Suite (BACS):
1.
Identify the NICs on your system. To identify the NICs:
a. Access the Dell Open Manage Server Administrator (OMSA).
b. On the main page, click System → Main Sytem Chassis → Slots.
2.
Uninstall the earlier versions of Broadcom drivers and management applications.
3.
Download the appropriate Broadcom drivers and BACS onto your appliance.
The following drivers are available at dell.com/support.
•
QLogic driver
Click Servers, storage, & Networking → Dell Software DL 4300 → Drivers & downloads →
Category → Network → QLogic BCM57xx and BCM57xxx .
•
Broadcom driver
Click Servers, storage, & Networking → Dell Software DL 4300 → Drivers & downloads →
Category → Network → Broadcom Windows 64bit driver update for NetXtreme Ethernet
adapters.
4.
Complete the installation by going through the installation wizard.
Creating the NIC team
NOTE: It is recommended not to use the native teaming interface in Windows 2012 Server. The
teaming algorithm is optimized for outbound, not inbound, traffic. It offers poor performance with a
backup workload, even with more network ports in the team.
To create NIC teaming:
1.
Go to Start → Search → Broadcom Advanced Control Suite.
47
NOTE: When using Broadcom Advanced Control Suite, only select the Broadcom network
cards.
2.
In the Broadcom Advanced Control Suite, select Teams → Go to Team View.
3.
In the Hosts list on the left side, right-click on the host name of the DL4300 appliance and select
Create Team.
4.
Click Next.
5.
Enter a name for the team and click Next.
6.
Select the Team Type and click Next.
The Broadcom Teaming Wizard window is displayed.
7.
Select an adapter you want to be part of the team, and click Add.
8.
Repeat these steps for all other adapters that are a part of the team.
9.
When all adapters are selected for the team, click Next.
10. Select a standby NIC if you want a NIC that can be used as the default, if the team fails.
11. Select whether to configure LiveLink, and then click Next.
12. Select Skip Manage VLAN and click Next.
13. Select Commit changes to system and click Finish.
14. Click Yes when warned that the network connection is interrupted.
NOTE: The building of the team may take about five minutes.
Configuring a Hyper-V Virtual Switch
For virtual standby machines to communicate within a production environment, create a virtual switch.
To create an external virtual switch, see Configure Virtual Networks section at
www.technet.microsoft.com.
48
Getting help
5
Finding documentation and software updates
In the Rapid Recovery Core console there are direct links to Rapid Recovery, Appliance documentation,
and software updates. To access the links, click the Appliance tab, and then click Overall Status. Links to
the software updates and documentation are located under the Documentation section.
Finding software updates
There are direct links to Rapid Recovery and DL4300 Appliance software updates available from the Rapid
Recovery Core Console. To access the links to software updates, select the Appliance tab, and then click
Overall Status. Links to the software updates are located under the Documentation section.
Contacting Dell
NOTE: If you do not have an active Internet connection, you can find contact information on your
purchase invoice, packing slip, bill, or Dell product catalog.
Dell provides several online and telephone-based support and service options. If you do not have an
active Internet connection, you can find contact information on your purchase invoice, packing slip, bill,
or Dell product catalog. Availability varies by country and product, and some services may not be
available in your area. To contact Dell for sales, technical support, or customer-service issues, go to
software.dell.com/support.
Documentation feedback
Click the Feedback link in any of the Dell documentation pages, fill out the form, and click Submit to
send your feedback.
49
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement