Dell DL4300 User guide

Dell DL4300 User guide
Dell DL4300 Appliance
Deployment Guide
Notes, cautions, and warnings
NOTE: A NOTE indicates important information that helps you make better use of your product.
CAUTION: A CAUTION indicates either potential damage to hardware or loss of data and tells you how to avoid the
problem.
WARNING: A WARNING indicates a potential for property damage, personal injury, or death.
© 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell and the Dell
logo are trademarks of Dell Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of
their respective companies.
2016 - 09
Rev. A03
Contents
1 Setting up DL4300 Appliance.......................................................................................... 5
Introduction........................................................................................................................................................................5
Terms used in this document....................................................................................................................................... 5
Available configurations......................................................................................................................................................5
Installation prerequisites..................................................................................................................................................... 6
Network requirements..................................................................................................................................................6
Recommended network infrastructure.........................................................................................................................6
Setting up the hardware.....................................................................................................................................................6
Installing the appliance in a rack....................................................................................................................................6
Setting the storage enclosure configuration switch..................................................................................................... 6
Connecting the storage enclosure to the system......................................................................................................... 7
Connecting the Cable Management Arm (Optional).....................................................................................................8
Cabling the appliance....................................................................................................................................................8
Turning on the appliance.............................................................................................................................................. 8
DL4300 disk configurations................................................................................................................................................ 8
2 Initial software setup.......................................................................................................9
AppAssure Appliance Configuration Wizard........................................................................................................................9
Configuring the network interface................................................................................................................................9
Configuring host name and domain settings............................................................................................................... 10
Configuring SNMP settings......................................................................................................................................... 11
Creating Windows and RASR virtual disk(s)................................................................................................................ 11
DL Appliance Configuration Wizard...................................................................................................................................12
Configuring the network interface.............................................................................................................................. 12
Registration and Host settings....................................................................................................................................13
Alerts and Monitoring..................................................................................................................................................13
Access and Management............................................................................................................................................14
Configuring Windows backup .....................................................................................................................................14
Storage provisioning................................................................................................................................................... 15
Configuring Retention policy and update options........................................................................................................15
Recovery and Update Utility............................................................................................................................................. 16
Rapid Appliance Self Recovery..........................................................................................................................................16
Creating the RASR USB key....................................................................................................................................... 17
Executing RASR..........................................................................................................................................................17
Executing the RASR through the Internal Dual SD Module......................................................................................... 18
Provisioning storage..........................................................................................................................................................18
Configuring the DL4300 using fibre channel storage (optional)....................................................................................... 20
3 Post installation tasks.................................................................................................... 21
Accessing the Core Console............................................................................................................................................. 21
Updating trusted sites in Internet Explorer........................................................................................................................21
Configuring browsers to remotely access the Core Console.............................................................................................21
3
Configuring browser settings in Internet Explorer and Chrome.................................................................................. 22
Configuring browser settings in Firefox......................................................................................................................22
Reviewing retention periods............................................................................................................................................. 22
Encrypting agent snapshot data.......................................................................................................................................22
Configuring an email server and email notification template ............................................................................................ 23
Adjusting the number of streams..................................................................................................................................... 24
4 Preparing to protect your servers................................................................................. 25
Overview..........................................................................................................................................................................25
Installing agents on clients................................................................................................................................................25
Deploying the agent software when protecting an agent...........................................................................................25
Installing the Rapid Recovery Agent software on Windows machines........................................................................26
Deploying the Rapid Recovery Agent software to one or more machines.................................................................. 27
About installing the Agent software on Linux machines................................................................................................... 29
Location of Linux Agent files....................................................................................................................................... 31
Agent dependencies....................................................................................................................................................31
Installing the Rapid Recovery Agent software on Debian or Ubuntu.......................................................................... 32
Installing the Rapid Recovery Agent software on SUSE Linux Enterprise Server....................................................... 32
Installing the agent on Red Hat Enterprise Linux and CentOS....................................................................................33
Installing the Agent software on offline Linux machines................................................................................................... 34
Installing the Agent software on Windows Server Core Edition machines..................................................................35
Configuring the Rapid Recovery Agent on a Linux machine....................................................................................... 35
Protecting a machine....................................................................................................................................................... 36
Checking network connectivity.................................................................................................................................. 38
Checking the firewall settings.................................................................................................................................... 39
Verifying name resolution (if applicable).....................................................................................................................39
Teaming network adapters.........................................................................................................................................39
5 Getting help...................................................................................................................41
Finding documentation and software updates.................................................................................................................. 41
Finding software updates..................................................................................................................................................41
Contacting Dell................................................................................................................................................................. 41
Documentation feedback.................................................................................................................................................. 41
4
1
Setting up DL4300 Appliance
Introduction
The Dell DL4300 appliance is the latest generation of backup-to-disk appliance powered by Rapid Recovery software. The appliance
allows:
•
Scalable storage capabilities to support organizations of any size
•
Faster backups, as well as quicker recovery scenarios over conventional tape devices and backup methodologies
•
Optional deduplication capability
•
Continuous data protection for data center and remote office servers
•
Quick and easy deployment experience that reduces the time required to begin protecting critical data
•
Optional Fibre Channel configuration
Terms used in this document
The following table lists the terms used in this document to refer to various hardware and software components of the DL4300
appliance.
Table 1. DL4300 Appliance hardware and software components
Component
Term Used
DL4300 Appliance
Appliance
Dell Storage MD1400 storage enclosure
Storage enclosure
Dell AppAssure Software
AppAssure
Rapid Recovery Software
Rapid Recovery
Available configurations
The DL appliance comes in two configurations: Standard Edition and High Capacity Edition.
Table 2. DL4300 Standard Edition capacity configurations
Capacity
Hardware Configuration
5 TB
12 x 1 TB drives, 4 x 1 TB internal drives
10–20 TB
12 x 2 TB drives, 4 x 2 TB internal drives
30–40 TB
12 x 4 TB drives, 4 x 4 TB internal drives
50–60 TB
12 x 6 TB drives, 4 x 6 TB internal drives
Table 3. DL4300 High Capacity Edition capacity configurations
Capacity
Hardware Configuration
40 TB, 50 TB, 60 TB, 70 TB, 80 TB, 90 TB, 100 TB, 110 TB, and
120 TB
12 x 6 TB drives, 4 x 6 TB internal drives
5
NOTE: Additional storage can be added through expansion shelves (Dell Storage MD1400). Additional storage can be
added to any model, however the Standard Edition has a maximum capacity of 60 TB and the High Capacity Edition has
a maximum capacity of 120 TB. Both editions support up to four expansion shelves.
Each configuration includes the following hardware and software:
•
Dell DL4300 system
•
Dell PowerEdge RAID Controllers (PERC)
•
Preinstalled operating system and Dell OpenManage system and storage management software
•
AppAssure software
NOTE: If your appliance configuration does not include Dell Storage MD1400 storage enclosures, ignore any references
to Dell Storage MD1400 and storage enclosures in this document.
Installation prerequisites
Network requirements
Your Appliance requires the following network environment:
•
Active network with available Ethernet cables and connections
•
A static IP address and DNS server IP address, if not provided by the Dynamic Host Configuration Protocol (DHCP)
•
User name and password with administrator privileges
Recommended network infrastructure
Dell recommends that organizations use a 1 GbE backbone for efficient performance for use with Rapid Recovery and 10 GbE
networks for extremely robust environments.
Setting up the hardware
The appliance ships with a single DL4300 system. Before setting up the appliance hardware, see the Dell DL4300 Appliance Getting
Started With Your System document that shipped with the appliance. Unpack and set up the DL Appliance hardware.
NOTE: The software is pre-installed on the appliance. Any media included with the system must be used only in the
event of a system recovery.
To set up the DL Appliance hardware:
1.
Rack and cable the DL4300 system and storage enclosure(s).
2.
Turn on the storage enclosure(s) and then the DL4300 system.
Installing the appliance in a rack
If your system includes a rail kit, locate the Rack Installation Instructions supplied with the rack kit. Follow the instructions to install
the rails in the rack unit, the system, and the storage enclosure in the rack.
Setting the storage enclosure configuration switch
Set the storage mode for the storage enclosure to unified mode as indicated in the following figure.
NOTE: The configuration switch must be set before turning on the storage enclosure. Changing the configuration mode
after turning on the storage enclosure has no effect on enclosure configuration until the system is power cycled. For
more information, see the Dell Storage MD1400 Enclosures Hardware Owner's Manual at Dell.com/support/home.
6
Figure 1. Setting the PowerVault MD1400 storage enclosure configuration switch
1.
configuration switch
Connecting the storage enclosure to the system
Connect the data cable from the PowerEdge RAID Controller (PERC) installed in the Dell DL4300 system to the primary Enclosure
Management Module (EMM) SAS port of the storage enclosure.
Figure 2. Connecting the DL4300 system to the MD1400 storage enclosure
Redundant port configuration
For redundant port configuration:
1.
Connect one end of each SAS cable to port 0 and port 1 on the DL4300 system PERC controller.
2.
Connect the other end of each SAS cable to port 1 on each Enclosure Management Module (EMM) on the MD1400 storage
enclosure.
Single port configuration
For single port configuration:
1.
Connect one end of the SAS cable to port 0 on the DL4300 system PERC controller.
2.
Connect the other end of the SAS cable to port 1 on the Enclosure Management Module (EMM) on the MD1400 storage
enclosure.
7
Multichain configuration
Figure 3. Multichain configuration
Multichain configuration supports up to four enclosures. The first two enclosures are daisy-chained with one of the enclosures
connected to a single port on the controller card. The other two enclosures are daisy-chained with one of the enclosures connected
to the second port on the controller card.
Connecting the Cable Management Arm (Optional)
If the appliance includes a Cable Management Arm (CMA), locate the CMA Installation Instructions that shipped with the CMA kit
and follow the instructions to install the CMA.
Cabling the appliance
Locate the Getting Started With Your System document at Dell.com/support/home that shipped with your appliance. Follow the
instructions to attach the keyboard, mouse, monitor, power, and network cables to the appliance.
Turning on the appliance
After cabling the appliance, turn on the MD1400 storage enclosure, and then turn on the DL4300 system.
NOTE: It is recommended that you connect the appliance to an Uninterrupted Power Supply (UPS) for maximum
reliability and availability.
DL4300 disk configurations
The DL4300 supports both nearline SAS drives and SATA drives. The operating system resides on a RAID 1 (mirrored) virtual disk
located in slots 12 and 13. For information on these disks, see the Dell DL4300 Appliance Owner’s Manual at Dell.com/support/
home. Drives available in slots 0–11 and 14–17 are available for automatic configuration by the AppAssure Appliance Configuration
Wizard (recommended) but can be manually configured for custom configurations if required. The disks are auto-provisioned as
RAID 6. Capacity expansion using an MD1400 storage enclosure is optional.
8
2
Initial software setup
When you turn on the appliance for the first time, and change the system password, the AppAssure Appliance Configuration
Wizard runs automatically.
1.
After you turn on the system, choose your operating system language from the Windows language options.
2.
To accept the EULA, click I accept button.
The Microsoft EULA (End User License Agreement) is displayed on the Settings page.
A screen to change the administrator password is displayed.
3.
Click OK on the message that prompts you to change the administrator password.
4.
Enter and confirm the new password.
A message prompts you confirming that the password is changed.
5.
Click OK.
6.
From the Dell readme.htm screen, scroll down and click Proceed.
7.
Log on using the changed administrator password.
The Select the language for AppAssure Appliance screen is displayed.
8.
Select the language for your appliance from the list of supported languages.
The AppAssure Appliance Configuration Wizard welcome screen is displayed.
NOTE: The AppAssure Appliance Configuration Wizard may take up to 30 seconds to display on the system console.
NOTE: Do not close the AppAssure Appliance Configuration Wizard until all the tasks have been completed.
AppAssure Appliance Configuration Wizard
CAUTION: Make sure you complete all the steps of AppAssure Appliance Configuration Wizard before performing any
other task or change any settings on the Appliance. Do not make any changes through the Control Panel, use Microsoft
Windows Update, update AppAssure software or install licenses, until the wizard is complete.
The AppAssure Appliance Configuration Wizard guides you through the following steps to configure the software on the
appliance.
•
Configuring the network Interface
•
Configuring host name and domain settings
•
Configuring SNMP settings
•
Creating Windows and RASR virtual disk(s)
On completing the installation using the wizard, the Core Console launches automatically.
Configuring the network interface
To configure the available network interfaces:
1.
On the AppAssure Appliance Configuration Wizard Welcome screen, click Next.
The network interfaces page displays the available connected network interfaces.
2.
Select the network interfaces that you want to configure.
9
NOTE: The AppAssure Appliance Configuration wizard configures network interfaces as individual ports (nonteamed). To improve ingest performance, you can create a larger ingest channel by teaming NICs. However, this
must be done after the initial configuration of the appliance.
3.
If required, connect additional network interfaces and click Refresh.
The additional connected network interfaces will be displayed.
4.
Click Next.
The Configure selected network interface page is displayed.
5.
Select the appropriate internet protocol for the selected interface.
You can choose IPv4 or IPv6.
The network details are displayed depending on the internet protocol you select.
6.
To assign the internet protocol details, do one of the following:
•
To assign the selected internet protocol details automatically, select Obtain an IPV4 address automatically.
•
To assign the network connection manually, select Use the following IPv4 address and enter the following details:
– IPv4 Address or IPv6 Address
– Subnet mask for IPv4 and Subnet prefix length for IPv6
7.
– Default Gateway
To assign the DNS server details, do one of the following:
•
To assign the DNS server address automatically, select Obtain DNS server address automatically.
•
To assign the DNS server manually, select Use the following DNS server address and enter the following details:
– Preferred DNS sever
8.
– Alternate DNS server
Click Next.
The Configure hostname and domain setting page is displayed.
For information on NIC teaming, see Teaming Network Adapters.
Configuring host name and domain settings
You must assign a host name for the appliance. It is recommended that you change the host name before starting backups. By
default, the host name is the system name that the operating system assigns.
NOTE: If you plan to change the host name, it is recommended that you change the host name at this stage. Changing
the host name after completing the AppAssure Appliance Configuration wizard requires manually performing several
steps.
To configure the host name and domain settings:
1.
2.
On the Configure host name and domain setting page, to change the host name for the appliance, in New host name enter
an appropriate host name.
If you do not want the appliance to join a domain, select No in Do you want this appliance to join a domain?
By default, Yes is selected.
3.
To join the appliance to a domain, enter the following details:
•
Domain name
•
Domain user name
NOTE: The domain user must have local administrative rights.
4.
• Domain user password
Click Next.
NOTE: Changing the host name or the domain requires restarting the machine. After restarting the machine, the
AppAssure Appliance Configuration wizard launches automatically. If the appliance is joined to a domain, after
restarting the machine, you must log in as a domain user with administrative privileges on the appliance.
10
The Configure SNMP Settings page is displayed.
Configuring SNMP settings
Simple Network Management Protocol (SNMP) is a commonly used network management protocol that allows SNMP-compatible
management functions such as device discovery, monitoring, and event generation. SNMP provides network management of the
TCP/IP protocol.
To configure SNMP alerts for the appliance:
1.
On the Configure SNMP Settings page, select Configure SNMP on this appliance on the Configure SNMP Settings page.
NOTE: Deselect Configure SNMP on this appliance if you do not want to set up SNMP details and alerts on the
appliance and skip to step 6.
2.
In Communities, enter one or more SNMP community names.
Use commas to separate multiple community names.
3.
In Accept SNMP packets from these hosts, enter the names of hosts with which the appliance can communicate.
Separate the host names with commas, or leave blank to allow communication with all hosts.
4.
To configure SNMP alerts, enter the Community Name and the Trap destinations for the SNMP alerts and click Add.
Repeat this step to add more SNMP addresses.
5.
To remove a configured SNMP address, in Configured SNMP addresses, select the appropriate SNMP address and click
Remove.
6.
Click Next.
The Create Windows and RASR virtual disk(s) page is displayed.
Creating Windows and RASR virtual disk(s)
The DL4300 system supports:
•
Two operating system drives, twelve data drives, and four internal hard drives
•
Option to create Logical Unit Numbers (LUNs) for the Bare Metal Restore (BMR) information to be stored
•
Option to create separate space for the Windows backup RASR file.
To create optional virtual disk(s):
1.
Select the following virtual disks:
a. Windows Backup virtual disk
CAUTION: If you skipped this option in the AppAssure Appliance Configuration Wizard, you will not be able to
create a Windows Server backup and configure a backup policy.
Windows backup virtual disk provides the target space to create Windows Server backups. A disk space of 75 GB is
allocated by default for the Windows backup VD that is created and you cannot increase the size of the Windows backup
VD. Overtime, the data that is backed up may exceed 75 GB and if it does, you will not be able to perform backup or
configure backup policy on the Backup page and an out of capacity error is displayed. In this case, the Windows backup can
be reconfigured to a network share or to another disk volume on the Dl Appliance. For more information, see Configure a
Scheduled Shared Network Drive Backup Policy section in Recovering a Dell™ DL Backup and Recovery Appliance using
Rapid Appliance Self Recovery (RASR) at Dell.com/supportmanuals.
b. Bootable RASR virtual disk
Bootable RASR virtual disk provides a redundant recovery volume to perform a RASR recovery. You can reboot to the
redundant recovery volume by pressing< F8> during POST. After rebooting, follow the steps in Executing RASR.
2.
Click Next.
A thank you screen is displayed while the system is configuring. A Configuration complete message is displayed.
3.
Click Exit.
The Core Console launches automatically.
11
4.
Continue the configuration process by Provisioning storage
DL Appliance Configuration Wizard
NOTE: You see the DL Appliance Configuration Wizard only when you upgrade your appliance using the latest RUU.
CAUTION: Make sure you complete all the steps of DL Appliance Configuration Wizard before performing any other task
or change any settings on the Appliance. Do not make any changes through the Control Panel, use Microsoft Windows
Update, update Rapid Recovery software or install licenses, until the wizard is complete. The Windows update service is
disabled temporarily during the configuration process. Exiting the DL Appliance Configuration Wizard before it is
complete may cause errors in system operation.
The DL Appliance Configuration wizard guides you through the following steps to configure the software on the appliance:
•
Configuring the network Interface
•
Registration and Host settings
•
Alerts and Monitoring
•
Access and Management
•
Configuring Windows backup
•
Storage provisioning
•
Configuring Retention policy and update options
NOTE: After you complete the Appliance configuration, you can either skip the wizard or continue performing Machine
protection, Replication, Virtual Machine Exports/Standby. If you choose to skip the wizard, the Core Console launches
automatically and you can perform machine protection, replication, and virtual machine Exports at the later stages.
For more information on performing machine protection, replication, and virtual machine Exports see Rapid Recovery on DL
Appliances User’s Guide at www.dell.com/support/home.
Configuring the network interface
To configure the available network interfaces:
1.
On the DL Appliance Configuration Wizard Welcome screen, click Next.
2.
To accept the agreement, click I accept license agreement, and then click Next.
The License Agreement page is displayed.
The Network Settings page displays the available connected network interfaces.
3.
If necessary, connect extra network interfaces and click Refresh.
The additional connected network interfaces are displayed.
4.
Select the appropriate network interfaces that are suitable for your environment.
You have the following options: IPV4 and IPV6.
The network details are displayed depending on the internet protocol you select.
5.
To enable IPV4, select Enable an IPv4 interface.
a. To assign the internet protocol details for IPV4 interface, do one of the following:
•
To assign the selected internet protocol details automatically, select Obtain an IPV4 address automatically.
•
To assign the network connection manually, select Set manually IPV4 address and enter the following details:
– IPv4 Address
– Subnet mask
6.
– Default Gateway
To enable IPV6, select Enable an IPv6 interface
a. To assign the internet protocol details for IPV6 interface, do one of the following:
•
12
To assign the selected internet protocol details automatically, select Obtain an IPV6 address automatically.
•
To assign the network connection manually, select Set manually IPV6 address and enter the following details:
– IPv6 Address
– Subnet prefix length
7.
– Default Gateway
To enable NIC teaming, select Enable NIC teaming.
For information on NIC teaming, see Teaming network adapters.
8.
Click Next.
The Registration page is displayed.
Registration and Host settings
Register your appliance with the appropriate license key to avail the features accordingly. It is recommended that you change the
host name before starting backups. By default, the host name is the system name that the operating system assigns.
NOTE: If you want to change the host name, it is recommended that you change the host name at this stage. Changing
the host name after completing the DL Appliance Configuration wizard requires you to perform several steps.
1.
On the Registration page, you must select one of the options below:
•
Register now– To register your appliance with the purchased license. Enter the following details: license number in the
License number text box and the valid email address in the Email address text box
•
2.
Use trial license– To register your appliance with the trial license. The trial license expires in 30 days. To continue using the
product without interruption, register your appliance within that period.
Click next.
The Host Settings page is displayed.
3.
By default, the Host name of your appliance is displayed in the Host Name box. To change the host name of your appliance,
enter appropriate name in the Host Name text box.
4.
If you want to join your appliance to a domain, select Join this system to a domain check box and specify the following
information:
Otherwise, go to step 5.
NOTE: Joining to a domain is not possible on Windows Server 2012 R2 Foundation Edition. In this case the Join this
system to a domain check box is disabled).
5.
Text box
Description
Domain Address
Address of the domain to which you want to add your system
Domain
Administrator
Domain Administrator
Password
Password
Click Next.
The Alerts and Monitoring page is displayed.
Alerts and Monitoring
To enable alerts for both hardware and software changes you have two options — SNMP and SMTP. Simple Network
Management Protocol (SNMP) is a commonly used network management protocol that allows SNMP-compatible management
functions such as device discovery, monitoring, and event generation. SNMP provides network management of the TCP/IP
protocol. You can use Simple Network Management Protocol (SNMP) or Simple Mail Transfer Protocol (SMTP) to set alerts and
monitoring for your appliance.
To receive notifications, configure the options here:
NOTE: It is recommended that you configure alerts. You also have the option to skip configuring alerts, to skip
configuring alerts go to step 3.
1.
You have the following options to enable alerts:
13
•
•
To enable system SNMP alerts, select Enable system SNMP alerts.
1.
In SNMP Community, enter one or more SNMP community names. Use commas to separate multiple community
names.
2.
In SNMP Trap destinations, enter trap destinations and click Add.
To enable software SNMP alerts, select Enable software SNMP alerts option.
1.
In SNMP Community, enter one or more SNMP community names. Use commas to separate multiple community
names.
2.
In SNMP Trap destinations, enter trap destinations and click Add.
2.
To set software alerts through email, select Notify via email option and enter the valid email address.
3.
Click Next.
The Access and Management page is displayed.
Access and Management
To access and manage your appliance, you must configure Access and Management settings.
To configure the access and management settings of your appliance:
1.
On the Access and Management page, select or deselect the following options to access and manage your appliance through
the following:
•
2.
Enable Remote Desktop
•
Enable Windows Firewall
•
Enable IE Enhanced Security
•
Enable Windows Updates
• Use Proxy Server
If you select Use Proxy Server, enter the proxy address in the Proxy address text box and port number in the Port text
box.
3.
NOTE: If you want to set the access and management setting to default options, click Reset to Default button.
Click Next.
The Appliance Configuration Backup Options page is displayed.
Configuring Windows backup
NOTE: All DL flavors, except DL 1000 support Windows backup feature.
Appliance configuration backup options allows you to set the frequency at which your appliance configuration is backed up.
Windows backup data helps in recovering your appliance configuration settings from any of the states before failure.
1.
On the Appliance Configuration Backup Options, select Perform Appliance configuration backup.
You have the following options: Daily, Weekly, and Monthly.
2.
3.
To set the frequency for Windows backup, select one of the options:
Option
Description
Daily
Backs your configuration settings daily beginning at 12:01 AM
Weekly
Backs your configuration settings every week beginning every Sunday at 12:01 AM
Monthly
Backs your configuration settings every month beginning every Sunday at 12:01 AM
Click Next.
The Storage Provisioning page is displayed.
14
Storage provisioning
Your appliance allows you to provision its internal storage to create Virtual disks (VDs) to host repositories and Virtual Standby,
archives or other purposes.
1.
On the Storage Provisioning page, select the following configuration options for your storage.
The Repository Name is displayed as Repository 1 by default.
NOTE: The size of the repository depends on the license applied during registration of your appliance.
•
If you had applied trial license while registering your appliance there is no restriction in the repository size.
•
If you had applied purchased license while registering your appliance, the size of the repository corresponds to the
model. For example: In DL 4300 5 TB Appliance, repository of size 5 TB is created. You have an option to expand the
repository from the Provisioning page, by applying the expansion license, for more information see Rapid Recovery
6.0 on DL Appliance User’s Guide
•
2.
If you had applied the purchased expansion license, the size of the repository corresponds to the applied license. For
example: In DL43005 TB appliance, if the purchased license (N TB) is applied during registration, the repository of
size 5+N TB is created.
Select Allocate a portion of your storage for Virtual Standby, archives, or other purposes.
3.
Allocate the percentage of storage space that is available after creating the repository by using the slider. You can also use
Size box to specify the exact size.
4.
Click Next.
A virtual disk of specified capacity for hosting virtual standby VMs, archives, other purpose is created.
The initial repository is created and the VDs for hosting VMs or other purposes are created.
The Retention Policy page is displayed.
Configuring Retention policy and update options
Retention policies enforce the periods of time in which backups are stored on short-term (fast and expensive) media. Sometimes
certain business and technical requirements mandate extended retention of these backups, but use of fast storage is cost
prohibitive. In your appliance, retention policies can be customized to specify the length of time a backup recovery point is
maintained. As the age of the recovery points approaches the end of their retention period, the recovery points age out and are
removed from the retention pool.
1.
The following options let you define the length of time the backup snapshots of protected machines are stored and modify the
rollup process of merging and deleting old backups. The Retention Policy page displays the following options:
Table 4. Schedule options for default retention policy
Text Box
Description
Keep all recovery points for n
[retention time period]
Specifies the retention period for the recovery points.
Enter a number to represent the retention period and then select the time period. The default
is 3 days.
You can choose from: Days, Weeks, Months, or Years
…and then keep one recovery Provides a more granular level of retention. It is used as a building block with the primary
point per hour for n [retention setting to further define how long recovery points are maintained.
time period]
Enter a number to represent the retention period and then select the time period. The default
is 2 days.
You can choose from: Days, Weeks, Months, or Years
…and then keep one recovery
point per day for n [retention
time period]
Provides a more granular level of retention. It is used as a building block to further define how
long recovery points are maintained.
Enter a number to represent the retention period and then select the time period. The default
is 4 days.
You can choose from: Days, Weeks, Months, or Years
15
Text Box
Description
…and then keep one recovery
point per week for n
[retention time period]
Provides a more granular level of retention. It is used as a building block to further define how
long recovery points are maintained.
…and then keep one recovery
point per month for n
[retention time period]
Provides a more granular level of retention. It is used as a building block to further define how
long recovery points are maintained.
Enter a number to represent the retention period and then select the time period. The default
is 3 weeks.
You can choose from: Weeks, Months, or Years
Enter a number to represent the retention period and then select the time period. The default
is 2 months.
You can choose from: Months or Years
…and then keep one recovery Enter a number to represent the retention period and then select the time period.
point per year for n [retention You can choose from: Years
time period]
2.
Click Next.
The Update Options page is displayed.
3.
To check for appliance software update, select Check for appliance software update option.
If an update exists, it is downloaded and installed upon completion of the wizard.
4.
To enable Rapid Recovery Core updates, select Enable Rapid Recovery Core updates and then select one of the options
below:
•
5.
Notify about updates, but don not install them automatically
• Automatically install updates
Click Finish
The appliance settings are applied.
Recovery and Update Utility
The Recovery and Update Utility (RUU) is an all-in-one installer to recover and update DL Appliances (DL1000, DL1300, DL4000 and
DL4300) software. It includes the Rapid Recovery Core software and appliance-specific components.
RUU consists of updated versions of the Windows Server Roles and Features, .Net 4.5.2, LSI Provider, DL Applications,
OpenManage Server Administrator and Rapid Recovery Core Software. In addition, the Recovery and Update Utility also updates
the Rapid Appliance Self Recovery (RASR) content.
NOTE: If you are currently using any of the AppAssure Core versions, Rapid Recovery Core version 6.0.2.144 or earlier,
RUU forces an update to the most recent version available in the Payload. It is not possible to skip the update and this
update is not revertible. If you do not want to upgrade the Core software, do not run the RUU.
To install the most recent version of the RUU:
1.
Go to the License Portal under the Downloads section or go to support.dell.com and download the RUU installer.
2.
To start the RUU process, run launchRUU.exe file in the RUU package.
NOTE: Your system may reboot during the RUU update process.
Rapid Appliance Self Recovery
Rapid Appliance Self Recovery (RASR) is a bare metal restore process that quickly restores your Appliance to an operating state.
RASR offers two recovery options:
•
Restore factory settings
•
Recover your appliance to a state just before failure (OS, configurations, and settings are recovered)
16
Creating the RASR USB key
To create a RASR USB key:
1.
Navigate to the Appliance tab.
2.
Using the left pane navigation, select Appliance → Backup.
Create RASR USB Drive window is displayed.
NOTE: Insert a 16 GB or larger USB key before attempting to create the RASR key.
3.
After inserting a 16 GB or larger USB key, click on Create RASR USB Drive now.
A Prerequisite Check message is displayed.
After the prerequisites are checked, Create the RASR USB Drive window displays the minimum size required to create the
USB drive and List of Possible target paths.
4.
Select the target and click Create.
A warning dialog box is displayed.
5.
Click Yes.
The RASR USB Drive key is created.
6.
NOTE: Make sure to use the Windows Eject Drive function to prepare the USB key for removal. Otherwise, the
content in the USB key may be damaged and the USB key doesn’t work as expected.
Remove the RASR USB key created for each DL Appliance, label, and store for future use.
Executing RASR
NOTE: Dell recommends you to create a RASR USB key after you have set up the appliance. To create RASR USB key,
see Creating the RASR USB Key section.
NOTE: Ensure that you have the latest RUU available and reachable on your appliance.
.
NOTE: To perform system recovery using RASR, see Recovering a Dell™ DL Backup and Recovery Appliance using
Rapid Appliance Self Recovery (RASR) document at Dell.com/support/home.
To perform a factory reset:
1.
Insert the RASR USB key created.
2.
Restart the appliance and select Boot Manager (F11).
3.
In the Boot Manager Main Menu, select One-shot BIOS Boot Menu.
4.
In the Boot Manager Boot Menu, select the attached USB drive.
5.
Select your keyboard layout.
6.
Click Troubleshoot → Rapid Appliance Self Recovery.
7.
Select the target operating system (OS).
RASR is launched and welcome screen is displayed.
8.
Click Next.
The Prerequisites check screen is displayed.
NOTE: Ensure all the hardware and other prerequisites are checked before performing the RASR.
9.
Click Next.
The Recovery Mode Selection screen is displayed with three options:
•
System Recovery
•
Windows Recovery Wizard
•
Factory Reset
17
10. Select the Factory Reset option.
This option will recover the operating system disk from the factory image.
11. Click Next.
The following warning message is displayed in a dialog box: This operation will recover the operating
system. All OS disk data will be overwritten.
12. Click Yes.
The operating system disk starts restoring back to factory reset.
13. The RASR Completed page is displayed on completion of the recovery process. Click Finish.
14. Boot the system after restore.
15.
NOTE: Continue further only if you see the AppAssure Appliance Configuration Wizard, otherwise go to Step 17.
Wait for AppAssure Appliance Configuration Wizard to load, you need to close it. Close the wizard using the Windows Task
Manager.
16. Run launchRUU.exe file in the RUU package. Follow the instructions and select the option to continue with RUU installation and
complete the RUU installation.
17. The DL Appliance Configuration Wizard launches and will guide you through the rest of the restore process.
Your appliance operates normally now.
Executing the RASR through the Internal Dual SD Module
Your system is shipped with an Internal dual SD module and an SD card of 16 GB capacity.
To execute the RASR using the Internal Dual SD module (IDSDM):
1.
Reboot the appliance through the IDSDM.
CAUTION: Make sure that the SD Card is inserted in slot 1.
The following message is displayed.
The secondary SD card is missing, not responding, or in write-protected mode. Do one of
the following: 1) Install a SD card media in the secondary SD card reader. 2) Reseat or
replace the SD card media.3) If write-protected mode is expected, then no respose
action is required.
Ignore the above message.
2.
To continue executing the RASR through the Internal SD Module, perform step 5 through step 13 of the Executing the RASR
through RASR USB key section.
Provisioning storage
The appliance configures available internal storage and any attached supported external storage enclosures for:
•
Repositories
NOTE: If fibre channel HBA is configured then the process of creating the repositories is manual. Rapid Recovery will
not create a repository automatically in the root directory. For more information, see Configuring the DL4300 using
fibre channel storage (optional) section.
•
\
Disk volumes for standby VMs or any other purpose
NOTE: MD1400s with 1 TB, 2 TB, 4 TB or 6 TB (for high capacity) drives connected to the H830 controller are
supported. Up to four MD 1400s are supported.
NOTE: The DL4300 high-capacity configuration supports either H830 PERC SAS adapter or two Fibre Channel
HBAs. For more information on configuring fibre channel HBAs, see the DL4xxx — Fibre Channel Implementation
whitepaper located at Dell.com/support/home.
Before you begin provisioning storage on the disk, determine how much storage you want to allocate for standby virtual machines.
You can allocate any percentage of the available capacity remaining after creating the Rapid Recovery repository to host standby
virtual machines. For example, if you are using Storage Resource Management (SRM), you can allocate up to 100 percent capacity
18
of the storage remaining after creating the Rapid Recovery repository. Space can be allocated for standby VMs only on the
appliances that are provisioned to host virtual machines. Using the Rapid Recovery’s Live Recovery feature, you can use these
virtual machines to quickly replace a failed server that the appliance protects.
Based on a medium-sized environment that does not need standby virtual machines, you can use all of the storage to back up a
significant number of agents. However, if you need more resources for standby virtual machines and back up a smaller number of
agent machines, you can allocate more resources for larger VMs.
When you select the Appliance → Provisioning tab, the Rapid Recovery Appliance software locates the available storage space for
all supported controllers in the system and validates that the hardware meets the requirements.
To complete disk provisioning for all available storage:
1.
Click Appliance → Provisioning.
The Provisioning screen displays the Repositories and Storage Volumes sections.
CAUTION: Before proceeding ensure Step 2 through Step 4 is followed in this procedure.
2.
Provision available storage to create:
•
3.
Repository
• Disk volumes for standby VMs or any other purpose
To create a repository:
a. On the provisioning page, in the Repositories section, click Add New Repository
The Add New Repository dialog box appears.
b. Enter the information as described in the following table.
Table 5. Provisioning storage
Text Box
Repository Name
Description
Enter the display name of the repository.
By default, this text box consists of the word Repository and a number, which
corresponds to the number of repositories for this Core. For example, if this is the
second repository, the default name is Repository 2. Change the name as needed.
Repository names must contain between 1 and 40 alphanumeric characters, including
spaces. Do not use prohibited characters or prohibited phrases . For more information,
see the topics ‘prohibited characters’ or ‘prohibited phrases’ in the Dell Data Protection
| Rapid Recovery 6.0 User Guide.
Controller
Select the appropriate storage controller depending on whether you are creating
repository on internal storage or on direct-attached storage enclosure.
Enclosure
Select the appropriate storage enclosure.
RAID type
Select the appropriate RAID level. You have the following options for RAID
configuration: 1, 5, or 6.
NOTE: Your system allows you to create repository only in the RAID levels in
which the storage is configured and as available out of factory. To create
repository in desired RAID configuration, you must configure your storage in
the desired RAID level. To configure storage in the desired RAID level, see Dell
Adapters documentation at www.dell.com/support/home.
Estimated capacity
Displays the estimated capacity available for creating a repository.
Controller available space
Displays the available space on the controller.
Size
Enter the size of the repository.
c. Click Create.
A new repository is created.
4.
To create disk volumes for standby VM or any other purpose:
a. In the Storage Volume section, click Create Volume.
19
b. In the Create Volume dialog box, specify the following information for a new disk volume Volume name, Controller,
Enclosure, RAID type, and Size.
The Controller available space is displayed by default. You can select one of the following RAID configurations: 1, 5, or 6.
c. Click Create.
A new storage volume is created.
Configuring the DL4300 using fibre channel storage (optional)
The DL4300 high-capacity edition offers a fibre channel HBA storage option allowing for creation of repositories using fibre channel
storage arrays.
NOTE: If the fibre channel configuration is ordered it will replace the slotted H830 PERC SAS adapter.
NOTE: For prerequisites, assumptions, and detailed information on the following steps, see the DL4xxx — Fibre Channel
Implementation whitepaper located at dell.com/support/home.
To integrate and configure the DL4300 using the fibre channel storage:
1.
Connect the DL4300 fibre channel HBA to a SAN switch.
2.
Install either the Qlogic or the Emulex HBAs management software for any adapter that was ordered with the system.
3.
Install the storage array multi-path software.
4.
Perform the fibre channel zoning.
5.
Create a fibre channel LUN to be assigned and used as a DL4300 repository.
6.
Mount the fibre channel storage LUN.
7.
Configure the DL4300 fibre channel storage as a backup repository.
20
3
Post installation tasks
After completing the DL Appliance Configuration Wizard perform the following procedures to ensure that your backup appliance
and the servers that the appliance is backing up are correctly configured.
NOTE: The appliance is configured with a 30–day temporary Rapid Recovery software license. To obtain a permanent
license key, log on to the Dell AppAssure License Portal at www.dell.com/DLActivation. For details on changing a license
key in the Rapid Recovery software, see the Dell Data Protection | Rapid Recovery License Portal User Guide.
Accessing the Core Console
Ensure that you update trusted sites as discussed in the topic Update Trusted Sites In Internet Explorer, and configure your
browsers as discussed in the topic Configuring Browsers To Remotely Access The Core Console. After you update trusted sites in
Internet Explorer, and configure your browsers, perform one of the following to access the Core Console:
•
Log on locally to your Rapid Recovery core server, and then double-click the Core Console icon.
•
Type one of the following URLs in your web browser:
– https://<yourCoreServerName>:8006/apprecovery/admin/core
– https://<yourCoreServerIPaddress>:8006/apprecovery/admin/core
Updating trusted sites in Internet Explorer
To update the trusted sites in Internet Explorer:
1.
Open Internet Explorer.
2.
If the File, Edit View, and other menus are not displayed, press <F10>.
3.
Click the Tools menu, and select Internet Options.
4.
In the Internet Options window, click the Security tab.
5.
Click Trusted Sites and then click Sites.
6.
In Add this website to the zone, enter https://[Display Name], using the new name you provided for the Display Name.
7.
Click Add.
8.
In Add this website to the zone, enter about:blank.
9.
Click Add.
10. Click Close and then OK.
Configuring browsers to remotely access the Core Console
To access the Core Console from a remote machine, you need to modify your browser settings.
NOTE: To modify the browser settings, log in to the system as an administrator.
NOTE: Google Chrome uses Microsoft Internet Explorer settings, change Chrome browser settings using Internet
Explorer.
21
NOTE: Ensure that the Internet Explorer Enhanced Security Configuration is turned on when you access the Core Web
Console either locally or remotely. To turn on the Internet Explorer Enhanced Security Configuration:
1.
Open Server Manager.
2.
Select Local Server IE Enhanced Security Configuration displayed on the right. Ensure that it is On.
Configuring browser settings in Internet Explorer and Chrome
To configure browser settings in Internet Explorer and Chrome:
1.
From the Internet Options screen, select the Security tab.
2.
Click Trusted Sites and then click Sites.
3.
Deselect the option Require server verification (https:) for all sites in the zone, and then add http://<hostname or IP
Address of the Appliance server hosting the Rapid Recovery Core> to Trusted Sites.
4.
Click Close, select Trusted Sites, and then click Custom Level.
5.
Scroll to Miscellaneous → Display Mixed Content and select Enable.
6.
Scroll to the bottom of the screen to User Authentication → Logon, and then select Automatic logon with current user name
and password.
7.
Click OK, and then select the Advanced tab.
8.
Scroll to Multimedia and select Play animations in webpages.
9.
Scroll to Security, check Enable Integrated Windows Authentication, and then click OK.
Configuring browser settings in Firefox
To modify browser settings in Firefox:
1.
In the Firefox address bar, type about:config, and then click I’ll be careful, I promise if prompted.
2.
Search for the term ntlm.
The search should return at least three results.
3.
4.
Double-click network.automatic-ntlm-auth.trusted-uris and enter the following setting as appropriate for your machine:
•
For local machines, enter the host name.
•
For remote machines, enter the host name or IP address separated by a comma of the appliance system hosting the Core;
for example, IP Address, host name.
Restart Firefox.
Reviewing retention periods
Rapid Recovery sets default retention periods that determine how often snapshots are taken and how long the snapshots are
retained. The retention periods must be based on the needs of your environment. For example, if you are backing up servers that
run frequently changing, mission-critical data that is essential for business continuity, snapshots must be taken frequently.
To review and change retention periods:
1.
Open the Core Console.
2.
Select the Configuration tab and then click Retention Policy.
3.
Adjust the retention policy based on the needs of your organization.
4.
Click Apply.
Encrypting agent snapshot data
The Core can encrypt agent snapshot data within the repository. Instead of encrypting the entire repository, it allows you to specify
an encryption key during the protection of an agent in a repository which allows the keys to be reused for different agents.
22
To encrypt agent snapshot data:
1.
From the AppAssure Core, click Configuration → Manage → Security.
2.
Click Actions, and then click Add Encryption Key.
The Create Encryption Key page is displayed.
3.
Complete the following information:
Field
Description
Name
Enter a name for the encryption key.
Comment
Enter a comment for the encryption key. It is used to provide extra details about the encryption key.
Passphrase
Enter a passphrase. It is used to control access.
Confirm
Passphrase
Re-enter the passphrase. It is used to confirm the passphrase entry.
NOTE: It is recommended that you record the encryption passphrase, as losing the passphrase makes the data
inaccessible.
Configuring an email server and email notification template
If you want to receive email notifications about events, configure an email server and an email notification template.
NOTE: You must also configure notification group settings, including enabling the Notify by email option, before email
alert messages will be sent. For more information on specifying events to receive email alerts, see 'Configuring
Notification Groups For System Events' in Dell DL4300 Appliance User’s Guide.
To configure an email server and email notification template:
1.
From the Core, select the Configuration tab.
2.
From the Manage option, click Events.
3.
In the Email SMTP Settings pane, click Change.
The Edit Email Notification Configuration dialog box appears.
4.
Select Enable Email Notifications, and then enter details for the email server described as follows:
Text Box
Description
SMTP Server
Enter the name of the email server to be used by the email notification template. The naming
convention includes the host name, domain, and suffix; for example, smtp.gmail.com.
Port
Enter a port number. It is used to identify the port for the email server; for example, the port 587 for
Gmail.
The default is 25.
Timeout (seconds)
To specify how long to try a connection before timing out, enter an integer value. It is used to establish
the time in seconds when trying to connect to the email server before a time-out occurs.
The default is 30 seconds.
TLS
Select this option if the mail server uses a secure connection such as Transport Layer Security (TLS)
or Secure Sockets Layer (SSL).
Username
Enter a user name for the email server.
Password
Enter a password for accessing the email server.
From
Enter a return email address. It is used to specify the return email address for the email notification
template; for example, [email protected]
Email Subject
Enter a subject for the email template. It is used to define the subject of the email notification template;
for example, <hostname> - <level> <name>.
23
Text Box
Description
Email
Enter information for the body of the template that describes the event, when it occurred, and the
severity.
5.
Click Send Test Email and review the results.
6.
After you are satisfied with the results of the tests, click OK.
Adjusting the number of streams
By default, Rapid Recovery is configured to allow three concurrent streams to the appliance. It is recommended that the number of
streams is set between 10 and 15 for optimal performance.
To change the number of concurrent streams:
1.
Select the Configuration tab and then click Settings.
2.
Select change in Transfer Queue.
3.
Change Maximum Concurrent Transfers to a number between 10 and 15 for optimal performance, but if the performance
seems unsatisfactory, try tuning it manually.
24
4
Preparing to protect your servers
Overview
To protect your data using DL 4300, you need to add the workstations and servers for protection in the Core Console; for example,
your Exchange server, SQL Server, your Linux server, and so on.
In the Core Console, you can identify the machine on which an Agent is installed and specify which volumes, for example, a
Microsoft Windows Storage Space, to protect. You can define the schedules for protection, add additional security measures such
as encryption, and much more. For more information on how to access the Core Console to protect workstations and servers, see
Protecting a machine.
Installing agents on clients
Each client that is backed up by the DL 4300 appliance must have the Rapid Recovery agent installed. The Rapid Recovery Core
console enables you to deploy agents to machines. Deploying agents to machines requires pre-configuring settings to select a single
type of agent to push to clients. This method works well if all clients are running the same operating system. However, if there are
different versions of operating systems, you may find it easier to install the agents on the machines.
You can also deploy the Agent software to the agent machine during the process of protecting a machine. This option is available
for machines that do not already have the Agent software installed. For more information on deploying the Agent software while
protecting a machine, see the Rapid Recovery on DL Appliance User’s Guide at Dell.com/support/home.
Deploying the agent software when protecting an agent
You can download and deploy agents during the process of adding an agent for protection.
NOTE: This procedure is not required if you have already installed the Agent software on a machine that you want to
protect.
If the Agent software is not installed prior to protecting a machine, you will not be able to select specific volumes for
protection as part of this wizard. In this case, by default, all volumes on the agent machine will be included for
protection.
Rapid Recovery supports the protection and recovery of machines configured with EISA partitions. Support is also
extended to Windows 8 and 8.1, and Windows 2012 and 2012 R2 machines that use Windows Recovery Environment
(Windows RE).
1.
Do one of the following:
•
•
If you are starting from the Protect Machine Wizard, proceed to Step 2 . .
If you are starting from the Rapid Recovery Core Console, from the button bar, click Protect.
The Protect Machine Wizard appears.
2.
On the Welcome page, select the appropriate installation options:
•
•
3.
If you do not need to define a repository or establish encryption, select Typical.
If you need to create a repository, or define a different repository for backups for the selected machine, or if you want to
establish encryption using the wizard, select Advanced (show optional steps).
• Optionally, if you do not wish to see the Welcome page for the Protect Machine Wizard in the future, select the option
Skip this Welcome page the next time the wizard opens.
When you are satisfied with your choices on the Welcome page, then click Next.
The Connection page appears.
25
4.
On the Connection page, enter the information about the machine to which you want to connect as described in the following
table, and then click Next.
Table 6. Machine connection settings
Text Box
Description
Host
The host name or IP address of the machine that you want to protect.
Port
The port number on which the Rapid Recovery Core communicates with the Agent on the machine.
The default port number is 8006.
User name
The user name used to connect to this machine; for example, Administrator (or, if the machine is in a
domain, [domain name]\Administrator).
Password
The password used to connect to this machine.
If the Install Agent page appears next in the Protect Machine Wizard, that means that Rapid Recovery does not detect the
Rapid Recovery Agent on the machine and will install the current version of the software.
5.
NOTE: The Agent software must be installed on the machine you want to protect, and that machine must be
restarted, before it can back up to the Core. To have the installer reboot the protected machine, select the option
After installation, restart the machine automatically (recommended) before clicking Next.
Click Next.
Installing the Rapid Recovery Agent software on Windows machines
Deploy the Rapid Recovery Agent installer file to the machine you want to protect using one of the methods described in the topic
“Installing the Rapid Recovery Agent software” in the Dell Data Protection | Rapid Recovery 6.0 Installation and Upgrade Guide.
Then launch the installer program as described below to install or upgrade the software on each Windows machine you want to
protect in the Rapid Recovery Core.
NOTE: You must run the installer with local administrator privileges.
1.
From the machine you want to protect, double-click on the executable Rapid Recovery Agent installer file to start the installer.
Depending on the configuration of your machine, the User Account Control window or the Open File - Security Warning
window could appear.
2.
If prompted for permission, confirm that you want to run the installer and make changes to the system.
3.
If .NET components are missing or need to be upgraded, accept the prompts to download and install the framework.
4.
In the language field, select the appropriate language and then click OK.
5.
Choose from one of the following:
•
If this is the first time the Rapid Recovery Agent software is being installed on this machine, the installer prepares the
installation, and then the Rapid Recovery Agent Installation Wizard appears. Proceed to Step 6.
•
If this machine has an earlier version of the AppAssure Agent or Rapid Recovery Agent software installed, you will see a
message asking if you want to upgrade to the current version.
1.
Click Yes.
The Rapid Recovery Agent Installation Wizard appears, showing the Progress page of the wizard. The application
downloads to the destination folder, with progress displayed in the progress bar. When finished, the wizard
automatically advances to the Completed page.
6.
2. Skip to Step 12.
In the Rapid Recovery Agent Installation Wizard, on the Welcome page, click Next to continue with the installation.
The License Agreement page appears.
7.
On the License Agreement page, click I accept the terms in the license agreement, and then click Next.
The Prerequisites page appears.
8.
The Rapid Recovery Agent Installer verifies the existence of the prerequisite files.
•
26
If the prerequisite files exist, a message appears indicating that all prerequisites are installed on the machine.
•
9.
If the prerequisite files do not exist, the Rapid Recovery Agent Installer identifies which files are needed and displays the
results accordingly; for example, CRT 2013 (x64) ENU (distributable code for Microsoft Visual Studio®), or Microsoft
System CLR Types for SQL Server 2008 R2 (x64). Click Install Prerequisites.
When the installation of the prerequisite files is completed, click Next.
The Installation Options page appears.
10. On the Installation Options page, review the installation options. If necessary, modify them as described below.
•
In the Destination Folder text field, review the destination folder for the installation. If you want to change the location, do
the following:
– Click the folder icon.
– In the Browse to Destination Folder dialog box, select a new location.
– Click OK.
•
In the Port Number text field, enter a port number to use for communication between the Agent software on the
protected machine and the Rapid Recovery Core.
NOTE: The default value is 8006. If you change the port number, be sure to make note of it in the event that you
need to adjust configuration settings at a later time.
•
Select Allow Agent to automatically send diagnostic and usage information to Dell Inc. to send diagnostic and usage
information to Dell. If you do not want to send this information, clear this option.
11. Once you are satisfied with the installation options, click Install.
The Progress page appears, and includes a status bar that lets you monitor the progress of the installation.
When the installation is complete, the Completed page appears. Skip to Step 12. .
12. On the Completed page, if you see a message indicating that the system must be restarted before the installation takes effect,
perform one of the following steps:
•
To restart now, select Yes, I want to restart my computer now.
• To restart later, clear the Yes, I want to restart my computer now option.
13. On the Completed page, click Finish.
The installer wizard closes, and the Agent installation is complete.
Deploying the Rapid Recovery Agent software to one or more machines
You can simplify the task of deploying the Rapid Recovery Agent software to one or more Windows machines by using the Deploy
Agent Software Wizard.
NOTE: In the past, this feature was referred to as "bulk deploy."
When you use the Deploy Agent Software Wizard, Rapid Recovery can automatically detect machines on a host and let you select
the machines to which you want to deploy. For machines on domains or hosts other than Active Directory or vCenter or ESX(i), you
can manually connect to individual machines by using their IP addresses and the appropriate credentials. You can also push upgrades
of the software to machines that the local Rapid Recovery Core already protects.
From within the Core Console, you can complete any of the following tasks:
•
Deploying to machines on an Active Directory domain
•
Deploying to machines on a VMware vCenter/ESX(i) virtual host
NOTE: Dell recommends limiting the number of machines to which you deploy simultaneously to 50 or fewer, to preclude
experiencing resource constraints that may cause the deploy operation to fail.
Installing Microsoft Windows agents at the client
To install the agents:
1.
Verify that the client has the Microsoft .NET 4 framework installed:
a. On the client, start the Windows Server Manager.
b. Click Configuration → Services.
c. Ensure that Microsoft .NET Framework appears in the list of services.
27
If it is not installed, you can get a copy from microsoft.com.
2.
Install the agent:
a. On your appliance, share the directory C:\Program Files\AppRecovery to the client(s) you plan to back up.
b. On the client system, map a drive to C:\Program Files\AppRecovery on your DL appliance.
c. On the client system, open the C:\Program Files\AppRecovery directory and double-click the correct agent for the client
system to begin the installation.
Deploying to machines on an Active Directory domain
Use this procedure to simultaneously deploy the Rapid Recovery Agent software to one or more machines on an Active Directory
domain.
Before you begin this procedure, have the domain information and logon credentials for the Active Directory server on hand.
1.
On the Rapid Recovery Core Console, click the Protect drop-down menu, and then click Deploy Agent Software.
The Deploy Agent Software Wizard opens.
2.
On the Connection page of the wizard, from the Source drop-down list, select Active Directory.
3.
Enter the domain information and logon credentials as described in the following table.
Table 7. Domain information and credentials
Text Box
Description
Host
The host name or IP address of the Active Directory domain.
User name
The user name used to connect to the domain; for example, Administrator or, if the machine is in a
domain, [domain name]\Administrator).
Password
The secure password used to connect to the domain.
4.
Click Next.
5.
On the Machines page, select the machines to which you want to deploy the Rapid Recovery Agent software.
6.
Optionally, to automatically restart the protected machines after the Agent is installed, select After Agent installation, restart
the machines automatically (Recommended).
7.
Click Finish.
The system automatically verifies each machine that you selected.
If Rapid Recovery detects any concerns during automatic verification, the wizard progresses to a Warnings page, where you
can clear machines from selection and manually verify the selected machines. If the machines you added pass the automatic
verification, they appear on the Deploy Agent to Machines pane.
8.
If the Warning page appeared and you are still satisfied with your selections, click Finish again.
The Rapid Recovery Agent software deploys to the specified machines. The machines are not yet protected. To protect machines,
see the topic “Protecting multiple machines on the Active Directory domain” in the Rapid Recovery 6.0 on DL Appliances User’s
Guide.
Deploying to machines on a VMware vCenter/ESX(i) virtual host
Use this procedure to simultaneously deploy the Rapid Recovery Agent software to one or more machines on a VMware vCenter/
ESX(i) virtual host.
Before starting this procedure, you must have the following information:
•
Logon credentials for the VMware vCenter/ESX(i) virtual host.
•
Host location.
•
Logon credentials for each machine you want to protect.
NOTE: All virtual machines must have VMware Tools installed; otherwise, Rapid Recovery cannot detect the host name
of the virtual machine to which to deploy. In lieu of the host name, Rapid Recovery uses the virtual machine name, which
may cause issues if the host name is different from the virtual machine name.
1.
On the Rapid Recovery Core Console, click the Protect drop-down menu, and then click Deploy Agent Software.
The Deploy Agent Software Wizard opens.
2.
28
On the Connection page of the wizard, from the Source drop-down list, select vCenter / ESX(i).
3.
Enter the host information and logon credentials as described in the following table.
Table 8. vCenter/ESX(i) connection settings
Text Box
Description
Host
The name or IP address of the VMware vCenter Server/ESX(i) virtual host.
Port
The port used to connect to the virtual host.
The default setting is 443.
User name
The user name used to connect to the virtual host; for example, Administrator or, if the machine is in a
domain, [domain name]\Administrator.
Password
The secure password used to connect to this virtual host.
4.
Click Next.
5.
On the Machines page of the wizard, select one of the following options from the drop-down menu:
•
6.
Hosts and Clusters
• VMs and Templates
Expand the list of machines, and then select the VMs to which you want to deploy the software.
A notification appears if Rapid Recovery detects that a machine is offline or that VMware Tools are not installed.
7.
If you want to restart the machines automatically after deployment, select After Agent installation, restart the machines
automatically (Recommended).
8.
Click Next.
Rapid Recovery automatically verifies each machine you selected.
9.
On the Adjustments page of the wizard, enter the credentials for each machine in the following format:
hostname::username::password.
NOTE: Enter one machine on each line.
10. Click Finish.
The system automatically verifies each machine that you selected.
If Rapid Recovery detects any concerns during automatic verification, the wizard progresses to a Warnings page, where you
can clear machines from selection and manually verify the selected machines. If the machines you added pass the automatic
verification, they appear on the Deploy Agent to Machines pane.
11. If the Warning page appeared and you are still satisfied with your selections, click Finish again.
The Rapid Recovery Agent software deploys to the specified machines.
About installing the Agent software on Linux machines
When installing the Agent software on Linux machines that you want to protect, use the following guidance. After installation is
complete, configure the Agent as described in the topic “Configuring the Rapid Recovery Agent on a Linux machine” in the Dell
Data Protection | Rapid Recovery 6.0 Installation and Upgrade Guide.
CAUTION: After configuring the newly installed Agent software on a Linux machine, restart the machine. Restarting
ensures that the proper kernel driver version is used to protect your machine.
The method for installing and removing the Agent software on Linux machines has changed. As of release 6.0.1, the following
factors apply:
•
One set of instructions applies to installations of Agent on a Linux machine with current access to the Internet. This is referred
to as online installation. Instead of using shell scripts, package managers are used to install or remove the Rapid Recovery
software from a repository referenced on the local Linux machine.
NOTE: The repository is used for staging of files for the relevant package managers. This repository is not related to
the Rapid Recovery repository.
•
If installing Agent on a Linux machine with no access to the Internet (such as an air-gapped or secured standalone machine),
this is referred to as offline installation. For this process, you must first download an installation package from a Linux machine
with Internet access, and then move those installation files to the secured computer for installation.
29
Because the various supported Linux distributions use different package managers for online installation, the procedure for installing,
upgrading, or removing Agent on any supported Linux OS depends on the package manager used. The package managers, and the
Linux distributions they support, are described in the following table.
Table 9. Package managers and the Linux distributions they support
Package Manager
Linux Distribution
yum
Linux distributions based on Red Hat Enterprise Linux (RHEL), including RHEL, CentOS, and Oracle Linux.
zypper
SUSE Linux Enterprise Server (SLES) versions 11, 12
apt
Linux distributions based on Debian, including Debian 7 or 8, and Ubuntu 12.04 and later
As a one-time setup step for each Linux machine, you must configure your local software repository to point to the location where
the package manager obtains Dell Rapid Recovery installation files.
NOTE: This process is represented by steps 1 through 4 in each of the installation procedures. When upgrading future
editions of the Rapid Recovery Agent on a Linux machine with the repository configured, you will not need to perform
these steps.
After you configure a software repository on your Linux machine, the package manager is able to retrieve and install the packages
needed for installation or removal of Rapid Recovery Agent software and related components, such as aamount (now called local
mount), aavdisk (now called rapidrecovery-vdisk), and Mono (an open source, Ecma standard-compliant, .NET Frameworkcompatible tool set used for porting the Agent software to Linux platforms).
For each package manager, you can run the appropriate command at the command line to determine if it is configured to download
Rapid Recovery packages. These commands are listed in the following table.
Table 10. Command to show package manager repository configuration
Package Manager
Command to list configured repositories
yum
yum replolist
zypper
zypper repos
apt
ls /etc/apt/sources.list.d
Previous versions of the AppAssure Agent software must be completely removed from a Linux machine before installing the Rapid
Recovery Agent version and protecting the Linux machine using the Rapid Recovery Core. This is true for online or offline
installations. Removing AppAssure Agent employs the use of shell scripts. The uninstall instructions differ, depending on the Linux
distribution you are using. For more information on uninstalling AppAssure Agent from a Linux machine, see the topic “Uninstalling
the AppAssure Agent software from a Linux machine” in the Dell Data Protection | Rapid Recovery 6.0 Installation and Upgrade
Guide.
NOTE: Removal of the new Rapid Recovery Agent software uses the package manager for each distribution. Therefore,
if uninstalling a version of Rapid Recovery Agent, see the appropriate procedure under the topic see the topic
“Uninstalling the AppAssure Agent software from a Linux machine” in the Dell Data Protection | Rapid Recovery 6.0
Installation and Upgrade Guide.
If installing Rapid Recovery Agent on a Linux machine that has never had AppAssure Agent installed, determine the appropriate
package manager from the preceding table. Then follow the appropriate installation procedure.
After configuring the newly installed Agent software on a Linux machine, you must restart the machine. Restarting ensures that the
proper kernel driver version is used to protect your machine.
Thus, the installation process when upgrading from AppAssure to Rapid Recovery involves:
•
Removing the AppAssure Agent software (not required for first-time installations)
•
Determine the relevant package manager for your Linux distribution
•
Follow the procedure for installing Rapid Recovery Agent on the Linux machine, including configuring the software repository
(steps 1 through 4 of the installation procedure)
•
Run the configuration utility to set port, configure users, add firewall exclusions, install the kernel module, and start the Agent
service.
30
•
Restart the Linux machine
The instructions for installing the Agent software on a Linux machine differ slightly depending on the Linux distribution you are using.
For more information about preparing for and installing the Agent software for a Linux machine connected to the Internet, see the
appropriate topic. You can choose from the following sections:
•
Installing the Rapid Recovery Agent software on Debian or Ubuntu
•
Installing the Rapid Recovery Agent software on SUSE Linux Enterprise Server
For more information about preparing for and installing the Agent software for a Linux machine that is not connected to the
Internet, see the topic:
•
Installing the Agent software on offline Linux machines
Before you begin installation of Agent software, see the topics: Downloading the Linux distribution, About security, Location of Linux
Agent files, Agent dependencies, Linux scripting information in the Dell Data Protection | Rapid Recovery 6.0 Installation and
Upgrade Guide.
Location of Linux Agent files
There are several files required to support the Rapid Recovery Agent software on a Linux machine. For all supported Linux
distributions, these files are located in the following directories:
•
mono:
/opt/apprecovery/mono
•
agent:
/opt/apprecovery/agent
•
local mount:
/opt/apprecovery/local_mount
•
rapidrecovery-vdisk and aavdctl:
/usr/bin/aavdisk
•
configuration files for rapidrecovery-vdisk:
/etc/apprecovery/aavdisk.conf
•
wrappers for agent and local_mount
/usr/bin/agent
/usr/bin/local_mount
•
autorun scripts for agent and rapidrecovery-vdisk:
/etc/init.d/rapidrecovery-agent
/etc/init.d/rapidrecovery-vdisk
Agent dependencies
The following dependencies are required and are installed as part of the Agent installer package:
•
For Debian and Ubuntu:
– The rapidrecovery-agent requires:
dkms, gcc, make, linux-headers-‘uname-r‘
libc6 (>=2.7-18), libblkid1, libpam0g, libpcre3
– The rapidrecovery-mono requires:
libc6 (>=2.7-18)
•
For Red Hat Enterprise Linux, CentOS, and Oracle Linux:
– The nbd-dkms requires
dkms, gcc, make, kernel-headers-‘uname-r‘ kernel-devel-‘uname-r‘
31
– The rapidrecovery-agent requires:
dkms, gcc, make, kernel-headers-‘uname-r‘ kernel-devel-‘uname-r‘,
nbd-dkms, libblkid, pam, pcre
– The rapidrecovery-mono requires:
glibc >=2.11
•
For SUSE Linux Enterprise Server:
– The nbd-dkms requires:
dkms, gcc, make, kernel-syms
– The rapidrecovery-agent requires:
dkms, kernel-syms, gcc, make, libblkid1, pam, pcre
– The rapidrecovery-mono requires:
glibc >= 2.11
Installing the Rapid Recovery Agent software on Debian or Ubuntu
The Rapid Recovery Agent .deb file is an archive containing repository information specific to the apt package manager. Complete
the following steps to install the Rapid Recovery Agent on Debian or Ubuntu machines for an online installation.
NOTE: This procedure applies to a Linux machine that is connected to the internet. For offline installation of Rapid
Recovery Agent on any Linux machine, see Installing the Agent software on offline Linux machines.
1.
Open a terminal session with root access.
2.
Determine your present working directory by entering PWD and pressing Enter. For example, assume your directory is /home/
rapidrecovery/.
3.
Download the appropriate Rapid Recovery Agent .deb installation file from the License Portal at https://licenseportal.com to
your present working directory.
For more information about the license portal, see the Dell Data Protection | Rapid Recovery License Portal User Guide.
4.
To establish a persistent connection between your Linux machine and the remote Dell repository in which Rapid Recovery
software and components are stored, type the following command:
dpkg -i <.deb installation file you downloaded>
For example, if the installer file is named rapidrecovery-repo-6.0.2.999.deb in the directory /home/rapidrecovery/, type the
following command, and then press Enter:
dpkg -i rapidrecovery-repo-6.0.2.999.deb
Any missing packages or files required by the Agent will be downloaded from the remote repository and installed automatically
as part of the script.
NOTE: For more information on dependencies for installing on a Linux machine, see Agent dependencies.
5.
Install the Rapid Recovery Agent by invoking the apt package manager, updating the repository manager. Type the following
command, and then press Enter:
apt-get update
6.
Instruct the package manager to install the Rapid Recovery Agent software. Type the following command, and then press
Enter:
apt-get install rapidrecovery-agent
7.
The package manager prepares to install all dependent files. If prompted to confirm installation of unsigned files, enter y and
then press Enter.
The Rapid Recovery Agent files are installed.
Installing the Rapid Recovery Agent software on SUSE Linux Enterprise Server
The Rapid Recovery Agent .rpm file is an archive containing repository information for SUSE Linux Enterprise Server (SLES) . This
distribution uses the zypper package manager. Complete the following steps to install the Rapid Recovery Agent on SLES.
32
NOTE: This procedure applies to a Linux machine that is connected to the internet. For offline installation of Rapid
Recovery Agent on any Linux machine, see Installing the Agent software on offline Linux machines .
1.
Open a terminal session with root access.
2.
Determine your present working directory by entering PWD and pressing Enter. For example, assume your directory is /home/
rapidrecovery/.
3.
Download the appropriate Rapid Recovery Agent .rpm installation file from the License Portal at https://licenseportal.com to
your present working directory.
For more information about the license portal, see the Dell Data Protection | Rapid Recovery License Portal User Guide.
4.
To establish a persistent connection between your Linux machine and the remote Dell repository in which Rapid Recovery
software and components are stored, type the following command:
rpm -ivh <.rpm installation file you downloaded>
For example, if the installer file is named rapidrecovery-repo-6.0.2.999.rpm in the directory /home/rapidrecovery/, type the
following command, and then press Enter:
rpm -ivh rapidrecovery-repo-6.0.2.999.rpm
Any missing packages or files required by the Agent will be downloaded from the remote repository and installed automatically
as part of the script.
NOTE: For more information on dependencies for installing on a Linux machine, see Agent dependencies.
5.
Install the Rapid Recovery Agent by invoking the zypper package manager, updating the repository manager. Type the
following command, and then press Enter:
apt-get update
6.
Instruct the package manager to install the Rapid Recovery Agent software. Type the following command, and then press
Enter:
apt-get install rapidrecovery-agent
7.
The package manager prepares to install all dependent files. If prompted to confirm installation of unsigned files, enter y and
then press Enter.
The Rapid Recovery Agent files are installed.
Installing the agent on Red Hat Enterprise Linux and CentOS
NOTE: Before performing these steps, ensure that you have downloaded the Red Hat or CentOS installer package to
the /home/system directory. The following steps are the same for both 32-bit and 64-bit environments.
To install an agent on Red Hat Enterprise Linux and CentOS:
1.
Open a terminal session with root access.
2.
To make the Agent installer executable, type the following command:
chmod +x appassure-installer__rhel_amd64_5.x.x.xxxxx.sh and then press <Enter>.
NOTE: For 32-bit environments, the installer is named appassureinstaller__
rhel_i386_5.x.x.xxxxx.sh.
The file becomes executable.
3.
To extract and install the Agent, type the following command:
/appassure-installer_rhel_amd64_5.x.x.xxxxx.sh and then press <Enter>.
The Linux agent begins its extraction and installation process. Any missing packages or files required by the agent is
downloaded and installed automatically as part of the script.
For information on the files required by the Agent, see Agent dependencies.
After the installer completes, the Agent will be running on your machine. For more information on protecting this machine with the
Core, see the topic 'Protecting Workstations and Servers' in the Rapid Recovery 6.0 on DL Appliances User’s Guide at Dell.com/
support/home.
33
Installing the Agent software on offline Linux machines
This task requires access to an online Linux machine, removable storage media, and access to the final offline Linux machine. If
AppAssure Agent is installed on the offline Linux machine, you must first uninstall it before installing Rapid Recovery Agent. For more
information, see “Uninstalling the AppAssure Agent software from a Linux machine” section in Dell Data Protection | Rapid
Recovery Installation and Upgrade Guide.
When installing the Agent software on Linux machines that do not have access to the Internet, follow this procedure. After
installation is complete, configure the Agent as described in the topic Configuring the Rapid Recovery Agent on a Linux machine.
NOTE: If installing on multiple Linux distributions, perform this procedure once for each distribution.
1.
From a Linux machine with access to the Internet, open a terminal window and type the following command:
wget http://s3.amazonaws.com/repolinux/6.0.2/packages-downloader.sh
The shell script downloads to your current directory.
2.
Run the shell script by executing the following command:
bash packages-downloader.sh
The script executes and prompts you to select a specific Linux distribution and architecture.
3.
Type the index of the installation package you want and press Enter.
For example, to obtain an installation package for Red Hat Enterprise Linux 7, enter 3 and press Enter.
The appropriate installer is extracted into the ~/rapidrecovery.packages/ directory.
NOTE: The tilde ~/ characters represent your home directory.
4.
Copy the packages for Rapid Recovery Agent to removable media. The specific location of your removable media can differ
based on Linux distribution. Type the following command and then press Enter:
cp -R ~/rapidrecovery.packages/ <your_removable_media>
For example, if using a removable USB drive that is mounted to location /media/USB-drive-1, type the following command and
then press Enter:
cp -R ~/rapidrecovery.packages /media/USB-drive-1
All the necessary files are copied to the removable medium.
5.
Take the removable medium to the offline Linux machine and mount the drive.
6.
Copy the data from the mounted device to your home directory or other desired location. For example, type the following
command and then press Enter:
cp -R /media/USB-drive-1 ~/rapidrecovery.packages
7.
Change to the Rapid Recovery directory. For example, type the following command and then press Enter:
cd ~/rapidrecovery.packages
8.
Run the installation of Agent with root privileges. This command differs based on Linux distribution.
•
For Red Hat, SLES, Oracle, and CentOS, type the following command and then press Enter:
sudo rpm -i *.rpm
•
For Debian and Ubuntu, type the following command and then press Enter:
sudo dpkg -i *.deb
The local package manager runs the installation of Rapid Recovery Agent.
After installation is complete, configure the Agent as described in the topic Configuring the Rapid Recovery Agent on a Linux
machine.
CAUTION: After configuring the newly installed Agent software on a Linux machine, you must restart the machine.
Restarting ensures that the proper kernel driver version is used to protect your machine.
34
Installing the Agent software on Windows Server Core Edition machines
Complete the steps in the following procedure to install the Agent software on a Windows Server Core machine.
NOTE: The following procedure installs the Agent software in console mode. To install in silent mode instead, append /
silent to the installer file name on the command line. For example, Agent-X64-6.X.X.xxxxx.exe /silent.
1.
Download the Rapid Recovery Agent installer file from the Dell Data Protection | Rapid Recovery License Portal or from the
Rapid Recovery Core.
2.
From a command prompt, navigate to the directory containing the Rapid Recovery Agent installer file and enter the installer file
name to begin the installation:
Agent-X64-6.x.x.xxxxx.exe
The installation program installs the Agent software and displays progress in the console. Upon completion, new installations
trigger an automatic restart of the machine, whereas Agent upgrades may not require a machine restart.
Configuring the Rapid Recovery Agent on a Linux machine
Run the Rapid Recovery Configuration utility after installing Rapid Recovery Agent software on a Linux machine. This compiles and
installs the kernel module on the Linux machine you want to protect in your Core.
The configuration utility offers several configuration options, and provides hints in the numbered steps of the instructions when it
detects your specific configuration information.
Complete the steps below to configure the Rapid Recovery Agent software on any Linux machine. Some configuration options
differ based on the Linux distribution you are installing.
1.
Open a terminal session with root access.
2.
Launch the configuration utility by typing the following command, and then press Enter:
sudo /usr/bin/rapidrecovery-config
The configuration utility starts. This lists several configuration options, each with an index number to enter for the appropriate
configuration step.
3.
Configure the port for this protected machine by typing the following command, and then press Enter. The default port is
8006.
1 <agent_port>
For example, if using the default port, type the command:
1 8006
4.
Configure users available for protection, by typing the following command, and then press Enter:
1 <user_names_separated_by_comma>
For example, if using usernames michael, administrator, and test_user1, type the command:
2 michael,administrator,test_user1
5.
Configure firewall rules to select a firewall configuration manager. This establishes firewall exceptions for the port designated in
step 1.
If the utility detects one or more firewall configuration managers (such as lokkit or firewalld), each is listed in the utility in line 3.
Select the appropriate configuration manager and enter it, starting with the command number (3), and then press Enter:
3 <firewall_configuration>
For example, if using firewalld, type the command:
3 firewalld
6.
Query the list of compatible kernel modules from the utility by entering the command number, and then press Enter:
4
A sub-shell returns all kernel modules compatible for installation. For example, the following could be returned:
Searching for all available for installation kernels.
This might take a while, depending on the Internet connection speed.
35
Kernels compatible for module installation:
0 - linux-image-3.16.0.23-generic
1 - linux-image-3.16.0.31-generic
2 - linux-image-3.16.0.33-generic
3 - linux-image-3.16.0.34-generic
Input indices of the kernel modules you wish to install, delimited by space; use 'all'
to install into all supported kernels, or 'q' to quit.
7.
Configure the appropriate Rapid Recovery kernel module.
For example, to enter kernel modules for 3.16.0-23 and 3.16.0-34, enter 1 4 and press Enter.
To enter all kernel modules, enter all and press Enter.
8.
After configuring the newly installed Agent software, restart the machine. Restarting ensures that the proper kernel driver
version is used to protect your machine.
After completing this process, the local repository has been configured on this Linux machine. The Agent software is installed and
the kernel module is loaded.
Your next step is to protect the machine on the Rapid Recovery Core.
Protecting a machine
If you have already installed the Rapid Recovery Agent software on the machine you want to protect, but have not restarted it yet,
restart the machine now.
This topic describes how to start protecting the data on a single machine that you specify using the Protect Machine Wizard.
When you add protection, you need to define connection information such as the IP address and port, and provide credentials for
the machine you want to protect. Optionally, you can provide a display name to appear in the Core Console instead of the IP
address. If you change this, you will not see the IP address for the protected machine when you view details in the Core Console.
You will also define the protection schedule for the machine.
The workflow of the protection wizard may differ slightly based on your environment. For example, if the Rapid Recovery Agent
software is installed on the machine you want to protect, you will not be prompted to install it from the wizard. Likewise, if a
repository already exists on the Core, you will not be prompted to create one.
1.
Do one of the following:
•
If you are starting from the Protect Machine Wizard, proceed to Step 2.
•
If you are starting from the Rapid Recovery Core Console, from the button bar, click Protect.
The Protect Machine Wizard appears.
2.
On the Welcome page, select the appropriate installation options:
•
If you do not need to define a repository or establish encryption, select Typical.
•
If you need to create a repository, or define a different repository for backups for the selected machine, or if you want to
establish encryption using the wizard, select Advanced (show optional steps).
•
3.
Optionally, if you do not wish to see the Welcome page for the Protect Machine Wizard in the future, select the option
Skip this Welcome page the next time the wizard opens.
When you are satisfied with your choices on the Welcome page, then click Next.
The Connection page appears.
4.
On the Connection page, enter the information about the machine to which you want to connect as described in the following
table, and then click Next.
Table 11. Machine connection settings
Text Box
Description
Host
The host name or IP address of the machine that you want to protect.
Port
The port number on which the Rapid Recovery Core communicates with the Agent on the machine.
The default port number is 8006.
36
Text Box
Description
User name
The user name used to connect to this machine; for example, Administrator (or, if the machine is in a
domain, [domain name]\Administrator).
Password
The password used to connect to this machine.
If the Install Agent page appears next in the Protect Machine Wizard, that means that Rapid Recovery does not detect the
Rapid Recovery Agent on the machine and will install the current version of the software. Go to Step 7.
If the Upgrade Agent page appears next in the wizard, that means that an older version of the Agent software exists on the
machine you want to protect.
NOTE: The Agent software must be installed on the machine you want to protect, and that machine must be
restarted, before it can back up to the Core. To have the installer reboot the protected machine, select the option
After installation, restart the machine automatically (recommended) before clicking Next.
5.
On the Upgrade Agent page, do one of the following:
•
To deploy the new version of the Agent software (matching the version for the Rapid Recovery Core), select Upgrade the
Agent to the latest version of the software.
•
6.
7.
To continue protecting the machine without updating the Agent software version, clear the option Upgrade the Agent to
the latest version of the software.
Click Next.
Optionally, on the Protection page, if you want a name other than the IP address to display in the Rapid Recovery Core console
for this protected machine, then in the Display Name field, type a name in the dialog box.
You can enter up to 64 characters. Do not use the special characters described in the topic “Prohibited characters” in the
Rapid Recovery on DL Appliances User’s Guide. Additionally, do not begin the display name with any of the character
combinations described in the topic prohibited phrases in the Rapid Recovery on DL Appliances User’s Guide.
8.
Select the appropriate protection schedule as described below:
•
To use the default protection schedule, in the Schedule Settings option, select Default protection.
With a default protection schedule, the Core will take snapshots of all volumes on the protected machine once every hour. To
change the protection settings at any time after you close the wizard, including choosing which volumes to protect, go to the
Summary page for the specific protected machine.
9.
• To define a different protection schedule, in the Schedule Settings option, select Custom protection.
Proceed with your configuration as follows:
•
If you selected a Typical configuration for the Protect Machine Wizard and specified default protection, then click Finish to
confirm your choices, close the wizard, and protect the machine you specified.
The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes)
will transfer to the repository on the Rapid Recovery Core following the schedule you defined, unless you specified to
initially pause protection.
•
If you selected a Typical configuration for the Protect Machine Wizard and specified custom protection, then click Next to
set up a custom protection schedule. For details on defining a custom protection schedule, see “Creating custom
protection schedules” section in the Rapid Recovery 6.0 on DL Appliances User’s Guide. .
•
If you selected Advanced configuration for the Protect Machine Wizard, and default protection, then click Next and
proceed to Step 14 o see repository and encryption options.
•
If you selected Advanced configuration for the Protect Machine Wizard and specified custom protection, then click Next
and proceed to Step 11 to choose which volumes to protect.
10. On the Protection Volumes page, select which volumes you want to protect. If any volumes are listed that you do not want to
include in protection, click in the Check column to clear the selection. Then click Next.
NOTE: Typically, it is good practice to protect, at minimum, the System Reserved volume and the volume with the
operating system (typically the C drive).
11. On the Protection Schedule page, define a custom protection schedule and then click Next. For details on defining a custom
protection schedule, see “Creating custom protection schedules” section in the Rapid Recovery 6.0 on DL Appliances User’s
Guide.
37
If you already have repository information configured, and you selected the Advanced option in Step 1, then the Encryption
page appears. Proceed to Step 13.
12. Optionally, on the Encryption page, to enable encryption, select Enable Encryption.
Encryption key fields appear on the Encryption page.
NOTE: If you enable encryption, it will be applied to data for all protected volumes for this machine.
You can change encryption settings later from the Rapid Recovery Core Console.
For more information about encryption, see the topic “Understanding encryption keys” in the Rapid Recovery 6.0
on DL Appliances User’s Guide at www.dell.com/support/home.
CAUTION: Rapid Recovery uses AES 256-bit encryption in the Cipher Block Chaining (CBC) mode with 256-bit
keys. While using encryption is optional, Dell highly recommends that you establish an encryption key, and that you
protect the passphrase you define. Store the passphrase in a secure location as it is critical for data recovery.
Without a passphrase, data recovery is not possible.
13. On the Encryption page, select one of the following options:
•
If you want to encrypt this protected machine using an encryption key that is already defined on this Rapid Recovery Core,
select Encrypt data using an existing Encryption key, and then select the appropriate key from the drop-down menu.
Proceed to the next step.
•
If you want to add a new encryption key to the Core and apply that key to this protected machine, then enter the
information as described in the following table.
Table 12. Encryption key settings
Text Box
Description
Name
Enter a name for the encryption key.
Encryption key names must contain between 1 and 130 alphanumeric characters. You may not include
special characters such as the back slash, forward slash, pipe, colon, asterisk, quotation mark,
question mark, open or close brackets, ampersand or hash. This information appears in the
Description field when viewing encryption keys from the Core Console.
Description
Enter a comment for the encryption key.
This information appears in the Description field when viewing encryption keys from the Core
Console.
Passphrase
Enter the passphrase used to control access.
Best practice is to avoid special characters listed above.
Record the passphrase in a secure location. Dell Support cannot recover a passphrase. Once you
create an encryption key and apply it to one or more protected machines, you cannot recover data if
you lose the passphrase.
Confirm
Passphrase
Re-enter the passphrase you just entered.
14. Click Finish to save and apply your settings.
The first time protection is added for a machine, a base image (that is, a snapshot of all the data in the protected volumes) will
transfer to the repository on the Rapid Recovery Core following the schedule you defined, unless you specified to initially pause
protection.
15. If you receive an error message, the appliance cannot connect to the machine to back it up. To resolve the issue:
a.
b.
c.
d.
Check Network Connectivity.
Check the Firewall Settings.
Verify Rapid Recovery Services and RPC are running.
Verify Domain Name Service Lookups (if applicable).
Checking network connectivity
To check network connectivity:
1.
On the client system to which you are trying to connect, open a command line interface.
2.
Run the command ipconfig and note the IP address of the client.
38
3.
Open a command line interface on the appliance.
4.
Run the command ping <IP address of client>.
5.
Depending on the result, do one of the following:
•
If the client does not reply to the ping, verify the server’s connectivity and network settings.
•
If the client replies, check that the firewall settings allow the Rapid Recovery components to run.
Checking the firewall settings
If the client is connected properly to the network, but cannot be seen by the Core Console, check the firewall to ensure that
necessary inbound and outbound communications are allowed.
To check the firewall settings on the Rapid Recovery Core and any clients that it backs up:
1.
On the appliance, click Start → Control Panel.
2.
In the Control Panel, click System and Security, under Windows Firewall click Check firewall status.
3.
Click Advanced Settings.
4.
In the Windows Firewall with Advanced Security screen, click Inbound Rules.
5.
Ensure the Rapid Recovery Core and ports display Yes in the Enabled column.
6.
If the rule is not enabled, right-click on the Rapid Recovery Core and select Enable Rule.
7.
Click Outbound Rules and verify the same for Rapid Recovery Core.
Verifying name resolution (if applicable)
If the machine you are trying to back up uses DNS, verify that DNS forward and reverse lookups are correct.
To ensure that the reverse lookups are correct:
1.
On the appliance, go to C:\Windows\system32\drivers\etc hosts.
2.
Enter the IP address of each client that backs up to DL4300.
Teaming network adapters
By default, the network adapters (NICs) on the DL4300 Appliance are not bonded, which affects the performance of the system. It
is recommended that you team the NICs to a single interface. Teaming the NICs require:
•
Reinstalling the Broadcom Advanced Control Suite
•
Creating the NIC team
•
Configuring a Hyper-V Virtual Switch
Reinstalling Broadcom Advanced Configuration Suite
To reinstall Broadcom Advanced Configuration Suite (BACS):
1.
Identify the NICs on your system. To identify the NICs:
a. Access the Dell Open Manage Server Administrator (OMSA).
b. On the main page, click System → Main Sytem Chassis → Slots.
2.
Uninstall the earlier versions of Broadcom drivers and management applications.
3.
Download the appropriate Broadcom drivers and BACS onto your appliance.
The following drivers are available at dell.com/support.
•
QLogic driver
Click Servers, storage, & Networking → Dell Software DL 4300 → Drivers & downloads → Category → Network →
QLogic BCM57xx and BCM57xxx .
•
Broadcom driver
Click Servers, storage, & Networking → Dell Software DL 4300 → Drivers & downloads → Category → Network →
Broadcom Windows 64bit driver update for NetXtreme Ethernet adapters.
39
4.
Complete the installation by going through the installation wizard.
Creating the NIC team
NOTE: It is recommended not to use the native teaming interface in Windows 2012 Server. The teaming algorithm is
optimized for outbound, not inbound, traffic. It offers poor performance with a backup workload, even with more
network ports in the team.
To create NIC teaming:
1.
Go to Start → Search → Broadcom Advanced Control Suite.
NOTE: When using Broadcom Advanced Control Suite, only select the Broadcom network cards.
2.
3.
In the Broadcom Advanced Control Suite, select Teams → Go to Team View.
In the Hosts list on the left side, right-click on the host name of the DL4300 appliance and select Create Team.
The Broadcom Teaming Wizard window is displayed.
4.
Click Next.
5.
Enter a name for the team and click Next.
6.
Select the Team Type and click Next.
7.
Select an adapter you want to be part of the team, and click Add.
8.
Repeat these steps for all other adapters that are a part of the team.
9.
When all adapters are selected for the team, click Next.
10. Select a standby NIC if you want a NIC that can be used as the default, if the team fails.
11. Select whether to configure LiveLink, and then click Next.
12. Select Skip Manage VLAN and click Next.
13. Select Commit changes to system and click Finish.
14. Click Yes when warned that the network connection is interrupted.
NOTE: The building of the team may take about five minutes.
Configuring a Hyper-V Virtual Switch
For virtual standby machines to communicate within a production environment, create a virtual switch. To create an external virtual
switch, see Configure Virtual Networks section at www.technet.microsoft.com.
40
5
Getting help
Finding documentation and software updates
In the Rapid Recovery Core console there are direct links to Rapid Recovery, Appliance documentation, and software updates. To
access the links, click the Appliance tab, and then click Overall Status. Links to the software updates and documentation are
located under the Documentation section.
Finding software updates
There are direct links to Rapid Recovery and DL4300 Appliance software updates available from the Rapid Recovery Core Console.
To access the links to software updates, select the Appliance tab, and then click Overall Status. Links to the software updates are
located under the Documentation section.
Contacting Dell
NOTE: If you do not have an active Internet connection, you can find contact information on your purchase invoice,
packing slip, bill, or Dell product catalog.
Dell provides several online and telephone-based support and service options. If you do not have an active Internet connection, you
can find contact information on your purchase invoice, packing slip, bill, or Dell product catalog. Availability varies by country and
product, and some services may not be available in your area. To contact Dell for sales, technical support, or customer-service
issues, go to software.dell.com/support.
Documentation feedback
Click the Feedback link in any of the Dell documentation pages, fill out the form, and click Submit to send your feedback.
41
Was this manual useful for you? yes no
Thank you for your participation!

* Your assessment is very important for improving the work of artificial intelligence, which forms the content of this project

Download PDF

advertisement