Dell DL4300 Appliance Users Guide - Page 142

Protecting a cluster, About Repositories

Page 142 highlights

• Basic disks The supported mount types include: • Shared drives that are connected as drive letters (for example, D:) • Simple dynamic volumes on a single physical disk (not striped, mirrored, or spanned volumes) • Shared drives that are connected as mount points Protecting a cluster This topic describes how to add a cluster for protection in AppAssure. When you add a cluster to protection, you need to specify the host name or IP address of the cluster, the cluster application, or one of the cluster nodes or machines that includes the AppAssure Agent. NOTE: A repository is used to store the snapshots of data that are captured from your protected nodes. Before you start protecting data in your cluster, set up at least one repository that is associated with your AppAssure Core. For information about setting up repositories, see About Repositories. To protect a cluster: 1. Do one of the following: • In the Core Console, navigate to the Home tab, and then click the Protect Cluster button. • In the Core Console, on the Machines tab, click Actions, and then click Protect Cluster. 2. In the Connect to Cluster dialog box, enter the following information: Text Box Description Host The host name or IP address of the cluster, the cluster application, or one of the cluster nodes that you want to protect. NOTE: If you use the IP address of one of the nodes, this node needs to have an AppAssure agent installed and started. Port User name The port number on the machine on which the AppAssure Core communicates with the agent. The user name of the domain administrator used to connect to this machine: for example, domain_name\administrator or administrator@domain_name.com NOTE: The domain name is mandatory. You cannot connect to the cluster using the local administrator username. Password The password used to connect to this machine. 3. In the Protect Cluster dialog box, select a repository for this cluster. 4. To protect the cluster based on default settings, select the nodes for default protection, and click Protect. NOTE: The default settings ensure that all volumes are protected with a schedule of every 60 minutes. 5. To enter custom settings for the cluster (for example, to customize the protection schedule for the shared volumes), do the following: a. Click settings. 142

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176

Basic disks
The supported mount types include:
Shared drives that are connected as drive letters (for example, D:)
Simple dynamic volumes on a single physical disk (not striped, mirrored, or spanned volumes)
Shared drives that are connected as mount points
Protecting a cluster
This topic describes how to add a cluster for protection in AppAssure. When you add a cluster to
protection, you need to specify the host name or IP address of the cluster, the cluster application, or one
of the cluster nodes or machines that includes the AppAssure Agent.
NOTE:
A repository is used to store the snapshots of data that are captured from your protected
nodes. Before you start protecting data in your cluster, set up at least one repository that is
associated with your AppAssure Core.
For information about setting up repositories, see
About Repositories
.
To protect a cluster:
1.
Do one of the following:
In the Core Console, navigate to the
Home
tab, and then click the
Protect Cluster
button.
In the Core Console, on the
Machines
tab, click
Actions
, and then click
Protect Cluster
.
2.
In the
Connect to Cluster
dialog box, enter the following information:
Text Box
Description
Host
The host name or IP address of the cluster, the cluster application, or one of
the cluster nodes that you want to protect.
NOTE:
If you use the IP address of one of the nodes, this node needs to
have an AppAssure agent installed and started.
Port
The port number on the machine on which the AppAssure Core
communicates with the agent.
User name
The user name of the domain administrator used to connect to this machine:
for example,
domain_name\administrator
or
administrator@domain_name.com
NOTE:
The domain name is mandatory. You cannot connect to the
cluster using the local administrator username.
Password
The password used to connect to this machine.
3.
In the
Protect Cluster
dialog box, select a repository for this cluster.
4.
To protect the cluster based on default settings, select the nodes for default protection, and click
Protect
.
NOTE:
The default settings ensure that all volumes are protected with a schedule of every 60
minutes.
5.
To enter custom settings for the cluster (for example, to customize the protection schedule for the
shared volumes), do the following:
a.
Click
settings
.
142