Dell DL4300 Appliance Users Guide - Page 142
Protecting a cluster, About Repositories
View all Dell DL4300 manuals
Add to My Manuals
Save this manual to your list of manuals |
Page 142 highlights
• Basic disks The supported mount types include: • Shared drives that are connected as drive letters (for example, D:) • Simple dynamic volumes on a single physical disk (not striped, mirrored, or spanned volumes) • Shared drives that are connected as mount points Protecting a cluster This topic describes how to add a cluster for protection in AppAssure. When you add a cluster to protection, you need to specify the host name or IP address of the cluster, the cluster application, or one of the cluster nodes or machines that includes the AppAssure Agent. NOTE: A repository is used to store the snapshots of data that are captured from your protected nodes. Before you start protecting data in your cluster, set up at least one repository that is associated with your AppAssure Core. For information about setting up repositories, see About Repositories. To protect a cluster: 1. Do one of the following: • In the Core Console, navigate to the Home tab, and then click the Protect Cluster button. • In the Core Console, on the Machines tab, click Actions, and then click Protect Cluster. 2. In the Connect to Cluster dialog box, enter the following information: Text Box Description Host The host name or IP address of the cluster, the cluster application, or one of the cluster nodes that you want to protect. NOTE: If you use the IP address of one of the nodes, this node needs to have an AppAssure agent installed and started. Port User name The port number on the machine on which the AppAssure Core communicates with the agent. The user name of the domain administrator used to connect to this machine: for example, domain_name\administrator or administrator@domain_name.com NOTE: The domain name is mandatory. You cannot connect to the cluster using the local administrator username. Password The password used to connect to this machine. 3. In the Protect Cluster dialog box, select a repository for this cluster. 4. To protect the cluster based on default settings, select the nodes for default protection, and click Protect. NOTE: The default settings ensure that all volumes are protected with a schedule of every 60 minutes. 5. To enter custom settings for the cluster (for example, to customize the protection schedule for the shared volumes), do the following: a. Click settings. 142