Dell DL4300 Appliance Users Guide - Page 143

Protecting nodes in a cluster, Protect Cluster Node

Page 143 highlights

b. In the Volumes dialog box, select the volume(s) to protect, and click Edit. c. In the Protection Schedule dialog box, select one of the schedule options for protecting your data as described in the following table. Text Box Description Interval You can choose from: • Weekday - To protect data on a specific interval, select Interval, and then: - To customize when to protect data during peak times, you can specify a start time, end time, and an interval. - To protect data during off-peak times, select the Protect during offpeak times check box, and then select an interval for protection. • Weekends - To protect data during weekends as well, select the Protect during weekends check box, and then select an interval. Daily To protect data on a daily basis, select the Daily option, and then for Protection Time, select a time to start protecting data. No Protection To remove protection from this volume, select the No Protection option. 6. When you have made all necessary changes, click Save. 7. To enter custom settings for a node in the cluster, select a node, and then click the Settings link next to the node. • Repeat Step 5 to edit the protection schedule. For more information on customizing nodes, see Protecting Nodes In A Cluster. 8. In the Protect Cluster dialog box, click Protect. Protecting nodes in a cluster This topic describes how to protect the data on a cluster node or machine that has an AppAssure agent installed. When you add protection, you need to select a node from the list of available nodes as well as specify the host name and the user name and password of the domain administrator. To protect nodes in a cluster: 1. After adding a cluster, navigate to that cluster, and click the Machines tab. 2. Click the Actions menu, and then click Protect Cluster Node. 3. In the Protect Cluster Node dialog box, select or enter as appropriate the following information, and then click Connect to add the machine or node. Text Box Description Host A drop-down list of nodes in the cluster available for protection. Port The port number on which the Core communicates with the agent on the node. User name The user name of the domain administrator used to connect to this node. For example, example_domain\administrator for administrator@example_domain.com. Password The password used to connect to this machine. 143

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163
  • 164
  • 165
  • 166
  • 167
  • 168
  • 169
  • 170
  • 171
  • 172
  • 173
  • 174
  • 175
  • 176

b.
In the
Volumes
dialog box, select the volume(s) to protect, and click
Edit
.
c.
In the
Protection Schedule
dialog box, select one of the schedule options for protecting your
data as described in the following table.
Text Box
Description
Interval
You can choose from:
Weekday
— To protect data on a specific interval, select
Interval
, and
then:
To customize when to protect data during peak times, you can
specify a start time, end time, and an interval.
To protect data during off-peak times, select the
Protect during off-
peak times
check box, and then select an interval for protection.
Weekends
— To protect data during weekends as well, select the
Protect during weekends
check box, and then select an interval.
Daily
To protect data on a daily basis, select the
Daily
option, and then for
Protection Time
, select a time to start protecting data.
No Protection
To remove protection from this volume, select the
No Protection
option.
6.
When you have made all necessary changes, click
Save
.
7.
To enter custom settings for a node in the cluster, select a node, and then click the
Settings
link next
to the node.
Repeat Step 5 to edit the protection schedule.
For more information on customizing nodes, see
Protecting Nodes In A Cluster
.
8.
In the
Protect Cluster
dialog box, click
Protect
.
Protecting nodes in a cluster
This topic describes how to protect the data on a cluster node or machine that has an AppAssure agent
installed. When you add protection, you need to select a node from the list of available nodes as well as
specify the host name and the user name and password of the domain administrator.
To protect nodes in a cluster:
1.
After adding a cluster, navigate to that cluster, and click the
Machines
tab.
2.
Click the
Actions
menu, and then click
Protect Cluster Node
.
3.
In the
Protect Cluster Node
dialog box, select or enter as appropriate the following information, and
then click
Connect
to add the machine or node.
Text Box
Description
Host
A drop-down list of nodes in the cluster available for protection.
Port
The port number on which the Core communicates with the agent on the
node.
User name
The user name of the domain administrator used to connect to this node. For
example,
example_domain\administrator
for
administrator@example_domain.com
.
Password
The password used to connect to this machine.
143