Dell PowerVault DL4000 Dell PowerVault DL4000 Backup To Disk Appliance - Power - Page 127

Protecting Nodes In A Cluster

Page 127 highlights

Text Box Description • To customize when to protect data during peak times, you can specify a start time, end time, and an interval. • To protect data during off-peak times, select the Protect during offpeak times check box, and then select an interval for protection. * Weekends - To protect data during weekends as well, select the Protect during weekends check box, and then select an interval. Daily No Protection To protect data on a daily basis, select the Daily option, and then for Protection Time, select a time to start protecting data. To remove protection from this volume, select the No Protection option. 7. When you have made all necessary changes, click Save. 8. To enter custom settings for a node in the cluster, select a node, and then click the Settings link next to the node, and then follow Step c of Step 5 to edit the protection schedule. To customize the nodes of the cluster further, see Protecting Nodes In A Cluster. 9. In the Protect Cluster dialog box, click Protect. Protecting Nodes In A Cluster This topic describes how to protect the data on a cluster node or machine that has an AppAssure agent installed. When you add protection, you need to select a node from the list of available nodes as well as specify the host name and the user name and password of the domain administrator. To protect nodes in a cluster: 1. After adding a cluster, navigate to that cluster, and click the Machines tab. 2. Click the Actions menu, and then click Protect Cluster Node. 3. In the Protect Cluster Node dialog box, select or enter as appropriate the following information, and then click Connect to add the machine or node. Text Box Description Host A drop-down list of nodes in the cluster available for protection. Port The port number on which the AppAssure 5 Core communicates with the agent on the node. User name The user name of the domain administrator used to connect to this node. For example, example_domain\administrator for administrator@example_domain.com. Password The password used to connect to this machine. 4. Click Protect to start protecting this machine with default protection settings. NOTE: The default settings ensure that all volumes on the machine are protected with a schedule of every 60 minutes. 5. To enter custom settings for this machine, (for example, to change the Display name, add encryption, or customize the protection schedule), click Show Advanced Options. 6. Edit the following settings as needed, as described below. Text Box Display Name Description Enter a new name for the machine to be displayed in the Core Console. 127

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163

Text Box
Description
To customize when to protect data during peak times, you can specify
a start time, end time, and an interval.
To protect data during off-peak times, select the
Protect during off-
peak times
check box, and then select an interval for protection.
*
Weekends
— To protect data during weekends as well, select the
Protect
during weekends
check box, and then select an interval.
Daily
To protect data on a daily basis, select the
Daily
option, and then for
Protection Time
,
select a time to start protecting data.
No Protection
To remove protection from this volume, select the
No Protection
option.
7.
When you have made all necessary changes, click
Save
.
8.
To enter custom settings for a node in the cluster, select a node, and then click the
Settings
link next to the node,
and then follow Step c of Step 5 to edit the protection schedule. To customize the nodes of the cluster further, see
Protecting Nodes In A Cluster
.
9.
In the
Protect Cluster
dialog box, click
Protect
.
Protecting Nodes In A Cluster
This topic describes how to protect the data on a cluster node or machine that has an AppAssure agent installed. When
you add protection, you need to select a node from the list of available nodes as well as specify the host name and the
user name and password of the domain administrator.
To protect nodes in a cluster:
1.
After adding a cluster, navigate to that cluster, and click the
Machines
tab.
2.
Click the
Actions
menu, and then click
Protect Cluster Node
.
3.
In the
Protect Cluster Node
dialog box, select or enter as appropriate the following information, and then click
Connect
to add the machine or node.
Text Box
Description
Host
A drop-down list of nodes in the cluster available for protection.
Port
The port number on which the AppAssure 5 Core communicates with the agent on the
node.
User name
The user name of the domain administrator used to connect to this node. For example,
example_domain\administrator
for
administrator@example_domain.com
.
Password
The password used to connect to this machine.
4.
Click
Protect
to start protecting this machine with default protection settings.
NOTE:
The default settings ensure that all volumes on the machine are protected with a schedule of every 60
minutes.
5.
To enter custom settings for this machine, (for example, to change the Display name, add encryption, or customize
the protection schedule), click
Show Advanced Options
.
6.
Edit the following settings as needed, as described below.
Text Box
Description
Display Name
Enter a new name for the machine to be displayed in the Core Console.
127