Dell PowerVault DL4000 Dell PowerVault DL4000 Backup To Disk Appliance - Power - Page 128

Process Of Modifying Cluster Node Settings, Roadmap For Configuring Cluster Settings

Page 128 highlights

Text Box Repository Encryption Schedule Description Select the repository on the AppAssure 5 Core in which the data from this machine is be stored. Specify whether encryption is to be applied to the data for every volume on this machine to be stored in the repository. NOTE: The encryption settings for a repository are defined under the Configuration tab in the AppAssure 5 Core Console. Select one of the following options. - Protect all volumes with default schedule. - Protect specific volumes with custom schedule. Then, under Volumes, select a volume and click Edit. See Step c in the section Protecting A Cluster or information about setting custom intervals. Process Of Modifying Cluster Node Settings After you have added protection for cluster nodes, you can easily modify basic configuration settings for those machines or nodes (for example, display name, host name, and so on), protection settings (for example, changing the protection schedule for local volumes on the machine, adding or removing volumes, and pausing protection), and more. To modify cluster node settings, you must perform the following tasks: 1. Do one of the following: - Navigate to the cluster that contains the node you want to modify, click the Machines tab, and select the machine or node that you want to modify. - Or, from the Navigation pane, under the Cluster heading, select the machine or node you want to modify. 2. To modify and view configuration settings, see Viewing And Modifying Configuration Settings. 3. To configure notification groups for system events, see Configuring Notification Groups For System Events. 4. To customize retention policy settings, see Customizing Retention Policy Settings. 5. To modify the protection schedule, see Modifying Protection Schedules. 6. To modify transfer settings, see Modifying Transfer Settings. Roadmap For Configuring Cluster Settings The roadmap for configuring cluster settings involves performing the following tasks: • Modifying Cluster Settings • Configuring Cluster Event Notifications • Modifying the Cluster Retention Policy • Modifying Cluster Protection Schedules • Modifying Cluster Transfer Settings Modifying Cluster Settings After adding a cluster, you can easily modify basic settings (for example, display name), protection settings (for example, protection schedules, adding or removing volumes, and pausing protection), and more. 128

  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  • 8
  • 9
  • 10
  • 11
  • 12
  • 13
  • 14
  • 15
  • 16
  • 17
  • 18
  • 19
  • 20
  • 21
  • 22
  • 23
  • 24
  • 25
  • 26
  • 27
  • 28
  • 29
  • 30
  • 31
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • 39
  • 40
  • 41
  • 42
  • 43
  • 44
  • 45
  • 46
  • 47
  • 48
  • 49
  • 50
  • 51
  • 52
  • 53
  • 54
  • 55
  • 56
  • 57
  • 58
  • 59
  • 60
  • 61
  • 62
  • 63
  • 64
  • 65
  • 66
  • 67
  • 68
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • 76
  • 77
  • 78
  • 79
  • 80
  • 81
  • 82
  • 83
  • 84
  • 85
  • 86
  • 87
  • 88
  • 89
  • 90
  • 91
  • 92
  • 93
  • 94
  • 95
  • 96
  • 97
  • 98
  • 99
  • 100
  • 101
  • 102
  • 103
  • 104
  • 105
  • 106
  • 107
  • 108
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • 116
  • 117
  • 118
  • 119
  • 120
  • 121
  • 122
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • 140
  • 141
  • 142
  • 143
  • 144
  • 145
  • 146
  • 147
  • 148
  • 149
  • 150
  • 151
  • 152
  • 153
  • 154
  • 155
  • 156
  • 157
  • 158
  • 159
  • 160
  • 161
  • 162
  • 163

Text Box
Description
Repository
Select the repository on the AppAssure 5 Core in which the data from this machine is be
stored.
Encryption
Specify whether encryption is to be applied to the data for every volume on this machine
to be stored in the repository.
NOTE:
The encryption settings for a repository are defined under the
Configuration
tab in the AppAssure 5 Core Console.
Schedule
Select one of the following options.
Protect all volumes with default schedule.
Protect specific volumes with custom schedule. Then, under
Volumes
, select a
volume and click
Edit
. See Step c in the section
Protecting A Cluster
or
information about setting custom intervals.
Process Of Modifying Cluster Node Settings
After you have added protection for cluster nodes, you can easily modify basic configuration settings for those
machines or nodes (for example, display name, host name, and so on), protection settings (for example, changing the
protection schedule for local volumes on the machine, adding or removing volumes, and pausing protection), and more.
To modify cluster node settings, you must perform the following tasks:
1.
Do one of the following:
Navigate to the cluster that contains the node you want to modify, click the
Machines
tab, and select the
machine or node that you want to modify.
Or, from the
Navigation
pane, under the
Cluster
heading, select the machine or node you want to modify.
2.
To modify and view configuration settings, see
Viewing And Modifying Configuration Settings
.
3.
To configure notification groups for system events, see
Configuring Notification Groups For System Events
.
4.
To customize retention policy settings, see
Customizing Retention Policy Settings
.
5.
To modify the protection schedule, see
Modifying Protection Schedules
.
6.
To modify transfer settings, see
Modifying Transfer Settings
.
Roadmap For Configuring Cluster Settings
The roadmap for configuring cluster settings involves performing the following tasks:
Modifying Cluster Settings
Configuring Cluster Event Notifications
Modifying the Cluster Retention Policy
Modifying Cluster Protection Schedules
Modifying Cluster Transfer Settings
Modifying Cluster Settings
After adding a cluster, you can easily modify basic settings (for example, display name), protection settings (for example,
protection schedules, adding or removing volumes, and pausing protection), and more.
128