Deploying To Multiple Machines; Monitoring The Deployment Of Multiple Machines - Dell DL1000 User Manual

Hide thumbs Also See for DL1000:
Table of Contents

Advertisement

To deploy and protect multiple agents, perform the following tasks:
1.
Deploy AppAssure to multiple machines.
See
Deploying To Multiple
2.
Monitor the activity of the batch deployment.
See
Monitoring The Deployment Of Multiple
3.
Protect multiple machines.
See
Protecting Multiple Machines
NOTE: This step can be skipped if you selected the Protect Machine After Install option during
deployment.
4.
Monitor the activity of the batch protection.
See
Monitoring the Protection of Multiple

Deploying To Multiple Machines

You can simplify the task of deploying the AppAssure Agent software to multiple Windows machines by
using the Bulk Deploy feature of AppAssure. You can bulk deploy to:
Machines on a VMware vCenter/ESXi virtual host
Machines on an Active Directory domain
Machines on any other host
The Bulk Deploy feature automatically detects machines on a host and allows you to select those to
which you want to deploy. Alternatively, you can manually enter host and machine information.
NOTE: The machines that you are deploying must have access to the internet to download and
install bits as AppAssure uses the web version of the AppAssure Agent Installer to deploy the
installation components. If access to the internet is not available, you can push the AppAssure Agent
installation program from the Core machine. You can download core and agent updates from the
License Portal.

Monitoring the deployment of multiple machines

You can view the progress of the deployment of AppAssure Agent software to the machines.
To monitor the deployment of multiple machines:
1.
From the Core Console, click Events → Alerts.
2.
Navigate to the AppAssure Core Home tab and then click the Events tab.
Alert events appear in the list, showing the time the event initiated and a message. For each
successful deployment of the Agent software, you will see an alert indicating that the protected
machine has been added.
3.
Optionally, click on any link for a protected machine.
The Summary tab for the selected machine appears, showing pertinent information including:
The host name of the protected machine
The last snapshot, if applicable
The scheduled time of the next snapshot, based on the protection schedule you selected
Time Remaining
Machines.
Machines.
.
Machines.
49

Advertisement

Table of Contents
loading

Table of Contents