Protecting Nodes In A Cluster - Dell DL4000 User Manual

Tape library
Hide thumbs Also See for DL4000:
Table of Contents

Advertisement

b. In the Volumes dialog box, select the volume(s) to protect, and click Edit.
c. In the Protection Schedule dialog box, select one of the schedule options for protecting your
data as described in the following table.
Text Box
Interval
Daily
No Protection
6.
When you have made all necessary changes, click Save.
7.
To enter custom settings for a node in the cluster, select a node, and then click the Settings link next
to the node.
Repeat Step 5 to edit the protection schedule.
For more information on customizing nodes, see
8.
In the Protect Cluster dialog box, click Protect.

Protecting nodes in a cluster

This topic describes how to protect the data on a cluster node or machine that has an AppAssure agent
installed. When you add protection, you need to select a node from the list of available nodes as well as
specify the host name and the user name and password of the domain administrator.
To protect nodes in a cluster:
1.
After adding a cluster, navigate to that cluster, and click the Machines tab.
2.
Click the Actions menu, and then click Protect Cluster Node.
3.
In the Protect Cluster Node dialog box, select or enter as appropriate the following information, and
then click Connect to add the machine or node.
Text Box
Host
Port
User name
Password
142
Description
You can choose from:
Weekday — To protect data on a specific interval, select Interval, and
then:
– To customize when to protect data during peak times, you can
specify a start time, end time, and an interval.
– To protect data during off-peak times, select the Protect during off-
peak times check box, and then select an interval for protection.
Weekends — To protect data during weekends as well, select the
Protect during weekends check box, and then select an interval.
To protect data on a daily basis, select the Daily option, and then for
Protection Time, select a time to start protecting data.
To remove protection from this volume, select the No Protection option.
Description
A drop-down list of nodes in the cluster available for protection.
The port number on which the Core communicates with the agent on the
node.
The user name of the domain administrator used to connect to this node. For
example, example_domain\administrator for
administrator@example_domain.com.
The password used to connect to this machine.
Protecting Nodes In A
Cluster.

Advertisement

Table of Contents
loading

Table of Contents