Viewing Machine Logs; Protecting A Machine - Dell DL4000 User Manual

Tape library
Hide thumbs Also See for DL4000:
Table of Contents

Advertisement

Click the hyperlink for the machine that you want to restart.
In the Navigation pane, select the machine that you want to restart.
3.
Click the Tools tab, and then click Diagnostics.
4.
Select the Restart Service option, and then click the Restart Service button.

Viewing machine logs

If you encounter any errors or issues with the machine, view the logs to troubleshoot.
To view machine logs:
1.
In the Core Console, click the Machines tab.
2.
From the Machines tab, perform one of the following:
Click the hyperlink for the machine containing the logs that you want to view.
In the Navigation pane, select the machine containing the logs that you want to view.
3.
Click the Tools tab, and then click Diagnostics.
4.
Click the View Log link.

Protecting a machine

This topic describes how to start protecting the data on a machine that you specify.
NOTE: The machine must have the Agent software installed in order to be protected. You can
choose to install the Agent software prior to this procedure, or you can deploy the software to the
agent as you define protection in the Connection dialog box. For specific steps to install the agent
software during the process of protecting a machine, see
Protecting An
Agent.
When you add protection, you must specify the name or IP address of the machine to protect and the
volumes on that machine to protect as well as define the protection schedule for each volume.
To protect multiple machines at the same time, see
To protect a machine:
1.
If you did not do so after installing the Agent software, reboot the machine on which the Agent
software is installed.
2.
From the Core Console on the core machine, do one of the following:
From the Home tab under Protected machines, click Protect Machine.
Select the Machines tab, and in the Actions drop-down menu, click Protect Machine.
The Connect dialog box appears.
3.
In the Connect dialog box, enter the information about the machine to which you want to connect
as described in the following table.
Text Box
Host
Port
Username
92
Description
The host name or IP address of the machine that you want to protect.
The port number on which the Core communicates with the agent on the
machine. The default port number is 8006.
The user name used to connect to this machine; for example, administrator.
Deploying The Agent Software When
Protecting Multiple
Machines.

Advertisement

Table of Contents
loading

Table of Contents