efolder Replibit Administration

Size: px
Start display at page:

Download "efolder Replibit Administration"

Transcription

1 Last Published January 2017

2 Table of Contents Table of Contents... 1 Thank you for choosing efolder Replibit!... 8 Customer Support... 8 SECTION A: Introduction to Major Components & Terms... 9 The Agent... 9 The Appliance... 9 The Vault... 9 The Management Portal The Replibit Licensing Portal SECTION B: Pre-Installation & Installation (Quick Start Part 1) Pre-Installation Information and Tasks Determine your Hardware Recommended Minimum Hardware Configuration Download the Replibit Software Creating a Bootable USB Flash Drive Using Rufus to Create a Bootable USB Flash Drive Prepping Your BIOS (if necessary) Installation Process The Replibit Installer Section C: Setup, Configuration and First Time Login (Quick Start Part 2) Initial Configuration First Time Login Initial Storage Configuration Licensing Agent Deployment Installing the Backup Agent Installing the UEFI Agent Change Machine Name Section D: Settings January 2017 Page 1 of 130

3 License Details (Appliances and Vaults Only) API Key Upload Logo Change Password Manage Users (Appliance Only) Export Image Quota Settings (Appliance and Vault Only) Notifications (Appliance and Vault Only) Alert Types Job Auto Delete Settings (Appliance and Vault Only) Agent Monitoring (Appliance Only) Change Machine Name Management Portal Time Settings Network Settings Update Manager Factory Reset (Appliance and Vault Only) Shutdown and Reboot Section E: Using the Appliance The Menu Pane Overview of Menu Items Protected Systems Overview Protected System Import and Vault Recovery Network Recovery USB Recovery Importing a System Enable Backups after Recovery or Import of a Protected System Protected System Details Page Managing Replication Adding Vault Replication Target(s) Deleting Vault Replication Target(s) Exporting a USB Seed Disk Importing a Seed Disk on the Vault January 2017 Page 2 of 130

4 Temporarily Disabling Replication Enabling Nightly Boot Checks Scheduling an Immediate Backup Migrating a Protected System to another Device Changing Backup Retention Settings Raise Alerts on No Backup Snapshots and Snapshot Actions Start VM Mount Export Start iscsi Delete Snapshot Used Snapshots Schedules Jobs Status Indicators and Actions Alerts File Browser NFS Exports iscsi Manage Storage Storage Status SAN Expansion Destroying the Storage Pool Storage Pool Operations Failed Disks (Identifying and Replacing) Used Disks (Disk Device Identification) Unused Disks (Expanding the Storage Pool) iscsi Storage (Managing Remote Storage Volumes) ConnectWise Settings Enable ConnectWise Integration: Configure Billing Integration Configure Ticketing Settings January 2017 Page 3 of 130

5 Import and Export Settings Vault Settings System Info Cluster Management Downloads Export and Search Options SECTION F: Using the Vault General differences between Appliance and Vault Vault Menus Admin Users Customer Users Protected Systems Menu Differences Users Menu (Admin Only) Section G: Setting up a Vault in the efolder Cloud Configuring your Vault SECTION H: Using the Management Portal Dashboard Managed Systems Action Buttons Protected Systems Boot VM Report Users Settings SECTION I: efolder Replibit Best Practices Hardware, Software and Other Requirements External IP Addresses Firewall Ports Appliance and Vault Installation Requirements Best Practices for Agent Deployment on Windows Completely uninstall other backup software and Reboot if possible Search for Unknown Large File Creation Verify VSS Settings Customers and Locations January 2017 Page 4 of 130

6 Networks, Switching, and Routing Backup Time Window Avoid Scheduled Defragmenting of Disks Microsoft Exchange and SQL Server VSS Agents OEM Installations Security Change Web Interface Password Change Shell User Password Change Shell Root User Password SECTION J: File and Folder Recovery Using iscsi to Recover Files SECTION K: Disaster Recovery Bare Metal Recovery Minimum System Requirements Recovering to Bare Metal Dissimilar Hardware Driver Injection Fixing Windows Boot Issues after performing a Bare Metal Recovery VMware Recovery VMware NFS Recovery VMware iscsi Recovery VMware: Relocating from iscsi or NFS Back to Local Storage Hyper-V Recovery Hyper-V NFS Recovery Hyper-V iscsi Recovery Relocating from iscsi or NFS Export Back to Local Storage After Performing ANY Recovery SECTION L: Advanced Topics Deploying efolder Replibit as a Virtual Machine Using the Linux Shell Setting the IP Address from the Shell Clustering Notes on Clustering Migrating Protected Systems January 2017 Page 5 of 130

7 Migrating to a new Appliance Migrating to a new Vault Using VirtIO in a VM Installing VirtIO Drivers Using VirtIO with UEFI Windows Directory Services Restore Mode Operations SECTION M: Troubleshooting and Support efolder Replibit Support Knowledgebase Troubleshooting Common Issues Backup Failures Replication Issues Issues with Boot VM Checks Other Issues GLOSSAY & TERMS Features Image Based Backup Incremental Change Capture Chain-Free (No Snapshot Dependencies) Branding ConnectWise Integration Alerting Automatic Updates Multi-Site Replication USB Seeding of Off-Site Base Image Export to VHD/VHDX/VMDK/VDI/RAW iscsi Target Support NFS Export Central Licensing Server Flexible Scheduling ZFS Storage Pool MBR and UEFI Centralized Management January 2017 Page 6 of 130

8 Support for Physical and Virtual Environments Bare Metal Recovery efolder Replibit Recovery Toolkit Instant Recovery Clustering Nightly Boot Checks Easy Data Migration Reliability January 2017 Page 7 of 130

9 Thank you for choosing efolder Replibit! Replibit is an Image-Based backup and disaster recovery solution with an integrated virtual machine hypervisor, and native off-site replication engine designed to ensure robust protection of during even the most severe site disasters. Replibit is licensed and delivered as a Channel-Only, Managed Services solution, available only to registered efolder Replibit Partners. Partners may use the product to deliver a custom branded Backup and Disaster Recovery, Managed Services solution to their own customers, as part of an overall Managed Services business platform. efolder Partners use Replibit to provide their Customers with an on-site Backup and Disaster Recovery platform, enabling instant recovery via on-appliance virtualization. Replibit provides a built-in replication engine to automatically transport every backup of your Protected Systems to the efolder Enterprise Storage Cloud or your own Datacenter. The efolder Cloud allows you to effortlessly scale from terabytes to petabytes, with 24/7 critical business support and includes free shipment of USB storage devices to manage base system image seeding. In addition to providing turnkey Replibit Vaults for off-site replication and a Replibit Global Management Portal virtual machine, you also have access to the efolder Continuity Cloud to provide your customers with dedicated IaaS hardware in the event of a site disaster. efolder Continuity Cloud provides for fast, off-site virtualization of your replicated servers and networks to restore your customers business critical systems when they need it most. Customer Support At efolder, we want to help you quickly resolve your technical issues and value your input to build products that incorporate your suggestions! If you need assistance with set-up or any other technical questions or issues, please contact our Technical Support team at replibitsupport@efolder.net or call: , and select 2 for technical support, then 1 for backup services support, which includes efolder Replibit. For known problem resolutions, open a browser and navigate to: Knowledgebase: Back to Table of Contents January 2017 Page 8 of 130

10 SECTION A: Introduction to Major Components & Terms The Agent Replibit is an Agent-based backup and disaster recovery solution. Agent software must be installed on each system to be protected. Backups of Protected Systems are Image-based. You will deploy the Agent software on systems to be protected. Windows Workstations and Servers are supported platforms. You can install and uninstall Agent software without the need to reboot your target device. This reduces the impact to the Customer environment. The Appliance Replibit is based on a Hardened-Linux based software appliance that may be deployed using your own hardware, or delivered pre-configured by ordering an efolder Replibit BDR system. to the hardware appliance deployed to the customer site, on which backup data will reside, and virtualization for instant recovery will be performed. Appliances are Server or Workstation-class devices running a hardened Linux distribution. The Appliance is the core Customer-facing component of the solution. It is deployed at the Customer site on either an efolder BDR unit or on Partner provided Build-Your-Own hardware. The Appliance device: Holds the backup data received from installed Agents, Manages replication to off-site Vaults, Provides the Web Management interface for the local site, and Hosts the virtual machine environment for Disaster Recovery. The Vault of Replibit that receives incoming Protected System data being replicated from your sites. Vaults are designed to be multitenant and provide all the same recovery options in the cloud that the Appliance provides to the customer on-site. Vaults are Server-class devices running a hardened Linux distribution. Vaults receive incoming replication of recovery points sent over the Internet from Appliances deployed at one or more Customer locations. Vaults are typically deployed in a Partner's datacenter or provided by efolder in the efolder Storage Cloud. January 2017 Page 9 of 130

11 Partners may choose to deploy a Vault at a remote Customer location, to provide the customer with a Managed, Private Cloud Backup and Disaster Recovery solution. Vaults are designed to be Multi-Tenant and securely house protected system data from multiple Customers and locations. Vaults can provide all the same restore and disaster recovery options as an Appliance, including hosting Servers or Workstations using an integrated Hypervisor.* Vaults can be deployed on an efolder BDR Appliance or on Partner provided Build-Your- Own hardware. The Vault device: Holds Multiple Customer Protected System Backup Data Receives Backup data over the Internet from Customer Appliances Provides the Web Management interface for Cloud Recovery, and Hosts the virtual machine environment for Disaster Recovery. * Virtualization on the Vault is not supported in the efolder Storage Cloud. Disaster Recovery in the efolder Storage Cloud utilizes dedicated compute nodes running Microsoft Hyper-V or VMware ESXi provided by the efolder Continuity Cloud. The Management Portal The Replibit provides for centralized management of all Appliances and Vaults deployed by a Partner, and provides a single-pane-of-glass view of all devices and protected systems. The Management Portal provides a central management repository, allowing secure remote access and reporting statistics for all connected Appliances and Vaults, and their Protected Systems. Typically, a Partner will deploy only one Management Portal, connecting all Appliances and Vaults to it. Partners who choose to replicate to the efolder Cloud receive a Management Portal virtual machine in the cloud free of charge. The Replibit Licensing Portal The Replibit Licensing Portal is the central management point for licensing and hardware orders. After requesting to become an efolder Replibit Partner and completing the initial onboarding and technical training, the Partner will gain access to the Replibit Licensing Portal, where all of your customer accounts and license assignments are managed. Additionally, the License Portal is where you place orders for efolder Replibit BDR January 2017 Page 10 of 130

12 Appliances if you choose to do so. efolder Replibit Appliances ship pre-configured for your customer deployment, and may optionally be shipped directly to your customer location. efolder requires that new partners complete a short training session on how to access and use the Licensing Portal prior to receiving your login credentials. The Replibit Licensing Portal will allow you to: Create and manage customer accounts with their associated site locations, Assign endpoint-based or storage-based licensing to backup Appliances, Order an efolder Replibit BDR Appliance and have it preconfigured for a specific customer and location, and Request an efolder hosted Vault to replicate your customer data to the efolder cloud. Replibit includes a license for Replication of every Protected System to an off-site Vault. You may choose to replicate your customer data to either the efolder Storage Cloud, or a Datacenter of your own choosing. All efolder Replibit Partners should read and become familiar with the efolder Replibit Licensing Guide. This is a separate guide that you can link to by clicking here: efolder Replibit Licensing Portal Guide 2.0, or clicking on the following url below: Back to Table of Contents January 2017 Page 11 of 130

13 SECTION B: Pre-Installation & Installation (Quick Start Part 1) This section of the guide will describe pre-installation tasks, installing, deploying, and managing Replibit Software directly onto your physical hardware. The information in this section is only necessary if you are deploying efolder Replibit on your own hardware. If you are deploying an efolder Replibit BDR Appliance, the device will arrive pre-loaded with Replibit and already configured for your customer location. For instructions on deploying the components on a virtual machine, see Deploying Replibit as a Virtual Machine in the Advanced Topics section of this guide. Note: The Replibit Appliance, Vault, and Management Portal all use the same ISO image for installation. The procedures listed below are exactly components. Assignment of the device to a particular role is performed during the Setup & Configuration stage (discussed in the next section) which is performed after installing the base operating system. Pre-Installation Information and Tasks Replibit is a hardened Linux appliance based on Ubuntu. You do not need to know Linux in order to run and operate efolder Replibit software as all management and operations are performed from within the Web Management interface. However, a basic understanding of Linux and common Linux shell commands can be useful when troubleshooting and maintaining the product. Replibit automatically updates all of the software and Agents so you do not have to worry about managing the underlying operating system; additionally, the efolder support team is available to assist you whenever necessary. Using the Linux Shell Advanced Topics accessing our simplified Linux command line environment. Prior to your first deployment of Replibit, please review Section I: efolder Replibit Best Practices within this guide. This should answer many of the questions you may have during your installation process, and provide you with an understanding of best practices to use when deploying the product. January 2017 Page 12 of 130

14 Determine your Hardware Replibit does not require you to purchase proprietary hardware. You can choose your own hardware if it meets the minimum hardware requirements, however, the hardware you choose must be compatible with Ubuntu Linux LTS. The following links will assist you in determining whether or not the hardware you want to use will support Linux. For individual components like NICs or HBA controllers use: Recommended Minimum Hardware Configuration For ONE to FIVE protected systems: 1. OS: 4GB RAM, 2 Cores minimum to install; 2. OS: 8GB RAM, 4 Cores minimum recommended for 1-5 protected systems; 3. For every five servers being backed up (round up) add: a. 2GB RAM b. 1 CPU Cores 4. Machine must have at least two hard drives: a. One drive for the Operating System, at least 100 GBs in size b. One or more drives for creating the Storage Pool 5. If You Intend to Use Virtualization for Instant Recovery a. Processor Must Support Hardware Assisted Virtualization i. Intel VT ii. AMD-V iii. Intel processors significantly outperform AMD b. Include Additional RAM and CPU cores for running virtual machines i. Minimum total memory required to enable BootVM checks is 5GB 6. The Software/Hardware RAID controllers available onboard some motherboards are not supported by Linux and can be used only in IDE/SATA mode. 7. Unless you are using SAN storage, it is recommended to use the Software RAID provided by the Appliance rather than a Hardware RAID controller. ZFS Software RAID is more robust than hardware RAID. Alerting for faulted disks, and failed disk replacement are not supported within the Replibit GUI when using hardware RAID. 8. The Replibit operating system does not support booting from UEFI. If your hardware defaults to UEFI, configure the system settings to boot in Legacy BIOS mode. It is highly recommended to install the Replibit Appliance software on bare metal for the best performance and reliability when backing up and recovering your customer Systems. January 2017 Page 13 of 130

15 Download the Replibit Software Use the below link for downloading the Replibit installation media Note: Please wait anywhere up to 5 minutes; the typical download is approximately 1.5 GB - Internet Explorer pop-up window for status. Once you have completed the download, proceed to the next section, Creating a Bootable USB Flash Drive. You may also burn the ISO onto DVD if you prefer. The base operating system installation from USB or DVD typically takes about ten minutes. Note: It is recommended to always download and use the latest version of the installation media every time that you deploy Replibit. Creating a Bootable USB Flash Drive You can utilize your preferred bootable USB creation tool. We recommend Rufus as a good all-around USB creation utility. You can download it from the following url: Note: You must have local Administrator privileges on your machine in order to run Rufus. January 2017 Page 14 of 130

16 Using Rufus to Create a Bootable USB Flash Drive 1. Insert your USB media into your system and launch Rufus. It should automatically detect and select your device; If it does not, select the correct device from the device drop-down list menu. 2. Ensure that the Partition scheme and target system type field is set to MBR partition for BIOS or UEFI-CSM. 3. Ensure that File system field is set to FAT32 as the default, or select FAT32 from the drop-down list menu. 4. Ensure that the Cluster size field is set to 4096 bytes as the default, or select 4096 bytes from the drop-down list menu. 5. Enter a New Volume label if desired. 6. Check the Quick Format checkbox to speed filesystem creation. 7. Check the Create a bootable disk using checkbox and select ISO Image from the drop-down list menu. Additionally, browse to and select the Replibit.ISO file. 8. Check the Create extended label and icon files checkbox. 9. Click the Start button and wait for the file copy process to complete. Note: Your USB drive will be formatted! 10. Once the USB creation process is completed, remove the Flash drive and attach it to your Replibit hardware device. 11. Ensure that Boot from USB is selected in the system BIOS settings, and that the USB drive is in the list of boot devices. January 2017 Page 15 of 130

17 Prepping Your BIOS (if necessary) The following process prepares your system for installing the efolder Replibit Appliance. Changing BIOS settings may be necessary if: You need to change the default boot device to load from a USB Flash device. You need to enable Intel-VT or AMD-V Virtualization. You need to make changes to Performance, Power Management, or Sleep settings. Your motherboard defaults to UEFI and you need to switch to Legacy BIOS mode. The following screenshots and instructions are presented as an example only. Consult the motherboard manual that came with your system for detailed instructions on configuring your BIOS settings. 1. To begin installation, change the BIOS settings configuration to boot from a USB Key. For demonstration purposes, we will present the steps for changing the following BIOS. To boot the system into the BIOS settings, Click the Delete key on your keyboard 2. Select Boot (or Startup) at the top of the screen. 3. Use the arrow to move down to select Removable Drives for Boot Settings Configuration January 2017 Page 16 of 130

18 4. Select the 1st Drive in the boot sequence for your USB device. 5. Select Chipset on the menu at the top of the screen and select, Enable for Hyper-Threading, Intel-VT d/x, or AMD-V/IOMMU. 6. Press F10 to Save and Exi the BIOS settings. When the system restarts, it should boot to your USB drive. Installation Process WARNING! With some hardware configurations, efolder Replibit will automatically start the install without any prompts. This will delete all data on the drive that you are using to install Replibit. Therefore, do not boot a machine with the efolder Replibit installer that has data on it that you intend to keep! Note: An Internet connection from the appliance will be required during the post-installation provisioning of the device. The following steps describe the installation of the underlying Replibit operating system. In order to ensure that the installation can complete successfully, the system should be connected to a network with DHCP and open Internet access to allow the software to be updated and registered during the Setup & Configuration process. If booting from a USB device, it may be necessary to change the default boot order of the system. January 2017 Page 17 of 130

19 o o o Power on the system and press the appropriate key (Typically <Del>, <F1> or <F2> on most white-box systems, or <F9> on HP Servers) to enter the BIOS setup menu. Locate the Boot Order management page within the BIOS and configure the system to enable booting from USB Flash drive. Ensure that the boot order places the USB device before internal Hard Drives. Alternatively, press the Boot Menu key (Typically <F9>, <F10>, or <F11> on most systems) and directly select the USB device to boot from. Note: The Replibit operating system does not support booting from UEFI mode motherboards. If your hardware defaults to booting using UEFI then you must change the settings within the BIOS to boot using Legacy mode. Consult your system motherboard documentation for instructions on selecting between Legacy and UEFI boot modes. Once the BIOS configuration has been completed: Ensure that the DVD or USB Flash Drive is inserted into the system. Exit from the BIOS after saving any settings changes. Reboot the machine. The Replibit installer should now load on the system. The Replibit Installer During boot of the Replibit OS, you should see this screen January 2017 Page 18 of 130

20 1. When prompted for an Installation Type, select Erase Everything and Install Replibit. IMPORTANT NOTE: If any other operating system is installed on the system, it will be destroyed, and replaced with the Replibit operating system. 2. Click the Continue button to proceed with the installation. 3. Select the first disk (typically ) in the system to be the boot drive and operating system disk. Note: This disk will be formatted and erased during the installation. 4. Click on Install Now to continue. January 2017 Page 19 of 130

21 Installation will now proceed; please wait for this step to fully complete. Loading the operating system may take several minutes, depending on the hardware and type of USB installation media being used. Once the installation is complete, remove the DVD or USB Flash Drive from the system. 5. Click the Restart Now button. Note: Depending on your system BIOS, it may be necessary to press the <Space> bar once to continue if the reboot appears to be stalled. Back to Table of Contents Section C: Setup, Configuration and First Time Login (Quick Start Part 2) Initial Configuration Now that the underlying operating system has been installed, it is time to complete the configuration and deployment of the new device. Note: Please document the IP address of the new system displayed at the login prompt. If there is no IP address displayed, wait one minute and press <Enter> to refresh the display. If you intend this device to be a Customer Appliance, ensure that you have already created a customer account in the efolder Replibit Licensing Portal, and that the account has an unallocated Location before proceeding. Please access the efolder Replibit Licensing Portal Guide 2.0 for detailed instructions on creating and managing customer accounts, locations, and licensing. January 2017 Page 20 of 130

22 Open a web browser and navigate to the IP address of the newly installed device to launch the Setup Wizard. Completing the setup and registration of the device requires that it have Internet access while running the Setup Wizard. There will likely be updates to apply. Applying updates may take as much as 20 minutes to complete. The device will be rebooted after the update process has completed. Observe the device console and wait for the system to complete its reboot before proceeding if updates need to be applied. Once the system has been updated, the Replibit License Agreement screen appears. 1. Read and accept the agreement before continuing. 2. Select the radio button, I accept the terms in the license agreement. 3. Click on the I Agree button to continue the configuration process. 4. Next, select between a standalone deployment or a multimachine cluster. For most deployments, you will select, First Machine in Cluster. If adding a new machine to an existing site deployment, Clustering. Note: It is recommended to consult with efolder Replibit Support prior to deploying any cluster, for a discussion of the benefits, ramifications, and limitations of clustering. 5. Click the Next button to proceed. January 2017 Page 21 of 130

23 6. Enter Passwords. The Linux Root user is the core operating system super-user and requires a highly secure password. Enter a Root Password at least 10 digits long containing Upper, Lower, Numeric and Special (i.e. #$%^&@!*) characters. The Replibit User Password is a limited access shell account whose password should be at least 8 characters long. The Admin (Web GUI) Password is used to access the Web Interface and all Replibit features. This password should be at least 8 characters long. Click the Next button to proceed. 7. Select the intended Role for the new device. These include: a) Appliance, which resides at the customer site, and receives backup data from Agent software installed on systems. b) Vault, which resides at the off-site recovery location or datacenter, and receives replication of recovery points created by one or more Appliances. c) Management Portal, which collects statistics from connected Appliance and Vault devices, and provides secure remote access and management. Partners January 2017 Page 22 of 130

24 typically deploy only a single Management Portal for all managed devices. 8. Click the Next button to proceed. 9. In the Reseller Username field, enter your Partner Username (License Portal user) that was provided when you completed your efolder Replibit Partner Agreement and License Portal training. 10. In the Reseller Password field, enter the License Portal Password that was provided when you completed your Replibit Partner agreement and License Portal training. 11. If deploying a new Appliance, click the Get Customers button to populate the list of customers with unallocated locations. 12. From the Customer Username drop-down box, select the correct Customer Username. 13. From the Customer Location drop-down box, select from the Customer Location(s) available. Note: As a reminder, you must first register in the efolder Replibit Licensing Portal to create Customers and Locations. If no Customers or Locations are displayed, there are no Customer accounts within the License Portal that have an unallocated Location. Consult the efolder Replibit Licensing Portal Guide 2.0 for more information. January 2017 Page 23 of 130

25 Note: If you are attempting to reuse an existing location that had a previous Appliance instance, you must delete and recreate the location within the efolder Replibit Licensing Portal if you are unable to perform a Factory Reset operation on the Appliance originally assigned to the site. Factory Reset will delete all data from the Appliance and make it unrecoverable. Click the Next button to proceed. The Network Setup screen appears. This displays the current Network Interface configuration. By default, efolder Replibit is configured for DHCP. efolder highly recommends that you cli and set up a Static IP address for your device. Once you have completed your Network configuration, click the Setup button to continue At this point your device and role assignment selections will be saved, and device setup will be completed. You will see the screens shown here to your right. Once initialization has completed the device will reboot automatically one last time. When the reboot has completed the login page will appear. (See screenshot on next page) Note The login page may appear before the device has rebooted, but you will not be able to log in until the January 2017 Page 24 of 130

26 reboot has completed. This may take several minutes on some systems. If you receive an error that the user is not authorized for login, wait 2 minutes and try again. First Time Login Once the machine has rebooted you may log in and continue configuring settings. 1. In the Username field, enter the default username admin 2. In the Password field, enter the password you provided for the Admin (Web GUI) user during the Setup & Configuration process. January 2017 Page 25 of 130

27 Initial Storage Configuration When you log in for the first time, the Menu Bar is opened and locked at the Manage Storage tab in the Add Storage Screen shown below. 1. The first task you must complete before the other menus become active is to setup your Storage Pool. January 2017 Page 26 of 130

28 2. and compression. Available options are RAID-0, RAID-1, RAID- 5, and RAID-6. RAID-1 requires a minimum of 2 disks, RAID- 5 requires a minimum of 3 disks, and RAID-6 requires a minimum of 4 disks. In RAID-1 and RAID-5, the total storage available for use will be reduced by 1 disk worth of space used for parity and to provide redundancy. A maximum of 1 disk may be lost within a RAID-1 or RAID-5 set without losing Storage Pool data integrity. In RAID-6, the total storage available for use will be reduced by 2 disks worth of space used for parity and to provide redundancy. A maximum of 2 disks may be lost within a RAID-6 set without losing Storage Pool data integrity. RAID-0 provides no redundancy and the loss of any disk in the Storage Pool will corrupt its data integrity. RAID-0 is not recommended for Production devices. 3. The Storage Pool may be expanded after creation, to increase available storage capacity. Regardless of the RAID level selected, the Storage Pool must be expanded by exactly the same number of disks chosen during the initial setup, using the same RAID level. When adding additional storage sets, the size of the new disks being added does not have to be the same as the original disk set, but the set must consist of the same number of disks. For example, if you choose to create a RAID-5 pool with 3 1TB disks and later want to expand the pool, you could add 3 additional 2TB disks to expand the pool. If you want to expand a RAID-0 pool by single disks, create the pool with 1 disk initially and then add disks 1 at a time to achieve your storage capacity target. Note: RAID-0 is not recommended or supported for Production usage. Loss of any disk in a RAID-0 Storage Pool will destroy all data in the pool! Using a larger number of disks in a Storage Pool set improves performance, as data is striped across multiple spindles. Creating Storage Pools by combining multiple sets of disks improves performance even more, at the expense of extra parity space consumption, as disk sets are stripped together using RAID-0. For example, 2 3-Disk RAID-5 sets combined into the storage pool is equivalent to RAID-50 or RAID5+0. Each disk set is independently redundant, and in the case of RAID-5 could survive the loss of 1 disk in each set; total usable capacity from the 6 disks assigned to the pool is only 4 disks worth of storage, as there is 1 disk worth of parity in each RAID set. After selecting the RAID level, select the Compression level for the pool. LZ mode has slightly lower compression but higher performance. January 2017 Page 27 of 130

29 GZIP mode has higher compression at the expense of lower performance. LZ is recommended for all devices. Expand the Unused Disks pane and select the desired disks to be used by the pool. If you have greater than 10 disks change your view to show 100 disks from the dropdown menu. Note: It is not recommended to have more than 10 disks in a single RAID set. Once you have selected the correct RAID level, Compression, and storage disks, click Create Storage to create the Storage Pool. The Storage Status section at the top of the page will list the availability status and pool configuration once the pool has successfully been created. January 2017 Page 28 of 130

30 Licensing Once the Storage Pool is set up, you should verify that licenses have been assigned to the Appliance. In the upper-left corner of the screen you will see available licenses displayed. Shown in the image above is an example of Endpoint licensing. If Storage licensing has been assigned, you will see a presentation of the remaining storage limit in TB. Note: The Storage limit presented represents the LICENSED storage amount. There may be a larger amount of storage physically present within the device. If assigned licenses are not yet present, select Settings from the Left pane, then Licensing, and click the Sync button to retrieve licenses from the Licensing Portal. If there are no licenses available after performing a Sync with the Licensing Server, visit the Licensing Portal, and verify that licenses have been assigned to this Appliance and location. See Section D: Settings within this guide for instructions on configuring other settings. For detailed instructions on using the License Portal, consult the efolder Replibit Licensing Portal Guide 2.0. Agent Deployment To add a new Protected System to an Appliance and begin performing backups, you will need to download and install the Replibit Agent on each system to be protected. The Agent software may be downloaded from the Downloads tab located in the left menu pane of the Appliance, or directly from the login screen. All Protected Systems require a backup Agent. If the system is configured to boot using UEFI, then after installing the backup Agent, download and install the UEFI agent. Before installing the Replibit Agent, remove any other existing backup agents or products. See Section I: efolder Replibit Best Practices within this guide for additional guidelines and recommendations when deploying Agents. January 2017 Page 29 of 130

31 Installing the Backup Agent After downloading the Agent installer, run it and complete the installation. Accept the Licensing Agreement, and click Next. Accept or change the default installation location, and click Next. Enter the IP address of the Appliance that will back up this system. Optionally, enter an Encryption passphrase for the system. Important Note: If you lose the passphrase there is no way to recover it! You will have to delete the Protected System and all recovery points from the Appliance and Vault, and then reinstall the Agent on the Protected System in order to reset the password. Once the Agent install has completed, click Finished. Installing the UEFI Agent After the backup Agent has been installed, you must install the UEFI Agent for systems that boot using UEFI. The UEFI Agent requires Microsoft.Net Framework 3.5. Agent installation will fail with a warning if.net is not installed. Installation of the UEFI Agent requires no selections, simply launch the Agent installer and click Install. Change Machine Name The default Machine Name (Hostname) of the system should always be changed when deploying a new device. This will ensure easy identification of the device when it is joined to the Management Portal. Select Settings from the left menu pane. Expand Change Machine Name. Enter a Hostname or FQDN describing the new device and click on Change. Back to Table of Contents January 2017 Page 30 of 130

32 Section D: Settings The following is a detailed explanation of the available options that may be configured from the Settings menu pane on the device. From the left menu pane, click on Settings to expose the configurable options within the main window. The Settings menu is universal across all device types, but not all options exist on all types of systems. Where there are differences, the sections below have been labeled as to which device types they apply to. The Menu pane is located along the left edge on Appliances and Vaults. The Menu pane is located across the top of the page on the Management Portal. License Details (Appliances and Vaults Only) The Licensing Details screen displays a list of licenses that have been assigned to the Appliance, as well as license type and usage statistics. Devices assigned with Endpoint licenses will list allocated, in use, and free licenses of each type. Devices assigned with Storage based licensing will display the Cloud retention policy (3-year or 10-year) as well as total, used, and available licensed storage. Note: Storage licensing applies to the size of the data on the Appliance. Cloud storage licensed usage is Unlimited for the specified retention period. Storage licensing includes unlimited endpoints. Click the Sync button to immediately synchronize with the Licensing Portal. On the Vault, this page enables syncing changes to the Partner account password with the Licensing Portal. If you change your Partner account password within the Licensing portal, you must visit each Vault and update the password in the Licensing Details page. January 2017 Page 31 of 130

33 API Key The API (Application Programming Interface) Key is an authentication string used for gaining access to the system by third-party integrations. Upload Logo Upload Logo provides for Branding of the product by replacing the logo image in the upper left corner and on the login page with a custom image. Image size should be 260 x 65 for best results. Click on the button to select your custom logo. Click on the Upload button once you have selected your desired logo. Change Password You can manage your password for the user account currently logged in to the Web Interface. Note: If the Admin (Web GUI) password is lost, you can change its password from the shell console. Using the Linux Shell information on using shell commands. To change the current user password: From the Change Password window, Current Password field, enter your Current Password. In the New Password field, enter your New Password. In the Confirm Password field, enter the New Password you just entered. Minimum Password Length is 8 Characters Select the Apply button. January 2017 Page 32 of 130

34 Manage Users (Appliance Only) Manage Users is an optional feature which allows you to create Customer login accounts on the Appliance. Customer user accounts on the Appliance have full administrative access to the device, and can perform any action available to the admin account with the exception of managing users. Export Image Quota Settings (Appliance and Vault Only) From the Export Image Quota Setting window, Set the maximum allowable storage space to be available for use when exporting Protected System disks for recovery. Export image quota does not apply to disks being exported to USB. The Default is 0, or no limit. Notifications (Appliance and Vault Only) Click to check the Enabled button to enable delivery of Notifications for alerts generated by the device. s may be deilvered to one or more addresses. The Enabled button opens up a form to complete the configuration of the mail server you wish to deliver s from.. Enter: From , Username, Password, Server Name (IP address or FQDN), Port, and Security type; then enter the destination To (s) addresses to which you wish to deliver alerts. Note: To deliver to more than one address, enter multiple addresses separated by commas. Note: Replibit requires authenticated login to an existing mail server to deliver Notifications. January 2017 Page 33 of 130

35 Alert Types Notifications allow for granular control over which types of alerting you wish to receive. Select or deselect the types of alerts that you would like to receive notifications for. All recipients receive the same alerts. Once finished with Notification conf settings. Once settings have been saved, click be successfully delivered using the configured mail server settings. Job Auto Delete Settings (Appliance and Vault Only) Within the Retain Jobs for text box, enter the retention period for historical job statistics to keep on the Jobs and Alerts menus. Type a value or click the up/down arrows to configure your desired number of days. Then click the Save button. Agent Monitoring (Appliance Only) With Agent Monitoring, you can define the scope of monitoring and alerting for the status of Agent connection states. This applies to both Notifications and ConnectWise integrated ticketing. The Dropdown selections include: Servers and Workstation, Only Servers, Only January 2017 Page 34 of 130

36 Workstations, and None. Selecting None will disable alert generation for the connection status of all Protected System Agents. Connections Alerts are generated for a Protected System whenever an Agent installed on the specified class(es) of system have not checked in for 5 minutes. Agent Monitoring alerts are automatically closed the next time the Agent checks in with the Appliance. Change Machine Name In the Machine name (hostname) field, enter a Name to configure the hostname of the device. This can be a simple hostname or FQDN if desired. Note: This name is used to identify this device when reporting statistics to the Management Portal, Notifications, and ConnectWise ticketing. It is recommended to use a descriptive name as this will appear in the Management Portal and the subject line of s and tickets. Management Portal Use the Management Portal settings tab to configure this device to connect to and be managed by a Management Portal. In the IP Address field, enter the public IP address or FQDN of the Management Portal. In the Username field, enter a configured username. o If you wish to allow Customers to access the Management Portal to view and manage their assigned Appliances, create a Customer user within the Management Portal and use this username and its API key Management Portal. Customer Users will have access to all devices registered using their account. The Admin user always has access to all devices. January 2017 Page 35 of 130

37 In the API Key field, enter an API key obtained from the Management Portal Users tab. Select the Test Connection button to verify communications. Click Save to complete the configuration and register with the Management Portal. Note: Devices connected to a Management Portal will be remotely and securely accessible from the portal, without the need to configure firewall rules or port forwarding, by utilizing an encrypted SSH tunnel connecting outward from the Appliance to the Management Portal. To access the available user names and API keys, log in to the Management Portal and select Users from the top menu bar. Using the Management Portal for more help using the Management Portal. Time Settings The Time Settings screen allows you to manage the Time, Date, and Time Zone of the device. Network Settings The Network Settings screen manages Network Settings on the device. From the Appliances drop-down list, select the desired Appliance name/ip address. (Multiple devices will only exist if a Cluster has been configured) Click to check the Enable Firewall checkbox. From the Interface(s) dropdown list, select your Interface from the selections. Select DHCP or Static. If you selected Static, enter IP address, Subnet Mask, Gateway, and DNS Servers. Multiple DNS Server entries may be entered separated by a comma. Click on Save. Note: Additional network adapters may be configured to provide access to additional network segments, or to segregate iscsi or NFS traffic from backup traffic using separate network paths. January 2017 Page 36 of 130

38 Update Manager The Update Manager configures and manages the automatic deployment of updates on devices and Protected Systems. To enable, check the Enable Auto Update checkbox to automatically install new updates during the overnight maintenance window. If available, Agent software on Protected Systems will also be updated automatically. To manually check for new updates and apply them immediately, click Check Updates. If new updates are discovered, the button will change to Update Now. Click Update Now to install updates immediately. The Device will be rebooted automatically once the update process has completed. Factory Reset (Appliance and Vault Only) If you would like to restore your Appliance or Vault back to a pre-deployment state, click on the Factory Reset button. This performs a complete reset of the device back to its initial, predeployment state. IMPROTANT NOTE: Performing a Factory Reset deletes all data stored on the device, and releases the configured Customer location for re-assignment to another Appliance within the License Portal. IMPORTANT: Licenses assigned to the Customer Location remain assigned. To return licenses for this customer location and remove them from Billing, visit the License Portal and remove the license assignments from the customer location. After performing a Factory Reset, the device is ready to be redeployed as an Appliance or Vault to the same, or other customer location. January 2017 Page 37 of 130

39 Shutdown and Reboot The Reboot and Shutdown functions/buttons reboot and/or shutdown the device. Note: When performing a shutdown, if the system does not have remote power management (such as IPMI or vpro for example) there will be no ability to remotely power it back on. A user will have to physically press the Power button on the system. Back to Table of Contents January 2017 Page 38 of 130

40 Section E: Using the Appliance The following section will discuss usage of the Web Interface options within the Appliance. Many of the options are also substantially similar to options when working with the Vault. The Menu Pane On the left side of the screen is the Menu pane. To populate the main window with task specific information and controls, click on Selections from the Menu. On Appliances, the top section of the menu pane contains an overview of the Licensing that has been assigned to the device. Overview of Menu Items Logo: The Branded Logo you to the device is displayed here. Protected Systems shows information about the systems being backed up by this Appliance. Schedules controls management of backup schedules that can be assigned to Protected Systems. Jobs shows information about active and completed job history. Alerts shows status and information on recent and past Alerts generated by the device. File Browser provides access to mounted recovery points and Exported disks, enabling retrieval of individual files from any web browser. For bulk file recovery, see the File and Folder Recovery guide. NFS Exports controls and manages access by remote systems to the NFS file shares hosted on the device for recovery and Exported disk retrieval. iscsi manages active iscsi targets exported from Protected Systems for recovery purposes. January 2017 Page 39 of 130

41 Manage Storage provides access to the Storage Pool configuration utility. Settings contains all of the configurable options discussed in the previous section. Section D: Settings ConnectWise Settings provides the configuration parameters for integrating Replibit with ConnectWise for automated billing and ticketing. Vault Settings controls configuration of offsite Vault destinations for replication of Protected System recovery points. System Info provides an overview of system configuration, hardware, and utilization statistics. Cluster Management displays information and management options for members of the current cluster. Downloads provides access to the available Agent installers and other components. Next we will discuss each of these Menu in detail. January 2017 Page 40 of 130

42 Protected Systems Overview Selecting Protected Systems will display a list of the systems currently being backed up and protected by this Appliance. The Status column has icons that indicate whether the system is currently running as a virtual machine (the first dot will be Green) and whether Replication is enabled for the system (the second dot will be Blue). System Name (Hostname), Operating System, and Currently Protected Volumes (disk volumes), are listed for identification and information. The Schedule column contains a dropdown list of available backup schedules. The assigned schedule is displayed. To change schedules, click the dropdown and select another schedule. Schedules are configured and managed from the Schedules menu, discussed in the next section. Under the Actions column are the Protected System Details and Delete buttons. Note: Selecting Delete will prompt for the permanent deletion and removal of the Protected System and all recovery points! This actions is permanent and cannot be undone! Selecting the Details button will open the Protected System Details page, which contains many additional system specific configuration options. (Discussed below) Click Refresh to update the display view with any newly discovered Protected Systems. Click Import to retrieve Protected Systems being Migrated or Recovered via USB media and import its data. Protected System Import and Vault Recovery Protected Systems that have been replicated to a Vault may be recovered back on to an Appliance in the event that the recovery data on the Appliance is lost. This provides for a means of retaining the backup history for the Protected System present on the Vault in the event an Appliance is lost and needs to be replaced. January 2017 Page 41 of 130

43 Note: If you intend to perform a Recovery of a Protected System from a Vault to an Appliance, before deploying the new Appliance at the customer site, disable the Replibit Agent service on all Protected Systems until the recovery is complete, in order to prevent the creation of a new backup chain on the new Appliance. Network Recovery To recover the Protected System from a Vault directly over the network, navigate to the Protected Systems page on the Appliance and click Recover. In the Recover Protected System dialog enter the IP address of the Vault and click Test Connection. Select the desired Customer Location from the Dropdown menu. Select the desired Protected System from the Dropdown menu. Click Recover. Monitor the recovery progress from the System tab on the Jobs menu. USB Recovery To recover a Protected System using a USB hard drive to transport the data, navigate to the Protected System Details page on the Vault. Click the Recover USB button. Select the desired disk from the USB Dropdown menu. Verify the Free Space is sufficient for the Protected System being exported Click on Recover to begin the export process. Monitor the progress of the data export from the System tab on the Jobs menu. January 2017 Page 42 of 130

44 Once the export to USB has completed successfully, transport the USB drive to the customer location and attach it to the Appliance. Navigate to the Protected Systems menu and click on Import. Select the USB drive from the USB Dropdown list, then select the Protected System from the Protected Systems Dropdown. If an Encryption password was configured for the Protected System, enter it in the Password field. Click Import to begin the recovery on the Appliance. Monitor the Import progress from the System tab of the Jobs menu. Importing a System When you export a Protected System to a USB disk, either by performing a Recover USB from a Vault (see USB Recovery), or a Migration over USB between devices (see Migrating Protected Systems), you may Import the Protected System into the Appliance using the Import button on the Protected Systems page. Attach the USB disk to the Appliance and click Import. Select the USB drive using the USB Dropdown Select the Protected System using the Protected Systems Dropdown If an Encryption password was assigned to the Protected System, enter it in the Password field Click Import to begin the data import process. Monitor the progress from the System tab of the Jobs menu. Enable Backups after Recovery or Import of a Protected System Once the Recovery or Import has completed successfully, create a connection to the Vault from the Vault Settings menu. From the Protected System Details page, select Replication and add a Vault Replication Target to the Vault for the Protected System. Verify that no errors are received when enabling Replication, or contact efolder Support for assistance. Once Replication has been enabled, enable and start the Replibit Agent service on the Protected System and perform an immediate Full Backup to ensure all system changes are synced to the Appliance and Vault. January 2017 Page 43 of 130

45 Protected System Details Page From the Protected System Details page, you can see general information about the protected system, available and in-use snapshots, and perform configuration of Replication, Boot Testing, Retention, and Alerting policies. If a Vault schedule has been created on the Vault Settings page (discussed below in the Vault Settings menu pane) then you can enable replication of recovery point data for this protected system to one or more off-site Vault(s). Managing Replication To view or change Replication configuration, click the Replication button. January 2017 Page 44 of 130

46 Adding Vault Replication Target(s) From the Protected Systems Details Page click the Replication button. The Enabled checkbox should be selected and enabled. Clear the checkbox to disable replication to this Vault. Click the Vault Setting dropdown to select an available Vault. (Vaults are configured under Vault Settings from the Menu Pane.) Click the Initial Snapshot dropdown and select which snapshot will be used as the Base Image when replicating to the Vault. If you wish to use USB Seeding to deliver the Protected System Base Image to the datacenter on a USB hard drive for this Vault, click to enable the checkbox to the left of USB Seeding. To add additional Vault that you would like to replicate this Protected System to, click Add Vault to create another Vault Replication Target and repeat the above steps to configure the replication settings. Click Save to save your Replication settings. Deleting Vault Replication Target(s) Click the Replication button from the Protected Systems Details Page. Click the Delete button for the Vault Replication Target that you wish to remove. IMPORTANT: Deleting a Vault Replication Target also deletes the Protected System from the Target Vault!! Click Save to save changes and begin the deletion process or Cancel to abort. Note: The Replication Settings window will show Deleting for deleted Vault targets until the Appliance has confirmed that the Protected System has been fully deleted from the Vault. This normally takes only a few minutes. Exporting a USB Seed Disk Connect a USB hard disk to the Appliance. Click the Replication button from the Protected Systems Details Page. Click the USB Seeding dropdown next to any Protected System for which you enabled seeding and select the target USB disk. Click the Seed button to start the seeding export job. Monitor the progress of the seeding export from the Seeding tab of the Jobs menu. If you select the same Base snapshot for all Vaults, a single Seed Export can be used for all. January 2017 Page 45 of 130

47 Importing a Seed Disk on the Vault Once the seeding job has successfully completed, transport the USB disk to the datacenter and connect it to the Vault. From the Menu pane select Protected Systems. Click the Seed button in the actions pane of the target Protected System (as shown below) to begin importing the seed data from the USB disk. Monitor the seed import process from the Replication tab on the Jobs Menu pane on the Vault. If the same Base Snapshot was selected for all Vaults when configuring replication (above), you may use the same USB Seed export disk for all Vaults, if desired. Temporarily Disabling Replication Click the Replication button from the Protected Systems Details Page. Click to clear the checkbox in the Enabled column. Click Save to save changes. To re-enable Replication, click to set the Enabled checkbox and save changes again. January 2017 Page 46 of 130

48 Enabling Nightly Boot Checks To enable nightly Boot VM Checks of the Protected System, click to enable the Boot VM Check checkbox. If an Encryption passphrase was specified when deploying the Agent to the Protected System, the System Encrypted password prompt will be displayed. Enter the Encryption Password and click I Accept. If the Boot VM Check option is enabled, the Appliance will perform a nightly virtual boot-up of the Protected System using the most recent recovery point, then take a screenshot of the running system. The most recent screenshot image may be viewed by clicking the Screenshot button on the Protected System Details page (shown here.) The image is delivered as an attachment if the Notifications feature is enabled in Settings and the Boot VM Check alert type is enabled. If ConnectWise Integration is enabled, a ConnectWise ticket will be created containing a link to the screenshot image if Boot VM Check is enabled. A global overview of all Boot Images is available on the Management Portal from the Boot VM Report page. Refer to Using the Management Portal for details. January 2017 Page 47 of 130

49 Scheduling an Immediate Backup Click Schedule Now to schedule an immediate backup of the Protected System. o You can choose from Incremental or Full type backups to be run. Click Schedule to queue the backup or Cancel to abort. January 2017 Page 48 of 130

50 Migrating a Protected System to another Device Performing a Migrate relocates the backup data of a Protected System along with all of its metadata to another Appliance or Vault. Cluster. network. USB hard drive. To receive the data on the target system, attach the USB hard drive and click on Protected Systems page. Starting a migration of a Protected System to another Appliance will permanently disable it for backups on this Appliance. Please s Migrating Protected Systems Advanced Topics for additional details. Note: Migrate Outside Cluster over USB may be used to migrate Protected System data to an entirely different Replibit Partner account if desired. January 2017 Page 49 of 130

51 Changing Backup Retention Settings Backup Retention controls how long recovery points will be retained on the device before being automatically purged. There are two modes of backup retention: Basic and Custom. Basic Retention mode will retain all snapshots for the specified number of days. o Snapshots older than the selected time window will be removed from the system. Custom Retention mode retains all snapshots for a set number of days similar to Basic mode. Thereafter it will retain a set number of Daily, Weekly, Monthly, and Yearly snapshots. The system will keep the LAST available snapshot for each period of time. (For example, the last snapshot of the day, week, month, or year). o The value for Retain All Snapshots must be greater than 0 (Zero) o Setting any retention period value to -1 indicates Keep Forever for that interval. In the example settings presented in the image to the right, we have elected to keep all snapshot for 5 days. After 5 days we will then begin keeping the last snapshot of the day for 5 days, the last snapshot of the week for 4 weeks, the last snapshot of the month for 3 months, and the last snapshot of the year forever. Daily, Weekly, Monthly, and Yearly retention may overlap. Overlapping snapshots are not deleted until they are no longer valid for any retention Interval. (For example, the last snapshot of the day on December 31 is both a monthly and a yearly and will not be deleted until it is beyond both the s.) o For example, suppose that it is 1:00PM on Thursday, January 8th. In this case, we would have all snapshots taken from 12:00am on Saturday, January 3 rd up to the present time (keep all for 5 days), the last snapshot of each day taken on Monday, December 29 th through Friday, January 2 nd. January 2017 Page 50 of 130

52 o Our most recent Weekly would the last snapshot of the day taken on Sunday, January 4 th o We would also have Weekly snapshots from December 28 th, 21 st, and 14 th. o Our Monthly snapshots would be the last snapshot of the day taken on December 31 st, November 30 th, and October 31 st. o Finally, our Yearly snapshots would be the last snapshot of the day taken on December 31 st of each year that we have had the Appliance in operation. Not that this overlaps with our most recent Monthly. If no snapshot exists for any of the given days listed above, the next most recent snapshot within the time interval will be chosen. For example, if no snapshots exist on Saturday or Sunday, the last snapshot taken on Friday will be selected for the Weekly, and so on. Raise Alerts on No Backup This setting controls the frequency of Alerts generated when backups fail or are missed. The default value for this setting is 0 (Zero) Hours, which indicates that Alerts should always be created immediately whenever a backup is missed or fails. Increasing the value of this setting will suppress Alert generation for failed or missed backups by the specified number of hours. For example, if this setting is set to 3 Hours, and a backup is missed on the first hour, then fails on the second hour, but succeeds on the third hour, no Alert will be raised. This setting controls Alert generation for both Alerting and ConnectWise ticket creation. Snapshots and Snapshot Actions For each recovery point, there are a series of actions that can be performed by selecting one of the buttons in the Actions menu. January 2017 Page 51 of 130

53 Start VM Selecting Start VM will virtualize the chosen recovery point and boot the Protected System from that point in time on the Appliance. There are a number of customizable options available when virtualizing a Protected System. Set the amount of RAM and number of CPU (cores) that will be available for the virtual system. Select Mode: Test Mode or Live Mode. Test Mode boots the virtual machine in a private network for testing. Any changes made to the virtual machine hard disk images will be destroyed when the system is shutdown. Live Mode boots the virtual machine on the same LAN as the Appliance management interface. The selected Recovery Point will be marked as Persistent and any changes made to the virtual machine disk volumes will not be lost when the system is shutdown. After running in Live Mode you may shut down the system and perform a Bare Metal Restore or Disk Export of the VM from this persistent snapshot to retain all data changes made while your Protected System was virtualized on the Appliance. Note: Live mode is intended be utilized as an emergency recovery method for Protected Systems that have become damaged or lost and need to be restored to service urgently or when other recovery methods would cause unacceptable downtime. You should perform a recovery of any system running in Live Mode back to physical or virtual hardware as soon as possible in order to re-establish redundancy. Selecting a Boot Key sends that key stroke to the virtual machine after BIOS POST completes and enables access to the virtual January 2017 Page 52 of 130

54 BIOS or Windows Startup menu during system boot. Configuring Boot Device and CD-ROM Image allow for booting of the protected system from a CD image for diagnostic or testing purposes. For example, to perform startup repair when performing a Live Mode system recovery. Password: If an Encryption passphrase was entered when installing the Agent, you will be prompted to enter it here in the Password field. For information on configuring and using Virt- Using VirtIO in a VM Advanced Topics When a virtual machine is running, the snapshot actions will change. Start VM will become Stop VM, and an additional button, Terminal will be present in the Actions list for the chosen recovery point. Other actions will be grayed out. If you select Terminal, this will open a new browser window displaying the running virtual machine console. Please ensure that your web browser is configured to allow popups before starting a VM or selecting Terminal. January 2017 Page 53 of 130

55 Mount Selecting Mount will backup on the Appliance or Vault and make them accessible from the File Browser tab of the Menu pane. If an Encryption Passphrase was entered during the Agent installation, you will be prompted to enter the Password. To use the Mount option for individual file recovery, select the desired recovery point and click Mount, then browse down using the File Browser to the file(s) you would like to recover. Download the files you are looking for by right-clicking them from the right side window. For instructions on performing bulk recovery of files or folders, File and Folder Recovery For instructions on recovering complete systems, refer to the Disaster Recovery Export Selecting Export will create a virtual disk image file for some or all of the protected disk volumes on the system. You may elect to selectively export specific disk volumes if you desire. By default, the images are generated in the ExportVMs folder on the Appliance or Vault within the Storage Pool, and can be accessed using the File Browser or via the NFS Export feature. An option exists to export the disk images to an attached USB drive if you prefer. January 2017 Page 54 of 130

56 Select the Volumes you would like to Export. Select your desired format from the available radio buttons: VMDK (VMware), VDI (VirtualBox), VHD (Hyper-V Gen1 or Xen), VHDX (Hyper-V Gen2), or RAW (KVM). If you entered an Encryption Passphrase during the installation of the Agent, you will be prompted for it in the Password field. After selecting your desired format, and entering your password (if necessary), select the Start button to begin the export process. You can monitor the progress of the Export from the Conversion tab on the Jobs Menu Pane. Start iscsi Start iscsi presents the disk volumes of the selected recovery point as iscsi Targets, which you can access by remote systems capable of running an iscsi Initiator client. (For example, Microsoft Windows iscsi Initiator is located in Control Panel under Administrative Tools.) You can utilize iscsi for bulk recovery of files or direct virtualization of protected systems on third-party hypervisors like VMware or Hyper-V. (See the File and Folder Recovery and Disaster Recovery sections of this guide for more details). You may enable iscsi for a recovery point in Test Mode or Live Mode. Similar to Start VM, when the recovery point is exported in Test Mode, it is then destroyed when iscsi has stopped; any changes made to the disk volumes are lost. January 2017 Page 55 of 130

57 When started in Live Mode, a persistent recovery point is created and any changes to data are retained. Persistent recovery points created by Start VM and Start iscsi are interchangeable. For example, a virtual machine recovered using Live Mode virtualization may be shut down and then exported via iscsi in Live Mode, preserving the data changes that have been made to the disks so that they can be recovered to new physical or virtual hardware. If an Encryption Passphrase was entered during the installation of the Agent, enter it in the Password field. Select the desired Mode and then click Start. To connect to the exported targets from a Windows system, launch iscsi Initiator from Control Panel -> Administrative Tools. From the iscsi Initiator Properties screen, enter the IP address of the Appliance or Vault in the Target field and click Quick Connect. Disk Discovered Targets field. Select each LUN and click Connect to mount it. January 2017 Page 56 of 130

58 Delete Snapshot If you would like to manually delete individual recovery points, you may do so by clicking the Delete button at the right edge of each snapshot. Used Snapshots Expanding the Used Snapshots section on the Protected Systems Details page will display all recovery points that are currently in use, for example, Mounted or running as a VM, and provide the appropriate option to close it if possible; (for example, Dismount or Stop iscsi, etc.). being Exported, or currently exposed as iscsi - Note: Snapshots in use by Export cannot be closed from the Used Snapshots view. You must wait for the Export process to complete before the snapshot will be closed automatically. Schedules The Schedules menu pane is used to manage scheduling of backup jobs for Protected Systems. Multiple backup schedules may be created, enabled, disabled, or deleted, and assigned to individual Protected Systems. To create a new schedule click Create Schedule. January 2017 Page 57 of 130

59 Enter a Name for the new Schedule. Check the corresponding checkbox to set whether this Schedule should be Enabled or assigned as the Default schedule if desired. You may specify a time window for performing the initial Full image backups of Protected Systems; for example, you may wish to exclude normal business hours. For ongoing incremental backups, choose the backup mode: Interval or Manual from the Incremental Backup selection. Interval mode performs backups every x minutes or hours between the specified Start and Stop times. Select the desired start and stop window and set the backup Interval. In Interval mode, backups always occur on the hour. i.e. 1:00, 2:00, etc. For more granular intervals, backups occur on 15 minute dividers. i.e. 3:15, 3:30, 3:45, etc. Manual mode performs backups only at specific times of the day, specified by a list of backup times. Enter a comma separated list of backup times using 24- hour format in the form HH:MM. (such as, 07:00,12:00,18:00). To stagger backup times when backing up many servers to one Appliance, use Manual schedules to start some servers 5 or 10 minutes after the hour. Select Save when you completed your selections. January 2017 Page 58 of 130

60 Jobs The Jobs menu pane contains information about current and historical job history. On the menu pane there are submenus for Backup, Replication, Seeding, Conversion, and System type jobs. The Backup tab contains information about local Backup jobs on the Appliance. The Replication tab shows details of recovery points being replicated to the off-site Vault. The Seeding tab shows the progress of full image Seed jobs being written to USB disks. The Conversion tab shows the progress and status of disk Export jobs on the system. The System tab shows the status and progress of System jobs, like system updates and Protected System migrations. You may set the historical retention period for Jobs metadata from the Jobs Auto Delete Settings page of the Settings menu pane. Status Indicators and Actions Possible Status values include Completed, Failed, Missed, Running, Paused, Error, and Waiting Ingestion (for Replication jobs). Hover the mouse over any status icon to display its text label. Note that in-progress jobs will have a Green circle icon followed by an Action icon. Backup jobs can be Paused (and resumed.) Replication, Seeding, and Conversion jobs may be cancelled while the snapshot is still in transit. Once transmission is completed, the Green circle in-progress icon will remain until the snapshot has been consumed and committed on the January 2017 Page 59 of 130

61 Vault. ( System jobs generally cannot be Paused or Cancelled. Note: When performing USB Seeding of a Protected System Base image, the subsequent Incremental backups will be replicated to the Vault immediately. The Replication Jobs menu at the Vault, get imported, and is consumed. Once the Base image has been received, the incremental backups will be processed in turn. Alerts The Alerts menu pane shows the status of any active or recent alerts generated by the Appliance. You may select between Alerts and Alert Archive views. Alerts filters for more recent alerts and Alert Archive displays all alerts within the log. Retention of the Alert Archive is controlled by the Jobs Auto Delete Settings retention on the Settings menu pane. Alert Status may be Active, Closed, or Auto Cleared. Hover the mouse over icons in the Status pane to read their text label. Many types of alerts will be automatically cleared if the next attempt to perform the failed action succeeds. Some types of alerts must be manually closed. Alerts in an Active state that can be manually closed will have a button in the Action pane. File Browser The File Browser lets you explore mounted disk volumes from Protected System recovery points, and download individual files for simple file recovery. Using File Browser you may also view the full system disk images that have been Exported on the device, download individual disk image January 2017 Page 60 of 130

62 files, or delete Exported disk images that you no longer need. Right-Click items in either the left or right windows panes for a list of options, such as Download or Delete. Located at the bottom of the page is a list of mounted recovery points, with an option to Dismount them once you have finished. When you have completed file recovery operations, it is recommended to dismount any Mounted recovery points or delete any Exported disk volumes. This will allow for successful cleanup of recovery points by retention policies and free up space in the Storage Pool. NFS Exports Enabling NFS Exports allows remote systems to connect to the Appliance and mount the Export folder using the network file system protocol. NFS connections are secured by host IP address. Using NFS Exports you may easily connect your VMware, Hyper-V or other hypervisor server to the Replibit Appliance or Vault in order to transfer Exported Protected Systems disks for recovery. To enable NFS Exports, click to select the Enable NFS Exports checkbox. Click Add Allowed IP and enter the IP address of the host that you wish to allow connections from. To mount the NFS folders from a client, provide the IP address of the Appliance and the shared folder path you wish to mount to the NFS client. On an Appliance, the shared folder path is /export/admin. On a Vault the shared folder path is /export/<username> where <Username> is the login name of the Customer whose data you are recovering. To remove a host from the access list, click the Delete button for the host in the Actions menu January 2017 Page 61 of 130

63 See the sections on recovering to VMware or Hyper- Disaster Recovery section of this guide for examples of using NFS Exports for data recovery. iscsi The iscsi menu pane displays all currently exported iscsi targets, including details about session identity and volume names. Use this tab to help identify disk volumes by IQN name, to quickly find all exported targets, or to Dismount and remove sessions when they are no longer necessary. File and Folder Recovery Disaster Recovery of using iscsi to recover Protected Systems and customer data. Manage Storage The Manage Storage menu pane allows you to see the status and configuration of the Storage Pool and all disk volumes present within the system. From this menu pane you may create or destroy the Storage Pool, replace failed disks and perform a rebuild of the Pool, or add disks to the Pool to expand storage capacity. Storage Status The top section of the Manage Storage view displays the current configuration and status of the Storage Pool. Items of note: The pool State should be Online. The State of each disk volume present should be Online Read, Write, and CKSum error count columns should all be 0 (Zero) Errors January 2017 Page 62 of 130

64 If any of the above statements is not true, contact efolder Replibit Support for assistance. SAN Expansion If you are using a SAN to provide storage for your Storage Pool (via iscsi, as discussed below) and have expanded the size of any LUN that you are exporting to the Replibit device, use the Expand Pool button to rescan the LUN for the size change and add the new storage space to the Pool. Destroying the Storage Pool Clicking Destroy Pool will delete the storage pool and all data. Note: Use the Destroy Pool option with caution. Clicking on Destroy Pool will delete the storage pool and all data. This is an irreversible action! Storage Pool Operations Expanding the Storage Pool menu displays the current RAID level, Disk-Set size, and Compression settings. Note in the example above that we have selected RAID6 using (4) disks per RAID volume set, with a Compression scheme of LZ4. January 2017 Page 63 of 130

65 Failed Disks (Identifying and Replacing) In the event that disks within the Storage Pool have failed, the Storage Status will change from Online to Degraded or Faulted, depending on the severity of the failure and the RAID level selected. In the event that sufficient RAID redundancy exists, the Storage Pool will become Degraded but will continue to operate in RAID Recovery mode. Performance will be impacted but the device will continue to function, and no customer data will be lost. Failed disks should be replaced as soon as possible in order to restore RAID redundancy and prevent the possible loss of customer data should additional storage pool disks fail. Once you have replaced the failed disks within the device, navigate to the Manage Storage menu and expand Failed Disks. Click the Replace button to start the failed disk recovery process. From the Unused Disk dropdown select an available disk that is as large as or larger than the original failed volume. Click on Replace to begin rebuilding the RAID set onto the replacement drive. If insufficient RAID redundancy exists to provide for the failed disk volumes, the Storage Pool will become Faulted and all customer data present will be lost. Faulted Storage Pools will have to be destroyed and then recreated again once the failed disks have been replaced. See Vault Recovery for information on retrieving data from the Vault. January 2017 Page 64 of 130

66 Used Disks (Disk Device Identification) Expanding Used Disks displays a list of all disk volumes in use, along with identifying information. Disk displays the local device address of the disk. Disk Type displays whether the device is a local physical volume or a remote iscsi LUN.. Disk ID displays the identity of the device within the Storage Pool. TargetIP and TargetPort displays connection information about the iscsi Target. Disk Status shows the current status of the disk. Size displays the total size of the volume. Unused Disks (Expanding the Storage Pool) Expanding Unused Disks displays a list similar to the Used Disks display described above. Unused Disks may be used to expand the capacity of the Storage Pool. To add additional storage capacity to the pool, select the minimum number of disks. (Minimum Disks is defined as the number of disks used to initially create the storage pool.) Refer to the image to the right: Minimum Disks is displayed in the RAID Level configuration, as well as noted under Compression Level. Select a set of disks that are all the same size. The size does not have to be the same as other RAID sets already assigned to the Storage Pool. Click Add to Storage to create a new RAID set and add it to the existing Storage Pool. Note: Additional RAID sets are Spanned onto the existing Storage Pool similar to RAID-0. For example, if your Storage Pool is configured for RAID-5, then adding a new RAID set is similar to RAID-50. Each RAID set contains its own set of redundant disks, so for example, a single disk could be lost from each RAID-5 set without losing data integrity of the Storage Pool. January 2017 Page 65 of 130

67 iscsi Storage (Managing Remote Storage Volumes) efolder Replibit supports using external iscsi disk volumes for creating the Storage Pool. Important! It is not recommended to mix Local storage with iscsi storage devices when creating the Storage Pool. Expand iscsi Storage to display the iscsi Initiator management settings. Enter the iscsi Target Server IP address (and port if it has been changed from the default) under Discover & Add iscsi Storage and then click Scan to search for accessible storage volumes. Click Add on each discovered disk volume that you would like use as a Storage Pool disk to attach it to the Appliance. iscsi utilizes the network layer instead of a dedicated storage controller when performing disk and storage operations. Multiple network adapters should be employed when utilizing iscsi for the Storage Pool in order to prevent network performance bottlenecks. Note that iscsi network traffic may be segregated from backup traffic by placing it in an alternate subnet bound to a second physical NIC. (See Network Settings or refer to Section D: Settings menu pane). Also, it is highly recommended to utilize 10Gbe Ethernet cards when using iscsi devices for the Storage Pool to improve disk performance. Using 1Gbe Ethernet (even when using multi-path) for iscsi Storage Pool devices is officially unsupported by the efolder Replibit Support team, due to poor performance concerns. USE AT YOUR OWN RISK! ConnectWise Settings From the ConnectWise Settings menu pane, you may enable integration of efolder Replibit with your ConnectWise PSA. Once enabled, alerting events trigger tickets within the PSA. Ticket status is synchronized in both directions with the corresponding alert. Important! Before enabling ConnectWise Integration within Replibit, you must first ensure that ConnectWise has been properly configured for Integration with third-party products. For complete details on configuring your ConnectWise system for integration with Replibit, please refer to the efolder Replibit ConnectWise Guide. January 2017 Page 66 of 130

68 It is recommended to contact efolder Replibit Support for assistance when enabling and configuring the ConnectWise Integration. Enable ConnectWise Integration: In the Site: field, enter the URL to your ConnectWise server. In the Company: field, enter the Company Name. In the API Key field, enter your API Key In the API Secret field, enter the API Secret password. Click the Test Connection button to verify that your credentials are correct; then click the Save Configuration and Credentials button. Configure Billing Integration To enable Billing integration for this Appliance, expand Billing Integration and click to check the Enable Billing Integration checkbox. Select the Customer that this Replibit device should be billed to from the Select a Company dropdown. Select the Agreement that you created within ConnectWise for this service from the Select an Agreement dropdown. The Agreement should contain a definition of the Monthly fixed billing for this device. Select the Addition that you created within ConnectWise for this service from the Select an Addition dropdown. Replibit will update the Addition within ConnectWise with the total amount of Storage (in Gigabytes) being consumed on all Vaults by all Protected Systems hosted on this Appliance. Storage used by Protected Systems being replicated to multiple Vaults will be reported cumulatively. The Addition should be configured within ConnectWise with the off-site Vault per- Gigabyte charge (if any) that you wish to bill this customer. January 2017 Page 67 of 130

69 Configure Ticketing Settings To enable ConnectWise Ticketing expand Ticketing Settings and select a company from the Service Ticket Company dropdown. Replibit ticketing integration with ConnectWise is granularly configurable per event type. To receive ConnectWise tickets for each type of alert event, enable each event class as follows: Check the Enable checkbox, select a Service Board, and then select the ticket status you would like to assign for New and Closed tickets of this type. All ticketing event classes are optional and you need only configure the types of events for which you wish to receive tickets within ConnectWise. Import and Export Settings Once you have completed configuring ConnectWise on your first device, you may Export the settings to a file and Import them when configuring subsequent devices. Click Export or Import from the ConnectWise Settings menu pane. January 2017 Page 68 of 130

70 Vault Settings From the Vault Settings menu pane, you can create and manage connections to one or more offsite Vault repositories. Click Add Vault to create a new connection. Vault, and the public IP address or FQDN by which it may be accessed by the Appliance. Click Test Connection to verify that communication can be established. Your firewall must allow ports 443 and 9080 from the Appliance to the Vault. Alert if Snapshots Lag By alert ticketing. Send Incremental Snapshots in Groups of to group replication jobs. This can reduce total WAN traffic by aggregating compression across several snapshots, but reduces the frequency off-site replications. The Vault may lag behind the Appliance by several snapshots if this feature is used. Enable or Disable the Vault schedule using the Enable checkbox. Disabling the Vault schedule here stops replication for all Protected Systems on this Appliance that are replicating to this Vault. To halt replication for a single Protected System only, disable the Vault Replication Target using the Replication button on the Protected System Details page. January 2017 Page 69 of 130

71 Configure the replication schedule to suite your specific Customer location requirements. o You may build Vault replication schedules to be as granular as you desire by selecting days of the week, start and stop times, and allowed bandwidth. o Click Add to add additional time blocks to the schedule. o Set different bandwidth restrictions throughout the day, or exclude time windows to prevent replication during those time periods if you so desire. Click Save to save your settings. It is recommended to create only a single Vault schedule assigned to all Protected Systems, as bandwidth consumed by concurrently running Vault schedules is cumulative. (For example, if two schedules are running during the same time window, each capped at 5Mbps, then the total allowable network traffic will be 10Mbps). In order to enable replication to multiple Vaults, you must create a Vault Schedule for each Vault. System Info The System Info menu pane displays an overview and summary of the system status of the Appliance. Details include system memory and disk usage, detailed storage utilization by protected system, and graphical performance metrics over time, as well as disk status information for the OS volume. Cluster Management Advanced Topics Clustering efolder Replibit does not recommend the use of Clustering unless required for very large Customer locations. Downloads From the Downloads menu pane you will find links to download the available Agents and other components of efolder Replibit that can be installed. January 2017 Page 70 of 130

72 Export and Search Options Many of the menu pane pages have a set of common Export and Search buttons in the top right corner of the page. The Following Export options are available: Copy will copy the selected page entries to the system clipboard. CSV, Excel, and PDF will prompt for downloading the currently displayed entries in the selected format. Print will generate and display the data in a printable format within the browser page. Using the Search feature: Use the Search field to filter for specific criteria within all fields displayed on the current page. For example, you may search Job or Alert history for specific events. You may combine multiple search criteria by separating search terms with a pipe character ( ). (for example, running paused or failed missed) Back to Table of Contents January 2017 Page 71 of 130

73 SECTION F: Using the Vault The Vault provides essentially the same services and features as the Appliance, with a few differences in presentation and function. All of the menu panes and features present on the vault work similarly to the Appliance, and as such, this manual will document only the Vault specific differences here. General differences between Appliance and Vault Where the Appliance is intended to be deployed at a single customer location, the Vault is designed to be multi-tenant, and securely accept replicated recovery point data from multiple customers and sites. The Web Interface features and options are slightly different than the Appliance, and specific features are split between Admin mode and User mode. The Admin has access to configuration and management functions on the device, but is locked out of user specific features and options, such as mounting, virtualizing, or exporting Protected Systems. Users have very limited access to configurable settings on the device, but have full access to recovery and export options ONLY for their own protected systems present on the Vault. To perform recovery operations on a Vault, you must log in to the Vault using the Customer credentials you entered when creating the customer in the Replibit License Portal. The Schedules, Vault Settings, and Download menus do not appear on the Vault. Vault Menus Admin Users When logged in to a Vault as Admin, the following menus are present: Protected Systems Users Jobs Alerts Manage Storage Settings ConnectWise Settings System Info Cluster Management January 2017 Page 72 of 130

74 Customer Users When logged in to a Vault as a Customer, the following menus are present: Protected Systems Jobs File Browser NFS Exports iscsi System Info Customer accounts have access only to Protected Systems and information related to their own account. When performing NFS Exports, virtual disk Export, or browsing mounted recovery points, customer related files are stored in customer specific paths, secured to their login account. Except where noted in the following sections below, all menu items present for the specified class of user (Admin or Customer) operate identically to the Appliance. Using the Appliance for a detailed description of their use and function. Protected Systems Menu Differences There is no Missed Backup Alert Hours setting present on the Vault. Replication settings do not exist on the Vault. The Replication button has been replaced with Recover USB (See USB Recovery.) When logged in as Admin, all of the snapshot actions are greyed out. You must log in using a customer account (as provisioned within the efolder Replibit Licensing Portal) in order to access the snapshot actions. Customer user accounts have access to all Snapshot actions and retention policy, but cannot configure bootvm or Migrate options. Users Menu (Admin Only) The Vault synchronizes periodically with the License Portal to retrieve all customer accounts and passwords. When logged in as Admin on a Vault the Users menu will appear be present. From the Users menu pane the Admin user can access a list of all customer user accounts that have been created by the Partner and set customer specific disk space quotas per customer to limit total storage usage on this Vault. A digest of license usage for all customers is also displayed from the Users menu page. Back to Table of Contents January 2017 Page 73 of 130

75 Section G: Setting up a Vault in the efolder Cloud All new Partners, and existing Partners who purchased Replibit directly from efolder will have a Vault and a Global Management Portal provisioned within the efolder Cloud. Credentials and access instructions will have been sent to the administrative address on file when your Partner account was created. If you do not have these credentials, contact Customer Support. Legacy Replibit Partners (those who purchased Replibit before the merger with efolder) who wish to use the efolder Cloud for their Vault storage may request one by contacting efolder Replibit Support. Occassionally it will be necessary to provision additional Vault servers in the efolder Cloud, as you grow your MSP business. efolder Support will monitor your Cloud Vault storage usage and automatically request additonal Vault servers on your behalf, and advise you when they have been deployed. Before using your new Vault for replication, you must first complete the initial setup and configuration of the device within the efolder Cloud. Configuring your Vault 1. Enter the web URL to your Vault that was provided by efolder support in a browser window. Note: The following URL is provided only as an example. January 2017 Page 74 of 130

76 When accessing the URL, you may see a message from your browser that a self-signed certificate does not match the full hostname this is normal and should be ignored. If you see a message indicating the connection is not safe, ignore it and click Continue to this website. 2. If you see the window to the right, this is normal. Click Proceed to continue. January 2017 Page 75 of 130

77 3. After reading the agreement, select I accept the terms in the license agreement; then, click I Agree. 4. Select First machine in Cluster; then, click Next. January 2017 Page 76 of 130

78 5. Enter a password for the Admin (Web GUI) user account. The Linux shell root and replibit users have been disabled on Vaults hosted within the efolder Cloud. The Admin (Web GUI) password should be at least 8 characters long. 6. Select Vault; then click Next. 7. Type the Reseller Username and Reseller Password in their respective fields. Note: these are the efolder Replibit Licensing Portal credentials you received from efolder when your Partner account was created. 8. Click Next to proceed. January 2017 Page 77 of 130

79 9. Select your Time Zone from the drop-down menu; then, click Setup. Do not change the IP address assigned to the system. 10. To complete the setup configuration, the system will reboot. Please allow ample time (about three minutes) and wait until this process completes. 11. Type the Username and Password in their respective fields. The username is admin and the password is the value you entered for the Admin (Web GUI) password above in step Then, click Login January 2017 Page 78 of 130

80 13. After login, the Storage Management screen is displayed. 14. Click to expand Storage Pool within the center pane 15. Select RAID Level 0 and LZ4 (lower compression, higher performance) mode 16. Expand Unused Disks and check to select the available Disk(s). 17. Click Create Storage. January 2017 Page 79 of 130

81 18. When the confirmation message appears, click Yes to continue. Note: efolder is using SAN storage in the datacenter and the storage disk redundancy is provided on the SAN. Once you have completed the initial configuration of the Vault in the efolder Cloud, refer to Section E: Using the Appliance and Section F: Using the Vault for further details on using and managing your Vaults. Back to Table of Contents January 2017 Page 80 of 130

82 SECTION H: Using the Management Portal The efolder Replibit Management Portal provides a central server that delivers secure remote access to all managed devices (Appliances and Vaults) as well as an overview of all managed and protected systems. Data is collected from all devices to provide consolidated reporting on license usage, device status, and protected system backups. Dashboard The Dashboard provides a simple count of managed and protected systems, broken down by type. Managed Systems The Managed Systems page displays details of all connected Appliances and Vaults. Data can be sorted by any field by clicking the column header. Click again to reverse the sort order. January 2017 Page 81 of 130

83 Some useful information that can be monitored from this page includes: Version The Version field displays the software version of Replibit installed on the specified device. You should periodically verify that all devices have been updated to the latest software; Stats Time Stats Time reports the most recent time that the Managed Device checked in with the Management Portal and updated its statistics. You should periodically verify that the Stats Time is current for all devices, indicating that they are online and have reported in recently; Licenses Licenses reports license usage for each Managed System. You may verify Endpoint license assignments and remaining Storage limits. Action Buttons At the right edge of each device is a series of Action buttons. In order from left to right: Remote - Access the Web Interface of the managed device over a secure SSH tunnel Terminal - Access the Shell console of the managed device over a secure SSH tunnel History - Display historical License usage by the device over time Systems - Jump to the Protected Systems page filtered for systems managed by this device Delete - Delete this object from the Management Portal Note: When deleting, if the device is currently connected, the Management Portal settings will be cleared from the Settings page on the selected device. Deleting a managed system will also delete all Protected Systems and metadata associated with it from the Management Portal database. Note: If you do not have a means to connect directly to the Managed Device Web Interface, you will no longer have access to the Managed System after deleting it from the Management Portal! January 2017 Page 82 of 130

84 Backup Status The Backup Status page provides a detailed list of protected systems residing on all managed devices. Details include identity, IP, Appliance, local storage utilization, agent status, and last backup time. From the Actions column click History to display historical backup status metrics for the protected system, or delete to remove the system and delete its history. Note that protected systems that still exist on the managed device will be recreated within the management portal. Replication Status The Replication Status page provides a detailed list of protected systems being Replicated to an off-site Vault. Details include identity, IP, Vault, off-site storage utilization, replication status, and last replication time. From the Actions column click History to display historical backup status metrics for the protected system, or delete to remove the system and delete its history. Note that protected systems that still exist on the managed device will be recreated within the management portal. Note: Managed Systems that have been retired, and Protected Systems that no longer exist on their Appliance should be deleted from the Management Portal to ensure accurate reporting statistics. Deleting a Protected System from an Appliance does not automatically remove it from the Management Portal. January 2017 Page 83 of 130

85 Boot VM Report This page provides a visual quick reference to the status of the latest Boot VM test for all protected systems managed by the Management Portal. If Boot VM Check is not enable for a system, the image column will display N/A. Identity and status information is provided for both Appliance and Vault Boot VM Check images to allow quick and easy verification that all protected systems are recoverable. Users Similar to the Vault, the Management Portal is designed to be multi-tenant. Unlike the Vault however, the user accounts on the Management Portal are not synced to or associated with the License Portal. User accounts on the Management Portal must be manually created and managed. Providing end-user access to the Management Portal for your customers is optional. From the users page you may optionally create customer login accounts that will allow a customer to use the remote access and reporting features of the Management Portal for their protected systems and managed devices. When configuring the Management Portal settings on a managed device, you will need the username and API key from the Users page of the Management Portal in order to establish the connection. The admin user has access to all managed systems connected to the portal. Customer user accounts have access only to managed and protected systems registered with the management portal using their customer user account. Settings All options on the settings page are covered under Section D: Settings within this guide. The Management Portal has only a subset of the available settings options present on an Appliance or Vault. Back to Table of Contents January 2017 Page 84 of 130

86 SECTION I: efolder Replibit Best Practices Hardware, Software and Other Requirements efolder Replibit recommends a minimum of 8GB of RAM and 4 CPU cores with support for Intel VT or AMD-V hardware virtualization. More RAM and CPU resources are recommended when protecting many systems, or if you plan to provide Virtualization as a recovery option. Typically, Appliances should be built using high-end Workstation or low-end Server equipment depending on the target environment. Vaults should be constructed on low- to mid-range server equipment for performance and reliability. Dedicated IPMI or other out-of-band management is recommended to ensure robust remote management options when maintaining your fleet of devices. Replibit is built on Ubuntu Linux, so consult the Ubuntu Linux hardware compatibility list (HCL) for supported hardware. External IP Addresses Each Vault and Management Portal instance running in your datacenter is an independent machine. Each of these devices will need their own dedicated Public IP address unless you are using a third-party VPN tunnel solution to route traffic from your customer Appliances. Creating Public DNS records for each device is optional but recommended. Firewall Ports LAN: Ports need to be open between the Protected System and the Appliance. WAN: Ports 443, and 9080 need to be open between the Appliance and the Vault. Ports 22, 443, and need to be open between all Appliances and Vaults and the Management Portal. o One port per managed device needs to be open above For example, if you have 50 Appliances and Vaults under management, you need to open ports Appliance and Vault Installation Requirements It is highly recommended that efolder Replibit be installed on Bare Metal. Virtual installations are not supported or recommended for production environments. To install Deploying Replibit as a Virtual Machine Advanced Topics efolder Replibit offers the flexibility to select your own hardware or purchase preconfigured BDR appliances. January 2017 Page 85 of 130

87 efolder Replibit BDR Appliances provide exceptional performance and reliability using all FastFlash SSD storage and our patented Durabit data integrity system. BDR Appliances ship with Replibit installed and pre-configured for your Customer location. It is recommended to use a single disk, or a hardware RAID-1 disk volume for the operating system. Protection of the operating system disk is not critical, as there is a recovery procedure to reload and restore all device settings from the storage pool. Unless you are using a SAN it is recommend to deploy 3 or more physical disks and use ZFS Software RAID when creating the Storage Pool. ZFS RAID is more robust than hardware RAID and Replibit has been optimized to provide disk failure and replacement of ZFS volumes. When using a SAN, you may opt to create a RAID-0 Storage Pool consisting of iscsi LUNs. (The disk redundancy will be provided by the SAN.) For optimal performance, create a RAID-1 storage pool using multiple 10Gbe network adapters to provide access to the iscsi disk volumes. Ideally, each iscsi volume should be provided by a separate SAN server. DHCP should be enabled on the network when installing Replibit to simplify the startup network configuration of the device for licensing and initial software upgrade. During configuration or after setup has completed, a permanent static IP address should be assigned to the device so that Agents have consistent access to the device. Best Practices for Agent Deployment on Windows Completely uninstall other backup software and Reboot if possible Some legacy backup software, such as Backup Exec or Acronis may not completely remove their proprietary VSS extensions when uninstalled from Add/Remove Programs. It is recommended to use their stand-alone uninstaller utility if available to ensure proper cleanup and removal of these agents. Search for Unknown Large File Creation Perform a search for files greater than 50MB created within the last 7 days. Verify that there are no ongoing large data dumps being performed on the server that can Some possible examples to avoid: SQL Database backups; Quickbooks company file backups; PST File exports or copies, Windows Server Backup images, etc. If large file creation is discovered, alleviate the issue by disabling the source of the file creation, or retarget the file storage to a separate disk volume and then disable that volume from backup by the efolder Replibit agent. Verify VSS Settings volume shadow copy size column and verify that it is NOT set to UNBOUNDED January 2017 Page 86 of 130

88 The recommended default storage size is 10% of total space If less than 15% of the disk volume is free, it is recommended to redirect shadowstorage to another volume with sufficient free space. To modify shadowstorage configuration, run the following command replace the source, destination and maxsize values as appropriate. Customers and Locations When deploying efolder Replibit to customers with multiple locations, create only one customer account within the License Portal and assign multiple locations to the account. Each customer location that has servers to be protected should have its own Appliance. efolder Replibit does not recommend performing backup operations of remote servers over Intranet or VPN connections with less than 1Gigabit of bandwidth available. Networks, Switching, and Routing Appliances should be connected to the same physical LAN and VLAN as the protected systems they are guarding. Avoid transporting data through firewalls or routers to alleviate network congestion and performance bottlenecks. Appliances and Protected Systems should be connected to 1Gigabit Ethernet switches or faster for best performance. Backup Time Window window by 15 minutes for every TB of disk size. (Total volume size, not space in use.) For example, a server with 2TB in total disk capacity should not be backed up any more frequently than every 30 minutes. Avoid Scheduled Defragmenting of Disks Performing Disk Defragment operations on systems protected by Image-based backup solutions can generate unnecessarily large incremental backups due to excessive block changes. It is not recommended to perform frequent, or regularly scheduled defragmentation operations on systems protected by Image-based backup solutions like Replibit Prior to installing the efolder Replibit Agent, it is recommended to perform a thorough disk defrag of both regular files and the Master File Table, if possible. This will help ensure that the initial base image for the protected system is in a healthy state. Microsoft Exchange and SQL Server VSS Agents The Exchange VSS agent is disabled by default on Windows Server 2003 SBS. Ensure that this service is set to Automatic startup and running in order to ensure consistent Exchange backups and log file cleanup. The Exchange VSS agent is set to Manual by default on Exchange 2008 and newer. Ensure that this service is set to Automatic startup and running in order to ensure consistent Exchange backups and log file cleanup. Verify that the Microsoft SQL VSS Writer service is set to Automatic and is running in order to ensure consistent backups of Microsoft SQL databases. January 2017 Page 87 of 130

89 OEM Installations Microsoft Windows systems distributed as OEM installations are not supported for virtualization. Many OEM distributions are deliberately crippled so that they will not run as a virtual machine. Virtualizing Microsoft OEM distributions is a violation of the Microsoft Licensing Terms and Conditions. efolder Replibit will not provide support for virtualizing OEM distributions of Microsoft operating systems. Recovery of Microsoft OEM distributions to new hardware is a violation of the Microsoft Licensing Terms and Conditions. OEM distributions may only legally be recovered onto the original hardware on which it shipped. efolder Replibit will not provide support for recovery of OEM distributions to replacement hardware. Security The efolder Replibit provisioning wizard forces a change of passwords during the initial configuration and setup. You should always use highly secure passwords when configuring a Replibit device. If your device was deployed prior to efolder Replibit version , or if you wish to manually change the passwords on the device, follow the steps below: Change Web Interface Password Log in to the Web Interface using any browser Select the Settings menu pane Select Change Password Enter current password and then enter the new password in each box, then click Apply. Change Shell User Password. Enter the new password for the efolder Replibit user. Enter the new password one more time. Change Shell Root User Password Contact efolder Replibit Support for assistance logging in as root. Note: efolder Support cannot give out the default root user password. Enter the new password for the Root user Note: Deploying devices with weak passwords is a serious security risk for both you and your customers. It is always best practice to deploy efolder Replibit Devices behind a hardware firewall. Back to Table of Contents January 2017 Page 88 of 130

90 SECTION J: File and Folder Recovery For simple recovery of a few files, it is fastest and easiest to use the Mount option for a selected recovery point from the protected system details page. After mounting the recovery point, browse the disk structure using the File Browser, locate the desired file(s) and download them. For larger requests, or if it is necessary to perform search operations to locate missing files, leverage iscsi to mount the recovery point on a workstation or server and perform standard Windows file search and copy operations to restore your missing data. Using iscsi to Recover Files Select the Snapshot you wish to recover data from on the protected system details page and click iscsi Start to export the data as a set of disks. From a Windows 7, Windows Server 2008, or newer system, open the iscsi Initiator Applet from Administrative Tools. If prompted to start the service, select Yes. In the Target field, enter the IP address of the Appliance or Vault, and click on Quick Connect. Available disks will be enumerated in the Discovered Targets window. Consult the iscsi menu pane of the Appliance or Vault to identify the IQN name of the disk volume you would like to search. In the Discovered Targets window, select the desired disk, and click Connect. Once the disk has been connected, open the Computer Management applet from Administrative Tools, expand Storage, and select Disk Management. January 2017 Page 89 of 130

91 Locate the newly attached system disk and verify that it is online. (If not, right-click the disk name and select Online.) Identify the drive letter that has been assigned to the disk volume(s). Using Windows Explorer or your preferred file management utility, search or browse for the files and folders you intended to recover, then copy and paste them back to the original server locations. Once recovery has been completed, you must cleanup and remove your disk connections. Close any Explorer windows open to the recovery disk volumes. From the Disk Management applet, right-click the disk name and select Offline. From the iscsi Initiator applet, select the connected disk(s) and click Disconnect. If you receive an error when disconnecting the volume within the iscsi Initiator applet, try again after stopping iscsi on the Appliance or Vault as described in the last step below. Also remove any entries from the Discovery and Favorites tabs. From the Appliance or Vault, click Stop iscsi from the iscsi menu pane or protected system details page. Back to Table of Contents January 2017 Page 90 of 130

92 SECTION K: Disaster Recovery Potentially, at any time you may be required to perform recovery for a protected system that has been damaged or corrupted beyond repair. Depending on whether the system is physical or virtual, there are a number of ways in which to perform the recovery process. Bare Metal Recovery Recovering a lost system directly onto bare metal used to be a painful and time consuming process. Because efolder Replibit captures a full system image during backup, the recovery of systems back onto Bare Metal has been greatly simplified. The Following instructions may be used to recover your protected system back onto either a bare metal server or virtual machine using the Replibit Recovery Toolkit. Presented here is a quick overview of the Bare Metal Restore process. For complete documentation of all features of the Recovery Toolkit, refer to the Replibit Recovery Toolkit Guide. Minimum System Requirements 1GB RAM 1Ghz CPU Bootable DVD or USB Support Recovering to Bare Metal Download the efolder Replibit Recovery ISO from Replibit Boot your destination system from the Recovery ISO. Locate the "Recovery Wizard" icon on the Desktop and Double-Click it January 2017 Page 91 of 130

93 This will launch the Replibit Recovery Wizard as shown here. In the IP Address field, enter the Vault, or Appliance IP address, or FQDN. In the Username field, enter the Username. (Admin on an Appliance, or the customer account on a Vault.) In the Password field, enter the Password. Click Next From the, Chose Protected System to restore drop-down box, select the protected system you would like to recover. Select Choose Snapshot to restore: o From a list of recent snapshots, or o From a specific date from which you wish to recover radio button. Click Next January 2017 Page 92 of 130

94 Select the recovery point date and time that you would like to use for recovery of the protected system. If an Encryption Passphrase was configured when the Agent was installed on this Protected System, the Encryption Password box will be present. Enter the Encryption password here. Click Next The Recovery Wizard will now initialize iscsi services, export the selected recovery point on the Appliance or Vault, and attach the disk volumes. The progress window should show Finished when successful. ` Click Next January 2017 Page 93 of 130

95 Select the drive volume(s) you wish to recover by checking the selection box For each volume being recovered, choose a disk to restore it to by selecting from the dropdown list Click Next The recovery data copy process will begin at this point. Monitor the overall job progress from the Recovery Wizard status window. Detailed job information is presented in the main window. Job status and estimated time remaining are shown at the bottom. Once the recovery process is complete, click Finish. Reboot the system now, or continue on to perform Dissimilar Hardware Driver Injection to install drivers if you are restoring to different hardware. January 2017 Page 94 of 130

96 Dissimilar Hardware Driver Injection If recovering to a Bare Metal system, it is likely that the new hardware is substantially different from the original machine and the recovered system will need to have drivers installed for the new devices. Perform the following steps to inject drivers into the offline system prior to booting it for the first time. Mount the volume containing the C: drive of the protected system using Disk Manager. From the Recovery Tools menu, launch the Driver Injector. If you have not mounted a disk volume that contains a valid Windows installation folder, you will receive a warning that the Driver Injector could not locate the offline Windows January 2017 Page 95 of 130

97 From the dropdown menu, select the Offline Windows Operating System, then click browse and select the location containing the Windows drivers you would like to install. To use the basic set of Windows drivers that has been included on the Recovery ISO, select the /root/windows- Drivers folder. You may leave all other settings at their default values. Click Next to continue. Wait for the Driver Injector to read through the provided driver files, and make matches against the hardware installed within the running system. Click Next to continue. January 2017 Page 96 of 130

98 Verify that the driver matches have been located for all critical hardware, such as storage controllers. To manually add specific drivers into the offline Windows installation, regardless of whether or not the hardware is physically present on the running system, click on Add Drivers From the Add Drivers dialog box, click Add and browse to the.inf driver file you would like to add. Repeat as necessary to add additional drivers. Note: No validation is performed on the drivers being selected. Please ensure that you are selecting a valid Windows driver file for the correct operating system and architecture! When finished adding drivers, click on Close. Click Next to continue. January 2017 Page 97 of 130

99 The previously discovered and (optionally) manually selected drivers will now be installed. Click Finish once the installation process has completed. January 2017 Page 98 of 130

100 Fixing Windows Boot Issues after performing a Bare Metal Recovery In the event that your recovered system does not boot (or a Blue-Screen error message appears on startup), it may be necessary to recreate the Windows boot records on the hard drive. To do this: Boot the system from a Windows operating system disc. Click Next on the language selection page, and then choose the Repair option. Select Troubleshoot, and then select Command Prompt. From the command shell use DOS commands to switch between disks to identify which drives are present and to locate the recovery partition if it exists. This will likely be on C:. The recovery partition will likely appear to be empty, but will have a hidden folder named BOOT. Change directory into /BOOT to verify that it exists. Within BOOT, rename the existing BCD file. For example: move BCD BCD.old Run the following commands to replace the boot records o bootrec /fixmbr (Only for systems using legacy MBR BIOS, not UEFI systems) January 2017 Page 99 of 130

101 o o bootrec /fixboot bootrec /RebuildBcd Select Yes when prompted for Windows instances to install. Reboot and verify that the system boots normally. VMware Recovery You may elect to perform a Bare Metal Recovery as discussed above when rescuing protected systems back into a VMware environment. In addition, the following options are also available: VMware NFS Recovery In a VMware environment, it is possible to utilize the NFS Export feature on an Appliance or Vault as a temporary data-store. This will simplify, and expedite recovery of protected systems when the underlying storage of the host server has been compromised, however, the physical host is still in operation. In order for this method to be employed, verify that there is sufficient free space remaining on the Appliance or Vault to hold the entire provisioned disk size for all protected systems you intend to recover. If insufficient disk space remains, refer to the VMware iscsi Recovery section below. To begin recovery of the affected protected systems: From the Web Interface, navigate to the Protected System details page. Select the recovery point for the protected system that you want to restore. Click Export. Select VMDK as the format, and start the Export process. Monitor the progress of the operation from the Conversion tab on the Jobs menu pane. Note: For better performance, it is recommended not to select Export to USB. From the Web Interface, navigate to the NFS Exports menu pane and select Enable NFS Exports. On a Vault, you will have to be logged in using a customer account in order to see this option. If not already present, click Add Allowed IP, and add the IP address of the VMware host server. In multi-server VMware environments, add all host addresses in your cluster to the allowed IP list if you desire to enable vmotion operations between hosts. From the VMware Client connect to each host and add the efolder Replibit device as an NFS storage location. Select Configuration, and then choose Storage. January 2017 Page 100 of 130

102 Click Add Storage, choose Network File System, and then click Next. For Server, enter the IP address of the efolder Replibit device. For Folder enter /export/admin for an Appliance or /export/<username> for a Vault, where <UserName> is the customer name the protected systems you are trying to restore belongs to. Do NOT select Mount NFS Read- Next, then Finished. If successful, the new Datastore should appear in the list of storage locations. Once the Export jobs have finished for each protected system that you intend to recover, create a new guest server within the VMware Client. Choose the efolder Replibit data store as the server location, and configure the desired system resources and settings. When selecting disk drives, (s) in the efolder Replibit datastore. If necessary, edit the final guest server configuration, and add any additional disks to the system. Power on the guest server and complete any required configuration changes to the running system to return it to service. The recovered system may be run from efolder Replibit storage while waiting for repair or replacement of the failed host system storage array. Once the host storage has been repaired you can simply move the virtual disk and vmware guest files back onto the ESX host server. VMware iscsi Recovery If disk space on the device is constrained, iscsi export can be used to expose the protected system disks to VMware. This has the advantage of being faster, as we do not have to wait for the Export conversion process, but iscsi is also more fragile. Exported iscsi target identifiers are not persistent through a reboot of the efolder Replibit device. The disks will have to be rediscovered and guest servers will have to be reconfigured if the efolder Replibit device is rebooted. Ensure you have selected Live mode when starting iscsi or data loss will occur if the Replibit device is rebooted. Data changes applied to the iscsi disks is persistent and will not be lost when running iscsi in Live mode, but the VMware configuration will have to be edited, as the iscsi disk identification will change. It is recommended to use iscsi Export with caution, and at present NFS Export is to be preferred. VMware will only allow storing the virtual disk pointer files for Raw Disk Mapping (RDM) disks on native VMFS storage, so the host must have at least one small native VMFS datastore to allow creation of virtual machines using this method. If the primary storage pool on the ESX host has been lost you may install a temporary IDE/SATA disk in the system with which to create a temporary native VMFS storage pool. This disk does not have to be very large, at it will only be used to hold the virtual machine definitions. January 2017 Page 101 of 130

103 Configure each VMware host to allow iscsi discovery from the efolder Replibit server. From Configuration select Storage Adapters. If not already present, add the Software iscsi Adapter to the host. For ESX 5.1 and newer, configure iscsi network communications as follows: From Networking select a virtual switch whose physical network adapters are connected to the same physical network as the efolder Replibit device. (Typically this is vswitch0). If there is not one already present, select properties and add a new VMKernel Adapter to the switch. Give it an available IP address in the same subnet as the efolder Replibit device. (If the efolder Replibit Appliance has multiple network adapters, you may use any configured subnet to isolate traffic onto separate controllers.) o In complex networks, assign the VMKernel adapter to the correct VLAN. If more than one physical network adapter is associated with this vswitch, edit the properties of the VMKernel adapter. o On the Nic Teaming page move all but one network adapter to Unused, so that there is only a single network card active. From the Storage Adapters configuration page, edit the Software iscsi adapter. Add the new VMkernel adapter on the Networking page. Add the IP address of the Appliance or Vault to the Dynamic Discovery tab, and save settings. For the protected system you wish to recover, choose a recovery point, and click Start iscsi to export the disks. From the VMware Client, select Storage Adapters from the Configuration page. Select the Software iscsi adapter and click Rescan All from the top right of the page. Once complete the newly exported iscsi disks should appear in the lower storage management window. It is recommended to iscsi export one system at a time and then change the default LUN names to a friendly name to simplify identification later. For example, change the random IQN names to <Server>_<Drive>. Within the VMware client, create a new Guest server stored on a native VMFS datastore. When selecting disks, choose and select the discovered iscsi disks exported from the efolder Replibit device. The disk objects must be stored on a VMFS datastore. Boot the new Guest server on the VMware host and complete any reconfiguration necessary to return the system to service. VMware: Relocating from iscsi or NFS Back to Local Storage Once the host server storage has been repaired, perform the following steps to migrate the recovered systems from iscsi or NFS back onto local storage. If you own VMware licensing and have a vcenter server, you may use Storage Migration from the VMware Client to easily relocate the guest system and storage back to the host. Enterprise January 2017 Page 102 of 130

104 license owners can perform this operation while the guest is up and running, others will be required to power off the protected system first. From the VMware Client, attach to vcenter and select the desired guest. Right-click and select new host and storage location for the system. If recovering using iscsi, in order to force the conversion of the Raw Disk (RDM) volumes into a VMDK, when choosing the storage location The target datastore must be different than the current location of the virtual machine definition. Those without vcenter licensing will have to perform a migration from the ESXi host shell. If you have not already done so, enable and start the ESXi Shell and optionally the SSH server on the host. From Security Profile in host Configuration, select Properties from the Services section. Start ESXi Shell, and optionally SSH to enable access to the server command line interface. Note: It is recommended to perform the following steps from the actual console of the ESXi host rather than via a remote SSH shell, in order to prevent the commands from failing if the remote connection is lost. Shut down the protected system and log in to the ESXi shell as root. Copy the Guest virtual machine definition onto local storage as follows: cp -R <src> <dst> (i.e. cp -R /vmfs/volumes/replibit/server01 /vmfs/volumes/datastore1) Convert the existing disk file while relocating it to native storage as follows: vmkfstools -I <src path> <dst path> -d <thick thin> (i.e. vmkfstools /vmfs/volumes/replibit/server01_2016_02_01_11_00_00_pm_vmdk/ _e06c_4d4a_91e6_7ef6b7b689fe_C.vmdk /vmfs/volumes/datastore1/server01/c.vmdk - d thin) The above command will work for both NFS Exported VMDK files and iscsi exported Raw Disks as discussed in the topics above. Note that when typing names in the shell you may utilize tab completion to make entering long file paths easier. Type the first few letters and press <Tab> to complete the name. If the name is not unique, press <Tab> twice to list all matching possibilities. Type a few more letters and press <Tab> again. There is no progress displayed during the conversion. Wait for the shell to return to a new line with a cursor prompt. You can monitor activity from the Performance tab within the VMware Client by observing disk read/write statistics. Once the conversion is complete, perform the following: From the VMware Client, select the protected system and remove it. (Do not select Delete from Disk!) From Configuration select January 2017 Page 103 of 130

105 Storage and browse the Datastore location that you copied the machine definition files. Open the folder containing the recovered server, right-click the.vmx file and import the Guest. Edit the Guest configuration and remove all hard disks. (Do not delete from disk!) Save the virtual machine and then edit the Guest again. Select Add Disk. Browse to the converted VMDK file within the local Datastore and select it. Repeat to add any additional disks. Save and boot the Guest. Hyper-V Recovery You may elect to perform a Bare Metal Recovery as previously discussed when rescuing protected systems back into a Hyper-V environment. In addition, the following options are also available. Hyper-V NFS Recovery In a Hyper-V environment, it is NOT possible to utilize the NFS Export feature of the efolder Replibit Appliance or Vault as a temporary data-store when the underlying storage of the host server has been compromised, but the physical host is still in operation, as Hyper-V cannot store virtual machine disk files on an NFS storage location. In order for this method to be employed, there must be sufficient local free space remaining on the Appliance or Vault to hold at least the Thin-provisioned disk size for all protected systems you intend to recover. In addition, to complete the Export process there must be enough free space remaining on the Appliance or Vault to hold the fully Thick provisioned disk size of the largest machine being recovered. If insufficient disk space remains, refer to Hyper-V iscsi Recovery below. To begin recovery of the affected protected systems, from the Web Interface navigate to the Protected System details page, select a recovery point for the protected system that you wish to restore and choose Export. Select VHD as the format for Generation 1 Hyper-V guests, or VHDX for Generation 2 Hyper-V guests (Server 2012 or later configured for UEFI boot only). Click Start to begin the Export process. Monitor the progress of the operation from the Conversion tab on the Jobs menu pane. For better performance, it is recommended not to select Export to USB. If you require additional space to perform the export, it is recommended to use the Hyper-V iscsi Recovery method instead. From the Web Interface navigate to the NFS Exports menu and select Enable NFS Exports. On a Vault, you will have to be logged in as a customer user account in order to see this option. If not already present, click Add Allowed IP and add the IP address of the Hyper-V host server. In multiserver environments, add all hosts addresses if desired. Install and configure NFS Client services on the Windows Hyper-V hosts if it is not already present. To install, run Server Manager and select Roles and Features. On Windows Server 2008/R2 select Features, expand File Server Tools and select Services for Network File Systems Tools. January 2017 Page 104 of 130

106 On Server 2012/R2 after choosing Add Roles and Features, select Role Based or Feature Based installation and then select the local server. Enable Client for NFS under the Features selections. For all version of Windows, mount the remote NFS share from a command prompt. Run the following for an Appliance: Mount o fileaccess=777 \\<Appliance IP>\export\admin <Drive:> (i.e. mount \\ \export\admin Z:) Run the following for a Vault: Mount o fileaccess=777 \\<Appliance IP>\export\<Customer> <Drive:> (i.e. mount o fileaccess=777 \\ \export\customer1 Z:) Copy the exported disk volumes onto a local storage location on the Hyper-V server using Windows Explorer or your favorite file manager utility. Create a new Hyper-V Guest as per normal. When selecting hard disks, browse to the location that you copied the disk volume images to and selected the exported VHD/VHDX file(s). Power on the guest server and complete any required configuration changes to the running system to return it to service. Hyper-V iscsi Recovery If disk space on the Replibit device is constrained, iscsi export can be used to expose the protected system disks to Hyper-V. This has the advantage of being faster, as we do not have to wait for the Export conversion process, but iscsi is also more fragile. Exported iscsi target identifiers are not persistent through a reboot of the efolder Replibit device. The disks will have to be rediscovered and guest servers will have to be reconfigured if the efolder Replibit device is rebooted. Ensure you have selected Live mode when starting iscsi or data loss will occur if the Replibit device is rebooted. Data changes applied to the iscsi disks is persistent and will not be lost when running iscsi in Live mode, but the Hyper-V virtual machine configuration will have to be edited, as the iscsi disk identification will change. It is recommended to use iscsi Export with caution, and at present NFS Export is to be preferred. For the protected system you wish to recover, select a recovery point and click Start iscsi to expose the disks to Hyper-V. From Administrative Tools on the Hyper-V host run iscsi Initiator. Enter the IP address of the Appliance or Vault in the Target field and click Quick Connect. Select each discovered disk and click Connect to attach it. Click Done when finished. Note: When adding additional servers, you can click refresh to discover the new disk LUNs. January 2017 Page 105 of 130

107 In order to enable a disk to be eligible for use as a pass-thru disk to a Guest system, the disk must be offline. Open Computer Manager, expand Storage, then select Disk Management. Identify the new system disks and set them offline if they are not already by right-clicking the disk name and selecting Offline. Open Hyper-V Manager and create a new Virtual Machine. If your primary storage array has been lost you may select, a mapped network share provided by provided by another server. Make a new folder for Virtual Machine definitions. Complete the creation of the Guest and assign resources as desired. When choosing hard disk options, select Once complete, edit the settings of the new Virtual Machine. Select the IDE (Gen 1) or SCSI (Gen 2) controller and add a hard disk. Select Physical Disk and choose the desired disk to assign from the dropdown containing all available local system disks. Relocating from iscsi or NFS Export Back to Local Storage Once the host server storage has been repaired, perform the following steps to migrate the recovered systems from raw iscsi disks back onto local storage. Shut down the Guest Virtual Machine, as this process cannot be completed while the machine is running. To enable migration of iscsi disks, you must first assign control of the disks back to the Hyper-V host. Open Computer Manager, expand Storage and select Disk Management. Right-click the disk label and select Online to enable access to the host server. Open Hyper-V Manager. Right-Click Hyper-V from the left toolbar and select New Disk. Select disk format (VHD or VHDX) and type (Fixed or Dynamic, do not choose Differencing) and specify a ropriate source physical disk. Click Finish and wait for the conversion process to complete. When completed, edit the virtual machine and replace the existing physical disks with the newly created virtual disk files. To relocate virtual disk files exported from Replibit and stored on temporary shared storage, copy them to the proper location on Local Storage using Windows Explorer or your favority file manager utility. If the Virtual Machine definition was created on a temporary network share, delete the virtual machine and recreate it on Local Storage. Attach the virtual disks created or migrated in the above steps and then reboot the guest server. January 2017 Page 106 of 130

108 After Performing ANY Recovery IMPORTANT!! After performing a full system recovery, regardless of the method used, it is imperative that a new Full Backup be run from the Appliance to synchronize the recovered system with the backup image. Failing to perform a full backup may result in mismatched or missing data in the recovery image and can lead to corrupted backups and total loss of protection. Back to Table of Contents January 2017 Page 107 of 130

109 SECTION L: Advanced Topics Deploying efolder Replibit as a Virtual Machine VMware is the only supported platform for deploying efolder Replibit devices in a virtual environment. efolder Replibit leverages a Type-1 hypervisor engine to enable protected system virtualization for boot testing and instant recovery. In order to operate as a virtual machine, efolder Replibit requires support for Nested Virtualization. VMware ESXi 5.1 supports nested virtualization using both AMD and Intel processors, but ESX 5.5 and newer has support only for Intel processors. It is recommended to use Intel processors when setting up virtual instances of efolder Replibit. Prior to deploying efolder Replibit as a virtual machine it is recommended that you schedule a call with an efolder Replibit support engineer to assist with the deployment. Note: It is possible to enable Nested Virtualization in KVM based Hypervisor solutions like Redhat Enterprise Virtualization in order to run Replibit as a virtual machine. Setup and configuration for these platforms is not supported by efolder Replibit. efolder Replibit does not recommend or support the deployment of Appliances or Vaults as virtual devices in a production environment. USE AT YOUR OWN RISK. It is supported to deploy a Management Portal as a virtual device provided sufficient resources are allocated to the device. A Management Portal should have at least 4GB of RAM, and a 100GB operating system disk. Disks may be thin provisioned. To deploy efolder Replibit on VMware, use the VMware client to create a new virtual machine with sufficient resources for the device being provisioned. Once the virtual machine has been created, perform the following steps to customize the virtual machine definition file for use as an efolder Replibit device. Gracefully shut down the efolder Replibit guest With the VM off, download the.vmx file and open it in WordPad Copy and paste the 4 entries below into the.vmx file and save it vcpu.hotadd = "FALSE" featmask.vm.hv.capable = "Min:1" vhv.enable = "TRUE" disk.enableuuid = "true" Upload the modified.vmx file back to its original location on the ESX host Remove the Virtual Machine from inventory (Without Deleting it!) Browse to the.vmx file from Storage and Open it to add the machine back to inventory Start the Virtual Machine January 2017 Page 108 of 130

110 Using the Linux Shell efolder Replibit is deployed as a hardened Linux distribution. As such there is no graphical user interface display on the physical console, only a text mode Linux shell. To simplify management of the device for users unfamiliar with using Linux shell commands, we have implemented a user account with limited access to a set of user friendly command-line tools. account that you specified during the initial provisioning of the device. and press <Enter> for a list of the available commands. All shell commands are case sensitive and should be entered in lower case. Note: Users familiar with the Linux command-line environment may wish to log the root password you specified during the initial provisioning of the device. se aristosnet: This utility is used to configure the network settings of the device Usage: aristosnet help aristosnet fixip aristosnet show all aristosnet show <interface> aristosnet enable <interface> aristosnet disable <interface> aristosnet dhcp <interface> aristosnet static <interface> <ip> <netmask> <gateway> <dnsserver> aristosnet changeclusterinterface <newinterface> January 2017 Page 109 of 130

111 changepassword: This will change a shell user account password Usage: changepassword [LOGIN] If [LOGIN] is not specified, default to currently logged in user account changewebpassword: Change the password of a Web Interface user account Usage: changewebpassword <UserName> exit: Exit and log out from the shell session Usage: exit help: List the commands available to the user Usage: help ping: Send a stream of network packets to a destination a display results. Useful for testing network connectivity or DNS name resolution. Usage: ping <IP address or FQDN> reboot: Perform a Reboot of the device Usage: reboot [OPTION] Options: -n, --no-sync -f, --force -p, --poweroff -w, --wtmp-only -q, --quiet -v, --verbose --help --version don't sync before reboot or halt force reboot or halt, don't call shutdown(8) switch off the power when called as halt don't actually reboot or halt, just write wtmp record reduce output to errors only increase output to include informational messages display this help and exit output version information and exit shutdown: Perform a Shutdown of the system and power it off January 2017 Page 110 of 130

112 Usage: shutdown [OPTION]... TIME [MESSAGE] Bring the system down. Options: -r reboot after shutdown -h halt or power off after shutdown -H halt after shutdown (implies -h) -P power off after shutdown (implies -h) -c cancel a running shutdown -k only send warnings, don't shutdown -q, --quiet -v, --verbose --help --version reduce output to errors only increase output to include informational messages display this help and exit output version information and exit TIME may have different formats, the most common is simply the word 'now' which will bring the system down immediately. Other valid formats are +m, where m is the number of minutes to wait until shutting down and hh:mm which specifies the time on the 24hr clock. Logged in users are warned by a message sent to their terminal, you may include an optional MESSAGE included with this. Messages can be sent without actually bringing the system down by using the -k option. If TIME is given, the command will remain in the foreground until the shutdown occurs. It can be cancelled by Control-C, or by another user using the -c option. The system is brought down into maintenance (single-user) mode by default, you can change this with either the -r or -h option which specify a reboot or system halt respectively. The -h option can be further modified with -H or -P to specify whether to halt the system, or to power it off afterwards. The default is left up to the shutdown scripts. Display Mounted USB Drives from the Shell To see a list of mounted USB disks, or to verify that a USB disk has been detected and mounted by the system, log in to the shell using the root user account. January 2017 Page 111 of 130

113 Setting the IP Address from the Shell Do not use ifconfig. To manually configure a static IP address on a device from the system console, log in to the shell using either Using the Linux Shell Run the following command to list the current network configuration Run the following command to set a static IP address on an Interface Run the following command to change to a DHCP provided IP address on an interface If changing from Static to DHCP mode, a reboot of the device may be necessary for the change to take effect. Clustering efolder Replibit has the ability to combine multiple Appliances or Vaults at a location into a cluster for management purposes. What this means is that the management database on the devices is merged and shared, and the Web Interface presents a consolidated view of all Protected Systems residing on any device within the cluster. This does NOT perform any data storage consolidation or filesystem clustering services, it is strictly a merging of the database information. To set up a cluster, first deploy a node in stand-alone mode as usual. Once you have deployed and configured the first node, you must enable it for clustering. Log in to the Web Interface and select the Cluster Management menu pane. Select to check the Enable Clustering option. January 2017 Page 112 of 130

114 Once enabled the cluster will consist of this single device as the Primary node with no Arbiter Node. A Cluster must consist of an Odd number of Nodes. In order to facilitate this, Replibit provides for a virtual node called the Arbiter. If you intend to deploy an Even number of actual Appliance or Vault devices, you will also need to deploy the Arbiter in order to make the total Node count Odd. If necessary, you may download the Arbiter software onto a Windows machine from the Downloads menu of any Appliance. The Arbiter should be installed on a Windows system located on the same LAN as the other members of the Cluster. Once the Arbiter has been installed, navigate to the Cluster Management menu on the Replibit device, enter the IP address of the Windows Server in the Arbiter Node field and click Save. Now you may deploy a second clustered device at the same location. When performing the initial configuration of the device from the Add machine to existing Cluster First machine in Cluster You will be prompted for the IP address of an existing member of the cluster. Enter the IP address of an already configured Replibit device, not the arbiter node. Complete the setup of the device, and configure the Storage Pool as normal. Storage Pool you will be able to access the Settings menu pane. You will notice that most of the available options and settings are globally shared with all members of the cluster. Only machine specific settings, like Machine Name and Network Settings are independently configurable. Changing any of the shared settings parameters (like Password for example) affects all members of the cluster. The Protected Systems page will list all protected systems residing in the cluster on any Node. Notes on Clustering The database engine on all devices in a Cluster is reconfigured as a true network clustered service once any additional Nodes are added to a stand-alone deployment. Changes are replicated synchronously to all members, and a quorum must be established to identify the primary node before any write operations are allowed in the database. To form a quorum, a majority of member Nodes, counting the Arbiter, must be online and in communication with one another. If no majority exists, no Node will be promoted to Primary and the database will remain read-only. January 2017 Page 113 of 130

115 In order for a quorum to exist, there MUST be an Odd number of Nodes in the Cluster. It is impossible to establish a majority with an Even number of Nodes. In order to facilitate maintaining an Odd number of Nodes, efolder Replibit utilizes the Arbiter service that may be deployed onto a Windows system when there are an Even number of Replibit devices in the Cluster. The Arbiter Node installer may be downloaded from the Downloads page on any device. Install the Arbiter on any Windows system to deploy a passive database replica to facilitate maintaining the quorum. The Arbiter is VERY low resource intensive, and should be deployed in the same site and subnet as the efolder Replibit devices in the cluster. Once an Arbiter node has been installed, join it to the cluster. From any device in the Cluster, navigate to the Cluster Management menu pane. Enter the IP address of the Arbiter Node and click Save. A popup should display success or failure when joining the Arbiter Node to the Cluster. Due to the extra complexity induced by the necessity of maintaining a quorum of active nodes, and possible user confusion over which device a particular protected system resides on, efolder Replibit does not recommend enabling Clustering unless there is a compelling need to do so. Note: Please perform at your own risk. Migrating Protected Systems Occasionally, it is desirable to relocate a protected system from one device to another, be it for migration to a new Appliance, balancing out storage consumption between Vaults, etc. In order to facilitate this, efolder Replibit has the ability to perform a migration of protected systems, include all recovery points, job history, and metadata, from one device to another. To perform a migration, please carefully follow the steps listed below: Migrating to a new Appliance Migrate only ONE system at a time Verify that no Backup or Replication Jobs are active for the Protected System Stop and Disable the efolder Replibit agent service on the Protected System From the Protected System Details page, select Migrate and choose a migration method Within Cluster Over Network Select another Node in this cluster from a list of Nodes Outside Cluster Over Network Manually Enter IP address of another Appliance Within Cluster Over USB Select connected USB storage device January 2017 Page 114 of 130

116 Outside Cluster Over USB Select connected USB storage device If migrating via USB, enter an Optional encryption password if desired. Note: if you do not enter a password, the data will be written to the USB drive unencrypted. Click Migrate to begin the migration You may observe the migration progress from the System tab on the Jobs menu pane. Verify that Migration completed successfully on the Source Appliance. If migrating via USB, once the export process completes on the source Appliance, connect the USB drive to the Destination Appliance. From the Protected Systems page click Import and select the protected system being migrated. VERIFY that Migration completed successfully on the DESTINATION Appliance. This is VERY Important! If the Migration fails on the Destination Appliance, you must retry the Migration until it is successful. If the Migration fails three times, contact efolder Replibit Support for assistance. Once the migration has completed successfully, reconfigure the Agent for the new Appliance and re-enable backups: Edit Aristos.cfg on the protected system and change the IP address to that of the new Appliance being migrated to. Enable and start the efolder Replibit service on the protected system. Perform a test Backup now from the new Appliance and verify that it completes successfully. If migrating within a cluster, once the job is successfully received on the destination Appliance and you reconfigure the Agent, the migration process is finished. If migrating outside the current cluster, once the import job on the destination Appliance completes successfully, you should delete the protected system from the source Appliance. Migrating to a new Vault Migrate only ONE system at a time. Verify that no Replication Jobs are active for the Protected System. Disable Replication on the Appliance for the Protected System that is being migrated from the Protected System Details page On the Vault, from the Protected Systems Details page of the system you are migrating, select Migrate and choose a migration method Within Cluster Over Network. Select another Node in this cluster Outside Cluster Over Network Enter IP address of another Vault Within Cluster Over USB January 2017 Page 115 of 130

117 Select connected USB storage device Outside Cluster Over USB Select connected USB storage device Click Migrate to begin the migration You may observe the migration progress from the System tab on the Jobs menu pane Verify that Migration completed successfully on the Source Vault If migrating via USB, once the export process completes on the source Vault, connect the USB drive to the Destination Vault. From the Protected Systems page click Import and select the protected system being migrated. VERIFY that Migration completed successfully on the DESTINATION Vault. VERY Important! If the Migration fails on the Destination Vault, you must retry the Migration until it is successful. If Migration fails 3 times, contact efolder Replibit Support for assistance. Once the migration has completed successfully, reconfigure the Appliance to replicate with the new Vault and enable Replication: Navigate to Vault Settings on the Appliance and create a Vault Schedule for the new Vault if it does not yet exist. Configure the schedule settings as desired. Add a new Vault Replication target for the Protected System on the Appliance and select the new Vault schedule. Do not configure any seeding options when enabling replication. Leave the original Vault Replication target disabled. Verify replication to the new Vault is completing successfully Delete the Vault Replication target for the Protected System from the Protected System Details page. Note: This will delete the Protected System from the original Vault! January 2017 Page 116 of 130

118 Using VirtIO in a VM Enabling VirtIO for a running virtual machine replaces the emulated IDE mode disk storage system with a paravirtual SCSI mode storage controller. Using paravirtual storage drivers improves disk I/O considerably for the guest Operating System and also allows for more than four disk storage devices. When enabling VirtIO in Test Mode, the changes will remain persistent for only ONE boot cycle of the selected recovery point. Once the VM is shut down and powered off, all changes will be lost and the recovery point will revert back to traditional IDE storage controller mode. Enabling VirtIO in Test Mode is available strictly purposes of testing the installation procedures and performance for a given Protected System. When enabling VirtIO in Live Mode, a permanent, persistent snapshot of the selected recovery point will be created. VirtIO changes to the configuration will remain enabled permanently for the selected recovery point. The selected recovery point will be locked and remain on the device until manually deleted from the storage pool by efolder Replibit Support. VirtIO will be enabled ONLY FOR THIS RECOVERY POINT. All other recovery points will remain configured for traditional IDE storage controller mode. Ensure that your popup blocker is disabled before starting setup for VirtIO. Installing VirtIO Drivers Login the efolder Replibit Appliance or Vault and open the protected system details page of the system you wish to virtualize. ctions menu for the recovery point you wish to virtualize. Be sure to make a note of the snapshot date and time for future reference. Choose the RAM, CPU, and Mode you wish to virtualize in. At the bottom of the popvirti Enter the Encryption Passphrase if prompted Press Start to launch the VM. January 2017 Page 117 of 130

119 When prompted for the Virtio Setup Confirmation, select Yes. The Virtio setup process window will appear. DO NOT DO ANYTHING HERE YET. CONTINUE WITH THE BELOW INSTRUCTIONS. WAIT FOR THE VM TO BOOT AND GO TO THE CONSOLE OF THE VIRTUALIZED PROTECTED SYSTEM. COMPLETE THE INSTALLATION OF VIRTIO DRIVERS WITHIN WINDOWS. If this is a UEFI system, you will be presented with the UEFI BIOS screen. Select Continue from the BIOS menu and press <Enter> The protected system will boot to the Windows startup menu. Select Safe Mode to load windows faster without unnecessary components at this stage. Log into the Windows protected system with a user account that has local admin rights. If this is a Domain Controller you will need the Active Directory Restore user and password. If the system displays a request to Reboot, Select Restart Later. From Control Panel open Device Manager. Expand Other Devices and select SCSI Controller. Right-click and select Update Driver Software. January 2017 Page 118 of 130

120 Select Browse My Computer for Driver Software. Click the Browse button and navigate to the attached CD Drive image. drivers and navigate downward to the correct operating system and architecture for the Protected System. Select the appropriate folder containing the correct drivers and click OK. Click Next to begin the driver installation process. January 2017 Page 119 of 130

121 Windows will present you with a security warning to verify driver software installation. Select Install to proceed. You should receive a successful install prompt when the driver installation has completed. Click Close. At this point, the protected system needs to be rebooted or shut down to complete the installation of the new drivers and commit registry changes to disk. From within the virtual environment, perform a reboot or shutdown of the protected system. If rebooting, wait for the system to reach the BIOS POST screen before proceeding. Once the system has started a new boot cycle or completed its shutdown you may continue. The Virtio drivers are now installed. Go back to the efolder Replibit Appliance/Vault Web Interface and select Finish at the Virtio setup process window. This will shut down the VM and switch the disks to the Virtio SCSI Controller. Be patient while the VM powers off. Once the system is powered off, you may power on the VM normally and it will be using the Virtio drivers. If you performed the setup in Test Mode, the VirtIO drivers and configuration will be present for ONE boot cycle and then revert back to the standard IDE driver configuration. If you performed the setup in Live Mode, the VirtIO drivers and configuration will remain persistent for THIS recovery point unless they are manually cleared from the device on the backend by efolder Replibit Support. Once the Protected System has booted into Windows, open Computer Management from Control Panel, expand Storage and select Disk Management. If any disks are listed as Offline, right-click the disk name and select Online. (Windows attaches newly discovered SCSI disks Offline by default). January 2017 Page 120 of 130

This option lets you reset the password that you use to log in if you do not remember it. To change the password,

This option lets you reset the password that you use to log in if you do not remember it. To change the password, User s Guide Overview IDrive offers the most cost-effective BMR functionality with onsite disk image backup for SMBs. You can store entire data of hard disks including the operating system (OS) and application

More information

Archiware Pure User Manual

Archiware Pure User Manual Archiware Pure User Manual Content 1 Preface... 3 1.1 About This Manual... 3 1.2 Who Should Read This Document?...3 1.3 Software Description... 3 1.4 Software Licensing... 3 1.5 Registration... 3 1.6 Technical

More information

KACE Systems Deployment Appliance 5.0. Administrator Guide

KACE Systems Deployment Appliance 5.0. Administrator Guide KACE Systems Deployment Appliance 5.0 Administrator Guide Table of Contents About the KACE Systems Deployment Appliance...10 Getting started... 11 Tasks for getting started using the KACE SDA... 11 About

More information

Virtual Appliance User s Guide

Virtual Appliance User s Guide Cast Iron Integration Appliance Virtual Appliance User s Guide Version 4.5 July 2009 Cast Iron Virtual Appliance User s Guide Version 4.5 July 2009 Copyright 2009 Cast Iron Systems. All rights reserved.

More information

Install ISE on a VMware Virtual Machine

Install ISE on a VMware Virtual Machine Supported VMware Versions, page 1 Support for VMware vmotion, page 1 Support for Open Virtualization Format, page 2 Virtual Machine Requirements, page 3 Virtual Machine Resource and Performance Checks,

More information

Configuration Note. AudioCodes One Voice for Microsoft Skype for Business. CloudBond 365. Backup and Restore Functionality. Version 9.

Configuration Note. AudioCodes One Voice for Microsoft Skype for Business. CloudBond 365. Backup and Restore Functionality. Version 9. 7 Configuration Note AudioCodes One Voice for Microsoft Skype for Business CloudBond 365 Backup and Restore Functionality Version 9.5 Update 4 Configuration Note Contents Table of Contents 1 Introduction...

More information

Archiware Pure Quick Start Guide

Archiware Pure Quick Start Guide Archiware Pure Quick Start Guide Content 1 System Requirements... 3 1.1 Hardware Requirements... 3 1.2 Supported Hypervisors... 3 1.3 Deployment Requirements... 3 2 Deploying the Virtual Appliance... 4

More information

DSI Optimized Backup & Deduplication for VTL Installation & User Guide

DSI Optimized Backup & Deduplication for VTL Installation & User Guide DSI Optimized Backup & Deduplication for VTL Installation & User Guide Restore Virtualized Appliance Version 4 Dynamic Solutions International, LLC 373 Inverness Parkway Suite 110 Englewood, CO 80112 Phone:

More information

Install ISE on a VMware Virtual Machine

Install ISE on a VMware Virtual Machine Supported VMware Versions, page 1 Support for VMware vmotion, page 1 Support for Open Virtualization Format, page 2 Virtual Machine Requirements, page 3 Virtual Machine Resource and Performance Checks,

More information

User Guide. Version R94. English

User Guide. Version R94. English Cloud Backup User Guide Version R94 English March 30, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE

EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE EFOLDER SHADOWPROTECT CONTINUITY CLOUD GUIDE Solution Overview Last Updated August 2, 2012 Prepare for the worst-case scenario with the efolder continuity cloud. Downtime of critical infrastructure can

More information

HySecure Quick Start Guide. HySecure 5.0

HySecure Quick Start Guide. HySecure 5.0 HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current

More information

SUREedge DR Installation Guide for Windows Hyper-V

SUREedge DR Installation Guide for Windows Hyper-V SUREedge DR Installation Guide for Windows Hyper-V Contents 1. Introduction... 2 1.1 SUREedge DR Deployment Scenarios... 2 1.2 Installation Overview... 3 2. Obtaining SUREedge Software and Documentation...

More information

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5 USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Virtual Storage Console, VASA Provider, and Storage Replication Adapter for VMware vsphere

Virtual Storage Console, VASA Provider, and Storage Replication Adapter for VMware vsphere Virtual Storage Console, VASA Provider, and Storage Replication Adapter for VMware vsphere Workflow Guide for 7.2 release July 2018 215-13170_B0 doccomments@netapp.com Table of Contents 3 Contents Deciding

More information

IBM Spectrum Protect Plus Version Installation and User's Guide IBM

IBM Spectrum Protect Plus Version Installation and User's Guide IBM IBM Spectrum Protect Plus Version 10.1.1 Installation and User's Guide IBM Note: Before you use this information and the product it supports, read the information in Notices on page 119. Third edition

More information

efolder BDR for Quest Rapid Recovery / VMware Continuity Cloud Guide

efolder BDR for Quest Rapid Recovery / VMware Continuity Cloud Guide efolder BDR for Quest Rapid Recovery / VMware Continuity Cloud Guide Accessing Continuity Cloud via VSphere Restore Your VM/Point in time restore Setting up Virtual Standby efolder BDR Guide for Veeam

More information

efolder BDR for Veeam VMware Continuity Cloud Guide

efolder BDR for Veeam VMware Continuity Cloud Guide efolder BDR for Veeam VMware Continuity Cloud Guide Setup Continuity Cloud Import Backup Copy Job Restore Your VM Accessing the Continuity Cloud Host uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION

More information

Installation of Cisco Business Edition 6000H/M

Installation of Cisco Business Edition 6000H/M Installation Overview, page 1 Installation Task Flow of Cisco Business Edition 6000H/M, page 2 Installation Overview This chapter describes the tasks that you must perform to install software on your Business

More information

NexentaStor VVOL

NexentaStor VVOL NexentaStor 5.1.1 VVOL Admin Guide Date: January, 2018 Software Version: NexentaStor 5.1.1 VVOL Part Number: 3000-VVOL-5.1.1-000065-A Table of Contents Preface... 3 Intended Audience 3 References 3 Document

More information

Zadara Enterprise Storage in

Zadara Enterprise Storage in Zadara Enterprise Storage in Google Cloud Platform (GCP) Deployment Guide March 2017 Revision A 2011 2017 ZADARA Storage, Inc. All rights reserved. Zadara Storage / GCP - Deployment Guide Page 1 Contents

More information

Install ISE on a VMware Virtual Machine

Install ISE on a VMware Virtual Machine ISE Features Not Supported in a Virtual Machine, page 1 Supported VMware Versions, page 1 Support for VMware vmotion, page 2 Support for Open Virtualization Format, page 2 Virtual Machine Requirements,

More information

Installing and Upgrading Cisco Network Registrar Virtual Appliance

Installing and Upgrading Cisco Network Registrar Virtual Appliance CHAPTER 3 Installing and Upgrading Cisco Network Registrar Virtual Appliance The Cisco Network Registrar virtual appliance includes all the functionality available in a version of Cisco Network Registrar

More information

Install ISE on a VMware Virtual Machine

Install ISE on a VMware Virtual Machine Supported VMware Versions, page 1 Support for VMware vmotion, page 1 Support for Open Virtualization Format, page 2 Virtual Machine Requirements, page 2 Virtual Machine Resource and Performance Checks,

More information

IT Essentials v6.0 Windows 10 Software Labs

IT Essentials v6.0 Windows 10 Software Labs IT Essentials v6.0 Windows 10 Software Labs 5.2.1.7 Install Windows 10... 1 5.2.1.10 Check for Updates in Windows 10... 10 5.2.4.7 Create a Partition in Windows 10... 16 6.1.1.5 Task Manager in Windows

More information

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1 vsphere Replication for Disaster Recovery to Cloud vsphere Replication 8.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

VMware vcloud Air User's Guide

VMware vcloud Air User's Guide vcloud Air This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Acronis Backup & Recovery 11.5

Acronis Backup & Recovery 11.5 Acronis Backup & Recovery 11.5 Installation Guide Applies to the following editions: Update 2 Advanced Server Server for Windows Virtual Edition Server for Linux Advanced Server SBS Edition Workstation

More information

Dell DL4300 Appliance Release Notes

Dell DL4300 Appliance Release Notes Dell DL4300 Appliance Release Notes Notes, cautions, and warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either potential

More information

Cisco VDS Service Broker Software Installation Guide for UCS Platforms

Cisco VDS Service Broker Software Installation Guide for UCS Platforms Cisco VDS Service Broker 1.0.1 Software Installation Guide for UCS Platforms Revised: May 2013 This document provides detailed instructions for installing the Cisco Videoscape Distribution Suite Service

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

SaaSaMe Transport Workload Snapshot Export for. Alibaba Cloud

SaaSaMe Transport Workload Snapshot Export for. Alibaba Cloud SaaSaMe Transport Workload Snapshot Export for Alibaba Cloud Contents About This Document... 3 Revision History... 3 Workload Snapshot Export for Alibaba Cloud... 4 Workload Snapshot Export Feature...

More information

PRODUCT DOCUMENTATION. Backup & Replication v5.0. User Guide.

PRODUCT DOCUMENTATION. Backup & Replication v5.0. User Guide. PRODUCT DOCUMENTATION User Guide Backup & Replication v5.0 www.nakivo.com Table of Contents Solution Architecture... 4 Deployment...11 System Requirements... 12 Deployment Scenarios... 15 Installing NAKIVO

More information

Configuring the SMA 500v Virtual Appliance

Configuring the SMA 500v Virtual Appliance Using the SMA 500v Virtual Appliance Configuring the SMA 500v Virtual Appliance Registering Your Appliance Using the 30-day Trial Version Upgrading Your Appliance Configuring the SMA 500v Virtual Appliance

More information

ShadowProtect Bare Metal Restore

ShadowProtect Bare Metal Restore ShadowProtect Bare Metal Restore Prerequisites Datto Technical Support is always prepared and on stand-by to assist with business critical situations such as Bare Metal Restores (BMRs). If the situation

More information

Acronis Backup Advanced Version 11.5 Update 6

Acronis Backup Advanced Version 11.5 Update 6 Acronis Backup Advanced Version 11.5 Update 6 APPLIES TO THE FOLLOWING PRODUCTS Advanced for Windows Server Advanced for Linux Server Advanced for PC Advanced for VMware / Hyper-V / RHEV / Citrix XenServer

More information

Product Version 1.1 Document Version 1.0-A

Product Version 1.1 Document Version 1.0-A VidyoDashboard Installation Guide Product Version 1.1 Document Version 1.0-A Table of Contents 1. Overview... 3 About This Guide... 3 Prerequisites... 3... 5 Installing the OVA for VMware ESXi... 5 Configuring

More information

dctrack Quick Setup Guide (Recommended) Obtain a dctrack Support Website Username and Password

dctrack Quick Setup Guide (Recommended) Obtain a dctrack Support Website Username and Password dctrack 5.0.0 Quick Setup Guide This guide walks you through installing dctrack for the first time. In other words, this is a clean install - it is not an integration of dctrack and Power IQ, and it is

More information

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.

More information

Quick Start Guide for Vmware. Version 2.5 Vmware vsphere Instance

Quick Start Guide for Vmware. Version 2.5 Vmware vsphere Instance Quick Start Guide for Vmware Version 2.5 Vmware vsphere Instance CONTENTS 1. Introduction 1.1 Running Gemini appliance on Vmware vsphere 1.1.1 Supported Versions 1.1.2 System Requirement 1.1.3 Note on

More information

Active System Manager Version 8.0 User s Guide

Active System Manager Version 8.0 User s Guide Active System Manager Version 8.0 User s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your product. CAUTION: A CAUTION indicates either

More information

User Guide. Version R95. English

User Guide. Version R95. English Cloud Backup User Guide Version R95 English September 11, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS

More information

dctrack Quick Setup Guide Virtual Machine Requirements Requirements Requirements Preparing to Install dctrack

dctrack Quick Setup Guide Virtual Machine Requirements Requirements Requirements Preparing to Install dctrack dctrack Quick Setup Guide This Quick Setup Guide explains how to install and configure dctrack. For additional information on any aspect of dctrack, see the accompanying dctrack Help in other its online

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Polycom RealPresence Distributed Media Application (DMA ) System

Polycom RealPresence Distributed Media Application (DMA ) System GETTING STARTED GUIDE 10.0 October 2018 3725-76311-001Q Polycom RealPresence Distributed Media Application (DMA ) System Copyright 2018, Polycom, Inc. All rights reserved. No part of this document may

More information

KACE Systems Deployment Appliance (K2000) 4.1. Administrator Guide

KACE Systems Deployment Appliance (K2000) 4.1. Administrator Guide KACE Systems Deployment Appliance (K2000) 4.1 Administrator Guide Table of Contents About the KACE Systems Deployment Appliance (K2000)... 9 Getting started... 10 Tasks for getting started using the K2000

More information

K2 ServerSave Installation and User Guide

K2 ServerSave Installation and User Guide K2 ServerSave Installation and User Guide Chapter 1: Introduction 1.1 What is K2 ServerSave? Welcome to the K2 ServerSave Server Edition User Guide. This guide briefly describes the K2 ServerSave Application

More information

Introduction to Virtualization

Introduction to Virtualization Introduction to Virtualization Module 2 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks Configuring

More information

Install ISE on a VMware Virtual Machine

Install ISE on a VMware Virtual Machine ISE Features Not Supported in a Virtual Machine, page 1 Supported VMware Versions, page 1 Support for VMware vmotion, page 2 Support for Open Virtualization Format, page 2 Virtual Machine Requirements,

More information

KeyNexus Hyper-V Deployment Guide

KeyNexus Hyper-V Deployment Guide v1.0 09/2018 . Copyright Notice Copyright 2018 KeyNexus Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

vsphere Replication for Disaster Recovery to Cloud

vsphere Replication for Disaster Recovery to Cloud vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

StarWind Virtual SAN Installing and Configuring SQL Server 2019 (TP) Failover Cluster Instance on Windows Server 2016

StarWind Virtual SAN Installing and Configuring SQL Server 2019 (TP) Failover Cluster Instance on Windows Server 2016 One Stop Virtualization Shop StarWind Virtual SAN Installing and Configuring SQL Server 2019 (TP) Failover Cluster Instance on Windows Server 2016 OCTOBER 2018 TECHNICAL PAPER Trademarks StarWind, StarWind

More information

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide

The Balabit s Privileged Session Management 5 F5 Azure Reference Guide The Balabit s Privileged Session Management 5 F5 Azure Reference Guide March 12, 2018 Abstract Administrator Guide for Balabit s Privileged Session Management (PSM) Copyright 1996-2018 Balabit, a One Identity

More information

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3.1

OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3.1 OpenManage Integration for VMware vcenter Quick Install Guide for vsphere Client, Version 2.3.1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use

More information

Installing VMware vsphere 5.1 Components

Installing VMware vsphere 5.1 Components Installing VMware vsphere 5.1 Components Module 14 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization

More information

Using iscsi with BackupAssist. User Guide

Using iscsi with BackupAssist. User Guide User Guide Contents 1. Introduction... 2 Documentation... 2 Terminology... 2 Advantages of iscsi... 2 Supported environments... 2 2. Overview... 3 About iscsi... 3 iscsi best practices with BackupAssist...

More information

StarWind Virtual SAN Installing and Configuring SQL Server 2017 Failover Cluster Instance on Windows Server 2016

StarWind Virtual SAN Installing and Configuring SQL Server 2017 Failover Cluster Instance on Windows Server 2016 One Stop Virtualization Shop Installing and Configuring SQL Server 2017 Failover Cluster Instance on Windows Server 2016 OCTOBER 2018 TECHNICAL PAPER Trademarks StarWind, StarWind Software and the StarWind

More information

Rapid Recovery 6.2. User Guide

Rapid Recovery 6.2. User Guide Rapid Recovery 6.2 User Guide Table of Contents Introduction to Rapid Recovery...14 Core Console... 15 Accessing the Rapid Recovery Core Console... 15 Understanding the Quick Start Guide... 15 Hiding the

More information

This option lets you reset the password that you use to log in if you do not remember it. To change the password,

This option lets you reset the password that you use to log in if you do not remember it. To change the password, User s Guide Overview IDrive offers the most cost effective BMR functionality with onsite disk image backup for SMBs. Store entire data of hard disks including the operating system (OS) and application

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Setting Up the DR Series System on Veeam

Setting Up the DR Series System on Veeam Setting Up the DR Series System on Veeam Quest Engineering June 2017 A Quest Technical White Paper Revisions Date January 2014 May 2014 July 2014 April 2015 June 2015 November 2015 April 2016 Description

More information

Setting Up the Dell DR Series System on Veeam

Setting Up the Dell DR Series System on Veeam Setting Up the Dell DR Series System on Veeam Dell Engineering April 2016 A Dell Technical White Paper Revisions Date January 2014 May 2014 July 2014 April 2015 June 2015 November 2015 April 2016 Description

More information

UCS-E160DP Double-wide E-Series Server, 6 core CPU, with PCIe

UCS-E160DP Double-wide E-Series Server, 6 core CPU, with PCIe Overview This chapter includes the following sections: Cisco UCS E-Series Servers Overview, page 1 Server Software, page 2 CIMC Overview, page 3 CIMC GUI, page 3 Cisco UCS E-Series Servers Overview The

More information

Installing the Cisco Unified MeetingPlace Web Server Software

Installing the Cisco Unified MeetingPlace Web Server Software Installing the Cisco Unified MeetingPlace Web Server Software Release 8.5 Revised: 2/19/13 : Install the Application Server (which includes the Software Media Server) : Install the Hardware Media Server

More information

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5

vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5 vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

ElasterStack 3.2 User Administration Guide - Advanced Zone

ElasterStack 3.2 User Administration Guide - Advanced Zone ElasterStack 3.2 User Administration Guide - Advanced Zone With Advance Zone Configuration TCloud Computing Inc. 6/22/2012 Copyright 2012 by TCloud Computing, Inc. All rights reserved. This document is

More information

Dell Storage Compellent Integration Tools for VMware

Dell Storage Compellent Integration Tools for VMware Dell Storage Compellent Integration Tools for VMware Administrator s Guide Version 3.1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your

More information

Backup and Recovery FAQs

Backup and Recovery FAQs Backup and Recovery FAQs Introduction The Backup and Recovery application is an easy to use, easy to manage data backup and disaster recovery solution for your DeltaV Distributed Control System (DCS),

More information

VMware vsphere Storage Appliance Installation and Configuration

VMware vsphere Storage Appliance Installation and Configuration VMware vsphere Storage Appliance Installation and Configuration vsphere Storage Appliance 1.0 vsphere 5.0 This document supports the version of each product listed and supports all subsequent versions

More information

Veeam Endpoint Backup

Veeam Endpoint Backup Veeam Endpoint Backup Version 1.5 User Guide March, 2016 2016 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be reproduced,

More information

Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5

Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5 Getting Started with ESX Server 3i Installable Update 2 and later for ESX Server 3i version 3.5 Installable and VirtualCenter 2.5 Getting Started with ESX Server 3i Installable Revision: 20090313 Item:

More information

VI-CENTER EXTENDED ENTERPRISE EDITION GETTING STARTED GUIDE. Version: 4.5

VI-CENTER EXTENDED ENTERPRISE EDITION GETTING STARTED GUIDE. Version: 4.5 VI-CENTER EXTENDED ENTERPRISE EDITION GETTING STARTED GUIDE This manual provides a quick introduction to Virtual Iron software, and explains how to use Virtual Iron VI-Center to configure and manage virtual

More information

SUREedge MIGRATOR INSTALLATION GUIDE FOR VMWARE

SUREedge MIGRATOR INSTALLATION GUIDE FOR VMWARE SUREedge MIGRATOR INSTALLATION GUIDE 5.0.1 FOR VMWARE 2025 Gateway Place, Suite #480, San Jose, CA, 95110 Important Notice This document is provided "as is" without any representations or warranties, express

More information

version 5.4 Installation Guide

version 5.4 Installation Guide version 5.4 Installation Guide Document Release Date: February 9, 2012 www.phdvirtual.com Legal Notices PHD Virtual Backup for Citrix XenServer Installation Guide Copyright 2010-2012 PHD Virtual Technologies

More information

Deploying the LANGuardian Virtual Appliance on VMware ESXi 6.5

Deploying the LANGuardian Virtual Appliance on VMware ESXi 6.5 Deploying the LANGuardian Virtual Appliance on VMware ESXi 6.5 LANGuardian Version 14.4 February 2018 This document describes how to deploy the LANGuardian virtual appliance onto a VMware ESXi bare metal

More information

StarWind Virtual SAN. Installing and Configuring SQL Server 2014 Failover Cluster Instance on Windows Server 2012 R2. One Stop Virtualization Shop

StarWind Virtual SAN. Installing and Configuring SQL Server 2014 Failover Cluster Instance on Windows Server 2012 R2. One Stop Virtualization Shop One Stop Virtualization Shop StarWind Virtual SAN Installing and Configuring SQL Server 2014 Failover Cluster Instance on Windows Server 2012 R2 OCTOBER 2018 TECHNICAL PAPER Trademarks StarWind, StarWind

More information

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE Page 1 of 35 Quick Start Guide TABLE OF CONTENTS This Quick Start Guide is designed to help you install and use a CommCell configuration to which you can later add other components. COMMCELL ARCHITECTURE

More information

vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7

vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 vcenter Server Appliance Configuration Modified on 17 APR 2018 VMware vsphere 6.7 VMware ESXi 6.7 vcenter Server 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Troubleshooting Cisco APIC-EM Single and Multi-Host

Troubleshooting Cisco APIC-EM Single and Multi-Host Troubleshooting Cisco APIC-EM Single and Multi-Host The following information may be used to troubleshoot Cisco APIC-EM single and multi-host: Recovery Procedures for Cisco APIC-EM Node Failures, page

More information

Dell Lifecycle Controller Integration Version for Microsoft System Center 2012 Virtual Machine Manager User s Guide

Dell Lifecycle Controller Integration Version for Microsoft System Center 2012 Virtual Machine Manager User s Guide Dell Lifecycle Controller Integration Version 1.0.1 for Microsoft System Center 2012 Virtual Machine Manager User s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that

More information

Dell Storage Compellent Integration Tools for VMware

Dell Storage Compellent Integration Tools for VMware Dell Storage Compellent Integration Tools for VMware Version 4.0 Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your

More information

LiveVault. Agent Guide

LiveVault. Agent Guide LiveVault Software Version: 7.82 Agent Guide Note The guide primarily provides instruction on how to install the LiveVault agent on Windows and Linux servers. Additionally it provides information about

More information

vrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017

vrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017 vrealize Suite Lifecycle Manager 1.0 Installation and Management vrealize Suite 2017 vrealize Suite Lifecycle Manager 1.0 Installation and Management You can find the most up-to-date technical documentation

More information

Cisco Prime Collaboration Deployment

Cisco Prime Collaboration Deployment Install System Requirements for Installation, page 1 Browser Requirements, page 2 IP Address Requirements, page 2 Virtualization Software License Types, page 3 Frequently Asked Questions About the Installation,

More information

Data Protection Guide

Data Protection Guide SnapCenter Software 4.0 Data Protection Guide For VMs and Datastores using the SnapCenter Plug-in for VMware vsphere March 2018 215-12931_C0 doccomments@netapp.com Table of Contents 3 Contents Deciding

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization

More information

Contents. Limitations. Prerequisites. Configuration

Contents. Limitations. Prerequisites. Configuration Welcome to your Netmail Secure trial The trial version of Netmail Secure allows you to evaluate Netmail Secure from within your own corporate domain. Included is a sample mail feed that is automatically

More information

Deploy the ExtraHop Discover 3100, 6100, 8100, or 9100 Appliances

Deploy the ExtraHop Discover 3100, 6100, 8100, or 9100 Appliances Deploy the ExtraHop Discover 3100, 6100, 8100, or 9100 s Published: 2017-12-29 This guide explains how to install the rack-mounted EDA 3100, EDA 6100, EDA 8100, and EDA 9100 ExtraHop Discover appliances.

More information

Deploy the ExtraHop Discover Appliance with VMware

Deploy the ExtraHop Discover Appliance with VMware Deploy the ExtraHop Discover Appliance with VMware Published: 2018-07-17 The ExtraHop virtual appliance can help you to monitor the performance of your applications across internal networks, the public

More information

VMware Skyline Collector Installation and Configuration Guide. VMware Skyline 1.4

VMware Skyline Collector Installation and Configuration Guide. VMware Skyline 1.4 VMware Skyline Collector Installation and Configuration Guide VMware Skyline 1.4 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Log & Event Manager UPGRADE GUIDE. Version Last Updated: Thursday, May 25, 2017

Log & Event Manager UPGRADE GUIDE. Version Last Updated: Thursday, May 25, 2017 UPGRADE GUIDE Log & Event Manager Version 6.3.1 Last Updated: Thursday, May 25, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/log_event_manager_(lem)/lem_documentation

More information

About the XenClient Enterprise Solution

About the XenClient Enterprise Solution About the XenClient Enterprise Solution About the XenClient Enterprise Solution About the XenClient Enterprise Solution XenClient Enterprise is a distributed desktop virtualization solution that makes

More information

Installing the Operating System or Hypervisor

Installing the Operating System or Hypervisor If you purchased E-Series Server or NCE Option 1 (E-Series Server or NCE without a preinstalled operating system or hypervisor), you must install an operating system or hypervisor. This chapter includes

More information

BACKUP APP V7 MICROSOFT SYSTEM BACKUP AND RESTORE GUIDE

BACKUP APP V7 MICROSOFT SYSTEM BACKUP AND RESTORE GUIDE V7 MICROSOFT SYSTEM BACKUP AND RESTORE GUIDE Revision History Date Descriptions Type of modification 27 July 2016 First Draft New 3 Feb 2017 Added instructions and screen shots for Encryption New key handling

More information

efolder BDR for Veeam Hyper-V Continuity Cloud Guide Setup Continuity Cloud Import Backup Copy Job Restore Your VM

efolder BDR for Veeam Hyper-V Continuity Cloud Guide Setup Continuity Cloud Import Backup Copy Job Restore Your VM efolder BDR for Veeam Hyper-V Continuity Cloud Guide Setup Continuity Cloud Import Backup Copy Job Restore Your VM efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder

More information

Data Protection Guide

Data Protection Guide SnapCenter Software 4.1 Data Protection Guide For VMs and Datastores using the SnapCenter Plug-in for VMware vsphere September 2018 215-13399_B0 doccomments@netapp.com Table of Contents 3 Contents Deciding

More information

Migrating vrealize Automation 6.2 to 7.2

Migrating vrealize Automation 6.2 to 7.2 Migrating vrealize Automation 6.2 to 7.2 vrealize Automation 7.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Deploy a Barracuda Backup Virtual Appliance

Deploy a Barracuda Backup Virtual Appliance Deploy a Virtual Appliance https://campus.barracuda.com/doc/78155552/ The following sections walk you through the process of deploying a Virtual (Vx) appliance. System Platform Requirements Barracuda provides

More information