Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers

Similar documents
Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

TOAD TIPS & TRICKS. Written by Jeff Podlasek, Toad DB2 product manager, Quest

A Rapid Recovery Technical Whitepaper. Lenovo Nutanix Data Protection: Best Practices for Quest Software Data Protection Solutions

Setting up the DR Series System with vranger. Technical White Paper

Setting Up Quest QoreStor with Veeam Backup & Replication. Technical White Paper

Setting up the DR Series System on Acronis Backup & Recovery v11.5. Technical White Paper

Spotlight on SQL Server Enterprise Spotlight Management Pack for SCOM

Rapid Recovery DocRetriever for SharePoint User Guide

Toad Edge Installation Guide

Quest Migration Manager Upgrade Guide

One Identity Starling Two-Factor AD FS Adapter 6.0. Administrator Guide

Metalogix Intelligent Migration. Installation Guide

Rapid Recovery License Portal Version User Guide

One Identity Starling Two-Factor Authentication. Administrator Guide

Quest Unified Communications Diagnostics Data Recorder User Guide

Setting up Quest QoreStor as an RDA Backup Target for NetVault Backup. Technical White Paper

Toad Intelligence Central 3.3 New in This Release

Quest Recovery Manager for Active Directory 9.0. Quick Start Guide

Toad Edge Installation Guide

Toad DevOps Toolkit 1.0

Quest Migration Manager for Exchange Granular Account Permissions for Exchange 2010 to 2013 Migration

One Identity Active Roles 7.2

1.0. Quest Enterprise Reporter Discovery Manager USER GUIDE

Metalogix ControlPoint 7.6. for Office 365 Installation Guide

Quest Migration Manager for Exchange Resource Kit User Guide

Quest Migration Manager for Exchange Granular Account Permissions for Exchange 2010 to 2010 Migration

One Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide

Metalogix Archive Manager for Files 8.0. IIS Installation

SQL Optimizer for Oracle Installation Guide

Authentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide

Quest Recovery Manager for Active Directory Forest Edition 9.0. Quick Start Guide

Metalogix Essentials for Office Creating a Backup

About Toad for Oracle 2017 Editions 2. Product release notes 4. Installation 5

Setting Up Quest QoreStor as a Commvault Backup Target. Technical White Paper

Cloud Access Manager How to Deploy Cloud Access Manager in a Virtual Private Cloud

One Identity Active Roles Diagnostic Tools 1.2.0

One Identity Starling Two-Factor Authentication. Administration Guide

EAM Portal User's Guide

Management Console for SharePoint

One Identity Starling Two-Factor Desktop Login 1.0. Administration Guide

Toad Edge 2.0 Preview

Spotlight Management Pack for SCOM. User Guide

Quest InTrust Objects Created and Used by InTrust

One Identity Defender 5.9. Product Overview

KACE GO Mobile App 5.0. Getting Started Guide

Quest Migrator for Notes to Exchange SSDM User Guide

LiteSpeed for SQL Server 6.1. Configure Log Shipping

Quest Knowledge Portal 2.9

One Identity Quick Connect Express

Metalogix Content Matrix 8.7. Quick Start Guide

Quest vworkspace. What s New. Version 7.5

What s New in SharePoint 2016 and Office 365

One Identity Password Manager User Guide

Quest Collaboration Services 3.6. Installation Guide

Security Explorer 9.1. User Guide

Dell SonicWALL SonicOS 5.9 Upgrade Guide

Quest Code Tester for Oracle 3.1. Installation and Configuration Guide

How to Show Grouping in Scatterplots using Statistica

SQL Optimizer for IBM DB2 LUW 4.3.1

Quest InTrust InTrust Events

Quest Enterprise Reporter 2.0 Report Manager USER GUIDE

Cloud Access Manager SonicWALL Integration Overview

8.2. Quick Start Guide

Dell Secure Mobile Access Connect Tunnel Service User Guide

One Identity Starling Two-Factor HTTP Module 2.1. Administration Guide

Quest Migration Manager for Active Directory Cached Credentials Utility Administrator Guide

Toad Data Point - Professional Edition. The Toad Data Point Professional edition includes the following new features and enhancements.

KACE GO Mobile App 5.0. Release Notes

Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell Statistica. Statistica Enterprise Server Installation Instructions

KACE GO Mobile App 3.1. Release Notes

Zero impact database migration

KACE GO Mobile App 4.0. Release Notes

One Identity Active Roles 7.2. Management Pack Technical Description

About One Identity Quick Connect for Base Systems 2.4.0

Dell Change Auditor 6.5. Event Reference Guide

One Identity Manager 8.0. Administration Guide for Connecting to a Universal Cloud Interface

voptimizer Pro Version What s New

Metalogix Migrator 4.7. Install Guide

Rapid Recovery 6.2. User Guide

One Identity Quick Connect for Base Systems 2.4. Administrator Guide

Quest NetVault Backup Plug-in for SnapMirror To Tape. User s Guide. version 7.6. Version: Product Number: NTG EN-01 NTG

One Identity Active Roles 7.2. Configuration Transfer Wizard Administrator Guide

One Identity Active Roles 7.2. Replication: Best Practices and Troubleshooting Guide

Dell GPOADmin 5.7. About Dell GPOADmin 5.7. New features. Release Notes. December 2013

Metalogix ControlPoint 7.6. Advanced Iinstallation Guide

Toad Data Point - Professional Edition. The Toad Data Point Professional edition includes the following new features and enhancements.

One Identity Starling Two-Factor Authentication

One Identity Management Console for Unix 2.5.1

One Identity Active Roles 7.2. Web Interface User Guide

The Privileged Appliance and Modules (TPAM) 1.0. Diagnostics and Troubleshooting Guide

Quest Unified Communications Analytics Deployment Guide

One Identity Active Roles 7.2. Web Interface Administrator Guide

Quest One Password Manager

Rapid Recovery 6.2. Installation and Upgrade Guide

Quest NetVault Backup Plug-in for NDMP. Application Notes for Dell FluidFS NAS Appliances. NCG x-EN-01 03/20/13

One Identity Manager 8.0. Administration Guide for Connecting to Azure Active Directory

One Identity Starling Identity Analytics & Risk Intelligence. User Guide

Transcription:

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization on two separate machines. Follow the procedure below to quickly install Quest VROOM on Windows machines. When protecting and monitoring large environments, be sure to pay attention to sizing and other considerations. Information about various installation options can be found in the Additional resources section at the end of this document. RAPID RECOVERY WINDOWS SETUP Minimum system requirements Installation begins with identification of a machine that offers enough resources to host a Rapid Recovery core. Use the Sizing Rapid Recovery Deployments technical brief to properly size a core to protect your environment. Minimum system requirements (to protect 10 20 virtual machines) include: Dedicated 64-bit Windows server that only hosts Rapid Recovery 8GB RAM or more Quad-core or higher CPU DAS or SAN storage to be used as backup data repository (NAS storage is an option for a repository smaller than 6TB) Network 1 x GbE or higher

Begin by downloading the installer package and confirming that all prerequisites have been installed. Figure 1. Double-click the Rapid Recovery core installer file. Procedure 1. Begin by downloading the Quest VROOM Windows installer package. 2. Double-click the Rapid Recovery core installer file, as shown in Figure 1. 3. Click Next to begin the installation. 4. Confirm that all prerequisites have been installed on the machine (see Figure 2). Click Next. Figure 2. Confirm that all prerequisites have been installed on the machine.

Figure 3. If Rapid Recovery will be protecting Exchange, select the Mailbox Restore for Exchange checkbox. When the installation is complete, launch the Rapid Recovery core console. 5. If Rapid Recovery will be protecting Exchange, select the Mailbox Restore for Exchange checkbox, as shown in Figure 3. Then click Next. 6. Choose a Rapid Recovery update option ( Notify me about updates is recommended) and click Next to start the Rapid Recovery core installation process. When the installation process is complete, click Finish. 7. Launch the Rapid Recovery core console by either double-clicking the core console icon or by typing the URL https://<yourcoreserveripaddress>: 8080/apprecovery/admin in a web browser. Provide a license key if necessary and then click Continue (see Figure 4). Figure 4. Enter your license key. 3

Begin creating a Rapid Recovery DVM repository. Figure 5. Begin the process of creating a Rapid Recovery DVM repository. 8. Begin creating a Rapid Recovery DVM repository by following the steps illustrated in Figure 5. a. Then define the storage location and capacity for the repository as shown in Figure 6. Click Save. Figure 6. Define the storage location and capacity for the repository. 4

Figure 7. Create the repository. b. Click Create to create the repository (see Figure 7). CONFIGURE RAPID RECOVERY TO PROTECT VMWARE VIRTUAL MACHINES Procedure 1. Click Protect Multiple Machines, as shown in Figure 8. You can configure Rapid Recovery to protect VMware virtual machines. Figure 8. Begin by clicking Protect Multiple Machines. 5

You can modify your protection settings at any time. Figure 9. Choose a vcenter server with proper credentials. If desired, select the Protect selected VMs agentlessly checkbox. 2. Choose a vcenter server with proper credentials. If desired, select the Protect selected VMs agentlessly checkbox (see Figure 9). Note that protecting virtual machines with an agent offers additional backup capabilities, including Live Recovery, SQL attachability checks and mountability checks. If you want these backup features, do not select this checkbox. Instead, return to Step 1 and click the Deploy Agent Software option (reboot is required). 3. Select the VMware virtual machines to be protected, as shown in Figure 10. Click Next. 4. Choose the default protection (hourly snapshots of all volumes) or define custom protection settings, and then click Finish. Protection settings can be modified at any time. Figure 10. Select the VMware virtual machines to be protected. 6

Figure 11. The VMware virtual machines you selected will be listed as Rapid Recovery protected machines. You can configure Rapid Recovery to protect Hyper-V virtual machines. 5. Over the next 2 3 minutes, the VMware virtual machines you selected will be listed as Rapid Recovery protected machines, as illustrated in Figure 11. CONFIGURE RAPID RECOVERY TO PROTECT HYPER-V VIRTUAL MACHINES Procedure 1. Click Protect Multiple Machines, as shown in Figure 12. Figure 12. To begin, click Protect Multiple Machines. 7

Agents must be installed on the Hyper-V hosts. Figure 13. Select either Hyper-V Server or Hyper-V Cluster as the source. 2. For the source, select either Hyper-V Server or Hyper-V Cluster (see Figure 13). Click Next. 3. Enter the proper Hyper-V host credentials and, if desired, select the Protect the Hyper-V server without requiring an agent in the guest VMs checkbox (see Figure 14). Then cllick Next. Note that protecting virtual machines with an agent offers additional backup capabilities, including Live Recovery, SQL attachability checks and mountability checks. If you want these backup features, do not proceed; instead, return to Step 1 and click the Deploy Agent Software option. 4. Rapid Recovery requires an agent to be installed on the Hyper-V hosts. Agents are not required to be installed on virtual machines that are or will be marked for protection. If a warning message appears, correct the issue and then click Next. Figure 14. Specify the proper Hyper-V host credentials. 8

Figure 15. Select the virtual machines to be protected by Rapid Recovery, and indicate whether newly added virtual machines will be automatically protected as well. 5. Select the virtual machines to be protected by Rapid Recovery, and indicate whether newly added virtual machines will be automatically protected as well (see Figure 15). Click Next. 6. Choose the default protection (hourly snapshots of all volumes) or define custom protection settings, and then click Finish. You can modify these settings at any time in the future. You can choose to have Rapid Recovery automatically protect newly added machines. 7. The Rapid Recovery agent is then deployed to Hyper-V hosts. To monitor this process, click the running task in the drop-down menu for further details. See Figure 16. (Installation of agents require a reboot.) Figure 16. You can monitor the running tasks as the Rapid Recovery agent is being deployed to the Hyper-V hosts. 9

Do not install Rapid Recovery and Foglight on the same machine. Figure 17. Wait until the virtual machines are populated in the Protected Machines section before rebooting them. 8. If the hosts require a reboot, wait a few minutes until the virtual machines are populated in the Protected Machines section of the dialog (see Figure 17). FOGLIGHT FOR VIRTUALIZATION WINDOWS SETUP Minimum system requirements Installation begins by identifying a Windows machine with enough resources to install Foglight for Virtualization. Do not install Rapid Recovery and Foglight on the same machine. Check the Foglight for Virtualization System Requirements and Platform Support Guide to determine the proper resources to monitor your virtual environment. Minimum system requirements include: Dedicated 64-bit Windows server that only hosts Foglight for Virtualization 4GB RAM or more Quad-core or higher CPU 120GB 10K disk storage or better 1 x GbE Procedure This setup process describes the installation using an embedded PostgressSQL database. For setup instructions using existing external databases and other installation options, refer to the Additional resources section at the end of this document. 1. Download the Foglight for Virtualization Enterprise Edition Windows installer. 2. Unzip the download file and run the executable as administrator. 3. Follow the wizard and provide basic setup information when asked to complete the installation. CONNECTING FOGLIGHT FOR VIRTUALIZATION TO VMWARE Procedure 1. When the Foglight for Virtualization login screen appears, log in using the following credentials: User name: foglight

10 Password: foglight

Figure 18. Select the Getting Started & Administration tab, and then click Connect to a VMware Virtual Center. 2. Select the Getting Started & Administration tab, and then click Connect to a VMware Virtual Center (see Figure 18). 3. The Foglight agent manager is automatically installed where Foglight for Virtualization is installed. In our example, only one Foglight agent manager is installed, and it is on a machine called vcenter.flrr01.com. Select the agent host to be configured and click Next, as shown in Figure 19. The Foglight agent manager is automatically installed where Foglight for Virtualization is installed. Figure 19. Select the agent host to be configured.

Be sure to enable the monitoring options. Figure 20. Specify the vsphere vcenter name or IP address and enable the monitoring options 4. Enter the vsphere Virtual Center name or IP address and enable the monitoring options, as shown in Figure 20. Click Next. 5. For first-time installations, select the Add vcenter(s) to a new credential radio button (see Figure 21). Click Next. Figure 21. For first-time installations, select the Add vcenter(s) to a new credential radio button. 12

Figure 22. Add the credential to the vcenter server, and then click the lockbox to encrypt the credential. Click the lockbox icon to encrypt your credential. 6. Add the credential to the vcenter server identified in the previous step, and then click the lockbox icon to encrypt the credential (see Figure 22). 7. Click Finish to complete the Foglight agent manager setup (see Figure 23). Figure 23. Click Finish to complete the Foglight agent manager setup. 13

Foglight VMware virtual machine monitoring is now configured. Figure 24. Once the setup is complete, click the VMware Environment option under the Homes tab of the Foglight management GUI. 8. The status message Creating agents in progress will be displayed for 2 3 minutes. Once the agent setup has been successful, click the VMware Environment option under the Homes tab of the Foglight management GUI, as shown in Figure 24. (If the Bookmarks/ Homes/Dashboards menu pane is not displayed, click the gray arrow at the center far left of the management GUI to display these options.) Foglight VMware virtual machine monitoring is now configured. 14

Figure 25. Log on to Foglight for Virtualization. CONNECTING FOGLIGHT FOR VIRTUALIZATION TO HYPER-V Procedure 1. In a web browser, enter the IP address of the FMS virtual machine. The example in Figure 25 uses the URL 10.0.0.205:8080. Authenticate with the following credentials: To connect Foglight for Virtualization to Hyper-V, begin by logging on to Foglight for Virtualization. User name: foglight Password: foglight 2. Select the Getting Started & Administration tab in the Foglight console. Then click Connect to Hyper-V Servers (see Figure 26). Figure 26. Click the Getting Started & Administration tab in the Foglight console. Then click Connect to Hyper-V Servers. 15

Download the first script and copy it to the domain controller. Figure 27. Download the first script and copy it to the domain controller. 3. There are two run script options. The first script is run once on the domain controller and configures all Hyper-V servers. This document demonstrates this option. The second is a pair of scripts that need to be manually run on each Hyper-V server. Download the first script and copy it to the domain controller (see Figure 27). Keep the wizard open; we will come back to this point and continue later. 4. If the domain controller script is chosen, a Windows organizational unit (OU) must be created. Notice the domain name in the example in Figure 28 is FLRR01.com. To begin the OU creation, access the domain controller and open the Active Directory Users and Computers tool. Figure 28. Begin the process of creating a new OU. 16

Use PowerShell to run the script you downloaded. Figure 29. Specify the name of the OU to be created. 5. Specify the name of the OU to be created. In the example in Figure 29, HpvServers is used. 6. Now run the script you downloaded to the domain controller by right-clicking the script and then clicking Run with PowerShell (see Figure 30). Figure 30. Run the script downloaded to the domain controller by right-clicking the script and then clicking Run with PowerShell. 17

Figure 31. Enter a GPO name. 7. Enter a Group Policy object (GPO) name. In the example in Figure 31, flrr01_gpo is used. Associate the OU with the GPO. 8. Specify that the OU created in the domain controller HpvServers should be associated with the GPO. In the example in Figure 32, our domain name is FLRR01.com. 9. Enter Y to confirm that the target OU name is correct. 10. Enter Y to invoke GPUpdate immediately (for Windows Server 2012 R2 only). 11. Enter N quit the wizard. Figure 32. Specify that the OU created in the domain controller HpvServers should be associated with the GPO. 18

Figure 33. Go back to the Connect to Hyper-V Servers wizard and click Next. 12. Go back to the Connect to Hyper-V Servers wizard and click Next (see Figure 33). 13. Select the Foglight agent manager host. This is the machine where you installed the Foglight for Virtualization Windows installer or virtual appliance. Click Next. 14. Click Manual to choose an individual Hyper-V server to monitor. 15. Enter the IP address of the Hyper-V server that will be monitored and ensure that storage collection is enabled (see Figure 34). Click Next. The Foglight agent manager host is the machine where you installed the Foglight for Virtualization Windows installer or virtual appliance. Figure 34. Enter the IP address of the Hyper-V server that will be monitored and ensure that storage collection is enabled. 19

Ensure that the IP addresses of the Hyper-V servers are listed. Figure 35. Select the Add host(s) to a new credential radio button. 16. Select the Add host(s) to a new credential radio button, as illustrated in Figure 35. 17. Select the proper credential type. This example uses a Windows credential. 18. Enter the proper Windows credential (see Figure 36). Then click Next. 19. Provide a unique name to identify the credential. Then click Next. 20. Select the Provided host names and IP addresses (only) ) checkbox. Ensure that the IP addresses of the Hyper-V servers are listed in the IP addresses box. Figure 36. Enter the proper Windows credential.

Figure 37. To prevent authentication lockouts, ensure the Failure Rate policy is enabled. 21. To prevent authentication lockouts, ensure that the Failure Rate policy is enabled (see Figure 37). Click Next. 22. Click Finish. The status message Creating agents in progress will be displayed for 2 3 minutes. Once the agent setup has been successful, click the Hyper-V Environment option under the Homes tab of the Foglight management GUI (see Figure 38). If the Bookmarks/ Homes/Dashboards menu pane is not displayed, click the gray arrow at the center far left of the management GUI to display these options.) Hyper-V virtual machine monitoring is now configured. ADDITIONAL RESOURCES Rapid Recovery Sizing Rapid Recovery Deployments Rapid Recovery technical documentation To prevent lockouts, ensure that the Failure Rate policy is enabled. Foglight for Virtualization F oglight for Virtualization Enterprise Edition technical documentation Figure 38. Once the agent setup has been successful, click the Hyper-V Environment

option under the Homes tab. 21

ABOUT QUEST Quest helps our customers reduce tedious administration tasks so they can focus on the innovation necessary for their businesses to grow. Quest solutions are scalable, affordable and simple-to-use, and they deliver unmatched efficiency and productivity. Combined with Quest s invitation to the global community to be a part of its innovation, as well as our firm commitment to ensuring customer satisfaction, Quest will continue to accelerate the delivery of the most comprehensive solutions for Azure cloud management, SaaS, security, workforce mobility and data-driven insight. 2017 Quest Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this guide may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying and recording for any purpose other than the purchaser s personal use without the written permission of Quest Software Inc. The information in this document is provided in connection with Quest Software products. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this document or in connection with the sale of Quest Software products. EXCEPT AS SET FORTH IN THE TERMS AND CONDITIONS AS SPECIFIED IN THE LICENSE AGREEMENT FOR THIS PRODUCT, QUEST SOFTWARE ASSUMES NO LIABILITY WHATSOEVER AND DISCLAIMS ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO ITS PRODUCTS INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL QUEST SOFTWARE BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS DOCUMENT, EVEN IF QUEST SOFTWARE HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Quest Software makes no representations or warranties with respect to the accuracy or completeness of the contents of this document and reserves the right to make changes to specifications and product descriptions at any time without notice. Quest Software does not make any commitment to update the information contained in this document. Patents Quest Software is proud of our advanced technology. Patents and pending patents may apply to this product. For the most current information about applicable patents for this product, please visit our website at www.quest.com/legal Trademarks Quest, Foglight and the Quest logo are trademarks and registered trademarks of Quest Software Inc. For a complete list of Quest marks, visit www.quest.com/legal/trademark-information.aspx. All other trademarks are property of their respective owners. If you have any questions regarding your potential use of this material, contact: Quest Software Inc. Attn: LEGAL Dept 4 Polaris Way Aliso Viejo, CA 92656 Refer to our Web site (www.quest.com) for regional and international office information. 22