Essential User Guide Section 4: Manage & monitor from vault or appliance Other resources:
|
This user guide is meant to be a step-by-step guide, with any information essential to understanding and using x360Recover services.
This chapter of the essential user guide introduces features and settings within the appliance and vault UIs. Access these portals by navigating to the appliance or vault in x360Recover Manager and directly logging in via SSO.
In this section: Manage & monitor from vault or appliance
- Migrate protected systems
- Navigate vaults and appliances
- Manage protected systems
- Manage jobs and backups
- Manage vault and appliance alerts
- Vault and appliance health checks
In this article:
What's the difference between vault and appliance UIs?
Log into a vault (the Axcient Cloud or a private vault) or appliance (for BDR services) directly from the x360Recover Manager. Use the UI to manage a specific vault or appliance, including viewing devices protected, managing backup jobs, and recovering data.
The x360Recover vault provides essentially the same services and features as the x360Recover appliance, with a few differences in presentation and function.
Where the appliance is intended to be deployed at a single customer location, the vault is designed to be multi-tenant, and securely accept replicated recovery point data from multiple customers and sites.
- The Web Interface features and options are slightly different than the appliance, and specific features are split between Admin mode and User mode.
- The Admin has access to configuration and management functions on the device, but is locked out of user-specific features and options, such as mounting, virtualizing, or exporting protected systems.
- Users have very limited access to configurable settings on the device, but have full access to recovery and export options ONLY for their own protected systems present on the vault.
- To perform recovery operations on a vault, you must log in to the vault using the customer credentials you entered when creating the customer in the x360Recover License Portal.
- The Schedules, Vault Settings, and Download menus do not appear on the vault.
x360Recover Vault Menus
Admin
When logged in to a vault as an Admin, the following menus are present:
- Protected Systems
- Users
- Jobs
- Alerts
- Manage Storage
- Settings
- ConnectWise Settings
- System Info
- Cluster Management
The vault synchronizes periodically with the License Portal to retrieve all customer accounts and passwords. When logged in as Admin on a vault, the Users menu will appear.
From the Users menu pane, the Admin user can access a list of all customer user accounts that have been created by the partner, and set customer-specific disk space quotas per customer to limit total storage usage on this vault.
A digest of license usage for all customers is also displayed from the Users menu page.
Customer
When logged in to a vault as a Customer, the following menus are present:
- Protected Systems
- Jobs
- File Browser
- NFS Exports
- iSCSI
- System Info
Customer accounts have access only to protected systems and information related to their own account. When performing NFS Exports, virtual disk export, or browsing mounted recovery points, customer related files are stored in customer specific paths, secured to their login account.
x360Recover Vault Protected Systems
- There is no Missed Backup Alert Hours setting present on the vault.
- Replication settings do not exist on the vault.
- The Replication button has been replaced with Recover – USB.
- When logged in as Admin, all of the snapshot actions are grayed out. You must log in using a customer account (as provisioned within the x360Recover Licensing Portal) in order to access the snapshot actions.
- Customer user accounts have access to all Snapshot actions and retention policy, but cannot configure bootVM or Migrate options.
Protected Systems page
1. In the appliance left hand navigation, click on Protected Systems. You will see a list of the systems currently being backed up and protected by the appliance.
2. Use the controls to manage protected systems:
- The Status column displays icons that indicate whether the system is currently running as a virtual machine (the first icon will be green) and whether replication is enabled for the system. (The second icon will be blue).
- System Name (Hostname), Operating System, and Currently Protected Volumes (disk volumes), are listed for identification and information.
- The Schedule column contains a dropdown list of available backup schedules. The assigned schedule displays. To change schedules, click the dropdown and select the preferred schedule. For more information, please review the Managing Schedules for Backup Jobs article
- The Actions column allows you to delete or view the details of a protected system.
3. Click Refresh to update the display view with any newly discovered protected systems.
4. Click Import to retrieve protected systems being migrated or recovered via USB media and import the related data.
Protected System Details page
In the Protected System Details page, you can:
1. Click the Schedule Now button to schedule a full or incremental backup.
2. Click the Run Analysis Tool button to collect event-related information and submit to Axcient Support.
.
3. Find a snapshot and click the Mount button to browse and recover files from the snapshot.
4. Click the Export button to create a virtual disk export for download and for failback from the cloud.
5. Click the iSCSI button to virtualize a protected system in the Axcient Continuity Cloud for cloud failover.
.
System Info page
The System Info page displays detailed information about CPU usage, running processes, network data, disk usage, and more.
- In the Local System Details section, review the system name, operating system, and RAM capacity details.
- In the Disk Usage Statistics section, review information about each disk. You can view the name of the disk, as well as space used and space available.
- In the Volumes section, review information about the Operating System volume. For example, you can view the encryption status, total space, used space, and free space.
- In the Network Interfaces section, review network details, such as the MAC and IP address.