Deployment Guide
● Host location.
● Logon credentials for each machine you want to protect.
NOTE: All virtual machines must have VMware Tools installed; otherwise, Rapid Recovery cannot detect the host name of
the virtual machine to which to deploy. In lieu of the host name, Rapid Recovery uses the virtual machine name, which may
cause issues if the host name is different from the virtual machine name.
1. On the Rapid Recovery Core Console, click the Protect drop-down menu, and then click Deploy Agent Software.
The Deploy Agent Software Wizard opens.
2. On the Connection page of the wizard, from the Source drop-down list, select vCenter / ESX(i).
3. Enter the host information and logon credentials as described in the following table.
Table 8. vCenter/ESX(i) connection settings
Text Box Description
Host The name or IP address of the VMware vCenter Server/ESX(i) virtual host.
Port The port used to connect to the virtual host.
The default setting is 443.
User name The user name used to connect to the virtual host; for example, Administrator or, if the machine is in a
domain, [domain name]\Administrator.
Password The secure password used to connect to this virtual host.
4. Click Next.
5. On the Machines page of the wizard, select one of the following options from the drop-down menu:
● Hosts and Clusters
● VMs and Templates
6. Expand the list of machines, and then select the VMs to which you want to deploy the software.
A notification appears if Rapid Recovery detects that a machine is offline or that VMware Tools are not installed.
7. If you want to restart the machines automatically after deployment, select After Agent installation, restart the machines
automatically (Recommended).
8. Click Next.
Rapid Recovery automatically verifies each machine you selected.
9. On the Adjustments page of the wizard, enter the credentials for each machine in the following format:
hostname::username::password.
NOTE: Enter one machine on each line.
10. Click Finish.
The system automatically verifies each machine that you selected.
If Rapid Recovery detects any concerns during automatic verification, the wizard progresses to a Warnings page, where you
can clear machines from selection and manually verify the selected machines. If the machines you added pass the automatic
verification, they appear on the Deploy Agent to Machines pane.
11. If the Warning page appeared and you are still satisfied with your selections, click Finish again.
The Rapid Recovery Agent software deploys to the specified machines.
About installing the Agent software on Linux
machines
When installing the Agent software on Linux machines that you want to protect, use the following guidance. After installation is
complete, configure the Agent as described in the topic “Configuring the Rapid Recovery Agent on a Linux machine” in the Dell
Data Protection | Rapid Recovery 6.0 Installation and Upgrade Guide.
CAUTION:
After configuring the newly installed Agent software on a Linux machine, restart the machine.
Restarting ensures that the proper kernel driver version is used to protect your machine.
Preparing to protect your servers 29










