Deployment Guide

For example, to enter kernel modules for 3.16.0-23 and 3.16.0-34, enter 1 4 and press Enter.
To enter all kernel modules, enter all and press Enter.
8. After configuring the newly installed Agent software, restart the machine. Restarting ensures that the proper kernel driver
version is used to protect your machine.
After completing this process, the local repository has been configured on this Linux machine. The Agent software is installed
and the kernel module is loaded.
Your next step is to protect the machine on the Rapid Recovery Core.
Protecting a machine
If you have already installed the Rapid Recovery Agent software on the machine you want to protect, but have not restarted it
yet, restart the machine now.
This topic describes how to start protecting the data on a single machine that you specify using the Protect Machine Wizard.
When you add protection, you need to define connection information such as the IP address and port, and provide credentials
for the machine you want to protect. Optionally, you can provide a display name to appear in the Core Console instead of the IP
address. If you change this, you will not see the IP address for the protected machine when you view details in the Core
Console. You will also define the protection schedule for the machine.
The workflow of the protection wizard may differ slightly based on your environment. For example, if the Rapid Recovery Agent
software is installed on the machine you want to protect, you will not be prompted to install it from the wizard. Likewise, if a
repository already exists on the Core, you will not be prompted to create one.
1. Do one of the following:
If you are starting from the Protect Machine Wizard, proceed to Step 2.
If you are starting from the Rapid Recovery Core Console, from the button bar, click Protect.
The Protect Machine Wizard appears.
2. On the Welcome page, select the appropriate installation options:
If you do not need to define a repository or establish encryption, select Typical.
If you need to create a repository, or define a different repository for backups for the selected machine, or if you want to
establish encryption using the wizard, select Advanced (show optional steps).
Optionally, if you do not wish to see the Welcome page for the Protect Machine Wizard in the future, select the option
Skip this Welcome page the next time the wizard opens.
3. When you are satisfied with your choices on the Welcome page, then click Next.
The Connection page appears.
4. On the Connection page, enter the information about the machine to which you want to connect as described in the
following table, and then click Next.
Table 11. Machine connection settings
Text Box Description
Host The host name or IP address of the machine that you want to protect.
Port The port number on which the Rapid Recovery Core communicates with the Agent on the machine.
The default port number is 8006.
User name The user name used to connect to this machine; for example, Administrator (or, if the machine is in a
domain, [domain name]\Administrator).
Password The password used to connect to this machine.
If the Install Agent page appears next in the Protect Machine Wizard, that means that Rapid Recovery does not detect the
Rapid Recovery Agent on the machine and will install the current version of the software. Go to Step 7.
If the Upgrade Agent page appears next in the wizard, that means that an older version of the Agent software exists on the
machine you want to protect.
Preparing to protect your servers
37