Veritas™ Resiliency Platform 2.2 Solutions for Applications

Last Published:
Product(s): Resiliency Platform & CloudMobility (2.2)
  1. Overview of Resiliency Platform
    1.  
      About Veritas Resiliency Platform
    2.  
      About disaster recovery using Resiliency Platform
    3.  
      About Resiliency Platform features and components
    4.  
      About Resiliency Platform capabilities
    5.  
      About permissions for operations in the console
  2. Managing applications using Resiliency Platform
    1.  
      Managing applications using Resiliency Platform
    2.  
      Providing inputs for partially discovered applications
    3.  
      Managing custom applications
    4.  
      About application bundles
    5.  
      Adding an application bundle to the Resiliency Manager
    6.  
      Removing an application bundle
    7.  
      Installing an application bundle on selected application hosts
    8.  
      Uninstalling an application bundle from selected hosts
    9.  
      Enabling and disabling application bundle on selected application hosts
    10.  
      Managing auto-deploy for an application bundle
    11.  
      Editing the discovery schedule for an application type
    12.  
      Viewing the details of application types
    13.  
      Viewing the applicable host details
  3. Managing InfoScale applications using Resiliency Platform
    1.  
      About Veritas InfoScale Operations Manager
    2.  
      Resiliency Platform support for InfoScale applications
    3.  
      Managing InfoScale applications using Resiliency Platform
  4. Managing resiliency groups
    1. About resiliency groups
      1.  
        Prerequisites for creating resiliency groups with applications
      2.  
        Prerequisites for creating resiliency groups with InfoScale applications
    2.  
      About service objectives
    3.  
      Managing applications for basic monitoring
    4.  
      Starting a resiliency group
    5.  
      Stopping a resiliency group
    6.  
      Displaying resiliency group information and status
    7.  
      Viewing InfoScale applications details
    8.  
      Viewing resiliency group details
    9.  
      Editing a resiliency group
    10.  
      Deleting a resiliency group
  5. Preparing for disaster recovery configuration
    1.  
      An overview of key steps required for disaster recovery of applications
    2.  
      Prerequisites for configuring applications for disaster recovery
    3.  
      An overview of key steps required for disaster recovery of InfoScale applications
    4.  
      Prerequisites for configuring InfoScale applications for disaster recovery
    5. About replication technologies used in disaster recovery of applications
      1.  
        Configuring applications for disaster recovery using EMC SRDF replication
      2.  
        Configuring applications for disaster recovery using NetApp SnapMirror replication
      3.  
        Configuring applications for disaster recovery using EMC RecoverPoint replication
    6. Configuring DNS server settings for a data center
      1.  
        Sample command for Windows keytab file
  6. Configuring resiliency groups for remote recovery
    1.  
      Understanding the role of resiliency groups in disaster recovery operations
    2.  
      Managing applications for remote recovery (DR)
  7. Rehearsing DR operations to ensure DR readiness
    1.  
      About ensuring the disaster recovery readiness of your assets
    2.  
      Rehearse operations for applications - array-based replication
    3.  
      Prerequisites for rehearsal operation
    4.  
      Performing the rehearsal operation
    5.  
      Performing cleanup rehearsal
  8. Performing disaster recovery operations
    1.  
      Migrating a resiliency group of applications
    2.  
      Taking over a resiliency group of applications
    3.  
      Performing the resync operation
  9. Monitoring and reporting assets status
    1.  
      About the Resiliency Platform Dashboard
    2.  
      Understanding asset types
    3.  
      Displaying an overview of your assets
    4.  
      Viewing reports
  10. Monitoring risks
    1.  
      About risk insight
    2.  
      Displaying risk information
    3.  
      Predefined risks in Resiliency Platform
    4.  
      Viewing the current risk report
    5.  
      Viewing the historical risk report
  11. Managing activities and resiliency plans
    1. Managing activities
      1.  
        Viewing activities
      2.  
        Aborting a running activity
    2. Managing resiliency plans
      1.  
        About resiliency plans
      2. Creating a new resiliency plan template
        1.  
          About manual task
        2.  
          Using manual tasks in resiliency plans
        3.  
          About custom script
        4.  
          Using custom scripts in resiliency plans
      3.  
        Editing a resiliency plan template
      4.  
        Deleting a resiliency plan template
      5.  
        Viewing a resiliency plan template
      6.  
        Creating a new resiliency plan
      7.  
        Editing a resiliency plan
      8.  
        Deleting a resiliency plan
      9.  
        Executing a resiliency plan
      10.  
        Viewing a resiliency plan
      11.  
        Creating a schedule for a resiliency plan
      12.  
        Editing a schedule for a resiliency plan
      13.  
        Deleting a schedule for a resiliency plan
      14.  
        Viewing a schedule for a resiliency plan
  12. Managing evacuation plans
    1.  
      About evacuation plan
    2.  
      Generating an evacuation plan
    3.  
      Regenerating an evacuation plan
    4.  
      Performing evacuation
    5.  
      Performing rehearse evacuation
    6.  
      Performing cleanup evacuation rehearsal
  13. Appendix A. Troubleshooting
    1.  
      Viewing events and logs in the console
  14.  
    Glossary

Viewing events and logs in the console

Veritas Resiliency Platform maintains the following types of logs that can be viewed in the web console:

System logs: System logs are typically the result of a user performing an operation in the console.

Audit logs: Audit logs are primarily used for security audits. They leave a chronological trail of activities performed on the system. They identify user, activity, affected objects, etc. They help track the individuals responsible for activities and detect security violations.

Event and notification logs: Event and notification logs are not necessarily related to user activity; they can include information such as a server going down. Events can be public or private. Rules can be configured to notify users by email of selected public events. Private events are typically unrelated to user-initiated operations. Private events are displayed in the console for troubleshooting but are not available to include in rules for notification.

By default, logs and SNMP traps are retained for 2 years. This retention period can be modified in the product settings in the console.

To view events and logs

  1. Navigate

    More Views (menu bar) > Logs

    You can also view new notifications from the Notifications icon.

  2. To view logs by type (System, Audit, or Notification) select the appropriate tab. You can filter by the product service and by severity (information, warning, or errors) or type (public, private), depending on the tab.