2.7.1 Backing up
You can obtain a backup using a procedure such as copying files. Note that before you obtain a backup, you must stop all PFM - RM for Virtual Machine services (of all PFM - RM for Virtual Machine instances).
The tables below describe the files of PFM - RM for Virtual Machine to back up.
No. |
File name |
Explanation |
---|---|---|
1 |
installation-folder\agt8\agent\*.ini files |
Remote Monitor Collector service settings files |
2 |
installation-folder\agt8\agent\instance-name#1\*.ini files |
|
3 |
installation-folder\agt8\agent\instance-name#1\groups\*.ini files |
|
4 |
installation-folder\agt8\agent\instance-name#1\targets\*.ini files |
|
5 |
installation-folder\agt8\plugin\*.ini files |
|
6 |
installation-folder\agt8\store\*.ini files |
Remote Monitor Store service settings files |
7 |
installation-folder\agt8\store\instance-name#1\*.ini files |
- #1
-
These are folders used for operation in an instance environment. In the case of an instance configuration, as many folders as there are instances are created.
No. |
File name |
Explanation |
---|---|---|
1 |
installation-folder\agt8\agent\*.ini files |
Remote Monitor Collector service settings files |
2 |
installation-folder\agt8\plugin\*.ini files |
|
3 |
environment-folder\agt8\instance-name#1\*.ini files |
|
4 |
environment-folder\agt8\agent\instance-name#1\groups\*.ini files |
|
5 |
environment-folder\agt8\agent\instance-name#1\targets\*.ini files |
|
6 |
installation-folder\agt8\store\*.ini files |
Remote Monitor Store service settings files |
7 |
environment-folder\agt8\store\instance-name#1\*.ini files |
- #1
-
These are folders used for operation in an instance environment. In the case of an instance configuration, as many folders as there are instances are created.
- Important note
-
When you acquire a backup for PFM - RM for Virtual Machine, try to manage the product version number of the acquired environment. For details about product version numbers, see the release note.
When you acquire a backup, you must record the instance and monitoring target configurations (including logical host environments).