After the Copy Policies are assigned to resources, and the schedules are created by RMC, you can use the Dashboard (HPE Recovery Manager Central > Dashboard) to monitor protection jobs. You can filter the dashboard charts based on the application plug-ins that you select. The dashboard provides a high-level information on the Scheduled (to be run later in the day), Completed, Running, and Failed jobs in the last 24 hours. The Dashboard reports are collated and cached periodically or when the data is available.

The dashboard provides you the following charts:

Copy Policy Execution

The Copy Policy Execution chart provides success to failure ratio of the completed protection jobs in RMC. The graph maps every execution of the policy over the time period that you set. The graph is derived from the calculation of the expected number of runs, the actual number of runs, and also the number of runs that are skipped due to system issues. To download the copy policy execution data, click the download icon. A CSV file is downloaded and consists of data for a selected application plug-in. The details include policy name, number of expected runs, successful runs, missed runs, and failed runs. The details are listed for each resource and for each Copy type.

Copies By Type

Displays the number of copies that are available for each Copy type.

Copies By Age

Provides you an account of the cost of Copies. The graph displays the types of Copies and the age of these Copies. Using this chart, you can understand the effective way of storing copies in the right tier of storage, according to the age of the copy. Hewlett Packard Enterprise recommends you to store the Copy that you want to use for a longer term on a cheaper storage, such as cloud storage.

Backup Efficiency

Displays the effective savings that you get by using RMC over a time period — 24 hours, 7 days, or 30 days. The graph displays the actual backup volume size and the delta volume size that is backed up.

Copy Policy Protection Tiers

Displays the number of resources and their levels of protection based on the current policy assignments. For example, if a resource is protected by a snapshot and an express protect backup, the protection level for that resource is 2.