Skip to content

SLA Management

SLA Management lets you define recovery objectives for your backup-protected devices and automatically alerts you when those objectives aren’t met. Set RPO (how much data loss you can tolerate) and RTO (how quickly you need to recover) targets, then let Breeze monitor compliance.


TermDefinition
RPO (Recovery Point Objective)Maximum acceptable time between the last backup and a failure. An RPO of 60 minutes means you can lose at most 60 minutes of data.
RTO (Recovery Time Objective)Maximum acceptable time to restore from backup. An RTO of 30 minutes means the restore must complete within 30 minutes.

  1. Go to Operations > Backup > SLA.
  2. Click Add SLA Config.
  3. Fill in the configuration:
    • Name — descriptive label (e.g., “Tier 1 Servers — 1hr RPO”)
    • RPO target — maximum minutes between backups (minimum 1)
    • RTO target — maximum minutes to restore (minimum 1)
    • Scope — choose Target Devices or Target Device Groups, then select from the dropdown
    • Alert on breach — enable to receive notifications when an SLA is violated
    • Active — toggle on/off
  4. Click Save.

The SLA tab shows:

  • Overall compliance % — percentage of SLA checks that passed
  • Active breaches — count of currently violated SLAs
  • Average RPO/RTO — actual recovery metrics across your fleet

A table of your SLA policies showing:

  • Policy name
  • RPO and RTO targets (in minutes)
  • Number of devices affected
  • Active/inactive status
  • Edit and delete actions

A chronological list of SLA events:

  • Device name — which device triggered the event
  • Event type — RPO Breach (red), RTO Breach (yellow), or Missed Backup (gray)
  • Detected time — when the breach was identified
  • Resolved time — when the breach was cleared (if applicable)

Breeze continuously monitors backup activity against your SLA policies:

  1. RPO check — compares the time since the last completed backup to the RPO target. If more time has passed than the target allows, an RPO breach event is created.
  2. RTO check — measures actual restore times from test restores and verification runs. If the measured time exceeds the RTO target, an RTO breach is recorded.
  3. Missed backup — if a scheduled backup didn’t run at all (agent offline, policy misconfigured), a missed backup event is created.

Breach detection runs automatically — no manual action needed.


Device tierRPORTORationale
Tier 1 (domain controllers, databases)15–60 min15–30 minCritical infrastructure — minimal data loss and fast recovery
Tier 2 (application servers, file servers)4–8 hours1–2 hoursImportant but can tolerate some downtime
Tier 3 (workstations, dev machines)24 hours4–8 hoursLower priority — daily backup is sufficient