Hp Storage Mirroring Software User Manual

Browse online or download User Manual for Storage Hp Storage Mirroring Software. HP Storage Mirroring Software User Manual [en] [es] [fr]

  • Download
  • Add to my manuals
  • Print
  • Page
    / 678
  • Table of contents
  • BOOKMARKS
  • Rated. / 5. Based on customer reviews
Page view 0
HP StorageWorks
Storage Mirroring Recover Users Guide
HP Part Number: T5437-96021
Published: November 2010
Page view 0
1 2 ... 678

Summary of Contents

Page 1 - HP StorageWorks

HP StorageWorksStorage Mirroring Recover Users GuideHP Part Number: T5437-96021Published: November 2010

Page 2

WINS replication 342DNS 343Windows DNSCMD command 344Storage Mirroring Recover DFO utility 346Non-Microsoft DNS 350Macintosh shares 352NFS Shares 354W

Page 3 - Table of Contents

Storage Mirroring Console Page 99 of 677Setting the console communications portTo access the console communications port, select Options from the tool

Page 4

Storage Mirroring Console Page 100 of 677Other consolesThere are various Storage Mirroring Recover consoles, many of which are being phasedout over ti

Page 5

Storage Mirroring Console Page 101 of 677Replication ConsoleTo open the Replication Console, select Start, Programs, HPStorage Mirroring, HPStorage

Page 6

Storage Mirroring Console Page 102 of 677Logging on and offTo ensure protection of your data, Storage Mirroring Recover offer multi-level securityusin

Page 7

Storage Mirroring Console Page 103 of 6773. Specify your Username, Password, Domain, and whether you want yourpassword saved.4. Click OK and verify yo

Page 8

Storage Mirroring Console Page 104 of 677Monitor rightsThis icon is a computer with a magnifying glass and it indicates theStorage Mirroring Recover s

Page 9

Storage Mirroring Console Page 105 of 677Managing the Replication Console treeTo better manage the servers that appear in the Replication Console, you

Page 10

Storage Mirroring Console Page 106 of 677Creating groupsUse one of the following methods to create a new group:l Right-click anywhere on the left pane

Page 11

Storage Mirroring Console Page 107 of 677Removing groupsl Use one of the following methods to remove a group.l Right-click on a group on the left of t

Page 12

Storage Mirroring Console Page 108 of 677Moving ServersServers that are auto-populated can be moved to different groups within the ReplicationConsole

Page 13

Log files 396Viewing the log file 397Viewing the log file through the Replication Console 398Viewing the log file through a text editor 401Filtering t

Page 14

Storage Mirroring Console Page 109 of 677Inserting ServersIf a machine is not displayed on the Replication Console, it can be manually inserted.This f

Page 15

Storage Mirroring Console Page 110 of 677Removing ServersIf you do not want to see a server in the Replication Console, it can be permanentlyremoved f

Page 16

Storage Mirroring Console Page 111 of 677Hiding ServersIf you do not want to see a server in the Replication Console and do not want to disableActive

Page 17 - Core operations

Storage Mirroring Console Page 112 of 677Unhiding ServersYou can unhide, or display, a hidden server at any time you want to access that server.The se

Page 18 - Mirroring

Storage Mirroring Console Page 113 of 677Sharing group and server configurationAll of the group and server information is stored on the local machine

Page 19 - Replication

Storage Mirroring Console Page 114 of 677WorkspacesThe Replication Console workspace contains the display of the panes of the ReplicationConsole and a

Page 20

Storage Mirroring Console Page 115 of 677Saving a workspaceAs you size, add, or remove windows in the Replication Console, you can save theworkspace t

Page 21 - Restoration

Storage Mirroring Console Page 116 of 677Opening a workspaceFrom the Replication Console, you can open a new workspace or open a previouslysaved works

Page 22

Storage Mirroring Console Page 117 of 677Clearing maintained security credentialsTo remove cached credentials, select File, Options and select the Sec

Page 23 - Full-server workloads

Storage Mirroring Console Page 118 of 677Failover Control CenterTo open the Failover Control Center, select Start, Programs, HPStorage Mirroring,Reco

Page 24 - Application workloads

Failing over virtual workloads in the Storage Mirroring Console 495Failing over virtual workloads in the Storage Mirroring Recover for VirtualInfrastr

Page 25 - Virtual workloads

Storage Mirroring Console Page 119 of 677Configuring communication portsThe Failover Control Center uses port 6320, by default for Storage Mirroring R

Page 26 - Cluster workloads

Storage Mirroring Console Page 120 of 677Configuring the console refresh rateThe failover client periodically requests information from the source and

Page 27

Storage Mirroring Console Page 121 of 677Clearing maintained security credentialsTo remove cached credentials, access the credentials security option,

Page 28 - Supported configurations

Storage Mirroring Console Page 122 of 677Full-Server Failover ManagerTo open the Full-Server Failover Manager, select Start, Programs, HPStorageMirro

Page 29 - One-to-one, active/standby

Storage Mirroring Console Page 123 of 677Configuring the console refresh rateSelect File, Options. By default, the main window of Full-Server Failover

Page 30 - One-to-one, active/active

Storage Mirroring Console Page 124 of 677Configuring the level of detail to logSelect File, Options. By default, Full-Server Failover Manager creates

Page 31 - Many-to-one

Storage Mirroring Console Page 125 of 677Clearing maintained security credentialsSelect File, Options. By default, Full-Server Failover Manager will s

Page 32 - One-to-many

Storage Mirroring Console Page 126 of 677Configuring how servers are added to the Full-Server Failover ManagerSelect File, Options. By default, Full-S

Page 33

Storage Mirroring Console Page 127 of 677Saving and reusing configuration optionsAfter you have created a protection pair and configured any of the op

Page 34

Storage Mirroring Console Page 128 of 677Application ManagerTo open the Application Manager, select Start, Programs, HPStorage Mirroring,Recover, HP

Page 35

Removing orphan files 546Replication 549Replication capabilities 550Replication sets 554Creating a replication set 558Creating or modifying replicatio

Page 36

Storage Mirroring Console Page 129 of 677Adding or managing serversStep 2 of the application protection workflow is to select your source and target s

Page 37

Storage Mirroring Console Page 130 of 677Changing Application Manager optionsTo modify Application Manager options, select Tools, Options and modify a

Page 38 - Foundation Edition

Storage Mirroring Console Page 131 of 677Storage Mirroring Recover for Virtual Infrastructure consoleTo open the Storage Mirroring Recover for Virtual

Page 39 - Standard Edition

Storage Mirroring Console Page 132 of 677Managing activation codesYou can manage your Storage Mirroring Recover for Virtual Infrastructure activationc

Page 40 - Advanced Edition

Storage Mirroring Console Page 133 of 677Managing VirtualCenter serversTo manage your VirtualCenter servers, select Manage VirtualCenter servers from

Page 41 - Premium Edition

Storage Mirroring Console Page 134 of 677Managing ESX serversTo manage your ESX servers, select Manage ESX servers from the left pane of theconsole. S

Page 42 - Virtual Guest 5-Pack Edition

Storage Mirroring Console Page 135 of 677Setting up an e-mail serverTo set up an e-mail server, select Set up e-mail server from the left pane of the

Page 43 - Virtual Host Standard Edition

Workload protection Page 136 of 677Workload protectionStorage Mirroring Recover flexible configurations allow you to protect differentworkloads depend

Page 44 - Virtual Host Advanced Edition

Workload protection Page 137 of 677Data protectionProtecting specific data consists of two main tasks - creating a replication set (to identifythe dat

Page 45 - Virtual Host Premium Edition

Workload protection Page 138 of 677Establishing a connection using the automated ConnectionWizardThe Connection Wizard guides you through the process

Page 46

Managing full-server and application snapshots 609Recommended optimizations 611Planning 612Installation 614General optimizations 616Performance optimi

Page 47

Workload protection Page 139 of 677selected. If it is not, select the Storage Mirroring Recover target. This is yourbackup server that will protect th

Page 48

Workload protection Page 140 of 677l Send all data to a single path on the target—This option sends allselected volumes and directories to the same lo

Page 49

Workload protection Page 141 of 677Creating a replication setBefore you can establish a connection, you must create a replication set.1. From the Repl

Page 50

Workload protection Page 142 of 677Note: Be sure and verify what files can be included by reviewing Replicationcapabilities.5. After selecting the dat

Page 51

Workload protection Page 143 of 677Establishing a connection manually using the ConnectionManagerAfter you have created a replication set, you can est

Page 52

Workload protection Page 144 of 677l Source Server—Specify the source server that contains the replication setthat is going to be transmitted to the S

Page 53 - SQL protection requirements

Workload protection Page 145 of 677amount of disk space available must be equal to or greater than theon-disc size of the sparse file.If you are mirro

Page 54

Workload protection Page 146 of 677l Full Mirror—All files in the replication set will be sent from the source to thetarget.l File Differences—Only th

Page 55

Workload protection Page 147 of 677Note: Stopping, starting, pausing, or resuming mirroring contains acomparison of how the file difference mirror set

Page 56

Workload protection Page 148 of 677Note: Database applications may update files without changing thedate, time, or file size. Therefore, if you are us

Page 57 - Virtual workload requirements

Initiating failback 648Restoring your data 650Evaluating full-server protection 652Establishing full-server protection 653Monitoring the activity and

Page 58

Workload protection Page 149 of 677Establishing a connection across a NAT or firewallIf your source and target are on opposite sides of a NAT or firew

Page 59

Workload protection Page 150 of 677l Storage Mirroring Recover failover can use ICMP pings to determine if thesource server is online. If you are goin

Page 60

Workload protection Page 151 of 677Simulating a connectionStorage Mirroring Recover offers a simple way for you to simulate a connection in orderto ge

Page 61

Workload protection Page 152 of 677l Source Server—Specify the source server that contains the replication setthat is going to be simulated to the TDU

Page 62

Workload protection Page 153 of 677Data workload failoverWhen you established your data workload protection, you only protected the data. Youstill nee

Page 63

Workload protection Page 154 of 677Configuring failover monitoring1. Open the Failover Control Center from your target server or a client machine. Don

Page 64 - ESX to ESXrequirements

Workload protection Page 155 of 6779. Highlight an IP address that you have selected for monitoring and select a Methodto Monitor for Failover.l Netwo

Page 65

Workload protection Page 156 of 67713. If you are monitoring multiple IP addresses, highlight the source name and specifythe Failover Trigger.l All Mo

Page 66 - Cluster workload requirements

Workload protection Page 157 of 677l Revert to Last Good Snapshot if Target Data is Bad—If the target data isin a bad Storage Mirroring Recover state,

Page 67

Workload protection Page 158 of 677source's subnet will be changed at failover, the source server must bethe only system on that subnet, which in

Page 68

Storage Mirroring Recover overview Page 15 of 677Storage Mirroring Recover overviewStorage Mirroring Recover ensures the availability of critical work

Page 69

Workload protection Page 159 of 677.SHR Share Mapping File check box is selected if you would like to use theStorage Mirroring Recover share mapping f

Page 70

Workload protection Page 160 of 677l If you want to pass any arguments to your script, specify the arguments.l If you want to delay the failover or fa

Page 71

Workload protection Page 161 of 677Updating shares on the targetShare information on the target can be manually updated from the Failover ControlCente

Page 72

Workload protection Page 162 of 677Editing failover monitoring configurationIf you want to edit the monitor settings for a source that is currently be

Page 73

Workload protection Page 163 of 677Removing failover monitoring configurationIf you want to discontinue monitoring a source, highlight that machine on

Page 74

Workload protection Page 164 of 677Server settingsMost of the Storage Mirroring Recover server settings are located in the ReplicationConsole Server P

Page 75 - Infrastructure

Workload protection Page 165 of 677Identifying a serverFrom the Replication Console, you can see server identity information, including aserver's

Page 76

Workload protection Page 166 of 677l Parent Group—This is the group in the Replication Console serverl Addresses—The IP address(es) for this server ar

Page 77

Workload protection Page 167 of 677Licensing a serverFrom the Replication Console, you can manage your server activation codes. Theactivation code is

Page 78

Workload protection Page 168 of 6773. Select the Licensing tab.4. Enter an activation code and click Add. Repeat for each activation code.5. Highlight

Page 79

Storage Mirroring Recover overview Page 16 of 677Core operationsStorage Mirroring Recover performs four basic types of operations.l Mirroring—The init

Page 80 - C:\>M:

Workload protection Page 169 of 677Configuring server startup optionsFrom the Replication Console, you can configure server startup options for each S

Page 81

Workload protection Page 170 of 677various points during the replication of data. Because the tasks are user-defined, you can achieve a wide variety o

Page 82

Workload protection Page 171 of 677applications, you should use the File Differences withchecksum or Full option.l Server Shutdown Timeout—This settin

Page 83

Workload protection Page 172 of 677Configuring network communication properties for a server1. Open the Replication Console and right-click the server

Page 84

Workload protection Page 173 of 677Queuing dataYou should configure queuing on both the source and target.1. Open the Replication Console and right-cl

Page 85 - Storage Mirroring Console

Workload protection Page 174 of 677l Select a dedicated, physical, non-boot volume.l Select a location on a non-clustered volume that will have minima

Page 86 - Starting the console

Workload protection Page 175 of 677amount of physical memory available but has a minimum of 32 MB. Bydefault, 128 MB or 512 MB of memory is used, depe

Page 87 - Getting started

Workload protection Page 176 of 677Note: The Maximum disk space for queue and Minimum Free Spacesettings work in conjunction with each other. For exam

Page 88 - Inserting servers manually

Workload protection Page 177 of 677Configuring source data processing options1. Open the Replication Console and right-click the server on the left pa

Page 89

Workload protection Page 178 of 677(SID). By replicating Windows security by name, you can transmit the ownername with the file. If that user exists o

Page 90

Storage Mirroring Recover overview Page 17 of 677MirroringMirroring is the process of transmitting user-specified data from the source to the targetso

Page 91 - Managing servers

Workload protection Page 179 of 677l Maximum Pending Mirror Operations—This option is the maximumnumber of mirror operations that are queued on the so

Page 92

Workload protection Page 180 of 677Configuring target data processing options1. Open the Replication Console and right-click the server on the left pa

Page 93 - Viewing server details

Workload protection Page 181 of 677l Retry Delay for Incomplete Operations (seconds)—This option specifiesthe amount of time, in seconds, before retry

Page 94

Workload protection Page 182 of 677Do not include the Recycler directory in your replication set if you aremoving deleted files. If the Recycler direc

Page 95 - Viewing server events

Workload protection Page 183 of 677Specifying the Storage Mirroring Recover database storage files1. Open the Replication Console and right-click the

Page 96 - Providing server credentials

Workload protection Page 184 of 677l Connection—This database file maintains the active source/targetconnection information. The default file name is

Page 97

Workload protection Page 185 of 677Specifying file names for logging and statistics1. Open the Replication Console and right-click the server on the l

Page 98 - Console options

Workload protection Page 186 of 677l Messages & Alerts, Maximum Files—Specify the maximum number ofStorage Mirroring Recover alert log files that

Page 99

Workload protection Page 187 of 677Supplying credentials for script processing1. Open the Replication Console and right-click the server on the left p

Page 100

Workload protection Page 188 of 677E-mailing event messagesYou can e-mail Storage Mirroring Recover event messages to specific addresses. Thesubject o

Page 101 - Other consoles

Storage Mirroring Recover overview Page 18 of 677ReplicationReplication is the real-time transmission of file changes. Unlike other relatedtechnologie

Page 102 - Replication Console

Workload protection Page 189 of 677Note: Any specified notification settings are retained when Enable notification isdisabled.5. Specify your e-mail s

Page 103 - Logging on and off

Workload protection Page 190 of 677the list.Note: You can test e-mail notification by specifying the options on the E-mailNotification tab and clickin

Page 104

Workload protection Page 191 of 677Full-server protectionBefore you can protect your entire source, you need to select a target that is suitable tobec

Page 105

Workload protection Page 192 of 677Finding a compatible targetReview the table below to determine if your server is a compatible target.Operating syst

Page 106

Workload protection Page 193 of 677MemoryThe target memory should be within 25% (plus or minus) of the source. Ifthe target has much less memory than

Page 107

Workload protection Page 194 of 677Boot volume configurationThe target boot volume cannot be a dynamic disk configuration. The bootvolume is the disk

Page 108

Workload protection Page 195 of 677failover, the failover will continue. If not, you will either have to select adifferent target or delete files on t

Page 109

Workload protection Page 196 of 6776. Double-click on any of the validation items to see details. You must correct anyerrors before you can enable pro

Page 110

Workload protection Page 197 of 677Optional full-server protection settingsOptional protection settings are available when configuring a full-server p

Page 111

Workload protection Page 198 of 677Including and excluding data to be protected1. Make sure you have a valid source and target specified, click Config

Page 112

© Copyright 1996-2010 Hewlett-Packard Development Company, L.P. and Double-Take Software, Inc. All rights reserved.Confidential computer software. Val

Page 113

Storage Mirroring Recover overview Page 19 of 677Failure monitoring and failoverFailover is the process in which a target stands in for a failed sourc

Page 114

Workload protection Page 199 of 677Stopping services on the target when protection is enabled1. Make sure you have a valid source and target specified

Page 115 - Workspaces

Workload protection Page 200 of 677Taking snapshots of the target1. Make sure you have a valid source and target specified, click Configureprotection

Page 116

Workload protection Page 201 of 677Configuring failover monitoring and processing1. Make sure you have a valid source and target specified, click Conf

Page 117

Workload protection Page 202 of 677Mapping network configuration on the target for post-failover1. Make sure you have a valid source and target specif

Page 118

Workload protection Page 203 of 677Routing data transmissions1. Make sure you have a valid source and target specified, click Configureprotection from

Page 119 - Failover Control Center

Workload protection Page 204 of 677Mirroring data1. Make sure you have a valid source and target specified, click Configureprotection from the main Fu

Page 120

Workload protection Page 205 of 677Compressing data1. Make sure you have a valid source and target specified, click Configureprotection from the main

Page 121

Workload protection Page 206 of 677Using NAT or firewalls with full-server workloadsIf your source and target are on opposite sides of a NAT or firewa

Page 122

Workload protection Page 207 of 677Full-server portsBy default, Storage Mirroring Recover uses port 6320 for all TCP and UDPcommunications. To verify

Page 123 - Full-Server Failover Manager

Workload protection Page 208 of 677Microsoft Windows portsFull-server workload protection uses WMI (Windows Management Instrumentation)which uses RPC

Page 124

Storage Mirroring Recover overview Page 20 of 677RestorationRestoration provides an easy method for copying replicated data from the target back toits

Page 125

Workload protection Page 209 of 677Hardware portsYou need to configure your hardware so that the full-server ports and Microsoft Windowsports are open

Page 126

Workload protection Page 210 of 677Application protectionProtecting an application consists of three main tasks - configuring the protection,validatin

Page 127

Workload protection Page 211 of 677Protecting an application1. Open the Application Manager.2. Verify the Setup tab is selected and then from the Task

Page 128

Workload protection Page 212 of 677Note: If you have previously used this source and target pair, you will be promptedto reuse the previous configurat

Page 129 - Application Manager

Workload protection Page 213 of 677If you are protecting multiple Exchange virtual servers, you canconfigure multiple like-named cluster protection co

Page 130 - Adding or managing servers

Workload protection Page 214 of 677If you will be configuring DNSfailover, the login account must be a memberof the domain DnsAdmins security group.E

Page 131

Workload protection Page 215 of 677black exclamation point (!) inside a yellow triangle. A successful validation isdesignated by a white checkmark ins

Page 132

Workload protection Page 216 of 6779. If you are protecting BlackBerry, a Complete BlackBerry Protection dialog willappear after the validation is com

Page 133 - Managing activation codes

Workload protection Page 217 of 677issue, either modify the failover script to use the domaincontroller that Exchange uses when the Information Stores

Page 134

Workload protection Page 218 of 677Optional application protection settingsOptional protection settings are available when configuring application pro

Page 135 - Managing ESX servers

Storage Mirroring Recover overview Page 21 of 677Storage Mirroring Recover workloadsBuilding on Storage Mirroring Recover core operations, you can pro

Page 136 - Setting up an e-mail server

Workload protection Page 219 of 677Configuring failover processing1. Make sure you have a valid domain and servers specified, click Configure fromthe

Page 137 - Workload protection

Workload protection Page 220 of 6773. Application Manager automatically determines the appropriate application servicesor resources to start and stop

Page 138 - Data protection

Workload protection Page 221 of 677Configuring DNS failoverApplication Manager will automatically determine default DNSfailover settings. Use thefoll

Page 139

Workload protection Page 222 of 677address for DNSupdates.Exchange Note: If you are protecting Exchange and one or more IP addressesare configured f

Page 140

Workload protection Page 223 of 677l If you have a NIC designated only for Storage Mirroring Recover traffic, DNSregistration for that NICshould be

Page 141

Workload protection Page 224 of 677Configuring identity failoverApplication Manager will automatically determine default identity failover settings. U

Page 142 - Creating a replication set

Workload protection Page 225 of 677SQL Note: If you are protecting SQL, do not failover the server name.File Server Note: You cannot failover file sha

Page 143

Workload protection Page 226 of 677Configuring failover monitoring1. Make sure you have a valid domain and servers specified, click Configure fromthe

Page 144

Workload protection Page 227 of 677l Application Monitoring—In non-cluster environments, you can monitor anapplication via a monitoring script. The sc

Page 145

Workload protection Page 228 of 677script that will monitor the application. The custom script can be PowerShell,Visual Basic, or JScript. Once your s

Page 146

Storage Mirroring Recover overview Page 22 of 677Full-server workloadsFull-server workload protection provides high availability for an entire server,

Page 147

Workload protection Page 229 of 677Taking snapshots of the target1. Make sure you have a valid domain and servers specified, click Configure fromthe m

Page 148

Workload protection Page 230 of 677Application connection settingsYou can configure routing and mirroring settings for your application connection. In

Page 149

Workload protection Page 231 of 677Routing data transmissions1. Make sure you have a valid domain and servers specified, click Configure fromthe main

Page 150

Workload protection Page 232 of 677Protection configurationApplication specific protection options are available on the Configure ProtectionConnection

Page 151

Workload protection Page 233 of 677Configuring Exchange storage group protectionIf you are protecting Exchange, you can specify which storage groups,

Page 152 - Simulating a connection

Workload protection Page 234 of 677The Protected Storage Groups list will be disabled if you have enabledOverride Generated Rules on the Advanced tab.

Page 153

Workload protection Page 235 of 677Configuring SQL database protectionIf you are protecting SQL, you can protect the SQL instance or only the database

Page 154 - Data workload failover

Workload protection Page 236 of 677l The servers must have the same named instances, unless you arerunning Application Manager in advanced mode. In th

Page 155

Workload protection Page 237 of 677*.ldf, and so on). Any attempts to manually attach the database may failif the user account does not yet have NTFS

Page 156

Workload protection Page 238 of 677unique target path for \level1\level2\database.mdf, the target path forlevel1\level2\level3\database.mdf will also

Page 157

Storage Mirroring Recover overview Page 23 of 677Application workloadsApplication workload protection provides high availability for Exchange, SQL,Bla

Page 158

Workload protection Page 239 of 677Configuring file server protectionIf you are protecting a file server, you can specify the file shares that you wan

Page 159

Workload protection Page 240 of 677Configuring BlackBerry database protection1. Make sure you have a valid domain and servers specified, click Configu

Page 160

Workload protection Page 241 of 677service(s).7. Under BlackBerry Services, Application Manager automatically determines theappropriate BlackBerry se

Page 161

Workload protection Page 242 of 677Mirroring data1. Make sure you have a valid domain and servers specified, click Configure fromthe main Application

Page 162 - Updating shares on the target

Workload protection Page 243 of 677Application advanced settingsYou can configure advanced settings for you application connection. The advancedsettin

Page 163

Workload protection Page 244 of 677Configuring the replication setApplication Manager automatically creates a replication set with a name based on the

Page 164

Workload protection Page 245 of 677if you launched Application Manager in standard or advanced mode.2. To modify the replication set definition, selec

Page 165 - Server settings

Workload protection Page 246 of 677Configuring scriptsScripts are executed at different points during failover, failback, and restoration. Thescripts

Page 166 - Identifying a server

Workload protection Page 247 of 677Configuring Active DirectoryIf you are protecting Exchange, you can configure several settings for Active Directory

Page 167

Workload protection Page 248 of 677This setting is cleared when protection is enabled, which prevents SMTPqueuing issues when trying to deliver messag

Page 168 - Licensing a server

Storage Mirroring Recover overview Page 24 of 677Virtual workloadsVirtual workload protection provides high availability to Hyper-V or ESXvirtual ser

Page 169

Workload protection Page 249 of 677Configuring items to failoverIf you are performing an identity failover, then you have already selected the Items t

Page 170

Workload protection Page 250 of 677Configuring default connection parametersSeveral default connection options are available which allow you to disabl

Page 171

Workload protection Page 251 of 677Using NAT or firewalls with application workloadsIf your source and target are on opposite sides of a NAT or firewa

Page 172

Workload protection Page 252 of 677Application workload portsBy default, Storage Mirroring Recover uses port 6320 for all TCPand UDPcommunications.

Page 173

Workload protection Page 253 of 677Microsoft Windows portsApplication workload protection uses WMI (Windows Management Instrumentation)which uses RPC

Page 174 - Queuing data

Workload protection Page 254 of 677Hardware portsYou need to configure your hardware so that the application workload ports andMicrosoft Windows ports

Page 175

Workload protection Page 255 of 677Exchange Failover UtilityWhen you configure Exchange for protection, Application Manager creates customizedscripts

Page 176

Workload protection Page 256 of 677be able to locate this file which could impede assistance throughTechnical Support.l NORUS—Do not change the Recipi

Page 177

Workload protection Page 257 of 677l DC domain_name | IPaddress—Name or IPaddress of the domaincontroller to make updates onl SDOMAIN—Source domain n

Page 178

Workload protection Page 258 of 677Virtual server protectionSelect a link to jump to instructions that correspond with your virtual configuration.l Ph

Page 179

Storage Mirroring Recover overview Page 25 of 677Cluster workloadsIn a standard cluster configuration, a single copy of data resides on a SCSI disk th

Page 180

Workload protection Page 259 of 677Protecting a physical or virtual server to a Hyper-V or ESXserverUse these instructions to protect a physical or vi

Page 181

Workload protection Page 260 of 677Your source can have no more than four NICs enabled, except if yoursource is ESX version 4.x. In that case, you can

Page 182

Workload protection Page 261 of 677l Server—Specify the name or IP address of the target server. You can clickBrowse to select a server from a network

Page 183

Workload protection Page 262 of 677l VirtualCenter Server—Select your VirtualCenter server from the list. If yourVirtualCenter server is not in the li

Page 184

Workload protection Page 263 of 677l Select the volume on the target server—Select one of the volumes fromthe list to indicate which volume on the tar

Page 185

Workload protection Page 264 of 677l Select the datastore on the target ESXserver—Select one of the volumesfrom the list to indicate where on the tar

Page 186

Workload protection Page 265 of 677In order for Storage Mirroring Recover to find the pre-existing disk, the virtualdisk file names must be formatted

Page 187

Workload protection Page 266 of 677l Replica virtual machine display name—Specify the name of the replicavirtual machine. This will be the display nam

Page 188

Workload protection Page 267 of 677Gateways, and DNSServer addresses. If you do not specify any networkconfiguration, the replica virtual machine wil

Page 189 - E-mailing event messages

Workload protection Page 268 of 677Note: The system volume must be an IDEcontroller. In addition, up to twomore volumes can be attached to an IDE con

Page 190

Storage Mirroring Recover overview Page 26 of 677In a GeoCluster configuration, data is stored on volumes local to each node andreplicated to each nod

Page 191

Workload protection Page 269 of 677The fields on this screen will vary depending on if you are using an ESXtarget or aHyper-V target.l Compress data

Page 192 - Full-server protection

Workload protection Page 270 of 677where redundant interfaces and high-speed, reliable network links areavailable to prevent the false detection of fa

Page 193 - Finding a compatible target

Workload protection Page 271 of 677Protecting a Hyper-V server to a Hyper-V serverUse these instructions to protect a virtual machine on a Hyper-V ser

Page 194

Workload protection Page 272 of 677l User name—Specify a user that is a member of the Double-Take Admin andlocal administrator security groups on the

Page 195

Workload protection Page 273 of 677l Server—Specify the name or IP address of the Hyper-V target server. Youcan click Browse to select a server from a

Page 196

Workload protection Page 274 of 677l Full path where the replica virtual machine will be stored—Specify alocation on the selected Volume to store the

Page 197

Workload protection Page 275 of 677l Replica virtual machine display name—Specify the name of the replicavirtual machine. This will be the display nam

Page 198

Workload protection Page 276 of 677be prompted to provide credentials for the virtual machine. Enter the DNSName/IP Address, User name, and Password

Page 199

Workload protection Page 277 of 677the source. When the target receives the compressed data, it decompressesit and then writes it to disk.l Limit band

Page 200

Workload protection Page 278 of 677l Require manual intervention before actually failing over—Whenselected, you will be prompted for failover when a f

Page 201

Storage Mirroring Recover overview Page 27 of 677Supported configurationsStorage Mirroring Recover is an exceptionally flexible product that can be us

Page 202

Workload protection Page 279 of 677Configuring Hyper-V Pro tip integration for failover notificationMicrosoft System Center Virtual Machine Manager (S

Page 203

Workload protection Page 280 of 677Protecting an ESX server to an ESX serverUse this process to protect a virtual machine on an ESX server, where you

Page 204 - Routing data transmissions

Workload protection Page 281 of 677Configuring ports1. Because the Storage Mirroring Recover for Virtual Infrastructure console uses SSHto communicate

Page 205 - Mirroring data

Workload protection Page 282 of 677Configuring root or non-root loginYou must configure both your source and target ESXservers to allow either root o

Page 206 - Compressing data

Workload protection Page 283 of 677Establishing ESX to ESX protection1. Open the Storage Mirroring Recover for Virtual Infrastructure console by selec

Page 207

Workload protection Page 284 of 677l Source VirtualCenter server—Select the VirtualCenter server thatadministrators the virtual machine you want to pr

Page 208 - Full-server ports

Workload protection Page 285 of 677l User name—Specify the user account that will log in to the ESXserver.l Password—Specify the password associated

Page 209 - Microsoft Windows ports

Workload protection Page 286 of 677l Choose a target datastore—Select a datastore in the table that is largeenough to hold the source virtual machine.

Page 210 - Hardware ports

Workload protection Page 287 of 6773. Click View replica virtual machine disk mapping to determinethe proper location on the target to copy the .vmdk

Page 211 - Application protection

Workload protection Page 288 of 677l Map replica virtual network adapters to target VSwitches—Identify howyou want to handle the network mapping after

Page 212 - Protecting an application

Storage Mirroring Recover overview Page 28 of 677One-to-one, active/standbyDescriptionOne target server, having no production activity, is dedicated t

Page 213

Workload protection Page 289 of 677may generate unpredictable results on the source and target virtualmachines.Storage Mirroring Recover for Virtual I

Page 214

Workload protection Page 290 of 677Optional ESX protection settingsOptional protection settings are available when configuring an ESXto ESXprotectio

Page 215

Workload protection Page 291 of 677Scheduling protection1. From the Protection summary page, click Schedule.2. If you want to start the protection imm

Page 216

Workload protection Page 292 of 677Changing the name of the protection job1. From the Protection summary page, click Change in the Name section.2. Spe

Page 217

Workload protection Page 293 of 677Setting transmission options1. From the Protection summary page, click Change in the Data transmissionsection.2. Sp

Page 218

Workload protection Page 294 of 677l Limit bandwidth—Bandwidth limitations are available to restrict the amountof network bandwdith used for Storage M

Page 219

Workload protection Page 295 of 677E-mailing notifications1. From the Protection summary page, click Change in the E-mail notificationssection.Note: I

Page 220

Workload protection Page 296 of 677Updating VirtualCenter credentials1. If you configured VirtualCenter servers when you established protection, you c

Page 221

Workload protection Page 297 of 677Configuring restart and threshold options1. From the Protection summary page, click Change in the Restart andthresh

Page 222

Workload protection Page 298 of 677Using firewalls with virtual workloadsIf your source and target are on opposite sides of a firewall, you will need

Page 223

Table of ContentsStorage Mirroring Recover overview 15Core operations 16Mirroring 17Replication 18Failure monitoring and failover 19Restoration 20Stor

Page 224

Storage Mirroring Recover overview Page 29 of 677One-to-one, active/activeDescriptionEach server acts as both a source and target actively replicating

Page 225

Workload protection Page 299 of 677Virtual workload portsBy default, Storage Mirroring Recover uses port 6320 for all TCPand UDPcommunications. To v

Page 226

Workload protection Page 300 of 677Microsoft Windows portsVirtual workload protection uses WMI (Windows Management Instrumentation) whichuses RPC (Rem

Page 227

Workload protection Page 301 of 677Hardware portsYou need to configure your hardware so that the Storage Mirroring Recover ports andMicrosoft Windows

Page 228

Workload protection Page 302 of 677Cluster protectionYour cluster protection will depend on the type of cluster configuration you are using.l Standard

Page 229

Workload protection Page 303 of 677Protecting a standard clusterUse the following steps to protect a standard cluster, where a single copy of data res

Page 230

Workload protection Page 304 of 677Note: If your source is a cluster, you need to create the replication set on the nodewhich currently owns the group

Page 231

Workload protection Page 305 of 677f. After selecting the data for this replication set, right-click the new replicationset icon and select Save. A sa

Page 232

Workload protection Page 306 of 677b. Record the exact drive and directories of each path displayed, includingwhere the rule is included or excluded a

Page 233

Workload protection Page 307 of 6775. On your cluster (source and/or target), you need to disable the standard StorageMirroring Recover connection con

Page 234

Workload protection Page 308 of 6777. If your source is a cluster, establish your connection by creating and bringingonline a Double-Take Source Conne

Page 235

Storage Mirroring Recover overview Page 30 of 677Many-to-oneDescriptionMany source servers are protected by one target server.ApplicationsThis configu

Page 236

Workload protection Page 309 of 677Establishing your connection on Windows 20031. From the Cluster Administrator, right-click on the group and virtual

Page 237

Workload protection Page 310 of 677l Replication Set—Select the Storage Mirroring Recover replication set thatyou want to use. If the replication set

Page 238

Workload protection Page 311 of 677l Fixed Bandwidth Limit—Data will be transmitted according to the user-specified bandwidth configuration. By defaul

Page 239

Workload protection Page 312 of 677l File differences—Only those files that are different based size or date andtime will be sent from the source to t

Page 240

Workload protection Page 313 of 677l Initial Verification Start—Specify when you want a verification process to beperformed. You can select the immedi

Page 241

Workload protection Page 314 of 677Establishing your connection on Windows 20081. From the Failover Cluster Management applet, right-click on the grou

Page 242

Workload protection Page 315 of 677l Replication Set—Select the Storage Mirroring Recover replication set thatyou want to use. If the replication set

Page 243

Workload protection Page 316 of 677l No Bandwidth Limit—Data will be transmitted using all availablebandwidth.l Fixed Bandwidth Limit—Data will be tra

Page 244 - Application advanced settings

Workload protection Page 317 of 6778. Select the Orphans tab and specify your Storage Mirroring Recover orphan fileparameters. By default, the orphan

Page 245

Workload protection Page 318 of 6779. Select the Compression tab and specify your Storage Mirroring Recovercompression parameters. By default, compres

Page 246

Storage Mirroring Recover overview Page 31 of 677One-to-manyDescriptionOne source server sends data to multiple target servers. The targetservers may

Page 247

Workload protection Page 319 of 67710. Select the Mirror Properties tab and specify how you want to mirror the data.l Full Mirror—All files in the rep

Page 248

Workload protection Page 320 of 677applications, it is critical that all files, not just some of them thatmight be newer, get mirrored.l Use block che

Page 249

Workload protection Page 321 of 677calendar allowing easy selection of any date. Time is formatted for any AM orPM time.l Reverification Interval—Sele

Page 250

Workload protection Page 322 of 677Protecting a GeoClusterThe GeoCluster Replicated Disk resource allows for the real-time copy of data to beavailable

Page 251

Workload protection Page 323 of 677Creating the GeoCluster Replicated Disk Resource on Windows 20031. Select Start, Programs, Administrative Tools, Cl

Page 252

Workload protection Page 324 of 677Mirroring Recover and your public traffic. If you have three routes, separatethe public traffic and then separate S

Page 253 - Application workload ports

Workload protection Page 325 of 677Creating the GeoCluster Replicated Disk Resource on Windows 20081. Select Start, Programs, Administrative Tools, Fa

Page 254

Workload protection Page 326 of 677l Delay connection until resources dependent on this one are online—This option allows you to delay a Storage Mirro

Page 255

Workload protection Page 327 of 677Bringing the resource onlineThe GeoCluster Replicated Disk resource will appear offline after it is created. Whenyo

Page 256 - Exchange Failover Utility

Workload protection Page 328 of 677Taking the resource offlineWhen you take the GeoCluster Replicated Disk resource offline, the following actionsoccu

Page 257

Storage Mirroring Recover overview Page 32 of 677ChainedDescriptionThe source servers sends replicated data to a target server, which acts asa source

Page 258

Workload protection Page 329 of 677GeoCluster resource propertiesResource properties are displayed differently in Windows 2003 and Windows 2008. Forex

Page 259 - Virtual server protection

Workload protection Page 330 of 677GeoCluster Replicated Disk properties on Windows 2003There are six properties tabs for the GeoCluster Replicated Di

Page 260

Workload protection Page 331 of 677to remain in a pending state before it fails. If the resource takes longer thanthe time specified to be brought onl

Page 261

Workload protection Page 332 of 677algorithms available for your operating system, you may see a slider bar indicatingdifferent compression levels. Se

Page 262

Workload protection Page 333 of 677GeoCluster Replicated Disk properties on Windows 2008There are eight properties tabs for the GeoCluster Replicated

Page 263

Workload protection Page 334 of 677The GeoCluster Replicated Disk resource must have at least twopossible owners to function properly.l Basic resource

Page 264

Workload protection Page 335 of 677are attempting to open files exclusively while GeoCluster is mirroring thosefiles is removed.l Enable orphans—An or

Page 265

Workload protection Page 336 of 677Configuring failover monitoringIf you are configuring failover monitoring for a cluster workload, use the same proc

Page 266

Workload protection Page 337 of 677Special configurationsStorage Mirroring Recover can be implemented with very little configuration necessaryin small

Page 267

Workload protection Page 338 of 677Domain controllersFailover of domain controllers is dependent on the Storage Mirroring Recoverfunctionality you are

Page 268

Storage Mirroring Recover requirements Page 33 of 677Storage Mirroring Recover requirementsEach Storage Mirroring Recover server must meet minimum req

Page 269

Workload protection Page 339 of 677NetBIOSBecause NetBIOS is not available on Windows 2008, if you are using Windows 2008 ina workgroup environment an

Page 270

Workload protection Page 340 of 677WINSWhen Storage Mirroring Recover failover occurs, Windows initiates WINS registrationwith the target’s primary WI

Page 271

Workload protection Page 341 of 677WINS registrationWINS registration can be added to your failover and failback scripts by using theWindows NETSH com

Page 272

Workload protection Page 342 of 677WINS replicationWINS replication can be added to your failover and failback scripts by using theWindows NETSH comma

Page 273

Workload protection Page 343 of 677DNSIf you are using a Microsoft DNSserver, when Storage Mirroring Recover failoveroccurs, DNS is not automatically

Page 274

Workload protection Page 344 of 677Windows DNSCMD commandDNS updates can be added to your failover and failback scripts by using the WindowsDNSCMD com

Page 275

Workload protection Page 345 of 677l Fully qualified domain name of the DNS server—DNSServer.domain.coml DNS zone—domain.comYou would add the followin

Page 276

Workload protection Page 346 of 677Storage Mirroring Recover DFO utilityDNS updates can be added to your failover and failback scripts by using the St

Page 277

Workload protection Page 347 of 677syntax.CommandDFODescriptionUsed in scripts to failover DNSserver nameSyntaxDFO [/DNSSRVNAME <dns_server_name&g

Page 278

Workload protection Page 348 of 677l PASSWORD password—The password associated with theuser accountl DNSZONE zone_name—The name of the DNS zone or DNS

Page 279

Storage Mirroring Recover requirements Page 34 of 677General source and target server requirementsVerify that each server meets the following general

Page 280

Workload protection Page 349 of 677l ADDOMAIN active_directory_domain_name—The name of theActive Directory domainl SOURCEDN source_domain_name—The nam

Page 281

Workload protection Page 350 of 677Non-Microsoft DNSIf you are using a non-Microsoft DNSserver (such as Unix) or if you are in a non-domainconfigurat

Page 282 - Configuring ports

Workload protection Page 351 of 67711. Add the following line to the failback script file, substituting your Storage MirroringRecover directory for in

Page 283

Workload protection Page 352 of 677Macintosh sharesA share is any volume, drive, or directory resource that is shared across a network.During failover

Page 284

Workload protection Page 353 of 677rem The following command starts the File Server for Macintosh servicenet start "File server for Macintosh&quo

Page 285

Workload protection Page 354 of 677NFS SharesA share is any volume, drive, or directory resource that is shared across a network.During failover, the

Page 286

Workload monitoring Page 355 of 677Workload monitoringOnce a workload protection is established you will want to monitor the protection. Youcan monito

Page 287

Workload monitoring Page 356 of 677Data workloadsWhen you are working with data workloads, you can monitor the connection and you canmonitor the statu

Page 288

Workload monitoring Page 357 of 677Monitoring a data workloadWhen a source is highlighted in the left pane of the Replication Console, theconnections

Page 289

Workload monitoring Page 358 of 677Connection statistics1. You can change the statistics that are displayed by selecting File, Options andselecting th

Page 290

Storage Mirroring Recover requirements Page 35 of 677on. Additionally, on a target server, you need sufficient disk space to store thereplicated data

Page 291

Workload monitoring Page 359 of 677Target Data Statel OK—The data on the target is in a good state.l Mirroring—The target is in the middle of a mirror

Page 292

Workload monitoring Page 360 of 677Mirror Statusl Mirroring—If the file size of the replication set has not been calculatedand the data is being mirro

Page 293 - 3. Click Save

Workload monitoring Page 361 of 677Sent (Bytes)The sent (bytes) statistic indicates the total number of mirror andreplication bytes that have been tra

Page 294

Workload monitoring Page 362 of 677compression is disabled, this statistic will be the same as sent mirror(bytes).Skipped Mirror (Bytes)The skipped mi

Page 295

Workload monitoring Page 363 of 677Connection and server displayYou can configure when the icons and colors change to accommodate your networkenvironm

Page 296

Workload monitoring Page 364 of 677—A red X on a server icon indicates the Replication Console cannotcommunicate with that server or there is a proble

Page 297

Workload monitoring Page 365 of 677once communications have stopped. Once communications have beenreestablished, the connection background will change

Page 298

Workload monitoring Page 366 of 677Monitoring failover monitoringSince it can be essential to quickly know the status of failover monitoring, StorageM

Page 299

Workload monitoring Page 367 of 677The Failover Control Center does not have to be running for failover to occur.The following table identifies how th

Page 300 - Virtual workload ports

Workload monitoring Page 368 of 677Status BarThe status bar displays the source machine and IP address currentlybeing assumed by the target.Colored Bu

Page 301

Storage Mirroring Recover requirements Page 36 of 677installed, you will need to review the patches available on the Microsoft website and install tho

Page 302

Workload monitoring Page 369 of 677Monitoring a full-server workloadAfter you have enabled full-server protection, you can monitor the protection from

Page 303 - Cluster protection

Workload monitoring Page 370 of 677determine the status of the source. If the source is still up and users are accessingit, you need to resolve the co

Page 304 - Protecting a standard cluster

Workload monitoring Page 371 of 677Monitoring an application workloadAfter you have enabled application protection, you can monitor the protection fro

Page 305

Workload monitoring Page 372 of 677l Restoring—Data is being restored from the target to the sourcel Unknown—The mirror status could not be determined

Page 306

Workload monitoring Page 373 of 677l Target path unblocked—Target path blocking is disabledl Unknown—The state could not be determinedConnected SinceT

Page 307

Workload monitoring Page 374 of 677Monitoring virtual workloadsWhen you are working with virtual workloads, you can monitor the connection and youcan

Page 308

Workload monitoring Page 375 of 677Monitoring virtual workloads in the Storage MirroringConsoleClick Monitor Connections from the main Storage Mirrori

Page 309

Workload monitoring Page 376 of 677Overview connection information displayed in the top paneThe top pane displays high-level overview information abou

Page 310

Workload monitoring Page 377 of 677l Percentage Complete—If the amount of data to be mirrored has beencalculated and data is actively being mirrored t

Page 311

Workload monitoring Page 378 of 677Filtering the connections displayed in the top paneYou can filter the connections displayed in the top pane using t

Page 312

Storage Mirroring Recover requirements Page 37 of 677Foundation EditionWindows 2003 and 2003 R2 operating systemsl Storage Server Editionl Small Busin

Page 313

Workload monitoring Page 379 of 677Detailed connection information displayed in the bottom paneThe details displayed in the bottom pane of the Monitor

Page 314

Workload monitoring Page 380 of 677Protection statusThe status of the workload protectionProtected volumesThe volumes that are being protectedTarget d

Page 315

Workload monitoring Page 381 of 677Connection controls available in the bottom paneThe connection controls available in the bottom pane of the Monitor

Page 316

Workload monitoring Page 382 of 677Stop protectionStops the selected connectionFailoverInitiate failover by shutting down the source and starting the

Page 317

Workload monitoring Page 383 of 677Viewing connection detailsThe View Connection Details page allows you to view information about a specificconnectio

Page 318

Workload monitoring Page 384 of 677Target data statel OK—The data on the target is in a good state.l Mirroring—The target is in the middle of a mirror

Page 319

Workload monitoring Page 385 of 677l Mirroring—If the file size of the replication set has not been calculatedand the data is being mirrored to the ta

Page 320

Workload monitoring Page 386 of 677l Failed—The Storage Mirroring service is not receiving replicationoperations from the Storage Mirroring driver. Ch

Page 321

Workload monitoring Page 387 of 677Monitoring virtual workloads in the Storage MirroringRecover for Virtual Infrastructure consoleSelect Monitor prote

Page 322

Workload monitoring Page 388 of 677Overview connection information displayed in the top paneThe top pane displays high-level overview information abou

Page 323 - Protecting a GeoCluster

Storage Mirroring Recover requirements Page 38 of 677Standard EditionWindows 2003 and 2003 R2 operating systemsl Storage Server Editionl Small Busines

Page 324

Workload monitoring Page 389 of 677Detailed connection information displayed in the bottom paneWhen the View protection details button in the toolbar

Page 325

Workload monitoring Page 390 of 677Connection controlsThe connection controls are available in the toolbar of the Monitor protection page.—Opens the P

Page 326

Workload monitoring Page 391 of 677Monitoring a cluster workloadIn a standard cluster configuration, where a single copy of data resides on a SCSI dis

Page 327

Workload monitoring Page 392 of 677Resolving an online pending GeoCluster Replicated DiskresourceWhen the GeoCluster Replicated Disk resource is in an

Page 328 - Bringing the resource online

Workload monitoring Page 393 of 677Windows 2008 MenuDiscard QueueDescriptionIf you have data in the target queue, you can discard that data. If youdis

Page 329 - Taking the resource offline

Workload monitoring Page 394 of 677Windows 2003 MenuAccept DataWindows 2008 MenuAcceptDescriptionIf you accept the data, the current data on the node

Page 330

Workload monitoring Page 395 of 677GeoCluster Replicated Disk Status ResourceThe function of the GeoCluster Replicated Disk Status resource (also disp

Page 331

Workload monitoring Page 396 of 677Log filesVarious Storage Mirroring Recover components (Storage Mirroring service, ReplicationConsole, Failover Cont

Page 332

Workload monitoring Page 397 of 677Viewing the log fileYou can view the Storage Mirroring Recover log file through the Replication Console orthrough a

Page 333

Workload monitoring Page 398 of 677Viewing the log file through the Replication Console1. Open a new message window using any of the following methods

Page 334

Application workload requirements 46Exchange protection requirements 48SQL protection requirements 52BlackBerry protection requirements 54File Server

Page 335

Storage Mirroring Recover requirements Page 39 of 677Advanced EditionWindows 2003 and 2003 R2 operating systemsl Storage Server Editionl Small Busines

Page 336

Workload monitoring Page 399 of 6773. To control the window after it is created, use one of the following methods toaccess the control methods listed

Page 337

Workload monitoring Page 400 of 6774. To change which server you are viewing messages for, select a different machinefrom the drop down list on the to

Page 338 - Special configurations

Workload monitoring Page 401 of 677Viewing the log file through a text editorThe log files can be viewed, from the location where Storage Mirroring Re

Page 339 - Domain controllers

Workload monitoring Page 402 of 677Mirroring Servers09/11/2010 12:45:53.9580 704 1032 3 2 0 Adding default group: StorageMirroring Servers\Auto-Discov

Page 340

Workload monitoring Page 403 of 677Filtering the log fileLog file output can be filtered using the LogViewer utility. Use the LogViewer commandfrom th

Page 341

Workload monitoring Page 404 of 677l NOID—Does not display the LogViewer ID in the outputl HELP—Displays the command optionsExamplesl LogViewer -type

Page 342 - WINS registration

Workload monitoring Page 405 of 677Configuring the properties of the log file1. To modify the maximum file size and the number of Storage Mirroring Re

Page 343 - WINS replication

Workload monitoring Page 406 of 677Storage Mirroring Recover log messagesThe following list describes some of the standard Storage Mirroring Recover a

Page 344

Workload monitoring Page 407 of 67773 Connected to ip://xxx.xxx.xxx.xxxA source machine has successfully connected a replication set to a targetmachin

Page 345 - Windows DNSCMD command

Workload monitoring Page 408 of 67781 Schedule transmit start to targetA scheduled transmission of data from a source machine to a targetmachine has s

Page 346

Storage Mirroring Recover requirements Page 40 of 677Premium EditionWindows 2003 and 2003 R2 operating systemsl Storage Server Editionl Small Business

Page 347

Workload monitoring Page 409 of 67794 Verification started con_idThe verification process of confirming that the Storage Mirroring Recoverdata on the

Page 348

Workload monitoring Page 410 of 67710003 Activation code violation with machine machine_nameDuplicate single-server activation codes are being used on

Page 349

Workload monitoring Page 411 of 677l (112) Disk full: The disk to which data is being written on the target isfull. This issue may be resolved by dele

Page 350

Workload monitoring Page 412 of 677503010 Asyncloctl for status thread 178 terminated, terminating the status threadA Storage Mirroring Recover proces

Page 351 - Non-Microsoft DNS

Workload monitoring Page 413 of 677Monitoring event messagesAn event is a significant occurrence in the system or in an application that requiresadmin

Page 352

Workload monitoring Page 414 of 677Event messagesThe following table identifies the Storage Mirroring events.1 This evaluation period has expired. Mir

Page 353 - Macintosh shares

Workload monitoring Page 415 of 6771003 The Double-Take counter DLL could not open the "Performance" key in theDouble-Take section of the re

Page 354

Workload monitoring Page 416 of 6774006 Service has aborted due to the following unrecoverable error: %1Error—Restart the Storage Mirroring service.40

Page 355 - NFS Shares

Workload monitoring Page 417 of 6774018 %1, however, mirroring and replication have been disabled as a restore isrequired due to a previous failover.W

Page 356 - Workload monitoring

Workload monitoring Page 418 of 6774030 RSResource.dll has an unknown error. The product functionality has beendisabled.Error—Reinstall the software,

Page 357 - Data workloads

Storage Mirroring Recover requirements Page 41 of 677Virtual Guest 5-Pack EditionWindows 2003 and 2003 R2 operating systemsl Storage Server Editionl S

Page 358 - Monitoring a data workload

Workload monitoring Page 419 of 6774037 Error verifying the vendor URL name. The product functionality has beendisabled.Error—Reinstall the software,

Page 359 - Connection statistics

Workload monitoring Page 420 of 6774044 An error was encountered and replication has been stopped. It is necessaryto stop and restart the service to c

Page 360

Workload monitoring Page 421 of 6774054 Service has paused a restore task to %1 (%2) for Replication Set %3, ID: %4Information—No action required.4055

Page 361

Workload monitoring Page 422 of 6774066 The product code requires a virtual server environment. The productfunctionality has been disabled.Error—The a

Page 362

Workload monitoring Page 423 of 6774098 The control device %2 was not created. Communication with the service willbe disabled. Reboot the server and c

Page 363

Workload monitoring Page 424 of 6774111 Target can not write %1 due to a sharing violation. Operation will be retried(%2 times or forever)Warning—A sh

Page 364 - Connection and server display

Workload monitoring Page 425 of 677scenarios did not cause the task to be discarded, contact technicalsupport.4202 Running %1 in band script: %2 (task

Page 365

Workload monitoring Page 426 of 6774306 Target paths for source %1 (%2) Connection id: %3 are already blockedWarning—No action required.4307 Target pa

Page 366

Workload monitoring Page 427 of 6774407 Disabled snapshot schedule for source %1 (%2) connection %3.Information—No action required.4408 %1 was unable

Page 367

Workload monitoring Page 428 of 6775103 Started adding drive shares from %1 to %2.Information—No action required.5104 %1 drive shares were taken over

Page 368

Storage Mirroring Recover requirements Page 42 of 677Virtual Host Standard EditionWindows 2008 and 2008 R2 operating systemsl Standard EditionVirtual

Page 369

Workload monitoring Page 429 of 6775302 Drive share information for %1 has been updated on the target machine.Information—No action required.5303 The

Page 370

Workload monitoring Page 430 of 6775503 E-mail notification could not be processed. Check to make sure the correctversion of SMTPMail.DLL is registere

Page 371

Workload monitoring Page 431 of 6777107 The driver was unable to get valid name information from the Filter Managerfor a file. It cannot be replicated

Page 372

Workload monitoring Page 432 of 677repeatedly, contact technical support. The last Word in the Data window is the NTstatus code.Warning—Contact techni

Page 373

Workload monitoring Page 433 of 6779106 The driver encountered an error writing file security data to the service inputbuffer. Check the Event Viewer

Page 374

Workload monitoring Page 434 of 6779112 The driver encountered an error writing a directory query to the service inputbuffer. Check the Event Viewer A

Page 375 - Monitoring virtual workloads

Workload monitoring Page 435 of 677information or contact technical support. The last Word in the Data window is theexception code.Error—Check for rel

Page 376

Workload monitoring Page 436 of 677or contact technical support. The last Word in the Data window is the exceptioncode.Error—Check for related service

Page 377

Workload monitoring Page 437 of 67710005 Node %1 is taking ownership of the group %2. The group will be broughtonline on this node.Information—No acti

Page 378

Workload monitoring Page 438 of 67710102 The driver could not recall the file. The last Word in the Data window is theexception code.Error—Contact tec

Page 379

Storage Mirroring Recover requirements Page 43 of 677Virtual Host Advanced EditionWindows 2008 and 2008 R2 operating systemsl Standard Editionl Enterp

Page 380

Workload monitoring Page 439 of 67711011 Service has aborted the archive preview operation.Warning—Verify the activation code on the source and target

Page 381

Workload monitoring Page 440 of 67716384 The driver encountered an unrecoverable error. Contact technical support.Error—Contact technical support16385

Page 382

Workload monitoring Page 441 of 677E-mailing event messagesYou can e-mail Storage Mirroring Recover event messages to specific addresses. Thesubject o

Page 383

Workload monitoring Page 442 of 677Note: Any specified notification settings are retained when Enable notification isdisabled.5. Specify your e-mail s

Page 384 - Viewing connection details

Workload monitoring Page 443 of 677the list.Note: You can test e-mail notification by specifying the options on the E-mailNotification tab and clickin

Page 385

Workload monitoring Page 444 of 677StatisticsStatistics logging is the process of taking snapshots of Storage Mirroring Recoverstatistical data. The d

Page 386

Workload monitoring Page 445 of 677Configuring the properties of the statistics file1. Right-click a machine in the left pane of the Replication Conso

Page 387

Workload monitoring Page 446 of 677l Write Interval—The frequency in which Storage Mirroring Recover writes thestatistical data to the statistics log

Page 388

Workload monitoring Page 447 of 677Viewing the statistics fileThe statistics log file created is a binary file. To view the log file, you must run the

Page 389

Workload monitoring Page 448 of 677l -STOP mm/dd/yyyy hh:mm—Filters out any data after the specifieddate and timel -SERVER ip_address port_number—Conn

Page 390

Storage Mirroring Recover requirements Page 44 of 677Virtual Host Premium EditionWindows 2008 and 2008 R2 operating systemsl Standard Editionl Enterpr

Page 391 - Connection controls

Workload monitoring Page 449 of 677StatisticsThe following table identifies the Storage Mirroring statistics.Note: The categories you see will depend

Page 392 - Monitoring a cluster workload

Workload monitoring Page 450 of 677Kernel, SourceStatel 0—Source is not runningl 1—Source is running without the replication driverl 2—Source is runni

Page 393

Workload monitoring Page 451 of 677Kernel, FailedMirrorCountThe number of mirror operations that failed due to an error reading the filefrom the diskK

Page 394

Workload monitoring Page 452 of 677Target, Ops RemainingThe total number of operations that are left in the target queueTarget, Orphan Files RemovedTh

Page 395

Workload monitoring Page 453 of 677Connection, conPeerAddressThe IP address of the target machineConnection, connectTimeThe time that this connection

Page 396

Workload monitoring Page 454 of 677Connection, conBytesInRepQueueThe number of replication bytes remaining to be transmitted to the targetConnection,

Page 397 - Log files

Workload monitoring Page 455 of 677changes to a file, then it will indicate the number of bytes it did not send forthis file in this field.Connection,

Page 398 - Viewing the log file

Workload monitoring Page 456 of 677Performance MonitorPerformance Monitor is the Windows graphical tool for measuring performance. Itprovides charting

Page 399

Workload monitoring Page 457 of 677Monitoring Performance Monitor statistics1. To access the Performance Monitor, select Start, Programs, Administrati

Page 400

Workload monitoring Page 458 of 677Performance Monitor statisticsThe following table identifies the Storage Mirroring Performance Monitor statistics.N

Page 401

Storage Mirroring Recover requirements Page 45 of 677Full-server workload requirementsIf you will be protecting an entire server, the general source a

Page 402

Workload monitoring Page 459 of 677Connection, Operations receivedThe number of operations received by the target since the lastPerformance Monitor re

Page 403

Workload monitoring Page 460 of 677sources connected to this target. If the value grows larger than the numberof currently executing differences mirro

Page 404 - Filtering the log file

Workload monitoring Page 461 of 677Kernel, Replication Kbytes generatedThe number of replication kilobytes generated on the source by the filesystem d

Page 405

Workload monitoring Page 462 of 677Target, Orphan BytesThe number of orphan bytes removed from the targetTarget, Orphan DirectoriesThe number of orpha

Page 406

Workload monitoring Page 463 of 677SNMPSNMP, Simple Network Management Protocol, is the Internet's standard for remotemonitoring and management o

Page 407

Workload monitoring Page 464 of 677Configuring SNMP on your serverSNMP must be installed on a server before Storage Mirroring Recover in order for the

Page 408

Workload monitoring Page 465 of 677SNMP trapsThe following table lists the Storage Mirroring SNMP traps.Kernel, dttrapKernelStartedStorage Mirroring h

Page 409

Workload monitoring Page 466 of 677Connection, dttrapConnectionFailedThe source to target connection was not successfulConnection, dttrapConnectionLos

Page 410

Workload monitoring Page 467 of 677Mirroring, dttrapMirrorStopMirroring has stoppedMirroring, dttrapMirrorPauseMirroring has pausedMirroring, dttrapMi

Page 411

Workload monitoring Page 468 of 677SNMP statisticsThe following table lists the Storage Mirroring SNMP statistics.General, dtUpTimeTime in seconds sin

Page 412

Storage Mirroring Recover requirements Page 46 of 677Application workload requirementsIf you will be protecting an application, the general source and

Page 413

Workload monitoring Page 469 of 677General, dtDriverQueuePercentThe amount of throttling calculated as a percentage of the stop replicatinglimitSource

Page 414 - Monitoring event messages

Workload monitoring Page 470 of 6771—Active. This indicates that the connection is functioning normally andhas no scheduling restrictions imposed on i

Page 415 - Event messages

Workload monitoring Page 471 of 677Connection, dtconBytesCompressedTxThe total number of compressed bytes transmitted to the targetConnection, dtconOp

Page 416

Workload monitoring Page 472 of 677Error codesThe following table contains error codes that you may see in the various user interfacesor in log files.

Page 417

Workload monitoring Page 473 of 677-125 Connection is replicating-126 Connection is not replicating-127 Replication set is enabled-128 Schedule is not

Page 418

Workload monitoring Page 474 of 677-154 Transmission is active-155 Target does not support the command-156 Command conversion to accommodate a differe

Page 419

Workload monitoring Page 475 of 677-183 Connection ID specified is invalid-184 No command objects are in the queue-185 Target is discarding operations

Page 420

Workload monitoring Page 476 of 677-223 Script timeout met-224 No replication timeout met - connection is bad-225 Invalid path-226 Kernel module is no

Page 421

Workload monitoring Page 477 of 677-2401 Snapshot module is not loaded-2402 Error reading the snapshot .dll-2403 Snapshot not found-2404 No snapshot c

Page 422

Failover Page 478 of 677FailoverYour failover process will depend on the type of workload you are protecting.l Failing over data workloads, applicatio

Page 423

Storage Mirroring Recover requirements Page 47 of 677the Storage Mirroring Recover installation, or from a copy you have obtainedmanually from the Mic

Page 424

Failover Page 479 of 677Failing over data workloads, application workloadsconfigured for identity failover, and cluster workloadsThe failover process,

Page 425

Failover Page 480 of 677Select an option based on the table below. You may want to check the amount of data inqueue on the target by reviewing the Sta

Page 426

Failover Page 481 of 677After failover is complete, clients will be rerouted to the target, which is standing in for thesource.Exchange Note: Users us

Page 427

Failover Page 482 of 677After failing over SQL 2008, you may not be able to take the SQLdatabase offline. If this occurs, stop and restart the SQLSer

Page 428

Failover Page 483 of 677Full-server workload failoverFull-server failover can be initiated through the Full-Server Failover Manager client or byusing

Page 429

Failover Page 484 of 677Failing over using the Full-Server Failover ManagerWhen a failover condition is met, you will want to start failover. Addition

Page 430

Failover Page 485 of 677l Revert to specified snapshot—Select this option, and then select asnapshot. The data on thetarget will be reverted to the s

Page 431

Failover Page 486 of 677l KMS volume licensing—Key Management Service (KMS) licensing allows ITprofessionals to complete activations on their local ne

Page 432

Failover Page 487 of 677Failing over from the command lineYou can configure connections and initiate failover without using the Full-ServerFailover Ma

Page 433

Failover Page 488 of 677l LOGLEVEL number—Specifies the level of detailed logged based onthe following numbers.l 2—Informational messages are loggedl

Page 434

Storage Mirroring Recover requirements Page 48 of 677Exchange protection requirementsIn addition to the general application requirements, you must als

Page 435

Failover Page 489 of 6771. View or download the Microsoft Volume ActivationDeployment Guide from the Microsoft web site.2. Using an administrative use

Page 436

Failover Page 490 of 677Failing over application workloads configured forDNSfailoverWhen a failover condition has been met, failover will be triggere

Page 437

Failover Page 491 of 6773. Specify if you want to perform an immediate or graceful failover. An immediatefailover begins immediately without waiting f

Page 438

Failover Page 492 of 677l Revert to specified snapshot—Select this option, and then select asnapshot. The data on thetarget will be reverted to the s

Page 439

Failover Page 493 of 677Outlook Web Access is not needed, contact technical support for aworkaround.If you SMTP gateway is configured to send e-mail t

Page 440

Failover Page 494 of 677Virtual workload failoverWhen a failover condition has been met, failover will be triggered automatically if youconfigured aut

Page 441

Failover Page 495 of 677Failing over virtual workloads in the Storage MirroringConsole1. On the Monitor Connections page, select the connection that y

Page 442

Failover Page 496 of 677shutdown and the protection job will be restarted performing a file differencesremirror.

Page 443

Failover Page 497 of 677Failing over virtual workloads in the Storage MirroringRecover for Virtual Infrastructure console1. Make sure your protection

Page 444

Failback and restore Page 498 of 677Failback and restoreYour failover and restoration process will depend on the type of workload you areprotecting.l

Page 445 - Statistics

Viewing server details 92Viewing server events 94Providing server credentials 95Managing VirtualCenter servers 96Console options 97Setting the frequen

Page 446

Storage Mirroring Recover requirements Page 49 of 677Microsoft Knowledge Base articles 822179, 332097, 305065, 304403, and875427.l The source and targ

Page 447

Failback and restore Page 499 of 677Data workload failback and restorationFailover occurred because the target was monitoring the source for a failure

Page 448 - Viewing the statistics file

Failback and restore Page 500 of 677Restoring then failing backRestoring before failing back allows your users to continue accessing their data on the

Page 449

Failback and restore Page 501 of 6779. From your target, confirm the Replication Console is communicating with thesource using the new IP address.a. F

Page 450

Failback and restore Page 502 of 677functionality (Microsoft failover from node to node) available duringthe restoration process, you will have to cre

Page 451

Failback and restore Page 503 of 677l Overwrite existing files during restore—This option restores allexisting files by overwriting them. Any files th

Page 452

Failback and restore Page 504 of 67711. After the Mirror Status is Idle, schedule a time for failback. User downtime willbegin once failback is starte

Page 453

Failback and restore Page 505 of 677k. Also on the source, change the source name back to its original name andreboot, or restart the Workstation, Ser

Page 454

Failback and restore Page 506 of 677Failing back then restoringFailback before restoration can be a simpler process, but it may require additionaldown

Page 455

Failback and restore Page 507 of 677Note: The source must be online and Storage Mirroring Recover must be runningto ensure that the source post-failba

Page 456

Failback and restore Page 508 of 677Note: If your target is a cluster, you can specify just one node in the clusterand restore only from that node. If

Page 457 - Performance Monitor

Storage Mirroring Recover requirements Page 50 of 677l Like-named cluster protection—If you are using Exchange 2003, you can protecta cluster with a l

Page 458

Failback and restore Page 509 of 677i. Select the Restore Replication Set check box to restore the target’s copy ofthe replication set database to the

Page 459

Failback and restore Page 510 of 6779. Because there are no users accessing the target data, the restoration process iscomplete when the Mirror Status

Page 460

Failback and restore Page 511 of 677Failing back and restoring a full-server workloadAfter your target has failed over and becomes your source, you ca

Page 461

Failback and restore Page 512 of 677Preparation of your original source or a new server source is key to this process. Thetype of preparation required

Page 462

Failback and restore Page 513 of 677remaining instructions.Note: If possible, you can attach any virtual hard disks that survived thefailure event to

Page 463

Failback and restore Page 514 of 6774. Stop all application services on the original source and set them to manual.5. Using the Replication Console, i

Page 464

Failback and restore Page 515 of 6772. Mirroring and replicating from the source to the original ornew source and failing over1. Using the Full-Server

Page 465

Failback and restore Page 516 of 677Application failback and restorationWhen protecting application workloads, your failback and restoration process w

Page 466 - SNMP traps

Failback and restore Page 517 of 677steps as a guideline for rebuilding the source server.1. Install Windows, and any service packs, using the same na

Page 467

Failback and restore Page 518 of 677Failback and restoration for applications configured foridentity failoverFor application workloads that were confi

Page 468

Storage Mirroring Recover requirements Page 51 of 677control to the target in the Configuration Naming Context in order to moveusers during failover.

Page 469 - SNMP statistics

Failback and restore Page 519 of 677Exchange 2003l MSExchangeSAl MSExchangeMGMTl POP3SVCl IMAP4SVCl ResVCl MSExchangeESl W3SVCl SMTPSVCSQL Serverl MSS

Page 470

Failback and restore Page 520 of 677File Serverl Serverl Computer Browser

Page 471

Failback and restore Page 521 of 677Restoring then failing back applications configured for DNSfailoverFor application workloads that were configured

Page 472

Failback and restore Page 522 of 677l Source IPAddress—Select an IP address on the source to handle therestoration data. In a cluster environment run

Page 473 - Error codes

Failback and restore Page 523 of 6774. Click Initiate Failback to being the failback process.Exchange Note: If you deslected any mail stores during yo

Page 474

Failback and restore Page 524 of 677Restoring then failing back virtual workloads1. Open the console you used to establish protection.2. On the Monito

Page 475

Connections Page 525 of 677ConnectionsA unique connection ID is associated with each Storage Mirroring Recover connection.The connection ID provides a

Page 476

Connections Page 526 of 677Data queuesDuring the Storage Mirroring Recover installation, you identified the amount of diskspace that can be used for S

Page 477

Connections Page 527 of 677has 10 KB left until the limit and the next operation to be applied to that fileis greater than 10 KB, a new transaction lo

Page 478

Connections Page 528 of 677Queuing dataYou should configure queuing on both the source and target.1. Open the Replication Console and right-click the

Page 479 - Failover

Storage Mirroring Recover requirements Page 52 of 677SQL protection requirementsIn addition to the general application requirements, you must also mee

Page 480

Connections Page 529 of 677l Select a dedicated, physical, non-boot volume.l Select a location on a non-clustered volume that will have minimalimpact

Page 481

Connections Page 530 of 677amount of physical memory available but has a minimum of 32 MB. Bydefault, 128 MB or 512 MB of memory is used, depending on

Page 482

Connections Page 531 of 677Note: The Maximum disk space for queue and Minimum Free Spacesettings work in conjunction with each other. For example, ass

Page 483

Connections Page 532 of 677Auto-disconnect and auto-reconnectWhile disk queues are user configurable and can be extensive, they are limited. If theamo

Page 484 - Full-server workload failover

Connections Page 533 of 677l Target service shutdown—If the target service is stopped and restarted, therecould have been data in the target queue whe

Page 485

Connections Page 534 of 677Reconnecting automaticallyUse the following steps to configure automatic reconnections.1. Open the Replication Console and

Page 486

Connections Page 535 of 677Pausing and resuming target processingYou can pause the target, which queues incoming Storage Mirroring Recover data fromth

Page 487

Connections Page 536 of 677Blocking writing to the target pathsYou can block writing to the paths on the target that contain the copy of the replicati

Page 488

Connections Page 537 of 677Disconnecting a connectionTo disconnect a Storage Mirroring Recover connection, open the Replication Console,and right-clic

Page 489

Mirroring Page 538 of 677MirroringMirroring is one of the key components of Storage Mirroring Recover. You can performthe following functions to manag

Page 490

Storage Mirroring Recover requirements Page 53 of 677l The source and target servers should be in the same domain. If they are not,the SQL Server serv

Page 491 - DNSfailover

Mirroring Page 539 of 677Stopping, starting, pausing, or resuming mirroringAfter a connection is established, you need to be able to control the mirro

Page 492

Mirroring Page 540 of 677File difference mirror options comparedl File Differences—Any file that is different on the source and target based on thedat

Page 493

Mirroring Page 541 of 677Mirroring automaticallyIn certain circumstances, for example if the disk-based queues on the source areexhausted, Storage Mir

Page 494

Mirroring Page 542 of 677l Full—All files are sent to the target.Note: Database applications may update files without changing the date,time, or file

Page 495 - Virtual workload failover

Mirroring Page 543 of 677Running scripts during mirroringYou can customize your mirroring process by running customized scripts on the target atpredef

Page 496

Mirroring Page 544 of 6774. For each of the three predefined points in the mirroring process, specify thefollowing information.l Script path—Specify t

Page 497 - Failover Page 496 of 677

Mirroring Page 545 of 677establish additional connections to the same target using the same target pathlocation, the mirror scripts will automatically

Page 498

Mirroring Page 546 of 677Removing orphan filesAn orphan file is a file that exists in the target’s copy of the replication set data, but itdoes not ex

Page 499 - Failback and restore

Mirroring Page 547 of 6774. To configure orphan files for processing during a mirror, verify, or restore, use thefollowing instructions.a. Right-click

Page 500

Mirroring Page 548 of 677so that the orphan files are only moved once.f. Specify if you want to Remove All Orphans or Remove Orphans notmodified withi

Page 501 - Restoring then failing back

Storage Mirroring Recover requirements Page 54 of 677BlackBerry protection requirementsIn addition to the general application requirements, you must a

Page 502

Replication Page 549 of 677ReplicationReplication is one of the key components of Storage Mirroring Recover. This sectioncontains the following replic

Page 503

Replication Page 550 of 677Replication capabilitiesStorage Mirroring Recover replicates file and directory data stored on any Windows filesystem (FAT,

Page 504

Replication Page 551 of 6773. If you select a dynamic volume and you increase the size of the volume, the targetmust be able to compensate for an incr

Page 505

Replication Page 552 of 677where the encrypted file is located is out of space, when it actually may bethe location where the temporary file is trying

Page 506

Replication Page 553 of 677restoration is complete and replication will continue from the target to thesource.e. If you have restored your data before

Page 507 - Failing back then restoring

Replication Page 554 of 677Replication setsA replication set defines the data on a source machine that Storage Mirroring Recoverprotects. Replication

Page 508

Replication Page 555 of 677l Calculating replication set sizel Deleting a replication setKeep in mind the following notes when creating and working wi

Page 509

Replication Page 556 of 677l If you rename the root folder of a connected replication set, Storage MirroringRecover interprets this operation as a mov

Page 510

Replication Page 557 of 677replication set to ensure the data is replicated to the correct location. (Thesecond file can be a zero byte file if desire

Page 511

Replication Page 558 of 677Creating a replication setBefore you can establish a connection, you must create a replication set.1. From the Replication

Page 512 - Full-server workload diagram

Storage Mirroring Recover requirements Page 55 of 677File Server protection requirementsIn addition to the general application requirements, you must

Page 513

Replication Page 559 of 677Note: Be sure and verify what files can be included by reviewing Replicationcapabilities.5. After selecting the data for th

Page 514 - 1B. Reusing your source

Replication Page 560 of 677Creating or modifying replication rules manuallyThere may be times when you cannot browse for data when creating a replicat

Page 515

Replication Page 561 of 677l Inc—Include indicates that the specified path is to be included in the filessent to the targetl Exc—Exclude indicates tha

Page 516

Replication Page 562 of 677Modifying a replication setStorage Mirroring Recover allows you to make modifications to a replication set whenyou want to

Page 517

Replication Page 563 of 677Renaming and copying a replication setTo rename or copy a replication set, open the Replication Console. Click once on ahig

Page 518

Replication Page 564 of 677Calculating replication set sizeWhile Storage Mirroring Recover is mirroring, the right pane of the Replication Consoledisp

Page 519

Replication Page 565 of 677Note: You can also configure the replication set calculation when establishing aconnection through the Connection Manager b

Page 520

Replication Page 566 of 677Deleting a replication setYou can only delete a replication set if it is not currently connected. If the replication setis

Page 521 - Computer Browser

Replication Page 567 of 677Starting replicationStarting replication when establishing a connection is the default and recommendedconfiguration. If rep

Page 522

Replication Page 568 of 677Inserting tasks during replicationTask command processing is a Storage Mirroring Recover feature that allows you toinsert a

Page 523

Storage Mirroring Recover requirements Page 56 of 677Virtual workload requirementsWhen you are protecting virtual server workloads, the general source

Page 524

Verification Page 569 of 677VerificationVerification is the process of confirming that the data on the target is identical to the dataon the source. V

Page 525

Verification Page 570 of 677Verifying manuallyA manual verification can be run anytime a mirror is not in progress.1. Open the Replication Console.2.

Page 526 - Connections

Verification Page 571 of 677blocks (not the entire files) that are different will be identified in the log andremirrored to the target.Note: Database

Page 527 - Data queues

Verification Page 572 of 677Verifying on a scheduleVerification can be scheduled to occur automatically at periodic intervals.1. Open the Replication

Page 528

Verification Page 573 of 6777. If you are remirroring your files, you can specify Only if Source file is newer thanTarget copy so that only files that

Page 529

Verification Page 574 of 677Configuring the verification logA verification log is created on the source during the verification process. The logidenti

Page 530

Verification Page 575 of 677name. For example, since the default is DTVerify.log, the verification log for thereplication set called UserData would be

Page 531

Verification Page 576 of 677File: beta\users\vincent\training.doc DIFFERENT ON TARGETSource Attributes: Timestamp = 1/12/2010 3:28:20 PM Size = 17 Ma

Page 532

Verification Page 577 of 6771. Each mask begins with 0x. Identify the hexadecimal number after the constant 0x.For example, if the mask is 0x23, then

Page 533

Verification Page 578 of 6770000000000100011, indicates read only, hidden, and archive. Another examplemight be mask 0x827 which converted to binary i

Page 534

Storage Mirroring Recover requirements Page 57 of 677Physical or virtual to Hyper-V requirementsUse these requirements if your source is a physical or

Page 535 - Reconnecting automatically

Verification Page 579 of 677Verify applications on the targetThe application verification process confirms that an Exchange or SQLapplicationdatabase

Page 536

Verification Page 580 of 677your environment, is available in the \Samples sub-directory of your StorageMirroring Recover installation.l Script to run

Page 537

Verification Page 581 of 677Verifying applications on the target from the command lineIf desired, you can verify your application on the target by usi

Page 538 - Disconnecting a connection

Verification Page 582 of 677the services you configured for application failover will be started whenthe test is performed. Use the ALL option if you

Page 539

Verification Page 583 of 677Notesl The application verification process from the command line is notavailable for Exchange or SQL in a cluster environ

Page 540

Data transmission Page 584 of 677Data transmissionStorage Mirroring Recover data is continuously transmitted to the target machine.Although the data m

Page 541

Data transmission Page 585 of 677Stopping, starting, pausing, and resumingtransmissionTo start, pause, or resume the transmission of data from the sou

Page 542 - Mirroring automatically

Data transmission Page 586 of 677Scheduling data transmissionUsing the Connection Manager Transmit tab, you can set start and stop criteria alongwith

Page 543

Data transmission Page 587 of 677l Transmission session start—This option establishes a date and time of theday to begin transmitting data. For exampl

Page 544

Data transmission Page 588 of 677cannot continue to queue data causing an auto-disconnect and the potentialfor loss of data. To avoid using the entire

Page 545

Storage Mirroring Recover requirements Page 58 of 677will also need version 3.5.1. You can install this version from the Storage MirroringRecover CD,

Page 546 - Mirroring Page 545 of 677

Data transmission Page 589 of 677l Time Limit—The time limit specifies the maximum length of time for eachtransmission period. Any data that is not se

Page 547 - Removing orphan files

Data transmission Page 590 of 677will be established when there is 10 MB of data in the queue. Thedata will be transmitted and when the 10 MB Byte Lim

Page 548

Data transmission Page 591 of 677l Enable Transmission Window—This option specifies whether atransmission window is in use.l Open window time—Specifie

Page 549

Data transmission Page 592 of 677Limiting transmission bandwidthBandwidth limitations are available to restrict the amount of network bandwidth used f

Page 550

Data transmission Page 593 of 6774. You have three bandwidth choices.l No Bandwidth Limit—Data will be transmitted at all times using all availableban

Page 551 - Replication capabilities

Data transmission Page 594 of 6777. If you want to transmit data according to a schedule using limited bandwidth, selectScheduled Bandwidth Limit.a. C

Page 552

Data transmission Page 595 of 677Note: You can establish a bandwidth schedule and then disable or override it byselecting No Bandwidth Limit or Fixed

Page 553

Data transmission Page 596 of 677Compressing data for transmissionTo help reduce the amount of bandwidth needed to transmit Storage Mirroring Recoverd

Page 554

Data transmission Page 597 of 6773. By default, compression is disabled. To enable it, select Enable Compression.4. Depending on the compression algor

Page 555 - Replication sets

Snapshots Page 598 of 677SnapshotsA snapshot is an image of data taken at a single point in time. Snapshots allow you toview files and folders as they

Page 556

Configuring the level of detail to log 124Clearing maintained security credentials 125Configuring how servers are added to the Full-Server Failover Ma

Page 557

Storage Mirroring Recover requirements Page 59 of 677Physical or virtual to ESX requirementsUse these requirements if your source is a physical or vir

Page 558

Snapshots Page 599 of 677functionality may have on Storage Mirroring Recover. For example, if you change thelocation where the shadow copies are store

Page 559

Snapshots Page 600 of 677Snapshots for data workloadsl Snapshot states explains the various states of data workload snapshots.l Automatic snapshots ex

Page 560 - Replication Page 559 of 677

Snapshots Page 601 of 677Snapshot statesA snapshot may not necessarily be useful if the data on the target is in a bad state. Youonly want snapshots o

Page 561

Snapshots Page 602 of 677Write operation retriedl State—Goodl Description—An operation cannot be written to the hard drive on the target. Forexample,

Page 562

Snapshots Page 603 of 677l Automatic action taken for scheduled and automatic snapshots—Scheduledand automatic snapshots will occur normally.l User in

Page 563 - Modifying a replication set

Snapshots Page 604 of 677l Automatic action taken for scheduled and automatic snapshots—Scheduledand automatic snapshots will be delayed until a resto

Page 564

Snapshots Page 605 of 677Automatic snapshotsWhen Storage Mirroring Recover transitions from a good state to a bad state, it willautomatically attempt

Page 565

Snapshots Page 606 of 677Scheduling snapshotsYou can schedule snapshots of your target data to fit your environment and needs. If thetarget data is in

Page 566

Snapshots Page 607 of 6776. Specify if you want the snapshots to start immediately. Otherwise, enter a date andtime for when the snapshot schedule wil

Page 567 - Deleting a replication set

Snapshots Page 608 of 677Taking snapshots manuallyYou can manually take a snapshot of the data on the target at any time. If an automatic orscheduled

Page 568 - Starting replication

Storage Mirroring Recover requirements Page 60 of 677and system state of the source. Since the virtual recovery appliance maintains itsown identity, i

Page 569

Snapshots Page 609 of 677Managing full-server and application snapshotsSnapshots can be created for full-server and application protections. If enable

Page 570 - Verification

Snapshots Page 610 of 677l Enable periodic snapshots—This option will not be available if you do not meetsnapshot requirements. If you disable or do n

Page 571 - Verifying manually

Recommended optimizations Page 611 of 677Recommended optimizationsStorage Mirroring Recover is an exceptionally flexible product that can be used in a

Page 572

Recommended optimizations Page 612 of 677PlanningBefore you begin your Storage Mirroring Recover installation, you should plan yourimplementation stra

Page 573 - Verifying on a schedule

Recommended optimizations Page 613 of 677l Create a connection to the Diagnostics target. This connection uses a built-in null(non-existent) target to

Page 574

Recommended optimizations Page 614 of 677InstallationMake sure you review all of the Storage Mirroring Recover requirements, including thegeneral sour

Page 575

Recommended optimizations Page 615 of 677l Upgrades—Keep the following caveats in mind when upgrading.l If the connection was created with the Applica

Page 576

Recommended optimizations Page 616 of 677General optimizationsThe following are general optimizations that can be used for any Storage MirroringRecove

Page 577

Recommended optimizations Page 617 of 677l Low bandwidth and queuing—In low bandwidth environments, you may need torevisit the queuing configuration y

Page 578

Recommended optimizations Page 618 of 677l Disable root encryption—If the top-level folders in your replication sets are notencrypted, you can gain a

Page 579

Storage Mirroring Recover requirements Page 61 of 677Hyper-V to Hyper-V requirementsUse these requirements if your source is a virtual server on a Hyp

Page 580

Recommended optimizations Page 619 of 677l E-mail notification—Enable e-mail notification through the Server Properties E-mail Notification tab so tha

Page 581

Recommended optimizations Page 620 of 677Anti-virus protectionl Storage Mirroring Recover queues—Exclude the Storage Mirroring Recoverqueue directory

Page 582

Recommended optimizations Page 621 of 677Application workloadsReview the following optimizations when you are protecting applications on your source.l

Page 583

Recommended optimizations Page 622 of 677Exchangel Exchange 2003 and 2007—Use the Storage Mirroring Recover ApplicationManager for Exchange 2003 and 2

Page 584

Recommended optimizations Page 623 of 677SQL Service Principal Names (SPNs) during failover and failback. If you have touse different accounts, Kerber

Page 585 - Data transmission

Recommended optimizations Page 624 of 677Cluster workloadsYou should carefully review Microsoft documentation and resources for properlyconfiguring yo

Page 586

Security Page 625 of 677SecurityTo ensure protection of your data, HP products offer multi-level security using nativeoperating system security featur

Page 587 - Scheduling data transmission

Security Page 626 of 677Security credentialsWhen a client machine attempts to access a source or target machine running onWindows, it will attempt to

Page 588

Security Page 627 of 677Note: If a user name exists both on the local machine and on the network, Windows firstattempts to login to the machine with t

Page 589

Security Page 628 of 677Adding users to the security groupsThe security groups are automatically created during the installation process. Thegroups ar

Page 590

Storage Mirroring Recover requirements Page 62 of 677l Windows Management Instrumentation (WMI)—The host and guestoperating systems must have the WMI

Page 591

Security Page 629 of 677Changing the account used to run the StorageMirroring serviceBy default, the Storage Mirroring service is configured to log on

Page 592

Security Page 630 of 6773. Add the domain account to the local administrator group.a. Select Start, Programs, Administrative Tools, Computer Managemen

Page 593

Evaluations Page 631 of 677EvaluationsYou may want to evaluate Storage Mirroring Recover before implementing it in yourproduction environment. This is

Page 594

Evaluations Page 632 of 677Evaluating data protectionThe following evaluation procedure has eleven tasks containing step-by-stepinstructions for evalu

Page 595

Evaluations Page 633 of 677Establishing a connection1. Open the Replication Console.2. Click Make a connection from the right pane of the Replication

Page 596

Evaluations Page 634 of 677logon is not successful, the Logon dialog box will appear prompting for yoursecurity identification. When logging in, the u

Page 597

Evaluations Page 635 of 677Monitoring the activity and completion of the initial mirrorView your new connection in the Replication Console by highligh

Page 598

Evaluations Page 636 of 677Changing data to cause replicationIn order to test replication, you need to change the data on your source. This includesmo

Page 599 - Snapshots

Evaluations Page 637 of 677Note: Many user applications typically save an entire file even though only a portion ofthe file may have changed. Therefor

Page 600

Evaluations Page 638 of 677Verifying the data changes on the targetNow that you have modified some of the files, you want to be sure that the filemodi

Page 601 - Snapshots for data workloads

Storage Mirroring Recover requirements Page 63 of 677ESX to ESXrequirementsUse these requirements if your source is a virtual server on an ESXserver

Page 602 - Snapshot states

Evaluations Page 639 of 677Just like when you were monitoring the mirror and replication processes, you canmonitor the verification process. Notice th

Page 603

Evaluations Page 640 of 677Testing your target dataAt this point in your evaluation, you may want to test your target data. The type of testingyou wil

Page 604

Evaluations Page 641 of 677you do want the newer files on the target to be overwritten by the files fromthe source. Click OK to begin the mirror.When

Page 605

Evaluations Page 642 of 677Configuring failover monitoringThe following instructions will configure failover monitoring.1. Open the Failover Control C

Page 606 - Automatic snapshots

Evaluations Page 643 of 677to Active Directory on the target. If you are using Active Directory, enable thisoption or you may experience problems with

Page 607 - Scheduling snapshots

Evaluations Page 644 of 677Monitoring failoverSince it can be essential to quickly know the status of failover, Storage MirroringRecover offers variou

Page 608 - Snapshots Page 607 of 677

Evaluations Page 645 of 677The Failover Control Center does not have to be running for failover to occur.Monitoring failover monitoring contains more

Page 609 - Taking snapshots manually

Evaluations Page 646 of 677Simulating a failureTo fully evaluate failover, you need to simulate a failure. The Failover Control Centerdoes not have to

Page 610

Evaluations Page 647 of 677Simulating data changes after failoverWhile your source is failed over to your target, end users continue to work withoutin

Page 611

Evaluations Page 648 of 677Initiating failbackWhen failover occurs, a source machine has failed. The steps below must be used tocomplete failback, whi

Page 612 - Recommended optimizations

Storage Mirroring Recover requirements Page 64 of 677l Microsoft .NETFramework—The source and target servers require the Microsoft.NET Framework vers

Page 613 - Planning

Evaluations Page 649 of 6776. At this time, you would connect the source to the network. For this evaluation,reconnect the network cable(s) on the sou

Page 614

Evaluations Page 650 of 677Restoring your dataThe Replication Console provides an easy method for restoring replicated data from thetarget back to the

Page 615 - Installation

Evaluations Page 651 of 6775. Select the Restore To machine. For this evaluation, select the original source.This is the machine where the copy of the

Page 616

Evaluations Page 652 of 677Evaluating full-server protectionThe following evaluation procedure has five tasks containing step-by-step instructionsfor

Page 617 - General optimizations

Evaluations Page 653 of 677Establishing full-server protection1. Login as a user that is a member of both the Double-Take Admin and localAdministrator

Page 618

Evaluations Page 654 of 6776. Double-click on any of the validation items to see details. You must correct anyerrors before you can enable protection.

Page 619 - General manageability

Evaluations Page 655 of 677Monitoring the activity and completion of the initial mirrorAfter you have enabled full-server protection, you can monitor

Page 620

Evaluations Page 656 of 677Changing data to cause replication and verifying the datachangesIn order to test replication, you need to change the data o

Page 621 - Hardware configurations

Evaluations Page 657 of 677Simulating a failureTo fully evaluate failover, you need to simulate a failure. To do this, power off the source.Watch as t

Page 622

Evaluations Page 658 of 677Starting failoverWhen a failover condition is met, you will want to start failover. You can actually startfailover without

Page 623 - Exchange

Storage Mirroring Recover requirements Page 65 of 677Cluster workload requirementsMake sure your cluster meets the general source and target server re

Page 624

Evaluations Page 659 of 677failover, the target will be rebooted automatically. After the reboot, the target will nolonger exist, since it will become

Page 625

Index Page 660 of 677Index..NET requirement 34, 67AA records 221ACLs (access control list) 550activation codes 74, 132, 167Active Directoryapplication

Page 626 - Security

Index Page 661 of 677scripts 246snapshots 229, 609storage group 233workload 21, 23, 136, 218Application Manager 128, 130auto-disconnect 532auto-reconn

Page 627 - Security credentials

Index Page 662 of 677ESX 259, 293files 550full-server workload 205GeoCluster 322, 329Hyper-V 259, 271standard cluster 303using 596configurationschaine

Page 628 - Security Page 627 of 677

Index Page 663 of 677Connection Wizard 137-138console 84, 100Application Manager 128connections 383credentials 95ESX 131Failover Control Center 118Ful

Page 629

Index Page 664 of 677disk signature 195DNS 221, 343A records 221alternate 350failback 521MX records 221non-Microsoft 350primary server 221reverse look

Page 630 - Mirroring service

Index Page 665 of 677requirements 56, 59, 63scheduling 291servers 134transmission 293VirtualCenter 96, 133, 296evaluationsdata workload 632full-server

Page 631

Index Page 666 of 677cluster workload 336data 153, 479DNS 221, 343domain controllers 338full-server 201, 483-484, 487Macintosh shares 352monitoring 15

Page 632 - Evaluations

Index Page 667 of 677requirements 55file shares 232, 239file system 34filters 94, 375firewall 34, 137, 149, 206, 251, 298full-servercompatible target

Page 633 - Evaluating data protection

Index Page 668 of 677starting 122GGeoClustercompression 322, 329monitoring 391online pending 329orphan files 322, 329requirements 65resource propertie

Page 634 - Establishing a connection

Storage Mirroring Recover requirements Page 66 of 677l Queuing—The Storage Mirroring Recover disk queue, configured duringinstallation, should use a l

Page 635

Index Page 669 of 677Jjunction points 550Llicensing 167loggingevent messages 413-414filtering 403log file 185, 396, 405messages 406verification 574vie

Page 636

Index Page 670 of 677Monitor Connections page 375monitoringapplication 371cluster 391data 356data workload 357ESX 374, 387failover data 366full-server

Page 637

Index Page 671 of 677optionsconsole 97orphan filesGeoCluster 322, 329removing 546standard cluster 303overview 15-16, 21-25, 27, 84Ppath 375Performance

Page 638

Index Page 672 of 677virtual 258Qqueuesauto-disconnect 532auto-reconnect 532overview 526queuing data 173, 528Rreconnecting automatically 534refresh ra

Page 639

Index Page 673 of 677calculating size 564copying 563creating 141, 558, 560database storage file 183deleting 566limitations 554modifying 560, 562overvi

Page 640

Index Page 674 of 677Failover Control Center 121Full-Server Failover Manager 125groups 628overview 625Replication Console 117service 629server configu

Page 641 - Testing your target data

Index Page 675 of 677sourcedata processing options 177definition 15requirements 34server startup options 169SQLprotection 232requirements 52verificati

Page 642 - Evaluations Page 641 of 677

Index Page 676 of 677TDV See target data verificationtime to live 48, 221, 343transactional NTFS operations (TxF) 550transmissionbandwidth 592compress

Page 643

Index Page 677 of 677virtualfailback 524failover 494-495, 497firewall 298monitoring 374PRO tips 279protection 258requirements 56restoration 524workloa

Page 644

Storage Mirroring Recover requirements Page 67 of 677Storage Mirroring Console requirementsThere are various Storage Mirroring Recover consoles, many

Page 645 - Monitoring failover

Installation Page 68 of 677InstallationBefore beginning the installation, review the Storage Mirroring Recover requirementsand Installation and upgrad

Page 646 - Evaluations Page 645 of 677

Queuing data 173Configuring source data processing options 177Configuring target data processing options 180Specifying the Storage Mirroring Recover d

Page 647 - Simulating a failure

Installation Page 69 of 677Installation and upgrade notesReview the following installation and upgrade notes before beginning your installation orupgr

Page 648

Installation Page 70 of 677l When performing a rolling upgrade, update the target servers first. After theupgrade is complete, the sources will automa

Page 649 - Initiating failback

Installation Page 71 of 677Installing or upgrading Storage Mirroring RecoverUse these instructions to install Storage Mirroring Recover or upgrade an

Page 650

Installation Page 72 of 6778. Click Next to continue.9. You will be prompted to enter your activation code information. Your ActivationCode is a 24-ch

Page 651 - Restoring your data

Installation Page 73 of 67716. During the installation, you may be prompted to add an exception to the WindowsFirewall for Storage Mirroring Recover.

Page 652

Installation Page 74 of 677Installing or upgrading Storage Mirroring for VirtualInfrastructureIn a typical Storage Mirroring Recover installation, you

Page 653

Installation Page 75 of 6775. When the Storage Mirroring Recover for Virtual Infrastructure installation begins,click Next.6. Review and accept the HP

Page 654

Installation Page 76 of 677Installing Storage Mirroring Recover automaticallyThe Storage Mirroring Recover installation program can accept command-lin

Page 655

Installation Page 77 of 677QMemoryBufferMaxAny integer representing the amount of system memory, in MB, to use formemory-based queuingDiskQueueFolderA

Page 656

Installation Page 78 of 677Installing or upgrading automatically to a local machine1. Create a temporary directory on the server. For example, create

Page 657

Configuring failover monitoring 226Taking snapshots of the target 229Application connection settings 230Routing data transmissions 231Protection confi

Page 658

Installation Page 79 of 677Installing or upgrading automatically to a remote machine1. Create a temporary directory on the primary site server. For ex

Page 659 - Starting failover

Installation Page 80 of 677Configuring your cluster for GeoCluster installationIf you want to use a GeoCluster configuration, where data is stored on

Page 660

Installation Page 81 of 677Configuring your Windows 2003 clusterIn a typical Windows 2003 MSCS shared disk cluster configuration, the quorumresource,

Page 661

Installation Page 82 of 677Configuring your Windows 2008 clusterThe default quorum resource in a Windows 2008 environment will vary depending onyour c

Page 662

Installation Page 83 of 6778. From Failover Cluster Management, create your application or service group.Note: If you are creating a file server using

Page 663

Storage Mirroring Console Page 84 of 677Storage Mirroring ConsoleThe Storage Mirroring Console is used to protect and monitor your servers andconnecti

Page 664

Storage Mirroring Console Page 85 of 677Starting the consoleAfter you have installed the console, you can launch it by selecting Start, Programs, HPS

Page 665

Storage Mirroring Console Page 86 of 677Getting startedThe first time you start the console, it is empty. In order to protect and monitor yourservers,

Page 666

Storage Mirroring Console Page 87 of 677Inserting servers manually1. Select Get Started from the toolbar.2. Select Add servers and click Next.3. On th

Page 667

Storage Mirroring Console Page 88 of 677Inserting servers through Active Directory discovery1. Select Get Started from the toolbar.2. Select Add serve

Page 668

Optional ESX protection settings 290Scheduling protection 291Changing the name of the protection job 292Setting transmission options 293E-mailing noti

Page 669

Storage Mirroring Console Page 89 of 677Inserting servers from a server configuration fileYou can share the console server configuration between machi

Page 670

Storage Mirroring Console Page 90 of 677Managing serversTo manage the servers in your console, select Manage Servers from the toolbar. TheManage Serve

Page 671

Storage Mirroring Console Page 91 of 677Activation CodeThe activation codes associated with the products licensed for the serverAdd ServersAdd a new s

Page 672

Storage Mirroring Console Page 92 of 677Viewing server detailsTo view details about a specific server, select View Server Details from the toolbar ont

Page 673

Storage Mirroring Console Page 93 of 677LicensingLicensing information for the serverl Product—The product associated with the licensel Serial number—

Page 674

Storage Mirroring Console Page 94 of 677Viewing server eventsTo view events associated with a specific server, select View Server Events from thetoolb

Page 675

Storage Mirroring Console Page 95 of 677Providing server credentialsTo update the security credentials used for a specific server, select Provide Cred

Page 676

Storage Mirroring Console Page 96 of 677Managing VirtualCenter serversTo manage your VirtualCenter servers, select Go, Manage VirtualCenter Servers. T

Page 677

Storage Mirroring Console Page 97 of 677Console optionsThere are several options that you can set that are specific to the Storage MirroringConsole. T

Page 678

Storage Mirroring Console Page 98 of 677Setting the frequency of console refreshesTo access the console refresh rate, select Options from the toolbar.

Comments to this Manuals

No comments