HP StorageWorksStorage Mirroring Recover Users GuideHP Part Number: T5437-96021Published: November 2010
WINS replication 342DNS 343Windows DNSCMD command 344Storage Mirroring Recover DFO utility 346Non-Microsoft DNS 350Macintosh shares 352NFS Shares 354W
Storage Mirroring Console Page 99 of 677Setting the console communications portTo access the console communications port, select Options from the tool
Storage Mirroring Console Page 100 of 677Other consolesThere are various Storage Mirroring Recover consoles, many of which are being phasedout over ti
Storage Mirroring Console Page 101 of 677Replication ConsoleTo open the Replication Console, select Start, Programs, HPStorage Mirroring, HPStorage
Storage Mirroring Console Page 102 of 677Logging on and offTo ensure protection of your data, Storage Mirroring Recover offer multi-level securityusin
Storage Mirroring Console Page 103 of 6773. Specify your Username, Password, Domain, and whether you want yourpassword saved.4. Click OK and verify yo
Storage Mirroring Console Page 104 of 677Monitor rightsThis icon is a computer with a magnifying glass and it indicates theStorage Mirroring Recover s
Storage Mirroring Console Page 105 of 677Managing the Replication Console treeTo better manage the servers that appear in the Replication Console, you
Storage Mirroring Console Page 106 of 677Creating groupsUse one of the following methods to create a new group:l Right-click anywhere on the left pane
Storage Mirroring Console Page 107 of 677Removing groupsl Use one of the following methods to remove a group.l Right-click on a group on the left of t
Storage Mirroring Console Page 108 of 677Moving ServersServers that are auto-populated can be moved to different groups within the ReplicationConsole
Log files 396Viewing the log file 397Viewing the log file through the Replication Console 398Viewing the log file through a text editor 401Filtering t
Storage Mirroring Console Page 109 of 677Inserting ServersIf a machine is not displayed on the Replication Console, it can be manually inserted.This f
Storage Mirroring Console Page 110 of 677Removing ServersIf you do not want to see a server in the Replication Console, it can be permanentlyremoved f
Storage Mirroring Console Page 111 of 677Hiding ServersIf you do not want to see a server in the Replication Console and do not want to disableActive
Storage Mirroring Console Page 112 of 677Unhiding ServersYou can unhide, or display, a hidden server at any time you want to access that server.The se
Storage Mirroring Console Page 113 of 677Sharing group and server configurationAll of the group and server information is stored on the local machine
Storage Mirroring Console Page 114 of 677WorkspacesThe Replication Console workspace contains the display of the panes of the ReplicationConsole and a
Storage Mirroring Console Page 115 of 677Saving a workspaceAs you size, add, or remove windows in the Replication Console, you can save theworkspace t
Storage Mirroring Console Page 116 of 677Opening a workspaceFrom the Replication Console, you can open a new workspace or open a previouslysaved works
Storage Mirroring Console Page 117 of 677Clearing maintained security credentialsTo remove cached credentials, select File, Options and select the Sec
Storage Mirroring Console Page 118 of 677Failover Control CenterTo open the Failover Control Center, select Start, Programs, HPStorage Mirroring,Reco
Failing over virtual workloads in the Storage Mirroring Console 495Failing over virtual workloads in the Storage Mirroring Recover for VirtualInfrastr
Storage Mirroring Console Page 119 of 677Configuring communication portsThe Failover Control Center uses port 6320, by default for Storage Mirroring R
Storage Mirroring Console Page 120 of 677Configuring the console refresh rateThe failover client periodically requests information from the source and
Storage Mirroring Console Page 121 of 677Clearing maintained security credentialsTo remove cached credentials, access the credentials security option,
Storage Mirroring Console Page 122 of 677Full-Server Failover ManagerTo open the Full-Server Failover Manager, select Start, Programs, HPStorageMirro
Storage Mirroring Console Page 123 of 677Configuring the console refresh rateSelect File, Options. By default, the main window of Full-Server Failover
Storage Mirroring Console Page 124 of 677Configuring the level of detail to logSelect File, Options. By default, Full-Server Failover Manager creates
Storage Mirroring Console Page 125 of 677Clearing maintained security credentialsSelect File, Options. By default, Full-Server Failover Manager will s
Storage Mirroring Console Page 126 of 677Configuring how servers are added to the Full-Server Failover ManagerSelect File, Options. By default, Full-S
Storage Mirroring Console Page 127 of 677Saving and reusing configuration optionsAfter you have created a protection pair and configured any of the op
Storage Mirroring Console Page 128 of 677Application ManagerTo open the Application Manager, select Start, Programs, HPStorage Mirroring,Recover, HP
Removing orphan files 546Replication 549Replication capabilities 550Replication sets 554Creating a replication set 558Creating or modifying replicatio
Storage Mirroring Console Page 129 of 677Adding or managing serversStep 2 of the application protection workflow is to select your source and target s
Storage Mirroring Console Page 130 of 677Changing Application Manager optionsTo modify Application Manager options, select Tools, Options and modify a
Storage Mirroring Console Page 131 of 677Storage Mirroring Recover for Virtual Infrastructure consoleTo open the Storage Mirroring Recover for Virtual
Storage Mirroring Console Page 132 of 677Managing activation codesYou can manage your Storage Mirroring Recover for Virtual Infrastructure activationc
Storage Mirroring Console Page 133 of 677Managing VirtualCenter serversTo manage your VirtualCenter servers, select Manage VirtualCenter servers from
Storage Mirroring Console Page 134 of 677Managing ESX serversTo manage your ESX servers, select Manage ESX servers from the left pane of theconsole. S
Storage Mirroring Console Page 135 of 677Setting up an e-mail serverTo set up an e-mail server, select Set up e-mail server from the left pane of the
Workload protection Page 136 of 677Workload protectionStorage Mirroring Recover flexible configurations allow you to protect differentworkloads depend
Workload protection Page 137 of 677Data protectionProtecting specific data consists of two main tasks - creating a replication set (to identifythe dat
Workload protection Page 138 of 677Establishing a connection using the automated ConnectionWizardThe Connection Wizard guides you through the process
Managing full-server and application snapshots 609Recommended optimizations 611Planning 612Installation 614General optimizations 616Performance optimi
Workload protection Page 139 of 677selected. If it is not, select the Storage Mirroring Recover target. This is yourbackup server that will protect th
Workload protection Page 140 of 677l Send all data to a single path on the target—This option sends allselected volumes and directories to the same lo
Workload protection Page 141 of 677Creating a replication setBefore you can establish a connection, you must create a replication set.1. From the Repl
Workload protection Page 142 of 677Note: Be sure and verify what files can be included by reviewing Replicationcapabilities.5. After selecting the dat
Workload protection Page 143 of 677Establishing a connection manually using the ConnectionManagerAfter you have created a replication set, you can est
Workload protection Page 144 of 677l Source Server—Specify the source server that contains the replication setthat is going to be transmitted to the S
Workload protection Page 145 of 677amount of disk space available must be equal to or greater than theon-disc size of the sparse file.If you are mirro
Workload protection Page 146 of 677l Full Mirror—All files in the replication set will be sent from the source to thetarget.l File Differences—Only th
Workload protection Page 147 of 677Note: Stopping, starting, pausing, or resuming mirroring contains acomparison of how the file difference mirror set
Workload protection Page 148 of 677Note: Database applications may update files without changing thedate, time, or file size. Therefore, if you are us
Initiating failback 648Restoring your data 650Evaluating full-server protection 652Establishing full-server protection 653Monitoring the activity and
Workload protection Page 149 of 677Establishing a connection across a NAT or firewallIf your source and target are on opposite sides of a NAT or firew
Workload protection Page 150 of 677l Storage Mirroring Recover failover can use ICMP pings to determine if thesource server is online. If you are goin
Workload protection Page 151 of 677Simulating a connectionStorage Mirroring Recover offers a simple way for you to simulate a connection in orderto ge
Workload protection Page 152 of 677l Source Server—Specify the source server that contains the replication setthat is going to be simulated to the TDU
Workload protection Page 153 of 677Data workload failoverWhen you established your data workload protection, you only protected the data. Youstill nee
Workload protection Page 154 of 677Configuring failover monitoring1. Open the Failover Control Center from your target server or a client machine. Don
Workload protection Page 155 of 6779. Highlight an IP address that you have selected for monitoring and select a Methodto Monitor for Failover.l Netwo
Workload protection Page 156 of 67713. If you are monitoring multiple IP addresses, highlight the source name and specifythe Failover Trigger.l All Mo
Workload protection Page 157 of 677l Revert to Last Good Snapshot if Target Data is Bad—If the target data isin a bad Storage Mirroring Recover state,
Workload protection Page 158 of 677source's subnet will be changed at failover, the source server must bethe only system on that subnet, which in
Storage Mirroring Recover overview Page 15 of 677Storage Mirroring Recover overviewStorage Mirroring Recover ensures the availability of critical work
Workload protection Page 159 of 677.SHR Share Mapping File check box is selected if you would like to use theStorage Mirroring Recover share mapping f
Workload protection Page 160 of 677l If you want to pass any arguments to your script, specify the arguments.l If you want to delay the failover or fa
Workload protection Page 161 of 677Updating shares on the targetShare information on the target can be manually updated from the Failover ControlCente
Workload protection Page 162 of 677Editing failover monitoring configurationIf you want to edit the monitor settings for a source that is currently be
Workload protection Page 163 of 677Removing failover monitoring configurationIf you want to discontinue monitoring a source, highlight that machine on
Workload protection Page 164 of 677Server settingsMost of the Storage Mirroring Recover server settings are located in the ReplicationConsole Server P
Workload protection Page 165 of 677Identifying a serverFrom the Replication Console, you can see server identity information, including aserver's
Workload protection Page 166 of 677l Parent Group—This is the group in the Replication Console serverl Addresses—The IP address(es) for this server ar
Workload protection Page 167 of 677Licensing a serverFrom the Replication Console, you can manage your server activation codes. Theactivation code is
Workload protection Page 168 of 6773. Select the Licensing tab.4. Enter an activation code and click Add. Repeat for each activation code.5. Highlight
Storage Mirroring Recover overview Page 16 of 677Core operationsStorage Mirroring Recover performs four basic types of operations.l Mirroring—The init
Workload protection Page 169 of 677Configuring server startup optionsFrom the Replication Console, you can configure server startup options for each S
Workload protection Page 170 of 677various points during the replication of data. Because the tasks are user-defined, you can achieve a wide variety o
Workload protection Page 171 of 677applications, you should use the File Differences withchecksum or Full option.l Server Shutdown Timeout—This settin
Workload protection Page 172 of 677Configuring network communication properties for a server1. Open the Replication Console and right-click the server
Workload protection Page 173 of 677Queuing dataYou should configure queuing on both the source and target.1. Open the Replication Console and right-cl
Workload protection Page 174 of 677l Select a dedicated, physical, non-boot volume.l Select a location on a non-clustered volume that will have minima
Workload protection Page 175 of 677amount of physical memory available but has a minimum of 32 MB. Bydefault, 128 MB or 512 MB of memory is used, depe
Workload protection Page 176 of 677Note: The Maximum disk space for queue and Minimum Free Spacesettings work in conjunction with each other. For exam
Workload protection Page 177 of 677Configuring source data processing options1. Open the Replication Console and right-click the server on the left pa
Workload protection Page 178 of 677(SID). By replicating Windows security by name, you can transmit the ownername with the file. If that user exists o
Storage Mirroring Recover overview Page 17 of 677MirroringMirroring is the process of transmitting user-specified data from the source to the targetso
Workload protection Page 179 of 677l Maximum Pending Mirror Operations—This option is the maximumnumber of mirror operations that are queued on the so
Workload protection Page 180 of 677Configuring target data processing options1. Open the Replication Console and right-click the server on the left pa
Workload protection Page 181 of 677l Retry Delay for Incomplete Operations (seconds)—This option specifiesthe amount of time, in seconds, before retry
Workload protection Page 182 of 677Do not include the Recycler directory in your replication set if you aremoving deleted files. If the Recycler direc
Workload protection Page 183 of 677Specifying the Storage Mirroring Recover database storage files1. Open the Replication Console and right-click the
Workload protection Page 184 of 677l Connection—This database file maintains the active source/targetconnection information. The default file name is
Workload protection Page 185 of 677Specifying file names for logging and statistics1. Open the Replication Console and right-click the server on the l
Workload protection Page 186 of 677l Messages & Alerts, Maximum Files—Specify the maximum number ofStorage Mirroring Recover alert log files that
Workload protection Page 187 of 677Supplying credentials for script processing1. Open the Replication Console and right-click the server on the left p
Workload protection Page 188 of 677E-mailing event messagesYou can e-mail Storage Mirroring Recover event messages to specific addresses. Thesubject o
Storage Mirroring Recover overview Page 18 of 677ReplicationReplication is the real-time transmission of file changes. Unlike other relatedtechnologie
Workload protection Page 189 of 677Note: Any specified notification settings are retained when Enable notification isdisabled.5. Specify your e-mail s
Workload protection Page 190 of 677the list.Note: You can test e-mail notification by specifying the options on the E-mailNotification tab and clickin
Workload protection Page 191 of 677Full-server protectionBefore you can protect your entire source, you need to select a target that is suitable tobec
Workload protection Page 192 of 677Finding a compatible targetReview the table below to determine if your server is a compatible target.Operating syst
Workload protection Page 193 of 677MemoryThe target memory should be within 25% (plus or minus) of the source. Ifthe target has much less memory than
Workload protection Page 194 of 677Boot volume configurationThe target boot volume cannot be a dynamic disk configuration. The bootvolume is the disk
Workload protection Page 195 of 677failover, the failover will continue. If not, you will either have to select adifferent target or delete files on t
Workload protection Page 196 of 6776. Double-click on any of the validation items to see details. You must correct anyerrors before you can enable pro
Workload protection Page 197 of 677Optional full-server protection settingsOptional protection settings are available when configuring a full-server p
Workload protection Page 198 of 677Including and excluding data to be protected1. Make sure you have a valid source and target specified, click Config
© Copyright 1996-2010 Hewlett-Packard Development Company, L.P. and Double-Take Software, Inc. All rights reserved.Confidential computer software. Val
Storage Mirroring Recover overview Page 19 of 677Failure monitoring and failoverFailover is the process in which a target stands in for a failed sourc
Workload protection Page 199 of 677Stopping services on the target when protection is enabled1. Make sure you have a valid source and target specified
Workload protection Page 200 of 677Taking snapshots of the target1. Make sure you have a valid source and target specified, click Configureprotection
Workload protection Page 201 of 677Configuring failover monitoring and processing1. Make sure you have a valid source and target specified, click Conf
Workload protection Page 202 of 677Mapping network configuration on the target for post-failover1. Make sure you have a valid source and target specif
Workload protection Page 203 of 677Routing data transmissions1. Make sure you have a valid source and target specified, click Configureprotection from
Workload protection Page 204 of 677Mirroring data1. Make sure you have a valid source and target specified, click Configureprotection from the main Fu
Workload protection Page 205 of 677Compressing data1. Make sure you have a valid source and target specified, click Configureprotection from the main
Workload protection Page 206 of 677Using NAT or firewalls with full-server workloadsIf your source and target are on opposite sides of a NAT or firewa
Workload protection Page 207 of 677Full-server portsBy default, Storage Mirroring Recover uses port 6320 for all TCP and UDPcommunications. To verify
Workload protection Page 208 of 677Microsoft Windows portsFull-server workload protection uses WMI (Windows Management Instrumentation)which uses RPC
Storage Mirroring Recover overview Page 20 of 677RestorationRestoration provides an easy method for copying replicated data from the target back toits
Workload protection Page 209 of 677Hardware portsYou need to configure your hardware so that the full-server ports and Microsoft Windowsports are open
Workload protection Page 210 of 677Application protectionProtecting an application consists of three main tasks - configuring the protection,validatin
Workload protection Page 211 of 677Protecting an application1. Open the Application Manager.2. Verify the Setup tab is selected and then from the Task
Workload protection Page 212 of 677Note: If you have previously used this source and target pair, you will be promptedto reuse the previous configurat
Workload protection Page 213 of 677If you are protecting multiple Exchange virtual servers, you canconfigure multiple like-named cluster protection co
Workload protection Page 214 of 677If you will be configuring DNSfailover, the login account must be a memberof the domain DnsAdmins security group.E
Workload protection Page 215 of 677black exclamation point (!) inside a yellow triangle. A successful validation isdesignated by a white checkmark ins
Workload protection Page 216 of 6779. If you are protecting BlackBerry, a Complete BlackBerry Protection dialog willappear after the validation is com
Workload protection Page 217 of 677issue, either modify the failover script to use the domaincontroller that Exchange uses when the Information Stores
Workload protection Page 218 of 677Optional application protection settingsOptional protection settings are available when configuring application pro
Storage Mirroring Recover overview Page 21 of 677Storage Mirroring Recover workloadsBuilding on Storage Mirroring Recover core operations, you can pro
Workload protection Page 219 of 677Configuring failover processing1. Make sure you have a valid domain and servers specified, click Configure fromthe
Workload protection Page 220 of 6773. Application Manager automatically determines the appropriate application servicesor resources to start and stop
Workload protection Page 221 of 677Configuring DNS failoverApplication Manager will automatically determine default DNSfailover settings. Use thefoll
Workload protection Page 222 of 677address for DNSupdates.Exchange Note: If you are protecting Exchange and one or more IP addressesare configured f
Workload protection Page 223 of 677l If you have a NIC designated only for Storage Mirroring Recover traffic, DNSregistration for that NICshould be
Workload protection Page 224 of 677Configuring identity failoverApplication Manager will automatically determine default identity failover settings. U
Workload protection Page 225 of 677SQL Note: If you are protecting SQL, do not failover the server name.File Server Note: You cannot failover file sha
Workload protection Page 226 of 677Configuring failover monitoring1. Make sure you have a valid domain and servers specified, click Configure fromthe
Workload protection Page 227 of 677l Application Monitoring—In non-cluster environments, you can monitor anapplication via a monitoring script. The sc
Workload protection Page 228 of 677script that will monitor the application. The custom script can be PowerShell,Visual Basic, or JScript. Once your s
Storage Mirroring Recover overview Page 22 of 677Full-server workloadsFull-server workload protection provides high availability for an entire server,
Workload protection Page 229 of 677Taking snapshots of the target1. Make sure you have a valid domain and servers specified, click Configure fromthe m
Workload protection Page 230 of 677Application connection settingsYou can configure routing and mirroring settings for your application connection. In
Workload protection Page 231 of 677Routing data transmissions1. Make sure you have a valid domain and servers specified, click Configure fromthe main
Workload protection Page 232 of 677Protection configurationApplication specific protection options are available on the Configure ProtectionConnection
Workload protection Page 233 of 677Configuring Exchange storage group protectionIf you are protecting Exchange, you can specify which storage groups,
Workload protection Page 234 of 677The Protected Storage Groups list will be disabled if you have enabledOverride Generated Rules on the Advanced tab.
Workload protection Page 235 of 677Configuring SQL database protectionIf you are protecting SQL, you can protect the SQL instance or only the database
Workload protection Page 236 of 677l The servers must have the same named instances, unless you arerunning Application Manager in advanced mode. In th
Workload protection Page 237 of 677*.ldf, and so on). Any attempts to manually attach the database may failif the user account does not yet have NTFS
Workload protection Page 238 of 677unique target path for \level1\level2\database.mdf, the target path forlevel1\level2\level3\database.mdf will also
Storage Mirroring Recover overview Page 23 of 677Application workloadsApplication workload protection provides high availability for Exchange, SQL,Bla
Workload protection Page 239 of 677Configuring file server protectionIf you are protecting a file server, you can specify the file shares that you wan
Workload protection Page 240 of 677Configuring BlackBerry database protection1. Make sure you have a valid domain and servers specified, click Configu
Workload protection Page 241 of 677service(s).7. Under BlackBerry Services, Application Manager automatically determines theappropriate BlackBerry se
Workload protection Page 242 of 677Mirroring data1. Make sure you have a valid domain and servers specified, click Configure fromthe main Application
Workload protection Page 243 of 677Application advanced settingsYou can configure advanced settings for you application connection. The advancedsettin
Workload protection Page 244 of 677Configuring the replication setApplication Manager automatically creates a replication set with a name based on the
Workload protection Page 245 of 677if you launched Application Manager in standard or advanced mode.2. To modify the replication set definition, selec
Workload protection Page 246 of 677Configuring scriptsScripts are executed at different points during failover, failback, and restoration. Thescripts
Workload protection Page 247 of 677Configuring Active DirectoryIf you are protecting Exchange, you can configure several settings for Active Directory
Workload protection Page 248 of 677This setting is cleared when protection is enabled, which prevents SMTPqueuing issues when trying to deliver messag
Storage Mirroring Recover overview Page 24 of 677Virtual workloadsVirtual workload protection provides high availability to Hyper-V or ESXvirtual ser
Workload protection Page 249 of 677Configuring items to failoverIf you are performing an identity failover, then you have already selected the Items t
Workload protection Page 250 of 677Configuring default connection parametersSeveral default connection options are available which allow you to disabl
Workload protection Page 251 of 677Using NAT or firewalls with application workloadsIf your source and target are on opposite sides of a NAT or firewa
Workload protection Page 252 of 677Application workload portsBy default, Storage Mirroring Recover uses port 6320 for all TCPand UDPcommunications.
Workload protection Page 253 of 677Microsoft Windows portsApplication workload protection uses WMI (Windows Management Instrumentation)which uses RPC
Workload protection Page 254 of 677Hardware portsYou need to configure your hardware so that the application workload ports andMicrosoft Windows ports
Workload protection Page 255 of 677Exchange Failover UtilityWhen you configure Exchange for protection, Application Manager creates customizedscripts
Workload protection Page 256 of 677be able to locate this file which could impede assistance throughTechnical Support.l NORUS—Do not change the Recipi
Workload protection Page 257 of 677l DC domain_name | IPaddress—Name or IPaddress of the domaincontroller to make updates onl SDOMAIN—Source domain n
Workload protection Page 258 of 677Virtual server protectionSelect a link to jump to instructions that correspond with your virtual configuration.l Ph
Storage Mirroring Recover overview Page 25 of 677Cluster workloadsIn a standard cluster configuration, a single copy of data resides on a SCSI disk th
Workload protection Page 259 of 677Protecting a physical or virtual server to a Hyper-V or ESXserverUse these instructions to protect a physical or vi
Workload protection Page 260 of 677Your source can have no more than four NICs enabled, except if yoursource is ESX version 4.x. In that case, you can
Workload protection Page 261 of 677l Server—Specify the name or IP address of the target server. You can clickBrowse to select a server from a network
Workload protection Page 262 of 677l VirtualCenter Server—Select your VirtualCenter server from the list. If yourVirtualCenter server is not in the li
Workload protection Page 263 of 677l Select the volume on the target server—Select one of the volumes fromthe list to indicate which volume on the tar
Workload protection Page 264 of 677l Select the datastore on the target ESXserver—Select one of the volumesfrom the list to indicate where on the tar
Workload protection Page 265 of 677In order for Storage Mirroring Recover to find the pre-existing disk, the virtualdisk file names must be formatted
Workload protection Page 266 of 677l Replica virtual machine display name—Specify the name of the replicavirtual machine. This will be the display nam
Workload protection Page 267 of 677Gateways, and DNSServer addresses. If you do not specify any networkconfiguration, the replica virtual machine wil
Workload protection Page 268 of 677Note: The system volume must be an IDEcontroller. In addition, up to twomore volumes can be attached to an IDE con
Storage Mirroring Recover overview Page 26 of 677In a GeoCluster configuration, data is stored on volumes local to each node andreplicated to each nod
Workload protection Page 269 of 677The fields on this screen will vary depending on if you are using an ESXtarget or aHyper-V target.l Compress data
Workload protection Page 270 of 677where redundant interfaces and high-speed, reliable network links areavailable to prevent the false detection of fa
Workload protection Page 271 of 677Protecting a Hyper-V server to a Hyper-V serverUse these instructions to protect a virtual machine on a Hyper-V ser
Workload protection Page 272 of 677l User name—Specify a user that is a member of the Double-Take Admin andlocal administrator security groups on the
Workload protection Page 273 of 677l Server—Specify the name or IP address of the Hyper-V target server. Youcan click Browse to select a server from a
Workload protection Page 274 of 677l Full path where the replica virtual machine will be stored—Specify alocation on the selected Volume to store the
Workload protection Page 275 of 677l Replica virtual machine display name—Specify the name of the replicavirtual machine. This will be the display nam
Workload protection Page 276 of 677be prompted to provide credentials for the virtual machine. Enter the DNSName/IP Address, User name, and Password
Workload protection Page 277 of 677the source. When the target receives the compressed data, it decompressesit and then writes it to disk.l Limit band
Workload protection Page 278 of 677l Require manual intervention before actually failing over—Whenselected, you will be prompted for failover when a f
Storage Mirroring Recover overview Page 27 of 677Supported configurationsStorage Mirroring Recover is an exceptionally flexible product that can be us
Workload protection Page 279 of 677Configuring Hyper-V Pro tip integration for failover notificationMicrosoft System Center Virtual Machine Manager (S
Workload protection Page 280 of 677Protecting an ESX server to an ESX serverUse this process to protect a virtual machine on an ESX server, where you
Workload protection Page 281 of 677Configuring ports1. Because the Storage Mirroring Recover for Virtual Infrastructure console uses SSHto communicate
Workload protection Page 282 of 677Configuring root or non-root loginYou must configure both your source and target ESXservers to allow either root o
Workload protection Page 283 of 677Establishing ESX to ESX protection1. Open the Storage Mirroring Recover for Virtual Infrastructure console by selec
Workload protection Page 284 of 677l Source VirtualCenter server—Select the VirtualCenter server thatadministrators the virtual machine you want to pr
Workload protection Page 285 of 677l User name—Specify the user account that will log in to the ESXserver.l Password—Specify the password associated
Workload protection Page 286 of 677l Choose a target datastore—Select a datastore in the table that is largeenough to hold the source virtual machine.
Workload protection Page 287 of 6773. Click View replica virtual machine disk mapping to determinethe proper location on the target to copy the .vmdk
Workload protection Page 288 of 677l Map replica virtual network adapters to target VSwitches—Identify howyou want to handle the network mapping after
Storage Mirroring Recover overview Page 28 of 677One-to-one, active/standbyDescriptionOne target server, having no production activity, is dedicated t
Workload protection Page 289 of 677may generate unpredictable results on the source and target virtualmachines.Storage Mirroring Recover for Virtual I
Workload protection Page 290 of 677Optional ESX protection settingsOptional protection settings are available when configuring an ESXto ESXprotectio
Workload protection Page 291 of 677Scheduling protection1. From the Protection summary page, click Schedule.2. If you want to start the protection imm
Workload protection Page 292 of 677Changing the name of the protection job1. From the Protection summary page, click Change in the Name section.2. Spe
Workload protection Page 293 of 677Setting transmission options1. From the Protection summary page, click Change in the Data transmissionsection.2. Sp
Workload protection Page 294 of 677l Limit bandwidth—Bandwidth limitations are available to restrict the amountof network bandwdith used for Storage M
Workload protection Page 295 of 677E-mailing notifications1. From the Protection summary page, click Change in the E-mail notificationssection.Note: I
Workload protection Page 296 of 677Updating VirtualCenter credentials1. If you configured VirtualCenter servers when you established protection, you c
Workload protection Page 297 of 677Configuring restart and threshold options1. From the Protection summary page, click Change in the Restart andthresh
Workload protection Page 298 of 677Using firewalls with virtual workloadsIf your source and target are on opposite sides of a firewall, you will need
Table of ContentsStorage Mirroring Recover overview 15Core operations 16Mirroring 17Replication 18Failure monitoring and failover 19Restoration 20Stor
Storage Mirroring Recover overview Page 29 of 677One-to-one, active/activeDescriptionEach server acts as both a source and target actively replicating
Workload protection Page 299 of 677Virtual workload portsBy default, Storage Mirroring Recover uses port 6320 for all TCPand UDPcommunications. To v
Workload protection Page 300 of 677Microsoft Windows portsVirtual workload protection uses WMI (Windows Management Instrumentation) whichuses RPC (Rem
Workload protection Page 301 of 677Hardware portsYou need to configure your hardware so that the Storage Mirroring Recover ports andMicrosoft Windows
Workload protection Page 302 of 677Cluster protectionYour cluster protection will depend on the type of cluster configuration you are using.l Standard
Workload protection Page 303 of 677Protecting a standard clusterUse the following steps to protect a standard cluster, where a single copy of data res
Workload protection Page 304 of 677Note: If your source is a cluster, you need to create the replication set on the nodewhich currently owns the group
Workload protection Page 305 of 677f. After selecting the data for this replication set, right-click the new replicationset icon and select Save. A sa
Workload protection Page 306 of 677b. Record the exact drive and directories of each path displayed, includingwhere the rule is included or excluded a
Workload protection Page 307 of 6775. On your cluster (source and/or target), you need to disable the standard StorageMirroring Recover connection con
Workload protection Page 308 of 6777. If your source is a cluster, establish your connection by creating and bringingonline a Double-Take Source Conne
Storage Mirroring Recover overview Page 30 of 677Many-to-oneDescriptionMany source servers are protected by one target server.ApplicationsThis configu
Workload protection Page 309 of 677Establishing your connection on Windows 20031. From the Cluster Administrator, right-click on the group and virtual
Workload protection Page 310 of 677l Replication Set—Select the Storage Mirroring Recover replication set thatyou want to use. If the replication set
Workload protection Page 311 of 677l Fixed Bandwidth Limit—Data will be transmitted according to the user-specified bandwidth configuration. By defaul
Workload protection Page 312 of 677l File differences—Only those files that are different based size or date andtime will be sent from the source to t
Workload protection Page 313 of 677l Initial Verification Start—Specify when you want a verification process to beperformed. You can select the immedi
Workload protection Page 314 of 677Establishing your connection on Windows 20081. From the Failover Cluster Management applet, right-click on the grou
Workload protection Page 315 of 677l Replication Set—Select the Storage Mirroring Recover replication set thatyou want to use. If the replication set
Workload protection Page 316 of 677l No Bandwidth Limit—Data will be transmitted using all availablebandwidth.l Fixed Bandwidth Limit—Data will be tra
Workload protection Page 317 of 6778. Select the Orphans tab and specify your Storage Mirroring Recover orphan fileparameters. By default, the orphan
Workload protection Page 318 of 6779. Select the Compression tab and specify your Storage Mirroring Recovercompression parameters. By default, compres
Storage Mirroring Recover overview Page 31 of 677One-to-manyDescriptionOne source server sends data to multiple target servers. The targetservers may
Workload protection Page 319 of 67710. Select the Mirror Properties tab and specify how you want to mirror the data.l Full Mirror—All files in the rep
Workload protection Page 320 of 677applications, it is critical that all files, not just some of them thatmight be newer, get mirrored.l Use block che
Workload protection Page 321 of 677calendar allowing easy selection of any date. Time is formatted for any AM orPM time.l Reverification Interval—Sele
Workload protection Page 322 of 677Protecting a GeoClusterThe GeoCluster Replicated Disk resource allows for the real-time copy of data to beavailable
Workload protection Page 323 of 677Creating the GeoCluster Replicated Disk Resource on Windows 20031. Select Start, Programs, Administrative Tools, Cl
Workload protection Page 324 of 677Mirroring Recover and your public traffic. If you have three routes, separatethe public traffic and then separate S
Workload protection Page 325 of 677Creating the GeoCluster Replicated Disk Resource on Windows 20081. Select Start, Programs, Administrative Tools, Fa
Workload protection Page 326 of 677l Delay connection until resources dependent on this one are online—This option allows you to delay a Storage Mirro
Workload protection Page 327 of 677Bringing the resource onlineThe GeoCluster Replicated Disk resource will appear offline after it is created. Whenyo
Workload protection Page 328 of 677Taking the resource offlineWhen you take the GeoCluster Replicated Disk resource offline, the following actionsoccu
Storage Mirroring Recover overview Page 32 of 677ChainedDescriptionThe source servers sends replicated data to a target server, which acts asa source
Workload protection Page 329 of 677GeoCluster resource propertiesResource properties are displayed differently in Windows 2003 and Windows 2008. Forex
Workload protection Page 330 of 677GeoCluster Replicated Disk properties on Windows 2003There are six properties tabs for the GeoCluster Replicated Di
Workload protection Page 331 of 677to remain in a pending state before it fails. If the resource takes longer thanthe time specified to be brought onl
Workload protection Page 332 of 677algorithms available for your operating system, you may see a slider bar indicatingdifferent compression levels. Se
Workload protection Page 333 of 677GeoCluster Replicated Disk properties on Windows 2008There are eight properties tabs for the GeoCluster Replicated
Workload protection Page 334 of 677The GeoCluster Replicated Disk resource must have at least twopossible owners to function properly.l Basic resource
Workload protection Page 335 of 677are attempting to open files exclusively while GeoCluster is mirroring thosefiles is removed.l Enable orphans—An or
Workload protection Page 336 of 677Configuring failover monitoringIf you are configuring failover monitoring for a cluster workload, use the same proc
Workload protection Page 337 of 677Special configurationsStorage Mirroring Recover can be implemented with very little configuration necessaryin small
Workload protection Page 338 of 677Domain controllersFailover of domain controllers is dependent on the Storage Mirroring Recoverfunctionality you are
Storage Mirroring Recover requirements Page 33 of 677Storage Mirroring Recover requirementsEach Storage Mirroring Recover server must meet minimum req
Workload protection Page 339 of 677NetBIOSBecause NetBIOS is not available on Windows 2008, if you are using Windows 2008 ina workgroup environment an
Workload protection Page 340 of 677WINSWhen Storage Mirroring Recover failover occurs, Windows initiates WINS registrationwith the target’s primary WI
Workload protection Page 341 of 677WINS registrationWINS registration can be added to your failover and failback scripts by using theWindows NETSH com
Workload protection Page 342 of 677WINS replicationWINS replication can be added to your failover and failback scripts by using theWindows NETSH comma
Workload protection Page 343 of 677DNSIf you are using a Microsoft DNSserver, when Storage Mirroring Recover failoveroccurs, DNS is not automatically
Workload protection Page 344 of 677Windows DNSCMD commandDNS updates can be added to your failover and failback scripts by using the WindowsDNSCMD com
Workload protection Page 345 of 677l Fully qualified domain name of the DNS server—DNSServer.domain.coml DNS zone—domain.comYou would add the followin
Workload protection Page 346 of 677Storage Mirroring Recover DFO utilityDNS updates can be added to your failover and failback scripts by using the St
Workload protection Page 347 of 677syntax.CommandDFODescriptionUsed in scripts to failover DNSserver nameSyntaxDFO [/DNSSRVNAME <dns_server_name&g
Workload protection Page 348 of 677l PASSWORD password—The password associated with theuser accountl DNSZONE zone_name—The name of the DNS zone or DNS
Storage Mirroring Recover requirements Page 34 of 677General source and target server requirementsVerify that each server meets the following general
Workload protection Page 349 of 677l ADDOMAIN active_directory_domain_name—The name of theActive Directory domainl SOURCEDN source_domain_name—The nam
Workload protection Page 350 of 677Non-Microsoft DNSIf you are using a non-Microsoft DNSserver (such as Unix) or if you are in a non-domainconfigurat
Workload protection Page 351 of 67711. Add the following line to the failback script file, substituting your Storage MirroringRecover directory for in
Workload protection Page 352 of 677Macintosh sharesA share is any volume, drive, or directory resource that is shared across a network.During failover
Workload protection Page 353 of 677rem The following command starts the File Server for Macintosh servicenet start "File server for Macintosh&quo
Workload protection Page 354 of 677NFS SharesA share is any volume, drive, or directory resource that is shared across a network.During failover, the
Workload monitoring Page 355 of 677Workload monitoringOnce a workload protection is established you will want to monitor the protection. Youcan monito
Workload monitoring Page 356 of 677Data workloadsWhen you are working with data workloads, you can monitor the connection and you canmonitor the statu
Workload monitoring Page 357 of 677Monitoring a data workloadWhen a source is highlighted in the left pane of the Replication Console, theconnections
Workload monitoring Page 358 of 677Connection statistics1. You can change the statistics that are displayed by selecting File, Options andselecting th
Storage Mirroring Recover requirements Page 35 of 677on. Additionally, on a target server, you need sufficient disk space to store thereplicated data
Workload monitoring Page 359 of 677Target Data Statel OK—The data on the target is in a good state.l Mirroring—The target is in the middle of a mirror
Workload monitoring Page 360 of 677Mirror Statusl Mirroring—If the file size of the replication set has not been calculatedand the data is being mirro
Workload monitoring Page 361 of 677Sent (Bytes)The sent (bytes) statistic indicates the total number of mirror andreplication bytes that have been tra
Workload monitoring Page 362 of 677compression is disabled, this statistic will be the same as sent mirror(bytes).Skipped Mirror (Bytes)The skipped mi
Workload monitoring Page 363 of 677Connection and server displayYou can configure when the icons and colors change to accommodate your networkenvironm
Workload monitoring Page 364 of 677—A red X on a server icon indicates the Replication Console cannotcommunicate with that server or there is a proble
Workload monitoring Page 365 of 677once communications have stopped. Once communications have beenreestablished, the connection background will change
Workload monitoring Page 366 of 677Monitoring failover monitoringSince it can be essential to quickly know the status of failover monitoring, StorageM
Workload monitoring Page 367 of 677The Failover Control Center does not have to be running for failover to occur.The following table identifies how th
Workload monitoring Page 368 of 677Status BarThe status bar displays the source machine and IP address currentlybeing assumed by the target.Colored Bu
Storage Mirroring Recover requirements Page 36 of 677installed, you will need to review the patches available on the Microsoft website and install tho
Workload monitoring Page 369 of 677Monitoring a full-server workloadAfter you have enabled full-server protection, you can monitor the protection from
Workload monitoring Page 370 of 677determine the status of the source. If the source is still up and users are accessingit, you need to resolve the co
Workload monitoring Page 371 of 677Monitoring an application workloadAfter you have enabled application protection, you can monitor the protection fro
Workload monitoring Page 372 of 677l Restoring—Data is being restored from the target to the sourcel Unknown—The mirror status could not be determined
Workload monitoring Page 373 of 677l Target path unblocked—Target path blocking is disabledl Unknown—The state could not be determinedConnected SinceT
Workload monitoring Page 374 of 677Monitoring virtual workloadsWhen you are working with virtual workloads, you can monitor the connection and youcan
Workload monitoring Page 375 of 677Monitoring virtual workloads in the Storage MirroringConsoleClick Monitor Connections from the main Storage Mirrori
Workload monitoring Page 376 of 677Overview connection information displayed in the top paneThe top pane displays high-level overview information abou
Workload monitoring Page 377 of 677l Percentage Complete—If the amount of data to be mirrored has beencalculated and data is actively being mirrored t
Workload monitoring Page 378 of 677Filtering the connections displayed in the top paneYou can filter the connections displayed in the top pane using t
Storage Mirroring Recover requirements Page 37 of 677Foundation EditionWindows 2003 and 2003 R2 operating systemsl Storage Server Editionl Small Busin
Workload monitoring Page 379 of 677Detailed connection information displayed in the bottom paneThe details displayed in the bottom pane of the Monitor
Workload monitoring Page 380 of 677Protection statusThe status of the workload protectionProtected volumesThe volumes that are being protectedTarget d
Workload monitoring Page 381 of 677Connection controls available in the bottom paneThe connection controls available in the bottom pane of the Monitor
Workload monitoring Page 382 of 677Stop protectionStops the selected connectionFailoverInitiate failover by shutting down the source and starting the
Workload monitoring Page 383 of 677Viewing connection detailsThe View Connection Details page allows you to view information about a specificconnectio
Workload monitoring Page 384 of 677Target data statel OK—The data on the target is in a good state.l Mirroring—The target is in the middle of a mirror
Workload monitoring Page 385 of 677l Mirroring—If the file size of the replication set has not been calculatedand the data is being mirrored to the ta
Workload monitoring Page 386 of 677l Failed—The Storage Mirroring service is not receiving replicationoperations from the Storage Mirroring driver. Ch
Workload monitoring Page 387 of 677Monitoring virtual workloads in the Storage MirroringRecover for Virtual Infrastructure consoleSelect Monitor prote
Workload monitoring Page 388 of 677Overview connection information displayed in the top paneThe top pane displays high-level overview information abou
Storage Mirroring Recover requirements Page 38 of 677Standard EditionWindows 2003 and 2003 R2 operating systemsl Storage Server Editionl Small Busines
Workload monitoring Page 389 of 677Detailed connection information displayed in the bottom paneWhen the View protection details button in the toolbar
Workload monitoring Page 390 of 677Connection controlsThe connection controls are available in the toolbar of the Monitor protection page.—Opens the P
Workload monitoring Page 391 of 677Monitoring a cluster workloadIn a standard cluster configuration, where a single copy of data resides on a SCSI dis
Workload monitoring Page 392 of 677Resolving an online pending GeoCluster Replicated DiskresourceWhen the GeoCluster Replicated Disk resource is in an
Workload monitoring Page 393 of 677Windows 2008 MenuDiscard QueueDescriptionIf you have data in the target queue, you can discard that data. If youdis
Workload monitoring Page 394 of 677Windows 2003 MenuAccept DataWindows 2008 MenuAcceptDescriptionIf you accept the data, the current data on the node
Workload monitoring Page 395 of 677GeoCluster Replicated Disk Status ResourceThe function of the GeoCluster Replicated Disk Status resource (also disp
Workload monitoring Page 396 of 677Log filesVarious Storage Mirroring Recover components (Storage Mirroring service, ReplicationConsole, Failover Cont
Workload monitoring Page 397 of 677Viewing the log fileYou can view the Storage Mirroring Recover log file through the Replication Console orthrough a
Workload monitoring Page 398 of 677Viewing the log file through the Replication Console1. Open a new message window using any of the following methods
Application workload requirements 46Exchange protection requirements 48SQL protection requirements 52BlackBerry protection requirements 54File Server
Storage Mirroring Recover requirements Page 39 of 677Advanced EditionWindows 2003 and 2003 R2 operating systemsl Storage Server Editionl Small Busines
Workload monitoring Page 399 of 6773. To control the window after it is created, use one of the following methods toaccess the control methods listed
Workload monitoring Page 400 of 6774. To change which server you are viewing messages for, select a different machinefrom the drop down list on the to
Workload monitoring Page 401 of 677Viewing the log file through a text editorThe log files can be viewed, from the location where Storage Mirroring Re
Workload monitoring Page 402 of 677Mirroring Servers09/11/2010 12:45:53.9580 704 1032 3 2 0 Adding default group: StorageMirroring Servers\Auto-Discov
Workload monitoring Page 403 of 677Filtering the log fileLog file output can be filtered using the LogViewer utility. Use the LogViewer commandfrom th
Workload monitoring Page 404 of 677l NOID—Does not display the LogViewer ID in the outputl HELP—Displays the command optionsExamplesl LogViewer -type
Workload monitoring Page 405 of 677Configuring the properties of the log file1. To modify the maximum file size and the number of Storage Mirroring Re
Workload monitoring Page 406 of 677Storage Mirroring Recover log messagesThe following list describes some of the standard Storage Mirroring Recover a
Workload monitoring Page 407 of 67773 Connected to ip://xxx.xxx.xxx.xxxA source machine has successfully connected a replication set to a targetmachin
Workload monitoring Page 408 of 67781 Schedule transmit start to targetA scheduled transmission of data from a source machine to a targetmachine has s
Storage Mirroring Recover requirements Page 40 of 677Premium EditionWindows 2003 and 2003 R2 operating systemsl Storage Server Editionl Small Business
Workload monitoring Page 409 of 67794 Verification started con_idThe verification process of confirming that the Storage Mirroring Recoverdata on the
Workload monitoring Page 410 of 67710003 Activation code violation with machine machine_nameDuplicate single-server activation codes are being used on
Workload monitoring Page 411 of 677l (112) Disk full: The disk to which data is being written on the target isfull. This issue may be resolved by dele
Workload monitoring Page 412 of 677503010 Asyncloctl for status thread 178 terminated, terminating the status threadA Storage Mirroring Recover proces
Workload monitoring Page 413 of 677Monitoring event messagesAn event is a significant occurrence in the system or in an application that requiresadmin
Workload monitoring Page 414 of 677Event messagesThe following table identifies the Storage Mirroring events.1 This evaluation period has expired. Mir
Workload monitoring Page 415 of 6771003 The Double-Take counter DLL could not open the "Performance" key in theDouble-Take section of the re
Workload monitoring Page 416 of 6774006 Service has aborted due to the following unrecoverable error: %1Error—Restart the Storage Mirroring service.40
Workload monitoring Page 417 of 6774018 %1, however, mirroring and replication have been disabled as a restore isrequired due to a previous failover.W
Workload monitoring Page 418 of 6774030 RSResource.dll has an unknown error. The product functionality has beendisabled.Error—Reinstall the software,
Storage Mirroring Recover requirements Page 41 of 677Virtual Guest 5-Pack EditionWindows 2003 and 2003 R2 operating systemsl Storage Server Editionl S
Workload monitoring Page 419 of 6774037 Error verifying the vendor URL name. The product functionality has beendisabled.Error—Reinstall the software,
Workload monitoring Page 420 of 6774044 An error was encountered and replication has been stopped. It is necessaryto stop and restart the service to c
Workload monitoring Page 421 of 6774054 Service has paused a restore task to %1 (%2) for Replication Set %3, ID: %4Information—No action required.4055
Workload monitoring Page 422 of 6774066 The product code requires a virtual server environment. The productfunctionality has been disabled.Error—The a
Workload monitoring Page 423 of 6774098 The control device %2 was not created. Communication with the service willbe disabled. Reboot the server and c
Workload monitoring Page 424 of 6774111 Target can not write %1 due to a sharing violation. Operation will be retried(%2 times or forever)Warning—A sh
Workload monitoring Page 425 of 677scenarios did not cause the task to be discarded, contact technicalsupport.4202 Running %1 in band script: %2 (task
Workload monitoring Page 426 of 6774306 Target paths for source %1 (%2) Connection id: %3 are already blockedWarning—No action required.4307 Target pa
Workload monitoring Page 427 of 6774407 Disabled snapshot schedule for source %1 (%2) connection %3.Information—No action required.4408 %1 was unable
Workload monitoring Page 428 of 6775103 Started adding drive shares from %1 to %2.Information—No action required.5104 %1 drive shares were taken over
Storage Mirroring Recover requirements Page 42 of 677Virtual Host Standard EditionWindows 2008 and 2008 R2 operating systemsl Standard EditionVirtual
Workload monitoring Page 429 of 6775302 Drive share information for %1 has been updated on the target machine.Information—No action required.5303 The
Workload monitoring Page 430 of 6775503 E-mail notification could not be processed. Check to make sure the correctversion of SMTPMail.DLL is registere
Workload monitoring Page 431 of 6777107 The driver was unable to get valid name information from the Filter Managerfor a file. It cannot be replicated
Workload monitoring Page 432 of 677repeatedly, contact technical support. The last Word in the Data window is the NTstatus code.Warning—Contact techni
Workload monitoring Page 433 of 6779106 The driver encountered an error writing file security data to the service inputbuffer. Check the Event Viewer
Workload monitoring Page 434 of 6779112 The driver encountered an error writing a directory query to the service inputbuffer. Check the Event Viewer A
Workload monitoring Page 435 of 677information or contact technical support. The last Word in the Data window is theexception code.Error—Check for rel
Workload monitoring Page 436 of 677or contact technical support. The last Word in the Data window is the exceptioncode.Error—Check for related service
Workload monitoring Page 437 of 67710005 Node %1 is taking ownership of the group %2. The group will be broughtonline on this node.Information—No acti
Workload monitoring Page 438 of 67710102 The driver could not recall the file. The last Word in the Data window is theexception code.Error—Contact tec
Storage Mirroring Recover requirements Page 43 of 677Virtual Host Advanced EditionWindows 2008 and 2008 R2 operating systemsl Standard Editionl Enterp
Workload monitoring Page 439 of 67711011 Service has aborted the archive preview operation.Warning—Verify the activation code on the source and target
Workload monitoring Page 440 of 67716384 The driver encountered an unrecoverable error. Contact technical support.Error—Contact technical support16385
Workload monitoring Page 441 of 677E-mailing event messagesYou can e-mail Storage Mirroring Recover event messages to specific addresses. Thesubject o
Workload monitoring Page 442 of 677Note: Any specified notification settings are retained when Enable notification isdisabled.5. Specify your e-mail s
Workload monitoring Page 443 of 677the list.Note: You can test e-mail notification by specifying the options on the E-mailNotification tab and clickin
Workload monitoring Page 444 of 677StatisticsStatistics logging is the process of taking snapshots of Storage Mirroring Recoverstatistical data. The d
Workload monitoring Page 445 of 677Configuring the properties of the statistics file1. Right-click a machine in the left pane of the Replication Conso
Workload monitoring Page 446 of 677l Write Interval—The frequency in which Storage Mirroring Recover writes thestatistical data to the statistics log
Workload monitoring Page 447 of 677Viewing the statistics fileThe statistics log file created is a binary file. To view the log file, you must run the
Workload monitoring Page 448 of 677l -STOP mm/dd/yyyy hh:mm—Filters out any data after the specifieddate and timel -SERVER ip_address port_number—Conn
Storage Mirroring Recover requirements Page 44 of 677Virtual Host Premium EditionWindows 2008 and 2008 R2 operating systemsl Standard Editionl Enterpr
Workload monitoring Page 449 of 677StatisticsThe following table identifies the Storage Mirroring statistics.Note: The categories you see will depend
Workload monitoring Page 450 of 677Kernel, SourceStatel 0—Source is not runningl 1—Source is running without the replication driverl 2—Source is runni
Workload monitoring Page 451 of 677Kernel, FailedMirrorCountThe number of mirror operations that failed due to an error reading the filefrom the diskK
Workload monitoring Page 452 of 677Target, Ops RemainingThe total number of operations that are left in the target queueTarget, Orphan Files RemovedTh
Workload monitoring Page 453 of 677Connection, conPeerAddressThe IP address of the target machineConnection, connectTimeThe time that this connection
Workload monitoring Page 454 of 677Connection, conBytesInRepQueueThe number of replication bytes remaining to be transmitted to the targetConnection,
Workload monitoring Page 455 of 677changes to a file, then it will indicate the number of bytes it did not send forthis file in this field.Connection,
Workload monitoring Page 456 of 677Performance MonitorPerformance Monitor is the Windows graphical tool for measuring performance. Itprovides charting
Workload monitoring Page 457 of 677Monitoring Performance Monitor statistics1. To access the Performance Monitor, select Start, Programs, Administrati
Workload monitoring Page 458 of 677Performance Monitor statisticsThe following table identifies the Storage Mirroring Performance Monitor statistics.N
Storage Mirroring Recover requirements Page 45 of 677Full-server workload requirementsIf you will be protecting an entire server, the general source a
Workload monitoring Page 459 of 677Connection, Operations receivedThe number of operations received by the target since the lastPerformance Monitor re
Workload monitoring Page 460 of 677sources connected to this target. If the value grows larger than the numberof currently executing differences mirro
Workload monitoring Page 461 of 677Kernel, Replication Kbytes generatedThe number of replication kilobytes generated on the source by the filesystem d
Workload monitoring Page 462 of 677Target, Orphan BytesThe number of orphan bytes removed from the targetTarget, Orphan DirectoriesThe number of orpha
Workload monitoring Page 463 of 677SNMPSNMP, Simple Network Management Protocol, is the Internet's standard for remotemonitoring and management o
Workload monitoring Page 464 of 677Configuring SNMP on your serverSNMP must be installed on a server before Storage Mirroring Recover in order for the
Workload monitoring Page 465 of 677SNMP trapsThe following table lists the Storage Mirroring SNMP traps.Kernel, dttrapKernelStartedStorage Mirroring h
Workload monitoring Page 466 of 677Connection, dttrapConnectionFailedThe source to target connection was not successfulConnection, dttrapConnectionLos
Workload monitoring Page 467 of 677Mirroring, dttrapMirrorStopMirroring has stoppedMirroring, dttrapMirrorPauseMirroring has pausedMirroring, dttrapMi
Workload monitoring Page 468 of 677SNMP statisticsThe following table lists the Storage Mirroring SNMP statistics.General, dtUpTimeTime in seconds sin
Storage Mirroring Recover requirements Page 46 of 677Application workload requirementsIf you will be protecting an application, the general source and
Workload monitoring Page 469 of 677General, dtDriverQueuePercentThe amount of throttling calculated as a percentage of the stop replicatinglimitSource
Workload monitoring Page 470 of 6771—Active. This indicates that the connection is functioning normally andhas no scheduling restrictions imposed on i
Workload monitoring Page 471 of 677Connection, dtconBytesCompressedTxThe total number of compressed bytes transmitted to the targetConnection, dtconOp
Workload monitoring Page 472 of 677Error codesThe following table contains error codes that you may see in the various user interfacesor in log files.
Workload monitoring Page 473 of 677-125 Connection is replicating-126 Connection is not replicating-127 Replication set is enabled-128 Schedule is not
Workload monitoring Page 474 of 677-154 Transmission is active-155 Target does not support the command-156 Command conversion to accommodate a differe
Workload monitoring Page 475 of 677-183 Connection ID specified is invalid-184 No command objects are in the queue-185 Target is discarding operations
Workload monitoring Page 476 of 677-223 Script timeout met-224 No replication timeout met - connection is bad-225 Invalid path-226 Kernel module is no
Workload monitoring Page 477 of 677-2401 Snapshot module is not loaded-2402 Error reading the snapshot .dll-2403 Snapshot not found-2404 No snapshot c
Failover Page 478 of 677FailoverYour failover process will depend on the type of workload you are protecting.l Failing over data workloads, applicatio
Storage Mirroring Recover requirements Page 47 of 677the Storage Mirroring Recover installation, or from a copy you have obtainedmanually from the Mic
Failover Page 479 of 677Failing over data workloads, application workloadsconfigured for identity failover, and cluster workloadsThe failover process,
Failover Page 480 of 677Select an option based on the table below. You may want to check the amount of data inqueue on the target by reviewing the Sta
Failover Page 481 of 677After failover is complete, clients will be rerouted to the target, which is standing in for thesource.Exchange Note: Users us
Failover Page 482 of 677After failing over SQL 2008, you may not be able to take the SQLdatabase offline. If this occurs, stop and restart the SQLSer
Failover Page 483 of 677Full-server workload failoverFull-server failover can be initiated through the Full-Server Failover Manager client or byusing
Failover Page 484 of 677Failing over using the Full-Server Failover ManagerWhen a failover condition is met, you will want to start failover. Addition
Failover Page 485 of 677l Revert to specified snapshot—Select this option, and then select asnapshot. The data on thetarget will be reverted to the s
Failover Page 486 of 677l KMS volume licensing—Key Management Service (KMS) licensing allows ITprofessionals to complete activations on their local ne
Failover Page 487 of 677Failing over from the command lineYou can configure connections and initiate failover without using the Full-ServerFailover Ma
Failover Page 488 of 677l LOGLEVEL number—Specifies the level of detailed logged based onthe following numbers.l 2—Informational messages are loggedl
Storage Mirroring Recover requirements Page 48 of 677Exchange protection requirementsIn addition to the general application requirements, you must als
Failover Page 489 of 6771. View or download the Microsoft Volume ActivationDeployment Guide from the Microsoft web site.2. Using an administrative use
Failover Page 490 of 677Failing over application workloads configured forDNSfailoverWhen a failover condition has been met, failover will be triggere
Failover Page 491 of 6773. Specify if you want to perform an immediate or graceful failover. An immediatefailover begins immediately without waiting f
Failover Page 492 of 677l Revert to specified snapshot—Select this option, and then select asnapshot. The data on thetarget will be reverted to the s
Failover Page 493 of 677Outlook Web Access is not needed, contact technical support for aworkaround.If you SMTP gateway is configured to send e-mail t
Failover Page 494 of 677Virtual workload failoverWhen a failover condition has been met, failover will be triggered automatically if youconfigured aut
Failover Page 495 of 677Failing over virtual workloads in the Storage MirroringConsole1. On the Monitor Connections page, select the connection that y
Failover Page 496 of 677shutdown and the protection job will be restarted performing a file differencesremirror.
Failover Page 497 of 677Failing over virtual workloads in the Storage MirroringRecover for Virtual Infrastructure console1. Make sure your protection
Failback and restore Page 498 of 677Failback and restoreYour failover and restoration process will depend on the type of workload you areprotecting.l
Viewing server details 92Viewing server events 94Providing server credentials 95Managing VirtualCenter servers 96Console options 97Setting the frequen
Storage Mirroring Recover requirements Page 49 of 677Microsoft Knowledge Base articles 822179, 332097, 305065, 304403, and875427.l The source and targ
Failback and restore Page 499 of 677Data workload failback and restorationFailover occurred because the target was monitoring the source for a failure
Failback and restore Page 500 of 677Restoring then failing backRestoring before failing back allows your users to continue accessing their data on the
Failback and restore Page 501 of 6779. From your target, confirm the Replication Console is communicating with thesource using the new IP address.a. F
Failback and restore Page 502 of 677functionality (Microsoft failover from node to node) available duringthe restoration process, you will have to cre
Failback and restore Page 503 of 677l Overwrite existing files during restore—This option restores allexisting files by overwriting them. Any files th
Failback and restore Page 504 of 67711. After the Mirror Status is Idle, schedule a time for failback. User downtime willbegin once failback is starte
Failback and restore Page 505 of 677k. Also on the source, change the source name back to its original name andreboot, or restart the Workstation, Ser
Failback and restore Page 506 of 677Failing back then restoringFailback before restoration can be a simpler process, but it may require additionaldown
Failback and restore Page 507 of 677Note: The source must be online and Storage Mirroring Recover must be runningto ensure that the source post-failba
Failback and restore Page 508 of 677Note: If your target is a cluster, you can specify just one node in the clusterand restore only from that node. If
Storage Mirroring Recover requirements Page 50 of 677l Like-named cluster protection—If you are using Exchange 2003, you can protecta cluster with a l
Failback and restore Page 509 of 677i. Select the Restore Replication Set check box to restore the target’s copy ofthe replication set database to the
Failback and restore Page 510 of 6779. Because there are no users accessing the target data, the restoration process iscomplete when the Mirror Status
Failback and restore Page 511 of 677Failing back and restoring a full-server workloadAfter your target has failed over and becomes your source, you ca
Failback and restore Page 512 of 677Preparation of your original source or a new server source is key to this process. Thetype of preparation required
Failback and restore Page 513 of 677remaining instructions.Note: If possible, you can attach any virtual hard disks that survived thefailure event to
Failback and restore Page 514 of 6774. Stop all application services on the original source and set them to manual.5. Using the Replication Console, i
Failback and restore Page 515 of 6772. Mirroring and replicating from the source to the original ornew source and failing over1. Using the Full-Server
Failback and restore Page 516 of 677Application failback and restorationWhen protecting application workloads, your failback and restoration process w
Failback and restore Page 517 of 677steps as a guideline for rebuilding the source server.1. Install Windows, and any service packs, using the same na
Failback and restore Page 518 of 677Failback and restoration for applications configured foridentity failoverFor application workloads that were confi
Storage Mirroring Recover requirements Page 51 of 677control to the target in the Configuration Naming Context in order to moveusers during failover.
Failback and restore Page 519 of 677Exchange 2003l MSExchangeSAl MSExchangeMGMTl POP3SVCl IMAP4SVCl ResVCl MSExchangeESl W3SVCl SMTPSVCSQL Serverl MSS
Failback and restore Page 520 of 677File Serverl Serverl Computer Browser
Failback and restore Page 521 of 677Restoring then failing back applications configured for DNSfailoverFor application workloads that were configured
Failback and restore Page 522 of 677l Source IPAddress—Select an IP address on the source to handle therestoration data. In a cluster environment run
Failback and restore Page 523 of 6774. Click Initiate Failback to being the failback process.Exchange Note: If you deslected any mail stores during yo
Failback and restore Page 524 of 677Restoring then failing back virtual workloads1. Open the console you used to establish protection.2. On the Monito
Connections Page 525 of 677ConnectionsA unique connection ID is associated with each Storage Mirroring Recover connection.The connection ID provides a
Connections Page 526 of 677Data queuesDuring the Storage Mirroring Recover installation, you identified the amount of diskspace that can be used for S
Connections Page 527 of 677has 10 KB left until the limit and the next operation to be applied to that fileis greater than 10 KB, a new transaction lo
Connections Page 528 of 677Queuing dataYou should configure queuing on both the source and target.1. Open the Replication Console and right-click the
Storage Mirroring Recover requirements Page 52 of 677SQL protection requirementsIn addition to the general application requirements, you must also mee
Connections Page 529 of 677l Select a dedicated, physical, non-boot volume.l Select a location on a non-clustered volume that will have minimalimpact
Connections Page 530 of 677amount of physical memory available but has a minimum of 32 MB. Bydefault, 128 MB or 512 MB of memory is used, depending on
Connections Page 531 of 677Note: The Maximum disk space for queue and Minimum Free Spacesettings work in conjunction with each other. For example, ass
Connections Page 532 of 677Auto-disconnect and auto-reconnectWhile disk queues are user configurable and can be extensive, they are limited. If theamo
Connections Page 533 of 677l Target service shutdown—If the target service is stopped and restarted, therecould have been data in the target queue whe
Connections Page 534 of 677Reconnecting automaticallyUse the following steps to configure automatic reconnections.1. Open the Replication Console and
Connections Page 535 of 677Pausing and resuming target processingYou can pause the target, which queues incoming Storage Mirroring Recover data fromth
Connections Page 536 of 677Blocking writing to the target pathsYou can block writing to the paths on the target that contain the copy of the replicati
Connections Page 537 of 677Disconnecting a connectionTo disconnect a Storage Mirroring Recover connection, open the Replication Console,and right-clic
Mirroring Page 538 of 677MirroringMirroring is one of the key components of Storage Mirroring Recover. You can performthe following functions to manag
Storage Mirroring Recover requirements Page 53 of 677l The source and target servers should be in the same domain. If they are not,the SQL Server serv
Mirroring Page 539 of 677Stopping, starting, pausing, or resuming mirroringAfter a connection is established, you need to be able to control the mirro
Mirroring Page 540 of 677File difference mirror options comparedl File Differences—Any file that is different on the source and target based on thedat
Mirroring Page 541 of 677Mirroring automaticallyIn certain circumstances, for example if the disk-based queues on the source areexhausted, Storage Mir
Mirroring Page 542 of 677l Full—All files are sent to the target.Note: Database applications may update files without changing the date,time, or file
Mirroring Page 543 of 677Running scripts during mirroringYou can customize your mirroring process by running customized scripts on the target atpredef
Mirroring Page 544 of 6774. For each of the three predefined points in the mirroring process, specify thefollowing information.l Script path—Specify t
Mirroring Page 545 of 677establish additional connections to the same target using the same target pathlocation, the mirror scripts will automatically
Mirroring Page 546 of 677Removing orphan filesAn orphan file is a file that exists in the target’s copy of the replication set data, but itdoes not ex
Mirroring Page 547 of 6774. To configure orphan files for processing during a mirror, verify, or restore, use thefollowing instructions.a. Right-click
Mirroring Page 548 of 677so that the orphan files are only moved once.f. Specify if you want to Remove All Orphans or Remove Orphans notmodified withi
Storage Mirroring Recover requirements Page 54 of 677BlackBerry protection requirementsIn addition to the general application requirements, you must a
Replication Page 549 of 677ReplicationReplication is one of the key components of Storage Mirroring Recover. This sectioncontains the following replic
Replication Page 550 of 677Replication capabilitiesStorage Mirroring Recover replicates file and directory data stored on any Windows filesystem (FAT,
Replication Page 551 of 6773. If you select a dynamic volume and you increase the size of the volume, the targetmust be able to compensate for an incr
Replication Page 552 of 677where the encrypted file is located is out of space, when it actually may bethe location where the temporary file is trying
Replication Page 553 of 677restoration is complete and replication will continue from the target to thesource.e. If you have restored your data before
Replication Page 554 of 677Replication setsA replication set defines the data on a source machine that Storage Mirroring Recoverprotects. Replication
Replication Page 555 of 677l Calculating replication set sizel Deleting a replication setKeep in mind the following notes when creating and working wi
Replication Page 556 of 677l If you rename the root folder of a connected replication set, Storage MirroringRecover interprets this operation as a mov
Replication Page 557 of 677replication set to ensure the data is replicated to the correct location. (Thesecond file can be a zero byte file if desire
Replication Page 558 of 677Creating a replication setBefore you can establish a connection, you must create a replication set.1. From the Replication
Storage Mirroring Recover requirements Page 55 of 677File Server protection requirementsIn addition to the general application requirements, you must
Replication Page 559 of 677Note: Be sure and verify what files can be included by reviewing Replicationcapabilities.5. After selecting the data for th
Replication Page 560 of 677Creating or modifying replication rules manuallyThere may be times when you cannot browse for data when creating a replicat
Replication Page 561 of 677l Inc—Include indicates that the specified path is to be included in the filessent to the targetl Exc—Exclude indicates tha
Replication Page 562 of 677Modifying a replication setStorage Mirroring Recover allows you to make modifications to a replication set whenyou want to
Replication Page 563 of 677Renaming and copying a replication setTo rename or copy a replication set, open the Replication Console. Click once on ahig
Replication Page 564 of 677Calculating replication set sizeWhile Storage Mirroring Recover is mirroring, the right pane of the Replication Consoledisp
Replication Page 565 of 677Note: You can also configure the replication set calculation when establishing aconnection through the Connection Manager b
Replication Page 566 of 677Deleting a replication setYou can only delete a replication set if it is not currently connected. If the replication setis
Replication Page 567 of 677Starting replicationStarting replication when establishing a connection is the default and recommendedconfiguration. If rep
Replication Page 568 of 677Inserting tasks during replicationTask command processing is a Storage Mirroring Recover feature that allows you toinsert a
Storage Mirroring Recover requirements Page 56 of 677Virtual workload requirementsWhen you are protecting virtual server workloads, the general source
Verification Page 569 of 677VerificationVerification is the process of confirming that the data on the target is identical to the dataon the source. V
Verification Page 570 of 677Verifying manuallyA manual verification can be run anytime a mirror is not in progress.1. Open the Replication Console.2.
Verification Page 571 of 677blocks (not the entire files) that are different will be identified in the log andremirrored to the target.Note: Database
Verification Page 572 of 677Verifying on a scheduleVerification can be scheduled to occur automatically at periodic intervals.1. Open the Replication
Verification Page 573 of 6777. If you are remirroring your files, you can specify Only if Source file is newer thanTarget copy so that only files that
Verification Page 574 of 677Configuring the verification logA verification log is created on the source during the verification process. The logidenti
Verification Page 575 of 677name. For example, since the default is DTVerify.log, the verification log for thereplication set called UserData would be
Verification Page 576 of 677File: beta\users\vincent\training.doc DIFFERENT ON TARGETSource Attributes: Timestamp = 1/12/2010 3:28:20 PM Size = 17 Ma
Verification Page 577 of 6771. Each mask begins with 0x. Identify the hexadecimal number after the constant 0x.For example, if the mask is 0x23, then
Verification Page 578 of 6770000000000100011, indicates read only, hidden, and archive. Another examplemight be mask 0x827 which converted to binary i
Storage Mirroring Recover requirements Page 57 of 677Physical or virtual to Hyper-V requirementsUse these requirements if your source is a physical or
Verification Page 579 of 677Verify applications on the targetThe application verification process confirms that an Exchange or SQLapplicationdatabase
Verification Page 580 of 677your environment, is available in the \Samples sub-directory of your StorageMirroring Recover installation.l Script to run
Verification Page 581 of 677Verifying applications on the target from the command lineIf desired, you can verify your application on the target by usi
Verification Page 582 of 677the services you configured for application failover will be started whenthe test is performed. Use the ALL option if you
Verification Page 583 of 677Notesl The application verification process from the command line is notavailable for Exchange or SQL in a cluster environ
Data transmission Page 584 of 677Data transmissionStorage Mirroring Recover data is continuously transmitted to the target machine.Although the data m
Data transmission Page 585 of 677Stopping, starting, pausing, and resumingtransmissionTo start, pause, or resume the transmission of data from the sou
Data transmission Page 586 of 677Scheduling data transmissionUsing the Connection Manager Transmit tab, you can set start and stop criteria alongwith
Data transmission Page 587 of 677l Transmission session start—This option establishes a date and time of theday to begin transmitting data. For exampl
Data transmission Page 588 of 677cannot continue to queue data causing an auto-disconnect and the potentialfor loss of data. To avoid using the entire
Storage Mirroring Recover requirements Page 58 of 677will also need version 3.5.1. You can install this version from the Storage MirroringRecover CD,
Data transmission Page 589 of 677l Time Limit—The time limit specifies the maximum length of time for eachtransmission period. Any data that is not se
Data transmission Page 590 of 677will be established when there is 10 MB of data in the queue. Thedata will be transmitted and when the 10 MB Byte Lim
Data transmission Page 591 of 677l Enable Transmission Window—This option specifies whether atransmission window is in use.l Open window time—Specifie
Data transmission Page 592 of 677Limiting transmission bandwidthBandwidth limitations are available to restrict the amount of network bandwidth used f
Data transmission Page 593 of 6774. You have three bandwidth choices.l No Bandwidth Limit—Data will be transmitted at all times using all availableban
Data transmission Page 594 of 6777. If you want to transmit data according to a schedule using limited bandwidth, selectScheduled Bandwidth Limit.a. C
Data transmission Page 595 of 677Note: You can establish a bandwidth schedule and then disable or override it byselecting No Bandwidth Limit or Fixed
Data transmission Page 596 of 677Compressing data for transmissionTo help reduce the amount of bandwidth needed to transmit Storage Mirroring Recoverd
Data transmission Page 597 of 6773. By default, compression is disabled. To enable it, select Enable Compression.4. Depending on the compression algor
Snapshots Page 598 of 677SnapshotsA snapshot is an image of data taken at a single point in time. Snapshots allow you toview files and folders as they
Configuring the level of detail to log 124Clearing maintained security credentials 125Configuring how servers are added to the Full-Server Failover Ma
Storage Mirroring Recover requirements Page 59 of 677Physical or virtual to ESX requirementsUse these requirements if your source is a physical or vir
Snapshots Page 599 of 677functionality may have on Storage Mirroring Recover. For example, if you change thelocation where the shadow copies are store
Snapshots Page 600 of 677Snapshots for data workloadsl Snapshot states explains the various states of data workload snapshots.l Automatic snapshots ex
Snapshots Page 601 of 677Snapshot statesA snapshot may not necessarily be useful if the data on the target is in a bad state. Youonly want snapshots o
Snapshots Page 602 of 677Write operation retriedl State—Goodl Description—An operation cannot be written to the hard drive on the target. Forexample,
Snapshots Page 603 of 677l Automatic action taken for scheduled and automatic snapshots—Scheduledand automatic snapshots will occur normally.l User in
Snapshots Page 604 of 677l Automatic action taken for scheduled and automatic snapshots—Scheduledand automatic snapshots will be delayed until a resto
Snapshots Page 605 of 677Automatic snapshotsWhen Storage Mirroring Recover transitions from a good state to a bad state, it willautomatically attempt
Snapshots Page 606 of 677Scheduling snapshotsYou can schedule snapshots of your target data to fit your environment and needs. If thetarget data is in
Snapshots Page 607 of 6776. Specify if you want the snapshots to start immediately. Otherwise, enter a date andtime for when the snapshot schedule wil
Snapshots Page 608 of 677Taking snapshots manuallyYou can manually take a snapshot of the data on the target at any time. If an automatic orscheduled
Storage Mirroring Recover requirements Page 60 of 677and system state of the source. Since the virtual recovery appliance maintains itsown identity, i
Snapshots Page 609 of 677Managing full-server and application snapshotsSnapshots can be created for full-server and application protections. If enable
Snapshots Page 610 of 677l Enable periodic snapshots—This option will not be available if you do not meetsnapshot requirements. If you disable or do n
Recommended optimizations Page 611 of 677Recommended optimizationsStorage Mirroring Recover is an exceptionally flexible product that can be used in a
Recommended optimizations Page 612 of 677PlanningBefore you begin your Storage Mirroring Recover installation, you should plan yourimplementation stra
Recommended optimizations Page 613 of 677l Create a connection to the Diagnostics target. This connection uses a built-in null(non-existent) target to
Recommended optimizations Page 614 of 677InstallationMake sure you review all of the Storage Mirroring Recover requirements, including thegeneral sour
Recommended optimizations Page 615 of 677l Upgrades—Keep the following caveats in mind when upgrading.l If the connection was created with the Applica
Recommended optimizations Page 616 of 677General optimizationsThe following are general optimizations that can be used for any Storage MirroringRecove
Recommended optimizations Page 617 of 677l Low bandwidth and queuing—In low bandwidth environments, you may need torevisit the queuing configuration y
Recommended optimizations Page 618 of 677l Disable root encryption—If the top-level folders in your replication sets are notencrypted, you can gain a
Storage Mirroring Recover requirements Page 61 of 677Hyper-V to Hyper-V requirementsUse these requirements if your source is a virtual server on a Hyp
Recommended optimizations Page 619 of 677l E-mail notification—Enable e-mail notification through the Server Properties E-mail Notification tab so tha
Recommended optimizations Page 620 of 677Anti-virus protectionl Storage Mirroring Recover queues—Exclude the Storage Mirroring Recoverqueue directory
Recommended optimizations Page 621 of 677Application workloadsReview the following optimizations when you are protecting applications on your source.l
Recommended optimizations Page 622 of 677Exchangel Exchange 2003 and 2007—Use the Storage Mirroring Recover ApplicationManager for Exchange 2003 and 2
Recommended optimizations Page 623 of 677SQL Service Principal Names (SPNs) during failover and failback. If you have touse different accounts, Kerber
Recommended optimizations Page 624 of 677Cluster workloadsYou should carefully review Microsoft documentation and resources for properlyconfiguring yo
Security Page 625 of 677SecurityTo ensure protection of your data, HP products offer multi-level security using nativeoperating system security featur
Security Page 626 of 677Security credentialsWhen a client machine attempts to access a source or target machine running onWindows, it will attempt to
Security Page 627 of 677Note: If a user name exists both on the local machine and on the network, Windows firstattempts to login to the machine with t
Security Page 628 of 677Adding users to the security groupsThe security groups are automatically created during the installation process. Thegroups ar
Storage Mirroring Recover requirements Page 62 of 677l Windows Management Instrumentation (WMI)—The host and guestoperating systems must have the WMI
Security Page 629 of 677Changing the account used to run the StorageMirroring serviceBy default, the Storage Mirroring service is configured to log on
Security Page 630 of 6773. Add the domain account to the local administrator group.a. Select Start, Programs, Administrative Tools, Computer Managemen
Evaluations Page 631 of 677EvaluationsYou may want to evaluate Storage Mirroring Recover before implementing it in yourproduction environment. This is
Evaluations Page 632 of 677Evaluating data protectionThe following evaluation procedure has eleven tasks containing step-by-stepinstructions for evalu
Evaluations Page 633 of 677Establishing a connection1. Open the Replication Console.2. Click Make a connection from the right pane of the Replication
Evaluations Page 634 of 677logon is not successful, the Logon dialog box will appear prompting for yoursecurity identification. When logging in, the u
Evaluations Page 635 of 677Monitoring the activity and completion of the initial mirrorView your new connection in the Replication Console by highligh
Evaluations Page 636 of 677Changing data to cause replicationIn order to test replication, you need to change the data on your source. This includesmo
Evaluations Page 637 of 677Note: Many user applications typically save an entire file even though only a portion ofthe file may have changed. Therefor
Evaluations Page 638 of 677Verifying the data changes on the targetNow that you have modified some of the files, you want to be sure that the filemodi
Storage Mirroring Recover requirements Page 63 of 677ESX to ESXrequirementsUse these requirements if your source is a virtual server on an ESXserver
Evaluations Page 639 of 677Just like when you were monitoring the mirror and replication processes, you canmonitor the verification process. Notice th
Evaluations Page 640 of 677Testing your target dataAt this point in your evaluation, you may want to test your target data. The type of testingyou wil
Evaluations Page 641 of 677you do want the newer files on the target to be overwritten by the files fromthe source. Click OK to begin the mirror.When
Evaluations Page 642 of 677Configuring failover monitoringThe following instructions will configure failover monitoring.1. Open the Failover Control C
Evaluations Page 643 of 677to Active Directory on the target. If you are using Active Directory, enable thisoption or you may experience problems with
Evaluations Page 644 of 677Monitoring failoverSince it can be essential to quickly know the status of failover, Storage MirroringRecover offers variou
Evaluations Page 645 of 677The Failover Control Center does not have to be running for failover to occur.Monitoring failover monitoring contains more
Evaluations Page 646 of 677Simulating a failureTo fully evaluate failover, you need to simulate a failure. The Failover Control Centerdoes not have to
Evaluations Page 647 of 677Simulating data changes after failoverWhile your source is failed over to your target, end users continue to work withoutin
Evaluations Page 648 of 677Initiating failbackWhen failover occurs, a source machine has failed. The steps below must be used tocomplete failback, whi
Storage Mirroring Recover requirements Page 64 of 677l Microsoft .NETFramework—The source and target servers require the Microsoft.NET Framework vers
Evaluations Page 649 of 6776. At this time, you would connect the source to the network. For this evaluation,reconnect the network cable(s) on the sou
Evaluations Page 650 of 677Restoring your dataThe Replication Console provides an easy method for restoring replicated data from thetarget back to the
Evaluations Page 651 of 6775. Select the Restore To machine. For this evaluation, select the original source.This is the machine where the copy of the
Evaluations Page 652 of 677Evaluating full-server protectionThe following evaluation procedure has five tasks containing step-by-step instructionsfor
Evaluations Page 653 of 677Establishing full-server protection1. Login as a user that is a member of both the Double-Take Admin and localAdministrator
Evaluations Page 654 of 6776. Double-click on any of the validation items to see details. You must correct anyerrors before you can enable protection.
Evaluations Page 655 of 677Monitoring the activity and completion of the initial mirrorAfter you have enabled full-server protection, you can monitor
Evaluations Page 656 of 677Changing data to cause replication and verifying the datachangesIn order to test replication, you need to change the data o
Evaluations Page 657 of 677Simulating a failureTo fully evaluate failover, you need to simulate a failure. To do this, power off the source.Watch as t
Evaluations Page 658 of 677Starting failoverWhen a failover condition is met, you will want to start failover. You can actually startfailover without
Storage Mirroring Recover requirements Page 65 of 677Cluster workload requirementsMake sure your cluster meets the general source and target server re
Evaluations Page 659 of 677failover, the target will be rebooted automatically. After the reboot, the target will nolonger exist, since it will become
Index Page 660 of 677Index..NET requirement 34, 67AA records 221ACLs (access control list) 550activation codes 74, 132, 167Active Directoryapplication
Index Page 661 of 677scripts 246snapshots 229, 609storage group 233workload 21, 23, 136, 218Application Manager 128, 130auto-disconnect 532auto-reconn
Index Page 662 of 677ESX 259, 293files 550full-server workload 205GeoCluster 322, 329Hyper-V 259, 271standard cluster 303using 596configurationschaine
Index Page 663 of 677Connection Wizard 137-138console 84, 100Application Manager 128connections 383credentials 95ESX 131Failover Control Center 118Ful
Index Page 664 of 677disk signature 195DNS 221, 343A records 221alternate 350failback 521MX records 221non-Microsoft 350primary server 221reverse look
Index Page 665 of 677requirements 56, 59, 63scheduling 291servers 134transmission 293VirtualCenter 96, 133, 296evaluationsdata workload 632full-server
Index Page 666 of 677cluster workload 336data 153, 479DNS 221, 343domain controllers 338full-server 201, 483-484, 487Macintosh shares 352monitoring 15
Index Page 667 of 677requirements 55file shares 232, 239file system 34filters 94, 375firewall 34, 137, 149, 206, 251, 298full-servercompatible target
Index Page 668 of 677starting 122GGeoClustercompression 322, 329monitoring 391online pending 329orphan files 322, 329requirements 65resource propertie
Storage Mirroring Recover requirements Page 66 of 677l Queuing—The Storage Mirroring Recover disk queue, configured duringinstallation, should use a l
Index Page 669 of 677Jjunction points 550Llicensing 167loggingevent messages 413-414filtering 403log file 185, 396, 405messages 406verification 574vie
Index Page 670 of 677Monitor Connections page 375monitoringapplication 371cluster 391data 356data workload 357ESX 374, 387failover data 366full-server
Index Page 671 of 677optionsconsole 97orphan filesGeoCluster 322, 329removing 546standard cluster 303overview 15-16, 21-25, 27, 84Ppath 375Performance
Index Page 672 of 677virtual 258Qqueuesauto-disconnect 532auto-reconnect 532overview 526queuing data 173, 528Rreconnecting automatically 534refresh ra
Index Page 673 of 677calculating size 564copying 563creating 141, 558, 560database storage file 183deleting 566limitations 554modifying 560, 562overvi
Index Page 674 of 677Failover Control Center 121Full-Server Failover Manager 125groups 628overview 625Replication Console 117service 629server configu
Index Page 675 of 677sourcedata processing options 177definition 15requirements 34server startup options 169SQLprotection 232requirements 52verificati
Index Page 676 of 677TDV See target data verificationtime to live 48, 221, 343transactional NTFS operations (TxF) 550transmissionbandwidth 592compress
Index Page 677 of 677virtualfailback 524failover 494-495, 497firewall 298monitoring 374PRO tips 279protection 258requirements 56restoration 524workloa
Storage Mirroring Recover requirements Page 67 of 677Storage Mirroring Console requirementsThere are various Storage Mirroring Recover consoles, many
Installation Page 68 of 677InstallationBefore beginning the installation, review the Storage Mirroring Recover requirementsand Installation and upgrad
Queuing data 173Configuring source data processing options 177Configuring target data processing options 180Specifying the Storage Mirroring Recover d
Installation Page 69 of 677Installation and upgrade notesReview the following installation and upgrade notes before beginning your installation orupgr
Installation Page 70 of 677l When performing a rolling upgrade, update the target servers first. After theupgrade is complete, the sources will automa
Installation Page 71 of 677Installing or upgrading Storage Mirroring RecoverUse these instructions to install Storage Mirroring Recover or upgrade an
Installation Page 72 of 6778. Click Next to continue.9. You will be prompted to enter your activation code information. Your ActivationCode is a 24-ch
Installation Page 73 of 67716. During the installation, you may be prompted to add an exception to the WindowsFirewall for Storage Mirroring Recover.
Installation Page 74 of 677Installing or upgrading Storage Mirroring for VirtualInfrastructureIn a typical Storage Mirroring Recover installation, you
Installation Page 75 of 6775. When the Storage Mirroring Recover for Virtual Infrastructure installation begins,click Next.6. Review and accept the HP
Installation Page 76 of 677Installing Storage Mirroring Recover automaticallyThe Storage Mirroring Recover installation program can accept command-lin
Installation Page 77 of 677QMemoryBufferMaxAny integer representing the amount of system memory, in MB, to use formemory-based queuingDiskQueueFolderA
Installation Page 78 of 677Installing or upgrading automatically to a local machine1. Create a temporary directory on the server. For example, create
Configuring failover monitoring 226Taking snapshots of the target 229Application connection settings 230Routing data transmissions 231Protection confi
Installation Page 79 of 677Installing or upgrading automatically to a remote machine1. Create a temporary directory on the primary site server. For ex
Installation Page 80 of 677Configuring your cluster for GeoCluster installationIf you want to use a GeoCluster configuration, where data is stored on
Installation Page 81 of 677Configuring your Windows 2003 clusterIn a typical Windows 2003 MSCS shared disk cluster configuration, the quorumresource,
Installation Page 82 of 677Configuring your Windows 2008 clusterThe default quorum resource in a Windows 2008 environment will vary depending onyour c
Installation Page 83 of 6778. From Failover Cluster Management, create your application or service group.Note: If you are creating a file server using
Storage Mirroring Console Page 84 of 677Storage Mirroring ConsoleThe Storage Mirroring Console is used to protect and monitor your servers andconnecti
Storage Mirroring Console Page 85 of 677Starting the consoleAfter you have installed the console, you can launch it by selecting Start, Programs, HPS
Storage Mirroring Console Page 86 of 677Getting startedThe first time you start the console, it is empty. In order to protect and monitor yourservers,
Storage Mirroring Console Page 87 of 677Inserting servers manually1. Select Get Started from the toolbar.2. Select Add servers and click Next.3. On th
Storage Mirroring Console Page 88 of 677Inserting servers through Active Directory discovery1. Select Get Started from the toolbar.2. Select Add serve
Optional ESX protection settings 290Scheduling protection 291Changing the name of the protection job 292Setting transmission options 293E-mailing noti
Storage Mirroring Console Page 89 of 677Inserting servers from a server configuration fileYou can share the console server configuration between machi
Storage Mirroring Console Page 90 of 677Managing serversTo manage the servers in your console, select Manage Servers from the toolbar. TheManage Serve
Storage Mirroring Console Page 91 of 677Activation CodeThe activation codes associated with the products licensed for the serverAdd ServersAdd a new s
Storage Mirroring Console Page 92 of 677Viewing server detailsTo view details about a specific server, select View Server Details from the toolbar ont
Storage Mirroring Console Page 93 of 677LicensingLicensing information for the serverl Product—The product associated with the licensel Serial number—
Storage Mirroring Console Page 94 of 677Viewing server eventsTo view events associated with a specific server, select View Server Events from thetoolb
Storage Mirroring Console Page 95 of 677Providing server credentialsTo update the security credentials used for a specific server, select Provide Cred
Storage Mirroring Console Page 96 of 677Managing VirtualCenter serversTo manage your VirtualCenter servers, select Go, Manage VirtualCenter Servers. T
Storage Mirroring Console Page 97 of 677Console optionsThere are several options that you can set that are specific to the Storage MirroringConsole. T
Storage Mirroring Console Page 98 of 677Setting the frequency of console refreshesTo access the console refresh rate, select Options from the toolbar.
Comments to this Manuals