Hp Storage Mirroring V4.5 Software Manuel d'utilisateur Page 1

Naviguer en ligne ou télécharger Manuel d'utilisateur pour Stockage Hp Storage Mirroring V4.5 Software. HP Storage Mirroring V4.5 Software User Manual Manuel d'utilisatio

  • Télécharger
  • Ajouter à mon manuel
  • Imprimer
  • Page
    / 163
  • Table des matières
  • MARQUE LIVRES
  • Noté. / 5. Basé sur avis des utilisateurs

Résumé du contenu

Page 1 - Application Manager

Application Manageruser’s guidePart number: T2558-96322Ninth edition: March 2009

Page 2

1 - 3Using the Application Manager with SQL in clustered environmentsThe Application Manager can be used with SQL Server 2005 or SQL Server 2008 in a

Page 3 - Table of Contents

7 - 14RouteThis setting identifies the Target IP Address that the Storage Mirroring data will be transmitted through. You should only change this sett

Page 4

7 - 15You can specify compression for different source/target connections, but all connections to the same target will have the same compression setti

Page 5

7 - 163. In the Rule Path field, type the directory that you want to protect or exclude.4. In the Include/Exclude area, select whether to include or e

Page 6

7 - 17By default, Application Manager generates all the required scripts for you automatically based on your system configuration. You can also edit t

Page 7

7 - 18Advanced settingsThe following options allow you to control what functions Application Manager will perform during configuration. By default, Ap

Page 8 - Introduction

7 - 19SharePoint settingsThe SharePoint tab includes options you can use to join or extend the target front-end web server to the production SharePoin

Page 9

7 - 20When you select this button, the SharePoint front-end web server specified in the Server Name field will be extended into the source SharePoint

Page 10 - SharePoint

8 - 1Protecting a BlackBerry ServerTo configure protection for a consolidated one-to-one configuration of your BlackBerry servers using the Applicatio

Page 11 - File server

8 - 2Select a taskTo protect a BlackBerry server, open the Application Manager (Start, Programs, Storage Mirroring, Application Manager), then on the

Page 12 - Requirements

8 - 3You may enter a user name for a different domain by entering a fully-qualified user name. The fully-qualified user name must be in the format Net

Page 13 - Exchange requirements

1 - 4 Application Manager for SharePoint supports only SQL instance mode protection. Database-only protection mode is not available. By default, App

Page 14 - SQL requirements

8 - 4Add or manage serversIf the servers you need do not appear, click the Advanced Find button. The Manage BlackBerry Servers window will appear. To

Page 15 - SharePoint requirements

8 - 5Configure protection settingsIf you do not need to change the configuration settings, continue with Validate the Configuration on page 9-1.If you

Page 16 - Related documentation

8 - 6After you select the DNS Failover option, click Configure. The Configure DNS Failover window will appear.Configure the following information for

Page 17 - Readme files

8 - 78. Click the Test button to validate that DNS failover is configured correctly for the selected DNS server(s) and that the specified credentials

Page 18 - Navigating the user

8 - 8After you select the Identity Failover option, click Configure. The Configure Identity Failover window will appear. Enter the following informat

Page 19 - Start the Application Manager

8 - 9Modifying the default configuration for services may affect whether data can be successfully replicated. Do not modify the services to start/stop

Page 20 - Menu options

8 - 103. In the Method to monitor for Failover field, select the ping method to use when monitoring source IP addresses. Network Access (ICMP)—Storag

Page 21

8 - 11Connection settingsThe Connection tab includes options that will be applied to the specified source/target connection. RouteThis setting ident

Page 22 - Using the online help

8 - 12 Checksum—(Default) This option performs a checksum comparison calculation. A checksum calculation is a formula applied to blocks of data to de

Page 23 - Exchange Server

8 - 133. To add a service, click Add. The Add Service window will appear.4. Select the Service name from the drop-down box, then click Add; or, type t

Page 24

1 - 5BlackBerryThe Application Manager can be used to configure Storage Mirroring to provide high availability for BlackBerry Enterprise Server using

Page 25

8 - 14Replication set rulesA replication set defines what directories/files are to be protected by Storage Mirroring. By default, Application Manager

Page 26

8 - 15Scripts are automatically generated by Application Manager during configuration. The scripts are copied to the Storage Mirroring installation di

Page 27

8 - 16Advanced settingsThe following options allow you to control what functions Application Manager will perform during configuration. By default, Ap

Page 28

8 - 17Saving configuration changesAfter you have changed the configuration parameters, click OK to apply the settings. If you click Cancel, any change

Page 29

9 - 1Validate the ConfigurationClick Validate, or select Actions, Validate, to ensure that the source and target servers are configured correctly for

Page 30

10 - 1Enabling Protection for a ServerBased on the current protection status, the Enable/Disable Protection button (on both the Setup and Monitor t

Page 31 - Resources (cluster only)

10 - 2While there may be other Storage Mirroring connections between the selected source and target, Application Manager only recognizes connections t

Page 32

10 - 3The following table describes the possible monitoring status states.Protection detail statesThe following table identifies the possible mirror s

Page 33 - Application Monitoring (BETA)

10 - 4The following table identifies the possible transmit modes.The following table identifies the possible target status states.Mirroring If the fil

Page 34

10 - 5Verify target data viabilityAfter you have configured your servers, you can use the Application Manager to run a test that verifies that the dat

Page 35

1 - 6 A copy of the most recent version of the Storage Mirroring Application Manager .NET Framework version 3.5 with service pack 1 or later. If you

Page 36

10 - 6You can verify the target stores at any time following the successful completion of a mirror. When you select Actions, Verify Target Data, the D

Page 37

10 - 73. The Results area displays the status of the target Exchange Stores and Storage Groups or SQL databases and instances. Initially, the state of

Page 38

10 - 8Managing snapshotsIf snapshots were enabled when you configured protection, you can open the Snapshot Manager to take and delete snapshots.To la

Page 39 - Target(ed) domain controller

11 - 1Failover, Failback, and RestorationIf you selected DNS failover, you can use the Application Manager to automate failover, failback, and restora

Page 40

11 - 2Initiating manual failoverTo initiate a manual failover, select Actions, Failover, or click the Failover button on the Monitoring tab. The Initi

Page 41

11 - 34. If you want to use the data from a snapshot, select Revert to specified snapshot, then select the snapshot in the list. Click Initiate Failov

Page 42 - Exchange Cluster with

11 - 45. Depending on how long the server has been failed over or the amount of data changed, it may be more efficient to perform a full mirror upon r

Page 43 - Configuring a standby cluster

11 - 5Before you begin to restore to the original source, resolve the issue(s) that caused the failure. If the source server has to be rebuilt, follow

Page 44

11 - 6 File Server Computer Browser SharePoint IISADMIN HTTPFilter SMTPSVC W3SVC SPAdmin SPSearch SPTimerV3 SPTrace SPWriter BlackBerry

Page 45

11 - 711. Select Tools, Restoration Manager.12. Complete the appropriate fields on the Restoration Manager.  Original Source—The source where the dat

Page 46 - Enabling protection

1 - 7 Exchange 2007  To use the Application Manager for Exchange, Storage Mirroring must be running under the localsystem account. The client or se

Page 47 - Dealing with a failure

A - 1Appendix A: Recommended CredentialsApplication Manager credentialsProper rights must be assigned to the account that is entered when the Applicat

Page 48 - Protecting a SQL

A - 26. Select the user to be included in the Storage Mirroring Admin group.7. Click OK to return to the Local Group Properties dialog box.8. Click OK

Page 49

A - 3Assigning the user to the DnsAdmins groupFollow these steps to add a user to the domain DnsAdmins group.1. Select Start, Programs, Administrative

Page 50

A - 4DNS permissions for Windows 2003 SP2 or laterVerify that the user has permissions to update DNS. The user must be: The user must be a member of

Page 51

A - 515. Click Add. Type the user or group name you want to use in the Enter the object names to select box, click Check Names to verify your entry or

Page 52

A - 6Assigning the user to the local Administrators groupFollow these steps to add a user to the local Administrators group.1. Select Start, Programs,

Page 53 - Select SQL instances

A - 7 The user running the Application Manager must be an Exchange full administrator at the organizational level, as delegated via the Exchange Syst

Page 54 - Failover type

A - 8Delegating Exchange administrative rightsTo assign Exchange administrative rights to a user through the Application Manager, select Tools, Delega

Page 55

A - 9 If the SQL Server service is not using the same domain user account on the source and target servers, the SQL Service Principal Names (SPNs) of

Page 56

B - 1Appendix B: Rebuilding the SourceThe following sections guide you through rebuilding a source server following a failure.Rebuilding the original

Page 57

1 - 8 SQL Server 2005 SQL Server 2008 SQL Sever Express To enable the Application Manager to work with MSDE (SQL Express 2000) and SQL Server 2005

Page 58

B - 29. If you accepted the default installation on the original source (before it failed), set Microsoft Exchange Messaging and Collaboration Service

Page 59

B - 3Rebuilding the original SQL source1. Verify that your source machine is not connected to the network. If it is, disconnect it.2. Resolve the sour

Page 60

C - 1Appendix C: Exchange and SQL Failover with BlackBerryIf you are using a standalone BlackBerry server with Exchange or SQL, complete the following

Page 61

D - 1Appendix D: Using a non-Microsoft DNS ServerIn order to update Windows-based Active Directory-Integrated DNS records, the account specified must

Page 62 - Database only

E - 1Appendix E: Using the Target Data Verification (TDV) UtilityThere are several options available in the Target Data Verification utility for perfo

Page 63

E - 2Options  /apptype SQL|EXCH —Select whether to verify SQL or Exchange data on the target server /dnsdomain domainname—The fully-qualified name o

Page 64

E - 3Target Data Verification Utility Command Syntax for SQL Examples TDV.EXE /helpDisplay TDV usage syntax help for Exchange and SQL.  TDV.EXE /app

Page 65

E - 4Options  /apptype SQL|EXCH—Select whether to verify SQL or Exchange data on the target server /srcname source—The source SQL server name /tarn

Page 66

E - 5Examples TDV.EXE /apptype SQL /helpDisplays usage for SQL.  TDV.EXE /setpassword mydomain.com\admin mypasswordStores encrypted user ID and pass

Page 67

F - 1Appendix F: Using the DNS Failover (DFO) UtilityThe DNS Failover utility (dfo.exe) can be used in the failover and failback scripts to delete and

Page 68

1 - 9 SQL Server 2000, SQL Server 2005, or SQL Server 2008 back-end Windows Firewall—You will need to open port 6350 for Sharepoint communication.Bl

Page 69

F - 2Options  dnsservername—The name of the source domain/zone's primary DNS server (optional; local machine name will be used if missing) sour

Page 70

F - 3Password Encryption /setpassword—Allows the user to store a username/password pairing in an encrypted file for later use. (Optional, but requir

Page 71 - Protecting a File

G - 1Appendix G: Using the Exchange Failover (EFO) UtilityThere are several options available in the Exchange Failover utility for configuring Exchang

Page 72

G - 2Options (continued) r—(Optional) By itself, this option creates a one-to-one mapping of the groups and mail stores from the source to the target

Page 73

1 - 10Application notesWhile the Application Manager greatly simplifies the process of configuring your application for use with Storage Mirroring, He

Page 74

2 - 1Navigating the user interfaceThe Application Manager interface is designed to guide you through the process of configuring protection for your se

Page 75

2 - 2The Application Manager installation uses an active internet connection to download the Microsoft Admin Pack and SQL server backward compatibilit

Page 76

© Copyright 2009 Hewlett-Packard Development Company, L.P.Hewlett-Packard Company makes no warranty of any kind with regard to this material, includin

Page 77

2 - 3Menu optionsBased on the current protection status and/or failover state, the Protection, Monitoring, and Failover/Failback menu options will be

Page 78

2 - 4Change Application Manager preferencesTo change display preferences for the Application Manager, select Tools, Options. The Options dialog box wi

Page 79

2 - 59. Select the Enable Alternative DNS checkbox to launch Application Manager in \Altdns mode the next time it is opened. For more information, see

Page 80

3 - 1Protecting an Exchange ServerTo configure protection for your Exchange servers, you will complete the following steps:1. Install Exchange on the

Page 81

3 - 2Select a taskTo protect an Exchange server, open the Application Manager (Start, Programs, Storage Mirroring, Application Manager), then on the T

Page 82

3 - 3You may enter a user name for a different domain by entering a fully-qualified user name. The fully-qualified user name must be in the format Net

Page 83

3 - 4Notice that after the source and target servers are selected, the Protection Status on the Monitor tab changes to Unprotected.Enter server login

Page 84

3 - 5Failover settingsThe Failover tab includes options that will be applied during Exchange failover. Failover typeFailover Type indicates what name

Page 85

3 - 6After you select the DNS Failover option, click Configure. The Configure DNS Failover window will appear. Configure the following information for

Page 86

3 - 77. In the Password field, enter the password that will be used to access/modify DNS records. 8. Click the Test button to validate that DNS failov

Page 87 - SharePoint Server

Table of ContentsChapter 1 Introduction ...1-1About the Storage Mirroring Application Manager .

Page 88

3 - 8After you select the Identity Failover option, click Configure. The Configure Identity Failover window will appear. Enter the following informati

Page 89 - Select SharePoint front end

3 - 9Modifying the default configuration for services may affect whether data can be successfully replicated. Do not modify the services to start/stop

Page 90

3 - 10Monitor settingsThe Monitoring tab includes options for configuring how you want to monitor the source server for failure.Configure how you want

Page 91

3 - 11Application Monitoring (BETA)By default, application monitor settings are not available in this release of the Storage Mirroring Application Man

Page 92

3 - 128. (Optional) Click the Clear Cached Credentials button to clear the cached user name and password.Snapshot settingsThe following allow you to s

Page 93

3 - 13Connection settingsThe Connection tab includes options that will be applied to the specified source/target connection. RouteThis setting identi

Page 94

3 - 14To refresh the tree view to show new source directories or files that may have been added or removed, select the logical node, then click the Re

Page 95

3 - 15Replication set rulesA replication set defines what directories/files are to be protected by Storage Mirroring. By default, Application Manager

Page 96

3 - 16Failover/failback scriptsScripts are executed at different points during the failover/failback process to perform the actions necessary to make

Page 97

3 - 17Before running Application Manager multiple times (for example, when re-enabling protection after a failover/failback), save a copy of your post

Page 98

iiConnection settings ... 3-13Route...

Page 99

3 - 18Advanced settingsThe following options allow you to control what functions Application Manager will perform during configuration. By default, Ap

Page 100 - Enable compression

3 - 197. Select the Create Failover Monitor checkbox to create a failover monitor on the target to monitor the source for failure. This monitor will u

Page 101 - Advanced settings

4 - 1Protecting an Exchange Cluster with a Like-Named ClusterThis section describes the process used to configure protection for an Exchange cluster w

Page 102 - Failover/failback scripts

4 - 2 Failover multiple EVS servers to pre-existing EVS servers on the target. If you choose this option, instead of selecting the like-named equival

Page 103 - Items to failover

4 - 33. After you select a like-named cluster for the target, you will need to configure the like-named cluster. After you select the target server, t

Page 104

4 - 46. On the Manage Exchange window, click Configure to open the Configure Protection window, then select the Failover tab. 7. DNS Failover is the o

Page 105 - SharePoint settings

4 - 59. On the Configure DNS window, you can modify the TTL value for the DNS record. You can also specify the user credentials needed to modify DNS.

Page 106 - Saving configuration changes

4 - 6Dealing with a failureGraceful failoverAt the user's discretion, the Application Manager can perform a graceful, or “soft”, failover. A soft

Page 107 - BlackBerry Server

5 - 1Protecting a SQL ServerTo configure protection for your SQL servers using Application Manager, you will complete the following steps:1. Install S

Page 108 - Select a domain

5 - 2Select a domainThe Domain Name on the main window will be populated automatically with the domain where the Application Manager client resides.If

Page 109

iiiAdvanced settings ... 5-19Replication set rules...

Page 110 - Add or manage servers

5 - 3Select source and target serversIf this is your first time to select a SQL server to protect, you may need to click the Advanced Find button to a

Page 111 - Failover settings

5 - 4Add or manage serversIf the servers you need do not appear, click the Advanced Find button, or select Actions, Manage SQL Servers. The Manage SQL

Page 112

5 - 5Enter server login informationAfter you select a server for the first time, you will be prompted to enter a user name and password to use for log

Page 113 - Identity failover

5 - 6Select SQL instancesIf you launch the Application Manager using the /sql /advanced switch (dtam /sql /advanced), you can select which instances t

Page 114 - Services

5 - 7Failover typeFailover Type indicates what name resolution method will be used to redirect users to the target SQL server in the event of a source

Page 115 - Monitor settings

5 - 85. To specify the value the Application Manager will establish for Time to Live (TTL) on the source’s affected DNS records, select the Update TTL

Page 116 - Snapshot settings

5 - 9 If you have client applications that are configured to connect to an IP address rather than a server name.After you select the Identity Failove

Page 117 - Connection settings

5 - 10Modifying the default configuration for services may affect whether data can be successfully replicated. Do not modify the services to start/sto

Page 118 - BlackBerry settings

5 - 11Monitor settingsThe Monitoring tab includes options for configuring how you want to monitor the source server for failure. Configure how you wan

Page 119

5 - 12Application Monitoring (BETA)By default, application monitor settings are not available in this release of the Storage Mirroring Application Man

Page 120 - Replication set rules

ivConnection settings ... 7-13Route...

Page 121 - 3. Save the script file

5 - 138. (Optional) Click the Clear Cached Credentials button to clear the cached user name and password.Snapshot settingsThe following allow you to s

Page 122

5 - 14Connection settingsThe Connection tab includes options that will be applied to the specified source/target connection. RouteThis setting ident

Page 123

5 - 15SQL Instance protection mode requires that the source and target servers both have the exact same version of SQL (major and minor versions) as w

Page 124 - Configuration

5 - 16If you select Database Only protection mode, you can select a non-system database and map it to a unique path on the target.1. Select the databa

Page 125 - Enabling Protection for

5 - 173. To confirm the new path, click Apply. Database only mode, many-to-one configurationsThe following examples describe the SQL many-to-one confi

Page 126 - Monitor protection status

5 - 18Case: Both source SQL servers have a database named “Accounting” (Source3\instance1|Accounting and Source4\instance2|Accounting). You can protec

Page 127 - Protection detail states

5 - 19Advanced settingsThe Advanced tab includes advanced configuration options. Replication set rulesA replication set defines what directories/file

Page 128

5 - 205. In the Recursive area, select whether the directory should be recursive (protecting all sub-folders under the directory) or non-recursive (pr

Page 129 - Verify target data viability

5 - 21Any change you make to the script in the editor will be copied to the appropriate server when configuration changes are accepted, thus overwriti

Page 130

5 - 22Advanced settingsThe following options allow you to control what functions Application Manager will perform during configuration. By default, Ap

Page 131

vVerify target data viability ... 10-5Relocating the MTA and SMTP pickup path and queues..

Page 132 - Managing snapshots

5 - 23When you have finished configuring the optional protection options, continue with Validate the Configuration on page 9-1. NOTE: If you close the

Page 133 - Restoration

6 - 1Protecting a File ServerTo configure protection for your file servers using Application Manager, you will complete the following steps:1. Install

Page 134 - Initiating manual failover

6 - 2Select a domainThe Domain Name on the main window will be populated automatically with the domain where the Application Manager client resides.If

Page 135 - Failback and restoration

6 - 3Select source and target serversClick the Advanced Find button to add servers to the Source Server and Target Server fields. For more information

Page 136 - Initiating a failover

6 - 4Add or manage serversIf the servers you need do not appear, click the Advanced Find button. The Manage Servers window will appear. To discover al

Page 137

6 - 5Configure protection settingsIf you do not need to change the configuration settings, continue with Validate the Configuration on page 9-1.If you

Page 138

6 - 6After you select the DNS Failover option, click Configure. The Configure DNS Failover window will appear.Configure the following information for

Page 139 - Re-enabling protection

6 - 78. Click the Test button to validate that DNS failover is configured correctly for the selected DNS server(s) and that the specified credentials

Page 140 - Credentials

6 - 8After you select the Identity Failover option, click Configure. The Configure Identity Failover window will appear. Enter the following informat

Page 141

6 - 9Modifying the default configuration for services may affect whether data can be successfully replicated. Do not modify the services to start/stop

Page 142 - DFO.exe command line will

1 - 1IntroductionThis document describes how to use the Storage Mirroring Application Manager to create and validate your application configuration. T

Page 143 - Assigning Full Control

6 - 10 Network Access (ICMP)—Storage Mirroring failover uses ICMP pings to determine if the source server is online. If a network device, such as a f

Page 144

6 - 11Connection settingsThe Connection tab includes options that will be applied to the specified source/target connection. RouteThis setting ident

Page 145 - Exchange credentials

6 - 12 Checksum—(Default) This option performs a checksum comparison calculation. A checksum calculation is a formula applied to blocks of data to de

Page 146

6 - 13To change the replication set rules:1. Select the Override Generated Rules checkbox. 2. To add a replication set rule, click Add. The Add Repset

Page 147 - SQL credentials

6 - 14Scripts are automatically generated by Application Manager during configuration. The scripts are copied to the Storage Mirroring installation di

Page 148 - BlackBerry credentials

6 - 153. Select the Active Directory Hostname (SPNs) checkbox if you want to remove the host SPN (Service Principle Name) automatically from Active Di

Page 149 - Appendix B: Rebuilding the

6 - 16When you have finished configuring the optional protection options, continue with Validate the Configuration on page 9-1. NOTE: If you close the

Page 150 -  exchfailover.exe

7 - 1Protecting a SharePoint ServerThe SharePoint databases will be protected by default and the Application Manager can be used to extend the target

Page 151

7 - 27. Install Storage Mirroring the source and target SQL servers using the installation defaults. See the Storage Mirroring Getting Started guide f

Page 152 - SQL Failover with BlackBerry

7 - 3If you want to change the domain, type in a domain name for a trusted domain that the Application Manager client can connect to, then press Tab o

Page 153 - Appendix D: Using a

1 - 2Using the Application Manager with Exchange in clustered environmentsThe Application Manager can be used in the following cluster configurations

Page 154 - Data Verification (TDV)

7 - 4or Validate, a prompt will appear asking if you want to re-use the previous configuration information. Click Yes to re-use the previous informati

Page 155

7 - 53. To add a non-discovered server to the Current Servers list, enter the server name in the field next to the Add button, then click Add.4. After

Page 156

7 - 6Failover settingsThe Failover tab includes options that will be applied during SharePoint failover.Failover typeFailover Type indicates what name

Page 157

7 - 7After you select the DNS Failover option, click Configure. The Configure DNS Failover window will appear.Configure the following information for

Page 158

7 - 88. Click the Test button to validate that DNS failover is configured correctly for the selected DNS server(s) and that the specified credentials

Page 159 - Failover (DFO) Utility

7 - 9After you select the Identity Failover option, click Configure. The Configure Identity Failover window will appear. Enter the following informati

Page 160

7 - 10Modifying the default configuration for services may affect whether data can be successfully replicated. Do not modify the services to start/sto

Page 161

7 - 11Configure how you want to monitor the source server for failure.1. Select the Active Monitoring Enabled option to enable or disable failover for

Page 162 - Exchange Failover (EFO)

7 - 122. In the Monitor Interval field, enter the interval (in seconds) at which you want to check application health.3. In the Error Threshold field,

Page 163

7 - 13Snapshot settingsThe following allow you to set up snapshots of your target data that can be used when failing over. By default, snapshots are n

Commentaires sur ces manuels

Pas de commentaire