Hp Storage Mirroring V4.5 Software Bedienungsanleitung

Stöbern Sie online oder laden Sie Bedienungsanleitung nach Lager Hp Storage Mirroring V4.5 Software herunter. HP Storage Mirroring V4.5 Software User Manual Benutzerhandbuch

  • Herunterladen
  • Zu meinen Handbüchern hinzufügen
  • Drucken
  • Seite
    / 163
  • Inhaltsverzeichnis
  • LESEZEICHEN
  • Bewertet. / 5. Basierend auf Kundenbewertungen

Inhaltsverzeichnis

Seite 1 - Application Manager

Application Manageruser’s guidePart number: T2558-96322Ninth edition: March 2009

Seite 2

1 - 3Using the Application Manager with SQL in clustered environmentsThe Application Manager can be used with SQL Server 2005 or SQL Server 2008 in a

Seite 3 - Table of Contents

7 - 14RouteThis setting identifies the Target IP Address that the Storage Mirroring data will be transmitted through. You should only change this sett

Seite 4

7 - 15You can specify compression for different source/target connections, but all connections to the same target will have the same compression setti

Seite 5

7 - 163. In the Rule Path field, type the directory that you want to protect or exclude.4. In the Include/Exclude area, select whether to include or e

Seite 6

7 - 17By default, Application Manager generates all the required scripts for you automatically based on your system configuration. You can also edit t

Seite 7

7 - 18Advanced settingsThe following options allow you to control what functions Application Manager will perform during configuration. By default, Ap

Seite 8 - Introduction

7 - 19SharePoint settingsThe SharePoint tab includes options you can use to join or extend the target front-end web server to the production SharePoin

Seite 9

7 - 20When you select this button, the SharePoint front-end web server specified in the Server Name field will be extended into the source SharePoint

Seite 10 - SharePoint

8 - 1Protecting a BlackBerry ServerTo configure protection for a consolidated one-to-one configuration of your BlackBerry servers using the Applicatio

Seite 11 - File server

8 - 2Select a taskTo protect a BlackBerry server, open the Application Manager (Start, Programs, Storage Mirroring, Application Manager), then on the

Seite 12 - Requirements

8 - 3You may enter a user name for a different domain by entering a fully-qualified user name. The fully-qualified user name must be in the format Net

Seite 13 - Exchange requirements

1 - 4 Application Manager for SharePoint supports only SQL instance mode protection. Database-only protection mode is not available. By default, App

Seite 14 - SQL requirements

8 - 4Add or manage serversIf the servers you need do not appear, click the Advanced Find button. The Manage BlackBerry Servers window will appear. To

Seite 15 - SharePoint requirements

8 - 5Configure protection settingsIf you do not need to change the configuration settings, continue with Validate the Configuration on page 9-1.If you

Seite 16 - Related documentation

8 - 6After you select the DNS Failover option, click Configure. The Configure DNS Failover window will appear.Configure the following information for

Seite 17 - Readme files

8 - 78. Click the Test button to validate that DNS failover is configured correctly for the selected DNS server(s) and that the specified credentials

Seite 18 - Navigating the user

8 - 8After you select the Identity Failover option, click Configure. The Configure Identity Failover window will appear. Enter the following informat

Seite 19 - Start the Application Manager

8 - 9Modifying the default configuration for services may affect whether data can be successfully replicated. Do not modify the services to start/stop

Seite 20 - Menu options

8 - 103. In the Method to monitor for Failover field, select the ping method to use when monitoring source IP addresses. Network Access (ICMP)—Storag

Seite 21

8 - 11Connection settingsThe Connection tab includes options that will be applied to the specified source/target connection. RouteThis setting ident

Seite 22 - Using the online help

8 - 12 Checksum—(Default) This option performs a checksum comparison calculation. A checksum calculation is a formula applied to blocks of data to de

Seite 23 - Exchange Server

8 - 133. To add a service, click Add. The Add Service window will appear.4. Select the Service name from the drop-down box, then click Add; or, type t

Seite 24

1 - 5BlackBerryThe Application Manager can be used to configure Storage Mirroring to provide high availability for BlackBerry Enterprise Server using

Seite 25

8 - 14Replication set rulesA replication set defines what directories/files are to be protected by Storage Mirroring. By default, Application Manager

Seite 26

8 - 15Scripts are automatically generated by Application Manager during configuration. The scripts are copied to the Storage Mirroring installation di

Seite 27

8 - 16Advanced settingsThe following options allow you to control what functions Application Manager will perform during configuration. By default, Ap

Seite 28

8 - 17Saving configuration changesAfter you have changed the configuration parameters, click OK to apply the settings. If you click Cancel, any change

Seite 29

9 - 1Validate the ConfigurationClick Validate, or select Actions, Validate, to ensure that the source and target servers are configured correctly for

Seite 30

10 - 1Enabling Protection for a ServerBased on the current protection status, the Enable/Disable Protection button (on both the Setup and Monitor t

Seite 31 - Resources (cluster only)

10 - 2While there may be other Storage Mirroring connections between the selected source and target, Application Manager only recognizes connections t

Seite 32

10 - 3The following table describes the possible monitoring status states.Protection detail statesThe following table identifies the possible mirror s

Seite 33 - Application Monitoring (BETA)

10 - 4The following table identifies the possible transmit modes.The following table identifies the possible target status states.Mirroring If the fil

Seite 34

10 - 5Verify target data viabilityAfter you have configured your servers, you can use the Application Manager to run a test that verifies that the dat

Seite 35

1 - 6 A copy of the most recent version of the Storage Mirroring Application Manager .NET Framework version 3.5 with service pack 1 or later. If you

Seite 36

10 - 6You can verify the target stores at any time following the successful completion of a mirror. When you select Actions, Verify Target Data, the D

Seite 37

10 - 73. The Results area displays the status of the target Exchange Stores and Storage Groups or SQL databases and instances. Initially, the state of

Seite 38

10 - 8Managing snapshotsIf snapshots were enabled when you configured protection, you can open the Snapshot Manager to take and delete snapshots.To la

Seite 39 - Target(ed) domain controller

11 - 1Failover, Failback, and RestorationIf you selected DNS failover, you can use the Application Manager to automate failover, failback, and restora

Seite 40

11 - 2Initiating manual failoverTo initiate a manual failover, select Actions, Failover, or click the Failover button on the Monitoring tab. The Initi

Seite 41

11 - 34. If you want to use the data from a snapshot, select Revert to specified snapshot, then select the snapshot in the list. Click Initiate Failov

Seite 42 - Exchange Cluster with

11 - 45. Depending on how long the server has been failed over or the amount of data changed, it may be more efficient to perform a full mirror upon r

Seite 43 - Configuring a standby cluster

11 - 5Before you begin to restore to the original source, resolve the issue(s) that caused the failure. If the source server has to be rebuilt, follow

Seite 44

11 - 6 File Server Computer Browser SharePoint IISADMIN HTTPFilter SMTPSVC W3SVC SPAdmin SPSearch SPTimerV3 SPTrace SPWriter BlackBerry

Seite 45

11 - 711. Select Tools, Restoration Manager.12. Complete the appropriate fields on the Restoration Manager.  Original Source—The source where the dat

Seite 46 - Enabling protection

1 - 7 Exchange 2007  To use the Application Manager for Exchange, Storage Mirroring must be running under the localsystem account. The client or se

Seite 47 - Dealing with a failure

A - 1Appendix A: Recommended CredentialsApplication Manager credentialsProper rights must be assigned to the account that is entered when the Applicat

Seite 48 - Protecting a SQL

A - 26. Select the user to be included in the Storage Mirroring Admin group.7. Click OK to return to the Local Group Properties dialog box.8. Click OK

Seite 49

A - 3Assigning the user to the DnsAdmins groupFollow these steps to add a user to the domain DnsAdmins group.1. Select Start, Programs, Administrative

Seite 50

A - 4DNS permissions for Windows 2003 SP2 or laterVerify that the user has permissions to update DNS. The user must be: The user must be a member of

Seite 51

A - 515. Click Add. Type the user or group name you want to use in the Enter the object names to select box, click Check Names to verify your entry or

Seite 52

A - 6Assigning the user to the local Administrators groupFollow these steps to add a user to the local Administrators group.1. Select Start, Programs,

Seite 53 - Select SQL instances

A - 7 The user running the Application Manager must be an Exchange full administrator at the organizational level, as delegated via the Exchange Syst

Seite 54 - Failover type

A - 8Delegating Exchange administrative rightsTo assign Exchange administrative rights to a user through the Application Manager, select Tools, Delega

Seite 55

A - 9 If the SQL Server service is not using the same domain user account on the source and target servers, the SQL Service Principal Names (SPNs) of

Seite 56

B - 1Appendix B: Rebuilding the SourceThe following sections guide you through rebuilding a source server following a failure.Rebuilding the original

Seite 57

1 - 8 SQL Server 2005 SQL Server 2008 SQL Sever Express To enable the Application Manager to work with MSDE (SQL Express 2000) and SQL Server 2005

Seite 58

B - 29. If you accepted the default installation on the original source (before it failed), set Microsoft Exchange Messaging and Collaboration Service

Seite 59

B - 3Rebuilding the original SQL source1. Verify that your source machine is not connected to the network. If it is, disconnect it.2. Resolve the sour

Seite 60

C - 1Appendix C: Exchange and SQL Failover with BlackBerryIf you are using a standalone BlackBerry server with Exchange or SQL, complete the following

Seite 61

D - 1Appendix D: Using a non-Microsoft DNS ServerIn order to update Windows-based Active Directory-Integrated DNS records, the account specified must

Seite 62 - Database only

E - 1Appendix E: Using the Target Data Verification (TDV) UtilityThere are several options available in the Target Data Verification utility for perfo

Seite 63

E - 2Options  /apptype SQL|EXCH —Select whether to verify SQL or Exchange data on the target server /dnsdomain domainname—The fully-qualified name o

Seite 64

E - 3Target Data Verification Utility Command Syntax for SQL Examples TDV.EXE /helpDisplay TDV usage syntax help for Exchange and SQL.  TDV.EXE /app

Seite 65

E - 4Options  /apptype SQL|EXCH—Select whether to verify SQL or Exchange data on the target server /srcname source—The source SQL server name /tarn

Seite 66

E - 5Examples TDV.EXE /apptype SQL /helpDisplays usage for SQL.  TDV.EXE /setpassword mydomain.com\admin mypasswordStores encrypted user ID and pass

Seite 67

F - 1Appendix F: Using the DNS Failover (DFO) UtilityThe DNS Failover utility (dfo.exe) can be used in the failover and failback scripts to delete and

Seite 68

1 - 9 SQL Server 2000, SQL Server 2005, or SQL Server 2008 back-end Windows Firewall—You will need to open port 6350 for Sharepoint communication.Bl

Seite 69

F - 2Options  dnsservername—The name of the source domain/zone's primary DNS server (optional; local machine name will be used if missing) sour

Seite 70

F - 3Password Encryption /setpassword—Allows the user to store a username/password pairing in an encrypted file for later use. (Optional, but requir

Seite 71 - Protecting a File

G - 1Appendix G: Using the Exchange Failover (EFO) UtilityThere are several options available in the Exchange Failover utility for configuring Exchang

Seite 72

G - 2Options (continued) r—(Optional) By itself, this option creates a one-to-one mapping of the groups and mail stores from the source to the target

Seite 73

1 - 10Application notesWhile the Application Manager greatly simplifies the process of configuring your application for use with Storage Mirroring, He

Seite 74

2 - 1Navigating the user interfaceThe Application Manager interface is designed to guide you through the process of configuring protection for your se

Seite 75

2 - 2The Application Manager installation uses an active internet connection to download the Microsoft Admin Pack and SQL server backward compatibilit

Seite 76

© Copyright 2009 Hewlett-Packard Development Company, L.P.Hewlett-Packard Company makes no warranty of any kind with regard to this material, includin

Seite 77

2 - 3Menu optionsBased on the current protection status and/or failover state, the Protection, Monitoring, and Failover/Failback menu options will be

Seite 78

2 - 4Change Application Manager preferencesTo change display preferences for the Application Manager, select Tools, Options. The Options dialog box wi

Seite 79

2 - 59. Select the Enable Alternative DNS checkbox to launch Application Manager in \Altdns mode the next time it is opened. For more information, see

Seite 80

3 - 1Protecting an Exchange ServerTo configure protection for your Exchange servers, you will complete the following steps:1. Install Exchange on the

Seite 81

3 - 2Select a taskTo protect an Exchange server, open the Application Manager (Start, Programs, Storage Mirroring, Application Manager), then on the T

Seite 82

3 - 3You may enter a user name for a different domain by entering a fully-qualified user name. The fully-qualified user name must be in the format Net

Seite 83

3 - 4Notice that after the source and target servers are selected, the Protection Status on the Monitor tab changes to Unprotected.Enter server login

Seite 84

3 - 5Failover settingsThe Failover tab includes options that will be applied during Exchange failover. Failover typeFailover Type indicates what name

Seite 85

3 - 6After you select the DNS Failover option, click Configure. The Configure DNS Failover window will appear. Configure the following information for

Seite 86

3 - 77. In the Password field, enter the password that will be used to access/modify DNS records. 8. Click the Test button to validate that DNS failov

Seite 87 - SharePoint Server

Table of ContentsChapter 1 Introduction ...1-1About the Storage Mirroring Application Manager .

Seite 88

3 - 8After you select the Identity Failover option, click Configure. The Configure Identity Failover window will appear. Enter the following informati

Seite 89 - Select SharePoint front end

3 - 9Modifying the default configuration for services may affect whether data can be successfully replicated. Do not modify the services to start/stop

Seite 90

3 - 10Monitor settingsThe Monitoring tab includes options for configuring how you want to monitor the source server for failure.Configure how you want

Seite 91

3 - 11Application Monitoring (BETA)By default, application monitor settings are not available in this release of the Storage Mirroring Application Man

Seite 92

3 - 128. (Optional) Click the Clear Cached Credentials button to clear the cached user name and password.Snapshot settingsThe following allow you to s

Seite 93

3 - 13Connection settingsThe Connection tab includes options that will be applied to the specified source/target connection. RouteThis setting identi

Seite 94

3 - 14To refresh the tree view to show new source directories or files that may have been added or removed, select the logical node, then click the Re

Seite 95

3 - 15Replication set rulesA replication set defines what directories/files are to be protected by Storage Mirroring. By default, Application Manager

Seite 96

3 - 16Failover/failback scriptsScripts are executed at different points during the failover/failback process to perform the actions necessary to make

Seite 97

3 - 17Before running Application Manager multiple times (for example, when re-enabling protection after a failover/failback), save a copy of your post

Seite 98

iiConnection settings ... 3-13Route...

Seite 99

3 - 18Advanced settingsThe following options allow you to control what functions Application Manager will perform during configuration. By default, Ap

Seite 100 - Enable compression

3 - 197. Select the Create Failover Monitor checkbox to create a failover monitor on the target to monitor the source for failure. This monitor will u

Seite 101 - Advanced settings

4 - 1Protecting an Exchange Cluster with a Like-Named ClusterThis section describes the process used to configure protection for an Exchange cluster w

Seite 102 - Failover/failback scripts

4 - 2 Failover multiple EVS servers to pre-existing EVS servers on the target. If you choose this option, instead of selecting the like-named equival

Seite 103 - Items to failover

4 - 33. After you select a like-named cluster for the target, you will need to configure the like-named cluster. After you select the target server, t

Seite 104

4 - 46. On the Manage Exchange window, click Configure to open the Configure Protection window, then select the Failover tab. 7. DNS Failover is the o

Seite 105 - SharePoint settings

4 - 59. On the Configure DNS window, you can modify the TTL value for the DNS record. You can also specify the user credentials needed to modify DNS.

Seite 106 - Saving configuration changes

4 - 6Dealing with a failureGraceful failoverAt the user's discretion, the Application Manager can perform a graceful, or “soft”, failover. A soft

Seite 107 - BlackBerry Server

5 - 1Protecting a SQL ServerTo configure protection for your SQL servers using Application Manager, you will complete the following steps:1. Install S

Seite 108 - Select a domain

5 - 2Select a domainThe Domain Name on the main window will be populated automatically with the domain where the Application Manager client resides.If

Seite 109

iiiAdvanced settings ... 5-19Replication set rules...

Seite 110 - Add or manage servers

5 - 3Select source and target serversIf this is your first time to select a SQL server to protect, you may need to click the Advanced Find button to a

Seite 111 - Failover settings

5 - 4Add or manage serversIf the servers you need do not appear, click the Advanced Find button, or select Actions, Manage SQL Servers. The Manage SQL

Seite 112

5 - 5Enter server login informationAfter you select a server for the first time, you will be prompted to enter a user name and password to use for log

Seite 113 - Identity failover

5 - 6Select SQL instancesIf you launch the Application Manager using the /sql /advanced switch (dtam /sql /advanced), you can select which instances t

Seite 114 - Services

5 - 7Failover typeFailover Type indicates what name resolution method will be used to redirect users to the target SQL server in the event of a source

Seite 115 - Monitor settings

5 - 85. To specify the value the Application Manager will establish for Time to Live (TTL) on the source’s affected DNS records, select the Update TTL

Seite 116 - Snapshot settings

5 - 9 If you have client applications that are configured to connect to an IP address rather than a server name.After you select the Identity Failove

Seite 117 - Connection settings

5 - 10Modifying the default configuration for services may affect whether data can be successfully replicated. Do not modify the services to start/sto

Seite 118 - BlackBerry settings

5 - 11Monitor settingsThe Monitoring tab includes options for configuring how you want to monitor the source server for failure. Configure how you wan

Seite 119

5 - 12Application Monitoring (BETA)By default, application monitor settings are not available in this release of the Storage Mirroring Application Man

Seite 120 - Replication set rules

ivConnection settings ... 7-13Route...

Seite 121 - 3. Save the script file

5 - 138. (Optional) Click the Clear Cached Credentials button to clear the cached user name and password.Snapshot settingsThe following allow you to s

Seite 122

5 - 14Connection settingsThe Connection tab includes options that will be applied to the specified source/target connection. RouteThis setting ident

Seite 123

5 - 15SQL Instance protection mode requires that the source and target servers both have the exact same version of SQL (major and minor versions) as w

Seite 124 - Configuration

5 - 16If you select Database Only protection mode, you can select a non-system database and map it to a unique path on the target.1. Select the databa

Seite 125 - Enabling Protection for

5 - 173. To confirm the new path, click Apply. Database only mode, many-to-one configurationsThe following examples describe the SQL many-to-one confi

Seite 126 - Monitor protection status

5 - 18Case: Both source SQL servers have a database named “Accounting” (Source3\instance1|Accounting and Source4\instance2|Accounting). You can protec

Seite 127 - Protection detail states

5 - 19Advanced settingsThe Advanced tab includes advanced configuration options. Replication set rulesA replication set defines what directories/file

Seite 128

5 - 205. In the Recursive area, select whether the directory should be recursive (protecting all sub-folders under the directory) or non-recursive (pr

Seite 129 - Verify target data viability

5 - 21Any change you make to the script in the editor will be copied to the appropriate server when configuration changes are accepted, thus overwriti

Seite 130

5 - 22Advanced settingsThe following options allow you to control what functions Application Manager will perform during configuration. By default, Ap

Seite 131

vVerify target data viability ... 10-5Relocating the MTA and SMTP pickup path and queues..

Seite 132 - Managing snapshots

5 - 23When you have finished configuring the optional protection options, continue with Validate the Configuration on page 9-1. NOTE: If you close the

Seite 133 - Restoration

6 - 1Protecting a File ServerTo configure protection for your file servers using Application Manager, you will complete the following steps:1. Install

Seite 134 - Initiating manual failover

6 - 2Select a domainThe Domain Name on the main window will be populated automatically with the domain where the Application Manager client resides.If

Seite 135 - Failback and restoration

6 - 3Select source and target serversClick the Advanced Find button to add servers to the Source Server and Target Server fields. For more information

Seite 136 - Initiating a failover

6 - 4Add or manage serversIf the servers you need do not appear, click the Advanced Find button. The Manage Servers window will appear. To discover al

Seite 137

6 - 5Configure protection settingsIf you do not need to change the configuration settings, continue with Validate the Configuration on page 9-1.If you

Seite 138

6 - 6After you select the DNS Failover option, click Configure. The Configure DNS Failover window will appear.Configure the following information for

Seite 139 - Re-enabling protection

6 - 78. Click the Test button to validate that DNS failover is configured correctly for the selected DNS server(s) and that the specified credentials

Seite 140 - Credentials

6 - 8After you select the Identity Failover option, click Configure. The Configure Identity Failover window will appear. Enter the following informat

Seite 141

6 - 9Modifying the default configuration for services may affect whether data can be successfully replicated. Do not modify the services to start/stop

Seite 142 - DFO.exe command line will

1 - 1IntroductionThis document describes how to use the Storage Mirroring Application Manager to create and validate your application configuration. T

Seite 143 - Assigning Full Control

6 - 10 Network Access (ICMP)—Storage Mirroring failover uses ICMP pings to determine if the source server is online. If a network device, such as a f

Seite 144

6 - 11Connection settingsThe Connection tab includes options that will be applied to the specified source/target connection. RouteThis setting ident

Seite 145 - Exchange credentials

6 - 12 Checksum—(Default) This option performs a checksum comparison calculation. A checksum calculation is a formula applied to blocks of data to de

Seite 146

6 - 13To change the replication set rules:1. Select the Override Generated Rules checkbox. 2. To add a replication set rule, click Add. The Add Repset

Seite 147 - SQL credentials

6 - 14Scripts are automatically generated by Application Manager during configuration. The scripts are copied to the Storage Mirroring installation di

Seite 148 - BlackBerry credentials

6 - 153. Select the Active Directory Hostname (SPNs) checkbox if you want to remove the host SPN (Service Principle Name) automatically from Active Di

Seite 149 - Appendix B: Rebuilding the

6 - 16When you have finished configuring the optional protection options, continue with Validate the Configuration on page 9-1. NOTE: If you close the

Seite 150 -  exchfailover.exe

7 - 1Protecting a SharePoint ServerThe SharePoint databases will be protected by default and the Application Manager can be used to extend the target

Seite 151

7 - 27. Install Storage Mirroring the source and target SQL servers using the installation defaults. See the Storage Mirroring Getting Started guide f

Seite 152 - SQL Failover with BlackBerry

7 - 3If you want to change the domain, type in a domain name for a trusted domain that the Application Manager client can connect to, then press Tab o

Seite 153 - Appendix D: Using a

1 - 2Using the Application Manager with Exchange in clustered environmentsThe Application Manager can be used in the following cluster configurations

Seite 154 - Data Verification (TDV)

7 - 4or Validate, a prompt will appear asking if you want to re-use the previous configuration information. Click Yes to re-use the previous informati

Seite 155

7 - 53. To add a non-discovered server to the Current Servers list, enter the server name in the field next to the Add button, then click Add.4. After

Seite 156

7 - 6Failover settingsThe Failover tab includes options that will be applied during SharePoint failover.Failover typeFailover Type indicates what name

Seite 157

7 - 7After you select the DNS Failover option, click Configure. The Configure DNS Failover window will appear.Configure the following information for

Seite 158

7 - 88. Click the Test button to validate that DNS failover is configured correctly for the selected DNS server(s) and that the specified credentials

Seite 159 - Failover (DFO) Utility

7 - 9After you select the Identity Failover option, click Configure. The Configure Identity Failover window will appear. Enter the following informati

Seite 160

7 - 10Modifying the default configuration for services may affect whether data can be successfully replicated. Do not modify the services to start/sto

Seite 161

7 - 11Configure how you want to monitor the source server for failure.1. Select the Active Monitoring Enabled option to enable or disable failover for

Seite 162 - Exchange Failover (EFO)

7 - 122. In the Monitor Interval field, enter the interval (in seconds) at which you want to check application health.3. In the Error Threshold field,

Seite 163

7 - 13Snapshot settingsThe following allow you to set up snapshots of your target data that can be used when failing over. By default, snapshots are n

Kommentare zu diesen Handbüchern

Keine Kommentare