Application Manageruser’s guidePart number: T2558-96322Ninth edition: March 2009
1 - 3Using the Application Manager with SQL in clustered environmentsThe Application Manager can be used with SQL Server 2005 or SQL Server 2008 in a
7 - 14RouteThis setting identifies the Target IP Address that the Storage Mirroring data will be transmitted through. You should only change this sett
7 - 15You can specify compression for different source/target connections, but all connections to the same target will have the same compression setti
7 - 163. In the Rule Path field, type the directory that you want to protect or exclude.4. In the Include/Exclude area, select whether to include or e
7 - 17By default, Application Manager generates all the required scripts for you automatically based on your system configuration. You can also edit t
7 - 18Advanced settingsThe following options allow you to control what functions Application Manager will perform during configuration. By default, Ap
7 - 19SharePoint settingsThe SharePoint tab includes options you can use to join or extend the target front-end web server to the production SharePoin
7 - 20When you select this button, the SharePoint front-end web server specified in the Server Name field will be extended into the source SharePoint
8 - 1Protecting a BlackBerry ServerTo configure protection for a consolidated one-to-one configuration of your BlackBerry servers using the Applicatio
8 - 2Select a taskTo protect a BlackBerry server, open the Application Manager (Start, Programs, Storage Mirroring, Application Manager), then on the
8 - 3You may enter a user name for a different domain by entering a fully-qualified user name. The fully-qualified user name must be in the format Net
1 - 4 Application Manager for SharePoint supports only SQL instance mode protection. Database-only protection mode is not available. By default, App
8 - 4Add or manage serversIf the servers you need do not appear, click the Advanced Find button. The Manage BlackBerry Servers window will appear. To
8 - 5Configure protection settingsIf you do not need to change the configuration settings, continue with Validate the Configuration on page 9-1.If you
8 - 6After you select the DNS Failover option, click Configure. The Configure DNS Failover window will appear.Configure the following information for
8 - 78. Click the Test button to validate that DNS failover is configured correctly for the selected DNS server(s) and that the specified credentials
8 - 8After you select the Identity Failover option, click Configure. The Configure Identity Failover window will appear. Enter the following informat
8 - 9Modifying the default configuration for services may affect whether data can be successfully replicated. Do not modify the services to start/stop
8 - 103. In the Method to monitor for Failover field, select the ping method to use when monitoring source IP addresses. Network Access (ICMP)—Storag
8 - 11Connection settingsThe Connection tab includes options that will be applied to the specified source/target connection. RouteThis setting ident
8 - 12 Checksum—(Default) This option performs a checksum comparison calculation. A checksum calculation is a formula applied to blocks of data to de
8 - 133. To add a service, click Add. The Add Service window will appear.4. Select the Service name from the drop-down box, then click Add; or, type t
1 - 5BlackBerryThe Application Manager can be used to configure Storage Mirroring to provide high availability for BlackBerry Enterprise Server using
8 - 14Replication set rulesA replication set defines what directories/files are to be protected by Storage Mirroring. By default, Application Manager
8 - 15Scripts are automatically generated by Application Manager during configuration. The scripts are copied to the Storage Mirroring installation di
8 - 16Advanced settingsThe following options allow you to control what functions Application Manager will perform during configuration. By default, Ap
8 - 17Saving configuration changesAfter you have changed the configuration parameters, click OK to apply the settings. If you click Cancel, any change
9 - 1Validate the ConfigurationClick Validate, or select Actions, Validate, to ensure that the source and target servers are configured correctly for
10 - 1Enabling Protection for a ServerBased on the current protection status, the Enable/Disable Protection button (on both the Setup and Monitor t
10 - 2While there may be other Storage Mirroring connections between the selected source and target, Application Manager only recognizes connections t
10 - 3The following table describes the possible monitoring status states.Protection detail statesThe following table identifies the possible mirror s
10 - 4The following table identifies the possible transmit modes.The following table identifies the possible target status states.Mirroring If the fil
10 - 5Verify target data viabilityAfter you have configured your servers, you can use the Application Manager to run a test that verifies that the dat
1 - 6 A copy of the most recent version of the Storage Mirroring Application Manager .NET Framework version 3.5 with service pack 1 or later. If you
10 - 6You can verify the target stores at any time following the successful completion of a mirror. When you select Actions, Verify Target Data, the D
10 - 73. The Results area displays the status of the target Exchange Stores and Storage Groups or SQL databases and instances. Initially, the state of
10 - 8Managing snapshotsIf snapshots were enabled when you configured protection, you can open the Snapshot Manager to take and delete snapshots.To la
11 - 1Failover, Failback, and RestorationIf you selected DNS failover, you can use the Application Manager to automate failover, failback, and restora
11 - 2Initiating manual failoverTo initiate a manual failover, select Actions, Failover, or click the Failover button on the Monitoring tab. The Initi
11 - 34. If you want to use the data from a snapshot, select Revert to specified snapshot, then select the snapshot in the list. Click Initiate Failov
11 - 45. Depending on how long the server has been failed over or the amount of data changed, it may be more efficient to perform a full mirror upon r
11 - 5Before you begin to restore to the original source, resolve the issue(s) that caused the failure. If the source server has to be rebuilt, follow
11 - 6 File Server Computer Browser SharePoint IISADMIN HTTPFilter SMTPSVC W3SVC SPAdmin SPSearch SPTimerV3 SPTrace SPWriter BlackBerry
11 - 711. Select Tools, Restoration Manager.12. Complete the appropriate fields on the Restoration Manager. Original Source—The source where the dat
1 - 7 Exchange 2007 To use the Application Manager for Exchange, Storage Mirroring must be running under the localsystem account. The client or se
A - 1Appendix A: Recommended CredentialsApplication Manager credentialsProper rights must be assigned to the account that is entered when the Applicat
A - 26. Select the user to be included in the Storage Mirroring Admin group.7. Click OK to return to the Local Group Properties dialog box.8. Click OK
A - 3Assigning the user to the DnsAdmins groupFollow these steps to add a user to the domain DnsAdmins group.1. Select Start, Programs, Administrative
A - 4DNS permissions for Windows 2003 SP2 or laterVerify that the user has permissions to update DNS. The user must be: The user must be a member of
A - 515. Click Add. Type the user or group name you want to use in the Enter the object names to select box, click Check Names to verify your entry or
A - 6Assigning the user to the local Administrators groupFollow these steps to add a user to the local Administrators group.1. Select Start, Programs,
A - 7 The user running the Application Manager must be an Exchange full administrator at the organizational level, as delegated via the Exchange Syst
A - 8Delegating Exchange administrative rightsTo assign Exchange administrative rights to a user through the Application Manager, select Tools, Delega
A - 9 If the SQL Server service is not using the same domain user account on the source and target servers, the SQL Service Principal Names (SPNs) of
B - 1Appendix B: Rebuilding the SourceThe following sections guide you through rebuilding a source server following a failure.Rebuilding the original
1 - 8 SQL Server 2005 SQL Server 2008 SQL Sever Express To enable the Application Manager to work with MSDE (SQL Express 2000) and SQL Server 2005
B - 29. If you accepted the default installation on the original source (before it failed), set Microsoft Exchange Messaging and Collaboration Service
B - 3Rebuilding the original SQL source1. Verify that your source machine is not connected to the network. If it is, disconnect it.2. Resolve the sour
C - 1Appendix C: Exchange and SQL Failover with BlackBerryIf you are using a standalone BlackBerry server with Exchange or SQL, complete the following
D - 1Appendix D: Using a non-Microsoft DNS ServerIn order to update Windows-based Active Directory-Integrated DNS records, the account specified must
E - 1Appendix E: Using the Target Data Verification (TDV) UtilityThere are several options available in the Target Data Verification utility for perfo
E - 2Options /apptype SQL|EXCH —Select whether to verify SQL or Exchange data on the target server /dnsdomain domainname—The fully-qualified name o
E - 3Target Data Verification Utility Command Syntax for SQL Examples TDV.EXE /helpDisplay TDV usage syntax help for Exchange and SQL. TDV.EXE /app
E - 4Options /apptype SQL|EXCH—Select whether to verify SQL or Exchange data on the target server /srcname source—The source SQL server name /tarn
E - 5Examples TDV.EXE /apptype SQL /helpDisplays usage for SQL. TDV.EXE /setpassword mydomain.com\admin mypasswordStores encrypted user ID and pass
F - 1Appendix F: Using the DNS Failover (DFO) UtilityThe DNS Failover utility (dfo.exe) can be used in the failover and failback scripts to delete and
1 - 9 SQL Server 2000, SQL Server 2005, or SQL Server 2008 back-end Windows Firewall—You will need to open port 6350 for Sharepoint communication.Bl
F - 2Options dnsservername—The name of the source domain/zone's primary DNS server (optional; local machine name will be used if missing) sour
F - 3Password Encryption /setpassword—Allows the user to store a username/password pairing in an encrypted file for later use. (Optional, but requir
G - 1Appendix G: Using the Exchange Failover (EFO) UtilityThere are several options available in the Exchange Failover utility for configuring Exchang
G - 2Options (continued) r—(Optional) By itself, this option creates a one-to-one mapping of the groups and mail stores from the source to the target
1 - 10Application notesWhile the Application Manager greatly simplifies the process of configuring your application for use with Storage Mirroring, He
2 - 1Navigating the user interfaceThe Application Manager interface is designed to guide you through the process of configuring protection for your se
2 - 2The Application Manager installation uses an active internet connection to download the Microsoft Admin Pack and SQL server backward compatibilit
© Copyright 2009 Hewlett-Packard Development Company, L.P.Hewlett-Packard Company makes no warranty of any kind with regard to this material, includin
2 - 3Menu optionsBased on the current protection status and/or failover state, the Protection, Monitoring, and Failover/Failback menu options will be
2 - 4Change Application Manager preferencesTo change display preferences for the Application Manager, select Tools, Options. The Options dialog box wi
2 - 59. Select the Enable Alternative DNS checkbox to launch Application Manager in \Altdns mode the next time it is opened. For more information, see
3 - 1Protecting an Exchange ServerTo configure protection for your Exchange servers, you will complete the following steps:1. Install Exchange on the
3 - 2Select a taskTo protect an Exchange server, open the Application Manager (Start, Programs, Storage Mirroring, Application Manager), then on the T
3 - 3You may enter a user name for a different domain by entering a fully-qualified user name. The fully-qualified user name must be in the format Net
3 - 4Notice that after the source and target servers are selected, the Protection Status on the Monitor tab changes to Unprotected.Enter server login
3 - 5Failover settingsThe Failover tab includes options that will be applied during Exchange failover. Failover typeFailover Type indicates what name
3 - 6After you select the DNS Failover option, click Configure. The Configure DNS Failover window will appear. Configure the following information for
3 - 77. In the Password field, enter the password that will be used to access/modify DNS records. 8. Click the Test button to validate that DNS failov
Table of ContentsChapter 1 Introduction ...1-1About the Storage Mirroring Application Manager .
3 - 8After you select the Identity Failover option, click Configure. The Configure Identity Failover window will appear. Enter the following informati
3 - 9Modifying the default configuration for services may affect whether data can be successfully replicated. Do not modify the services to start/stop
3 - 10Monitor settingsThe Monitoring tab includes options for configuring how you want to monitor the source server for failure.Configure how you want
3 - 11Application Monitoring (BETA)By default, application monitor settings are not available in this release of the Storage Mirroring Application Man
3 - 128. (Optional) Click the Clear Cached Credentials button to clear the cached user name and password.Snapshot settingsThe following allow you to s
3 - 13Connection settingsThe Connection tab includes options that will be applied to the specified source/target connection. RouteThis setting identi
3 - 14To refresh the tree view to show new source directories or files that may have been added or removed, select the logical node, then click the Re
3 - 15Replication set rulesA replication set defines what directories/files are to be protected by Storage Mirroring. By default, Application Manager
3 - 16Failover/failback scriptsScripts are executed at different points during the failover/failback process to perform the actions necessary to make
3 - 17Before running Application Manager multiple times (for example, when re-enabling protection after a failover/failback), save a copy of your post
iiConnection settings ... 3-13Route...
3 - 18Advanced settingsThe following options allow you to control what functions Application Manager will perform during configuration. By default, Ap
3 - 197. Select the Create Failover Monitor checkbox to create a failover monitor on the target to monitor the source for failure. This monitor will u
4 - 1Protecting an Exchange Cluster with a Like-Named ClusterThis section describes the process used to configure protection for an Exchange cluster w
4 - 2 Failover multiple EVS servers to pre-existing EVS servers on the target. If you choose this option, instead of selecting the like-named equival
4 - 33. After you select a like-named cluster for the target, you will need to configure the like-named cluster. After you select the target server, t
4 - 46. On the Manage Exchange window, click Configure to open the Configure Protection window, then select the Failover tab. 7. DNS Failover is the o
4 - 59. On the Configure DNS window, you can modify the TTL value for the DNS record. You can also specify the user credentials needed to modify DNS.
4 - 6Dealing with a failureGraceful failoverAt the user's discretion, the Application Manager can perform a graceful, or “soft”, failover. A soft
5 - 1Protecting a SQL ServerTo configure protection for your SQL servers using Application Manager, you will complete the following steps:1. Install S
5 - 2Select a domainThe Domain Name on the main window will be populated automatically with the domain where the Application Manager client resides.If
iiiAdvanced settings ... 5-19Replication set rules...
5 - 3Select source and target serversIf this is your first time to select a SQL server to protect, you may need to click the Advanced Find button to a
5 - 4Add or manage serversIf the servers you need do not appear, click the Advanced Find button, or select Actions, Manage SQL Servers. The Manage SQL
5 - 5Enter server login informationAfter you select a server for the first time, you will be prompted to enter a user name and password to use for log
5 - 6Select SQL instancesIf you launch the Application Manager using the /sql /advanced switch (dtam /sql /advanced), you can select which instances t
5 - 7Failover typeFailover Type indicates what name resolution method will be used to redirect users to the target SQL server in the event of a source
5 - 85. To specify the value the Application Manager will establish for Time to Live (TTL) on the source’s affected DNS records, select the Update TTL
5 - 9 If you have client applications that are configured to connect to an IP address rather than a server name.After you select the Identity Failove
5 - 10Modifying the default configuration for services may affect whether data can be successfully replicated. Do not modify the services to start/sto
5 - 11Monitor settingsThe Monitoring tab includes options for configuring how you want to monitor the source server for failure. Configure how you wan
5 - 12Application Monitoring (BETA)By default, application monitor settings are not available in this release of the Storage Mirroring Application Man
ivConnection settings ... 7-13Route...
5 - 138. (Optional) Click the Clear Cached Credentials button to clear the cached user name and password.Snapshot settingsThe following allow you to s
5 - 14Connection settingsThe Connection tab includes options that will be applied to the specified source/target connection. RouteThis setting ident
5 - 15SQL Instance protection mode requires that the source and target servers both have the exact same version of SQL (major and minor versions) as w
5 - 16If you select Database Only protection mode, you can select a non-system database and map it to a unique path on the target.1. Select the databa
5 - 173. To confirm the new path, click Apply. Database only mode, many-to-one configurationsThe following examples describe the SQL many-to-one confi
5 - 18Case: Both source SQL servers have a database named “Accounting” (Source3\instance1|Accounting and Source4\instance2|Accounting). You can protec
5 - 19Advanced settingsThe Advanced tab includes advanced configuration options. Replication set rulesA replication set defines what directories/file
5 - 205. In the Recursive area, select whether the directory should be recursive (protecting all sub-folders under the directory) or non-recursive (pr
5 - 21Any change you make to the script in the editor will be copied to the appropriate server when configuration changes are accepted, thus overwriti
5 - 22Advanced settingsThe following options allow you to control what functions Application Manager will perform during configuration. By default, Ap
vVerify target data viability ... 10-5Relocating the MTA and SMTP pickup path and queues..
5 - 23When you have finished configuring the optional protection options, continue with Validate the Configuration on page 9-1. NOTE: If you close the
6 - 1Protecting a File ServerTo configure protection for your file servers using Application Manager, you will complete the following steps:1. Install
6 - 2Select a domainThe Domain Name on the main window will be populated automatically with the domain where the Application Manager client resides.If
6 - 3Select source and target serversClick the Advanced Find button to add servers to the Source Server and Target Server fields. For more information
6 - 4Add or manage serversIf the servers you need do not appear, click the Advanced Find button. The Manage Servers window will appear. To discover al
6 - 5Configure protection settingsIf you do not need to change the configuration settings, continue with Validate the Configuration on page 9-1.If you
6 - 6After you select the DNS Failover option, click Configure. The Configure DNS Failover window will appear.Configure the following information for
6 - 78. Click the Test button to validate that DNS failover is configured correctly for the selected DNS server(s) and that the specified credentials
6 - 8After you select the Identity Failover option, click Configure. The Configure Identity Failover window will appear. Enter the following informat
6 - 9Modifying the default configuration for services may affect whether data can be successfully replicated. Do not modify the services to start/stop
1 - 1IntroductionThis document describes how to use the Storage Mirroring Application Manager to create and validate your application configuration. T
6 - 10 Network Access (ICMP)—Storage Mirroring failover uses ICMP pings to determine if the source server is online. If a network device, such as a f
6 - 11Connection settingsThe Connection tab includes options that will be applied to the specified source/target connection. RouteThis setting ident
6 - 12 Checksum—(Default) This option performs a checksum comparison calculation. A checksum calculation is a formula applied to blocks of data to de
6 - 13To change the replication set rules:1. Select the Override Generated Rules checkbox. 2. To add a replication set rule, click Add. The Add Repset
6 - 14Scripts are automatically generated by Application Manager during configuration. The scripts are copied to the Storage Mirroring installation di
6 - 153. Select the Active Directory Hostname (SPNs) checkbox if you want to remove the host SPN (Service Principle Name) automatically from Active Di
6 - 16When you have finished configuring the optional protection options, continue with Validate the Configuration on page 9-1. NOTE: If you close the
7 - 1Protecting a SharePoint ServerThe SharePoint databases will be protected by default and the Application Manager can be used to extend the target
7 - 27. Install Storage Mirroring the source and target SQL servers using the installation defaults. See the Storage Mirroring Getting Started guide f
7 - 3If you want to change the domain, type in a domain name for a trusted domain that the Application Manager client can connect to, then press Tab o
1 - 2Using the Application Manager with Exchange in clustered environmentsThe Application Manager can be used in the following cluster configurations
7 - 4or Validate, a prompt will appear asking if you want to re-use the previous configuration information. Click Yes to re-use the previous informati
7 - 53. To add a non-discovered server to the Current Servers list, enter the server name in the field next to the Add button, then click Add.4. After
7 - 6Failover settingsThe Failover tab includes options that will be applied during SharePoint failover.Failover typeFailover Type indicates what name
7 - 7After you select the DNS Failover option, click Configure. The Configure DNS Failover window will appear.Configure the following information for
7 - 88. Click the Test button to validate that DNS failover is configured correctly for the selected DNS server(s) and that the specified credentials
7 - 9After you select the Identity Failover option, click Configure. The Configure Identity Failover window will appear. Enter the following informati
7 - 10Modifying the default configuration for services may affect whether data can be successfully replicated. Do not modify the services to start/sto
7 - 11Configure how you want to monitor the source server for failure.1. Select the Active Monitoring Enabled option to enable or disable failover for
7 - 122. In the Monitor Interval field, enter the interval (in seconds) at which you want to check application health.3. In the Error Threshold field,
7 - 13Snapshot settingsThe following allow you to set up snapshots of your target data that can be used when failing over. By default, snapshots are n
Kommentare zu diesen Handbüchern