Volume Replicator 7.4.1 Administrator's Guide - Windows

Last Published:
Product(s): InfoScale & Storage Foundation (7.4.1)
Platform: Windows
  1. Understanding Volume Replicator
    1. About Volume Replicator
      1.  
        Feature highlights of Volume Replicator
      2.  
        About Volume Replicator support for IPv6 and dual stack
    2. Basic Volume Replicator terms
      1.  
        Primary and Secondary host
      2.  
        Write-order fidelity
      3.  
        Consistent data versus up-to-date data
      4.  
        Heartbeat protocol
    3. Building blocks of Volume Replicator
      1.  
        Replicated Volume Group
      2.  
        Replicator Log volume
      3.  
        Replication Link - RLINK
      4.  
        Replicated Data Set
      5.  
        Data Change Map
    4. Understanding replication in the Volume Replicator environment
      1.  
        Volume Replicator at the Primary
      2.  
        Volume Replicator at the Secondary
      3.  
        How replication happens in the Volume Replicator environment
    5. Modes of replication
      1. Synchronous mode of replication
        1.  
          Advantage of synchronous mode of replication
        2.  
          Disadvantages of synchronous mode of replication
      2.  
        Understanding data flow in Volume Replicator synchronous mode
      3. Asynchronous mode of replication
        1.  
          Advantages of Asynchronous mode of replication
        2.  
          Disadvantages of Asynchronous mode of replication
    6. Understanding data flow in Volume Replicator asynchronous mode
      1.  
        Synchronous override mode
    7.  
      Understanding data flow in an RDS that contains multiple Secondary hosts
    8. Managing data during failure and recovery
      1. Preventing data loss
        1.  
          Preventing data loss during normal operations
        2.  
          Preventing data loss during a Primary host failure
      2.  
        Maintaining data consistency
      3.  
        Detecting host and connection failures
      4.  
        Securing Volume Replicator
  2. Replication concepts
    1. About using Volume Replicator as a disaster recovery tool
      1.  
        Migrating the Primary role
      2.  
        Taking over the Primary role
      3.  
        Performing a takeover using the fast-failback option
    2. Understanding how Volume Replicator logs writes to the Replicator Log
      1. Sizing the Replicator Log
        1.  
          Determining the size of the Replicator Log
    3. Understanding replication settings for a Secondary
      1.  
        Mode of replication - synchronous attribute
      2. Using the available bandwidth effectively
        1.  
          Bandwidth of the available network connection
      3.  
        Choosing the network protocol
    4. Measures to protect log overflow and replication latency
      1. Replicator Log overflow protection - srlprot attribute
        1.  
          Replicator Log protection when Primary and Secondary are connected
        2.  
          Replicator Log protection when Primary and Secondary are disconnected
        3.  
          Changing between the states of Replicator Log protection
      2. Latency protection - latencyprot attribute
        1.  
          Understanding latency protection
        2.  
          Latency protection when Primary and Secondary are connected
        3.  
          Latency protection when Primary and Secondary are disconnected
    5. Pausing the replication
      1.  
        Pausing the replication from the Primary host
      2.  
        Pausing the replication from the Secondary host
      3.  
        Applications of the pause feature
    6.  
      Understanding checkpoints
    7. Synchronizing the Secondary
      1. Using Automatic Synchronization
        1.  
          Performing intelligent synchronization
      2.  
        Using incremental synchronization after log overflow
      3.  
        Using backup and checkpoint
    8. Understanding Volume Replicator support for FlashSnap
      1. About the snapshot operation
        1.  
          Conditions for creating disk group split friendly snapshots
        2.  
          Forcing the snapshot operation
      2.  
        About the snapback operation
    9. About Synchronized Snapshots
      1.  
        How Volume Replicator creates synchronized snapshots
    10. Understanding Bunker replication
      1.  
        About Bunker replication
      2.  
        Advantages of Bunker replication
      3.  
        How Bunker replication differs from normal replication
      4.  
        Bunker node workflow during normal operations
      5.  
        Using the Bunker node for disaster recovery
    11. Understanding Volume Replicator Support for TCP Multi-Connection
      1.  
        Advantages of TCP Multi-Connection
    12.  
      About Volume Replicator compression
    13. About Volume Replicator memory monitoring and control support
      1.  
        Advantages of memory monitoring
    14. About Volume Replicator Graphs
      1.  
        General functionality constraints for Volume Replicator Graphs in a clustered environment
  3. Setting up replication
    1.  
      About setting up replication
    2.  
      Best practices for setting up replication
    3. Security considerations for Volume Replicator
      1.  
        Configuring the VxSAS Service
      2.  
        Enabling NAT support for Volume Replicator
    4. Setting up replication using the Setup Replicated Data Set wizard
      1.  
        Prerequisites for setting up the RDS
    5.  
      Creating a Replicated Data Set (RDS)
    6.  
      Replication failover considerations with diverse network configurations
    7. Setting up the Bunker RVG for replication
      1.  
        Prerequisites for setting up Bunker RVG
      2.  
        Best practices for creating the Bunker RVG
      3.  
        Adding the Bunker RVG to the RDS
  4. Using the VEA Console for Volume Replication Operations
    1.  
      About performing Volume Replicator operations in the VEA console
    2.  
      Features of VEA console
    3.  
      Launching the VEA console
    4. Managing connections
      1.  
        Connecting to a host
      2.  
        Disconnecting from a host
      3.  
        Reconnecting hosts at startup
      4.  
        Using history to view recent connections
      5.  
        Managing favorites
      6.  
        Adding a host to the favorites
      7.  
        Removing a host from the favorites
      8.  
        Switching connections
    5. Layout of the VEA console
      1.  
        Performing tasks related to views
      2.  
        Selecting objects
      3.  
        Left pane or navigation view (tree view)
      4.  
        Right pane or details view (tabular view)
      5. Status pane
        1.  
          Console view
        2.  
          Tasks view
      6.  
        URL bar
      7. Perspectives
        1. Control Panel
          1.  
            Changing the IPv6 preference through the Control Panel
      8.  
        Menu bar and toolbar
    6. Accessing the Volume Replicator options
      1. Menu bar options
        1.  
          File menu
        2.  
          Tools menu
        3.  
          Actions menu
        4.  
          Toolbar options
    7.  
      Exiting the VEA client
  5. Monitoring replication
    1.  
      About monitoring replication
    2. Interpreting the information in the Volume Replicator views
      1.  
        Viewing all the RDSs on the host
      2. Viewing RDS information
        1.  
          RVG states
        2.  
          Replication status
      3.  
        Viewing information about the Primary RVG
      4.  
        Viewing information about the Secondary RVG
      5.  
        Viewing information about the Primary data volume
      6.  
        Viewing the Replicator Log volume information
      7.  
        Viewing information about the Secondary data volume
    3. Monitoring replication using the VEA console
      1.  
        Displaying the monitor view
      2.  
        Specifying preferences for the monitor view
      3. Interpreting the information in the monitor view
        1.  
          Configuration information
        2.  
          Log usage information
        3.  
          Obtaining replication status information
        4.  
          Obtaining statistical information
        5.  
          Interpreting error information
    4. Checking replication performance using vxrlink stats
      1.  
        Identifying the most up-to-date Secondary
    5.  
      Analyzing Volume Replicator performance
    6.  
      Monitoring alerts to interpret error conditions
    7.  
      Handling Volume Replicator events
  6. Administering Volume Replicator
    1.  
      About administering Volume Replicator
    2.  
      Modifying the configuration
    3. Adding volumes
      1.  
        Prerequisite for adding data volumes to an RDS
    4.  
      Adding a Secondary host
    5. Administering the RVG
      1.  
        Enabling or disabling data access to the RVG data volumes
      2.  
        Expanding the data volumes
      3.  
        Expanding the Replicator Log
      4. Shrinking the data volumes
        1.  
          Before shrinking a data volume
        2.  
          Shrinking a data volume
      5. Adding or removing the DCM logs from the data volumes
        1.  
          Adding or removing the DCM logs for all volumes in an RVG
      6.  
        Resynchronizing the Secondary hosts
      7. Associating or dissociating the Replicator Log volume
        1.  
          Associating the Replicator Log with the RVG
        2.  
          Dissociating the Replicator Log volume on an RVG
    6. Administering replication
      1.  
        Disabling the SwiftSync feature
      2.  
        Starting replication through the VEA console
      3.  
        Stopping replication using the VEA console
      4.  
        Changing replication settings for an RDS
      5. Managing checkpoints
        1.  
          Ending the checkpoint
      6. Pausing replication using Volume Replicator
        1.  
          Notes on pausing the replication
        2.  
          Pausing Secondary from the Primary
        3.  
          Resuming the Secondary host from Primary
        4.  
          Pausing the Secondary host from the Secondary
      7.  
        Converting the Primary to a Secondary
      8.  
        Migrating the Primary role within an RDS
      9. Creating snapshots for the data volumes
        1.  
          Reattaching the snapshots back to the original volumes
      10. Creating synchronized snapshots using the VSS Snapshot wizard
        1.  
          About snapshot naming convention on the Secondary
        2.  
          Creating synchronized snapshot sets
        3.  
          Prerequisites for creating synchronized snapshot sets
        4.  
          Creating schedules for synchronized snapshots
        5.  
          Displaying the status of the scheduled synchronized snapshot
        6.  
          Reattaching synchronized snapshots
        7.  
          Deleting a synchronized snapshot schedule
      11.  
        Recovering the RVG
      12.  
        Restoring the Secondary
      13.  
        Migrating VVR to support IPv6 or dual stack
    7. Administering Bunker replication
      1.  
        Stopping the replication
      2.  
        Pausing Secondary
      3.  
        Changing replication settings for Bunker RVG
      4. Associating or dissociating the Replicator Log
        1.  
          Dissociating the Replicator Log volume on Bunker RVG
        2.  
          Associating the Replicator Log with Bunker RVG
      5.  
        Activate Bunker
      6.  
        Deleting the Bunker Secondary
    8. Performing disaster recovery operation
      1.  
        Using the Bunker node to update the Secondary
      2.  
        Resynchronizing the original Primary when it becomes available
      3.  
        Updating the Secondary from the Bunker
      4. Taking over the Primary role using the fast-failback option
        1. Performing takeover with fast-failback
          1.  
            Prerequisites for takeover with fast-failback
        2.  
          Performing takeover without using fast-failback
        3.  
          General notes on take over operation
      5.  
        Performing takeover in a multiple Bunker setup
    9. Deleting Volume Replicator objects
      1. Removing data volumes
        1.  
          Understanding the remove data volume behavior in different scenarios
      2.  
        Deleting the replicated data set
      3.  
        Deleting the Primary RVG
      4.  
        Deleting the Secondary RVG
    10. Accessing data on Secondary host
      1.  
        Creating a mirror break-off
      2.  
        Creating snapshots
    11. Performing automated system recovery (ASR)
      1.  
        Automated system recovery (ASR) overview
      2.  
        Volume Replicator support for ASR
      3. ASR recovery process
        1.  
          Considerations when restoring a Secondary with a healthy Primary
      4.  
        Microsoft Cluster recovery
    12. Alternative methods to synchronize the Secondary faster
      1.  
        Method 1: Moving the Secondary RVG disk group on to a spare server within the same LAN as the Primary
      2. Method 2: Using snapshots for synchronizing the Secondary data volumes
        1.  
          Renaming Volumes on the Secondary host
      3. Method 3: Using mirrored plexes to synchronize the Secondary
        1.  
          Renaming mirror-breakoff volumes on the Secondary host
    13. Obtaining statistical information through Volume Replicator Graphs
      1.  
        Graph types and usage
      2. Viewing statistical information using Volume Replicator Graph
        1.  
          Viewing online bandwidth usage for an RLINK
        2.  
          Viewing Historic bandwidth usage for an RLINK
        3.  
          Viewing Volume Replicator Non-Paged Pool (NPP) Memory Graph
        4.  
          Saving an Online or Historic bandwidth usage graph
        5.  
          Re-opening a saved CSV graph file
        6.  
          Starting or stopping the Historic Bandwidth Data Collection
  7. Using the command line interface
    1.  
      About using the command line interface
    2.  
      Conventions for command line syntax
    3. Administering the RDS using the vxrds command
      1.  
        Activating the Bunker RVG
      2.  
        Creating and adding a Secondary RVG
      3.  
        Adding an existing volume to the RDS
      4.  
        Adding a Bunker node
      5.  
        Changing the host name or IP
      6.  
        Creating the Primary RVG
      7.  
        Deactivating the Bunker RVG
      8.  
        Deleting the Bunker node
      9.  
        Deleting the Secondary
      10.  
        Deleting the Primary
      11.  
        Dissociating data volumes
      12.  
        Resynchronizing a failed Primary with the new Primary
      13.  
        Converting a Primary to a Secondary
      14.  
        Migrating the Primary to a Secondary
      15.  
        Pausing replication using the vxrds pauserep command
      16.  
        Displaying the RDS
      17. Resizing the data volumes
        1.  
          Before resizing a data volume
        2.  
          Shrinking a data volume
      18.  
        Growing the Replicator Log volume
      19.  
        Resuming replication after pausing
      20.  
        Resynchronizing the Secondary
      21.  
        Setting replication attributes
      22.  
        Starting replication using the vxrds startrep command
      23.  
        Stopping replication using the vxrds stoprep command
      24.  
        Taking over the Primary role using the vxrds takeover command
      25.  
        Performing RLINK Operations using the vxrlink command
      26.  
        Associating a Secondary
      27.  
        Attaching a Secondary
      28.  
        Displaying the list of Secondary checkpoints
      29.  
        Deleting the Secondary checkpoint
      30.  
        Detaching an RLINK
      31.  
        Dissociating an RLINK
      32.  
        Creating new RLINK
      33.  
        Pausing the RLINK
      34.  
        Recovering the RLINK
      35.  
        Restoring the RLINK
      36.  
        Resuming the RLINK
      37.  
        Removing the RLINK
      38.  
        Setting the RLINK attributes
      39. Displaying the network statistics for the RLINK
        1.  
          Output values for vxrlink stats without the -e option
        2.  
          Output values for vxrlink stats with the -e option
      40.  
        Displaying the RLINK status
      41.  
        Identifying the most up-to-date Secondary
      42.  
        Verifying the RLINK
      43.  
        Starting the Historic Bandwidth Data Collection using the CLI
      44.  
        Stopping the Historic Bandwidth Data Collection using the CLI
    4. Administering the RVGs using the vxrvg command
      1.  
        Adding DCM log
      2.  
        Associating the Replicator Log volume to an RVG
      3.  
        Associating data volume with the RVG
      4.  
        Ending checkpoint
      5.  
        Starting the checkpoint
      6.  
        Deleting the RVG checkpoint
      7.  
        Displaying RVG checkpoints
      8.  
        Dissociating volumes from RVG
      9.  
        Dismounting data volumes
      10.  
        Creating new RVG
      11.  
        Converting a Secondary RVG to Primary RVG
      12.  
        Converting a Primary RVG to Secondary RVG
      13.  
        Recovering the RVG
      14.  
        Removing an RVG
      15.  
        Resynchronizing the RVG
      16.  
        Setting RVG attributes
      17.  
        Creating snapshots for data volumes in an RVG
      18.  
        Reattaching the snapshot volumes back to the data volumes in an RVG
      19.  
        Enabling data access (Starting the RVG)
      20.  
        Generating application statistics
      21.  
        Disabling data access (stopping the RVG)
    5. Displaying information using the vxprint command
      1.  
        Displaying a specific RLINK
      2.  
        Interpreting RLINK flag settings
      3. Displaying an individual RVG
        1.  
          Interpreting RVG flag settings
      4.  
        Displaying an individual data volume or Replicator Log
    6. Creating snapshots using the vxsnap command
      1.  
        Preparing volumes for snapshots
      2. Creating Synchronized Snapshots
        1.  
          About snapshot naming convention on the Secondary
      3.  
        Reattaching the Snapshots
    7.  
      Displaying memory statistics using the vxmemstat command
    8. Administering replicated volumes using the vxvol command
      1.  
        Associating a data volume with an RVG
      2.  
        Associating a volume to an RVG as a Replicator Log
      3.  
        Dissociating a volume from an RVG
    9. Displaying and changing replication ports using the vrport command
      1.  
        Displaying or setting ports for replicating data
      2.  
        Displaying or setting ports for heartbeats
      3.  
        Displaying or setting ports for vradmind
      4.  
        Displaying or setting ports for vxrsyncd
    10. Administering the RVG using the vxedit
      1.  
        Deleting the Volume Replicator objects
      2.  
        Setting the attributes
    11. Administering the RVG using the vxassist command
      1.  
        Adding a DCM log
      2.  
        Growing the volumes
      3.  
        Removing a DCM log
    12. Tuning Volume Replicator
      1.  
        Displaying the tunable values
      2.  
        Setting the tunable values
    13. Examples: Using the command line
      1.  
        Sample setup using the command line
      2. Example 1: Setting up replication using the command line interface
        1.  
          Creating the RLINK on the Primary system VVRPRI
        2.  
          Creating the Primary RVG on the Primary system VVRPRI
        3.  
          Creating the RLINK on the Secondary system VVRSEC
        4.  
          Creating the Secondary RVG on Secondary system VVRSEC
        5.  
          Attaching the RLINKs and starting replication on the Secondary
        6.  
          Attaching the RLINKs and starting replication on the Primary
      3.  
        Example 2: Setting up Bunker replication
      4. Example 3: Using Bunker node for disaster recovery
        1.  
          Updating the Secondary from the Bunker
        2.  
          Transferring the Primary role
        3.  
          Restoring the original Primary in a Bunker setup
        4.  
          Migrating the Primary role back to the original Primary
        5.  
          Recovering the original Primary during Bunker replay
        6.  
          Failing back to the original Primary
        7.  
          Restoring the Bunker setup after failback to original Primary
      5. Example 4: Using synchronized snapshots to restore data
        1.  
          Sample setup showing how to restore data using synchronized snapshots
        2.  
          Configuration Details
        3.  
          Preparing the Volumes
        4.  
          Creating snapshot volumes
        5.  
          Using the snapshots to recover the corrupted volumes
        6.  
          Restoring the original Primary
        7.  
          Migrating the Primary role back to the original Primary (failing back to the original Primary)
  8. Configuring Volume Replicator in a VCS environment
    1.  
      About configuring Volume Replicator in a VCS environment
    2. Components of a VCS cluster
      1.  
        Resources
      2.  
        Attributes
      3. Service groups
        1.  
          Application Service group
        2.  
          Replication Service group
    3. Illustrating a highly available Volume Replicator setup
      1.  
        List of agents for Volume Replicator
    4. How the agents work
      1. VvrRvg agent
        1.  
          VvrRvg agent-specific functions, state definitions, and attributes
        2.  
          Sample replicated Service group definition
        3.  
          Dependency graph
        4.  
          Resource dependencies within a replication Service group
        5.  
          Service group dependencies
      2. RVGPrimary agent
        1.  
          Typical multiple Secondary setup
        2.  
          How the agent works in a multiple Secondary setup
        3.  
          How the agent works in a Bunker set up
        4.  
          RVGPrimary agent-specific functions, state definitions, and attributes
        5.  
          Sample RVGPrimary resource definition
    5. Configuring the agents
      1.  
        About configuring the Disaster Recovery Solutions using the DR Wizard
      2.  
        Taking the application group offline on Secondary
      3.  
        Setting up replication using a virtual IP address
      4.  
        Changing the Primary and Secondary IP
      5.  
        Creating RLINKs between each pair of Secondary hosts
      6. Creating the replication service group
        1.  
          Prerequisites for creating the replication service group
    6. Working with existing replication service groups
      1.  
        Adding a new RVG resource to an existing replication Service group
      2.  
        Modifying an existing resource in the replication service group
  9. Configuring Volume Replicator with Hyper-V
    1.  
      Implementing Volume Replicator replication on Hyper-V with Microsoft failover cluster
    2.  
      Prerequisites for setting up Volume Replicator with Hyper-V
    3.  
      Configuring a virtual machine group and resource dependencies
    4. Configuring replication for the virtual machine
      1.  
        Setup 1: Replicating the System as well as Data disks
      2.  
        Setup 2: Replicating the Data disks
    5.  
      Recommendations and workarounds
  10. Advanced settings in Volume Replicator
    1.  
      About using the advanced settings in Volume Replicator
    2. Tuning the Volume Replicator memory parameters
      1. Understanding the concept of a buffer space
        1.  
          Shared memory between Volume Replicator and SFW
        2.  
          Minimum memory required by SFW and Volume Replicator
        3.  
          Size of the memory available on the Secondary
        4.  
          Readback buffer space on the Primary
      2.  
        Modifying the tunable values
    3. Understanding IBC messaging
      1.  
        Features of the IBC messaging
      2.  
        Application of IBC messaging
      3. IBC messaging commands
        1.  
          Command arguments
        2.  
          Registering an application
        3.  
          Unregistering the application
        4.  
          Sending a message
        5.  
          Receiving a message
        6.  
          Unfreezing the Secondary RVG
        7.  
          Displaying registered application names
        8.  
          Registering and sending messages
        9.  
          Registering and receiving messages
      4. Example: Using the IBC messaging facility to take snapshots
        1.  
          Sample setup showing how to take snapshots using the IBC messaging facility
  11. Troubleshooting Volume Replicator
    1.  
      About troubleshooting Volume Replicator
    2. Recommendations and checks
      1.  
        Encrypted files on replicated volumes
      2.  
        Selecting the mode of replication
      3.  
        Volume Replicator issues when Norton AntiVirus scan is performed
      4.  
        Monitor view does not display the RDS information
      5.  
        Preventing the connect problems
      6.  
        Configuration checks for RLINKS
      7.  
        Network, process, and operating system checks
      8.  
        Configuration checks for volume mappings
      9.  
        Troubleshooting Volume Replicator performance
      10.  
        Other information and checks
    3. Recovering from problems in a firewall or NAT setup
      1.  
        Errors when replicating across a firewall
    4. Recovering from problems during replication
      1.  
        Permission denied errors when performing Volume Replicator Operations
      2. Error when configuring the VxSAS Service
        1.  
          Configuring the VxSAS using the Service Control Manager
      3.  
        VEA Service is not started
      4.  
        Connecting to cluster having multiple IP addresses
      5.  
        Error when disabling data access to the RVG, creating Secondary RVG, adding volumes
      6.  
        Error when resizing volumes
      7.  
        Replica link already exists
      8.  
        Unable to perform delete RDS, add volume, delete volume
      9.  
        Removing the Replicator Log volume mirror
      10.  
        Pausing when writes are in progress
      11.  
        Unable to see volume name for associating Replicator Log
      12.  
        Unable to see the volume names for adding volumes to RDS
      13.  
        Adding logs to dissociated volumes
      14.  
        Using two commands in succession
      15.  
        Renaming dynamic disk group while importing
      16.  
        Problems when performing the snapshot operation
      17. Operation time-out errors
        1.  
          The vxrvg stop command displays operation time-out error
        2.  
          Pausing Secondary from Primary displays operation time-out error
    5. Problems when configuring Volume Replicator in a VCS environment
      1.  
        Application Service group does not failover correctly
    6. Problems when setting performance counters
      1.  
        Volume Replicator objects are not displayed
    7.  
      Ignore error when adding secondary using VEA
  12. Appendix A. Services and ports
    1.  
      InfoScale ports and services
  13. Appendix B. Using the vxrsync utility
    1.  
      About using the vxrsync utility
    2.  
      When to use vxrsync
    3. Understanding how the utility works
      1. Layout of the configuration file
        1.  
          Sample configuration file layout
      2. Using the vxrsync utility with the vxrclient component
        1.  
          vxrclient
        2.  
          vxrserver
    4.  
      Example: Using vxrsync for difference-based synchronization
  14. Appendix C. VR Advisor (VRAdvisor)
    1. Introducing Volume Replicator Advisor (VRAdvisor)
      1.  
        Overview of VRAdvisor
      2. How VRAdvisor works
        1.  
          Data collection
        2.  
          Data analysis
        3.  
          What-if analysis
    2.  
      Installing Volume Replicator Advisor (VRAdvisor)
    3.  
      Uninstalling VRAdvisor on Windows
    4. Collecting the sample of data
      1.  
        Collecting sample data using the VRAdvisor Wizard
      2.  
        Collecting the sample data using the diskStats command
    5. Analyzing the sample of data
      1. Understanding the results of the analysis
        1. Viewing the analysis results
          1.  
            Analysis graph
          2.  
            Analysis results
        2. Recalculating the analysis results
          1.  
            Applying different parameters to the existing sample of data
          2.  
            Performing What-if analysis
        3.  
          Recording and viewing the results
    6. Sizing the SRL
      1.  
        Overview
      2.  
        Peak usage constraint
      3.  
        Synchronization period constraint
      4.  
        Secondary backup constraint
      5.  
        Secondary downtime constraint
      6. Additional factors
        1.  
          Example

Creating a Replicated Data Set (RDS)

You can create the Replicated Data Set (RDS) in the following way.

To create the replicated data set

  1. In the tree in the left pane, right-click the Replication Network node and select Setup Replicated Data Set.
  2. Read the information about the Welcome panel and click Next.
  3. Complete the Enter names for the Replicated Data Set and Replicated Volume Group panel as follows:

    Replicated Data Set name

    Enter a name for the RDS.

    Replicated Volume Group name

    Enter a name for the RVG. The same name is used for the Primary and Secondary RVG.

    Primary Host

    By default the local host is selected. To specify a different host name, make sure that the required host is connected to the VEA console and select it in the Primary Host list. If the required host is not connected to the VEA, it does not appear in the list. In that case, use the VEA console to connect to the host.

    Click Next.

  4. Select the dynamic disk group and volumes to be replicated as follows.

    Dynamic Disk Group

    Select the appropriate dynamic disk group from the list. Multiple disk groups cannot be added in an RDS.

    Select Volumes

    Choose the required data volumes from the table by selecting the check boxes for the volumes. To select all the volumes, select the check box in the top left corner of the Select Volumes table.

    To select multiple volumes, press the Shift or Control key while using the Up or Down arrow key.

    By default, adds DCM logs with mirrored plexes for all selected volumes. If the disk space is inadequate for creating a DCM with mirrored plexes, a single plex is created.

    Click Next.

  5. Complete the Select or create a volume for Replicator Log panel by choosing one of the following:
    • To select an existing volume, select the volume in the table and click Next.

    • If you have not created a volume for the Replicator Log or want to create a new one, click Create Volume. Complete the information about the Create Volume dialog box as follows:

      Name

      Enter a name for the volume.

      Size

      Enter a size for the volume.

      Layout

      Select the appropriate volume layout.

      Disks Selection

      If you want Volume Replicator to select the disks for the Replicator Log, choose Select disks automatically.

      If you want to choose specific disks from the Available disks pane for the Replicator Log, choose Select disks manually. Either double-click on the disks or click Add to move the disks into the Selected disks pane.

      Click OK. The volume is created and displayed in the Replicator Log panel. Click Next. The summary panel appears.

  6. Review the information on the summary panel. Click Back if you want to change any information.

    Click Create Primary RVG to create the RVG.

  7. After the Primary RVG has been created successfully, Volume Replicator displays the following message:
    RDS with Primary RVG has been created successfully. Do you want
     to add Secondary host to this RDS for replication now?
  8. On the Specify Secondary host for replication panel, enter the name or IP address of the Secondary host. Click Next. If the Secondary host is not connected to VEA, the wizard tries to connect it when you click Next. Wait till the connection process is complete and then click Next again.

    • If the disk group with the required data volumes and the Replicator Log volume as on the Primary host does not exist on the Secondary, Volume Replicator displays a message. Read the message carefully.

      • The option to automatically create the disk group and the associated volumes on the Secondary host is available only if the required number of disks of the same type, having the same or a larger amount of space as on the Primary, are available on the Secondary. Otherwise, the wizard enables you to create the disk group and the volumes manually.

      • Click Yes to automatically create the disk group, data volumes, and Replicator Log. Any available disks are automatically chosen for creating the disk group on the Secondary host.

      • Click No to manually create the disk group, data volumes, and Replicator Log. Complete the Create Dynamic Disk Group on Secondary host panel. If the dynamic disk group as on the Primary has already been created on the Secondary, then this panel does not appear.

        Complete the information on this panel as follows:

        Create cluster group

        Choose this option only if you need to create clustered disk groups. Select the required disks from the Available disks pane. Either double-click on the disks or click Add to move the disks into the Selected disks pane. To select all the available disks, choose the Add All option.

        Create Dynamic Disk Group

        Click Create Dynamic Disk Group to proceed with creating the disk group. A disk group with the same name as that on the Primary is created.

        After the disk group has been created, click Next. The Volume Information on connected hosts panel appears.

        Complete this panel as described in step 9.

    • If a disk group, without any data volumes or Replicator Log, as on the Primary host exists on the Secondary, Volume Replicator displays a message. Read the message carefully.

      • The option to automatically create the volumes on the Secondary host is available only as follows: If the disks that are part of the disk group have the same or a larger amount of space as on the Primary and enough space to create volumes with the same layout as on the Primary. Otherwise, the wizard enables you to create the required volumes manually.

      • Click Yes to automatically create the data volumes and the Replicator Log.

        After the configuration has been automatically created on the Secondary, proceed to step 10.

      • Click No to create the data volumes and the Replicator Log manually, using the Volume Information on connected hosts panel.

  9. The Volume Information on connected hosts panel displays information about the availability of volumes on the Secondary nodes, if the Primary and Secondary hosts are connected to the VEA.

    This panel does not appear if all the required volumes that are available on the Primary host are also available on the Secondary hosts.

    If the required data volumes or the Replicator Log volume have not been created on the Secondary host, the panel displays the appropriate message against the volume name on the Secondary. Create the required volumes as follows:

    • For each required volume that is not created, click Create Volume.

    • The Create Volume dialog verifies the information about the Primary host and displays the volume name and the size.

      Complete the information on this panel as follows:

      Name

      Displays the name that is specified for the Primary volume.

      Size

      Displays the size that is specified for the primary volume.

      Layout

      Lets you specify the volume layout. Select the appropriate volume layout depending on your requirement.

      Disks Selection

      Enables you to specify the disk selection method.

      Select the Select disks automatically option if you want Volume Replicator to select the disks.

      Select the Select disks manually option to use specific disks from the Available disks pane for creating the volume. Either double-click on it or select Add to move the disks into the Selected disks pane.

      Click OK to create the required volume.

    • Repeat the steps for each of the data volumes and Replicator Log that has not been created.

    • After all volumes are created, the volume information panel is updated. Click Next.

    If the required volumes are created but are not eligible for replication, the reason for non-eligibility is indicated against the volume name.

    The Volume Information on connected hosts panel enables the appropriate option to convert a non-eligible volume to a Volume Replicator acceptable format.

    Complete the information on this panel as follows:

    Recreate Volume

    This option is enabled if the required data volume is available on the Secondary, but is of a size greater than the Primary volume.

    Clicking this option displays a message that prompts you to confirm that you want to recreate the volume.

    Warning:

    This operation first deletes the volume resulting in loss of the data that already exists on the volumes.

    Choose Yes to recreate the volume using the Create Volume dialog.

    Remove DRL

    This option is enabled if the required data volume is available on the Secondary but has a DRL. Clicking this option displays a message that prompts you to confirm that you want to remove the log. Click Yes to confirm the removal of DRL.

    Remove DCM

    This option is enabled if the required Replicator Log volume is available on the Secondary but has a DCM log. Clicking this option displays a message that prompts you to confirm if you want to remove the log. Click Yes to confirm the removal of the DCM log.

    Expand Volume

    This option is enabled if the required data volume is available on the Secondary but is of a smaller size than the Primary volume. Clicking this option displays a message that prompts you to confirm that you want to grow the volume.

    Click Yes to grow the volume to the required size.

    After you have converted the non-eligible volumes to a Volume Replicator acceptable format, click Next.

    If the volume on the Secondary is already a part of another RDS, the wizard does not let you proceed. If you want to use the same volume, you must either remove the corresponding Primary volume from the Primary RVG or delete the other RDS.

  10. Complete the Edit replication settings panel to specify basic and advanced replication settings for a Secondary host as follows:
    • To modify the default values for the basic settings, select the required value from the drop-down list for each property, as follows:

      Primary side IP

      Displays the IP address on the Primary that is to be used for replication. If there is more than one IP address available for replication, you can choose the one that you want to use from the drop-down list. If the required IP address is not displayed in the list, edit the field to add the IP address.

      Secondary Side IP

      Displays the IP address on the Secondary that is to be used for replication, if the Secondary is connected to VEA. If there is more than one IP address available for replication, you can choose the one that you want to use from the drop-down list. If the required IP address is not displayed in the list, edit the field to add the IP address.

      Replication Mode

      Select the required mode of replication; Synchronous, Asynchronous, or Synchronous Override. The default is synchronous override.

      Note:

      If the Secondary is set to the synchronous mode of replication and is disconnected, the Primary data volumes with NTFS or ReFS file systems may be displayed as MISSING.

      Replicator Log Protection

      The AutoDCM is the default mode for the Replicator Log overflow protection when all the volumes in the Primary RVG have a DCM log. The DCM is enabled when the Replicator Log overflows.

      The DCM option enables the Replicator Log protection for the Secondary host when the Replicator Log overflows, and the connection between the Primary and Secondary is lost. This option is available only if all the data volumes under the Primary RVG have a DCM Log associated with them.

      The Off option disables Replicator Log Overflow protection.

      In the case of the Bunker node. Replicator Log protection is set to Off, by default. Thus, if the Primary RLINK overflows due to the Bunker RLINK, then this RLINK is detached.

      The Override option enables log protection. If the Secondary node is still connected and the Replicator Log is about to overflow, the writes are stalled until 5% or 20 MB of space (whichever is lesser) becomes available in the Replicator Log.

      If the Secondary becomes inactive due to disconnection or administrative action then Replicator Log protection is disabled, and the Replicator Log overflows.

      The Fail option enables log protection. If the log is about to overflow the writes are stalled until 5% or 20 MB of space (whichever is lesser) becomes available in the Replicator Log. If the connection between Primary and Secondary RVG is broken, then, any new writes to the Primary RVG are failed.

      Primary RLINK Name

      This option enables you to specify a Primary RLINK name of your choice. If you do not specify any name, Volume Replicator assigns a default name.

      Secondary RLINK Name

      This option enables you to specify a Secondary RLINK name of your choice. If you do not specify any name, Volume Replicator assigns a default name.

    • To proceed without modifying the advanced replication settings, click Next. The Start Replication panel appears.

      Proceed to step 11.

    • To specify advanced replication settings, click Advanced.

      Complete the Advanced Replication Settings panel as follows:

      Latency Protection

      By default, latency protection is set to Off. When this option is selected the High Mark Value and the Low Mark Value are disabled. Select the Fail or Override option to enable Latency protection.

      The Override option behaves like the Off option when the Secondary is disconnected and behaves like the Fail option when the Secondary is connected.

      High Mark Value

      This option is enabled only when Latency Protection is set to Override or Fail. It specifies the maximum number of pending updates by which the Secondary can be behind the Primary. The default value is 10000, but you can specify the required limit.

      To ensure that latency protection is most effective the difference between the high and low mark values must not be very large.

      Low Mark Value

      This option is enabled only when Latency Protection is set to Override or Fail. When the updates in the Replicator Log reach the High Mark Value, then the writes to the Primary continue to be stalled until the number of pending updates on the Replicator Log falls back to the Low Mark Value. The default value is 9950, but you can specify the required limit.

      Protocol

      UDP/IP is the default replication protocol. Choose TCP/IP or UDP/IP for a regular Secondary. If the storage on the Bunker Secondary is directly accessible from the Primary use the STORAGE protocol, otherwise use TCP/IP or UDP/IP.

      Note:

      If the replication protocol for the Bunker Secondary has been set to STORAGE, you can change it only by deleting and recreating the Bunker with the required protocol; UDP/IP or TCP/IP. You cannot change the STORAGE protocol using the Change Replication Settings option.

      Packet Size(Bytes)

      Default is 1400. Choose the required packet size for data transfer from the drop-down list. The default unit for the packet size is Bytes. You can set the packet size only if the protocol is UDP/IP.

      Some firewalls do not support packet sizes greater than 1400 bytes. To replicate across such a firewall, use the default packet size to make sure all the Volume Replicator operations function as required. You can also set the packet size to 1300 by selecting from the list. The minimum packet size that you can specify is 1100 bytes.

      Note:

      If you need to set a value for packet size different from the value that is provided in the list, use the command line interface.

      Bandwidth

      By default, Volume Replicator uses the maximum available bandwidth.

      To control the bandwidth thatVolume Replicator uses for replication, choose Specify Limit, and then specify the bandwidth limit in the field provided. The default unit is Megabits per second (Mbps) and the minimum allowed value is 1 Mbps.

      Enable Compression

      Enable this option if you want to enable compression for the Secondary host.

      After completing the Advanced Replication Settings panel, click OK. The wizard returns to the Edit Replication Settings panel. Click Next. The Start Replication panel appears.

  11. Choose the appropriate option from the Start Replication panel as follows:
    • To add the Secondary and start replication immediately, select the Start Replication with one of the following options:

      Synchronize Automatically

      For an initial setup, use this option to synchronize the Secondary and start the replication. This setting is the default.

      When this option is selected, Volume Replicator by default performs intelligent synchronization to replicate only those blocks on a volume that the file system uses. If required, you can disable intelligent synchronization.

      Note:

      Intelligent synchronization is applicable only to volumes with the NTFS and ReFS file systems and not to raw volumes or volumes with FAT file systems.

      Synchronize from Checkpoint

      If you want to use this method, then you must first create a checkpoint.

      If the Primary data volumes have a considerable amount of data, you may first want to synchronize the Secondary for existing data using the backup-restore method with checkpoint. After the restore is complete, use the Synchronize from Checkpoint option to start replication from checkpoint; this operation synchronizes the Secondary with the writes that happened when backup-restore was in progress.

    • To add the Secondary without starting replication, deselect the Start Replication option. You can start replication later by using the Start Replication option from the Secondary RVG right-click menu.

      Click Next to display the Summary panel.

  12. Review the information on the Summary panel.

    Click Back to change any information you had specified or click Finish to add the Secondary to the RDS and exit the wizard.