Chapter 5 protecting a sql server -1 – HP Storage Mirroring V4.5 Software User Manual

Page 4

Advertising
background image

ii

Connection settings ......................................................................... 3-13

Route................................................................................................................. 3-13

Protected Storage Groups ..................................................................................... 3-13

Mirror type ......................................................................................................... 3-14

Enable compression ............................................................................................. 3-14

Advanced settings ........................................................................... 3-14

Replication set rules ............................................................................................. 3-15

Failover/failback scripts ........................................................................................ 3-16

Force AD replication ............................................................................................. 3-17

Target(ed) domain controller................................................................................. 3-17

Advanced settings................................................................................................ 3-18

Saving configuration changes.......................................................... 3-19

Chapter 4 Protecting an Exchange Cluster with a
Like-Named Cluster ...............................................................4-1

Prerequisites ..................................................................................... 4-1
Permissions ....................................................................................... 4-1
Multiple EVS ...................................................................................... 4-1
Configuring a standby cluster ............................................................ 4-2
Enabling protection ........................................................................... 4-5
Dealing with a failure ........................................................................ 4-6

Graceful failover .................................................................................................... 4-6

Site failure failover................................................................................................. 4-6

Differences in failback ............................................................................................ 4-6

Chapter 5 Protecting a SQL Server.........................................5-1

Select a task ...................................................................................... 5-1
Select a domain ................................................................................. 5-2
Select source and target servers ....................................................... 5-3

Add or manage servers........................................................................................... 5-4

Enter server login information ................................................................................. 5-5

Using clustered SQL servers .................................................................................... 5-5

Configure protection settings ............................................................ 5-5
Select SQL instances.......................................................................... 5-6
Failover settings ................................................................................ 5-6

Failover type ......................................................................................................... 5-7

Services ............................................................................................................... 5-9

Resources (cluster only) ....................................................................................... 5-10

Monitor settings .............................................................................. 5-11

Application Monitoring (BETA) ............................................................................... 5-12

Snapshot settings ............................................................................ 5-13
Connection settings ......................................................................... 5-14

Route................................................................................................................. 5-14

Protected Databases ............................................................................................ 5-14

Mirror type ......................................................................................................... 5-18

Enable compression ............................................................................................. 5-18

Advertising
This manual is related to the following products: