Failing back then restoring – HP Storage Mirroring Software User Manual

Page 543

Advertising
background image

541 of 739

created on the target during failover will need to be created manually on
the source.

15. On the source, change the IP address that you modified earlier to the unique

address back to its original address. You can also enable any other NICs on the
source.

16. Also on the source, change the source name back to its original name and reboot,

or restart the Workstation, Server, and any other services you were prompted to
stop.

17. Once the source is back online, users can reconnect to the source.
18. Confirm the Replication Console is communicating with the source using the

original IP address.

a. Right-click the source and select Remove.
b. Depending on your configuration, the source may be automatically inserted

back into the Replication Console. If it is not, select Insert, Server. Specify
the source server and click OK.

19. At this time, you can go back to the dialog box in the Failover Control Center.

Select Continue or Stop to indicate if you want to continue monitoring the source.
After you have selected whether or not to continue monitoring the source, the
source post-failback script, if configured, will be started.

Note:

The source must be online and Storage Mirroring Recover must be
running to ensure that the source post-failback script can be started. If the
source has not completed its boot process, the command to start the script
may be lost and the script will not be initiated.

20. You can now reconnect your original replication set on the source to your target, to

reestablish protection.

Failing back then restoring

Failback before restoration can be a simpler process, but it may require additional
downtime. The amount of downtime will depend on the amount of data to be restored.
Users must be kept off of the source and target during this entire process.

1. Resolve the problem(s) on the source that caused it to fail. Make sure in resolving

the problems, that you do not bring the source on the network at this time because
the target currently has the source’s identity because of failover.

2. Schedule a time for this process. Select a time that will have minimal disruption on

your users.

3. When you are ready, begin the failback process.

Advertising