HP Storage Mirroring Software User Manual
HP Storage
Table of contents
Document Outline
- HP StorageWorks Storage Mirroring Recover Users Guide
- Contents
- Storage Mirroring Recover overview
- Storage Mirroring Recover requirements
- Installation
- Storage Mirroring Console
- Workload protection
- Data protection
- Establishing a connection using the automated Connection Wizard
- Creating a replication set
- Establishing a connection manually using the Connection Manager
- Establishing a connection across a NAT or firewall
- Simulating a connection
- Data workload failover
- Server settings
- Identifying a server
- Licensing a server
- Configuring server startup options
- Configuring network communication properties for a server
- Queuing data
- Configuring source data processing options
- Configuring target data processing options
- Specifying the Storage Mirroring Recover database storage files
- Specifying file names for logging and statistics
- Supplying credentials for script processing
- E-mailing event messages
- Full-server protection
- Application protection
- Virtual server protection
- Protecting a physical or virtual server to a Hyper-V or ESX server
- Protecting a Hyper-V server to a Hyper-V server
- Protecting an ESX server to an ESX server
- Using firewalls with virtual workloads
- Cluster protection
- Special configurations
- Data protection
- Workload monitoring
- Data workloads
- Monitoring a full-server workload
- Monitoring an application workload
- Monitoring virtual workloads
- Monitoring a cluster workload
- Log files
- Monitoring event messages
- Statistics
- Performance Monitor
- SNMP
- Error codes
- Failover
- Failback and restore
- Connections
- Mirroring
- Replication
- Verification
- Data transmission
- Snapshots
- Recommended optimizations
- Security
- Evaluations
- Evaluating data protection
- Establishing a connection
- Monitoring the activity and completion of the initial mirror
- Changing data to cause replication
- Verifying the data changes on the target
- Testing your target data
- Configuring failover monitoring
- Monitoring failover
- Simulating a failure
- Simulating data changes after failover
- Initiating failback
- Restoring your data
- Evaluating full-server protection
- Evaluating data protection
- Index