beautypg.com

HP Storage Mirroring V5.1 Software User Manual

Page 40

background image

4 - 2

Replication sets contain error checking to avoid inadvertent overwrites of the replication set

rules. When replication sets are modified, a generation number is associated with the

modifications. The generation number is incremented anytime the modifications are saved,

but the save is not allowed if there is a mismatch between the generation number on the

source and the Management Console. You will be notified that the replication set could not be

saved. This error checking safeguards the replication set data in the event that more than one

client machine is accessing the source’s replication sets.

Storage Mirroring will not replicate the same data from two different replication sets on your

source. The data will only be replicated from one of the replication sets. If you need to

replicate the same data more than once, connect the same replication set to multiple targets.

If you rename the root folder of a connected replication set, Storage Mirroring interprets this

operation as a move from inside the replication set to outside the replication set. Therefore,

since all of the files under that directory have been moved outside the replication set and are

no longer a part of the replication set, those files will be deleted from the target copy of the

replication set. This, in essence, will delete all of your replicated data from the target. If you

have to rename the root directory of your replication set, make sure that the replication set

is not connected.

When creating replication sets, keep in mind that when recursive rules have the same type

(include or exclude) and have the same root path, the top level recursive rule will take

precedence over lower level non-recursive rules. For example, if you have c:\data included

recursively and c:\data\logs included nonrecursively, the top level rule, c:\data, will take

precedence and the rule c:\data\logs will be discarded. If the rules are different types (for

example, c:\data is included and c:\data\logs is excluded), both rules will be applied as

specified.

Including and excluding files

Do not exclude Microsoft Office temporary files from your replication set. When a user opens

a Microsoft Office file, a temporary copy of the file is opened. When the user closes the file,

the temporary file is renamed to the original file and the original file is deleted. Storage

Mirroring needs to replicate both the rename and the delete. If you have excluded the

temporary files from your replication set, the rename operation will not be replicated, but the

delete operation will be replicated. Therefore, you will have missing files on your target.

When Microsoft SQL Server databases are being replicated, you should always include the

tempdb files, unless you can determine that they are not being used by any application. Some

applications, such as PeopleSoft and BizTalk

®

, write data to the tempdb file. You can, most

likely, exclude temporary databases for other database applications, but you should consult

the product documentation or other support resources before doing so.

Some applications create temporary files that are used to store information that may not be

necessary to replicate. If user profiles and home directories are stored on a server and

replicated, this could result in a significant amount of unnecessary data replication on large

file servers. Additionally, the \Local Settings\Temporary Internet Files directory can easily

reach a few thousand files and dozens of megabytes. When this is multiplied by a hundred

users it can quickly add up to several gigabytes of data that do not need to be replicated.

Creating replication sets that only contain one file may cause unexpected results. If you need

to replicate just one file, add a second file to the replication set to ensure the data is replicated

to the correct location. (The second file can be a zero byte file if desired.)

Backups

Storage Mirroring does not replicate the last access time if it is the only thing that has

changed. Therefore, if you are performing incremental or differential backups on your target

machine, you need to make sure that your backup software is using an appropriate flag to

identify what files have been updated since the last backup. You may want to use the last

modified date on the file rather than the date of the last backup.

Virus protection

Virus protection software on the target should not scan replicated data. If the data is protected

on the source, operations that clean, delete, or quarantine infected files will be replicated to

the target by Storage Mirroring. If the replicated data on the target must be scanned for

viruses, configure the virus protection software on both the source and target to delete or

quarantine infected files to a different directory that is not in the replication set. If the virus

software denies access to the file because it is infected, Storage Mirroring will continually

attempt to commit operations to that file until it is successful, and will not commit any other

data until it can write to that file.

This manual is related to the following products: