Protected storage groups, Mirror type, Enable compression – HP Storage Mirroring V5 Software User Manual
Page 35
![background image](/manuals/396978/35/background.png)
HP StorageWorks Storage Mirroring Application Manager user’s guide
25
In a cluster, the route should be set to the name of the Exchange virtual server (EVS) dependent IP.
Protected storage groups
The Protected storage groups area displays the storage groups, mailbox, and public folder stores.
Select the Exchange storage groups that you want to protect. By selecting individual storage groups to protect,
you can reduce the amount of data being replicated and filter out storage groups that do not need to be
protected or failed over. Only the users associated with the selected storage groups will be failed over. By
default, all storage groups are selected for an Exchange source.
The replication set that the Application Manager generates will include the directories and files needed to
protect the selected storage groups. It is recommended that you protect all storage groups.
NOTE:
If you do not select all storage groups, you should make sure that other backups are available from
which to recover the storage groups that are not failed over.
Hewlett-Packard recommends that you place all query-based distribution groups in a single organization
container and give the target server full control rights to the container and all child objects.
You can also select non-application specific data under the Volumes folder.
NOTE:
If
Override Generated Rules
is selected on the
Advanced
tab, this control will be disabled.
To refresh the tree view to show new source directories or files that may have been added or removed, select
the logical node, then click the
Refresh
button. If a node in the volumes branch is selected, then the items under
that node will be refreshed.
Mirror type
The following options specify what files you want sent from the source to the target during a mirror:
•
Full
—Copies all of the directories and files in the replication set to the target machine. If a mirror has
already been completed, another full mirror will overwrite the data on the target.
•
Checksum
—
(Default)
This option compares the date, time, and size, and for those files that are different, a
checksum calculation comparison is performed. A checksum calculation is a formula applied to blocks of
data to determine if the binary make-up of the block is identical. If the checksums on the source and target
machine are the same, the block is skipped. If the checksums on the source and target machine are not the
same, the block on the source is sent to the target. With this option, the entire file is not overwritten; only the
block that is received from the source is overwritten.
NOTE:
The
Mirror type
setting also applies to the restoration connection.
Enable compression
This setting enables compression of data that is transmitted from the source to the target. Significant
improvements in bandwidth utilization have been seen in Wide Area Network (WAN) configurations, or in
any case where network bandwidth is a constraint.
Compression may be used in Local Area Network (LAN) configurations, though it may not provide any
significant network improvements.
You can specify compression for different source/target connections, but all connections to the same target will
have the same compression settings.
By default, compression is disabled. To enable it, select
Enable Compression
, then set the level from minimum to
maximum compression.