beautypg.com

Protected storage groups, Mirror type, Enable compression – HP Storage Mirroring V5 Software User Manual

Page 35

background image

HP StorageWorks Storage Mirroring Application Manager user’s guide

25

In a cluster, the route should be set to the name of the Exchange virtual server (EVS) dependent IP.

Protected storage groups

The Protected storage groups area displays the storage groups, mailbox, and public folder stores.
Select the Exchange storage groups that you want to protect. By selecting individual storage groups to protect,

you can reduce the amount of data being replicated and filter out storage groups that do not need to be

protected or failed over. Only the users associated with the selected storage groups will be failed over. By

default, all storage groups are selected for an Exchange source.
The replication set that the Application Manager generates will include the directories and files needed to

protect the selected storage groups. It is recommended that you protect all storage groups.

NOTE:

If you do not select all storage groups, you should make sure that other backups are available from

which to recover the storage groups that are not failed over.

Hewlett-Packard recommends that you place all query-based distribution groups in a single organization

container and give the target server full control rights to the container and all child objects.

You can also select non-application specific data under the Volumes folder.

NOTE:

If

Override Generated Rules

is selected on the

Advanced

tab, this control will be disabled.

To refresh the tree view to show new source directories or files that may have been added or removed, select

the logical node, then click the

Refresh

button. If a node in the volumes branch is selected, then the items under

that node will be refreshed.

Mirror type

The following options specify what files you want sent from the source to the target during a mirror:

Full

—Copies all of the directories and files in the replication set to the target machine. If a mirror has

already been completed, another full mirror will overwrite the data on the target.

Checksum

(Default)

This option compares the date, time, and size, and for those files that are different, a

checksum calculation comparison is performed. A checksum calculation is a formula applied to blocks of

data to determine if the binary make-up of the block is identical. If the checksums on the source and target

machine are the same, the block is skipped. If the checksums on the source and target machine are not the

same, the block on the source is sent to the target. With this option, the entire file is not overwritten; only the

block that is received from the source is overwritten.

NOTE:

The

Mirror type

setting also applies to the restoration connection.

Enable compression

This setting enables compression of data that is transmitted from the source to the target. Significant

improvements in bandwidth utilization have been seen in Wide Area Network (WAN) configurations, or in

any case where network bandwidth is a constraint.
Compression may be used in Local Area Network (LAN) configurations, though it may not provide any

significant network improvements.
You can specify compression for different source/target connections, but all connections to the same target will

have the same compression settings.
By default, compression is disabled. To enable it, select

Enable Compression

, then set the level from minimum to

maximum compression.

This manual is related to the following products: