beautypg.com

Database only – HP Storage Mirroring V5 Software User Manual

Page 58

background image

48

Protecting a SQL Server

NOTE:

If you are protecting SQL named instances, both the source and target SQL Servers must have named

instances with the

exact

same name installed

prior

to configuring protection.

When using named instances, all named instances will appear in the

Protected Databases

area. You can either

de-select an entire instance, or select specific databases within each instance.

By default, the TcpPort on the source named instance will be different than the TcpPort on the target named

instance. However, the Application Manager will still be able to work and there is no need for any additional

configuration.

You can also select non-application specific data under the Volumes folder.

NOTE:

If

Override Generated Rules

is selected on the

Advanced

tab, this control will be disabled.

To refresh the tree view to show new source directories or files that may have been added or removed, select

the logical node, then click the

Refresh

button. If a node in the volumes branch is selected, then the items under

that node will be refreshed.

Database Only

The Database Only mode is intended for advanced users only.
Select

Database Only

protection mode to replicate

only

the

.mdf

,

.ldf

, and

.ndf

files to the target server. The

selected database(s) will be attached to the target SQL Server upon failover, allowing clients to access the

underlying data.
You can also select non-application specific data under the Volumes folder.

NOTE:

If

Override Generated Rules

is selected on the

Advanced

tab, this control will be disabled.

To refresh the tree view to show new source directories or files that may have been added or removed, select

the logical node, then click the

Refresh

button. If a node in the volumes branch is selected, then the items under

that node will be refreshed.
During the configuration and validation process, you will have the opportunity to transfer user logins and

permissions (both server and database-level) and certain SQL Server registry and configuration settings to the

target server. This will allow users to access the data associated with the selected database(s), but no other

server-level functionality will be transferred to the target server (including but not limited to Job Server

configuration, Full-Text service configuration, SQL Replication configuration, linked servers, remote servers,

backup devices).

This manual is related to the following products: