Database only – HP Storage Mirroring V5 Software User Manual
Page 58
48
Protecting a SQL Server
NOTE:
If you are protecting SQL named instances, both the source and target SQL Servers must have named
instances with the
exact
same name installed
prior
to configuring protection.
When using named instances, all named instances will appear in the
Protected Databases
area. You can either
de-select an entire instance, or select specific databases within each instance.
By default, the TcpPort on the source named instance will be different than the TcpPort on the target named
instance. However, the Application Manager will still be able to work and there is no need for any additional
configuration.
You can also select non-application specific data under the Volumes folder.
NOTE:
If
Override Generated Rules
is selected on the
Advanced
tab, this control will be disabled.
To refresh the tree view to show new source directories or files that may have been added or removed, select
the logical node, then click the
Refresh
button. If a node in the volumes branch is selected, then the items under
that node will be refreshed.
Database Only
The Database Only mode is intended for advanced users only.
Select
Database Only
protection mode to replicate
only
the
.mdf
,
.ldf
, and
.ndf
files to the target server. The
selected database(s) will be attached to the target SQL Server upon failover, allowing clients to access the
underlying data.
You can also select non-application specific data under the Volumes folder.
NOTE:
If
Override Generated Rules
is selected on the
Advanced
tab, this control will be disabled.
To refresh the tree view to show new source directories or files that may have been added or removed, select
the logical node, then click the
Refresh
button. If a node in the volumes branch is selected, then the items under
that node will be refreshed.
During the configuration and validation process, you will have the opportunity to transfer user logins and
permissions (both server and database-level) and certain SQL Server registry and configuration settings to the
target server. This will allow users to access the data associated with the selected database(s), but no other
server-level functionality will be transferred to the target server (including but not limited to Job Server
configuration, Full-Text service configuration, SQL Replication configuration, linked servers, remote servers,
backup devices).