beautypg.com

HP Storage Mirroring Software User Manual

Page 3

background image

Table of Contents

Introducing Storage Mirroring for Virtual Infrastructure ..................... 2

Requirements .......................................................................................................... 3

Related documentation ............................................................................................. 3

Install Storage Mirroring for Virtual Infrastructure ............................. 4
Getting Started with Storage Mirroring for Virtual Infrastructure ........ 5

Configure your VMware ESX server to use a root account .............................................. 5

Configure your VMware ESX server to use a non-root account ........................................ 5

Configure the SCP timeout ........................................................................................ 6

Configure the VirtualCenter operation timeout ............................................................. 6

Navigate the Storage Mirroring for Virtual Infrastructure interface .................................. 6

Using the menus ................................................................................................. 6

Using the left pane navigation list ......................................................................... 7

Find out more information about tasks ........................................................................ 7

Start Storage Mirroring for Virtual Infrastructure .......................................................... 7

Connect to the Administrative Servers ................................................. 8

Connect to the SMVI server ....................................................................................... 8

Connect to the VirtualCenter server ............................................................................ 9

Log off administrative servers .................................................................................. 10

Manage activation codes ......................................................................................... 10

Set up the E-mail Server .................................................................... 11
Manage ESX Servers .......................................................................... 12

Add an ESX server ................................................................................................. 12

Configure an ESX server ......................................................................................... 13

Set up Protection for a Virtual Machine .............................................. 14

Select the source virtual machine ............................................................................. 14

Select the source virtual machine without VirtualCenter ......................................... 16

Select the target physical machine ........................................................................... 17

Select the target physical machine without VirtualCenter ........................................ 19

Select a data store on the target server .................................................................... 19

Edit replica virtual machine ..................................................................................... 20

Modify protection settings ....................................................................................... 22

Schedule protection start time ............................................................................ 23

Change protection set name ............................................................................... 23

Set data transmission options ............................................................................. 24

Set e-mail notification options ............................................................................ 26

Change VirtualCenter credentials ........................................................................ 27

Change restart and threshold options .................................................................. 28

Save protection settings ......................................................................................... 29

Monitor your Protected Virtual Machines ........................................... 31

Understanding failover and job reversal .................................................................... 33

Failover and reversal scenarios ................................................................................ 33

Failover after a problem is encountered on the source ........................................... 33

Perform a failover test to verify the quality of the backup data without

disrupting clients .............................................................................................. 34

Pre-Staging Data on the Target ......................................................... 35

This manual is related to the following products: