beautypg.com

Pre-staging .vmdk data on the target – HP Storage Mirroring Software User Manual

Page 298

background image

296 of 739

b. MB—Enter the number of megabytes remaining that should trigger the

protection to stop.

3. When you are finished, click Save.

Saving protection settings

Review the protection settings on the Protection summary page.

If the settings are acceptable, click Finish to save your protection settings.

After your protection has been configured, you will be able to monitor the protection
status of your virtual machine(s). See

Monitoring protected virtual machines

.

Note:

While using Storage Mirroring Recover for Virtual Infrastructure, you should not
attempt to manually create or delete snapshots on the protected virtual
machine. Doing so will disrupt the protection of the virtual machine and may
generate unpredictable results on the source and target virtual machines.

Next step:

Monitoring protected virtual machines

Pre-staging .VMDK data on the target

Storage Mirroring Recover for Virtual Infrastructure supports the ability to pre-stage
source virtual machine .vmdk files on the target ESX host. Pre-staging means that you
will use some other means to copy the .vmdk files to the target. After the protection job
starts, the pre-staged .vmdk files will be used to perform a file difference mirror, rather
than performing a full sync of the files. This is useful if you need to protect virtual
machines with large virtual disks without taking up a large amount of network bandwidth
between the source and target ESX hosts.

To pre-stage .vmdk files, complete the following tasks:

1. Verify that the source virtual machine that you intend to protect has at least one

active snapshot. This will unlock the .vmdk files for the virtual machine, allowing
them to be copied.

2. If you have not done so already,

launch the Storage Mirroring Recover for Virtual

Infrastructure console

.

3. Create a protection job in Storage Mirroring Recover for Virtual Infrastructure with a

delayed protection start time. Be sure to allow enough time to complete pre-staging
the data (with large files, this step can sometimes take hours).

4. On the Protection Summary page for the protection job, click on the View replica

virtual machine disk mapping link. This will open a text file that will show the
source-to-target mappings for each of the protected virtual machine’s .vmdk files.