beautypg.com

HP Storage Mirroring Software User Manual

Page 559

background image

557 of 739

11. Select Tools, Restoration Manager.
12. Complete the appropriate fields on the Restoration Manager.

Original Source—The source where the data originally resided.

Restore From—The target that contains the replicated data that users have
been updating.

Replication Set—The name of the replication set.

Restore To—The source where the data will be restored to.

13. Disable Only if backup copy is more recent. This option must be disabled

because if the services were stopped on the source after the time they were
stopped on the target, the source files will have a more recent date and time and
the target files will not be restored.

14. Identify the correct drive mappings for the data and

any other restoration options

necessary

.

15. On the Orphans tab, select to move or delete orphan files on the source.

Orphan files

, such as out-dated transaction logs, may keep the database from

starting on the source.

16. Verify that the selections you have made are correct and click Restore. The

restoration procedure time will vary depending on the amount of data that you have
to restore.
When the restoration process is complete, the restoration status information will no
longer appear in the right pane.

17. If you are performing a failback for an Exchange server, continue with

Rehoming

the Exchange objects to the source

to complete the restoration process.

18. Continue to

Re-enabling protection

to complete the restoration process.

Rehoming the Exchange objects to the source

After the restoration is complete, you will need to run the Exchange Failover utility
(exchfailover.exe) to rehome the informational store databases to the source. For more
information about using the Exchange Failover utility, see

Using the Exchange Failover

(EFO) Utility

.

1. From a command prompt on the source, run the post_restore_

name>_.bat file that Application Manager automatically
generated.

2. Restart any Outlook clients so that they can access the source.

To re-establish protection of the Exchange data on the source, create a replication set,
re-establish the Storge Mirroring connection to the target, and begin failure monitoring as
documented earlier in the procedure.