Changing file server cluster members, Changing resource groups on clustered file servers, See also – Dell PowerVault DP600 User Manual
Page 40
40
See Also
Performing File Server and Workstation Management Tasks
Performing General Maintenance on File Servers and Workstations
Changing File Server Cluster Members
When you make changes to a server cluster that is protected by DPM, DPM takes the following
actions:
• When a new server is added to a cluster, DPM issues an alert to install a protection agent on
the new cluster node and protection fails.
• When a server is removed from a cluster, DPM detects that a node has left the cluster and
the server now appears separate from the cluster with no data protected on it.
For example, assume you have a server cluster that contains four computers: Node1, Node2,
Node3, and Node4. You need to replace computer Node4 with a new computer, named Node5.
You use the administration console for your cluster service to add Node5 to the cluster and
configure the resources that can be failed over to Node5.
DPM issues an alert that protection of the server cluster will fail until a protection agent is installed
on Node5. You install the protection agent on Node5.
You fail over the resources from Node4 to other nodes in the cluster. When no resources remain
on Node4, you remove it from the cluster. DPM detects the failovers and continues protection of
the cluster.
DPM detects that Node4 has left the cluster—it appears as a stand-alone node now. If it no
longer exists on the network, you can remove the record for this server in DPM Administrator
Console.
See Also
Changing Resource Groups on Clustered File Servers
Performing File Server and Workstation Management Tasks
Performing General Maintenance on File Servers and Workstations
Changing Resource Groups on Clustered File Servers
A cluster node can have any number of resource groups. Moving a DPM protected data source to
a resource group, between resource groups, or out of a resource group can cause protection job
failures. To successfully make any of those changes to resource group membership, perform the
following steps:
1. Stop existing protection of the data source. The data source could belong to a protection
group as a single data source on a protected server or as a data source as a member of a
resource group.