not limited to, the implied warranties of merchantability and fitness for a particular purpose.
Hewlett-Packard shall not be liable for errors contained herein or for incidental or consequential
damages in connection with the furnishing, performance, or use of this material.
This document contains proprietary information, which is protected by copyright. No part of this
document may be photocopied, reproduced, or translated into another language without the prior
written consent of Hewlett-Packard. The information contained in this document is subject to change
without notice.
Microsoft®, Windows®, and Windows NT® are U.S. registered trademarks of Microsoft Corporation.
Hewlett-Packard Company shall not be liable for technical or editorial errors or omissions contained
herein. The information is provided "as is" without warranty of any kind and is subject to change
without notice. The warranties for Hewlett-Packard Company products are set forth in the express
limited warranty statements for such products. Nothing herein should be construed as constituting
an additional warranty.
HP StorageWorks Storage Mirroring Application Manager User’s Guide
Ninth Edition (March 2009)
Part Number: T2558-96322
Appendix F Using the DNS Failover (DFO) Utility ...................)-1
Appendix G Using the Exchange Failover (EFO) Utility.......... G-1
v
Introduction
This document describes how to use the Storage Mirroring
Application Manager to create and validate your application
configuration. The Application Manager lets you quickly configure
protection for an application without requiring you to have advanced
knowledge of either Storage Mirroring or your application. The Application Manager works by
gathering information about your source and target environments, then configuring Storage Mirroring
to protect the source.
About the Storage Mirroring Application Manager
The Application Manager is used to simplify the setup of standard Storage Mirroring connections. The
Application Manager discovers all servers running a designated application in your environment so
that you can determine which servers are not protected. It gathers information about the
environment from various sources (including Storage Mirroring, Active Directory
automatically configures Storage Mirroring to protect that environment. It also performs a “health
check” to make sure that your configuration is correct. This check not only helps to reduce
configuration errors, but it also simplifies the setup process.
Supported configurations
NOTE:Blackberry Server and Exchange cannot be protected on the same machine.
®
, and DNS) and
Exchange
Exchange 2003Exchange 2007
Source to target topology
One to oneYesYes
Many to oneNoNo
One to manyNoNo
Cascaded (chained)NoNo
Cluster support
Cluster to clusterYesMailbox role only
Cluster to standaloneYesMailbox role only
Standalone to clusterNoNo
Application configurations
2000/2003 front-end
server
2000/2003 back-end serverYesN/A
2007 consolidated rolesN/AMailbox role only
NoN/A
2007 distributed rolesN/AMailbox role only
Domain topology
Single forestYesYes
Multiple forestNoNo
1 - 1
Exchange 2003Exchange 2007
Parent/childYesYes
Child/childYesYes
NOTE:For Exchange 2007, in a consolidated role environment only the mailbox role is protected.
The Hub Transport and Client Access roles are not protected or failed over because they
are already installed on the target.
For Exchange 2007, replication and failover between a distributed role source
configuration to a consolidated role target configuration is permitted, provided that the
systems are configured as follows:
The source Mailbox Server role is installed on a standalone server or MSCS cluster
with the other roles residing on different servers.
The target configuration is a stand-alone server with the Mailbox, Hub Transport, and
Client Access roles installed.
In these configurations, Storage Mirroring will not replicate any data associated with the
Hub Transport/Client Access data; however, the target Hub Transport/Client Access roles
function properly when failing over the source Mailbox role, allowing necessary
operations to resume.
Using the Application Manager with Exchange in clustered
environments
The Application Manager can be used in the following cluster configurations with Exchange 2003:
Clustered source to standalone target
Multi-node cluster to another multi-node cluster
Multi-node cluster to a single-node cluster (requires GeoCluster
Single-node cluster to a multi-node cluster (requires GeoCluster PLUS)
®
PLUS)
NOTE:The Application Manager does not support configurations where Exchange and the
domain controller are on the same node of a cluster.
When using Exchange on a cluster, Exchange must be installed in its own uniquely named
group and not in the cluster group.
Like-named cluster support is only available for clusters running Exchange 2003. It is not
available for Exchange 2007.
SQL
SQL Server
2000
Source to target topology
One to oneYesYesYesYes
Many to oneDatabase mode
only
One to manyNoNoNoNo
Cascaded (chained)NoNoNoNo
Cluster support
Cluster to clusterNoYesYesNo
SQL Server
2005
Database mode
only
SQL Server
2008
Database mode
only
SQL Express
Database mode
only
1 - 2
SQL Server
2000
SQL Server
2005
SQL Server
2008
SQL Express
Cluster to
standalone
Standalone to
cluster
Application configurations
Named instanceYesYesYesYes
Database onlyYesYes (standalone
Domain topology
Single forestYesYesYesYes
Multiple forestNoNoNoNo
Parent/childYesYesYesYes
Child/childYesYesYesYes
NoNoNoNo
NoNoNoNo
only)
Yes (standalone
only)
Yes
Using the Application Manager with SQL in clustered
environments
The Application Manager can be used with SQL Server 2005 or SQL Server 2008 in a cluster-to-cluster
environment.
If you want to use SQL 2000 in a clustered environment, or if you have a cluster-to-standalone
configuration, refer to one of the following application notes, available from
http://www.hp.com/support
Guidelines for using Microsoft SQL Server 2000 with Storage Mirroring
Guidelines for using Microsoft SQL Server 2005 with Storage Mirroring
.
SharePoint
SQL 2000SQL 2005SQL 2008
Source to target topology
One to oneYesYesYes
Many to oneNoNoNo
One to manyNoNoNo
Cascaded (chained)NoNoNo
Cluster support
Cluster to clusterNoNoNo
Cluster to standaloneNoNoNo
Standalone to clusterNoNoNo
Application configurations
WSSYesYesYes
MOSS 2007YesYesYes
Domain topology
1 - 3
SQL 2000SQL 2005SQL 2008
Single forestYesYesYes
Multiple forestNoNoNo
Parent/childYesYesYes
Child/childYesYesYes
Application Manager for SharePoint supports only SQL instance mode protection. Database-only
protection mode is not available.
By default, Application Manager for SharePoint displays the Advanced options and automatically
selects to failover Server Name and Hostname (SPNs). These two options are required to make
SharePoint failover work correctly.
Application Manager for SharePoint does not support graceful/soft failover.
Only target web servers running a version of SharePoint that is identical to what is installed on
the source web front-end can be extended into the source SharePoint configuration.
The SharePoint Admin account used to install WSS 3 or MOSS 2007 on the source web front-end
is required to extend a target web server into the SharePoint configuration.
File server
Windows 2003Windows 2008
Source to target topology
One to oneYesYes
Many to oneNoNo
One to manyNoNo
Cascaded (chained)NoNo
Cluster support
Cluster to clusterNoNo
Cluster to standaloneNoNo
Standalone to clusterNoNo
Domain topology
Single forestYesYes
Multiple forestNoNo
Parent/childNoNo
Child/childYes, as long as the
child domain has a
DNS server. If the
DNS server resides
in the parent
domain, then
validation will fail.
Yes, as long as the
child domain has a
DNS server. If the
DNS server resides
in the parent
domain, then
validation will fail.
Application Manager for file severs does not support graceful/soft failover.
1 - 4
BlackBerry
The Application Manager can be used to configure Storage Mirroring to provide high availability for
BlackBerry Enterprise Server using a Microsoft SQL Server database back end. This allows a
secondary server to assume the identity and role of a failed server while maintaining the availability
of BlackBerry Enterprise Server and/or SQL Server services with minimal disruption or data loss.
All versions
Consolidated to consolidatedSupported
Distributed to distributed Not supported
Distributed to consolidated Not supported
Requirements
The Application Manager will run from any client (or server) on any Microsoft® Windows® operating
system that has access to the domain in which the servers are located.
NOTE:Storage Mirroring Application Manager should be run on a machine that is not a domain
controller. Hewlett-Packard recommends that you run Application Manager from either a
third “administrative” client that is running a supported operating system or from the
Storage Mirroring target.
If you attempt to run Application Manager on a domain controller, the following errors
may occur:
Application Manager could not verify credentials when connecting to the server
x.x.x.x. Due to technical restrictions, credentials cannot be verified when used to
connect to a local machine.
GetWbemScope: Attempting connection to WBEM server (using specified
The Application Manager requires the following minimum system configuration:
Two servers that meet one of the following operating system requirements:
Microsoft Windows 2003 with Service Pack 1 or later
Microsoft Windows XP with Service Pack 2 or later
Microsoft Windows Vista
Microsoft Windows 2008
NOTE:Windows 2008 Server Core installation option is not supported.
Microsoft Windows 2008 can only be used with the following application versions:
Exchange 2007
SQL 2005 and SQL 2008
File Server
SharePoint
Two licensed copies of Storage Mirroring with the most recent Windows Server 2008 feature pack
NOTE:Storage Mirroring must be installed and running on the source and target servers. If
the Storage Mirroring service is not installed or not running on source or target server,
an error will appear.
1 - 5
A copy of the most recent version of the Storage Mirroring Application Manager
NOTE:The version of Storage Mirroring and Storage Mirroring Application Manager must be
the same.
See the Hewlett-Packard support website to obtain the most recent version of the
Application Manager.
.NET Framework version 3.5 with service pack 1 or later. If you do not have .NET Framework
version 3.5 SP 1 installed, Application Manager will prompt you to install it
Microsoft Installer version 3.0 or later (as required by the .NET Framework version 3.5 SP 1)
An active internet connection (required only during the Application Manager installation to
download the Microsoft Admin Pack, .NET Framework, and/or SQL Server 2005 Backward
Compatibility components containing the SQLDMO libraries)
NOTE:Alternatively, these packages are available on the Hewlett-Packard support website
and can be downloaded to a different server, from which you can use an internal file
share or removable media to copy the files to the Application Manager client.
If you are using the Target Data Verification feature, you will need to install the Volume Shadow
Copy Service SDK (Vshadow.exe) in the windows\system32 directory on the target server.
This tool is available for download from the Windows Download Center on the Microsoft website
(www.microsoft.com).
The target must have drive letters that match the drive letters where the protected application
stores data
Application Manager does not support single-label DNS domain names (that is, domain names
that do not include a suffix such as
The program files for your application must be installed in the same location on the target and
.com, .corp, .net, and so on)
the source
In addition, your environment must adhere to requirements specific to the application you are
protecting. For additional requirements, see:
Exchange requirements on page 1-6
SQL requirements on page 1-7
File server requirements on page 1-8
SharePoint requirements on page 1-8
BlackBerry requirements on page 1-9
Exchange requirements
If you are using the Application Manager for Exchange, your system must meet the following
requirements.
Two licensed copies of Microsoft Exchange Server that meet one of the following requirements:
Exchange Server 2003
1 - 6
Exchange 2007
NOTE:
Hewlett-Packard recommends that the Exchange version be the same as the
operating system version (for example, Windows Server 2003 running Exchange
2003).
Only Exchange 2007 is supported with Windows Server 2008.
The source and target servers must both be running a Microsoft-supported
operating system/Exchange combination.
Both source and target Exchange versions must be identical.
To perform target data verification, you must be using Exchange 2003 with service
pack 1 or later.
For Exchange 2007, Application Manager may be run on a workstation, provided
that the Exchange 2007 Management Tools are installed prior to installing the
Application Manager.
To use the Application Manager for Exchange, Storage Mirroring must be running under the
localsystem account.
The client or server that is running the Application Manager must have access to the domain in
which the Exchange servers are located.
The source and target Exchange servers must be in the same root forest domain.
The source and target servers must be part of the same Exchange Administrative Group.
The target Exchange server cannot be a domain controller.
The Exchange configurations on the source and target servers must be identical for the following
components:
Storage groups
Location of storage groups (log and data files)
Log file prefixes
Database locations (log and data files)
Message Transfer Agent (MTA) location
Queue paths
NOTE:This requirement does not apply to like-named clusters.
In a parent\child domain, at least one domain controller in the child domain must designated as
a global catalog server.
The Application Manager does not support configurations where Exchange and the domain
controller are on the same node of a cluster.
While installing Exchange Server 2003 on a domain controller is a supported operation, it is not
generally recommended. Hewlett-Packard also does not recommend this configuration. If you
must use Exchange Server2003 on a domain controller, review the following Microsoft Knowledge
Base articles:
If you are using the Application Manager for SQL, your system must meet the following requirements.
Two licensed copies of Microsoft SQL Server that meet one of the following requirements:
SQL Server 2000 with Service Pack 4 or later
1 - 7
SQL Server 2005
SQL Server 2008
SQL Sever Express
NOTE:
If you are using SQL Server, you will be prompted to download and install the
Microsoft SQL Server 2005 backward compatibility components. This package
includes the SQLDMO library, which is required to run the Application Manager.
You should use the same version and service pack of SQL Server on both the
source and target servers. Exceptions would be that in Database Only protection
mode you may use a newer version of SQL Server on the target server or have a
32-bit source and a 64-bit target to perform a failover (for instance, when using
Application Manager to facilitate a migration from SQL Server 2000 on the source
to SQL Server 2005 on the target, or to migrate data from a 32-bit source to a
64-bit target). You cannot failback when using different versions of SQL Server
on the source and target.
To enable the Application Manager to work with MSDE (SQL Express 2000) and SQL Server 2005
Express, Named Pipes and TCP/IP need to be added to the Enabled Protocols. By default, these
are disabled. They must be enabled to accept remote connections.
For MSDE, you must run the svrnetcn.exe command, which is located in the C:\Program
For SQL Server 2005 Express, you must launch the SQL Server Configuration Manager,
expand SQL Server 2005 Network Configuration, and for Protocols for MSSQLSERVER
enable Named Pipes and TCP/IP.
To use the Application Manager for SQL, the user logged on to Windows must be a member of
the SQL Server sysadmin role on the source and target servers.
The source and target SQL servers must be in the same domain; otherwise, the SQL Server
service on both the source and target servers must be configured to start with the same domain
user account.
In order to protect SQL named instances, both the source and target SQL Servers must have
named instances with the exact same name installed prior to configuring protection.
File server requirements
If you are using the Application Manager for file servers, your system must meet the following
requirement.
Two licensed copies of Storage Mirroring 5.0 with the latest service pack
NOTE:
Hewlett-Packard strongly recommends that the target server be a dedicated
standby server which does not host any critical applications. During failback for file
servers, the Server service is re-started, which could also re-start any dependent
services.
File server protection is currently only supported in a flat domain.
SharePoint requirements
If you are using the Application Manager for SharePoint, your system must meet the following
requirements.
Windows SharePoint Services (WSS) version 3
NOTE:WSS 3.0 service pack 1 is required for Windows 2008.
Microsoft Office SharePoint Server (MOSS) 2007
NOTE:MOSS 2007 service pack 1 is required for Windows 2008.
1 - 8
SQL Server 2000, SQL Server 2005, or SQL Server 2008 back-end
NOTE:SharePoint protection is currently only supported in a flat domain.
Windows Firewall—You will need to open port 6350 for Sharepoint communication.
BlackBerry requirements
If you are using the Application Manager for BlackBerry, your system must meet the following
requirements.
Licensed copies of Microsoft SQL Server that meet one of the following requirements:
SQL Server 2000 with Service Pack 4 or later
SQL Server 2005
SQL Express
NOTE:
If you are using SQL Server, you will be prompted to download and install the
Microsoft SQL Server 2005 backward compatibility components. This package
includes the SQLDMO library, which is required to run the Application Manager.
You should use the same version and service pack of SQL Server on both the
source and target servers. The only exception would be that you may use a newer
version of SQL Server on the target server to perform a failover while in Database Only protection mode (for instance, when using Application Manager to facilitate
a migration from SQL Server 2000 on the source to SQL Server 2005 on the
target). You can NOT failback when using different versions of SQL Server on the
source and target.
Licensed copies of BlackBerry Enterprise Server for Microsoft Exchange versions 4.1.4
through 4.1.6
Licensed copies of Microsoft Exchange Server that meet one of the following requirements:
NOTE:
Hewlett-Packard recommends that the Exchange version be the same as the
operating system version (for example, Windows Server 2003 running Exchange
2003).
The source and target servers must both be running a Microsoft-supported
operating system/Exchange combination.
Both source and target Exchange versions must be identical.
To perform target data verification, you must be using Exchange 2003 with service
pack 1 or later.
Related documentation
Before you begin to configure your solution, make sure that you have complete documentation for
your operating system, application, and Storage Mirroring.
User’s guide
The following document(s) contain additional information that you may need while setting up this
solution:
Storage Mirroring User’s Guide or online documentation
NOTE:The Storage Mirroring User’s Guide contains a list of Storage Mirroring error codes. This
reference is useful for troubleshooting.
1 - 9
Application notes
While the Application Manager greatly simplifies the process of configuring your application for use
with Storage Mirroring, Hewlett-Packard recognizes that in some environments a manual process for
application configuration is more desirable. However, the manual process is much more time
consuming and labor intensive. Hewlett-Packard has application notes which provide guidelines on
using manual processes to configure your application with Storage Mirroring.
To obtain application notes for the manual process for Exchange configurations, you must contact
Hewlett-Packard technical support. Current contact information for technical support is available at
http://www.hp.com/support
Application notes for other applications are available for download from the Application Notes page
of the Hewlett-Packard support web site (http://www.hp.com/support
.
).
Readme files
The following readme files contain additional reference information related to the Application
Manager:
Readme_Application_Manager.htm—The readme file contains information about known issues
and workarounds in the current release of the Application Manager.
Readme_DFO.htm—The DNS failover utility (DFO.exe), which is called in the failover scripts,
automatically updates DNS resource records in order to seamlessly redirect network clients. The
DFO readme file documents DFO syntax, known issues, and workarounds.
The readme files can be found in the folder where the Application Manager is installed (the default
installation location is either \Program Files\Storage Mirroring\ or \Program files\Application
Manager).
1 - 10
Navigating the user
interface
The Application Manager interface is designed to guide you through the process of configuring
protection for your servers. The default configuration parameters have been selected to be
appropriate for most configurations; however, you may need to modify them for your specific
environment. Any changes you make to non-machine specific configuration settings (such as Missed
Packets) will become the default the next time you run the Application Manager.
When you launch the Application Manager and select an application to protect, you will see the main
Application Manager window. The Setup tab of the Application Manager window leads you through
the steps to configure protection for a server using standard Windows-style controls. Enter
information in fields, select options from drop-down menus, click buttons, and use menu options to
configure protection.
After protection has been set up, use the Monitor tab to view information about the current
source/target pair. Based on the current protection status and/or failover state, the Failover,
Monitoring, and Protection button text on the Monitor tab will be updated to display the available
command. If the Application Manager is not in a state that will allow any of these options to be
executed, the corresponding button(s) will be grayed out (disabled).
The interface provides tooltip-style online help. When you place the pointer over a field in the
Application Manager, a tooltip will appear to provide additional information about the field.
Install the Application Manager
If you have not done so already, install the Application Manager by running the Application Manager
installation file downloaded from the Hewlett-Packard support website or from your installation
media. If you install .NET during the Application Manager installation, you may be required to reboot
your system prior to the installation of Application Manager. After the reboot, the installation should
continue.
When the installation autorun file is launched, the Application Manager will detect the platform that
the server is running on (that is, whether it is on 32-bit or 64-bit). When you select Install
Application Manager, the correct version of Application Manager will be installed automatically.
NOTE:On 32-bit systems, if Storage Mirroring is installed before the Application Manager is
For the initial setup, the Application Manager only needs to be installed on one system. For managing
failover and failback, the Application Manager should be run from either the target server or an
administrative workstation.
installed, then the Application Manager will be installed to the same location as Storage
Mirroring. If the Application Manager is installed before Storage Mirroring, then the
Application Manager will be installed to the \Application Manager directory that is created.
On 64-bit systems, Storage Mirroring is installed to the Program Files directory (not
\Program Files <x86>). When the Application Manager is installed, the Application
Manager will be installed to the \Program Files folder where Storage Mirroring resides. If
the Application Manager is installed before Storage Mirroring, then the Application
Manager will be installed to \Program Files\Application Manager. If Storage Mirroring is
subsequently installed, it will be in a separate directory (that is, the Application Manager
will be installed to \Program Files\Application Manager and Storage Mirroring will be
installed to \Program Files\Storage Mirroring).
2 - 1
The Application Manager installation uses an active internet connection to download the Microsoft
Admin Pack and SQL server backward compatibility (SQLDMO) files. In addition, if you do not have
.NET Framework version 3.5 SP1 installed, you will be prompted to install it. Microsoft Installer
version 3.0 or later is required to install the .NET Framework.
NOTE:Alternatively, these packages are available on the Hewlett-Packard support website and
can be downloaded to a different server, from which you can use an internal file share or
removable media to copy the files to the Application Manager client.
Start the Application Manager
Launch the Application Manager by selecting Start, Programs, Storage Mirroring, Application
Manager. The Application Manager will open. If you have not yet set up protection, the window will
show the Welcome screen.
You can protect servers for a different application by selecting one of the following options in the
Tasks area on the left pane:
Protect Exchange Server—To protect an Exchange server, click this option. The right pane will
display the Manage Exchange page, which will lead you through the steps to protect an Exchange
server. Continue with Protecting an Exchange Server on page 3-1.
Protect SQL Server—To protect a SQL server, click this option. The right pane will display the
Manage SQL page, which will lead you through the steps to protect a SQL server. Continue with
Protecting a SQL Server on page 5-1.
Protect File Server—To protect a file server, click this option. The right pane will display the
Manage File Server page, which will lead you through the steps to protect a File server. Continue
with Protecting a File Server on page 6-1.
Protect SharePoint Server—To protect a SharePoint server, click this option. The right pane
will display the Manage SharePoint Server page, which will lead you through the steps to protect
a SharePoint server. Continue with Protecting a SharePoint Server on page 7-1.
Protect BlackBerry Server—To protect a BlackBerry server, click this option. The right pane will
display the Manage BlackBerry Server page, which will lead you through the steps to protect a
BlackBerry server. Continue with Protecting a BlackBerry Server on page 8-1.
2 - 2
Menu options
Based on the current protection status and/or failover state, the Protection, Monitoring, and
Failover/Failback menu options will be updated to display the available commands. If the Application
Manager is not in a state that will allow any of these options to be executed, the corresponding menu
option(s) will be grayed out (disabled).
The following menu options are available on the main Application Manager window:
File menu
New—Start a new application server protection
Exit—Exit the Application Manager
Tools menu
Options—Modify Application Manager preferences and clear cached credentials
Delegate Rights (Exchange Only)— Assign Exchange administrative rights to an account
Actions menu
Configure Protection—Launch the Configure Protection dialog box
Validate—Validate the source/target configuration
Enable/Disable Protection—Enable or disable protection for the source server
Enable/Disable Monitoring—Enable or disable failover monitoring for the source server
Failover/Failback—Initiate manual failover or failback
View source DFO log—Launch a viewer to examine the log file generated by the dfo.exe utility
on the source server
View source ExchFailover log (Exchange only)—Launch a viewer to examine the log file
generated by the exchfailover.exe utility on the source server
View target DFO log—Launch a viewer to examine the log file generated by the dfo.exe utility
on the target server
View target ExchFailover log (Exchange only)—Launch a viewer to examine the log file
generated by the exchfailover.exe utility on the target server
Manage SQL Servers (SQL and SharePoint only)—Extended options for selecting SQL servers
and testing SQL services on those servers. This is the same window that is displayed when you
click the Advanced Find button on the SQL Manager or Sharepoint Manager main page.
Verify Target Data (Exchange and SQL only)—Verify that the target stores (for Exchange) or
databases (for SQL) will mount with the replicated data without forcing a re-mirror
Restore PF Tree (Exchange only)—Add the target back to the PF list to which the source belongs
NOTE:This option is only available when Application Manager is running in the Advanced
context.
Manage Snapshots—Launch the Snapshot Manager.
Help menu
View Welcome Page—Return to the initial Application Manager screen, from which you can
check for product updates or access the Hewlett-Packard website
View Online Help—Launch the Application Manager online help
View User’s Guide—Launch the Application Manager User’s Guide PDF
About—View the Application Manager revision number and copyright information
2 - 3
Change Application Manager preferences
To change display preferences for the Application Manager, select Tools, Options. The Options
dialog box will appear.
1. In the Service Listen Port field, enter the value for the Storage Mirroring port to be used for
Application Manager communication. The default port is 6320.
NOTE:The Storage Mirroring Application Manager Service Listen Port must be the same as
the Storage Mirroring Service Listen Port on both the source and target servers.
You can also change the port through the Storage Mirroring Management Console.
2. To specify the rate at which the Application Manager updates the protection status, clear the
Enable automatic adjustment of refresh interval checkbox, then enter the desired Refresh
Interval. You can enter a value between 1 and 30,000 seconds.
3. If you want the refresh interval to be updated automatically, select the Enable automatic
adjustment of refresh interval checkbox.
NOTE:If the Application Manager appears to be running slowly, it may be because the
refresh interval is set to a long interval. Set a shorter refresh interval and make sure
that the automatic adjustment option is not selected.
4. In the Maximum log file size field, enter the maximum size for the dtam.verbose.log file.
When the maximum size is reached, the dtam.verbose.log file is renamed to
dtam.verbose.prev.log and subsequent actions are logged to a new dtam.verbose.log file
(Default = 1 MB).
5. Select the Enable verbose logging checkbox to have all user interactions with Application
Manager logged to the dtam.verbose.log file (Default = selected).
6. Select the Always show protection details checkbox to have the Protection Details section on
the Monitor tab expanded by default.
7. Select the Display statistics values in bytes checkbox if you always want to show the values
on the Protection Details section on the Monitor tab values in bytes, rather than in MB, GB, or
TB.
8. Select the Load last selected server upon startup checkbox to automatically reconnect to the
last protected source/target pair when Application Manager is re-started.
2 - 4
9. Select the Enable Alternative DNS checkbox to launch Application Manager in \Altdns mode
the next time it is opened. For more information, see Using a non-Microsoft DNS Server on
page D-1.
10. Select the Display Advanced Options checkbox to launch Application Manager in \Advanced
mode the next time it is opened.
11. Click the Clear Cached Credentials button to clear the cached user name and password.
12. Click OK to save your changes, or Cancel to discard your changes and exit the Options dialog
box.
Using the online help
To view additional information about a task in the Application Manager interface, from the Help
menu, click View Online Help. This will launch the online help file in your internet browser.
To search for information about a topic, use tabs on the left pane:
The Contents tab provides a table of contents for the help file. Click a topic to view the topic in
the right pane.
The Index tab provides a list of terms. Click on a term to view the help topic(s) that include that
term.
The Search tab allows you to enter a word or words. When you click the Search button, a list of
all topics that include that term appears. Click on the topic title to view the topic.
While viewing the online help and readme (.htm) files in Internet Explorer, a message may appear
stating that Internet Explorer has restricted the file from showing active content. You can disable this
setting by modifying your Internet Explorer security settings.
1. In Internet Explorer, select Tools, Internet Options.
2. On the Advanced tab, scroll down to the Security section.
3. Enable Allow active content to run in files on My Computer.
2 - 5
Protecting an
Exchange Server
To configure protection for your Exchange servers, you will complete the following steps:
1. Install Exchange on the source server and apply any Exchange service packs or patches. Use the
default installation options for Exchange.
2. Install Exchange on the target, placing it in the same Exchange organization as the source and
verifying that the installation location for the target is the same as the source. Apply any
Exchange service packs or patches. Use the default installation options for Exchange with the
following considerations:
The target must be a unique installation (that is, two Exchange servers must be available for
a protection pair)
Logical drive mapping must be the same on the source and target, and must assigned prior
to running the Application Manager
3. Install Storage Mirroring on the source and target Exchange servers. See the Storage Mirroring
Getting Started guide for more information.
4. Install the Application Manager on page 2-1
5. Verify the Exchange environment (recommended) on page 3-1
6. Select a task on page 3-2
7. Select a domain on page 3-2
8. Select source and target servers on page 3-3
9. (Optional) Configure protection settings on page 3-4
10. Validate the Configuration on page 9-1
To protect your Exchange server, you will complete the following steps:
1. Enable protection on page 10-1
2. Monitor protection status on page 10-2
In the event of a failure, you will need to perform some additional tasks. These tasks are described
in Failover, Failback, and Restoration on page 11-1.
NOTE:If you need to protect any data that is stored on a non-mailbox server role (for example,
SMTP queue data), you will need to configure protection for that data separately. In
addition, you may need to manually update the DNS setting for the client access server
to point to the target site.
Verify the Exchange environment (recommended)
Before you use Application Manager, complete the following tasks to verify that the environment is
properly set up.
1. With both Exchange servers online, use Active Directory Users and Computers to move an
existing user from the source to the target and then back to the original source.
2. Verify that you can create a new user on the target.
3. To verify connectivity, create an Outlook
connect to the target.
®
profile for the new user on a client machine and
3 - 1
Select a task
To protect an Exchange server, open the Application Manager (Start, Programs, Storage
Mirroring, Application Manager), then on the Tasks area on the left pane, select Protect
Exchange Server. The Manage Exchange page will appear in the right pane. Make sure that the
Setup tab is in view.
NOTE:You can also launch Application Manager for Exchange by using the command line
/exchange option (dtam /exchange).
Select a domain
The Domain Name on the main window will be populated automatically with the root domain where
the Application Manager client resides. This is necessary for Application Manager to gather Exchange
information from the Configuration container.
If you want to change the domain, type in a domain name for a trusted root domain that the
Application Manager client can connect to, then press Tab or click on another field. If the domain you
entered doesn’t exist or you do not have the credentials to modify Active Directory for the new
domain, the Domain Login window will appear. You will be prompted to enter the domain name, user
name, and password to use for logging in to the domain.
NOTE:Domain names must include a suffix, such as
The user account should have administrator permissions. For more information about configuring
permissions, see Recommended Credentials on page A-1.
3 - 2
.com, .corp, or .net.
You may enter a user name for a different domain by entering a fully-qualified user name. The
fully-qualified user name must be in the format NetBIOS domain name\username or username.
If you enter a non-qualified name, the default domain will be used.
NOTE:When the Application Manager launches, it selects the forest root automatically. The
domain that is entered MUST be the root of the forest domain, since this is where all
Exchange server objects reside (even if the Exchange server is a member of a child
domain).
Select source and target servers
The Application Manager will automatically attempt to populate the Source Server and Target
Server lists with any servers in the specified domain that are running Exchange.
If you select a source/target pair for which you have previously enabled and disabled protection, you
may use the existing configuration settings (provided that the source/target connection is not
currently active, in which case the existing setting s will always be used). When you select Configure
or Validate, a prompt will appear asking if you want to re-use the previous configuration information.
Click Yes to re-use the previous information, or click No to revert to the Application Manager default
settings.
NOTE:If the IP address(es) for the source or target server have changed since you originally
configured protection (for example, if you configure the source or target in a staging area
and then send it to a production location), you must re-configure the protection settings.
When you are prompted to re-use the previous protection configuration, click No, then
click the Configure Protection button.
1. In the Source Server field, select the Exchange server that you want to protect. If this is your
first time to log in to the selected server, you will be prompted to enter server login information.
For more information about logging in to servers, see Enter server login information on
page 3-4.
NOTE:You cannot protect a server if it is already functioning as a target server.
If you attempt to select a source that is currently unavailable, a prompt will appear
stating that the source is not available and that if the source is failed over, you should
first select the target.
If you select the target, then select the source (as recommended in the prompt), the
same prompt appears (though you would expect to get a prompt to failover). The
ability to failover using the Application Manager will not be available until a failover
condition has been met in accordance with the failover monitor settings set on the
Monitoring tab.
2. In the Target Server field, select the backup Exchange server that will protect the source
server in the event of a failure. The target must be in the same Exchange admin group as the
source.
3 - 3
Notice that after the source and target servers are selected, the Protection Status on the Monitor tab
changes to Unprotected.
NOTE:If you select a target that is monitoring a connection that has met a failover condition and
requires manual intervention, a prompt will appear asking if you want to initiate failover.
Enter server login information
After you select a server for the first time, you will be prompted to enter a user name and password
to use for logging in to the selected server. The login account MUST be a member of the Storage
Mirroring Admin local security group for the selected server. For more information about permissions,
see Recommended Credentials on page A-1.
You may enter a user name for a different domain by entering a fully-qualified user name. The
fully-qualified user name must be in the format domain\username or username@domain. If you
enter a non-qualified name, the DNS domain will be used. Entering the credentials for the logged-on
user may be valid.
The Application Manager will attempt to use the same user name and password the next time you
select a server.
Using clustered Exchange servers
Exchange virtual servers (EVS) are selectable in the same way as physical servers; however, physical
servers that are members of a cluster (called a “node”) are not shown in the server drop-down list.
For more information about setting up protection for a cluster with a like-named cluster, see
Protecting an Exchange Cluster with a Like-Named Cluster on page 4-1.
Configure protection settings
If you do not need to change the configuration settings, continue with Validate the Configuration
on page 9-1.
If you have already enabled protection for a connection and need to change the configuration
parameters, you will first need to disable protection as described in Disable protection on
page 10-2.
To change the default configuration parameters, click Configure from the main Application Manager
window, or select Actions, Configure Protection from the menu. The Configure Protection window
will appear.
The Configure Protection window has tabs for configuring failover, connection, and advanced settings.
The following sections describe the options on each of these tabs.
3 - 4
Failover settings
The Failover tab includes options that will be applied during Exchange failover.
Failover type
Failover Type indicates what name resolution method will be used to redirect users to the target
Exchange server in the event of a source failure. By default, DNS Failover is selected.
NOTE:For clustered environments, only DNS failover is supported.
DNS failover
DNS Failover is the recommended method for failover. Use this option if you want to failover by
updating the DNS records associated with the source. This will modify all source server A, MX, and
PTR-type DNS resource records to point to the target.
In DNS Failover, the DNS records for the source server are modified to point to the target server’s IP
address. This allows clients to resolve the source Exchange server name to the target server’s
network name and IP address at failover time. DNS Failover eliminates duplicate server name and IP
addresses on your network.
3 - 5
After you select the DNS Failover option, click Configure. The Configure DNS Failover window will
appear.
Configure the following information for DNS failover:
1. To add additional DNS server IP addresses, type the IP address into the DNS Server field, then
click Add.
2. The list box under the DNS Server field contains all DNS IP addresses for the source and target
servers. The label after the DNS IP address indicates whether the DNS IP address belongs to the
source, target, or both.
NOTE:To remove an IP address from the DNS server list, select the IP address, then click
the Delete button.
3. In the Source IP column, select the checkbox next to the source IP address(es) to be monitored
for failover.
4. In the Target IP column, select the target IP address to be used when failover occurs.
NOTE:If one or more IP addresses are configured for the SMTP virtual server on the target,
the first IP address will be the default target IP address for all source IP addresses.
If the target is monitoring multiple source IP addresses for failover, each monitored
source IP address must be mapped to a unique target IP address.
5. To specify the value the Application Manager will establish for Time to Live (TTL) on the source’s
affected DNS records, select the Update TTL checkbox, then enter the desired update interval
(in seconds). The default is the current TTL of the source’s A records. The recommended value is
300 seconds (5 minutes) or less.
6. In the Username field, enter the user name that will be used to access/modify DNS records.
The login account MUST be a member of the DNSAdmins group for the domain in which the DNS
server resides. For more information about permissions, see Recommended Credentials on
page A-1.
You may enter a user name for a different domain by entering a fully-qualified user name. The
fully-qualified user name must be in the format domain\username or username@domain. If
you enter a non-qualified name, the DNS domain will be used by default. The domain name is
obtained from the DNS server name, provided that reverse lookup in DNS is enabled. For more
information about enabling reverse lookup, refer to your Microsoft documentation.
3 - 6
7. In the Password field, enter the password that will be used to access/modify DNS records.
8. Click the Test button to validate that DNS failover is configured correctly for the selected DNS
server(s) and that the specified credentials are sufficient to update DNS.
9. When the DNS configuration is complete, click OK to save your entries and return to the
Configure Protection window.
NOTE:
If you are running Windows Server 2000 on the primary DNS server hosting zones or
domains that contain source and/or target resource records, you must have the DNS
WMI Provider installed on that DNS server.
The Dynamic updates setting for the DNS zone should be set to Secure only.
Otherwise, you must disable dynamic registration on the source server in order to
prevent the source from reclaiming its DNS record.
If a hosts file entry for the source server exists on the client machine, errors may occur
during a failover and failback.
Reverse lookup in DNS should be enabled. For more information about enabling reverse
lookup, refer to your Microsoft documentation.
DNS registration for the private (devoted to Storage Mirroring) NIC IP should be
disabled.
If your Exchange server is using a public IP address to receive email, you will have to
change the public advertised DNS MX record to reflect the target IP. Consult your
service provider for instructions.
To allow external email to be delivered to the target server when the source is
unavailable, you should create an additional external MX record for the target server.
The target MX record should have a lower priority than the source. Refer to your router
or firewall documentation for more information.
For more information about using the DNS Failover utility, access the dfo.exe help by
typing
dfo.exe /? from a command prompt.
In order to set the primary DNS server with which the Application Manager will communicate during
failover, you must launch Application Manager using the command line
option (
dtam /exchange /advanced). When launched in the Advanced context, the Client DNS
/exchange /advanced
Server field will appear on the Configure DNS Failover window. Use the Client DNS Server field to
select the primary DNS server.
Identity failover
Select this option if you want to failover by transferring the source IP address and name to the target.
When using identity failover, it is possible that a name and/or IP address conflict can occur either
during failover or when the original source server comes back online. To avoid this conflict, use DNS
Failover.
NOTE:Identity failover is not supported in clustered environments.
Application Manager cannot be used for failover or failback when the Identity failover
method is selected. However, the Failover Control Center can still be used to initiate
failover. DNS failover reduces downtime and provides other benefits. It is recommended
for most environments.
In Identity Failover, the target’s physical identity is modified to match the source during a failover.
This includes the target adopting the source server’s name, primary IP address, and drive shares
during a failover. Identity failover may be required in the following situations:
Access to the domain controller or DNS server is not available (for example, due to permissions)
from the account that Storage Mirroring runs under on the source/target servers.
If you determine that the time it takes to propagate the necessary DNS or Active Directory
changes to the rest of your environment is not acceptable. The time needed to propagate these
changes depends on your Active Directory Replication and DNS server settings.
If you have client applications that are configured to connect to an IP address rather than a server
name.
3 - 7
After you select the Identity Failover option, click Configure. The Configure Identity Failover window
will appear.
Enter the following information for Identity failover:
1. In the Source IP column, select the source IP address(es) to be monitored for failover.
2. In the Target NIC column, select the target NIC to be used when failover occurs.
3. The Target IP Addresses area displays the IP address(es) of the selected target NIC.
4. Select the IP Address checkbox if you want the specified source IP address to be monitored
(Default = selected).
NOTE:If your source and target servers are on different subnets, you should NOT failover
the IP address. Instead, if the server name is required you should choose DNS failover
with the Advanced switch and select the Server Name. For more information, see
Advanced settings on page 3-18.
5. Select the Server Name checkbox if you want the source name to be added to the target when
failover occurs (Default = NOT selected).
6. Select the Shares checkbox if you want the source file shares to be added to the target when
failover occurs (Default = NOT selected).
7. Select the Active Directory Hostname (SPNs) checkbox to remove the host SPN (Service
Principle Name) from Active Directory for the source automatically and add it to Active Directory
for the target during failover (Default = NOT selected).
NOTE:You should NOT select this option when using Exchange.
8. Click OK to save your entries and return to the Configure Protection window.
Services
Application Manager will determine the appropriate Exchange services to start/stop based on your
operating system/Exchange configuration. You should only modify this selection if there are
additional services that need to be started along with Exchange during the failover/failback process.
3 - 8
Modifying the default configuration for services may affect whether data can be successfully
replicated. Do not modify the services to start/stop unless you are very familiar with Storage
Mirroring and Exchange.
1. To add a service, click Add. The Add Service window will appear.
2. Select the Service name from the drop-down box, then click Add; or, type the name of a
service, then press Enter.
3. If available, select the Service must be stopped on target checkbox. Most services must be
stopped on the target for replication to occur properly.
4. When you are finished entering services, click Close to return to the Failover configuration
window.
5. To remove a service, select one or more services, then click Remove.
You can only remove services that you added manually using the Application Manager.
6. Services will be started in the displayed order (top-to-bottom starting with the left column) and
shutdown in reverse order (bottom-to-top starting with the right column). To re-arrange the
order in which services are started/stopped:
a. Add any additional services.
b. Select a service in the list, then use the up and down arrow buttons to move the service to
the appropriate position in startup/shutdown order.
Resources (cluster only)
If you are using clustered Exchange servers, you will select resources instead of services to bring
online and offline during failover. The Resource selection works exactly like the service selection
functionality.
NOTE:If you are using Exchange in a cluster-to-standalone configuration and have selected a
source cluster server, a button will appear in the Services/Resources area, allowing you
to toggle between services to start/stop on the target, and Resources to start/stop on the
source.
3 - 9
Monitor settings
The Monitoring tab includes options for configuring how you want to monitor the source server for
failure.
Configure how you want to monitor the source server for failure.
1. Select the Active Monitoring Enabled option to enable or disable failover for the selected
source/target pair.
2. By default, Manual Intervention Required is selected. Manual intervention allows you to
control when failover occurs. When a failure occurs, a prompt appears and waits for you to
initiate the failover process manually.
Disable Manual Intervention Required only if you want failover to occur immediately when a
failure condition is met.
3. In the Method to monitor for Failover field, select the ping method to use when monitoring
source IP addresses.
Network Access (ICMP)—Storage Mirroring failover uses ICMP pings to determine if the
source server is online. If a network device, such as a firewall or router, between the source
and target is blocking ICMP traffic, failover monitors cannot be created or used.
Replication Service (UDP)—The Storage Mirroring service on the target server sends a
ping-like UDP request to the source Storage Mirroring service, which replies immediately to
confirm it is running. This method is useful when ICMP is blocked on routers between the
source and target.
4. Configure how long to wait after a source failure to initiate failover. The amount of time before
failover begins is calculated by multiplying the Monitor Interval by the Missed Packets. For
example, if the Monitor Interval is set to 5 seconds and the Missed Packets setting is 5, a failover
condition will be identified after 25 seconds of missed source activity.
NOTE:In a cluster environment, make sure to include a cushion to account for the time it
takes for the EVS to failover between nodes. Setting values too low will cause the
Application Manager to assume the source cluster has failed and will indicate that a
failover condition has been met.
a. In the Monitor Interval field, select how often the monitor should check the source
machine availability (Default = 5 seconds).
b. In the Missed Packets field, select how many monitor replies can be missed before
assuming the source machine has failed (Default = 5 missed replies).
5. If you are monitoring multiple IP addresses, select one of the Failover Trigger options.
All Monitored IP Addresses Fail—Failover begins when all monitored IP addresses fail.
One Monitored IP Address Fails—Failover begins when any of the monitored IP addresses
fail.
3 - 10
Application Monitoring (BETA)
By default, application monitor settings are not available in this release of the Storage Mirroring
Application Manager. Application monitoring is only available when you launch Application Manager
using the command line
WARNING:This feature is currently BETA and should not be used in production environments.
1. If you select the Enable Application Monitoring checkbox, the remaining fields in Application
Monitor Settings area will be enabled.
NOTE:A message box will appear, asking you to confirm that you want to use this BETA
feature. To continue, click OK.
Application monitoring is not available when dealing with a cluster.
2. In the Monitor Interval field, enter the interval (in seconds) at which you want to check
application health.
3. In the Error Threshold field, enter the number of consecutive errors that can be received
before an error alert appears.
4. In the Type of Monitoring area, select one of the following options.
Built-in Monitoring Points—Use the default monitoring options.
Custom Script—Launch a batch file to check application health. Either type the name of the
script, or click Browse to locate a script.
NOTE:If you select Custom Script, you will also need to designate whether to use .PS1
(PowerShell) or .VB (VisualBasic) as the Script Engine. Make sure you select the
appropriate engine for your script type.
An example script that you can use as a basis for creating your custom script is
included in the \Samples subfolder where the Application Manager is installed.
5. In the Username field, enter the fully-qualified user name that will be used to run WMI scripts.
The fully-qualified user name must be in the format domain\username or
username@domain.
NOTE:The required credentials for running WMI scripts is full WMI access to the CIMV2
namespace. Under Windows 2008, the supplied credentials must also be allowed
through DCOM and User Access Control. It is recommended that a group be created
for running scripts, and that the required permissions be given to the group.
By default, the administrative group of a Windows 2008 machine has full WMI access.
However, DCOM and User Access Control settings may need to be adjusted.
6. In the Password field, enter the password for the specified user account.
7. Click the Test button to validate that the specified credentials are sufficient to run WMI scripts.
3 - 11
8. (Optional) Click the Clear Cached Credentials button to clear the cached user name and
password.
Snapshot settings
The following allow you to set up snapshots of your target data that can be used when failing over.
By default, snapshots are not enabled in the Application Manager.
1. To enable snapshots, select the Enable periodic snapshots checkbox. This will enable the
remaining controls.
2. In the Snapshot interval field, select the interval at which you want to perform snapshots (in
minutes). The minimum interval is 15 minutes.
3. Select one of the following options for when to begin collecting snapshots:
Start now—Select this option to take the first snapshot as soon as protection is enabled.
Start at—Select this option to start taking snapshots at a future time. If you select this option,
you will also need to enter a date and time.
4. When you are finished, click OK.
3 - 12
Connection settings
The Connection tab includes options that will be applied to the specified source/target connection.
Route
This setting identifies the Target IP Address that the Storage Mirroring data will be transmitted
through. You should only change this setting if you want to select a different route for Storage
Mirroring traffic. On a machine with more than one NIC, this increases the flexibility of configuring
Storage Mirroring activity. For example, you can separate regular network traffic and Storage
Mirroring traffic on a machine. The default ports will be used.
In a cluster, the route should be set to the name of the Exchange virtual server (EVS) dependent
IP address.
Protected Storage Groups
The Protected Storage Groups area displays the storage groups, mailbox, and public folder stores.
Select the Exchange storage groups that you want to protect. By selecting individual storage groups
to protect, you can reduce the amount of data being replicated and filter out storage groups that do
not need to be protected or failed over. Only the users associated with the selected storage groups
will be failed over. By default, all storage groups are selected for an Exchange source.
The replication set that the Application Manager generates will include the directories and files needed
to protect the selected storage groups. It is recommended that you protect all storage groups.
NOTE:
If you do not select all storage groups, you should make sure that other backups are
available from which to recover the storage groups that are not failed over.
Hewlett-Packard recommends that you place all query-based distribution groups in a
single organization container and give the target server full control rights to the
container and all child objects.
You can also select non-application specific data under the Volumes folder.
NOTE:If Override Generated Rules is selected on the Advanced tab, this control will be
disabled.
3 - 13
To refresh the tree view to show new source directories or files that may have been added or
removed, select the logical node, then click the Refresh button. If a node in the volumes branch is
selected, then the items under that node will be refreshed.
Mirror type
The following options specify what files you want sent from the source to the target during a mirror.
Full—Copies all of the directories and files in the replication set to the target machine. If a mirror
has already been completed, another full mirror will overwrite the data on the target.
Checksum—(Default) This option performs a checksum comparison calculation. A checksum
calculation is a formula applied to blocks of data to determine if the binary make-up of the block
is identical. If the checksums on the source and target machine are the same, the block is skipped.
If the checksums on the source and target machine are not the same, the block on the source is
sent to the target. With this option, the entire file is not overwritten; only the block that is received
from the source is overwritten.
NOTE:The Mirror type setting also applies to the restoration connection.
Enable compression
This setting enables compression of data that is transmitted from the source to the target. Significant
improvements in bandwidth utilization have been seen in Wide Area Network (WAN) configurations
or in any case where network bandwidth is a constraint.
Compression may be used in Local Area Network (LAN) configurations, though it may not provide any
significant network improvements.
You can specify compression for different source/target connections, but all connections to the same
target will have the same compression settings.
By default, compression is disabled. To enable it, select Enable Compression, then set the level
from minimum to maximum compression.
Advanced settings
The Advanced tab includes advanced configuration options.
3 - 14
Replication set rules
A replication set defines what directories/files are to be protected by Storage Mirroring. By default,
Application Manager selects all of the necessary directories/files to protect Exchange based on your
source server configuration. These include all storage groups (system and log files), each database
store (mailbox and public folder system and log files), Message Transfer Agent (MTA) files, and SMTP
queues (pickup path and queuepath). By default, the Application Manager-generated replication set
will be named
You should only modify the replication set rules if there are additional directories/files specific to your
configuration that must also be protected with Exchange. Modifying the default configuration for
replication set rules may affect whether data can be successfully replicated. Do not modify the
replication set unless you are very familiar with Storage Mirroring and Exchange.
NOTE:If you want to protect the Badmail folder, you will need to manually add it to the
To change the replication set rules:
1. Select the Override Generated Rules checkbox.
NOTE:When this box is selected, the Protected Storage Groups control on the Connection
2. To add a replication set rule, click Add. The Add Repset Rule dialog box will appear.
xdag01_<source server name>_<target server name>.
replication set as described in this section.
tab will be disabled. For more information, see Protected Storage Groups on
page 3-13.
3. In the Rule Path field, type the directory that you want to protect or exclude.
4. In the Include/Exclude area, select whether to include or exclude the path from the replication
set.
5. In the Recursive area, select whether the directory should be recursive (protecting all
sub-folders under the directory) or non-recursive (protecting only the files in the directory).
6. Click Add.
7. When you have entered all of your replication set rules, click Close to return to the Advanced
configuration tab.
NOTE:You will need to manually verify that the rule path is correct since the Application
Manager does not validate rule paths.
8. To remove a rule, select one or more rules, then click Remove.
NOTE:Removing rules that were automatically added by Application Manager could impact
the success of failover. Any changes to rules should be thoroughly tested.
9. To reset the rules to the auto-generated rules and to re-enable the Protected Storage Groups
control, remove the selection from the Override Generated Rules checkbox.
3 - 15
Failover/failback scripts
Scripts are executed at different points during the failover/failback process to perform the actions
necessary to make Exchange available on the appropriate server. Scripts perform steps such as
starting/stopping services, modifying mailbox values in Active Directory to point users to the
appropriate server, and modifying DNS entries on the DNS server to point users to the appropriate
server.
Editing scripts is an advanced feature. Do not edit scripts unless you fully understand what each
command is doing.
NOTE:Any manual edits to the failover/failback scripts should be made carefully and tested prior
to deployment in order to make sure that the changes are correct. If you remove the
/username entry from the DFO command line in the PostFailover script, DNS failover
will fail.
Scripts are automatically generated by Application Manager during configuration. The scripts are
copied to the Storage Mirroring installation directory on the specified server using the administrative
share for that server’s drive.
ScriptFile nameDescription
FailoverPost_failover_<source>_<target>
.txt
FailbackPre_failback_<source>_<target>.
txt
RestorePost_restore_<source>_<target>.
txt
NOTE:The post-restore script must be run from the source server.
By default, Application Manager generates all the required scripts for you automatically based on your
system configuration. You can also edit the scripts to add, modify, or delete specific commands. To
edit a script:
1. Click on the button for the script you want to update. The script file will be displayed using your
machine’s default editor.
2. Enter your changes.
3. Save the script file.
Any change you make to the script in the editor will be copied to the appropriate server when
configuration changes are accepted, thus overwriting any changes that have been made outside the
Application Manager.
The scripts can be overwritten by certain operations during setup. For example, any changes to
configuration options done in the Application Manager will overwrite previous script changes. If you want to make permanent changes to a script, you must modify the appropriate .txt file within
the Application Manager installation directory. If there is more than one client machine that will be
configuring failover, the change must be made to all the appropriate .txt files.
A post-failover script is executed after the
core failover processes have completed on
the target server. The primary functions of
the post-failover script are to start the
services on the target and to modify DNS
and Active Directory entries as necessary.
A pre-failback script is executed before
failback processing occurs on the target
server. The primary functions of this script
are to stop services on the target and to
move DNS and Active Directory entries as
necessary.
A post-restore script is not executed
automatically, though it is provided on the
source to perform actions that are generally
required after data has been restored from
the target to source after a failover/failback.
The primary function of this script is to
restart services on the source server and
rehome
source server.
the public folders hosted on the
3 - 16
Before running Application Manager multiple times (for example, when re-enabling protection after a
failover/failback), save a copy of your post-restore and pre-failback batch files. After Application
Manager executes, replace the default script file(s) with the customized file(s) that you saved.
Force AD replication
(Default = selected) When selected, replication is initiated from the domain controller with which the
source or target server communicates. This will be done each time the Exchange Failover utility
(exchfailover.exe) is executed from within the failover/failback scripts. For more information about
using the Exchange Failover utility, see Using the Exchange Failover (EFO) Utility on page G-1.
Disable Force AD Replication if you do not want Active Directory changes to be replicated.
In the Max wait time for AD replication field, enter the maximum time you want to wait for Active
Directory replication to complete before continuing on with the failover/back process. The default is
30 minutes.
NOTE:The wait time is a factor determining when failover is complete.
If replication exceeds the amount of time specified, a log entry is created and replication
continues. If it is exceeded, failover is not reported as incomplete or failed.
Target(ed) domain controller
This field allows you to specify the name of the domain controller where updates will be made during
failover and failback. If this field is left blank, the default or Active Directory-determined domain
controller will be used.
NOTE:The Target(ed) domain controller field is only available for Exchange 2003. It is not
By default, the domain controller is resolved through Windows.
available for Exchange 2007.
You must enter the name of the domain controller. IP addresses are not valid for this field.
3 - 17
Advanced settings
The following options allow you to control what functions Application Manager will perform during
configuration. By default, Application Manager performs all of these functions. Individual functions
should only be disabled for testing or debugging purposes.
NOTE:These options are only available when you launch Application Manager using the
1. Select the Server Name checkbox if you want the source name to be added to the target when
failover occurs (Default = NOT selected).
2. Select the Shares checkbox if you want the source file shares to be added to the target when
failover occurs (Default = NOT selected).
3. Select the Active Directory Hostname (SPNs) checkbox if you want to remove the host SPN
(Service Principle Name) automatically from Active Directory for the source and add it to Active
Directory for the target during failover (Default = NOT selected).
NOTE:If you are using Active Directory, you should enable this option. Otherwise, you may
4. Select the Create Replication Set checkbox to automatically create a replication set that
includes all of the necessary directories/files that must be protected for your specific
configuration. This should only be disabled if you have customized your replication set and do
not want to overwrite it (Default = selected).
5. Select the Create Failover Scripts checkbox to automatically generate the failover/failback
scripts and copy them to the appropriate server. This should be disabled only if you have
customized your script files and do not want them to be overwritten (Default = selected).
6. Select the Create Connection checkbox to create the connection between the source and
target using the automatically-generated replication set. This should only be disabled if you
would like to verify the replication set that is created by Application Manager prior to connection
(Default = selected).
experience problems with failover.
3 - 18
7. Select the Create Failover Monitor checkbox to create a failover monitor on the target to
monitor the source for failure. This monitor will use the failover parameters specified during
configuration as well as the script files that have been created (Default = selected).
8. When you are finished, click OK.
9. If you want to add the target back to the PF list to which the source belongs, you will need to
enable the Restore PF Tree option.
a. Select Tools, Actions.
b. Choose Display Advanced Options.
c. Select Protect Exchange Server again. The Restore PF Tree option will be added to the
Actions menu.
d. Select Actions, Restore PF Trees. This will copy the owning PF tree setting from the source
public folders to the target public folders.
This setting is cleared when protection is enabled, which prevents SMTP queuing issues when
trying to deliver messages to the target, but is never restored. If you want to have an active
target server, you can use this command to restore it to a pre-Application Manager state.
Saving configuration changes
After you have changed the configuration parameters, click OK to apply the settings. If you click
Cancel, any changes you have made will be discarded and the previous configuration parameters will
be used.
When you have finished configuring the optional protection options, continue with Validate the
Configuration on page 9-1.
NOTE:If you close the Application Manager prior to enabling protection, your changes will not
be saved. You must enable protection in order to save your configuration settings for a
source/target pair.
If you modify your configuration on the source server (such as adding a new storage
group or database), you must disable protection, run validation and fix any issues, then
re-enable protection to apply the changes to the Application Manager replication set.
3 - 19
Protecting an
Exchange Cluster with
a Like-Named Cluster
This section describes the process used to configure protection for an Exchange cluster with a
like-named (also known as a standby) cluster.
When you protect a cluster with a like-named cluster, the Application Manager moves the EVS
(Exchange virtual server) location from the source cluster to the target cluster. By moving the EVS,
the process of moving users and public folders from one server to another is not needed because they
will continue to use the same mail store on the target as they were on the source. This, coupled with
the ability to reduce the TTL (Time to Live) value of the EVS DNS record (optional), allows a more
seamless failover.
Prerequisites
Before you can use the Application Manager to protect a cluster with a like-named cluster, you must
complete the following:
Each target server node must have the same version and service pack level of Exchange as is
installed on the source nodes.
The target must have a resource group that has the same name as the resource group on the
source.
The target resource group only needs to contain physical disk resources, which MUST use the
same drive letters that are used by the physical disk resources on the source.
NOTE:Like-named cluster support is only available for clusters running Exchange 2003. It is not
available for Exchange 2007.
Permissions
When protecting a cluster with a like-named cluster, you can perform the setup, failover, and failback
with the following permissions:
The user must be a member of the local Storage Mirroring Admin group.
The user must be a member of the local Administrators group on all cluster nodes.
The user must be delegated Full Exchange Administrator access through Exchange System
Manager.
(Optional) In order to change the TTL within DNS during failover, the user must be a member of
the DnsAdmins group.
Multiple EVS
The instructions in this chapter also apply to setting up multiple EVS. There are two ways to perform
multiple EVS failover:
Set up multiple like-name jobs for each EVS on your source cluster, as described in this chapter.
4 - 1
Failover multiple EVS servers to pre-existing EVS servers on the target. If you choose this option,
instead of selecting the like-named equivalent, you will select the target EVS with which to setup
protection. The Like-named cluster setup window will not appear since you are not using a
like-named target.
NOTE:If you are running Exchange 2003 in mixed mode, the first installed EVS contains the MTA
(Message Transfer Agent) resource that is needed to communicate with versions prior to
Exchange 2003. If you do not failover all Exchange virtual servers, then any user who is
in a different mail store than the first one may not be able to route mail.
Configuring a standby cluster
The process for protecting a cluster with a like-named cluster is similar to protecting a standard
cluster. The following instructions point out the differences in configuration. For more information
about basic protection functions, see Protecting an Exchange Server on page 3-1.
1. In the Source Server field, select the source cluster that you want to protect.
2. In the Target Server field, select the same server.
NOTE:The server name will be appended with the suffix “(like-named)”
4 - 2
3. After you select a like-named cluster for the target, you will need to configure the like-named
cluster. After you select the target server, the Like-named cluster setup dialog box will appear.
4. Enter the following information:
Target Cluster—Enter the name of one of the target nodes, then click Connect.
Network—Select the NIC to which you will assign the IP address.
IP Address (to create)—Enter a new IP address for the target to use when it stands in for
the source.
Subnet Mask—Enter the subnet mask to use for the new IP address.
Storage Resources—The Application Manager will automatically select the required storage
resources on the target, provided that they exist (for example, if the source and target both
have
E:\ and S:\). Verify that the drive letters where Exchange data is located are selected.
NOTE:
You can not de-select a storage resource that exists on both the source and
target.
If the drive letters on the source and target do not match, then not all required
data will be selected automatically. You will need to select it manually. The
selected storage resources must be in the same group.
5. When you are finished, click OK to return to the Manage Exchange window.
4 - 3
6. On the Manage Exchange window, click Configure to open the Configure Protection window,
then select the Failover tab.
7. DNS Failover is the only option available for configuring protection with like-named clusters.
For more information about DNS failover, see DNS failover on page 3-5.
8. If you want to modify DNS configuration options, click Configure. The Configure DNS Failover
window will appear.
4 - 4
9. On the Configure DNS window, you can modify the TTL value for the DNS record. You can also
specify the user credentials needed to modify DNS. When you are finished, you can click Test to
test the DNS configuration for the selected DNS server(s), or click OK to return to the
Configure Protection window.
NOTE:Decreasing the TTL value will increase the speed at which clients get the updated
information.
10. After you have changed the configuration parameters, click OK to apply the settings and return
to the Manage Exchange window. If you click Cancel, any changes you have made will be
discarded and the previous configuration parameters will be used.
11. Click Validate to validate the selected cluster pair. The validation proceeds exactly like
validation for other methods of failover.
12. Click Enable Protection to enable protection for the source cluster.
Enabling protection
After protection is enabled, the Application Manager creates four resources on the target cluster: two
generic script resources, an IP address resource, and a temporary name resource. The temporary
name resource is the source EVS name with “_LN” appended to the end. The Application Manager
uses the temporary name resource for the connection between the source and target clusters. The
Application Manager gets the order of the source cluster resources from the Microsoft Cluster DLL,
then builds the scripts with the resources in order and based off the source’s resources configuration.
Scripts are automatically generated by the Application Manager during configuration. The scripts are
copied to the Storage Mirroring installation directory on the specified server using the administrative
share for that server’s drive.
ScriptFile nameDescription
Failoverpost_failover_LN.txtA post-failover script is executed after the core failover
processes have completed on the target server. The
primary function of the post-failover script is to start
the resources on the target.
Failbackpre_failback_LN.txtA pre-failback script is executed before failback
processing occurs on the target server. The primary
function of this script is to stop resources on the target.
Restorepost_restore_LN.txtA post-restore script is not executed automatically,
though it is provided on the source to perform actions
that are generally required after data has been restored
from the target to source after a failover/failback. The
primary function of this script is to restart resources on
the source server.
After the resources are online and the mirroring has completed, the source cluster is considered
protected and the Application Manager starts monitoring the source for complete source failure.
NOTE:If you modify your configuration on the source cluster, you must disable protection, run
validation and fix any issues, then re-enable protection to apply the changes to the
Application Manager replication set.
4 - 5
Dealing with a failure
Graceful failover
At the user's discretion, the Application Manager can perform a graceful, or “soft”, failover. A soft
failover means the source cluster remains up and running while the EVS is transferred to the target
cluster. This can be accomplished by using the failover button in Application Manager. The steps the
Application Manager takes to transfer the EVS from the source cluster to the target are the same as
during a site failure failover, which is described in Site failure failover on page 4-6. The only
difference is that in a soft failover, the source cluster resources are taken offline gracefully.
Site failure failover
If the Application Manager detects that the source cluster has failed completely, it will display a
prompt asking if a failover is desired. The time it takes for the Application Manager to realize a
complete source cluster failure varies greatly. At times, the prompt can be seconds after the failure,
or it might take several minutes. If you want the prompt to appear more quickly and you know that
the source cluster has failed, you can decrease the amount of wait time by closing the Application
Manager, re-opening it, and selecting the protected pair (if it is not automatically selected).
When a failover is initiated, the following steps occur:
1. The Application Manager waits on the target replication queue to empty.
2. The exchfailover.exe utility fails over the virtual protocols of the EVS.
3. The resources are created on the target cluster.
The resources are created in the same order as they appeared on the source cluster.
The resources are configured exactly as they were on the source cluster.
4. The resources are brought online.
5. The DNS failover utility is used to lock the source DNS record.
Differences in failback
The process used to failback to the source cluster is the same as any other cluster failover method.
The only difference is the EVS is now on both the source and target clusters.
To failback to the source cluster, make sure the Physical Disk resource(s) and the IP Address resource
are online on the source cluster, then use the Storage Mirroring Application Manager to failback.
NOTE:When you bring the source cluster online, an identical network name will still be active
on the target. Because of this, when the source cluster tries to bring up the EVS on the
source, the network name resource will fail and consequently the group will not come
online on the source. You should allow the source cluster to finish trying to bring the
resources online before using the Application Manager to failback.
4 - 6
Protecting a SQL
Server
To configure protection for your SQL servers using Application Manager, you will complete the
following steps:
1. Install SQL on the source server and apply any SQL service packs or patches. Use the default
installation options for SQL.
2. Install SQL on the target, verifying that the installation location for the target is the same as the
source. Apply the same SQL service packs or patches that were installed on the source. Use the
default installation options for SQL with the following considerations:
The target must be a unique installation (that is, two SQL servers must be available for a
protection pair).
Logical drive mapping must be the same on the source and target and must be assigned prior
to running the Application Manager.
You should use the same version and service pack of SQL Server on both the source and target
servers.
If you are using clusters, you will need to pre-configure the SQL instances on the target using
any combination of default and/or named instances to match what is on the source.
3. Install Storage Mirroring on the source and target SQL servers. See the Storage Mirroring
Getting Started guide for more information.
4. Install the Application Manager on page 2-1
5. Select a task on page 5-1
6. Select a domain on page 5-2
7. Select source and target servers on page 5-3
8. (Optional) Configure protection settings on page 5-5
9. Validate the Configuration on page 9-1
To protect your SQL server, you will complete the following steps:
1. Enable protection on page 10-1
2. Monitor protection status on page 10-2
In the event of a failure, you will need to perform some additional tasks. These tasks are described
in Failover, Failback, and Restoration on page 11-1.
Select a task
To protect a SQL server, open the Application Manager (Start, Programs, Storage Mirroring,
Application Manager), then on the Tasks area on the left pane, select Protect SQL Server. The
Manage SQL page will appear in the right pane. Make sure that the Setup tab is in view.
NOTE:You can also launch Application Manager for SQL by using the command line
dtam /sql).
(
5 - 1
/sql option
Select a domain
The Domain Name on the main window will be populated automatically with the domain where the
Application Manager client resides.
If you want to change the domain, type in a domain name for a trusted domain that the Application
Manager client can connect to, then press Tab or click on another field. If the domain you entered
doesn’t exist or you do not have the credentials to modify Active Directory for the new domain, the
Domain Login window will appear. You will be prompted to enter the domain name, user name, and
password to use for logging in to the domain.
NOTE:Domain names must include a suffix, such as
The user account should have administrator permissions. For more information about configuring
permissions, see Recommended Credentials on page A-1.
You may enter a user name for a different domain by entering a fully-qualified user name. The
fully-qualified user name must be in the format NetBIOS domain name\username or username.
If you enter a non-qualified name, the default domain will be used.
5 - 2
.com, .corp, or .net.
Select source and target servers
If this is your first time to select a SQL server to protect, you may need to click the Advanced Find
button to add servers to the Source Server and Target Server fields. For more information, see Add
or manage servers on page 5-4.
If you select a source/target pair for which you have previously enabled and disabled protection, you
may use the existing configuration settings (provided that the source/target connection is not
currently active, in which case the existing settings will always be use d) . W hen you select Configure
or Validate, a prompt will appear asking if you want to re-use the previous configuration information.
Click Yes to re-use the previous information, or click No to revert to the Application Manager default
settings.
NOTE:If the IP address(es) for the source or target server have changed since you originally
configured protection (for example, if you configure the source or target in a staging area
and then send it to a production location), you must re-configure the protection settings.
When you are prompted to re-use the previous protection configuration, click No, then
click the Configure Protection button.
1. In the Source Server field, select the SQL server that you want to protect. If this is your first
time to log in to the selected server, you will be prompted to enter server login information. For
more information about logging in to servers, see Enter server login information on
page 5-5.
NOTE:You cannot protect a server if it is already functioning as a target server.
If you attempt to select a source that is currently unavailable, a prompt will appear
stating that the source is not available and that if the source is failed over, you should
first select the target.
If you select the target, then select the source (as recommended in the prompt), the
same prompt appears (though you would expect to get a prompt to failover). The
ability to failover using the Application Manager will not be available until a failover
condition has been met in accordance with the failover monitor settings set on the
Monitoring tab.
2. In the Target Server field, select the backup SQL server that will protect the source server in
the event of a failure.
Notice that after the source and target servers are selected, the Protection Status on the Monitor tab
changes to Unprotected.
NOTE:If you first select a target that is monitoring a connection that has met a failover condition
and requires manual intervention, then select the protected source server, a prompt will
appear asking if you want to initiate failover.
5 - 3
Add or manage servers
If the servers you need do not appear, click the Advanced Find button, or select Actions, Manage
SQL Servers. The Manage SQL Servers window will appear.
To discover all servers in the domain:
1. Click the Search button. The Discovered Servers list will be populated with all servers that the
Application Manager can discover that reside in the domain.
2. To directly add a server to the drop-down list on the Manage SQL main page, select the server in
the Discovered Servers list, then use the >> button to move it into the Current Servers list.
3. To add a non-discovered server to the Current Servers list, enter the server name in the field
next to the Add button, then click Add.
NOTE:In environments with a very large number of servers in Active Directory, you may
experience significant delays while the Application Manager searches for SQL servers.
To override the automatic scan for SQL servers, you can launch Application Manager
through the command line using the
/nosqlsearch option
(dtam /sql /nosqlsearch). This will cause the Application Manager not to populate
the Source and Target fields automatically. You will then need to click the Advanced Find
button and add the source and target SQL servers manually.
4. After a server has been added to the Current Servers list, you can manage that server. Select
the server, then select one of the following options:
Remove—Click the Remove button to remove the selected server from the drop-down list
on the Manage SQL main page.
Test SQL—Click the Test SQL button to determine if SQL is installed and accessible for the
selected server.
5. When you have finished adding, managing, or testing servers, click OK to save your changes, or
Cancel to return to the Manage SQL main page without saving.
5 - 4
Enter server login information
After you select a server for the first time, you will be prompted to enter a user name and password
to use for logging in to the selected server. The login account MUST be a member of the Storage
Mirroring Admin local security group for the selected server. For more information about permissions,
see Recommended Credentials on page A-1.
You may enter a user name for a different domain by entering a fully-qualified user name. The
fully-qualified user name must be in the format domain\username or username@domain. If you
enter a non-qualified name, the DNS domain will be used. Entering the credentials for the logged-on
user may be valid.
The Application Manager will attempt to use the same user name and password the next time you
select a server.
Using clustered SQL servers
SQL servers are selectable in the same way as physical servers; however, physical servers that are
members of a cluster (called a “node”) are not shown in the server drop-down list.
Configure protection settings
If you do not need to change the configuration settings, continue with Validate the Configuration
on page 9-1.
If you have already enabled protection for a connection and need to change the configuration
parameters, you will first need to disable protection as described in Disable protection on
page 10-2.
To change the default configuration parameters, click Configure from the main Application Manager
window, or select Actions, Configure Protection from the menu. The Configure Protection window
will appear.
The Configure Protection window has tabs for configuring failover, connection, and advanced settings.
The following sections describe the options on each of these tabs.
5 - 5
Select SQL instances
If you launch the Application Manager using the /sql /advanced switch (dtam /sql
/advanced
does not exist on the target. This window will appear only when Application Manager is launched in
advanced mode and when there are two or more SQL instances (default plus one or more named
instance, or two or more named instances and no default instance).
The Source SQL Server Instances list will be populated with all instances that the Application Manager
can discover on the source SQL server.
1. To directly add an instance, select the server in the Source SQL Server Instances list, then
use the >> button to move it into the SQL Server Instances to Protect list.
2. To add a non-discovered instance to the SQL Server Instances to Protect list, enter the instance
name in the field next to the Add button, then click Add.
3. When you have finished adding instances, click OK to save your changes, or Cancel to return to
the Configure Protection page without saving.
), you can select which instances to protect, for example, when an instance is offline or
Failover settings
The Failover tab includes options that will be applied during SQL failover.
5 - 6
Failover type
Failover Type indicates what name resolution method will be used to redirect users to the target SQL
server in the event of a source failure. By default, DNS Failover is selected.
NOTE:For clustered environments, only DNS failover is supported.
DNS failover
DNS Failover is the recommended method for failover. Use this option if you want to failover by
updating the DNS records associated with the source. This will modify all source server A, MX, and
PTR-type DNS resource records to point to the target.
In DNS Failover, the DNS records for the source server are modified to point to the target server’s IP
address. This allows clients to resolve the source SQL server name to the target server’s network
name and IP address at failover time. DNS Failover eliminates duplicate server name and IP
addresses on your network.
After you select the DNS Failover option, click Configure. The Configure DNS Failover window will
appear.
Configure the following information for DNS failover:
1. To add additional DNS server IP addresses, type the IP address into the DNS Server field, then
click Add.
2. The list box under the DNS Server field contains all DNS IP addresses for the source and target
servers. The label after the DNS IP address indicates whether the DNS IP address belongs to the
source, target, or both.
NOTE:To remove an IP address from the DNS server list, select the IP address, then click
the Delete button.
3. In the Source IP column, select the checkbox next to the source IP address(es) to be monitored
for failover.
4. In the Target IP column, select the target IP address to be used when failover occurs.
NOTE:If the target is monitoring multiple source IP addresses for failover, each monitored
source IP address must be mapped to a unique target IP address.
5 - 7
5. To specify the value the Application Manager will establish for Time to Live (TTL) on the source’s
affected DNS records, select the Update TTL checkbox, then enter the desired update interval
(in seconds). The default is the current maximum TTL of all the source’s A records. The
recommended value is 300 seconds (5 minutes).
6. In the Username field, enter the user name that will be used to access/modify DNS records.
The login account MUST be a member of the DNSAdmins group for the domain in which the DNS
server resides. For more information about permissions, see Recommended Credentials on
page A-1.
You may enter a user name for a different domain by entering a fully-qualified user name. The
fully-qualified user name must be in the format domain\username or username@domain. If
you enter a non-qualified name, the DNS domain will be used by default. The domain name is
obtained from the DNS server name, provided that reverse lookup in DNS is enabled. For more
information about enabling reverse lookup, refer to your Microsoft documentation.
7. In the Password field, enter the password that will be used to access/modify DNS records.
8. Click the Test button to validate that DNS failover is configured correctly for the selected DNS
server(s) and that the specified credentials are sufficient to update DNS.
9. When the DNS configuration is complete, click OK to save your entries and return to the
Configure Protection window.
NOTE:
If you are running Windows Server 2000 on the primary DNS server hosting zones or
domains that contain source and/or target resource records, you must have the DNS
WMI Provider installed on that DNS server.
The Dynamic updates setting for the DNS zone should be set to Secure only.
Otherwise, you must disable dynamic registration on the source server in order to
prevent the source from reclaiming its DNS record.
If a hosts file entry for the source server exists on the client machine, errors may occur
during a failover and failback.
Reverse lookup in DNS should be enabled. For more information about enabling reverse
lookup, refer to your Microsoft documentation.
DNS registration for the private (devoted to Storage Mirroring) NIC IP should be
disabled.
If dynamic updates are enabled on a standard primary zone, the source server will be
able to update its DNS records after failover. To prevent this, configure DNS to use an
Active Directory-integrated zone.
For more information about using the DNS Failover utility, access the dfo.exe help by
typing
dfo.exe /? from a command prompt.
Identity failover
Select this option if you want to failover by transferring the source IP address and name to the target.
When using identity failover, it is possible that a name and/or IP address conflict can occur either
during failover or when the original source server comes back online. To avoid this conflict, use DNS
Failover.
NOTE:Identity failover is not supported in clustered environments.
Application Manager cannot be used for failover or failback when the Identity failover
method is selected. However, the Failover Control Center can still be used to initiate
failover. DNS failover reduces downtime and provides other benefits. It is recommended
for most environments.
In Identity Failover, the target’s physical identity is modified to match the source during a failover.
This includes the target adopting the source server’s name, primary IP address, and drive shares
during a failover. Identity failover may be required in the following situations:
Access to the domain controller or DNS server is not available (for example, due to permissions)
from the account that Storage Mirroring runs under on the source/target servers.
If you determine that the time it takes to propagate the necessary DNS or Active Directory
changes to the rest of your environment is not acceptable. The time needed to propagate these
changes depends on your Active Directory Replication and DNS server settings.
5 - 8
If you have client applications that are configured to connect to an IP address rather than a server
name.
After you select the Identity Failover option, click Configure. The Configure Identity Failover window
will appear.
Enter the following information for Identity failover:
1. In the Source IP column, select the source IP address(es) to be monitored for failover.
2. In the Target NIC column, select the target NIC to be used when failover occurs.
3. The Target IP Addresses area displays the IP address(es) of the selected target NIC.
4. Select the IP Address checkbox if you want the specified source IP address to be monitored
(Default = selected).
NOTE:If your source and target servers are on different subnets, you should NOT failover
the IP address. Instead, if the server name is required you should choose DNS failover
with the Advanced switch and select the Server Name. For more information, see
Advanced settings on page 5-22.
5. Select the Server Name checkbox if you want the source name to be added to the target when
failover occurs (Default = NOT selected).
6. Select the Shares checkbox if you want the source file shares to be added to the target when
failover occurs (Default = NOT selected).
7. Select the Active Directory Hostname (SPNs) checkbox to remove the host SPN (Service
Principle Name) from Active Directory for the source automatically and add it to Active Directory
for the target during failover (Default = NOT selected).
8. Click OK to save your entries and return to the Configure Protection window.
Services
Application Manager will determine the appropriate SQL services to start/stop based on your
operating system/SQL configuration. You should only modify this selection if there are additional
services that need to be started along with SQL during the failover/failback process.
5 - 9
Modifying the default configuration for services may affect whether data can be successfully
replicated. Do not modify the services to start/stop unless you are very familiar with Storage
Mirroring and SQL.
1. To add a service, click Add. The Add Service window will appear.
2. Select the Service name from the drop-down box, then click Add; or, type the name of a
service, then press Enter.
3. If available, select the Service must be stopped on target checkbox. Most services must be
stopped on the target for replication to occur properly.
4. When you are finished entering services, click Close to return to the Failover configuration
window.
5. To remove a service, select one or more services, then click Remove.
You can remove all of the services besides the required SQL server service (
default instance, or
6. Services will be started in the displayed order (top-to-bottom starting with the left column) and
shutdown in reverse order (bottom-to-top starting with the right column). To re-arrange the
order in which services are started/stopped:
a. Add any additional services.
b. Select a service in the list, then use the up and down arrow buttons to move the service to
the appropriate position in startup/shutdown order.
MSSQL$<instance_name> for a named instance).
MSSQLSERVER for a
Resources (cluster only)
If you are using clustered SQL servers, you will select resources instead of services to bring online
and offline during failover. The Resource selection works exactly like the service selection
functionality.
5 - 10
Monitor settings
The Monitoring tab includes options for configuring how you want to monitor the source server for
failure.
Configure how you want to monitor the source server for failure.
1. Select the Active Monitoring Enabled option to enable or disable failover for the selected
source/target pair.
2. By default, Manual Intervention Required is selected. Manual intervention allows you to
control when failover occurs. When a failure occurs, a prompt appears and waits for you to
initiate the failover process manually.
Disable Manual Intervention Required only if you want failover to occur immediately when a
failure condition is met.
3. In the Method to monitor for Failover field, select the ping method to use when monitoring
source IP addresses.
Network Access (ICMP)—Storage Mirroring failover uses ICMP pings to determine if the
source server is online. If a network device, such as a firewall or router, between the source
and target is blocking ICMP traffic, failover monitors cannot be created or used.
Replication Service (UDP)—The Storage Mirroring service on the target server sends a
ping-like UDP request to the source Storage Mirroring service, which replies immediately to
confirm it is running. This method is useful when ICMP is blocked on routers between the
source and target.
4. Configure how long to wait after a source failure to initiate failover. The amount of time before
failover begins is calculated by multiplying the Monitor Interval by the Missed Packets. For
example, if the Monitor Interval is set to 5 seconds and the Missed Packets setting is 5, a failover
condition will be identified after 25 seconds of missed source activity.
NOTE:In a cluster environment, make sure to include a cushion to account for the time it
takes for SQL to failover between nodes. Setting values too low will cause the
Application Manager to assume the source cluster has failed and will indicate that a
failover condition has been met.
a. In the Monitor Interval field, select how often the monitor should check the source
machine availability (Default = 5 seconds).
b. In the Missed Packets field, select how many monitor replies can be missed before
assuming the source machine has failed (Default = 5 missed replies).
5. If you are monitoring multiple IP addresses, select one of the Failover Trigger options.
All Monitored IP Addresses Fail—Failover begins when all monitored IP addresses fail.
One Monitored IP Address Fails—Failover begins when any of the monitored IP addresses
fail.
5 - 11
Application Monitoring (BETA)
By default, application monitor settings are not available in this release of the Storage Mirroring
Application Manager. Application monitoring is only available when you launch Application Manager
using the command line
WARNING:This feature is currently BETA and should not be used in production environments.
1. If you select the Enable Application Monitoring checkbox, the remaining fields in Application
Monitor Settings area will be enabled.
NOTE:A message box will appear, asking you to confirm that you want to use this BETA
feature. To continue, click OK.
Application monitoring is not available when dealing with a cluster.
/sql /advanced option (dtam /sql /advanced)
2. In the Monitor Interval field, enter the interval (in seconds) at which you want to check
application health.
3. In the Error Threshold field, enter the number of consecutive errors that can be received
before an error alert appears.
4. In the Type of Monitoring area, select one of the following options.
Built-in Monitoring Points—Use the default monitoring options.
Custom Script—Launch a batch file to check application health. Either type the name of the
script, or click Browse to locate a script.
NOTE:If you select Custom Script, you will also need to designate whether to use .PS1
(PowerShell) or .VB (VisualBasic) as the Script Engine. Make sure you select the
appropriate engine for your script type.
An example script that you can use as a basis for creating your custom script is
included in the \Samples subfolder where the Application Manager is installed.
5. In the Username field, enter the fully-qualified user name that will be used to run WMI scripts.
The fully-qualified user name must be in the format domain\username or
username@domain.
NOTE:The required credentials for running WMI scripts is full WMI access to the CIMV2
namespace. Under Windows 2008, the supplied credentials must also be allowed
through DCOM and User Access Control. It is recommended that a group be created
for running scripts, and that the required permissions be given to the group.
By default, the administrative group of a Windows 2008 machine has full WMI access.
However, DCOM and User Access Control settings may need to be adjusted.
6. In the Password field, enter the password for the specified user account.
7. Click the Test button to validate that the specified credentials are sufficient to run WMI scripts.
5 - 12
8. (Optional) Click the Clear Cached Credentials button to clear the cached user name and
password.
Snapshot settings
The following allow you to set up snapshots of your target data that can be used when failing over.
By default, snapshots are not enabled in the Application Manager.
1. To enable snapshots, select the Enable periodic snapshots checkbox. This will enable the
remaining controls.
2. In the Snapshot interval field, select the interval at which you want to perform snapshots (in
minutes). The minimum interval is 15 minutes.
3. Select one of the following options for when to begin collecting snapshots:
Start now—Select this option to take the first snapshot as soon as protection is enabled.
Start at—Select this option to start taking snapshots at a future time. If you select this option,
you will also need to enter a date and time.
4. When you are finished, click OK.
5 - 13
Connection settings
The Connection tab includes options that will be applied to the specified source/target connection.
Route
This setting identifies the Target IP Address that the Storage Mirroring data will be transmitted
through. You should only change this setting if you want to select a different route for Storage
Mirroring traffic. On a machine with more than one NIC, this increases the flexibility of configuring
Storage Mirroring activity. For example, you can separate regular network traffic and Storage
Mirroring traffic on a machine. The default ports will be used.
In a cluster, the route should be set to the name of the SQL dependent IP address.
Protected Databases
For SQL, you can select one of the following protection modes:
SQL instance (default)
Database only
Database only mode, many-to-one configurations
SQL instance (default)
Select SQL Instance protection mode to replicate all of the SQL program and data files (except the
\binn directory) to the target SQL server. This will allow the clients to access your production SQL
Server data and functionality on the target in the event of a failure.
5 - 14
SQL Instance protection mode requires that the source and target servers both have the exact same
version of SQL (major and minor versions) as well as similar logical drive structures (the target must
have at least the same logical drives as the source where SQL program and data files are stored).
Certain user databases can be de-selected, but the System databases (except for
tempdb) are
required.
NOTE:
If you are protecting SQL named instances, both the source and target SQL Servers
must have named instances with the exact same name installed prior to configuring
protection.
When using named instances, all named instances will appear in the Protected
Databases area. You can either de-select an entire instance, or select specific
databases within each instance.
By default, the TcpPort on the source named instance will be different than the
TcpPort on the target named instance. However, the Application Manager will still be
able to work and there is no need for any additional configuration.
If you need to reduce the amount of mirroring and replication traffic, you may choose
to deselect the tempdb database if it is not necessary.
You can also select non-application specific data under the Volumes folder.
NOTE:If Override Generated Rules is selected on the Advanced tab, this control will be
disabled.
To refresh the tree view to show new source directories or files that may have been added or
removed, select the logical node, then click the Refresh button. If a node in the volumes branch is
selected, then the items under that node will be refreshed.
Database only
The Database Only mode is intended for advanced users only.
Select Database Only protection mode to replicate only the
target server. The selected database(s) will be attached to the target SQL Server upon failover,
allowing clients to access the underlying data.
You can also select non-application specific data under the Volumes folder.
.mdf, .ldf, and .ndf files to the
NOTE:If Override Generated Rules is selected on the Advanced tab, this control will be
disabled.
To refresh the tree view to show new source directories or files that may have been added or
removed, select the logical node, then click the Refresh button. If a node in the volumes branch is
selected, then the items under that node will be refreshed.
During the configuration and validation process, you will have the opportunity to transfer user logins
and permissions (both server and database-level) and certain SQL Server registry and configuration
settings to the target server. This will allow users to access the data associated with the selected
database(s), but no other server-level functionality will be transferred to the target server (including
but not limited to Job Server configuration, Full-Text service configuration, SQL Replication
configuration, linked servers, remote servers, backup devices).
NOTE:When using Database Only mode, any SQL Server replication configured on the protected
databases must be configured by the administrator on the target after failover.
5 - 15
If you select Database Only protection mode, you can select a non-system database and map it to a
unique path on the target.
NOTE:You must first select the database in order for the Target Path commands to be visible.
1. Select the database you want to re-map, then click the ellipse button. The Choose a Target
Folder window will appear.
2. Enter the desired path in the Target Path field, then click OK.
NOTE:The target database must be either offline or detached from the target before you can
enable protection in the Application Manager. The validation test will detect if the
target database is still online. Clicking Fix will detach that database on the target.
5 - 16
3. To confirm the new path, click Apply.
NOTE:If Database-Only protection mode is used to protect SQL Server, attempting to attach
a replicated SQL database on the target server after failover can fail when done
outside of the Application Manager.
The Storage Mirroring service account (typically the target's LocalSystem account) is
the account used to attach/detach databases on failover/failback. When the database
is detached by the failback script, the Storage Mirroring service account becomes the
owner of those files that make up the database (*.mdf, *.ldf, etc.), and any attempts
to manually attach the database may fail if the user account does not yet have NTFS
permissions to access the physical files.
To change the permissions on an individual file, perform these steps on each file that
is part of the database's file list.
1. In Windows Explorer, select the folder that contains the physical files for the
database that needs to be manually attached.
2. Right-click, then select Properties.
3. Select the Security tab.
4. Determine if the user account has NTFS permissions for that folder.
5. If the user account does not have specific or inherited permissions, click the Add
button.
6. Enter the user account name (such as domain\administrator).
7. After the user account has been added, give the account the necessary
permissions to the folder (Full Control).
8. Make sure that the subfolders and files are set to inherit these rights, then click
OK.
Database only mode, many-to-one configurations
The following examples describe the SQL many-to-one configurations that can be protected using
Application Manager.
Example 1: If you have two SQL servers (
default instance installed, you can protect databases from both servers' default instance, provided
that the database names are unique.
Case 1: Both source servers’ default instances have a database named “Accounting”. You can
only protect/failover one server's copy of the database (because SQL on the target will not allow
you to attach more than one copy of the same-named database).
NOTE:If you select and setup both servers’ default instances for protection and both source
servers fail, the “Accounting” database on the first source server to be failed over will
be attached. The second server to failover will not be able to attach its “Accounting”
database.
Case 2: If
“Accounting2”, then you can protect and failover the database on both servers without any
issues.
NOTE:All database filenames (
Source1 has a database named “Accounting1”, and Source2 has a database named
Uniquely named (for example, accounting1.mdf and accounting2.mdf), or
Uniquely located on the target (for example,
c:\Source1\accounting1\accounting.mdf and
c:\Source2\accounting2\accounting.mdf).
Source1 and Source2) where each server has only the
*.mdf, *.ldf, and *.ndf) must either be:
Example 2: If you have two SQL servers (
instance installed (for example,
protect databases from both servers if the target has at least those two instances installed
(
Target1\instance1 and Target1\instance2).
Source3\instance1 and Source4\instance2), you can
Source3 and Source4) where each has a named
5 - 17
Case: Both source SQL servers have a database named “Accounting”
(
Source3\instance1|Accounting and Source4\instance2|Accounting). You can
protect and failover each SQL server’s copy of the database without any issue.
NOTE:All the database filenames (
Uniquely named (for example, accounting1.mdf and accounting2.mdf), or
Uniquely located on the target (for example,
*.mdf, *.ldf, and *.ndf) must either be:
c:\Source3\accounting1\accounting1.mdf and
c:\Source4\accounting2\accounting2.mdf)
Mirror type
The following options specify what files you want sent from the source to the target during a mirror.
Full—Copies all of the directories and files in the replication set to the target machine. If a mirror
has already been completed, another full mirror will overwrite the data on the target.
Checksum—(Default) This option performs a checksum comparison calculation. A checksum
calculation is a formula applied to blocks of data to determine if the binary make-up of the block
is identical. If the checksums on the source and target machine are the same, the block is skipped.
If the checksums on the source and target machine are not the same, the block on the source is
sent to the target. With this option, the entire file is not overwritten; only the block that is received
from the source is overwritten.
NOTE:The Mirror type setting also applies to the restoration connection.
Enable compression
This setting enables compression of data that is transmitted from the source to the target. Significant
improvements in bandwidth utilization have been seen in Wide Area Network (WAN) configurations
or in any case where network bandwidth is a constraint.
Compression may be used in Local Area Network (LAN) configurations, though it may not provide any
significant network improvements.
You can specify compression for different source/target connections, but all connections to the same
target will have the same compression settings.
By default, compression is disabled. To enable it, select Enable Compression, then set the level
from minimum to maximum compression.
5 - 18
Advanced settings
The Advanced tab includes advanced configuration options.
Replication set rules
A replication set defines what directories/files are to be protected by Storage Mirroring. By default,
Application Manager selects all of the necessary directories/files to protect SQL based on your source
server configuration. These include the SQL application data and transaction logs, tempdb files, and
SQL error logs. By default, the Application Manager-generated replication set will be named
sqldag01_<source server name>_<target server name>
You should only modify the replication set rules if there are additional directories/files specific to your
configuration that must also be protected with SQL. Modifying the default configuration for replication
set rules may affect whether data can be successfully replicated. Do not modify the replication set
unless you are very familiar with Storage Mirroring and SQL.
To change the replication set rules:
1. Select the Override Generated Rules checkbox.
NOTE:When this box is selected, the Protected Databases control on the Connection tab will
be disabled. For more information, see Protected Databases on page 5-14.
2. To add a replication set rule, click Add. The Add Repset Rule dialog box will appear.
.
3. In the Rule Path field, type the directory that you want to protect or exclude.
4. In the Include/Exclude area, select whether to include or exclude the path from the replication
set.
5 - 19
5. In the Recursive area, select whether the directory should be recursive (protecting all
sub-folders under the directory) or non-recursive (protecting only the files in the directory).
6. Click Add.
7. When you have entered all of your replication set rules, click Close to return to the Advanced
configuration tab.
NOTE:You will need to manually verify that the rule path is correct since the Application
Manager does not validate rule paths.
8. To remove a rule, select one or more rules, then click Remove.
NOTE:Removing rules that were automatically added by Application Manager could impact
the success of failover. Any changes to rules should be thoroughly tested.
9. To reset the rules to the auto-generated rules and to re-enable the Protected Databases control,
remove the selection from the Override Generated Rules checkbox.
Failover/failback scripts
Scripts are executed at different points during the failover/failback process to perform the actions
necessary to make SQL available on the appropriate server. Scripts perform steps such as
starting/stopping services, attaching/detaching databases in database-only protection mode, and
modifying DNS entries on the DNS server to point users to the appropriate server.
Editing scripts is an advanced feature. Do not edit scripts unless you fully understand what each
command is doing.
Scripts are automatically generated by Application Manager during configuration. The scripts are
copied to the Storage Mirroring installation directory on the specified server using the administrative
share for that server’s drive.
ScriptFile nameDescription
Failoverpost_failover_sql.txt A post-failover script is executed after the
core failover processes have completed on
the target server. The primary functions of
the post-failover script are to start the
services on the target and to modify DNS
and Active Directory entries as necessary.
Failbackpre_failback_sql.txt A pre-failback script is executed before
failback processing occurs on the target
server. The primary functions of this script
are to stop services on the target and to
move DNS and Active Directory entries as
necessary.
Restorepost_restore_sql.txt A post-restore script is not executed
automatically, though it is provided on the
source to perform actions that are generally
required after data has been restored from
the target to source after a failover/failback.
The primary function of this script is to
restart services on the source server.
By default, Application Manager generates all the required scripts for you automatically based on your
system configuration. You can also edit the scripts to add, modify, or delete specific commands. To
edit a script:
1. Click on the button for the script you want to update. The script file will be displayed using your
machine’s default editor.
2. Enter your changes.
3. Save the script file.
5 - 20
Any change you make to the script in the editor will be copied to the appropriate server when
configuration changes are accepted, thus overwriting any changes that have been made outside the
Application Manager.
The scripts can be overwritten by certain operations during setup. For example, any changes to
configuration options done in the Application Manager will overwrite previous script changes. If you want to make permanent changes to a script, you must modify the appropriate .txt file within
the Application Manager installation directory. If there is more than one client machine that will be
configuring failover, the change must be made to all the appropriate .txt files.
Before running Application Manager multiple times (for example, when re-enabling protection after a
failover/failback), save a copy of your post-restore and pre-failback batch files. After Application
Manager executes, replace the default script file(s) with the customized file(s) that you saved.
Items to failover
Select the items to failover.
1. Select the Server Name checkbox if you want the source name to be added to the target when
failover occurs (Default = NOT selected).
2. Select the Shares checkbox if you want the source file shares to be added to the target when
failover occurs (Default = NOT selected).
3. Select the Active Directory Hostname (SPNs) checkbox if you want to remove the host SPN
(Service Principle Name) automatically from Active Directory for the source and add it to Active
Directory for the target during failover (Default = NOT selected).
NOTE:If you are using Active Directory, you should enable this option. Otherwise, you may
experience problems with failover.
5 - 21
Advanced settings
The following options allow you to control what functions Application Manager will perform during
configuration. By default, Application Manager performs all of these functions. Individual functions
should only be disabled for testing or debugging purposes.
NOTE:These options are only available when you launch Application Manager using the
command line
/sql /advanced option (dtam /sql /advanced).
1. Select the Create Replication Set checkbox to automatically create a replication set that
includes all of the necessary directories/files that must be protected for your specific
configuration. This should only be disabled if you have customized your replication set and do
not want to overwrite it (Default = selected).
2. Select the Create Failover Scripts checkbox to automatically generate the failover/failback
scripts and copy them to the appropriate server. This should be disabled only if you have
customized your script files and do not want them to be overwritten (Default = selected).
3. Select the Create Connection checkbox to create the connection between the source and
target using the automatically-generated replication set. This should only be disabled if you
would like to verify the replication set that is created by Application Manager prior to connection
(Default = selected).
4. Select the Create Failover Monitor checkbox to create a failover monitor on the target to
monitor the source for failure. This monitor will use the failover parameters specified during
configuration as well as the script files that have been created (Default = selected).
Saving configuration changes
After you have changed the configuration parameters, click OK to apply the settings. If you click
Cancel, any changes you have made will be discarded and the previous configuration parameters will
be used.
5 - 22
When you have finished configuring the optional protection options, continue with Validate the
Configuration on page 9-1.
NOTE:If you close the Application Manager prior to enabling protection, your changes will not
be saved. You must enable protection in order to save your configuration settings for a
source/target pair.
If you modify your configuration on the source server (such as adding a new storage
group or database to a directory that was not included in the replication set), you must
disable protection, run validation and fix any issues, then re-enable protection to apply
the changes to the Application Manager replication set.
5 - 23
Protecting a File
Server
To configure protection for your file servers using Application Manager, you will complete the
following steps:
1. Install Storage Mirroring on the source and target file servers. See the Storage Mirroring Getting
Started guide for more information.
2. Install the Application Manager on page 2-1
3. Select a task on page 6-1
4. Select a domain on page 6-2
5. Select source and target servers on page 6-3
6. (Optional) Configure protection settings on page 6-5
7. Validate the Configuration on page 9-1
To protect your file server, you will complete the following steps:
1. Enable protection on page 10-1
2. Monitor protection status on page 10-2
In the event of a failure, you will need to perform some additional tasks. These tasks are described
in Failover, Failback, and Restoration on page 11-1.
Select a task
To protect a File server, open the Application Manager (Start, Programs, Storage Mirroring,
Application Manager), then on the Tasks area on the left pane, select Protect File Server. The
Manage File Server page will appear in the right pane. Make sure that the Setup tab is in view.
NOTE:You can also launch Application Manager for File Servers by using the command line
/fileprint option (dtam /fileprint).
6 - 1
Select a domain
The Domain Name on the main window will be populated automatically with the domain where the
Application Manager client resides.
If you want to change the domain, type in a domain name for a trusted domain that the Application
Manager client can connect to, then press Tab or click on another field. If the domain you entered
doesn’t exist or you do not have the credentials to modify Active Directory for the new domain, the
Domain Login window will appear. You will be prompted to enter the domain name, user name, and
password to use for logging in to the domain.
NOTE:Domain names must include a suffix, such as
The user account should have administrator permissions. For more information about configuring
permissions, see Recommended Credentials on page A-1.
You may enter a user name for a different domain by entering a fully-qualified user name. The
fully-qualified user name must be in the format NetBIOS domain name\username or username.
If you enter a non-qualified name, the default domain will be used.
6 - 2
.com, .corp, or .net.
Select source and target servers
Click the Advanced Find button to add servers to the Source Server and Target Server fields. For
more information, see Add or manage servers on page 6-4.
If you select a source/target pair for which you have previously enabled and disabled protection, you
may use the existing configuration settings (provided that the source/target connection is not
currently active, in which case the existing settings will always be use d) . W hen you select Configure
or Validate, a prompt will appear asking if you want to re-use the previous configuration information.
Click Yes to re-use the previous information, or click No to revert to the Application Manager default
settings.
NOTE:If the IP address(es) for the source or target server have changed since you originally
configured protection (for example, if you configure the source or target in a staging area
and then send it to a production location), you must re-configure the protection settings.
When you are prompted to re-use the previous protection configuration, click No, then
click the Configure Protection button.
1. In the Source Server field, select the File server that you want to protect. If this is your first
time to log in to the selected server, you will be prompted to enter server login information. For
more information about logging in to servers, see Enter server login information on
page 6-4.
NOTE:You cannot protect a server if it is already functioning as a target server.
If you attempt to select a source that is currently unavailable, a prompt will appear
stating that the source is not available and that if the source is failed over, you should
first select the target.
If you select the target, then select the source (as recommended in the prompt), the
same prompt appears (though you would expect to get a prompt to failover). The
ability to failover using the Application Manager will not be available until a failover
condition has been met in accordance with the failover monitor settings set on the
Monitoring tab.
2. In the Target Server field, select the backup File server that will protect the source server in
the event of a failure.
NOTE:In a parent/child configuration, you will need to click Advanced Find and manually add
the target server. The Application Manager only searches the root domain (or domain
entered in Domain Name) and since the target server is in a child domain, it will not
be auto discovered.
Notice that after the source and target servers are selected, the Protection Status on the Monitor tab
changes to Unprotected.
NOTE:If you first select a target that is monitoring a connection that has met a failover condition
and requires manual intervention, then select the protected source server, a prompt will
appear asking if you want to initiate failover.
6 - 3
Add or manage servers
If the servers you need do not appear, click the Advanced Find button. The Manage Servers window
will appear.
To discover all servers in the domain:
1. Click the Search button. The Discovered Servers list will be populated with all servers that the
Application Manager can discover that reside in the domain.
2. To directly add a server to the drop-down list on the Manage File Server main page, select the
server in the Discovered Servers list, then use the >> button to move it into the Current
Servers list.
3. To add a non-discovered server to the Current Servers list, enter the server name in the field
next to the Add button, then click Add.
4. After a server has been added to the Current Servers list, you can click the Remove button to
remove the selected server from the drop-down list on the Manage File Server main page.
5. When you have finished adding servers, click OK to save your changes, or Cancel to return to
the Manage File Server main page without saving.
Enter server login information
After you select a server for the first time, you will be prompted to enter a user name and password
to use for logging in to the selected server. The login account MUST be a member of the Storage
Mirroring Admin local security group for the selected server. For more information about required
account permissions, see Recommended Credentials on page A-1.
You may enter a user name for a different domain by entering a fully-qualified user name. The
fully-qualified user name must be in the format domain\username or username@domain. If you
enter a non-qualified name, the DNS domain will be used by default. Entering the credentials for the
logged-on user may be valid.
The Application Manager will attempt to use the same user name and password the next time you
select a server.
6 - 4
Configure protection settings
If you do not need to change the configuration settings, continue with Validate the Configuration
on page 9-1.
If you have already enabled protection for a connection and need to change the configuration
parameters, you will first need to disable protection as described in Disable protection on
page 10-2.
To change the default configuration parameters, click Configure from the main Application Manager
window, or select Actions, Configure Protection from the menu. The Configure Protection window
will appear.
The Configure Protection window has tabs for configuring failover, connection, and advanced settings.
The following sections describe the options on each of these tabs.
Failover settings
The Failover tab includes options that will be applied during File server failover.
Failover type
Failover Type indicates what name resolution method will be used to redirect users to the target File
server in the event of a source failure. By default, DNS Failover is selected.
DNS failover
DNS Failover is the recommended method for failover. Use this option if you want to failover by
updating the DNS records associated with the source. This will modify all source server A, MX, and
PTR-type DNS resource records to point to the target.
In DNS Failover, the DNS records for the source server are modified to point to the target server’s IP
address. This allows clients to resolve the source File server name to the target server’s network
name and IP address at failover time. DNS Failover eliminates duplicate server name and IP
addresses on your network.
6 - 5
After you select the DNS Failover option, click Configure. The Configure DNS Failover window will
appear.
Configure the following information for DNS failover:
1. To add additional DNS server IP addresses, type the IP address into the DNS Server field, then
click Add.
2. The list box under the DNS Server field contains all DNS IP addresses for the source and target
servers. The label after the DNS IP address indicates whether the DNS IP address belongs to the
source, target, or both.
NOTE:To remove an IP address from the DNS server list, select the IP address, then click
the Delete button.
3. In the Source IP column, select the checkbox next to the source IP address(es) to be monitored
for failover.
4. In the Target IP column, select the target IP address to be used when failover occurs.
NOTE:If the target is monitoring multiple source IP addresses for failover, each monitored
source IP address must be mapped to a unique target IP address.
5. To specify the value the Application Manager will establish for Time to Live (TTL) on the source’s
affected DNS records, select the Update TTL checkbox, then enter the desired update interval
(in seconds). The default is the current maximum TTL of all the source’s A records. The
recommended value is 300 seconds (5 minutes).
6. In the Username field, enter the user name that will be used to access/modify DNS records.
The login account MUST be a member of the DNSAdmins group for the domain in which the DNS
server resides. For more information about required account permissions, see Recommended
Credentials on page A-1.
You may enter a user name for a different domain by entering a fully-qualified user name. The
fully-qualified user name must be in the format domain\username or username@domain. If
you enter a non-qualified name, the DNS domain will be used by default. The domain name is
obtained from the DNS server name, provided that reverse lookup in DNS is enabled. For more
information about enabling reverse lookup, refer to your Microsoft documentation.
7. In the Password field, enter the password that will be used to access/modify DNS records.
6 - 6
8. Click the Test button to validate that DNS failover is configured correctly for the selected DNS
server(s) and that the specified credentials are sufficient to update DNS.
9. When the DNS configuration is complete, click OK to save your entries and return to the
Configure Protection window.
NOTE:
If you are running Windows Server 2000 on the primary DNS server hosting zones or
domains that contain source and/or target resource records, you must have the DNS
WMI Provider installed on that DNS server.
The Dynamic updates setting for the DNS zone should be set to Secure only.
Otherwise, you must disable dynamic registration on the source server in order to
prevent the source from reclaiming its DNS record.
If a hosts file entry for the source server exists on the client machine, errors may occur
during a failover and failback.
Reverse lookup in DNS should be enabled. For more information about enabling reverse
lookup, refer to your Microsoft documentation.
DNS registration for the private (devoted to Storage Mirroring) NIC IP should be
disabled.
If dynamic updates are enabled on a standard primary zone, the source server will be
able to update its DNS records after failover. To prevent this, configure DNS to use an
Active Directory-integrated zone.
For more information about using the DNS Failover utility, access the dfo.exe help by
typing
dfo.exe /? from a command prompt.
Identity failover
Select this option if you want to failover by transferring the source IP address and name to the target.
When using identity failover, it is possible that a name and/or IP address conflict can occur either
during failover or when the original source server comes back online. To avoid this conflict, use DNS
Failover.
NOTE:Application Manager cannot be used for failover or failback when the Identity failover
method is selected. However, the Failover Control Center can still be used to initiate
failover. DNS failover reduces downtime and provides other benefits. It is recommended
for most environments.
In Identity Failover, the target’s physical identity is modified to match the source during a failover.
This includes the target adopting the source server’s name, primary IP address, and drive shares
during a failover. Identity failover may be required in the following situations:
Access to the domain controller or DNS server is not available (for example, due to permissions)
from the account that Storage Mirroring runs under on the source/target servers.
If you determine that the time it takes to propagate the necessary DNS or Active Directory
changes to the rest of your environment is not acceptable. The time needed to propagate these
changes depends on your Active Directory Replication and DNS server settings.
If you have client applications that are configured to connect to an IP address rather than a server
name.
6 - 7
After you select the Identity Failover option, click Configure. The Configure Identity Failover window
will appear.
Enter the following information for Identity failover:
1. In the Source IP column, select the source IP address(es) to be monitored for failover.
2. In the Target NIC column, select the target NIC to be used when failover occurs.
3. The Target IP Addresses area displays the IP address(es) of the selected target NIC.
4. Select the IP Address checkbox if you want the specified source IP address to be monitored
(Default = selected).
NOTE:If your source and target servers are on different subnets, you should NOT failover
the IP address. Instead, if the server name is required you should choose DNS failover
with the Advanced switch and select the Server Name. For more information, see
Advanced settings on page 6-15.
5. Select the Server Name checkbox if you want the source name to be added to the target when
failover occurs (Default = selected).
6. Select the Shares checkbox if you want the source file shares to be added to the target when
failover occurs (Default = selected).
7. Select the Active Directory Hostname (SPNs) checkbox to remove the host SPN (Service
Principle Name) from Active Directory for the source automatically and add it to Active Directory
for the target during failover (Default = selected).
8. Click OK to save your entries and return to the Configure Protection window.
Services
Application Manager will determine the appropriate services to start/stop based on your system
configuration. You should only modify this selection if there are additional services that need to be
started during the failover/failback process.
6 - 8
Modifying the default configuration for services may affect whether data can be successfully
replicated. Do not modify the services to start/stop unless you are very familiar with Storage
Mirroring and the applications running on your server.
1. To add a service, click Add. The Add Service window will appear.
2. Select the Service name from the drop-down box, then click Add; or, type the name of a
service, then press Enter.
3. If available, select the Service must be stopped on target checkbox. Most services must be
stopped on the target for replication to occur properly.
4. When you are finished entering services, click Close to return to the Failover configuration
window.
5. To remove a service, select one or more services, then click Remove.
You can only remove services that you added manually using the Application Manager.
6. Services will be started in the displayed order (top-to-bottom starting with the left column) and
shutdown in reverse order (bottom-to-top starting with the right column). To re-arrange the
order in which services are started/stopped:
a. Add any additional services.
b. Select a service in the list, then use the up and down arrow buttons to move the service to
the appropriate position in startup/shutdown order.
Monitor settings
The Monitoring tab includes options for configuring how you want to monitor the source server for
failure.
Configure how you want to monitor the source server for failure.
1. Select the Active Monitoring Enabled option to enable or disable failover for the selected
source/target pair.
2. By default, Manual Intervention Required is selected. Manual intervention allows you to
control when failover occurs. When a failure occurs, a prompt appears and waits for you to
initiate the failover process manually.
Disable Manual Intervention Required only if you want failover to occur immediately when a
failure condition is met.
3. In the Method to monitor for Failover field, select the ping method to use when monitoring
source IP addresses.
6 - 9
Network Access (ICMP)—Storage Mirroring failover uses ICMP pings to determine if the
source server is online. If a network device, such as a firewall or router, between the source
and target is blocking ICMP traffic, failover monitors cannot be created or used.
Replication Service (UDP)—The Storage Mirroring service on the target server sends a
ping-like UDP request to the source Storage Mirroring service, which replies immediately to
confirm it is running. This method is useful when ICMP is blocked on routers between the
source and target.
4. Configure how long to wait after a source failure to initiate failover. The amount of time before
failover begins is calculated by multiplying the Monitor Interval by the Missed Packets. For
example, if the Monitor Interval is set to 5 seconds and the Missed Packets setting is 5, a failover
condition will be identified after 25 seconds of missed source activity.
a. In the Monitor Interval field, select how often the monitor should check the source
machine availability (Default = 5 seconds).
b. In the Missed Packets field, select how many monitor replies can be missed before
assuming the source machine has failed (Default = 5 missed replies).
5. If you are monitoring multiple IP addresses, select one of the Failover Trigger options.
All Monitored IP Addresses Fail—Failover begins when all monitored IP addresses fail.
One Monitored IP Address Fails—Failover begins when any of the monitored IP addresses
fail.
Snapshot settings
The following allow you to set up snapshots of your target data that can be used when failing over.
By default, snapshots are not enabled in the Application Manager.
1. To enable snapshots, select the Enable periodic snapshots checkbox. This will enable the
remaining controls.
2. In the Snapshot interval field, select the interval at which you want to perform snapshots (in
minutes). The minimum interval is 15 minutes.
3. Select one of the following options for when to begin collecting snapshots:
Start now—Select this option to take the first snapshot as soon as protection is enabled.
Start at—Select this option to start taking snapshots at a future time. If you select this option,
you will also need to enter a date and time.
4. When you are finished, click OK.
6 - 10
Connection settings
The Connection tab includes options that will be applied to the specified source/target connection.
Route
This setting identifies the Target IP Address that the Storage Mirroring data will be transmitted
through. You should only change this setting if you want to select a different route for Storage
Mirroring traffic. On a machine with more than one NIC, this increases the flexibility of configuring
Storage Mirroring activity. For example, you can separate regular network traffic and Storage
Mirroring traffic on a machine. The default ports will be used.
File Shares
By default, all non-administrative file shares are selected. You can add other data that you want to
protect by selecting the checkbox next to it in the tree view.
NOTE:On a domain controller, you cannot protect the NETLOGON and SYSVOL shares and they
will not be visible in the File Shares tree.
You can also select non-application specific data under the Volumes folder.
NOTE:If Override Generated Rules is selected on the Advanced tab, this control will be
disabled.
To refresh the tree view to show new source directories or files that may have been added or
removed, select the logical node, then click the Refresh button. If a node in the volumes branch is
selected, then the items under that node will be refreshed.
Mirror type
The following options specify what files you want sent from the source to the target during a mirror.
Full—Copies all of the directories and files in the replication set to the target machine. If a mirror
has already been completed, another full mirror will overwrite the data on the target.
6 - 11
Checksum—(Default) This option performs a checksum comparison calculation. A checksum
calculation is a formula applied to blocks of data to determine if the binary make-up of the block
is identical. If the checksums on the source and target machine are the same, the block is skipped.
If the checksums on the source and target machine are not the same, the block on the source is
sent to the target. With this option, the entire file is not overwritten; only the block that is received
from the source is overwritten.
NOTE:The Mirror type setting also applies to the restoration connection.
Enable compression
This setting enables compression of data that is transmitted from the source to the target. Significant
improvements in bandwidth utilization have been seen in Wide Area Network (WAN) configurations
or in any case where network bandwidth is a constraint.
Compression may be used in Local Area Network (LAN) configurations, though it may not provide any
significant network improvements.
You can specify compression for different source/target connections, but all connections to the same
target will have the same compression settings.
By default, compression is disabled. To enable it, select Enable Compression, then set the level
from minimum to maximum compression.
Advanced settings
The Advanced tab includes advanced configuration options.
Replication set rules
A replication set defines what directories/files are to be protected by Storage Mirroring. By default,
Application Manager selects all of the necessary directories/files to protect the file server based on
your source server configuration. These include all non-administrative file shares. By default, the
Application Manager-generated replication set will be named
name>_<target server name>
You should only modify the replication set rules if there are additional directories/files specific to your
configuration that must also be protected. Modifying the default configuration for replication set rules
may affect whether data can be successfully replicated. Do not modify the replication set unless you
are very familiar with Storage Mirroring.
.
6 - 12
fileprint_<source server
To change the replication set rules:
1. Select the Override Generated Rules checkbox.
NOTE:When this box is selected, the File Shares control on the Connection tab will be
disabled. For more information, see File Shares on page 6-11.
2. To add a replication set rule, click Add. The Add Repset Rule dialog box will appear.
3. In the Rule Path field, type the directory that you want to protect or exclude.
4. In the Include/Exclude area, select whether to include or exclude the path from the replication
set.
5. In the Recursive area, select whether the directory should be recursive (protecting all
sub-folders under the directory) or non-recursive (protecting only the files in the directory).
6. Click Add.
7. When you have entered all of your replication set rules, click Close to return to the Advanced
configuration tab.
NOTE:You will need to manually verify that the rule path is correct since the Application
Manager does not validate rule paths.
8. To remove a rule, select one or more rules, then click Remove.
NOTE:Removing rules that were automatically added by Application Manager could impact
the success of failover. Any changes to rules should be thoroughly tested.
9. To reset the rules to the auto-generated rules and to re-enable the File Shares control, remove
the selection from the Override Generated Rules checkbox.
Failover/failback scripts
Scripts are executed at different points during the failover/failback process to perform the actions
necessary to make the file shares available on the appropriate server.
Editing scripts is an advanced feature. Do not edit scripts unless you fully understand what each
command is doing.
6 - 13
Scripts are automatically generated by Application Manager during configuration. The scripts are
copied to the Storage Mirroring installation directory on the specified server using the administrative
share for that server’s drive.
ScriptFile nameDescription
Failoverpost_failover_FilePrint.txt A post-failover script is executed after the
Failbackpre_failback_FilePrint.txt A pre-failback script is executed before
Restorepost_restore_FilePrint.txt A post-restore script is not executed
Post-failbackpost_failback_FilePrint.txtA post-failback script is executed on the
core failover processes have completed on
the target server. The primary functions of
the post-failover script are to start the
services on the target and to modify DNS
and Active Directory entries as necessary.
failback processing occurs on the target
server. The primary functions of this script
are to stop services on the target and to
move DNS and Active Directory entries as
necessary.
automatically, though it is provided on the
source to perform actions that are generally
required after data has been restored from
the target to source after a failover/failback.
The primary function of this script is to
restart services on the source server.
target before the post-restore script runs.
The primary function of this script is to
re-start the Server service and all dependent
services on the source in order to refresh
client connections.
By default, Application Manager generates all the required scripts for you automatically based on your
system configuration. You can also edit the scripts to add, modify, or delete specific commands. To
edit a script:
1. Click on the button for the script you want to update. The script file will be displayed using your
machine’s default editor.
2. Enter your changes.
3. Save the script file.
Any change you make to the script in the editor will be copied to the appropriate server when
configuration changes are accepted, thus overwriting any changes that have been made outside the
Application Manager.
The scripts can be overwritten by certain operations during setup. For example, any changes to
configuration options done in the Application Manager will overwrite previous script changes. If you want to make permanent changes to a script, you must modify the appropriate .txt file within
the Application Manager installation directory. If there is more than one client machine that will be
configuring failover, the change must be made to all the appropriate .txt files.
Before running Application Manager multiple times (for example, when re-enabling protection after a
failover/failback), save a copy of your post-restore and pre-failback batch files. After Application
Manager executes, replace the default script file(s) with the customized file(s) that you saved.
Items to failover
Select the items to failover.
1. Select the Server Name checkbox if you want the source name to be added to the target when
failover occurs (Default = selected).
2. Select the Shares checkbox if you want the source file shares to be added to the target when
failover occurs (Default = selected).
6 - 14
3. Select the Active Directory Hostname (SPNs) checkbox if you want to remove the host SPN
(Service Principle Name) automatically from Active Directory for the source and add it to Active
Directory for the target during failover (Default = selected).
NOTE:If you are using Active Directory, you should enable this option. Otherwise, you may
experience problems with failover.
Advanced settings
The following options allow you to control what functions Application Manager will perform during
configuration. By default, Application Manager performs all of these functions. Individual functions
should only be disabled for testing or debugging purposes.
NOTE:These options are only available when you launch Application Manager using the
command line
1. Select the Create Replication Set checkbox to automatically create a replication set that
includes all of the necessary directories/files that must be protected for your specific
configuration. This should only be disabled if you have customized your replication set and do
not want to overwrite it (Default = selected).
2. Select the Create Failover Scripts checkbox to automatically generate the failover/failback
scripts and copy them to the appropriate server. This should be disabled only if you have
customized your script files and do not want them to be overwritten (Default = selected).
3. Select the Create Connection checkbox to create the connection between the source and
target using the automatically-generated replication set. This should only be disabled if you
would like to verify the replication set that is created by Application Manager prior to connection
(Default = selected).
4. Select the Create Failover Monitor checkbox to create a failover monitor on the target to
monitor the source for failure. This monitor will use the failover parameters specified during
configuration as well as the script files that have been created (Default = selected).
After you have changed the configuration parameters, click OK to apply the settings. If you click
Cancel, any changes you have made will be discarded and the previous configuration parameters will
be used.
6 - 15
When you have finished configuring the optional protection options, continue with Validate the
Configuration on page 9-1.
NOTE:If you close the Application Manager prior to enabling protection, your changes will not
be saved. You must enable protection in order to save your configuration settings for a
source/target pair.
If you modify your configuration on the source server (such as adding a new storage
group or database), you must disable protection, run validation and fix any issues, then
re-enable protection to apply the changes to the Application Manager replication set.
6 - 16
Protecting a
Source
Microsoft SQL Server (default or named instance)
Storage Mirroring
Internet Information Services
Microsoft SQL Server (default or named instance)
Storage Mirroring
Targe t
Source
Internet Information Services
database server
front-end
database server
and
front-end
WSS 3.0 or MOSS 2007
WSS 3.0 or MOSS 2007
web server
web server
SharePoint Server
The SharePoint databases will be protected by default and the Application Manager can be used to
extend the target web front-end into the source SharePoint configuration.
To configure protection for your SharePoint servers using Application Manager, you will complete the
following steps:
1. Configure each source as a Windows member server.
2. Install Microsoft SQL Server on each source that will be used as a back-end server.
NOTE:For SQL Server 2000, Microsoft recommends that all service packs be installed
independently for each source and target instance. This ensures that operating
system files and registry entries are applied appropriately.
3. Install and configure Windows SharePoint Services (WSS 3.0) or Microsoft Office SharePoint
Server (MOSS 2007) on each source that will be used as a front-end server, according to
Microsoft guidelines.
4. Configure each Windows 2003 target as a member server in the same Active Directory
or trusted domain environment as the source.
5. Install SQL on the target, verifying that the locations for the SQL installation and the location of
the data and log files for the target are the same as the source. Apply the same SQL service
packs or patches as were installed on the source. Use the default installation options for SQL
with the following considerations:
The target must be a unique installation (that is, two separate SQL servers must be available
for a protection pair)
Logical drive mapping must be the same on the source and target and must assigned prior to
running the Application Manager.
NOTE:For SQL Server 2000, Microsoft recommends that all service packs be installed
independently for each source and target instance. This ensures that operating
system files and registry entries are applied appropriately.
®
domain
6. Install WSS 3.0 or MOSS 2007 on the target server, but DO NOT configure it if you want to use
Storage Mirroring Application Manager to extend the target into the Web Farm.
7 - 1
7. Install Storage Mirroring the source and target SQL servers using the installation defaults. See
the Storage Mirroring Getting Started guide for details.
8. Install the Application Manager on page 2-1
9. Select a task on page 7-2
10. Select a domain on page 7-2
11. Select SharePoint front end on page 7-3
12. Select source and target servers on page 7-3
13. (Optional) Configure protection settings on page 7-5
14. Validate the Configuration on page 9-1
To protect your SharePoint server, you will complete the following steps:
1. Enable protection on page 10-1
2. Monitor protection status on page 10-2
In the event of a failure, you will need to perform some additional tasks. These tasks are described
in Failover, Failback, and Restoration on page 11-1.
Select a task
To protect a SharePoint server, open the Application Manager (Start, Programs, Storage
Mirroring, Application Manager), then on the Tasks area on the left pane, select Protect
SharePoint Server. The Manage SharePoint page will appear in the right pane. Make sure that the
Setup tab is in view.
NOTE:You can also launch Application Manager for SharePoint by using the command line
/sharepoint option (dtam /sharepoint).
Select a domain
The Domain Name on the main window will be populated automatically with the domain where the
Application Manager client resides.
7 - 2
If you want to change the domain, type in a domain name for a trusted domain that the Application
Manager client can connect to, then press Tab or click on another field. If the domain you entered
doesn’t exist or you do not have the credentials to modify Active Directory for the new domain, the
Domain Login window will appear. You will be prompted to enter the domain name, user name, and
password to use for logging in to the domain.
NOTE:Domain names must include a suffix, such as
The user account should have administrator permissions. For more information about configuring
permissions, see Recommended Credentials on page A-1.
You may enter a user name for a different domain by entering a fully-qualified user name. The
fully-qualified user name must be in the format NetBIOS domain name\username or username.
If you enter a non-qualified name, the default domain will be used.
.com, .corp, or .net.
Select SharePoint front end
Enter the name of the server that functions as the SharePoint front end, then click Get Config to load
that server’s configuration information into the Application Manager. The source server will be
detected and added to the Source Server field.
Select source and target servers
If this is your first time to select a SharePoint server to protect, you may need to click the Advanced
Find button to add servers to the Source Server and Target Server fields. For more information, see
Add or manage servers on page 7-4.
If you select a source/target pair for which you have previously enabled and disabled protection, you
may use the existing configuration settings (provided that the source/target connection is not
currently active, in which case the existing settings will always be use d) . W hen you select Configure
7 - 3
or Validate, a prompt will appear asking if you want to re-use the previous configuration information.
Click Yes to re-use the previous information, or click No to revert to the Application Manager default
settings.
NOTE:If the IP address(es) for the source or target server have changed since you originally
configured protection (for example, if you configure the source or target in a staging area
and then send it to a production location), you must re-configure the protection settings.
When you are prompted to re-use the previous protection configuration, click No, then
click the Configure Protection button.
1. In the Source Server field, select the SharePoint server that you want to protect. If this is your
first time to log in to the selected server, you will be prompted to enter server login information.
For more information about logging in to servers, see Enter server login information on
page 7-5.
NOTE:You cannot protect a server if it is already functioning as a target server.
If you attempt to select a source that is currently unavailable, a prompt will appear
stating that the source is not available and that if the source is failed over, you should
first select the target.
If you select the target, then select the source (as recommended in the prompt), the
same prompt appears (though you would expect to get a prompt to failover). The
ability to failover using the Application Manager will not be available until a failover
condition has been met in accordance with the failover monitor settings set on the
Monitoring tab.
2. In the Target Server field, select the backup SharePoint server that will protect the source
server in the event of a failure.
Notice that after the source and target servers are selected, the Protection Status on the Monitor tab
changes to Unprotected.
NOTE:If you first select a target that is monitoring a connection that has met a failover condition
and requires manual intervention, then select the protected source server, a prompt will
appear asking if you want to initiate failover.
Add or manage servers
If the servers you need do not appear, click the Advanced Find button, or select Actions, Manage
SQL Servers. The Manage SQL Servers window will appear.
To discover all servers in the domain:
1. Click the Search button. The Discovered Servers list will be populated with all servers that the
Application Manager can discover that reside in the domain.
2. To directly add a server to the drop-down list on the Manage SharePoint main page, select the
server in the Discovered Servers list, then use the >> button to move it into the Current
Servers list.
7 - 4
3. To add a non-discovered server to the Current Servers list, enter the server name in the field
next to the Add button, then click Add.
NOTE:In environments with a very large number of servers in Active Directory, you may
4. After a server has been added to the Current Servers list, you can manage that server. Select
the server, then select one of the following options:
Remove—Click the Remove button to remove the selected server from the drop-down list
Test SQL—Click the Test SQL button to determine if SQL is installed and accessible for the
5. When you have finished adding, managing, or testing servers, click OK to save your changes, or
Cancel to return to the Manage SharePoint main page without saving.
experience significant delays while the Application Manager searches for SQL servers.
To override the automatic scan for SQL servers, you can launch Application Manager
through the command line using the
(
dtam /sharepoint /nosqlsearch). This will cause the Application Manager not to
populate the Source and Target fields automatically. You will then need to click the
Advanced Find button and add the source and target SQL servers manually.
on the Manage SharePoint main page.
selected server.
/nosqlsearch option
Enter server login information
After you select a server for the first time, you will be prompted to enter a user name and password
to use for logging in to the selected server. The login account MUST be a member of the Storage
Mirroring Admin local security group for the selected server. For more information about permissions,
see Recommended Credentials on page A-1.
You may enter a user name for a different domain by entering a fully-qualified user name. The
fully-qualified user name must be in the format domain\username or username@domain. If you
enter a non-qualified name, the DNS domain will be used. Entering the credentials for the logged-on
user may be valid.
The Application Manager will attempt to use the same user name and password the next time you
select a server.
Configure protection settings
If you do not need to change the configuration settings, continue with Validate the Configuration
on page 9-1.
If you have already enabled protection for a connection and need to change the configuration
parameters, you will first need to disable protection as described in Disable protection on
page 10-2.
To change the default configuration parameters, click Configure from the main Application Manager
window, or select Actions, Configure Protection from the menu. The Configure Protection window
will appear.
The Configure Protection window has tabs for configuring failover, connection, SharePoint, and
advanced settings. The following sections describe the options on each of these tabs.
7 - 5
Failover settings
The Failover tab includes options that will be applied during SharePoint failover.
Failover type
Failover Type indicates what name resolution method will be used to redirect users to the target
SharePoint server in the event of a source failure. By default, DNS Failover is selected.
DNS failover
DNS Failover is the recommended method for failover. Use this option if you want to failover by
updating the DNS records associated with the source. This will modify all source server A, MX, and
PTR-type DNS resource records to point to the target.
In DNS Failover, the DNS records for the source server are modified to point to the target server’s IP
address. This allows clients to resolve the source SharePoint server name to the target server’s
network name and IP address at failover time. DNS Failover eliminates duplicate server name and IP
addresses on your network.
7 - 6
After you select the DNS Failover option, click Configure. The Configure DNS Failover window will
appear.
Configure the following information for DNS failover:
1. To add additional DNS server IP addresses, type the IP address into the DNS Server field, then
click Add.
2. The list box under the DNS Server field contains all DNS IP addresses for the source and target
servers. The label after the DNS IP address indicates whether the DNS IP address belongs to the
source, target, or both.
NOTE:To remove an IP address from the DNS server list, select the IP address, then click
the Delete button.
3. In the Source IP column, select the checkbox next to the source IP address(es) to be monitored
for failover.
4. In the Target IP column, select the target IP address to be used when failover occurs.
NOTE:If the target is monitoring multiple source IP addresses for failover, each monitored
source IP address must be mapped to a unique target IP address.
5. To specify the value the Application Manager will establish for Time to Live (TTL) on the source’s
affected DNS records, select the Update TTL checkbox, then enter the desired update interval
(in seconds). The default is the current maximum TTL of all the source’s A records. The
recommended value is 300 seconds (5 minutes).
6. In the Username field, enter the user name that will be used to access/modify DNS records.
The login account MUST be a member of the DNSAdmins group for the domain in which the DNS
server resides. For more information about permissions, see Recommended Credentials on
page A-1.
You may enter a user name for a different domain by entering a fully-qualified user name. The
fully-qualified user name must be in the format domain\username or username@domain. If
you enter a non-qualified name, the DNS domain will be used by default. The domain name is
obtained from the DNS server name, provided that reverse lookup in DNS is enabled. For more
information about enabling reverse lookup, refer to your Microsoft documentation.
7. In the Password field, enter the password that will be used to access/modify DNS records.
7 - 7
8. Click the Test button to validate that DNS failover is configured correctly for the selected DNS
server(s) and that the specified credentials are sufficient to update DNS.
9. When the DNS configuration is complete, click OK to save your entries and return to the
Configure Protection window.
NOTE:
If you are running Windows Server 2000 on the primary DNS server hosting zones or
domains that contain source and/or target resource records, you must have the DNS
WMI Provider installed on that DNS server.
The Dynamic updates setting for the DNS zone should be set to Secure only.
Otherwise, you must disable dynamic registration on the source server in order to
prevent the source from reclaiming its DNS record.
If a hosts file entry for the source server exists on the client machine, errors may occur
during a failover and failback.
Reverse lookup in DNS should be enabled. For more information about enabling reverse
lookup, refer to your Microsoft documentation.
DNS registration for the private (devoted to Storage Mirroring) NIC IP should be
disabled.
If dynamic updates are enabled on a standard primary zone, the source server will be
able to update its DNS records after failover. To prevent this, configure DNS to use an
Active Directory-integrated zone.
For more information about using the DNS Failover utility, access the dfo.exe help by
typing
dfo.exe /? from a command prompt.
Identity failover
Select this option if you want to failover by transferring the source IP address and name to the target.
When using identity failover, it is possible that a name and/or IP address conflict can occur either
during failover or when the original source server comes back online. To avoid this conflict, use DNS
Failover.
NOTE:Application Manager cannot be used for failover or failback when the Identity failover
method is selected. However, the Failover Control Center can still be used to initiate
failover. DNS failover reduces downtime and provides other benefits. It is recommended
for most environments.
In Identity Failover, the target’s physical identity is modified to match the source during a failover.
This includes the target adopting the source server’s name, primary IP address, and drive shares
during a failover. Identity failover may be required in the following situations:
Access to the domain controller or DNS server is not available (for example, due to permissions)
from the account that Storage Mirroring runs under on the source/target servers.
If you determine that the time it takes to propagate the necessary DNS or Active Directory
changes to the rest of your environment is not acceptable. The time needed to propagate these
changes depends on your Active Directory Replication and DNS server settings.
If you have client applications that are configured to connect to an IP address rather than a server
name.
7 - 8
After you select the Identity Failover option, click Configure. The Configure Identity Failover window
will appear.
Enter the following information for Identity failover:
1. In the Source IP column, select the source IP address(es) to be monitored for failover.
2. In the Target NIC column, select the target NIC to be used when failover occurs.
3. The Target IP Addresses area displays the IP address(es) of the selected target NIC.
4. Select the IP Address checkbox if you want the specified source IP address to be monitored
(Default = selected).
NOTE:If your source and target servers are on different subnets, you should NOT failover
the IP address. Instead, if the server name is required you should choose DNS failover
with the Advanced switch and select the Server Name. For more information, see
Advanced settings on page 7-18.
5. Select the Server Name checkbox if you want the source name to be added to the target when
failover occurs (Default = NOT selected).
6. Select the Shares checkbox if you want the source file shares to be added to the target when
failover occurs (Default = NOT selected).
7. Select the Active Directory Hostname (SPNs) checkbox to remove the host SPN (Service
Principle Name) from Active Directory for the source automatically and add it to Active Directory
for the target during failover (Default = NOT selected).
8. Click OK to save your entries and return to the Configure Protection window.
Services
Application Manager will determine the appropriate SharePoint services to start/stop based on your
operating system/SharePoint configuration. You should only modify this selection if there are
additional services that need to be started along with SharePoint during the failover/failback process.
7 - 9
Modifying the default configuration for services may affect whether data can be successfully
replicated. Do not modify the services to start/stop unless you are very familiar with Storage
Mirroring and SharePoint.
1. To add a service, click Add. The Add Service window will appear.
2. Select the Service name from the drop-down box, then click Add; or, type the name of a
service, then press Enter.
3. If available, select the Service must be stopped on target checkbox. Most services must be
stopped on the target for replication to occur properly.
4. When you are finished entering services, click Close to return to the Failover configuration
window.
5. To remove a service, select one or more services, then click Remove.
You can remove all of the services besides the required SQL server service (
default instance, or
6. Services will be started in the displayed order (top-to-bottom starting with the left column) and
shutdown in reverse order (bottom-to-top starting with the right column). To re-arrange the
order in which services are started/stopped:
a. Add any additional services.
b. Select a service in the list, then use the up and down arrow buttons to move the service to
the appropriate position in startup/shutdown order.
MSSQL$<instance_name> for a named instance).
MSSQLSERVER for a
Add/remove SharePoint services
To stop the target SharePoint services when protection is enabled, click the Add SharePoint
Services button. SharePoint services will be added to the list of services.
NOTE:If you add SharePoint services, they will be started upon failover and stopped upon
failback. This will result in SharePoint on the target being active only when the target is
failed over.
Monitor settings
The Monitoring tab includes options for configuring how you want to monitor the source server for
failure.
7 - 10
Configure how you want to monitor the source server for failure.
1. Select the Active Monitoring Enabled option to enable or disable failover for the selected
source/target pair.
2. By default, Manual Intervention Required is selected. Manual intervention allows you to
control when failover occurs. When a failure occurs, a prompt appears and waits for you to
initiate the failover process manually.
Disable Manual Intervention Required only if you want failover to occur immediately when a
failure condition is met.
3. In the Method to monitor for Failover field, select the ping method to use when monitoring
source IP addresses.
Network Access (ICMP)—Storage Mirroring failover uses ICMP pings to determine if the
source server is online. If a network device, such as a firewall or router, between the source
and target is blocking ICMP traffic, failover monitors cannot be created or used.
Replication Service (UDP)—The Storage Mirroring service on the target server sends a
ping-like UDP request to the source Storage Mirroring service, which replies immediately to
confirm it is running. This method is useful when ICMP is blocked on routers between the
source and target.
4. Configure how long to wait after a source failure to initiate failover. The amount of time before
failover begins is calculated by multiplying the Monitor Interval by the Missed Packets. For
example, if the Monitor Interval is set to 5 seconds and the Missed Packets setting is 5, a failover
condition will be identified after 25 seconds of missed source activity.
a. In the Monitor Interval field, select how often the monitor should check the source
machine availability (Default = 5 seconds).
b. In the Missed Packets field, select how many monitor replies can be missed before
assuming the source machine has failed (Default = 5 missed replies).
5. If you are monitoring multiple IP addresses, select one of the Failover Trigger options.
All Monitored IP Addresses Fail—Failover begins when all monitored IP addresses fail.
One Monitored IP Address Fails—Failover begins when any of the monitored IP addresses
fail.
Application Monitoring (BETA)
By default, application monitor settings are not available in this release of the Storage Mirroring
Application Manager. Application monitoring is only available when you launch Application Manager
using the command line
WARNING:This feature is currently BETA and should not be used in production environments.
1. If you select the Enable Application Monitoring checkbox, the remaining fields in Application
Monitor Settings area will be enabled.
NOTE:A message box will appear, asking you to confirm that you want to use this BETA
feature. To continue, click OK.
Application monitoring is not available when dealing with a cluster.
2. In the Monitor Interval field, enter the interval (in seconds) at which you want to check
application health.
3. In the Error Threshold field, enter the number of consecutive errors that can be received
before an error alert appears.
4. In the Type of Monitoring area, select one of the following options.
Built-in Monitoring Points—Use the default monitoring options.
Custom Script—Launch a batch file to check application health. Either type the name of the
script, or click Browse to locate a script.
NOTE:If you select Custom Script, you will also need to designate whether to use .PS1
(PowerShell) or .VB (VisualBasic) as the Script Engine. Make sure you select the
appropriate engine for your script type.
An example script that you can use as a basis for creating your custom script is
included in the \Samples subfolder where the Application Manager is installed.
5. In the Username field, enter the fully-qualified user name that will be used to run WMI scripts.
The fully-qualified user name must be in the format domain\username or
username@domain.
NOTE:The required credentials for running WMI scripts is full WMI access to the CIMV2
namespace. Under Windows 2008, the supplied credentials must also be allowed
through DCOM and User Access Control. It is recommended that a group be created
for running scripts, and that the required permissions be given to the group.
By default, the administrative group of a Windows 2008 machine has full WMI access.
However, DCOM and User Access Control settings may need to be adjusted.
6. In the Password field, enter the password for the specified user account.
7. Click the Test button to validate that the specified credentials are sufficient to run WMI scripts.
8. (Optional) Click the Clear Cached Credentials button to clear the cached user name and
password.
7 - 12
Snapshot settings
The following allow you to set up snapshots of your target data that can be used when failing over.
By default, snapshots are not enabled in the Application Manager.
1. To enable snapshots, select the Enable periodic snapshots checkbox. This will enable the
remaining controls.
2. In the Snapshot interval field, select the interval at which you want to perform snapshots (in
minutes). The minimum interval is 15 minutes.
3. Select one of the following options for when to begin collecting snapshots:
Start now—Select this option to take the first snapshot as soon as protection is enabled.
Start at—Select this option to start taking snapshots at a future time. If you select this option,
you will also need to enter a date and time.
4. When you are finished, click OK.
Connection settings
The Connection tab includes options that will be applied to the specified source/target connection.
7 - 13
Route
This setting identifies the Target IP Address that the Storage Mirroring data will be transmitted
through. You should only change this setting if you want to select a different route for Storage
Mirroring traffic. On a machine with more than one NIC, this increases the flexibility of configuring
Storage Mirroring activity. For example, you can separate regular network traffic and Storage
Mirroring traffic on a machine. The default ports will be used.
Protected Databases
By default, all of the SharePoint program and data files (except the \binn directory) are selected for
replication to the target SharePoint server. This will allow the clients to access your production
SharePoint server data and functionality on the target in the event of a failure.
The source and target servers must both have the exact same version of SharePoint (major and
minor versions) as well as similar logical drive structures (the target must have at least the same
logical drives as the source where SharePoint program and data files are stored).
NOTE:
You can also select non-application specific data under the Volumes folder.
NOTE:If Override Generated Rules is selected on the Advanced tab, this control will be
To refresh the tree view to show new source directories or files that may have been added or
removed, select the logical node, then click the Refresh button. If a node in the volumes branch is
selected, then the items under that node will be refreshed.
If you are using a SQL server named instance for a back-end database server in your
SharePoint setup, both the source and target SQL servers must have named instances
with the exact same name and logical drive structure as the source SQL server
installed prior to configuring protection.
To enable the ability to add or remove SharePoint instances, you can launch
Application Manager through the command line using the
/advanced
a dialog box will appear when you select Configure Protection.
If you need to reduce the amount of mirroring and replication traffic, you may choose
to deselect the tempdb database if it is not necessary.
disabled.
option (dtam /sharepoint /advanced). With this option enabled,
/sharepoint
Mirror type
The following options specify what files you want sent from the source to the target during a mirror.
Full—Copies all of the directories and files in the replication set to the target machine. If a mirror
has already been completed, another full mirror will overwrite the data on the target.
Checksum—(Default) This option performs a checksum comparison calculation. A checksum
calculation is a formula applied to blocks of data to determine if the binary make-up of the block
is identical. If the checksums on the source and target machine are the same, the block is skipped.
If the checksums on the source and target machine are not the same, the block on the source is
sent to the target. With this option, the entire file is not overwritten; only the block that is received
from the source is overwritten.
NOTE:The Mirror type setting also applies to the restoration connection.
Enable compression
This setting enables compression of data that is transmitted from the source to the target. Significant
improvements in bandwidth utilization have been seen in Wide Area Network (WAN) configurations
or in any case where network bandwidth is a constraint.
Compression may be used in Local Area Network (LAN) configurations, though it may not provide any
significant network improvements.
7 - 14
Loading...
+ hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.