Double Take - Virtual Recovery Assistant - Users Guide

Published on October 2021 | Categories: Documents | Downloads: 10 | Comments: 0 | Views: 211
of 25
Download PDF   Embed   Report

Comments

Content

 

Virtual Recovery Assistant User’s Guide

Double-Take, GeoCluster, GeoCluster, and NSI are registered trademarks of Double-Take Software, Inc. Balance, Double-Take for Virtual Systems, Double-Take for Virtual Servers, and Double-Take ShadowC ShadowCaster aster are trademarks of Double-Take Software, Inc. Microsoft, Windows, Windows Vista, and Active Directory and the Windows logo are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. VMware and VMotion are registered trademarks or trademarks (the “Marks”) of VMware, Inc. in the United States and/or other jurisdictions. All other trademarks are the property of their respective companies. © 2008 Double-Take Software, Inc. All rights reserved.

Version 5.1.0 DTVRA-510-UG-052908

 

Attention Notice IMPORTANT: READ CAREFULLY BEFORE USING THIS PRODUCT. USE OF THE SOFTWARE IS SUBJECT TO THE DOUBLE-TAKE SOFTWARE, INC. ("Licensor") SOFTWARE LICENSE TERMS SET FORTH BELOW. OPENING, INSTALLING, AND/OR USING THE SOFTWARE INDICATES YOUR ACCEPTANCE ACCEPTA NCE OF THESE LICENSE TERMS. IF YOU DO NOT ACCEPT THESE LICENSE TERMS, YOU MUST NOT INSTALL THE SOFTWARE.

License Grant 1. Subject to Your compliance with the terms and conditions set forth herein, In return for the fee paid by You, LICENSOR hereby grants You a limited, non-transferable personal license to use the object code version of the software included on the media on a single server (or if You have purchased a Gold Disk license, on the number of servers set forth in your Purchase Order or Gold Disk Agreement) authorized in writing by LICENSOR in the relevant documentation in conformance with: - Use restrictions and authorizations for the software specified by LICENSOR in its quotation, invoice or terms that accompany the software; - If your purchase includes multiple instances instances of software, usage is restricted r estricted to the number of licenses specified in the relevant documentation documentatio n accompanying your purchase. - If you are receiving a license for evaluation purposes, usage is restricted to a controlled environment for evaluation and testing purposes only and solely for the period of time specified by LICENSOR. The evaluat evaluation ion software will be equipped with a time out mechanism set for the period of time specified by LICENSOR. Evaluation license licenses s are not eligible for Indemnification Indemnification.. 2. Unless otherwise specified, all software licenses will be perpetual unless terminated or transferred in accordance with the terms of this agreement. 3. In the event that the software is Linux based, kernel dtfs.ko and dtrep.ko ("Open Source Software") are subject to the GNU General Public License, version 2, as published by the Free Software Foundation ("the GPL"), and the Open Source Software shall not be subject to the remaining terms herein. There are no warranties prov provided ided with respect to the Open Source Software and all implied warranties are disclaimed, in accordance with with the terms of the GPL. In the event of any conflict between between the terms herein and the GPL with respect to the the Open Source Software, Software, the terms of tthe he GPL shall control. A copy of the GPL license is provided with the software distribution and can also be obtained at http://www.gnu.org/licenses http://www. gnu.org/licenses/old-licenses/gpl-2 /old-licenses/gpl-2.0.html. .0.html. The source files for the Open Open Source Softwa Software re are available via an FTP site from LICENSOR, and can be obtained upon request submitted to LinuxPM@doubleta [email protected]. ke.com. Notwithstandi Notwithstanding ng the foregoing, the GPL shall only apply to the Open Source Software and shall not apply, in whole or part, to the remaining software, and in no event shall LICENSEE have any right to access or obtain the source code for the remaining software. 4. By opening, installing, and/or using this software, you signify agreement to all terms of this license.

Copyright Software is owned and copyrighted by LICENSOR. LICENSOR. This software license confers no title or ownership and is not a sale of any rights in the software. You agree that this software remains the property of LICENSOR and that you only have a license to use this software. LICENSOR Software reserves all other rights to the software.

Restrictions You may not (i) rent, lease, sub-license, time-s time-share, hare, sell or otherwise transfer the software or documentation except as expressly authorized in these terms; (ii) make the software available over the Internet or any other publicly accessible network or technology; (iii) remove any copyright, trademark, or other proprietary notices from the software or the media; (iv) make any copies of the documenta documentation; tion; (v) copy the software except as expressly provided for herein; (vi) assign any rights or obligations hereunder; or (vii) reverse engineer, decompile, disassemble, or otherwise attempt directly or indirectly to discover, use, disclose or transfer any source code or other confidential information contained in the software.

Copying You may make and maintain one backup copy of the software provided it is used only for your own backup purposes and you keep possession of all backup copies.

Pre-Printed Terms Any pre-printed terms and conditions of any documents used by any third party in connection with this Agreement shall not be binding on LICENSOR and shall not be deemed to modify this Agreement.

Termination LICENSOR may terminate Your license upon notice for failure to comply with any of the license terms set forth herein. Immediately upon termination, termination, the software, and all copies of the software, at LICENSOR’s option, will be destroyed or returned to LICENSOR.

Limitation of Liability EXCEPT TO THE EXTENT PROHIBITED BY LOCAL LAW, IN NO EVENT WILL LICENSOR OR ITS SUBSIDIARIES, AFFILIATES, DIRECTORS, OFFICERS, EMPLOYEES, AGENTS OR SUPPLIERS BE LIABLE FOR DIRECT, INDIRECT, SPECIAL, INCIDENTAL, CONSEQUENTIAL, PUNITIVE, OR OTHER DAMAGES (INCLUDING LOST PROFIT, LOST DATA, OR DOWNTIME COSTS), ARISING OUT OF THE USE, INABILITY TO USE, OR THE RESULTS OF USE OF THE SOFTWARE, WHETHER BASED IN WARRANTY, CONTRACT, TORT OR OTHER LEGAL THEORY, AND WHETHER OR NOT LICENSOR WAS ADVISED ADVI SED OF THE POSSIBILI POSSIBILITY TY OF SUCH DAMAGES. In any case, LICENSOR’s entire liability under any provision of this License shall be limited to amount received by LICENSOR. Your use of the software is entirely at your own risk.

Limited Warranty LICENSOR warrants warrants only that the software media will be free of physical defects for a period of ninety (90) days from delivery. Exclusive Remedy. The entire liability of LICENSOR and Your exclusive remedy for software that does not conform to this Limited Warranty shall be the during repair or of the media. warranty and remedy are subject Your returning the defective media thereplacement warranty period todefective LICENSOR or to This the Distributor whom You obtained the to software.

 

Indemnification a. Infringement. LICENSOR will, at LICENSOR's expense, indemnify, defend and hold harmless You (including officers, directors, employees and agents), against any actual third party claims (including but not limited to reasonable attorneys' fees and costs) that the software infringes, violates or misappropriates a patent, copyright, trademark, or other property right of a third party in the United States by the software in the form provided by Licensor to Licensee provided that (i) You notify LICENSOR promptly upon learning that the claim might be asserted; (ii) LICENSOR has sole control over the defense of the claim and any negotiations for its settlement or compromise, and (iii) You take no action that, in LICENSOR LICENSOR’s ’s judgment, impairs LICENSOR’s defense of the claim. This indemnification obligation shall be effective only if (a) You have made all payments required by the terms of this Agreement; (b) You have given prompt notice of the claim, and (c) the infringement does not result from Your modification of the software or the software’s incorporation with other software, hardware or apparatus not supplied by the LICENSOR. b. Remedy. If such a claim is made, LICENSOR, at its own expense, may exercise any of the following remedies that is reasonably and practicable (1) obtain for Youand theinright r ight to continue use the software consistent this Agreement; (2) commercially modify the software so it is non-infringing compliance with to this Agreement; or (3) replace with the software with non-infringing software that complies with this Agreement. If none of these options are available, LICENSOR shall refund to You the remaining value of the software as amortized over a thirty six (36) month life.

Disclaimer TO THE EXTENT ALLOWED BY LAW, THIS SOFTWARE IS PROVIDED TO YOU "AS IS" WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, WHETHER ORAL OR WRITTEN, EXPRESS OR IMPLIED. LICENSOR SPECIFICALLY DISCLAIMS ANY IMPLIED WARRANTIES OR CONDITIONS OF MERCHANTABILITY, SATISFACTORY QUALITY, NON-INFRINGEMENT, TITLE, ACCURACY OF INFORMATIONAL CONTENT, AND FITNESS FOR A PARTICULAR PURPOSE. THE ENTIRE RISK AS TO THE RESULTS AND PERFORMANCE OF THE SOFTWARE IS ASSUMED BY YOU. NO ORAL OR WRITTEN INFORMATION OR ADVICE GIVEN BY LICENSOR SHALL CREATE A WARRANTY OR AMEND THIS "AS IS" WARRANTY. Some jurisdictions do not allow exclusions of implied warranties or conditions, so the above exclusion may not apply to you to the extent prohibited by such local laws. You may have other rights that vary from country to country, state to state, or province to province.

Government If the software is licensed for use in the performance of a U.S. government prime contract or subcontract, You agree that, consistent with FAR 12.211 and 12.212, commercial computer software, computer software documentation documentation and technical data for commercial items are licensed under vendor’s standard commercial license.

Export Restrictions You acknowledge that this Software is subject to the export laws of the United States and agree to comply at all times with such laws. This Software or any components, data, code or technology thereof may not be exported except in full compliance with all United States and other applicable laws and regulations. You hereby represent and warrant that you: (A) are not a citizen or resident of Cuba, Iraq, Libya, Sudan, North Korea, Iran, or Syria, and if a legal entity, (B) are not an entity formed under the laws of Cuba, Iraq, Libya, Sudan, North Korea, Iran, or Syria, or (C) are not included on the U.S. Treasury Department’s list of Specially Designated Designated nationals or the U.S. Commerce Department’s Table of Deny Orders.

Severability If any term or provision herein is determined to be illegal or unenforceable, the validity or enforceability of the remainder of the terms or provisions herein will remain in full force and effect.

Gold Disk Maintenance Renewals If you choose to renew maintena maintenance, nce, You shall purchase maintenance for all licenses purchased hereunder and for any subsequent licenses added to the Gold Disk. Rev 08-28-07 © 1996-2008 Double-Take Software, Inc. all Rights reserved.

 

Table of Contents Chapter 1 Introduction ............................ ................................................... ............................. ......1-1 1-1 Resources .......................................................... ......................................................................................... ............................... 1-2 Suggest improvements to this product ............................................. 1-2

Chapter 2 Installing Virtual Assistant .................... 2-1 Virtual Recovery Assistant Requirements ............................................................... ................................................................................... .................... 2-1 Install Virtual Recovery Assistant ..................................................... 2-1 Uninstalling Virtual Recovery Assistant ............................................ 2-2

Chapter 3 Console .................................................................3-1 Start Virtual Recovery Assistant ....................................................... 3-1 Understanding the console ................................................... ............................................................... ............ 3-1 Using the left pane navigation list ............................................................... ........................................................................... ............ 3-1

Find out more inform information ation about tasks ............................................. 3-1

Chapter 4 Connect Connect to the VirtualCenter VirtualCenter server ..................... 4-1 Log off VirtualCenter server ................................................ .............................................................. .............. 4-2

Chapter 5 Select servers .......................................................5-1 Select the source physical machine .................................................. 5-1 Select volumes to protect .................................................... ................................................................. ............. 5-2 Select a target server .................................................. ....................................................................... ..................... 5-3 Select the target datastore .................................................. ............................................................... ............. 5-5 Select the virtual recove recovery ry ap appliance pliance ................................................ 5-5 Define replica virtual machine .......................................................... .......................................................... 5-6 Set protection options ...................................................................... ...................................................................... 5-7

Chapter 6 Monitor protection ................................................6-1 Chapter 7 Failover ........................ ................................................. ........................................ ...............7-1 7-1 Chapter 8 Manage virtual recovery recovery appliances ...................... 8-1 Add a virtual recovery appliance ....................................................... 8-2

i

 

Introduction Double-Take® Virtual Recovery Assistant (VRA) is used to protect entire physical and/or virtual source machines to virtual target machines running on VMware ESX Server. In addition to providing the proven Double-Take byte-level replication, monitoring, and failover technologies, the Double-Take Virtual Recovery Assistant greatly simplifies the setup of the target virtual machines by automating the virtual machine provisioning process. Double-Take Virtual Recovery Assistant uses a client/server architecture. The DTVRA clients clients are  are used to create protection jobs.

 



The target VMware ESX host ESX host server is a physical machine that the VMware ESX host software runs on. The Virtual Recovery Appliance and any replica virtual machines will reside on this ESX host. The Virtual Recovery Appliance is Appliance is a virtual machine running on the target VMware ESX host. The Virtual Recovery Appliance serves as a communication and management hub for all Double-Take Virtual Recovery Assistant activities. Some of its functions include: 



Handling all ESX server communication (for example, it creates the virtual server, creates disks, mounts disks, formats disks, and dismount disks)



Push-installing Double-Take Double-Take and the Source Registry Service to the source (if needed).



Creating and controlling the Double-Take job.



Reporting the Double-Take Virtual Recovery Assistant state to the clients.

Virtual replica machines are machines are hosted by the VMware ESX host server. The virtual replica machines are created by the source protection job using the Virtual Recovery Appliance, but remain powered off until failover. At failover, the replica machine is powered on and assumes the identity of the original source machine. Virtual Recovery Appliance

Double-Take Double-Ta ke VRA clients

C:\  System C:\  Source Machine 1

Replica1_C:\  Source Machine 1_Replica C:\  D:\ 

Source Machine 2

Replica2_C:\  Replica2_D:\  ESX Datastore

Source Machine 2_Replica

Target VMware ESX Host Server

Double-Take Virtual Recovery Assistant uses Double-Take to configure the replication set and monitor failover conditions. For more information on Double-Take system requirements, see the Double-Take User’s Guide or online documentation.

1-1

 

Resources You have many resources available to you when using Double-Take Virtual Recovery Assistant. 



Operating system and application documentation—Make documentation—Make sure that you have complete documentation for your operating system and your applications. Double-Take documentation—Each documentation—Each Double-Take manual is available in the \DblTake\docs directory on the product CD and in the root of the installation directory you selected during the installation. The manuals are in Adobe ® Acrobat® PDF format. If needed, you can install the free Adobe Acrobat Reader Reader® by downloading the latest version from the Adobe web site at www.adobe.com. www.adobe.com . 







Double-Take User’s Guide — This This

guide is a complete how-to guide with detailed steps for installing and using Double-Take. This guide also contains a complete list of Double-Take messages, alerts, and statistics.

Double-Take Virtual Recovery Assistant User’s Guide — This This guide is a complete how-to guide for configuring Double-Take Virtual Recovery Assistant.

Readme—Double-Take and Double-Take Virtual Recovery Assistant include readme files which Readme—Double-Take contain any last-minute information. The readme files are located in the \DblTake\docs directory of the product CD and in the root of the installation i nstallation directory you selected during the installation. Other resources—Technical resources—Technical support, professional services, and training are all available for Double-Take and Double-Take Virtual Recovery Assistant. 





Technical Support—If Support—If you need technical assistance, you can contact technical support. All basic configurations outlined in the Double-Take User’s Guide and the Double-Take Virtual Recovery Assistant User’s Guide will be supported through technical support. Your technical support center is dependent on the reseller or distributor you purchased your product from and is identified on your service agreement. If you do not have access to this agreement, contact Double-Take Software Technical Technical Support and they will direct you to the correct service provider. To contact Double-Take Software Technical Support, you will need your serial number and activation code. For a complete complete list of US and international international phone numbers, see the Double-Take Software Software web site at www.doubletake.com . Online support is available at support.doubletake.com support.doubletake.com.. Professional Services—Assistance Services—Assistance and support for advanced configurations may be referred to a Pre-Sales Pre-Sales Systems Engineer or to Professional Services. See the Double-Take Software web site at www.doubletake.com  for more information. Training—Classroom and Training—Classroom  and computer-based training computer-based training are available. See the Double-Take Software web site at www.doubletake.com  for more information.

Suggest improvements to this product Our product managers encourage us to develop products that are one step ahead of our competitors. While we like having the best products, we think it’s more important to give you the features that you need to your get your job done there a us way Double-Take Virtual Assistant could make job easier, it’sefficiently. important If that youislet know. If you can thinkRecovery of ways to improve the ease of use or performance of Double-Take Virtual Recovery Assistant, we want to know that, too. If you have suggestions for enhancements to Double-Take Software products, products, please let us know at http://www.doubletake.com/suppo .doubletake.com/support/product-su rt/product-support/feature-request pport/feature-request.aspx .aspx   http://www

1-2

 

Installing Virtual Recovery Assistant Review the minimum requirements. When your servers meet the required conditions, continue with the installation instructions.

Requirements Double-Take Virtual Recovery Assistant requires the following minimum system configuration: 

A copy of Double-Take with the latest service pack



At least two valid activation codes for Double-Take



The Double-Take Virtual Recovery Assistant client software must be installed on a physical or virtual server running one of the following operating systems: 

Microsoft Windows 2000



Microsoft Windows XP



Microsoft Windows 2003 NOTE:



 

The client should not be not be running on the source machine.

Source machines can be any physical or virtual machines running a 32-bit version of Microsoft Windows 2000 or Microsoft Windows 2003. The target VMware ESX host server is a physical machine running VMware ESX 3.01 or later. The Double-Take Virtual Recovery Assistant service runs on the Virtual Recovery Appliance. The Virtual Recovery Appliance must be a virtual machine running a 32-bit version of Microsoft®  Windows® 2003 and hosted by the VMware ESX server where you want to create the replica virtual machines. Yo You u must create the virtual machine to be used as the Virtual Recovery Appliance before installing Double-Take Virtual Recovery Assistant. It is strongly recommended that recommended that this virtual machine be used for no other purpose than as the Virtual Recovery Appliance. NOTE:

Double-Take Virtual Recovery Assistant is not supported on 64-bit operating systems.

Install Virtual Recovery Assistant

The Double-Take Virtual Recovery Assistant is installed during the Double-Take installation. For more information about installing Double-Take, see the Double-Take User’s Guide. After you have installed Double-Take Virtual Recovery Assistant, launch the program by selecting Start, Programs, Double-Take, Virtual Recovery Assistant Console. Console. If this is your first time launching Double-Take Virtual Virtual Recovery Assistant, the Connect to VirtualCenter VirtualCenter Server window will appear as described in C o n n e c t t o t h e V i r t u a lC lC e n t e r s e r v e r   on on page page 44-1 1. If you hav have e not previously connected, you will be taken to the Select a Source Server window, described in S e le c t t h e s o u r c e ph p h y s i c a l m a c h i n e  on page page 55-1 1. To make sure that you are using the most recent version of Double-Take Virtual Recovery Assistant, Assistant, periodically select Help, Check for updates. updates. This will launch the Double-Take Software technical support site to see if an updated version of Double-Take Virtual Recovery Assistant is available.

2-1

 

Uninstalling Virtual Recovery Assistant Use these instructions to uninstall an existing Double-Take installation. If you want to use the product installation files to perform the uninstallation, you have to use the same installation files as the currently-installed version. version. If you do not have the same installation files as the currently-installed version, you will need to use the Windows Add/Remove Programs feature to uninstall the software. 1. Close any open applications. 2. If you are using the Windows Add/Remove Programs feature, when you are asked to confirm

that you want to remove the program, click Yes Yes.. 3. If you are using the same installation files as the currently-installed version , start the uninstallation program using the appropriate instructions, dependingversion, on your media source. 



CD—Load the Double-Take CD—Load Double-Take CD into the local CD-ROM drive. If auto-run is enabled, the uninstallation program will start automatically automatically.. To manually start the program, select Start, Run and Run  and specify <cd_drive>:\autorun. <cd_drive>:\autorun.exe. exe. Web download—Launch download—Launch the .exe file that you downloaded from the web.

4. When the uninstallation program begins, the Double-Take Setup Wizard appears. 5. When prompted to Repair or Remove the existing installation, select Remove Remove and  and click Finish Finish to  to

continue. 6. Any files created by the Microsoft Windows Installer during the Double-T Double-Take ake installation can be

safely deleted after an uninstall.

2-2

 

Console This section provides information about how to use the Double-Take Virtual Recovery Assistant console.

Start Virtual Recovery Assistant Launch Double-Take Virtual Recovery Assistant by selecting Start, Programs, Double-Take, Virtual Recovery Assistant Console. Console. The first time you launch Double-Take Virtual Recovery Assistant, a login window will appear. In subsequent sessions, after you have entered and saved login information for your VirtualCenter server, you will be taken directly to the Double-Take Virtual Recovery Assistant interface. Double-Take Virtual Recovery Assistant uses standard Windows-style controls. Enter information in fields, select options from drop-down menus, click buttons, and use menu options.

Understanding the console The Double-Take Virtual Recovery Assistant interface is designed to guide you through the process of configuring protection for your virtual machines. The default configuration parameters have been selected to be appropriate for most configurations; however, they may need to be modified for your specific environment.

Using the Double-Take left pane navigation list When you launch Virtual Recovery Assistant, you will see the main Double-Take Virtual Recovery Assistant window. The first time you launch Double-Take Virtual Recovery Assistant, the interface will lead you through each step you need to take to set up protection for a physical source machine. After you have set up the initial protection job, you can select options in the left pane of Double-Take Virtual Recovery Assistant to monitor and manage your protection jobs.

Find out more information about tasks There are two main ways to view information about a task in the Double-Take Virtual Recovery Assistant interface: 



In the Double-Take Virtual Recovery Assistant interface, read the descriptive text for the field or control. From the Help menu, click Double-Take Virtual Recovery Assistant Help. Help. This will launch the online help file for Double-Take Virtual Recovery Assista Assistant. nt. You can click the icons in the upper-left corner of the help window to navigate through the topics. The “closed book” icon opens the Table of Contents, and the “open book” icon opens the Index.

3-1

 

Connect to the VirtualCenter server Double-Take Virtual Recovery Assistant can use VMware VirtualCenter to manage the VMware ESX host server. To use VirtualCenter, you must enter credentials for logging in to the VMware VirtualCenter server. The first time you log in, the Connect to VirtualCenter Server  dialog box will appear:

The VirtualCenter server is where the VMware VirtualCenter service is running. The VMware VirtualCenter service manages all the VMware ESX servers in the environment. The account you specify must have permission to view, create, and modify virtual machines in the datacenter. Typically, this account has administrator permission. NOTE:

When using VirtualCenter, VirtualCenter, the VirtualCenter APIs are necessary necessary to connect to the target ESX host to manipulate the VMDK connections and start the replica virtual machine at failover. If the VirtualCenter server is offline and failover is attempted, the failover process will not complete successfully.

If you do not want to connect to the VirtualCenter server, click the Skip button. You will need to specify an ESX host as described in  S e le c t a t ar g e t s e r v e r  on page page 55-3. 3. Enter the following information in the appropriate fields: server. 1. Server—Enter the IP address or fully-qualified domain name of the VirtualCenter server. 2. User name—Enter the user name for the account that will access the VirtualCenter server. server. 3. Password—Enter the password that is associated with the user name. 4. If you want Double-Take Virtual Recovery Assistant to remember the login information, select the Save VirtualCenter connection information checkbox. By selecting this box, Double-Take

Virtual Recovery Assistant will remember reme mber the credentials for logging in to the VirtualCenter VirtualCenter server. The logon information is cached and encrypted, so you will not need to enter this server. information again at subsequent logons. 5. When you have finished entering the login information, click Connect . Double-Take Virtual

Recovery Recover y Assistant will verify the credentials that you have entered for the VirtualCenter server server.. If this is your first time to use Double-Take Virtual Recovery Assistant, you will start by selecting your page e 55-1. 1. source server to protect. Continue with S e le c t t h e s o u r c e p h y s i c al m ac h i n e  on pag

4-1

 

Log off VirtualCenter server Logging off clears the current credentials so that you will be prompted to enter credentials on your next logon. To disconnect from the t he currently-configured VirtualCenter server, click the Disconnect button in the left pane, or select File, Disconnect. Disconnect. A box that identifies the servers that you are currently logged in to will appear. If you click Disconnect Disconnect,, you will be disconnected from the VirtualCenter server and your Double-Take Virtual Recovery Assistant session will end.

When you disconnect from the server, any saved connection information (such as user name and password) will be deleted.

4-2

 

Select servers The Protect a server workflow guides you through all the steps to protect the physical source server whose data and system state you will be protecting with a virtual target server.

Select the source physical machine When you click Protect a server or server or select Go, Protect a server, server, the Select source server window server window will appear. appear.

Enter the following information for the source server: 1. Server Server—Enter —Enter the IP address or DNS name of the source server you want to protect. Or Or,, click the Browse button to browse to locate a server. a. In the Browse for server window, server window, browse through the server tree to select a source server.

5-1

 

b. After you have found the source server, select it, then click Choose Choose..

NOTE:

In order to protect a source, the source must have no more than four NICs enabled. If you have changed the default port (6330) used by the Double-Take server, specify the port as well. Enter the IP address and port in the Server field, using the format IP Address:Port. Address:Port.

2. User name—Enter name—Enter the user name for the account that will access the source server.

NOTE:

If Double-Take is installed on the source, then the user account specified must have Double-Take Admin privileges on the source server. If Double-Take is not not installed  installed on the source, Double-Take Virtual Recovery Assistan Assistantt will perform a push install. The user account must be a member of the source server’s local admin group.

3. Password Password—Enter —Enter the password that is associated with the user account. 4. After all fields have been completed, click Next Next.. A window will display the progress as the

Double-Take Virtual Recovery Assistant console authenticates the source server.

Select volumes to protect Select the volumes you want to protect to the target virtual machine. By default, the system volume will be selected. NOTE:

Double-Take Virtual Recovery Assistant can protect a maximum of 14 source volumes per SCSI controller installed installed on the Virtual Recovery Recovery Appliance virtual mac machine. hine. Please consult your VMware ESX documentation to determine how to install additional SCSI controllers on the Recovery Appliance.

5-2

 

You can specify the size of the selected volume on the replica virtual machine. 1. Select the name of the volume in the Volume Volume table.  table.

machine field. 2. Enter a value in the Size of the selected volume on the replica virtual machine field. 3. Use the drop-down box to select whether the value is in MB or GB. G B. 4. After you have entered information for the selected volume, click Update Update.. Y 5. Repeat this process to configure the size of additional volumes on the replica virtual machine. 6. To exclude a path or folder from the protection, type the path to exclude iin n the Exclude these

paths field, paths  field, then click Add Add.. 7. To remove a path from being excluded, select the path, then click Remove Remove.. 8. When you are finished selecting the data to t o protect, click Next Next..

Select a target server Select the target VMware ESX server where the virtual recovery appliance and replica virtual machines will be hosted.

5-3

 

Enter the following information for the target server: 1. IP address or DNS name—Enter name—Enter the IP address or DNS name of the target server which will host your virtual recovery appliance and replica virtual machines. Or, Or, click the Browse button to

browse to locate a server. NOTE:

If you did not specify a VirtualCenter server, the Browse Browse button  button will not be available. You will be prompted to add a username and password for the target server.

a. In the Browse for server window, server window, browse through the file fi le tree to select a target server server..

b. After you have found the target server, select it, then click Choose Choose.. 2. When you are finished, click Next Next..

5-4

 

Select the target datastore Select the datastore where the protected data will be stored, then click Next Next.. The target datastore must have enough free space to store the source data.

Select the virtual recovery appliance Select the virtual machine that will be used to coordinate the protection of the data.

Enter the following information for the virtual recovery appliance: 1. Choose an existing virtual machine—Select machine—Select the virtual machine you would like to use as the

virtual recovery appliance. NOTE:

This field will only display virtual recovery appliances that are powered on and that are running Windows 2003, Standard Standard or Enterprise Enterprise edition.

2. User name—Enter name—Enter the user name for the account that will access the virtual recovery appliance.

NOTE:

If Double-Take is installed on the virtual appliance, thenappliance. the user account specified must have Double-Take Admin privileges on the virtual

3. Password Password—Enter —Enter the password that is associated with the user account.

5-5

 

4. After all fields have been completed, click Next Next.. A window will display the progress as the

Double-Take Virtual Recovery Assistant console authenticates the virtual recovery appliance.

Define replica virtual machine Select the options that will configure the virtual machine that will stand in for the source server after failover.

1. Replica virtual machine name—Use name—Use the default replica virtual machine name, or enter a new

name. 2. Map replica virtual network IP to target networks—If networks—If there are multiple target networks,

you can select the network on the target to use. 3. Number of processors—Select processors—Select the number of processors for the replica virtual machine.

NOTE:

The Processors on the source server field server field displays the number of processors on the original source server.

4. Amount of memory—Enter memory—Enter the amount of memory to use for the replica virtual machine.

NOTE:

The Memory on the source server field server  field displays the amount of memory (in MB) on the original source server.

5. When you are finished configuring the replica virtual machine, click Next Next..

5-6

 

Set protection options Select the options you want to use during protection.

1. Compression Compression—Select —Select the compression level (None, Low, Medium, or High) to use when sending

data from the source to target server. 2. Enable automatic failover—If failover—If you want the replica virtual machine to stand in for the source

server when the source is inaccessible, select this checkbox. NOTE:

If automatic failover is enabled and a failover condition is met before the initial mirror has completed, Double-Take Virtual Recovery Assistant will attempt to failover to the target virtual machine. To prevent potential issues, all protection jobs should be configured to use manual failover until the initial mirror is complete.

failover—Select the IP address to monitor for 3. IP address to monitor for automatic failover—Select automatic failover. (seconds)—(Default = 5) Select how often the monitor will check the 4. Monitoring interval (seconds)—(Default source machine availability. 5. Missed intervals—(Default intervals—(Default = 5) Select how many monitor replies can be missed before

assuming the source machine has failed.

5-7

 

6. Activation code for source server—If Double-Take is not already installed on the source

server, enter the Double-Take activation code. NOTE:

Double-Take Virtual Recovery Assistant requires Double-Take 5.0 or later in order to function properly. If Double-Take Virtual Recovery Assistant detects that a previous version of Double-Take is installed on either the source or virtual recovery appliance, you will be given the option to upgrade. If you choose to upgrade, you must enter the activation code. If Double-Take is already installed on source or virtual recovery appliance, these fields will be disabled.

7. Activation code for virtual recovery appliance —If Double-Take is not installed on the virtual

recovery appliance, enter the Double-Take activation code. NOTE:

If Double-Take is not already installed on the source server and/or virtual recovery appliance, a push install will be performed. The push install process will force a reboot of the source and/or target servers. You will be prompted to begin the push install and system reboot.

8. When you have finished setting protection options, click Next. The Protection Summary pane

will appear. appear.

5-8

 

9. Review the protection options, then click Finish Finish to  to initiate the protection process.

When you click Finish, a message box will appear identifying the status of the protection check. If the source server does not have Double-Take installed, Double-Take Virtual Recovery Assistant will push install Double-Take 5.x to it. If the Double-Take Virtual Recovery Assistant service and/or Double-Take is not installed on the virtual appliance, Double-Take Virtual Recovery Ass Assistant istant will push install the service and/or Double-Take. NOTE:

Push install may not work if WMI is disabled or if your firewall is set to block WMI access. If this happens, you will need to manually install Double-Take on the source server and the Double-Take Virtual Recovery Assistant service on the Double-Take Virtual Recovery Assistant virtual appliance.

5-9

 

Monitor protection After you have finished setting up the protection, the Monitor Protection pane will appear. From this window, you can view the status of machine protection jobs. You can also open this pane by clicking the Monitor protection button protection button on the left pane, or select Go, Monitor Protection. Protection.

Select a protection job, then choose one of the following actions: Toolbar button

Function Start protection—Starts protection—Starts synchronization synchronization for the selected protection job. When you start protection, the Status Status column  column will display the protection progress. Pause protection—Temporarily protection—Temporarily pause synchronization for the selected protection job. Stop protection—Stop protection—Stop the selected protection job. Delete protection—Remove protection—Remove the selected protection job. When you click this button, you will have to confirm whether to “Keep “Keep and register the associated replica virtual machine” machine” or to “Delete “Delete the associated replica virtual machine”. machine”. Select one of these options, then click Yes Yes to  to proceed with deleting the protection, or click No No to  to cancel. View last error—View error—View the last error associated with the selected protection job. Failover—Transfer ownership from the source to the Failover—Transfer the target virtual mach machine ine in the  on pag page e 77-1 1. selected protection job. For more information, see Failover  on

6-1

 

Failover The Double-Take Virtual Recovery Assistant provides the ability to failover to a replica virtual machine in the event of a failure of the source machine. Source servers may be failed over in two different ways: 

  Automatic Failover—The



  Manual Failover —The

application detects that a failover condition is met and automatically initiates the failover process.

user manually initiates the failover process by clicking the Failover  button in the user interface.

The type of failover for the job is selected during job creation. For more information, see S e t  p r o t e c t i o n o p t i o n s  on page  pr page 55-7 7. NOTE:

For optimal virtual machine performance, Double-Take Software recommends that you install VMtools on the replica virtual machine after failover is complete. In most cases, the installation of VMtools will require the virtual machine to be rebooted.

During the failover process, the following steps are initiated by the Double-Take Virtual Recovery Assistant: 1.

The Double-Take connection between the source machine and Virtual Recovery Appliance is disconnected.

2.

The VMware virtual drivers for video, mouse, disk controllers, and network adapters are injected into the Windows registry on the target virtual disk.

3.

The target virtual disk volumes are un-mounted and removed from the Virtual Recovery Appliance.

4.

If you are performing manual failover, the source machine is shut down.

5.

The target virtual disk volumes are connected to the replica virtual machine.

6.

The replica virtual machine is powered on.

Because of the nature of physical-to-virtual failover process, failback to the original source is not possible with the Double-Take Virtual Recovery Assistant. NOTE:

If a VirtualCenter server is used during job creation and failover is attempted while VirtualCenter is offline, the failover process will not complete properly and the job will be in an error state. To resolve this issue: 1.

Using the VMware VI client, edit the virtual machine settings of the recovery appliance. Remove the disk drives of the replica virtual machine, but DO NOT delete the drives from disk.

2.

Start the replica virtual machine.

3.

Delete the protection job from the Double-Take Double-Take Virtual Recovery Assistant client. If asked whether or not to delete the associated replica virtual machine, DO NOT  delete the replica, then confirm the selection.

7-1

 

Manage virtual recovery appliances Select Manage virtual recovery appliances in appliances in the left pane, or select Go, Manage virtual recovery appliance to appliance to view the Manage virtual recovery appliances pane. appliances pane.

From this pane, you can select a virtual machine, then choose one of the following actions: Toolbar button

Function Add virtual recovery appliance—Click appliance—Click this button to add a new virtual recovery appliance. The Select ESX server pane will appear where you can begin selecting the virtual machine. For more information, see A d d a v i r t u al r e c o v e r y ap p li an c e  on page page 88-2 2. Configure virtual recovery appliance—Select appliance—Select a virtual recovery appliance in the list, then click this button to enter or update the login credentials for the selected virtual recovery appliance. Remove virtual recovery appliance—Select appliance—Select a virtual recovery appliance in the list, then click this button to delete the selected virtual recovery appliance.

8-1

 

Add a virtual recovery appliance Select the VMware ESX server where the virtual recovery appliance will be hosted.

Enter the following information for the target server: 1. IP address or DNS name—Enter name—Enter the IP address or DNS name of the server which will host your virtual recovery appliance. Or, click the Browse button to browse to locate a server.

NOTE:

If you did not specify a VirtualCenter server, the Browse Browse button  button will not be available. You will be prompted to add a username and password for the target server.

a. In the Browse for server window, server window, browse through the file fi le tree to select a target server server..

b. After you have found the target server, select it, then click Choose Choose..

8-2

 

2. When you are finished, click Next Next.. The Add virtual recovery appliance window will appear. appear.

3. Choose an existing virtual machine—Select machine—Select the virtual machine you would like to use as the

virtual recovery appliance. NOTE:

This field will only display virtual recovery appliances that are powered on and that are running Windows 2003, Standard Standard or Enterprise Enterprise edition.

4. User name—Enter name—Enter the user name for the account that will access the virtual recovery appliance.

NOTE:

If Double-Take is installed on the virtual appliance, then the user account specified must have Double-Take Admin privileges on the virtual appliance.

5. Password Password—Enter —Enter the password that is associated with the user account. 6. After all fields have been completed, click Finish Finish..

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close