Double-Take Availability User's Guide Printable Version

This document is a single HTML page that contains all of the separate HTML pages in the Double-Take Availability User's Guide. This single HTML document is designed to make printing the entire User's Guide easier. You can also print sections of the User's Guide by using your browser's print preview feature and printing only the desired pages. Keep in mind that the page numbers as seen in the Table of Contents may not match the page numbers when you print the document because of differences in printer configurations.

This printable document is not a standalone document. It requires the style definition files and graphic files used in the separate-page User’s Guide. Therefore, if you try to view or print this document on its own (for example, by copying or downloading the single file to a different location), the output will not have any formatting or graphics included.

Table of Contents

Welcome to the Double-Take Availability User's Guide 11
Getting started 12
Frequently used pages 13
Printable version 14
Resources 15
Legal 16
Double-Take Availability overview 17
Core operations 18
Double-Take Availability workloads 22
Full-server workloads 22
Application workloads 23
Virtual workloads 24
Cluster workloads 25
Supported configurations 28
Double-Take Availability requirements 33
General source and target server requirements 34
Full-server workload requirements 44
Application workload requirements 45
Exchange protection requirements 46
SQL protection requirements 49
SharePoint protection requirements 51
BlackBerry protection requirements 51
File Server protection requirements 52
Virtual workload requirements 53
Physical or virtual to Hyper-V requirements 53
Physical or virtual to ESX requirements 54
Hyper-V to Hyper-V requirements 55
ESX to ESX requirements 56
Cluster workload requirements 57
Double-Take Console requirements 58
Installation 59
Installation and upgrade notes 60
Installing or upgrading Double-Take Availability 62
Installing or upgrading Double-Take for VMware Infrastructure 65
Installing Double-Take Availability automatically 67
Configuring your cluster for GeoCluster installation 72
Double-Take Console 75
Starting the console 77
Getting started 78
Inserting servers manually 78
Inserting servers through Active Directory discovery 79
Inserting servers from a server configuration file 79
Managing servers 80
Viewing server details 81
Viewing server events 88
Providing server credentials 88
Managing VirtualCenter servers 89
Console options 90
Setting the frequency of console refreshes 90
Setting the console communications port 90
Updating the console software 90
Other consoles 92
Replication Console 92
Logging on and off 93
Managing the Replication Console tree 96
Groups 96
Servers 97
Sharing group and server configuration 99
Workspaces 100
Clearing maintained security credentials 100
Failover Control Center 101
Configuring communication ports 102
Configuring the console refresh rate 102
Clearing maintained security credentials 103
Full-Server Failover Manager 103
Configuring the console refresh rate 104
Configuring the level of detail to log 105
Clearing maintained security credentials 105
Configuring the monitoring method for server availability 106
Saving and reusing configuration options 106
Application Manager 107
Adding or managing servers 108
Changing Application Manager options 109
Double-Take Availability for VMware Infrastructure console 110
Managing activation codes 111
Managing VirtualCenter servers 112
Managing ESX servers 113
Setting up an e-mail server 113
Workload protection 114
Data protection 115
Establishing a connection using the automated Connection Wizard 115
Creating a replication set 117
Establishing a connection manually using the Connection Manager 119
Establishing a connection across a NAT or firewall 124
Simulating a connection 125
Data workload failover 127
Configuring failover monitoring 127
Updating shares on the target 134
Editing failover monitoring configuration 134
Removing failover monitoring configuration 134
Server settings 135
Identifying a server 135
Licensing a server 137
Configuring server startup options 139
Configuring network communication properties for a server 141
Queuing data 142
Configuring source data processing options 146
Configuring target data processing options 148
Specifying the Double-Take Availability database storage files 151
Specifying file names for logging and statistics 152
Supplying credentials for script processing 154
E-mailing event messages 155
Full-server protection 159
Finding a compatible target 159
Establishing full-server protection 161
Optional full-server protection settings 163
Including and excluding data to be protected 163
Stopping services on the target when protection is enabled 164
Taking snapshots of the target 164
Configuring failover monitoring and processing 165
Mapping network configuration on the target for post-failover 166
Routing data transmissions 167
Mirroring data 167
Compressing data 168
Using NAT or firewalls with full-server workloads 168
Full-server ports 168
Microsoft Windows ports 169
Hardware ports 169
Application protection 170
Protecting an application 170
Optional application protection settings 177
Configuring failover processing 177
Configuring DNS failover 179
Configuring identity failover 182
Configuring failover monitoring 183
Taking snapshots of the target 185
Application connection settings 186
Routing data transmissions 186
Protection configuration 187
Configuring Exchange storage group protection 187
Configuring SQL database protection 188
Configuring file server protection 191
Configuring BlackBerry database protection 192
Configuring SharePoint database protection 194
Mirroring data 196
Application advanced settings 197
Configuring the replication set 198
Configuring scripts 199
Configuring Active Directory 200
Configuring items to failover 201
Configuring default connection parameters 202
Using NAT or firewalls with application workloads 202
Application workload ports 203
Microsoft Windows ports 203
Hardware ports 203
Exchange Failover Utility 204
Virtual server protection 208
Protecting a physical or virtual server to a Hyper-V or ESX server 208
Protecting a Hyper-V server to a Hyper-V server 220
Protecting an ESX server to an ESX server 227
Configuring ports 227
Configuring root or non-root login 228
Establishing ESX to ESX protection 229
Optional ESX protection settings 235
Scheduling protection 235
Changing the name of the protection job 236
Setting transmission options 236
E-mailing notifications 237
Updating VirtualCenter credentials 238
Configuring restart and threshold options 238
Using firewalls with virtual workloads 238
Double-Take Availability ports 239
Microsoft Windows ports 239
Hardware ports 240
Cluster protection 241
Protecting a standard cluster 241
Protecting a GeoCluster 255
GeoCluster resource properties 259
Configuring failover monitoring 265
Special configurations 267
Domain controllers 267
NetBIOS 267
WINS 268
DNS 270
Non-Microsoft DNS 277
Macintosh shares 279
NFS Shares 280
Workload monitoring 282
Data workloads 283
Monitoring a data workload 283
Monitoring failover monitoring 292
Monitoring a full-server workload 295
Monitoring an application workload 297
Monitoring virtual workloads 303
Monitoring virtual workloads in the Double-Take Console 303
Viewing connection details 308
Monitoring virtual workloads in the Double-Take Availability for VMware Infrastructure console 320
Monitoring a cluster workload 323
Log files 326
Viewing the log file 327
Filtering the log file 330
Configuring the properties of the log file 331
Double-Take Availability log messages 332
Monitoring event messages 340
Event messages 340
E-mailing event messages 381
Statistics 385
Configuring the properties of the statistics file 386
Viewing the statistics file 387
Statistics 388
Performance Monitor 405
Monitoring Performance Monitor statistics 405
Performance Monitor statistics 405
SNMP 414
Configuring SNMP on your server 414
SNMP traps 415
SNMP statistics 419
Error codes 428
Failover 435
Failing over data workloads, application workloads configured for identity failover, and cluster workloads 436
Full-server workload failover 441
Failing over using the Full-Server Failover Manager 441
Failing over from the command line 445
Failing over application workloads configured for DNS failover 449
Virtual workload failover 455
Failing over virtual workloads in the Double-Take Console 455
Failing over virtual workloads in the Double-Take Availability for VMware Infrastructure console 456
Failback and restore 457
Data workload failback and restoration 458
Restoring then failing back 458
Failing back then restoring 463
Failing back and restoring a full-server workload 468
Application failback and restoration 469
Failback and restoration for applications configured for identity failover 469
Restoring then failing back applications configured for DNS failover 472
Restoring then failing back virtual workloads 475
Connections 476
Data queues 477
Queuing data 478
Auto-disconnect and auto-reconnect 482
Reconnecting automatically 483
Pausing and resuming target processing 485
Blocking writing to the target paths 486
Disconnecting a connection 487
Mirroring 488
Stopping, starting, pausing, or resuming mirroring 489
Mirroring automatically 492
Running scripts during mirroring 494
Removing orphan files 497
Replication 500
Replication capabilities 501
Replication sets 505
Creating a replication set 508
Creating or modifying replication rules manually 509
Modifying a replication set 511
Renaming and copying a replication set 512
Calculating replication set size 512
Deleting a replication set 514
Starting replication 515
Inserting tasks during replication 516
Verification 517
Verifying manually 518
Verifying on a schedule 520
Configuring the verification log 522
Verify applications on the target 527
Verifying applications on the target from the command line 528
Data transmission 532
Stopping, starting, pausing, and resuming transmission 533
Scheduling data transmission 534
Limiting transmission bandwidth 540
Compressing data for transmission 544
Snapshots 546
Snapshots for data workloads 548
Snapshot states 548
Automatic snapshots 552
Scheduling snapshots 552
Taking snapshots manually 553
Managing full-server and application snapshots 554
Security 556
Security credentials 557
Adding users to the security groups 559
Changing the account used to run the Double-Take service 560
Configuring the Double-Take service for Active Directory 562
Evaluations 564
Evaluating data protection 565
Evaluating full-server protection 579

Welcome to the Double-Take Availability User's Guide

This online documentation is designed to help you find detailed information about Double-Take Availability. Use the Table of Contents pane on the left to explore the different sections or use Search or Index to find specific topics. Below are some of the most useful and most accessed topics in the online documentation.

Getting started

Frequently used pages

Printable version

A printable version, which is a single HTML page containing all of the separate HTML pages in the Double-Take Availability User’s Guide, is available. This single HTML document is designed to make printing the entire User’s Guide easier.

Resources

Legal 

Double-Take, Balance, Double-Take Availability, Double-Take Backup, Double-Take Cargo, Double-Take Flex, Double-Take for Hyper-V, Double-Take for Linux, Double-Take Move, Double-Take ShadowCaster, Double-Take for Virtual Systems, GeoCluster, Livewire, netBoot/i, NSI, sanFly, TimeData, TimeSpring, winBoot/i and associated logos are registered trademarks or trademarks of Double-Take Software, Inc. and/or its affiliates and subsidiaries in the United States and/or other countries. Microsoft, Hyper-V, Windows, and the Windows logo are trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries. All other trademarks are the property of their respective companies.

© 1996-2010 Double-Take Software, Inc. All rights reserved.

 

Double-Take Availability overview

Double-Take Availability ensures the availability of critical workloads. Using real-time replication and failover, you can protect data, individual applications, entire servers, or virtual machines.

Identify your critical workload on your production server, known as the source, and replicate the workload to a backup server, known as the target. The target server, on a local network or at a remote site, stores the copy of the workload from the source. Double-Take Availability monitors any changes to the source workload and sends the changes to the copy stored on the target server. By replicating only the file changes rather than copying an entire file, Double-Take Availability allows you to more efficiently use resources.

Core operations

Double-Take Availability performs four basic types of operations.

Mirroring

Mirroring is the process of transmitting user-specified data from the source to the target so that an identical copy of data exists on the target. When Double-Take Availability initially performs mirroring, it copies all of the selected data, including file attributes and permissions. Mirroring creates a foundation upon which Double-Take Availability can efficiently update the target server by replicating only file changes.

If subsequent mirroring operations are necessary, Double-Take Availability can mirror specific files or blocks of changed data within files. By mirroring only files that have changed, network administrators can expedite the mirroring of data on the source and target servers.

Mirroring has a defined end point - when all of the selected files from the source have been transmitted to the target. When a mirror is complete, the target contains a copy of the source files at that point in time.

Replication

Replication is the real-time transmission of file changes. Unlike other related technologies, which are based on a disk driver or a specific application, the Double-Take Availability replication process operates at the file system level and is able to track file changes independently from the file’s related application. In terms of network resources and time, replicating changes is a more efficient method of maintaining a real-time copy of data than copying an entire file that has changed.

After a source and target have been connected through Double-Take Availability, file system changes from the user-defined data set are tracked. Double-Take Availability immediately transmits these file changes to the target server. This real-time replication keeps the data on the target up-to-date with the source and provides high availability and disaster recovery with minimal data loss.

Unlike mirroring which is complete when all of the files have been transmitted to the target, replication continuously captures the changes as they are written to the source. Replication keeps the target up-to-date and synchronized with the source.

Failure monitoring and failover

Failover is the process in which a target stands in for a failed source. As a result, user and application requests that are directed to the failed source are routed to the target.

Double-Take Availability monitors the source status by tracking network requests and responses exchanged between the source and target. When a monitored source misses a user-defined number of requests, Double-Take Availability assumes that the server has failed. Double-Take Availability then prompts the network administrator to initiate failover, or, if configured, it occurs automatically.

The failover target assumes the network identity of the failed source. When the target assumes the identity of the source, user and application requests destined for the source server or its IP address(es) are routed to the target.

When partnered with the Double-Take Availability data replication capabilities, failover routes user and application requests with minimal disruption and little or no data loss. In some cases, failover may be used without data replication to ensure high availability on a server that only provides processing services, such as a web server.

Restoration

Restoration provides an easy method for copying replicated data from the target back to its original location on the source. The process only requires you to select the source, target, and the appropriate replication set. There is no need to select files or to remember where the data came from on the source since that information is maintained by Double-Take Availability.

Restoration can be used if the source data is lost due to a disk crash or when the most up-to-date data exists on the target due to failover. At the time of a source server failure, your Double-Take Availability target will contain the same data as your Double-Take Availability source. If you are using the Double-Take Availability failover capabilities, users can continue updating data on the target server while the problems on the source are resolved. Because of the continued updates on the target, when the source server is ready to come back online, the two servers will no longer contain the same data. Restoration is the process of copying the up-to-date data from the target back to the original source or a new source.

When a restoration is complete, the source and target are again synchronized. Replication continues from the target to the source, keeping the two servers synchronized, until you disconnect the restoration connection.

Double-Take Availability workloads

Building on Double-Take Availability core operations, you can protect specific workloads to meet your protection goals.

Full-server workloads

Full-server workload protection provides high availability for an entire server, including the system state, which is the server's configured operating system and applications. You identify your source, which is the server you want to protect, and your target, which is the server that will stand-in for the source in the event the source fails. Once the two servers are selected and their configurations validated, Double-Take Availability monitors the source for a failure. When it fails, Double-Take Availability allows the target to stand-in for the source by rebooting and applying the source, including its system state, on the target. After the reboot, the target becomes the source, and the target no longer exists.

Application workloads

Application workload protection provides high availability for Exchange, SQL, SharePoint, BlackBerry, and a Windows file server. You identify your source, which is the server running the application, and your target, which is the server that will stand-in for the source in the event the source fails. Double-Take Availability will gather information from your environment (Active Directory, DNS, and so on) about the application being protected and automatically protect the application. Double-Take Availability monitors the source server or the application services for a failure. When it fails, Double-Take Availability allows the target to stand-in for the source. Your end-users can continue to access the application running on the target, which is standing in for the source.

Virtual workloads

Virtual workload protection provides high availability to Hyper-V or ESX virtual servers. You identify your source, which is the server you want to protect. Your source can be a physical server, a virtual machine where you want to protect the data within the guest operating system, or a virtual machine where you want to protect the host-level virtual disk files (.vhd or .vmdk files). Your target is a Hyper-V or ESX server that will host a virtual machine that is a replica of the source. Double-Take Availability monitors the source for a failure. In the event of a source failure, the replica virtual machine on the target can stand-in allowing end-users to continue accessing data and/or applications.

Cluster workloads

In a standard cluster configuration, a single copy of data resides on a SCSI disk that is shared between cluster nodes. Data is available without users knowing which node owns a cluster resource. MSCS handles failover between nodes of the cluster. By adding Double-Take Availability to this cluster environment, you can further protect your data by replicating the cluster data to a target. In the event the cluster fails, your cluster data will be available on the target.

In a GeoCluster configuration, data is stored on volumes local to each node and replicated to each node in the cluster using Double-Take Availability. Resources and groups are handled in the same manner as a standard cluster. Instead of assigning one group by SCSI drive, you assign one group per logical volume. If a server, disk, group, or network interface should fail, MSCS relocates the failed group to another node, which contains the replicated copy of the data, thus maintaining availability.

Supported configurations

Double-Take Availability is an exceptionally flexible product that can be used in a wide variety of network configurations. To implement Double-Take Availability effectively, it is important to understand the possible configuration options and their relative benefits. Double-Take Availability configuration options can be used independently or in varying combinations.

One-to-one, active/standby

Description One target server, having no production activity, is dedicated to support one source server. The source is the only server actively replicating data.
Applications
  • This configuration is appropriate for offsite disaster recovery, failover, and critical data backup. This is especially appropriate for critical application servers such as Exchange, SQL Server, and web servers.
  • This is the easiest configuration to implement, support, and maintain.
Considerations
  • This configuration requires the highest hardware cost because a target server is required for every source server.
  • You must pause the target when backing up database files on the target.
One-to-one, active/active

Description Each server acts as both a source and target actively replicating data to each other
Applications This configuration is appropriate for failover and critical data backup. This configuration is more cost-effective than the Active/Standby configuration because there is no need to buy a dedicated target server for each source. In this case, both servers can do full-time production work.
Considerations
  • Coordination of the configuration of Double-Take Availability and other applications can be more complex than the one-to-one active/standby configuration.
  • During replication, each server must continue to process its normal workload.
  • Administrators must avoid selecting a target destination path that is included in the source’s replication set. Any overlap will cause an infinite loop.
  • To support the production activities of both servers during failover without reducing performance, each server should have sufficient disk space and processing resources.
  • Failover and failback scripts must be implemented to avoid conflict with the existing production applications.
  • You must pause the server when backing up database files.
Many-to-one

Description Many source servers are protected by one target server.
Applications This configuration is appropriate for offsite disaster recovery. This is also an excellent choice for providing centralized tape backup because it spreads the cost of one target server among many source servers.
Considerations
  • The target server must be carefully managed. It must have enough disk space and RAM to support replication from all of the source systems. The target must be able to accommodate traffic from all of the servers simultaneously.
  • If using failover, scripts must be coordinated to ensure that, in the event that the target server stands in for a failed server, applications will not conflict.
  • You must pause the target when backing up database files on the target.
One-to-many

Description One source server sends data to multiple target servers. The target servers may or may not be accessible by one another.
Applications This configuration provides offsite disaster recovery, redundant backups, and data distribution. For example, this configuration can replicate all data to a local target server and separately replicate a subset of the mission-critical data to an offsite disaster recovery server.
Considerations
  • Updates are transmitted multiple times across the network. If one of the target servers is on a WAN, the source server is burdened with WAN communications.
  • You must pause the target when backing up database files on the target.
Chained

Description The source servers sends replicated data to a target server, which acts as a source server and sends data to a final target server, which is often offsite.
Applications This is a convenient approach for integrating local high availability with offsite disaster recovery. This configuration moves the processing burden of WAN communications from the source server to the target/source server. After failover in a one-to-one, many-to-one, or one-to-many configuration, the data on the target is no longer protected. This configuration allows failover from the first source to the middle machine, with the third machine still protecting the data.
Considerations
  • The target/source server could become a single point of failure for offsite data protection.
  • You must pause the target when backing up database files on the target.

Double-Take Availability requirements

Each Double-Take Availability server must meet minimum requirements. If you are protecting certain workloads, your servers may need to meet additional requirements. Verify that each server meets the general requirements and any additional requirements for your workload type. Additionally, the machine where you will be running the console must also meet several requirements.

General source and target server requirements

Full-server workload requirements

If you will be protecting an entire server, the general source and target server requirements apply. However, keep in mind that a target server may meet these requirements but may not be suitable to stand-in for a source in the event of a source failure. See Finding a compatible target for additional information regarding an appropriate target server for your particular source.

Note:

If you are using Small Business Server, you will need to check with your NAS vendor to verify if there are technical or license restrictions on failing over an image of a server to different hardware.

Microsoft Server Core is only supported in a Server Core to Server Core configuration.

There is one limitation for full-server protection of a cluster. Microsoft clusters identify disks by their disk signature, which is stored on the physical disk in the master boot record. When Double-Take Availabilityis used to failover a cluster node, the disk signature of the target will be different than the source and the cluster will fail to start. Therefore, Double-Take Availability does not natively support the full-server protection of Microsoft cluster nodes. However, you can alter the disk signature on the target manually. See the Microsoft Knowledge Base article 280425 for details on how to change the disk signature.

Application workload requirements

If you will be protecting an application, the general source and target server requirements apply. In addition, you must meet the application requirements below.

Exchange protection requirements

In addition to the general application requirements, you must also meet the following requirements to protect Exchange.

SQL protection requirements

In addition to the general application requirements, you must also meet the following requirements to protect SQL.

SharePoint protection requirements

In addition to the general application requirements, you must also meet the following requirements to protect SharePoint.

BlackBerry protection requirements

In addition to the general application requirements, you must also meet the following requirements to protect BlackBerry.

File Server protection requirements

In addition to the general application requirements, you must also meet the following requirements to protect a file server.

Virtual workload requirements

When you are protecting virtual server workloads, the general source and target server requirements still apply, however, the requirements and limitations are more strict depending on your virtual configuration. Select a link from the table below to see the requirements that correspond with your virtual configuration.

If your source is... and you want to protect... and your target is... then see these requirements...
a physical or virtual server the volumes from the physical server or the volumes from within the virtual guest operating system a virtual server on a Hyper- V server Physical or virtual to Hyper-V requirements
a virtual server on an ESX server Physical or virtual to ESX requirements
a virtual server on a Hyper-V server the host-level virtual disk files (.vhd and .vmdk files) a virtual server on a Hyper-V server Hyper-V to Hyper-V requirements
a virtual server on an ESX server a virtual server on an ESX server ESX to ESX requirements

Physical or virtual to Hyper-V requirements

Use these requirements if your source is a physical or virtual server, you want to protect the volumes from the physical server or volumes from within the virtual guest operating system, and your target is an automatically provisioned virtual server on a Hyper-V server. This means Double-Take Availability will automatically create the virtual server on the Hyper-V target if failover is triggered.

Physical or virtual to ESX requirements

Use these requirements if your source is a physical or virtual server, you want to protect the volumes from the physical server or volumes from within the virtual guest operating system, and your target is an automatically provisioned virtual server on an ESX server. This means Double-Take Availability will automatically create the virtual server on the ESX target if failover is triggered.

Hyper-V to Hyper-V requirements

Use these requirements if your source is a virtual server on a Hyper-V server, you want to protect the host-level virtual disk files, and your target is a virtual server on a Hyper-V server.

ESX to ESX requirements

Use these requirements if your source is a virtual server on an ESX server, you want to protect the host-level virtual disk files, and your target is a virtual server on an ESX server.

Cluster workload requirements

Double-Take Console requirements

There are various Double-Take Availability consoles, many of which are being phased out over time. To help consolidate the consoles and help you locate the necessary workflows to complete your work, use the console called Double-Take Console. You must meet the following requirements for the Double-Take Console.

Installation

Before beginning the installation, review the Double-Take Availability requirements and Installation and upgrade notes. Use the installation instructions appropriate for the type of workload you are protecting

Installation and upgrade notes

Review the following installation and upgrade notes before beginning your installation or upgrade.

  1. Move all cluster resources to one node.
  2. Upgrade to the new version of Double-Take Availability on all of the other nodes.
  3. Move the cluster resources to one of the upgraded nodes.
  4. Upgrade to the new version of Double-Take Availability on the last node.
  5. If needed, move the cluster resources to the desired nodes.

Installing or upgrading Double-Take Availability

Use these instructions to install Double-Take Availability or upgrade an existing Double-Take Availability installation.

  1. Close any open applications.
  2. Start the installation program using the appropriate instructions, depending on your media source.
  3. When the installation program begins, the Double-Take Software Setup Launcher appears allowing you to install software and view documentation for various applications from Double-Take Software. The listed applications will depend on which products are included on the CD or in the web download. To install Double-Take Availability, select Double-Take Availability from the list of products. Under Product Installs, select Double-Take Availability.
  4. Depending on your version of Windows and the components you have installed, you may see an initial screen indicating that you should install or enable Microsoft .NET Framework. If you do not see this screen, your server already has the appropriate version of Microsoft .NET. You should install or enable Microsoft .NET before installing Double-Take Availability. Click Yes to install Microsoft .NET. Click No to continue without installing .NET.
  5. When the Double-Take Availability installation begins, you will be given the opportunity to check for a more recent version of the software.
  6. Review and accept the Double-Take Software license agreement to continue with the installation program. Click Next to continue.
  7. Select the type of installation you would like to perform on this machine.
  8. If desired, specify where the Double-Take Availability files will be installed.
  9. Click Next to continue.
  10. You will be prompted to enter your activation code information. Your Activation Code is a 24-character, alpha-numeric activation code which applies the appropriate license to your installation. You must have a valid activation code to use Double-Take Availability. Enter your code and click Add.
  11. Click Next to continue.
  12. The next screen will depend on the activation code you entered.
  13. Double-Take Availability uses system memory to store data in queues. Specify the maximum amount of system memory to be used for the Double-Take Availability queues and click Next to continue.

    If you set the system memory queue lower, Double-Take Availability will use less system memory, but you will queue to disk sooner which may impact system performance. If you set it higher, Double-Take Availability will maximize system performance by not queuing to disk as soon, but the system may have to swap the memory to disk if the system memory is not available. In general, the amount of memory Double-Take Availability and other applications on the server are configured to use should be less than the amount of physical memory on the system to prevent low memory conditions.

  14. When the Double-Take Availability system memory queue is exhausted, Double-Take Availability will queue to disk. Specify the size and location of the disk queue. (See Queuing data for guidelines on selecting an appropriate location.) By default, the disk space is set to Unlimited which will allow the queue usage to automatically expand whenever the available disk space expands. Click Next to continue.
  15. The Double-Take Availability security information screen appears next. Review this information and click Next to continue with the installation.
  16. If you are satisfied with the selections you have made and are ready to begin copying the Double-Take Availability files, click Install.
  17. During the installation, you may be prompted to add an exception to the Windows Firewall for Double-Take Availability. Click OK to add the port exception. If you Cancel the port modification, you will have to manually modify your firewall settings for Double-Take Availability processing.
  18. After the files have completed copying, click Finish to exit the installation program.

Installing or upgrading Double-Take for VMware Infrastructure

In a typical Double-Take Availability installation, you install the server components on each source and target server. However, when you are protecting the host-level virtual disk files (the .vmdk files) from an ESX source to an ESX target, you need to install the server components on another machine. The Double-Take Availability for VMware Infrastructure service will run from this machine and will communicate with both the source and target servers to handle replication. You may want to consider protecting this machine with Double-Take Availability to keep the machine available because if it becomes unavailable, Double-Take Availability for VMware Infrastructure will be unable to replicate data between the source and target.

In addition to the Double-Take Availability for VMware Infrastructure service, you will need to install the Double-Take Availability for VMware Infrastructure console. The console can be installed on the same machine as the service or it can be installed on a different machine.

Use these instructions to install or upgrade an existing Double-Take Availability for VMware Infrastructure installation.

  1. Close any open applications.
  2. Start the installation program using the appropriate instructions, depending on your media source.
  3. When the installation program begins, the Double-Take Software Setup Launcher appears allowing you to install software and view documentation for various applications from Double-Take Software. The listed applications will depend on which products are included on the CD or in the web download. To install Double-Take Availability for VMware Infrastructure, select Double-Take Availability from the list of products. Under Product Installs, select Double-Take Availability for VMware Infrastructure.
  4. Depending on your version of Windows and the components you have installed, you may see an initial screen indicating that you should install or enable Microsoft .NET Framework. If you do not see this screen, your server already has the appropriate version of Microsoft .NET. You should install or enable Microsoft .NET before installing Double-Take Availability for VMware Infrastructure. Click Yes to install Microsoft .NET. Click No to continue without installing .NET.
  5. When the Double-Take Availability for VMware Infrastructure installation begins, click Next.
  6. You will be given the opportunity to check for a more recent version of the software.
  7. Review and accept the Double-Take Software license agreement to continue with the installation program. Click Next to continue.
  8. Specify where the Double-Take Availability for VMware Infrastructure files will be installed. Click Next to continue.
  9. Select the type of installation you would like to perform on this machine.
  10. Click Next to continue.
  11. You will be prompted to enter your user name, company name, and activation code information. Your Activation Code is a 24-character, alpha-numeric activation code which applies the appropriate license to your installation.
  12. Click Next to continue.
  13. If you are satisfied with the selections you have made and are ready to begin copying the Double-Take Availability for VMware Infrastructure files, click Install.
  14. After the files have completed copying, click Finish to exit the installation program.

Installing Double-Take Availability automatically

The Double-Take Availability installation program can accept command-line parameters which allow you to automate the installation or upgrade process by running an unattended, or silent, installation. The automatic process allows you to pass parameters through to the installation program instead of entering information manually during the installation or upgrade.

Since the automated process does not prompt for settings, the settings are manually defined in a configuration file called DTSetup.ini. By default, DTSetup.ini contains two sections. The second section can be duplicated as many times as necessary. The first section, [Config], applies to any server not defined in the second (or duplicate of second) sections. The second (or duplicate of second) section, [MachineName], allows you to specify unique settings for individual servers. You have to modify the heading name (case-sensitive) to identify the server.

Sample DTSetup.ini

[Config]

DTSETUPTYPE=DTNT

DTACTIVATIONCODE=123456789012345678901234

DOUBLETAKEFOLDER="C:\Program Files\Double-Take Software\Double-Take"

QMEMORYBUFFERMAX=128

DISKQUEUEFOLDER="C:\Program Files\Double-Take Software\Double-Take"

DISKQUEUEMAXSIZE=UNLIMITED

DISKFREESPACEMIN=50

DTSERVICESTARTUP=1

PORT=6320

SET_FWPORT=Y

 

[Alpha]

DTSETUPTYPE=DTNT

DTACTIVATIONCODE=123456789012345678901234

DOUBLETAKEFOLDER="C:\Program Files\Double-Take Software\Double-Take"

QMEMORYBUFFERMAX=128

DISKQUEUEFOLDER="C:\Program Files\Double-Take Software\Double-Take"

DISKQUEUEMAXSIZE=UNLIMITED

DISKFREESPACEMIN=50

DTSERVICESTARTUP=1

PORT=6320

SET_FWPORT=Y

 

[Beta]

DTSETUPTYPE=DTNT

DTACTIVATIONCODE=123456789012345678901234

DOUBLETAKEFOLDER="C:\Program Files\Double-Take Software\Double-Take"

QMEMORYBUFFERMAX=128

DISKQUEUEFOLDER="C:\Program Files\Double-Take Software\Double-Take"

DISKQUEUEMAXSIZE=UNLIMITED

DISKFREESPACEMIN=50

DTSERVICESTARTUP=1

PORT=6320

SET_FWPORT=Y

In the sample DTSetup file, the server Alpha would use the parameters defined under the [Alpha] heading. The server Beta would use the parameters defined under the [Beta] heading. All other servers would use the configuration under the [Config] section.

Note: Do not leave any parameter blank in the Config or MachineName sections. Otherwise, a hard-coded default stored in a Double-Take Availability .dll file will be used.

Review the following table to understand the different parameters available in DTSetup.ini.

Parameter Valid Values
DTSetupType
  • DTNT—Both the Double-Take Availability server and client components will be installed.
  • DTCO—Only the Double-Take Availability client components will be installed.
  • DTSO—Only the Double-Take Availability server components will be installed.

If you are installing on Windows Server Core or Windows Hyper-V Server (standalone), the setup type will be server components only regardless of your setting.

DTActivationCode A 24 character, alpha-numeric activation code which applies the appropriate license to the server. Multiple activation codes can be separated by a semi-colon.
DoubleTakeFolder Any valid path specifying the location of the Double-Take Availability files
QMemoryBufferMax Any integer representing the amount of system memory, in MB, to use for memory-based queuing
DiskQueueFolder Any valid path to the location of the disk-based queue.
DiskQueueMaxSize Any integer representing the amount of disk space, in MB, to use for disk-based queuing or the keyword UNLIMITED which will allow the queue usage to automatically expand whenever the available disk space expands
DiskFreeSpaceMin Any integer representing the amount of disk space, in MB, that must remain free at all times
DTServiceStartup
  • Y or 1—Start the Double-Take service automatically
  • N or 0—Do not start the Double-Take service automatically

This parameter is not applied if your DTSetupType is DTCO.

Port Any integer between 1024 and 65535 that identifies the Windows Firewall port used for Double-Take Availability.
Set_FWPORT
  • Y or 1—Set the Windows Firewall port for Double-Take Availability
  • N or 0—Do not set the Windows Firewall port for Double-Take Availability
Note:

You must have Microsoft .NET installed on server before starting the automatic installation.

If you are using Windows 2008, but you are not using the built-in administrator account, Windows 2008 User Access Control will prompt you to confirm you want to install Double-Take Availability. To work around this issue, use the built-in administrator account when you are installing to each server. You may also disable User Access Control if that is acceptable for your environment.

Installing or upgrading automatically to a local machine
  1. Create a temporary directory on the server. For example, create c:\temp_install.
  2. On the CD, locate the files in a subdirectory under \setup\dtsw that is appropriate for your architecture, either i386, x64, or IA64. Copy the files from that subdirectory to the temporary directory.
  3. From a command prompt, remove the read-only attributes from the files in the temporary directory by using the command attrib *.* -r.
  4. Make a backup copy of the default DTSetup.ini file in the temporary directory.
  5. Edit DTSetup.ini as needed using the values described in the previous table.
  6. Determine the exact file name of your setup file by using the command dir setup*.* from the temporary directory command prompt. Depending on how you received your software (CD or web), your setup file name will be named setup.exe or setup_xxxx.exe where xxxx is four numbers that specify the build number. For example, your setup file might be called setup.exe or setup_1352.exe.
  7. Run one of the following case-sensitive commands from the temporary directory, depending on if you have setup.exe or setup_xxxx.exe where xxxx is a four digit build number.

setup /s /v"DTSETUPINI=\"c:\dtinstall\DTSetup.ini\" /qn"

setup_xxxx /s /v"DTSETUPINI=\"c:\dtinstall\DTSetup.ini\" /qn"

Note:

The command must be run from the directory where the temporary files are located as well as specifying that directory for the .ini file.

Spacing is critical with this command. A space should precede /s, /v, and /qn but should not appear anywhere else for the command to work correctly.

Installing or upgrading automatically to a remote machine
  1. Create a temporary directory on the primary site server. For example, create z:\temp_install.
  2. Share the temporary folder.
  3. On the CD, locate the files in a subdirectory under \setup\dtsw that is appropriate for your architecture, either i386, x64, or IA64. Copy the files from that subdirectory to the temporary directory.
  4. From a command prompt, remove the read-only attributes from the files in the temporary directory by using the command attrib *.* -r.
  5. Make a backup copy of the default DTSetup.ini file in the shared folder.
  6. Edit DTSetup.ini as needed using the values described in the previous tables.
  7. From each server where you want to install Double-Take Availability, map a drive to the temporary directory that you created in step 1. For example, you might map your m: drive to the share.
  8. Determine the exact file name of your setup file by using the command dir setup*.* from the mapped drive command prompt. Depending on how you received your software (CD or web), your setup file name will be named setup.exe or setup_xxxx.exe where xxxx is four numbers that specify the build number. For example, your setup file might be called setup.exe or setup_1352.exe.
  9. Run one of the following case-sensitive commands from the mapped drive, depending on if you have setup.exe or setup_xxxx.exe where xxxx is a four digit build number.

setup /s /v"DTSETUPINI=\"m:\DTSetup.ini\" /qn"

setup_xxxx /s /v"DTSETUPINI=\"m:\DTSetup.ini\" /qn"

Note:

The command must be run from the shared folder as well as specifying that directory for the .ini file.

Substitute your mapped drive for m:\.

Spacing is critical with this command. A space should precede /s, /v, and /qn but should not appear anywhere else for the command to work correctly.

C:\>net use m: \\server_name\share

The command completed successfully

C:\>M:

M:\>setup_1352 /s /v"DTSETUPINI=\"m:\DTSetup.ini\" /qn"

Configuring your cluster for GeoCluster installation

If you want to use a GeoCluster configuration, where data is stored on volumes local to each node and replicated to each node in the cluster, complete the cluster configuration appropriate for the operating system you are using.

Configuring your Windows 2003 cluster

In a typical Windows 2003 MSCS shared disk cluster configuration, the quorum resource, by default, is the Local Quorum and is located on the first shared disk in the cluster. Because in a GeoCluster configuration there is no shared physical disk, the Local Quorum will not work as the quorum resource. You will need to choose one of the other Windows quorums. Review the following table to determine which quorum is appropriate for your environment.

Note: If you are upgrading from a previous GeoCluster version and were using GeoCluster as a quorum, you must select another quorum type. GeoCluster can no longer be used as a quorum resource.
Quorum Type Description GeoCluster Recommendation
Local Quorum This quorum is for single node clusters and shared disk clusters. It cannot be used in a GeoCluster configuration.  
Majority Node Set This quorum is for clusters with three or more nodes. X
Majority Node Set with File Share Witness This quorum is for clusters with only two nodes. If you are using Windows 2003 Service Pack 1 or earlier, see the Microsoft support article 921181 for an update for the File Share Witness. If you are using Service Pack 2 or later, the update is not needed. X

Use the following instructions as a guideline for configuring your Windows 2003 cluster. See your Windows cluster documentation as a complete reference.

  1. Login with an account that has administrative rights on the domain and the local machine.
  2. Create the cluster on the first node, if it is not already created. See your Windows documentation for instructions on how to create a cluster.
  3. Add your additional nodes to the cluster. See your Windows documentation for instructions on how to add nodes to the cluster.
  4. Install GeoCluster on each node of the cluster.
  5. Configure your quorum. See your Windows documentation for instructions on configuring the quorum appropriate for your environment.
  6. If desired, you can install GeoCluster on non-clustered client machines if you want to use Cluster Administrator to control the GeoCluster resources. Install GeoCluster, selecting the Client Components Only installation option.
Configuring your Windows 2008 cluster

The default quorum resource in a Windows 2008 environment will vary depending on your configuration (number of nodes, shared disks, and so on). The ideal quorum resource to use for GeoCluster is the Node and File Share Majority. There are other quorum types available. Review the following table to determine which quorum is appropriate for your environment.

Quorum Type Description GeoCluster Recommendation
Node Majority This quorum is recommended for clusters with an odd number of nodes. The cluster can handle failures of half of the nodes (rounding up) minus one and still stay online.  
Node and Disk Majority This quorum is recommended for clusters with an even number of nodes. The cluster can handle failures of half of the nodes (rounding up), as long as the witness disk remains online, and still stay online. If the witness disk fails, the cluster can handle failures of only half of the nodes (rounding up) minus one and still stay online.  
Node and File Share Majority This quorum is recommended for clusters with special configurations, such as GeoCluster. The cluster can handle failures of half of the nodes (rounding up), as long as the witness share remains online, and still stay online. If the witness share fails, the cluster can handle failures of only half of the nodes (rounding up) minus one and still stay online. X
No Majority: Disk Only This quorum is not usually recommended. The cluster can handle failures of all nodes except one and still stay online.  

Use the following instructions as a guideline for configuring your Windows 2008 cluster. See your Windows cluster documentation as a complete reference.

  1. Login with an account that has administrative rights on the domain and the local machine.
  2. Create the cluster, if it is not already created. See your Windows documentation for instructions on how to create a cluster.
  3. Configure a Node and File Share Majority quorum. See your Windows documentation for instructions on how to configure the quorum.
  4. If you are going to be using Hyper-V, install the Hyper-V server role on all nodes in the cluster. Make sure that you have the required Microsoft hotfixes applied, including KB958065 which is a failover clustering hotfix and KB950050.
  5. Install GeoCluster on each node of the cluster.
  6. If desired, you can install GeoCluster on non-clustered client machines if you want to use Cluster Administrator to control the GeoCluster resources. Install GeoCluster, selecting the Client Components Only installation option.
  7. If you are going to be using Hyper-V, create your virtual machine from within Hyper-V. Be sure to leave the virtual machine off.
  8. From Failover Cluster Management, create your application or service group.
  9. Note:

    If you are creating a file server using clustered file shares, the path for the file share in the Failover Cluster Management wizard is case-sensitive. If the drive letter is uppercase, the path in the clustered file share wizard must also be uppercase. If the case does not match, the wizard will fail stating the path does not exist.

  10. If you are using Hyper-V, add your virtual machine resource to the group. Any warnings about storage may be disregarded because the GeoCluster Replicate Disk will alleviate storage requirements.

Double-Take Console

The Double-Take Console is used to protect and monitor your servers and connections. Each time you open the Double-Take Console, you start at the Home page. This page provides a high-level overview of the status of your connections.

The appearance of the Home page is the same for all users. However, other console pages may have variances in the appearance or you may not see some pages at all. The pages and views depend on the Double-Take Software products that you have installed.

Starting the console

After you have installed the console, you can launch it by selecting Start, Programs, Double-Take, Double-Take Console.

Getting started

The first time you start the console, it is empty. In order to protect and monitor your servers, you must insert your servers in the console. You can insert servers manually, through Active Directory discovery, or from a console server configuration file.

Inserting servers manually

  1. Select Get Started from the toolbar.
  2. Select Add servers and click Next.
  3. On the Manual Entry tab, specify the server information.
  4. If necessary, specify the domain or protocol under More Options.
  5. After you have specified the server information, click Add.
  6. Repeat steps 3 through 5 for any other servers you want to add.
  7. If you need to remove servers from the list of Servers to be added, highlight a server and click Remove. You can also remove all of them with the Remove All button.
  8. When your list of Servers to be added is complete, click OK.

You will automatically be taken to the Manage Servers page.

Inserting servers through Active Directory discovery

  1. Select Get Started from the toolbar.
  2. Select Add servers and click Next.
  3. Select the Automatic Discovery tab.
  4. Click Discover to search Active Directory for servers running Double-Take Availability.
  5. If you need to remove servers from the list of Servers to be added, highlight a server and click Remove. You can also remove all of them with the Remove All button.
  6. When your list of Servers to be added is complete, click OK.

You will automatically be taken to the Manage Servers page.

Inserting servers from a server configuration file

You can share the console server configuration between machines that have the Double-Take Console installed. The console server configuration includes the server name, server communications ports, user name, encrypted password, and other internal processing information.

  1. To export a server configuration file, select File, Export.
  2. Specify a file name and click Save.

After the configuration file is exported, you can import it to another console.

When you are importing a console server configuration file from another console, you will not lose or overwrite any servers that already exist in the console. For example, if you have server alpha in your console and you insert a server configuration file that contains servers alpha and beta, only the server beta will be inserted.

  1. To import a server configuration file, select File, Import.
  2. Locate the console configuration file saved from the other machine and Open.

After the configuration file is imported, you will automatically be taken to the Manage Servers page.

Managing servers

To manage the servers in your console, select Manage Servers from the toolbar. The Manage Servers page allows you to view, add, edit, or remove servers from your console.

Column Description
 

The first blank column indicates the status of communications between the console and the server.

The console is attempting to communicate with the server.

The server is online and the console is communicating with it.

The server is offline, so the console cannot communicate with it.

The console has lost communication with the server.

 

The second blank column indicates the security level

Administrator access

Monitor only access

No security access

Server The name of the server
Activity

There are many different Activity messages that keep you informed of the server activity. Most of the activity messages are informational and do not require any administrator interaction. If you see error messages, check the server details.

Version The product version information
Product The products licensed for the server
Activation Code The activation codes associated with the products licensed for the server
Toolbar Item Description
Add a new server. This button leaves the Manage Servers page and opens the Add Servers page
View detailed information about a server. This button leaves the Manage Servers page and opens the View Server Details page
Remove the server from the console
Change the login credentials for a server
View event messages for a server. This button leaves the Manage Servers page and opens the View Server Events page.

Viewing server details

To view details about a specific server, select View Server Details from the toolbar on the Manage Servers page. The View Server Details page allows you to view details about a particular server.

Category Server Detail Item Description
Properties Server name The server name or IP address as added to the console
Status There are many different Status messages that keep you informed of the server activity. Most of the status messages are informational and do not require any administrator interaction. If you see error messages, check the rest of the server details.
Activity

There are many different Activity messages that keep you informed of the server activity. Most of the activity messages are informational and do not require any administrator interaction. If you see error messages, check the rest of the server details.

Protocol
  • Automatically detect protocol—The console automatically determined the protocol type to use to communicate with the server.
  • XML web services protocol—XML web services is the protocol being used to communicate with the server. This server should be running Double-Take version 5.2 or later.
  • Legacy protocol—Double-Take legacy, proprietary protocol is being used to communicate with the server. This server should be running Double-Take version 5.1 or earlier.
Port The port used for communication with the server
Version The product version information
Access The security level granted to the specified user
User name The user account used to access the server
Licensing

Licensing information for the server

  • Product—The product associated with the license
  • Serial number—The serial number associated with the license
  • Expiration date—The date the license expires, if there is one
  • Code—The activation code
Connections Source connections A list of any connections from this server. Double-clicking on a connection in this list will automatically open the View Connection Details page.
Target connections A list of any connections to this server. Double-clicking on a connection in this list will automatically open the View Connection Details page.

Viewing server events

To view events associated with a specific server, select View Server Events from the toolbar on the Manage Servers page.The View Server Events page displays the same messages that are logged to the Windows Event Viewer. The list of events are displayed in the top pane of the page, although the Description is limited. When you highlight an event, the event details, including the full Description, are displayed in the bottom pane of the page.

You can filter the events displayed by using the Filter drop-down list or the View warning events and View error events toolbar buttons. To clear a filter, select All events in the Filter drop-down list. See Event messages for a complete list of the service and driver event messages.

Providing server credentials

To update the security credentials used for a specific server, select Provide Credentials from the toolbar on the Manage Servers page. When prompted, specify the User name, Password, and Domain of the account you want to use for this server. Click OK to save the changes.

Managing VirtualCenter servers

To manage your VirtualCenter servers, select Go, Manage VirtualCenter Servers. The Manage VirtualCenter Server page allows you to view, add, remove, or edit credentials for your VirtualCenter servers available in the console.

Column Description
VirtualCenter Server The name of the VirtualCenter server
Full Name

The full name of the VirtualCenter server

User Name The user account being used to access the VirtualCenter server
Toolbar Item Description

Add a new VirtualCenter server. When prompted, specify the VirtualCenter server and a user account.

Remove the VirtualCenter server from the console.
Edit credentials for the selected VirtualCenter server. When prompted, specify a user account to access the VirtualCenter server.

Console options

There are several options that you can set that are specific to the Double-Take Console. To access these console options, select Options from the toolbar.

Setting the frequency of console refreshes

To access the console refresh rate, select Options from the toolbar. On the Options page, Monitoring interval specifies how often, in seconds, the console refreshes the monitoring data. The servers will be polled at the specified interval for information to refresh the console.

Setting the console communications port

To access the console communications port, select Options from the toolbar. On the Options page, Default port specifies the port that the console will use when sending and receiving data to Double-Take servers. By default, the port is 6325. Changes to the console port will not take effect until the console is restarted.

Note: If you are using an older Double-Take version, you will need to use the legacy protocol port. This applies to Double-Take versions 5.1 or earlier.

Updating the console software

By default, each time the console is started, it will automatically check the Double-Take Software web site to see if there is updated console software available. If there is updated console software available, an Automatic Updates section will appear on the Home page. Click Get the latest update to download and install the updated console software.

If you want to disable the automatic check for updates, click Change automatic updates or select Options from the toolbar. On the Options page, deselect Automatically check for updates to disable the automatic check.

You can also manually check for updates by selecting Help, Check for Updates.

Other consoles

There are various Double-Take Availability consoles, many of which are being phased out over time. To help consolidate the consoles and help you locate the necessary workflows to complete your work, use the console called Double-Take Console.

To access this console, select Start, Programs, Double-Take, Double-Take Console. Select Get Started from the toolbar and then select the type of workload protection you want to establish. The appropriate workflow or console will then open.

Use the following links to find more information on the other consoles available.

Replication Console

To open the Replication Console, select Start, Programs, Double-Take, Double-Take Replication Console.

From the Replication Console, you can manage, monitor, and control your data workload connections. The Replication Console is a two pane view. The views in the panes change depending on what is highlighted. For example, when the root of the tree in the left pane is selected, all of the machines in your environment running Double-Take Availability are displayed in the right pane. If you expand the tree in the left pane and select a server, any connections for that server are displayed in the right pane.

Note:

You may not have access to some of the components or see certain display options if you are using a newer version of the Replication Console to control an older version of your source or target.

If you are logged in locally to the machine running the Replication Console, there will be no servers automatically populated in the Servers tree. You will have to manually insert each server.

Logging on and off

To ensure protection of your data, Double-Take Availability offer multi-level security using native operating system security features. Privileges are granted through membership in user groups defined on each machine running Double-Take Availability. To gain access to a particular Double-Take Availability source or target, the user must provide a valid operating system user name and password and the specified user name must be a member of one of the Double-Take Availability security groups. Once a valid user name and password has been provided and the Double-Take Availability source or target has verified membership in one of the Double-Take Availability security groups, the user is granted appropriate access to the source or target and the corresponding features are enabled in the client. Access to Double-Take Availability is granted on one of the following three levels.

  1. Highlight a machine on the left pane of the Replication Console. By double-clicking the machine name, Double-Take Availability automatically attempts to log you on to the selected machine using the ID that you are currently logged on with. Verify your access by the resulting icon.
  2. If you have no access, the Logon dialog box will automatically appear. If you have monitor access or want to log on with a different username, right-click the machine name and select Logon.

  1. Specify your Username, Password, Domain, and whether you want your password saved.
  2. Click OK and verify your access by the resulting icon and log on again if necessary.
  3. Note:

    When logging in, the user name, password, and domain are limited to 100 characters.

    If your activation code is missing or invalid, you will be prompted to open the Server Properties General tab to add or correct the code. Select Yes to open the Server Properties dialog box or select No to continue without adding an activation code.

    If the login does not complete within 30 seconds, it is automatically canceled. If this timeout is not long enough for your environment, you can increase it by adjusting the Communication Timeout on the Configuration tab of the Replication Console properties. Select File, Options, from the Replication Console to access this screen.

    Double-Take Availability uses ICMP pings to verify server availability during the login process. If your Double-Take Availability server is across a router or firewall that has ICMP pings disabled, you will need to disable the Double-Take Availability ICMP ping verification. To do this, select File, Options, from the Replication Console and disable Use ICMP to verify server availability.

    Double-Take Availability uses the current user's login credentials to attempt to log in to servers. This is called a unified login. If you want to disable unified logins, select File, Options, from the Replication Console and enable Use Named Pipes for Login.

    Icon Description Access Granted
    This icon is a computer with a gear and it indicates the Double-Take Availability security is set to administrator access. Administrator rights
    This icon is a computer with a magnifying glass and it indicates the Double-Take Availability security is set to monitor only access. Monitor rights
    This icon is a lock and it indicates the Double-Take Availability security is set to no access. No rights
  4. To log off of a Double-Take Availability machine, right-click the machine name on the left pane of the Replication Console and select Logout.

Managing the Replication Console tree

To better manage the servers that appear in the Replication Console, you can customize the server display to fit your needs. You can create groups and move servers to those groups to help you organize your environment. Within the groups, you can insert, remove, hide or unhide servers. Each of these functions is detailed in the following sections.

Groups

The left pane of the Replication Console is a tree view of the Double-Take Availability servers. By default, the first group in the tree is the Discovered Servers group. All Double-Take Availability servers that are automatically discovered will be added to this group. Use server groups in a hierarchical structure to help you organize your environment.

Creating groups

Use one of the following methods to create a new group:

The location of the new group that is created will depend on what was highlighted. If the root of the tree was highlighted, the new group will be created as a child of the root. If a group or server within a group was highlighted, the new group will be created as a child of that group. Name the newly inserted group with a unique name by typing over the default name and pressing Enter. This process is similar to naming a new folder in Windows Explorer. You can also rename an established group by double-clicking on the existing name. Type the new group name over the existing name and press Enter.

Removing groups

You will prompted to confirm the removal of the group and its subgroups and any servers (displayed or hidden) contained in them. Click OK.

If Active Directory discovery is enabled on the Replication Console, those servers that have Active Directory advertisement enabled will automatically be repopulated back in the default Discovered Servers group. If Active Directory discovery is disabled on the Replication Console or for individual servers, servers will need to be manually inserted into the Replication Console.

Note:

The Remove toolbar button also removes servers and replication sets, so make sure you have the correct item highlighted before clicking the toolbar button.

You cannot remove the default Discovered Servers group.

Servers

Within your server groups, you have the ability to further manage the servers that are displayed by using the following functions.

Moving Servers

Servers that are auto-populated can be moved to different groups within the Replication Console tree. You can move servers to groups by either of the following methods

A Double-Take Availability server will only appear once within the entire Replication Console tree. Servers cannot be placed into multiple groups.

Inserting Servers

If a machine is not displayed on the Replication Console, it can be manually inserted. This feature is useful for machines that are across a router or on a different network segment.

Note:

If a machine is manually inserted into the Replication Console, it will automatically be saved in your workspace and will appear the next time the Replication Console is started.

Use the following instructions to insert a server into the Replication Console.

  1. A server that already exists in the tree will be moved to the currently selected group if you attempt to insert it again.
  2. Right-click on a group and select New, Server or highlight a group and select Insert, Server.
  3. Type the machine name or IP address and the port number, if it is different than the default.
  4. Click Test to determine if the machine is running Double-Take Availability. At any time while Double-Take Availability is attempting to locate the machine, click Stop to cancel the test. If you do not manually test a machine before inserting it, Double-Take Availability will automatically test it for you.
  5. Click OK to insert the server or Cancel if you do not want to insert that server.

Even if a machine is not running Double-Take Availability, you can still insert it in the Replication Console.

Removing Servers

If you do not want to see a server in the Replication Console, it can be permanently removed from the display. You might need to remove a server that was manually added, if that server is no longer needed. Or if there are servers within the network that another administrator is responsible for, you can remove them from your display.

If a server is listed in Active Directory and Active Directory discovery is enabled, a removed server will automatically be added back to the server list .

To remove a server, right-click on the server in the left or right pane of the Replication Console and select Remove. You can also select Remove Item from the toolbar.

If Active Directory discovery is enabled on the Replication Console, those servers that have Active Directory advertisement enabled will automatically be repopulated back in the default Discovered Servers group. If Active Directory discovery is disabled on the Replication Console or for individual servers, servers will need to be manually inserted into the Replication Console.

Note:

The Remove toolbar button also removes servers and replication sets, so make sure you have the correct item highlighted before clicking the toolbar button.

You cannot remove the default Discovered Servers group.

Hiding Servers

If you do not want to see a server in the Replication Console and do not want to disable Active Directory discovery, you can hide the server from view. This keeps the server in the Replication Console’s internal list of servers, but does not display it in the server tree, any dialog boxes, or any field/menu selections.

To hide a server, right-click on a server in the left or right pane of the Replication Console and select Hide.

Note:

If you attempt to insert a server that is already in the tree but hidden, you will be prompted to unhide the server and insert it into the selected group.

Be careful if you hide a server with an established Double-Take Availability connection. If that connection goes into an error state, you will not be able to see the connection in the Replication Console. The Double-Take Availability log, Event Viewer, and other monitoring methods will still be functioning to alert you to the error. Hiding the server only removes it from the Replication Console display.

If a target server with an established Double-Take Availability connection is hidden and you open the Connection Manager for that connection via the source, you will see the target and IP address displayed in the Target and Route fields, respectively. This is the only time you will see a hidden server.

Unhiding Servers

You can unhide, or display, a hidden server at any time you want to access that server. The server will be displayed in the server tree, all dialog boxes, and field/menu selections.

To unhide, or display, a hidden server, you can insert the server or use the following instructions.

  1. Select View, Unhide Servers.
  2. Select one or more servers by using Ctrl-click or Shift-click. You can also click Select All to select all of the servers in the list.
  3. Click Unhide.

Before moving a group that contains at least one subgroup with at least two hidden servers, you must unhide all of the servers. After the servers have been unhidden, move the group and then hide the servers again. Any attempt to move a group containing subgroups with hidden servers will result in an error when saving the workgroup or exiting the Replication Console.

Sharing group and server configuration

All of the group and server information is stored on the local machine for each user. When you close the Replication Console, the group information is saved and will be persisted the next time you open the Replication Console on this machine. If you want to share the group configuration with another user or machine, you can export the group configuration information (File, Export server group configuration) to an .xml file. That file can then be copied and imported (File, Import server group configuration) by another user on this machine or to another machine.

Workspaces

The Replication Console workspace contains the display of the panes of the Replication Console and any servers that may have been inserted. Multiple workspaces can be used to help organize your environment or to view settings from another machine.

Saving a workspace

As you size, add, or remove windows in the Replication Console, you can save the workspace to use later or use on another Double-Take Availability client machine. Select File and one of the following options.

Opening a workspace

From the Replication Console, you can open a new workspace or open a previously saved workspace. Select File and one of the following options.

Clearing maintained security credentials

To remove cached credentials, select File, Options and select the Security tab. To remove the security credentials, enable Clear Cached Security Credentials and then click OK.

Failover Control Center

To open the Failover Control Center, select Start, Programs, Double-Take, Availability, Double-Take Availability Failover Control Center.

The Failover Control Center should be run from your target server or a client machine. Do not run the Failover Control Center from your source server.

From the Failover Control Center, you can manage, monitor, and control failover for your Double-Take Availability servers. The Failover Control Center displays a main window for monitoring failover activity. Control buttons to the right allow you to configure and manage your servers.

 

Configuring communication ports

The Failover Control Center uses port 6320, by default for Double-Take Availability communications. To view or modify the port settings in the Failover Control Center, select Settings, Communications.

Configuring the console refresh rate

The failover client periodically requests information from the source and target. Depending on the type of information, the request may be a machine-specific request, like obtaining the Time to Fail status from a target, or may be a general request, like determining which machines are running Double-Take Availability.

The rate at which these requests are made can be modified through the Failover Control Center refresh rate dialog box. Select Settings, Refresh Rate. The default update interval is one second. A lower refresh rate value updates the information in the Failover Control Center window's Monitored Machines tree more often, but also generates more network traffic and higher utilization on the client and target machines. A higher refresh rate value updates the information less frequently, but minimizes the network traffic.

Clearing maintained security credentials

To remove cached credentials, access the credentials security option, by selecting Settings, Security. To remove the security credentials, enable Clear Cached Security Credentials and then click OK.

Full-Server Failover Manager

To open the Full-Server Failover Manager, select Start, Programs, Double-Take, Availability, Double-Take Availability Full-Server Failover Manager.

The Full-Server Failover Manager allows you to create your source and target connection, monitor your full-server workload protection, manage your full-server snapshots, and initiate full-server failover.

The client is a simple interface with four numbered steps. Steps 1 and 2 for the source and target have to be completed before the other steps are available or the Protection Status is displayed.

Configuring the console refresh rate

Select File, Options. By default, the main window of Full-Server Failover Manager will automatically update every five (5) seconds. If desired, you can modify the Refresh Interval. You can also refresh the main window manually by selecting File, Refresh.

Configuring the level of detail to log

Select File, Options. By default, Full-Server Failover Manager creates a log that maintains all processing information. If desired, you can disable the option Enable Verbose Logging so that only basic processing information is logged.

Clearing maintained security credentials

Select File, Options. By default, Full-Server Failover Manager will save the user credentials supplied for each servers. If desired, you can enable Clear cached credentials on exit so they are not saved. You can also clear the user credentials manually by selecting File, Clear Cached Credentials.

Configuring the monitoring method for server availability

Select File, Options. By default, Full-Server Failover Manager will use ICMP pings to check for server availability. If you do not want to use ICMP pings, select Do not use ICMP Ping. When this option is selected, the Full-Server Manager will use the Double-Take service to check for server availability.

Saving and reusing configuration options

After you have created a protection pair and configured any of the optional settings you can save those settings so that you can reuse them for future pairs of servers. Once you have the settings the way you want them, save them by selecting File, Defaults, Save Current Settings as Defaults. This creates a file called FFMDefaults.xml, which will automatically be the default settings the next time you use the Full-Server Failover Manager. If desired, you can rename the FFMDefaults.xml file and then save a new set of defaults to FFMDefaults.xml to be used by the Full-Server Failover Manager. This would allow you to have multiple failover configurations, which can be more easily interchanged. You can also use these different files to initiate failovers without using the Full-Server Failover Manager GUI.

Note: Because network adapters are uniquely identified on each server, the Network Mappingis not stored in the default settings

If you want to reset the configuration settings back to the default settings, select File, Defaults, Reset Defaults.

Application Manager

To open the Application Manager, select Start, Programs, Double-Take, Availability, Double-Take Availability Application Manager.

Note:

You can also start the Application Manager from the command line.

  • To start it in standard mode, run the command dtam /application, where /application is /exchange, /sql, /fileprint, /blackberry, or /sharepoint.
  • To start it in advanced mode, run the command dtam /application /advanced, where /application is /exchange, /sql, /fileprint, /blackberry, or /sharepoint.

The Application Manager allows you to establish application protection, monitor that protection, and initiate application failover and failback.

When you select an application to protect in the Tasks list on the left pane, the Setup tab on the right pane is a simple interface with four numbered steps. Steps 1 and 2 are for the domain and servers. Step 3 is optional configuration and step 4 validates the servers.

After protection has been established, use the Monitor tab to check on the status of your protection.

 

Adding or managing servers

Step 2 of the application protection workflow is to select your source and target servers. If no servers are populated in the lists (perhaps the server you need is in a child domain), click Advanced Find to add servers to the lists. Advanced Find is not available for all application protections.

  1. Click Search to locate all the application servers that Application Manager can discover in the domain. If you have a large number of servers in Active Directory, this search may take awhile.
  2. Highlight servers in the Discovered Servers list and move them to the Current Servers list to add them to the Application Manager console.
  3. To add a non-discovered server, type the server name below the Current Servers list and click Add.
  4. To remove any servers from the Application Manager console, highlight the server name in the Current Servers list and click Remove.
  5. For some applications, you can click the Test SQL button to have Application Manager check to see if the application is installed and accessible on the selected server.
  6. When you have finished managing your servers, click OK.

Changing Application Manager options

To modify Application Manager options, select Tools, Options and modify any of the following options.

Double-Take Availability for VMware Infrastructure console

To open the Double-Take Availability for VMware Infrastructure console, select Start, Programs, Double-Take, Availability, Double-Take Availability for VMware Infrastructure.

The first time you use the console or if you have not saved your login information, you will be prompted to provide login information. Specify the Server, which is the machine running the Double-Take Availability for VMware Infrastructure service, and a User name and Password. If you do not want to provide login information each time you open the console, enable Save DTAVI connection information.

The Double-Take Availability for VMware Infrastructure console allows you to establish protection of host-level virtual disk files (the .vmdk files) from an ESX source to an ESX target. You can also initiate failover and failback.

The left pane is a tasks-style pane. When an item in the left pane is selected, the right pane of the console display updates to the corresponding workflow or page.

 

Managing activation codes

You can manage your Double-Take Availability for VMware Infrastructure activation codes by selecting Go, Manage activation codes.

Enter a new activation code and click Add. To remove a code, highlight in the list and click Remove.

Each activation code corresponds to a number of slots, where each slot represents the capacity to protect a single virtual machine in your environment. Each time protection is established, Double-Take Availability for VMware Infrastructure will update the available number of slots for subsequent protections.

Note:

If you are using VMware bundle licensing, each slot represents an ESX server, rather than a protection. Therefore, entering an ESX host by IP address and again by DNS name will cause a duplicate entry using an additional license slot. Therefore, when you add ESX servers, enter either the IP address or the DNS name but not both.

Managing VirtualCenter servers

To manage your VirtualCenter servers, select Manage VirtualCenter servers from the left pane of the console.

Managing ESX servers

To manage your ESX servers, select Manage ESX servers from the left pane of the console. Double-Take Availability for VMware Infrastructure scans to find ESX servers that are VMotion destination candidates, based upon SAN connectivity. The Credentials Cached column in the table identifies servers that need to have credentials added. To add the credentials, highlight a server in the list and click Configure ESX server on the toolbar. On the Configure ESX server page, add, edit, or remove a user. If prompted, specify the password associated with the user. Click Done to save the modficiations.

If you need to add an ESX server, click Add ESX server on the toolbar. On the Add ESX server page, specify the VirtualCenter server, the IP address or DNS name of the ESX server, a User name. and Password. Click Save to insert the ESX server.

If you need to remove an ESX server, highlight an ESX server in the list and click Remove ESX server.

Setting up an e-mail server

To set up an e-mail server, select Set up e-mail server from the left pane of the console. E-mail configuration applies to all protection jobs. Specify the e-mail server configuration.

Click Save to save your settings.

Workload protection

Double-Take Availability flexible configurations allow you to protect different workloads depending on the needs of your organization.

Data protection

Protecting specific data consists of two main tasks - creating a replication set (to identify the data to protect) and connecting that replication set to a target.

You have the following data protection options.

Once your connection is established, move on with Data workload failover to ensure high availability.

 

 

Establishing a connection using the automated Connection Wizard

The Connection Wizard guides you through the process of protecting your data. It helps you select a source, identify the data from your source that will be included in the replication set, and select a target.

  1. From the Replication Console, start the Connection Wizard to establish your connection. If you have just opened the Replication Console, you can click Make a connection from the right pane of the Replication Console. If the quick launch screen is no longer visible, select Tools, Connection Wizard.
  2. Note: If the Servers root is highlighted in the left pane of the Replication Console, the Connection Wizard menu option will not be available. To access the menu, expand the server tree in the left pane, and highlight a server in the tree.
  1. The Connection Wizard opens to the Welcome screen. Review this screen and click Next to continue.
  2. Note: At any time while using the Connection Wizard, click Back to return to previous screens and review your selections.
  1. If you highlighted a source in the Replication Console, the source will already be selected. If it is not, select the Double-Take Availability source. This is the server where the files reside that you want to protect.
  2. Note:

    Double-Take Availability will automatically attempt to log on to the selected source using the identification of the user logged on to the local machine. If the logon is not successful, the Logon dialog box will appear prompting for your security identification. When logging in, the user name, password, and domain are limited to 100 characters.

  1. Click Next to continue.
  2. If you highlighted a target in the Replication Console, the target will already be selected. If it is not, select the Double-Take Availability target. This is your backup server that will protect the source.
  3. Note:

    Double-Take Availability will automatically attempt to log on to the selected target using the identification of the user logged on to the local machine. If the logon is not successful, the Logon dialog box will appear prompting for your security identification. When logging in, the user name, password, and domain are limited to 100 characters.

  1. Click Next to continue.
  2. Choose to create a new replication set or use a replication set that already exists.
  1. Click Next to continue.
  2. If you are creating a new replication set, a tree display appears identifying the volumes and directories available on your selected source server. Mark the check box of the volumes and/or directories you want to protect and click Next to continue.
  3. Select the location on the target where the data will be stored.

  1. Click Next to continue.
  2. Review your selections on the summary screen. If your Connection Wizard settings are correct, establish your connection by completing one of the two options below:

Creating a replication set

Before you can establish a connection, you must create a replication set.

  1. From the Replication Console, highlight a source in the left pane of the Replication Console and select Insert, Replication Set from the menu bar. You can also right-click on the source name and select New, Replication Set.
  2. A replication set icon appears in the left pane under the source. By default, it is named New Replication Set. Rename the newly inserted replication set with a unique name by typing over the default name and pressing Enter. This process is similar to naming a new folder in Windows Explorer.
  3. Expand the tree under the replication set name to view the volume and directory tree for the source.
  4. Note:

    The default number of files that are listed in the right pane of the Replication Console is 2500, but this is user configurable. A larger number of file listings allows you to see more files in the Replication Console, but results in a slower display rate. A smaller number of file listings displays faster, but may not show all files contained in the directory. To change the number of files displayed, select File, Options and adjust the File Listings slider bar to the desired number.

    To hide offline files, such as those generated by snapshot applications, select File, Options and disable Display Offline Files. Offline files and folders are denoted by the arrow over the lower left corner of the folder or file icon.

  1. Identify the data on the source that you want to protect by selecting volumes, drives, directories, and/or specific files.

Note: Be sure and verify what files can be included by reviewing Replication capabilities.
  1. After selecting the data for this replication set, right-click the new replication set icon and select Save. A saved replication set icon will change from red to black.

Establishing a connection manually using the Connection Manager

After you have created a replication set, you can establish a connection through the Connection Manager by connecting the replication set to a target.

  1. From the Replication Console, open the Connection Manager to establish the connection.
  1. The Connection Manager opens to the Servers tab. Depending on how you opened the Connection Manager, some entries on the Servers tab will be completed already. For example, if you accessed the Connection Manager by right-clicking on a replication set, the name of the replication set will be displayed in the Connection Manager. Verify or complete the fields on the Servers tab.

  1. If desired, you can configure mirror settings before establishing your connection. Select the Mirroring tab on the Connection Manager.

  1. Click Connect to establish the connection.
  2. Note:

    The settings on the other tabs of the Connection Manager are advanced settings. You can modify any of them before or after establishing your connection.

    If you decide to enable orphan file processing while you are establishing your connection, orphan files will not be immediately processed when you create the connection. This setting is for processes that are run after a connection is already established (remirror, auto-remirror, verification, and so on).

Establishing a connection across a NAT or firewall

If your source and target are on opposite sides of a NAT or firewall, you will need special configurations to accommodate the complex network environment. Additionally, you must have the hardware already in place and know how to configure the hardware ports. If you do not, see the reference manual for your hardware.

In this environment, you must have static mapping where a single, internal IP address is always mapped in a one-to-one correlation to a single, external IP address. Double-Take Availability cannot handle dynamic mappings where a single, internal IP address can be mapped to any one of a group of external IP addresses managed by the router.

  1. Double-Take Availability uses specific ports for communication between the Double-Take Availability servers and Double-Take Availability clients. In order to use Double-Take Availability through a NAT or firewall, you must first verify the current Double-Take Availability port settings so that you can open the correct ports on your hardware to allow Double-Take Availability machines to communicate with each other. By default, Double-Take Availability uses port 6320 for all communications. If you have changed your Double-Take Availability port, you will need to identify what port number is being used. The port setting can be found in the following locations.
  1. You need to configure your hardware so that Double-Take Availability traffic is permitted access through the router and directed appropriately. Configure your router identifying each Double-Take Availability server, its IP address, and the Double-Take Availability and router ports. Also, note the following caveats.

Since there are many types of hardware on the market, each can be configured differently. See your hardware reference manual for instructions on setting up your particular router.

  1. Manually insert the servers, by selecting Insert, Server. Type the IP address of the router the server is connected to and the port number the server is using for heartbeats.
  2. Once your server is inserted in the Replication Console, use the Connection Manager to establish your connection. When specifying the Route on the Connection Manager Servers tab, you can manually enter the external IP address so traffic is routed appropriately.

Simulating a connection

Double-Take Availability offers a simple way for you to simulate a connection in order to generate statistics that can be used to approximate the time and amount of bandwidth that the connection will use when actively established. This connection uses the TDU (Throughput Diagnostics Utility), which is a built-in null (non-existent) target to simulate a real connection. No data is actually transmitted across the network. Since there is no true connection, this connection type helps you plan for a disaster recovery solution.

Before and after simulating your connection, you should gather network and system information specific to Double-Take Availability operations. Use the DTInfo utility to automatically collect this data. It gathers Double-Take Availability log files; Double-Take Availability and system settings; network configuration information such as IP, WINS and DNS addresses; and other data which may be necessary in evaluating Double-Take Availability performance. The DTInfo utility can be found on the product CD, in the Double-Take Availability installation directory, or on the Double-Take Software support web site.

  1. From the source where you will be running the TDU, run DTInfo.exe. It may take several minutes for DTInfo to finish processing. After DTInfo processing is complete, a \support subdirectory will automatically be created in the Double-Take Availability installation directory. A .zip file will contain the information gathered. The file name is based on the machine name. To distinguish this file from the next time you run DTInfo, append a unique identifier, perhaps the date and time, to the end of the file name.
  2. Make sure you have created a replication set that contains the data you want to protect.
  3. From the Replication Console, open the Connection Manager to establish the connection.
  1. The Connection Manager opens to the Servers tab. Depending on how you opened the Connection Manager, some entries on the Servers tab will be completed already. For example, if you accessed the Connection Manager by right-clicking on a replication set, the name of the replication set will be displayed in the Connection Manager. Verify or complete the fields on the Servers tab.

  1. Click Connect to establish the connection. The simulation data will be logged to the Double-Take Availability statistics file.
  2. Repeat step 1 to run the diagnostics utility after the simulation is complete.

Data workload failover

When you established your data workload protection, you only protected the data. You still need to establish failover monitoring, so that the target can stand in for the source in the event of a source failure, and your end users can access the data from the target.

 

Configuring failover monitoring

  1. Open the Failover Control Center from your target server or a client machine. Do not run the Failover Control Center from your source server.
  2. Select a failover target from the Target Machine list box.
  3. Note:

    If the target you need is not listed, click Add Target and manually enter a name or IP address (with or without a port number). You can also select the Browse button to search for a target machine name. Click OK to select the target machine and return to the Failover Control Center main window.

  4. Click Login to login to the selected target.
  5. Select a source machine to monitor by clicking Add Monitor. The Insert Source Machine dialog box appears in front of the Monitor Settings dialog box.
  6. On the Insert Source Machine dialog, specify your source machine by any of the following methods.

The Insert Source Machine dialog closes and the Monitor Settings dialog remains open with your source listed in the Names to Monitor tree.

  1. In the Names to Monitor tree, locate and select the IP addresses on the source that you want to monitor.
  2. Highlight an IP address that you have selected for monitoring and select a Target Adapter that will assume that IP address during failover. Repeat this process for each IP address that is being monitored. Current IP Addresses displays the IP address(es) currently assigned to the selected target adapter.
  3. Highlight an IP address that you have selected for monitoring and select a Method to Monitor for Failover.
  1. Repeat step 8 for each IP address that is being monitored.
  2. Highlight an IP address that you have selected for monitoring and select a Monitor Interval. This setting identifies the number of seconds between the monitor requests sent from the target to the source to determine if the source is online. This option is not configurable if your Method to Monitor for Failover is set to No Monitoring. Repeat this step for each IP address that is being monitored.
  3. Highlight an IP address that you have selected for monitoring and select the Missed Packets. This setting is the number of monitor replies sent from the source to the target that can be missed before assuming the source machine has failed. This option is not configurable if your Method to Monitor for Failover is set to No Monitoring. Repeat this step for each IP address that is being monitored.
  4. Note:

    To achieve shorter delays before failover, use lower Monitor Interval and Missed Packets values. This may be necessary for IP addresses on machines, such as a web server or order processing database, which must remain available and responsive at all times. Lower values should be used where redundant interfaces and high-speed, reliable network links are available to prevent the false detection of failure. If the hardware does not support reliable communications, lower values can lead to premature failover. To achieve longer delays before failover, choose higher values. This may be necessary for IP addresses on slower networks or on a server that is not transaction critical. For example, failover would not be necessary in the case of a server restart.

  1. If you are monitoring multiple IP addresses, highlight the source name and specify the Failover Trigger.
  1. If Manual Intervention is enabled, Target Data State at Failover will be disabled because the same options will be presented to you at failover time. If Manual Intervention is disabled, the options will be enabled so that an option can be selected to occur automatically when failover occurs. Highlight the source name and specify the Target Data State at Failover by specifying what data you want to use on the target when failover occurs.
  1. Highlight the source name and specify the Items to Failover, which identifies which source components you want to failover to the target.
  1. By default, Manual Intervention is enabled, allowing you to control when failover occurs. When a failure occurs, a prompt appears in the Failover Control Center and waits for you to manually initiate the failover process. Disable this option only if you want failover to occur immediately when a failure occurs. This option is not configurable if the Method to Monitor for Failover is set to No Monitoring.
  2. If the Shares selection under Items to Failover is selected, verify that the Use .SHR Share Mapping File check box is selected if you would like to use the Double-Take Availability share mapping file to create shares on the target during failover. If this option is not selected, shares will be created using the information gathered when the machine was selected as a source to be monitored.
  3. Note:

    If the Shares selection under Items to Failover is not selected, shares will not be failed over to the target regardless of the Use .SHR Share Mapping File selection.

  1. By default, Failover Hostname is disabled. This option automatically removes the host SPN (Service Principle Name) from Active Directory on the source and adds it to Active Directory on the target. If you are using Active Directory, enable this option or you may experience problems with failover.
  2. Failback Hostname returns the host SPN on the source and target back to their original settings on failback. If you are using Active Directory, enable this option or you may experience problems with failback.
  3. If you are failing over or failing back hostnames, you need to specify an Active Directory user that has update privileges within Active Directory. Click Credentials and identify a user and the associated password that has privileges to create and delete SPNs. The username must be in the format fully_qualified_domain\user. Click OK to return to the Monitor Settings dialog box.
  4. Note:

    The Active Directory account password cannot be blank.

  5. If you are using any failover or failback scripts, click Scripts and enter the path and filename for each script type. Scripts may contain any valid Windows command, executable, or batch file. Examples of functions specified in scripts include stopping services on the target before failover because they may not be necessary while the target is standing in for the source, stopping services on the target that need to be restarted with the source’s machine name and IP address, starting services or loading applications that are in an idle, standby mode waiting for failover to occur, notifying the administrator before and after failover or failback occurs, stopping services on the target after failback because they are no longer needed, stopping services on the target that need to be restarted with the target machine’s original name and IP address, and so on. Specify each script that you want to run and the following options, if necessary.
  1. Click OK to return to the Monitor Settings dialog box.
  2. Note:

    Failover scripts will run but will not be displayed on the screen if the Double-Take service is not set to interact with the desktop. Enable this option through the Services applet.

    With these flexible scripting features, application failover using Double-Take Availability can be seamless to the end user. Double-Take Software tests many of the popular applications on the market today. The results of these testing procedures are written up into formal Application Notes that describe how Double-Take Availability should be configured to work correctly with certain applications, including scripting examples. For a complete list of Double-Take Availability Application Notes, visit the Double-Take Software support web site.

  3. Click OK on the Monitor Settings dialog box to save your monitor settings and begin monitoring for a failure.

Updating shares on the target

Share information on the target can be manually updated from the Failover Control Center window. To manually update the share information, highlight a source machine in the Monitored Machines tree and click the Update Shares button.

Editing failover monitoring configuration

If you want to edit the monitor settings for a source that is currently being monitored, highlight that source on the Monitored Machines tree on the main Failover Control Center screen and click Edit. The Monitor Settings dialog box will open. Follow the Configuring failover monitoring instructions.

Removing failover monitoring configuration

If you want to discontinue monitoring a source, highlight that machine on the Monitored Machines tree on the main Failover Control Center screen and click Remove Monitor. No additional dialog boxes will open.

Server settings

Most of the Double-Take Availability server settings are located in the Replication Console Server Properties dialog box. To access this dialog box, right-click a server in the left pane of the Management Console and select Properties. The Server Properties dialog box contains multiple tabs with the Double-Take Availability server settings. For information on the server settings not available through the Replication Console, see the Scripting Guide.

This section contains the following topics, each corresponding to a tab in the Server Properties dialog box.

 

Identifying a server

From the Replication Console, you can see server identity information, including a server's Double-Take Availability activation code.

  1. Open the Replication Console and right-click the server on the left pane of the Replication Console.
  2. Select Properties
  3. Select the General tab.

  1. Specify the server identity information. Some of the fields are informational only.
  1. Click OK to save the settings.

Licensing a server

From the Replication Console, you can manage your server activation codes. The activation code is the Double-Take Availability license which is required on every Double-Take Availability server. The activation code is a 24 character, alpha-numeric code. You can change your activation code without reinstalling, if your license changes. There are different licenses available.

  1. Open the Replication Console and right-click the server on the left pane of the Replication Console.
  2. Select Properties.
  3. Select the Licensing tab. The fields displayed on this tab will vary depending on your activation code(s).

  1. Enter an activation code and click Add. Repeat for each activation code.
  2. Highlight an activation code in the list to display any status messages for that code below the list display.
  3. If you need to remove a code from the server, highlight it in the list and click Remove.
  4. To update a temporary node-locked license to a permanent license, you need to provide server information which will be used to generate a permanent node-locked license.
  1. Highlight your activation code in the list to display the Node-Locking section at the bottom of the Licensing tab.
  2. Click the hyperlink in the Node-Locking section. If you do not have an Internet connection, copy the Server Information text from the Node-Locking section into the form at https://activate.doubletake.com from another machine.
  3. After you submit the form, you will receive an email with a node-locked license key. Enter that key on the Licensing tab and click Add. The permanent activation code is specific to this server. It cannot be used on any other server. If the activation code and server do not match, Double-Take Availability will not run.
  1. Click OK to save the settings.

Configuring server startup options

From the Replication Console, you can configure server startup options for each Double-Take Availability server.

  1. Open the Replication Console and right-click the server on the left pane of the Replication Console.
  2. Select Properties
  3. Select the Setup tab.

  1. Specify the server setup and source startup options.

Task command processing can be enabled from the Replication Console, but it can only be initiated through the scripting language. See the Scripting Guide for more information.

If you disable this option on a source server, you can still submit tasks to be processed on a target, although task command processing must be enabled on the target.

  1. Click OK to save the settings.

Configuring network communication properties for a server

  1. Open the Replication Console and right-click the server on the left pane of the Replication Console.
  2. Select Properties
  3. Select the Network tab.

  1. Specify the network communication properties.
  1. Click OK to save the settings.

Queuing data

You should configure queuing on both the source and target.

  1. Open the Replication Console and right-click the server on the left pane of the Replication Console.
  2. Select Properties.
  3. Select the Queue tab.
  4. Specify the queue settings for the server.

  5. Click OK to save the settings.

Configuring source data processing options

  1. Open the Replication Console and right-click the server on the left pane of the Replication Console.
  2. Select Properties
  3. Select the Source tab.

  1. Specify how the source will process data.

If you enable this option, make sure that the same groups and users exist on the target as they do on the source. Additionally, you must enable this option on your target server before starting a restoration, because the target is acting like a source during a restoration.

Enabling this option may have an impact on the rate at which Double-Take Availability can commit data on the target. File security attributes are sent to the target during mirroring and replication. The target must obtain the security ID (SID) for the users and groups that are assigned permissions, which takes some time. If the users and groups are not on the target server, the delay can be substantial. The performance impact enabling this option will have will vary depending on the type of file activity and other variables. For instance, it will not affect the overall performance of large database files much (since there is a lot of data, but only a few file permissions), but may affect the performance of user files significantly (since there are often thousands of files, each with permissions). In general, the performance impact will only be noticed during mirrors since that is when the target workload is greatest.

Regardless of the security model you are using, if you create new user accounts on the source, you should start a remirror so the new user account information associated with any files in your replication set can be transmitted to the target.

  1. Click OK to save the settings.

Configuring target data processing options

  1. Open the Replication Console and right-click the server on the left pane of the Replication Console.
  2. Select Properties
  3. Select the Target tab.

  1. Specify how the target will process data.
  1. Click OK to save the settings.

Specifying the Double-Take Availability database storage files

  1. Open the Replication Console and right-click the server on the left pane of the Replication Console.
  2. Select Properties
  3. Select the Database tab.

  1. Specify the database files that store the Double-Take Availability replication set, connection, and scheduling information.
  1. Click OK to save the settings.

Specifying file names for logging and statistics

  1. Open the Replication Console and right-click the server on the left pane of the Replication Console.
  2. Select Properties
  3. Select the Logging tab.

  1. Specify the location and file names for the log and statistics files.
  1. Click OK to save the settings.

Supplying credentials for script processing

  1. Open the Replication Console and right-click the server on the left pane of the Replication Console.
  2. Select Properties
  3. Select the Script Credentials tab.

  1. If you will be using any customized scripts (mirroring, failover, task command processing, and so on) specify a Username, Password, and Domain to use when running the scripts. If you do not specify any security credentials, the account running the Double-Take service will be used.
  2. Click OK to save the settings.

E-mailing event messages

You can e-mail Double-Take Availability event messages to specific addresses. The subject of the e-mail will contain an optional prefix, the server name where the message was logged, the message ID, and the severity level (information, warning, or error). The text of the message will be displayed in the body of the e-mail message.

  1. Open the Replication Console and right-click the server on the left pane of the Replication Console.
  2. Select Properties.
  3. Select the E-mail Notification tab.

  1. Select Enable notification.
  2. Note: Any specified notification settings are retained when Enable notification is disabled.
  3. Specify your e-mail settings.

If desired, enter unique text for the Subject Prefix which will be inserted at the front of the subject line for each Double-Take Availability e-mail message. This will help distinguish Double-Take Availability messages from other messages. This field is optional.

If desired, enable Add event description to subject to have the description of the message appended to the end of the subject line. This field is optional.

  1. Click OK to save the settings.

Full-server protection

Before you can protect your entire source, you need to select a target that is suitable to become the source, in the event of a source failure. Double-Take Availability will validate the target you select and identify any incompatibilities. Errors will disqualify the target as a suitable server. First you will need to find a compatible target, then you can establish full-server protection.

Finding a compatible target

Review the table below to determine if your server is a compatible target.

Requirement Configuration
Operating system version The source and the target must have the same operating system. For example, you cannot have Windows 2003 on the source and Windows 2008 on the target. The two servers do not have to have the same level of service pack or hotfix.
Domain The domain of the source should be the same as the domain of the target.
Server role

The target cannot be a domain controller. Ideally, the target should not host any functionality (file server, application server, and so on) because the functionality will be removed when failover occurs.

If your source is a domain controller, it will start in a non-authoritative restore mode after failover. This means that if the source was communicating with other domain controllers before failover, it will require one of those domain controllers to be reachable after failover so it can request updates. If this communication is not available, the domain controller will not function after failover. If the source is the only domain controller, this is not an issue.

Architecture The source and the target must have the same architecture. For example, you cannot failover a 32-bit server to a 64-bit server.
Processors There are no limits on the number or speed of the processors, but the source and the target should have at least the same number of processors. If the target has fewer processors or slower speeds than the source, there will be performance impacts for the users after failover.
Memory The target memory should be within 25% (plus or minus) of the source. If the target has much less memory than the source, there will be performance impacts for the users after failover.
Network adapters You must map at least one NIC from the source to one NIC on the target. If the source has more NICs than the target, some of the source NICs will not be mapped to the target. Therefore, the IP addresses associated with those NICs will not be available after failover, unless you configure the advanced options. If there are more NICs on the target than the source, the additional NICs will still be available after failover.
File system format The source and the target must have the same file system format. For example, an NTFS volume cannot be sent to a FAT volume.
HAL type and version The Windows hardware abstraction layer (HAL) refers to a layer of software that deals directly with your computer hardware. The HAL type and version do not have to be identical, but they must be compatible between the source and the target. If the two are incompatible, Double-Take Availability will warn you. In that case, you must upgrade or downgrade the target.
Administrative shares The Full-Server Failover Manager console must be able to access administrative shares on the source and the target.
Boot volume configuration The target boot volume cannot be a dynamic disk configuration. The boot volume is the disk volume that contains the Windows operating system and supporting files. By default, the operating system files are in the \Windows folder, and the supporting files are in the \Windows\System32 folder. The boot volume might be the same volume as the system volume, but that configuration is not required.
System volume The target must have the same system volume as the source. The system volume is the disk volume that contains the hardware-specific files that are needed to start Windows. The system volume might be the same volume as the boot volume, but that configuration is not required.
Logical volumes There are no limits to the number of logical volumes, although you are bound by operating system limits. The source and the target must have the same number of logical volumes, and the source and the target must have the same drive letters. For example, if the source has drives C: and D:, the target cannot have drives D: and E:. In this case, the target must also have drives C: and D:.
System path The source and the target must have the same system path. The system path includes the location of the Windows files, Program Files, and Documents and Settings.
Double-Take Availability path Double-Take Availability must be installed on the system path on the source and the target.
Double-Take Availability data state The source should be from a time when the Double-Take Availability data state is good. If you are using snapshots, you may want to use a snapshot from the last good data state.
Capacity and free space

The target must have enough space to store the data from the source. This amount of disk space will depend on the applications and data files you are protecting. The more data you are protecting, the more disk space you will need. You must also have enough space on the target to process and apply the system state data.

Double-Take Availability performs several validation checks to determine if adequate disk space is available. First, the target must have enough free space on its system volume to hold the entire volume(s) (free and used) from the source. If this first validation check passes, then no additional checks are necessary. Otherwise, there must be at least enough free space on the target system volume to store the system path (including the location of the Windows files, Program Files, and Documents and Settings) from the source. If this second validation check passes, then no additional checks are necessary. If this second validation fails, Double-Take Availability will check to see if a previous failover may have been attempted. Since Double-Take Availability can reuse the disk space from a previous failover attempt, it will add the size of that data to the amount of free space available. If that is enough space for the failover, the failover will continue. If not, you will either have to select a different target or delete files on the target to free disk space.

Establishing full-server protection

Use the following instructions to establish protection for your entire source.

  1. Login as a user that is a member of both the Double-Take Admin and local Administrators security groups.
  2. Open the Full-Server Failover Manager.
  3. Enter your source and target servers. You can click Browse when selecting either server to locate it by drilling down through your network. After you have specified a server name, enter login credentials when prompted. Once the server is selected and logged in, the Properties tab at the bottom of the Full-Server Failover Manager updates to display the server’s properties.

  1. Optional protection settings are available but not required. If desired, configure the optional protection settings by clicking Configure protection.
  2. You must validate that your target is compatible with your source and can stand-in if the source fails. Click Validate configuration. The Validation tab at the bottom of the Full-Server Failover Manager updates to display the validation check. Errors are designated by a white X inside a red circle. Warnings are designated by a black exclamation point (!) inside a yellow triangle. A successful validation is designated by a white checkmark inside a green circle.

  1. Double-click on any of the validation items to see details. You must correct any errors before you can enable protection. Depending on the error, you may be able to click Fix or Fix All and let Double-Take Availability correct the problem for you. For those errors that Double-Take Availability cannot correct automatically, you will need to modify the target to correct the error, or you can select a different target. You must revalidate the selected servers until the validation check passes without errors.
  2. Once the validation check passes without errors, click Enable Protection to begin monitoring.
Note:

After protection is enabled, a View Configuration link will display the optional protection settings in read-only mode. If you need to modify any of the optional protection settings, you will have to disable your protection, modify the optional protection settings, and then re-enable protection.

If you have a full-server protection connection established, do not create any other Double-Take Availability connections from or to the source or target.

If you are using a cluster, you must manually alter the disk signature before or after failover. See the Microsoft Knowledge Base article 280425 for details on how to change the disk signature. You can automate the disk signature alteration as part of failover using the pre- or post-failover scripts.

Optional full-server protection settings

Optional protection settings are available when configuring a full-server protection connection, but they are not required. If you want to configure the optional settings, make sure you have a valid source and target specified, then click Configure protection from the main Full-Server Failover Manager page.

You have the following optional configuration settings available.

Including and excluding data to be protected

  1. Make sure you have a valid source and target specified, click Configure protection from the main Full-Server Failover Manager page, and then select the Protection tab.
  2. Specify that data you want to include and/or exclude.
  1. Click OK to save the settings.

Stopping services on the target when protection is enabled

  1. Make sure you have a valid source and target specified, click Configure protection from the main Full-Server Failover Manager page, and then select the Protection tab.
  2. Double-Take Availability determines what services are currently running on the target. You can specify which services you want to keep running and those services you want to stop when you enable your protection. Move the services between the Services to stop and Services to leave running lists by using the double arrows. Select Show critical services to see the list of critical services that will remain running on the target. The critical services are displayed in a lighter colored, italics font. The critical services cannot be moved from the running list.
  3. Click OK to save the settings.

Taking snapshots of the target

  1. Make sure you have a valid source and target specified, click Configure protection from the main Full-Server Failover Manager page, and then select the Protection tab.
  2. A snapshot is an image of data taken at a single point in time. Snapshots allow you to view files and folders as they existed at points of time in the past, so you can, for example, recover from cases where corrupted source data was replicated to the target. By default, Double-Take Availability takes periodic snapshots of the data on the target. When failover is triggered, you can use the live target data at the time of failover or you can failover to a snapshot of the target data. Specify how you want to handle snapshots.
  1. Click OK to save the settings.

Configuring failover monitoring and processing

  1. Make sure you have a valid source and target specified, click Configure protection from the main Full-Server Failover Manager page, and then select the Failover tab.
  2. Specify how you want to handle failover monitoring and processing.
  1. Click OK to save the settings.

Mapping network configuration on the target for post-failover 

  1. Make sure you have a valid source and target specified, click Configure protection from the main Full-Server Failover Manager page, and then select the Failover tab.
  2. Specify how you want to handle network configurations on the target after failover.
  1. After you have entered the DNS information, click Test to validate that DNS is configured correctly and that the specified credentials are sufficient to update DNS. When the DNS configuration is complete, click OK to save your entries and return to the Configure Protection window.
Note:

If you are protecting a cluster node and select Retain target network configuration, the virtual IP addresses associated with the cluster will still be failed over. The only IP address that will not be failed over is the physical IP address of the cluster node.

  1. Click OK to save the settings.

Routing data transmissions

  1. Make sure you have a valid source and target specified, click Configure protection from the main Full-Server Failover Manager page, and then select the Advanced tab.
  2. By default, Double-Take Availability will select the default route for transmissions. If desired, select a different IP address on the target that will be used for full-server connection transmissions.
  3. Click OK to save the settings.

Mirroring data

  1. Make sure you have a valid source and target specified, click Configure protection from the main Full-Server Failover Manager page, and then select the Advanced tab.
  2. Specify how you want to mirror data.
  1. Click OK to save the settings.

Compressing data

  1. Make sure you have a valid source and target specified, click Configure protection from the main Full-Server Failover Manager page, and then select the Advanced tab.
  2. Compression allows you to reduce the amount of bandwidth needed to transmit data from the source to the target. The data is compressed before being transmitted and then is uncompressed before it is written on the target. Typically, compression is used in WAN environments, but not in LAN environments. If desired, enable compression and select the level of compression that you want to use. All connections to the same target will have the same compression settings.
  3. Click OK to save the settings.

Using NAT or firewalls with full-server workloads

If your source and target are on opposite sides of a NAT or firewall, you will need to configure your hardware to accommodate full-server workload communications. You must have the hardware already in place and know how to configure the hardware ports. If you do not, see the reference manual for your hardware.

Full-server ports

By default, Double-Take Availability uses port 6320 for all communications. To verify or modify the ports, you must use the Replication Console.

  1. Open the Replication Console.
  2. Locate your servers in the server tree in the left pane of the Replication Console.
  3. Right-click the server in the left pane of the Replication Console and select Properties.
  4. On the Network tab, verify or modify the Communications Port as needed. All servers and clients in your full-server workload protection must be using the same port.

Double-Take Availability uses ICMP pings to monitor the source for failover. A failover monitor will not be created if ICMP is blocked (although the data and system state will still be protected). You should configure your hardware to allow ICMP pings between the source and target. If you cannot, you will have to monitor for a failure using the Double-Take Availability replication service. Use the Monitor Type option on the configuration Failover tab to set your failover monitoring method.

Microsoft Windows ports

Full-server workload protection uses WMI (Windows Management Instrumentation) which uses RPC (Remote Procedure Call). By default, RPC will use ports at random above 1024, and these ports must be open on your firewall. RPC ports can be configured to a specific range by specific registry changes and a reboot. See the Microsoft Knowledge Base article 154596 for instructions.

Full-server workload protections also rely on other Microsoft Windows ports.

These ports must be open on your firewall. Check your Microsoft documentation if you need to modify these ports.

Hardware ports

You need to configure your hardware so that the full-server ports and Microsoft Windows ports are open. Since communication occurs bidirectionally, make sure you configure both incoming and outgoing traffic.

There are many types of hardware on the market, and each can be configured differently. See your hardware reference manual for instructions on setting up your particular router.

Application protection

Protecting an application consists of three main tasks - configuring the protection, validating the protection, and enabling the protection. The processes are similar for the different application types, however, there are some variances. Optional protection settings are available when configuring application protection, but they are not required.

 

 

Protecting an application

  1. Open the Application Manager.
  2. Verify the Setup tab is selected and then from the Tasks list on the left pane, select the type of application you want to protect.
  3. Note: The fields in the Application Manager console will vary depending on the type of application you are protecting.
  4. Application Manager will automatically identify the root domain where the Application Manager is running and populate the Domain Name field. If necessary, change the domain name to a trusted root domain that the Application Manager console can connect to. If prompted, enter security credentials with administrator privileges for the domain.

  5. Note:

    Domain names must include a suffix, such as .com, .corp, .net, and so on.

    If you are protecting Exchange, the domain must be the root of the forest domain because that is where all Exchange server objects reside, even if the Exchange server is a member of a child domain.

  6. Application Manager will automatically attempt to populate the Source Server and Target Server lists with any servers in the specified domain that are running the application you are protecting. Select your source and target servers.

  7. Note:

    If you have previously used this source and target pair, you will be prompted to reuse the previous configuration. If you select Yes, your previous configuration settings will be used. If you do not want to use the previous configuration settings (perhaps the source or target configuration has changed since you configured the connection), select No to use the default configuration settings.

    If you select a source that is currently unavailable, you will be prompted to select the target first. When you select the target then the source, you may get a failover prompt or the same source is unavailable prompt. This will depend on if a failover condition has been met according to the original failover configuration.

    You cannot protect a server if it is already functioning as a target.

    If you are using a cluster environment, select your virtual server as you would a physical server.

    If you are protecting Exchange, the target you select must be in the same Exchange administrative group as the source.

    If you are protecting Exchange in a like-named cluster scenario, select the same server for the source and target. The target server name will automatically be appended with the suffix like-named. Enter the requested information in the Like-named Cluster Setup dialog box.

    • Target Cluster—Enter the name of one of the target nodes, then click Connect.
    • Network—Select the target NIC that can accommodate a new IP address.
    • IP Address—Enter a new IP address for the target to use when it stands in for the source.
    • Subnet Mask—Enter the subnet mask to use for the new IP address.
    • Storage Resources—The Application Manager will automatically select the required storage resources on the target, provided that they exist. Verify that the drive letters where Exchange data is located are selected. You cannot deselect a storage resource that exists on both the source and target. If the drive letters on the source and target do not match, then not all required data will be selected automatically. You will need to select it manually. The selected storage resources must be in the same group.

    If you have protecting multiple Exchange virtual servers, you can configure multiple like-named cluster protection connections, or you can failover multiple Exchange virtual servers to pre-existing Exchange virtual servers on the target. In this case, select the target Exchange virtual server.

    If you are protecting Exchange 2003 and it is running in mixed mode, the first installed Exchange virtual server contains the MTA (Message Transfer Agent) resource that is needed to communicate with versions prior to Exchange 2003. If you do not failover all Exchange virtual servers, then any user who is in a different mail store than the first one may not be able to route mail.

    If you are protecting SharePoint, enter the SharePoint Front-End Web Server and click Get Config to populate the Source Server list.

    If no servers are populated in the lists (perhaps the server you need is in a child domain), click Advanced Find to add servers to the lists. Advanced Find is not available for all application protections. See Managing servers for more details on Advanced Find.

    Server names must be 15 characters or less.

    You will be unable to configure protection when your environment between the Application Manager and the source or target contains a NAT or certain VPN configurations. This is due to WMI limitations. Contact technical support for instructions to configure protection manually.

  8. If prompted when selecting a server, provide login credentials.
  9. Optional protection settings are available but not required. If desired, configure the optional protection settings by clicking Configure.
  10. Once you have finalized your protection settings, you need to validate your configuration by clicking Validate. Monitor the status of the validation process in the status bar at bottom of the Application Manager.
  11. When the validation is complete, the status progress indicator is removed. Errors are designated by a white X inside a red circle. Warnings are designated by a black exclamation point (!) inside a yellow triangle. A successful validation is designated by a white checkmark inside a green circle. Unknown items are a white question mark inside a blue circle. Double-click on any of the validation items to see details. Application Manager can automatically fix errors and warnings marked with a yellow gear. Highlight a single item and click Fix to have Application Manager fix that one issue. Click Fix All to have Application Manager correct all of the issues. You must correct any errors, and ideally any warnings, before you can enable protection.

    Note:

    If you are using DNS failover and did not enter DNS credentials under the optional protection settings, you will be prompted for credentials that can access and modify DNS records.

    If you validate a source and target pair that is already in a Protected state and the validation detects issues with the target, Fix and Fix All will be disabled. You must disable the protection, fix the issue, then re-enable protection.

    If you are protecting SQL, are using Database Only mode, and the database is online on the target, the database cannot be taken offline on the target by using Fix if it has a SQL Server replication publication. The publication will have to be deleted using the SQL Server management tools before the database can be taken offline.

    For SQL 2000 servers, Application Manager may hang when rerunning validation after disabling protection in the same session. To work around this issue, disable the protection, stop and restart the Application Manager, then validate or enable protection.

  1. If you are protecting BlackBerry, a Complete BlackBerry Protection dialog will appear after the validation is complete. Select the name of the Exchange server under step 2 of the dialog box and you will be able to complete the application protection process again in order to protect your Exchange server.
  2. Once the validation passes without errors, click Enable Protection. View the status of the protection on the Monitor tab.
  3. Note:

    If you are protecting Exchange keep in the mind the following caveats.

    • If you need to protect data that is stored on a non-mailbox server role, for example SMTP queue data, you will need to configure protection for that data separately. In addition, you may need to manually update the DNS setting for the client access server to point to the target site.
    • If your source has a public store that has a non-MAPI Owning Tree, the folders within this tree may not be updated with current information and therefore unavailable to the users.
    • If you are protecting Exchange 2007 and your environment has more than one domain controller and the domain controller that Exchange is using will change during the failover process, stores may not mount during failover. To work around this issue, either modify the failover script to use the domain controller that Exchange uses when the Information Store service is started or mount the stores manually and run the Replace replicas PowerShell call from the failover script to update the PF replicas (if applicable).
    • If you are protecting Exchange in a like-named cluster scenario, Application Manager will create four resources on the target cluster: two generic script resources, an IP address resource, and a temporary name resource. The temporary name resource will be the Exchange virtual server with the suffix _LN. Application Manager uses the temporary name resource for the connection between the source and target clusters.

    If you are protecting Exchange or SQL on a cluster, if the target cluster has more than one IP address resource for the virtual Exchange or SQL Server you may experience the following issue. If the one of the IP addresses is not routable from the source server and that IP address was created before any of the routable IP address resources, the Application Manager will fail to enable protection. To enable protection, you will need to delete the non-routable IP address resource(s), re-create them, and then re-add them as dependencies on the network name resource for the virtual server.

    If you modify your source server configuration on the source server, for example, adding a new storage group or database, you must disable protection, run validation and fix any issues, then re-enable protection to apply the changes.

    If your application protection is in a cluster environment, you should not move any resources from one cluster group to another once protection is established.

    If you close Application Manager prior to enabling protection, your configuration changes will not be saved. You must enable protection in order to save your configuration settings.

    After you have enabled protection, do not use the Failover Control Center client to edit your failover configuration. Doing so will force a failover. If this occurs, cancel the failover prompt and then disable and re-enable monitoring using Application Manager.

 

Optional application protection settings

Optional protection settings are available when configuring application protection, but they are not required. If you want to configure the optional settings, make sure you have a valid domain and servers specified, then click Configure from the main Application Manager page.

You have the following optional configuration settings available.

Configuring failover processing

  1. Make sure you have a valid domain and servers specified, click Configure from the main Application Manager page, and then select the Failover tab.
  2. Note: The fields on the Failover tab will vary depending on the type of application you are protecting.
  3. Specify the Failover Type which is the name resolution method that will be used to redirect users to the target in the event the source fails. Ideally, you should use DNS failover to reduce downtime and avoid server name or IP address conflicts. However, you may want to select identity failover if access to the domain controller or DNS server is not available, the time required to propogate DNS updates is unacceptable, or your end-users are configured to connect to an IP address and not a server name. For cluster environments, DNS failover is the only option available.

  1. Application Manager automatically determines the appropriate application services or resources to start and stop based on the application you are protecting, your operating system, and your application configuration. If necessary, modify the list of services or resources.

  1. Click Add to insert a service or resource into the list. Specify the service or resource name and make sure that Service must be stopped on target is enabled so that replication can update files on the target.
  2. Click Remove to remove a service or resource from the list. The services you can remove depend on the application you are protecting. For example, if you are protecting Exchange, you can only remove services or resources that you have manually added.
  3. If you are configuring your services, highlight a service and click the up or down arrow to reorder the list. The services will be stopped and started in the order displayed.
  4. If you are using a cluster source and standalone target configuration, you can toggle between the services and resource configuration by clicking the Services button.
  5. If you are protecting SharePoint, you can add or remove the SharePoint services to the list of SQL services by using the appropriate Add SharePoint Services and Remove SharePoint Services buttons.
  1. Click OK to save the settings.

Configuring DNS failover

Application Manager will automatically determine default DNS failover settings. Use the following instructions to modify the DNS failover settings.

  1. The DNS Server list contains all DNS IP addresses for the source and target servers. The label after the IP address indicates if the DNS IP address belongs to the source, target, or both. To additional DNS servers to the list, enter an IP address into the DNS Server field and click Add. To remove an IP address from the list, highlight the address and click Delete.
  2. Note:

    If you want to set the primary DNS server that Double-Take Availability will use during failover, you can specify Client DNS Server. This option is only available if you have launch the Application Manager using the command line advanced option.

  1. Under Source IP addresses to update, map a source IP address to a target IP address for DNS updates.
  2. Note: If you are protecting Exchange and one or more IP addresses are configured for the SMTP virtual server on the target, the first IP address will be the default target IP address for all source IP addresses.
  3. You can specify the length of time, in seconds, that the source's DNS A records are cached in the Time to Live. Enable Update TTL and specify a number of seconds. Ideally, you should specify 300 seconds (5 minutes) or less.
  4. Note:

    In order to update the Time to Live, the machine where the Application Manager is running must be able to connect to the DNS server through WMI. If it cannot, the Time to Live record will not be updated and the Application Manager will return an error that the RPC server is unavailable.

  5. Specify DNS Credentials and specify a user that has privileges to access and modify DNS records. The user must be a member of the DNSAdmins gruop for the domain where the DNS server resides. You can enter a user for a different domain by entering a fully qualified name in the format domain\username or username@domain. If you enter a non-qualified name, the DNS domain from the DNS server will be used.
  6. Once your DNS failover settings are configured, click Test to validate your configuration. If you have any issues with your configuration, review the following DNS information.
  1. Click OK to save your settings.

Configuring identity failover

Application Manager will automatically determine default identity failover settings. Use the following instructions to modify the identity failover settings.

  1. Under Source IP address to failover, map a Source IP address to a Target NIC. The target NIC will assume the source IP address during failover. The Target IP addresses list displays the IP address(es) of the selected Target NIC.

  1. The default selected items under Items to Failover will depend on the application you are protecting. Enable or disable if you want to failover the source's IP addresses, server name, file shares, and/or Active Directory host name.
  2. Note:

    If your source and target are on different subnets, you should not failover the IP address.

    If you are protecting Exchange, do not failover the Active Directory host name.

    If you are protecting SQL, do not failover the server name.

    You cannot failover file shares from a parent to child domain.

  3. Click OK to save your settings.

Configuring failover monitoring

  1. Make sure you have a valid domain and servers specified, click Configure from the main Application Manager page, and then select the Monitoring tab.
  2. To enable the target to monitor the source for a failure, enable Active Monitoring Enabled. If this option is disabled, you will need to manually monitor the source and initiate failover if the source fails.
  3. To help you better control when failover occurs, enable Manual Intervention Required. If this option is disabled, failover will occur immediately when a failover condition is met.
  4. Specify the following Monitor Settings.

  1. Click OK to save the settings.

Taking snapshots of the target

  1. Make sure you have a valid domain and servers specified, click Configure from the main Application Manager page, and then select the Snapshot tab.
  2. Note: Snapshots are not available in cluster environments.
  3. A snapshot is an image of data taken at a single point in time. Snapshots allow you to view files and folders as they existed at points of time in the past, so you can, for example, recover from cases where corrupted source data was replicated to the target. By default, Double-Take Availability takes periodic snapshots of the data on the target. When failover is triggered, you can use the live target data at the time of failover or you can failover to a snapshot of the target data. Specify how you want to handle snapshots.

  1. Click OK to save the settings.

Application connection settings

You can configure routing and mirroring settings for your application connection. In addition, there are application specific settings that you can configure. The fields on the Connection tab will vary depending on the type of application you are protecting.

Routing data transmissions
  1. Make sure you have a valid domain and servers specified, click Configure from the main Application Manager page, and then select the Connection tab.
  2. Note: The fields on the Connection tab will vary depending on the type of application you are protecting.
  3. By default, Double-Take Availability will select the default Route for transmissions. If desired, select a different IP address on the target that will be used for transmissions. If you are using a cluster, use the virtual server IP address.

  1. Click OK to save the settings.

Protection configuration

Application specific protection options are available on the Configure Protection Connection tab. The fields on the Connection tab will vary depending on the type of application you are protecting.

Configuring Exchange storage group protection

If you are protecting Exchange, you can specify which storage groups, mailboxes, and public folder stores that you want to protect.

  1. Make sure you have a valid domain and servers specified, click Configure from the main Application Manager page, and then select the Connection tab.
  2. Note: The fields on the Connection tab will vary depending on the type of application you are protecting.
  3. The Protected Storage Groups will list the storage groups, mailboxes, and public folder stores. By default everything is slected. Select the storage groups that you want to protect. By selecting individual storage groups, you can reduce the amount of data being replicated and filter out storage groups that do not need to be protected or failed over. Only the users associated with the selected storage groups will be failed over.

Note:

If you do not select all storage groups, you should make sure that other backups are available.

Ideally, you should place all query-based distribution groups in a single organization container and give the target server full control to the container and all child objects.

Names with a plus sign (+) are not supported. You must rename the storage group and remove the plus sign.

The Protected Storage Groups list will be disabled if you have enabled Override Generated Rules on the Advanced tab.

  1. If desired, you can select additional data to protect under the Volumes folder.
  2. Click Refresh if you need to refresh the items in the tree view.
  3. Click OK to save the settings.

Configuring SQL database protection

If you are protecting SQL, you can protect the SQL instance or only the database only.

  1. Make sure you have a valid domain and servers specified, click Configure from the main Application Manager page, and then select the Connection tab.
  2. Note: The fields on the Connection tab will vary depending on the type of application you are protecting.
  3. Select if you want to protect the SQL Instance or the Database Only. The Protected Databases options and list will be disabled if you have enabled Override Generated Rules on the Advanced tab.

With this option, the source and target servers must have the following configuration.

  1. In Windows Explorer, right-click the folder that contains the physical files for the database that needs to be manually attached.
  2. Select Properties.
  3. On the Security tab, determine if the user account has NTFS permissions for that folder.
  4. If the user account does not have specific or inherited permissions, click the Add button.
  5. Enter the user account name (such as domain\administrator).
  6. After the user account has been added, give the account Full Control permissions.
  7. Make sure that the subfolders and files are set to inherit these rights, then click OK.

If your two SQL servers have unique instances installed, you can protect databases from both servers if the target has at least those two instances installed.

Keep in mind, if the database names (accounting1.mdf and accounting2.mdf) or locations on the target (\source1\accounting1\accounting.mdf and \source2\accounting2\accounting.mdf) are unique, you can protect and failover both databases to the same target.

  1. If you selected Database Only, you can highlight a non-system database and then identify a unique Target Path. Keep in mind that if you are protecting multiple databases, specifying a unique target path will impact the location of any databases in the same or lower directory structure. For example, if you specify a unique target path for \level1\level2\database.mdf, the target path for level1\level2\level3\database.mdf will also be in that path. Click the ellipse (...) button to search for a target path and click Apply to save the setting.
  2. If desired, you can select additional data to protect under the Volumes folder.
  3. Click Refresh if you need to refresh the items in the tree view.
  4. Click OK to save the settings.

Configuring file server protection

If you are protecting a file server, you can specify the file shares that you want to protect.

  1. Make sure you have a valid domain and servers specified, click Configure from the main Application Manager page, and then select the Connection tab.
  2. Note: The fields on the Connection tab will vary depending on the type of application you are protecting.
  3. By default, all non-administrative file shares will be selected. Select or deselect the file shares in the tree that you want to protect.

Note:

The File Shares list will be disabled if you have enabled Override Generated Rules on the Advanced tab.

If your source is a domain controller, you cannot protect the NETLOGON and SYSVOL shares and they will not be visible in the File Shares tree.

  1. If desired, you can select additional data to protect under the Volumes folder.
  2. Click Refresh if you need to refresh the items in the tree view.
  3. Click OK to save the settings.

Configuring BlackBerry database protection
  1. Make sure you have a valid domain and servers specified, click Configure from the main Application Manager page, and then select the Connection tab.
  2. Note: The fields on the Connection tab will vary depending on the type of application you are protecting.
  3. Select the databases that you want to protect.

Note:

You cannot deselect the databases containing the BES or MDS information.

If you do not want to protect the MDS database, deselect Protect MDS services on the BlackBerry tab using the instructions below.

You may want to exlude the tempdb database to reduce mirroring and replication traffic.

The Protected Databases list will be disabled if you have enabled Override Generated Rules on the Advanced tab.

  1. If desired, you can select additional data to protect under the Volumes folder.
  2. Click Refresh if you need to refresh the items in the tree view.
  3. Next select the BlackBerry tab.
  4. Under BlackBerry Options select to Protect log files and/or Protect MDS service(s).

  1. Under BlackBerry Services, Application Manager automatically determines the appropriate BlackBerry services to start and stop. If necessary, modify the list of services.

  1. Click Add to insert a service into the list. Specify the service name and make sure that Service must be stopped on target is enabled so that replication can update files on the target.
  2. Click Remove to remove a service from the list. You can only remove services that you have manually added.
  3. If you are configuring your services, highlight a service and click the up or down arrow to reorder the list. The services will be stopped and started in the order displayed.
  1. Click OK to save the settings.

Configuring SharePoint database protection
  1. Make sure you have a valid domain and servers specified, click Configure from the main Application Manager page, and then select the Connection tab.
  2. Note: The fields on the Connection tab will vary depending on the type of application you are protecting.
  3. By default, the entire SharePoint program and data files (except the \binn directory) will be protected. End-users can access the data from the target in the event of a failure.

Note:

The servers must have the same version of SharePoint (major and minor versions).

The servers must have the same logical drive structure where the SharePoint program and data files are stored.

If you are using a SQL server named instance for a back-end database server in your SharePoint setup, both the source and target SQL servers must have the same named instances and the same logical drive structure.

You may want to exlude the tempdb database to reduce mirroring and replication traffic.

The Protected Databases list will be disabled if you have enabled Override Generated Rules on the Advanced tab.

  1. If desired, you can select additional data to protect under the Volumes folder.
  2. Click Refresh if you need to refresh the items in the tree view.
  3. Next select the SharePoint tab. These options allow you to join or extend the target front-end web server to the production SharePoint configuration or web farm. Application Manager determines the Microsoft SQL server and configuration database used by the source SharePoint web front-end server, then uses that information to connect the specified target web server to the same SharePoint configuration. The target web server specified can be local or remote.
  4. Note:

    The target web server must have the same version of SharePoint installed as the product SharePoint web server.

    For best results, SharePoint should be installed but not yet configured on the target web server.

    In order to extend the target web server, you will need to add the SharePoint administrator account to the local domain administrator group on the target server before you extend target web front-end server into the farm.

  5. The first five fields will be filled in automatically. However, you can modify any of the fields.
  1. After you have entered the parameters, click Connect Server and the specified SharePoint front-end web will be extended into the source SharePoint configuration. This process may take several minutes to complete. During this time, you can perform other tasks within the Configure Protection window, however, you will not be able to close the Configure Protection window until the task is complete.
  2. Note: You must manually install the Central Administration web application after the target has been extended in order to be able to administer SharePoint in the event of a failover.
  3. Click OK to save the settings.

Mirroring data
  1. Make sure you have a valid domain and servers specified, click Configure from the main Application Manager page, and then select the Connection tab.
  2. Note: The fields on the Connection tab will vary depending on the type of application you are protecting.
  3. Specify your Mirror Settings.

  1. Click OK to save the settings.

Application advanced settings

You can configure advanced settings for you application connection. The advanced settings that are available will depend on the application you are protecting. Therefore, the fields on the Advanced tab will vary. In addition, the fields will vary depending on if you launched Application Manager in standard or advanced mode.

Configuring the replication set

Application Manager automatically creates a replication set with a name based on the application you are protecting. The list below contains the default replication set names, where source and target are the names of the respective servers.

Application Manager selects all of the necessary directories and files to add to your replication set to protect your application. You should only modify the replication set definition if there are additional directories or files that you want to protect. Do not modify the rules unless you are familiar with Double-Take Availability and your application.

Note:

If you are protecting Exchange and want to protect the Badmail folder, you will need to manually add it using the instructions below.

If you are protecting SQL, the folder that contains a database’s FILESTREAM data will automatically be included in the replication set for protection if the database is included for protection. Any steps previously taken to enable FILESTREAM support on the source (for instance, file system or operating system-level changes that were made specifically to support FILESTREAM) must also be applied similarly to the target for consistency. Failure to account for FILESTREAM-specific changes on the target server, or specifically excluding FILESTREAM data files/paths from the replication set, can impact SQL Server’s ability to mount a database with FILESTREAM data when failing over.

  1. Make sure you have a valid domain and servers specified, click Configure from the main Application Manager page, and then select the Advanced tab.
  2. Note: The fields on the Advanced tab will vary depending on the type of application you are protecting. In addition, the fields will vary depending on if you launched Application Manager in standard or advanced mode.
  3. To modify the replication set definition, select Override Generated Rules. When this option is selected, the application controls (storage groups or protected databases) on the Connection tab will be disabled.
  4. To add a new replication set rule, click Add.
  5. Specify a path, wild card, or specific file name. Application Manager will not verify the rule you are adding.
  6. Select to Include or Exclude the file.
  7. Mark the rule as Recursive or Non-Recursive if you want the rule applied to subdirectories.
  8. Click Add.
  9. Repeat steps 4 through 7 for each replication set rule you want to add.
  10. When you are finished adding rules, click Close.
  11. If you need to remove a rule, highlight it and click Remove. If you remove a rule added by Application Manager, you could impact the success of failover.
  12. Click OK to save the settings.

Configuring scripts

Scripts are executed at different points during failover, failback, and restoration. The scripts perform actions to make your applications available on the appropriate server. Editing scripts is an advanced feature. Do not modify the scripts unless you are familiar with Double-Take Availability, your application, and scripting. Any edits should be made carefully and tested prior to deployment to ensure the changes are correct. Incorrect script changes could cause failover issues.

  1. Make sure you have a valid domain and servers specified, click Configure from the main Application Manager page, and then select the Advanced tab.
  2. Note: The fields on the Advanced tab will vary depending on the type of application you are protecting. In addition, the fields will vary depending on if you launched Application Manager in standard or advanced mode.
  3. Click on the button associated with the script you want to edit.

Any changes you save to the scripts will be copied to the appropriate server when the configuration changes are accepted. If you reconfigure your application protection after making script changes, Application Manager will copy updated scripts to the appropriate server, overwriting any changes that you manually made. You should make a backup copy of your script changes to copy over after making Application Manager updates. If you want to make the script changes permanent, you must modify the script files manually in the Double-Take Availability installation location.

  1. Click OK to save the settings.

Configuring Active Directory

If you are protecting Exchange, you can configure several settings for Active Directory.

  1. Make sure you have a valid domain and servers specified, click Configure from the main Application Manager page, and then select the Advanced tab.
  2. Note: The fields on the Advanced tab will vary depending on the type of application you are protecting. In addition, the fields will vary depending on if you launched Application Manager in standard or advanced mode.
  3. Enable Force AD replication if you want Active Directory replication to be initiated from the source and target's domain controller. Each time the Double-Take Availability Exchange Failover utility is executed in the failover and failback scripts, Active Directory replication will be forced. If you do not want to force Active Directory replication, disable this option.
  4. If you have enabled forced Active Directory replication, specify the Max wait time for AD replication. This is the length of time, in minutes, that failover or failback will wait for before continuing. If replication exceeds the wait time specified, a log created and replication and failover continue. This wait time does impact when failover and failback will complete, however it does not impact the success or failure.
  5. If you are using Exchange 2003, you can specify the name (not an IP address) of the Target domain controller which is the server where updates will be made during failover and failback. If you do not specify a domain controller, then the domain controller determined by Active Directory will be used.
  6. Click OK to save the settings.
  7. Note:

    If you want to add the target back to the PF list to which the source belongs, you will need to enable the Restore PF Tree option.

    1. From the main Application Manager screen, select Tools, Actions.
    2. Enable Display Advanced Options.
    3. Reselect Protect Exchange Server from the Tasks list in the left pane and the Restore PF Tree option will be added to the Actions menu.
    4. Select Actions, Restore PF Tree. This will copy the owning PF tree setting from the source public folders to the target public folders.

    This setting is cleared when protection is enabled, which prevents SMTP queuing issues when trying to deliver messages to the target, but is never restored. If you want to have an active target server, you can use this command to restore it to an Application Manager state.

Configuring items to failover

If you are performing an identity failover, then you have already selected the Items to Failover. Changing any of the Items to Failover on the Advanced tab will automatically make the same change on the Failover tab Configure Identity Failover page. However, if you are performing DNS failover, you may want to modify the items that you are failing over using the instructions below.

  1. Make sure you have a valid domain and servers specified, click Configure from the main Application Manager page, and then select the Advanced tab.
  2. Note: The fields on the Advanced tab will vary depending on the type of application you are protecting. In addition, the fields will vary depending on if you launched Application Manager in standard or advanced mode.
  3. The default selected items under Items to Failover will depend on the application you are protecting. Enable or disable if you want to failover the source's server name, file shares, and/or Active Directory host name.
  4. Note:

    If your source and target are on different subnets, you should not failover the IP address.

    If you are protecting Exchange, do not failover the Active Directory host name.

    If you are protecting SQL, do not failover the server name.

    You cannot failover file shares from a parent to child domain.

  5. Click OK to save the settings.

Configuring default connection parameters

Several default connection options are available which allow you to disable or enable the creation of default connection parameters. Ideally, you want Application Manager to create the default parameters. However, if you have modified any of the parameters manually and you do not want your modifications overwritten by the defaults, then you may want to disable the creation of the default connection parameters.

  1. Make sure you have a valid domain and servers specified, click Configure from the main Application Manager page, and then select the Advanced tab.
  2. Note: The fields on the Advanced tab will vary depending on the type of application you are protecting. In addition, the fields will vary depending on if you launched Application Manager in standard or advanced mode.
  3. Create Replication Set indicates if the default replication set generated by Application Manager will be used to establish an application protection connection. If enabled, the default replication set will be generated and used. Disable this option if you have manually updated the default replication set.
  4. Create Failover Scripts indicates if the default failover, failback, and restore scripts generated by Application Manager will be used during those processes. If enabled, the default scripts will be used. Disable this option if you have manually updated the scripts.
  5. Create Connection indicates if a connection will be established when application protection is enabled. Disable this option if you want to perform testing on your replication set prior to establishing the connection.
  6. Create Failover Monitor indicates if failover monitoring will be started when application protection is enabled. Disable this option if you want to perform testing on your scripts prior to establishing monitoring.
  7. Click OK to save the settings.

Using NAT or firewalls with application workloads

If your source and target are on opposite sides of a NAT or firewall, you will need to configure your hardware to accommodate application workload communications. You must have the hardware already in place and know how to configure the hardware ports. If you do not, see the reference manual for your hardware.

Application workload ports

By default, Double-Take Availability uses port 6320 for all communications. To verify or modify the ports, use the following instructions.

  1. In the Application Manager, select Tools, Options.
  2. Verify or modify the Service Listen Port as needed. All servers and clients in your application workload protection must be using the same port.

Double-Take Availability uses ICMP pings to monitor the source for failover. A failover monitor will not be created if ICMP is blocked (although the data and application will still be protected). You should configure your hardware to allow ICMP pings between the source and target. If you cannot, you will have to monitor for a failure using the Double-Take Availability replication service. Use the Method to Monitor for Failover option on the configuration Monitoring tab to set your failover monitoring method.

Note: If you are protecting SharePoint, you also need to configure your hardware to allow communication on port 6350.

Microsoft Windows ports

Application workload protection uses WMI (Windows Management Instrumentation) which uses RPC (Remote Procedure Call). By default, RPC will use ports at random above 1024, and these ports must be open on your firewall. RPC ports can be configured to a specific range by specific registry changes and a reboot. See the Microsoft Knowledge Base article 154596 for instructions.

Application workload protections also rely on other Microsoft Windows ports.

These ports must be open on your firewall. Check your Microsoft documentation if you need to modify these ports.

Hardware ports

You need to configure your hardware so that the application workload ports and Microsoft Windows ports are open. Since communication occurs bidirectionally, make sure you configure both incoming and outgoing traffic.

There are many types of hardware on the market, and each can be configured differently. See your hardware reference manual for instructions on setting up your particular router.

Exchange Failover Utility

When you configure Exchange for protection, Application Manager creates customized scripts based on the settings you choose. The scripts are based on the Exchange Failover Utility (EFO). Generally, you do not need to run the Exchange Failover Utility from the command line or modify the scripts that Application Manager creates, however, the syntax for the utility is provided below in case that need arises.

Command EFO
Description Used in script files to failover Exchange data
Syntax

EXCHFAILOVER -FAILOVER | -FAILBACK -S <source> -T <target> [-L <filename>] [-NORUS] [-NORM] [-NOSPN] [-NOOAB] [-NOADREPLICATION] [-MAXREPWAIT <minutes>] [-NOEXCHANGEAB] [-NOQUERYBASEDDISTGROUPS] [-NORGCONNECTORS] [-NOPUBLICFOLDERS] [-ONLYPUBLICFOLDERS] [-MOVEHOSTSPN] [-O <filename>] [-R [<source_group>] [,<source_mailstore>] [: [<target_group>] [,<target_mailstore>] ] ] [-SETUP] [-TEST] [-U <name> : <password>] [-VIRTUAL <new_IPaddress>] [-DC <domain_name> | <IPaddress>] [-SDOMAIN] [-TDOMAIN] [/?] [/??]

Options
  • FAILOVER—Exchange data will be moved from the source to the target
  • FAILBACK—Exchange data will be moved from the target to the source. Even through the flow of data has changed (target to source), the source-related options with this utility still pertain to your original source (or a new source if you had to replace the source). The target-related options pertain to the original target, the server that is currently standing in for the source.
  • S source—Name of the original source
  • T target—Name of the original target
  • L filename—Name of the log file. By default, the log file is ExchFailover.log and is stored in the directory containing the exchfailover.exe file. If this name is changed, the DTInfo utility will not be able to locate this file which could impede assistance through Technical Support.
  • NORUS—Do not change the Recipient Update service
  • NORM—Do not change the Routing Master
  • NOSPN—Do not change the Service Principal Name
  • NOOAB—Do not change the siteFolderServer for the offline address book
  • NOADREPLICATION—Do not force Active Directory replication
  • MAXREPWAIT minutes—Maximum time, in minutes, to wait for Active Directory replication to complete before continuing failover or failback. The default value is 30 minutes. This option is not applicable if NOADREPLICATION is used.
  • NOEXCHANGEAB—Do not fail back the ExchangeAB Service Principal Name for Small Business Server
  • NOQUERYBASEDDISTGROUPS—Do not update query-based distribution lists
  • NORGCONNECTORS—Do not change Routing Group connectors
  • NOPUBLICFOLDERS—Do not move public folders
  • ONLYPUBLICFOLDERS—Only move public folders
  • MOVEHOSTSPN—Move the HOST Service Principal Name to or from the target instead of removing and adding it
  • O filename—Name of the file that contains the options to pass through to the Exchange Failover utility
  • R source_group, source_mailstore : target_group , target_mailstore—By itself, this option creates a one-to-one mapping of the groups and mail stores from the source to the target. Optionally, you can supply group and mail store names to customize the mapping. Repeat this option as often as needed.
  • SETUP— Sets the overwrite database on restore flag without completing user moves or RUS and folder updates. If this option is not used, the Exchange Failover utility still sets the overwrite database on restore flag, but the other work is also performed.
  • TEST—Runs in test mode, so no Active Directory updates are made
  • U name : password—User with Active Directory permissions. The password is case-sensitive.
  • VIRTUAL new_IPaddress—Performs updates to virtual protocols only for like-named cluster failover
  • DC domain_name | IPaddress—Name or IP address of the domain controller to make updates on
  • SDOMAIN—Source domain name
  • TDOMAIN—Target domain name
  • ?—Displays the Exchange Failover utility syntax
  • ??—Displays a description of the Exchange Failover utility options
Examples
  • exchfailover -failover -s alpha -t beta
  • exchfailover -failback -s alpha -t beta
  • exchfailover -failover -s alpha -t beta -r -onlypublicfolders
  • exchfailover -failover -s alpha -t beta -u administrator:password -dc domaincontroller

Virtual server protection

Select a link from the table below for protection instructions that correspond with your virtual configuration.

If your source is... and you want to protect... and your target is... then see these instructions...
a physical or virtual server the volumes from the physical server or the volumes from within the virtual guest operating system a virtual server on a Hyper- V server Protecting an entire physical or virtual server to a Hyper-V or ESX server
a virtual server on an ESX server
a virtual server on a Hyper-V server the host-level virtual disk files (.vhd and .vmdk files) a virtual server on a Hyper-V server Protecting a Hyper-V server to a Hyper-V server
a virtual server on an ESX server a virtual server on an ESX server Protecting an ESX server to an ESX server

 

Protecting a physical or virtual server to a Hyper-V or ESX server

Use these instructions to protect a physical or virtual server, where you want to protect the volumes from the physical server or the volumes from within the virtual guest operating system, to a virtual server on a Hyper-V or ESX server.

  1. Open the Double-Take Console by selecting Start, Programs, Double-Take, Double-Take Console.
  2. Click Get Started from the toolbar.
  3. Select Double-Take Availability and click Next.
  4. Select Protect an entire server using a Hyper-V or ESX virtual machine and click Next.
  5. Specify the source server that you want to protect. This is the physical or virtual server that you want to protect.

  6. Click Next to continue.
  7. Choose the volumes on the source server that you want to protect.

  8. Click Next to continue.
  9. Specify the target server. If you are protecting to a Hyper-V server, this is the name of the Hyper-V server. If you are protecting to a ESX server, this is the host name of your virtual recovery appliance.

  10. Click Next to continue.
  11. If you are protecting to an ESX server, specify the ESX server information for your target virtual recovery appliance.

  12. Click Next to continue.
  13. If you are using a Hyper-V target, select a location on the target for the replica virtual machine.

  14. If you are using an ESX target, select a location on the target for the replica virtual machine.

  15. Click Next to continue.
  16. Configure the replica virtual machine.

  17. Click Next to continue.
  18. Specify your protection settings.

    The fields on this screen will vary depending on if you are using an ESX target or a Hyper-V target.

  19. Click Next to continue.
  20. The Protection Summary page displays all of the options you selected in your workflow. If you want to make any changes to any of the workflow settings, click Back to return to previous pages of the workflow. If you want to modify the name assigned to this protection job, click Change and specify a new name.
  21. When you are satisfied with your workflow selections, click Finish, and you will automatically be taken to the Monitor Connections page.

Protecting a Hyper-V server to a Hyper-V server

Use these instructions to protect a virtual machine on a Hyper-V server, where you want to protect the host-level virtual disk files (the .vhd files), to a virtual server on a Hyper-V server.

  1. Open the Double-Take Console by selecting Start, Programs, Double-Take, Double-Take Console.
  2. Click Get Started from the toolbar.
  3. Select Double-Take Availability and click Next.
  4. Select Protect a Hyper-V virtual machine using host-level protection and click Next.
  5. Specify your source server. This is the Hyper-V source that contains the virtual machine that you want to protect.

  6. Click Next to continue.
  7. Choose the virtual machine on the Hyper-V source that you want to protect. Select a virtual machine from the list and click Next to continue.

  8. Specify the Hyper-V target server where you will store the replica of the source server.

  9. Click Next to continue.
  10. Select a home folder on the Hyper-V target for the replica virtual machine.

  11. Click Next to continue.
  12. Configure the replica virtual machine.

  13. Click Next to continue.
  14. Specify your protection settings.

  15. Click Next to continue.
  16. The Protection Summary page displays all of the options you selected in your workflow. If you want to make any changes to any of the workflow settings, click Back to return to previous pages of the workflow. If you want to modify the name assigned to this protection job, click Change and specify a new name.
  17. When you are satisfied with your workflow selections, click Finish, and you will automatically be taken to the Monitor Connections page.
  18. Note:

    Once protection is established, Double-Take Availability monitors the virtual disks of the protected virtual machine for changes to the disk layout. If a new virtual hard disk is added to the virtual machine, the protection job will automatically be updated to include the new virtual hard disk, and a file difference mirror will automatically start. However, if a virtual hard disk is removed from the protected virtual machine, the virtual hard disk will not be removed from the projection job until it is deleted from the source or the protection job is deleted and re-created.

Protecting an ESX server to an ESX server

Use this process to protect a virtual machine on an ESX server, where you want to protect the host-level virtual disk files (the .vmdk files), to a virtual server on an ESX server. In this scenario, you have several steps to complete.

  1. Port configuration—You must configure your ESX servers, your VirtualCenter server(s), and the machine running the Double-Take Availability for VMware Infrastructure service. These steps only need to be performed once.
  2. Root or non-root login configuration—You must configure your ESX servers for either root or non-root login. These steps only need to be performed once.
  3. Establish protection—Use these instructions to configure your ESX to ESX protection job.
  4. Optional ESX protection settings—Optional settings can be configured at the end of your protection job creation or after the job has been established.

 

Configuring ports

  1. Because the Double-Take Availability for VMware Infrastructureconsole uses SSH to communicate with the VMware ESX host(s), and the ESX hosts also use it to connect to each other, you must configure SSH port communication on both your source and target ESX servers.
    1. Using the VMware Virtual Infrastructure Client, select the host ESX server.
    2. On the Configuration tab, select Security Profile.
    3. In the Firewall Properties, verify that SSH Client is selected and click OK.
    4. Verify that the Configuration tab shows that SSH Clientis enabled for the host on port 22.
    5. In the Firewall Properties, verify that SSH Server is selected and click OK.
    6. Verify that the Configuration tab shows that SSH Cerveris enabled for the host on port 22.
  2. Open port 443 on both your source and target ESX servers for HTTPS communication. You also need to open this port on your VirtualCenter server.
  3. Open port 6331 on the machine running the Double-Take Availability for VMware Infrastructure service.
  4. Note:

    If the Double-Take Availability for VMware Infrastructureconsole and the Double-Take Availability for VMware Infrastructure service are on separate machines, the machines cannot be separate by a firewall because Microsoft .NET remoting is required, which is not compatible with a firewall configuration.

Configuring root or non-root login

You must configure both your source and target ESX servers to allow either root or non-root login. If you are not using VirtualCenter, you must use root account credentials. If you want to use non-root credentials, VirtualCenter is required. In addition to using non-root credentials, VirtualCenter allows you to use VMotion to move the virtual machine.

Establishing ESX to ESX protection

  1. Open the Double-Take Availability for VMware Infrastructure console by selecting Start, Programs, Double-Take, Availability, Double-Take for VMware Infrastructure.
  2. If prompted, connect to the Double-Take Availability for VMware Infrastructure server. This prompt will appear if this is the first time you have accessed the console, if there are no valid, saved credentials, or if you have intentionally disconnected from a server.
  3. If you want to save the login information so that you do not have to login to the server the next time you use the console, enable Save DTAVI connection information.
  4. Click Connect to connect to the server.
  5. To begin the protection workflow, select Protect a virtual machine.
  6. Select the virtual machine that you want to protect.

  7. Click Next to continue.
  8. Specify the target ESX server that will store the replica virtual machine.

  9. Click Next to continue.
  10. Select a datastore on the target where the source virtual machine data will be replicated.

  11. Click Next to continue.
  12. Configure the replica virtual machine.

  13. Click Next to continue.
  14. The Protection Summary page displays the options you selected in your workflow, as well as optional protection settings.
  15. When you are satisfied with your workflow selections, click Finish, and you will automatically be taken to the Monitor protection page.
  16. Note:

    The target virtual machine is registered when replication is started and will remain registered. To unregister a machine, you must click Delete Protection and choose Delete the associated replica virtual machine.

    Even though the target virtual machine appears to be available on the ESX server, it should not be powered on, removed, or modified while it is owned by an active protection job, otherwise the target virtual machine will become corrupt and break the protection job.

    Do not attempt to manually create or delete snapshots on the protected virtual machine. This will disrupt the protection of the virtual machine and may generate unpredictable results on the source and target virtual machines.

    Double-Take Availability for VMware Infrastructure supports generic SCSI device mappings in virtual machines, however, the generic SCSCI device will not be created on the target virtual machine during failover because the target virtual machine will fail to start if the SCSI device hardware does not exist on the target ESX host. After failback, the generic SCSI device will be mapped back to the original source, but the SCSI device will not be mapped back to the original source if the protection job is re-created in the reverse direction.

Optional ESX protection settings

Optional protection settings are available when configuring an ESX to ESX protection job, but they are not required. The options are available at the end of the workflow when you are establishing protection or from the Monitor protection page when you click Configure Protection.

Scheduling protection
  1. From the Protection summary page, click Schedule.
  2. If you want to start the protection immediately, select Start this protection immediately.
  3. If you want to delay the start of the protection, select Schedule this protection to start.
  4. Select a date and time for the protection job to start.
  5. Click Save.

Changing the name of the protection job
  1. From the Protection summary page, click Change in the Name section.
  2. Specify a new name for the protection job.
  3. Click Save.

Setting transmission options
  1. From the Protection summary page, click Change in the Data transmission section.
  2. Specify any of the following data transmission options.
  3. Click Save.

E-mailing notifications
  1. From the Protection summary page, click Change in the E-mail notifications section.
  2. Note:

    In order to use e-mail notification, you may need to complete any or all of the following on the Double-Take Availability for VMware Infrastructure server.

    • Disable anti-virus software
    • Open port 25 in your anti-virus software to allow SMTP e-mail
    • Enable outbound e-mail messages
    • Exclude VI_Service.exe from blocked processes for sending outbound e-mail messages.
  3. If you have not yet configured an e-mail server, you will be prompted at the top of the window. Click Configure.
  4. Specify the e-mail notification settings.
  5. Click Test E-mail Settings to verify your e-mail configuration.
  6. Note: The following error message indicates anti-virus software on the server may be blocking outbound e-mail messages. "Failure sending mail. Unable to connect to the remote server. An established connection was aborted by the software in your host machine."
  7. Click Save.

 

Updating VirtualCenter credentials
  1. If you configured VirtualCenter servers when you established protection, you can select Change in the VirtualCenters section on the Protection Summary page.
  2. Modify the User name and Password associated with either the source or target VirtualCenter server. The changes will be applied to this protection job only.
  3. Click Save.

Configuring restart and threshold options
  1. From the Protection summary page, click Change in the Restart and thresholds section.
  2. Specify any of the following options.
  3. Click Save.

Using firewalls with virtual workloads

If your source and target are on opposite sides of a firewall, you will need to configure your hardware to accommodate communications. You must have the hardware already in place and know how to configure the hardware ports. If you do not, see the reference manual for your hardware.

These firewall instructions are for the following protection scenarios.

Double-Take Availability ports

By default, Double-Take Availability uses port 6320 for all communications. To verify or modify the ports, you must use the Replication Console.

  1. Open the Replication Console.
  2. Locate your servers in the server tree in the left pane of the Replication Console.
  3. Right-click the server in the left pane of the Replication Console and select Properties.
  4. On the Network tab, verify or modify the Communications Port as needed. All servers and clients in your virtual workload protection must be using the same port.

Double-Take Availability uses ICMP pings to monitor the source for failover. A failover monitor will not be created if ICMP is blocked (although the data and system state will still be protected). You should configure your hardware to allow ICMP pings between the source and target. If you cannot, you will have to monitor for a failure manually and create a dummy monitor at failover time that can be manually failed over. Contact technical support for assistance with this manual process.

Microsoft Windows ports

Virtual workload protection uses WMI (Windows Management Instrumentation) which uses RPC (Remote Procedure Call). By default, RPC will use ports at random above 1024, and these ports must be open on your firewall. RPC ports can be configured to a specific range by specific registry changes and a reboot. See the Microsoft Knowledge Base article 154596 for instructions.

Virtual workload protections also rely on other Microsoft Windows ports.

These ports must be open on your firewall. Check your Microsoft documentation if you need to modify these ports.

Hardware ports

You need to configure your hardware so that the Double-Take Availability ports and Microsoft Windows ports are open. Since communication occurs bidirectionally, make sure you configure both incoming and outgoing traffic.

There are many types of hardware on the market, and each can be configured differently. See your hardware reference manual for instructions on setting up your particular router.

Cluster protection

Your cluster protection will depend on the type of cluster configuration you are using.

 

Protecting a standard cluster

Use the following steps to protect a standard cluster, where a single copy of data resides on a SCSI disk that is shared between cluster nodes. You will be using the Double-Take Source Connection cluster resource to protect your standard cluster.

  1. If your source is a cluster, create a virtual server (including resources for an IP address, network name, and physical disk) on the source cluster. With this configuration, users will access their data from the source cluster, regardless of which node is currently in control. MSCS will handle failover between the nodes of the cluster. Double-Take Availability will handle failover between the source cluster and the target (cluster or standalone). See your Microsoft documentation if you need assistance creating a virtual server on the source cluster.

  1. If your target is a cluster, create a virtual server (including resources for an IP address, network name, and physical disk) on the target cluster. With this configuration, if there is a source failure, the data will be available for the users from the target cluster, regardless of which node is currently in control. MSCS will handle failover between the nodes of the target cluster. Double-Take Availability will handle failover between the source (cluster or standalone) and the target cluster. See your Microsoft documentation if you need assistance creating a virtual server on the target cluster.
  2. On your source, create a replication set from the Replication Console.
  3. Note:

    If your source is a cluster, you need to create the replication set on the node which currently owns the group with the virtual server you want to protect.

  1. Open the Replication Console.
  2. Right-click the source in the left pane of the Replication Console and select New, Replication Set.
  3. A replication set icon appears in the left pane under the source. By default, it is named New Replication Set. Rename the newly inserted replication set with a unique name by typing over the default name and pressing Enter. This process is similar to naming a new folder in Windows Explorer.
  4. Expand the tree under the replication set name to view the volume and directory tree for the source.
  5. Note:

    The default number of files that are listed in the right pane of the Replication Console is 2500, but this is user configurable. A larger number of file listings allows you to see more files in the Replication Console, but results in a slower display rate. A smaller number of file listings displays faster, but may not show all files contained in the directory. To change the number of files displayed, select File, Options and adjust the File Listings slider bar to the desired number.

    To hide offline files, such as those generated by snapshot applications, select File, Options and disable Display Offline Files. Offline files and folders are denoted by the arrow over the lower left corner of the folder or file icon.

  6. Identify the data on the source associated with the group that you want to protect by selecting volumes, drives, directories, and/or specific files. Be sure and verify what files can be included in your replication set.

  1. After selecting the data for this replication set, right-click the new replication set icon and select Save. A saved replication set icon will change from red to black.
  1. If your source is a cluster, you need to create a duplicate replication set on each of the other nodes in the cluster. Because the other nodes do not currently own the files, you will not be able to browse to select the data like you did on the first node. Therefore, you will have to manually enter the replication set data.
  2. Note:

    As an alternative to the following manual steps, you can stop the Double-Take service on the other nodes of the source cluster, copy the file DblTake.db from the first node to the other nodes, and then restart the Double-Take service.

  1. Right-click the replication set created on the owning node and select Properties.

  1. Record the exact drive and directories of each path displayed, including where the rule is included or excluded and if recursion is applied.
  2. Right-click a non-owning node and select New, Replication Set.
  3. Enter the exact, case-sensitive name for the replication set as specified on the owning node and press Enter.
  4. Right-click the replication set that you just created and select Properties.
  5. Click Add.
  6. Enter the exact same replication set rules you recorded from the owning node. Be sure and mark the correct Include, Exclude and Recurse sub-directories options that need to be applied.
  7. Note:

    Each replication set rule on the non-owning nodes must be identical to the replication set rule on the owning node.

  1. After entering all of the replication set rules, save the replication set. The replication set rules will be saved even though the non-owning nodes do not have access to the locations right now. The rules will function properly when the node becomes an owner.
  1. On your cluster (source and/or target), you need to disable the standard Double-Take Availability connection controls so that the MSCS resource that you will be configuring later can control the Double-Take Availability connections.
  1. In the Replication Console, right-click a node of the source cluster and select Properties.
  2. Select the Setup tab.

  1. By default, the Automatically Reconnect During Source Initialization check box will be selected. Disable this option by clearing the check box.
  2. Click OK to save the changes.
  3. Repeat these steps on each node of the cluster(s).
  1. If your source is a standalone server, establish your connection through the Connection Manager, selecting the virtual server network name for the Target Server and the virtual server IP address for the Route.
  2. If your source is a cluster, establish your connection by creating and bringing online a Double-Take Source Connection resource. These instructions will vary depending on your operating system.
Establishing your connection on Windows 2003
  1. From the Cluster Administrator, right-click on the group and virtual server you are protecting and select New, Resource.
  2. Specify the following fields on the New Resource dialog box.
  1. Click Next to continue.
  2. Verify that all of the cluster nodes appear as Possible Owners and click Next to continue.
  3. The resource is dependent on the physical disk and network name resources. Select these two resources so that the Double-Take Source Connection resource is dependent on both of them. Click Next to continue.
  4. Specify your Double-Take Availability connection parameters.

  1. Click Next to continue.
  2. Specify your Double-Take Availability bandwidth limiting parameters.

  1. Click Next to continue.
  2. Specify your Double-Take Availability orphan file parameters. By default, the orphan files feature is disabled. To enable it, select Move/Delete Orphan Files. Specify if you want to delete or move the files. If you select the move option, identify the location where these orphan files will be located. Click Next to continue.
  3. Specify your Double-Take Availability compression parameters. By default, compression is disabled. To enable it, select Enable Compression. Depending on the compression algorithms available for your operating system, you may see a slider bar indicating different compression levels. Set the level from minimum to maximum compression to suit your needs. Click Next to continue.
  4. Specify your Double-Take Availability mirroring settings.

  1. Click Finish to complete the creation of the Double-Take Source Connection resource.
Establishing your connection on Windows 2008
  1. From the Failover Cluster Management applet, right-click on the group and virtual server you are protecting and select Add a resource, More resources, Add Double-Take Source Connection.
  2. Right-click on the new resource and select Properties.
  3. On the General tab, specify a Resource Name that indicates this is the Double-Take Availability virtual server connection.
  4. Select the Dependencies tab. This resource is dependent on the physical disk and network name resources. Insert these two resources so that the Double-Take Source Connection resource is dependent on both of them.
  5. Select the Advanced Policies tab. Verify that all of the cluster nodes appear as Possible Owners.
  6. Select the Basic Connection tab and specify your Double-Take Availability connection parameters. 

  1. Select the Bandwidth Limiting tab and specify your Double-Take Availability bandwidth limiting parameters. 

  1. Select the Orphans tab and specify your Double-Take Availability orphan file parameters. By default, the orphan files feature is disabled. To enable it, select Move/Delete Orphan Files. Specify if you want to delete or move the files. If you select the move option, identify the location where these orphan files will be located.

  1. Select the Compression tab and specify your Double-Take Availability compression parameters. By default, compression is disabled. To enable it, select Enable Compression. Depending on the compression algorithms available for your operating system, you may see a slider bar indicating different compression levels. Set the level from minimum to maximum compression to suit your needs.

  1. Select the Mirror Properties tab and specify how you want to mirror the data.

  1. Click OK to complete the creation of the Double-Take Source Connection resource.
  1. Bring the Double-Take Source Connection resource and the virtual server resources online.

Protecting a GeoCluster

The GeoCluster Replicated Disk resource allows for the real-time copy of data to be available on other nodes in the cluster. In the event of a failure and another node takes ownership, the GeoCluster Replicated Disk resource is also moved to the other node and it continues to replicate data, in real-time, to the remaining nodes in the cluster.

The instructions for creating this resource are different depending on your operating system.

Creating the GeoCluster Replicated Disk Resource on Windows 2003
  1. Select Start, Programs, Administrative Tools, Cluster Administrator.
  2. Right-click the group that you want to add a replicated disk to and select New, Resource.
  3. Specify the following fields on the New Resource dialog box.
  1. Click Next to continue.
  2. The GeoCluster Replicated Disk resource ensures that an up-to-the-minute copy of the data resides on all nodes identified in the Possible owners list. All nodes are included in the default, which should not be changed. Click Next to continue.
  3. The GeoCluster Replicated Disk resource is not dependent on any other resources. Click Next to continue.
  4. Specify the GeoCluster Replicated Disk parameters using the settings below.
  1. Click Next to continue.
  2. If you want to configure compression, verify that Enable Compression is selected. Depending on the compression algorithms available for your operating system, you may see a slider bar indicating different compression levels. Set the level from minimum to maximum compression to suit your needs.
  3. Click Next to continue.
  4. Specify your Double-Take Availability mirroring settings.
  1. Click Finish to complete the creation of the GeoCluster Replicated Disk resource.
Creating the GeoCluster Replicated Disk Resource on Windows 2008
  1. Select Start, Programs, Administrative Tools, Failover Cluster Management.
  2. Right-click the application group where you want to add a replicated disk to and select Add a resource, More resources, Add GeoCluster Replicated Disk.
  3. Right-click on the resource and select Properties.
  4. On the Connection Parameters tab, specify the GeoCluster Replicated Disk connection parameters using the settings below.
  1. No other settings are required for the GeoCluster Replicated Disk resource, although there are optional settings available. Click OK to save the GeoCluster Replicated Disk configuration changes that you made.
  2. If you are using Hyper-V, you have several additional configuration steps.
  1. Take the virtual machine’s configuration resource offline by right-clicking on it and selecting Take this resource offline.
  2. Modify the virtual machine’s configuration resource and specify the GeoCluster Replicated Disk resource (not the GRD Status resource) as a dependency.
  3. Modify the virtual machine resource (the parent of the virtual machine configuration resource) and specify the GeoCluster Replicated Disk resource (not the GRD Status resource) as a dependency.
  4. From a command prompt, execute the following command, substituting the name of your GeoCluster Replicated Disk resource.

cluster res "New Geocluster Replicated Disk" /priv sourcefailoverdelay=15

The GeoCluster Replicated Disk will mirror and replicate the virtual machine data to the other cluster nodes.

To control the resource, you can bring it online and take it offline. Neither of these actions trigger failover. They just control the activity of the resource.

Bringing the resource online

The GeoCluster Replicated Disk resource will appear offline after it is created. When you bring it online, the following actions occur.

  1. A Double-Take Availability replication set is created with the same name that was assigned to the resource.
  2. The replication set is connected to all of the possible owners specified in the resource.
  3. A mirror is initiated to create the baseline copy of data from the active node to all of the possible owners.
  4. The drive where the mirrored data is located on each of the possible owners is made read-only to all other applications except Double-Take Availability.
  5. Real-time replication from the active node to all of the possible owners begins.

If you are using Windows 2003, right-click the resource and select Bring online.

If you are using Windows 2008, right-click the resource and select Bring this resource online.

Taking the resource offline

When you take the GeoCluster Replicated Disk resource offline, the following actions occur.

  1. Real-time replication from the active node to the possible owners stops.
  2. The read-only limitation is removed from the corresponding drive letters on the possible owners.
  3. The replication set is disconnected from all of the possible owners.
  4. The replication set is deleted.

If you are using Windows 2003, right-click the resource and select Take offline.

If you are using Windows 2008, right-click the resource and select Take this resource offline.

Note: If the GeoCluster Replicated Disk Resource is offline, data integrity cannot be guaranteed on the other nodes in the cluster.

GeoCluster resource properties

Resource properties are displayed differently in Windows 2003 and Windows 2008. For example, the possible owners of a resource is listed on the General tab of the resource properties in Windows 2003, while in Windows 2008 they are listed on the Advanced Policies tab.

For both operating systems, right-click the resource and select Properties, when you want to view or modify the resource properties.

GeoCluster Replicated Disk properties on Windows 2003

There are six properties tabs for the GeoCluster Replicated Disk resource on Windows 2003.

  1. General—This tab identifies the Name and Description of the resource and the Possible Owners. If you change the name of the resource, the replication set name will not change until the next time the resource is brought online.

Modifying the Possible Owners list will cause one of the following actions to occur.

The GeoCluster Replicated Disk resource must have at least two possible owners to function properly.

  1. Dependencies—By default, the GeoCluster Replicated Disk resource is not dependent on any other resources.
  2. Advanced settings—This tab controls how and when MSCS handles a failure of the resource.

For more information on the Advanced Settings options, see your Windows documentation.

  1. Connection parameters—This tab controls disk replication, network routing, and orphan files for GeoCluster.

Ideally, the networks used for various traffic should be separated. This is dependent on the number of networks that you established when you created the cluster and the priority assigned to each network. For example, if you have two network routes, separate GeoCluster and your public traffic. If you have three routes, separate the public traffic and then separate GeoCluster from the cluster heartbeat.

Modifications to either of the first two settings will not take effect until the next time the resource is brought online.

  1. Compression—If you want to configure Double-Take Availability compression, verify that Enable Compression is selected. Depending on the compression algorithms available for your operating system, you may see a slider bar indicating different compression levels. Set the level from minimum to maximum compression to suit your needs.
  1. Mirror Properties—This tab controls the Double-Take Availability mirroring process.
GeoCluster Replicated Disk properties on Windows 2008

There are eight properties tabs for the GeoCluster Replicated Disk resource on Windows 2008.

  1. General—This tab identifies the Name and Resource type of the resource. It also displays the current state of the resource and an additional detailed status message.
  2. Dependencies—By default, the GeoCluster Replicated Disk resource is not dependent on any other resources.
  3. Policies—This tab controls how and when MSCS handles a failure of the resource.

For more information on Policies options, see your Windows documentation.

  1. Advanced Policies—This tab controls resource specific settings.

The GeoCluster Replicated Disk resource must have at least two possible owners to function properly.

For more information on Advanced Policies options, see your Windows documentation.

  1. Connection parameters—This tab controls disk replication, network routing, and orphan files for Double-Take Availability.

Ideally, the networks used for various traffic should be separated. This is dependent on the number of networks that you established when you created the cluster and the priority assigned to each network. For example, if you have two network routes, separate GeoCluster and your public traffic. If you have three routes, separate the public traffic and then separate GeoCluster from the cluster heartbeat.

Modifications to either of the first two settings will not take effect until the next time the resource is brought online.

  1. Compression—If you want to configure Double-Take Availability compression, verify that Enable Compression is selected. Depending on the compression algorithms available for your operating system, you may see a slider bar indicating different compression levels. Set the level from minimum to maximum compression to suit your needs.
  2. Online Pending—Because context-sensitive, right-click menus are not available in the Windows 2008 Failover Cluster Administrator, GeoCluster processing controls have been added to a properties tab. For details on this tab, see Monitoring a cluster workload.
  3. Mirror Properties—This tab controls the Double-Take Availability mirroring process.

Configuring failover monitoring

If you are configuring failover monitoring for a cluster workload, use the same process for a data workload, except note the following changes.

Cluster resource “IP_Address_Resource_Name” /OFFLINE

The post-failback script must contain the following case-sensitive command, substituting the name of the group on the target virtual server.

Cluster group “Group_Name” /ONLINE

 

Special configurations

Double-Take Availability can be implemented with very little configuration necessary in small or simple networks, but additional configuration may be required in large or complex environments. Because an infinite number of network configurations and environments exist, it is difficult to identify all of the possible configurations. Select a link to review configuration information for particular network environments.

Domain controllers

Failover of domain controllers is dependent on the Double-Take Availability functionality you are using.

NetBIOS

Because NetBIOS is not available on Windows 2008, if you are using Windows 2008 in a workgroup environment and do not have DNS host records, there may be a delay of up to five minutes before the failed over source server name is available for client access. See About the NetBIOS Interface in the MSDN library.

WINS

When Double-Take Availability failover occurs, Windows initiates WINS registration with the target’s primary WINS server to associate the source server’s name with the target’s primary IP address. In an environment with just one WINS server, no additional processing is required. In an environment with more than one WINS server, WINS replication will distribute the updated WINS registration to other WINS servers on the network. The length of time required for all WINS servers to obtain the new registration depends on the number of WINS servers, the WINS replication architecture, and the WINS replication interval. Clients will be unable to access the target until their WINS server has received the updated WINS information. You can reduce the time required for the WINS updates, thereby decreasing the wait time for the end users, by scripting the WINS updates in the Double-Take Availabilityfailover scripts. You have two options for scripting the WINS updates.

WINS registration

WINS registration can be added to your failover and failback scripts by using the Windows NETSH command with the WINS add name context. Add the following command to your failover and failback scripts for each additional WINS server in your environment (excluding the target’s primary WINS server).

netsh wins server wins_server_IP_address add name Name=source_server_name RecType=1 IP={IP_address}

Variable Description
wins_server_IP_address The IP address of the WINS server
source_server_name The name of the source server
IP_address The IP address of the target that has taken over for the failed source (for the failover script) or the IP address of the source that is reassuming its original identity (for the failback script)

For example, suppose you had the following environment.

You would add the following to your failover script to register the source’s name with the target’s IP address on the two secondary WINS servers.

netsh wins server 192.168.1.110 add name Name=Alpha RecType=1 IP={116.123.2.47}

netsh wins server 150.172.114.74 add name Name=Alpha RecType=1 IP={116.123.2.47}

You would add the following to your failback script to register the source’s name back with the source’s original IP address on the two secondary WINS servers.

netsh wins server 192.168.1.110 add name Name=Alpha RecType=1 IP={192.168.1.108}

netsh wins server 150.172.114.74 add name Name=Alpha RecType=1 IP={192.168.1.108}

See your Windows documentation or the Microsoft web site for more details on the NETSH command.

WINS replication

WINS replication can be added to your failover and failback scripts by using the Windows NETSH command with the WINS set replicate context. Add the following command to your failover and failback scripts.

netsh wins server target’s_primary_wins_server_IP_address set replicateflag 1

Variable Description
target's_primary_wins_server_IP_address The IP address of the target's primary WINS server

For example, suppose you had the following environment.

You would add the following to your failover script to force the target’s primary WINS server to replicate its updated information to the other secondary WINS servers on the network.

netsh wins server 116.123.2.50 set replicateflag 1

You would add the same line to your failback script to force the target’s primary WINS server to replicate its updated information again. This would replicate information for the source’s name and the source’s original IP address to the other secondary WINS servers on the network.

netsh wins server 116.123.2.50 set replicateflag 1

See your Windows documentation or the Microsoft web site for more details on the NETSH command.

DNS

If you are using a Microsoft DNS server, when Double-Take Availability failover occurs, DNS is not automatically updated. If the end-users use DNS to resolve server names and the source IP address was not failed over to the target, additional DNS updates will be required because the host records for the source will remain intact after failover. You can automate this process by scripting the DNS updates in the failover and failback scripts. You have two options for scripting the DNS updates.

Windows DNSCMD command

DNS updates can be added to your failover and failback scripts by using the Windows DNSCMD command as long as dynamic updates are enabled on the DNS zone and the account running the Double-Take service is a member of the DNSAdmins security group. (See your Microsoft documentation to verify if dynamic updates are enabled.) Add the following commands to your failover and failback scripts to delete the host and reverse lookup entries and add new entries associating the source to the target.

For example, suppose you had the following environment.

You would add the following to your failover script to delete the host and reverse lookup entries and add new entries associating the source to the target.

dnscmd DNSServer.domain.com /RecordDelete domain.com alpha A 192.168.1.108 /f

dnscmd DNSServer.domain.com /RecordDelete 192.168.in-addr.arpa 108.1 PTR alpha.domain.com /f

dnscmd DNSServer.domain.com /RecordAdd domain.com alpha A 116.123.2.47

dnscmd DNSServer.domain.com /RecordAdd 116.123.in-addr.arpa 47.2 PTR alpha.domain.com

You would add the following to your failback script to delete the host and reverse lookup entries and add new entries associating the source with its original identity.

dnscmd DNSServer.domain.com /RecordDelete domain.com alpha A 116.123.2.47 /f

dnscmd DNSServer.domain.com /RecordDelete 116.123.in-addr.arpa 47.2 PTR alpha.domain.com /f

dnscmd DNSServer.domain.com /RecordAdd domain.com alpha A 192.168.1.108

dnscmd DNSServer.domain.com /RecordAdd 192.168.in-addr.arpa 108.1 PTR alpha.domain.com

See your Windows documentation or the Microsoft web site for more details on the DNSCMD command.

Double-Take Availability DFO utility

DNS updates can be added to your failover and failback scripts by using the Double-Take Availability DFO utility as long as the utility has been registered and the proper privileges are configured.

  1. Extract the DFO utility to the location where the Double-Take Availability program files are installed on the target.
  2. From a command prompt, change to the Double-Take Availability program files directory and register the DFO utility by entering the command regsvr32 capicom.dll
  3. Create a user account that has full control on the WMI DNS namespace on the source’s primary DNS server.
  1. Select Start, Run, and enter the command mmc.
  2. After the Microsoft Management Console starts, select File, Add/Remove Snap-in.
  3. Click Add, select WMI Control, click Add again, confirm the local computer is selected, and then click Finish.
  4. Close the snap-in dialog box and then click OK to return to the console.
  5. Right-click WMI Control and select Properties.
  6. On the Security tab, expand the tree under Root.
  7. Select MicrosoftDNS and click Security.
  8. Click Add and identify the user account that you want the DFO utility to use.
  9. Grant the user account permissions for Execute Methods, Full Write, Partial Write, Provider Write, Enable Account, Remote Enable, and Read Security.
  10. Click OK to close all open dialog boxes and then close the console.
  11. Restart the Windows Management Instrumentation service for the changes to take effect. .
  1. Add the same user account that has full control on the WMI DNS namespace to the domain’s DnsAdmins group where the source's primary DNS server is located.
  1. Select Start, Programs, Administrative Tools (Common), and Active Directory Users and Computers.
  2. Right-click the DnsAdmins group and select Properties.
  3. Select the Members tab, click Add, and identify the user account that you granted full control on the WMI DNS namespace.
  4. Click OK to close all open dialog boxes and then close Active Directory Users and Computers.
  1. Add the appropriate DFO command to your failover script using the following syntax.
Command DFO
Description Used in script files to failover the DNS server name
Syntax

DFO [/DNSSRVNAME <dns_server_name>] /SRCNAME <source_fqd_name> /SRCIP <source_ip> /TARIP <target_ip> /TARNAME <target_fqd_name> [/RECORDTYPE <rec_type>] [/USERNAME <user_name> /PASSWORD <password>] [/DNSZONE <zone_name>] [/DNSDOMAIN <domain_name>] [/LOGFILE <file_name>] /FAILBACK [fb_switch] [/SETPASSWORD <user_name> <password>[machine][file]] [/GETPASSWORD] [/LOCK] [/UNLOCK] /TRUSTEE <trustee_name> [/VERBOSE] [/FLUSHDNS /MACHINE <machine_fqd_name>] [/TTL <seconds>] [/ADDOMAIN <active_directory_domain_name> [/SOURCEDN <source_domain_name> [/TEST] [/DEBUG] [/HELP]

Options
  • DNSSRVNAME dns_server_name—The name of the source domain/zone's primary DNS server. If not specified, the local machine will be used.
  • SRCNAME source_fqd_name—The source machine's fully qualified domain name
  • SRCIP source_ip—The source machine's IP address
  • TARIP target_ip—The target machine's IP address
  • TARNAME target_fqd_name—The target machine's fully qualified domain name (required only for failback)
  • RECORDTYPE rec_type—The type of DNS resource records to modify or list. Values record types are ALL, MSEXCHANGE, A, CNAME, MX, PTR, STD, or STANDARD. STD and STANDARD are used to specify a non-Exchange record (minus the MX records). By default, all record types are included.
  • USERNAME user_name—The domain name of the user account. If not specified, the account running the utility will be used.
  • PASSWORD password—The password associated with the user account
  • DNSZONE zone_name—The name of the DNS zone or DNS container, used to refine queries
  • DNSDOMAIN domain_name—The name of the DNS domain, used to refine queries
  • LOGFILE file_name—The name of the log file
  • FAILBACK fb_switch—Denotes a failback procedure, performed after a failed source is recovered or restored (required for failback). By default, the DFO will only failback records in the dfo_failback_config.dat file. This option allows you to enter search criteria to identify the records to change back, even if they are not in the configuration file. This option is also used if the dfo_failback_config.dat file is missing.
  • SETPASSWORD user_name password machine file—Stores user credentials on the specified machine in the specified file for later use. The file will be encrypted. This option must be run separately from a modify or list activity.
  • GETPASSWORD—Retrieves previously stored user credentials. This option can only be used if the credentials were previously stored with the setpassword option.
  • LOCK—Allows Active Directory locking for the A record type of the source specified without modifying the record
  • UNLOCK—Allows Active Directory unlocking for the A record type of the source specified without modifying the record
  • TRUSTEE trustee_name—The domain account for the source machine (domain\machine$). DFO attempts to deny write permissions to the DNS A record on failover for the account identified as the trustee. “Deny write permissions” is then removed from the DNS A record on failback. This keeps the source server from reclaiming its DNS A record if it comes back online prior to failback.
  • VERBOSE—Logging and display level set to maximum detail
  • FLUSHDNS MACHINE machine_fqd_name—Runs the ipconfig /flushdns command to flush the DNS cache on the specified machine. Use the fully-qualified domain name of the machine.
  • TTL seconds—Specifies the number of seconds for the time to live value of all modified records
  • ADDOMAIN active_directory_domain_name—The name of the Active Directory domain
  • SOURCEDN source_domain_name—The name of the source's domain
  • TEST—Runs in test mode so that modifications are not made, only listed
  • DEBUG—Forces DFO to write the DNS resource record as-is to the dfolog.log file prior to any DFO modify or list activity.
  • HELP—Displays the syntax of the DNS Failover utility
Examples
  • dfo /dnssrvname gamma.domain.com /srcname alpha.domain.com /srcip 206.31.4.10 /verbose (Lists all resource records on the specified DNS server that match the source criteria)
  • dfo /dnssrvname gamma.domain.com /srcname alpha.domain.com /srcip 206.31.4.10 /tarip 210.11.12.13 /verbose (Modifies all resource records on the specified DNS server that match the source criteria, using the credentials of the account running the utility to connect to the DNS server)
  • dfo /dnssrvname gamma.domain.com /srcname alpha.domain.com /srcip 206.31.4.10 /tarip 210.11.12.13 /username domain.com\admin /password /verbose (Modifies all resource records on the specified DNS server that match the source criteria, using the username and password to connect to the DNS server)
  • dfo /dnssrvname gamma.domain.com /srcname alpha.domain.com /srcip 210.11.12.13 /tarname beta.domain.com /tarip 206.31.4.10 /failback /verbose (Fails back all resource records on the specified DNS server that were changed on failover)
  • dfo /setpassword domain.com\admin password (Stores the user name and password in an encrypted file)
  • dfo /dnssrvname gamma.domain.com /srcname alpha.domain.com /srcip 206.31.4.10 /tarip 210.11.12.13 /username domain.com\admin /getpassword /verbose (Modifies all resource records on the specified DNS server that match the source criteria, using the specified username and retrieving the password from the encrypted file)

Non-Microsoft DNS

If you are using a non-Microsoft DNS server (such as Unix) or if you are in a non-domain configuration (such as a workgroup), when Double-Take Availability failover occurs, DNS is not automatically updated. If the end-users use DNS to resolve server names and the source IP address was not failed over to the target, additional DNS updates will be required because the host records for the source will remain intact after failover. You can automate this process by scripting the DNS updates in the failover and failback scripts.

If you are protecting an application, you can configure the Application Manager not to check for Microsoft DNS or you can start the Application Manager from the command line and specify the /altdns option after your application switch.

For other workload protections, one option is to use a BIND DNS client for DNS scripting. The following steps provide an example of how you can use a BIND DNS client for DNS failover and failback scripting. You may need to modify this example to fit your environment.

  1. Go to www.isc.org and download the appropriate BIND DNS client.
  2. Install the BIND client on the target server.
  3. Set a PATH statement for the BIND directory to ensure that it runs every time the executable is called.
  4. Create a failover script file in the Double-Take Availability directory.
  5. Add the following line to the failover script file, substituting your Double-Take Availability directory for install_location.
  6. nsupdate.exe "c:\install_location\dnsover.txt"
  7. Save the failover script file.
  8. Create a text file, called dnsover.txt in the Double-Take Availability directory.
  9. Add the following lines to the dnsover.txt file, substituting your source name, fully-qualified domain name, target name, and target IP address as appropriate.
  10. update delete source_server_name.fully_qualified_domain_name.com A

    update add target_server_name.fully_qualified_domain_name.com 86400 A target_server_IP_address

    send

  11. Save the dnsover.txt file.
  12. Create a failback script file in the Double-Take Availability directory.
  13. Add the following line to the failback script file, substituting your Double-Take Availability directory for install_location.
  14. nsupdate.exe "c:\install_location\dnsback.txt"
  15. Save the failback script file.
  16. Create a text file, called dnsback.txt in the Double-Take Availability directory.
  17. Add the following lines to the dnsback.txt file, substituting your target name, fully-qualified domain name, source name, and source IP address as appropriate.
  18. update delete target_server_name.fully_qualified_domain_name.com A

    update add source_server_name.fully_qualified_domain_name.com 86400 A source_server_IP_address

    send

  19. Save the dnsback.txt file.
  20. Change the Double-Take service on the target server to a domain account that has rights to modify BIND DNS. Stop and start the service to have it take effect.

Macintosh shares

A share is any volume, drive, or directory resource that is shared across a network. During failover, the target can assume or add any source shares so that they remain accessible to the end users. Automatic share failover only occurs for standard Windows file system shares. Other shares, including Macintosh volumes, must be configured for failover through the failover scripts or created manually on the target.

  1. On your target, set the File Server for Macintosh service to manual startup. This allows the post-failover script on the target to control when the service starts on the target.
  2. Create each volume on the target machine exactly as it exists on the source. Use the Shared Folder wizard to configure each volume as a Macintosh-accessible volume. Follow these steps to start the wizard:
  1. Open the Control Panel and click Administrative Tools.
  2. Select Configure Your Server.
  3. In the Configure Your Server window, click the File Server link.
  4. Click Start the Shared Folder wizard to start the wizard, and then follow the directions provided by the wizard. On the Create Shared Folders screen, you must enable Apple Macintosh.
  5. Note:

    You can automate the creation of the volumes during the failover process by using the macfile volume command in the post-failover batch file. For detailed information on how to use this command, see your Windows reference guide.

  1. On the target machine, copy the chngname utility, chngname.exe, from the \tools\Win2K directory of the Double-Take Availability CD or from the Double-Take Software support web site to the directory where Double-Take Availability is installed.
  2. Add the following to your failover script.
  3. rem Commands for Macintosh-accessible volume failover

    rem The chngname utility (chngname.exe) must be located in the same

    rem directory where Double-Take Availability is installed.

    rem The following command temporarily changes the name of the server. You

    rem will need to replace <drive>:\<directory>\ with the location of

    rem your Double-Take Availability chngname utility and replace

    rem source_name with the name of the source machine.

    <drive>\<directory>\chngname /s source_name

    rem The following command starts the File Server for Macintosh service

    net start "File server for Macintosh"

    rem The following command changes the name of the server back to its

    rem original name. You will need to replace <drive>:\<directory>\ with

    rem the location of your Double-Take Availability chngname utility.

    <drive>\<directory>\chngname /t

In the event of a failure, the Macintosh clients must remap the volume in order to access it. From the Macintosh client, use the Chooser to select the volume that needs to be remapped.

NFS Shares

A share is any volume, drive, or directory resource that is shared across a network. During failover, the target can assume or add any source shares so that they remain accessible to the end users. Automatic share failover only occurs for standard Windows file system shares. Other shares, including NFS shares, must be configured for failover through the failover scripts or created manually on the target.

  1. On your target, set the NFS service to manual startup. This allows the post-failover script on the target to control when the service starts on the target.
  2. Create each shared drive or directory on the target exactly as it exists on the source. Configure each drive or directory as an NFS share by following these steps.
  1. Right-click the drive or directory that you want to share and select Sharing.
  2. Click the NFS Sharing tab on the Program Files Properties dialog box.
  3. Enable Share this folder, provide the name of the share, and click OK to share the folder as an NFS share.
  1. On the target machine, copy the chngname utility, chngname.exe, from the \tools\Win2K directory of the Double-Take Availability CD or from the Double-Take Software support web site to the directory where Double-Take Availability is installed.
  2. Add the following to your failover script.
  3. rem Commands for NFS share failover

    rem The chngname utility (chngname.exe) must be located in the same

    rem directory where Double-Take Availability is installed.

    rem The following command temporarily changes the name of the server. You

    rem will need to replace <drive>:\<directory>\ with the location of

    rem your Double-Take Availability chngname utility and replace

    rem source_name with the name of the source machine.

    <drive>\<directory>\chngname /s source_name

    rem The following command starts the NFS service

    net start "Server for NFS"

In the event of a failure, the clients must remount the shares in order to access them.

Workload monitoring

Once a workload protection is established you will want to monitor the protection. You can monitor the workload protection using the same Double-Take Availability client that you used to establish the workload protection, or you can use several general monitoring tools that are available for all workload types.

 

Data workloads

When you are working with data workloads, you can monitor the connection and you can monitor the status of failover monitoring.

Monitoring a data workload

When a source is highlighted in the left pane of the Replication Console, the connections and their statistics are displayed in the right pane. Additionally, colors and icons are used for the connections, and the Double-Take Availability servers, to help you monitor your connections.

Connection statistics
  1. You can change the statistics that are displayed by selecting File, Options and selecting the Statistics tab.
  2. The statistics displayed in the Replication Console will be listed with check boxes to the left of each item. Mark the check box to the left of each statistic that you want to appear, and clear the check box to the left of each statistic that you do not want to appear.
  3. The statistics appear on the Replication Console in the order they appear on the Statistics tab. If you want to reorder the statistics, highlight the statistic to be moved and select the up or down arrow button, to the right of the vertical scroll bar, to move the selection up or down in the list. Repeat this process for each statistic that needs to be moved until you reach the desired order.
  4. If you have made changes to the statistics list and have not yet saved them, you can go back to the previously used settings by clicking Reset to Last. This will revert the list back to the last saved settings.
  5. To return the statistics list to the Double-Take Availability default selection and order, click Reset to Default.
  6. Click OK to apply and save any changes that have been made to the order or display of the Replication Console statistics.

Statistics marked with an asterisk (*) are not displayed, by default.

Statistic Description
Replication Set Replication set indicates the name of the connected replication set.
Connection ID The connection ID is the incremental counter used to number each connection established. This number is reset to one each time the Double-Take service is restarted.
Target Name The name of the target as it appears in the server tree in the left pane of the Replication Console. If the server’s name is not in the server tree, the IP address will be displayed.
Target IP The target IP is the IP address on the target machine where the mirroring and replication data is being transmitted.
Target Data State
  • OK—The data on the target is in a good state.
  • Mirroring—The target is in the middle of a mirror process. The data will not be in a good state until the mirror is complete.
  • Mirror Required—The data on the target is not in a good state because a remirror is required. This may be caused by an incomplete or stopped mirror or an operation may have been dropped on the target.
  • Restore required—The data on the source and target do not match because of a failover condition. Restore the data from the target back to the source. If you want to discard the changes on the target, you can remirror to resynchronize the source and target.
  • Snapshot reverted—The data on the source and target do not match because a snapshot has been applied on the target. Restore the data from the target back to the source. If you want to discard the changes on the target, you can remirror to resynchronize the source and target.
Target Status
  • OK—The target machine is active and online.
  • Not Loaded—The target module is not loaded on the target. (For example, the activation code is invalid.)
  • Paused—The target machine is paused by user intervention.
  • Retrying—The target machine is retrying operations for the connection.

This field may not be updated until there is source/target activity.

Commit Mode *

The commit mode status indicates the connection status.

  • Real-time—Data is being transmitted to the target machine in real-time.
  • Scheduled—Data is waiting to be transmitted to the target machine until one or more transmit options have been met.
Transmit Mode
  • Started—Data is being transferred to the target machine.
  • Paused—If the transmission is real-time and the transmission has been paused, the Transmit Mode indicates Paused.
  • Scheduled—If the transmission is scheduled, the Transmit Mode indicates Scheduled.
  • Stopped—Data is not being transferred to the target machine.
  • Error—There is a transmission error.
Mirror Status
  • Mirroring—If the file size of the replication set has not been calculated and the data is being mirrored to the target machine, the Mirror Status will indicate Mirroring.
  • Idle—Data is not being mirrored to the target machine.
  • Paused—Mirroring has been paused.
  • Percentage Complete—If the file size of the replication set has been calculated and the data is being mirrored to the target machine, the Mirror Status will display the percentage of the replication set that has been sent.
  • Waiting—Mirroring is complete, but data is still being written to the target.
  • Restoring—Data is being restored from the target to the source.
  • Verifying—Data is being verified.
  • Removing Orphans—Double-Take Availability is checking for orphan files within the target path location (files that exist on the target but not on the source). These files will be removed.
  • Archiving—Data is being archived or an archive report is being run.
Replication Status
  • Replicating—Data is being replicated to the target machine.
  • Ready—There is no data to replicate to the target machine.
  • Stopped—Replication has stopped.
  • Pending—If auto-remirror is enabled and you have experienced a source or target failure and recovery, the status will change to pending while the connections are reestablished and will update when the remirror begins. If auto-remirror is disabled and you have experienced a source or target failure and recovery, replication will be Pending until a remirror is performed. Without a remirror, data integrity cannot be guaranteed.
  • Out of Memory—Kernel memory has been exhausted.
  • Failed—TheDouble-Take service is not receiving replication operations from the Double-Take Availability driver. Check the Double-Take Availability log and Event Viewer for driver related issues.
Queued (Ops) * The queued (ops) statistic indicates the total number of mirror and replication operations that are in the source queue.
Sent (Bytes) The sent (bytes) statistic indicates the total number of mirror and replication bytes that have been transmitted to the target.
Sent Compressed (Bytes) The sent compressed (bytes) statistic indicates the total number of compressed mirror and replication bytes that have been transmitted to the target. If compression is disabled, this statistic will be the same as sent (bytes).
Intermediate Queue (Bytes) * The intermediate queue (bytes) indicates the total amount of memory being used by the operations buffer queue.
Disk Queue (Bytes) The disk queue (bytes) indicates the amount of disk being used to queue data on the source.
Queued Replication (Bytes) The queued replication (bytes) statistic is the total number of replication bytes that are remaining to be transmitted from the source.
Sent Replication (Bytes) The sent replication (bytes) statistic is the total number of replication bytes that have been transmitted to the target.
Sent Compressed Replication (Bytes) * The sent compressed replication (bytes) statistic is the total number of compressed replication bytes that have been transmitted to the target. If compression is disabled, this statistic will be the same as sent replication (bytes).
Queued Mirror (Ops) * The queue mirror (ops) statistic is the total number of mirror operations in the queue.
Sent Mirror (Bytes) The sent mirror (bytes) statistic is the total number of mirror bytes that have been transmitted to the target.
Sent Compressed Mirror (Bytes) * The sent compressed mirror (bytes) statistic is the total number of compressed mirror bytes that have been transmitted to the target. If compression is disabled, this statistic will be the same as sent mirror (bytes).
Skipped Mirror (Bytes) The skipped mirror (bytes) statistic is the total number of bytes that have been skipped when performing a difference or checksum mirror. These bytes are skipped because the data is not different on the source and target machines.
Remaining Mirror (Bytes) The remaining mirror (bytes) statistic is the total number of mirror bytes that are remaining to be sent to the target.
Queued Replication (Ops) * The queued replication (ops) statistic is the total number of replication operations in the queue.
Last File Touched The last file touched identifies the last file that Double-Take Availability transmitted to the target. If you are using long file names (more than several thousand characters long) you may want to disable the display of this statistic to improve Replication Console response times.
Connected Since Connected since is the date and time indicating when the current connection was made. This field is blank, indicating that a TCP/IP socket is not present, when the connection is waiting on transmit options or if the transmission has been stopped. This field will maintain the date and time, indicating that a TCP/IP socket is present, when transmission has been paused.
Bandwidth Limit (Kbps) If bandwidth limiting has been set, this statistic identifies the limit. The keyword Unlimited means there is no bandwidth limit set for the connection.
Connection and sever display

You can configure when the icons and colors change to accommodate your network environment. For example, a slow or busy network may need longer delays before updating the icons or colors.

  1. Select File, Options. On the Configuration tab, you will see Site Monitor and Connection Monitor. The Site Monitor fields control the icons on the left pane of the Replication Console and the icons on the right pane when a group is highlighted in the left pane. The Connection Monitor field controls the display when a server is highlighted in the left pane. These two separate monitoring capabilities allow for flexible monitoring.
  2. Under Site Monitor, specify Check Status Interval to identify the number of seconds between requests sent from the Replication Console to the servers in order to update the display. Valid values are between 0 and 3600. The default setting is 30 seconds.
  3. Under Site Monitor, specify Missed Status Responses to identify the number of responses from a server that can be missed before the Replication Console considers communications lost and updates the icons. Valid values are between 1 and 100. The default setting is 2.
  4. Under Connection Monitor, specify Missed Status Responses to identify the number of responses from a server that can be missed before the Replication Console considers communications lost and updates the icons and colors. Valid values are between 0 and 1000. The default setting is 5.
  5. Click OK to save the settings.
  6. Note:

    If the Site Monitor and Connection Monitor settings are different, at times, the icons and color may not be synchronized between the left and right panes.

Location Icon or Color Description
Icons and colors displayed in the right pane when a server is highlighted in the left pane A green checkmark on a connection indicates the connection is working properly.
A red X on a connection indicates a connection error. For example, an error may be caused by broken transmission or pending replication. To determine the exact problem, locate the connection data item that appears in red.
A lock icon on a connection indicates target path blocking is enabled for the connection. This prohibits writing to the path on the target where the replication data is stored.
White If the connection background is white, the Replication Console and the source are communicating.
Gray If the connection background is gray, the Replication Console and the source are no longer communicating. The connection data stops updating once communications have stopped. Once communications have been reestablished, the connection background will change back to white.
Icons displayed in the right pane when a group is highlighted in the left pane An icon with a network cable between two servers on the right pane indicates there are no established Double-Take Availability connections to this server. This icon also indicates that communications between the Replication Console and the server are working properly.
An icon with two servers on the right pane indicates this server has active connections that are working properly.
A yellow server icon with a red X on the right pane indicates a connection error. For example, an error may be caused by broken transmission or pending replication. To determine the exact problem, locate the connection data item that appears in red.
An icon with a network cable between two servers and marked with a red X on the right pane indicates a communication error between the Replication Console and the server.
A blue server icon with a red X indicates a restore is required because of a failover.
A network cable with a black X indicates the server is not running Double-Take Availability.
Left pane icon An icon with yellow and blue servers indicates a server that is working properly.
A hammer over a server indicates an activation code violation. Check the Double-Take Availability log or Event messages for more information.
A red X on a server icon indicates the Replication Console cannot communicate with that server or that is a problem with one of the server’s connections. If the connection background is gray, it is a communication issue. If the connection also has a red X, it is a connection issue.
Two red vertical lines on a server icon indicates the target is paused.
A red tree view (folder structure) on a server icon indicates a restore is required because of a failover.
A black X on a server icon indicates the server is not running Double-Take Availability.
A yellow folder with a blue server indicates a group folder that is working properly.
A black exclamation point inside a yellow triangle on a group folder indicates there is a communication error on one of the servers in the group. Drill down through the group until you find the server that has the communication error.
A white X inside a red circle on a group folder indicates there is a connection error on one of the servers in the group. Drill down through the group until you find the server that has the connection error.

Monitoring failover monitoring

Since it can be essential to quickly know the status of failover monitoring, Double-Take Availability offers various methods for monitoring failover monitoring. When the Failover Control Center is running, you will see four visual indicators:

The following table identifies how the visual indicators change as the status of failover changes.

  Time to Fail Countdown Status Bar Colored Bullets Desktop Icon Tray
Source is Online

The Time to Fail counter is counting down and resetting each time a response is received from the source machine.

The status bar indicates that the target machine is monitoring the source machine.

The bullets are green.

When the Time to Fail value has decreased by 25% of the entire timeout period, the bullet changes from green to yellow, indicating that the target has not received a response from the source. The yellow bullet is a caution signal. If a response from the source is received, the countdown resets and the bullets change back to green. If the countdown reaches zero without the target receiving a response from the source, failover begins.

The Windows desktop icon tray contains a failover icon with red and green computers.
Source Fails and Failover is Initiated The Time to Fail countdown value is 0. The status bar displays the source machine and IP address currently being assumed by the target.

The bullets are red.

The Windows desktop icon tray contains a failover icon with red and green computers.

Failover is Complete The Time to Fail counter is replaced with a failed message.

The status bar indicates that monitoring has continued.

The bullets are red.

The Windows desktop icon tray contains a failover icon with a red computer.

Monitoring a full-server workload

After you have enabled full-server protection, you can monitor the protection from the Full-Server Failover Manager, and you can review the log file generated by Full-Server Failover Manager.

The Protection Status is displayed in the right center of the Full-Server Failover Manager. You can tell the status of your protection from this field.

In addition to the status displayed in Full-Server Failover Manager, a log file is generated detailing processing information. By default, Full-Server Failover Manager logs basic processing information. To view the log file, select File, Logs, View Full-Server Failover Manager Log. The log file will be opened automatically in Notepad. The log file, FFMLog.log, is located on the in the directory where you installed it. You can clear the log file by selecting File, Logs, Clear Full-Server Failover Manager Log.

Monitoring an application workload

After you have enabled application protection, you can monitor the protection from the Application Manager Monitor tab.

Monitor Section Status Item Description
Status Protection Status
  • Unprotected—No connection exists
  • Warning—A connection exists but has issues
  • Protected—A connection exists and is active
  • Synchronizing—Mirroring is in progress
  • Unknown—The protection status could not be determined
  • Failing over—Failover from the source to the target is in progress
  • Failed over—Failover is complete and the target has assumed the source role
  • Failing back—Failback from the target to the original source is in progress
  • Restoring—Mirroring (target to source) is in progress
Monitoring Status
  • Disabled—Monitoring is disabled
  • Enabled—Monitoring is active
  • Failover condition met—The source server is unavailable
  • Failing over—Failover from the source to the target is in progress
  • Failed over—Failover is complete and the target has assumed the source role
  • Failing back—Failback from the target to the original source is in progress
Protection Details Mirror Status
  • Calculating—The amount of data to be mirrored is being calculated
  • Idle—Data is not being mirrored to the target machine
  • Mirroring—Data is being mirrored to the target machine
  • Paused—Mirroring has been paused
  • Removing Orphans—Double-Take Availability is checking for orphan files within the target path location (files that exist on the target but not on the source). These files will be removed.
  • Verifying—Data is being verified
  • Restoring—Data is being restored from the target to the source
  • Unknown—The mirror status could not be determined
Mirror Remaining The percentage of the mirror remaining
Replication Status
  • Replicating—Data is being replicated to the target machine
  • Ready—There is no data to replicate to the target machine
  • Stopped—Replication has stopped
  • Out of Memory—Kernel memory has been exhausted
Transmit Mode
  • Started—Data is being transferred to the target machine
  • Paused—Data transmission has been paused
  • Stopped—Data is not being transferred to the target machine.
  • Error—There is a transmission error.
Target State
  • Online—The target is active and online
  • Mirroring—The target is in the middle of a mirror process. The data will not be in a good state until the mirror is complete.
  • Mirroring stopped—The mirroring process has been stopped
  • Remirror required—The data on the target is not in a good state because a remirror is required. This may be caused by an incomplete or stopped mirror or an operation may have been dropped on the target.
  • Retrying—The target machine is retrying operations
  • Paused—The target machine has been paused
  • Pausing—The connection is pausing
  • Restore required—The data on the source and target do not match because of a failover condition. Restore the data from the target back to the source. If you want to discard the changes on the target, you can remirror to resynchronize the source and target.
  • Replicating—Data is being replicated to the target
  • Snapshot reverted—The data on the source and target do not match because a snapshot has been applied on the target. Restore the data from the target back to the source. If you want to discard the changes on the target, you can remirror to resynchronize the source and target.
  • Target path blocked—Target path blocking is enabled
  • Target path unblocked—Target path blocking is disabled
  • Unknown—The state could not be determined
Connected Since The date and time indicating when the current connection was made
Transmitted The amount of data transmitted from the source to the target
Compressed The amount of compressed data transmitted from the source to the target
Source Queue The amount of data in queue on the source
Target Queue The amount of data in queue on the target

Monitoring virtual workloads

When you are working with virtual workloads, you can monitor the connection and you can monitor the status of failover monitoring. If you are protecting host-level virtual disk files (the .vmdk files) from an ESX source to an ESX target, you will need to use the Double-Take Availability for VMware Infrastructure console to monitor your protection. For all other virtual workloads, use the Double-Take Console to monitor your protection.

Monitoring virtual workloads in the Double-Take Console

Click Monitor Connections from the main Double-Take Console toolbar. The Monitor Connections page allows you to view information about your connections. You can also manage your connections from this page.

Overview connection information displayed in the top pane

The top pane displays high-level overview information about your connections.

Column Description
 

The first blank column indicates the state of the connection.

The connection is in a healthy state.

The connection is in a warning state.

The connection is in an error state.

 The connection is in an unknown state.

Connection The name of the connection
Source Server The name of the source
Target Server The name of the target
Replication Set The name of the replication set
Activity There are many different Activity messages that keep you informed of the connection activity. Most of the activity messages are informational and do not require any administrator interaction. If you see error messages, check the connection details.
Mirror Status
  • Calculating—The amount of data to be mirrored is being calculated.
  • Mirroring—If the file size of the replication set has not been calculated and the data is being mirrored to the target machine, the Mirror Status will indicate Mirroring.
  • Percentage Complete—If the file size of the replication set has been calculated and the data is being mirrored to the target machine, the Mirror Status will display the percentage of the replication set that has been sent.
  • Waiting—Mirroring is complete, but data is still being written to the target.
  • Idle—Data is not being mirrored.
  • Paused—Mirroring has been paused.
  • Stopped—Mirroring has been stopped.
  • Removing Orphans—Orphan files on the target are being removed or deleted depending on the configuration.
  • Verifying—Data is being verified between the source and target.
  • Restoring—Data is being restored from the target to the source.
  • Archiving—Data is being archived or an archive report is being run.
  • Unknown—The console cannot determine the status.
Replication Status
  • Replicating—Data is being replicated to the target.
  • Ready—There is no data to replicate.
  • Pending—Replication is pending.
  • Stopped—Replication has been stopped.
  • Out of Memory—Replication memory has been exhausted.
  • Failed—The Double-Take service is not receiving replication operations from the Double-Take driver. Check the Event Viewer for driver related issues.
  • Unknown—The console cannot determine the status.
Transmit Mode
  • Started—Data is being transmitted to the target.
  • Paused—Data transmission has been paused.
  • Scheduled—Data transmission is waiting on schedule criteria.
  • Stopped—Data is not being transmitted to the target.
  • Error—There is a transmission error.
  • Unknown—The console cannot determine the status. 
Filtering the connections displayed in the top pane

You can filter the connections displayed in the top pane using the toolbar buttons in that pane.

Toolbar Item Description
Leave the Monitor Connections page and open the View Connection Details page
Filter Select a filter option from the drop-down list to only display certain connections. You can display Healthy Connections, Connections with warnings, or Connections with errors. To clear the filter, select All connections.
Display only connections with warnings
Display only connections with errors
Type a server name Only those servers that contain the entered text will be displayed
Detailed connection information displayed in the bottom pane

The details displayed in the bottom pane of the Monitor Connections page will depend on the type of protection workload that is highlighted in the top pane.

Detail Item Description
Name The name of the server
Activity There are many different Activity messages that keep you informed of the connection activity. Most of the activity messages are informational and do not require any administrator interaction. If you see error messages, check the connection details.
Source server The name of the source
Target server The name of the target
Bytes sent The total number of mirror and replication bytes that have been transmitted to the target
Bytes sent compressed The total number of compressed mirror and replication bytes that have been transmitted to the target. If compression is disabled, this statistic will be the same as Bytes sent.
Connected since The date and time indicating when the current connection was made. This field is blank, indicating that a TCP/IP socket is not present, when the connection is waiting on transmit options or if the transmission has been stopped. This field will maintain the date and time, indicating that a TCP/IP socket is present, when transmission has been paused.
Protection type The type of workload protection
Hypervisor The type of target virtual server host
Protection status The status of the workload protection
Protected volumes The volumes that are being protected
Target datastore or Target path The location on the target where the source replica is being stored
Automatic failover Indicates if failover will be automatic and the number of retries that have been attempted if the source is unresponsive
Connection controls available in the bottom pane

The connection controls available in the bottom pane of the Monitor Connections page will depend on the type of protection workload that is highlighted in the top pane.

Toolbar Item Description
Opens the Protection Summary page

Removes configuration information for the selected protection

If you no longer want to protect the source and no longer need the replica of the source on the target, select the appropriate delete option when prompted. The option name will vary depending on your workload type. Selecting this option will remove the connection and completely delete the replica virtual machine on the target.

If you no longer want to mirror and replicate data from the source to the target but still want to keep the replica of the source on the target, select the appropriate keep option when prompted. The option name will vary depending on the your workload type. For example, you may want to use this option to relocate the virtual hard disks and create a new job between the original source and the new location. Selecting this option, will preserve and register the source replica on the target, provided it has been fully synchronized. If the source replica is not fully synchronized, related files will be kept on the target but will not be registered.

Enables protection for the selected protection

If you have previously stopped protection, the virtual hard disks on the target will be checked. If they are the same as the source, replication only (no mirroring) will begin. If they are not the same but there is a file on the target, a difference mirror will begin.

If you have previously paused protection, the protection job will resume where it left off.

Pause the selected protection

Stops the selected protection

Initiate failover by shutting down the source and starting the replica of the source on the target
For some workload types, you can undo failover after it has occurred. This resets the servers and the job back to their original state.
For some workload types, you can reverse the protection. The connection will start mirroring in the reverse direction with the connection name and log file names changing accordingly. After the mirror is complete, the job will continue running in the opposite direction.
Displays the most recent error associated with the selected protection

Viewing connection details

The View Connection Details page allows you to view information about a specific connection.

Category Server Detail Item Description
Properties Connection name The name of the connection
Description The connection status
Health

The connection is in a healthy state.

The connection is in a warning state.

The connection is in an error state.

 The connection is in an unknown state.

Activity

There are many different Activity messages that keep you informed of the connection activity. Most of the activity messages are informational and do not require any administrator interaction. If you see error messages, check the rest of the connection details.

Replication set The name of the replication set
Connection ID The incremental counter used to number each connection established. This number is reset to one each time the Double-Take service is restarted.
Transmit mode
  • Started—Data is being transmitted to the target.
  • Paused—Data transmission has been paused.
  • Scheduled—Data transmission is waiting on schedule criteria.
  • Stopped—Data is not being transmitted to the target.
  • Error—There is a transmission error.
  • Unknown—The console cannot determine the status.
Target data state
  • OK—The data on the target is in a good state.
  • Mirroring—The target is in the middle of a mirror process. The data will not be in a good state until the mirror is complete.
  • Mirror Required—The data on the target is not in a good state because a remirror is required. This may be caused by an incomplete or stopped mirror or an operation may have been dropped on the target.
  • Restore required—The data on the source and target do not match because of a failover condition. Restore the data from the target back to the source. If you want to discard the changes on the target, you can remirror to resynchronize the source and target.
  • Snapshot reverted—The data on the source and target do not match because a snapshot has been applied on the target. Restore the data from the target back to the source. If you want to discard the changes on the target, you can remirror to resynchronize the source and target.
Target route The IP address on the target used for Double-Take Availability transmissions.
Compression
  • On / Level—Data is compressed at the level specified
  • Off—Data is not compressed
Bandwidth limit If bandwidth limiting has been set, this statistic identifies the limit. The keyword Unlimited means there is no bandwidth limit set for the connection.
Connected since The date and time indicating when the current connection was made. This field is blank, indicating that a TCP/IP socket is not present, when the connection is waiting on transmit options or if the transmission has been stopped. This field will maintain the date and time, indicating that a TCP/IP socket is present, when transmission has been paused.
Statistics Mirror status
  • Calculating—The amount of data to be mirrored is being calculated.
  • Mirroring—If the file size of the replication set has not been calculated and the data is being mirrored to the target machine, the Mirror Status will indicate Mirroring.
  • Percentage Complete—If the file size of the replication set has been calculated and the data is being mirrored to the target machine, the Mirror Status will display the percentage of the replication set that has been sent.
  • Waiting—Mirroring is complete, but data is still being written to the target.
  • Idle—Data is not being mirrored.
  • Paused—Mirroring has been paused.
  • Stopped—Mirroring has been stopped.
  • Removing Orphans—Orphan files on the target are being removed or deleted depending on the configuration.
  • Verifying—Data is being verified between the source and target.
  • Restoring—Data is being restored from the target to the source.
  • Archiving—Data is being archived or an archive report is being run.
  • Unknown—The console cannot determine the status.
Mirror percent complete The percentage of the mirror that has been completed
Mirror remaining The total number of mirror bytes that are remaining to be sent from the source to the target
Mirror skipped The total number of bytes that have been skipped when performing a difference or checksum mirror. These bytes are skipped because the data is not different on the source and target.
Replication status
  • Replicating—Data is being replicated to the target.
  • Ready—There is no data to replicate.
  • Pending—Replication is pending.
  • Stopped—Replication has been stopped.
  • Out of Memory—Replication memory has been exhausted.
  • Failed—The Double-Take service is not receiving replication operations from the Double-Take driver. Check the Event Viewer for driver related issues.
  • Unknown—The console cannot determine the status.
Replication queue The total number of replication bytes in the source queue
Disk queue The amount of disk space being used to queue data on the source
Bytes sent The total number of mirror and replication bytes that have been transmitted to the target
Bytes sent compressed The total number of compressed mirror and replication bytes that have been transmitted to the target. If compression is disabled, this statistic will be the same as Bytes sent.

Monitoring virtual workloads in the Double-Take Availability for VMware Infrastructure console

Select Monitor protection from the left pane of the console. The Monitor protection page allows you to view information about your connections. You can also manage your connections from this page.

Overview connection information displayed in the top pane

The top pane displays high-level overview information about your connections.

Column Description
Name The name of the connection
Status A description of the current status of the protection
Bytes Pending The remaining amount of data (.vmdk files plus snapshot files) that needs to be transmitted
Remaining Interval The amount of time until the next replication cycle
Detailed connection information displayed in the bottom pane

When the View protection details button in the toolbar is toggled on, the bottom pane displays detailed connection information.

Section Status Item Description
Source Virtual Disk A list of the virtual disks being protected
Snapshot Data Size The size of the snapshot of each virtual disk
Last Modified The last time the snapshot was updated
Virtual machine name The name of the virtual machine that contains the virtual disk being protected
Snapshot datastore The name of the datastore on the source storing the snapshot data
Free space The amount of free space on the source snapshot datastore
Target Virtual machine name The name of the target replica virtual machine
Datastore The name of the target datastore
Free space The amount of free space on the target datastore
Last replication The last time snapshot files were replicated to the target
Last synchronization The last time .vmdk files were mirrored to the target
Connection controls

The connection controls are available in the toolbar of the Monitor protection page.

Toolbar Item Description
Opens the Protection Summary page allowing you to modify some protection settings.
Deletes the selected protection. You will be prompted to keep or delete the associated replica virtual machine on the target. If you do not need the replica on the target, you can delete it. However, if you want to keep the replica on the target, for example, if you want to being using the replica on the target as the production server, you can keep the replica. In this case, the replica will be preserved and registered (as long as the initial mirror has completed) allowing the virtual machine to be available in VirtualCenter. If the initial mirror has not completed, the files will be available on the target ESX server but will not be registered.
Starts protection
Stops protection
Initiates failover by stopping the virtual machine on the source and starting the replica virtual machine on the target
Initiate reverse protection by mirroring and replicating from the replica virtual machine on the target to the virtual machine on the source

Initiate undo failover to reset the virtual machines and the protection job back to the original state

View errors for the selected protection
View details for the selected protection

Monitoring a cluster workload

In a standard cluster configuration, where a single copy of data resides on a SCSI disk that is shared between cluster nodes, the Double-Take Source Connection resource keeps the data synchronized between your source and target. Use the standard Windows cluster tools to monitor the status of the resource.

In a GeoCluster configuration, where data is stored on volumes local to each node and replicated to each node in the cluster, the GeoCluster Replicated Disk resource keeps the data synchronized between nodes of the cluster. You should also use the standard Windows cluster tools to monitor the status of the resource, but you should also use the following information to help you monitor the GeoCluster Replication Disk resource.

Resolving an online pending GeoCluster Replicated Disk resource

When the GeoCluster Replicated Disk resource is in an online pending state, you are protected from possible data corruption. If you are using Windows 2003, review the description of the GeoCluster Replicated Disk Status resource to see why the GeoCluster Replicated Disk resource is in the online pending state. If you are using Windows 2008, you can see the online pending status directly in the description of the GeoCluster Replicated Disk resource. If the pending state were bypassed, the node where you are trying to bring the resource online would have incomplete data, which would then be replicated to the other nodes in the cluster. This state safeguards you from corrupting your data.

There are different options for resolving an online pending state, depending on whether your operating system supports snapshots. Therefore, some of the following options may not be displayed or may be disabled if they are not valid for your configuration.

If you are using Windows 2003, right-click on the online pending resource and select the desired control.

If you are using Windows 2008, right-click the online pending resource, select Properties, select the Online Pending tab, and click the desired control button.

Windows 2003 Windows 2008 Description
Revert to snapshot Revert Snapshot If you have a snapshot of the target data available, you can revert to that data. If you revert to a snapshot, any data changes made after the snapshot’s specified date and time will be lost. A Double-Take Availability connection will be established to replicate the node’s data (at the snapshot point-in-time) to the other nodes.
Discard target queue Flush Target If you have data in the target queue, you can discard that data. If you discard the queued data, you will lose the changes associated with that data made on the previously owning node. A Double-Take Availability connection will be established to replicate the node’s data (without the data that was in queue) to the other nodes.
Force Resource Offline Fail Resource If you are using Windows 2003, you can force the resource offline. If you are using Windows 2008, you can fail the resource. In either case, no Double-Take Availabilityconnection will be established.
Verify Group Test Data With this option and snapshot capability, you can test the data on the node before deciding whether to use it. If you select this option, a snapshot of the node’s current Double-Take Availability data will be taken, but the GeoCluster Replicated Disk resource does not come online, allowing you to check the data. (This means there is no Double-Take Availability connection established at this time.) Once the snapshot is taken, you can test the data on the node to see if it is viable. Once you have tested the data, you need to right-click on the online pending resource again and accept or reject the data.
Accept Data Accept If you accept the data, the current data on the node will be used, and a Double-Take Availability connection will be established to replicate the current node’s data to the other nodes. If any other nodes in the cluster contain more recent data, this node will overwrite that data and it will be lost.
Reject Data Reject If you reject the data, the node will be reverted to the snapshot that was taken when you selected the Verify Group or Test Data option. Any changes made on the node after that snapshot was created will be lost. This option essentially takes you back to where you were, allowing you the opportunity to check other nodes for more recent data.
GeoCluster Replicated Disk Status Resource

The function of the GeoCluster Replicated Disk Status resource (also displayed as GRD Status) varies between Windows 2003 and Windows 2008. In both operating systems, it is automatically created when the first GeoCluster Replicated Disk resource is created in a group. Once the status resource is created, it will exist as long as there is a GeoCluster Replicated Disk resource in the group. When the last GeoCluster Replicated Disk resource in a group is deleted, the status resource will be deleted. Only one status resource is created per group.

If you are using Windows 2003, the description of the status resource corresponds to various states of your Double-Take Availability data. By reviewing the status descriptions, you can tell at-a-glance the state of your Double-Take Availability data. If you are using Windows 2008, these status descriptions are seen directly in the GeoCluster Replicated Disk resource description, rather than the GeoCluster Replicated Disk Status resource.

Sample Status Resource Description Double-Take Availability Data State
The status of all targets is OK. The data on each target node is in a good state.
  • Target target_name is pending. Data integrity not guaranteed.
  • Target target_name is suspect. Data integrity not guaranteed.
The data on the specified target node is not in a good state. This could be because a mirror is in progress, an operation has been dropped on the target, or another Double-Take Availabilityprocessing issue. Check the Double-Take Availability logs for more information. As long as the status is pending, data integrity cannot be guaranteed on the specified target node.
Target target_name is queuing. Data in queue on target. The data on the specified target is not up-to-date. Because there is data in queue on the target, that has not been written to disk yet, the target data is out-of-date.

The text of the descriptions may vary between Windows 2003 and Windows 2008.

Another function of the status resource, for both Windows 2003 and Windows 2008, is to keep you from moving the GeoCluster Replicated Disk resource to another node at the wrong time and potentially corrupting your data. If the GeoCluster Replicated Disk resource was moved while the status resource is in a pending or queuing state, the new node would have incomplete data, which would then be replicated to the other nodes in the cluster. This resource safeguards you from corrupting your data.

Log files

Various Double-Take Availability components (Double-Take service, Replication Console, Failover Control Center, and the Command Line Client) generate a log file to gather alerts, which are notification, warning, and error messages. The log files are written to disk.

Each log file consists of a base name, a series number, and an extension.

Viewing the log file

You can view the Double-Take Availability log file through the Replication Console or through any text editor. You can view any of the other component log files through any text editor.

Viewing the log file through the Replication Console
  1. Open a new message window using any of the following methods.
    • Right-click on the server that you want to monitor in the left pane and select New, Message Window.
    • Select the Message Window icon from the toolbar.
    • Select Monitor, New Message Window and identify the Server that you want to monitor.
  2. Repeat step 1 if you want to open multiple message windows.

  3. Note:

    The standard appearance of the message window is a white background. If your message window has a gray background, the window is inactive. The Replication Console may have lost communications with that server, for example, or you may no longer be logged into that server.

    The message window is limited to the most recent 1000 lines. If any data is missing an entry in red will indicate the missing data. Regardless of the state of the message window, all data is maintained in the Double-Take Availability log on the server.

  4. To control the window after it is created, use either of the following methods to access the control methods listed in the following table.
    • Right-click on the message window and select the appropriate control.
    • Select the appropriate toolbar control.
    • Select Monitor, the name of the message window, and the appropriate control.
    Message Window Control Description Toolbar Icon
    Close

    Closes the message window

    Clear

    Clears the message window

    Pause/Resume

    Pauses and resumes the message window.

    Pausing prevents new messages from being displayed in the message window so that you are not returned to the bottom of the message window every time a new message arrives. The messages that occur while the window is logged are still logged to the Double-Take Availability log file.

    Resuming displays the messages that were held while the window was paused and continues to display any new messages.

    Pausing is automatically initiated if you scroll up in the message window. The display of new log messages will automatically resume when you scroll back to the bottom.

    Copy

    Allows you to copy selected text

    Options

    This control is only available from the Monitor menu. Currently, there are no filter options available so this option only allows you to select a different server. In the future, this control will allow you to filter which messages to display.

     
  5. To change which server you are viewing messages for, select a different machine from the drop down list on the toolbar. If necessary, the login process will be initiated.
  6. To move the message window to other locations on your desktop, click and drag it to another area or double-click it to automatically undock it from the Replication Console.
Viewing the log file through a text editor

The log files can be viewed, from the location where Double-Take Availability is installed, with a standard text editor.

The following table describes the information found in each column of the log file.

Column Number Description
1 The date the message was generated
2 The time the message was generated.
3 The process ID.
4 The thread ID.
5 The sequence number is an incremental counter that assigns a unique number to each message.
6

The type or level of message displayed.

  • 1—Warning or error message
  • 2—Informational message
7 The message ID.
8 The message text.
Sample Double-Take Availability log file

01/15/2010 14:14:18.3900 95 98 2 2 69 Kernel Started

01/15/2010 14:14:18.4200 95 98 3 2 10004 Valid Activation Key Detected :

01/15/2010 14:14:18.5350 98 170 4 2 52501 Target module loaded successfully

01/15/2010 14:14:18.6760 98 172 5 2 10004 Valid Activation Key Detected :

01/15/2010 14:14:18.9870 130 131 6 2 51501 Source module loaded successfully

01/15/2010 14:24:15.2070 130 132 7 2 72 Connection Request from ip://206.31.4.305

01/15/2010 14:24:16.3090 131 133 8 2 600002 Unified login provides ADMIN access

01/15/2010 14:24:40.9680 132 134 9 2 99 RepSet Modified: UserData

01/15/2010 14:25:22.4070 134 131 10 2 71 Originator Attempting ip://206.31.4.305 01/15/2010 14:25:22.5030 134 131 11 2 0 Transmission Create to ip://206.31.4.305.

01/15/2010 14:25:22.6060 135 133 12 2 500000 UserData is connected to ip://206.31.4.305 01/15/2010 14:25:23.5030 136 98 13 2 87 Start Replication on connection 1

Sample Replication Console log file

00/00/0000 00:00:00.0000 Application starting

09/11/2010 12:45:53.8980 704 1032 1 2 0 Could not find XML file: C:\Program Files\Double-Take Software\Double-Take\Administrator.xml, default groups will be added.

09/11/2010 12:45:53.9580 704 1032 2 2 0 Adding default group: Double-Take Servers

09/11/2010 12:45:53.9580 704 1032 3 2 0 Adding default group: Double-Take Servers\

Auto-Discovered Servers

09/11/2010 12:46:08.3390 704 1032 4 210004 Evaluation license expires in 95 day(s).

Filtering the log file

Log file output can be filtered using the LogViewer utility. Use the LogViewer command from the directory where Double-Take Availability is installed.

Command LOGVIEWER
Description The Double-Take Availability logging utility that filtersDouble-Take Availability log files
Syntax LOGVIEWER [-PATH <path>] [-TYPE <number>] [-INCLUDE <list>] [-EXCLUDE <list>] [-NODATE] [-NOTIME] [-NOPID] [-NOTID] [-NOSEQ] [-NOTYPE] [-NOID] [-HELP]
Options
  • PATH path—Specify the full path to the log file
  • TYPE number—Allows you to filter the messages that are displayed. Specify 1 to display warning and error messages or specify 2 to display warnings, errors, and notifications
  • INCLUDE—Only includes specified IDs. All other IDs will not be displayed in the output
  • EXCLUDE—Excludes specified IDs. Ignore the specified IDs and display all others
  • list—A comma-separated list of IDs or ID ranges that follows the INCLUDE and EXCLUDE switches. A space should separate the switch from the list but within the list, there should be no spaces. Ranges are specified with a begin and end number and separated with a dash (-).
  • NODATE—Does not display the date in the output
  • NOTIME—Does not display the time in the output
  • NOPID—Does not display the process ID in the output
  • NOTID—Does not display the thread ID in the output
  • NOSEQ—Does not display the sequence number in the output
  • NOTYPE—Does not display the message type number in the output
  • NOID—Does not display the LogViewer ID in the output
  • HELP—Displays the command options
Examples
  • LogViewer -type 2
  • LogViewer -include 200,400-500,10000-15000
Notes The default setting is -type 2 which displays both type 1 and 2 messages.

Configuring the properties of the log file

  1. To modify the maximum file size and the number of Double-Take Availability log files that are maintained, access the Server Properties dialog box by right-clicking a machine name in the left pane of the Replication Console and selecting Properties.
  2. Select the Logging tab.
  3. At the top of the window, Folder indicates the directory where the log files are located. The default is the directory where the Double-Take Availability program files are installed.
  4. Modify any of the options under Messages and Alerts, if necessary.
  1. Click OK to save the changes.

Double-Take Availability log messages

The following table describes some of the standard Double-Take Availability alerts that may be displayed in the log files.

Note: In the following table, con_id refers to the unique connection ID assigned to each connection between a source replication set and a target.
ID Message Description
0 N/A There are several log messages with this ID#. See the description in the Message column in the log file.
7
  • Synchronous ioctl returned STATUS_PENDING
  • Failed to reset Replication Flags. Replication may not be performed correctly.

 

  • Communication with the Double-Take Availability driver is not being performed correctly. A reboot is required to guarantee replication and data integrity.
  • An error occurred between the Double-Take Availability driver and recent changes to the replication set. The possible resolutions are:
  • Undo the changes to the replication set
  • Stop and restart Double-Take Availability
  • Reboot the server
69 Double-Take kernel started on server_name The Double-Take service was started on the Double-Take Availability server specified.
70 Double-Take kernel stopped The Double-Take service was stopped on a Double-Take Availability server.
71 Originator attempting ip://xxx.xxx.xxx.xxx A source is requesting to connect a replication set to a target machine.
72 Connection request from ip://xxx.xxx.xxx.xxx A target machine has received a source machine’s request to connect a replication set to the target.
73 Connected to ip://xxx.xxx.xxx.xxx A source machine has successfully connected a replication set to a target machine.
74 Connection paused with ip://xxx.xxx.xxx.xxx A network connection between the source and the target exists and is available for data transmission, but data is being held in queue and is not being transmitted to the target. This happens because the target machine cannot write data to disk fast enough. Double-Take Availability will resolve this issue on its own by transmitting the data in queue when the target catches up.
75 Connection resumed with ip://xxx.xxx.xxx.xxx The transmission of data from the source machine to the target machine has resumed.
76 Connection failed to ip://xxx.xxx.xxx.xxx An attempt to establish a network connection between a source machine and target machine has failed. Check your network connections and verify that the target machine is still online.
77 Connection lost with IP address address The network connection previously established between a source machine and target machine has been lost. Check your network connections and troubleshoot to see why the connection was lost.
78 Auto-disconnect threshold has been reached. The Double-Take Availability queue has exceeded its limit, and the auto-disconnect process will disconnect the source and target connection. The auto-reconnect process will automatically reestablish the connection if the auto-reconnect feature is enabled. If the auto-reconnect feature is not enabled, you must first verify that the connection between the source and target has been broken, and then manually reestablish the connection in the Replication Console.
79 Memory freed to bring Double-Take memory usage below the limit Data in the source queue has been sent to the target machine, bringing the pagefile below its limit.
80 Trying to auto-retransmit to ip://xxx.xxx.xxx.xxx Double-Take Availability is attempting to automatically reconnect previously established source and target connections after a server reboot or auto-disconnect. This is also referred to as the auto-reconnect process.
81 Schedule transmit start to target A scheduled transmission of data from a source machine to a target machine has started. See the description in the Message column in the log file.
82 Schedule transmit end to target A scheduled transmission of data from a source machine to a target machine has ended. See the description in the Message column in the log file.
85 repset has been auto-disconnected Double-Take Availability automatically disconnects the source and target connection because the queue size has reached a specified size for this action.
87 Start replication on connection con_id Data has started replicating from a source machine to a target machine.
88 Stop replication on connection con_id Data has stopped replicating from a source machine to a target machine.
89 Mirror started con_id Data is being mirrored from a source machine to a target machine.
90 Mirror stopped con_id The process of mirroring data from a source machine to a target machine has stopped due to user intervention or an auto-disconnect. (This means the mirroring process was not completed.)
91 Mirror paused con_id The process of mirroring data from a source machine to a target machine has paused because the target machine cannot write the data to disk fast enough. Double-Take Availability will resolve this issue on its own by transmitting the data in queue when the target catches up.
92 Mirror resumed con_id The process of mirroring data from a source machine to a target machine has resumed.
93 Mirror ended con_id The process of mirroring data from a source machine to a target machine has ended.
94 Verification started con_id The verification process of confirming that the Double-Take Availability data on the target is identical to the data on the source has started.
95 Verification ended con_id The verification process of confirming that the Double-Take Availability data on the target is identical to the data on the source has ended.
97 Restore started con_id The restoration process of copying the up-to-date data from the target back to the original source machine has started.
98 Restore completed con_id The restoration process of copying the up-to-date data from the target back to the original source machine has been completed.
99 RepSet Modified: repset_ name This message means that the specified replication set has been modified.
100 Failover condition has been met and user intervention is required Double-Take Availability has determined that the source has failed, and requires manual intervention to start the failover process.
101 Failover in progress!!! The conditions for failover to occur have been met, and the failover process has started.
102 Target full! The disk to which data is being written on the target is full. This issue may be resolved by deleting files on the target machine or by adding another disk.
801 Auto-disconnect has occurred on IP address with connection con_id Disconnected replication set name: repset_name. Auto-disconnect has occurred for the specified connection. This is due to the source queue filling up because of a network or target failure or bottleneck.
10001 Activation key is not valid. An invalid activation code was identified when the Double-Take service was started.
10002 Evaluation period has expired. The evaluation license has expired.
10003 Activation code violation with machine machine_name Duplicate single-server activation codes are being used on the servers, and Double-Take Availability is disabled.
10004 Valid activation key detected A valid activation code was identified when the Double-Take service was started.
51001 Source module failed to load The Double-Take Availability source module failed to load. Look at previous log messages to determine the reason. (Look for messages that indicate that either the activation code was invalid or the user-configurable source module was not set to load automatically at startup.) The source module may have been configured this way intentionally.
51501 Source module loaded successfully The Double-Take Availability source module was loaded successfully.
51502 Source module already loaded The Double-Take Availability source module was already loaded.
51503 Source module stopped The Double-Take Availability source module stopped.
52000
  • The target has been paused due to manual intervention.
  • The target has been resumed due to manual intervention
The target has been paused or resumed through user intervention.
52000 Unfinished Op error

This error message contains various Microsoft API codes. The text Code -<x> Internal <y> appears at the end of this message. The code value indicates why the operation failed, and the internal value indicates the type of operation that failed. The most common code values that appear in this error message are:

  • (5) Permission denied: The account running the Double-Take service does not have permission to update the file specified.
  • (32) Sharing violation: Another application is using a particular file that Double-Take Availability is trying to update. Double-Take Availability will wait and try to update the file later.
  • (112) Disk full: The disk to which data is being written on the target is full. This issue may be resolved by deleting files on the target machine or by adding another disk.
52501 Target module loaded successfully The Double-Take Availability target module was loaded successfully.
52502 Target module already loaded The Double-Take Availability target module was already loaded.
52503 Target module stopped The Double-Take Availability target module stopped.
53001 File was missing from target The verification process confirms that the files on the target are identical to the files on the source. This message would only appear if the verification process showed that a file on the source was missing from the target.
53003 Could not read filename Double-Take Availability could not read a file on the source machine because the file may have been renamed or deleted. For example, temporary files show up in queue but do not show up during transmission. (No user action required.)
54000 Kernel started The Double-Take service was started.
54001 Failover module failed to load The Double-Take Availability failover module failed to load. Look at previous log messages to determine the reason.
54503 Failover module stopped The Double-Take Availability failover module stopped.
99001 Starting source module low memory processing The source’s queue is full, and the auto-disconnect process will disconnect the source and target connection. The auto-reconnect process will automatically reestablish the connection if the auto-reconnect feature is enabled. If the auto-reconnect feature is not enabled, you must first verify that the connection between the source and target has been broken, and then manually reestablish the connection in the Replication Console.
99999 Application is terminating normally The Double-Take service is shutting down normally.
503010 Asyncloctl for status thread 178 terminated, terminating the status thread A Double-Take Availability process monitors the state of the Double-Take Availability driver. When the service is shut down, the driver is shut down, and this process is terminated. (No user action required.)
600002
  • Unified login provides ADMIN access
  • User has level access (x)
  • Using the current login grants ADMIN access.
  • The listed user has listed access level and access level ID.
700000 The source machine source_machine is not responding to a ping. This occurs when all monitored IP addresses on the source machine stop responding to pings. Countdown to failover will begin at the first occurrence and will continue until the source machine responds or until failover occurs.
800000
  • Active Directory GetHostSpns function call failed
  • Active Directory RemoveSpns function call failed
  • Active Directory AddSpns function call failed
  • Double-Take Availability failed to get the host SPN (Service Principal Name) from Active Directory.
  • Double-Take Availability failed to remove an SPN from Active Directory.
  • Double-Take Availability failed to add a host SPN to Active Directory.

Monitoring event messages

An event is a significant occurrence in the system or in an application that requires administrators to be notified. The operating system writes notifications for these events to a log that can be displayed using the Windows Event Viewer. Three different log files are generated: application, security, and system.

  1. To access the Event Viewer, select Programs, Administrative Tools, Event Viewer.
  2. Select the log to view (System, Security, or Application) from the left pane of the Event Viewer. The following information is displayed for an event in the right pane of the Event Viewer.
  1. To view a detailed description, double-click an event. The additional information is displayed in the Event Properties screen.
  2. Note: For additional information on customizing the Event Viewer (such as sorting the display, filtering the display, and so on), see your Windows reference guide or the Windows online help.

For a complete list of Double-Take events, see Event messages.

Event messages

The following table identifies the Double-Take Availability events.

ID Category Severity Event Message Required Response
1 Activation Key Error This evaluation period has expired. Mirroring and replication have been stopped. To obtain a license, please contact your vendor. Contact your vendor to purchase either a single or site license.
2 Activation Key Info. The evaluation period expires in %1 day(s). Contact your vendor before the evaluation period expires to purchase either a single or site license.
3 Activation Key Info. The evaluation period has been activated and expires in %1 day(s). Contact your vendor before the evaluation period expires to purchase either a single or site license.
4 Activation Key Warning Duplicate activation codes detected on machine %1 from machine %2. If you have an evaluation license or a site license, no action is necessary. If you have a single license, you must purchase either another single license or a site license.
5 Activation Key Error This product edition can only be run on Windows Server or Advanced Server running the Server Appliance Kit. Verify your activation code has been entered correctly and contact technical support.
1000 DTCounters Error An exception occurred: %1 Run the installation and select Repair. Contact technical support if this event occurs again.
1001 DTCounters Error The Double-Take counter DLL could not initialize the statistics handler object to gather performance data. Run the installation and select Repair. Contact technical support if this event occurs again.
1002 DTCounters Error The Double-Take counter DLL could not map shared memory file containing the performance data. Run the installation and select Repair. Contact technical support if this event occurs again.
1003 DTCounters Error The Double-Take counter DLL could not open the "Performance" key in the Double-Take section of the registry. Run the installation and select Repair. Contact technical support if this event occurs again.
1004 DTCounters Error The Double-Take counter DLL could not read the "First Counter" value under the Double-Take\Performance Key. Run the installation and select Repair. Contact technical support if this event occurs again.
1005 DTCounters Error The Double-Take counter DLL read the "First Help" value under the Double-Take\Performance Key. Run the installation and select Repair. Contact technical support if this event occurs again.
1006 DTCounters Error The Double-Take counter DLL could not create event handler for the worker thread. Run the installation and select Repair. Contact technical support if this event occurs again.
3000 Service Info. Logger service was successfully started. No action required.
3001 Service Info. Logger service was successfully stopped. No action required.
4000 Service Info. Kernel was successfully started. No action required.
4001 Service Info. Target service was successfully started. No action required.
4002 Service Info. Source service was successfully started. No action required.
4003 Service Info. Source service was successfully stopped. No action required.
4004 Service Info. Target service was successfully stopped. No action required.
4005 Service Info. Kernel was successfully stopped. No action required.
4006 Service Error Service has aborted due to the following unrecoverable error: %1 Restart the Double-Take service.
4007 Service Warning Auto-disconnecting from %1 (%2) for Replication Set %3, ID: %4 due to %5 The connection is auto-disconnecting because the disk-based queue on the source has been filled, the service has encountered an unknown file ID, the target server has restarted, or an error has occurred during disk queuing on the source or target (for example, Double-Take Availability cannot read from or write to the transaction log file).
4008 Service Info. Auto-disconnect has succeeded for %1 (%2) for Replication Set %3, ID: %4 No action required.
4009 Service Info. Auto-reconnecting Replication Set %1 to %2 (%3) No action required.
4010 Service Info. Auto-reconnect has succeeded connecting Replication Set %1 to %2 (%3) No action required.
4011 Service Error Auto-reconnect has failed connecting Replication Set %1 to %2 (%3) Manually reestablish the replication set to target connection.
4012 Service Warning %1 This is a placeholder message for many other messages. See the specific log message for additional details.
4013 Service Info. %1 This is a placeholder message for many other messages. See the specific log message for additional details.
4014 Service Info. Service has started network transmission. No action required.
4015 Service Info. Service has stopped network transmission. No action required.
4016 Service Info. Service has established a connection to %1 (%2) for Replication Set %3, ID: %4 No action required.
4017 Service Info. Service has disconnected from %1 (%2) for Replication Set %3, ID: %4 No action required.
4018 Service Warning %1, however, mirroring and replication have been disabled as a restore is required due to a previous failover. Perform a restoration.
4019 Service Info. Service has started a mirror to %1 (%2) for Replication Set %3, ID: %4 No action required.
4020 Service Info. Service has paused a mirror to %1 (%2) for Replication Set %3, ID: %4 No action required.
4021 Service Info. Service has resumed a mirror to %1 (%2) for Replication Set %3, ID: %4 No action required.
4022 Service Info. Service has stopped a mirror to %1 for Replication Set %2, ID: %3, %4 No action required.
4023 Service Info. Service has completed a mirror to %1 %2 for Replication Set %3, ID: %4, %5 No action required.
4024 Service Info. Service has started Replication to %1 (%2) for Replication Set %3, ID: %4 No action required.
4025 Service Info. Service has stopped Replication to %1 (%2) for Replication Set %3, ID: %4 No action required.
4026 Service Info. The target has been paused due to user intervention. No action required.
4027 Service Info. The target has been resumed due to user intervention. No action required.
4028 Service Warning Registration of service class with Active Directory failed. Verify that the Active Directory server is up and the service has the proper permissions to update its entries. Verify that the Active Directory server is running and that the Double-Take service has permission to update Active Directory.
4029 Service Warning Registration of service instance with Active Directory failed. Verify that the Active Directory server is up and the service has the proper permissions to update its entries. Verify that the Active Directory server is running and that the Double-Take service has permission to update Active Directory.
4030 Service Error RSResource.dll has an unknown error. The product functionality has been disabled. Reinstall the software, using the installation Repair option, to install a new copy of the RSResource.dll. Contact technical support if this error persists.
4031 Service Error RSResource.dll could not be opened. The product functionality has been disabled. Reinstall the software, using the installation Repair option, to install a new copy of the RSResource.dll. Contact technical support if this error persists.
4032 Service Error The RSResource.dll component version does not match the component version expected by the product. The product functionality has been disabled. Reinstall the software, using the installation Repair option, to install a new copy of the RSResource.dll. Contact technical support if this error persists.
4033 Service Error RSResource.dll build version is invalid. The product functionality has been disabled. Reinstall the software, using the installation Repair option, to install a new copy of the RSResource.dll. Contact technical support if this error persists.
4034 Service Error Error verifying the service name. The product functionality has been disabled. Reinstall the software, using the installation Repair option, to install a new copy of the RSResource.dll. Contact technical support if this error persists.
4035 Service Error Error verifying the product name. The product functionality has been disabled. Reinstall the software, using the installation Repair option, to install a new copy of the RSResource.dll. Contact technical support if this error persists.
4036 Service Error Error verifying the vendor name. The product functionality has been disabled. Reinstall the software, using the installation Repair option, to install a new copy of the RSResource.dll. Contact technical support if this error persists.
4037 Service Error Error verifying the vendor URL name. The product functionality has been disabled. Reinstall the software, using the installation Repair option, to install a new copy of the RSResource.dll. Contact technical support if this error persists.
4038 Service Error Error verifying the product code. The product functionality has been disabled. Reinstall the software, using the installation Repair option, to install a new copy of the RSResource.dll. Contact technical support if this error persists.
4039 Service Error Error while reading RSResource.dll. The product functionality has been disabled. Reinstall the software, using the installation Repair option, to install a new copy of the RSResource.dll. Contact technical support if this error persists.
4040 Service Error The product code is illegal for this computer hardware. The product functionality has been disabled. Reinstall the software, using the installation Repair option, to install a new copy of the RSResource.dll. Contact technical support if this error persists.
4041 Service Error The product code is illegal for this operating system version. The product functionality has been disabled. Reinstall the software, using the installation Repair option, to install a new copy of the RSResource.dll. Contact technical support if this error persists.
4042 Service Error The product code requires installing the Windows Server Appliance Kit. The product functionality has been disabled. Reinstall the software, using the installation Repair option, to install a new copy of the RSResource.dll. Contact technical support if this error persists.
4043 Service Error This product can only be run on a limited number of processors and this server exceeds the limit. The product functionality has been disabled. Reinstall the software, using the installation Repair option, to install a new copy of the RSResource.dll. Contact technical support if this error persists.
4044 Service Error An error was encountered and replication has been stopped. It is necessary to stop and restart the service to correct this error. Contact technical support if this error persists.
4045 Service Error %1 value must be between 1025 and 65535. Using default of %2. Verify that the Double-Take Availability port value you are trying to use is within the valid range. If it is not, it will automatically be reset to the default value.
4046 Service Error This service failed to start because of a possible port conflict. Win32 error: %1 Verify that the Double-Take Availability ports are not conflicting with ports used by other applications.
4047 Service Error Could not load ZLIB DLL %1. Some levels of compression will not be available. The compression levels available depend on your operating system. You can reinstall the software, using the installation Repair option, to install a new copy of the DynaZip.dll, or contact technical support if this error persists.
4048 Service Info. Service has started a delete orphans task to %1 (%2) for Replication Set %3, ID: %4 No action required.
4049 Service Info. Service has paused a delete orphans task to %1 (%2) for Replication Set %3, ID: %4 No action required.
4050 Service Info. Service has resumed a delete orphans task to %1 (%2) for Replication Set %3, ID: %4 No action required.
4051 Service Info. Service has stopped a delete orphans task to %1 (%2) for Replication Set %3, ID: %4 No action required.
4052 Service Info. Service has completed a delete orphans task to %1 (%2) for Replication Set %3, ID: %4 No action required.
4053 Service Info. Service has started a restore task to %1 (%2) for Replication Set %3, ID: %4 No action required.
4054 Service Info. Service has paused a restore task to %1 (%2) for Replication Set %3, ID: %4 No action required.
4055 Service Info. Service has resumed a restore task to %1 (%2) for Replication Set %3, ID: %4 No action required.
4056 Service Info. Service has stopped a restore task to %1 (%2) for Replication Set %3, ID: %4 No action required.
4057 Service Info. Service has completed a restore task to %1 (%2) for Replication Set %3, ID: %4 No action required.
4058 Service Info. Service has started a verification task to %1 (%2) for Replication Set %3, ID: %4 No action required.
4059 Service Info. Service has paused a verification task to %1 (%2) for Replication Set %3, ID: %4 No action required.
4060 Service Info. Service has resumed a verification task to %1 (%2) for Replication Set %3, ID: %4 No action required.
4061 Service Info. Service has stopped a verification task to %1 (%2) for Replication Set %3, ID: %4 No action required.
4062 Service Info. Service has completed a verification task to %1 (%2) for Replication Set %3, ID: %4 No action required.
4063 Service Info. Bandwidth limit to %1 (%2) has changed to %3. No action required.
4064 Service Info. Bandwidth limit to %1 (%2) is now in the "%3" period at %4. No action required.
4065 Service Warning Target data state for connection %1 from %2 (%3) has changed because %4. No action required.
4066 Service Error The product code requires a virtual server environment. The product functionality has been disabled. The activation code you are using is for the Virtual SystemsTM edition. This code will not work on non-virtual server environments.
4067 Service Error No replication ops have been received from the driver for an extended period of time. Check other messages for errors with the Double-Take Availability drivers, and correct as required. If there are no driver messages, verify that your drives are connected to the source. If this error persists, contact technical support.
4068 Service Error Failed to write to a replicating volume. Reboot the source server. Contact technical support if this event occurs again.
4069 Service Warning The option MoveOrphansDir has been updated because it was missing or empty. No action required.
4070 Service Error An error occurred while reading data for connection %1. All data needs to be remirrored. See the log for details. Double-Take Availability will automatically remirror the data. See the Double-Take Availability log file for details.
4096 System Warning The registry parameter %2 is unknown. Delete the parameter and report this issue to technical support.
4097 System Warning Failed to initialize WMI support. The last Word in the Data Window is the NT status code. No action required.
4097 System Error The file system filter failed to load. Replication will not occur. Reboot your server and contact technical support if this error occurs again. The last Word in the Data window is the NT status code. Reboot your server and contact technical support if this event occurs again.
4098 System Warning The registry parameters failed to load, so the default configuration values will be used. The last Word in the Data window is the NT status code. No action required.
4098 System Error The control device %2 was not created. Communication with the service will be disabled. Reboot the server and contact technical support if this error occurs again. The last Word in the Data window is the NT status code. Reboot your server and contact technical support if this event occurs again.
4099 System Warning The driver detected a hard link for a file on drive %2. Hard links are not supported. Changes to this file will not be replicated. Hard links are not supported.
4099 System Error The driver failed to register with filter manager. Reboot the server and contact technical support if this error occurs again. The last Word in the Data window is the NT status code. Reboot your server and contact technical support if this event occurs again.
4100 Activation Key Error Product activation code is invalid. Please check that it is typed correctly and is valid for the version of the operating system in use. If you are in the process of installing Double-Take Availability, verify that you are using a 24 character alpha-numeric code. If Double-Take Availability is already installed, confirm that the code entered is correct. If the code appears to be correct, contact technical support.
4100 System Error The versions of the driver and the filter driver do not match. Replication will not occur. Reboot your server. If this error occurs again, reinstall the software. Contact technical support if this error occurs after the software has been reinstalled. The last three Words in the Data window are the NT status code and the driver version numbers. Reboot your server. Reinstall the software if this event occurs again. Contact technical support if this event occurs after reinstalling the software.
4101 Activation Key Error This service will not run on this device. Contact your sales representative for upgrade procedures. The activation code does not match the type of server you are attempting to run on. Contact your vendor for a new activation code or contact technical support.
4110 Service Warning Target cannot write %1 due to target disk being full. Operation will be retried (%2 times or forever) The disk on the target is full. The operation will be retried according to the TGExecutionRetryLimit setting.
4111 Service Warning Target can not write %1 due to a sharing violation. Operation will be retried (%2 times or forever) A sharing violation error is prohibiting Double-Take Availability from writing on the target. The operation will be retried according to the TGExecutionRetryLimit setting.
4112 Service Warning Target can not write %1 due to access denied. Operation will be retried (%2 times or forever) An access denied error is prohibiting Double-Take Availability from writing on the target. The operation will be retried according to the TGExecutionRetryLimit setting.
4113 Service Warning Target can not write %1 due to an unknown reason. Operation will be retried (%2 times or forever). Please check the log files for further information on the error. An unknown error is prohibiting Double-Take Availability from writing on the target. The operation will be retried according to the TGExecutionRetryLimit setting.
4120 Service Info. Target write to %1 was completed successfully after %2 retries. No action required.
4150 Service Error Target write %1 failed after %2 retries and will be discarded. See the event log or log files for error conditions. After correcting the problem, you should re-mirror or run a verify to resynchronize the changes. The operation has been retried according to the TGExecutionRetryLimit setting but was not able to be written to the target and the operation was discarded. Correct the problem and remirror the files.
4155 Service Warning The service was unable to complete a file system operation in the allotted time. See the log files for error conditions. After correcting the problem, remirror or perform a verification with remirror to synchronize the changes. Correct the file system error and then remirror or perform a verification with remirror to synchronize the changes.
4200 Service Info. In band task %1 submitted from %2 by %3 at %4 No action required.
4201 Service Warning In band task %1 discarded (submitted from %2 by %3 at %4) A task may be discarded in the following scenarios: all connections to a target are manually disconnected, replication is stopped for all connections to a target, or an auto-disconnect occurs. If one of these scenarios did not cause the task to be discarded, contact technical support.
4202 Service Info. Running %1 in band script: %2 (task %3 submitted from %4 by %5 at %6) No action required.
4203 Service Info. Completed run of in band script: %1 (exit code %2) No action required.
4204 Service Error Error running in band script: %1 Review the task and its associated script(s) for syntax errors.
4205 Service Warning Timeout (%1 seconds) running in band script: %2 The timeout specified for the script to complete has expired. Normal processing will continue. You may need to manually terminate the script if it will never complete.
4206 Service Warning Run timeout disabled for in band script: %1 The timeout period was set to zero (0). Double-Take Availability will not wait for the script to complete before continuing. No action is required.
4207 Service Warning In band scripts disabled by server - no attempt will be made to run %1 Enable task command processing.
4300 Service Error A connection request was received on the target before the persistent target paths could be loaded. You may need to disconnect and reconnect your replication set.
4301 Service Error Unable to block target paths, the driver is unavailable. If you need to block your target paths, contact technical support.
4302 Service Info. Target Path %1 has been successfully blocked No action required.
4303 Service Warning Blocking of target path: %1 failed. Error Code: %2 If you need to block your target paths, contact technical support.
4304 Service Info. Target Path %1 has been successfully unblocked No action required.
4305 Service Warning Unblocking of target path: %1 failed. Error Code: %2 If you need to unblock your target paths, contact technical support.
4306 Service Warning Target paths for source %1 (%2) Connection id: %3 are already blocked No action required.
4307 Service Warning Target paths for source %1 (%2) Connection id: %3 are already unblocked No action required.
4308 Service Error Error loading target paths for blocking, registry key %1 has been corrupted. If you need to block your target paths, contact technical support.
4400 Service Error Failed to create snapshot set for source %1 (%2) Connection ID: %3. Error: %4 The snapshot could not be created. This may be due to a lack of disk space or memory or another reason. The error code is the Microsoft VSS error. Check your VSS documentation or contact technical support.
4401 Service Error Failed to delete automatic snapshot set for source %1 (%2) Connection ID: %3. Error: %4 The automatic snapshot could not be deleted. This may be due to a lack of memory, the file does not exist, or another reason. The error code is the Microsoft Volume Shadow Copy error. Check your Volume Shadow Copy documentation or contact technical support.
4402 Service Error Failed to delete snapshot set for source %1 (%2) Connection ID: %3. Error: %4 The snapshot could not be deleted. This may be due to a lack of memory, the file does not exist, or another reason. The error code is the Microsoft Volume Shadow Copy error. Check your Volume Shadow Copy documentation or contact technical support.
4403 Service Error A scheduled snapshot could not be created for source %1 (%2) Connection ID: %3. because the target data was in a bad state. A snapshot will automatically be created when the target data reaches a good state. No action required. A snapshot will automatically be created when the target data reaches a good state.
4404 Service Info. Set snapshot schedule for source %1 (%2) connection %3 to every %4 minutes. Next snapshot: %5. No action required.
4405 Service Info. Removed snapshot schedule for source %1 (%2) connection %3. No action required.
4406 Service Info. Enabled snapshot schedule for source %1 (%2) connection %3. No action required.
4407 Service Info. Disabled snapshot schedule for source %1 (%2) connection %3. No action required.
4408 Service Warning %1 was unable to move some orphans for source %2 on connection ID %3. Check the %1 logs for further details. Orphan files could not be moved. For example, the location could be out of disk space. Check the Double-Take Availability log for more information.
4409 Service Warning %3 was unable to delete some orphans for source %1 on connection ID %2. Check the %3 logs for further details. Orphan files could not be deleted. Check the Double-Take Availability log for more information.
4410 Service Error The registry hive dump failed with an of error: %1. Contact technical support.
4411 Service Warning The Service has detected that port %1 is being %2 by the Windows Firewall. The firewall port needs to be unblocked or restrictions against Double-Take Availability removed so that Double-Take Availability data can be transmitted.
5000 Service Info. Server Monitor service was successfully started. No action required.
5001 Service Info. Server Monitor service was successfully stopped. No action required.
5002 Service Info. Placeholders were modified to %1. No action required.
5100 Failover Info. Failover completed for %1. No action required.
5101 Failover Info. IP address %1 with subnet mask %2 was added to target machine's %3 adapter. No action required.
5102 Failover Warning %1 has reached a failover condition. A response from the user is required before failover can take place. User intervention has been configured. Open the Failover Control Center and accept or decline the failover prompt.
5103 Failover Info. Started adding drive shares from %1 to %2. No action required.
5104 Failover Info. %1 drive shares were taken over by %2. No action required.
5105 Failover Info. Attempting to run the %1 script. No action required.
5106 Failover Info. The %1 script ran successfully. No action required.
5107 Failover Error Error occurred in running %1 script. Verify that the script identified exists with the proper permissions.
5108 Failover Error The source machine %1 is not responding to a ping. This occurs when all monitored IP addresses on the source machine stop responding to pings. Countdown to failover will begin at the first occurrence and will continue until the source machine responds or until failover occurs.
5109 Failover Error The public NIC on source machine %1 is not responding to a ping. The failover target did not receive an answer to its ping of the source machine. Eventually, a failover will result. Investigate possible errors (down server, network error, etc.).
5110 Failover Info. The %1 script "%2" is still running. No action required.
5200 Failback Info.. Failback completed for %1. No action required.
5201 Failback Info.. IP address %1 was removed from target machine's %2 adapter. No action required.
5202 Failback Error Unable to Failback properly because IP address %1 was missing a corresponding SubNet Mask. Contact technical support.
5300 Monitoring Info. The following IP address was added to target's monitoring list: %1 No action required.
5301 Monitoring Info. The following IP address was removed from target's monitoring list: %1 No action required.
5302 Monitoring Info. Drive share information for %1 has been updated on the target machine. No action required.
5303 Monitoring Info. The application monitor script has started successfully. No action required.
5304 Monitoring Info The application monitor script has finished successfully. No action required.
5305 Monitoring Warning The application monitor has found the %1 service stopped. Double-Take Availability Application Manager will attempt to restart the service.
5306 Monitoring Warning The application monitor has restarted the %1 service. No action required.
5307 Monitoring Error The application monitor cannot contact the server %1. Verify the server is running. Verify available network communications with the server.
5400 ARP Info. Broadcasted new MAC address %1 for IP address %2. No action required.
5500 Service Warning Could not connect to e-mail server. Check to make sure the SMTP server %1 is available (error code: %2). Double-Take Availability could not connect to your SMTP server or the username and/or password supplied is incorrect. Verify that SMTP server is available and that you have identified it correctly in your e-mail notification configuration. Also verify that your username and password have been entered correctly.
5501 Service Warning E-mail notification could not be enabled (error code: %1). This alert occurs if there is an unexpected error enabling e-mail notification during service startup. Check to see if any other errors related to e-mail notification have been logged. Also, check to make sure the Windows Management Instrumentation (WMI) service is enabled. If neither of these apply, contact technical support.
5502 Service Warning E-mail notification could not be initialized. Check to make sure Internet Explorer 5.0 or later is installed. E-mail notification no longer requires Internet Explorer 5.0 or later. If you receive this error, contact technical support.
5503 Service Warning E-mail notification could not be processed. Check to make sure the correct version of SMTPMail.DLL is registered on the system (error code: %1). If you are using Double-Take Availability 4.4.2.1 or earlier and Windows NT 4.0, e-mail notification requires Windows Management Instrumentation (WMI) to be installed. Verify that you have it installed on the Double-Take Availability server.
5504 Service Warning Could not load LocalRS.dll (for e-mail notification). This alert occurs if there is an error loading the resource DLL for the service. Typically, this is caused by a missing LocalRS.dll file. Reinstall the software, using the installation Repair option, to install a new copy of the LocalRS.dll. Contact technical support if this error persists.
5505 Service Warning E-mail could not be sent. Check e-mail settings (error code: %1). Verify that the e-mail server that you have identified in your e-mail notification configuration is correct.
5506 Service Warning One or more required e-mail settings have not been specified (error code: %1). At a minimum, you must specify the e-mail server, the From and To addresses, and at least one type of event to include.
5507 Service Warning E-mail notification could not be initialized. Check to make sure WMI is installed and available (error code: %1). If you are using Double-Take Availability 4.4.2.1 or earlier and Windows NT 4.0, e-mail notification requires Windows Management Instrumentation (WMI) to be installed. Verify that you have it installed on the Double-Take Availability server.
5508 Service Warning An error occurred connecting to the WMI namespace. Check to make sure the Windows Management Instrumentation service is not disabled (error code %1). This alert occurs if there is an error with the Windows Management Instrumentation (WMI) service. Verify that you have it installed on the Double-Take Availability server and that it is enabled.
5600 Service Warning Part or all of the e-mail setting %1 is not in a valid format. Verify that the include categories and exclude ID list are identified and formatted correctly.
7106 RepDrv Error The driver was unable to get valid name information from the Filter Manager for the file %2. (Filename may be truncated.) It cannot be replicated. Please contact technical support. Contact technical support.
7107 RepDrv Error The driver was unable to get valid name information from the Filter Manager for a file. It cannot be replicated. Please contact technical support. Contact technical support.
8100 RepDac Error The driver encountered an unrecoverable internal error. Contact technical support. The last Word in the Data window is the internal error code. Contact technical support.
8192 Resources Error Driver failed to allocate Kernel memory. Replication is stopped and server must be rebooted for replication to continue. The last word in the data window is the tag of the allocation that failed. Reboot the server and contact technical support if this event occurs again.
8192 RepDrv Error Kernel memory is exhausted. Replication is stopped. This may have been caused by low system resources. Reboot the server and contact technical support if this event occurs again.
8193 System Error The driver failed to create a thread required for normal operation. This may have been caused by low system resources. Reboot your server and contact technical support if this error occurs again. The last Word in the Data window is the NT status code. Reboot the server and contact technical support if this event occurs again.
8196 RepDrv Warning The maximum amount of memory for replication queuing has been reached. Replication is stopped and memory is being freed. Contact technical support if this event occurs again.
8198 Resources Warning The driver registry path could not be saved. The default registry path will be used. No action required.
8200 Resources Warning The driver failed to allocate a buffer for a file name longer than 260 characters. The file will be skipped. The last Word in the Data window is the NT status code. Reboot the server and contact technical support if this event occurs again.
9000 RepKap Warning The driver has failed to process a rename operation. The driver will resend the rename operation. This message is only a warning. If you receive this message repeatedly, contact technical support. The last Word in the Data window is the NT status code. Contact technical support if this event occurs again.
9100 RepKap Error The driver encountered an error opening a file from the service. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9101 RepKap Error The driver encountered an error reading from the service input buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9102 RepKap Error The driver encountered an error writing to the service output buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9103 RepKap Error The driver encountered an error writing to the service input buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9104 RepKap Error The driver encountered an error querying for file security from the service input buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9105 RepKap Error The driver encountered an error querying for file security from the service input buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9106 RepKap Error The driver encountered an error writing file security data to the service input buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9107 RepKap Error The driver encountered an error querying for an allocated range from the service input buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9108 RepKap Error The driver encountered an error querying for an allocated range from the service output buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9109 RepKap Error The driver encountered an error writing an allocated range to the service input buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9110 RepKap Error The driver encountered an error querying for a directory from the service input buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9111 RepKap Error The driver encountered an error querying for a directory from the service output buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9112 RepKap Error The driver encountered an error writing a directory query to the service input buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9113 RepKap Error The driver encountered an error querying a stream from the service input buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9114 RepKap Error The driver encountered an error writing a stream query to the service output buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9115 RepKap Error The driver encountered an error writing a stream query to the service output buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9116 RepKap Error The driver has failed to close a file handle. If you receive this message repeatedly, contact technical support. The last Word in the Data window is the NT status code. Contact technical support.
9117 RepKap Error The driver encountered an error querying for extended attributes from the service input buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9118 RepKap Error The driver encountered an error writing extended attributes to the service output buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9119 RepKap Error The driver encountered an error writing extended attributes status to the service input buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9120 RepKap Error The driver encountered an error querying for file information from the service input buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9121 RepKap Error The driver encountered an error writing file information to the service output buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9122 RepKap Error The driver encountered an error writing file information status to the service input buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9123 RepKap Error The driver encountered an error querying for fsctl information from the service input buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9124 RepKap Error The driver encountered an error writing fsctl information to the service output buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
9125 RepKap Error The driver encountered an error writing fsctl status to the service input buffer. Check the Event Viewer Application log for additional service information or contact technical support. The last Word in the Data window is the exception code. Check for related service messages. Contact technical support if this event occurs again.
10000 RepHsm Warning This message is only a placeholder warning. The last Word in the Data window is the NT status code. No action required.
10000 GeoCluster Error Connect failed to node %1 for resource %2. Adding node to reconnect list. Ensure that GeoCluster is running on all possible owners and that it can communicate on the network selected for mirroring and replication traffic. GeoCluster will try to reestablish a connection using the check unresponsive node interval specified for the resource.
10001 GeoCluster Info. Reconnect succeeded to node %1 for resource %2. Will be added as a possible owner when mirror is complete. No action required.
10002 GeoCluster Error Disk check failed on node %1 for resource %2. Removing as a possible owner. Ensure that GeoCluster is running on all possible owners and that it can communicate on the public network. Also ensure that the disk specified for the resource is functioning correctly on all possible owners.
10003 GeoCluster Error Owner %1 of the quorum resource %2 couldn't access the arbitration path %3. Network may be down. Ensure that the network used to access the arbitration path is up and that the server is operational. Also ensure that the arbitration share path does exist and that the account running the cluster service has write privileges to the share path.
10004 GeoCluster Warning Failover of the group %1 is being delayed. Group will be brought online when the target queue is below the limit or the timeout has expired. No action required.
10005 GeoCluster Info. Node %1 is taking ownership of the group %2. The group will be brought online on this node. No action required.
10006 GeoCluster Warning The cluster notification thread failed to start on node %1 for resource %2. The resource should be taken offline and brought back online. Take the resource offline and bring it back online.
10007 GeoCluster Warning The user %1 has reverted a snapshot for the %2 resource on node %3. No action required. The snapshot you selected will be reverted.
10008 GeoCluster Warning The user %1 has discarded queued data for the %2 resource on node %3. No action required. The queue you selected will be discarded.
10009 GeoCluster Warning The user %1 is verifying data for the %2 resource on node %3. A snapshot of the current data has been taken. After you have verified the data, accept or reject the data.
10010 GeoCluster Warning The user %1 has rejected the data for the %2 resource on node %3. No action required. Since the data was rejected, the data has been reverted to the snapshot taken when the data was selected for verification.
10011 GeoCluster Warning The user %1 has accepted the data for the %2 resource on node %3. No action required. The current data will be used.
10012 GeoCluster Warning The GeoCluster Replicated Disk resource %1 has been set to validate its data. No data replication is occurring to the remaining nodes in the cluster. Please Accept or Reject the data by right-clicking on the resource and selecting the appropriate option. Replication has been stopped because of the validation request. Accept or reject the data on the node by right-clicking on the resource and selecting the appropriate option.
10100 RepKap Error The driver could not recall a file because it did not have a token for impersonation. The security provider service should set this token. The last Word in the Data window is the exception code. Contact technical support if this event occurs again.
10101 RepKap Error The driver could not access the file in the archive bin, due to a failed impersonation attempt. The last Word in the Data window is the exception code. Contact technical support if this event occurs again.
10102 RepKap Error The driver could not recall the file. The last Word in the Data window is the exception code. Contact technical support if this event occurs again.
11000 Service Info. Service has started an archive to %1 (%2) for Replication Set %3, ID: %4 No action required.
11001 Service Info. Service has completed an archive to %1 (%2) for Replication Set %3, ID: %4, %5 No action required.
11002 Service Info. Service has started a recall from %1 (%2) for Replication Set %3, ID: %4 No action required.
11003 Service Info. Service has completed a recall from %1 (%2) for Replication Set %3, ID: %4, %5 No action required.
11004 Service Warning Service has failed connection to the RepHSM driver. %1 Reboot the server or manually restart the RepHSM.sys driver.
11005 Service Warning Service has aborted the archive operation. Verify the activation code on the source and target is valid for archiving. Reboot an unlicensed server.
11006 Service Warning Service has aborted the archive recall operation. Verify the activation code on the source and target is valid for archiving. Reboot an unlicensed server.
11007 Service Warning Verification has finished with errors. %1 Review the verification log to correct or accept the errors.
11008 Service Warning Archive feature is not supported on volume %1 The source and target must be NTFS for archiving functionality
11009 Service Info. Service has started an archive preview to %1 (%2) for Replication Set %3, ID: %4 No action required.
11010 Service Info. Service has completed an archive preview to %1 (%2) for Replication Set %3, ID: %4 No action required.
11011 Service Warning Service has aborted the archive preview operation. Verify the activation code on the source and target is valid for archiving. Reboot an unlicensed server.
12000 DTRecall Info. The service has started. This message refers to the Double-Take Recall service. No action required.
12001 DTRecall Error The service failed to start. Check the user name and password for the Double-Take Recall service to ensure validity. Reinstall the software if this event occurs again.
12002 DTRecall Info. The service has stopped. This message indicates a system shutdown or the user stopped the Double-Take Recall service. No action is required.
12003 DTRecall Error The service failed to create a stop control event. (Error %1) Restart the Double-Take Recall service. Reinstall the software if this event occurs again.
12004 DTRecall Error RegisterServiceCtrlHandler failed. (Error %1) Restart the Double-Take Recall service. Reinstall the software if this event occurs again.
12005 DTRecall Error Service encountered SetServiceStatus error (Error %1) Restart the Double-Take Recall service. Reinstall the software if this event occurs again.
12006 DTRecall Error Service could not get handle to driver for security update. (Error %1) The Double-Take Recall service could not connect to the Double-Take Recall archiving driver. Reboot the server and reinstall the software if this event occurs again.
12007 DTRecall Warning Service failed a periodic security update. (Error %1) This message refers to the Double-Take Recall service. The operation will be performed every five minutes. Reinstall the software if this event occurs after five minutes.
12288 RepDrv Error The driver encountered an error accessing a buffer from the service. Contact technical support. The last Word in the Data window is the exception code. Contact technical support.
16384 RepDrv Error The driver encountered an unrecoverable error. Contact technical support. Contact technical support
16385 RepDrv Error The driver encountered an unexpected internal result. Contact technical support. The last Word in the Data window is the NT status code. Contact technical support.
16393 RepDrv Error The driver encountered an internal error. Contact technical support. The last Word in the Data window is the internal error code. Contact technical support.
16395 Resources Error The driver detected a memory error which may have been caused by a bad driver or faulty hardware. Contact technical support. The last Word in the Data window is the internal error code. Contact technical support.
16396 Resources Error The driver failed to create work queues for normal operation. This may have been caused by low system resources. Reboot the server and contact technical support if this error occurs again. The last Word in the Data window is the NT status code. Reboot the server and contact technical support if this event occurs again.
16400 RepDrv Info. RepDrv has encountered an unexpected condition, usually caused by low kernel memory. Unless otherwise mentioned, this event has already been handled and your data remains protected. If you continue to receive these events or have further questions please contact tech support. No action required.

E-mailing event messages

You can e-mail Double-Take Availability event messages to specific addresses. The subject of the e-mail will contain an optional prefix, the server name where the message was logged, the message ID, and the severity level (information, warning, or error). The text of the message will be displayed in the body of the e-mail message.

  1. Open the Replication Console and right-click the server on the left pane of the Replication Console.
  2. Select Properties.
  3. Select the E-mail Notification tab.

  1. Select Enable notification.
  2. Note: Any specified notification settings are retained when Enable notification is disabled.
  3. Specify your e-mail settings.

If desired, enter unique text for the Subject Prefix which will be inserted at the front of the subject line for each Double-Take Availability e-mail message. This will help distinguish Double-Take Availability messages from other messages. This field is optional.

If desired, enable Add event description to subject to have the description of the message appended to the end of the subject line. This field is optional.

  1. Click OK to save the settings.

Statistics

Statistics logging is the process of taking snapshots of Double-Take Availability statistical data. The data can be written to a file for future use. Changes to the statistics file configuration are detected and applied immediately without restarting the Double-Take service.

The statistics log file created is a binary file. To view the log file, you must run the DTStat utility from the command prompt.

Sample DTStat output

=================================

0/11/10 12:48:05:2040

=================================

SYSTEMALLOCATOR::Total Bytes: 0

IQALLOCATOR::Total Bytes: 0

SECURITY::Logins : 1 FailedLogins : 0

KERNEL::SourceState: 2 TargetState: 1 Start Time: Tue Sep 11 12:45:26 2007

  RepOpsGenerated: 436845 RepBytesGenerated: 0

  MirOpsGenerated: 3316423 MirBytesGenerated: 108352749214952

   FailedMirrorCount: 0 FailedRepCount: 0

   ActFailCount: 0 TargetOpenHandles: 0 DriverQueuePercent: 0

TARGET:: PeerAddress: 10.10.1.104 LocalAddress: 10.10.1.104

   Ops Received: 25 Mirror Ops Received: 23

   Retries: 0 OpsDropped: 0 Ops Remaining: 0

   Orphan Files Removed: 0 Orphan Directories Removed: 0 Orphan Bytes Removed: 0

   Bytes In Target Queue: 0 Bytes In Target Disk Queue: 0

   TasksSucceeded: 0 TasksFailed: 0 TasksIgnored: 0

SOURCE::autoDisConnects : 0 autoReConnects : 1

   lastFileTouched : /log/data_file

CONNECTION:: conPeerAddress: 10.10.1.104

   connectTime: Tue Sep 11 12:45:34 2007

   conState: 1 conOpsInCmdQueue: 0 conOpsInAckQueue: 0

   conOpsInRepQueue: 0 conOpsInMirQueue: 0 conBytesInRepQueue: 0

   conOpsTx: 27 conBytesInMirQueue: 0 conBytesTx: 14952687269

   conBytesCompressedTx: 14952

   conOpsRx: 201127 conBytesRx: 647062280 conResentOpCount: 0 conBytesInDiskQueue: 0

   conBandwidthLimit: 429496295 conBytesSkipped: 22867624 conMirrorBytesRemain: 0

   conMirrorPercent: 100.0%

   conTaskCmdsSubmitted: 0 conTaskCmdsQueued: 0

   conTasksSucceeded: 0 conTasksFailed: 0 conTasksIgnored: 0

Configuring the properties of the statistics file

  1. Right-click a machine in the left pane of the Replication Console and select Properties
  2. Select the Logging tab.

  1. At the top of the tab, specify the Folder where the log files for messages, alerts, verification, and statistics will be saved.
  2. Under Statistics, specify the following information:
  1. Select the Setup tab.
  2. Verify that Log Statistics Automatically is enabled. If disabled, statistics will not be logged.
  3. Click OK to save the settings.

Viewing the statistics file

The statistics log file created is a binary file. To view the log file, you must run the DTStat utility from a command prompt. From the directory where Double-Take Availability is installed, run the DTStat command.

Command DTSTAT
Description Starts the DTStats statistics logging utility from a command prompt
Syntax DTSTAT [-p][-i <interval>][-t <filename>] [-f <filename>] [-s <filename>] [-st <filename>][-IP <address>] [-START <mm/dd/yyyy hh:mm>][-STOP <mm/dd/yyyy hh:mm>] [-SERVER <ip_address> <port_number>]
Options
  • -p—Do not print the output to the screen
  • -i interval—Refresh from shared memory every interval seconds
  • -t filename—Save the data from memory to the specified binary file filename
  • -f filename—Reads from a previously saved binary file, filename, that was generated using the -t option instead of reading from memory
  • -s filename—Saves only the connection data from the data in memory to an ASCII, comma-delimited file, filename
  • -st filename—Saves only the target data from the data in memory to an ASCII, comma-delimited file, filename
  • -f filename1 -s filename2—Saves only the connection data from a previously saved binary file, filename1, to an ASCII, comma-delimited file, filename2
  • -f filename1 -st filename2—Saves only the target data from a previously saved binary file, filename1, to an ASCII, comma-delimited file, filename2
  • -IP address—Filters out the specified address in the IP address field and prints only those entries. Specify more than one IP address by separating them by a comma.
  • -START mm/dd/yyyy hh:mm—Filters out any data prior to the specified date and time
  • -STOP mm/dd/yyyy hh:mm—Filters out any data after the specified date and time
  • -SERVER ip_address port_number—Connects DTStat to the specified IP address using the specified port number instead of to the local machine
Examples
  • DTStat -i 300
  • DTStat -p -i 300 -t AlphaStats.sts
  • DTStat -f AlphaStats.sts -s AlphaStats.csv -start 02/02/2007 09:25
  • DTStat -server 206.31.4.51 1106
Notes
  • This command is not case-sensitive.
  • If no options are specified, DTStat will print the output to the screen at an interval of every one second.
  • If the statistics are not changing, DTStat will discontinue writing until statistics begin updating again.

Statistics

The following table identifies the Double-Take Availability statistics.

Note:

The categories you see will depend on the function of your server (source, target, or both).

If you have multiple IP addresses connected to one target server, you will see multiple Target sections for each IP address.

If you convert your statistics output to an ASCII, comma-delimited file using the dtstat -s option, keep in mind the following differences.

  • The statistic labels will be slightly different in the ASCII file than in the following table.
  • The statistics will appear in a different order in the ASCII file than in the following table.
  • The statistics in the Target Category in the following table are not included in the ASCII file.
  • The Kernel statistic Target Open Handles is not included in the ASCII file.
  • The ASCII file contains a Managed Pagefile Alloc statistic which is no longer used.
Category Statistic Description
Date/Time Stamp   The date and time that the snapshot was taken. This is the date and time that each statistic was logged. By default, these are generated once a second, as long as there are statistics being generated. If mirroring/replication is idle, then DTStat will be idle as well.
SystemAllocator Total Bytes The number of bytes currently allocated to the system pagefile
IQAllocator Total Bytes The number of bytes currently allocated to the intermediate queue
Security Logins The number of successful login attempts
FailedLogins The number of failed login attempts
Kernel SourceState
  • 0—Source is not running
  • 1—Source is running without the replication driver
  • 2—Source is running with the replication driver
TargetState
  • 0—Target is not running
  • 1—Target is running
Start Time Date and time stamp indicating when the Double-Take service was loaded
RepOpsGenerated The number of replication operations generated by the file system driver. An op is a file system operation. Double-Take Availability replicates data by sending the file system operations across the network to the target. RepOpsGenerated indicates the number of file system operations that have been generated by replication.
RepBytesGenerated The number of replication bytes generated by the file system driver. This is the number of bytes generated during replication. In other words, this is roughly the amount of traffic being sent across the network that is generated by replication. It does not take into account TCP/IP overhead (headers and such).
MirOpsGenerated The number of mirror operations transmitted to the target. Mirroring is completed by transmitting the file system operations necessary to generate the files on the target. This statistic indicates the number of file system operations that were transmitted during the initial mirror. It will continue to increase until the mirror is complete. Any subsequent remirrors will reset this field to zero and increment from there.
MirBytesGenerated The number of mirror bytes transmitted to the target. This is the number of bytes generated during mirroring. In other words, this is roughly the amount of traffic being sent across the network that is generated by the mirror. It does not take into account TCP/IP overhead (headers and such). Again, any subsequent remirror will reset this field to zero and increment from there.
FailedMirrorCount The number of mirror operations that failed due to an error reading the file from the disk
FailedRepCount The number of replication operations that failed due to an error reading the file from the disk
ActFailCount The number of activation code failures when loading the source or target. Activation codes can be bad for reasons such as: expiration of evaluation codes, duplicate codes, incorrect codes, etc.
TargetOpenHandles The number of handles currently open on the target
DriverQueuePercent The amount of throttling calculated as a percentage of the stop replicating limit
Target PeerAddress The IP address of the source machine
LocalAddress The IP address of the target machine.
Ops Received The total number of operations received by this machine as a target since the Double-Take service was loaded
Mirror Ops Received The total number of mirror operations received by this machine as a target since the Double-Take service was loaded. This number does not reset to zero for remirrors.
Retries The number of retries performed before all operations were completed
OpsDropped The number of operations skipped during a difference mirror. During a difference mirror, if Double-Take Availability detects that there have been no changes to a file, then it will indicate the number of operations it did not send for this file in this field.
Ops Remaining The total number of operations that are left in the target queue
Orphan Files Removed The number of orphan files removed from the target machine
Orphan Directories Removed The number of orphan directories removed from the target machine
Orphan Bytes Removed The number of orphan bytes removed from the target machine
Bytes In Target Queue The number of bytes currently in the system memory queue on the target
Bytes In Target Disk Queue The number of bytes currently in the disk queue on the target
TasksSucceeded The number of task commands that have succeeded on the target
TasksFailed The number of task commands that have failed on the target
TasksIgnored The number of task commands that have been ignored on the target
Source autoDisConnects The number of automatic disconnects since starting Double-Take Availability. Auto-disconnects occur because the source no longer sees the target This could be because the connection between the two has failed at some point or because the target machine data is changing on the source faster than the source can get the data to the target. This field tracks the number of times an auto-disconnect has occurred since the Double-Take service was started.
autoReConnects The number of automatic reconnects since starting Double-Take Availability. Auto-reconnect occurs after a target machine is back online. This field tracks the number of times an auto-reconnect has happened since the Double-Take service was started.
lastFileTouched The last filename that had a replication operation executed
Connection

 

conPeerAddress The IP address of the target machine
connectTime The time that this connection was established
conState

The state of the active connection

  • 0—None. This indicates a connection has not been established. Statistics are still available for the source and target machines.
  • 1—Active. This indicates that the connection is functioning normally and has no scheduling restrictions imposed on it at this time. (There may be restrictions, but it is currently in a state that allows it to transmit.)
  • 2—Paused. This indicates a connection that has been paused.
  • 4—Scheduled. This indicates a connection that is not currently transmitting due to scheduling restrictions (bandwidth limitations, time frame limitations, and so on).
  • 8—Error. This indicates a connection that is not transmitting because something has gone wrong (for example, lost connection).

Only the Scheduled and Error states can coexist. All other states are mutually exclusive. Statistics will display a conState of 12 when the connection is in both a scheduled and an error state because this is the sum of the two values (4 + 8).

conOpsInCmdQueue The number of operations waiting to be executed on the target
conOpsInAckQueue The number of operations waiting in the acknowledgement queue. Each operation that is generated receives an acknowledgement from the target after that operation has been received by the target. This statistic indicates the number of operations that have yet to receive acknowledgement of receipt.
conOpsInRepQueue The number of replication operations currently waiting to be executed on the target
conOpsInMirQueue The number of mirror operations currently waiting to be executed on the target
conBytesInRepQueue The number of replication bytes remaining to be transmitted to the target
conOpsTx The number of operations transmitted to the target. This is the total number of operations that Double-Take Availability has transmitted as a source. In other words, the cumulative number of operations transmitted by this source to all connected targets.
conBytesInMirQueue The number of mirror bytes remaining to be transmitted to the target
conBytesTx The number of bytes transmitted to the target. This is the total number of bytes that Double-Take Availability has transmitted as a source. In other words, the cumulative number of bytes transmitted by this source to all connected targets.
conBytesCompressedTx The number of compressed bytes transmitted to the target.
conOpsRx The number of operations received by the target. The number of operations that the target for this connection (as indicated by the IP address field) has received from this source.
conBytesRx The number of bytes received by the target. The number of bytes that the target for this connection (as indicated by the IP address field) has received from this source.
conResentOpCount The number of operations resent because they were not acknowledged
conBytesInDiskQueue The number of bytes in the source disk queue
conBandwidthLimit The amount of bandwidth that may be used to transfer data
conBytesSkipped The number of bytes skipped during a difference mirror. During a difference mirror, if Double-Take Availability detects that there have been no changes to a file, then it will indicate the number of bytes it did not send for this file in this field.
conMirrorBytesRemain The number of mirror bytes remaining to be transmitted
conMirrorPercent The percentage of the mirror that has been completed. This field is determined if the replication set size was calculated.
conTaskCmdsSubmitted The number of task commands that have been submitted on the source
conTaskCmdsQueued The number of task commands that have been queued on the source
conTasksSucceeded The number of task commands that have succeeded on the source
conTasksFailed The number of task commands that have failed on the source
conTasksIgnored The number of task commands that have been ignored on the source

Performance Monitor

Performance Monitor is the Windows graphical tool for measuring performance. It provides charting, alerting, and reporting capabilities that reflect both current activity and ongoing logging. Double-Take Availabilitystatistics are available through the Performance Monitor.

Monitoring Performance Monitor statistics

  1. To access the Performance Monitor, select Start, Programs, Administrative Tools, Performance.
  2. Specify the data to monitor by right-clicking and selecting Add or using the Add button on the toolbar.
  3. Choose one of the following Double-Take Availability Performance Objects.
  1. Select the statistics you want to monitor, and click Add.

For additional information and details on the Performance Monitor, see your Windows reference guide.

Performance Monitor statistics

The following table identifies the Double-Take Availability Performance Monitor statistics.

Note: If you have multiple IP addresses connected to one target server, you will see multiple Target statistic sections for each IP address.
Object Statistic Description
Connection Bandwidth Limit The amount of bandwidth that may be used to transfer data
Bytes in disk queue The number of bytes in the source disk queue
Bytes in replication queue The number of replication bytes in the source queue
Bytes in mirror queue The number of mirror bytes in the source queue
Bytes received The number of bytes received by the target since the last Performance Monitor refresh
Bytes transferred The number of bytes transmitted from the source
Compressed bytes transferred The number of compressed bytes transmitted from the source
Operations in acknowledgement queue The number of operations waiting in the source acknowledgement queue
Operations in command queue The number of operations waiting in the source command queue
Operations in mirror queue The number of mirror operations in the source queue
Operations in replication queue The number of replication operations in the source queue
Operations received The number of operations received by the target since the last Performance Monitor refresh
Operations resent The number of operations re-sent since the last time the Double-Take service was restarted on the source
Operations transmitted The number of operations transmitted from the source
Task commands queued The number of task commands queued on the source
Task commands submitted The number of task commands submitted on the source
Tasks failed The number of task commands that have failed to execute on the source
Tasks ignored The number of task commands that have been ignored on the source
Tasks succeeded The number of task commands that have succeeded on the source
Kernel Activation code failures The number of activation code failures when loading the source or target, since the last time the Double-Take service was restarted on the source
Double-Take queue memory usage The amount of system memory in use by the Double-Take Availability queue
Driver Queue Percent The amount of throttling calculated as a percentage of the stop replicating limit
Failed mirror operations The number of mirror operations on the source that failed due to an error reading the file from the disk
Failed replication operations The number of replication operations on the source that failed due to an error reading the file from the disk
Mirror Kbytes generated The number of mirror kilobytes transmitted from the source
Mirror operations generated The number of mirror operations transmitted from the source
Open Target Handles The number of handles currently open on the target.
Replication Kbytes generated The number of replication kilobytes generated on the source by the file system driver
Replication operations generated The number of replication operations generated on the source by the file system driver
Security Failed logins Number of failed login attempts since the last time the Double-Take service was restarted
Successful logins Number of successful login attempts since the last time the Double-Take service was restarted
Source Auto disconnects The number of automatic disconnects since the last time the Double-Take service was restarted on the source
Auto reconnects The number of automatic reconnects since the last time the Double-Take service was restarted on the source
Target Bytes in Disk Queue The number of bytes in the target disk queue
Bytes in Queue The number of bytes in the system memory and disk queues
Mirror operations received The number of mirror operations received on the target
Operations received The number of operations received on the target
Ops Dropped The number of operations dropped on the target since the last time the Double-Take service was restarted on the target
Ops Remaining The number of operations on the target remaining to be applied
Orphan Bytes The number of orphan bytes removed from the target
Orphan Directories The number of orphan directories removed from the target
Orphan Files The number of orphan files removed from the target
Retries The number of retries performed on the target since the last time the Double-Takeservice was restarted on the target
Tasks failed The number of task commands that have failed on the target.
Tasks ignored The number of task commands that have been ignored on the target
Tasks succeeded The number of task commands that have succeeded on the target

SNMP

SNMP, Simple Network Management Protocol, is the Internet's standard for remote monitoring and management of hosts, routers and other nodes and devices on a network. Double-Take Availability provides an SNMP sub-agent that can be managed from an SNMP Management Console.

Double-Take Availability installs two components to work with SNMP.

Configuring SNMP on your server

SNMP must be installed on a server before Double-Take Availability in order for the Double-Take AvailabilitySNMP components to be added during the Double-Take Availabilityinstallation. If SNMP is installed on a server after Double-Take Availability is installed, run a repair install to install the SNMP components.

The Double-Take Availability .mib file will need to be loaded into your SNMP Management Console. Depending on the type of console you are using, this process might include compiling the .mib file. Reference your SNMP Management Console documentation for additional information.

SNMP traps

The following table lists the Double-Take Availability SNMP traps.

Object Type Trap Description
Kernel dttrapKernelStarted Double-Take Availability has started
dttrapKernelStopped Double-Take Availability has stopped
License dttrapLicenseViolationStartingSource The source cannot be started due to a license violation
dttrapLicenseViolationOnNetwork A Double-Take Availability serial number conflict was identified on the network
Source dttrapSourceStarted Double-Take Availability source component has started
dttrapSourceStopped Double-Take Availability source component has stopped
Target dttrapTargetStarted Double-Take Availability target component has started
dttrapTargetStopped Double-Take Availability target component has stopped
Connection dttrapConnectionRequested The source has requested a connection to the target
dttrapConnectionRequestReceived The target has received a connection request from the source
dttrapConnectionSucceeded The source to target connection has been established
dttrapConnectionPause The source to target connection has paused
dttrapConnectionResume The source to target connection has resumed
dttrapConnectionFailed The source to target connection was not successful
dttrapConnectionLost The source to target connection has been disconnected
dttrapMemoryLimitReached The Double-Take Availability memory pool limit has been reached
dttrapMemoryLimitRemedied The memory pool usage is below the maximum limit specified
dttrapAutoReconnect Auto-reconnect needs to make a new connection
dttrapScheduledConnectStart A scheduled connection has been established
dttrapScheduledConnectEnd A scheduled end connection has been reached and the connection has been disconnected
dttrapAutoDisconnectWriteQueue Auto-disconnect has forced the queue to be written to disk
dttrapAutoDisconnectPauseTransmission Auto-disconnect requested that the source pause any operation (create, modify, or delete) sending
dttrapAutoDisconnectEndConnection Auto-disconnect has intentionally dropped the connection
dttrapAutoDisconnectShutdown Auto-disconnect forced Double-Take Availability to shutdown
Replication dttrapReplicationStart Replication has started
dttrapReplicationStop Replication has stopped
Mirroring dttrapMirrorStart Mirroring has started
dttrapMirrorStop Mirroring has stopped
dttrapMirrorPause Mirroring has paused
dttrapMirrorResume Mirroring has resumed
dttrapMirrorEnd Mirroring has ended
Verification dttrapVerificationStart Verification has started
dttrapVerificationEnd Verification has ended
dttrapVerificationFailure Verification has failed
Restoration dttrapRestoreStarted Restoration has started
dttrapRestoreComplete Restoration is complete
Replication Sets dttrapRepSetModified Replication has been modified
Failover dttrapFailoverConditionMet Manual intervention is required because failover has detected a failed source machine
dttrapFailoverInProgress Failover is occurring
dttrapTargetFull The target is full

SNMP statistics

The following table lists the Double-Take Availability SNMP statistics.

Object Type Statistic Description
General dtUpTime Time in seconds since Double-Take Availability was last started
dtCurrentMemoryUsage Amount of memory allocated from the Double-Take Availability memory pool
dtMirOpsGenerated The number of mirror operations (create, modify, or delete) that have been transmitted by the mirroring process
dtMirBytesGenerated The number of bytes that have been transmitted by the mirroring process
dtRepOpsGenerated The number of operations (create, modify, or delete) that have been transmitted by the replication process
dtRepBytesGenerated The number of bytes that have been transmitted by the replication process
dtFailedMirrorCount The number of operations that failed to mirror because they could not be read on the source
dtFailedRepCount The number of operations that failed to be replicated because they could not be read on the source
dtActFailCount The number of activation code errors
dtAutoDisCount The number of auto-disconnects
dtAutoReCount The number of auto-reconnects
dtDriverQueuePercent The amount of throttling calculated as a percentage of the stop replicating limit
Source dtSourceState
  • 0—Source is not running
  • 1—Source is running without the replication driver
  • 2—Source is running with the replication driver.
Target dtTargetState
  • 0—Target is not running
  • 1—Target is running
dtRetryCount The number of file operations that have been retried
dtOpsDroppedCount The number of file operations that have failed and will not be retried
Security dtLoginCount The number of successful logins
dtFailedLoginCount The number of unsuccessful logins
Connection dtConnectionCount The number of active connections between machines
dtconIpAddress The IP address of the connected machine. If at the source, then the IP address of the target. If at the target, then the IP address of the source.
dtconConnectTime The duration of time since the connection was first established
dtconState

The state of the active connection

  • 0—None. This indicates a connection has not been established. Statistics are still available for the source and target machines.
  • 1—Active. This indicates that the connection is functioning normally and has no scheduling restrictions imposed on it at this time. (There may be restrictions, but it is currently in a state that allows it to transmit.)
  • 2—Paused. This indicates a connection that has been paused.
  • 4—Scheduled. This indicates a connection that is not currently transmitting due to scheduling restrictions (bandwidth limitations, time frame limitations, and so on).
  • 8—Error. This indicates a connection that is not transmitting because something has gone wrong (for example, lost connection).

Only the Scheduled and Error states can coexist. All other states are mutually exclusive. SNMP will display a dtconState of 12 when the connection is in both a scheduled and an error state because this is the sum of the two values (4 + 8).

dtconOpsInCmdQueue The number of operations (create, modify, or delete) in the retransmit queue on the source
dtconOpsInAckQueue The number of operations (create, modify, or delete) waiting for verification acknowledgements from the target
dtconOpsInRepQueue The number of replication operations (create, modify, or delete) in the queue
dtconOpsInMirQueue The number of mirror operations (create, modify, or delete) in the queue
dtconBytesInRepQueue The number of bytes in the replication queue
dtconBytesInMirQueue The number of bytes in the mirror queue
dtconOpsTx The total number of operations (create, modify, or delete) transmitted to the target
dtconBytesTx The total number of bytes transmitted to the target
dtconBytesCompressedTx The total number of compressed bytes transmitted to the target
dtconOpsRx The total number of operations (create, modify, or delete) received from the target
dtconBytesRx The total number of bytes received from the target
dtconResentOpCount The number of operations that were resent because of acknowledgement errors

Error codes

The following table contains error codes that you may see in the various user interfaces or in log files.

Error Code Description
-1 Unknown error code (generated when a command failed but the failure is not linked to a pre-defined error code)
-101 Invalid parameter was supplied
-102 Command is not a valid or the syntax is incorrect
-103 Double-Take Availability source module is not loaded
-104 No Double-Take Availability source identified
-105 Double-Take Availability target module is not loaded
-106 Connection already established
-107 Connection does not exist
-108 Mirror currently active
-109 Server does not exist or could not be located
-110 Server is not responding
-111 Double-Take Availability is running
-112 Unknown connection error
-113 Mirror already active
-114 Date is invalid - valid format is mm/dd/yy
-115 Time is invalid - valid format is hh:mm
-116 Invalid option supplied
-117 Mirror is not paused
-118 Connection is not paused
-119 Connection does not exist
-120 Connection already connected
-121 Mirror is not running
-122 Replication set exists
-123 Replication set does not exist
-124 No replication set has been selected
-125 Connection is replicating
-126 Connection is not replicating
-127 Replication set is enabled
-128 Schedule is not defined
-129 Replication set is changed
-130 Replication set is in use
-131 No Double-Take Availability target identified
-132 Memory is low
-133 Memory is sufficient
-134 Replication is pending
-135 Invalid option supplied
-136 Replication set rule does not exist
-137 Mirror queue is full
-138 Insufficient security access
-139 Schedule command is invalid
-140 Source path is invalid
-141 Replication set is not changed
-142 Insufficient source security access
-143 Invalid statistics file
-144 Replication set not saved
-145 Connection failed
-146 Cleaner option is not enabled
-147 Target mirror capacity high threshold is met
-148 Target mirror capacity low threshold is met
-149 New option applied
-150 Target is restarted
-151 Replication is out of memory
-152 Write access is blocked on the volume
-153 This error code could be one of two errors. 1) Compression level is not supported, or server does not support compression 2) Transmission is paused
-154 Transmission is active
-155 Target does not support the command
-156 Command conversion to accommodate a different Double-Take Availability version has failed
-157 Incompatible source and target Double-Take Availability versions
-158 Incompatible source and target operating system versions
-159 NAS server to non-NAS server is not a supported configuration
-160 Target module is not loaded
-161 Operation or command is not supported
-162 Target is paused
-163 Target is pending
-164 Target is active
-165 Target is retrying operations
-166 Target is no longer retrying operations
-167 Restore required state is unknown
-168 Not a valid failover source
-169 Failover login failed
-170 Feature is not supported
-171 Command is not supported
-172 Target queue log file error
-173 Target disk is full
-174 Target disk has sufficient disk space
-175 Error reading from or writing to the queue log file
-176 Memory-based queue is in use
-177 Disk-based queue is in use
-178 Restore is required
-179 ID the driver supplied to the service is invalid
-180 Child path is blocked
-181 Parent path is blocked
-182 Target path blocking is disabled
-183 Connection ID specified is invalid
-184 No command objects are in the queue
-185 Target is discarding operations from the target queue
-186 Target is not discarding operations from the target queue
-187 Schedule is paused
-188 Schedule is resumed
-189 Target state has changed
-190 Target name has changed
-201 Monitor name exists
-202 Monitor name does not exist
-203 Monitor configuration exists
-204 Monitor configuration does not exist
-205 Monitor configuration is in use
-206 Monitor configuration is not in use
-207 Source is online
-208 Source is offline
-209 Server is not failed over
-210 Server is failed over
-211 Server is not being monitored
-212 Failback is in progress
-213 IP address placeholders on the target are unavailable
-214 Target NIC was not found
-215 Source module is not loaded
-216 Failed to set the source state
-217 Unable to ping source
-218 Invalid argument
-219 Recovery is busy
-220 Invalid command
-221 Recovery is started
-222 Script failed to start
-223 Script timeout met
-224 No replication timeout met - connection is bad
-225 Invalid path
-226 Kernel module is not loaded
-2201 Error communicating with e-mail server
-2202 Error connecting to e-mail server
-2203 E-mail notification is disabled
-2204 E-mail notification is enabled
-2205 E-mail notification requires Internet Explorer version 5.0 and WMI
-2206 E-mail notification requires Internet Explorer version 5.0 (E-mail notification no longer requires Internet Explorer 5.0 or later. If you receive this error, contact technical support.)
-2207 Error sending e-mail
-2208 Error sending test e-mail
-2209 WMI error connecting to e-mail server
-2210 E-mail notification requires WMI
-2211 Event Viewer settings for e-mail notification are invalid
-2212 E-mail notification setting is invalid
-2213 E-mail notification address exists
-2214 E-mail notification alert ID is invalid
-2215 E-mail notification format is invalid
-2216 E-mail notification address does not exist
-2217 E-mail notification address notification list is empty
-2218 E-mail warning is not set
-2219 E-mail test warning is not set
2200 E-mail notification is functioning properly
-2301 Bandwidth limiting time exists
-2302 Bandwidth limiting name exists
-2303 Bandwidth limit not found
-2304 Bandwidth limit day is invalid
-2305 Bandwidth limit label is invalid
-2401 Snapshot module is not loaded
-2402 Error reading the snapshot .dll
-2403 Snapshot not found
-2404 No snapshot connections found
-2501 Full-server functionality is disabled
-2502 No full-server interface available

Failover

Your failover process will depend on the type of workload you are protecting.

Failing over data workloads, application workloads configured for identity failover, and cluster workloads

The failover process, including script processing, can be tested at any time. To force unavailability, disconnect the network cable from a monitored machine, wait for the Time to Fail counter to decrease to zero and failover begins. To avoid the countdown delay, highlight the monitored machine name in the Failover Control Center window and select Failover.

If Manual Intervention is enabled, the Failover Control Center will prompt you when a failure occurs. Click Cancel to abort the failover process. (If necessary, you can initiate failover later from the Failover Control Center.) Click OK to proceed with failover.

Note:

If the Failover Control Center is not running at the time the failure occurs, the manual intervention dialog box will appear the next time the Failover Control Center is started.

When a failure occurs, an alert is forwarded to the Windows event log. You can then start the Failover Control Center and respond to the manual intervention prompt.

If SNMP is installed and configured, an SNMP trap is also generated. When using a third-party SNMP manager, an e-mail or page can be generated to notify you of the failure.

You will be prompted to specify what data you want to use on the target.

Select an option based on the table below. You may want to check the amount of data in queue on the target by reviewing the Statistics or Performance Monitor.

Target Data State at Failover Description Advantages Disadvantages
Apply Data in Target Queues Then Failover All of the data in the target queue will be applied before failover begins. All of the data that the target has received will be applied before failover begins. Depending on the amount of data in queue, the amount of time to apply all of the data could be lengthy.
Discard Data in Target Queues and Failover Immediately All of the data in the target queue will be discarded and failover will begin immediately. Failover will occur immediately. Any data in the target queue will be lost.
Revert to Last Good Snapshot if Target Data is Bad If the target data is in a bad Double-Take Availability state, Double-Take Availability will automatically revert to the last good Double-Take Availability snapshot before failover begins. If the target data is in a good state, Double-Take Availability will not revert the target data. Instead, Double-Take Availability will apply the data in the target queue and then failover. Good data on the target is guaranteed to be used. If the target data state is bad, you will lose any data between the last good snapshot and the failure.

After failover is complete, clients will be rerouted to the target, which is standing in for the source.

Note:

If you are protecting Exchange, keep in mind the following caveats.

  • Users using Outlook or Outlook Web Access to receive e-mail can connect after the changes have propagated through your environment. Users that had Outlook open during failover will need to restart the Outlook client (excluding Outlook Web Access clients on a LAN). Additionally, those users using Outlook Web Access or Outlook 2007 may see a security alert because the security certificate has the source server name but Exchange is now on the target. Click Allow or OK to dismiss the alert.
  • You will not be able to log in to the domain from the source Exchange server after failover because the target has assumed the source server's host Service Principal Name so that Outlook Web Access can use the source name. If you need to log in to the domain and Outlook Web Access is not needed, contact technical support for a workaround.
  • If you SMTP gateway is configured to send e-mail to a specific IP address that address is not failed over to the target, you will need to update the IP address after failover.
  • Mail stores or storage groups created after a failover will not be failed back.

If you are protecting SQL, keep in mind the following caveats.

  • After failover, linked databases in the SQL instance will be unavailable until the service master key is updated. You will need to run the command "alter service master key force regenerate" against the SQL target server to reset the service master key and then remove and re-add the linked servers into the target SQL instance.
  • After failover with a snapshot of a SQL database-only server, the SQL services on the target server are stopped and the databases are not mounted. You will need to manually start the MSSQLServer service for each instance on the target server and then manually attach the databases.
  • After failing over SQL 2008, Rich Internet Applications created using ADO.net 2 may not connect.
  • After failing over SQL 2008, you may not be able to take the SQL database offline. If this occurs, stop and restart the SQL Server Management Studio application, and then you can take the database offline.
  • After failing over in a SQL workgroup, you will not be able to connect to the source server instance of SQL. You can work around this issue by creating an alias on the target with the source server’s name.

If you are protecting BlackBerry, there is a potential to lose BlackBerry instant messages and instant message contacts when an Exchange mailbox is moved, depending on the type of BlackBerry hand-held device. You should back up instant messages through the BlackBerry desktop software or have the BlackBerry Enterprise server configured to audit all instant messages through a policy.

Full-server workload failover

Full-server failover can be initiated through the Full-Server Failover Manager client or by using a command line interface.

Failing over using the Full-Server Failover Manager

When a failover condition is met, you will want to start failover. Additionally, you can start it without a failover condition, as long as protection is enabled. For example, you may want to force failover when upgrading to a better source server.

  1. To start failover, click Failover.
  2. If Double-Take Availability determines there is a possibility that the data on the target is incomplete, you will be warned before failover begins. If you proceed with failover, the state of the source will be unknown until failover is complete. The best case scenario would be a missing data file, while the worst case scenario would be missing system state data that causes the server to be unusable or unbootable. Select your failover options.

  1. Click OK to initiate failover. Monitor the failover percentage as shown in the Protection Status. At the end of failover, the target will be rebooted automatically. After the reboot, the target will no longer exist, since it will become the source.
  2. Note:

    If you are failing over a cluster node, it is possible that volumes may lose their drive letter assignments. If a clustered application fails to start after failover and the disk signature has changed, check the drive letter assignments under the Disk Management utility and re-create drive letter assignments as needed.

    Because the Windows product activation is dependent on hardware, you may need to reactivate your Windows registration after failover. In most cases when you are using Windows 2003, you can follow the on-screen prompts to complete the reactivation. However, when you are using Windows 2008, the reactivation depends on your licensing type. If a Windows 2008 target comes online after failover with an activation failure, use the steps appropriate for your license type.

    • Retail licensing—Retail licensing allows the activation of a single operating system installation.
      1. Open the System applet in Windows Control Panel.
      2. Under Windows activation at the bottom of the page, click Change product key.
      3. Enter your retail license key. You may need access to the Internet or to call Microsoft to complete the activation.
    • MAK volume licensing—Multiple Activation Key (MAK) licensing allows the activation of multiple operating system installations using the same activation key.
      1. View or download the Microsoft Volume Activation Deployment Guide from the Microsoft web site.
      2. Using an administrative user account, open a command prompt and follow the instructions from the deployment guide to activate MAK clients. Multiple reboots may be necessary before you can access a command prompt. You may need access to the Internet or to call Microsoft to complete the activation.
    • KMS volume licensing—Key Management Service (KMS) licensing allows IT professionals to complete activations on their local network without contacting Microsoft.
      1. View or download the Microsoft Volume Activation Deployment Guide from the Microsoft web site.
      2. Using an administrative user account, open a command prompt and follow the instructions from the deployment guide to convert a MAK activation client to a KMS client. Multiple reboots may be necessary before you can access a command prompt.

Failing over from the command line

You can configure connections and initiate failover without using the Full-Server Failover Manager user interface. The same executable that launches the user interface can be used from a command prompt with options. The command line execution opens the user interface, passes through specified parameters, and initiates specified processes. You may want to use this alternate execution if you have different configuration files that you want to execute or if you have multiple connections. The Full-Server Failover Manager command can be initiated one at a time from a command prompt, or it can be scripted. The Full-Server Failover Manager executable is located in the installation directory.

Command FFMANAGER
Description Initiates the Full-Server Failover Manager user interface, passes through specified parameters, and initiates specified processes
Syntax FFMANAGER /SOURCE source_name /TARGET target_name/USERNAME username /PASSWORD password /VALIDATE /FIXALL /PROTECT /FAILOVER /LOGLEVEL number /CONFIG filename
Options
  • SOURCE source_name—Name of the source
  • TARGET target_name—Name of the target
  • USERNAME username—Name of a user who is a member of the Double-Take Admin security group
  • PASSWORD password—Password associated with the specified user
  • VALIDATE—Validates the configuration of the two servers to make sure they are compatible
  • FIXALL—Corrects those errors that Full-Server Failover can automatically correct
  • PROTECT—Initiates the connection between the source and target
  • FAILOVER—Initiates failover from the source to the target
  • LOGLEVEL number—Specifies the level of detailed logged based on the following numbers.
  • 2—Informational messages are logged
  • 3—Informational and error messages are logged
  • 4—Informational, error, and exception messages are logged
  • 5—Informational, error, exception, and debug messages are logged. This is the default setting.
  • 6—Informational, error, exception, debug, and internal coding messages are logged
  • CONFIG filename—Name of the file that contains the failover options. If no file is specified, the FFMDefaults.xml file will be used.
Examples
  • ffmanager /source alpha /target beta /username administrator /password password /validate /fixall /protect
  • ffmanager /source alpha /target beta /username administrator /password password /validate /failover
Notes
  • If you do not specify any options with this command, the Full-Server Failover Manager user interface will open. The fields will be blank and no processing will occur.
  • If you are failing over a cluster node, it is possible that volumes may lose their drive letter assignments. If a clustered application fails to start after failover and the disk signature has changed, check the drive letter assignments under the Disk Management utility and re-create drive letter assignments as needed.
  • Because the Windows product activation is dependent on hardware, you may need to reactivate your Windows registration after failover. In most cases when you are using Windows 2003, you can follow the on-screen prompts to complete the reactivation. However, when you are using Windows 2008, the reactivation depends on your licensing type. If a Windows 2008 target comes online after failover with an activation failure, use the steps appropriate for your license type.
    • Retail licensing—Retail licensing allows the activation of a single operating system installation.
      1. Open the System applet in Windows Control Panel.
      2. Under Windows activation at the bottom of the page, click Change product key.
      3. Enter your retail license key. You may need access to the Internet or to call Microsoft to complete the activation.
    • MAK volume licensing—Multiple Activation Key (MAK) licensing allows the activation of multiple operating system installations using the same activation key.
      1. View or download the Microsoft Volume Activation Deployment Guide from the Microsoft web site.
      2. Using an administrative user account, open a command prompt and follow the instructions from the deployment guide to activate MAK clients. Multiple reboots may be necessary before you can access a command prompt. You may need access to the Internet or to call Microsoft to complete the activation.
    • KMS volume licensing—Key Management Service (KMS) licensing allows IT professionals to complete activations on their local network without contacting Microsoft.
      1. View or download the Microsoft Volume Activation Deployment Guide from the Microsoft web site.
      2. Using an administrative user account, open a command prompt and follow the instructions from the deployment guide to convert a MAK activation client to a KMS client. Multiple reboots may be necessary before you can access a command prompt.

Failing over application workloads configured for DNS failover

When a failover condition has been met, failover will be triggered automatically if you configured automatic failover when establishing protection. If you configured manual intervention before failover, you can use the Application Manager to initiate failover for application workloads configured for DNS failover.

Note:

In a clustered environment where the source suddenly becomes unavailable (for example, it crashes) and the Application Manager is open, it may appear to be unresponsive for up to 30 minutes before the failover process continues. The Application Manager is waiting on a Microsoft cluster file to respond. To reduce the amount of time before failover can continue, close and re-open the Application Manager.

If you are protecting a file server, failover is only available if the source is offline, in order to prevent name conflicts on the network.

  1. If you are protecting a standalone BlackBerry server with Exchange or SQL, shutdown the BlackBerry server.
  2. In the Application Manager, make sure your source target pair is selected and then on the Monitor tab, click Failover.

  3. Specify if you want to perform an immediate or graceful failover. An immediate failover begins immediately without waiting for the data queues on the source and target to empty. A graceful failover waits until the queues are emptied before continuing. If you select the graceful failover, specify how often you want the failover prompt to continue asking for failover while there is still data in the queues.
  4. Note:

    The graceful failover option is not available if you are protecting a SharePoint server of file server.

    If you are protecting an Exchange virtual server in a cluster environment, you should use the graceful failover option so that the source cluster resources are taken offline gracefully.

  5. If you have taken snapshots of your target data, specify the data you want to use for failover.
  6. Type Description
    Scheduled This snapshot was taken as part of a periodic snapshot.
    Deferred This snapshot was taken as part of a periodic snapshot, although it did not occur at the specified interval because the connection between the source and target was not in a good state.
    User Request This snapshot was taken manually by a user.
  7. Click Initiate Failover to being the failover process.
  8. If you shutdown your BlackBerry server, bring it back up when failover is complete and perform the following steps.
    1. Open a command prompt on the BlackBerry server to the \Program Files\Research In Motion\BlackBerry Enterprise Server\Utility directory.
    2. Run the following command.

      handheldcleanup –m

    3. Run the command, specifying the name of the BlackBerry server when prompted.

      handheldcleanup –u

    4. If you are using BlackBerry Enterprise Server 3.5 through 4.1, see the BlackBerry article How to move the BlackBerry Enterprise Server service account mailbox.

    Note:

    If you are protecting Exchange, keep in mind the following caveats.

    • Users using Outlook or Outlook Web Access to receive e-mail can connect after the changes have propagated through your environment. Users that had Outlook open during failover will need to restart the Outlook client (excluding Outlook Web Access clients on a LAN). Additionally, those users using Outlook Web Access or Outlook 2007 may see a security alert because the security certificate has the source server name but Exchange is now on the target. Click Allow or OK to dismiss the alert.
    • You will not be able to log in to the domain from the source Exchange server after failover because the target has assumed the source server's host Service Principal Name so that Outlook Web Access can use the source name. If you need to log in to the domain and Outlook Web Access is not needed, contact technical support for a workaround.
    • If you SMTP gateway is configured to send e-mail to a specific IP address that address is not failed over to the target, you will need to update the IP address after failover.
    • Mail stores or storage groups created after a failover will not be failed back.

    If you are protecting SQL, keep in mind the following caveats.

    • After failover, linked databases in the SQL instance will be unavailable until the service master key is updated. You will need to run the command "alter service master key force regenerate" against the SQL target server to reset the service master key and then remove and re-add the linked servers into the target SQL instance.
    • After failover with a snapshot of a SQL database-only server, the SQL services on the target server are stopped and the databases are not mounted. You will need to manually start the MSSQLServer service for each instance on the target server and then manually attach the databases.
    • After failing over SQL 2008, Rich Internet Applications created using ADO.net 2 may not connect.
    • After failing over SQL 2008, you may not be able to take the SQL database offline. If this occurs, stop and restart the SQL Server Management Studio application, and then you can take the database offline.
    • After failing over in a SQL workgroup, you will not be able to connect to the source server instance of SQL. You can work around this issue by creating an alias on the target with the source server’s name.

    If you are protecting BlackBerry, there is a potential to lose BlackBerry instant messages and instant message contacts when an Exchange mailbox is moved, depending on the type of BlackBerry hand-held device. You should back up instant messages through the BlackBerry desktop software or have the BlackBerry Enterprise server configured to audit all instant messages through a policy.

Virtual workload failover

When a failover condition has been met, failover will be triggered automatically if you configured automatic failover when establishing protection. If you configured manual intervention before failover, you can failover your protection from the console you used to establish protection. If you are protecting host-level virtual disk files (the .vmdk files) from an ESX source to an ESX target, you will need to use the Double-Take Availability for VMware Infrastructure console to initiate failover. For all other virtual workloads, use the Double-Take Console to initiate failover.

Failing over virtual workloads in the Double-Take Console

  1. On the Monitor Connections page, select the connection that you want to failover.
  2. In the lower pane, click Failover in the toolbar.
  3. Select the type of failover to perform.
  4. Click Failover to begin failover.
  5. Note:

    Once failover has occurred, if you add CPUs to the replica of the source on the target, you may have to reboot the replica before the operating system will recognize the additional CPUs.

  6. After failover is complete, you can undo it by clicking Undo Failover in the toolbar. The replica virtual machine on the target will be shutdown, the source virtual machine will be restarted (in the case of live failover), and protection will be restarted performing a file differences remirror. All changes made on the replica virtual machine on the target will be lost. If you do not want to lose changes made replica virtual machine on the target, perform a restore and failback.

Failing over virtual workloads in the Double-Take Availability for VMware Infrastructure console

  1. Make sure your protection job is in an active (non-stopped) state.
  2. On the Monitor protection page, select the connection that you want to failover and click Failover in the toolbar.
  3. Select the type of failover to perform.
  4. Select the failover timing.
  5. Click Failover to begin failover.
  6. After failover is complete, you can undo it by clicking Undo Failover in the toolbar. The replica virtual machine on the target will be shutdown, the source virtual machine will be restarted (in the case of live failover), and protection will be restarted performing a file differences remirror. All changes made on the replica virtual machine on the target will be lost.

Failback and restore

Your failover and restoration process will depend on the type of workload you are protecting.

Data workload failback and restoration

Failover occurred because the target was monitoring the source for a failure, and when a failure occurred, the target stood in for the source. User and application requests that were directed to the failed source are routed to the target.

While the users are accessing their data on the target, you can repair the issue(s) on the source. Before users can access the source again, you will need to restore the data from the target back to the source and perform failback. Failback is the process where the target releases the source identity it assumed during failover. Once failback is complete, user and application requests are no longer routed to the target, but back to the source.

Ideally, you want to restore your data from the target back to the source before you failback. This allows users who are currently accessing their data on the target because of failover to continue accessing their data. Restoration before failback reduces user downtime. The procedure to restore and then failback varies widely with server and network configuration. Another method, which may be easier in some environments, allows you to failback first and then restore the data from the target to the source. A possible disadvantage to this process is that users may experience longer downtime, depending on the amount of data to be restored, because they will be unable to access their data during both the restoration and the failback.

Restoring then failing back

Restoring before failing back allows your users to continue accessing their data on the failed over target, which is standing in for the source, while you perform the restoration process. The key to this process is to keep the users off of the source, but allow the source and target to communicate to perform the restoration.

  1. Locate the file connect.sts on the source where you installed Double-Take Availability and rename it to connect.sts.old. This will keep the original connection from reconnecting when you bring the source online.
  2. Resolve the problem(s) on the source that caused it to fail. Make sure in resolving the problems, that you do not bring the source on the network at this time because the target currently has the source’s identity because of failover.
  3. Disable all of the NICs on the source.
  4. Change one of the NICs on the source to a unique IP address that the target can access.
  5. Configure that IP address so that it does not automatically register with DNS. This option is on the Advanced TCP/IP Settings dialog box on the DNS tab.
  6. Do not enable the modified NIC yet. If you do, you will receive a network name conflict, because the target has the source’s identity because of failover. There are many variations for dealing with a name conflict, here are a few examples.
  1. Stop any applications that may be running on your source. The files must be closed on the source so that updated files from the target will overwrite the files on the source.
  2. At this point, confirm you have the following configuration.
  1. From your target, confirm the Replication Console is communicating with the source using the new IP address.
  1. From the Replication Console on the target, right-click the source and select Remove.
  2. Depending on your configuration, the source may be automatically inserted back into the Replication Console. If it is not, select Insert, Server. Specify the source server and click OK.
  1. Begin your restoration process.
  1. From the Replication Console, select Tools, Restoration Manager.

  1. Identify the Original Source machine. This is your source machine where the data originally resided.
  2. Select the Restore From machine. This is the target machine where the copy of the data is stored.
  3. Note: If your target is a cluster, you can specify just one node in the cluster and restore only from that node. If you need to have the cluster functionality (Microsoft failover from node to node) available during the restoration process, you will have to create a resource, like you did for your original connection, for the restoration process. See Protecting a standard cluster. Keep in mind when restoring, your target will function as your source, sending data to the target, which will be your original or new source.
  4. Replication Set contains the replication set information stored on the target machine (the machine in Restore From). If no replication sets are available, the list will be blank. Select the replication set that corresponds to the data that you need to restore.
  5. Select the Restore To machine. This is your temporary source that has the unique IP address.
  6. The Restore To and Restore From paths will automatically be populated when the replication set is selected. The restore to path is the directory that is the common parent directory for all of the directories in the replication set. If the replication set crosses volumes, then there will be a separate path for each volume. The restore from path is the path on the target server where the replicated files are located.
  7. Note:

    Restoring across a NAT router requires the ports to be the same as the original connection. If the ports have been modified (manually or reinstalled), you must set the port numbers to the same values as the last valid source/target connection.

  1. Select the Use Backup Replication Set check box to use the target’s copy of the replication set database for the restoration. If this check box is not marked, you will be accessing the replication set information from the source.
  2. Select the Restore Replication Set check box to restore the target’s copy of the replication set database to the source during the restoration process.
  3. Select the restoration conditionals that you want to use.
  1. If you want to configure orphan files, click the Orphans tab. The same orphan options are available for a restoration connection as a standard connection.
  2. If your original source was using Replicate NT Security by Name, you must enable that option on the target before you start the restoration. The option is available on the target’s Server Properties on the Source tab.
  3. Click Restore to begin the restoration. You can identify a restoration connection because it is enclosed in parenthesis ( ) and it has _Restore appended to the end of the replication set name. The initial restoration is complete when the Mirror Status is Idle. After the Mirror Status is Idle, the connection will continue replicating any on-going data changes from the target to the source.
  1. After the Mirror Status is Idle, schedule a time for failback. User downtime will begin once failback is started, so select a time that will have minimal disruption on your users.
  2. When you are ready, begin the failback process.
  1. Open the Failover Control Center.
  2. Select the target that is currently standing in for the failed source.
  3. Select the failed source and click Failback. The user downtime starts now. If you have a pre-failback script configured, it will be started.
  4. Note: If the target is a cluster, you will need to determine the active node and failback from that node. Then you will need to failback from each of the other nodes to synchronize all of the nodes of the cluster.
  5. When failback is complete, the post-failback script, if configured, will be started. When the script is complete, you will be prompted to determine if you want to continue monitoring the source, do not select either option. Leave the prompt dialog box open as is.
  1. Back in the Replication Console, watch the restoration connection until activity has ended and replication is in a Ready state. This will happen as the final data in queue, if any, is applied on the source. The replication Ready state indicates replication is waiting for new incoming data changes. There will not be any additional data changes because failback has released the source identity, so users are no longer accessing their data.
  2. Once replication is in a Ready state, disconnect the restoration connection from the target. This is the connection enclosed in parenthesis () and it has _Restore appended to the end of the replication set name.
  3. Note:

    If your target is a cluster, take the Double-Take Source Connection resource offline to disconnect the connection.

    During the restoration, only the data is restored back to the source. Shares are not created on the source during the restoration. Shares that were created on the target during failover will need to be created manually on the source.

  1. On the source, change the IP address that you modified earlier to the unique address back to its original address. You can also enable any other NICs on the source.
  2. Also on the source, change the source name back to its original name and reboot, or restart the Workstation, Server, and any other services you were prompted to stop.
  3. Once the source is back online, users can reconnect to the source.
  4. Confirm the Replication Console is communicating with the source using the original IP address.
  1. Right-click the source and select Remove.
  2. Depending on your configuration, the source may be automatically inserted back into the Replication Console. If it is not, select Insert, Server. Specify the source server and click OK.
  1. At this time, you can go back to the dialog box in the Failover Control Center. Select Continue or Stop to indicate if you want to continue monitoring the source. After you have selected whether or not to continue monitoring the source, the source post-failback script, if configured, will be started.
  2. Note:

    The source must be online and Double-Take Availability must be running to ensure that the source post-failback script can be started. If the source has not completed its boot process, the command to start the script may be lost and the script will not be initiated.

  1. You can now reconnect your original replication set on the source to your target, to reestablish protection.

Failing back then restoring

Failback before restoration can be a simpler process, but it may require additional downtime. The amount of downtime will depend on the amount of data to be restored. Users must be kept off of the source and target during this entire process.

  1. Locate the file connect.sts on the source where you installed Double-Take Availability and rename it to connect.sts.old. This will keep the original connection from reconnecting when you bring the source online.
  2. Resolve the problem(s) on the source that caused it to fail. Make sure in resolving the problems, that you do not bring the source on the network at this time because the target currently has the source’s identity because of failover.
  3. Schedule a time for this process. Select a time that will have minimal disruption on your users.
  4. When you are ready, begin the failback process.
  1. Open the Failover Control Center and select the target that is currently standing in for the failed source.
  2. Select the failed source and click Failback. The user downtime starts now. If you have a pre-failback script configured, it will be started.
  3. Note:

    If the target is a cluster, you will need to determine the active node and failback from that node. Then you will need to failback from each of the other nodes to synchronize all of the nodes of the cluster.

  4. When failback is complete, the post-failback script, if configured, will be started. When the script is complete, you will be prompted to determine if you want to continue monitoring the source, do not select either option. Leave the prompt dialog box open as is.
  1. Bring your source onto the network at this time, but make sure that the users are not accessing it. The target must be able to access the source, but users cannot access the source because the data on the source is out-of-date.
  2. Once your source is on the network, select Continue or Stop in the Failover Control Center to indicate if you want to continue monitoring the source. After you have selected whether or not to continue monitoring the source machine, the source post-failback script, if configured, will be started.
  3. Note:

    The source must be online and Double-Take Availability must be running to ensure that the source post-failback script can be started. If the source has not completed its boot process, the command to start the script may be lost and the script will not be initiated.

  4. Stop any applications that may be running on your source. The files must be closed on the source so that updated files from the target will overwrite the files on the source.
  5. Now you can begin your restoration process.
  1. From the Replication Console on the target, select Tools, Restoration Manager.

  1. Identify the Original Source machine. This is your source machine where the data originally resided.
  2. Select the Restore From machine. This is the target machine where the copy of the data is stored.
  3. Note:

    If your target is a cluster, you can specify just one node in the cluster and restore only from that node. If you need to have the cluster functionality (Microsoft failover from node to node) available during the restoration process, you will have to create a resource, like you did for your original connection, for the restoration process. See Protecting a standard cluster. Keep in mind when restoring, your target will function as your source, sending data to the target, which will be your original or new source.

  1. Replication Set contains the replication set information stored on the target machine (the machine in Restore From). If no replication sets are available, the list will be blank. Select the replication set that corresponds to the data that you need to restore.
  2. Select the Restore To machine. This is your source where the updated data from the target will be sent.
  3. The Restore To and Restore From paths will automatically be populated when the replication set is selected. The restore to path is the directory that is the common parent directory for all of the directories in the replication set. If the replication set crosses volumes, then there will be a separate path for each volume. The restore from path is the path on the target server where the replicated files are located.
  4. Note:

    Restoring across a NAT router requires the ports to be the same as the original connection. If the ports have been modified (manually or reinstalled), you must set the port numbers to the same values as the last valid source/target connection.

  1. Select the Use Backup Replication Set check box to use the target’s copy of the replication set database for the restoration. If this check box is not marked, you will be accessing the replication set information from the source.
  2. Select the Restore Replication Set check box to restore the target’s copy of the replication set database to the source during the restoration process.
  3. Select the restoration conditionals that you want to use.
  1. If you want to configure orphan files, click the Orphans tab. The same orphan options are available for a restoration connection as a standard connection.
  2. If your original source was using Replicate NT Security by Name, you must enable that option on the target before you start the restoration. The option is available on the target’s Server Properties on the Source tab.
  3. Click Restore to begin the restoration. You can identify a restoration connection because it is enclosed in parenthesis ( ) and it has _Restore appended to the end of the replication set name.
  4. Note:

    If your target is a cluster, take the Double-Take Source Connection resource offline to disconnect the connection.

    During the restoration, only the data is restored back to the source. Shares are not created on the source during the restoration. Shares that were created on the target during failover will need to be created manually on the source.

  1. Because there are no users accessing the target data, the restoration process is complete when the Mirror Status is Idle. When the Mirror Status is Idle, disconnect the restoration connection from the target.
  2. Your original connection on the source, if it still exists in the Replication Console, will be in a Mirror Required state. Right-click the connection and select Mirror, Start. Select the type of mirror you wish to perform and click OK. When prompted to start replication, click Yes.
  3. Once you have restarted the mirror and replication, you can allow users to reconnect to the source.

Failing back and restoring a full-server workload

After your target has failed over and becomes your source, you can stay with that configuration long term. However, in some instances, it may be necessary or desired to go back to using the original hardware after you have failed over. Use the following process to failback to your original (or other) hardware.

  1. Because your new source is on the network, you must make sure your original source is unique on the network to avoid name and IP address conflicts. You have several options available for achieving this.
  1. Establish protection from your new source (the server that you failed over to) back to your original source using the same process as when you protected your original source. The mirror that completes from the new source back to the original source will act as a restoration process.
  2. When the protection is established and the mirror is complete, initiate failover. This process will act as a failback. Once the failover is complete, you will be back to your original source.

Application failback and restoration

When protecting application workloads, your failback and restoration process will depend on if you configured your application for identity or DNS failover.

Failback and restoration for applications configured for identity failover

For application workloads that were configured for identity failover, you need to stop the services on your source that correspond with your application before you begin the failback and restoration process. Use the table below as a guideline for the services to stop. After you have stopped the services on the source, use the instructions for data workload failback and restoration to complete your application failback and recovery.

Note:

If you were protecting Exchange, after the restoration is complete, you will need to rehome the informational store databases to the source.

  1. From a command prompt on the source, run the post_restore_<source server name>_<target server name>.bat file that Application Manager automatically generated.
  2. Restart any Outlook clients so that they can access the source.
Application Services to Stop
Exchange 2007
  • Microsoft Exchange Active Directory Topology Service
  • Microsoft Exchange Anti-spam Update
  • Microsoft Exchange EdgeSync
  • Microsoft Exchange File Distribution
  • Microsoft Exchange IMAP4
  • Microsoft Exchange Information Store
  • Microsoft Exchange Mail Submission
  • Microsoft Exchange Mailbox Assistants
  • Microsoft Exchange POP3
  • Microsoft Exchange Replication Service
  • Microsoft Exchange Search Indexer
  • Microsoft Exchange Service Host
  • Microsoft Exchange System Attendant
  • Microsoft Exchange Transport
  • Microsoft Exchange Transport Log Search
  • Microsoft Search (Exchange)
  • World Wide Web Publishing Service
Exchange 2003
  • MSExchangeSA
  • MSExchangeMGMT
  • POP3SVC
  • IMAP4SVC
  • ResVC
  • MSExchangeES
  • W3SVC
  • SMTPSVC
SQL Server
  • MSSqlServer
  • SQLServerAgent
  • MSSearch (SQL 2000)
  • MSFteSQL (SQL 2005)
  • MSSQLServerADHelper
  • MSDTC
  • MSSQLServerOLAPService
  • MSDTSServer
  • SQLWriter
  • SQLBrowser (SQL 2005)
SharePoint
  • IISADMIN
  • HTTPFilter
  • SMTPSVC
  • W3SVC
  • SPAdmin
  • SPSearch
  • SPTimerV3
  • SPTrace
  • SPWriter
BlackBerry
  • BlackBerry Router
  • BlackBerry Server Alert
  • BBAttachServer
  • BlackBerry Controller
  • BlackBerry Database Consistency Service
  • BlackBerry Dispatcher
  • BlackBerry Policy Service
  • BlackBerry SyncServer
  • BlackBerry MDS Connection Service
  • MdsTomcat
File server
  • Server
  • Computer Browser

Restoring then failing back applications configured for DNS failover

For application workloads that were configured for DNS failover, you can use the Application Manager to initiate failback and, if desired restore data from the target back to the source. In order to minimize downtime, the restoration process is completed before the failback.

  1. If you are using a cluster environment and protecting Exchange, make sure the Physical Disk resource(s) and the IP Address resource are online on the source cluster.
  2. Note: When you bring the source cluster online, an identical network name will be active on the target. Therefore, when the source cluster tries to bring the Exchange virtual server on the source online, the network name resource will fail and the group will not come online. Allow the source cluster to finish trying to bring the resources online before beginning failback.
  3. When you bring the source cluster online, an identical network name will still be active on the target. Because of this, when the source cluster tries to bring up the EVS on the source, the network name resource will fail and consequently the group will not come online on the source. You should allow the source cluster to finish trying to bring the resources online before using the to failback.
  4. In the Application Manager, make sure your source target pair is selected and then on the Monitor tab, click Failback.
  5. Note: The Failback button may not become active right away after completing a failover. In this case, restart the Application Manager.
  6. Specify the options for your failback and restoration.

  7. Click Initiate Failback to being the failback process.
  8. Note:

    If you are protecting Exchange, keep in mind the following caveats.

    • If you deslected any mail stores during your failover configuration, you may see a message during failback about potential errors (unpaired mail stores). This message can be disregarded.
    • If you created any new mail stores on the target after failover, they will not be failed back.
    • Mail sent to public folders during failback may be routed to the target server after Exchange is shut down, which will result in mail being stuck in the queue. Make sure mail is not sent to public folders until the failback process is complete.
    • If you close the Application Manager during failback, you may have to manually run the post_restore.bat file which starts the Exchange services and updates public folders on the source.
    • If your source is an Exchange 2007 CCR, LCR, or SCC cluster, after failback the CCR, LCR, or SCC replication will need to be manually reseeded after verifying Exchange is functioning properly. For information about this process, see Microsoft TechNet Article How to Seed a Cluster Continuous Replication Copy.
    • In a like-named cluster environment with more than one DNS server, there may be a delay contacting the source after failback. The DNS server used by the source cluster is updated on failback to point back to the source server. However, if the Application Manager is running on a machine that uses a different DNS server, it may not recognize the change until the next DNS zone refresh.

Restoring then failing back virtual workloads

  1. Open the console you used to establish protection.
  2. On the Monitor Connections or Monitor protections page (depending on your console), select the connection that you want to restore and failback.
  3. Click Reverse Protection in the toolbar. The flow of mirroring and replication data will change. Data will be transmitted from the replica virtual machine on the target back to the source.
  4. After mirroring is complete and you are ready to failback, perform the failover process again. This process will act as a failback. Once the failover is complete, you will be back to your original source.

Connections

A unique connection ID is associated with each Double-Take Availability connection. The connection ID provides a reference point for each connection. The connection ID is determined by sequential numbers starting at one (1). Each time a connection is established, the ID counter is incremented. It is reset back to one each time the Double-Take service is restarted. For example, if the Double-Take service was started and the same replication set was connected to five target machines, each connection would have a unique connection ID from 1 to 5. The connection can be in various states as described in the following table.

Connection Status Description
Started

The network connection exists and is available for data transmission. Replication and mirror data are transmitted to the target as soon as possible. This is the standard state that you will see most often.

Stopped Double-Take Availability has linked the source and target, but the network connection does not exist. Replication and mirror data are not transmitted to the target but are held in queue on the source.
Paused

The network connection exists and is available for data transmission, but the replication and mirror data is being held in a queue and is not being transmitted to the target.

Scheduled

Double-Take Availability has linked the source and target, but the network connection is not established until event driven or scheduling criteria have been met.

Error

A transmission error has occurred. Possible errors include a broken physical line or a failed target service.

You can perform the following functions to manage your connections.

 

Data queues

During the Double-Take Availability installation, you identified the amount of disk space that can be used for Double-Take Availability queuing. Queuing to disk allows Double-Take Availability to accommodate high volume processing that might otherwise fill-up system memory. For example, on the source, this may occur if the data is changing faster than it can be transmitted to the target, or on the target, a locked file might cause processing to back up.

The following diagram will help you understand how queuing works. Each numbered step is described after the diagram.

  1. If data cannot immediately be transmitted to the target, it is stored, or queued, in system memory. You can configure how much system memory you want to use for queuing. By default, 128 or 512 MB of memory is used, depending on your operating system.
  2. When the allocated amount of system memory is full, new changed data bypasses the full system memory and is queued directly to disk. Data queued to disk is written to a transaction log. Each transaction log can store 5 MB worth of data. Once the log file limit has been reached, a new transaction log is created. The logs can be distinguished by the file name which includes the target IP address, the Double-Take Availability port, the connection ID, and an incrementing sequence number.
  3. Note:

    You may notice transaction log files that are not the defined size limit. This is because data operations are not split. For example, if a transaction log has 10 KB left until the limit and the next operation to be applied to that file is greater than 10 KB, a new transaction log file will be created to store that next operation. Also, if one operation is larger than the defined size limit, the entire operation will be written to one transaction log.

  4. When system memory is full, the most recent changed data is added to the disk queue, as described in step 2. This means that system memory contains the oldest data. Therefore, when data is transmitted to the target, Double-Take Availability pulls the data from system memory and sends it. This ensures that the data is transmitted to the target in the same order it was changed on the source. Double-Take Availability automatically reads operations from the oldest transaction log file into system memory. As a transaction log is depleted, it is deleted. When all of the transaction log files are deleted, data is again written directly to system memory (step 1).
  5. To ensure the integrity of the data on the target, the information must be applied in the same order as it was on the source. If there are any delays in processing, for example because of a locked file, a similar queuing process occurs on the target. Data that cannot immediately be applied is queued to system memory. By default, 128 or 512 MB of memory is used, depending on your operating system.
  6. When the allocated amount of system memory on the target is full, new incoming data bypasses the full system memory and is queued directly to disk. Data queued to disk is written to a transaction log. On the target, the transaction logs are identified with the source IP address, the Double-Take Availability port, the connection ID, and an incrementing sequence number.

Like the source, system memory on the target contains the oldest data so when data is applied to the target, Double-Take Availability pulls the data from system memory. Double-Take Availability automatically moves operations from the oldest transaction log file to system memory. As a transaction log is depleted, it is deleted. When all of the transaction log files are deleted, data is again written directly to system memory (step 4).

Queuing data

You should configure queuing on both the source and target.

  1. Open the Replication Console and right-click the server on the left pane of the Replication Console.
  2. Select Properties.
  3. Select the Queue tab.
  4. Specify the queue settings for the server.

  5. Click OK to save the settings.

Auto-disconnect and auto-reconnect

While disk queues are user configurable and can be extensive, they are limited. If the amount of disk space specified for disk queuing is met, additional data could not be added to the queue and data would be lost. To avoid any data loss, the auto-disconnect and auto-reconnect processes occur.

Reconnecting automatically

Use the following steps to configure automatic reconnections.

  1. Open the Replication Console and right-click the server on the left pane of the Replication Console.
  2. Select Properties and select the Setup tab.

  1. Verify that the check box Automatically Reconnect During Source Initialization is marked to enable the auto-reconnect feature.
  2. Click OK to save the settings.

Pausing and resuming target processing

You can break the source/target connection without disconnecting the connection, so that you can control the transmission of data across the network. You can do this by pausing the target. If the target is paused, data is queued on the source until you manually resume the target.

For example, you must pause the target while you perform a backup of database files stored on the target because the database and log files must be backed up when they are at the exact same point in time. For example, say the backup of the file mydatabase.mdf begins on the target. While the backup program has access to the file, Double-Take Availability cannot write to the file. When the backup completes, Double-Take Availability writes to the file. Double-Take Availability also writes to the corresponding mydatabase.ldf file. When the backup gets to the mydatabase.ldf file, it no longer matches the .mdf file. The database may require special startup procedures, which may result in incomplete transactions being left in the database or data loss. To workaround this scenario, pause the target before starting the backup and then resume the target when the backup is complete.

While the target is paused, the Double-Take Availability source cannot queue data indefinitely. If the source queue is filled, Double-Take Availability will automatically disconnect the connections and attempt to reconnect them.

To pause a target, open the Replication Console and right-click a target server on the left pane of the Replication Console. Select Pause Target. All active connections to that target will complete the operations already in progress. You will see Pause Pending in the Replication Console while these operations are completed. The status will update to Paused after the operations are completed. Any new operations will be queued on the source until the target is resumed. When you are ready to resume the target, right-click the target and select Resume Target.

Note:

If you have multiple connections to the same target, all connections will be paused and resumed.

Blocking writing to the target paths

You can block writing to the paths on the target that contain the copy of the replication set data. This keeps the data from being changed outside of Double-Take Availability processing. To block the replication set data paths on the target, open the Replication Console, and right-click the connection on the right pane of the Replication Console. Select Block Target Path(s). To unblock the paths, right-click the connection and deselect Block Target Path(s).

Note:

If you are going to use failover, any target paths that are blocked will automatically be unblocked during the failover process so that users can modify data on the target after failover. During a restoration, the paths are automatically blocked again. If you failover and failback without performing a restoration, the target paths will remain unblocked. You can manually block or unblock the target paths by right-clicking on a connection.

Do not block your target paths if you are protecting a full-server because system state data will not be able to be written to the target.

Disconnecting a connection

To disconnect a Double-Take Availability connection, open the Replication Console, and right-click the connection on the right pane of the Replication Console. Select Disconnect. The source and target will be disconnected.

Note:

If a connection is disconnected and the target is monitoring the source for failover, you will be prompted if you would like to continue monitoring for a failure. If you select Yes, the Double-Take Availability connection will be disconnected, but the target will continue monitoring the source. To make modifications to the failure monitoring, you will need to use the Failover Control Center. If you select No, the Double-Take Availability connection will be disconnected, and the source will no longer be monitored for failure by the target.

If a connection is disconnected while large amounts of data still remain in queue, the Replication Console may become unresponsive while the data is being flushed. The Replication Console will respond when all of the data has been flushed from the queue.

Mirroring

Mirroring is one of the key components of Double-Take Availability. You can perform the following functions to manage mirroring.

 

Stopping, starting, pausing, or resuming mirroring

After a connection is established, you need to be able to control the mirroring. You can start, stop, pause and resume mirroring. open the Replication Console, and right-click the connection on the right pane of the Replication Console. Select Mirroring and the appropriate mirror control.

File difference mirror options compared

An X enclosed in parentheses (X) indicates that the global option on the Server Properties Source tab can be on or off. The use of this option does not change the action performed during the mirror.

Mirroring automatically

In certain circumstances, for example if the disk-based queues on the source are exhausted, Double-Take Availability will automatically disconnect connections (called auto-disconnect) and then automatically reconnect them (called auto-reconnect). In order to ensure data integrity on the target, Double-Take Availability will perform an automatic mirror (called an auto-remirror) after an auto-reconnect.

Note:

Auto-remirror is a per source option. When enabled, all connections from the source will perform an auto-remirror after an auto-reconnect. When disabled, none of the connections from the source will perform an auto-remirror after an auto-reconnect.

  1. Open the Replication Console, and right-click a server in the left pane of the Replication Console and select Properties.
  2. Select the Setup tab.

  1. Verify that Perform Remirror After Auto-Reconnect is selected to initiate an auto-remirror after an auto-reconnect.
  2. Note: If auto-remirror is disabled and an auto-reconnect occurs, the transmission state of the connection will remain pending after the reconnect until a mirror is started manually.
  3. Verify that Mirror only Changed Files on Source Reboot is selected to use the Windows NTFS change journal to track file changes. When this option is enabled, if the source is rebooted, only the files identified in the change journal will be remirrored to the target. This setting helps improve mirror times.
  4. Specify the type of mirror that you wish to perform.
  1. Click OK to save the settings.

Running scripts during mirroring

You can customize your mirroring process by running customized scripts on the target at predefined points in the mirroring process. Scripts may contain any valid Windows command, executable, batch, or script file. The scripts are processed using the same account running the Double-Take service, unless you provide specific credentials on the Server Properties Script Credentials tab for the target server. There are three types of mirroring scripts.

  1. Open the Replication Console.
  2. Right-click the connection on the right pane of the Replication Console and select Connection Manager.
  3. Select the Scripts tab.

  1. For each of the three predefined points in the mirroring process, specify the following information.
  1. Click OK to save the settings.
  2. Note: Mirror scripts are dependent on the target and target path location of a connection. Therefore, if you establish mirror scripts for one connection and then establish additional connections to the same target using the same target path location, the mirror scripts will automatically be applied to those subsequent connections. If you select a different target path location, the mirror scripts will have to be reconfigured for the new connection(s).

Removing orphan files

An orphan file is a file that exists in the target’s copy of the replication set data, but it does not exist in the source replication set data. An orphan file can be created when you delete a file contained in the source replication set while there is no Double-Take Availability connection. For example, if a connection was made and a mirror was completed and then the connection was stopped and a file was deleted on the source, an orphan file will exist on the target. Because the connection has been disconnected, the delete operation is not replicated to the target and the file is not deleted on the target. Additionally, orphan files may also exist if files were manually copied into or deleted from the location of the target’s copy of the replication set data.

You can configure orphan files to be moved or deleted automatically during a mirror, verify, or restore, or you can move or delete orphan files manually at any time. You can move or delete all orphan files on the target or only those orphan files that are older than a specified period of time. The results of orphan processing are maintained in the Double-Take Availability log on the target, including the number of moved/deleted orphan files, the directories, and the number of bytes.

Note:

Orphan file configuration is a per target option. All connections to the same target will have the same orphan file configuration.

The orphans feature does not move or delete alternate data streams. To do this, use a full mirror which will delete the additional stream(s) when the file is re-created.

If Double-Take Availability is configured to move orphan files, the Double-Take Availability log file will indicate that orphan files have been deleted even though they have actually been moved. This is a reporting issue only.

If delete orphans is enabled, directories and files that do not exist on the source and are excluded in the replication set using a wildcard rule will be removed from the target path. If you have data in your target path that does not exist on the source, do not use wildcard rules in your replication set. Manually select and deselect those files which should be included or excluded from your replication set.

  1. Open the Replication Console.
  2. If you want to remove orphan files manually, right-click an established connection and select Remove Orphans, Start.
  3. If you want to stop the process after it has been started, right-click the connection and select Remove Orphans, Stop.
  4. To configure orphan files for processing during a mirror, verify, or restore, use the following instructions.
  1. Right-click the connection on the right pane of the Replication Console and select Connection Manager.
  2. Select the Orphans tab.

  1. Specify if you want to log the name of the orphan files to the Double-Take Availability log file on the target by marking Log Orphaned Files to Target Log.
  2. By default, the orphan files feature is disabled. To enable it, mark Move/Delete Orphan Files.
  3. Specify if you want to Delete Orphaned Files or Move Orphaned Files to a different location. If you select the move option, identify the location where these orphan files will be located.
  4. Note:

    If you are moving files, make sure the directory you specify to move the files to is not included in the destination of the replication set data so that the orphan files are only moved once.

  5. Specify if you want to Remove All Orphans or Remove Orphans not modified within the following time period. If you select the time-based option, only orphans older than the time you specify will be removed.
  6. Click OK to save the settings.

Replication

Replication is one of the key components of Double-Take Availability. This section contains the following replication topics.

 

Replication capabilities

Double-Take Availability replicates file and directory data stored on any Windows file system (FAT, FAT32, NTFS4, and NTFS5). Replicated items also include Macintosh files, compressed files, NTFS attributes and ACLs (access control list), dynamic volumes, files with alternate data streams, sparse files, and encrypted files. Files can be replicated across mount points, even though mount points are not created on the target. Some reparse points are replicated, including CommVault Data Migrator and BridgeHead Software HT FileStore.

Double-Take Availability does not replicate items that are not stored on the file system, such as physical volume data and registry based data. Additionally, Double-Take Availability does not replicate NTFS extended attributes, registry hive files, Windows or any system or driver pagefile, system metadata files ($LogFile, $Mft, $BitMap, $Extend\\$UsnJrnl, $Extend\\$Quota, $Extend\\$ObjId, and $Extend\\$Reparse), hard links, or the Double-Take Availability disk-based queue logs. The only exception to these exclusions is for the full-server workloads. If you are protecting your system state and data using full-server protection, Double-Take Availability will automatically gather and replicate all necessary system state data, including files for the operating system and applications.

Note the following replication caveats.

  1. If you have mixed file systems, keep in the mind the following.
  1. If, on your source, you have a FAT volume mounted on a directory which resides on an NTFS volume, these files will not be mirrored, regardless of the target file system. Replication will work correctly. To work around this issue, make sure both volumes are NTFS.
  2. If you are mirroring/replicating from an NTFS source to a FAT target, you may see additional error messages in your Double-Take Availability log file because the target file system cannot handle the NTFS attributes or file permissions. For example, if your replication set contains files with alternate data streams, you will see messages indicating that there are unfinished operations because the FAT file system cannot store the alternate data stream information.
  3. If you select a compressed file or folder from an NTFS partition and replicate it to a FAT target, the attributes are lost, but the data is maintained.
  1. If any directory or file contained in your replication set specifically denies permission to the system account or the account running the Double-Take service, the attributes of the file on the target will not be updated because of the lack of access. This also includes denying permission to the Everyone group because this group contains the system account.
  2. If you select a dynamic volume and you increase the size of the volume, the target must be able to compensate for an increase in the size of the dynamic volume.
  3. If you select files with alternate data streams, keep in mind the following.
  1. Alternate data streams are not included in the replication set size calculation. Therefore, you may see the mirror process at 100% complete while mirroring continues.
  2. The number of files and directories reported to be mirrored will be incorrect. It will be off by the number of alternate streams contained in the files and directories because the alternate streams are not counted. This is a reporting issue only. The streams will be mirrored correctly.
  3. Use the checksum option when performing a difference mirror or verification to ensure that all alternate data streams are compared correctly.
  4. If your alternate streams are read-only, the times may be flagged as different if you are creating a verification report only. Initiating a remirror with the verification will correct this issue.
  1. If you select encrypted files, keep in mind the following.
  1. Only the data, not the attributes or security/ownership, is replicated. However, the encryption key is included. This means that only the person who created the encrypted file on the source will have access to it on the target.
  2. Only data changes cause replication to occur; changing security/ownership or attributes does not.
  3. Replication will not occur until the Windows Cache Manager has released the file. This may take awhile, but replication will occur when Double-Take Availability can access the file.
  4. When remirroring, the entire file is transmitted every time, regardless of the remirror settings.
  5. Verification cannot check encrypted files because of the encryption. If remirror is selected, the entire encrypted file will be remirrored to the target. Independent of the remirror option, all encrypted files will be identified in the verification log.
  6. Empty encrypted files will be mirrored to the target, but if you copy or create an empty encrypted file within the replication set after mirroring is complete, the empty file will not be created on the target. As data is added to the empty file on the source, it will then be replicated to the target.
  7. When you are replicating encrypted files, a temporary file is created on both the source and target servers. The temporary file is automatically created in the same directory as the Double-Take Availability disk queues. If there is not enough room to create the temporary file, an out of disk space message will be logged. This message may be misleading and indicate that the drive where the encrypted file is located is out of space, when it actually may be the location where the temporary file is trying to be created that is out of disk space.
  1. If you are using mount points, keep in mind the following.
  1. By default, the mount point data will be stored in a directory on the target. You can create a mount point on the target to store the data or maintain the replicated data in a directory. If you use a directory, it must be able to handle the amount of data contained in the mount point.
  2. Recursive mount points are not supported. If you select data stored on a recursive mount point, mirroring will never finish.
  1. Double-Take Availability supports transactional NTFS (TxF) write operations, with the exception of TxF SavePoints (intermediate rollback points).
  1. With transactional NTFS and Double-Take Availability mirroring, data that is in a pending transaction is in what is called a transacted view. If the pending transaction is committed, it is written to disk. If the pending transaction is aborted (rolled back), it is not written to disk.

During a Double-Take Availability mirror, the transacted view of the data on the source is used. This means the data on the target will be the same as the transacted view of the data on the source. If there are pending transactions, the Double-Take Availability Target Data State will indicate Transactions Pending. As the pending transactions are committed or aborted, Double-Take Availability mirrors any necessary changes to the target. Once all pending transactions are completed, the Target Data State will update to OK.

If you see the pending transactions state, you can check the Double-Take Availability log file for a list of files with pending transactions. As transactions are committed or aborted, the list is updated until all transactions are complete, and the Target Data State is OK.

  1. During replication, transactional operations will be processed on the target identically as they are on the source. If a transaction is committed on the source, it will be committed on the target. If a transaction is aborted on the source, it will be aborted on the target.
  2. When failover occurs any pending transactions on the target will be aborted before the source identity is assigned to the target.
  3. Double-Take Availability restore functions as a mirror, except the roles of the source and target are reversed. The transacted view of the data on the target is restored to the source. As pending transactions are committed or aborted on the target, Double-Take Availability restores any necessary changes to the source. Once all pending transactions are completed, the restoration is complete and replication will continue from the target to the source.
  4. If you have restored your data before starting the failback process, make sure the restoration process does not have pending transactions and is complete before starting failback. If you are restoring your data after the failback the process has completed, users will not be accessing the data once failback occurs, so there are no opportunities for pending transactions.
  1. Double-Take Availability supports Windows 2008 symbolic links and junction points. A symbolic link is a link (pointer) to a file. Junction points are also links, but to folders and volumes.
  1. If the link and the file/folder/volume are both in your source replication set, both the link and the file/folder/volume are mirrored and replicated to the target.
  2. If the link is in the source replication set, but the file/folder/volume it points to is not, only the link is mirrored and replicated to the target. The file/folder/volume that the link points to is not mirrored or replicated to the target. A message is logged to the Double-Take Availability log identifying this situation.
  3. If the file/folder/volume is in the source replication set, but the link pointing to it is not, only the file/folder/volume is mirrored and replicated to the target. The link pointing to the file/folder/volume is not mirrored or replicated to the target.
  1. Short file names are not supported on FAT file systems.

Replication sets

A replication set defines the data on a source machine that Double-Take Availability protects. Replication sets are defined by volumes, directories, files, or wild card combinations. Creating multiple replication sets allows you to customize sets of data that need to be protected. When working with data workloads, you need to define the replication set data yourself. If you are protecting full-server, application, virtual, or cluster workloads, the replication set is automatically defined for you.

When a replication set is created, a series of rules are defined that identify the volumes, directories, files, and/or wild card combinations that will be replicated to the target. Each rule includes:

For example, a replication set rule might be volume\directory\* inc, rec

This specifies that all files contained in the volume\directory path are included in the replication set. Because recursion is set, all files and subdirectories under volume\directory are also included. A complete replication set becomes a list of replication set rules.

Replication sets offer flexibility tailoring Double-Take Availability to your environment. For example, multiple replication sets can be created and saved for a source to define a unique network configuration. There may be three replication sets - Critical Data, User Data, and Offsite Data. Critical Data could be configured to replicate, in real-time, to an onsite high-availability server. Offsite Data is replicated across a WAN and, therefore, is configured to queue changes until a sufficient amount of data is changed to justify transmission. At that point, the connection is made and stays active until all the data is transmitted. User Data is not replicated throughout the day, but a nightly changed file mirror copies only blocks of data that are different between the source and target server prior to a nightly tape backup operation being run on the target server. Each of these replication sets can be automated to transmit as needed, thus protecting your entire environment.

Keep in mind the following notes when creating and working with replication sets and connections.

Creating a replication set

Before you can establish a connection, you must create a replication set.

  1. From the Replication Console, highlight a source in the left pane of the Replication Console and select Insert, Replication Set from the menu bar. You can also right-click on the source name and select New, Replication Set.
  2. A replication set icon appears in the left pane under the source. By default, it is named New Replication Set. Rename the newly inserted replication set with a unique name by typing over the default name and pressing Enter. This process is similar to naming a new folder in Windows Explorer.
  3. Expand the tree under the replication set name to view the volume and directory tree for the source.
  4. Note:

    The default number of files that are listed in the right pane of the Replication Console is 2500, but this is user configurable. A larger number of file listings allows you to see more files in the Replication Console, but results in a slower display rate. A smaller number of file listings displays faster, but may not show all files contained in the directory. To change the number of files displayed, select File, Options and adjust the File Listings slider bar to the desired number.

    To hide offline files, such as those generated by snapshot applications, select File, Options and disable Display Offline Files. Offline files and folders are denoted by the arrow over the lower left corner of the folder or file icon.

  1. Identify the data on the source that you want to protect by selecting volumes, drives, directories, and/or specific files.

Note: Be sure and verify what files can be included by reviewing Replication capabilities.
  1. After selecting the data for this replication set, right-click the new replication set icon and select Save. A saved replication set icon will change from red to black.

Creating or modifying replication rules manually

There may be times when you cannot browse for data when creating a replication set. For example, you can create a replication set rule for a directory or file that does not exist. Since you cannot browse for the location, you have to create replication set rule manually. At other times, the data you want to replicate cannot be easily selected from the Replication Console. For example, you may want to select all .db files from a specific volume or directory. This task may be easier to complete by creating the replication set rule manually. Use the following instructions to create or modify a replication set rule manually.

  1. Open the Replication Console.
  2. If you do not have a replication set created, you need to create one. Highlight a source in the left pane of the Replication Console and select Insert, Replication Set from the menu bar. You can also right-click on the source name and select New, Replication Set. A replication set icon appears in the left pane under the source. By default, it is named New Replication Set. Rename the newly inserted replication set with a unique name by typing over the default name and pressing Enter. This process is similar to naming a new folder in Windows Explorer.
  3. Right-click on the replication set icon and select Properties. The Replication Set Properties dialog box appears and lists any existing rules. The existing rules may have been entered manually or selected by browsing the source. Each rule will display the attributes associated it.

  1. From the Replication Set Properties dialog box, click Add.
  2. Specify a path, wild card, or specific file name. Select the Include, Exclude, and/or Recurse sub-directories attributes to be applied to this rule and click OK.
  3. Repeat steps 3 and 4 to add additional replication set rules.
  4. If you need to edit an existing rule, highlight it and click Edit.
  5. If you need to remove a rule, highlight it and click Remove.
  6. After the replication set rules have been defined, exit the Replication Set Properties dialog box by clicking OK. Notice the replication set icon has changed from black to red, indicating changes to the replication set rules. If you click Cancel, your changes will not be reflected in the current replication set.
  7. Right-click the replication set icon and select Save. A saved replication set icon will change from red to black.

Modifying a replication set

Double-Take Availability allows you to make modifications to a replication set when you want to change the data you wish to protect. This allows you to add, remove, or modify any replication set rules without having to create a new replication set.

  1. Open the Replication Console.
  2. In the left pane, highlight the replication set you want to modify and expand the volume and directory levels as needed.
  3. Modify the items by marking or clearing the volume, drive, directory, or file check boxes. Notice the replication set icon has changed from black to red, indicating changes to the replication set rules.
  4. After updating the rules for this replication set, right-click the replication set icon and select Save. A saved replication set icon will change from red to black.
  5. Note:

    If you save changes to a connected replication set, it is recommended that you perform a mirror to guarantee data integrity between the source and target machines. A dialog box will appear instructing you to disconnect and reconnect the replication set and perform a difference mirror.

    If your source is a cluster, you must make the same modifications to the replication set on the non-owning nodes. The replication set rules must be identical on all nodes for Double-Take Availability to function properly on the cluster.

Renaming and copying a replication set

To rename or copy a replication set, open the Replication Console. Click once on a highlighted replication set name to edit the field. Specify a unique name and press Enter. The process is similar to renaming a folder in Windows Explorer. If the original replication set has not been saved (red icon), the new name replaces the original name. If the original replication set is saved (black icon), the new name creates a copy of the original replication set.

Note:

If you save changes to a connected replication set, it is recommended that you perform a mirror to guarantee data integrity between the source and target machines. A dialog box will appear instructing you to disconnect and reconnect the replication set and perform a difference mirror.

If your source is a cluster, you must make the same modifications to the replication set on the non-owning nodes. The replication set rules must be identical on all nodes for Double-Take Availability to function properly on the cluster.

Calculating replication set size

While Double-Take Availability is mirroring, the right pane of the Replication Console displays statistics to keep you informed of its progress. If the size of the replication set is determined before the mirror is started, Double-Take Availability can display the percentage of the replication set that has been mirrored in the Mirror Status column. If the size was not calculated prior to starting the mirror, the column displays Mirroring.

  1. Open the Replication Console.
  2. Right-click on the replication set icon and select Properties. The Replication Set Properties dialog box appears.
  3. Select the Size tab.

  1. If the replication set size has never been determined, click Calculate. If the replication set has previously been determined, the button will be labeled Recalculate. Depending on user activity, the size shown may not accurately reflect the current size of the replication set. If changes are occurring to files in the replication set while the calculation is being made, the actual size may differ slightly. The amount of data is determined at the exact time the calculation is made.
  2. Click OK to return to the Replication Console.
  3. Note:

    You can also configure the replication set calculation when establishing a connection through the Connection Manager by selecting Calculate Replication Set size on connection on the Mirroring tab.

    If your replication set contains a large number of files, for example, ten thousand or more, you may want to disable the calculation of the replication set size so that data will start being mirrored sooner. If calculation is enabled, the source calculates the file size before it starts mirroring. This can take a significant amount of time depending on the number of files and system performance. Disabling calculation will result in the mirror status not showing the percentage complete or the number of bytes remaining to be mirrored.

Deleting a replication set

You can only delete a replication set if it is not currently connected. If the replication set is connected, you must disconnect the connection and then delete the replication set.

To delete a replication set, open the Replication Console. Right-click the replication set icon and select Delete. Additionally, you can highlight the replication set and press the Delete key on the keyboard.

Starting replication

Starting replication when establishing a connection is the default and recommended configuration. If replication is not started, data is not added to the queue on the source, and source/target data integrity is not guaranteed.

To start replication, open the Replication Console. Right-click the connection on the right pane of the Replication Console and select Replication, Start. After starting replication, you should perform a remirror to guarantee the source and target data are identical.

Inserting tasks during replication

Task command processing is a Double-Take Availability feature that allows you to insert and run tasks at various points during the replication of data. Because the tasks are user-defined, you can achieve a wide variety of goals with this feature. For example, you might insert a task to create a snapshot or run a backup on the target after a certain segment of data from the source has been applied on the target. This allows you to coordinate a point-in-time backup with real-time replication.

Task command processing can be enabled from the Replication Console, but it can only be initiated through the scripting language. See the Scripting Guide for more information.

To enable task command processing open the Replication Console. Right-click a server in the left pane of the Replication Console, select Properties, select the Setup tab, and select Enable Task Command Processing.

Note: If you disable this option on a source server, you can still submit tasks to be processed on a target, although task command processing must be enabled on the target.

Verification

Verification is the process of confirming that the data on the target is identical to the data on the source. Verification creates a log file detailing what was verified as well as which files are not synchronized. If the data is not the same, Double-Take Availability can automatically initiate a remirror. The remirror ensures data integrity between the source and target.

Note: Because of the way the Windows Cache Manager handles memory, machines that are doing minimal or light processing may have file operations that remain in the cache until additional operations flush them out. This may make Double-Take Availability files on the target appear as if they are not synchronized. When the Windows Cache Manager releases the operations in the cache on the source, the files will be updated on the target.

 

Verifying manually

A manual verification can be run anytime a mirror is not in progress.

  1. Open the Replication Console.
  2. Right-click the connection on the right pane of the Replication Console and select Verify.
  3. Select the verification options that you would like to perform.

  1. Click OK to start the verification.

Verifying on a schedule

Verification can be scheduled to occur automatically at periodic intervals.

  1. Open the Replication Console.
  2. Right-click the connection on the right pane of the Replication Console and select Connection Manager.
  3. Select the Verify tab.

  1. Specify when you want to start the initial verification. Select the immediate date and time by clicking Now, or enter a specific Date and Time. The down arrow next to Date displays a calendar allowing easy selection of any date. Time is formatted for any AM or PM time.
  2. Mark the Reverification Interval check box to repeat the verification process at the specified interval. Specify an amount of time and choose minutes, hours, or days.
  3. Select if you want to Remirror files to the Target automatically. When enabled, Double-Take Availability will verify the data, generate a verification log, and remirror to the target any files that are different on the source. If disabled, Double-Take Availability will verify the data and generate a verification log, but no files will be remirrored to the target.
  4. If you are remirroring your files, you can specify Only if Source file is newer than Target copy so that only files that are newer on the source than on the target are remirrored.
  5. Note:

    If you are using a database application, do not use the newer option unless you know for certain you need it. With database applications, it is critical that all files, not just some of them that might be newer, get mirrored.

  1. Specify if you want the verification process to Use block checksum comparison/delta block transfer to determine which blocks are different. If this option is enabled, only those blocks (not the entire files) that are different will be identified in the log and/or remirrored to the target.
  2. Note:

    Database applications may update files without changing the date, time, or file size. Therefore, if you are using database applications, you should use the block checksum comparison to ensure proper verification and remirroring.

  1. Click OK to save the settings.

Configuring the verification log

A verification log is created on the source during the verification process. The log identifies what is verified as well as which files are not synchronized.

  1. Open the Replication Console.
  2. Right-click the source server on the left pane of the Replication Console and select Properties.
  3. Select the Logging tab.

  1. At the top of the window, Folder identifies the location where the log files identified on this tab are stored. By default, the log files are stored in the same directory as the Double-Take Availability program files.
  2. Under the Verification section, Filename contains the base log file name for the verification process. The replication set name will be prefixed to the base log file name. For example, since the default is DTVerify.log, the verification log for the replication set called UserData would be UserData DTVerify.log.
  3. Specify the Maximum Length of the log file. The default is 1048576 bytes (1 MB). When the log file reaches this limit, no additional data will be logged.
  4. By default, the log is appended to itself each time a verification process is completed. Clear the Append check box if you do not want to append to the previous log file.
  5. Note: Changes made to the verification log in the Server Properties, Logging tab will apply to all connections from the current source machine.
  1. Specify the Language of the log file. Currently, English is the only available language.
  2. Click OK to save the settings.

In the log file, each verification process is delineated by beginning and end markers. A list of files that are different on the source and target is provided as well cumulative totals for the verification process. The information provided for each file is the state of its synchronization between the source and the target at the time the file is verified. If the remirror option is selected so that files that are different are remirrored, the data in the verify log reflects the state of the file before it is remirrored, and does not report the state of the file after it is remirrored. If a file is reported as different, review the output for the file to determine what is different.

Sample verification log

--- VERIFICATION OF CONNECTION 2 (Sales data for alpha --> 206.31.65.40 : 1100) ---

Start Time: 1/24/2010 12:15:20 PM for connection 2 (Sales data for alpha -->

206.31.65.40 : 1100)

File:       beta\users\bob\budget.xls DIFFERENT ON TARGET

     Source Attributes: Timestamp = 1/17/2010 8:21:36 PM Size = 1272 Mask = [0x20]

     Target Attributes: Timestamp = 1/17/2010 8:21:36 PM Size = 1272 Mask = [0x20]

Security descriptors are different.

      0 BYTES OUT OF SYNC

File:       beta\users\bill\timesheet.xls DIFFERENT ON TARGET

     Source Attributes: Timestamp = 1/17/2010 8:21:37 PM Size = 1272 Mask = [0x20]

     Target Attributes: Timestamp = 1/17/2010 8:21:37 PM Size = 1272 Mask = [0x23]

      0 BYTES OUT OF SYNC

File:       beta\users\vincent\training.doc DIFFERENT ON TARGET

     Source Attributes: Timestamp = 1/12/2010 3:28:20 PM Size = 17 Mask = [0x20]

     Target Attributes: Timestamp = 1/20/2010 5:05:26 PM Size = 2 Mask = [0x20]

      17 BYTES OUT OF SYNC

Completion Time: 1/24/2010 12:37:44 PM for connection 2 (Sales data for alpha -->

206.31.65.40 : 1100)

Elapsed Time (seconds): 1320.256470

Total Directories Compared: 657

Total Directories Missing: 0

Total Directories Remirrored: 0

Total Files Compared: 120978

Total Files Missing: 0

Total Files Different: 3

Total Files Encrypted: 0

Total Files Remirrored: 1

Total Bytes Skipped: 0

Total Bytes Compared: 18527203678

Total Bytes Missing: 0

Total Bytes Different: 17

Total Bytes Remirrored: 17

Related links and directory attributes have been adjusted.

----- END OF VERIFICATION -----

The mask must be converted in order to determine what attributes are assigned to a file. The mask is a hexadecimal number corresponding to a binary number that indicates what the attributes are. Using the following steps, you can determine how the mask corresponds to the attributes of a file.

  1. Each mask begins with 0x. Identify the hexadecimal number after the constant 0x. For example, if the mask is 0x23, then the hexadecimal number you are interested in is 23. The hexadecimal number may be up to four digits.
  2. Convert the hexadecimal number to its 16-digit binary equivalent. You can use the Windows calculator for this conversion.
  1. Select Start, Programs, Accessories, Calculator.
  2. Switch to scientific view, if it is not already in that view, by selecting View, Scientific.
  3. Select Hex.
  4. Enter the hexadecimal number, for example 23, as specified in your verification log.
  5. Select Bin and the hexadecimal number will change to the binary equivalent.
  6. Pad the beginning of the binary equivalent with zeroes (0) so that the number is 16 digits long. For example, hexadecimal number 23 converts to 100011, so the 16-digit binary equivalent would be 0000000000100011.
  1. Determine what number appears in each position of the binary number. Because binary numbers count from right to left, start with position 1 on the right. For example, hexadecimal number 23, which converted to 0000000000100011, is broken out into the following positions.
  2. Position (from right to left) Attribute Sample Hexadecimal Number 23
    1 Read only 1
    2 Hidden 1
    3 None 0
    4 System 0
    5 Directory 0
    6 Archive 1
    7 Encrypted 0
    8 Normal 0
    9 Temporary 0
    10 Sparse file 0
    11 Reparse point 0
    12 Compressed 0

    13

    Offline 0
    14 Not content indexed 0
    15 None 0
    16 None 0
  3. Using the same chart above, identify those attributes that are enabled by those positions equal to one (1). The positions equal to zero (0) are disabled and that attribute does not apply. So hexadecimal number 23, which converted to 0000000000100011, indicates read only, hidden, and archive. Another example might be mask 0x827 which converted to binary is 0000100000100111. Positions 1-3, 6, and 12 are all enabled which indicates the file is read only, hidden, archive, and compressed.
  4. Note: Files that were replicated with the Replicate NT Security by Name feature enabled, will be identified as different in the log file because of the local name attribute. The files will be the same.

Verify applications on the target

The application verification process confirms that an Exchange or SQL application database on the target is viable for failover.

Note:

The application verification process is not available for Exchange or SQL in a cluster environment.

The application verification process can only be performed on active connections that are in a good state and are not failed over.

  1. Verify that your current volumes have adequate space to contain snapshots of your target. These snapshots will be used to revert the target back to its pre-test state after you have completed your application verification.
  2. Disable target path blocking for your application protection connection.
  3. Verify that your Double-Take disk queue is not located on a volume that you will be reverting (a volume with application data). Also verify that the queues have adequate space to handle the data changes that will be queued while you are testing your application.
  4. If you are verifying Exchange and you are running the Application Manager from a machine other than the source or target, you must install Exchange System Manager on that machine.
  5. From the Application Manager, select Actions, Verify Target Data.
  6. There are four main sections of the Database Verification window.
  7. Click Test to begin the application verification. The Status, Results, and History will update during the test. When the Status is Target online, the verification is complete. You can perform any custom testing at this time.
  8. If you have any problems during the test, click Undo to revert the target to its pre-test state. All snapshots and items created for the verification test will be removed. If you do not have Volume Shadow Copy installed, the snapshots used during the test will not be removed.
  9. When you have completed any custom testing, click Continue to revert back to the pre-test state. All snapshots and items created for the verification test will be removed. If you do not have Volume Shadow Copy installed, the snapshots used during the test will not be removed.

Verifying applications on the target from the command line

If desired, you can verify your application on the target by using the TDV utility from the command line.

Command TDV
Description Utility that confirms that the application database on the target is viable for failover
Syntax

TDV /APPTYPE <SQL | EXCHANGE> /DNSDOMAIN <domain_name> /SRCNAME <source_name> /TARNAME <target_name> /MODE <INSTANCE|DATABASE> [/PORT <port_number>] [/USERNAME <user_name>] [/PASSWORD <password>] /SVC <APP|ALL> [/ADDONSVC <service1,service2, ..>] [/SETPASSWORD <username> <password>] [/GETPASSWORD] [/SCRIPTPOST <post_online>] [/SCRIPTPRE <pre_restore>] /SRCEXCHVER <2003|2007> /TAREXCHVER <2003|2007> /SRCVER <2000|2005|2008|MSDE|EXPR> /TARVER <2000|2005|2008|MSDE|EXPR> [/INTERACTIVE] [/HELP]

Options
  • APPTYPE—Specify the keyword SQL or EXCHANGE to indicate the application being verified on the target
  • DNSDOMAIN <domain_name>—Fully-qualified name of the domain
  • SRCNAME <source_name>—Name of the source server
  • TARNAME <target_name>—Name of the target server
  • MODE—Specify the keyword INSTANCE or DATABASE to indicate the type of SQL database being verified
  • PORT <port_number>—The source and target port number. This port number must be the same on both servers.
  • USERNAME <user_name>—Name of the user login account
  • PASSWORD <password>—The password associated with specified user name
  • SVC—Specify the keyword APP or ALL to indicate if only the core application services will be started when the test is performed or if all of the services you configured for application failover will be started when the test is performed. Use the ALL option if you have an application add-on such as BlackBerry.
  • ADDONSVC <service1,service2, ..>—Specify any additional services to run when the test is performed
  • SETPASSWORD <username> <password>—Stores the specified user name and password in an encrypted file for later use
  • GETPASSWORD—Retrieves the user name and password previously stored with the /SETPASSWORD option
  • SCRIPTPOST <post_online>—A script, located in the Double-Take Availability installation folder on the target, to run after the target application is online. If there are spaces in the path and/or filename, enclose the path in quotation marks.
  • SCRIPTPRE <pre_restore>—A script, located in the Double-Take Availability installation folder on the target, to run before stopping the application on the target. If there are spaces in the path and/or filename, enclose the path in quotation marks.
  • SRCEXCHVER <2003|2007>—Specify the keyword 2003 or 2007 to indicate the version of Exchange running on the source
  • TAREXCHVER <2003|2007>—Specify the keyword 2003 or 2007 to indicate the version of Exchange running on the target
  • SRCVER <2000|2005|2008|MSDE|EXPR>—Specify the keyword 2000, 2005, 2008, MSDE, or EXPR to indicate the version of SQL running on the source
  • TARVER <2000|2005|2008|MSDE|EXPR>—Specify the keyword 2000, 2005, 2008, MSDE, or EXPR to indicate the version of SQL running on the target
  • INTERACTIVE—Runs the TDV utility in interactive mode. You will be prompted to continue before the test is started and after the test is complete.
  • HELP—Displays command syntax help
Examples
  • TDV /apptype EXCH /dnsdomain corp.greek.com /srcname alpha /tarname beta /username administrator /password password /svc app /interactive
  • TDV /apptype SQL /srcname alpha /tarname beta /mode instance /username administrator /password password /svc all
Notes
  • The application verification process can only be performed on active connections that are in a good state and are not failed over.
  • If you deselected a SQL instance when configuring SQL protection, all of the named instances on the target will be listed, including any you deselected.
  • If Application Manager is open when the TDV utility is run and becomes unresponsive, close and reopen Application Manager.
  • Any status other than online or offline will be reported as unknown.

Data transmission

Double-Take Availability data is continuously transmitted to the target machine. Although the data may be queued if the network or target machine is slow, the default transmission setting is to transmit the data as soon as possible. You can modify the transmission to suit your environment.

 

Stopping, starting, pausing, and resuming transmission

To start, pause, or resume the transmission of data from the source to the target, open the Replication Console. Right-click an established connection, select Transmit and the appropriate transmission control.

Scheduling data transmission

Using the Connection Manager Transmit tab, you can set start and stop criteria along with a schedule window.

Note:

Double-Take Availability checks the schedule once every second, and if a user-defined criteria is met, transmission will start or stop, depending on the option specified.

Any replication sets from a source connected to the same IP address on a target will share the same scheduled transmission configuration.

  1. Open the Replication Console.
  2. Right-click the connection on the right pane of the Replication Console and select Connection Manager.
  3. Select the Transmit tab. The Transmit tab contains four limit types: Bandwidth, Start, Stop, and Window. The transmission options for each limit type are displayed by highlighting a selection in the Limit Type box.

At the top of the Transmit tab dialog box, the Enable Transmission Limiting check box allows you to turn the transmission options on or off. You can enable the transmission options by marking the Enable Transmission Limiting check box when you want the options to be applied, but you can disable the transmission options, without losing the settings, by clearing that check box.

Also at the top of the Transmit tab dialog box, the Clear All button, when selected, will remove all transmission limitations that have been set under any of the limit types. The Clear button will clear the settings only for the Limit Type selected.

  1. When you schedule transmission start criteria, transmission will start when the criteria is met and will continue until the queue is empty or a transmission stop criteria is met. Select the Start option in the Limit Type box.

Define the start options for Double-Take Availability transmission by using any combination of the following options.

  1. Schedule any desired stop criteria to stop transmission after a transmission start criteria has initiated the transmission. If you do not establish a stop criteria, transmission will end when the queue is empty. Select the Stop option in the Limit Type box.

Define the stop options to stop Double-Take Availability transmissions by using either or both of the following options.

  1. Schedule a transmission window to establish a period of availability for all Double-Take Availability transmissions. You can specify a begin and end time for all Double-Take Availability transmissions. When a transmission window is in effect, all other start and stop criteria are bound by this window. This means that Double-Take Availability will never transmit data outside of an established window, regardless of other transmission settings. For example, if you set a window of availability from 9 p.m. to 4 a.m. and a start option to initiate transmission at 5 a.m., the window option will override the start option and no data will be sent at 5 a.m. Select the Window option in the Limit Type box.
  2. Note:

    Setting a transmission window by itself is not sufficient to start a transmission. You still need to set a start criteria within the window.

Define a window to control Double-Take Availability transmissions by enabling the feature and then specifying both window options.

  1. Click OK to save the settings.

Limiting transmission bandwidth

Bandwidth limitations are available to restrict the amount of network bandwidth used for Double-Take Availabilitydata transmissions. The network administrator specifies a percentage of bandwidth that is available or an absolute bandwidth limit for Double-Take Availability transmissions and Double-Take Availability never exceeds that allotted amount. The bandwidth not in use by Double-Take Availability is available for all other network traffic. You can schedule when you want bandwidth limiting to occur.

Note:

Any replication sets from a source connected to the same IP address on a target will share the same bandwidth limitation configuration.

You will not be able to set a limit lower than 100% of a 28.8 Kbps connection speed. A setting this low would cause abnormal behavior between Double-Take Availability servers because of the lengthy delay between commands and responses transmitted between the two servers.

You cannot set a bandwidth limit of zero (0). If you need to stop data transmission completely, use the stop criteria on the Connection Manager Transmit tab.

  1. Open the Replication Console.
  2. Right-click the connection on the right pane of the Replication Console and select Connection Manager.
  3. Select the Bandwidth tab.

  1. You have three bandwidth choices.
  1. If you want to transmit data at all times using all of the available bandwidth, select No Bandwidth Limit.
  2. If you want to transmit data at all times using limited bandwidth, select Fixed Bandwidth Limit.
  1. By default, the Unlimited checkbox is enabled. This configuration is identical to selecting No Bandwidth Limit. If you want to limit your bandwidth usage, clear this checkbox.
  2. To limit the bandwidth usage, enter the maximum amount of data you want to transfer per second. You can indicate it by specifying your Connection Speed and the Percentage of the bandwidth that you want to use or by entering the Transfer Rate value directly.
  1. If you want to transmit data according to a schedule using limited bandwidth, select Scheduled Bandwidth Limit.
  1. Click New Event to create a bandwidth schedule event.
  1. Specify a name for the bandwidth schedule event.
  2. Select the day(s) of the week that you want this event to be initiated on.
  3. Specify the time when you want this event to start.
  4. Specify the bandwidth limitation. By default, the Unlimited checkbox is enabled. This setting will not limit the transfer of Double-Take Availability data during the day and time specified. If you want to limit your bandwidth usage, clear this checkbox. To limit the bandwidth usage during the day and time specified, specify the maximum amount of data that you want to transfer per second. You can indicate it by specifying your Connection Speed and the Percentage of the bandwidth that you want to use or by entering the Transfer Rate value directly.
  1. Repeat each part of the new event creation to establish a comprehensive bandwidth schedule. For example, if you want to limit Double-Take Availability bandwidth usage weekdays (Monday - Friday) from 6:00 AM to 8:00 PM and have unlimited bandwidth usage outside of those times, you would create two events. The first event would be for Monday through Friday, would start at 6:00 AM, and would limit the bandwidth to the desired rate. The second event would be Monday through Friday, would start at 8:00 PM, and would not limit the bandwidth. (The Unlimited checkbox would be enabled.) In this schedule, on Monday at 6:00 AM, the schedule limit would be applied, limiting the transfer of data. At 8:00 PM that night, the schedule limit would be applied again, unlimiting the transfer of data. At 6:00 AM Tuesday morning, the schedule would be applied again. This would continue until the Friday 8:00 PM schedule is applied. That event would remain in effect until Monday morning at 6:00 AM.
  2. Highlight an existing schedule event and click Edit Event to make modifications to the event. The same steps used to create the event can be used to edit the event.
  3. Highlight an existing schedule event and click Remove Event to delete the event that is no longer needed.
  4. You can export the entire schedule for use on another Double-Take Availability server by clicking Export Schedule. Specify a file name and location, and an XML file with the schedule information will be saved.
  5. You can import an exported schedule by clicking Import Schedule. Locate the XML file and click OK. Any existing schedule will be overwritten by the imported schedule.
  1. Click OK to save the settings.
  2. Note:

    You can establish a bandwidth schedule and then disable or override it by selecting No Bandwidth Limit or Fixed Bandwidth Limit. The schedule criteria will be saved and will not be reactivated until you reselect Scheduled Bandwidth Limit.

    You can modify the bandwidth limits applied to a connection that is already established by right-clicking on the connection and selecting Set Bandwidth. A modified version of the Connection Manager Bandwidth tab will allow you to select a different bandwidth limitation. You cannot create a schedule from this dialog box. An existing schedule must already exist in the Connection Manager.

Compressing data for transmission

To help reduce the amount of bandwidth needed to transmit Double-Take Availability data, compression allows you to compress data prior to transmitting it across the network. In a WAN environment this provides optimal use of your network resources. If compression is enabled, the data is compressed before it is transmitted from the source. When the target receives the compressed data, it decompresses it and then writes it to disk. On a default Double-Take Availability installation, compression is disabled.

Note:

Any replication sets from a source connected to the same IP address on a target will share the same compression configuration.

Keep in mind that the process of compressing data impacts processor usage on the source. If you notice an impact on performance while compression is enabled in your environment, either adjust to a lower level of compression, or leave compression disabled. Use the following guidelines to determine whether you should enable compression:

  1. Right-click the connection on the right pane of the Replication Console and select Connection Manager.
  2. Select the Compression tab.

  1. By default, compression is disabled. To enable it, select Enable Compression.
  2. Depending on the compression algorithms available for your operating system, you may see a slider bar indicating different compression levels. Set the level from minimum to maximum compression to suit your needs.
  3. Click OK to save the settings.

Snapshots

A snapshot is an image of data taken at a single point in time. Snapshots allow you to view files and folders as they existed at points of time in the past, so you can, for example, recover files that were accidentally deleted or overwritten. You could also compare a current revision of a file with an older revision. Double-Take Availability utilizes snapshot functionality by allowing you to create snapshots of the replicated data stored on the Double-Take Availability target.

Double-Take Availability snapshot functionality ensures that you will always have usable data on the target. For example, if your source server becomes infected with a virus, you can revert to a previous snapshot of the data on the target that was created prior to the virus infection. If you know the data on your target is good data, in a usable state, it will minimize application downtime in the event of a source failure. For example, if the source failed and the data on the target is not good due to an incomplete mirror, you can revert to a good snapshot on the target before failover. Snapshots also allow you to retrieve files that a user may have deleted.

Double-Take Availability uses the Microsoft Volume Shadow Copy service to create snapshots. To access this functionality, your target must be running Windows 2003 Service Pack 1 or later. Your servers must also be using the NTFS file system. Snapshots are taken at the volume level, corresponding to the target volumes contained in your replication set. For example, if your replication set contains d:\data and e:\files, the snapshot will contain all of the data on both the d: and e: volumes. If your replication set only includes d:\data (e:\files exists but is not included in the replication set), the snapshot will only contain the d: volume.

Sometimes taking a snapshot may not be possible. For example, there may not be enough disk space to create and store the snapshot, or maybe the target is too low on memory. If a snapshot fails, an Event message and a Double-Take Availability log message are both created and logged.

There are limitations imposed by Microsoft Volume Shadow Copy that impact Double-Take Availability snapshots. For example, Double-Take Availability maintains only 64 snapshots because Volume Shadow Copy only maintains 64 snapshots. If 64 snapshots exist and another one is taken, the oldest snapshots are deleted to make room for the new one. Another example is that Double-Take Availability snapshots must be created within one minute because Volume Shadow Copy snapshots must be created within one minute. If it takes longer than one minute to create the snapshot, the snapshot will be considered a failure. Additionally, Volume Shadow Copy will not revert snapshots of a volume with operating system files, therefore Double-Take Availability is also unable to revert a volume with operating system files. You must also keep in mind that if you are using extended functionality provided by Volume Shadow Copy, you need to be aware of the impacts that functionality may have on Double-Take Availability. For example, if you change the location where the shadow copies are stored and an error occurs, it may appear to be a Double-Take Availability error when it is in fact a Volume Shadow Copy error. Be sure and review any events created by the VolSnap driver and check your Volume Shadow Copy documentation for details.

Snapshots for data workloads

Snapshot states

A snapshot may not necessarily be useful if the data on the target is in a bad state. You only want snapshots of data that is in a good state. Therefore, you need to understand when the data is in a good or bad state.

Action State Description Automatic Action Taken for Scheduled and Automatic Snapshots User Interaction Required for Manual Snapshots
Mirror Started Bad Mirroring has started, but is not complete. The data on the source and target will not be synchronized until the mirror is complete. Scheduled and automatic snapshots will be delayed until the mirror is complete before taking a snapshot. Wait until the mirror is complete and the data is in a good state, then take a manual snapshot.
Mirror Stopped Bad Mirroring has stopped without completing. The data on the source and target will not be synchronized until the mirror is complete. Scheduled and automatic snapshots will be delayed until the mirror has been restarted and is complete before taking a snapshot. Restart the mirror, wait until it is complete and the data is in a good state, and then take a manual snapshot.
Mirror Complete Good Because the mirror is complete, the data on the source and target is synchronized. Double-Take Availability will take a snapshot while the data is in a good state. Scheduled and automatic snapshots will occur normally. Manual snapshots can be taken normally.
Write Operation Retried Good An operation cannot be written to the hard drive on the target. For example, the file could be in use by another application on the target. Scheduled and automatic snapshots will occur normally, although the operation that is being retried will not be included in the snapshot. Manual snapshots can be taken normally, although the operation that is being retried will not be included in the snapshot.
Write Operation Dropped Bad An operation could not be written to the hard drive on the target, even after multiple retries. For example, the file could be in use by another application on the target.

An automatic snapshot will be taken just prior to the operation being dropped.

Scheduled snapshots will be delayed until the target data is back in a good state.

Start a mirror, wait until it is complete and the data is in a good state, and then take a manual snapshot.
Write Operation Succeeded Good An operation that was retrying on the target has been successfully written to the hard drive. Scheduled and automatic snapshots will occur normally. Manual snapshots can be taken normally.
Target Restarted with Connection Persistence Good The target service was able to persist connection information prior to restarting. Scheduled and automatic snapshots will occur normally. Manual snapshots can be taken normally.
Target Restarted without Connection Persistence Bad The target service has been restarted and was unable to persist connection information, therefore, operations that were in the queue have been lost.

An automatic snapshot will be taken after the target restarts, if the target data was in a good state prior to the target restart and the connection is configured to auto-remirror on auto-reconnect.

Scheduled snapshots will be delayed until the target data is back in a good state.

Start a mirror, wait until it is complete and the data is in a good state, and then take a manual snapshot.
Restore Required Good or Bad The data on the target no longer matches the data on the source because of a failover. This does not necessarily mean that the data on the target is bad. Scheduled and automatic snapshots will be delayed until a restore is completed or the Restore Required state is overruled by a mirror. Once the restoration or mirror is complete, automatic and scheduled snapshots will occur normally. Restore the target data back to the source or overrule the Restore Required state by performing a mirror. Once the restoration or mirror is complete, manual snapshots can be taken normally.
Snapshot Reverted Good or Bad The data on the target no longer matches the data on the source because a snapshot has been applied on the target. This does not necessarily mean that the data on the target is bad. Scheduled and automatic snapshots will be delayed until a restore is completed or the Snapshot Reverted state is overruled by a mirror. Once the restoration or mirror is complete, automatic and scheduled snapshots will occur normally. Restore the target data back to the source or overrule the Snapshot Reverted state by performing a mirror. Once the restoration or mirror is complete, manual snapshots can be taken normally.
Restore Complete Good Because the restoration is complete, the data on the source and target is synchronized. Scheduled and automatic snapshots will occur normally. Manual snapshots can be taken normally.

To be completely assured that your data on the target is good, automatic and scheduled snapshots only occur when the data is in a good Double-Take Availability state. However, manual snapshots can be taken during any state. There are instances when you may want to take a manual snapshot, even if the target data is in a bad state. For example, if you drop an operation, that does not necessarily mean your data on the target is corrupt or the target would be unable to stand in for the source in the event of a failure. A snapshot of a bad state may be useful and usable, depending on your environment. If your source is a file server and an operation has been dropped, it is just one user file that is out-of-date. All of the remaining target files are intact and can be accessed in the event of a failure.

However, if your source is an application server and an operation has been dropped, that one file could cause the application not to start on the target in the event of a failure. In these cases, manual snapshots of a bad state depend on the context of your environment.

Note: Because the driver for Volume Shadow Copy is started before the driver for Double-Take Availability, if you revert any files on the source that are contained in your replication set, Double-Take Availability will not be aware of the revert and, therefore, the file change will not be replicated to the target. The file change will be mirrored to the target during the next mirroring process.

Automatic snapshots

When Double-Take Availability transitions from a good state to a bad state, it will automatically attempt to take a snapshot of the data before it leaves the good state and enters the bad state. For example, if your data is in a good state and you start a mirror, before the mirror is started, Double-Take Availability will automatically take a snapshot of the target. In the event the mirror fails to complete, you will have a snapshot of the data on the target when it was in its last good state.

Only one automatic snapshot per connection is maintained on the target. When an automatic snapshot is taken, it replaces any previous automatic snapshots.

Scheduling snapshots

You can schedule snapshots of your target data to fit your environment and needs. If the target data is in a bad state at the time of a scheduled snapshot, the snapshot will be delayed until the data on the target reaches a good state. If multiple scheduled snapshots are delayed, only one snapshot will be taken when the data reaches a good state.

  1. Open the Replication Console.
  2. Right-click the connection on the right pane of the Replication Console and select Connection Manager.
  3. Select the Snapshot tab. You will not see the Snapshots tab if your server does not meet the snapshot requirements.

  1. Select Enable Scheduled Snapshots.
  2. Specify when snapshots should be taken, indicating minutes, hours, or days. The snapshots should be at least 15 minutes apart. By default, a snapshot is taken every hour.
  3. Specify if you want the snapshots to start immediately. Otherwise, enter a date and time for when the snapshot schedule will begin.
  4. Click OK to save the settings.

Taking snapshots manually

You can manually take a snapshot of the data on the target at any time. If an automatic or scheduled snapshot is currently in progress, Double-Take Availability will wait until that one is finished before taking the manual snapshot. Open the Replication Console, right-click the connection, and select Snapshot Now.

Managing full-server and application snapshots

By default, snapshots are enabled for full-server and application protections. Also by default, a snapshot is taken every 60 minutes. This may lead to numerous snapshots on the target that you may want to manage. You can do that from the Full-Server Failover Manger by selecting Actions, Snapshot Manager or from the Application Manager by selecting Tools, Manage Snapshots. (These options are only available when a source and target are selected and protection is enabled.)

Use the following options to manage your full-server and application workload snapshots. (The dialog box will appear different between the Full-Server Failover Manager and the Application Manager, but the options are the same.)

Note:

The Schedule options at the top of the are the same options from when you configured protection. If you change the options in one location, they will be changed in the other location too.

The Existing Snapshots list only contains snapshots from full-server and application protection workloads. Snapshots from other utilities and tools will not be listed.

Security

To ensure protection of your data, Double-Take Software products offer multi-level security using native operating system security features. Privileges are granted through membership in user groups defined on each machine. To gain access to a source or target, the user must provide a valid operating system user name and password and the specified user name must be a member of one of the Double-Take Availability security groups. Once a valid user name and password have been provided and the source or target has verified membership in one of the security groups, the user is granted appropriate access to the source or target and the corresponding features are enabled in the client. Access is granted on one of the following three levels.

Although passwords are encrypted when they are stored, Double-Take Software security design does assume that any machine running the client application is protected from unauthorized access. If you are running the client and step away from your machine, you must protect your machine from unauthorized access.

Security credentials

When a client machine attempts to access a source or target machine running on Windows, it will attempt to automatically logon to the source or target using the three methods below.

The client tries each of these three methods until a set of credentials granting Administrator access is found. If no credentials granting Administrator access are found, the client attempts to find a set of credentials granting Monitor access. If no credentials grant Monitor access, the user must manually logon to the source or target by providing a user name, password, and domain.

Note: If a user name exists both on the local machine and on the network, Windows first attempts to login to the machine with the local user name and password and ignores the domain. If this fails, it then tries to login with the network user name, password and domain.

Adding users to the security groups

The security groups are automatically created during the installation process. The groups are assigned specific case-sensitive names.

The local administrator and the domain administrator are automatically added to the Double-Take Admin group.

Note: If Double-Take Availability is installed on a member servers, it will use the local groups. If an Active Directory user is granted access to the Active Directory Double-Take Admin or Double-Take Monitors groups, the user or domain group must also be granted access to the local Double-Take Availability groups. If Double-Take Availability is installed on a domain controller, the Active Directory group will provide sufficient access. The groups are created in the Users OU and need to stay here. If the groups are not there, users will be unable to log into Double-Take Availability on the domain controller.

Users that need administrator access to Double-Take Availability must be added to the Double-Take Admin group. All users that need monitor only access must be added to the Double-Take Monitors group. In both cases, local users, domain users, or global groups may be added to the local groups.

To add, delete, or modify users for a group, follow these steps.

  1. Select Start, Programs, Administrative Tools, and User Manager. (If you are on a domain controller, select User Manager for Domains.)
  2. Double-click the group to be modified or highlight it and select User, Properties.
  3. To add local users, domain users, and/or global groups to the group, click Add.
  4. Select the local user, domain user, and/or global group to be included in the security group.
  5. Click OK to return to the Local Group Properties dialog box.
  6. Click OK to return to the User Manager.
  7. Exit the User Manager.

Changing the account used to run the Double-Take service

By default, the Double-Take service is configured to log on as the system account. If you want to select a specific account to run the service, use these instructions.

Note: If you are protecting full-server workloads, you cannot modify the account used to run the Double-Take service. Otherwise, the full-server protection will not function correctly.
  1. Modify the user account that the Double-Take service is using.
  1. Open the Double-Take service settings by selecting Start, Programs, Administrative Tools, Services and double-clicking the Double-Take service.
  2. Select the Log On tab, select This Account, and enter a valid domain account.
  3. Enter the password for this account.
  4. Click OK to save these settings.
  1. Grant an additional user right to the account you are using to run the Double-Take service.
  2. Note:

    If domain-level policy settings are defined (through Domain Security Policy, Security Settings, Local Policies, User Rights Assignment), they will override local policy settings.

  1. Select Start, Programs, Administrative Tools, Local Security Policy.
  2. Expand the Local Policies folder and highlight the User Rights Assignment folder.
  3. Double-click the option Act as part of operating system on the right pane of the screen.
  4. Add the user that you selected to run the Double-Take service and click OK.
  5. Exit the Local Security Settings dialog box. This user is now configured to run the Double-Take service.
  1. Add the domain account to the local administrator group.
  1. Select Start, Programs, Administrative Tools, Computer Management.
  2. Expand the Local Users and Groups folder and highlight the Groups folder.
  3. Right-click on the Administrators group on the right pane of the screen and select Add to Group.
  4. Click Add.
  5. Locate the domain account that you are using for the Double-Take service. Select that account and click OK.
  6. Click OK to close the Administrators Properties dialog box.
  7. The domain account is now added to the local administrator group. Close the Computer Management window.

Configuring the Double-Take service for Active Directory

If you want to use Active Directory registration, the Double-Take service must have privileges to modify Active Directory. There are two options for assigning the privileges.

  1. Select Start, Programs, Administrative Tools, Active Directory Users and Computers.
  2. Verify that Advanced Features is enabled on the View menu so that the System folder is displayed.
  3. Expand the System folder and select WinsockServices.
  1. Select the Security tab.
  2. Click Add and select the specific computer account you are running Double-Take Availability on or Domain Computers to allow all computers within the domain to update Active Directory.
  3. Grant both Read and Write access and click OK.
  4. Note:

    If your corporate policies require that only the minimum required privileges be supplied, you can select only the permissions listed below by modifying the Advanced permissions for the account.

    • List Contents
    • Read All Properties
    • Write All Properties
    • Read Permissions

Evaluations

You may want to evaluate Double-Take Availability before implementing it in your production environment. This is a good process for users who want to see, first-hand, the benefits that Double-Take Availabilityhas to offer.

The evaluation processes walk you through a step-by-step process to assess the key Double-Take Availability features. Select a link below based on the type of evaluation you would like to perform.

For the evaluation, you should install in a test environment. Do no use actual production servers because you will be forcing a failure during the evaluation.

 

Evaluating data protection

The following evaluation procedure has eleven tasks containing step-by-step instructions for evaluating the data protection functionality of Double-Take Availability.

Before starting this evaluation procedure, make sure you have reviewed the server requirements and that you have installed the software on both the source and target.

Also, you should have approximately 500 MB to 1 GB of data on the source for testing. If you are going to be protecting application data, make sure the application is pre-installed on the target, but the application is not running on the target. If the application is running on the target, the files will be held open and Double-Take Availability will not be able to write to the files. In the event of a source failure, the application can be started on the target and the files can then be accessed.

Note: For the evaluation, you should install in a test environment. Do no use actual production servers because you will be forcing a failure during the evaluation.

This evaluation consists of the following tasks.

1. Establishing a connection
  1. Open the Replication Console.
  2. Click Make a connection from the right pane of the Replication Console. If that quick launch screen is no longer visible, select Tools, Connection Wizard.
  3. Note:

    If the Double-Take Servers root is highlighted in the left pane of the Replication Console, the Connection Wizard menu option will not be available. To access the menu, expand the server tree in the left pane, and highlight a server in the tree.

  1. The Connection Wizard opens to the Welcome screen. Review this screen and click Next to continue.
  2. Note:

    At any time while using the Connection Wizard, click Back to return to previous screens and review your selections.

  1. If you highlighted a source in the Replication Console, the source will already be selected. If it is not, select the Double-Take Availability source. This is the server that you want to protect. Click Next to continue.
  2. Note:

    Double-Take Availability will automatically attempt to log on to the selected source using the identification of the user logged on to the local machine. If the logon is not successful, the Logon dialog box will appear prompting for your security identification. When logging in, the user name, password, and domain are limited to 100 characters.

  1. If you highlighted a target in the Replication Console, the target will already be selected. If it is not, select the Double-Take Availability target. This is your backup server that will protect the source. Click Next to continue.
  2. Note:

    Double-Take Availability will automatically attempt to log on to the selected target using the identification of the user logged on to the local machine. If the logon is not successful, the Logon dialog box will appear prompting for your security identification. When logging in, the user name, password, and domain are limited to 100 characters.

  1. On the next screen, verify Create a new replication set with this name is selected.
  2. Enter a name for your replication set, and click Next to continue.
  3. A tree display appears identifying the volumes and directories available on your source. Mark the check box of the volumes and/or directories you want to protect. Click Next to continue.
  4. There are two pre-defined locations to store the source data on the target, or you can select a custom location. For this evaluation, select the option Send all data to the same path on the target. This option keeps the directory structure on the source and target identical.
  5. Click Next to continue.
  6. Review your selections on the summary screen. You do not need to set any advanced options for this evaluation, so click Finish. The Connection Wizard will close, the connection will be established, and mirroring and replication will begin.
  7. You will be prompted to save your newly created replication set. Click Yes to save it.
2. Monitoring the activity and completion of the initial mirror

View your new connection in the Replication Console by highlighting the source on the left pane. The connection will appear on the right pane. Use the horizontal scroll bar at the bottom of the right pane to view the various status columns. Pay attention to the Mirror Status column which shows the status of the mirroring operation. During the mirroring process, you will see a percentage of the mirror that has been completed. When the Mirror Status changes to Idle, there is no mirroring activity, meaning your initial mirror has completed.

To view specific mirroring statistics that may be of interest, use the horizontal scroll bar at the bottom of the right pane of the Replication Console window to view the various columns.

Monitoring a data workload contains complete details on all of the Replication Console statistics.

After your mirror is complete, look at your target and you will see the replicated data stored in the location you specified. Now you are ready to continue with the evaluation.

3. Changing data to cause replication

In order to test replication, you need to change the data on your source. This includes modifying existing files, creating new files, deleting files, and changing permissions and attributes.

  1. On the source, browse through the directories and files contained in your replication set.
  2. Select four files from your source and record the file name, date, time, and file size for each file.
  3. On your target, locate those same four files that you just identified on your source. The files on the target match the files on the source.
  4. Back on your source, view the contents of one of your files contained in your replication set and note the file contents.
  5. On your target, view that same file that you just viewed on the source. The file contents on the target match the file contents on the source.
  6. Highlight your source in the left pane of the Replication Console.
  7. Locate the Replication Status and Sent (Bytes) columns in the right pane.
  8. Tile your Replication Console so that you can see it while still having access to your desktop.
  9. On your source, edit the file that you viewed above. Save your changes, and watch the Replication Console statistics as the file change causes replication to occur.
  10. Modify the other three files so that the date, time, and/or size is updated, and again watch the Replication Console statistics as the file changes cause replication to occur. While Double-Take Availability is actively replicating, the status will be Replicating. When there is no replication activity, the status is Ready.
  11. Use the horizontal scroll bars to display additional replication statistics.

Monitoring a data workload contains complete details on all of the Replication Console statistics.

Note:

Many user applications typically save an entire file even though only a portion of the file may have changed. Therefore, the replication statistics will show the entire file being transmitted, not just the changed data. To confirm that replication only transmits the changed segments of files, you must use an application, such as a database application, or a command, such as the echo command, to save only the changed portions of a file.

You may notice your Replication Status toggle between Replicating and Ready as it continues processing the file changes, when your Replication Status stays at Ready, Double-Take Availability is waiting for additional changes to transmit. After replication is complete, you are ready to continue with the evaluation.

4. Verifying the data changes on the target

Now that you have modified some of the files, you want to be sure that the file modifications were applied correctly.

Note:

Because of the way the Windows Cache Manager handles memory, machines that are doing minimal or light processing, as you are in this evaluation, may have file operations that remain in the cache until additional operations flush them out. This may make Double-Take Availability files on the target appear as if they are not synchronized. When the Windows Cache Manager releases the operations in the cache on the source, the files will be updated on the target. To make sure this does not impact your testing, flush the cache by copying a couple of files from one directory to another and then deleting them.

  1. Browse your source and target. Compare the directory structures and the total number of files.
  2. Look again at the four files you modified earlier. Verify manually that the changes you made have been applied to the target copy of the file.
  3. Right-click the connection on the right pane of the Replication Console and select Verify. You will see two choices on the Start Verification dialog box.
  1. Select Verify only and click OK.

Just like when you were monitoring the mirror and replication processes, you can monitor the verification process. Notice that the Mirror Status column changes to Verifying while the verification process occurs. When the verification is complete, Double-Take Availability will have created a log file for you to review.

  1. Wait until your Mirror Status has returned to Idle and then open the file DTVerify.log located in the Double-Take Availability installation directory on your source. You will see that all of the files are reported as the same.
  2. Modify one of your files on the target and repeat the verification process, but this time, select Remirror files to the Target automatically.
  3. Note:

    Since your target file is newer, make sure that Only if Source file is newer than Target copy is not selected.

  4. Look at the file on the target that you modified and confirm that your changes are gone. The source version has overwritten the file on the target.
5. Testing your target data

At this point in your evaluation, you may want to test your target data. The type of testing you will need to perform will depend on the type of data you are protecting.

  1. In order to test the application data on the target, you will need to start the application on the target. But Double-Take Availability requires applications to be in a standby mode in order to update files on the target. In order to meet both of those requirements, you will need to pause the target. When you pause the target, the source begins to queue the data changes that are occurring. This will give you an opportunity to start the services on the target, test the data, stop the services, and then resume the target. Make sure your mirror is Idle and then pause the target by right-clicking the connection in the Replication Console and selecting Pause Target.
  2. Once the target is paused, you can start the application services on the target. Test the application data by using clients to connect to the application. For this evaluation, the clients will need to be configured to access the application from the target. In a real-world scenario, if failover has occurred, the target would be standing in for the source and the clients would still be accessing the application from the source identity.
  3. After you have completed your testing, stop the application services on the target.
  4. After the application services on the target have been stopped, you can resume your target through the Replication Console by right-clicking the connection and selecting Resume Target.
  5. While you were testing the application on the target, the application files were updated on the target, thus your source and target are no longer synchronized. You will need to perform a manual remirror to resynchronize the files on the source and target. Right-click the connection and select Mirroring, Start. Select a File differences mirror. Make sure that Send data only if Source is newer than Target is not selected. Since your target files are actually newer than the source (because of the testing you performed), you do want the newer files on the target to be overwritten by the files from the source. Click OK to begin the mirror.

When the mirror is complete, your source and target will again be synchronized and you can continue with your evaluation.

6. Configuring failover monitoring

The following instructions will configure failover monitoring.

  1. Open the Failover Control Center.
  2. Select your target from the Target Machine list box.
  3. Click Login to login to the selected target.
  4. Click Add Monitor. The Insert Source Machine dialog box appears in front of the Monitor Settings dialog box.
  5. Type in your source machine name and click OK. The Insert Source Machine dialog box will close and the Monitor Settings dialog box will be available for updating. This is where you configure failover monitoring.
  6. Select the source to be monitored by marking the check box to the left of the source server name in the Names to Monitor tree.

  1. By default, Failover Hostname is disabled. This option automatically removes the host SPN (Service Principle Name) from Active Directory on the source and adds it to Active Directory on the target. If you are using Active Directory, enable this option or you may experience problems with failover.
  2. Failback Hostname returns the host SPN on the source and target back to their original settings on failback. If you are using Active Directory, enable this option or you may experience problems with failback.
  3. If you are failing over or failing back hostnames, you need to specify an Active Directory user that has update privileges within Active Directory. Click Credentials and identify a user and the associated password that has privileges to create and delete SPNs. The username must be in the format fully_qualified_domain\user. The Active Directory account password cannot be blank. Click OK to return to the Monitor Settings dialog box.

At this point, in terms of your evaluation, your failover configuration is complete because you will be using the default settings for the remaining options. But while you are viewing the Monitor Settings dialog box, notice the flexible configuration options available to you.

7. Monitoring failover

Since it can be essential to quickly know the status of failover, Double-Take Availability offers various methods for monitoring the state of failover. When the Failover Control Center is running, you will see four visual indicators.

Note:

You can minimize the Failover Control Center and, although it will not appear in your Windows taskbar, it will still be active and the failover icon will still appear in the desktop icon tray.

The Failover Control Center does not have to be running for failover to occur.

Monitoring failover monitoring contains more information on the Failover Control Center visual indicators.

8. Simulating a failure

To fully evaluate failover, you need to simulate a failure. The Failover Control Center does not have to be running in order for failover to occur, but for the purpose of this evaluation, make sure that it is running so that you can see each step of the process.

  1. Ping the source’s IP address from a client machine.
  2. Ping the source’s machine name from a client machine.
  3. Disconnect the network cable(s) on the source. Notice immediately, that the Failover Control Center Time to Fail counter decreases and never resets. You will see the icons change to yellow and eventually to red. Once the icons are red and the Failed Over message is displayed, failover has occurred.
  4. You will be prompted to determine how to apply the data in queue on the target. Select Apply Data in Target Queues Then Failover. Once the icons are red and the Failed Over message is displayed, failover has occurred.
  5. Note:

    The Event log on the target provides details on the actual steps that have occurred during failover.

  1. Ping the source’s IP address from a client machine.
  2. Ping the source’s machine name from a client machine.

As you can see, the target has taken on the identity of the source. Application and user requests destined for the source are routed directly to the target. The impact on your end users is minimal.

9. Simulating data changes after failover

While your source is failed over to your target, end users continue to work without interruption and the data on the target will be updated. To fully evaluate the next step, restoration, simulate the changes that the end users would have made on the target while the source was unavailable.

  1. Identify the file that you edited earlier on the source.
  2. Locate that same file on the target and make edits to it. Save the changes.
  3. Repeat that process, modifying the other three files from earlier, but this time make the modifications on the target copy of the file. Save the changes.

If desired, you can also test the target data as you did earlier. You can test user data using the associated application, and you can save the changes if desired. If you want to test application data, start the application services on the target, and test the application data by using clients to connect to the application. Because the source is now failed over, you will not need to worry about pausing the target or configuring clients to access the application from the target. The clients will continue to access the source, which is now being handled by the target machine.

10. Initiating failback

When failover occurs, a source machine has failed. The steps below must be used to complete failback, which releases the source identity from the target.

  1. If this were a real failure scenario and not an evaluation, you would first verify that your source machine is not connected to the network. If it is, you would have to disconnect it from the network.
  2. Next you would resolve the source machine problem that caused the failure.
  3. Warning: Do not connect the source machine to the network at this time.
  4. In the Failover Control Center, select the target that is currently standing in for the failed source.
  5. Select the failed source and click Failback.

  1. You will be prompted to determine if you want to continue monitoring the source. Do not make any selections at this time.
  2. At this time, you would connect the source to the network. For this evaluation, reconnect the network cable(s) on the source that you disconnected to simulate the failure.
  3. After the source is online, select Stop in the Failover Control Center to indicate that you do not want to continue monitoring the source.

At this time, your target is back to its original identity and the source is back online.

11. Restoring your data

The Replication Console provides an easy method for restoring replicated data from the target back to the original source or to a new source server. You are only required to input the original source, the target, and the name of the replication set you want to restore. Double-Take Availability handles the rest, including selecting the files in the replication set and restoring them to the correct location.

  1. From the Replication Console, select Tools, Restoration Manager.

  1. Identify the Original Source machine. This is your source machine where the data originally resided.
  2. Select the Restore From machine. This is the target machine where the copy of the data is stored.
  3. Replication Set contains the replication set information stored on the target machine (the machine in Restore From). If no replication sets are available, the list will be blank. Select the replication set that corresponds to the data that you need to restore.
  4. Select the Restore To machine. For this evaluation, select the original source. This is the machine where the copy of the data will be sent.
  5. The Restore To and Restore From paths will automatically be populated when the replication set is selected. The restore to path is the directory that is the common parent directory for all of the directories in the replication set. If the replication set crosses volumes, then there will be a separate path for each volume. The restore from path is the path on the target server where the replicated files are located.
  6. Use the default settings for the remaining restoration options.
  7. Click Restore to begin the restoration.
  8. After the restoration is complete, disconnect the restoration connection. You can identify a restoration connection because it is enclosed in parenthesis ( ) and it has _Restore appended to the end of the replication set name.

Once the restoration is complete, your evaluation is complete. Congratulations!

Evaluating full-server protection

The following evaluation procedure has five tasks containing step-by-step instructions for evaluating the full-server protection functionality of Double-Take Availability.

Before starting this evaluation procedure, make sure you have reviewed the server requirements and that you have installed the software on both the source and target. Also, make sure that the target you select is compatible to stand-in as the source.

Note: For the evaluation, you should install in a test environment. Do no use actual production servers because you will be forcing a failure during the evaluation.

This evaluation consists of the following tasks.

1. Establishing full-server protection
  1. Login as a user that is a member of both the Double-Take Admin and local Administrators security groups.
  2. Open the Full-Server Failover Manager.
  3. Enter your source and target servers. You can click Browse when selecting either server to locate it by drilling down through your network. After you have specified a server name, enter login credentials when prompted. Once the server is selected and logged in, the Properties tab at the bottom of the Full-Server Failover Manager updates to display the server’s properties.

  1. Optional protection settings are available but are not required for the evaluation. Feel free to review the optional settings, if desired. A complete description of each setting can be found in Optional full-server protection settings.
  2. You must validate that your target is compatible with your source and can stand-in if the source fails. Click Validate configuration. The Validation tab at the bottom of the Full-Server Failover Manager updates to display the validation check. Errors are designated by a white X inside a red circle. Warnings are designated by a black exclamation point (!) inside a yellow triangle. A successful validation is designated by a white checkmark inside a green circle.

  1. Double-click on any of the validation items to see details. You must correct any errors before you can enable protection. Depending on the error, you may be able to click Fix or Fix All and let Double-Take Availability correct the problem for you. For those errors that Double-Take Availability cannot correct automatically, you will need to modify the target to correct the error, or you can select a different target. You must revalidate the selected servers until the validation check passes without errors.
  2. Once the validation check passes without errors, click Enable Protection to begin monitoring.
2. Monitoring the activity and completion of the initial mirror

After you have enabled full-server protection, you can monitor the protection from the Full-Server Failover Manager. The Protection Status is displayed in the right center of the Full-Server Failover Manager. You can tell the status of your protection from this field.

  1. Watch as the mirroring percentage increases. When the mirroring is complete, the status will change to Enabled.
  2. Look at your target and you will see the data from the source.

Once protection is Enabled, if the source should fail, the target can stand-in for the source.

3. Changing data to cause replication and verifying the data changes

In order to test replication, you need to change the data on your source. This includes modifying existing files, creating new files, deleting files, and changing permissions and attributes.

  1. On the source, browse through the directories and files.
  2. Select four data files from your source and record the file name, date, time, and file size for each file.
  3. On your target, locate those same four files that you just identified on your source. The files on the target match the files on the source.
  4. Back on your source, view the contents of one of your data files and note the file contents.
  5. On your target, view that same file that you just viewed on the source. The file contents on the target match the file contents on the source.
  6. On your source, edit the file that you viewed above and save your changes.
  7. Modify the other three files so that the date, time, and/or size is updated.
  8. Verify the changes that you made on the source have been applied to the target copy of the file.
  9. Note:

    Because of the way the Windows Cache Manager handles memory, machines that are doing minimal or light processing, as you are in this evaluation, may have file operations that remain in the cache until additional operations flush them out. This may make Double-Take Availability files on the target appear as if they are not synchronized. When the Windows Cache Manager releases the operations in the cache on the source, the files will be updated on the target. To make sure this does not impact your testing, flush the cache by copying a couple of files from one directory to another and then deleting them.

4. Simulating a failure

To fully evaluate failover, you need to simulate a failure. To do this, power off the source. Watch as the status changes to Failover condition met.

5. Starting failover

When a failover condition is met, you will want to start failover. You can actually start failover without a failover condition, as long as protection is enabled. For example, you may want to force a failover when upgrading to a better source server.

Note: If you are testing failover and your source is a domain controller, do not let the domain controller communicate with any other production domain controllers after failover. Otherwise, when the original source domain controller is brought online after the test, it may create a USN rollback scenario if the test domain controller was allowed to communicate with other production domain controllers.
  1. To begin failover, click Failover.
  2. If Double-Take Availability determines there is a possibility that the data on the target is incomplete, you will be warned before failover begins. If you proceed with failover, the state of the source will be unknown until failover is complete. The best case scenario would be a missing data file, while the worst case scenario would be missing system state data that causes the server to be unusable or unbootable. For this evaluation, select Use live data and click OK.

  1. Monitor the failover percentage as shown in the Protection Status. At the end of failover, the target will be rebooted automatically. After the reboot, the target will no longer exist, since it will become the source.
  2. Note: Because the Windows product activation is dependent on hardware, you may need to reactivate your Windows registration after failover. Follow the on-screen prompts to complete the reactivation.

After your target has failed over and becomes your source, you can stay with that configuration long term. However, in some instances, it may be necessary or desired to go back to using the original hardware after you have failed over.