The following evaluation procedure has eleven tasks containing step-by-step instructions for evaluating the data protection functionality of Double-Take Availability.
Before starting this evaluation procedure, make sure you have reviewed the server requirements and that you have installed the software on both the source and target.
Also, you should have approximately 500 MB to 1 GB of data on the source for testing. If you are going to be protecting application data, make sure the application is pre-installed on the target, but the application is not running on the target. If the application is running on the target, the files will be held open and Double-Take Availability will not be able to write to the files. In the event of a source failure, the application can be started on the target and the files can then be accessed.
Note: | For the evaluation, you should install in a test environment. Do no use actual production servers because you will be forcing a failure during the evaluation. |
This evaluation consists of the following tasks.
Note: |
If the Double-Take Servers root is highlighted in the left pane of the Replication Console, the Connection Wizard menu option will not be available. To access the menu, expand the server tree in the left pane, and highlight a server in the tree. |
Note: |
At any time while using the Connection Wizard, click Back to return to previous screens and review your selections. |
Note: |
Double-Take Availability will automatically attempt to log on to the selected source using the identification of the user logged on to the local machine. If the logon is not successful, the Logon dialog box will appear prompting for your security identification. When logging in, the user name, password, and domain are limited to 100 characters. |
Note: |
Double-Take Availability will automatically attempt to log on to the selected target using the identification of the user logged on to the local machine. If the logon is not successful, the Logon dialog box will appear prompting for your security identification. When logging in, the user name, password, and domain are limited to 100 characters. |
View your new connection in the Replication Console by highlighting the source on the left pane. The connection will appear on the right pane. Use the horizontal scroll bar at the bottom of the right pane to view the various status columns. Pay attention to the Mirror Status column which shows the status of the mirroring operation. During the mirroring process, you will see a percentage of the mirror that has been completed. When the Mirror Status changes to Idle, there is no mirroring activity, meaning your initial mirror has completed.
To view specific mirroring statistics that may be of interest, use the horizontal scroll bar at the bottom of the right pane of the Replication Console window to view the various columns.
Monitoring a data workload contains complete details on all of the Replication Console statistics.
After your mirror is complete, look at your target and you will see the replicated data stored in the location you specified. Now you are ready to continue with the evaluation.
In order to test replication, you need to change the data on your source. This includes modifying existing files, creating new files, deleting files, and changing permissions and attributes.
Monitoring a data workload contains complete details on all of the Replication Console statistics.
Note: |
Many user applications typically save an entire file even though only a portion of the file may have changed. Therefore, the replication statistics will show the entire file being transmitted, not just the changed data. To confirm that replication only transmits the changed segments of files, you must use an application, such as a database application, or a command, such as the echo command, to save only the changed portions of a file. |
You may notice your Replication Status toggle between Replicating and Ready as it continues processing the file changes, when your Replication Status stays at Ready, Double-Take Availability is waiting for additional changes to transmit. After replication is complete, you are ready to continue with the evaluation.
Now that you have modified some of the files, you want to be sure that the file modifications were applied correctly.
Note: |
Because of the way the Windows Cache Manager handles memory, machines that are doing minimal or light processing, as you are in this evaluation, may have file operations that remain in the cache until additional operations flush them out. This may make Double-Take Availability files on the target appear as if they are not synchronized. When the Windows Cache Manager releases the operations in the cache on the source, the files will be updated on the target. To make sure this does not impact your testing, flush the cache by copying a couple of files from one directory to another and then deleting them. |
Just like when you were monitoring the mirror and replication processes, you can monitor the verification process. Notice that the Mirror Status column changes to Verifying while the verification process occurs. When the verification is complete, Double-Take Availability will have created a log file for you to review.
Note: |
Since your target file is newer, make sure that Only if Source file is newer than Target copy is not selected. |
At this point in your evaluation, you may want to test your target data. The type of testing you will need to perform will depend on the type of data you are protecting.
When the mirror is complete, your source and target will again be synchronized and you can continue with your evaluation.
The following instructions will configure failover monitoring.
At this point, in terms of your evaluation, your failover configuration is complete because you will be using the default settings for the remaining options. But while you are viewing the Monitor Settings dialog box, notice the flexible configuration options available to you.
Since it can be essential to quickly know the status of failover, Double-Take Availability offers various methods for monitoring the state of failover. When the Failover Control Center is running, you will see four visual indicators.
Note: |
You can minimize the Failover Control Center and, although it will not appear in your Windows taskbar, it will still be active and the failover icon will still appear in the desktop icon tray. The Failover Control Center does not have to be running for failover to occur. |
Monitoring failover monitoring contains more information on the Failover Control Center visual indicators.
To fully evaluate failover, you need to simulate a failure. The Failover Control Center does not have to be running in order for failover to occur, but for the purpose of this evaluation, make sure that it is running so that you can see each step of the process.
Note: |
The Event log on the target provides details on the actual steps that have occurred during failover. |
As you can see, the target has taken on the identity of the source. Application and user requests destined for the source are routed directly to the target. The impact on your end users is minimal.
While your source is failed over to your target, end users continue to work without interruption and the data on the target will be updated. To fully evaluate the next step, restoration, simulate the changes that the end users would have made on the target while the source was unavailable.
If desired, you can also test the target data as you did earlier. You can test user data using the associated application, and you can save the changes if desired. If you want to test application data, start the application services on the target, and test the application data by using clients to connect to the application. Because the source is now failed over, you will not need to worry about pausing the target or configuring clients to access the application from the target. The clients will continue to access the source, which is now being handled by the target machine.
When failover occurs, a source machine has failed. The steps below must be used to complete failback, which releases the source identity from the target.
Warning: | Do not connect the source machine to the network at this time. |
At this time, your target is back to its original identity and the source is back online.
The Replication Console provides an easy method for restoring replicated data from the target back to the original source or to a new source server. You are only required to input the original source, the target, and the name of the replication set you want to restore. Double-Take Availability handles the rest, including selecting the files in the replication set and restoring them to the correct location.
Once the restoration is complete, your evaluation is complete. Congratulations!