Use these instructions to protect a virtual machine on a Hyper-V server or cluster, where you want to protect the host-level virtual disk files (the .vhd files), to a virtual server on a Hyper-V server.
Specify your source server. This is the Hyper-V source that contains the virtual machine that you want to protect.
Server/Cluster—Specify the name or IP address of the Hyper-V server or cluster that is hosting the virtual machine that you want to protect. You can click Browse to select a server from a network drill-down list.
Note: If you enter the source server's fully-qualified domain name, the Double-Take Console will resolve the entry to the server short name. If that short name resides in two different domains, this could result in name resolution issues. In this case, enter the IP address of the server.
Choose the virtual machine on the Hyper-V source that you want to protect. The list of virtual machines will vary depending on whether your source is a Hyper-V server, cluster, or node. Select a virtual machine from the list and click Next to continue.
Specify the Hyper-V target server where you will store the replica of the source server.
Server—Specify the name or IP address of the Hyper-V target server. You can click Browse to select a server from a network drill-down list.
Note: If you enter the target server's fully-qualified domain name, the Double-Take Console will resolve the entry to the server short name. If that short name resides in two different domains, this could result in name resolution issues. In this case, enter the IP address of the server.
Select a home folder on the Hyper-V target for the replica virtual machine.
Configure the replica virtual machine. The fields on this page will vary depending on your selections.
Advanced settings for network configuration—These options are only displayed if you have enabled the advanced settings and supplied valid credentials. For each Source virtual machine network adapter, you can specify Target IP addresses, Default Gateways, and DNS Server addresses.
Note: Updates made during failover will be based on the network adapter name when protection is established. If you change that name, you will need to delete the job and re-create it so the new name will be used during failover.
If you update one of the advanced settings (IP address, gateway, or DNS server), then you must update all of them. Otherwise, the remaining items will be left blank. If you do not specify any of the advanced settings, the replica virtual machine will be assigned the same network configuration as the source.
Specify your protection settings.
Monitor for failover—Select this option if you want the target to actively monitor the source for a failure. Specify the Monitoring interval, which is the number of seconds between monitor requests sent from the target to the source to determine if the source is online, and the Number of missed intervals that trigger failover, which is the number of monitor replies sent from the source to the target that can be missed before assuming the source has failed.
Note: To achieve shorter delays before failover, use lower interval and missed interval values. This may be necessary for servers, such as a web server or order processing database, which must remain available and responsive at all times. Lower values should be used where redundant interfaces and high-speed, reliable network links are available to prevent the false detection of failure. If the hardware does not support reliable communications, lower values can lead to premature failover. To achieve longer delays before failover, choose higher values. This may be necessary for servers on slower networks or on a server that is not transaction critical. For example, failover would not be necessary in the case of a server restart.
When you are satisfied with your workflow selections, click Finish, and you will automatically be taken to the Monitor Connections page.
Note: Once protection is established, Double-Take Availability monitors the virtual disks of the protected virtual machine for changes to the disk layout. If a new virtual hard disk is added to the virtual machine, the protection job will automatically be updated to include the new virtual hard disk, and a file difference mirror will automatically start. However, if a virtual hard disk is removed from the protected virtual machine, the virtual hard disk will not be removed from the projection job until it is deleted from the source or the protection job is deleted and re-created.
If your source is a cluster and the Double-Take service on the source is stopped and restarted but failover is not initiated, you will need to manually bring the Double-Take Source Connection resource back online in order for your Hyper-V job to reconnect and transition to a good state.