Use the following steps to protect a standard cluster, where a single copy of data resides on a SCSI disk that is shared between cluster nodes. You will be using the Double-Take Source Connection cluster resource to protect your standard cluster.
If your source is a cluster, create a virtual server (including resources for an IP address, network name, and physical disk) on the source cluster. With this configuration, users will access their data from the source cluster, regardless of which node is currently in control. MSCS will handle failover between the nodes of the cluster. Double-Take Availability will handle failover between the source cluster and the target (cluster or standalone). See your Microsoft documentation if you need assistance creating a virtual server on the source cluster.
On your source, create a replication set from the Replication Console.
Note: If your source is a cluster, you need to create the replication set on the node which currently owns the group with the virtual server you want to protect.
Expand the tree under the replication set name to view the volume and directory tree for the source.
Note: The default number of files that are listed in the right pane of the Replication Console is 2500, but this is user configurable. A larger number of file listings allows you to see more files in the Replication Console, but results in a slower display rate. A smaller number of file listings displays faster, but may not show all files contained in the directory. To change the number of files displayed, select File, Options and adjust the File Listings slider bar to the desired number.
To hide offline files, such as those generated by snapshot applications, select File, Options and disable Display Offline Files. Offline files and folders are denoted by the arrow over the lower left corner of the folder or file icon.
Identify the data on the source associated with the group that you want to protect by selecting volumes, drives, directories, and/or specific files. Be sure and verify what files can be included in your replication set.
If your source is a cluster, you need to create a duplicate replication set on each of the other nodes in the cluster. Because the other nodes do not currently own the files, you will not be able to browse to select the data like you did on the first node. Therefore, you will have to manually enter the replication set data.
Note: As an alternative to the following manual steps, you can stop the Double-Take service on the other nodes of the source cluster, copy the file DblTake.db from the first node to the other nodes, and then restart the Double-Take service.
Right-click the replication set created on the owning node and select Properties.
Enter the exact same replication set rules you recorded from the owning node. Be sure and mark the correct Include, Exclude and Recurse sub-directories options that need to be applied.
Note: Each replication set rule on the non-owning nodes must be identical to the replication set rule on the owning node.
In the Replication Console, right-click a node of the source cluster and select Properties.