Restoring before failing back allows your users to continue accessing their data on the failed over target, which is standing in for the source, while you perform the restoration process. The key to this process is to keep the users off of the source, but allow the source and target to communicate to perform the restoration.
- Locate the file connect.sts on the source where you installed Double-Take Availability and rename it to connect.sts.old. This will keep the original connection from reconnecting when you bring the source online.
- Resolve the problem(s) on the source that caused it to fail. Make sure in resolving the problems, that you do not bring the source on the network at this time because the target currently has the source’s identity because of failover.
- Disable all of the NICs on the source.
- Change one of the NICs on the source to a unique IP address that the target can access.
- Configure that IP address so that it does not automatically register with DNS. This option is on the Advanced TCP/IP Settings dialog box on the DNS tab.
- Do not enable the modified NIC yet. If you do, you will receive a network name conflict, because the target has the source’s identity because of failover. There are many variations for dealing with a name conflict, here are a few examples.
- Enable the modified NIC, knowing you will get the name conflict error. Disregard the error. Change the source name to a unique name in the domain and reboot when prompted.
- Change the source name to a unique name in a workgroup, not in the domain, and reboot when prompted. Enable the modified NIC.
- Stop the Workstation and Server services on the source. You may be prompted to stop other services. Stop those services also and note the service names for later. Enable the modified NIC. The server will not broadcast its name to the network because of the services you disabled.
- Stop any applications that may be running on your source. The files must be closed on the source so that updated files from the target will overwrite the files on the source.
- At this point, confirm you have the following configuration.
- Your target is standing in for your source because of failover, and users are accessing their data from the target.
- Your source is back online with a unique IP address and no network name conflicts.
- The source and target can communicate with each other.
- All applications on the source are stopped.
- The Replication Console is a legacy console that is eventually being phased into the Double-Take Console. This console is used for the restoration process. To access this console, select Start, Programs, Double-Take, Double-Take Replication Console.
- Select Insert Server, specify the source and click OK.
- Begin your restoration process.
- From the Replication Console, select Tools, Restoration Manager.
- Identify the Original Source machine. This is your source machine where the data originally resided.
- Select the Restore From machine. This is the target machine where the copy of the data is stored.
- Replication Set contains the replication set information stored on the target machine (the machine in Restore From). If no replication sets are available, the list will be blank. Select the replication set that corresponds to the data that you need to restore.
- Select the Restore To machine. This is your temporary source that has the unique IP address.
- Select the Restore from Route. This is the IP address and port on the target that the data will be transmitted through. This allows you to select a different route for Double-Take Availability traffic. For example, you can separate regular network traffic and Double-Take Availability traffic on a machine with multiple IP addresses.
-
The Restore To Server Path and Restore From Server Path paths will automatically be populated when the replication set is selected. The restore to path is the directory that is the common parent directory for all of the directories in the replication set. If the replication set crosses volumes, then there will be a separate path for each volume. The restore from path is the path on the target server where the replicated files are located.
- Select the Use Backup Replication Set check box to use the target’s copy of the replication set database for the restoration. If this check box is not marked, you will be accessing the replication set information from the source.
- Select the Restore Replication Set check box to restore the target’s copy of the replication set database to the source during the restoration process.
- Select the restoration conditionals that you want to use.
- Overwrite existing files during restore—This option restores all existing files by overwriting them. Any files that do not exist on the source are written also. If this option is disabled, only files that do not exist on the source will be restored.
-
Only if backup copy is more recent—This option restores only those files that are newer on the target than on the source. The entire file is overwritten with this option.
If you are using a database application, do not use the newer option unless you know for certain you need it. With database applications, it is critical that all files, not just some of them that might be newer, get mirrored.
- Use block checksum comparison/delta block transfer—Specify if you want the restoration process to use a block checksum comparison to determine which blocks are different. If this option is enabled, only those blocks (not the entire files) that are different will be restored to the source.
- If you want to configure orphan files, click the Orphans tab.
- If your original source was using Replicate NT Security by Name, you must enable that option on the target before you start the restoration. The option is available on the target’s Server Properties on the Source tab.
-
Click Restore to begin the restoration. You can identify a restoration connection because it is enclosed in parenthesis ( ) and it has _Restore appended to the end of the replication set name. The initial restoration is complete when the Mirror Status is Idle. After the Mirror Status is Idle, the connection will continue replicating any on-going data changes from the target to the source.
During the restoration, only the data is restored back to the source. Shares are not created on the source during the restoration. Shares that were created on the target during failover will need to be created manually on the source.
- After the Mirror Status is Idle, schedule a time for failback. User downtime will begin once failback is started, so select a time that will have minimal disruption on your users.
- When you are ready, begin the failback process. User downtime starts now.
- Deny user access to the target, so that no additional updates can be made to the data on the target.
- Stop all applications on the target, allowing the data to become quiescent.
- In the Replication Console, watch the restoration connection until activity has ended and replication is in a Ready state. This will happen as the final data in queue, if any, is applied on the source. The replication Ready state indicates replication is waiting for new incoming data changes.
- The Failover Control Center is a legacy console that is eventually being phased into the Double-Take Console. This console is used for the failback process. To access this console, select Start, Programs, Double-Take, Availability, Double-Take Availability Failover Control Center.
- On the main Failover Control Center page, click Add Target, specify your target server, and click OK.
- After the target is inserted in the Target Machine list, click Login. Supply valid credentials if prompted.
- Highlight the failed source and click Failback.
- You will be prompted that the restoration connection is still in place. Continue with the failback. If you have a pre-failback script configured, it will be started.
- When failback is complete, the post-failback script, if configured, will be started. When the script is complete, you will be prompted to determine if you want to continue monitoring the source, do not select either option. Leave the prompt dialog box open as is.
- Since failback has occurred, your restoration connection is no longer valid and will be marked with a red X. Disconnect the restoration connection.
- On the source, change the IP address that you modified earlier to the unique address back to its original address. You can also enable any other NICs on the source.
- Also on the source, change the source name back to its original name and reboot, or restart the Workstation, Server, and any other services you were prompted to stop.
- Once the source is back online, users can reconnect to the source.
- Confirm the Replication Console is communicating with the source using the original IP address.
- Right-click the source and select Remove.
- Depending on your configuration, the source may be automatically inserted back into the Replication Console. If it is not, select Insert, Server. Specify the source server and click OK.
-
At this time, you can go back to the dialog box in the Failover Control Center. Select Continue or Stop to indicate if you want to continue monitoring the source. After you have selected whether or not to continue monitoring the source, the source post-failback script, if configured, will be started.
The source must be online and Double-Take Availability must be running to ensure that the source post-failback script can be started. If the source has not completed its boot process, the command to start the script may be lost and the script will not be initiated.
- If desired, you can reconnect your original replication set on the source to your target to reestablish protection.